You are on page 1of 6

1 Expand the Term in Cyber Safety

(a) IPR - Intellectual Property Rights


It refers to any kind of work or creation produced with the help of intellect and
creativity. Examples: books, movies, paintings, logo , music, videos. To protect
the IPR, there are three common ways - copyright, patents, trademark

(b) FLOSS - Free Libre and Open Source Software


There are software which are both free software as well as open source
software. You can freely use the software and also have the rights to modify the
source code and redistribute the software.

(c) GNU - Gnu Not Unix


It was the project started by Richard Stallman to create Operating systems and
software which are similar to Unix OS and can be made available freely.

2 (i)
data =['p', 'r', 'o', 'b', 'l', 'e', 'm']
data[2:3] =[]
print(data)
#['p', 'r', 'b', 'l', 'e', 'm']

data[2:5]=[]
print(data)

Output
['p', 'r', 'b', 'l', 'e', 'm']
['p', 'r', 'm']

(ii)
a = [1, 2, 3, 4, 5, 6, 7, 8, 9]
b = a.pop(5) #6
c = a.pop() #9
d = a.pop(-1) #8
print(b)
print(c)
print(d)
print(a)

Output
6
9
8
[1, 2, 3, 4, 5, 7]

3 fruit={}
L1 =['apple','banana','apple','orange']
for index in L1:
if index in fruit:
fruit[index] += 1
else:
fruit[index]=1
print(len(fruit))
print(fruit)

Output
3
{'apple': 2, 'banana': 1, 'orange': 1}

T1 = (1, 2, 3, 4, 5, 6, 7, 8)
print(T1)
print(T1 * 2)
print(T1 + T1)
print(len(T1) * 2)

Output
(1, 2, 3, 4, 5, 6, 7, 8)
(1, 2, 3, 4, 5, 6, 7, 8, 1, 2, 3, 4, 5, 6, 7, 8)
(1, 2, 3, 4, 5, 6, 7, 8, 1, 2, 3, 4, 5, 6, 7, 8)
16

4 What do you understand by the term Cyber Bullying?

It is bullying or threatening someone using digital devices like mobile phone,


computers etc especially on the Internet using social media platforms or chat
apps.
Cyberbullying includes sending, posting, or sharing negative, harmful, false, or
mean content about someone else. It can include sharing personal or private
information about someone else causing embarrassment or humiliation.

5 What is a digital footprint? Why is it so important?

It is the record or data of a person that exists on the Internet as a result of their
online activity. Examples of digital footprints are login records, posting on social
media or messages on chat apps, visiting websites. There are two types of
digital footprint:

Active footprints which are formed by your online activity knowingly.


Passive footprints - which are recorded by the online application without your
knowledge, like searching on google.

It is important because it keeps records of the online activity and provides


information about the online activity if the same is required later.

6 How is pharming similar to and different from phishing?

Phishing - it is the method in which sensitive information from a person is taken


by using fake websites which look very much similar to original websites or
using emails or messages which appear to be coming from legitimate sources.

Pharming - it is an attack in which a hacker attempts to redirect users to a


malicious website. Through a pharming attack, the attacker points you to a
malicious and illegitimate website by redirecting the legitimate URL. You have
entered the correct URL but the browser redirects you to a fake website.

Similarity - both are form of cyber crime which tricks user to reveal their
sensitive personal information

Different - Phishing is done through sending hyperlinks, emails and messages


without doing any technical modification in the system whereas pharming is
done by hacker by changing the settings of the browser.

7 Error

text="abracadbra"
counts={}
for word in text:
counts[word] =counts[word] +1

Line -4 Key error, as dictionary is empty

Correct
text="abracadbra"
counts={}
for word in text:
counts[word] =1

(ii)
mydict={}
mydict[(1,2,4)]=8
mydict[[4,2,1]]=10
print(mydict)

Line-3 dictionary cannot have mutable keys

mydict={}
mydict[(1,2,4)]=8
mydict[(4,2,1)]=10
print(mydict)

8 (a) what is this happening to Nivedita?;


She has become victim of cyber stalking

(b) what action should she take to stop them?


She should inform her parents and school authorities. And she report this to the
cyber crime cell of police with the help of her parents.

9 import random
PICK=random.randint (1,3) # CITY= ["DELHI", "MUMBAI", "CHENNAI",
"KOLKATA"]
for I in CITY: #Delhi
for J in range (0, PICK): #[0- (1-3)] [0,0-1, 0-2]
print (I, end = "") #
print ()

Correct option
(i) & (iii)
minimum value =1 maximum value =3

10 It refers to any kind of work or creation produced with the help of intellect and
creativity. Examples: books, movies, paintings, logo , music, videos. To protect
the IPR, there are three common ways - copyright, patents, trademark

There are 3 common forms of IPR infringement:


(i) Plagiarism
(ii) Copyright Infringement
(iii) Trademark Infringement

11 n =int(input('enter no of students '))


d ={}
for i in range(n):
name =input('enter name ')
marks=eval(input('enter marks of 3 subjects '))
d[name]= marks
print(d)
for name in d:
total = sum(d[name])
avg =total/3
print(name, total, avg)

12 lst=eval(input('enter list '))


lst1=[]
lst2=[]
for x in lst:
if x>=0:
lst1.append(x)
else:
lst2.append(x)
print(lst)
print(lst1)
print(lst2)

Output
enter list [2,3,-4,5,6,-7,8,9,-1]
[2, 3, -4, 5, 6, -7, 8, 9, -1]
[2, 3, 5, 6, 8, 9]
[-4, -7, -1]

13 n =int(input('enter number of terms '))


(a) t =(0,1)
for i in range(2,n):
x=t[i-1]+t[i-2]
t = t + (x,)
print(t)

Output
enter number of terms 20
(0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, 233, 377, 610, 987, 1597, 2584,
4181)

13 lst =eval(input('enter list'))


(b) ulist=[]
dlist=[]
for x in lst:
if lst.count(x)==1:
ulist.append(x)
else:
if x not in dlist:
dlist.append(x)
print(ulist)
print(dlist)

Output
enter list[2,3,4,5,2,4,5,6,7,8]
[3, 6, 7, 8]
[2, 4, 5]

You might also like