Page 309 - Informatics_Practices_Fliipbook_Class12
P. 309

7.  Manohar received an email from a company, named Makemoney Pvt. Ltd., claiming that Manohar has won 20 lakhs in
                  a survey done online. In order to claim the prize money, he was required to answer a few security questions such as his
                  Name, Account number, PAN card details, Phone number, and OTP for verification purposes. For this, he had to click on the
                  link provided in the email.                                                                  [2023]
                  Answer the following questions:
                  (i)  Should Manohar give the required details to the company?
                  (ii)  What is the activity depicted above?
                  (iii)  What should he do with this email?
                                                               OR
                  What do you understand by the term Hacking? Write any two measures that one should take to avoid being the victim of
                  hacking.
             Ans.  (i)    No, he should not give the required details to the company.
                  (ii)  Phishing
                  (iii)  He should delete the email immediately and not click on any link given in the email.
                                                                  OR
                    Hacking is the act of unauthorised access to a computer, computer network or any digital system. Hackers usually have
                  technical expertise of the hardware and software. They look for bugs to exploit and break into the system.
                  Two measures that one should take to avoid being the victim of hacking are as follows:
                  (i)   Use strong password for web login, and change it periodically. Do not use same password for all the websites. Use
                     different combinations of alphanumeric characters including special characters. Ignore common words or names in
                     password.
                  (ii)  Always perform online transactions through secured sites only.


                                            NCERT Exercise Solutions


               1.  After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate
                  Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of
                  his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber-crime?
                  Justify your answer.
                  a.  Hacking                                     b.  Identity theft
                  c.  Cyber bullying                              d.  Plagiarism
             Ans.  b.  Identity theft

                       As he wrote inflammatory emails while using someone else's account.
               2.  Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off
                  thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit, her classmate.
                  What is ethically correct for Rishika to do?
                  a.  Inform Garvit so that he may change his password.
                  b.  Give the password of Garvit’s email ID to all other classmates.
                  c.  Use Garvit’s password to access his account.
             Ans.  a. Inform Garvit so that he may change his password.
               3.  Suhana is down with fever. So, she decided not to go to school tomorrow. Next day, in the evening she called up her
                  classmate, Shaurya and enquired about the computer class. She also requested him to explain the concept. Shaurya said,
                  “Mam taught us how to use tuples in python”. Further, he generously said, “Give me some time, I will email you the
                  material which will help you to understand tuples in python”. Shaurya quickly downloaded a 2-minute clip from the Internet
                  explaining the concept of tuples in python. Using video editor, he added the text “Prepared by Shaurya” in the downloaded
                  video clip. Then, he emailed the modified video clip to Suhana. This act of Shaurya is an example of—
                  a.  Fair use             b.  Hacking            c. Copyright infringement   d.  Cyber crime
             Ans.  Copyright infringement




                                                                                                Societal Impacts  295
   304   305   306   307   308   309   310   311   312   313   314