Informatics Practices
Munish has topped in all the subjects in his school exams. His father has gifted him a laptop. He would like to make Munish aware of the health hazards associated with inappropriate and excessive use of laptop. Help his father list the points which he should discuss with Munish.
Computing Safety & Ethics
2 Likes
Answer
Munish must be made aware of the following points regarding the pitfalls of excessive use of technology:
Physical Problems
- Repetitive Strain Injury
- Carpal Tunnel Syndrome
- Computer Vision Syndrome
- Radiation
- Sleeping disorders and decline in productivity
- Loss of attention and stress
Psychological Problems
- Fear of technology
- Computer anxiety
- Internet addiction
Answered By
2 Likes
Related Questions
Jeet has to prepare a project on 'Swachh Bharat Abhiyan'. He decides to gather information from the internet. He downloads three web pages (webpage 1, webpage 2, webpage 3) containing information on Swachh Bharat Mission. Which of the following steps taken by Jeet is/are an example of plagiarism or copyright infringement? Give justification in support of your answer.
(a) He read a paragraph on 'Swachh Bharat Abhiyan' from webpage 1 and rephrased it. He finally pasted the rephrased paragraph in his project.
(b) He downloaded three images of 'Swachh Bharat Abhiyan' from webpage 2. He made a collage for his project using these images.
(c) He downloaded 'Swachh Bharat Abhiyan' icon from webpage 3 and pasted it on the front page of his project report.
Angad receives an SMS, shown alongside, from his bank querying a recent transaction. Answer the following questions as to what he should do in such a situation:
(a) Should he SMS his pin number to the given contact number?
(b) Should he call the bank helpline number to recheck the validity of the SMS received?

Jayati Chatterjee is studying digital footprints. Help her clarify the concepts of digital footprints.
(i) Digital footprints are also known as:
- Digital data
- Digital tattoos
- Plagiarism
- Digital print
(ii) Digital footprints are stored
- Temporarily (for a few days)
- For 7 days only
- Permanently
- For 3 days only
(iii) Whenever we surf the internet using smartphones, we leave behind a trail of data reflecting the activities performed by us online, which is termed as …………… .
- Digital footprint
- Online handprint
- Digital activities
- Internet activities
(iv) There are …………… kinds of digital footprints.
- 1
- 3
- 2
- 4
(v) Which is the correct type(s) of digital footprint?
- Active digital footprint
- Passive digital footprint
- Both (1) and (2)
- None of these
Neetu has recently shifted to a new city and a new school. She does not know many people there. However, someone starts posting negative, demeaning comments on her social networking profile, school site's forum, etc.
She also starts getting repeated mails from unknown people. Every time she goes online, she finds someone chasing her online.
(i) What is all this happening to Neetu?
- Neetu has become a victim of cyber bullying and cyber stalking
- Eaves dropping
- Scam
- Violation of IPR
(ii) What action should be taken by her to stop all this?
- Discuss with her parents
- Discuss in peer group
- Keep quiet and suffer emotionally
- She must immediately bring all this to the notice of her parents and school authorities and also report this to the cybercrime wing of the local police with the help of her parents.
(iii) The act of fraudulently acquiring someone's personal and private information, such as online account names, login information and passwords is called …………… .
- Phishing
- Identity theft
- Fraud
- Plagiarism
(iv) Neetu needs to protect her personal information or data from unintentional and intentional attacks and disclosure which is termed as …………… .
- Digital right
- Privacy
- Copyright
- Intellectual property
(v) A set of moral principles that governs the behaviour of a group or individual and regulates the use of computers.
- Copyright
- Computer ethics
- Property rights
- Privacy law