11.
1 Introduction
● Digital Technologies have transformed daily life, making tasks faster and more
convenient.
● Sectors like banking, aviation, e-commerce, and industrial production heavily rely on
digital technology.
● Digital technologies became widespread due to personal computers, the Internet, and
smartphones.
11.2 Digital Footprints
● Digital Footprint: The trail of data left behind from online activities.
○ Includes websites visited, emails sent, and information shared.
○ Contains device-specific details like IP address and location.
Types of Digital Footprints:
1. Active Digital Footprint: Data intentionally shared online (e.g., social media posts,
emails).
2. Passive Digital Footprint: Data collected without direct knowledge (e.g., browsing
history, cookies).
● Digital footprints can be stored on browsers and servers, making them difficult to erase
permanently.
11.3 Digital Society and Netizen
● Digital Society: A society where most activities (banking, communication, shopping) are
conducted digitally.
● Netizen: An individual using the Internet responsibly and ethically.
11.3.1 Net Etiquettes
1. Be Ethical
○ Avoid copyright violations.
○ Share credible expertise and information.
2. Be Respectful
○ Respect others' privacy and diversity.
3. Be Responsible
○ Avoid cyberbullying.
○ Ignore Internet trolls.
11.3.2 Communication Etiquettes
1. Be Precise
○ Respect others' time.
○ Avoid sending large attachments; use cloud storage.
2. Be Polite
○ Maintain a respectful tone in online interactions.
3. Be Credible
○ Ensure your communication is accurate and reliable.
11.3.3 Social Media Etiquettes
1. Be Secure
○ Use strong passwords.
○ Verify the authenticity of new connections.
○ Be cautious of fake information.
2. Be Reliable
○ Think before uploading content.
○ Understand that deleted content may still exist.
11.4 Data Protection
● Data Privacy: Ensuring sensitive data is accessible only to authorized users through
encryption and authentication.
11.4.1 Intellectual Property Rights (IPR)
1. Copyright: Legal protection for creative works (e.g., books, software, videos).
2. Patent: Protects inventions and gives the owner exclusive rights for 20 years.
3. Trademark: Protects symbols, logos, and brand names.
11.4.2 Violation of IPR
1. Plagiarism: Presenting someone else's work as your own without giving credit.
2. Copyright Infringement: Unauthorized use of copyrighted material.
3. Trademark Infringement: Using protected trademarks without permission.
11.4.3 Public Access and Open Source Software
● Creative Commons (CC): Allows free distribution of copyrighted works with specific
usage conditions.
● GNU General Public License (GPL): Allows free use, modification, and distribution of
software.
● Apache License: Allows open-source software distribution with fewer restrictions,
enabling both personal and commercial use.
● Software Piracy: Unauthorized use or distribution of copyrighted software.
11.5 Cyber Crime
● Cyber Crime: Criminal activities conducted in a digital environment.
Types of Cyber Crimes:
1. Hacking: Unauthorized access to computer systems.
○ White Hat Hackers: Ethical hackers who improve security.
○ Black Hat Hackers: Criminal hackers who exploit vulnerabilities.
2. Phishing and Fraud Emails: Deceptive methods to steal personal information (e.g.,
fake emails).
○ Identity Theft: Using stolen personal information for financial gain or other
purposes.
3. Ransomware: Malicious software that locks users out of their data until a ransom is
paid.
4. Eavesdropping: Unauthorized interception of private communications, including emails
and phone calls.
5. Cyberbullying: Using digital platforms to harass, intimidate, or threaten individuals.
6. Cyber Trolls: Individuals who deliberately post offensive or provocative content online to
disturb others.
Preventing Cyber Crime:
● Use updated antivirus software.
● Regularly back up important data.
● Use strong, unique passwords.
● Avoid downloading from untrusted websites.
● Practice safe browsing habits and verify links before clicking.
11.6 Indian Information Technology Act (IT Act)
● IT Act, 2000 (amended in 2008) governs cyber activities and provides a legal framework
for e-governance.
Key Provisions:
● Recognizes electronic records and digital signatures.
● Addresses crimes like hacking, data theft, and publishing sensitive data.
● Cyber Appellate Tribunal handles cyber crime disputes.
● Provides legal support for online transactions and protects user data.
11.7 Malware
Malware refers to malicious software designed to harm, exploit, or disrupt digital devices.
Types of Malware:
1. Viruses: Malicious code that attaches itself to legitimate programs.
2. Trojans: Malware disguised as legitimate software.
3. Adware: Software that displays unwanted advertisements.
Preventing Malware Attacks:
● Install and update antivirus software regularly.
● Avoid downloading files from untrusted websites.
● Keep operating systems and applications updated.
● Use firewalls to block unauthorized access.
11.8 E-Waste Management
E-Waste (Electronic Waste) refers to discarded electronic devices and gadgets.
Methods of E-Waste Management:
1. Reduce: Minimize the purchase of unnecessary gadgets.
2. Reuse: Extend the life of electronic devices through repair and upgrades.
3. Recycle: Properly dispose of devices through certified e-waste recycling programs.
Safe Disposal Practices:
● Donate functional electronics to charities.
● Use authorized e-waste collection centers.
Importance of E-Waste Management:
● Protects the environment from hazardous chemicals.
● Conserves natural resources.
11.9 Cyber Safety
Cyber safety involves practices and measures to protect digital devices and personal
information from cyber threats.
Best Practices for Cyber Safety:
1. Safe Browsing: Use HTTPS websites, avoid suspicious links.
2. Identity Protection: Use strong, unique passwords and enable 2FA.
3. Confidentiality: Avoid sharing sensitive information online.
11.10 Technology and Society: Gender and Disability Issues
Gender Issues in Technology:
● Representation Gap: Women are underrepresented in STEM fields.
● Access Disparity: Socio-cultural barriers can limit women's access to technology.
Disability Issues in Technology:
● Accessibility Challenges: Digital platforms may lack features for visually or
hearing-impaired users.
● Assistive Technologies: Tools like screen readers improve access.
● Inclusive Design: Implementing WCAG ensures equal access for all.