Page 308 - Informatics_Practices_Fliipbook_Class12
P. 308

Case-based Questions

           1.  Amarjit has recently purchased a software for his manufacturing unit to manage the inventory. Recently, he received an
              email stating that his company will not be able to access the software or the data stored suing the software until an amount
              of 5000 bitcoins is paid. Do you think Amarjit is the victim of a cyber crime?
           2.  Kashvi is a fashion designer. She creates her own designs and uploads them on her blog. Recently, she came to know that
              one of her competitors has copied her design and sold to one of her clients. Can Kashvi get legal protection? If yes, under
              which law and what is the punishable offence committed by Kashvi's competitor?

                                       Previous Years' Questions


           1.  Ramandeep is a young woman with great aspirations and has a good team of like-minded people. She along with her team
              members started a company to sell handicrafts online and also designed a logo for their company. What type of intellectual
              property does this logo represent?                                                           [2023]
              a.  Patent                                      b. Copyright
              c.  Design                                      d. Trademark
         Ans.  d. Trademark
           2.  Which of the following is a type of cybercrime where objectionable and demeaning comments are posted on social media
              platform about a person, such that he/she is mentally harassed?                              [2023]
              a.  Phishing                                    b. Hacking
              c.  Cyberbullying                               d. Identity Theft
         Ans.  c. Cyberbullying
           3.  Primary law in India for matters related to e-commerce and cybercrime is                    [2023]
              a.  IT Act 1995                                 b. IT Act 2000
              c.  IT Act 1998                                 d. IT Act 2010
         Ans.  b. IT Act 2000
           4.  The digital footprint that we leave online unintentionally is called                        [2023]
              a.  Active digital footprint                    b. Passive digital footprint
              c.  True digital footprint                      d. False digital footprint
         Ans.  b. Passive digital footprint

           5.  E-waste is responsible for the degradation of our environment if not properly treated or disposed of. Some of the feasible
              methods of e-waste management are reduce, _________ and recycle.                             [2023]
              a.  reuse                                       b. recheck
              c.  resubmit                                    d. regular
         Ans.  a. reuse

           6.  Explain plagiarism with an example.                                                         [2023]
                                                           OR
              Nowadays all of us frequently use social media to connect with our friends. Give any two netiquettes that we should follow
              while communicating on social media.
         Ans.   Plagiarism refers to presenting someone else's idea or works as one's own idea or work. If any content is copied directly
              from the internet without giving any credit or mentioning the source or creator of the content is known as plagiarism.
              Sometimes product or idea derived from an existing product or idea is called plagiarism.
                For example, downloading the project from Google and submitting it for your practical board exam without mentioning
              the source.
                                                              OR
              Two netiquettes that we should follow while communicating on social media are as follows:
              a.  Strong and frequently change password
              b.  Be careful while accepting a friend request from unknown people
              c.  Do not believe anything blindly in everything came across on social media
              d.  Be cautious while uploading content
          294  Touchpad Informatics Practices-XII
   303   304   305   306   307   308   309   310   311   312   313