Please refer to Societal Impacts Class 12 Informatics Practices notes and questions with solutions below. These revision notes and important examination questions have been prepared based on the latest Informatics Practices books for Class 12. You can go through the questions and solutions below which will help you to get better marks in your examinations.
Class 12 Informatics Practices Societal Impacts Notes and Questions
Q1 Describe measures to recycle your e-waste safely.
ANs
Hints:
1. Use a Certified E-waste recycler
2. Visit Civic Institutions
3. Expect Retail Options
4. Donate your Electronics
Q2 CASE STUDY BASED QUESTION:
Jeet has to prepare a project on “Swachh Bharat Abhiyan”. He decides to gather information from the internet. He downloads three web pages (webpage 1, webpage 2, webpage 3) containing information on Swachh Bharat Mission.
Which of the following steps taken by Jeet is/are an example of plagiarism or copyright infringement. Give justification in support of your answer.
(a) He read a paragraph on “Swachh Bharat Abhiyan” from webpage 1 and rephrased it in his own words. He finally pasted the rephrased paragraph in his project.
(b) He downloaded three images of “Swachh Bharat Abhiyan” from webpage 2. He made a collage for his project using these images.
(c) He downloaded “Swachh Bharat Abhiyan” icon from web page 3 and pasted it on the front page of his project report.
Ans.
Hints:
• All of the Above steps are examples of plagiarism. Give proper justification for each of the points
Q3. CASE STUDY BASED QUESTION:
Angad received the following SMS, from his bank querying a recent transaction.
“Bank has noticed that your ATM card was recently used at Vijaya Online store on 2nd January 2019 at 1:00 p.m. for Rs. 30000. If the transaction was not carried out by you, urgently sms your pin number on 09993xxxxx”
Answer the following questions as what he should do upon receiving this SMS:
(a) Should he SMS his pin number to the given contact number?
(b) Should he call the bank helpline number to recheck the validity of theSMS received?
Ans. Hint:
a. He should not reply with pin. Write about what consequences might happen if shared.
He should call the bank helpline number. Write briefly about how they can help.
Q4. Mrs. Amita is using his internet connection for checking the online account of company’s admin without his knowledge. What do we call this type of activity? What are the ways by which we can avoid such type of activities?
Ans. We call this type of activity as Eavesdropping
Precautions we can take in this :
• Alert employees.
• Round the clock control over physical access by outsiders to the area to be protected.
• Continuous supervision/observation of all service personnel allowed into the area for repairs or to make alterations.
• Thorough inspection by a qualified technical countermeasures specialist of all new furnishings, decorations, or equipment brought into the area.
Q5. What do you mean by Phishing? Explain with the help of an example.
Ans. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
Example: URGENT REQUEST (Email Impersonation)
Q15 Rakesh went to an ATM Machine to withdraw some cash. He noticed a suspicious person standing right behind him. Answer the following questions in relation to this.
a. What would you suggest Rakesh to do in such a situation?
b. Is the security of the account of Rakesh compromised in this situation?
Ans
a. Rakesh should ask the person to stand away
b. Yes
Q16. Sudhir once opened an unknown website and entered his personal details such as Email ID, Password, Bank Account Number etc. Now he has noticed his Email Inbox being flooded with useless mails from that Site. In relation to this, answer the following questions:
a. What kind of Cyber Threat is this?
b. Give justification to your answer in part-1.
Ans
a. Spamming
b. It is because, the spammers where he entered his personal email IDs and credentials are now flooding his mail box with useless or spam files
Q17. Mandeep has received a phone call from a company, named XYZ Ltd. claiming that Mandeep has won Rs. 10 lakhs in a lottery. The other person is seeking some security questions from Mandeep for his verification, like his name, date of birth, account number, IFSC Code, Phone number, OTP etc. In relation to this, kindly answer the following questions:
a. Should Mandeep give his details being asked?
b. Give reasons for your answer in part-1
Ans
a. No
b. The other person is trying to ask credential information like OTP etc, which should never be shared with anyone
Q18. “Privacy is the protection of personal information given online. In e-commerce especially, it is related to a company’s policies on the use of user data.”
(a) Why is the above given statement important?
(b) What is the need to safeguard user privacy?
Ans
(a) It is important for the safeguard of user privacy, online.
(b) Online world is an open world and thus the personal information of a user must not be available openly, as it may be misused. Thus, it is very important and highly needed
to safeguard user privacy.
Q19. Neelam has recently shifted to new city and new College. She does not many people in her new city and school. But all of a sudden, someone is posting negative, demeaning comments on her social networking profile, college site’s forum etc. She is also getting repeated mails from unknown people. Every time she goes online, she finds someone chasing her online.
a) What is this happening to Neelam?
b) What action should she taken to stop them?
Ans
a) Neelam has become a victim of cyber bullying and cyber stalking.
b) She must immediately bring it into the notice of her parents and school authorities and she must report this cybercrime to local police with the help of her parents.
Q20. Write a short note on Cyber Crime.
Ans A Cyber Crime: Cyber crime is that crime which is done through internet. The Cyber act 2000, was now enforced by Indian government to punish the cyber Criminals. The points of cyber act 2000 are as follows.
(i) The documents transferred through internet are legally valid and can be produced in court of law.
(ii) The digital signatures are described on Authentic documents.
(iii) Cyber crime is defined and provision of giving punishment to the cyber criminals.
Q21. What do you mean by cyber security?
Ans. Cyber security is the combination of best processes and practices to ensure the security of networks,computers, programs, data and information from attack, damage or unauthorized access.
Q22. What is cyber stalking?
Ans. Cyber stalking is defined as the unlawful act of harassing a person or collecting an individual’s private information using electronic network.
Q23. Name a few items that will fall under e-waste.
Ans. 1) Acid Battery
2) Damaged mobile phones
Q24. Explain how e-waste can affect human health?
Ans
1) Lung Cancer
2) DNA Damage
Q25. Explain how e-wase can affect environmental health?
Ans 1) Acidification of soil 2) Air pollution
Q26. What do we do with e-waste?
Ans
1) Give Your Electronic Waste to a Certified E-Waste Recycler
2) Donating Your Outdated Technology
Q27. How to recycle and reuse electronic scrap
Ans
1) Give Your Electronic Waste to a Certified E-Waste Recycler
2) Scavenge usable parts from the e-waste.
Q28. What are the things that we should not do while disposing e-waste?
Ans 1) We should not dump them
2) We should not burn them
Q27. What can happen if we throw acid batteries in empty landfills? What kind of pollution it can cause?
Ans. Throwing acid batteries in empty landfills will cause soil pollution and water pollution. This in turn will harm the environment.
Q28. Suppose we have a UPS that is no longer functional. What issues can be caused if we throw the UPS without following proper e-waste management protocols?
Ans
1) The UPS has acid batteries that can cause soil and water pollution.
2) The UPS has chips made of silicon, burning which can cause air pollution
Q29. Suppose we have a PC which is no longer functional. How would you suggest we dispose of this PC?
Ans. 1) Give Your Electronic Waste to a Certified E-Waste Recycler
2) Scavenge usable parts from the e-waste.
We hope the above Societal Impacts Class 12 Informatics Practices are useful for you. If you have any questions then post them in the comments section below. Our teachers will provide you an answer. Also refer to MCQ Questions for Class 12 Informatics Practices