Page 308 - Informatics_Practices_Fliipbook_Class12
P. 308
Case-based Questions
1. Amarjit has recently purchased a software for his manufacturing unit to manage the inventory. Recently, he received an
email stating that his company will not be able to access the software or the data stored suing the software until an amount
of 5000 bitcoins is paid. Do you think Amarjit is the victim of a cyber crime?
2. Kashvi is a fashion designer. She creates her own designs and uploads them on her blog. Recently, she came to know that
one of her competitors has copied her design and sold to one of her clients. Can Kashvi get legal protection? If yes, under
which law and what is the punishable offence committed by Kashvi's competitor?
Previous Years' Questions
1. Ramandeep is a young woman with great aspirations and has a good team of like-minded people. She along with her team
members started a company to sell handicrafts online and also designed a logo for their company. What type of intellectual
property does this logo represent? [2023]
a. Patent b. Copyright
c. Design d. Trademark
Ans. d. Trademark
2. Which of the following is a type of cybercrime where objectionable and demeaning comments are posted on social media
platform about a person, such that he/she is mentally harassed? [2023]
a. Phishing b. Hacking
c. Cyberbullying d. Identity Theft
Ans. c. Cyberbullying
3. Primary law in India for matters related to e-commerce and cybercrime is [2023]
a. IT Act 1995 b. IT Act 2000
c. IT Act 1998 d. IT Act 2010
Ans. b. IT Act 2000
4. The digital footprint that we leave online unintentionally is called [2023]
a. Active digital footprint b. Passive digital footprint
c. True digital footprint d. False digital footprint
Ans. b. Passive digital footprint
5. E-waste is responsible for the degradation of our environment if not properly treated or disposed of. Some of the feasible
methods of e-waste management are reduce, _________ and recycle. [2023]
a. reuse b. recheck
c. resubmit d. regular
Ans. a. reuse
6. Explain plagiarism with an example. [2023]
OR
Nowadays all of us frequently use social media to connect with our friends. Give any two netiquettes that we should follow
while communicating on social media.
Ans. Plagiarism refers to presenting someone else's idea or works as one's own idea or work. If any content is copied directly
from the internet without giving any credit or mentioning the source or creator of the content is known as plagiarism.
Sometimes product or idea derived from an existing product or idea is called plagiarism.
For example, downloading the project from Google and submitting it for your practical board exam without mentioning
the source.
OR
Two netiquettes that we should follow while communicating on social media are as follows:
a. Strong and frequently change password
b. Be careful while accepting a friend request from unknown people
c. Do not believe anything blindly in everything came across on social media
d. Be cautious while uploading content
294 Touchpad Informatics Practices-XII

