Page 309 - Informatics_Practices_Fliipbook_Class12
P. 309
7. Manohar received an email from a company, named Makemoney Pvt. Ltd., claiming that Manohar has won 20 lakhs in
a survey done online. In order to claim the prize money, he was required to answer a few security questions such as his
Name, Account number, PAN card details, Phone number, and OTP for verification purposes. For this, he had to click on the
link provided in the email. [2023]
Answer the following questions:
(i) Should Manohar give the required details to the company?
(ii) What is the activity depicted above?
(iii) What should he do with this email?
OR
What do you understand by the term Hacking? Write any two measures that one should take to avoid being the victim of
hacking.
Ans. (i) No, he should not give the required details to the company.
(ii) Phishing
(iii) He should delete the email immediately and not click on any link given in the email.
OR
Hacking is the act of unauthorised access to a computer, computer network or any digital system. Hackers usually have
technical expertise of the hardware and software. They look for bugs to exploit and break into the system.
Two measures that one should take to avoid being the victim of hacking are as follows:
(i) Use strong password for web login, and change it periodically. Do not use same password for all the websites. Use
different combinations of alphanumeric characters including special characters. Ignore common words or names in
password.
(ii) Always perform online transactions through secured sites only.
NCERT Exercise Solutions
1. After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate
Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of
his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber-crime?
Justify your answer.
a. Hacking b. Identity theft
c. Cyber bullying d. Plagiarism
Ans. b. Identity theft
As he wrote inflammatory emails while using someone else's account.
2. Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off
thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit, her classmate.
What is ethically correct for Rishika to do?
a. Inform Garvit so that he may change his password.
b. Give the password of Garvit’s email ID to all other classmates.
c. Use Garvit’s password to access his account.
Ans. a. Inform Garvit so that he may change his password.
3. Suhana is down with fever. So, she decided not to go to school tomorrow. Next day, in the evening she called up her
classmate, Shaurya and enquired about the computer class. She also requested him to explain the concept. Shaurya said,
“Mam taught us how to use tuples in python”. Further, he generously said, “Give me some time, I will email you the
material which will help you to understand tuples in python”. Shaurya quickly downloaded a 2-minute clip from the Internet
explaining the concept of tuples in python. Using video editor, he added the text “Prepared by Shaurya” in the downloaded
video clip. Then, he emailed the modified video clip to Suhana. This act of Shaurya is an example of—
a. Fair use b. Hacking c. Copyright infringement d. Cyber crime
Ans. Copyright infringement
Societal Impacts 295

