0% found this document useful (0 votes)
21 views3 pages

Societal Impact 2

Uploaded by

max12342732k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views3 pages

Societal Impact 2

Uploaded by

max12342732k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

SOCIETAL IMPACT | CLASS : XII | INFORMATICS PRACTICES

Fill in blanks:

(1) Software which usually limit the functionality after a trial period are known
as ................. .
(2) IT Amendment Act, 2008 came into force from the year .2009
`................ .
(3) Online ................. is a theft of personal information in order to commit
fraud.
(4) A smart mob . is an organized group of people who have gathered through
the use of social media to protest for a social or political cause.
(5) ................. is a specific type of disorder where a person can’t strike a
balance between their time online and offline.
(6) The practice of attempting to acquire sensitive information from individuals
over the internet by means of deception is called ................. .

MCQs:
(1) Which of the following is a/an open-source software?
(i) Microsoft Windows (ii) Adobe Photoshop
(iii) MySQL (iv) MS Powerpoint
(2) “Rice Bucket Challenge” is an example of:
(i) Crowd Sourcing (ii) Online Campaigns
(iii) Smart Mobs (iv) Internet Addiction
(3) Online personal account, personal websites are examples of:
(i) Digital Wallet (ii) Digital Property
(iii) Digital Certificate (iv) Digital Signature
(4) Unsolicited commercial email is known as ........................ .
(i) Spam (ii) Malware (iii) Virus (iv) Spyware
(5) Which of the following is not a type of a cybercrime?
(i) Data theft (ii) Forgery
(iii) Damage to data (iv) Installing antivirus for protection

CASE-BASED/SOURCE-BASED INTEGRATED QUESTIONS

1. Jeet has to prepare a project on “Swachh Bharat Abhiyan”. He decides to


gather information from the internet. He downloads three web pages
(webpage 1, webpage 2, webpage 3) containing information on Swachh
Bharat Mission. Which of the following steps taken by Jeet is/are an example
of plagiarism or copyright infringement. Give justification in support of your
answer.
(a) He read a paragraph on “Swachh Bharat Abhiyan” from webpage 1 and
rephrased it in his own words. He finally pasted the rephrased paragraph in
his project.
(b) He downloaded three images of “Swachh Bharat Abhiyan” from webpage 2.
He made a collage for his project using these images.
(c) He downloaded “Swachh Bharat Abhiyan” icon from web page 3 and pasted
it on the front page of his project report.
Ans. All of the above steps (a, b and c) taken by Jeet shall be considered as
plagiarism or copyright infringement as they are in violation of copyright
laws, which state that one should use one’s own words and ideas. However,
Jeet has copied the ideas along with the images from a website without
giving reference to the author or the website.
It is necessary to provide some reference or give credit to the source from where
you have received your information. Since he has used information from a
website, he should have cited the name of the website, its URL or the name
of the author along with proper acknowledgement.
2. Angad received an SMS, shown alongside, from his bank querying a recent
transaction. Answer the following questions as what he should do upon
receiving this SMS:
(a) Should he SMS his pin number to the given contact number?
(b) Should he call the bank helpline number to recheck the validity of the SMS
received?
Ans. (a) If he responds by sending his pin number, then there is an absolute
chance of hacking of his bank account which can result in a huge
financial loss to him.
(b) He should call the bank helpline number to recheck the validity of the SMS
received since this is an act of phishing (cybercrime) which is aimed at
stealthily getting information from the user.

You might also like