Page 310 - Informatics_Practices_Fliipbook_Class12
P. 310

4.  After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?
              a.  You sent an email to your friend with a message saying that “I am sorry”.
              b.  You sent a threatening message to your friend saying “Do not try to call or talk to me”.
              c.  You created an embarrassing picture of your friend and uploaded on your account on a social networking site.
         Ans.  a.  You sent an email to your friend with a message saying that “I am sorry”.

           5.  Sourabh has to prepare a project on “Digital India Initiatives”. He decides to get information from the Internet. He downloads
              three web pages (webpage 1, webpage 2, webpage 3) containing information on Digital India Initiatives. Which of the
              following steps taken by Sourabh is an example of plagiarism or copyright infringement?
              Give justification in support of your answer.
              a.  He read a paragraph on “Digital India Initiatives” from webpage 1 and rephrased it in his own Words. He finally pasted
                 the rephrased paragraph in his project.
              b.  He downloaded three images of “Digital India Initiatives” from webpage 2. He made a collage form his project using
                 these images.
              c.  He downloaded “Digital India Initiative” icon from web page 3 and pasted it on the front page of his
                 project report.
         Ans.  a.   Paraphrasing, utilising someone else's concepts from the internet and putting them in their own words while referencing
                 the original source.
              b.  Copyright Infringement, Sourabh downloaded and used the images, which might be protected by copyright.
              c.  Copyright Infringement, Sourabh downloaded and used the icon, which might be protected by copyright.

           6.  Match the following:
               Column A        Column B
                               Fakers, by offering special rewards or money prize asked for personal information, such as bank
               Plagiarism
                               account information.
               Hacking         Copy and paste information from the Internet into your report and then organise it.
               Credit card fraud  The trail that is created when a person uses the Internet.
               Digital Foot Print  Breaking into computers to read private emails and other files
         Ans.   Column A       Column B

               Plagiarism      Copy and paste information from the Internet into your report and then organise it.
               Hacking         Breaking into computers to read private emails and other files
                               Fakers, by offering special rewards or money prize asked for personal information, such as bank
               Credit card fraud
                               account information.
               Digital Foot Print  The trail that is created when a person uses the Internet.

           7.  You got the below shown SMS from your bank querying a recent transaction. Answer the following:




















              a.  Will you SMS your pin number to the given contact number?
              b.  Will you call the bank helpline number to recheck the validity of the SMS received?
         Ans.  a.  No, I will not shared PIN to that contact number.
              b.  Yes. I will call the bank helpline number.

          296  Touchpad Informatics Practices-XII
   305   306   307   308   309   310   311   312   313   314   315