Files Overall Price: | 0.00 | |
Videos Overall Price: | 0.00 | |
Total Overall Price: | 0 | |
Sold By: | Pooja Singla |
NCERT Solutions for Class 9 Foundation of Information Technology – Social Impacts of IT are prepared by CBSE student eCARE expert to score good marks in class 9. This chapter contain many topics which are very important to score good in class 9. There are some important topic mentioned below:
The following are important jobs in IT:
Question 1:
An extended synonym for Information Technology is ICT. So, how ICT differs from IT?
Answer:
Differences between IT and ICT are as follows:
IT | ICT |
IT refers to an entire industry that uses computers, networking, software and other equipment to manage information. | ICT can be seen as an integration of IT with media broadcasting technologies, audio/video processing and transmission and telephony. |
IT is a term widely used in the industry. | ICT is widely used in the context of education. |
Question 2:
List down some common usage of Information Technology.
Answer:
Common usage of IT includes information storage, data processing and statistical analysis, Word processing, accounting and financial forecasting, management information systems, communication, designing and the control and automation of manufacturing processes, computer programmers, computer sales etc.
Question 3:
IT security today has become a major point of concern. What comes under IT security?
Answer:
IT security is a term which is more concerned with the protection of hardware, software and a network of an organisation, from the perils of disaster and external attacks through virus, hacking etc.
Question 4:
List the guidelines to avoid plagiarism.
Answer:
Follow the below given guidelines to avoid plagiarism:
Question 5:
Today people are less aware about software ethics and because of this unintentionally they are getting involved in illegal activities. Elaborate the term software ethics.
Answer:
Software enables us to accomplish many different tasks with computers. Unfortunately, for various reasons, some people justify making and using unauthorised copies of software. Software ethics refers to ensuring that the software being used is not pirated or unauthorised. This also includes that the software developers should be given a fair return for their work.
Question 6:
The individual’s right to privacy deals mainly with information. What are the other things covered under this right?
Answer:
The right to privacy involves the decisions pertaining to questions like what information about one’s self or one’s associations must a person reveal to others , under what conditions and with what safeguards. What things can people keep to them and not be forced to reveal to others?
Question 7:
“Internet can affect the privacy rights of a person.” Comment.
Answer:
A person’s Internet usage and transactions done by him/her online provides a large amounts of information which provides insight into that person’s interests and other vital information about the person.
Hacking or tracking of activities of some person without his/her knowledge have become prominent with the increase usage of Internet. Hence, a person with malicious intent can easily invade in some other person’s privacy online.
Question 8:
Which three laws are formulated in order to stop software piracy?
Answer:
In order to stop software piracy, three types of laws are formulated as follows:
Question 9:
Intellectual property right means that the person who produces the information is the only one who can use that information.
Now, explain the need of protecting intellectual property right.
Answer:
The intellectual property rights must be protected because protecting them:
Question 10:
Using copyright, software piracy can be stopped. How?
Answer:
The copyright in the work of authorship immediately becomes the property of the author, who created the work.
Only the author or those deriving their rights through the author, can rightfully claim copyright.