Chapter 17 Sumita Arora Solutions | Class 12 Computer Science

Here is class 12 computer science Unit 17 solutions for Sumita Arora back exercise assignment. Below includes both textual and video solutions wherever required. View all the answers in assignment for all chapters here.

NOTE: This chapter is not in class 12 syllabus for 2021 and has been removed because of COVID-19 Outbreak.

Q1: What is online fraud?  Give some examples.

Online fraud is the unofficial means and use of the resources and accessing the data on internet available. The main online fraud are in today scenario is data bleaching, security breakdown and misusing individual pins and password attaining of credit cards etc.

For example: credit card fraud, Facebook data leak, plagiarism etc.

Q2: What is credit card fraud?

Credit card fraud involves the use and accessing someone else credit card for own sake. In fraud transactions are categorized as lost, stolen, not received, issued on a fraudulent application, counterfeit, fraudulent processing of transactions, account takeover or other fraudulent conditions as defined by the card company or the member company.

Q3: What is identity theft?

In Identity theft a person forge his own identity as someone fake identity or uses someone else identity as own. In digital word someone else candidature is used for the risky and unsocial offence and to hide own character under that.

Q4: What measures can you take to curb online frauds?

1. Keep Financial Data Separate: All the data and card details must keep to our own security zone.
2. Know Who’s Asking: Don’t reveal any information else you are having full confidence of legality of that.
3. Keep Your Passwords Secret: Password and pin is meant to keep safe and in non-sharing zone.
4. Protect Your Computer: All the storage and tech device must be kept out of easy access zone.

Q5: What is safe data transmission?  How can you ensure secure data transmission?

Safe data transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. This involves only the exchange of data between the sender and receiver side no other one involved.

You can ensure the safe data transmission by sending data over end-to-end encryption and always using secures network.

Q6: What is intellectual property?  What do you understand by intellectual property rights?

Intellectual property (IP) refers to creations of the mind, such as inventions, literary and artistic works, designs, and symbols, names and images used in commerce. It makes the creativity of the representation.
Intellectual property rights refers to the general term for the assignment of property rights through patents, copyrights and trademarks.

Q7: What is plagiarism?  How can you avoid plagiarism while referring to someone’s else’s creation?

Plagiarism means using someone else’s words or ideas without properly crediting the original author and beyond that stating the art and work as own creation.
Giving proper reference to the context from where the content is taken in the knowledge of the creator.

Q8: What is plagiarism?  How can you avoid plagiarism while referring to someone’s else’s creation?

Plagiarism means using someone else’s words or ideas without properly crediting the original author and beyond that stating the art and work as own creation.
Giving proper reference to the context from where the content is taken in the knowledge of the creator.

Q9: How can you protect your digital properties?
  1. Locate and Listing begin by making a comprehensive list of all of these assets.
  2. Establish Ownership and Value by legal identification of digital assets you have listed.
  3. Create Protective Agreements.
  4. Register Your Ownership with the proper guideline.
  5. Backup of the value and worth of digital data related to that.
Q10: Expand the terms: OSI, FLOSS,FSF, GNU,GPL, W3C,OSS

OSI: Open Systems Interconnection model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.

FSF: Free Software Foundation is a 501 non-profit organization to support the free software movement, which promotes the universal freedom to study, distribute, create, and modify computer software.

GNU: is an operating system and an extensive collection of computer software. GNU is composed wholly of free software, most of which is licensed under the GNU Project’s own General Public Licence.

GPL: The GNU General Public License is a series of widely used free software licenses that guarantee end users the freedom to run, study, share, and modify the software.

W3C: The World Wide Web Consortium is the main international standards’ organization for the World Wide Web the consortium is made up of member organizations that maintain full-time staff working together in the development of standards for the World Wide Web.

OSS: Opensource software  is a type of computer software in which source code is released under a licence in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose.

Q11: What are open source based software?

Opensource software (OSS) is a type of computer software in which source code is released under a licence in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose.

Q12: Compare and Contrast (i) Free software and Open source software (ii)OSS and FLOSS (iii) Proprietary software and Free software (iv) Freeware and Software (v) Freeware and Free software.
(i) Free software is that for which no cost is charge to use and implement into the projects while the open source is software that give also the access to edit the base code and structure over the free factor.

(ii) OSS is open source software that is having the base code on the medium and allow the user to be also a contributor by adding the features in the code and FLOSS is free and open source available to that. 

(iii) Some Propriety software is commercial, and you have to pay for a licence, but other proprietary software is free. Free and open-source software is software that is freely distributed and for which the source code is released.

(iv) Freeware is software that is available for use at no monetary cost or for an optional fee, but usually (although not necessarily) closed source with one or more restricted usage rights. And software is any programme that is the interfacing medium between the user and the hardware.

(v) Freeware is software that is available for use at no monetary cost or for an optional fee, but usually (although not necessarily) closed source with one or more restricted usage rights. And free software is any programme that is the available without any cost for the use in the system.
Q13: What is public domain software?  Name some common public domain software licenses.

Public domain software is any software that has no legal, copyright or editing restrictions associated with it. It is free and open-source software that can be publicly modified, distributed or sold without any restrictions.
For example SQLite, The Apache Software Foundation.

Q14: What is GPL software license?  How is it different from LGPL software license?

GPL stands for General Public LicenceLGPL is like an amended version of GPL. It stands for Lesser General Public Licence.
It limits your requirement to provide some of your code, but you still are required to divulge the modifications that you implement.

Q15: These days it is equally important to safeguard digital properties :

(a) What are digital properties?
(b) Why is above given statement/fact important?
(c)  What are possible threats to digital properties?
(d) How can digital properties be safeguarded?
(a) Digital property includes data, Internet accounts, and other rights in the digital world, including contractual rights and intellectual property rights.

(b) It is important to safeguard digital property because it contains the whole data about the globe and individual such as financial, nation property, nation and individual security in concerns and such as that.

(c) Threats to digital property can be many like Software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion.

(d) 
1. Locate and Listing begin by making a comprehensive list of all of these assets.
2. Establish Ownership and Value by legal identification of digital assets you have listed.
3. Create Protective Agreements.
4. Register Your Ownership with the proper guideline.
5. Backup of the value and worth of digital data related to that.

Q16: Define these terms: 

(i) Phishing
(ii) scam
(iii) computer forensics
(iv) identity theft
(i) Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.

(ii) Internet fraud is a type of cybercrime fraud or deception which makes use of the Internet. Once sent, the money is gone and the scammer often disappears, though many attempts to keep the scam.

(iii) Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to have trace and tracking on the illegal offence.

(iv) Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss. 
Q17: What is cyber crime? Give example.

The cyber crimes is the extension of the crime scenario from the offline world to the online world. It is the extension of the crime such as identity theft and invasion of privacy. Internet fraud, ATM’s fraud, wire fraud. File sharing and piracy, counterfeiting and forgery, hacking, computer viruses, denial of service attacks, spam, steganography, and e-mail hacking.

Q18: Can you give an example of crime which is not cyber crime?

Child abuse is the case that is the crime but not appropriate for the cyber crime.

Q19: What protection measures would you take against identity theft?

Mix up and change your Passwords timely.
Stay Away from Shady Websites and Links.
Never Give Out Personal Information.
Regularly Check Your Credit Reports.
Establish Fraud Alerts if needed within time and security.

Q20: What is computer forensics?  What important practices are followed in computer forensics?

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to have trace and tracking on the illegal offence.

Policy and Procedure Development.
Evidence Assessment.
Evidence Acquisition.
Evidence Examination.
Documenting and reporting.

Q21: How can special needs of differently able students be met while teaching computers?

This is the most significant and the appropriate field that can be the need and scene meet of the differently able students as it didn’t need that physical and multiple intellectual level will boast the approach of the teaching.

Q22: Discuss Gender issues that you see in the field of computer science studies?

The Bureau of Labor Statistics (BLS) projects computer science research jobs will grow 19% by 2026. Yet, women only earn 18% of computer science bachelor’s.
This is the scenario of the gender issue that is in field of computer science studies.

Clear Doubts with Computer Tutor
In case you’re facing problems in understanding concepts, writing programs, solving questions, want to learn fun facts | tips | tricks or absolutely anything around computer science, feel free to join CTs learner-teacher community: students.computertutor.in

You cannot copy content of this page