Page 311 - Informatics_Practices_Fliipbook_Class12
P. 311
8. Preeti celebrated her birthday with her family. She was excited to share the moments with her friend Himanshu. She
uploaded selected images of her birthday party on a social networking site so that Himanshu can see them. After few days,
Preeti had a fight with Himanshu. Next morning, she deleted her birthday photographs from that social networking site,
so that Himanshu cannot access them. Later in the evening, to her surprise, she saw that one of the images which she had
already deleted from the social networking site was available with their common friend Gayatri. She hurriedly enquired
Gayatri “Where did you get this picture from?”. Gayatri replied “Himanshu forwarded this image few minutes back”.
Help Preeti to get answers for the following questions. Give justification for your answers so that Preeti can understand it
clearly.
a. How could Himanshu access an image which I had already deleted?
b. Can anybody else also access these deleted images?
c. Had these images not been deleted from my digital footprint?
Ans. a. Images loaded on a social networking site can be saved/downloaded or even screenshots may be taken.
b. Yes, from the digital footprint, government and other agencies can obtain these legally, if needed.
c. Images deleted from a social website always remain part of a digital footprint.
9. The school offers wireless facility (wifi) to the Computer Science students of Class XI. For communication, the network
security staff of the school have a registered URL schoolwifi.edu. On 17 September 2017, the following email was mass
distributed to all the Computer Science students of Class XI. The email claimed that the password of the students was about
to expire. Instructions were given to go to URL to renew their password within 24 hours.
a. Do you find any discrepancy in this email?
b. What will happen if the student will click on the given URL?
c. Is the email an example of cyber-crime? If yes, then specify which type of cyber-crime is it. Justify your answer.
Ans. a. Yes. If you look carefully, the url given in mail has one extra ‘i’. The original school URL is schoolwifi.edu, while URL given
in mail is schoolwifii.edu/update password.
b. It is a phishing site which will steal the students’ data
c. Yes. It is an example of phishing where using a similar looking URL and site, people are fooled.
10. You are planning to go for a vacation. You surfed the Internet to get answers for the following queries—
a. Weather conditions
b. Availability of air tickets and fares
c. Places to visit
d. Best hotel deals
Which of your above mentioned actions might have created a digital footprint?
Ans. All of these
11. How would you recognise if one of your friends is being cyber bullied?
a. Cite the online activities which would help you detect that your friend is being cyber bullied?
b. What provisions are in IT Act 2000, (amended in 2008) to combact such situations?
Ans. a. Some activities which may help to detect that my friend is being cyber bullied are :
• Checking his Social Media Account like Facebook, Twitter, Whats-app etc.
• Checking his Email account like Gmail, yahoo etc.
b. The act provides legal framework for electronic governance by giving recognition to electronic records and digital
signatures. The act outlines cyber crimes and penalties for them.
Societal Impacts 297

