Page 412 - Computer Science Class 11 With Functions
P. 412
Ø Data protection is defending sensitive information against loss, tampering, or corruption.
Ø Intellectual property rights (IPRs) are the rights that an individual or organisation has to their intellectual
property.
Ø Copyright is When an author or an organisation sets a work in a physical form of expression, they have a
copyright on it that prevents others from claiming its ownership.
Ø A patent is a property right that an autonomous body (or a sovereign state) grants to the inventor for a
specific amount of time.
Ø A trademark is a distinctive symbol, pattern, or phrase that sets one source’s goods and services apart from
those of other sources.
Ø Plagiarism When someone passes off the words, ideas, or expressions of another author as their own, it is an
act of plagiarism.
Ø Unauthorised use of a brand or service mark is known as trademark infringement.
Ø Digital Rights Management (DRM) is a way to control and limit access to intellectual property using technology.
Ø Open data is information that anyone can access, use, and share, possibly with the requirement that the
source of the data be cited.
Ø A licence is an agreement between a person or organisation that wants to use software and the company
that owns it.
Ø Proprietary licence will be able to use the software, but they do not have access to the source code and are
not authorised to modify it.
Ø Free and open-source software is software with publicly available source code.
Ø Open-source licences allow the user to modify the software and distribute the modified version.
Ø Creative Commons licences give content creators a standard way to let other people use their work.
Ø Under the General Public Licence (GPL), users can use, modify, and share the software.
Ø Apache is an open-source software project initiated by the Apache Software Foundation (ASF).
Ø Cybercrimes are crimes related to the misuse of resources available on the Internet.
Ø Information Technology Act 2000 to keep pace with information technology-related crime.
Ø Privacy law establishes the rules that regulate the collection, storage, and disclosure of a person’s or
organisation’s financial, medical, and other personal information to third parties.
Ø Cyberlaws are statutory provisions against various forms of cybercrime.
Ø Electronic products that are no longer needed, are broken, or have reached the end of their useful lives are
called e-waste.
Ø The e-waste includes smartphones, desktops, laptops, hard drives, cables, batteries, routers, switches, and
hubs that are no longer required.
Ø Lack of suitable instructional materials designed to meet the needs of students with disabilities adversely
impacts the teaching and learning process.
410 Touchpad Computer Science-XI

