Informatics Practices
Jayati Chatterjee is studying digital footprints. Help her clarify the concepts of digital footprints.
(i) Digital footprints are also known as:
- Digital data
- Digital tattoos
- Plagiarism
- Digital print
(ii) Digital footprints are stored
- Temporarily (for a few days)
- For 7 days only
- Permanently
- For 3 days only
(iii) Whenever we surf the internet using smartphones, we leave behind a trail of data reflecting the activities performed by us online, which is termed as …………… .
- Digital footprint
- Online handprint
- Digital activities
- Internet activities
(iv) There are …………… kinds of digital footprints.
- 1
- 3
- 2
- 4
(v) Which is the correct type(s) of digital footprint?
- Active digital footprint
- Passive digital footprint
- Both (1) and (2)
- None of these
Computing Safety & Ethics
1 Like
Answer
(i) Digital tattoos
Reason — Digital footprints are referred to as "digital tattoos" because, just like tattoos, they can be permanent and leave a lasting impression.
(ii) Permanently
Reason — Digital footprints are stored permanently because they are recorded and stored on servers, databases, and other digital storage systems.
(iii) Digital Footprint
Reason — A digital footprint refers to the trail of data that we leave behind when we use the internet or digital devices. This can include our browsing history, search queries, social media activity, and other online actions.
(iv) 2
Reason — There are two main types of digital footprints: active digital footprints and passive digital footprints.
(v) Both (1) and (2)
Reason — The two types of digital footprints are active digital footprint and passive digital footprint.
Answered By
1 Like
Related Questions
Angad receives an SMS, shown alongside, from his bank querying a recent transaction. Answer the following questions as to what he should do in such a situation:
(a) Should he SMS his pin number to the given contact number?
(b) Should he call the bank helpline number to recheck the validity of the SMS received?

Munish has topped in all the subjects in his school exams. His father has gifted him a laptop. He would like to make Munish aware of the health hazards associated with inappropriate and excessive use of laptop. Help his father list the points which he should discuss with Munish.
Neetu has recently shifted to a new city and a new school. She does not know many people there. However, someone starts posting negative, demeaning comments on her social networking profile, school site's forum, etc.
She also starts getting repeated mails from unknown people. Every time she goes online, she finds someone chasing her online.
(i) What is all this happening to Neetu?
- Neetu has become a victim of cyber bullying and cyber stalking
- Eaves dropping
- Scam
- Violation of IPR
(ii) What action should be taken by her to stop all this?
- Discuss with her parents
- Discuss in peer group
- Keep quiet and suffer emotionally
- She must immediately bring all this to the notice of her parents and school authorities and also report this to the cybercrime wing of the local police with the help of her parents.
(iii) The act of fraudulently acquiring someone's personal and private information, such as online account names, login information and passwords is called …………… .
- Phishing
- Identity theft
- Fraud
- Plagiarism
(iv) Neetu needs to protect her personal information or data from unintentional and intentional attacks and disclosure which is termed as …………… .
- Digital right
- Privacy
- Copyright
- Intellectual property
(v) A set of moral principles that governs the behaviour of a group or individual and regulates the use of computers.
- Copyright
- Computer ethics
- Property rights
- Privacy law
What do you mean by Cybercrime?