Rajasthan Board RBSE Class 9 Information Technology Chapter 8 Social Impacts of ICT
Rajasthan Board RBSE Class 9 Information Technology Chapter 8 Social Impacts of ICT
Rajasthan Board RBSE Class 9 Information Technology Chapter 8 Social Impacts of ICT
TEXTBOOK QUESTIONS SOLVED
I. Multiple Choice Questions
Question 1.
By a writer to release another writer’s book in his/her name known as-
(a) Secrecy
(b) Authentication
(c) Integrity
(d) Plagiarism
Answer:
(d)
Question 2.
When was Intellectual Property Organization established?
(a) 1947
(b) 1950
(c) 1967
(d) 1986
Answer:
(c)
Question 3.
How many rights are secured under “Intellectual Property Rights” in India?
(a) 6
(b) 7
(c) 8
(d) 10
Answer:
(c)
Question 4.
Which employment is/ are part of Careers in Information Technology?
(a) Database manager
(b) Web developer
(c) System administrator
(d) All of these
Answer:
(d)
Question 5.
Which one is mostly used social networking site?
(a) Face book
(b) Instagram
(c) Twitter
(d) Linked in
Answer:
(a)
II. Very Short Answer Type Questions
Question 1.
Name the right which one is used by authorized person only?
Answer:
Secrecy.
Question 2.
Which medium is used to find out the authorized person on computer?
Answer:
Password.
Question 3.
If a writer steal from other person’s work, known as-
Answer:
Plagiarism.
Question 4.
In expansion of ICT, whole world is known as-
Answer:
Global Village.
Question 5.
Which medium is used to stop Plagiarism?
Answer:
By Software.
Question 6.
A Plagiarism done by students, teachers or researcher in field of education , known as-
Answer:
Academic Dishonesty or Academic Fraud.
Question 7.
When was Intellectual Property Organization established?
Answer:
1967.
Question 8.
Name the software which source code is open for all?
Answer:
Open Source Software.
Question 9.
Give any one employment name in field of ICT.
Answer:
Graphic Designer.
Question 10.
Which Social Networking site is mostly used?
Answer:
Facebook.
III. Short Answer Type Questions
Question 1.
Why Plagiarism is increased in expansion of ICT?
Answer:
It’s often said that if you steal from one person’s work, it’s plagiarism, but if you steal from lots of people it’s “research”. Very droll, but plagiarism is a serious business. As well as being potentially economically damaging to the victim, it is demeaning for the perpetrator – although, like all thieves, they probably don’t realise it. Now, these days, using concept of ICT Plagiarism is increasing day by day because of every thing is available on Internet any time so, a person can access any type of information.
Question 2.
How is Plagiarism done by Researcher?
Answer:
Researchers are collected study material using illegal way and after editing this material attach along with their research paper. They generally use any search engine on internet and search their related information and copy it and after editing and modifying to submit to his/her instructor.
Question 3.
What do you understand by Plagiarism?
Answer:
Plagiarism is defined as “any passing off of another’s ideas, words, or work as one’s own.” It is a form of cheating and a violation of academic integrity, and is taken seriously by reputable universities such as Alliant.
Question 4.
How to use other writer’s data in your article?
Answer:
An important part of copyright law is the Fair Use Doctrine. It was designed to balance the rights of a work’s creator with the work’s potential benefit to society, as well as free speech rights. Fair Use allows the photocopying, downloading and printing of copyrighted works, without securing permission, for these purposes: criticism, comment, news reporting, teaching, scholarship, and research.
(i) The following’ four factors must be considered when determining if the use or duplication of a work is legal:
- Purpose and character of the use
- Nature of the copyrighted work
- Amount of the portion used in relation to the whole work
- Effect of use on the potential market or value of the copyrighted work
Question 5.
What do you mean by Intellectual Property Right?
Answer:
Intellectual property (IP) refers to creations of the mind, such as inventions, literary and artistic works, Designs, and symbols, names and images used in commerce.
Question 6.
Expand the WIPO.
Answer:
World Intellectual Property Organization.
Question 7.
What do you mean by TRIP?
Answer:
It is an agreement done by WTO in 1995 and it stands for Agreement on the Trade Related Aspect of Intellectual Property Rights.
Question 8.
What are the uses of Intellectual Property Right?
Answer:
Intellectual property rights are like any other property rights-they allow the creator, or owner, of a patent, trademark, or copyright to benefit from his or her own work or investment.
Question 9.
Why there is a maximum possible employment in field of ICT?
Answer:
Information technology professionals are responsible for designing, developing, supporting and managing computer hardware, computer software, and information networks, including the Internet. The real world applications of information technologies can be found everywhere. In fact, IT is already a part of your life in ways you may not even be aware. Examples of real world application of information technology includes computer software used to manage basic computer applications, computer generated animation in popular movies, networks and programs that allow you to purchase online, and satellites and systems that enable NASA to perform remote space exploration. There is a wide variety of career opportunities available for capable and experienced IT professionals. Detailed job descriptions, career reviews, to identify useful technology degrees, and to see employment forecasts in information technology.
Question 10.
Define Social Media?
Answer:
Definition: Social media is a type of online media that expedites conversation as opposed to traditional media, which delivers content but doesn’t allow readers/viewers/listeners to participate in the creation or development of the content.
“Social media essentially is a category of online media where people are talking, participating, sharing, networking, and bookmarking online.”
IV. Long Answer Type Questions
Question 1.
What do you mean by Plagiarism? How can we stop it?
Answer:
Plagiarism is defined as “any passing off of another’s ideas, words, or work as one’s own.” It is a form of cheating and a violation of academic integrity, and is taken seriously by reputable universities such as Alliant.
(i ) How to Avoid Plagiarism: At the graduate level, students produce assignments to analyze and synthesize information. You show what you know and produce something new. In an assignment, you might answer a question, solve a problem, or propose a theory or model that explains some phenomenon. This builds your skills and expertise in producing meaningful, original work.
When you analyze information, you may report what other people have said, but then slice and dice it in new ways to draw your own conclusions. Mostly, reporting others information involves paraphrasing it in your own words.
When you synthesize information produced by other people, you also paraphrase and maybe quote small bits of information from other people. Then, you put the information together in new ways.
(ii) Some point keep in mind to avoid Plagiarism:
- Keep track of your sources; print electronic sources.
- Keep sources in correct context.
- Plan ahead.
- Don’t cut and paste: File and label your sources.
- Keep your own writing and your sources separate.
- Keep your notes and your draft separate.
- Paraphrase carefully in your notes; acknowledge your sources explicitly when paraphrasing.
- Avoid reading a classmate’s paper for inspiration.
- Don’t save your citations for later.
- Quote your sources properly.
- Keep a source trail.
Question 2.
Write a detailed note on Intellectual Property Right.
Answer:
Intellectual property, in its literal sense, means the things which emanate from the exercise of the human brain. It is the product emerging out of the intellectual labour of a human being. It involves the visible expression of a mental conception, the work of both brain and hand.
Intellectual property refers to creations of the mind: inventions, literary and artistic * works, and symbols, names and images used in commerce.
Copyright includes literary works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures and architectural designs.
Intellectual property rights are like any other property rights-they allow the creator, or owner, of a patent, trademark, or copyright to benefit from his or her own work or investment.
Both treaties are administered by the World Intellectual Property Organization (WIPO). Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.
IP is protected in law by, for example, patents, copyright and trademarks, which enable people to earn recognition or financial benefit from what they invent or create. By striking the right balance between the interests of innovators and the wider public interest, the IP system aims to foster an environment in which creativity and innovation can flourish.
(i) Here are four main types of intellectual property that you can use to protect your business.
- Copyrights-Copyrights protect original works of authorship, such as literature, music, artistic works, and computer software.
- Patents.
- Trademarks.
- Trade Secrets.
Question 3.
Give the advantages and disadvantages of Social Media.
Answer:
When it comes to social networking in the workplace, there is no one-size-fits-all approach. The benefits of social networking platforms vary based on platform type, features and the company itself.
Social networking platforms may allow organizations to improve communication and productivity by disseminating information among different groups of employees in a more efficient manner. While it is not meant to be all-inclusive, the list below outlines some of the possible advantages and disadvantages of social media use by workplaces.
(i) Advantages:
- Facilitates open communication, leading to enhanced information discovery and delivery.
- Allows employees to discuss ideas, post news, ask questions and share links.
- Provides an opportunity to widen business contacts.
- Targets a wide audience, making it a useful and effective recruitment tool.
- Improves business reputation with minimal use of advertising.
- Expands market research, implements marketing campaigns, delivers communications and directs interested people to specific web sites.
(ii) Disadvantages:
- Opens up the possibility for hackers to commit fraud and launch spam and virus attacks.
- Increases the risk of people falling prey to online scams that seem genuine, resulting in data or identity theft.
- Potentially results in negative comments from employees about the company or potential legal consequences if employees use these sites to view objectionable, illicit or offensive material.
- Potentially results in lost productivity, especially if employees are busy updating profiles, etc.
Question 4.
Write a detailed note on ICT and Employment.
Answer:
The rapid developments in ICT had a dramatic effect on modern society.
(i) Many jobs have been lost because:
- ICT can make someone more efficient at their job, a company can therefore employ less people to complete that job.
(ii) For example:
- In a factory, skilled technicians and machinists can be replaced by computer- controlled robots which can work faster, for longer and more consistently.
- In a factory, many dirty and dangerous monitoring jobs have been replaced by data-logging equipment using sensors.
- In a factory, many quality control jobs involved routine sampling and were very boring, many have now been replaced by automatic machines.
- In a warehouse, many loading and sorting jobs have been replaced by a few staff running a computer-controlled warehouse.
- In an office, many typists can be replaced by one person using a word processor. For example documents can be saved and reloaded for editing rather than being re-typed and mail merging can be used to create apparently custom-typed documents.
- In an office, many payroll clerks using calculators and paper-based records can be replaced by one person using a spreadsheet to calculate a company’s payroll.
- In an office, many clerks updating paper-based files in filing cabinets can be replaced by one person using a database.
- In a telephone exchange, operators have been replaced by computer systems that make the phone connections automatically.
- In a car park, the car park attendant can be replaced by automatic ticket machines and barriers using control technology.
- In a shop, stock control staff can be replaced by automated bar-code readers recording items entering the building and being sold.
- In a bank, due to ATM machines, less cashiers are needed inside the bank to deal with customers.
- Working with ICT requires new skills and many workers found it difficult to retrain because they found the new skills hard to learn.
- Converting a business to make use of ICT can be very expensive and many small companies could not afford to make the change.
- Many jobs have been created because:
(iii) Computerization has created many new jobs or radically changed existing jobs. For example:
- Engineers are needed to build the new computerized machines.
- Programmers are needed to write the new programs that the computers run.
- Systems analysts are needed to design the new computerized systems.
- Skilled workers are needed to operate the new computerized machinery.
- Skilled workers are needed to use new software such as graphics packages, web- design software and CAD programs.
- More staff may be needed because of the increased business generated by improved efficiency.
(iv) Many jobs have changed because:
- People may work less hours as a result of the increased efficiency of automation and the introduction of ICT into their workplace.
- New skills are needed to use the computer software and hardware. Pupils who gain ICT skills during their education, as well as staff who are prepared to retrain, are well placed to take advantage of the new forms of employment.
- Highly skilled jobs can now be done by unskilled staff using a computer. A skilled machinist can be replaced by someone operating a computerised lathe. This can result in a more standardised product because there is less risk of human error.
- Many professional jobs can now be done by amateurs using a home computer. For example, photographic editing, video editing and sound editing.
- Many people can now work from home using teleworking.
- Students can educate themselves more easily due to the huge amount of educational software resources and information now available, much of it interactive and allowing then to self-assess.
- In many jobs, the efficiency of staff can now be accurately monitored by computers, this can help target resources but can be very stressful if staff set unrealistic targets.
- Communications equipment means employees can be available and able to work even when on holiday or weekends. This can be stressful on individuals and families.
- Employees can have more job satisfaction because the jobs involving some aspect of ICT generally require higher skill levels and may therefore be less boring.
Question 5.
Write a short note on each of the following terms-
(a) Secrecy
(b) Authentication
(c) Integrity
Answer:
(a) Secrecy: Secrecy is the practice of hiding information from certain individuals or groups, perhaps while sharing it with other individuals. That which is kept hidden is known as the secret. Secrecy is often controversial, depending on the content of the secret, the group or people keeping the secret.
(b) Authentication: It is a process in which the credentials provided are compared to those on file in a database of authorized users’ information on a local operating system or within an authentication server. If the credentials match, the process is completed and the user is granted authorization for access.
(c) Integrity: In computing terms,‘integrity’ is used in a sentence such as,“we have a system in place to ensure data integrity”. In this context, it means that the data is not corrupt.
So, the sentence above means that something has been put in place to prevent data corruption.
ADDITIONAL QUESTIONS SOLVED
I. Multiple Choice Questions
Question 1.
Through social networking people can speak to family and friends from across the-
(a) State
(b) Country
(c) other countries
(d) All of the above
Answer:
(d)
Question 2.
What is the full from of UGC?
(a) user-generated content
(b) user generated company
(c) unique generated content
(d) unique general content
Answer:
(a)
Question 3.
Broadband access is not available to-
(a) Urban areas
(b) Rural areas
(c) Universities
(d) Businesses
Answer:
(b)
Question 4.
Secrecy can also be called-
(a) General information
(b) Complexity
(c) Furtiveness
(d) Attentiveness
Answer:
(c)
Question 5.
Which one of the following cannot be used as a protection of Intellectual Property?
(a) Copyright
(b) Trademarks
(c) Patents
(d) Depreciation
Answer:
(d)
II. Very Short Answer Type Questions
Question 1.
What is the full form of WIPO?
Answer:
World Intellectual property organisation.
Question 2.
What is the application base of social media?
Answer:
Web 2.0 Internet based.
Question 3.
What is TRIP?
Answer:
Trade Related aspects of Intellectual Property Rights.
Question 4.
When TRIP agreement was done?
Answer:
In 1995.
Question 5.
Clandestinity is another name of-
Answer:
Secrecy.
III. Short Answer Type Questions
Question 1.
Define Authentication.
Answer:
It is a process in which the credentials provided are compared to those on file in a database of operating system or within an authentication server, if the credentials match, the process is completed and the user is granted authorization for access.
Question 2.
How IP can be protected?
Answer:
IP can be protected by the use of the following:
- Copyright
- Patents
- Trade marks
- trade secrets
Question 3.
What is social media?
Answer:
Social media are computer-mediated tools that allow people, companies, and organisations to create, share, or exchange information, ideas in virtual communities.
Question 4.
Give some points to avoid plagiarism.
Answer:
Some points to avoid plagiarism are given below:
- Keep track of your sources
- Keep sources in correct context.
- Don’t cut and paste, file and label your sources.
- Keep your notes and your draft separate.
- keep a source trail.
Question 5.
List some jobs created by computerization
Answer:
Some of the jobs created by computerization are as follows:
- Engineers are needed to build new computerized machines
- Programmers are needed to write the new programmers that the computers run.
- System analysts are needed to design new computerized systems
- Skilled workers are needed to operate the new computerized machinery.
IV. Long Answer Type Questions
Question 1.
Describe the social impacts of ICT?
Answer:
The impact of ICT, has changed the way how we socialise today. There are many positive points but there are many negative points too.
Some positive points of social impact of ICT:
- ICT has brought the world together through social networking sites.
- ICT has made researching information easier, as information can be found by looking over the internet.
- ICT has created many jobs for people to apply for, ICT skills are required for almost every type of industry.
Some negative points of social impact of ICT:
- Children and teenagers spend most of their free time using computers, which affects their social development.
- Small local businesses are badly affected by the effects of ICT as people would rather shop online which is causing smaller businesses losing revenue.
- ICT has caused many legal impacts. Many media forms such as movies and music have become easily available across the internet, which has led to copyright material to become easy to steal.