Curriculum
Course: Ncert-Class 10 computer science
Login

Curriculum

Ncert-Class 10 computer science

Text lesson

Application Oriented Questions -Class 10 – Computer science -Chapter 3: Cyber ethics

 

Application Oriented Questions

Q1. Kuhu has just learnt how to do online banking. Name any two precautions that she should take to prevent online fraud.

 Ans: Two precautions that Kuhu should take to prevent online fraud are:

 She should not share her user id and password with anyone.

She should avoid doing transactions from cyber cafe and other public places.

Q2. Companies spend a lot on secure data transmission that requires enough technical safeguards.

 (a) What do you understand by secure data transmission ?

 (b) Why do you think companies spend so much on secure data transmission ?

 (c) What are common technical safeguards that are applied to ensure secure data transmission ?

 Ans: (a) Secure data transmission means applying enough technical safeguards so that data travels safely to its target, without being compromised or eavesdropped.

 (b) Companies spend heavily on secure data transmission due to the following reasons:

 Protection of sensitive information such as customer information, trade secrets, financial records, or intellectual property.

Many industries have stringent regulatory requirements regarding data protection and privacy. They invest in secure data transmission to comply with these regulations and avoid penalties.

Companies demonstrate their commitment to protecting customer data and maintaining trust.

Implementing secure data transmission helps mitigate potential financial implications.

(c) To ensure secure data transmission, following techniques are applied : SSL secure data transmission — SSL (Secure Sockets Layer) is a standard security protocol which ensures data security by establishing encrypted online links between a web server and a browser. It encrypts the transmitted data and keeps it secure.

Data encryption — Encrypted data when sent over Internet is hard to steal and hence is safer.

Use Safe protocols — Use safe FTP protocol for files wherever possible, as safe protocols use some safety shells such as SSH.

Q3. These days it is equally important to safeguard digital properties:

 (a) What are digital properties? 

(b) Why is above given statement/fact important?

 (c) What are possible threats to digital properties?

 (d) How can digital properties be safeguarded?

 Ans 

(a) Digital property (or digital assets) refers to any information about us or created by us that exists in digital form, either online or on an electronic storage device.

 For example, any online personal accounts such as email, personal websites and blogs, domain names registered in our name, intellectual properties etc.

 (b) Digital property rights lie with the owner. Legally a person who has created it or the owner who has got it developed by paying legally is the legal owner of a digital property. Only the owner can use and decide who all and in what form can his/her digital asset may be used by others, whether by making payments or by buying it or by obtaining its license or usage rights etc. Thus, it is important to safeguard digital properties.

 (c) The common threats to digital properties are as follows:

 Digital software penetration tools — There are many software penetration tools such as cracks and keygens which enable unauthorized users to freely access a software without actually paying for it.

Stealing and plagiarizing codes of digital properties — Other developers may steal a software’s source code and use it to build their own versions of it, and then sell it under their own company name.

(d) The following are the ways to ensure protection of digital properties:

 Anti-Tamper Solutions — They use a host of advanced technologies to prevent hacking, reverse-engineering or manipulating digital properties such as utility tools, software, apps, video games and so forth.

Legal Clauses — There must be a transparent clause in the software’s Terms of Service that prohibits the scraping of the software’s source code for reuse.

Limit the sharing of software code — One should share software code only with trusted individuals who are part of development team. Digital Rights Management (DRM) solution can protect a software from being scraped for source code using decompilers etc.

Q4. Freedom of information refers to right to access information available on public platforms.

 (a) What are the problems that are a hinderance in freedom of information for all?

 (b) What are the ways to ensure freedom of information for all?

 Ans: (a) There are several problems that hinder freedom of information for all: 

Technology reach — Technological reach is not the same all across India, especially in rural and remote areas.

Digital Literacy — The rate of digital literacy is far less in rural areas as compared to urban areas. People in remote areas and rural areas are picking up with digital literacy, now.

Language and literacy barriers — Limited availability of information in different languages or low literacy rates can hinder individuals from accessing and understanding relevant information.

(b) To ensure freedom of information for all, the following approaches can be taken:

Legal safeguards — Enact and uphold laws that protect freedom of information.

Open data initiatives — Governments and institutions can proactively make information available to the public through open data initiatives, ensuring transparency and accessibility.

Strengthening digital infrastructure — Bridge the digital divide by expanding internet access, providing affordable connectivity, and promoting digital literacy programs.

Fact-checking and media literacy — Promote media literacy and critical thinking skills to help individuals identify and evaluate reliable sources of information.

International cooperation — Encourage collaboration between countries and organizations to promote freedom of information.

 

 

×

Cart