0% found this document useful (0 votes)
18 views22 pages

Chap 11

The document discusses the societal impact of digital technologies, defining concepts such as digital footprints, digital society, and netizens. It emphasizes the importance of net etiquette, communication etiquette, and social media etiquette, as well as the legal aspects of data protection, intellectual property rights, and cyber crime. Additionally, it outlines preventive measures against cyber crime and the role of the Indian IT Act in regulating digital activities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views22 pages

Chap 11

The document discusses the societal impact of digital technologies, defining concepts such as digital footprints, digital society, and netizens. It emphasizes the importance of net etiquette, communication etiquette, and social media etiquette, as well as the legal aspects of data protection, intellectual property rights, and cyber crime. Additionally, it outlines preventive measures against cyber crime and the role of the Indian IT Act in regulating digital activities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

1-MCQ

SOCIETAL IMPACT 1-2M


1-5M
8M

‘Digital Technologies’

From the banking industry to aviation impact of these


Industrial production to e-commerce, technologies on our
Dependent on the use of computers and society
digital technologies.
best practices that can
ensure safe digital
environment.
DIGITAL FOOTPRINTS
What is digital footprint? Give example.
• data created and used with or without knowledge of users when browsed
online
• example email, online shopping
Mention the types of digital footprint.
• two types
1. active digital footprint
2. passive digital footprint
• Active digital footprint:intentional online data submission
examples e-mail response, comment to your post
• Passive digital footprint: unintentional online data submission
example browsing Internet, use of apps
Digital society and netizen
Define Digital Society.
The integration of digital technologies into activities of daily life, including communication,
social networking, banking, shopping, entertainment, education, and transportation.
Define Netizen.
person who uses digital technology with Internet is called netizen or digital citizen
What are the good practices to be followed by internet user?
Or
what are the etiquettes to followed by netizen on internet?
• A responsible netizen must abide by or
1. Net etiquettes
2. Communication etiquettes
3. Social media etiquettes.
Explain the significance of net etiquette.
Net etiquette:
1. Be ethical
• No copyright violation:
Should not use should not use copyrighted materials without the permission of owner
• Share the expertise:
Sharing of knowledge and information on the Internet without ambiguity
2. Be respectful
• Respect privacy :
right to privacy and freedom for personal expression
• Respect diversity:
respecting the people with knowledge experience culture and aspects
3. Be responsible
• Avoid cyber bullying:
Avoid insulting, degrading, creating rumors
• Don’t feed the troll
“Internet troll” a person who upsets the people by posting unwanted messages
do not pay attention to the troll
Explain the role of communication etiquette in digital technology.
Communication etiquette:
it includes e-mail texting instant message audio video conferences post on social media
1. Be precise
respect time:
• Do not waste time by responding unwanted mails
respect to data limit:
• sending compressed files instead of large attachments
• EX: sending link through cloud storage like Google Drive
2. Be polite:
using polite words by avoiding abusive words in synchronous or asynchronous
communication
3. Be credible
be cautious on reply and comments which decides the credibility
Explain the significance of social media etiquette.
Social media etiquette
• What is social media
• applications that enable users to participate in social network by sharing content in their
community

be secure :
1. choose password wisely
Having strong and frequently changed passwords
2. know who you befriend
beware of unknown people as their intentions could be Malicious
3. beware of fake information
Figuring the fake news and message with awareness and experience
be reliable :
think before uploading
be cautious while uploading or sending sensitive and confidential information
What are the policies or guidelines or laws for Data protection
Data protection:
Data protection

Intellectual property right(IPR) Violation of IPR Public access and open source

Copyright Trademark
plagiarism infringement license
copyright patent trademark infringement

Software piracy

Intellectual property right(IPR )


• something new or idea of a person referred to as intellectual property
Ex: inventions, literacy, symbols
• this enables creator or copyright owner to earn recognition of financial
benefit for their idea of creation
• Provides legal ownership through copyright, patents, trademark
What is copyright? What are rights that a owner can possess?
a) Copyright:
• granting legal rights to creators for their original works like writing,
photograph, audio recordings, video, sculptures, architectural works,
computer software, and other creative works like literary and artistic work.
The rights include
• right to copy (reproduce) a work,
• right to create derivative works based upon it,
• right to distribute copies of the work to the public, and
• right to publicly display or perform the work.
Advantage:
• It prevents others from copying, using or selling the work.
• Ex: copyright for novel
What is patent?
b) Patent
Granted for inventions to prevent others from using, selling or distributing the
invention.
• patentee gets the rights to decide how to use the invention by others.
• Can protect invention for 20 years after it can be freely used.
What is trade mark?
c) Trademark
• Any visual symbol word name slogan label etc the identifies the brand
example like nike
• No other brands are allowed to use the same
Mention the violations of IPR
Violation of IPR
What is plagiarism?
1. Plagiarism:
• Presenting someone idea or work as ones own idea
OR
• Deriving an idea or product from which is already existing and
presenting it as new
2. Copyright infringement
• Using other persons work without obtaining permission or not paying
for it if sold.
3. Trademark infringement
Unauthorised use of others trademark on products and services.
Public access and open source software
What is license? mention its types.
License
• Rules and guidelines for others to use existing work
• 2 types
1. Public license:
license
• Allows users to use and modify the content with copyright
2. Open source license Open
Public
source
• Allows user to contribute to existing work without permission or copyright
GNU GPL(general public license) CC creative commons licence
GNU General public license(GPL) Creative
commons(CC)

It is a free software license author gives people the right to


provided to end users to study share, use and build on it
and modify the software Freeware software
license/proprietary software
FOSS
Ex:Skype, adobe reader Ex:music, literature ,creative
work
• Freeware software license:
Copying for personal use but prohibit distribution.
Ex: skype
• Proprietary Software:
Software sold commercially and distribute license.
Ex: antivirus software
• FOSS(free and open source software):
Software and code available freely .
Ex: Ubuntu
What is software piracy ?
software piracy
• Unauthorized use or distribution of software
• Those who purchase license for a copy do not have right to make
additional copies
• Pirated software degrades performance and affects software industry
What is cyber crime? explain the types
• Offence done through computers which cause harm financial loss or mental
harassment
1.hacking Cyber crime

unauthorized access to computer or computer network hacking Pishing and ransomware


fraudmail
two types Ethical
hacking Identity theft

1. ethical hacking or white hackers Non ethical


hacking

Specialist who check for loophole or vulnerability in the software


2. Non ethical hacking blackhead hackers
unauthorized access to computer or network to steal the data
2. Phishing and fraud emails
Define the following: i) phishing ii) fraud email iii) identity theft
2. phishing : fake websites or emails that looks original or authentic sent to
collect the data
fraud emails: Use of fake or forged email address.
Identity theft :stealing demographic details like banking credentials, passport,
pan etc
types
• financial identity theft: misuse for financial gain
• criminal identity theft: use of victim identity to avoid detection of true identity
• medical identity theft:criminal seek for medical treatment using stolen identity
3.Ransomware:
What is ransomware?
• Criminal gets access to the computer and blocks the user by encrypting data
3.Ransomware:
What is ransomware?
• Criminal gets access to the computer and blocks the user by encrypting data
• it gets downloaded when user visit unsecured website
• some sent through attachment in spam mail Some by malicious
advertisement
What are the preventing measures or safety measures
for combating cyber crime?
1. regular backup of data
2. use of antivirus software and keep updated
3. Avoid installing pirated software
4. Always update system software
5. Avoid using unsatisfied unverified security certificate web page
6. Use of strong password and changing it periodically
7. Performing online transaction through well known website
Explain the role of the Indian IT Act in regulating
digital activities.
• Empowers people for filing, creating and storing of documents digitally
• It provides guidelines to users on processing storing and transmission of sensitive
information
• cyber appellate established to resolve cyber crimes like hacking
• electronic governance by recognizing to electronic records and digital signatures
• cyber cells in police stations where one can report any cyber crime.

• Digital signature: unique digital ID for signing the document digitally


Define Ergonomics. Mention any four common health
issues due to the excessive use of digital technologies.
• Ergonomics helps design safe and comfortable workspaces to reduce
physical strain

Common health issues include:


• Eye Strain: Caused by prolonged screen exposure.
• Postural Issues: Back, neck, and shoulder pain from improper posture.
• Overuse Injuries: Wrist and finger pain from excessive typing.
• Stress and Obesity: Resulting from excessive use of digital devices.
What are the good and safety keys to be followed for computer
maintenance or health?
1. Regularly cleaning to keep the dust off.
2. Use liquid solution for the cleaning of screens.
3. Keep it away from direct heat, sunlight.
4. Placing in a room with good ventilation for air circulation.
5. Do not eat food or drink on the device which can cause issues.
•a
What are the types of software license?
1. proprietary license
software license that allow copying for personal use but not
commercial distribution
Ex: Skype, adobe reader
2. free and open source software license
software and program code both available for free
Ex:Ubuntu, Linux

You might also like