Page 313 - Informatics_Practices_Fliipbook_Class12
P. 313
16. List down the steps you need to take in order to ensure —
a. Your computer is in good working condition for a longer time.
b. Smart and safe Internet surfing.
Ans. a. Device Safety: Ensures Good Health of a Computer System:
(i) Regularly clean it to keep the dust off. Use a liquid solution specifically formulated for the cleaning of electronic
screens.
(ii) Wipe monitor’s screen often using the regular microfibre soft cloth (the one used for spectacles).
(iii) Keep it away from direct heat, sunlight and put it in a room with enough ventilation for air circulation.
(iv) Do not eat food or drink over the keyboard. Food crumbs that fall into the gaps between the keys or spilled over
liquid can cause issues to the devices.
b. Smart and Safe Internet Surfing:
(i) Download only from secure websites and official app stores.
(ii) Always type the URLs rather than using a webpage or email link.
(iii) Avoid clicking on unknown links.
(iv) Use regularly updated anti-virus software.
(v) Look for secure URLs (with https) while providing data or making payments.
(vi) Avoid using the proxy sites and proxy software.
17. What is data privacy? Websites that you visit collect what type of information about you?
Ans. Data privacy refers to the rules about the authorised access of data, i.e., which all users/sites/ service providers etc. can
access or track the data/ browsing information.
Websites collect the following information:
(i) IP addresses of the user’s computer (user’s location).
(ii) Information about usage of website. For example, what users click on and how long they spend on a page.
(iii) Information about browsers and device used to access the sites.
(iv) Browsing activity across different sites.
18. In the computer science class, Sunil and Jagdish were assigned the following task by their teacher.
a. Sunil was asked to find information about “India, a Nuclear power”. He was asked to use Google Chrome browser and
prepare his report using Google Docs.
b. Jagdish was asked to find information about “Digital India”. He was asked to use Mozilla Firefox browser and prepare his
report using Libre Office Writer.
What is the difference between technologies used by Sunil and Jagdish?
Ans. Sunil used Google Chrome browser and prepared his report using Google Docs, which are proprietary (freeware) products
provided by Google.
Jagdish used Mozilla Firefox browser and prepared his report using LibreOffice Writer, which are free and open source
software.
19. Cite examples depicting that you were a victim of following cyber-crime. Also, cite provisions in IT Act to deal with such a
cyber-crime.
a. Identity theft
b. Credit card account theft
Ans. a. Someone got hold of login and password of our social network site and used it to troll or cyber bully someone using
stolen credentials.
b. Someone did fraud shopping after stealing our credit card.
Societal Impacts 299

