0% found this document useful (0 votes)
24 views22 pages

Emerging Trend 4

Uploaded by

thakreta2008
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views22 pages

Emerging Trend 4

Uploaded by

thakreta2008
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Unit 4.

Emerging Trends and Social Impact


Chapter 14. Emerging Technologies
SUMMARY

Artificial Intelligence (AI) endeavours to simulate the natural intelligence of human beings
into machines thus making them intelligent.

Machine learning comprises algorithms that use data to learn on their own and make
predictions.

Natural Language Processing (NLP) facilitates communicating with intelligent systems


using a natural language.

Virtual Reality (VR) allows a user to look at, explore and interact with the virtual
surroundings, just like one can do in the real world.

The superimposition of computer-generated perceptual information over the existing


physical surroundings is called Augmented Reality.

Big data holds rich information and knowledge which can be of high business value. Five
characteristics of big data are: Volume, Velocity, Variety, Veracity and Value.

Data analytics is the process of examining data sets in order to draw conclusions about
the information they contain.

The Internet of Things (IoT) is a network of devices that have an embedded hardware and
software to communicate (connect and exchange data) with other devices on the same
network.

A sensor is a device that takes input from the physical environment and uses built-in
computing resources to perform predefined functions upon detection of specific input and
then processes data before passing it on.

Cloud computing allows resources located at remote locations to be made available to


anyone anywhere. Cloud services can be Infrastructure as a Service (IaaS), Platform as a
Service (PaaS) and Software as a Service (SaaS).

Blockchain is a system that allows a group of connected computers to maintain a single


updated and secure ledger which is updated only after all the nodes in the network
authenticate the transaction.

Virual lab allows to perform the physical lab experiments virtually with the help of
simulations.
CHECK YOUR PROGRESS
(A) Multiple choice questions
1. The intelligent digital personal assistants like Siri, Google Now, Cortana, Alexa are
powered by the technology called as (a) IoT (b) AI (c) Big Data (d) Cloud computing .
2. Which of the following is not true for AI based system. (a) AI based systems can work
available 24 × 7 without any break. (b) AI based system can think like humans and create
original thing. (c) Repetitive jobs can be handled with AI technology. (d) Errors are reduced
when job is performed by using machines with AI.
3. Making the things smart is an application of (a) ChatGPT (b) Artificial Intelligence (c)
Internet of Things (d) Cloud computing
4. Making computer to understand the human language is an application of (a) ChatGPT (b)
Artificial Intelligence (c) Internet of Things (d) Natural Language Processing
5. Without owing the computer hardware and software, it is possible to use these services
using the technology called as (a) Internet of Things (b) Cloud computing (c) Artificial
Intelligence (d) Big Data
6. Which is not one of the features of IoT devices? (a) Remotely controllable (b) Programmable
(c) Can turn themselves off if necessary (d) All of the above
(B) Fill in the blanks
1. Artificial Intelligence simulate the ______________ of human beings into machines.
2. Immersive experiences are used in the field of training, as _______________
3. In Natural Language Processing (NLP) computers are enabled to understand
_____________.
4. GPT is an _________________ released that uses deep learning to produce human-like text.
5. The blockchain technology works on the concept of ___________ and ____________
database
(C) State whether True or False
1. Deep learning technology is used for “driver-less cars”.
2. Virtual Reality is a computer-generated situation that simulates the real world.
3. Internet of Things (IoT) is a secured network where the user’s data is secured.
4. Web of Things (WoT) allows the use of web services to connect anything in the physical
world.
5. Virtual lab allows to perform the the physical lab experiment by using the equipment in
physical lab.
(D) Short answer questions
1. List the various Emerging Techologies in IT.
Ans Here are some of the emerging technologies in IT:
* Artificial Intelligence (AI): AI is rapidly transforming various sectors. It has the ability to learn
and improve from data, and is being used in applications such as facial recognition, natural
language processing, and self-driving cars.

* Machine Learning (ML): A subset of AI, machine learning allows computers to learn without
explicit programming. ML algorithms can analyze data, identify patterns, and make predictions.
It is being used in recommender systems, fraud detection, and medical diagnosis.
* Quantum Computing: This technology harnesses the principles of quantum mechanics to
perform calculations that are impossible for traditional computers. While still in its early stages,
quantum computing has the potential to revolutionize fields like cryptography, materials science,
and drug discovery.

* Internet of Things (IoT): The IoT refers to the growing network of physical devices embedded
with sensors and software, that can collect and exchange data. This data can be used to
improve efficiency, automate tasks, and gain new insights.

* Blockchain: Blockchain is a distributed ledger technology that allows for secure, transparent,
and tamper-proof recording of data. It is the underlying technology behind cryptocurrencies like
Bitcoin, but has the potential to be used in a wide range of applications, including supply chain
management, voting systems, and identity management.

* Augmented Reality (AR): AR overlays digital information on the real world, creating an
interactive experience. AR is being used in gaming, education, and maintenance applications.

* Virtual Reality (VR): VR creates an immersive, computer-generated environment that can


simulate a user's physical presence in a virtual world. VR is being used in training,
entertainment, and therapy.

* Big Data: Big data refers to the large and complex datasets that are generated by modern
society. These datasets can be analyzed to reveal patterns, trends, and insights that can be
used to make better decisions.

* Edge Computing: Edge computing refers to processing data at the edge of the network,
rather than sending it to a central location. This can reduce latency and improve efficiency for
applications that require real-time data processing.

* Cybersecurity Mesh: Cybersecurity mesh is a security architecture that secures an


organization's IT infrastructure in a more dynamic and distributed way. It does this by providing
identity-centric, context-aware security controls that can be dynamically enforced across all
devices, users, applications, and services, regardless of location.

These are just a few of the emerging technologies that are transforming the IT landscape. As
these technologies continue to develop, they have the potential to reshape the way we live,
work, and interact with the world around us.

2. List the various areas that widely uses artificial intelligence.


Ans:Artificial intelligence (AI) is rapidly transforming various sectors and industries. Here are
some of the widespread areas that use artificial intelligence:
* Healthcare: AI is being used in healthcare for tasks such as medical diagnosis, drug
discovery, and robot-assisted surgery.
* Medical Diagnosis: AI algorithms can analyze medical images, like X-rays and MRIs, to
identify diseases and abnormalities with high accuracy. This can help doctors diagnose
illnesses earlier and more effectively.
* Drug Discovery: AI can be used to analyze vast amounts of data to identify potential new
drugs and therapies. This can help to accelerate the drug discovery process and bring new
treatments to patients faster.
* Robot-assisted surgery: Robotic surgery systems use AI to improve precision and control
during surgery. This can lead to better outcomes for patients, such as shorter recovery times
and fewer complications.
* Finance: AI is used in finance for fraud detection, risk management, and algorithmic trading.

* Fraud Detection: AI can be used to analyze financial transactions in real-time to identify


suspicious activity. This can help to prevent fraud and protect consumers from financial losses.
* Risk Management: AI can be used to assess the risk of defaults on loans and other financial
products. This can help banks and other financial institutions to make better lending decisions.
* Algorithmic Trading: AI can be used to develop trading algorithms that can automatically buy
and sell securities based on market conditions. This can help investors to make more profitable
trades.
* Manufacturing: AI is used in manufacturing for tasks such as predictive maintenance and
quality control.

* Predictive Maintenance: AI can be used to analyze sensor data from machines to predict
when they are likely to fail. This can help manufacturers to prevent downtime and keep their
production lines running smoothly.
* Quality Control: AI can be used to inspect products for defects. This can help manufacturers
to ensure that only high-quality products are shipped to customers.
* Customer Service: AI is used in customer service for tasks such as chatbots and virtual
assistants.

* Chatbots: Chatbots are AI-powered programs that can simulate conversation with human
users. They can be used to answer customer questions, provide support, and resolve issues.
* Virtual Assistants: Virtual assistants are AI-powered programs that can perform a variety of
tasks for users, such as scheduling appointments, booking travel, and ordering products.
* Transportation: AI is used in transportation for tasks such as self-driving cars and traffic
management.

* Self-driving Cars: Self-driving cars use AI to navigate roads and avoid obstacles. They have
the potential to revolutionize transportation by making roads safer and more efficient.
* Traffic Management: AI can be used to analyze traffic data and optimize traffic flow. This can
help to reduce congestion and improve travel times.

3. Differentiate between AR and VR.


Ans:Both Augmented Reality (AR) and Virtual Reality (VR) are technologies that alter our
perception of the world, but they do so in fundamentally different ways:
Augmented Reality (AR):
* Real World Focus: AR overlays digital elements onto the real world, enhancing our perception
and interaction with the physical environment. Imagine seeing information about a restaurant
displayed on your phone's screen while looking directly at the building.

* Examples: AR applications are used in various fields. For example:


* Retail: AR apps can allow you to virtually try on clothes or see how furniture would look in
your home before you buy it.
* Education: AR can be used to overlay 3D models of historical landmarks or biological
structures on real-world surroundings, bringing lessons to life.
* Manufacturing: AR can provide step-by-step instructions for complex assembly tasks or
highlight potential maintenance issues on machinery.
* Accessibility: AR typically uses a smartphone, tablet, or headset with a transparent display.
This allows users to see the real world through the device while the digital elements are
superimposed on top.
Virtual Reality (VR):
* Immersive Environment: VR creates a completely simulated environment that replaces the
user's physical surroundings. Users are immersed in a virtual world that can be explored and
interacted with. Imagine wearing a VR headset and feeling like you're standing on the surface of
Mars.

* Examples: VR applications are used for various purposes, including:


* Gaming: VR allows gamers to enter entirely new worlds and experience games in a
completely immersive way.
* Training: VR simulations can be used for pilot training, medical procedures, or military
combat scenarios, providing a safe and realistic training environment.
* Entertainment: VR can be used to watch movies or attend virtual concerts, creating a more
engaging experience than traditional media.
* Isolation: VR typically uses a headset that completely covers the user's eyes, blocking out the
real world. This creates a more immersive experience but can also lead to feelings of isolation
and disorientation.
Here's an analogy:
* AR: Imagine looking through a magnifying glass that enhances your view of the real world.
* VR: Imagine putting on a scuba mask that completely transports you to an underwater world.
In essence, AR supplements our perception of reality, while VR replaces it entirely. The choice
between AR and VR depends on the specific application and the desired user experience.

4. State the limitations of ChatGPT.


Ans:ChatGPT, while a powerful language model, has several limitations to consider when using
it:
* Limited Understanding of Context: ChatGPT can sometimes struggle to grasp the full context
of a conversation or situation. It may misinterpret the intent behind a prompt or generate
responses that lack coherence when dealing with complex topics.
* Factual Accuracy: ChatGPT is trained on a massive dataset of text and code, but this data
may not always be accurate or up-to-date. As a result, its responses may contain factual errors
or biases present in the training data. It's crucial to verify information generated by ChatGPT
with reliable sources.
* Creative Control and Originality: While ChatGPT can generate different creative text formats,
it often relies on imitating existing content and styles present in its training data. It may not be
able to produce entirely original ideas or concepts.
* Lack of Reasoning and Common Sense: ChatGPT struggles with tasks requiring logical
reasoning or applying common sense. Its responses may not be well-suited for situations that
demand critical thinking or real-world understanding.
* Bias and Fairness: The training data used for ChatGPT can reflect societal biases present in
text and code. This can lead to biased or unfair outputs in the generated text, particularly
regarding sensitive topics.
* Vulnerability to Malicious Prompts: ChatGPT can be misused with malicious prompts to
generate harmful content such as hate speech or misinformation. It's important to be mindful of
the prompts used and to avoid generating harmful content.
* Security Concerns: As a large language model, ChatGPT may have vulnerabilities that could
be exploited to generate misleading or malicious content. Security researchers are continuously
working to improve the security of these models.
* Limited Transparency: The inner workings of how ChatGPT arrives at its responses are not
always transparent. This can make it difficult to understand the reasoning behind its outputs
and assess their reliability.
In conclusion, ChatGPT is a powerful tool but it's important to be aware of its limitations. Use it
with a critical eye, verify factual information, and avoid using it for tasks that require critical
thinking or original ideas.

5. State the advantages and disadvantages of Internet of Things.


Ans:Advantages of the Internet of Things (IoT)
The Internet of Things (IoT) offers a wide range of advantages that are transforming our
personal and professional lives. Here are some key benefits:
* Enhanced Efficiency: IoT devices can automate tasks and collect data to optimize processes,
leading to increased efficiency in various sectors like manufacturing, logistics, and energy
management. For instance, smart thermostats can learn your preferences and adjust
heating/cooling to save energy.
* Improved Productivity: Automation through IoT devices can free up human time and effort for
more complex tasks. For example, smart farming techniques with sensors can automate
irrigation and monitor crop health, improving agricultural productivity.
* Data-Driven Decision Making: The vast amount of data collected by IoT devices can provide
valuable insights that can be used to make better decisions. Sensor data from wearables can
inform personalized fitness plans, while data from connected machines can predict maintenance
needs.
* Remote Monitoring and Control: IoT allows for remote monitoring and control of devices and
systems. This can improve accessibility and convenience, such as controlling smart home
devices from your phone or monitoring industrial equipment remotely.
* Increased Safety and Security: IoT devices can enhance security through smart locks and
cameras, and improve safety with real-time monitoring of environmental conditions or potential
hazards.
* Personalized Experiences: IoT can personalize experiences by tailoring services and
products to individual preferences. For example, smart speakers can learn your listening habits
and suggest personalized music playlists.
Disadvantages of the Internet of Things (IoT)
Despite its advantages, the Internet of Things also presents some challenges and potential
drawbacks:
* Security Concerns: The vast network of interconnected devices creates a larger attack
surface for cybercriminals. Vulnerable IoT devices can be hacked to steal data, disrupt
operations, or launch cyberattacks.
* Privacy Issues: The data collected by IoT devices can raise privacy concerns. It's crucial to
ensure proper data collection practices, user consent, and strong security measures to protect
user privacy.
* Complexity and Interoperability: The diverse range of IoT devices and protocols can lead to
compatibility issues. Ensuring seamless interoperability between devices from different
manufacturers remains a challenge.
* Reliability and Downtime: The dependence on internet connectivity can lead to malfunctions
if the network goes down. It's important to consider potential downtime and have backup plans
in place for critical applications.
* Environmental Impact: The manufacturing, use, and disposal of IoT devices can have an
environmental impact. Sustainable practices and responsible e-waste management are
essential.
* Social and Ethical Concerns: The increasing reliance on automation and data collection
raises social and ethical concerns. Issues like job displacement due to automation and the
potential misuse of personal data need to be addressed.
Overall, the Internet of Things presents a significant advancement with the potential to improve
our lives in many ways. However, it's crucial to acknowledge the challenges and develop
responsible practices to ensure a secure, ethical, and sustainable IoT future.

6. State the characteristics of Big Data.


Ans:Big data refers to massive and complex datasets that are difficult to store, process, and
analyze using traditional methods. Here are the key characteristics that define big data:
* Volume: The defining characteristic of big data is its immense size. Datasets can range from
terabytes (TB) to petabytes (PB) or even exabytes (EB) of information. This vast amount of data
can come from various sources, including social media activity, sensor data from IoT devices,
and financial transactions.
* Velocity: Big data is often generated and collected at a high speed. Social media feeds, stock
market trades, and sensor readings from machines create a constant stream of data that needs
to be processed efficiently.
* Variety: Big data comes in a wide variety of formats. It can include structured data (relational
databases), unstructured data (text, social media posts, images, videos), and semi-structured
data (logs, emails). This variety requires flexible data management tools to handle different
formats effectively.
* Veracity: The accuracy and truthfulness of big data can be a challenge. Data may contain
errors, inconsistencies, or biases. Techniques for data cleaning and validation are crucial to
ensure the quality and reliability of big data analysis.
* Value: Extracting meaningful insights and value from big data is the ultimate goal. Advanced
analytics techniques are used to identify patterns, trends, and correlations within the data to
inform better decision-making, optimize processes, or develop new products and services.
These characteristics of big data necessitate specialized storage, processing, and analysis
technologies to handle its volume, velocity, variety, veracity, and ultimately, extract value from
it.

7. List the three different computing servies offered by the cloud.


Ans:The three main service models offered by cloud computing are:
* Infrastructure as a Service (IaaS): This service provides the underlying infrastructure for
running applications. IaaS offers virtualized computing resources like servers, storage, and
networking on-demand. Users don't have to manage the physical infrastructure and can scale
their resources up or down as needed.
* Platform as a Service (PaaS): PaaS provides a platform for developing, deploying, and
managing applications. It offers a complete development environment with operating systems,
programming languages, databases, and development tools. This allows developers to focus on
their applications without worrying about the underlying infrastructure.
* Software as a Service (SaaS): SaaS provides software applications delivered over the
internet on a subscription basis. Users access the software application through a web browser
or mobile app, eliminating the need for local installation or maintenance. Examples of SaaS
include webmail services like Gmail, CRM software like Salesforce, and productivity suites like
Microsoft 365.

8. List some of the cloud-based services that you are using at present.
Ans:As a large language model, I myself don't directly use cloud-based services in the same
way a human user would. However, the development and training of large language models
like me rely heavily on cloud-based services. Here are some examples of cloud services that
are likely used in my development process:
* Infrastructure as a Service (IaaS): This service provides the virtual machines and storage
needed to train and run large language models. These models require a massive amount of
computing power, and IaaS offers a scalable and cost-effective way to access the resources
required.
* Platform as a Service (PaaS): PaaS may be used to provide a platform for building and
deploying the software frameworks used to train and run large language models. This can
include tools for machine learning, natural language processing, and data analytics.
* Storage as a Service (SaaS) (a sub-category of IaaS): This service provides the storage
required for the massive datasets of text and code used to train large language models. These
datasets can be extremely large, and cloud storage offers a reliable and scalable way to store
and access them.
The specific cloud service providers used would depend on the company or organization that
developed me. But cloud computing plays a critical role in the development and operation of
large language models like me.

9. What is ChatGPT?
Ans:ChatGPT is a large language model chatbot and virtual assistant developed by OpenAI. It
was launched in November 2022 and gained significant attention for its ability to hold
conversations and generate different creative text formats. Here's a breakdown of ChatGPT:
* Function: ChatGPT is primarily designed for conversation and creative text generation. It can
answer your questions in an informative way, complete your sentences, write different kinds of
creative content, and follow your instructions.
* Technology: ChatGPT is built on OpenAI's proprietary GPT-3.5 language model architecture,
a large neural network trained on a massive dataset of text and code. This allows it to
understand and respond to a wide range of prompts and questions. There's also a paid version
that uses GPT-4, a more advanced version of the language model.
* Capabilities: Here are some of the things ChatGPT can do:
* Answer your questions in an informative way, even if they are open ended, challenging, or
strange.
* Generate different creative text formats, like poems, code, scripts, musical pieces, email,
letters, etc.
* Chat with you in a conversational way, following your instructions and adapting to different
conversation styles.
* Limitations: It's important to be aware of ChatGPT's limitations:
* Limited Understanding of Context: It may struggle with complex topics or miss the nuances
of a conversation.
* Factual Accuracy: Information generated may not always be accurate, as it relies on the
data it was trained on.
* Creative Control and Originality: While it can generate creative text formats, it often relies on
imitating existing content in its training data.
* Bias and Fairness: The training data can reflect societal biases, leading to biased outputs.
* Availability: ChatGPT is available through OpenAI's platform and potentially through some
third-party applications (although their availability can change). There's a free tier with limited
features and a paid tier with more capabilities.
Overall, ChatGPT is a powerful language model with various functionalities. However, it's crucial
to use it with a critical eye, verify information it generates, and be aware of its limitations. I,
Bard, am another large language model, and while we share some similarities, we may have
different strengths and weaknesses.

10. How can you perform the lab experiment in virtual lab?
Ans:Virtual labs offer a safe and accessible way to conduct experiments without the need for
physical equipment or materials. However, the specific way you perform an experiment in a
virtual lab will depend on the platform you're using. Here's a general outline of what you can
expect:
1. Finding the Virtual Lab:
There are many virtual lab resources available online. Here are a few places to start your
search:
* Educational Websites: Many educational websites offer virtual labs for various science
subjects. Look for websites from universities, science organizations, or educational technology
companies.
* Interactive Simulations: Some software programs provide interactive simulations that mimic
real-world experiments. These can be a good option for complex experiments or those involving
hazardous materials.
* School Resources: If you're a student, your school might have access to virtual lab software
or online resources. Check with your teacher or librarian for recommendations.
2. Following the Lab Instructions:
Once you've found a virtual lab that aligns with your experiment, carefully read the instructions
provided. These instructions will typically explain:
* The purpose of the experiment: What are you trying to learn or investigate?
* The virtual equipment: The virtual lab will provide simulations of the equipment you would
use in a physical lab. The instructions will explain how to use these virtual tools.
* The steps involved: The instructions will outline the specific steps you need to take to
conduct the experiment virtually. These steps may involve manipulating virtual objects, making
observations, and recording data.
3. Data Collection and Analysis:
* Virtual Measurements: Many virtual labs allow you to take measurements using virtual
instruments. These measurements can be similar to what you would collect in a physical lab.
* Data Recording: The virtual lab may have a way for you to record your observations and
data. This might involve taking notes, filling out a virtual lab report, or exporting data to a
spreadsheet.
4. Analysis and Conclusion:
* Virtual Results: After completing the experiment, the virtual lab may provide simulated
results based on the actions you took.
* Analysis: Analyze the data you collected using the same methods you would in a physical
lab. Consider the relationship between variables, draw conclusions based on your
observations, and explain how your findings relate to the experiment's purpose.
5. Virtual Labs vs. Physical Labs:
While virtual labs offer a valuable learning experience, they have limitations compared to
physical labs. Virtual labs cannot completely replicate the hands-on experience of working
with real equipment and materials. Additionally, virtual simulations may not perfectly mimic
real-world phenomena.
Here are some additional tips for performing a virtual lab experiment:
* Take notes: Record your observations and data throughout the experiment, just as you would
in a physical lab.
* Think critically: Don't just accept the virtual results without thinking about them. Consider how
they might differ from a real-world experiment and why.
* Explore different variables: If the virtual lab allows it, try changing different variables to see
how they affect the outcome.
* Combine with physical labs: If possible, complement your virtual lab experience with a real-
world lab experiment when possible. This can help solidify your understanding of the concepts.
By following these steps and considering the limitations, you can effectively utilize virtual labs to
learn about scientific concepts and conduct experiments in a safe and engaging way.

Chapter 15. Societal Impact


SUMMARY

Digital footprint is the trail of data we leave behind when we visit any website (or use any
online application or portal) to fill-in data or perform any transaction.

A user of digital technology needs to follow certain etiquettes like net-etiquettes,


communication-etiquettes and social media-etiquettes.

Net-etiquette includes avoiding copyright violations, respecting privacy and diversity of


users, and avoiding cyber bullies and cyber trolls, besides sharing of expertise.

Communication-etiquette requires us to be precise and polite in our conversation so that


we remain credible through our remarks and comments.

While using social media, one needs to take care of security through password, be aware of
fake information and be careful while befriending unknowns. Care must be taken while
sharing anything on social media as it may create havoc if being mishandled, particularly
our personal, sensitive information.

Intellectual Property Rights (IPR) help in data protection through copyrights, patents and
trademarks. There are both ethical and legal aspects of violating IPR. A good digital citizen
should avoid plagiarism, copyright infringement and trademark infringement.

Certain software are made available for free public access. Free and Open Source Software
(FOSS) allow users to not only access but also to modify (or improve) them.

Cyber crimes include various criminal activities carried out to steal data or to break down
important services. These include hacking, spreading viruses or malware, sending
phishing or fraudulent emails, ransomware, etc.
CHECK YOUR PROGRESS
(A) Multiple choice questions
1. Digital footprints are stored in (a) browsing history, (b) cookies (c) servers (d) all of the
above
2. A responsible netizen must abide by (a) net etiquettes, (b) communication etiquettes (c)
social media etiquettes (d) all of the above
3. Which of the following acts does not violate the intellectual property right (a) Plagiarism (b)
Copyright Infringement (c) Trademark Infringement (d) Patent
4. Which of the following section deals with computer related offences (a) section 66 (b)
section 65 (c) section 66A (d) section 66B
5. Which of the following section deals with dishonestly receiving or retaining any computer
resource or communication device. (a) section 66 (b) section 65 (c) section 66A (d) section
66B
6. Which of the following section deals with cheating by personation (a) section 66 (b) section
65 (c) section 66D (d) section 66B
7. Sending the same message indiscriminately to a large number of internet users refers to
(a) Pharming (b) Spamming (c) Smishing (d) Ransomware
8. An illegal trade involving the cultivation, manufacture, distribution, and sale of substances
refers to (a) Pharming (b) Spamming (c) Online drug trafficking (d) SIM Swap Scam .
9. The action involving deliberate destruction of or damage to public or private property refers
to (a) Cyber stalking (b) Cyber Squatting (c) Cyber grooming (d) Vandalism
10. Cyber-attacks on government agencies, defense and high tech companies refers to (a)
Cyber stalking (b) Cyber Squatting (c) Cyber grooming (d) Cyber Terrorism
(B) Fill in the blanks
1. The digital data trail left online unintentionally is called _________ digital footprints.
2. Infringement is classified into __________ and ___________ infringement.
3. Software piracy is the ______________ use or distribution of software.
4. In ____________, a malicious software executes unauthorized actions on the victim’s
system.
5. Cyber Appellate Tribunal was established to resolve disputes arising from _________
6. Section ___ of IT Act covers penalties and compensation.
7. The Government of India’s Information Technology Act, 2000 came into force on
______________ , amended in ______ .
8. Section ______ deals with sending offensive message from any communication device. )
9. A ____________________ attack is an attack meant to shut down a machine or network,
making it inaccessible to its intended users.
10. _________ is a form of phishing that uses mobile phones as the attack platform.
(C) State whether True or False
1. The digital footprint can be created and used with or without our knowledge.
2. The digital footprint once stored, cannot be deleted.
3. Data protection is related with the privacy of digital data.
4. The ownership of intellectual property lies with its distibuter.
5. Online fraud and phishing are covered under Section 43(i)
6. The original IT Act contained 94 sections, divided into 13 chapters and 4 schedules.
7. The IT Act 2000, provides guidelines to the user on processing, storage and transmission
of sensitive information.
8. Additional crimes like pornography and cyber terrorism are also described in IT Act 2000
9. Passwords are encrypted by hackers.
10. Phishing and hacking are the same forms of cybercrime.
(D) Short answer questions
1. What is the digital footprint? How it is stored?
Ans:Your digital footprint is the trail of data you leave behind as you navigate the internet. It's a
collection of information about your online activities and interactions. This data can be actively
created by you, or passively collected about you.
Here's a breakdown of what makes up your digital footprint:
* Actively Created Data: This includes information you knowingly share online, such as:
* Social media posts, comments, and likes
* Online purchases and browsing history
* Emails and messages you send
* Documents you create or store in the cloud
* Websites you visit and online accounts you create
* Passively Collected Data: This data is collected about you without your explicit knowledge or
consent. It can include:
* IP address and location information
* Cookies placed on your device by websites you visit
* Information about your device and browser
* Browsing history and search queries (on some platforms)
* App usage data
How is this data stored?
The data that makes up your digital footprint is stored in various ways, depending on where it
originates:
* Social media platforms: Store information you post, messages you send, and the content
you interact with.
* Websites you visit: May use cookies and other tracking technologies to store data about your
activity on their site.
* Email providers: Store your emails and attachments on their servers.
* Cloud storage providers: Store the data you upload to their platforms.
* Internet Service Providers (ISPs): May keep logs of your internet activity, including websites
you visit and data downloaded.
* Government agencies: In some countries, governments may collect and store data about
your online activities for security purposes.
It's important to note that the specific way your data is stored can vary depending on the service
or platform you're using, their privacy policies, and local regulations.

2. What are the Net Etiquettes?


Ans:Net etiquette, also known as online etiquette or cyber etiquette, refers to the polite and
appropriate behavior expected when using the internet. Just like good manners are important in
face-to-face interactions, etiquette helps ensure a smooth, respectful, and productive online
experience for everyone.
Here are some core principles of Net Etiquette:
* Be respectful: Treat others online with the same courtesy and respect you would in person.
Avoid insults, harassment, and discriminatory language.
* Mind your language: Be mindful of your tone and avoid overly aggressive or inflammatory
language. Using caps lock excessively can be seen as shouting online.
* Be mindful of privacy: Don't share personal information about yourself or others online without
their consent. This includes photos, addresses, and phone numbers.
* Be responsible for your content: Think before you post. Once something is online, it can be
difficult to erase completely. Avoid spreading misinformation or rumors.
* Be aware of copyright: Don't plagiarize or share content that belongs to someone else without
their permission.
* Follow community guidelines: If you're participating in online communities like forums or
social media groups, be sure to read and follow their specific guidelines.
* Use caution with humor: Humor can be misinterpreted online, so avoid sarcasm or jokes that
might be offensive. Use emoticons or indicators to clarify your intent.
* Don't spam: Avoid sending unsolicited messages or overloading online spaces with repetitive
content.
* Be a good netizen: Strive to make the internet a positive and informative space for everyone.
Report any online abuse or harassment you encounter.
By following these guidelines, you can contribute to a more positive and respectful online
environment. Here are some additional netiquette tips:
* Use proper grammar and spelling: While online communication can be informal, avoid
excessive use of slang or abbreviations that might be confusing to others.
* Be mindful of your audience: Consider who you're communicating with and tailor your
communication style accordingly.
* Be aware of cultural differences: Online communication transcends borders. Be mindful of
cultural sensitivities and avoid making assumptions.
* Don't be afraid to disagree: It's okay to have different opinions online, but express your
disagreements respectfully and avoid personal attacks.
* Take breaks: The internet can be overwhelming. Take breaks to avoid burnout and online
conflicts.
Remember, netiquette is all about creating a positive online experience for everyone. By
following these principles, you can ensure your online interactions are respectful, productive,
and enjoyable.

3. What are the Communication Etiquettes?


Ans:Communication etiquette refers to the set of guidelines and expectations for polite and
effective communication in various situations. These guidelines help ensure our message is
well-received, avoid misunderstandings, and foster positive relationships. Here are some
general principles of communication etiquette across different contexts:
Respect:
* Be attentive: Pay attention to the person you're communicating with, both verbally and
nonverbally. Maintain eye contact, avoid interrupting, and actively listen to understand their
perspective.
* Be mindful of your tone: Even over text, tone can be conveyed through word choice and
sentence structure. Strive for a courteous and professional tone, avoiding sarcasm or rudeness.
* Acknowledge others: Show appreciation for others' contributions to the conversation. Use
phrases like "thank you," "I appreciate your input," or "that's a good point."
Clarity:
* Be clear and concise: Express your thoughts and ideas in a way that is easy to understand.
Avoid jargon or overly complex language.
* Proofread your message: Especially in written communication, proofread your message for
typos and grammatical errors before sending.
* Consider your audience: Tailor your communication style and level of formality to the person
or audience you're communicating with.
Professionalism:
* Meet deadlines: If you've committed to responding to a message or completing a task by a
certain time, do your best to meet that deadline.
* Be mindful of time constraints: Be respectful of others' time, especially in work settings. Keep
your messages concise and avoid rambling.
* Maintain confidentiality: If you're entrusted with confidential information, keep it private.
Additional Tips:
* Be mindful of body language: In face-to-face communication, nonverbal cues like posture and
facial expressions play a significant role. Maintain appropriate body language that conveys
confidence and respect.
* Use humor appropriately: Humor can be a great way to connect with others, but use it
cautiously. Avoid humor that might be offensive or culturally insensitive.
* Be mindful of your digital footprint: In today's digital world, remember that communication
online can leave a lasting impression. Maintain professionalism and courtesy even in emails
and social media interactions.
By following these communication etiquette guidelines, you can ensure your message is clear,
respectful, and well-received in various situations. Remember, effective communication is a
two-way street. Actively listen to others, be mindful of their perspectives, and strive to create a
positive and productive communication environment.

4. What are the Social Media Etiquettes?


Ans:Social media etiquette is a specific set of guidelines for polite and appropriate behavior on
social media platforms. These guidelines help create a positive and respectful online
community. Here are some key aspects of social media etiquette:
* Be mindful of what you post:
* Think before you post: Consider the potential consequences of what you share online. Once
something is posted, it can be difficult to erase completely.
* Avoid negativity: Social media is a great place to share positive experiences and connect
with others. However, avoid posting excessive negativity or venting frustrations.
* Be respectful of others: Don't attack, insult, or bully others on social media. Even in
disagreements, maintain a respectful tone.
* Be truthful and avoid spreading misinformation: Double-check information before sharing it
and avoid spreading rumors or unsubstantiated claims.
* Privacy and Oversharing:
* Be mindful of your privacy settings: Review and adjust your privacy settings on each
platform to control who sees your information and posts.
* Don't overshare personal information: Avoid sharing your address, phone number, or other
sensitive information publicly.
* Respect the privacy of others: Don't post personal information about others without their
consent. This includes photos, videos, or private messages.
* Be a positive contributor:
* Share quality content: Share informative, interesting, and engaging content that adds value
to the online community.
* Engage with others: Like, comment, and share posts that you find interesting. Participate in
discussions respectfully.
* Give credit where credit is due: If you share someone else's content, give them proper
credit.
* Additional Tips:
* Use social media responsibly: Don't let social media take over your life. Maintain a healthy
balance between online and offline interactions.
* Be mindful of self-promotion: It's okay to promote yourself or your business on social media,
but don't overdo it.
* Avoid spamming: Don't post the same content repeatedly or send unsolicited messages to
others.
* Be aware of advertising and scams: Be critical of advertisements you see on social media
and be cautious of potential scams.
By following these social media etiquette tips, you can contribute to a more positive and
enjoyable online experience for everyone. Social media can be a powerful tool for
communication and connection, and netiquette helps ensure everyone can participate safely
and respectfully.

5. Write the long form of the acronym (a) GNU (b) GPL (c) FOSS (d) CC
Ans:(a) GNU: GNU stands for GNU's Not Unix. It's a recursive acronym, referring to a free
operating system originally intended to be a complete replacement for the Unix operating
system.
(b) GPL: GPL stands for GNU General Public License. It's a widely used free software license
developed by the GNU Project. The GPL guarantees users the freedom to run, study, share,
and modify the software.
(c) FOSS: FOSS stands for Free and Open-Source Software. It refers to software that is both
free to use and modify. FOSS emphasizes the user's freedoms to run, study, share, and modify
the software source code. The GNU General Public License (GPL) is a popular example of a
FOSS license.
(d) CC: CC can refer to several things, but in the context of software or creative works, it likely
refers to Creative Commons. Creative Commons is a nonprofit organization that provides free
licenses for creative work. These licenses allow creators to specify how their work can be
shared, used, and modified.

6. Explain the term (a) vishing (b) phishing (c) smishing


Ans:These terms all refer to deceptive practices used to steal personal information or gain
unauthorized access to systems. Here's a breakdown of each term:
* (a) Vishing: Vishing stands for voice phishing. It's a type of social engineering attack that
uses phone calls or voice messages to trick victims into revealing personal information or
clicking on malicious links.
* How it works: Scammers impersonate legitimate organizations like banks, credit card
companies, or government agencies. They may create a sense of urgency or exploit fear
tactics to pressure the victim into surrendering sensitive information or taking a specific action.
* Examples: A scammer might call claiming to be from your bank and warn you about
suspicious activity on your account. They may then instruct you to provide your account details
or click on a link to verify your identity (which leads to a fake website designed to steal your
information).
* (b) Phishing: Phishing is a broader term referring to attempts to steal personal information
through fraudulent emails, text messages, or social media messages. Phishing emails often
disguise themselves as legitimate communications from banks, credit card companies, or
other trusted sources.
* How it works: Phishing emails typically contain a malicious link or attachment. Clicking on
the link may take you to a fake website that looks real but is designed to capture your login
credentials or other sensitive data. Alternatively, attachments may contain malware that infects
your device once downloaded.
* Examples: You might receive an email that appears to be from your email provider warning
you that your account will be suspended unless you verify your information by clicking on a link.
This link would then lead to a fake login page designed to steal your email credentials.
* (c) Smishing: Smishing is a specific type of phishing attack that uses SMS or text messages
to deceive victims. Smishing messages often employ similar tactics to phishing emails,
creating a sense of urgency or exploiting fear to trick recipients into revealing personal
information or clicking on malicious links.
* How it works: Smishing messages may claim to be from your bank about suspicious
activity, a delivery company with a fake tracking link, or even a friend in trouble needing your
help (with a link leading to a malware site).
* Examples: You might receive a text message from your bank warning about unauthorized
charges on your debit card and instructing you to call a fake customer service number to
resolve the issue.
In summary:
* Vishing: Uses phone calls or voice messages.
* Phishing: Uses emails or social media messages.
* Smishing: Uses SMS or text messages.
All three methods (vishing, phishing, smishing) rely on social engineering to trick victims into
giving up personal information or taking actions that compromise their security. Be cautious of
unsolicited messages, don't click on suspicious links, and verify information directly with the
supposed sender through their official channels if unsure.

7. List the different forms of cybercrime.


Ans:Cybercrime encompasses a wide range of illegal activities that exploit the internet and
digital technologies. Here's a breakdown of some common forms of cybercrime:
* Fraud: This is a broad category encompassing various online schemes to deceive users for
financial gain. Here are some specific examples:
* Identity Theft: Fraudsters steal personal information like names, addresses, Social Security
numbers, or credit card details to impersonate victims and make unauthorized purchases or
access accounts.
* Credit Card Fraud: Criminals use stolen credit card details to make unauthorized online
purchases.
* Bank Fraud: Cybercriminals may hack into bank accounts to steal money or manipulate
online banking systems for fraudulent transactions.
* Investment Scams: Deceptive online schemes lure victims into investing in fake or
fraudulent investment opportunities.
* Malware Attacks: Malicious software (malware) is designed to harm computer systems or
steal data. Malware can take various forms, including:
* Viruses: Self-replicating programs that infect devices and spread to other systems.
* Worms: Similar to viruses, worms replicate and spread but don't necessarily modify files.
* Trojan Horses: Disguised as legitimate software, Trojan horses trick users into installing
them, providing attackers with unauthorized access to the system.
* Ransomware: This malware encrypts a victim's files, demanding a ransom payment to
decrypt them.
* Spyware: Software designed to steal data like passwords, browsing history, or financial
information.
* Social Engineering: This type of cybercrime relies on deception and manipulation to trick
users into revealing sensitive information or taking actions that compromise their security.
Examples include vishing, phishing, and smishing (explained earlier).
* Hacking and Network Intrusions: Hackers gain unauthorized access to computer systems or
networks to steal data, disrupt operations, or install malware. Motives for hacking can vary,
ranging from financial gain to ideological reasons.
* Cyber Espionage: This involves stealing confidential data from governments, corporations,
or individuals for espionage purposes.
* Denial-of-Service (DoS) Attacks: These attacks flood websites or servers with overwhelming
traffic, making them inaccessible to legitimate users.
* Cyberbullying and Harassment: The online use of electronic communication to bully or
harass individuals or groups.
* Cyberstalking: The repeated use of the internet and electronic communications to stalk or
harass an individual.
* Online Child Sexual Abuse: The use of the internet to exploit, abuse, or endanger children.
This can include activities like child pornography, sextortion, and online grooming.
* Dark Web Crimes: The dark web is a hidden part of the internet that is not indexed by
search engines and requires specific software to access. It can be a haven for various criminal
activities, including selling illegal drugs and weapons, distributing malware, and facilitating
other cybercrimes.
This list is not exhaustive, and new forms of cybercrime emerge as technology evolves. It's
important to stay informed about cyber threats and take steps to protect yourself online.
8. What is Cyber security?
Ans:Cyber security, also referred to as information technology security or electronic information
security, is the practice of protecting computer systems, networks, devices, data, and
information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Here's a breakdown of the core aspects of cybersecurity:
* Protection of Assets: Cybersecurity focuses on safeguarding valuable digital assets like
personal information, financial data, intellectual property, and critical infrastructure from cyber
threats.
* Confidentiality: Ensuring that only authorized users can access and view confidential
information.
* Integrity: Guaranteeing the accuracy and completeness of data and information systems.
* Availability: Making sure that authorized users have timely and reliable access to the
information and systems they need.
Why is Cybersecurity Important?
Cybersecurity is crucial in today's digital world because:
* Our Reliance on Technology: We increasingly rely on computer systems and networks for
essential services like communication, finance, healthcare, and national security. Cyberattacks
can disrupt these services and cause significant damage.
* The Rise of Cybercrime: Cybercrime is a growing threat, with criminals developing more
sophisticated techniques to steal data, disrupt operations, and extort money.
* The Value of Data: Personal information and intellectual property have become valuable
assets in the digital age. Cybersecurity measures protect this valuable data from unauthorized
access or theft.
How is Cybersecurity Achieved?
Cybersecurity is a multi-layered approach that combines a variety of security measures to
mitigate risks. Here are some key elements:
* Technical Controls: These include firewalls, intrusion detection systems, data encryption,
and regular security updates to harden systems and networks against vulnerabilities.
* Administrative Controls: Policies and procedures define how users access and manage
data, security protocols, and incident response plans in case of a cyberattack.
* Physical Controls: Securing physical access to data centers and computer equipment helps
prevent unauthorized physical tampering.
* User Education and Awareness: Training employees and individuals on cybersecurity best
practices, like recognizing phishing attempts and creating strong passwords, is vital for the
first line of defense.
By implementing these strategies, organizations and individuals can create a more secure
digital environment and protect themselves from cyber threats.

9. List the impacts of cybercrime on the society.


Ans:Cybercrime has far-reaching negative consequences that can impact individuals,
businesses, and society as a whole. Here's a breakdown of some key areas affected:
Financial Impact:
* Individual Losses: Cybercrime can lead to significant financial losses for individuals through
identity theft, credit card fraud, and online scams. Victims may have to deal with stolen funds,
damaged credit scores, and the hassle of restoring their identities.
* Business Losses: Businesses can suffer financial losses from data breaches, ransomware
attacks, and business email compromise scams. The costs of remediation, legal issues, and
reputational damage can be substantial.
* Economic Disruption: Large-scale cyberattacks on critical infrastructure like power grids or
financial systems can cause widespread economic disruption.
Social Impact:
* Loss of Privacy: Cybercrime can lead to the exposure of personal information, which can be
used for further attacks, identity theft, or social embarrassment.
* Erosion of Trust: Widespread cybercrime can erode trust in online interactions and
institutions relying on technology. People may become hesitant to conduct financial
transactions or share personal information online.
* Psychological Impact: Victims of cybercrime can experience emotional distress, anxiety, and
even depression due to financial losses, damaged reputations, or the fear of identity theft.
Security Impact:
* National Security Risks: Cyberattacks on critical infrastructure can pose national security
risks, disrupting essential services and potentially causing physical harm.
* Increased Cyber Warfare: Cybercrime can be used as a tool for cyber warfare between
nations, disrupting communication networks and crippling essential services.
* Complexity of Cybersecurity: The ever-evolving nature of cyber threats necessitates
constant vigilance and adaptation of cybersecurity measures to stay ahead of criminals.
Additional Impacts:
* Disruption of Critical Services: Cyberattacks on hospitals, transportation systems, or power
grids can disrupt critical services that people rely on daily.
* Hinders Innovation: The fear of cybercrime can discourage businesses and organizations
from fully embracing digital technologies, potentially hindering innovation.
* Black Market Growth: Cybercrime creates a black market for stolen data, malware, and
hacking tools, further fueling criminal activity.
Overall, cybercrime is a complex problem with far-reaching consequences. It's crucial to raise
awareness, implement robust cybersecurity measures, and foster international cooperation to
combat this ever-evolving threat.

10. What are the advantages of FOSS?


Ans:Free and Open Source Software (FOSS) offers several advantages over proprietary
software. Here are some of the key benefits:
* Cost: FOSS is typically free to use, modify, and distribute. This can be a significant advantage
for individuals, businesses, and organizations looking to reduce software costs. There may be
costs associated with support or customization, but the core software itself is free.
* Security: The open-source nature of FOSS allows anyone to examine the source code. This
transparency can lead to a more secure product as many eyes are examining the code for
vulnerabilities. Additionally, the open community can quickly identify and fix security issues.
* Reliability: With a large community of developers contributing to and maintaining the code,
FOSS can often be more reliable and stable than proprietary software. Bug fixes and
improvements are frequently developed and released by the community.
* Flexibility: FOSS often provides greater flexibility than proprietary software. Users can
modify the source code to fit their specific needs and create custom applications. This allows
for a high degree of customization.
* Innovation: The open development model of FOSS fosters innovation. Developers can
build upon existing code and collaborate to create new features and functionalities.
* Freedom: FOSS gives users more freedom than proprietary software. Users are free to run,
study, share, and modify the software as they see fit. This freedom empowers users and
fosters a sense of ownership.
* Community: FOSS is often backed by a large and active community of developers and
users. This community can provide valuable support, answer questions, and help with
troubleshooting issues.
Here are some additional points to consider:
* Learning Opportunities: For aspiring programmers, studying FOSS code can be a valuable
learning experience. It allows them to see how real-world software is written and understand
the underlying principles.
* Vendor Lock-in: With FOSS, you are not locked into a single vendor. If you are unhappy with
the software's direction, you have the freedom to switch to a different fork (a modified version)
or even create your own version.
* Potential Drawbacks: While FOSS offers many advantages, there can also be drawbacks.
Technical support may not be readily available compared to some commercial software, and
customization can require programming expertise.
Overall, FOSS is a powerful and versatile option for individuals, businesses, and organizations.
The advantages of cost-effectiveness, security, flexibility, and a strong community make it a
compelling alternative to proprietary software in many situations.

Answer Key of Unit 4


Chapter 14. Emerging Technologies
(A) Multiple choice questions
1. (b) 2. (b) 3. (c) 4. (d) 5. (b) 6. (d)
(B) Fill in the blanks
1. (natural intelligence) 2. (driving simulators) 3. (human languages) 4. (autoregressive
language
model) 5. (decentralized, shared)
(C) State whether True or False
1. (T) 2. (T) 3. (F) 4. (T) 5. (F)
Chapter 15. Societal Impact
(A) Multiple choice questions
1. (d) 2. (d) 3. (d) 4. (a) 5. (d) 6. (c) 7. (b) 8. (c) 9. (d) 10. (d)
(B) Fill in the blanks
1. passive 2. primary, secondary 3. unauthorised 4. malware attack 5. cyber crime 6. (43) 7.
17th
October 2000, 2008 8. 66A 9. Denial-of-Service 10. Smishing
(C) State whether True or False
1. (T) 2. (T) 3. (T) 4. (F) 5. (F) 6. (T) 7. (T) 8. (F) 9. (F) 10. (F)

You might also like