Page 303 - Informatics_Practices_Fliipbook_Class12
P. 303

10.  The advertisements generate revenue for developers of a website.                        _________
              11.  One should turn on the firewall at all times.                                           _________
              12.  A cookie is stored only on a web server.                                                _________
              13.  The person who owns a patent is allowed to sue anyone who uses the patented invention without
                  their permission.                                                                        _________
            C.  Fill in the blanks.
               1.  A ____________ is a trail of personal data that one leaves behind while using the Internet.
               2.  The free version of YouTube includes some interruptions in the form of ____________ while watching a video or listening
                  to audio.
               3.  The malicious act where illegitimate information is inserted along with authentic data is ____________.
               4.  A user name on X is known as a ____________.
               5.  A ____________ is the illicit use of a computer, the Internet, or both to steal, modify, or access electronic data.
               6.  When someone steals your personal information to commit fraud, it is known as ____________.
               7.  ____________ is listening in on someone else's private conversation or conversation with someone without that person's
                  permission in order to get information.
               8.  ____________ is unsolicited unwanted junk mail sent in bulk for advertising purposes.
               9.  Any program that is meant to harm your device or your data is ____________.
              10.  ____________ are viruses that attach themselves to executable files by overwriting a part of their code or appending their
                  code to the files.
            D.  Answer the following questions:
               1.  Differentiate between active and passive digital footprints.
             Ans.   The information that you leave willingly is known as an active digital footprint while the data that companies collect without
                  your knowledge or approval is called passive digital footprint.

               2.  Explain the 4-point policy of YouTube.
             Ans.  YouTube has a 4-point policy with four Rs:
                  •  Remove the content that violates its policies.
                  •  Reduce the speed of harmful misinformation.
                  •  Raise up the authoritative sources for news.
                  •  Reward trusted creators and artists.

               3.  Define the following:
               (i)  Phishing
             Ans.   Phishing is the act of sending a user a phoney email purporting to be from a trustworthy, well-known source, like a bank or
                  a government agency.
               (ii)  Hacking
             Ans.   Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information (such as a
                  password or private files) or damage the system or network.
              (iii)  Trademark
             Ans.   A trademark is a distinctive symbol, pattern, or phrase that sets one source's goods and services apart from those of other
                  sources.
              (iv)  Open Data
             Ans.   Open data is information that anyone can access, use, and share, possibly with the requirement that the source of the data
                  be cited.
               4.  Name the two primary methods of eavesdropping.
             Ans.  There are two primary methods of eavesdropping:
                  •  Listening directly to digital or analog voice transmissions
                  •  Intercepting text, images, or videos over a communication channel.



                                                                                                Societal Impacts  289
   298   299   300   301   302   303   304   305   306   307   308