Computer Notes 8th Class Unit No.7

UNIT NO.7

Digital Citizenship

(Solved Exercise)

C. Answer the following short questions.

1. What is the internet?
The Internet is also called ‘the NET’ or ‘Network of Networks’, which means International Network. It is a network used all over the world where users located at different locations can communicate and exchange information with each other. It is a collection of networks that are connected and form a global network.

2. What is hacking?
Hacking is the act of gaining unauthorized access to computers, systems, or networks to manipulate, steal, or disrupt data.

3. Give any two examples of intellectual property rights.
Copyright ; It is the legal right given exclusively to the person for a fixed number of years to published record, the literary, artistic, musical, or musical use of his or her work. Copyright of work lasts even after the death of the originator.
Patent ; It is the right that gives an inventor the complete right to make, use, and sell his or her work for a specific time period. Usually, the validity period for a patent is 20 years.

4. Write two types to stop cyberbullying.
1. Try avoiding friend requests from unknown people on social media.
2. Never install unwanted software and applications like online games, etc.

5. How can email spoofing be done?
When someone sends e-mails that appear genuine from trusted e-mail ID but, in reality, they are not to be trusted
we call it E-mail Spoofing. It can be done by slightly change email ID.

6. What are the ways to prevent cyberbullying?
1. Remember never to share personal details such as age, address, date of birth, etc. with unknown people on social media.
2. Restrict access to your data on social media platforms. For example, only your friends must be able to see any pictures on Facebook.
3. Try avoiding friend requests from unknown people on social media.

7. Describe the types of online transaction fraud.
Identity Theft: Sometimes, cybercriminals deliberately use another’s identity to gain a financial advantage over someone else. Cybercriminals may also pose as someone else to obtain credit and other benefits in the other person’s name.
Job Frauds: Cybercriminals portray incorrect details as an employer.
Banking Frauds: Some cybercriminals fraudulently obtain money from users for investment by posing as a bank or other financial institution.

8. What is the Internet? Write any three disadvantages of it.
The Internet is also called ‘the NET’ or ‘Network of Networks’, which means International Network. It is a collection of networks that are connected and form a global network.
Disadvantages
Wastage of Time
It is a waste of time as with the excessive use of internet without any useful outcome.
Virus and Spam Attacks
Internet has also increased the cases of virus attacks.
Loss of Personal Information
We share our personal information over the internet that can be misused by cyber criminals to harm us.

9. What are digital footprints?
Footprints are the impression we leave through a foot or walking on the ground while moving. In the same way, a digital footprint is a trail of data of a user that he leaves while using the Internet.

10. How can we avoid hacking?
1. Keep a password for your Wi-Fi connection and computer.
2. Keep changing your passwords
3. Keep updating your operating system.
4. Do not plug into devices you are not sure about.

D. Answer the following long questions.

1. What are Ethics? Write about the ethical use of the digital environment.
Ethics
Ethics is a system of moral principles. They affect how people make decisions and lead their lives. Ethics is concerned with what is good for individuals and society and is also described as moral philosophy.
Ethical Use of Digital Environment
If not handled ethically, using a digital environment can be dangerous. The following is a list of some ethical principles you should follow when using the digital environment:
• Be respectful
• Protect your reputation
• Protect your privacy
• Trustworthiness and honesty
• Doing good and preventing harm
• Avoidance of conflicts
• Fairness
• Accountability

2. Write a detailed note on intellectual property rights.
Intellectual Property Rights
Intellectual property is a term that «refers to the legal property rights of a person over creations of his/her mind, both artistic and commercial. Under intellectual property Rights, the owners of the property are granted exclusive rights over their creation. These creations could be artistic, musical or literary.
Intellectual property rights ensure that the creator’s hard work is safe and protected from any unauthorised copying or piracy.
Types of Intellectual Property Rights (IPR)
There are three main types of intellectual Property Rights:
Copyright : It is the legal right given exclusively to the person for a fixed number of years to published record, the literary, artistic, musical, or musical use of his or her work. Copyright of work lasts even after the death of the originator.
Patent : It is the right that gives an inventor the complete right to make, use, and sell his or her work for a specific time period. Usually, the validity period for a patent is 20 years.
Trademark: It is a symbol, word or logo legally registered or established and used as representing a company or a product. Trademarks help to protect brand names, logos, and the design of the product. The validity period for a Trademark is 10 years and can be renewed after that.

3. Explain online transaction frauds in detail.
Online Transaction Fraud
Although at this age, as students, most of you may not be using banking services such as debit cards, credit cards, net banking, etc. yet it is important to be aware of this type of cybercrime.
Online transaction fraud refers to the illegal withdrawal or transfer of money from one bank account to another by a cybercriminal. Online transaction frauds generally take place when a cybercriminal steals a user’s login credentials, bank account details, credit card details, etc.
Ways to Cheat People Online :
• Cybercriminals may send emails from a fake account that can appear to be from a bank or credit card service provider.
• Cybercriminals may also fake their identity and call people pretending to be bank employees to obtain a user’s banking details.
Types of Online Transaction Frauds
Identity Theft: Sometimes, cybercriminals deliberately use another’s identity to gain a financial advantage over someone else. Cybercriminals may also pose as someone else to obtain credit and other benefits in the other person’s name.
Job Frauds: Cybercriminals portray incorrect details as an employer.
Banking Frauds: Some cybercriminals fraudulently obtain money from users for investment by posing as a bank or other financial institution.

4. What is meant by social media? Write about its advantages and disadvantages as well.
Social Media
The website or program known  Social Media is where users can share their content. Additionally, it facilitates online conversations with other users. Millions of  all over the world are actively using it because of its enormous popularity and usefulness.
Advantages of Social Media
Social media has a lot of benefits.
• You can use it for educational purposes.
• You can use it for entertainment.
• It is easier to communicate and share information.
• You can create your brand and content to share original material to.
• It is easier to get updated information and news.
Disadvantages of Social Media
Social media also has several drawbacks, but fewer than its advantages. Some of its disadvantages include:
• It may also be the cause of a great deal of inefficiency.
• Lack of privacy can lead to identity theft, stalking, and other problems.
• As it is easy to get distracted from your work and loose focus when using social media, it may also be the cause of a great deal of inefficiency.
• It can be quite damaging to not know how to respond to negative feedback and to become easily distracted.
• Your shared data may be used against you after tempering it.