Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 32

PRACTICAL 1

Introduction to Digital Literacy


To live a full life in the modern world, one must be digitally literate.
According to the Indian National Statistical Office, a digitally literate
person is at least five years old and can navigate the Internet via a
web browser, use e-mail, and find, evaluate, and communicate
information using social media tools.
The office’s statistics show that while over 55 per cent of Indians
have access to broadband, only 20 per cent had the ability to use the
Internet. But the digital divide in India – as elsewhere – exists in
different degrees and extends beyond access to technologies and
infrastructure. Digital inclusion also depends on the ability to use
technologies meaningfully.
One current theory, the Technology Acceptance Model (TAM),
suggests three factors motivate people to accept and adopt any
technology: perceived usefulness; perceived ease of use; and attitude
towards usage.
A 2019 study which focused on the experiences of first-year students
at a private university in Malaysia, found a strong correlation
between digital literacy and perceptions of tech usability.
People’s degrees of digital literacy varied significantly depending on
whether they routinely had access to the Internet. Two distinct yet
related concepts, Internet access and digital literacy, are clearly
worth comparing
The Digital in India 2019 report revealed that 99.9 per cent of
Internet users in the country use a mobile device to access the web.
Age, gender, occupation, geography, caste, and other variables have
also been shown to shape the diffusion of technology in India.
But despite these indicators, existing digital literacy initiatives often
do not distinguish between the usage patterns and specific
conditions of different citizens.

Digital literacy of different age groups:

1. Access to Computers and Internet:


a. Across India, only one in ten households have a computer — whether a
desktop, laptop or tablet.
b. Almost 25% of all homes have Internet facilities, accessed via a fixed or
mobile network using any device, including smartphones.
2. Urban-Rural Divide:
a. Most of the Internet-enabled homes are located in cities, where 42%
have Internet access. In rural India, however, only 15% are connected to
the internet.
2. Access and Utilization Gap:
a. Of course, having Internet access is no guarantee that one can use it.
b. 20% of Indians above the age of 5 years had basic digital literacy,
c. Just 40% in the critical age group of 15 to 29 years, which includes all high
school and college students as well as young parents responsible for
teaching younger children.
3. Disparity due to Economic status:
The biggest divide is by economic status, which the NSO marks by dividing the
population into five equal groups, or quintiles, based on their usual monthly
per capita expenditure.
PRACTICAL 2
PRACTICAL 3
E-Kranti is an ambitious initiative by the Government of India aimed
at delivering government services to citizens electronically. It
encompasses the implementation of various e-governance projects
to enable easier access to government services using digital means.
The goal of E-Kranti is to transform India into a digitally empowered
society and knowledge economy by leveraging information
technology for better governance and service delivery.
The initiative focuses on several key areas:
1. e-Governance: Facilitating government services online to improve
accessibility and efficiency.
2. Electronic Delivery of Services: Ensuring various government
services are available electronically to citizens.
3. Information for All: Making government information available and
accessible digitally.
4. IT for Jobs: Encouraging IT-based employment opportunities
across different sectors.
5. Early Harvest Programmes: Implementing priority projects to
demonstrate quick results in e-governance. E-Kranti aims to bridge
the digital divide and bring about inclusive growth by leveraging
the power of technology to provide better services to all citizens
PRACTICAL 4

FOUR ACHIEVMENT OF DIGITAL INDIA:

1) Digital India has led to less paper usage and wastage which results
in a decline in deforestation.
2) In metropolitan areas the number of people using internet as a
primary means of service has rose to 64%.
3) Digital India has made majority of the government services
available online which leads to task getting done quickly and
efficiently.
4) It also aimed at improving public accountability through mandated
delivery of government’s electronic unique IDs and ePramaan
based on authentic, integrated government application.
PRACTICAL 5
1. Broadband Highways: The first pillar focuses on establishing robust
broadband connectivity across the country, especially in rural and
remote areas. The cornerstone initiatives include the National
Optical Fiber Network (NOFN) and BharatNet, aimed at providing
high-speed internet access to over 250,000 Gram Panchayats and
connecting all remaining Gram Panchayats with broadband services.
2. Universal Access to Mobile Connectivity: This pillar emphasizes
expanding mobile network coverage to ensure comprehensive
accessibility to mobile services throughout the nation. The
government is actively working on improving mobile network
infrastructure and reducing call drops to enhance the quality and
reach of mobile connectivity.
3. Public Internet Access: Efforts under this pillar focus on facilitating
public access to the internet, particularly in rural areas, through
initiatives like establishing Common Service Centers (CSCs) and
promoting the Digital Locker, providing citizens with secure digital
document storage.
4. E-Governance – Reforming Government through Technology:
EGovernance forms a pivotal pillar in Digital India, aiming to deliver
government services online, enhancing efficiency, transparency, and
accessibility. Key initiatives include the MyGov Portal for citizen
engagement and e-Sign for secure digital authentication.
5. e-Kranti - Electronic Delivery of Services: This pillar centers on the
electronic delivery of government services, fostering efficiency and
transparency. The National e-Governance Plan (NeGP) and the
Digital India Internship Scheme are prominent initiatives under this
pillar.
6. Information for All: Digital India ensures the accessibility of
government information to all citizens digitally, promoting
transparency and awareness. Initiatives such as the Open Data
Platform and National Scholarships Portal facilitate access to
government data and scholarship schemes.
7. Electronics Manufacturing – Targeting Net Zero Imports: To reduce
dependence on electronic imports, this pillar focuses on promoting
electronics manufacturing within the country. Initiatives like Make in
India for Electronics and M-SIPS incentivize domestic electronics
production.
8. IT for Jobs: Creating employment opportunities in the IT sector is
the aim of this pillar. It emphasizes skill development through
various programs and initiatives while fostering a conducive
environment for startups through schemes like Startup India.
9. Early Harvest Programmes: The final pillar emphasizes the
implementation of priority projects to showcase quick results in
egovernance and digital transformation. Notable initiatives include
Jeevan Pramaan, a digital life certificate for pensioners, and
UMANG, a unified mobile application for accessing various
government services
PRACTICAL 6
PRACTICAL 5
The first day of college was a mix of emotions – excitement,
nervousness, anticipation, and a sprinkle of anxiety. Stepping
onto the campus grounds, the air humming with enthusiasm,
I felt a surge of mixed feelings. It was a day painted with
myriad expectations and uncertainties, a new chapter waiting
to unfold.
Navigating through the buildings, I was struck by the vibrancy
in the air, the mix of diverse cultures and energy pulsating
around me. The unfamiliar faces seemed both Scaring and
exhiting as I ventured to find my place in this new world. The
class buzzed with voices, echoing a symphony of chatter and
laughter
Among the crowd of new faces, I found comfort in meeting
like-minded individuals who shared my passion for learning.
Engaging in ice-breaking activities and orientation sessions, I
discovered a sense of belonging in this community of budding
scholars.
The professors' words echoed wisdom and knowledge,
igniting sparks of curiosity and fear within me. Their
enthusiasm and dedication were contagious, setting the tone
for an academic journey filled with exploration and
enlightenment. As the day concluded, I walked away with a
emotions. The nervous jitters had dissipated, replaced by a
budding sense of belonging and a hunger to delve deeper
into the vast sea of knowledge awaiting exploration
PRACTICAL 15
WHAT IS DATA BREACH:
A Data breach is an incident where information is stolen or taken
from a system without the knowledge or authorization of the
system’s owner. A small company or large organization may suffer a
data breach. Stolen data may involve sensitive, proprietary, or
confidential information such as credit card numbers, customer data,
trade secrets, or matters of national security.
TYPES OF DATA BREACH
● Ransomware - in a ransomware attack, you suddenly get a
message stating that all data on your phone or computer is now
encrypted, denying you access to your own data. With
ransomware, the perpetrator will tell you that they will turn the
data back over to you and not release it to the public if you pay a
fee
● Phishing - In Phishing hacker lures its target to open a virus
attached mail by sending them lucrative offers of winning a lottery
or cash prize
● Malware - Malware or viruses are sent to people with the goal
of wiping their computer of all data. This can be harmful to any
company, especially those who rely on their data
METHODS OF DATA BREACH:
● Payment card fraud: Payment card data is stolen using physical
skimming devices.
● Loss or theft: Portable drives, laptops, office computers, files,
and other physical properties are lost or stolen.
● Unintended disclosure: Through mistakes or negligence,
sensitive data is expose
HOW DATA BREACH TAKES PLACE
STEP 1: Research
In this step the attacker who has already picked a target conducts a research about the target. The
main aim of this research is to find out the weakness in the target’s system , which attacker can use
to steal the data

STEP 2: Attack
In this step , once the attacker has found the weakness in target's system he/she launches a attack to
gain and exploit targets data . The attacker firstly makes initial contact through messages or email in
order to capture target’s attention.

STEP 3 : Exfiltrate
Once inside the system , the attacker is free to extract data from the company’s network. This data
may be used for either blackmail or cyber propaganda.

HOW TO PREVENT DATA BREACH


● Be mindful of what you share on social media

● Keep changing your password frequently

● Do not open or respond to emails or messages from unfamiliar sender


CASE STUDY ON BLOCKCHAIN TECHNOLOGY
A blockchain is a distributed ledger with growing lists of records (blocks) that
are securely linked together via cryptographic hashes. Each block contains a
cryptographic hash of the previous block, a timestamp, and transaction data
(generally represented as a Merkle tree, where data nodes are represented by
leaves). Since each block contains information about the previous block, they
effectively form a chain (compare linked list data structure), with each
additional block linking to the ones before it. Consequently, blockchain
transactions are irreversible in that, once they are recorded, the data in any
given block cannot be altered retroactively without altering all subsequent
blocks.
Blockchain has the potential to be a disruptive technology across industries,
with varying impacts on finance. While many applications are still at the
exploration stage, there are plenty of examples demonstrating how the
technology could be used. Here you can read case studies gathered by the Tech
Faculty and Deloitte.
There are a range of different ways blockchain technologies can be used to
generate business benefits, such as improved visibility and near real-time
reporting. Some applications are built around the synchronicity of the ledger
and its ability to simplify reconciliation, while others are focused on removing
middleman from systems, reducing cost and bias. A third group, meanwhile,
are dedicated to hosting smart contracts, automating and adding certainty to
contractual arrangements and transactions.
Blockchain is connecting the world to the future of finance. It's one of the
fastest growing and most trusted digital assets company, helping millions
across the globe, from individuals to the largest institutions, get easy and safe
access to digital assets. Blockchain has raised more than $70 million in funding
from leading investors including Lightspeed Venture Partners and Google
Venture
PRACTICAL - 17
PRACTICAL 18
Various laws that helps to decide what is acceptable in cyberspace

1. Information Technology Act, 2000:


 The Information Technology Act, 2000 (IT Act) is the primary legislation governing various
aspects of cyberspace in India. It covers issues related to electronic commerce, digital signatures,
cyber security, data protection, and penalties for cybercrimes. Sections 43, 66, and 72 of this act
specifically address unauthorized access to computer systems, data breaches, and privacy
violations.

2. The Information Technology (Intermediary Guidelines and Digital Media Ethics


Code) Rules, 2021:
 Introduced in 2021, these rules govern social media platforms, digital news media, and OTT
(over-the-top) streaming services operating in India. They outline guidelines for intermediary
liability, requiring platforms to implement measures for content moderation, grievance redressal,
and compliance with government orders regarding content removal.

3. The Aadhaar (Targeted Delivery of Financial and Other Subsidies,


Benefits and Services) Act, 2016:
 The Aadhaar Act regulates the use and protection of Aadhaar, India's biometric identification
system. It defines the collection, storage, and usage of Aadhaar data and establishes measures to
safeguard individuals' biometric and demographic information.

4. The Right to Information Act, 2005:


 While not exclusively focused on cyberspace, the Right to Information Act enables Indian
citizens to access government information. It promotes transparency and accountability by
allowing individuals to request and obtain information from public authorities. It includes
provisions for accessing digital records and information held by government bodies.

5. The Copyright Act, 1957 (Amended in 2012):


 The Copyright Act protects intellectual property rights, including digital content such as
software, music, videos, and literature. The amendments made in 2012 address digital rights
management, protection against circumvention of technological protection measures, and
penalties for copyright infringement in cyberspace
PRACTICAL – 19

Q19) Danger of cyber behaviour


1. Cyberbullying and Harassment:
 Online platforms can be breeding grounds for cyberbullying, harassment, and online
abuse. Individuals may face persistent harassment, threats, or humiliation through social
media, messaging apps, or online forums. Cyberbullying can have severe emotional and
psychological impacts on victims, leading to stress, anxiety, depression, and in extreme
cases, selfharm or suicide.
2. Privacy and Identity Theft:
 Sharing personal information online poses risks of privacy breaches and identity theft.
Posting sensitive details, such as home addresses, phone numbers, or financial information,
can make individuals vulnerable to cybercriminals. Unauthorized access to personal data can
result in identity theft, financial fraud, or misuse of personal information for malicious
purposes.
3. Online Scams and Fraud:
 The internet is rife with scams and fraudulent activities. Individuals might fall victim to
phishing attacks, fraudulent schemes, or fake websites that trick them into revealing
sensitive information or making financial transactions. Scammers often use deceptive tactics
to steal money, obtain personal details, or infect devices with malware.
4. Exposure to Inappropriate Content:
 The internet contains a vast amount of content, including explicit or inappropriate material
that might not be suitable for all audiences, especially minors. Inadvertently accessing or
being exposed to such content can have negative effects, causing distress, confusion, or
desensitization, particularly among young users
PRACTICAL - 20
In today's digitally connected world, young people are more immersed in online spaces than ever
before. Social media, forums, gaming platforms, and various digital environments offer
unprecedented opportunities for communication, learning, and entertainment. However, alongside
these benefits come significant challenges, particularly concerning the understanding of
consequences associated with online activities. Following are the reasons why young generation
does not realize the effect of their social activity

Lack of Experience and Maturity: One of the primary reasons young people may not fully
understand the consequences of their online activity is their limited life experience and cognitive
maturity..

Digital Literacy Gap: While the younger generation is highly proficient in using technology,
there exists a gap in digital literacy when it comes to understanding the intricacies of online privacy,
security, and permanence of digital footprints.

Influence of Social Norms and Peer Pressure: The influence of social norms and peer
pressure significantly impacts young people's online behavior. Seeking validation and acceptance
among peers often leads individuals to partake in risky

Educational Deficiency: The current education system often lacks comprehensive digital
citizenship and online safety curricula. Many young people are not adequately taught about
responsible online behavior, privacy settings, or the potential legal implications of their actions.

You might also like