Society, Law and Ethics sumita arora solution || Society, Law and Ethics class 12 sumita arora solution || Society, Law and Ethics class 12 sumita arora || Society, Law and Ethics sumita arora || sumita arora Society, Law and Ethics || sumita arora Society, Law and Ethics solution || Society, Law and Ethics sumita arora practical solution || sumita arora practical solution || Society, Law and Ethics class 12 solution || Society, Law and Ethics class 12

Note :-  Please Click on the Question to Answer of that Question !!!


Q1. What is online fraud? Give some examples.


Q2. What is credit card fraud?


Q3. What is identity theft?


Q4. What measures can you take to curb online frauds?


Q5. What is safe data transmission? How can you ensure secure data transmission?


Q6. What is intellectual property? What do you understand by intellectual property rights?


Q7. What is plagiarism? How can you avoid plagiarism while referring to someone's else's creation?


Q8. What is digital property? What are the threats to digital properties?


Q9. How can you protect your digital properties?


Q10. Expand the terms: OSI, FLOSS, FSF, GNU, GPL W3C, OSS.


Q11. What are open source based software?


Q12. Compare and Contrast
(i) Free software and Open source software
(ii) OSS and FLOSS
(iii) Proprietary software and Free software
(iv) Freeware and Shareware
(v) Freeware and Free software.



Q13. What is public domain software? Name some common public domain software licenses.


Q14. What is GPL software license? How is it different from LGPL software license?


Q15. These days it is equally important to safeguard digital properties:
(a) What are digital properties?
(b) Why is above given statement/fact important?
(c) What are possible threats to digital properties?
(d) How can digital properties be safeguarded?



Q16. Define these terms:
(i) Phishing
(ii) Scam
(iii) Computer forensics
(iv) Identity theft



Q17. What is cyber crime? Give example.


Q18. Can you give an example of crime which is not cyber-crime?


Q19. What protection measures would you take against identity theft?


Q20. What is computer forensics? What important practices are followed in computer forensics?


Q21. How can special needs of differently abled students be met while teaching computers?


Q22. Discuss Gender issues that you see in the field of computer science studies.

Post a Comment

You can help us by Clicking on ads. ^_^
Please do not send spam comment : )

Previous Post Next Post