Page 125 - IPP-12-2025
P. 125

56. What are Digital Footprints?
                Ans.  Digital  footprints  are  the  trail  of  data  we  leave  behind  when  we  visit  any  website  or  use  any  online
                    application or portal to fill in data or perform any transaction.
                 57. Explain Phishing.
                Ans.  Phishing  is  the  fraudulent  attempt  to  obtain  sensitive  information  such  as  usernames,  passwords  and
                    credit  card  details,  often  for  malicious  reasons,  by  disguising  as  a  trustworthy  entity  in  an  electronic
                    communication. Phishing is typically carried out by email spoofing or instant messaging. It often directs
                    users  to  enter  personal  information  at  a  fake  website,  the  look  and  feel  of  which  is  identical  to  the
                    legitimate one, the only difference being the URL of the website in question.
                 58. What is Identity Theft?
                Ans.  Identity theft involves obtaining personal or financial information of another person and using their identity
                    to commit a fraud, such as making unauthorised transactions or purchases. Identity theft is committed in
                    many different ways and its victims suffer damage to their reputation as well as financial loss.
                 59. What is Cyber Stalking?
                Ans.  Cyber  stalking  is  defined  as  an  unlawful  act  of  harassing  a  person  or  collecting  an  individual’s  personal
                    information using electronic network.
                 60. What is the importance of Cyber Laws?
                Ans.  Communication  technology  uses  several  means  of  transferring  textual  messages,  pictures,  etc.,  via
                    internet.  Each  time  there  may  be  a  number  of  threats  on  either  the  sender’s  or  the  receiver’s  side
                    which create a bridge between networking communication. To sort out these problems, cyber laws exist
                    that cover almost all aspects of transactions and activities on the internet. Cyber laws are used to protect
                    people from online frauds.
                 61. Differentiate between lists and series.
                Ans. In Python, both lists and series are used to store sequences of data but there are some key differences
                    between them:
                    Lists: lists are basic built-in data structures in Python, used to store an ordered sequence of elements. They
                    can store elements of different data types, including other lists.
                    Lists are mutable, meaning you can add, remove or change elements in a list.
                    Series: series is a one-dimensional labelled array in the Pandas library, used for data analysis. Series have
                    an index associated with each element, which allows for more efficient indexing and data alignment. Series
                    can store elements of only one data type, whereas lists can store elements of different data types. Series
                    have built-in methods for handling missing data and performing data operations that are more convenient
                    and efficient than what is available in lists.
                 62. Expand the following:
                     (a)  CSV                (b)  SQL                (c)  DBMS               (d)  RDBMS
                     (e)  DDL                 (f)  DML               (g)  DCL                (h)  TCL
                      (i)  DQL                (j)  ARPANET           (k)  NSFNET              (l)  ISP
                    (m) POP                  (n) NAPs                (o) Wi-Fi               (p) www
                     (q) URL                  (r) VoIP                (s) IPR                 (t) FOSS
                Ans.  (a)  Comma Separated Values               (b) Structured Query Language
                     (c) Database Management System             (d) Relational Database Management System
                     (e) Data Definition Language               (f) Data Manipulation Language
                     (g) Data Control Language                  (h) Transaction Control Language
                      (i) Data Query Language                   (j) Advanced Research Project Agency Network
                     (k) National Science Foundation Network    (l) Internet Service Provider
                    (m) Point of Presence                       (n) Network Access Points
                     (o) Wireless Fidelity                      (p) World Wide Web
                     (q) Uniform Resource Locator               (r) Voice over Internet Protocol
                     (s) Intellectual Property Rights           (t) Free and Open-Source Software







                                                                                           Viva Voce         V.5
   120   121   122   123   124   125   126