Advertisement

Balbharati solutions for Information Technology (IT) 11th Standard HSC Maharashtra State Board chapter 4 - Cyber Law

Chapter 4: Cyber Law


Complete the following web.

Balbharati solutions for Information Technology (IT) 11th Standard HSC Maharashtra State Board chapter 4 - Cyber Law


SOLUTION

Left side (Do's)

  1. Adhere to copyright restrictions when downloading material from the Internet, including software, games, movies, or music.

  2. Report online bullying immediately to the teacher and parents/ or some one whom you trust.

  3. Use a strong and unique password with combinations of numbers, uppercase and lowercase letter and special characters for each account(s) and change your password frequently.

  4. Obtain software from trusted sources. Always scan files before opening them.

  5. Check to see if the web address begins with https:// whenever you sign in online.

  6. Connect only with known individuals.

  7. Think twice before you post/like/ share something related to sensitive topics like politics, religion etc.

  8. Report to the service provider immediately if the account is hacked. If possible deactivate your account.

Right side (Dont's)

  1. Don't share your personal information: real name, date of birth, phone number etc. unnecessarily.

  2. Don't send your pictures to unknown persons or share them on social media.

  3. Don't open emails and attachments from strangers.

  4. Don't respond to any suspicious email, instant message or web page asking for personal information.

  5. Don't share your password/OTP with anyone.

  6. Don't save your username and password on the browser.

  7. Don't steal other's information.

  8. Don't access or use files without the permission of the owner.

  9. Don't copy software which has copyright without the author's permission.

  10. Don't bully others online by teasing, threatening, using rude or offensive language, making derogatory or hateful comments.

  11. Don't meet unknown (even if they are known only through online interaction) people alone; always inform an adult or a friend.

  12. Don't open or download any attachments from an unknown source as they may be harmful.



Complete the following chart. Examples of unauthorized access

Balbharati solutions for Information Technology (IT) 11th Standard HSC Maharashtra State Board chapter 4 - Cyber Law



SOLUTION

Examples of unauthorized access

  1. Hacking financial / bank account related information.

  2. Stealing organizational / intellectual information.

  3. Illegal monitoring of information owned by other users.

  4. Illegal use/break of login and password of other users.

  5. Causing intentional irritation to other users by means of damaging software and important information.



Fill following boxes with appropriate cyber crime name.

Balbharati solutions for Information Technology (IT) 11th Standard HSC Maharashtra State Board chapter 4 - Cyber Law

Copyright violation of software created originally by an individual.



SOLUTION

Software piracy



Gaining access without the user’s permission.


SOLUTION

Unauthorized Access



Extracting confidential information by email.


SOLUTION

Phishing



Read the following and answer the question.

Rahul lost his pen drive in his college computer lab. His classmate Madhav finds it .He carries it home to return it to him the next day. When Madhav opens it he finds his favourite game. He thinks of making a duplicate copy of the game software.

  1. Does Madhav think ethically?

  2. What do you think should Madhav do?

  3. If he makes a duplicate copy then which cyber crime will he commit?



SOLUTION

  1. No.

  2. Madhav should returns back pen drive without making duplicate copy of game.

  3. Software Piracy



What care should be taken by the user while doing online activities?


SOLUTION

  1. Stick to copyright restrictions when downloading anything from the internet.

  2. Use strong passwords with combinations of numbers. Uppercase and lowercase letters and special characters.

  3. Always scan files before opining them.

  4. Don’t talk to strangers

  5. Think before posting something on social media related to any sensitive topic like politics, religion etc.

  6. Report to service provider if the account is hacked; if possible deactivate your account.

  7. Whenever you sign in online check if the web address begins with https: //



Define the term: 


Ethics


SOLUTION

Also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong.



Moral


SOLUTION

The standards of behaviour; principles of right and wrong behaviour. Thus morals are dictated by society, culture or religion while ethics are chosen by the person himself which governs his life.



Explain three examples related to unauthorized access?


SOLUTION

  1. Hacking financial / bank account related information.

  2. Stealing organizational / intellectual information.

  3. Illegal monitoring of information owned by other users.

  4. Illegal use/break of login and password of other users.

  5. Causing intentional irritation to other users by means of damaging software and important information.



Explain software piracy.


SOLUTION

Software piracy is the illegal copying, distribution, or use of software. It 15 such a profitable "business" that it has caught the attention of organized crime groups in a numb



Explain Hacking.


SOLUTION

Hacking refers to unauthorised intrusion into a computer or a network. Hacker is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language. They might discover loopholes within systems and reasons for such loopholes.



Observe the following picture and give your opinion about it by responding to the following questions.

Balbharati solutions for Information Technology (IT) 11th Standard HSC Maharashtra State Board chapter 4 - Cyber Law

  1. Is 'B's response correct or not?

  2. What will be the consequences of 'B's reply?

  3. Which type of cyber crime does the picture depict?

Solution

  1. No B’s response is not correct.

  2. With all such crucial information like OTP in hand, the fraudster can easily carry out illegal financial transactions using B’s identity.

  3. Fake Call Frauds


Balbharati Solutions for Information Technology (IT) 11th Standard HSC Maharashtra State Board

The answers for the Balbharati books are the best study material for students. These Balbharati Solutions for Information Technology (IT) 11th Standard HSC Maharashtra State Board will help students understand the concepts better.


 • Chapter 1: Basics of Information Technology

 • Chapter 2: Introduction to DBMS

 • Chapter 3: Impressive Web Designing

 • Chapter 4: Cyber Law


.