Informatics Practices
Jeet has to prepare a project on 'Swachh Bharat Abhiyan'. He decides to gather information from the internet. He downloads three web pages (webpage 1, webpage 2, webpage 3) containing information on Swachh Bharat Mission. Which of the following steps taken by Jeet is/are an example of plagiarism or copyright infringement? Give justification in support of your answer.
(a) He read a paragraph on 'Swachh Bharat Abhiyan' from webpage 1 and rephrased it. He finally pasted the rephrased paragraph in his project.
(b) He downloaded three images of 'Swachh Bharat Abhiyan' from webpage 2. He made a collage for his project using these images.
(c) He downloaded 'Swachh Bharat Abhiyan' icon from webpage 3 and pasted it on the front page of his project report.
Computing Safety & Ethics
1 Like
Answer
Jeet's actions in all three scenarios (a, b, and c) are examples of plagiarism or copyright infringement because he failed to properly cite or acknowledge the original sources. By rephrasing a paragraph from webpage 1 without credit, downloading and using images from webpage 2 without permission or attribution, and using the 'Swachh Bharat Abhiyan' icon from webpage 3 without permission or attribution, Jeet presented others work as his own, violating fundamental principles of academic integrity and copyright laws, and should have provided proper citations, credits, or acknowledgements to the original sources to avoid these infringements.
Answered By
1 Like
Related Questions
Assertion (A): Social media are websites or applications that enable their users to participate in social networking but they cannot create and share content with others in the community.
Reasoning (R): We should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Assertion (A): Hacking is compromising security on digital devices.
Reasoning (R): Hacking involves stealing passwords and other digital information.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Angad receives an SMS, shown alongside, from his bank querying a recent transaction. Answer the following questions as to what he should do in such a situation:
(a) Should he SMS his pin number to the given contact number?
(b) Should he call the bank helpline number to recheck the validity of the SMS received?

Munish has topped in all the subjects in his school exams. His father has gifted him a laptop. He would like to make Munish aware of the health hazards associated with inappropriate and excessive use of laptop. Help his father list the points which he should discuss with Munish.