StudenteCare mission is to give people the power to build educational community and bring the Educators, Students, Parents, Consultant, University, Colleges, Schools and Coachings closer together
Ncert Solution | Ncert Solution for class 9th | NCERT solution for Class 9 Foundation of Information Technology | NCERT FOUNDATION OF INFORMATION TECHNOLOGY CHAPTER 12 SOCIAL IMPACTS OF IT
by   Pooja Singla
Files Overall Price:    0.00
Videos Overall Price:    0.00
Total Overall Price:    0
Sold By:    Pooja Singla


Description Above File

NCERT Solutions for Class 9 Foundation of Information Technology – Social Impacts of IT

NCERT Solutions for Class 9 Foundation of Information Technology – Social Impacts of IT are prepared by CBSE student eCARE expert to score good marks in class 9. This chapter contain many topics which are very important to score good in class 9. There are some important topic mentioned below:

The following are important jobs in IT:

  1. Computer Programmer A computer programmer is a person, who codes various computer programs for users, so that they can perform desired tasks on computer.
  2. Software Engineer A software engineer is a person, who is responsible for designing and programming a large scale system software and application software.
  3. System Analyst A system analyst is responsible for researching, planning and recommending software and systems choices to meet an organisation’s business requirements.
  4. System Administrator (SA) A system administrator is responsible for managing, overseeing and maintaining a multiuser computing environment, such as a Local Area Network (LAN).
  5. Maintenance Technicians A maintenance technician mainly deals with computer hardware.
  6. Web Master A Web master manages the implementation and administration of a Website.
  7. Network Administrator A network administrator manages the LAN of an organisation.
  8. Network Security Analyst A network security analyst ensures their company’s information systems and computer networks are secure.
  9. Database Administrator (DBA) A DBA is a person who manages the database of an organisation.
  10. Database Analyst A database analyst designs and develops the information flow model and database architecture.
  11. Help Desk Executive A help desk executive is a resource intended to provide the customer or end user with information and support related to a company’s or institution’s products and services.
  12. Information Systems Managers These are responsible for the implementation of technology with in an organisation and direct the work of systems and business analysts, developers, support specialists and other computer-related workers.
  13. Internet Engineer/Internet working Engineer An Internet engineer works with a company’s current information system, assesses its growing needs and designs and implements new software and applications that will help the company move forward in its market.
  14. Technical Writer A Technical writer is responsible for authoring hardware and software documentation either for an organisation’s internal computer systems or for third party vendors.



Description Below File

Some questions are asked by class 9 students related to Foundation of Information Technology

Question 1:
An extended synonym for Information Technology is ICT. So, how ICT differs from IT?
Answer:
Differences between IT and ICT are as follows:

IT ICT
IT refers to an entire industry that uses computers, networking, software and other equipment to manage information. ICT can be seen as an integration of IT with media broadcasting technologies, audio/video processing and transmission and telephony.
IT is a term widely used in the industry. ICT is widely used in the context of education.

Question 2:
List down some common usage of Information Technology.
Answer:
Common usage of IT includes information storage, data processing and statistical analysis, Word processing, accounting and financial forecasting, management information systems, communication, designing and the control and automation of manufacturing processes, computer programmers, computer sales etc.

Question 3:
IT security today has become a major point of concern. What comes under IT security?
Answer:
IT security is a term which is more concerned with the protection of hardware, software and a network of an organisation, from the perils of disaster and external attacks through virus, hacking etc.

 

Question 4:
List the guidelines to avoid plagiarism.
Answer:
Follow the below given guidelines to avoid plagiarism:

  1. To avoid plagiarism, instead of copying the language of the book as it is, try to put it in your own language/words.
  2. One should have a clear understanding of plagiarism and its consequences, so that no one can perform it unintentionally.
  3. If copying someone else’s work in our task, word for word, then do not forget enclosing it in quotes and also mention its source.
  4. Another way is to credit the author has write which was useful for your task and not taking credit for it yourself.

Question 5:
Today people are less aware about software ethics and because of this unintentionally they are getting involved in illegal activities. Elaborate the term software ethics.
Answer:
Software enables us to accomplish many different tasks with computers. Unfortunately, for various reasons, some people justify making and using unauthorised copies of software. Software ethics refers to ensuring that the software being used is not pirated or unauthorised. This also includes that the software developers should be given a fair return for their work.

Question 6:
The individual’s right to privacy deals mainly with information. What are the other things covered under this right?
Answer:
The right to privacy involves the decisions pertaining to questions like what information about one’s self or one’s associations must a person reveal to others , under what conditions and with what safeguards. What things can people keep to them and not be forced to reveal to others?

 

Question 7:
“Internet can affect the privacy rights of a person.” Comment.
Answer:
A person’s Internet usage and transactions done by him/her online provides a large amounts of information which provides insight into that person’s interests and other vital information about the person.
Hacking or tracking of activities of some person without his/her knowledge have become prominent with the increase usage of Internet. Hence, a person with malicious intent can easily invade in some other person’s privacy online.

Question 8:
Which three laws are formulated in order to stop software piracy?
Answer:
In order to stop software piracy, three types of laws are formulated as follows:

  1. Copyright is an exclusive right of the developer or author, to protect their works which is granted by law.
  2. Patent is the special power of monopoly granted by the law. The work cannot be used or reproduced without obtaining a license from patent holder.
  3. Trademark is the registered word or text/logo depicting the identity of a product, work or company.

Question 9:
Intellectual property right means that the person who produces the information is the only one who can use that information.
Now, explain the need of protecting intellectual property right.
Answer:
The intellectual property rights must be protected because protecting them:

  1. encourages individuals and business to create new software and new software applications, as well as improving existing applications.
  2. ensures new ideas and technologies are widely distributed.
  3. promotes investment in the national economy.

Question 10:
Using copyright, software piracy can be stopped. How?
Answer:
The copyright in the work of authorship immediately becomes the property of the author, who created the work.
Only the author or those deriving their rights through the author, can rightfully claim copyright.