1he biggest o
is an unlawful activity where fake websites or
emails that look original or authentic are presented to
the user to fraudulently collect sensitive and personal
details, particularly usernames, passwords, banking
and credit card details. The most common phishing
method is through email spoofing where a fake or
forged email address is used and the user presumes
it to be from an authentic source. So you might get an
email from an address that looks similar to your bank
or educational institution, asking for your information,
but if you look carefully you will see their URL address
is fake. They will often use logo’s of the original, making
them difficult to detect from the real! Phishing attempts
through phone calls or text messages are also common
these days.
(A) Identity Theft
Identity thieves increasingly use personal information
stolen from computers or computer networks, to commit
fraud by using the data gained unlawfully. A user’s
identifiable personal data like demographic details,
email ID, banking credentials, passport, PAN, Aadhaar
number and various such personal data are stolen and
misused by the hacker on behalf of the victim. This
is one type of phishing attack where the intention is
largely for monetary gain. There can be many ways in
which the criminal takes advantage of an individual’s
stolen identity. Given below are a few examples:
• Financial identity theft: when the stolen identity is
used for financial gain.
• Criminal identity theft: criminals use a victim’s
stolen identity to avoid detection of their
true identity.
• Medical identity theft: criminals can seek medical
drugs or treatment using a stolen identity.
Beware !!
Accepting links from
untrusted emails can be
hazardous, as they may
potentially contain a
virus or link to malicious
website. We should ensure
to open any email link or
attachment only when it is
from a trusted source and
doesn’t look doubtful.
Ch 11.indd 240 08-Apr-19 12:32:00 PM
2020-21
Societal Impact 241
11.5.3 Ransomware
This is another kind of cyber crime where the attacker
gains access to the computer and blocks the user from
accessing, usually by encrypting the data. The attacker
blackmails the victim to pay for getting access to the
data, or sometimes threaten to publish personal and
sensitive information or photographs unless a ransom
is paid.
Ransomware can get downloaded when the users
visit any malicious or unsecure websites or download
software from doubtful repositories. Some ransomware
are sent as email attachments in spam mails. It can
also reach our system when we click on a malicious
advertisement on the Internet.
11.5.4 Combatting and Preventing Cyber Crime
The challenges of cyber crime can be mitigated with
the twin approach of being alert and taking legal help.
Following points can be considered as safety measures
to reduce the risk of cyber crime:
• Take regular backup of important data
• Use an antivirus software and keep it updated
always
• Avoid installing pirated software. Always download
software from known and secure (HTTPS) sites
• Always update the system software which include
the Internet browser and other application software
• Do not visit or download anything from untrusted
websites
• Usually the browser alerts users about doubtful
websites whose security certificate could not be
verified; avoid visiting such sites
• Use strong password for web login, and change
it periodically. Do not use same password for
all the websites. Use different combinations
of alphanumeric characters including special
characters. Ignore common words or names
in password
• While using someone else’s computer, don’t allow
browser to save password or auto fill data, and try
to browse in your private browser window
Activity 11.6
Explore and find out
how to file a complaint
with the cyber cell in
your area.
Ch 11.indd 241 08-Apr-19 12:32:00 PM
2020-21
242 Computer Science – Class xi
• For an unknown site, do not agree to use cookies
when asked for, through a Yes/No option.
• Perform online transaction like shopping, ticketing,
and other such services only through well-known
and secure sites
• Always secure wireless network at home with strong
password and regularly change it.
11.6 Indian Information Technology Act (IT Act)
With the growth of Internet, many cases of cyber crimes,
frauds, cyber attacks and cyber bullying are reported.
The nature of fraudulent activities and crimes keeps
changing. To deal with such menaces, many countries
have come up with legal measures for protection of
sensitive personal data and to safeguard the rights of
Internet users. The Government of India’s Information
Technology Act, 2000 (also known as IT Act), amended in
2008, provides guidelines to the user on the processing,
storage and transmission of sensitive information.
In many Indian states, there are cyber cells in police
stations where one can report any cyber crime. The
act provides legal framework for electronic governance
by giving recognition to electronic records and digital
signatures. The act outlines cyber crimes and penalties
for them.
Cyber Appellate Tribunal has been established
to resolve disputes arising from cyber crime, such as
tampering with computer source documents, hacking
the computer system, using password of another person,
publishing sensitive personal data of others without
their consent, etc. The act is needed so that people can
perform transactions over the Internet through credit
cards without fear of misuse. Not only people, the act
empowers government departments also to accept
filing, creation and storage of official documents in the
digital format.
11.7 Impact on Health
As digital technologies have penetrated into different
fields, we are spending more time in front of screens, be
it mobile, laptop, desktop, television, gaming console,
Do you follow
precautions to stay
healthy — physically,
mentally as well as
emotionally while
using digital
technologies?
Think and Reflect
Digital signatures are
the digital equivalent of a
paper certificate. Digital
signatures work on a
unique digital ID issued
by a Certified Authority
(CA) to the user. Signing a
document digitally means
attaching that user's
identity which can be used
to authenticate.
A licensed CA who has
been granted a license to
issue it under section 24 of
the indian IT-Act 2000, can
issue the digital signature.
Ch 11.indd 242 08-Apr-19 12:32:00 PM
2020-21
Societal Impact 243
music or sound device. But interacting in an improper
posture can be bad for us — both physically, and
mentally. Besides, spending too much time on
Internet can be addictive and can have a negative
impact on our physical and psychological well being.
However, these health concerns can be addressed
to some extent by taking care of the way we position
such devices and the way we position our posture.
Ergonomics is a branch of science that deals with
designing or arranging workplaces including the
furniture, equipments and systems so that it becomes
safe and comfortable for the user. Ergonomics helps
us in reducing the strain on our bodies — including
the fatigue and injuries due to prolonged use.
When we continuously look at the screen for
watching, typing, chatting or playing games, our
eyes are continuously exposed to the glare coming
from the screens. Looking at small handheld
devices makes it worse. Eye strain is a symptom
commonly complained by users of digital devices.
Device Safety: Ensures
Good Health of a
Computer System
√ Regularly clean it
to keep the dust
off. Use a liquid
solution specifically
formulated for
the cleaning of
electronic screens.
√ Wipe monitor’s
screen often using
the regular microfibre
soft cloth (the one
used for spectacles).
√ Keep it away from
direct heat, sunlight
and put it in a
room with enough
ventilation for air
circulation.
√ Do not eat food
or drink over the
keyboard. Food
crumbs that fall into
the gaps between
the keys or spilled
over liquid can cause
issues to the devices.
Figure 11.5: Correct posture while sitting in front of a computer
Viewing Angle
Viewing Distance 19”-24”
Wrist Straight
900
Seat Back Angle 900
900
Knee
Angle
Adjustable
Seat
Height
23”-28”
Lumber
Support
for Lower
Back
Feet on floor
footrest for
shorter people
Ch 11.indd 243 08-Apr-19 12:32:01 PM
2020-21
244 Computer Science – Class xi
Ergonomically maintaining the viewing distance and
angle, along with the position can be of some help.
Figure 11.5 shows the posture to be maintained in
order to avoid fatigue caused due to prolonged use of
computer system and other digital devices. However,
to get rid of dry, watering, or itchy eyes, it is better to
periodically focus on distant objects, and take a break
for outdoor activities.
Bad posture, backaches, neck and shoulder pains
can be prevented by arranging the workspace as
recommended by ergonomics. Overuse of keyboards
(be it physical keyboard or touchscreen-based virtual
keyboard) not aligned ergonomically, can give rise to a
painful condition of wrists and fingers, and may require
medical help in the long run.
Stress, physical fatigue and obesity are the other
related impacts the body may face if one spends too
much time using digital devices.
Maintain a Balance!!
Enjoy the exciting world of
digital devices in tandem
with other pursuits
of thrilling sports and
hobbies. Online friends
are good, but spending
time with friends in real
life is very fulfilling. Often
the wholesome nature of
real interactions cannot
be compared to just online
social networking.
Summary
• Digital footprint is the trail of data we leave behind
when we visit any website (or use any online
application or portal) to fill-in data or perform
any transaction.
• A user of digital technology needs to follow certain
etiquettes like net-etiquettes, communicationetiquettes and social media-etiquettes.
• Net-etiquette includes avoiding copyright
violations, respecting privacy and diversity of
users, and avoiding cyber bullies and cyber trolls,
besides sharing of expertise.
• Communication-etiquette requires us to be precise
and polite in our conversation so that we remain
credible through our remarks and comments.
• While using social media, one needs to take care
of security through password, be aware of fake
information and be careful while befriending
unknowns. Care must be taken while sharing
anything on social media as it may create havoc
if being mishandled, particularly our personal,
sensitive information.
• Intellectual Property Rights (IPR) help in data
protection through copyrights, patents and
trademarks. There are both ethical and legal
Ch 11.indd 244 08-Apr-19 12:32:01 PM
2020-21
Societal Impact 245
aspects of violating IPR. A good digital citizen
should avoid plagiarism, copyright infringement
and trademark infringement.
• Certain software are made available for free public
access. Free and Open Source Software (FOSS)
allow users to not only access but also to modify
(or improve) them.
• Cyber crimes include various criminal activities
carried out to steal data or to break down
important services. These include hacking,
spreading viruses or malware, sending phishing
or fraudulent emails, ransomware, etc.
• Excessive usage of digital devices has a negative
impact on our physical as well as psychological
well-being. Ergonomic positioning of devices as
well as our posture are important.
Exercise
1. After practicals, Atharv left the computer laboratory
but forgot to sign off from his email account.
Later, his classmate Revaan started using the
same computer. He is now logged in as Atharv. He
sends inflammatory email messages to few of his
classmates using Atharv’s email account. Revaan’s
activity is an example of which of the following cyber
crime? Justify your answer.
a) Hacking
b) Identity theft
c) Cyber bullying
d) Plagiarism
2. Rishika found a crumpled paper under her desk.
She picked it up and opened it. It contained some
text which was struck off thrice. But she could still
figure out easily that the struck off text was the
email ID and password of Garvit, her classmate.
What is ethically correct for Rishika to do?
a) Inform Garvit so that he may change his
password.
b) Give the password of Garvit’s email ID to all
other classmates.
c) Use Garvit’s password to access his account.
3. Suhana is down with fever. So she decided not to
go to school tomorrow. Next day, in the evening she
called up her classmate, Shaurya and enquired
Notes
Ch 11.indd 245 08-Apr-19 12:32:01 PM
2020-21
246 Computer Science – Class xi
about the computer class. She also requested
him to explain the concept. Shaurya said, “Mam
taught us how to use tuples in python”. Further,
he generously said, “Give me some time, I will email
you the material which will help you to understand
tuples in python”. Shaurya quickly downloaded
a 2-minute clip from the Internet explaining the
concept of tuples in python. Using video editor,
he added the text “Prepared by Shaurya” in the
downloaded video clip. Then, he emailed the
modified video clip to Suhana. This act of Shaurya
is an example of:
a) Fair use
b) Hacking
c) Copyright infringement
d) Cyber crime
4. After a fight with your friend, you did the following
activities. Which of these activities is not an example
of cyber bullying?
a) You sent an email to your friend with a message
saying that “I am sorry”.
b) You sent a threatening message to your friend
saying “Do not try to call or talk to me”.
c) You created an embarrassing picture of your
friend and uploaded on your account on a
social networking site.
5. Sourabh has to prepare a project on “Digital India
Initiatives”. He decides to get information from the
Internet. He downloads three web pages (webpage
1, webpage 2, webpage 3) containing information
on Digital India Initiatives. Which of the following
steps taken by Sourabh is an example of plagiarism
or copyright infringement. Give justification in
support of your answer.
a) He read a paragraph on “ Digital India
Initiatives” from webpage 1 and rephrased it in
his own words. He finally pasted the rephrased
paragraph in his project.
b) He downloaded three images of “ Digital India
Initiatives” from webpage 2. He made a collage
for his project using these images.
c) He downloaded “Digital India Initiative” icon
from web page 3 and pasted it on the front
page of his project report.
Notes
Ch 11.indd 246 08-Apr-19 12:32:01 PM
2020-21
Societal Impact 247
6. Match the following:
Column A Column B
Plagiarism Fakers, by offering special rewards or money prize asked for
personal information, such as bank account information
Hacking Copy and paste information from the Internet into your report
and then organise it
Credit card fraud The trail that is created when a person uses the Internet.
Digital Foot Print Breaking into computers to read private emails and other files
7. You got the below shown SMS from your bank
querying a recent transaction. Answer the following:
a) Will you SMS your pin number to the given
contact number?
b) Will you call the bank helpline number to
recheck the validity of the SMS received?
8. Preeti celebrated her birthday with her family. She
was excited to share the moments with her friend
Himanshu. She uploaded selected images of her
birthday party on a social networking site so that
Himanshu can see them. After few days, Preeti had a
fight with Himanshu. Next morning, she deleted her
birthday photographs from that social networking
site, so that Himanshu cannot access them. Later
in the evening, to her surprise, she saw that one
of the images which she had already deleted from
the social networking site was available with their
common friend Gayatri. She hurriedly enquired
Gayatri “Where did you get this picture from?”.
Gayatri replied “Himanshu forwarded this image
few minutes back”.
Help Preeti to get answers for the following questions.
Give justification for your answers so that Preeti
can understand it clearly.
a) How could Himanshu access an image which I
had already deleted?
b) Can anybody else also access these deleted
images?
c) Had these images not been deleted from my
digital footprint?
Ch 11.indd 247 08-Apr-19 12:32:01 PM
2020-21
248 Computer Science – Class xi
9. The school offers wireless facility (wifi) to the
Computer Science students of Class XI. For
communication, the network security staff of the
school have a registered URL schoolwifi.edu. On
17 September 2017, the following email was mass
distributed to all the Computer Science students of
Class XI. The email claimed that the password of
the students was about to expire. Instructions were
given to go to URL to renew their password within
24 hours.
a) Do you find any discrepancy in this email?
b) What will happen if the student will click on
the given URL?
c) Is the email an example of cyber crime? If yes,
then specify which type of cyber crime is it.
Justify your answer.
10. You are planning to go for a vacation. You surfed
the Internet to get answers for the following queries:
a) Weather conditions
b) Availability of air tickets and fares
c) Places to visit
d) Best hotel deals
Which of your above mentioned actions might have
created a digital footprint?
11. How would you recognise if one of your friends is
being cyber bullied?
a) Cite the online activities which would help you
detect that your friend is being cyber bullied?
b) What provisions are in IT Act 2000, (amended
in 2008) to combact such situations.
12. Write the differences between the followinga) Copyrights and Patents
A+B
Ch 11.indd 248 08-Apr-19 12:32:01 PM
2020-21
Societal Impact 249
b) Plagiarism and Copyright infringement
c) Non-ethical hacking and Ethical hacking
d) Active and Passive footprints
e) Free software and Free and open source
software
13. If you plan to use a short text from an article on the
web, what steps must you take in order to credit the
sources used?
14. When you search online for pictures, how will you
find pictures that are available in the free public
domain. How can those pictures be used in your
project without copyright violations?
15. Describe why it is important to secure your wireless
router at home. Search the Internet to find the rules
to create a reasonably secure password. Create an
imaginary password for your home router. Will you
share your password for home router with following
people. Justify your answer.
a) Parents
b) Friends
c) Neighbours
d) Home Tutors
16. List down the steps you need to take in order to
ensure
a) your computer is in good working condition
for a longer time.
b) smart and safe Internet surfing.
17. What is data privacy? Websites that you visit collect
what type of information about you?
18. In the computer science class, Sunil and Jagdish
were assigned the following task by their teacher.
a) Sunil was asked to find information about
“India, a Nuclear power”. He was asked to use
Google Chrome browser and prepare his report
using Google Docs.
b) Jagdish was asked to find information about
“Digital India”. He was asked to use Mozilla
Firefox browser and prepare his report using
Libre Office Writer.
What is the difference between technologies used
by Sunil and Jagdish?
Notes
Ch 11.indd 249 08-Apr-19 12:32:01 PM
2020-21
250 Computer Science – Class xi
19. Cite examples depicting that you were a victim of
following cyber crime. Also, cite provisions in IT Act
to deal with such a cyber crime.
a) Identity theft
b) Credit card account theft
20. Neerja is a student of Class XI. She has opted for
Computer Science. Neerja prepared the project
assigned to her. She mailed it to her teacher. The
snapshot of that email is shown below.
Find out which of the following email etiquettes
are missing in it. Justify your answer.
a) Subject of the mail
b) Formal greeting
c) Self-explanatory terms
d) Identity of the sender
e) Regards
21. Sumit got good marks in all the subjects. His
father gifted him a laptop. He would like to make
Sumit aware of health hazards associated with
inappropriate and excessive use of laptop. Help his
father to list the points which he should discuss
with Sumit.