Page 364 - Web_Application_v2.0_C12_Fb
P. 364

3.  Why is Intellectual Property important for Businesses?
               Ans.  Intellectual property (IP) is essential for businesses because it ensures that their brand identity and innovations
                    are protected while responsibly handling existing intellectual property.
                  4.   Name any four forms of trademarks.
                 Ans.  Words, Symbols, Sounds and Shapes are forms of trademarks.

                  5.  Write any two importance of trademarks.
               Ans.  Two importance of trademarks are:

               Ð   Ð  Ð  Trademarks enable consumers to identify the source of a product or service.
               Ð   Ð  Ð  This empowers consumers to make informed decisions based on their previous interactions with the brand.
              B.   Long answer type questions.
                  1.  What is a Digital Footprint? Explain Two Types of Digital Footprint.

               Ans.  A digital footprint refers to the trail of information individuals leave behind when using the internet. Your digital
                    footprint, often referred to as a digital shadow or electronic trail. It reflects your online activities, interactions, and
                    the data collected about you, either voluntarily or automatically. Various applications may collect your footprint
                    in two different ways.
               Ð   ÐÐ  Active Digital Footprints: An active digital footprint is created when you intentionally share information
                       online. These footprints are under your control because you actively decide what to share.

               Ð   ÐÐ  Passive Digital Footprints: A passive digital footprint is created without your direct action or knowledge. It
                       results from data collected about you automatically as you navigate the web.
                  2.  Write the difference between data privacy and data security.

               Ans.  Data privacy refers to managing personal information, such as your name, address, email, social security number,
                    browsing history, online transactions, health records, or location data, to ensure control over how it is collected,
                    used, and accessed. It focuses on proper handling, processing, storage, and usage of sensitive data, including
                    personal and confidential information like financial and intellectual property data, to meet regulatory requirements
                    while protecting confidentiality and integrity.

                     Data security is the practice of protecting digital information from unauthorised access, misuse, or disclosure. It
                    involves securing personal details like names, addresses, and passwords against hackers and cyber threats. Data
                    security utilises a combination of strategies, technologies, and processes to safeguard sensitive information while
                    maintaining its confidentiality, integrity, and availability.

                  3.  What is a data backup?

               Ans.  Data backup refers to the process of creating copies of data to ensure that it can be restored in the event of data
                    loss due to natural disasters, accidents, cyber-attacks, or other unexpected events. Sometimes physical backup
                    media is used to secure in access-controlled environments. Another method to secure data can be the cloud
                    backup which is considered more reliable.

                  4.  Define Cybercrime. Explain at least two types of cybercrimes.                     [CBSE Handbook]
               Ans.  Cybercrime refers to any unlawful activity enabled by electronic devices and the internet. These criminal acts occur
                    online, using computers or smart devices either as tools or targets, often designed to streamline our daily tasks.

                     Two types of cybercrimes are:
               Ð   Ð  Ð   Identity Theft: An identity theft is a cybercrime where an individual's personal information—such as their
                       name, Aadhaar number, email, phone number, or financial details—is stolen and used fraudulently to commit
                       crimes in their name. This misuse often aims to harm the victim's reputation or for financial exploitation.

                362   Touchpad Web Applications (Ver. 2.0)-XII
   359   360   361   362   363   364   365   366   367   368   369