Page 362 - Web_Application_v2.0_C12_Fb
P. 362

Recap Zone


                Ð Ð A digital footprint refers to the trail of information individuals leave behind when using the internet.
                   Your digital footprint, often referred to as a digital shadow or electronic trail.
                Ð Ð Data privacy refers to managing personal information, such as your name, address, email, social security
                   number, browsing history, online transactions, health records, or location data, to ensure control over
                   how it is collected, used, and accessed.
                Ð Ð Data security is the practice of protecting digital information from unauthorised access, misuse, or
                   disclosure. It involves securing personal details like names, addresses, and passwords against hackers
                   and cyber threats.
                Ð Ð Security measures are steps taken to protect devices, networks, and data from cyber threats. They aim
                   to ensure safety, privacy, and reliability in the digital world.
                Ð Ð Intellectual Property refers to the ideas and innovations that are the creation of an individual mind or
                   a group of minds.
                Ð Ð Plagiarism is the act of copying someone else’s work and publishing and pretending as if it is one’s own
                   work. This can include copying of texts, media and even ideas.

                Ð Ð A patent is a legal protection granted by a government that provides an inventor with exclusive rights
                   to their invention for a limited period.

                Ð Ð A trademark is a category of intellectual property, comprising a unique symbol, design, or expression
                   that serves to identify and differentiate a product or service from its competitors and highlights its
                   origin.

                Ð Ð Copyright is a legal protection for intellectual property that safeguards original creative works.
                Ð Ð Cybercrime refers to any unlawful activity enabled by electronic devices and the internet.
                Ð Ð India's cyber laws are primarily regulated by the Information Technology Act, 2000 (IT Act) and its
                   subsequent amendments.

                Ð Ð The Bharatiya Nyaya Sanhita, 2023 (BNS) was officially enacted on December 25, 2023, replacing the
                   Indian Penal Code, 1860 (IPC) as the nation's new penal code.





              Solved Exercise


                                                              Section A
                                                      (Objective Type Questions)
              A.  Choose the correct option.
                  1.  Which entities are involved in collecting and processing personal data?
                    i.   Companies                                    ii.  Governments
                    iii.  Organisations                              iv.  All of these
                  2.  Granting access permissions to users is an example of ................................
                    i.   Confidentiality                              ii.  Authorization
                    iii.  Integrity                                  iv.  Encryption

                  3.  What does Two-Factor Authentication (2FA) require in addition to a password?
                    i.   A username                                   ii.  An email
                    iii.  A second verification                      iv.  A fingerprint

                360   Touchpad Web Applications (Ver. 2.0)-XII
   357   358   359   360   361   362   363   364   365   366   367