Societal Impact Class 11 Notes

Teachers and Examiners (CBSESkillEduction) collaborated to create the Societal Impact Class 11 Notes. All the important Information are taken from the NCERT Textbook Computer Science (083) class 11.

Societal Impact Class 11 Notes

Digital Footprints

The websites we visit, emails we send, any information we post online, etc., as well as the IP address, location, and other device-specific information of the computer this is known as digital footprint. or you can say data left behind by users after they utilise the internet is known as a digital footprint.

Example of digital footprint
a. Search history
b. Photos and Videos
c. Like/ dislike in social media
d. Browser history

We leave two different types of digital footprints.

  1. Active digital footprint – data that we consciously submit online is included in our active digital footprints.
    This would include any emails we send, comments or postings we make on various websites or apps, etc.
  2. Passive digital footprints – are the traces of data we unwittingly leave online. Included in this are the data produced when we access a website, utilise a mobile app, explore the internet, etc.

Societal Impact Class 11 Notes

Digital Society and Netizen

A digital citizen, often known as a netizen, is someone who uses digital technology and the Internet. A good netizen uses digital technology in a safe, moral, and legal manner. Internet etiquette, communication etiquette, and social media etiquette must all be followed by a responsible netizen.

Net Etiquettes

When we engage with others, we adhere to specific social norms. Similar to this, we must act appropriately and politely when using the internet. While online, one should behave ethically, respectfully, and responsibly.

Be Ethical
  • No copyright violation – We should not use copyrighted materials without the permission of the creator or owner.
  • Share the expertise – It is beneficial to share expertise and information online so that others can use it. However, we must be confident that we are sufficiently knowledgeable about a subject before sharing any information.
Be Respectful
  • Respect privacy – As good digital citizens we have the right to privacy and the freedom of personal expression. At the same time, we have to understand that other digital citizens also have the same rights and freedoms.
  • Respect diversity – in a group or public forum, we should respect the diversity of the people in terms of knowledge, experience, culture and other aspects.
Be Responsible
  • Avoid cyber bullying – We have to avoid insulting, degrading or intimidating online behaviour like repeated posting of rumours, giving threats online, posting the victim’s personal information or sexual harassment. We need to realise that bullying online can have very serious implications on the other person (victim).
  • Don’t feed the troll – An Internet troll is someone who intentionally sows conflict online by provoking arguments, upsetting people, or by publishing controversial or irrelevant statements in online communities for fun.

Societal Impact Class 11 Notes

Communication Etiquettes

Email, texting, instant messaging, cell phone conversations, audio and video conferencing, forum posting, social networking site posting, etc. are all examples of digital communication. All of them are great opportunities to interact with others and share information, ideas, and knowledge.

Be Precise
  • Respect time – we should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us.
  • Respect data limits – For concerns related to data and bandwidth, very large attachments may be avoided. Rather send compressed files or link.
Be Polite
  • we should be polite and non-aggressive in our communication. We should avoid being abusive even if we don’t agree with others’ point of view.
Be Credible
  • We should be cautious while making a comment, replying or writing an email or forum post as such acts decide our credibility over a period of time.

Societal Impact Class 11 Notes

Social Media Etiquettes

We are familiar with several social networking platforms and may even have an account there. These websites enable users to submit or upload photographs of their ideas and experiences. It has started to influence how politics, business, entertainment, education, and other things turn out. There are certain social media etiquettes we must adhere to as well.

Be Secure
  • Choose password wisely – Users need to be aware of how to protect themselves and their accounts. Having a strong password that is updated periodically is the way to minimize the risk from hackers.
  • Know who you befriend – We must take precautions while making friends with strangers because their motives may be dangerous and harmful.
  • Beware of fake information – In social networks, fake posts, messages, and news are common. We should be aware of them as users.
Be Reliable
  • Think before uploading – On social networks, almost anything can be uploaded. But keep in mind that once posted, the file remains on the remote server even if we delete it. Therefore, we must tread cautiously while transmitting or uploading private or sensitive files that could compromise our privacy.

Societal Impact Class 11 Notes

Data Protection

Every nation in the globe has its unique data protection legislation (laws). These policies, which are formal legal papers, give the user instructions on how to handle, store, and transmit sensitive data. The goal of putting these policies into place is to guarantee that sensitive data is properly protected from change or disclosure.

Intellectual Property Right (IPR)

It is the inventor’s intellectual property if they come up with a novel idea. Intellectual property includes innovations, literary and artistic works, visual arts, names, and logos. The originator or intellectual property owner is the rightful proprietor of such concepts.

Copyright

Copyright gives creators legal protection for their original works, including writing, photography, audio and video recordings, computer software, sculptures, architectural creations, and other types of creative output like literary and artistic works. Copyrights are automatically granted to creators and authors.

Patent

Inventions are granted a patent. In opposed to copyright, the creator must submit an application (file) to patent the innovation. After receiving a patent, the owner gains the only authority to prohibit anyone from making, using, or selling the invention.

Trademark

Any visual symbol, word, name, design, slogan, label, etc. that sets the brand or business apart from other brands or businesses is considered a trademark.

Societal Impact Class 11 Notes

Violation of IPR

The following are some ways that intellectual property rights may be violated –

Plagiarism

Text, images, and videos may all be easily copied or shared. Plagiarism is the process of representing the thoughts or works of another person as one’s own. Plagiarism is defined as the act of taking someone else’s work and using it without crediting the author name or source.

Copyright Infringement

When we utilise someone else’s creative work without asking permission or, if the work is being sold, without paying for it, we are infringing their copyright.

Trademark Infringement

Unauthorized use of another’s trademark on goods and services is known as trademark infringement. Anyone who violates a trademark registered to them may face legal action from the trademark owner.

Societal Impact Class 11 Notes

Public Access and Open Source Software

Two well-known types of public licences are the GNU General Public License (GPL) and Creative Commons (CC).

  • Creative Common License – All types of creative works, including websites, music, movies, books, etc., use Creative Commons. CC makes it possible to distribute a copyrighted work freely.
  • General Public License – Another free software licence, the GNU GPL, allows users to run, study, share, and modify the software while also receiving frequent updates.

Societal Impact Class 11 Notes

Cyber Crime

To disrupt or harm data or services, a cybercriminal targets a computer or a network that connects it to other computers. Additionally, a cybercriminal could spread viruses and other malware in order to obtain private and confidential data for extortion and blackmail. Cybercrimes are committed with the goal to directly or indirectly cause physical harm, financial loss, or mental harassment against an individual, a group, an organisation, or even a country.

Hacking

Unauthorized access to a computer, computer network, or other digital system is known as hacking. Hackers frequently possess technical knowledge of both software and hardware. They search for bugs that they can use to access the system.

Phishing and Fraud Emails

Phishing is an illegal practise in which users are provided with false websites or emails that appear genuine or original in order to illegally obtain sensitive and personal information, including usernames, passwords, banking information, and credit card numbers.

Identity Theft – Identity thieves are increasingly leveraging personal data obtained illegally from computers or computer networks to conduct fraud.

Ransomware

The attacker gains access to the computer in this case and prevents the user from using it, typically by encrypting the data. When a ransom is not paid, the attacker may threaten to disclose the victim’s private and sensitive information or photos or use blackmail to force the victim to pay for access to the data.

Combatting and Preventing Cyber Crime

With the dual strategy of being cautious and seeking legal assistance, the difficulties of cybercrime can be reduced.
The following items can be thought of as safety precautions to lower the danger of cybercrime:

  • Take regular backup of important data
  • Use an antivirus software and keep it updated always
  • Avoid installing pirated software. Always download software from known and secure (HTTPS) sites
  • Always update the system software which include the Internet browser and other application software
  • Do not visit or download anything from untrusted websites
  • In most cases, the browser warns users about dubious websites whose security certificate could not be confirmed; stay away from such sites.
  • For web logins, use strong passwords, and change them frequently. Use a different password for each website. Use a variety of alphanumeric character combinations, including special characters. Don’t include common names or words in your password
  • Don’t let your browser remember your password or auto-fill information when using someone else’s computer, and attempt to browse in a private browser window.

Societal Impact Class 11 Notes

Indian Information Technology Act (IT Act)

The Information Technology Act, 2000 (commonly known as the IT Act) of the Government of India, as revised in 2008, offers instructions to the user on the handling, storing, and transfer of sensitive data.

There are cyber cells in police stations in various Indian states where one can report any cybercrime. By recognising digital signatures and electronic records, the legislation creates a legal framework for electronic government. The statute describes cybercrimes and their associated consequences.

Impact on Health

We are spending more time in front of screens, whether on our phones, laptops, desktop computers, televisions, gaming consoles, or music or sound equipment, as digital technologies have permeated several industries. However, conversing while hunched over might be detrimental to our health on both a physical and mental level. 

The science of ergonomics is the design or arrangement of workplaces, including the systems, furniture, and equipment, to make them safe and comfortable for the user. We can lessen the burden on our bodies thanks to ergonomics, including weariness and ailments brought on by continuous use.

Computer Science Class 11 Notes
Computer Science Class 11 MCQ
Computer Science Class 11 NCERT Solutions

Computer

error: Content is protected !!