0% found this document useful (0 votes)
22 views9 pages

General Concept of Social Networking - Study Notes

Uploaded by

dkumar2003111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views9 pages

General Concept of Social Networking - Study Notes

Uploaded by

dkumar2003111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

General Concept

of Social
Networking
COMPUTER

Copyright © 2014-2021 Testbook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App

General Concept of Social Networking


Introduction
A social network is a collection of individuals linked together by a set of relationships. Online social
networking sites ‘virtually’ link individuals, who may or may not ‘know’ each other. As a result, they enable the
rapid exchange of knowledge, high levels of dialogue, and collaborative communication through text, audio,
and video.

Social networking
It is the process of connecting with friends, family, coworkers, and businesses online through social media
platforms. People can use social networking to share and talk about their interests and concerns with others
who might share them and interact with them in other ways.

Digital Technologies
• The employment of "Digital Technologies" has caused a lot of changes in the world around us recently.

• Our lives have been significantly impacted by these changes. making things more practical, quick, and
manageable.

COMPUTER | General Concept of Social Networking PAGE 2


Download Testbook App

• A letter used to take days to arrive, and each receiver would receive a copy and reply on their own.

Digital Footprint
• The digital shadows reflect the activity of any person on the internet and their behaviors towards the
information on the internet.

• The digital footprint is generated and used with or without user knowledge. It includes websites we
visited, emails sent by users, any information submitted by users on the online platform, and the
computer’s address, location, and other device-specific details.

There are two types of digital footprint: Active Digital


Footprint and Passive Digital Footprint.

• Active Digital Footprint: There are two kinds of


digital footprints users leave behind. Active
digital footprints include data that users
intentionally submit online. This would include
emails the users write or responses or posts users
make on different websites or mobile Apps, etc.

• Passive Digital Footprint: The digital data trail


users leave online unintentionally is called
passive digital footprints. This includes the data
generated when users visit a website, use a
mobile app, browse the Internet, etc.

Everyone who is connected to the Internet may have


a digital footprint. With more usage, the trail grows.
By examining the browser settings, Users can find
out how it stores our browsing history, cookies,
passwords, auto fills, and many other types of data.

COMPUTER | General Concept of Social Networking PAGE 3


Download Testbook App

Digital Society and Netizens


Thus, the rise in the use of digital technologies in all areas of human endeavor is reflected in the development
of a digital society. Internet etiquette, communication etiquette, and social media etiquette must all be
followed by a responsible netizen.

Etiquettes: It is the set of conventional rules of personal behavior in polite society, usually in the form of an
ethical code that delineates the expected and accepted social behaviors that accord with the conventions and
norms observed by a society, a social class, or a social group.

Net Etiquettes:
Net etiquette consists of ethical, respectful, and responsible behavior of users.

• Ethical: Users should not use copyrighted materials without the permission of the creator or owner. Prior
to sharing information, the users also need to be sure that user has sufficient knowledge on that topic. The
information shared should be true and unambiguous.

• Respectful: As good digital citizens users have the right to privacy and the freedom of personal expression.
At the same time, users have to understand that other digital citizens also have the same rights and
freedoms.

• Responsible: Any insulting, degrading, or intimidating online behavior to publicly ridicule a particular user
is termed as cyberbullying. Even do not feed the troll by posting inflammatory or off-topic messages in an
online community, just for amusement.

Communication Etiquettes:
• Digital communication includes email, texting, instant messaging, talking on the cell phone, audio or video
conferencing, posting on forums, social networking sites, etc.

Be Precise:
• Respect time we should not waste precious time in responding to unnecessary emails or comments unless
they have some relevance to us.

• Respect data limits: Rather send compressed files or links to the files through cloud-shared storage like
Google Drive, Microsoft OneDrive, Yahoo Dropbox, etc.

COMPUTER | General Concept of Social Networking PAGE 4


Download Testbook App

• Be Polite: We should be courteous and non-aggressive in our communication, whether it is synchronous


(happening in real-time, like chat, audio/video conversations, or forum posts), or asynchronous (like email,
forum posts, or comments). Even if we disagree with others' viewpoints, we should refrain from becoming
abusive.

• Be Credible: When leaving a comment, responding, or posting to a forum or email, we should exercise
caution because these actions affect our trustworthiness over time.

Social Media Etiquettes


Social Media platforms encourage users to share their thoughts and experiences through posts or pictures. In
this way, users can interact with other online users of those social media apps or channels.

In social media too, there are certain etiquettes users need to follow and they are:

Users need to be secure:

• Choose a password wisely: it is vital for social network users. there is a possibility that social networks can
be the reason for data leakage. Never share personal credentials like username and password with others.

• Know who you befriend: social networks usually encourage connecting with users (making friends),
sometimes even those whom the user doesn’t know or has not met. However, users need to be careful
while befriending unknown people as their intentions possibly could be malicious and unsafe.

• Beware of fake information: fake news, messages, and posts are common on social networks. As a user,
we should be aware of them. With experience, the user should be able to figure out whether news,
message, or post is genuine or fake.

Data Protection
Intellectual Property is legally protected through copyrights, patents, trademarks, etc.

Types of intellectual property rights:

• A patent may be granted for a new, useful, and non-obvious invention.

 It gives the patent holder an exclusive right to commercially exploit the invention for a certain
period of time (typically 20 years from the date of filing an application for patent).

• Copyright is given for creative and artistic works (e.g. books, movies, music, paintings, software etc).

COMPUTER | General Concept of Social Networking PAGE 5


Download Testbook App

 It gives a copyright holder the exclusive right to control the reproduction or adaptation of such
works for a certain period of time.

• Trademarks is a distinctive graphic sign which is used to distinguish the products or services of different
businesses.

 These are presently administered under the Trade Marks Act, 1999 and the rules are made
thereunder.

• Industrial design right protects the form of appearance, style or design of an industrial object (e.g. spare
parts, furniture, or textiles).

IPR violations or intellectual property violations:


• It is a type of cybercrime.
• Infringements against Intellectual Property Trademark, copyright, and patent infringement are the three
main types of intellectual property violations.
• Software piracy or other trademark and copyright infringement, such as copying an existing website's
content or text, are fairly widespread and call for a court order for an injunction. Additionally, using a
third party's trademark to falsely represent one business may be considered dishonest.
The following are some ways that intellectual property rights may be violated:

Plagiarism:
• Plagiarism is presenting someone else's work or ideas as your own, with or without their consent, by
incorporating it into your work without full acknowledgement.
• Plagiarism is both an illegal and punishable act and is considered to be on the same level as stealing from
the author who originally created it.

Phishing:
• The act of sending an email that falsely represents itself as coming from a reputable company, especially
banks.
• The email will request private data, including bank account information, PINs, or passwords, from the
receiver.

Skimming:
• This entails installing a skimmer device on an ATM machine so that it may read and save credit card
information. It leads to credit card fraud and misuse.

COMPUTER | General Concept of Social Networking PAGE 6


Download Testbook App

Cyberbullying
• Cyberbullying is the deliberate use of social media to persistently hurt or harass other individuals.
• It primarily involves bullying of schoolchildren online.

Cyber Crime
• Cybercrime is the use of a computer as an instrument to further illegal ends, such as committing fraud,
trafficking in child pornography and intellectual property, stealing identities, or violating privacy.

• The Cybercrime occurs primarily because of the skill of the offender who is called the Hacker.

• Cybercrime becomes easier for the offender to commit when the victim has a lack of knowledge towards
computer technology.

• Union Home Minister Amit Shah inaugurated the Indian Cyber Crime Coordination Centre (I4C) and also
dedicated the National Cyber Crime Reporting Portal to the nation on 11 Jan 2020.

• It is located in New Delhi.

• The scheme to set up I4C was approved in October 2018 at an estimated cost of around 416 crore rupees
to deal with all types of cyber-crimes in a comprehensive and coordinated manner.

• National Cyber Crime Reporting Portal (www.cybercrime.gov.in) is a citizen-centric initiative that will
enable citizens to report cybercrimes online through the portal.

Indian IT Act
The IT Act 2000 is the first cyber law in India.

• IT Act 2000 was enacted on 9th June 2000.

• IT Act 2000 was came into force on 17th October 2000.

• The original Act contained 94 sections, 13 chapters, and 4 schedules.

IT Act 2000 was amended in 2008.

• IT Act 2008 came into force on 27th October 2009.

• IT Act of 2008 contained 124 Sections and 14 Chapters.

COMPUTER | General Concept of Social Networking PAGE 7


Download Testbook App

• IT Act 2008 introduced Section 66A which penalized sending "offensive messages".

• Section 66A was scrapped by the supreme court of India in 2015.

Other Important Sections

• Identity Theft: Punishable under Section 66C of the IT Act, 2000.

• Software Piracy: Punishable under Section 63B of the IT Act, 2000.

• Hacking: Punishable under section Section 66 of IT Act, 2000.

Some Social Networking Sites:

Social networking sites are usually made up of other individuals; they might also include profiles of events,
companies, and even political parties. Facebook, Instagram, Twitter, and LinkedIn are examples of social
networking sites.

Facebook
• It is a social networking site that makes it easy for you to connect and share with family and friends online.

• Originally designed for college students, Facebook was created in 2004 by Mark Zuckerberg while he was
enrolled at Harvard University.

LinkedIn
• It is the most popular social networking site when it comes to online “business networking”.

• It is a platform that allows business people and professionals all over the world, regardless of their
industry, to connect with other professionals.

COMPUTER | General Concept of Social Networking PAGE 8


Download Testbook App

Twitter
• It is a social network that allows users to send and receive short messages, called tweets.

• Tweets can be up to 140 characters long. You can send tweets from your computer or even from your
mobile phone. Twitter users can follow what other people post.

Notebook
• An extremely lightweight personal computer. Notebook computers typically weigh less than 6 pounds
and are small enough to fit easily in a briefcase.

• Aside from size and portability, the principal difference between a notebook computer and a personal
computer is the display screen.

• Notebook computers use a variety of techniques, known as flat-panel technologies, to produce a


lightweight and non-bulky display screen.

COMPUTER | General Concept of Social Networking PAGE 9

You might also like