Page 312 - Informatics_Practices_Fliipbook_Class12
P. 312
12. Write the differences between the following—
a. Copyrights and Patents
b. Plagiarism and Copyright infringement
c. Non-ethical hacking and Ethical hacking
d. Active and Passive footprints
e. Free software and Free and open source software
Ans. a. Refer to 8.5.1 Intellectual Property Rights (IPR), Copyright and Patent
b. Refer to 8.5.2 Violation of IPR, Plagiarism, Copyright Infringement
c. Hacking, when done with a positive intent, is called ethical hacking. Such ethical hackers are known as white hat hackers.
An ethical hacker may exploit a website in order to discover its security loopholes or vulnerabilities. Thus, ethical hacking
is actually preparing the owner against any cyber-attack.
d. Active data traces are the ones that the user leaves intentionally, whereas digital data trail we leave online unintentionally
is called passive digital footprints.
e. Free Software means the software is freely accessible and can be freely used, changed, improved, copied and distributed
to others. No payments are needed to be made for free software.
Free and Open Source Software: refer to a software which is both free software as well as open source software. An
open source means, it source code is also available.
13. If you plan to use a short text from an article on the web, what steps must you take in order to credit the sources used?
Ans. Following steps need to be taken
(i) Determine if you need the permission to use the desired piece of work.
(ii) Identify the owner of the article.
(iii) Identify the rights needed to use it.
(iv) Contact the owner and negotiate whether payment is required.
(v) Get your permission agreement in writing.
14. When you search online for pictures, how will you find pictures that are available in the free public domain. How can those
pictures be used in your project without copyright violations?
Ans. To find pictures available in the free public domain, use websites like Unsplash, Pixabay, or Wikimedia Commons. Ensure
images have a Creative Commons Zero (CC0) license, allowing for free use. Verify licensing terms on each platform. Use
images responsibly, giving proper attribution if required, and avoid any use that violates the license terms.
15. Describe why it is important to secure your wireless router at home. Search the Internet to find the rules to create a
reasonably secure password. Create an imaginary password for your home router. Will you share your password for home
router with following people? Justify your answer.
a. Parents
b. Friends
c. Neighbours
d. Home tutors
Ans. WiFi router security is important otherwise any one can use our wifi to commit fraud or cybercrimes.
Rules to Create Secure Password:
● At least 8 characters—the more characters, the better.
● A mixture of both uppercase and lowercase letters.
● A mixture of letters and numbers.
● Inclusion of at least one special character, e.g., ! @ # ? ] Note: do not use < or > in your password, as both can cause
problems in Web browsers.
We shall share the password with parents only.
Never share your wifi password to Friends, Neighbours and Home Tutors. There is possibilities that someone else also
come to know your wifi password. If you shared in emergency, then don’t forget to change the password.
298 Touchpad Informatics Practices-XII

