Page 362 - Web_Application_v2.0_C12_Fb
P. 362
Recap Zone
Ð Ð A digital footprint refers to the trail of information individuals leave behind when using the internet.
Your digital footprint, often referred to as a digital shadow or electronic trail.
Ð Ð Data privacy refers to managing personal information, such as your name, address, email, social security
number, browsing history, online transactions, health records, or location data, to ensure control over
how it is collected, used, and accessed.
Ð Ð Data security is the practice of protecting digital information from unauthorised access, misuse, or
disclosure. It involves securing personal details like names, addresses, and passwords against hackers
and cyber threats.
Ð Ð Security measures are steps taken to protect devices, networks, and data from cyber threats. They aim
to ensure safety, privacy, and reliability in the digital world.
Ð Ð Intellectual Property refers to the ideas and innovations that are the creation of an individual mind or
a group of minds.
Ð Ð Plagiarism is the act of copying someone else’s work and publishing and pretending as if it is one’s own
work. This can include copying of texts, media and even ideas.
Ð Ð A patent is a legal protection granted by a government that provides an inventor with exclusive rights
to their invention for a limited period.
Ð Ð A trademark is a category of intellectual property, comprising a unique symbol, design, or expression
that serves to identify and differentiate a product or service from its competitors and highlights its
origin.
Ð Ð Copyright is a legal protection for intellectual property that safeguards original creative works.
Ð Ð Cybercrime refers to any unlawful activity enabled by electronic devices and the internet.
Ð Ð India's cyber laws are primarily regulated by the Information Technology Act, 2000 (IT Act) and its
subsequent amendments.
Ð Ð The Bharatiya Nyaya Sanhita, 2023 (BNS) was officially enacted on December 25, 2023, replacing the
Indian Penal Code, 1860 (IPC) as the nation's new penal code.
Solved Exercise
Section A
(Objective Type Questions)
A. Choose the correct option.
1. Which entities are involved in collecting and processing personal data?
i. Companies ii. Governments
iii. Organisations iv. All of these
2. Granting access permissions to users is an example of ................................
i. Confidentiality ii. Authorization
iii. Integrity iv. Encryption
3. What does Two-Factor Authentication (2FA) require in addition to a password?
i. A username ii. An email
iii. A second verification iv. A fingerprint
360 Touchpad Web Applications (Ver. 2.0)-XII

