CBSE CS and IP

CBSE Class 11 & 12 Computer Science and Informatics Practices Python Materials, Video Lecture

Showing posts with label Class 12 CS. Show all posts
Showing posts with label Class 12 CS. Show all posts

XII CS CRASH COURSE eBook (PDF) 2020-21

 

eBook PDF CLASS 12 CS CARSH COURSE

Purchase the Class 12 CS CRASH COURSE ebook from here. It is based on the Revised Syllabus of CBSE and Covers UNIT-1 and UNIT-3 of Class 12 CS CBSE Syllabus.

Free Video Lectures are available on the youtube channel cbsecsip, click here to access the free video lectures.

Note:- 

  1. eBook PDF file will be delivered in your email within 15 - 20 minutes of purchase.
  2. This book covers UNIT-1 and UNIT-3, all the topics which are discussed in the Online Youtube Class 12 CS CRASH COURSE of cbsecsip.
  3. Once purchased, the item is not exchangeable or refundable.

What is Plagiarism and How to avoid it


 

Table of contents

  1. What is Plagiarism?
  2. Acts that involve Plagiarism
  3. How to Avoid Plagiarism

What is Plagiarism?

  • Plagiarism is stealing someone else’s intellectual work (can be an idea, literary work or academic work, etc.) and representing it as your own work without giving credit to the creator or without citing the source of information.
  • Plagiarism is an offense because it involves copyright infringement and not giving the credit to the author.

An act that involves plagiarism

  • Turning in someone else's work as your own
  • Copying words or ideas from someone else without giving credit
  • Failing to put a quotation in quotation marks
  • Giving incorrect information about the source of a quotation
  • Changing words but copying the sentence structure of a source without giving credit.

How to avoid plagiarism

You must give credit whenever you use:
  •  Another person’s idea, opinion, or theory
  • Quotation of another person’s actual spoken or written words
  • Paraphrases of another person’s spoken or written words




Net Etiquettes (Netiquettes)


 

What is Net Etiquettes (Netiquettes) or Net+etiquetts?

You must be aware of the term etiquette. This means the general behavior you must follow in your daily life. There is a little difference between etiquette and net etiquette. There are some rules that you must obey when you are online and using the Web/internet. These rules are called net etiquette (Netiquettes), Internet etiquettes or Online etiquetts
  • Online etiquette or ‘netiquette’ refers to the dos and don’ts of online communication.
  • You can do Online Communication using Snapchat, Instagram, WhatsApp, etc. These are the most popular online mediums available online.
Now let us discuss net etiquette do's and don'ts and some rules that you should follow while you are using the internet. 

7 Net Etiquettes you should follow

  1. Be respectful.
  2. Be aware of what you are commenting on social media.
  3. Be careful with humor and sarcasm
  4. You should take care of how you are sharing your data and who can see this.
  5. Friend requests and group invites should be checked before you accept them
  6. Take time to have a read of the rules of conduct/ community standards
  7. Be forgiving do not take fight online

Bad net etiquette

  1. Posting inappropriate jokes on social media
  2. Continuously posting messages to get the attention of someone is bad net etiquette.
  3.  Using a photo of another person on your profile
  4. Not respective peoples privacy online
  5. Taking fight online





Digital footprint

Digital Footprints


What is a Digital footprint?

  • A digital footprint is an impact you create on the Web through your online activity, which incorporates browsing, interactions with others, and publication of content. 
  • In other words, it can be considered as the data trail – intentional and unintentional - you leave behind while you surf the Web or Internet. 
  • Digital footprint or digital shadow refers to the trail of data left behind through the utilization of the Web or on digital devices.
  • The digital footprint of any person can have a positive as well as a negative impact on him.

How Digital Footprints are Created-

Find some of the examples of digital footprints:
  • Visiting Websites And Online Shopping
  •  Online Searching 
  •  Posting on Social Media, blogs, etc.
  •  Online Image and Video Upload 
  •  Communicating Online (Ex:- Chat, Email, etc.)
  •  Any activity you perform Online etc.

Types of digital footprints-

Following are the two types of digital footprints:
Active digital footprints:- Active digital footprints are those data trails that a person leaves intentionally on the Web. 
Ex:- Twitter, blog posts, Facebook, social network connections, image and video uploaded on Internet, phone calls, email, and chats are among the ways people create active digital footprints.
Passive digital footprints:- This suggests that a passive footprint would be defined as the unintentional traces of data that an individual creates on the Web.
Ex:- Website visits and actions, searches, and online purchases are among the activities that add passive data traces to a digital footprint.

Positive and Negative Digital Footprints

Positive digital Footprints:- 
That reflects your Positive Personality.
  • Increased opportunity
  • Higher profits
  • Less risk
  • Gentler treatment
Negative digital footprints:- 
Things that reflect your Negative Personality sort of a drunken photo, a silly comment, logging on to an inappropriate website.
  • Fewer Opportunities (like Admission, Job, etc.)
  • Negative Personal Image

How digital footprints can affect you?

  1. Privacy Issues: Digital footprints are a privacy concern because they're a group of traceable actions, contributions, and concepts shared by users. They are often tracked and may allow internet users to find out about human actions.
  2. Cyber Vetting: where interviewers could research about the applicants before the interview based on their online activities on the Web.
  3. Target advertisement: It is used by marketers so as to seek out what products a user is curious about or to inspire ones' interest during a certain product that supported similar interests.
  4. Less/More Opportunities depends upon your Positive/Negative Digital Footprints.

How can you manage your digital footprint?

Though it is not possible to fully hide your digital footprints, you can follow some of the given techniques to manage your digital footprints.
  1. You can search your name on different search engines and they provide you facilities where you can set up an alert for future notifications when your name searched online
  2. Have different email addresses, so professional and private accounts aren't automatically related to each other
  3. You can change privacy settings on social media accounts where you do not make more things public. But you should not trust them completely because your data is still with those platforms.
  4. Exercise caution altogether our activities, and refrain from oversharing

Built Positive Digital Footprints-

Since it is hard to not have a digital footprint, it is in one’s best interest to create a positive one.

It is beneficial for you !!














 

Cyber Law IT ACT 2000

CYBER LAW


What is cyber Law?


  • Cyber law, also known as cybercrime law, is legislation focused on the acceptable behavioral use of technology including computer hardware and software, the internet, and networks.
  • Cyber law helps protect users from harm by enabling the investigation and prosecution of online criminal activity.
  • It applies to the actions of individuals, groups, the public, government, and private organizations.

Overview of Indian IT ACT

  • The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce.
  • A major amendment was made in 2008 and now it is called the IT (Amendment) Act 2008.

Some Suggested questions that may be asked in board examination Class 12 CS/IP

  1. What is Cyber Crime? Write the act that deals with it.
  2. What is IT Act, 2000? Write down 2 salient features of IT Act, 2000.
  3. Difference between Cyber Crime and Cyber Law.