Page 310 - Informatics_Practices_Fliipbook_Class12
P. 310
4. After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?
a. You sent an email to your friend with a message saying that “I am sorry”.
b. You sent a threatening message to your friend saying “Do not try to call or talk to me”.
c. You created an embarrassing picture of your friend and uploaded on your account on a social networking site.
Ans. a. You sent an email to your friend with a message saying that “I am sorry”.
5. Sourabh has to prepare a project on “Digital India Initiatives”. He decides to get information from the Internet. He downloads
three web pages (webpage 1, webpage 2, webpage 3) containing information on Digital India Initiatives. Which of the
following steps taken by Sourabh is an example of plagiarism or copyright infringement?
Give justification in support of your answer.
a. He read a paragraph on “Digital India Initiatives” from webpage 1 and rephrased it in his own Words. He finally pasted
the rephrased paragraph in his project.
b. He downloaded three images of “Digital India Initiatives” from webpage 2. He made a collage form his project using
these images.
c. He downloaded “Digital India Initiative” icon from web page 3 and pasted it on the front page of his
project report.
Ans. a. Paraphrasing, utilising someone else's concepts from the internet and putting them in their own words while referencing
the original source.
b. Copyright Infringement, Sourabh downloaded and used the images, which might be protected by copyright.
c. Copyright Infringement, Sourabh downloaded and used the icon, which might be protected by copyright.
6. Match the following:
Column A Column B
Fakers, by offering special rewards or money prize asked for personal information, such as bank
Plagiarism
account information.
Hacking Copy and paste information from the Internet into your report and then organise it.
Credit card fraud The trail that is created when a person uses the Internet.
Digital Foot Print Breaking into computers to read private emails and other files
Ans. Column A Column B
Plagiarism Copy and paste information from the Internet into your report and then organise it.
Hacking Breaking into computers to read private emails and other files
Fakers, by offering special rewards or money prize asked for personal information, such as bank
Credit card fraud
account information.
Digital Foot Print The trail that is created when a person uses the Internet.
7. You got the below shown SMS from your bank querying a recent transaction. Answer the following:
a. Will you SMS your pin number to the given contact number?
b. Will you call the bank helpline number to recheck the validity of the SMS received?
Ans. a. No, I will not shared PIN to that contact number.
b. Yes. I will call the bank helpline number.
296 Touchpad Informatics Practices-XII

