Page 311 - Informatics_Practices_Fliipbook_Class12
P. 311

8.  Preeti celebrated her birthday with her family. She was excited to share the moments with her friend Himanshu. She
                  uploaded selected images of her birthday party on a social networking site so that Himanshu can see them. After few days,
                  Preeti had a fight with Himanshu. Next morning, she deleted her birthday photographs from that social networking site,
                  so that Himanshu cannot access them. Later in the evening, to her surprise, she saw that one of the images which she had
                  already deleted from the social networking site was available with their common friend Gayatri. She hurriedly enquired
                  Gayatri “Where did you get this picture from?”. Gayatri replied “Himanshu forwarded this image few minutes back”.
                  Help Preeti to get answers for the following questions. Give justification for your answers so that Preeti can understand it
                  clearly.
                  a.  How could Himanshu access an image which I had already deleted?
                  b.  Can anybody else also access these deleted images?
                  c.  Had these images not been deleted from my digital footprint?
             Ans.  a.  Images loaded on a social networking site can be saved/downloaded or even screenshots may be taken.
                  b.  Yes, from the digital footprint, government and other agencies can obtain these legally, if needed.
                  c.  Images deleted from a social website always remain part of a digital footprint.

               9.  The school offers wireless facility (wifi) to the Computer Science students of Class XI. For communication, the network
                  security staff of the school have a registered URL schoolwifi.edu. On 17 September 2017, the following email was mass
                  distributed to all the Computer Science students of Class XI. The email claimed that the password of the students was about
                  to expire. Instructions were given to go to URL to renew their password within 24 hours.















                  a.  Do you find any discrepancy in this email?
                  b.  What will happen if the student will click on the given URL?
                  c.  Is the email an example of cyber-crime? If yes, then specify which type of cyber-crime is it. Justify your answer.
             Ans.  a.   Yes. If you look carefully, the url given in mail has one extra ‘i’. The original school URL is schoolwifi.edu, while URL given
                    in mail is schoolwifii.edu/update password.
                  b.  It is a phishing site which will steal the students’ data
                  c.  Yes. It is an example of phishing where using a similar looking URL and site, people are fooled.
              10.  You are planning to go for a vacation. You surfed the Internet to get answers for the following queries—
                  a.  Weather conditions
                  b.  Availability of air tickets and fares
                  c.  Places to visit
                  d.   Best hotel deals
                  Which of your above mentioned actions might have created a digital footprint?
             Ans.  All of these
              11.  How would you recognise if one of your friends is being cyber bullied?
                  a.  Cite the online activities which would help you detect that your friend is being cyber bullied?
                  b.  What provisions are in IT Act 2000, (amended in 2008) to combact such situations?
             Ans.  a.  Some activities which may help to detect that my friend is being cyber bullied are :
                     • Checking his Social Media Account like Facebook, Twitter, Whats-app etc.
                     • Checking his Email account like Gmail, yahoo etc.
                  b.   The  act  provides  legal  framework  for  electronic  governance  by  giving  recognition  to  electronic  records  and  digital
                    signatures. The act outlines cyber crimes and penalties for them.

                                                                                                Societal Impacts  297
   306   307   308   309   310   311   312   313   314   315   316