Humanities/Arts Exam  >  Humanities/Arts Notes  >  Computer Science for Class 11  >  NCERT Textbook: Societal Impact

NCERT Textbook: Societal Impact | Computer Science for Class 11 - Humanities/Arts PDF Download

Download, print and study this document offline
Please wait while the PDF view is loading
 Page 1


11.1 Introduct Ion In recent years, the world around us has seen a lot 
of changes due to use of ‘Digital Technologies’. These 
changes have made a dramatic impact on our lives, 
making things more convenient, faster, and easier to 
handle. In the past, a letter would take days to reach, 
and every recipient would get his or her own copy 
and respond separately. Today, one can send and 
receive emails to more than one person at a time. The 
instantaneous nature of electronic communications has 
made us more efficient and productive.
From the banking industry to aviation, industrial 
production to e-commerce, especially with regard to the 
delivery of their goods and services, all are now dependent 
on the use of computers and digital technologies. 
Applications of digital technologies have redefined and 
evolved all spheres of human activities. Today more 
and more people are using digital technologies through 
smartphones, computers, etc., with the help of high 
speed Internet. 
Why did the digital technologies become so 
widespread? The introduction of personal computers 
(PCs) and Internet followed by smartphones has brought 
these technologies to the common man. 
While we reap the benefits of digital technologies, 
these technologies can also be misused. Let’s look at 
the impact of these technologies on our society and the 
best practices that can ensure a productive and safe 
digital environment for us. 
11.2 d Ig Ital Footpr Ints Have you ever searched online for any information? 
Have you ever purchased an online ticket, or responded 
to your friend’s email, or checked the score of a 
“I think computer viruses 
should count as life. I think it 
says something about human 
nature that the only form of 
life we have created so far 
is purely destructive. We’ve 
created life in our own image.” 
– Stephen Hawking
Chapter 11
Societal Impact
In this chapter
 » Introduction
 » Digital Footprint
 » Digital Society and 
Netizen
 » Data Protection
 » Cyber Crime
 » Indian IT Act
 » Impact on Health
Ch 11.indd   229 08-Apr-19   12:31:10 PM
2024-25
Page 2


11.1 Introduct Ion In recent years, the world around us has seen a lot 
of changes due to use of ‘Digital Technologies’. These 
changes have made a dramatic impact on our lives, 
making things more convenient, faster, and easier to 
handle. In the past, a letter would take days to reach, 
and every recipient would get his or her own copy 
and respond separately. Today, one can send and 
receive emails to more than one person at a time. The 
instantaneous nature of electronic communications has 
made us more efficient and productive.
From the banking industry to aviation, industrial 
production to e-commerce, especially with regard to the 
delivery of their goods and services, all are now dependent 
on the use of computers and digital technologies. 
Applications of digital technologies have redefined and 
evolved all spheres of human activities. Today more 
and more people are using digital technologies through 
smartphones, computers, etc., with the help of high 
speed Internet. 
Why did the digital technologies become so 
widespread? The introduction of personal computers 
(PCs) and Internet followed by smartphones has brought 
these technologies to the common man. 
While we reap the benefits of digital technologies, 
these technologies can also be misused. Let’s look at 
the impact of these technologies on our society and the 
best practices that can ensure a productive and safe 
digital environment for us. 
11.2 d Ig Ital Footpr Ints Have you ever searched online for any information? 
Have you ever purchased an online ticket, or responded 
to your friend’s email, or checked the score of a 
“I think computer viruses 
should count as life. I think it 
says something about human 
nature that the only form of 
life we have created so far 
is purely destructive. We’ve 
created life in our own image.” 
– Stephen Hawking
Chapter 11
Societal Impact
In this chapter
 » Introduction
 » Digital Footprint
 » Digital Society and 
Netizen
 » Data Protection
 » Cyber Crime
 » Indian IT Act
 » Impact on Health
Ch 11.indd   229 08-Apr-19   12:31:10 PM
2024-25
Computer SCien Ce – Cla SS xi 230
game online? Whenever we surf the Internet using 
smartphones, tablets, computers, etc., we leave a trail 
of data reflecting the activities performed by us online, 
which is our digital footprint. 
Our digital footprint can be created and used with 
or without our knowledge. It includes websites we visit, 
emails we send, and any information we submit online, 
etc., along with the computer’s IP address, location, and 
other device specific details. Such data could be used 
for targeted advertisement or could also be misused or 
exploited. Thus, it is good to be aware of the data trail we 
might be leaving behind. This awareness should make 
us cautious about what we write, upload or download 
or even browse online.
There are two kinds of digital footprints we 
leave behind. Active digital footprints which 
includes data that we intentionally submit online. 
This would include emails we write, or responses 
or posts we make on different websites or mobile 
Apps, etc. The digital data trail we leave online 
unintentionally is called passive digital footprints. 
This includes the data generated when we visit a 
website, use a mobile App, browse Internet, etc., 
as shown in Figure 11.1. 
Everyone who is connected to the Internet may 
have a digital footprint. With more usage, the trail 
grows. On examining the browser settings, we 
can find out how it stores our browsing history, 
cookies, passwords, auto fills, and many other 
types of data. 
Besides browser, most of our digital footprints 
are stored in servers where the applications are 
hosted. We may not have access to remove or 
erase that data, neither do we have any control 
on how that data will be used. Therefore, once 
a data trail is generated, even if we later try to 
erase data about our online activities, the digital 
footprints still remain. There is no guarantee that 
digital footprints will be fully eliminated from the 
Internet. Therefore, we need to be more cautious 
while being online! All our online activities leave a data 
trace on the Internet as well as on the computing device 
that we use. This can be used to trace the user, his/her 
location, device and other usage details.
Figure 11.1: Exemplar web 
applications that result in digital 
footprints
Can your digital 
footprints be used to 
judge your attitude 
and work ethics?
Think and Reflect
Ch 11.indd   230 08-Apr-19   12:31:59 PM
2024-25
Page 3


11.1 Introduct Ion In recent years, the world around us has seen a lot 
of changes due to use of ‘Digital Technologies’. These 
changes have made a dramatic impact on our lives, 
making things more convenient, faster, and easier to 
handle. In the past, a letter would take days to reach, 
and every recipient would get his or her own copy 
and respond separately. Today, one can send and 
receive emails to more than one person at a time. The 
instantaneous nature of electronic communications has 
made us more efficient and productive.
From the banking industry to aviation, industrial 
production to e-commerce, especially with regard to the 
delivery of their goods and services, all are now dependent 
on the use of computers and digital technologies. 
Applications of digital technologies have redefined and 
evolved all spheres of human activities. Today more 
and more people are using digital technologies through 
smartphones, computers, etc., with the help of high 
speed Internet. 
Why did the digital technologies become so 
widespread? The introduction of personal computers 
(PCs) and Internet followed by smartphones has brought 
these technologies to the common man. 
While we reap the benefits of digital technologies, 
these technologies can also be misused. Let’s look at 
the impact of these technologies on our society and the 
best practices that can ensure a productive and safe 
digital environment for us. 
11.2 d Ig Ital Footpr Ints Have you ever searched online for any information? 
Have you ever purchased an online ticket, or responded 
to your friend’s email, or checked the score of a 
“I think computer viruses 
should count as life. I think it 
says something about human 
nature that the only form of 
life we have created so far 
is purely destructive. We’ve 
created life in our own image.” 
– Stephen Hawking
Chapter 11
Societal Impact
In this chapter
 » Introduction
 » Digital Footprint
 » Digital Society and 
Netizen
 » Data Protection
 » Cyber Crime
 » Indian IT Act
 » Impact on Health
Ch 11.indd   229 08-Apr-19   12:31:10 PM
2024-25
Computer SCien Ce – Cla SS xi 230
game online? Whenever we surf the Internet using 
smartphones, tablets, computers, etc., we leave a trail 
of data reflecting the activities performed by us online, 
which is our digital footprint. 
Our digital footprint can be created and used with 
or without our knowledge. It includes websites we visit, 
emails we send, and any information we submit online, 
etc., along with the computer’s IP address, location, and 
other device specific details. Such data could be used 
for targeted advertisement or could also be misused or 
exploited. Thus, it is good to be aware of the data trail we 
might be leaving behind. This awareness should make 
us cautious about what we write, upload or download 
or even browse online.
There are two kinds of digital footprints we 
leave behind. Active digital footprints which 
includes data that we intentionally submit online. 
This would include emails we write, or responses 
or posts we make on different websites or mobile 
Apps, etc. The digital data trail we leave online 
unintentionally is called passive digital footprints. 
This includes the data generated when we visit a 
website, use a mobile App, browse Internet, etc., 
as shown in Figure 11.1. 
Everyone who is connected to the Internet may 
have a digital footprint. With more usage, the trail 
grows. On examining the browser settings, we 
can find out how it stores our browsing history, 
cookies, passwords, auto fills, and many other 
types of data. 
Besides browser, most of our digital footprints 
are stored in servers where the applications are 
hosted. We may not have access to remove or 
erase that data, neither do we have any control 
on how that data will be used. Therefore, once 
a data trail is generated, even if we later try to 
erase data about our online activities, the digital 
footprints still remain. There is no guarantee that 
digital footprints will be fully eliminated from the 
Internet. Therefore, we need to be more cautious 
while being online! All our online activities leave a data 
trace on the Internet as well as on the computing device 
that we use. This can be used to trace the user, his/her 
location, device and other usage details.
Figure 11.1: Exemplar web 
applications that result in digital 
footprints
Can your digital 
footprints be used to 
judge your attitude 
and work ethics?
Think and Reflect
Ch 11.indd   230 08-Apr-19   12:31:59 PM
2024-25
Societal i mpact 231
11.3 Digital Society an D n etizen As our society is inclined towards using more and 
more digital technologies, we end up managing most 
of our tasks digitally. In this era of digital society, our 
daily activities like communication, social networking, 
banking, shopping, entertainment, education, 
transportation, etc., are increasingly being driven by 
online transactions. 
Digital society thus reflects the growing trend of 
using digital technologies in all spheres of human 
activities. But while online, all of us need to be aware 
of how to conduct ourselves, how best to relate with 
others and what ethics, morals and values to maintain. 
Anyone who uses digital technology along with Internet 
is a digital citizen or a netizen. Being a good netizen 
means practicing safe, ethical and legal use of digital 
technology. A responsible netizen must abide by 
net etiquettes, communication etiquettes and social 
media etiquettes.
11.3.1 Net Etiquettes
We follow certain etiquettes during our social 
interactions. Similarly, we need to exhibit 
proper manners and etiquettes while being 
online as shown in Figure 11.2. One should 
be ethical, respectful and responsible while 
surfing the Internet.
(A) Be Ethical 
• No copyright violation: we should not 
use copyrighted materials without the 
permission of the creator or owner. As 
an ethical digital citizen, we need to be 
careful while streaming audio or video 
or downloading images and files from 
the Internet. We will learn more about 
copyright in Section 11.4.
• Share the expertise: it is good to share information 
and knowledge on Internet so that others can 
access it. However, prior to sharing information, we 
need to be sure that we have sufficient knowledge 
on that topic. The information shared should be 
true and unambiguous. Also, in order to avoid 
Activity 11.1
As a digital citizen, list 
various services that 
you avail online.
Figure 11.2: Net Etiquettes
Ch 11.indd   231 21-May-19   12:42:48 PM
2024-25
Page 4


11.1 Introduct Ion In recent years, the world around us has seen a lot 
of changes due to use of ‘Digital Technologies’. These 
changes have made a dramatic impact on our lives, 
making things more convenient, faster, and easier to 
handle. In the past, a letter would take days to reach, 
and every recipient would get his or her own copy 
and respond separately. Today, one can send and 
receive emails to more than one person at a time. The 
instantaneous nature of electronic communications has 
made us more efficient and productive.
From the banking industry to aviation, industrial 
production to e-commerce, especially with regard to the 
delivery of their goods and services, all are now dependent 
on the use of computers and digital technologies. 
Applications of digital technologies have redefined and 
evolved all spheres of human activities. Today more 
and more people are using digital technologies through 
smartphones, computers, etc., with the help of high 
speed Internet. 
Why did the digital technologies become so 
widespread? The introduction of personal computers 
(PCs) and Internet followed by smartphones has brought 
these technologies to the common man. 
While we reap the benefits of digital technologies, 
these technologies can also be misused. Let’s look at 
the impact of these technologies on our society and the 
best practices that can ensure a productive and safe 
digital environment for us. 
11.2 d Ig Ital Footpr Ints Have you ever searched online for any information? 
Have you ever purchased an online ticket, or responded 
to your friend’s email, or checked the score of a 
“I think computer viruses 
should count as life. I think it 
says something about human 
nature that the only form of 
life we have created so far 
is purely destructive. We’ve 
created life in our own image.” 
– Stephen Hawking
Chapter 11
Societal Impact
In this chapter
 » Introduction
 » Digital Footprint
 » Digital Society and 
Netizen
 » Data Protection
 » Cyber Crime
 » Indian IT Act
 » Impact on Health
Ch 11.indd   229 08-Apr-19   12:31:10 PM
2024-25
Computer SCien Ce – Cla SS xi 230
game online? Whenever we surf the Internet using 
smartphones, tablets, computers, etc., we leave a trail 
of data reflecting the activities performed by us online, 
which is our digital footprint. 
Our digital footprint can be created and used with 
or without our knowledge. It includes websites we visit, 
emails we send, and any information we submit online, 
etc., along with the computer’s IP address, location, and 
other device specific details. Such data could be used 
for targeted advertisement or could also be misused or 
exploited. Thus, it is good to be aware of the data trail we 
might be leaving behind. This awareness should make 
us cautious about what we write, upload or download 
or even browse online.
There are two kinds of digital footprints we 
leave behind. Active digital footprints which 
includes data that we intentionally submit online. 
This would include emails we write, or responses 
or posts we make on different websites or mobile 
Apps, etc. The digital data trail we leave online 
unintentionally is called passive digital footprints. 
This includes the data generated when we visit a 
website, use a mobile App, browse Internet, etc., 
as shown in Figure 11.1. 
Everyone who is connected to the Internet may 
have a digital footprint. With more usage, the trail 
grows. On examining the browser settings, we 
can find out how it stores our browsing history, 
cookies, passwords, auto fills, and many other 
types of data. 
Besides browser, most of our digital footprints 
are stored in servers where the applications are 
hosted. We may not have access to remove or 
erase that data, neither do we have any control 
on how that data will be used. Therefore, once 
a data trail is generated, even if we later try to 
erase data about our online activities, the digital 
footprints still remain. There is no guarantee that 
digital footprints will be fully eliminated from the 
Internet. Therefore, we need to be more cautious 
while being online! All our online activities leave a data 
trace on the Internet as well as on the computing device 
that we use. This can be used to trace the user, his/her 
location, device and other usage details.
Figure 11.1: Exemplar web 
applications that result in digital 
footprints
Can your digital 
footprints be used to 
judge your attitude 
and work ethics?
Think and Reflect
Ch 11.indd   230 08-Apr-19   12:31:59 PM
2024-25
Societal i mpact 231
11.3 Digital Society an D n etizen As our society is inclined towards using more and 
more digital technologies, we end up managing most 
of our tasks digitally. In this era of digital society, our 
daily activities like communication, social networking, 
banking, shopping, entertainment, education, 
transportation, etc., are increasingly being driven by 
online transactions. 
Digital society thus reflects the growing trend of 
using digital technologies in all spheres of human 
activities. But while online, all of us need to be aware 
of how to conduct ourselves, how best to relate with 
others and what ethics, morals and values to maintain. 
Anyone who uses digital technology along with Internet 
is a digital citizen or a netizen. Being a good netizen 
means practicing safe, ethical and legal use of digital 
technology. A responsible netizen must abide by 
net etiquettes, communication etiquettes and social 
media etiquettes.
11.3.1 Net Etiquettes
We follow certain etiquettes during our social 
interactions. Similarly, we need to exhibit 
proper manners and etiquettes while being 
online as shown in Figure 11.2. One should 
be ethical, respectful and responsible while 
surfing the Internet.
(A) Be Ethical 
• No copyright violation: we should not 
use copyrighted materials without the 
permission of the creator or owner. As 
an ethical digital citizen, we need to be 
careful while streaming audio or video 
or downloading images and files from 
the Internet. We will learn more about 
copyright in Section 11.4.
• Share the expertise: it is good to share information 
and knowledge on Internet so that others can 
access it. However, prior to sharing information, we 
need to be sure that we have sufficient knowledge 
on that topic. The information shared should be 
true and unambiguous. Also, in order to avoid 
Activity 11.1
As a digital citizen, list 
various services that 
you avail online.
Figure 11.2: Net Etiquettes
Ch 11.indd   231 21-May-19   12:42:48 PM
2024-25
Computer SCien Ce – Cla SS xi 232
redundant information, we should verify that the 
information is not available already on Internet.
(B) Be Respectful 
• Respect privacy: as good digital citizens we 
have the right to privacy and the freedom of 
personal expression. At the same time, we have 
to understand that other digital citizens also 
have the same rights and freedoms. Our personal 
communication with a digital citizen may include 
images, documents, files, etc., that are private 
to both. We should respect this privacy and 
should not share those images, documents, files, 
etc., with any other digital citizen without each 
others’ consent.
• Respect diversity: in a group or public forum,  
we should respect the diversity of the people 
in terms of knowledge, experience, culture and  
other aspects.
(C) Be Responsible
• Avoid cyber bullying: any insulting, degrading 
or intimidating online behaviour like repeated 
posting of rumours, giving threats online, 
posting the victim’s personal information, sexual 
harassment or comments aimed to publicly 
ridicule a victim is termed as cyber bullying. 
It implies repeatedly targeting someone with 
intentions to hurt or embarrass. Perhaps new or 
non-frequent users of the Internet feel that things 
done online have no effect in the real world. We 
need to realise that bullying online can have very 
serious implications on the other person (victim). 
Also, remember our actions can be traced back 
using our digital footprints. 
• Don’t feed the troll: an Internet troll is a person 
who deliberately sows discord on the Internet by 
starting quarrels or upsetting people, by posting 
inflammatory or off topic messages in an online 
community, just for amusement. Since trolls thrive 
on attention, the best way to discourage trolls is 
not to pay any attention to their comments.
11.3.2 Communication Etiquettes
Digital communication includes email, texting, instant 
messaging, talking on the cell phone, audio or video 
Remember!!
While surfing the Internet, 
we should be cautious 
about our personal and 
confidential data.
 v Think before sharing 
credentials with others 
on an online platform.
 v Keep personal 
information safe and 
protected through 
passwords.
Activity 11.2
Find out how to report 
about an abusive or 
inappropriate post or 
about a sender in a 
social network?
Ch 11.indd   232 08-Apr-19   12:32:00 PM
2024-25
Page 5


11.1 Introduct Ion In recent years, the world around us has seen a lot 
of changes due to use of ‘Digital Technologies’. These 
changes have made a dramatic impact on our lives, 
making things more convenient, faster, and easier to 
handle. In the past, a letter would take days to reach, 
and every recipient would get his or her own copy 
and respond separately. Today, one can send and 
receive emails to more than one person at a time. The 
instantaneous nature of electronic communications has 
made us more efficient and productive.
From the banking industry to aviation, industrial 
production to e-commerce, especially with regard to the 
delivery of their goods and services, all are now dependent 
on the use of computers and digital technologies. 
Applications of digital technologies have redefined and 
evolved all spheres of human activities. Today more 
and more people are using digital technologies through 
smartphones, computers, etc., with the help of high 
speed Internet. 
Why did the digital technologies become so 
widespread? The introduction of personal computers 
(PCs) and Internet followed by smartphones has brought 
these technologies to the common man. 
While we reap the benefits of digital technologies, 
these technologies can also be misused. Let’s look at 
the impact of these technologies on our society and the 
best practices that can ensure a productive and safe 
digital environment for us. 
11.2 d Ig Ital Footpr Ints Have you ever searched online for any information? 
Have you ever purchased an online ticket, or responded 
to your friend’s email, or checked the score of a 
“I think computer viruses 
should count as life. I think it 
says something about human 
nature that the only form of 
life we have created so far 
is purely destructive. We’ve 
created life in our own image.” 
– Stephen Hawking
Chapter 11
Societal Impact
In this chapter
 » Introduction
 » Digital Footprint
 » Digital Society and 
Netizen
 » Data Protection
 » Cyber Crime
 » Indian IT Act
 » Impact on Health
Ch 11.indd   229 08-Apr-19   12:31:10 PM
2024-25
Computer SCien Ce – Cla SS xi 230
game online? Whenever we surf the Internet using 
smartphones, tablets, computers, etc., we leave a trail 
of data reflecting the activities performed by us online, 
which is our digital footprint. 
Our digital footprint can be created and used with 
or without our knowledge. It includes websites we visit, 
emails we send, and any information we submit online, 
etc., along with the computer’s IP address, location, and 
other device specific details. Such data could be used 
for targeted advertisement or could also be misused or 
exploited. Thus, it is good to be aware of the data trail we 
might be leaving behind. This awareness should make 
us cautious about what we write, upload or download 
or even browse online.
There are two kinds of digital footprints we 
leave behind. Active digital footprints which 
includes data that we intentionally submit online. 
This would include emails we write, or responses 
or posts we make on different websites or mobile 
Apps, etc. The digital data trail we leave online 
unintentionally is called passive digital footprints. 
This includes the data generated when we visit a 
website, use a mobile App, browse Internet, etc., 
as shown in Figure 11.1. 
Everyone who is connected to the Internet may 
have a digital footprint. With more usage, the trail 
grows. On examining the browser settings, we 
can find out how it stores our browsing history, 
cookies, passwords, auto fills, and many other 
types of data. 
Besides browser, most of our digital footprints 
are stored in servers where the applications are 
hosted. We may not have access to remove or 
erase that data, neither do we have any control 
on how that data will be used. Therefore, once 
a data trail is generated, even if we later try to 
erase data about our online activities, the digital 
footprints still remain. There is no guarantee that 
digital footprints will be fully eliminated from the 
Internet. Therefore, we need to be more cautious 
while being online! All our online activities leave a data 
trace on the Internet as well as on the computing device 
that we use. This can be used to trace the user, his/her 
location, device and other usage details.
Figure 11.1: Exemplar web 
applications that result in digital 
footprints
Can your digital 
footprints be used to 
judge your attitude 
and work ethics?
Think and Reflect
Ch 11.indd   230 08-Apr-19   12:31:59 PM
2024-25
Societal i mpact 231
11.3 Digital Society an D n etizen As our society is inclined towards using more and 
more digital technologies, we end up managing most 
of our tasks digitally. In this era of digital society, our 
daily activities like communication, social networking, 
banking, shopping, entertainment, education, 
transportation, etc., are increasingly being driven by 
online transactions. 
Digital society thus reflects the growing trend of 
using digital technologies in all spheres of human 
activities. But while online, all of us need to be aware 
of how to conduct ourselves, how best to relate with 
others and what ethics, morals and values to maintain. 
Anyone who uses digital technology along with Internet 
is a digital citizen or a netizen. Being a good netizen 
means practicing safe, ethical and legal use of digital 
technology. A responsible netizen must abide by 
net etiquettes, communication etiquettes and social 
media etiquettes.
11.3.1 Net Etiquettes
We follow certain etiquettes during our social 
interactions. Similarly, we need to exhibit 
proper manners and etiquettes while being 
online as shown in Figure 11.2. One should 
be ethical, respectful and responsible while 
surfing the Internet.
(A) Be Ethical 
• No copyright violation: we should not 
use copyrighted materials without the 
permission of the creator or owner. As 
an ethical digital citizen, we need to be 
careful while streaming audio or video 
or downloading images and files from 
the Internet. We will learn more about 
copyright in Section 11.4.
• Share the expertise: it is good to share information 
and knowledge on Internet so that others can 
access it. However, prior to sharing information, we 
need to be sure that we have sufficient knowledge 
on that topic. The information shared should be 
true and unambiguous. Also, in order to avoid 
Activity 11.1
As a digital citizen, list 
various services that 
you avail online.
Figure 11.2: Net Etiquettes
Ch 11.indd   231 21-May-19   12:42:48 PM
2024-25
Computer SCien Ce – Cla SS xi 232
redundant information, we should verify that the 
information is not available already on Internet.
(B) Be Respectful 
• Respect privacy: as good digital citizens we 
have the right to privacy and the freedom of 
personal expression. At the same time, we have 
to understand that other digital citizens also 
have the same rights and freedoms. Our personal 
communication with a digital citizen may include 
images, documents, files, etc., that are private 
to both. We should respect this privacy and 
should not share those images, documents, files, 
etc., with any other digital citizen without each 
others’ consent.
• Respect diversity: in a group or public forum,  
we should respect the diversity of the people 
in terms of knowledge, experience, culture and  
other aspects.
(C) Be Responsible
• Avoid cyber bullying: any insulting, degrading 
or intimidating online behaviour like repeated 
posting of rumours, giving threats online, 
posting the victim’s personal information, sexual 
harassment or comments aimed to publicly 
ridicule a victim is termed as cyber bullying. 
It implies repeatedly targeting someone with 
intentions to hurt or embarrass. Perhaps new or 
non-frequent users of the Internet feel that things 
done online have no effect in the real world. We 
need to realise that bullying online can have very 
serious implications on the other person (victim). 
Also, remember our actions can be traced back 
using our digital footprints. 
• Don’t feed the troll: an Internet troll is a person 
who deliberately sows discord on the Internet by 
starting quarrels or upsetting people, by posting 
inflammatory or off topic messages in an online 
community, just for amusement. Since trolls thrive 
on attention, the best way to discourage trolls is 
not to pay any attention to their comments.
11.3.2 Communication Etiquettes
Digital communication includes email, texting, instant 
messaging, talking on the cell phone, audio or video 
Remember!!
While surfing the Internet, 
we should be cautious 
about our personal and 
confidential data.
 v Think before sharing 
credentials with others 
on an online platform.
 v Keep personal 
information safe and 
protected through 
passwords.
Activity 11.2
Find out how to report 
about an abusive or 
inappropriate post or 
about a sender in a 
social network?
Ch 11.indd   232 08-Apr-19   12:32:00 PM
2024-25
Societal i mpact 233
conferencing, posting on forums, social 
networking sites, etc. All these are 
great ways to connect with people in 
order to exchange ideas, share data 
and knowledge. Good communication 
over email, chat room and other such 
forums require a digital citizen to abide 
by the communication etiquettes as 
shown in Figure 11.3.
(A) Be Precise
• Respect time: we should not waste 
precious time in responding to 
unnecessary emails or comments 
unless they have some relevance for us. Also, we 
should not always expect an instant response as 
the recipient may have other priorities. 
• Respect data limits: For concerns related to data 
and bandwidth, very large attachments may be 
avoided. Rather send compressed files or link of 
the files through cloud shared storage like Google 
Drive, Microsoft OneDrive, Yahoo Dropbox, etc.
(B) Be Polite
Whether the communication is synchronous (happening 
in real time like chat, audio/video calls) or asynchronous 
(like email, forum post or comments), we should be 
polite and non-aggressive in our communication. We 
should avoid being abusive even if we don’t agree with 
others’ point of view. 
(C) Be Credible
We should be cautious while making a comment, 
replying or writing an email or forum post as such acts 
decide our credibility over a period of time. That is how 
we decide to follow some particular person’s forum posts 
while ignoring posts of other members of the forum. On 
various discussion forums, we usually try to go through 
the previous comments of a person and judge their 
credibility before relying on that person’s comments.
11.3.3 Social Media Etiquettes
In the current digital era, we are familiar with different 
kinds social media and we may have an account on 
Facebook, Google+, Twitter, Instagram, Pinterest, or 
the YouTube channel. Social media are websites or 
Avoid Spam!!
On receiving junk email 
(called Spam), neither 
reply nor open any 
attachment in such 
email. 
No Permanent Deletion!!
We can post or comment 
anything on Internet, and 
delete it later. 
 v But remember, 
it cannot be 
permanently deleted. 
It is recorded in our 
Digital Footprint.
 v This is how many 
culprits who spread 
hate, bully others or 
engage in criminal 
activities are traced 
and apprehended.
Figure 11.3: Communication etiquettes
Be 
Precise
Respect 
Time  
Respect 
Data
Limits
Be 
Polite
Be 
Credible   
Communication Etiquettes
Ch 11.indd   233 08-Apr-19   12:32:00 PM
2024-25
Read More
33 docs|11 tests
Related Searches

Objective type Questions

,

mock tests for examination

,

pdf

,

NCERT Textbook: Societal Impact | Computer Science for Class 11 - Humanities/Arts

,

ppt

,

MCQs

,

NCERT Textbook: Societal Impact | Computer Science for Class 11 - Humanities/Arts

,

Viva Questions

,

Sample Paper

,

Important questions

,

video lectures

,

Previous Year Questions with Solutions

,

NCERT Textbook: Societal Impact | Computer Science for Class 11 - Humanities/Arts

,

past year papers

,

Exam

,

shortcuts and tricks

,

study material

,

Extra Questions

,

Semester Notes

,

Free

,

Summary

,

practice quizzes

;