CBSE Class 10 Computer Science Societal Impacts Of It Notes

Download CBSE Class 10 Computer Science Societal Impacts Of It Notes in PDF format. All Revision notes for Class 10 Computers have been designed as per the latest syllabus and updated chapters given in your textbook for Computers in Standard 10. Our teachers have designed these concept notes for the benefit of Grade 10 students. You should use these chapter wise notes for revision on daily basis. These study notes can also be used for learning each chapter and its important and difficult topics or revision just before your exams to help you get better scores in upcoming examinations, You can also use Printable notes for Class 10 Computers for faster revision of difficult topics and get higher rank. After reading these notes also refer to MCQ questions for Class 10 Computers given our website

Societal Impacts Of It Class 10 Computers Revision Notes

Class 10 Computers students should refer to the following concepts and notes for Societal Impacts Of It in standard 10. These exam notes for Grade 10 Computers will be very useful for upcoming class tests and examinations and help you to score good marks

Societal Impacts Of It Notes Class 10 Computers

♦ Virus
A computer virus is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions. Attaches itself to program and propagates copies of itself to other programs. A virus cannot spread without a human action (such as running an infected program) i.e. Code Red, Melissa, Zeus...
A worm is a program that spreads copies of itself through a network. The primary difference between a worm and a virus is that a worm operates through networks, and a virus can spread through any medium (but usually uses copied program or data files). Additionally, the worm spreads copies of itself as a stand-alone program, whereas the virus spreads copies of itself as a program that attaches to or embeds in other programs. Worms generally are little programs. i.e. Morris Worm, Storm Worm...
Contains unexpected, additional functionality. Software that you thought was going to be one thing, but turns out to be something bad. Unlike worms and viruses these do not replicate. Named for the fabled “Trojan Horse” that appeared to be a gift but in fact carried a dangerous payload. i.e. CryptoLocker, MyDoom...
 Anti-Virus Software
An antivirus is a software program that is used to detect and remove viruses from computer. Requirements of effective antivirus:
• It needs to run in the background at all times.
• It should be kept updated so that it recognizes new versions of malicious programs.
• Capability to scan email attachments and files as they are downloaded from internet.
Some examples of antivirus software areNorton, Kaspersky, Avast, Microsoft Security Essentials...
♦ Spyware
Software that monitors your computer and reveals collected information to an interested party. Spyware steals information. This can be benign when it tracks what webpages you visit; or it can be incredibly invasive when it monitors everything you do with your mouse and keyboard. i.e. Coolwebsearch, Finfisher...
• Malware
The word Malware is short for malicious software, and is a general term used to describe all of the viruses, worms, spyware, and pretty much anything that is specifically designed to cause harm to your PC or steal your information.
Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising and fraud. It is electronic junk mail. i.e. Receiving a jackpot mail.
 Data Backup and Recovery
Data backup means to make copies of data in a removable, long term storage device. It allows the data to be stored at another location and, when required, an individual file or a set of files can be restored to the computer system. The additional copies are called backups.
Data recovery is a process of retrieving inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way.
Recovery tool: If data is not backed up properly and lost due to any reason, it can be recovered sing recovery software. A few examples of data recovery software are R-Studio Data Recovery, R-Undelete, PC inspector file Recovery...
♦ Online Backups
These are also called as remote backup, refers to copying of data (files, folders, or the entire content of hard disk) to some computer on the Internet for online storage. Google drive is widely used software for online backup now a days, this is also helpful in saving you mobile device data online.
• Data can be restored to any computer that is online (connected to the Internet).
• Data is stored safely at a remote location that is far away from the original data.
• Privacy and security of data are assured with encryption and password protection.
• Hacker and Cracker
Showing computer expertise is called as hacking. A hacker constantly looks for flaws in the computer internet security and their sole aim is to rectify these flaws and improve the security.
Breaching security on software or systems is called as Cracking. The purpose of a cracker is to break the security of computers and networks. 
♦ Information Security provisions in e-commerce
The information security system in E-commerce should meet the following requirements:
Confidentiality − Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission.
Integrity − Information should not be altered during its transmission over the network.
Availability − Information should be available wherever and whenever required within a time limit specified.
Authenticity − There should be a mechanism to authenticate a user before giving him/her an access to the required information.
Non-Reputability − It is the protection against the denial of order or denial of payment. Once a sender sends a message, the sender should not be able to deny sending the message. Similarly, the recipient of message should not be able to deny the receipt.
Encryption − Information should be encrypted and decrypted only by an authorized user.
♦ Benefits of ICT(Information and Communication Technologies)
Information: It refers to the meaning extracted from the data provided.
Communication: It refers to how the information is verified, distributed and kept secured.
Technology: It refers to the formats and tools used to gather, store and communicate information.
ICT is beneficial in various areas like.
 Education: Teaching and learning using a computer and internet and CD-ROM. Advantages of education through ICT are:
o Complex topics can be easily explained to students.
• 3D Images can be used in teaching which improves the knowledge retention of students.
 Practical demo can be given on any topic.
• Healthcare: Plays an important role in improving the health of individuals. It is used by the government to;
 To promote medical education and training.
 Provide medical assistance during disasters and emergency.
 Share research work.
♦ Governance: Used to achieve efficiency, transparency and citizens participation. It helps citizen in following ways:
 Enables them to pay bills and taxes online.
• Maintains transparency in the system.
 Virtual School: Provides provision of educational facilities on the internet. It has the following features:
 It is available 24x7.
 Quick evaluation by the teachers.
 Parents can access the grades, assignments and other information.
♦ Impact of ICT on Society
The impact of ICT on society is great. As more and more people begin to work from home or jobs become deskilled, computer based, the social implication are going to be very serious.
 Knowledge Based Society: It refers to societies that are well education, and who therefore rely on the knowledge of there citizens to drive the innovation , entrepreneurship and dynamism of that society economy.
 Infomania: It is a condition of reduced concentration caused by a continuously responding to electronic communications such as e-mails and sms.
• Digital Unity: Providing the same opportunities to all sections of peoples to access information technology and the knowledge to use it.
 Digital Divide: The gap between people who have access to modern information technology, such as mobile phones, computer, and the internet, and the knowledge to use them, and people who do not have access and the knowledge to use them.



Click for more Computers Study Material

Latest NCERT & CBSE News

Read the latest news and announcements from NCERT and CBSE below. Important updates relating to your studies which will help you to keep yourself updated with latest happenings in school level education. Keep yourself updated with all latest news and also read articles from teachers which will help you to improve your studies, increase motivation level and promote faster learning

CBSE Class 10 Revised Syllabus

Last year CBSE had to reduce the syllabus because of the pandemic situation but it was not very effective because there were no examinations. This year to avoid any confusion and conflict, CBSE has decided to reduce the syllabus into term 1 and term 2. 50 percent of...

CBSE OMR Sheet Guidelines for Term 1

You are aware that the CBSE will be using OMR for the first time for assessment of both the Classes-X and XII in Term-I examinations. Hence, there is a need that all the students appearing in the Term-l examinations and the schools sponsoring these students should have...

CBSE Reading Challenge

The acquisition of 21st century competencies of communication, critical and creative thinking and the ability to locate, understand and reflect on various kinds of information has become more crucial for our learners. It is well accepted that Reading Literacy is not...

Studies Today