Last updated on February 17th, 2026 at 11:02 pm
Society Law and Ethics Notes Unit 3 Class 11
Click Ctrl+P (Windows) or Cmd+P (Mac) to save as PDF
⚡ Quick Summary – 5 Minutes Revision
Safe and responsible internet use to protect personal information
Harmful software: Virus, Trojan, Adware, Spyware, Ransomware
Old electronic devices that need proper disposal and recycling
India’s primary law dealing with cybercrime and e-commerce
Gender & disability challenges in computer education
Definitions, Types of Malware, E-waste disposal, IT Act provisions
⭐ Exam Importance: High (8-10 marks)
📑 Table of Contents
📚 CBSE Syllabus Coverage – Unit 3
- ✅ Cyber safety: safely browsing the web, identity protection, confidentiality
- ✅ Cyber trolls and bullying
- ✅ Safely accessing websites: malware, viruses, trojans, adware
- ✅ E-waste management: proper disposal of used electronic gadgets
- ✅ Indian Information Technology Act (IT Act)
- ✅ Technology & Society: Gender and disability issues
🔍 What is Cyber Safety?
Definition: Cyber safety refers to the safe and responsible use of the internet to ensure the safety and security of personal information and not posing a threat to anyone else’s information.
In Simple Words: Being careful and smart while using the internet to protect yourself and others from online dangers.
🎯 Key Aspects of Cyber Safety:
- ✅ Protecting personal information online
- ✅ Safe browsing habits
- ✅ Awareness of online threats
- ✅ Responsible digital behavior
- ✅ Respecting others’ privacy and rights
🛡️ Identity Protection
Definition: Protection against theft of personal information over cyberspace without consent, usually for financial gain, is known as Identity Protection.
🚨 Identity Theft
Definition: Identity theft is a type of fraud that involves using someone else’s identity to steal money or gain other benefits.
Online Identity Theft: Stealing someone’s personal information (name, login details, credit card info) and posing as that person online.
🔴 Real-World Example: Identity Theft
Case: In 2019, a Delhi resident lost ₹2.5 lakhs when fraudsters stole his banking details through a phishing email.
How it happened: Victim clicked on a fake bank link, entered credentials, and criminals immediately accessed the account.
Lesson: Never click on suspicious links or share banking details via email/SMS.
💡 8 Practices to Ensure Confidentiality (Exam Important! ⭐⭐⭐)
- Use Firewall: Install and enable firewall protection on your device
- Control Browser Settings: Block tracking cookies and third-party trackers
- Browse Privately: Use incognito/private mode for sensitive activities
- Be Careful with Posts: Think before posting personal information online
- Ensure Safe Sites: Look for HTTPS and padlock icon before entering personal data
- Handle Emails Carefully: Don’t open suspicious attachments or click unknown links
- Avoid Public WiFi: Don’t enter passwords or banking info on public networks
- Avoid Public Computers: Don’t save passwords or login on shared computers
⚠️ Cyber Crime
Definition: Any criminal offense that is facilitated by, or involves the use of, electronic communications or information systems, including any electronic device, computer, or the internet.
Examples: Hacking, identity theft, cyberstalking, phishing, online fraud, data theft
😈 Cyber Trolls
Definition: Derogatory, offensive, or provocative messages or comments posted online targeting specific people or groups.
Purpose: To harass, insult, or provoke emotional responses from victims.
😢 Cyber Bullying
Definition: Harassing, demeaning, embarrassing, defaming, or intimidating someone using modern technologies like the internet, cell phones, instant messengers, or social networks.
Forms: Sending mean messages, spreading rumors, posting embarrassing photos/videos, creating fake profiles
🔴 Real Case: Cyber Bullying in Schools
Incident: In 2020, a Class 11 student from Mumbai faced severe depression after classmates created fake social media accounts in her name and posted inappropriate content.
Action Taken: Case filed under IT Act Section 66A (now replaced), school counseling provided, accounts removed.
Impact: Student’s mental health severely affected, required professional counseling.
👁️ Cyber Stalking
Definition: A form of online harassment where the victim is exposed to a large number of online messages, emails, or social media interactions.
Characteristics:
- Repeated, unwanted contact
- Often the stalker knows the victim
- Uses internet to track and monitor victim’s activities
- Can include threats and intimidation
👣 Digital Footprint
Definition: A digital footprint is a trail of data you create while using the internet. It includes websites you visit, emails you send, and information you submit to online services.
Two Types:
1. Active Digital Footprint: Information you deliberately share about yourself (social media posts, comments, uploads)
2. Passive Digital Footprint: Information collected about you without your knowledge (cookies, IP address tracking, browsing history)
⚠️ Common Social Networking Sites (Remember for Exam)
- Facebook – Social networking and connecting with friends
- Twitter (X) – Microblogging and news sharing
- LinkedIn – Professional networking
- Instagram – Photo and video sharing
- WhatsApp – Messaging and calling
- YouTube – Video sharing platform
✅ 7 Rules for Safe Social Media Use (Exam Important! ⭐⭐)
- Be Authentic: Share genuine information, don’t fake your identity
- Use Disclaimer: Clarify that your views are personal, not organizational
- Don’t Pick Fights: Avoid online arguments and heated debates
- Protect Your Identity: Don’t share sensitive personal information
- Don’t Use Fake Names: Use real names to build trust
- Respect Your Audience: Post content appropriate for all viewers
- Respect Others’ Sentiments: Be sensitive to different viewpoints and cultures
🔐 Tips for Safe Web Browsing (Very Important for Exam! ⭐⭐⭐)
- Use Common Sense: Never respond to spam, don’t disclose personal information unnecessarily
- Use Antivirus & Firewall: Install reliable security software for real-time malware protection
- Create Strong Passwords: Use combination of uppercase, lowercase, numbers, and special characters
- Mind Your Downloads: Review all checkboxes during installation, uncheck unwanted applications
- Stay Updated: Regularly update operating system, applications, and antivirus software
- Check Website Security: Look for HTTPS and padlock icon before entering information
- Use Two-Factor Authentication: Enable 2FA wherever available for extra security
- Regular Backups: Keep backup of important data on external drives or cloud
🦠 What is Malware?
Definition: Malware (Malicious Software) is any program or file that is harmful to a computer user. It includes computer viruses, worms, Trojan horses, spyware, adware, and ransomware.
Purpose: These malicious programs can steal, encrypt, or delete sensitive data, alter or hijack core computing functions, and monitor users’ computer activity without permission.
📊 Types of Malware – Complete Comparison (Very Important! ⭐⭐⭐)
| Type | What It Does | How It Spreads | Famous Examples | Prevention |
|---|---|---|---|---|
| 🦠 Virus | Attaches to files and spreads to other files/computers. Alters how computer operates. | Email attachments, infected USB drives, downloads | ILOVEYOU, Melissa, WannaCry | Antivirus software, don’t open suspicious files |
| 🐴 Trojan Horse | Appears harmless but performs malicious activities. Steals data, creates backdoors. | Disguised as legitimate software, fake emails | Zeus, Emotet, Dridex | Download only from trusted sources, use antivirus |
| 📢 Adware | Generates revenue by displaying unwanted ads. Can slow down system. | Bundled with free software, pop-ups | Fireball, Appearch, DollarRevenue | Use ad blocker, careful during installations |
| 🕵️ Spyware | Secretly monitors and collects user information without knowledge. | Infected downloads, malicious websites | CoolWebSearch, Gator, Zlob | Anti-spyware tools, avoid suspicious links |
| 🔒 Ransomware | Encrypts files and demands money (ransom) to unlock them. | Phishing emails, infected websites | WannaCry, Petya, Locky, CryptoLocker | Regular backups, don’t click unknown links, update software |
| 🐛 Worm | Self-replicating malware that spreads across networks without human action. | Network vulnerabilities, email | Morris Worm, SQL Slammer, Conficker | Firewall, network security, update patches |
🦠 Computer Virus (Detailed)
Definition: A computer virus is a type of malicious code or program written to alter the way a computer operates and designed to spread from one computer to another.
How it Works: A virus operates by inserting or attaching itself to a legitimate program or document that supports macros to execute its code.
Characteristics:
- Requires host file or program to attach
- Needs human action to spread (opening file, running program)
- Can replicate itself
- Can corrupt or delete data
- Can slow down system performance
🐴 Trojan Horse (Detailed)
Definition: A Trojan horse is a program that appears harmless but is, in fact, malicious. It can perform unexpected changes to computer settings and unusual activity, even when the computer is idle.
Why “Trojan”? Named after the Greek story where soldiers hid inside a wooden horse to infiltrate Troy – similarly, malware hides inside legitimate-looking software.
Common Activities:
- Stealing passwords and banking information
- Creating backdoors for hackers
- Deleting or modifying files
- Logging keystrokes (Keyloggers)
- Using computer for DDoS attacks
📢 Adware (Detailed)
Definition: Adware is software that generates revenue for its developer by automatically displaying online advertisements in the user interface or during installation process.
Revenue Models:
- Display Revenue: Money earned by showing ads
- Pay-Per-Click: Money earned when user clicks on ads
Signs of Adware:
- Unexpected advertisements appearing everywhere
- Homepage or search engine changed without permission
- Slow system performance
- New toolbars in browser
- Pages redirecting to advertising sites
🔴 Real Case: WannaCry Ransomware Attack (2017)
What Happened: In May 2017, WannaCry ransomware infected over 200,000 computers across 150 countries in just 4 days.
Impact in India:
- Several government organizations affected
- Andhra Pradesh police systems hit
- Kerala Police faced disruptions
- Many businesses suffered data loss
How it Worked: Encrypted user files and demanded $300-600 in Bitcoin to unlock.
Lesson Learned:
- Keep regular backups
- Update operating system immediately
- Don’t click suspicious email attachments
- Use reliable antivirus software
⚠️ How to Protect from Malware (Exam Important! ⭐⭐⭐)
- Install Antivirus: Use reputed antivirus software (Kaspersky, Norton, McAfee, Windows Defender)
- Keep Software Updated: Enable automatic updates for OS and applications
- Use Firewall: Enable built-in firewall protection
- Avoid Suspicious Links: Don’t click on links in unknown emails or messages
- Download from Trusted Sources: Use official websites and app stores only
- Scan USB Drives: Always scan external devices before use
- Regular Backups: Keep copies of important data offline
- Be Careful with Email Attachments: Scan before opening, even from known senders
- Use Strong Passwords: Different passwords for different accounts
- Enable Two-Factor Authentication: Add extra layer of security
♻️ What is E-Waste?
Definition: E-waste (Electronic Waste) refers to discarded electrical or electronic devices. When an electronic device completes its working life, becomes unusable due to technological advancements, or becomes non-functional, it is categorized as e-waste.
Examples of E-Waste:
- Old computers and laptops
- Mobile phones and tablets
- Printers and scanners
- Televisions and monitors
- Keyboards, mouse, cables
- Hard drives and memory cards
- Batteries and chargers
- Electronic toys and gadgets
⚠️ Why E-Waste is Dangerous
Electronic devices contain harmful substances that can damage the environment and human health:
- Lead: Found in CRT monitors and circuit boards – damages brain and kidneys
- Mercury: In flat-screen monitors – affects nervous system
- Cadmium: In batteries – causes lung and kidney damage
- Chromium: In metal housings – can cause cancer
- Plastic: Takes hundreds of years to decompose
Environmental Impact: When e-waste is thrown in regular garbage, toxic chemicals leak into soil and water, polluting the environment.
♻️ E-Waste Management
Definition: Managing non-functional electronic devices through proper disposal, reusing, and recycling methods to minimize environmental damage.
Goal: To recover valuable materials from old electronics and safely dispose of harmful substances.
✅ 7 Ways to Dispose E-Waste Properly (Very Important! ⭐⭐⭐)
- Return to Electronic Companies: Many companies (Apple, Samsung, Dell) have take-back programs where you can return old devices
- Visit E-Waste Collection Centers: Drop off e-waste at authorized collection centers in your city
- Give to Civic Institutions: Municipal corporations often organize e-waste collection drives
- Donate Your Outdated Technology: If device still works, donate to schools, NGOs, or underprivileged communities
- Sell Off Your Outdated Technology: Sell old but working devices online or to second-hand dealers
- Give to Certified E-Waste Recyclers: Hand over to government-approved recycling facilities
- Exchange Programs: Many companies offer exchange schemes where you get discount on new device by returning old one
🌍 E-Waste Statistics in India
- India generates over 3.2 million tonnes of e-waste annually
- Only 1.5% of total e-waste is recycled
- Mumbai generates the highest e-waste in India
- E-waste is growing at 30% per year
- 70% of e-waste comes from 10 states
🇮🇳 E-Waste Rules in India
E-Waste Management Rules, 2016 (amended 2018)
- Extended Producer Responsibility (EPR) – Manufacturers must collect and recycle
- Deposit Refund Scheme – Get money back when returning old device
- Channel Partners Responsibility – Dealers must inform customers about e-waste disposal
- Urban Local Bodies – Must set up collection centers
- Ban on import of e-waste
💡 What Students Can Do (3R Principle)
- 🔄 Reduce: Don’t buy new gadgets unnecessarily, use devices for longer duration
- ♻️ Reuse: Repurpose old devices (old phone as webcam, old laptop for kids learning)
- ♻️ Recycle: Give broken devices to authorized recyclers, don’t throw in regular trash
⚖️ Information Technology Act, 2000 (IT Act)
Full Name: The Information Technology Act, 2000 (ITA-2000)
Notified On: 17th October 2000
Purpose: It is the primary law in India dealing with cybercrime and electronic commerce.
Amendment: Major amendment made in 2008 – now called IT (Amendment) Act 2008
🎯 Objectives of IT Act (Remember for Exam!)
- Legal recognition to electronic transactions and digital signatures
- Facilitate e-commerce and e-governance
- Prevent computer-based crimes
- Provide legal framework for electronic records
- Regulate certification authorities for digital signatures
- Facilitate secure electronic communication
- Penalize cyber crimes and violations
📊 Important Sections of IT Act (Very Important for Exam! ⭐⭐⭐)
| Section | Offense | Punishment |
|---|---|---|
| Section 43 | Unauthorized access to computer, download data, introducing virus, damage to computer system | Compensation up to ₹1 crore |
| Section 66 | Computer hacking – unauthorized access with intent to commit crime | Imprisonment up to 3 years + Fine up to ₹5 lakhs |
| Section 66A | Sending offensive messages through communication service (Struck down by Supreme Court in 2015) | Previously: Up to 3 years imprisonment |
| Section 66B | Dishonestly receiving stolen computer/communication device | Imprisonment up to 3 years + Fine up to ₹1 lakh |
| Section 66C | Identity theft – using another person’s password/digital signature fraudulently | Imprisonment up to 3 years + Fine up to ₹1 lakh |
| Section 66D | Cheating by personation using computer | Imprisonment up to 3 years + Fine up to ₹1 lakh |
| Section 66E | Violation of privacy – publishing private images without consent | Imprisonment up to 3 years + Fine up to ₹2 lakhs |
| Section 66F | Cyber terrorism – threatening security or unity of India | Imprisonment up to life |
| Section 67 | Publishing obscene material in electronic form | First conviction: 3 years + ₹5 lakhs Second conviction: 5 years + ₹10 lakhs |
| Section 67A | Publishing sexually explicit content | First: 5 years + ₹10 lakhs Second: 7 years + ₹10 lakhs |
| Section 67B | Publishing child pornography or predating children online | First: 5 years + ₹10 lakhs Second: 7 years + ₹10 lakhs |
🔴 Real Case Studies under IT Act
Case 1: Identity Theft (Section 66C)
Incident: A person created fake Facebook profile using someone else’s photos and posted objectionable content.
Action: FIR filed under Section 66C and 66D of IT Act.
Punishment: 2 years imprisonment + ₹50,000 fine
Case 2: Cyber Stalking (Section 66E)
Incident: Person sent repeated threatening messages and published private photos without consent.
Action: Case filed under Section 66E and Section 507 IPC.
Punishment: 3 years imprisonment + ₹1 lakh fine
Case 3: Hacking (Section 66)
Incident: Hacker gained unauthorized access to company’s database and stole customer information.
Action: Charged under Section 66 and Section 43 of IT Act.
Punishment: 3 years imprisonment + ₹3 lakh fine + Compensation to company
🆕 Recent Amendments & Updates (2021-2023)
- Information Technology (Intermediary Guidelines) Rules, 2021
- Social media platforms must appoint compliance officers
- Grievance redressal mechanism within 24 hours
- Traceability of first originator of message
- Content moderation and removal of illegal content
- Personal Data Protection Bill, 2023
- Consent required for data collection
- Right to be forgotten
- Data localization requirements
- Heavy penalties for data breaches
👩 Gender Issues in Computer Education
Definition: Challenges and barriers faced by girls and women in accessing, learning, and using computer technology.
⚠️ Common Gender Issues (Important for Exam! ⭐⭐)
- Preconceived Notions: Stereotypes like “boys are better at technical subjects” and “girls are better at humanities” discourage girls from pursuing computer science
- Lack of Interest: Girls often don’t see computer science as a “suitable” career option due to social conditioning
- Lack of Motivation: Fewer opportunities and encouragement compared to boys reduce motivation levels
- Lack of Role Models: Very few female computer scientists and tech leaders for girls to look up to
- Lack of Encouragement in Class: Teachers may unconsciously give more attention to boys in computer labs
- Not Girl-Friendly Work Culture: Tech industry often perceived as male-dominated with unfriendly work environment
- Safety Concerns: Parents worry about girls working late hours in IT companies
- Career Break Challenges: Difficulty in returning to tech careers after maternity or family responsibilities
✅ Solutions to Gender Issues (Very Important! ⭐⭐⭐)
- Initiative Programs for Girls:
- Organize special computer workshops for girls
- Scholarship programs for girls in computer science
- Girls-only coding bootcamps and hackathons
- Fair Media Representation:
- Show more female role models in tech on TV and movies
- Highlight success stories of women in technology
- Censor board should ensure balanced gender representation
- Better Classroom Support:
- Teachers should give equal attention to all students
- More help and assistance in practical labs for girls
- Create safe and comfortable learning environment
- Awareness Campaigns:
- Break gender stereotypes through education
- Parents counseling about career opportunities
- School seminars by successful women in tech
- Flexible Policies:
- Work-from-home options in IT industry
- Maternity-friendly policies
- Career restart programs for women
🌟 Success Stories – Indian Women in Tech
- Roshni Nadar Malhotra – Chairperson of HCL Technologies
- Falguni Nayar – Founder of Nykaa (Tech-driven beauty platform)
- Debjani Ghosh – President of NASSCOM
- Kiran Mazumdar-Shaw – Biocon (Uses advanced tech in biotechnology)
These role models prove that women can excel in technology!
♿ Disability Issues in Computer Education
Definition: Challenges faced by differently-abled students (physical, visual, hearing, learning disabilities) in accessing and using computer technology.
⚠️ Common Disability Issues (Important for Exam! ⭐⭐)
- Unavailability of Teaching Materials/Aids:
- Lack of Braille keyboards for visually impaired
- No screen readers or text-to-speech software
- Missing subtitles in video tutorials for hearing impaired
- Inadequate adaptive hardware devices
- Lack of Special Needs Teachers:
- Regular teachers not trained to teach differently-abled students
- Shortage of specialized educators in computer science
- No sign language interpreters in computer labs
- Lack of Supporting Curriculum:
- Curriculum not designed with accessibility in mind
- Exams not adapted for different disabilities
- Practical assignments not modified for special needs
- Infrastructure Barriers:
- Computer labs not wheelchair accessible
- Furniture not adjustable for different needs
- Poor lighting for visually impaired students
✅ Solutions to Disability Issues (Very Important! ⭐⭐⭐)
- Prepare Adequate Teaching Aids:
- For Visually Impaired: Braille keyboards, screen readers (JAWS, NVDA), text-to-speech software, audio books
- For Hearing Impaired: Sign language interpreters, subtitled videos, visual alerts instead of sounds
- For Physically Disabled: Ergonomic keyboards, voice recognition software, adjustable furniture, trackball mice
- For Learning Disabilities: Extra time, simplified instructions, one-on-one support
- Employ Special Needs Teachers:
- Hire teachers trained in special education
- Provide regular training to existing teachers
- Employ assistants for one-on-one support
- Conduct workshops on inclusive teaching
- Design Inclusive Curriculum:
- Curriculum should accommodate all learning styles
- Provide alternative assessment methods
- Allow extra time in exams
- Offer practical alternatives (oral tests, projects)
- Use Assistive Technology:
- Screen Readers: JAWS, NVDA for reading screen content
- Speech Recognition: Dragon NaturallySpeaking, Windows Speech Recognition
- Screen Magnifiers: ZoomText for visually impaired
- Alternative Input Devices: Head pointers, eye-tracking systems
- Infrastructure Improvements:
- Wheelchair-accessible computer labs
- Adjustable height tables
- Proper lighting and ventilation
- Separate quiet spaces for students with autism
🇮🇳 Government Initiatives in India
- Rights of Persons with Disabilities Act, 2016 – Guarantees right to education and accessibility
- Accessible India Campaign (Sugamya Bharat Abhiyan) – Making public spaces and transport accessible
- UDID (Unique Disability ID) – Single document for all benefits
- National Policy for Persons with Disabilities – Focus on education and skill development
- ADIP Scheme – Provides assistive devices to differently-abled persons
📝 1 Mark Questions (Very Short Answer)
Q1. What is cyber safety?
Answer: Cyber safety refers to the safe and responsible use of the internet to ensure the safety and security of personal information.
Q2. Define identity theft.
Answer: Identity theft is a type of fraud that involves using someone else’s identity (name, personal information) to steal money or gain other benefits.
Q3. What is e-waste?
Answer: E-waste (Electronic Waste) refers to discarded electrical or electronic devices that are no longer functional or needed.
Q4. When was IT Act passed in India?
Answer: The Information Technology Act was passed on 17th October 2000.
Q5. What is cyber stalking?
Answer: Cyber stalking is a form of online harassment where the victim is exposed to repeated unwanted online messages, emails, or social media interactions.
Q6. Define malware.
Answer: Malware (Malicious Software) is any program or file that is harmful to a computer user, including viruses, trojans, spyware, and adware.
Q7. What is a computer virus?
Answer: A computer virus is malicious code that attaches to files and spreads from one computer to another, altering the way a computer operates.
Q8. What is cyber bullying?
Answer: Cyber bullying is harassing, demeaning, or intimidating someone using modern technologies like internet, cell phones, or social networks.
Q9. What is a digital footprint?
Answer: A digital footprint is a trail of data you create while using the internet, including websites visited, emails sent, and information shared.
Q10. What is adware?
Answer: Adware is software that generates revenue by automatically displaying unwanted online advertisements to users.
📝 2 Marks Questions (Short Answer)
Q1. Differentiate between virus and trojan horse.
Answer:
- Virus: Attaches to files, needs host program, requires user action to spread, replicates itself
- Trojan: Appears harmless, doesn’t need host, doesn’t replicate, creates backdoors for hackers
Q2. List any four social networking sites.
Answer:
- Facebook – Social networking
- Twitter (X) – Microblogging
- Instagram – Photo/video sharing
- LinkedIn – Professional networking
Q3. What are the two types of digital footprints?
Answer:
- Active Digital Footprint: Information deliberately shared by user (posts, comments, uploads)
- Passive Digital Footprint: Information collected without user’s knowledge (cookies, IP tracking, browsing history)
Q4. Write any four ways to dispose e-waste properly.
Answer:
- Return to electronic companies through take-back programs
- Visit e-waste collection centers in your city
- Donate working devices to schools or NGOs
- Give to certified e-waste recyclers
Q5. What are gender issues in computer education?
Answer: Gender issues include:
- Preconceived notions that boys are better at technical subjects
- Lack of female role models in technology
- Insufficient encouragement for girls in computer classes
- Not girl-friendly work culture in IT industry
Q6. List four types of malware.
Answer:
- Virus – Attaches to files and spreads
- Trojan – Appears harmless but steals data
- Adware – Shows unwanted advertisements
- Ransomware – Locks files and demands money
Q7. What are cyber trolls?
Answer: Cyber trolls are derogatory, offensive, or provocative messages/comments posted online to harass or provoke people. They are posted intentionally to disturb or upset individuals or groups on social media or online forums.
Q8. Write four tips for safe web browsing.
Answer:
- Use antivirus software and firewall
- Create strong passwords
- Don’t click suspicious links or download unknown files
- Keep software and operating system updated
Q9. What is e-waste management?
Answer: E-waste management is the process of properly handling, disposing, reusing, and recycling electronic waste to minimize environmental damage and recover valuable materials from old devices.
Q10. Name two assistive technologies for disabled students.
Answer:
- Screen Readers (JAWS, NVDA): For visually impaired students to hear screen content
- Speech Recognition Software: For physically disabled to control computer using voice
📝 3 Marks Questions (Short Answer)
Q1. Explain cyber bullying with an example.
Answer:
Definition: Cyber bullying is harassing, demeaning, embarrassing, defaming, or intimidating someone using modern technologies like internet, cell phones, instant messengers, or social networks.
Forms of Cyber Bullying:
- Sending mean or threatening messages
- Spreading false rumors online
- Posting embarrassing photos or videos
- Creating fake profiles to harass someone
Example: A student continuously receives hateful messages on WhatsApp from classmates, who also post embarrassing photos of the student on Instagram without consent. This causes emotional distress and affects the student’s mental health and academic performance.
Q2. Write six practices to ensure confidentiality of information.
Answer:
- Use Firewall: Install and enable firewall protection
- Control Browser Settings: Block tracking cookies
- Browse Privately: Use incognito mode for sensitive activities
- Be Careful with Posts: Don’t share personal information publicly
- Ensure Safe Sites: Check for HTTPS and padlock icon
- Handle Emails Carefully: Don’t open suspicious attachments
Q3. What is IT Act 2000? Write its importance.
Answer:
IT Act 2000: The Information Technology Act, 2000 is India’s primary law dealing with cybercrime and electronic commerce, notified on 17th October 2000.
Importance:
- Provides legal recognition to electronic transactions
- Facilitates e-commerce and e-governance
- Prevents computer-based crimes and cybercrimes
- Penalizes cyber criminals and violators
- Regulates digital signatures and certification authorities
- Protects citizens from online frauds and harassment
Q4. Explain malware and its types.
Answer:
Malware: Malware (Malicious Software) is any harmful program designed to damage computers, steal data, or disrupt operations.
Types of Malware:
- Virus: Attaches to files, replicates, spreads to other computers
- Trojan: Appears harmless, creates backdoors, steals information
- Adware: Displays unwanted advertisements, slows system
- Spyware: Secretly monitors user activity, collects personal data
- Ransomware: Encrypts files, demands money to unlock them
- Worm: Self-replicates, spreads across networks without user action
Q5. How can we handle gender issues in computer education?
Answer:
Solutions to Gender Issues:
- Initiative Programs: Organize special computer workshops and scholarships for girls
- Fair Media Representation: Show more female role models in tech on TV and movies
- Classroom Support: Teachers should give equal attention and assistance to all students
- Awareness Campaigns: Break gender stereotypes through education and counseling
- Mentorship Programs: Connect girl students with successful women in technology
- Safe Environment: Create comfortable and encouraging learning spaces for girls
📝 5 Marks Questions (Long Answer)
Q1. Explain e-waste management in detail with disposal methods.
Answer:
E-Waste: Electronic waste refers to discarded electrical or electronic devices that are no longer functional, needed, or have become obsolete due to technological advancements.
Why E-Waste Management is Important:
- Contains toxic materials (lead, mercury, cadmium) harmful to health
- Pollutes soil and water if not disposed properly
- Valuable materials can be recovered and recycled
- Growing rapidly – India generates 3.2 million tonnes annually
E-Waste Disposal Methods:
- Return to Manufacturers: Many companies (Apple, Samsung, Dell) have take-back programs where old devices can be returned
- E-Waste Collection Centers: Drop off e-waste at authorized collection centers established by municipal corporations
- Civic Institutions: Participate in e-waste collection drives organized by government bodies
- Donation: Donate working but outdated devices to schools, NGOs, or underprivileged communities
- Sell/Exchange: Sell old devices to second-hand dealers or use exchange offers when buying new devices
- Certified Recyclers: Hand over broken devices to government-approved e-waste recycling facilities
- Proper Dismantling: Professional recyclers safely extract valuable materials and dispose toxic substances properly
3R Principle:
- Reduce: Buy only necessary devices, use for longer duration
- Reuse: Repurpose old devices for different uses
- Recycle: Give broken devices to authorized recyclers
Q2. What is cyber crime? Explain different types of cyber crimes.
Answer:
Cyber Crime: Any criminal offense that is facilitated by or involves the use of electronic communications or information systems, including computers, mobile devices, or the internet.
Types of Cyber Crimes:
1. Identity Theft:
- Stealing personal information (name, passwords, credit card details)
- Using someone else’s identity for financial gain or fraud
- Example: Creating fake accounts using others’ information
2. Hacking:
- Unauthorized access to computer systems or networks
- Stealing data, passwords, or confidential information
- Example: Breaking into company databases
3. Cyber Stalking:
- Repeatedly harassing someone online
- Sending unwanted messages, threats, or following online activities
- Example: Continuous threatening messages on social media
4. Cyber Bullying:
- Harassing, embarrassing, or defaming someone using technology
- Spreading rumors, posting embarrassing content
- Example: Creating fake profiles to insult someone
5. Phishing:
- Fraudulent attempts to obtain sensitive information
- Fake emails/websites pretending to be legitimate organizations
- Example: Fake bank emails asking for passwords
6. Ransomware Attacks:
- Encrypting victim’s files and demanding money
- System becomes unusable until ransom is paid
- Example: WannaCry ransomware attack
7. Online Financial Fraud:
- Credit/debit card fraud, online shopping scams
- Fake lottery winnings, investment schemes
- Example: Fake website stealing banking details
8. Cyber Terrorism:
- Using internet to threaten national security
- Hacking critical infrastructure, spreading propaganda
- Most serious form punishable with life imprisonment
Q3. Write in detail about IT Act 2000 and its important sections.
Answer:
Information Technology Act, 2000:
The IT Act is India’s primary law dealing with cybercrime and electronic commerce, notified on 17th October 2000 and amended in 2008.
Objectives:
- Legal recognition to electronic transactions and digital signatures
- Facilitate e-commerce and e-governance
- Prevent computer-based crimes
- Penalize cyber criminals
Important Sections:
Section 43: Penalty for damage to computer systems
- Unauthorized access, data theft, virus introduction
- Compensation up to ₹1 crore
Section 66: Computer hacking
- Unauthorized access with intent to commit crime
- Punishment: Up to 3 years + ₹5 lakh fine
Section 66C: Identity theft
- Using another person’s password/digital signature fraudulently
- Punishment: Up to 3 years + ₹1 lakh fine
Section 66D: Cheating by personation
- Using computer to impersonate and cheat
- Punishment: Up to 3 years + ₹1 lakh fine
Section 66E: Violation of privacy
- Publishing private images without consent
- Punishment: Up to 3 years + ₹2 lakh fine
Section 66F: Cyber terrorism
- Threatening security or unity of India
- Punishment: Up to life imprisonment
Section 67: Publishing obscene material
- First conviction: 3 years + ₹5 lakh
- Second conviction: 5 years + ₹10 lakh
Section 67B: Child pornography
- Publishing/predating children online
- Punishment: Up to 5-7 years + ₹10 lakh fine
Q4. Explain various disability issues in computer education with solutions.
Answer:
Disability Issues:
1. Unavailability of Teaching Materials/Aids:
- No Braille keyboards for visually impaired
- Missing screen readers and text-to-speech software
- No subtitles in videos for hearing impaired
- Inadequate adaptive hardware devices
2. Lack of Special Needs Teachers:
- Regular teachers not trained for special education
- Shortage of specialized computer science educators
- No sign language interpreters available
3. Lack of Supporting Curriculum:
- Curriculum not designed with accessibility in mind
- Exams not adapted for different disabilities
- Practical assignments not modified
4. Infrastructure Barriers:
- Labs not wheelchair accessible
- Furniture not adjustable
- Poor lighting and ventilation
Solutions:
1. Prepare Adequate Teaching Aids:
- Visual Impairment: Braille keyboards, screen readers (JAWS, NVDA), audio books, text-to-speech
- Hearing Impairment: Sign language interpreters, subtitled videos, visual alerts
- Physical Disability: Voice recognition, ergonomic keyboards, trackball mice, adjustable furniture
- Learning Disabilities: Extra time, simplified instructions, one-on-one support
2. Employ Special Needs Teachers:
- Hire trained special education teachers
- Provide training to existing teachers
- Employ teaching assistants
- Conduct workshops on inclusive teaching
3. Design Inclusive Curriculum:
- Accommodate all learning styles
- Provide alternative assessment methods
- Allow extra time in exams
- Offer practical alternatives (oral tests, projects)
4. Infrastructure Improvements:
- Make labs wheelchair accessible
- Install adjustable height tables
- Ensure proper lighting
- Create quiet spaces for students with autism
5. Use Assistive Technology:
- Screen readers and magnifiers
- Speech recognition software
- Alternative input devices
- Specialized software for different needs
Q5. What is identity protection? Write measures to protect identity online.
Answer:
Identity Protection: Protection against theft of personal information over cyberspace without consent, usually for financial gain or fraudulent purposes.
Identity Theft: Using someone else’s personal information (name, passwords, credit card details) to commit fraud, steal money, or impersonate online.
Measures to Protect Identity Online:
1. Use Strong Passwords:
- Combination of uppercase, lowercase, numbers, special characters
- Minimum 8-12 characters long
- Different passwords for different accounts
- Change passwords regularly
- Use password manager apps
2. Enable Two-Factor Authentication (2FA):
- Add extra security layer beyond password
- Use OTP, biometric, or authentication apps
- Enable on email, banking, social media accounts
3. Be Careful with Personal Information:
- Don’t share Aadhaar, PAN, credit card details publicly
- Avoid posting birthdates, addresses on social media
- Check privacy settings on all platforms
- Don’t overshare personal details online
4. Secure Internet Connection:
- Use firewall and antivirus software
- Avoid public WiFi for banking/sensitive activities
- Use VPN when on public networks
- Enable WPA2/WPA3 encryption on home WiFi
5. Safe Browsing Practices:
- Check for HTTPS and padlock icon
- Don’t click suspicious links in emails
- Verify website authenticity before entering details
- Use private/incognito mode for sensitive activities
6. Monitor Your Accounts:
- Regularly check bank statements
- Review credit card transactions
- Set up alerts for account activities
- Report suspicious activities immediately
7. Be Cautious with Emails:
- Don’t open attachments from unknown senders
- Be wary of urgent/threatening emails
- Banks never ask for passwords via email
- Verify sender’s email address carefully
8. Use Security Software:
- Install reputed antivirus and anti-malware
- Keep security software updated
- Enable firewall protection
- Scan devices regularly
9. Regular Backups:
- Keep backup of important documents
- Store on external drives or cloud
- Encrypt sensitive backups
10. Educate Yourself:
- Stay updated about new scams
- Learn about phishing techniques
- Understand latest security threats
- Follow cybersecurity best practices
📌 Must Remember Definitions (1 Mark Each)
- Cyber Safety: Safe and responsible internet use
- Identity Theft: Stealing someone’s personal information for fraud
- Cyber Crime: Criminal offense using computers/internet
- Cyber Trolls: Derogatory messages targeting people online
- Cyber Bullying: Harassing someone using technology
- Cyber Stalking: Repeated online harassment
- Digital Footprint: Trail of data created online
- Malware: Harmful software (virus, trojan, adware, etc.)
- Virus: Malicious code that attaches to files and spreads
- Trojan: Appears harmless but performs malicious activities
- Adware: Software that displays unwanted ads
- E-Waste: Discarded electronic devices
- E-Waste Management: Proper disposal, reusing, recycling
- IT Act 2000: India’s primary cybercrime law
⭐ Most Important for Exam
- ✅ 8 Practices to ensure confidentiality (Section 1)
- ✅ Types of malware comparison table (Section 2)
- ✅ 7 Ways to dispose e-waste (Section 3)
- ✅ Important sections of IT Act with punishments (Section 4)
- ✅ Gender issues and solutions (Section 5)
- ✅ Disability issues and solutions (Section 5)
- ✅ Tips for safe web browsing (Section 1)
- ✅ Social networking sites list (Section 1)
🎓 Exam Strategy Tips
- For 1 Mark: Write definition + one line explanation
- For 2 Marks: Definition + 2-3 points or examples
- For 3 Marks: Definition + 4-6 points with brief explanation
- For 5 Marks: Detailed explanation + examples + diagrams/tables if possible
- Use Points: Always write in numbered/bulleted points for better presentation
- Underline Keywords: Highlight important terms
- Give Examples: Real-world examples earn extra marks
- Draw Tables: For comparison questions (like malware types)
⚠️ Common Mistakes to Avoid
- ❌ Don’t confuse virus with trojan
- ❌ Don’t forget to mention IT Act year (2000) and amendment (2008)
- ❌ Don’t write only theory – include practical examples
- ❌ Don’t skip learning section numbers of IT Act
- ❌ Don’t give vague answers – be specific with points
- ❌ Don’t write long paragraphs – use bullet points
- ❌ Don’t forget to mention punishments in IT Act questions
Save these notes for offline study!
📚 Related Resources
💬 Found These Notes Helpful?
Share with your classmates and help them prepare better!
For doubts and queries, comment below or email us at: [email protected]
Last Updated: February 2026 | Created by: Jitendra Singh (CBSE Computer Science Teacher & Examiner)
© 2020-2026 CBSEPython.in – All Rights Reserved
⭐ Rate These Notes:
★★★★★ (4.8/5 from 2,847 students)
Comments are closed.