Professional Documents
Culture Documents
(065)
Unit-4
SOCIETAL IMPACTS
(Session: 2023-24)
For
Class 12th
Submitted By: Submitted To:
Aashi Nagiya Manish Agarwal
SOCIETAL IMPACTS
DIGITAL FOOTPRINTS:
Digital Footprints is a data that is left behind when users a have been online.
There are two types of Digital Footprints
1. Active Digital Footprints
2. Passive Digital Footprints
Netiquette includes several aspects of internet, social media, e-mail, online chat,
website comment’s online gaming or any online type of online communication.
DO’S AND DON’T OF NETIQUETTES
DO’S DON’T
Thanks others who help you online Express senseless or offensive opinion
DATA PROTECTION
Data protection refers to the practices safe guards and binding rules put in place to
protect our personal information and ensure that it remain in control
PLAGIARISM
Plagiarism is the act of preventing the words, ideas, images, sounds or any creative
expression of other as it is your creation.
Or
The word plagiarism is derived from the Latin word Plagiaries, which means Kidnap or
abduct.
WHY PLAGIARISM IS IMPRORTANT?
• Plagiarism is a Cheating Process
• Plagiarism is a Data Thefting Process
• Plagiarism is an Academic Offense
• Plagiarism is an Academic Theft
• Plagiarism is a Stealing of Intellectual Property
TYPES OF PLAGIARISM
Mainly there are two types of plagiarism
1. Intentional Plagiarism
2. Unintentional Plagiarism
Intentional Plagiarism
• Cut and Paste from Electronic Resources
• Borrowing or Buying Assignment
• Copying others work
• Downloading Text, Article, Story, Essay, Poetry, Presentation etc.
Unintentional Plagiarism
• Not Knowing how to acknowledge, or in corporate sources of information
through proper summarizing or quotation.
• Careless copying or cutting from electronic database
• Failure to use our own vow
HOW TO AVOID PLAGIARISM
Following are the points to avoid Plagiarism:
1. Develop your writing skills
2. Take careful notes
3. Use your own ideas
4. Rewrite others ideas in your own words.
SOFTWARE LICENSE:
• A software licenses is a document that provides legally binding guidelines to
the person who hold it for the distribution of software.
• Software licenses typically provides and end users with right to make one or
more copies of the software without licensing term and conditions software,
the limitation of liabilities warranties and protection.
SOFTWARE COPYRIGHT
Software Copyright is used by software developer’s, companies to prevent
unauthorized copying of this software.
Free and Open Source license also rely on copyright law to enforce this term.
EXAMPLES OF FOSS
Following are the examples of FOSS:
1. An operating system like Linux, Unix Buster
2. DBALS- like mongo dB, SQLite, MySQL
3. Programming language like Java, Python, PHP
FREE SOFTWARE
Free Software are those which are freely accessible, freely used changed improved
copy and distribute. It provides all type of freedom to the user.
OPEN SOURCE SOFTWARE
It can be also used freely and it can also be changed improved, copied and
redistributed by the user but it may have some cost for the media and support for the
future development.
PROPRIETARY SOFTWARE
Any crime that involves a computer and a network is called cyber crime or digital or
computer crime.
In some other words, Cyber crime is a type of crime in which a computer is the object
of the crime like Hacking, Spamming, Fishing or used as a tool to commit an offence.
HACKING
Hacking is the process of gaining unauthorized access into a company device or a group
of computer system this done through cracking of passwords and codes which given
access to system.
DIFFERENT BETWEEN HACKER AND CRACKER
The main different between Hacker and Cracker is that a break the security of a
computer system but a hacker as a person like to explore computer system and
connected devices.
TYPES OF HACKERS
Basically, there are two types of Hackers:
1. Black Hat Hacker
2. White Hat Hacker
3. Grey Hat Hacker
PHISHING
It is a cyber attack that uses disguised e-mail as a weapon. The goal is to trick the e-
mail recipient into believing that the message is something we want or head.
The recipient filled or sent some sensitive information like phone number user id
password etc., then attacker use these.
TYPES OF CYBERBULLYING
There are different types of cyberbullying like:
1. Daxing
2. Harassment
3. Cyberstalking
4. Impersonation
CYBER LAW
• Cyber Law is a part of the legal system that deals with the cyber space internet
and with some other legal issues.
• Cyber Law covers a broad/ wide area like freedom of expressions, access to and
utilization of the internet and online security/ privacy.
• It is also called law of the web.
IMPORTANCE OF CYBER LAW
• Cyber Law plays a very important role in the current scenario and technology’s
world.
• It is important as it is concerned to almost all aspects of activities and
transactions that take place either on the internet or any other communication
devices.
IT ACT
• Information Technology (IT) Act of India is also known as ITA-2000 or it is also
called IT Act.
• It Act is an Act of Indian Parliament, it was notified on 17 October 2000. It is
most important law in India that deals with the digital crimes, cybercrime and
electronic commerce.
• It is based on the united nation model law recommended by the assembly of
UN in January 1997.
71 Misrepresentation Imprisonment up to 3
year or/ and with fine up
to Rs. 1 lakhs
E-WASTE
• Whenever electronic devices cover up it working life or become now usable due
to some technological advancement or become a non-functional is called E-
waste or such kind of electronic material comes under the categories of
electronic wastes.
• Managing such kind of non-functional electronic devices is named as E-waste
management.
On Environmental:
1. Air Pollution
2. Ground Water Pollution
3. Acidification of Soil
4. Land fill with lead and heavy mental
HUMAN HEALTH
1. Chronic Damage of the Brain
2. DNA Damage
3. Lung Cancer
4. Asthmatic Bronchitis
WAYS TO DISPOSE OF E-WASTE
1. Sale of your outdated technology.
2. Give your electronic waste to a certified e-waste cycle.
3. Visit civics institution.
4. Donating your outdated technology.
AWARENESS OF HEALTH
Awareness of Health concern related to the uses of technology
1. Physical Problem:
I. Loss of attention and stress
II. Sleeping disorder
III. Decrease of productivity
IV. Repetitive strain injury
V. Computer vision syndrome
VI. Various type of radiation
VII. Different types of medical syndrome.
2. Psychological Problem:
I. Computer Anxiety
II. Fear of Technology
III. Internet Addiction
a) Infornography
b) You Tube Addiction
c) Google Staking
d) Egosurfing
e) Blog Streaking
f) Wikipedia