Kerala Plus Two Computer Science Chapter Wise Previous Questions and Answers Chapter 12 ICT and Society
Question 1
a) Name a digital financial instrument. [MARCH – 2016] (1)
b) Discuss about various IPRs with examples for each. (3)
Answer:
a) Credit card or Debit card or ATM machine or Swipe machine
b) Refer Sectionl2.2.1 Intellectual Property Right.
Question 2
Givethegoal of Computer forensics. [Say – 2016] (1)
Answer:
Critical evidence of a particular crime is available in electronic format with the help of computer foren¬sics. It helps to identify the criminal.
Question 3.
Explain different categories of cybercrimes against the government. [Say – 2016] (3)
Answer:
Just like normal crimes( theft, trespassing private area, destroy, etc,) Cyber crimes(Virus, Trojan Horse, Phishing, Denial of Service, Pornography etc) also increased significantly . Due to cyber crime, the victims lose money, reputation,etc and some ofthem commit suicide.
A) Cyber crimes against individuals
i) Identity theft: The various information such as personal details(name, Date of Birth, Address, Phone number etc.), Credit / Debit Card details(Card number, PIN, Expiry Date, CW, etc), Bank details, etc. are the identity of a person. Stealing these information by acting as the authorized person without the permission of a person is called Identity theft. The misuse of this information is a punishable offence.
ii) Harassment : Commenting badly about a particular person’s gender, colour, race, religion, nationality, in Social Media is considered as harassment. This is done with the help of Internet is called Cyber stalking (Nuisance). This is a kind of torturing and it may lead to spoil friend ship, career, self image and confidence. Sometimes may lead to a big tragedy of a whole family or a group of persons.
iii) Impersonation and cheating : Fake accounts are created in Social Medias and act as the original one for the purpose of cheating or misleading others. Eg: F.ake accounts in Social Medias (Facebook, Twitter,etc), fake sms, fake emails etc.
iv) Violation of privacy : Trespassing into another person’s life and try to spoil the life. It is a punishable offence. Hidden camera is used to capture the video or picture and black mailing them.
v) Dissemination of obscene material: With the help of hidden camera capture unwanted video or picture. Distribute or publish this obscene clips on Internet without the consent of the victims may mislead the people specifically the younger ones.
B) Cyber crimes against property
Stealing credit card details, hacking passwords of social media accounts or mail account or Net banking, uploading latest movies etc, are considered as cyber crimes against property.
i) Credit card fraud : Stealing the details such as credit card number, company name, expiry date, cw number,password etc. and use these details to make payment for purchasing goods ortransfer funds also.
ii) Intellectual property theft: The violation of Intellectual Property Right of Copy right, Trademark, Patent etc. In film industry crores of investment is needed to create a movie. Intellectual Property thieves upload the movies on the Releasing day itself. Hence the revenue from the theatres are less significantly and undergoes huge loss.(Eg: Premam, Bahubali, etc) Copying a person’s creation and present as a new creation is called plagiarism. This can be identified some tools(programs) available in the Internet.
iii) Internet time theft : This is deals with the misuse of WiFi Internet facility. If it is not protected by good password there is a chance of misuse our devices(Modem/Router) to access Internet without our consent by unauthorized persons. Hence our money and volume of data(Package) will lose and we may face the consequences if others make any crimes.
C) Cyber crimes against government
The cyber crimes against Govt, websites is increased significantly. For example in 2015 the website of Registration Department of Kerala is hacked and destroys data from 2012 onwards.
i) Cyber terrorism : It is deals with the attacks against very sensitive computer networks like computer controlled atomic energy power plants, air traffic controls, Gas line controls, telecom, Metro rail controls, Satellites etc. This is a very serious matter and may lead to huge loss (money and life of citizens). So Govt, is very conscious and give tight security mechanism for their services.
ii) Website defacement : It means spoil or hacking websites and posting bad comments about the Govt.
iii) Attacks against e-governance websites : Its main target is a Web server. Due to this attack the Web server/ computer forced to restart and this results refusal of service to the genuine users. If we want to access a website first you have to type the web site address in the URL and press Enter key, the browser requests that page from the web server. Dos attacks send huge number of requests to the web server until it collapses due to the load and stops functioning.
Question 4.
a) An Educational channel of Kerala Government is [MARCH -2017] (1)
b) Discuss about the schemes used in protecting intellectual property. (3)
Answer:
a) VICTERS.
b) Intellectual property is divided into two categories
1) Industrial Property
2) Copy right
1) Industrial property
It ensures the protection of industrial inventions, designs, Agricultural products etc from unauthorized copying or creation or use. In India this is done by Controller of Patents Designs and Trademarks.
• Patents
A person or organization invented a product or a creation can be protected from unauthorized copying or creation without the permission of the creator by law. This right is called Patent. In India the validity of the right is up to 20 years. After this anybody can use freely.
• Trademark
This is a unique, simple and memorable – sign to promote a brand and hence increase the business and goodwill of a company, it must be registered. The period of registration is for 10 years and can be renewed. The registered trademark under Controller General of Patents Design and Trademarks cannot use or copy by anybody else.
• Industrial designs:
A product or article is designed so beautifully to attract the customers. This type of designs is called industrial design. This is a prototype and used as a model for large scale production.
• Geographical indications
Some products are well known by the place of its origin. Kozhikkodan Halwa, Marayoor Sharkkara(Jaggery), Thirupathi Ladoo, etc are the examples.
2) Copyright
The trade mark is ©, copy right is the property right that arises automatically when a person creates a new work by his own and by Law it Prevents the others from the unauthorized or intentional copying of this without the permission of the creator for 60 years after the death of the author.
Attributes | Patent | Trademark | Copyright |
Items | Product, Process | Name, Logo, Signs | Creativity, artistic |
Registration Required | Yes | Yes | No(Automatic) |
Duration | 20 years | 10 years | Upto60 years after the death ofthe author |
Renewable | No | Yes | NA |