Humanities/Arts Exam  >  Humanities/Arts Notes  >  Informatics Practices for Class 12  >  NCERT Textbook: Societal Impacts

NCERT Textbook: Societal Impacts | Informatics Practices for Class 12 - Humanities/Arts PDF Download

Download, print and study this document offline
Please wait while the PDF view is loading
 Page 1


In this chapter
 » Introduction
 » Digital Footprints
 » Digital Society and 
Netizen
 » Data Protection
 » Creative Commons
 » Cyber Crime
 » Indian Information 
Technology Act (IT Act)
 » E-waste: Hazards and 
Management
 » Impact on Health
6.1 Introduct Ion In recent years, the world around us has 
seen a lot of changes due to use of ‘Digital 
Technologies’. These changes have made a 
dramatic impact on our lives, making things 
more convenient, faster, and easier to handle. 
In the past, a letter would take days to reach, 
and every recipient would get his or her own 
copy and respond separately. Today, one can 
send and receive emails to more than one 
person at a time. The instantaneous nature 
of electronic communications has made us 
more efficient and productive.
From the banking industry to aviation, 
industrial production to e-commerce, 
especially with regard to the delivery of their 
“I think computer viruses should 
count as life. I think it says 
something about human nature 
that the only form of life we have 
created so far is purely destructive. 
We’ve created life in our own 
image.”
—  Stephen Hawking
Chapter
 6
Societal Impacts
Chapter 6.indd   167 10/9/2020   12:36:45 PM
2024-25
Page 2


In this chapter
 » Introduction
 » Digital Footprints
 » Digital Society and 
Netizen
 » Data Protection
 » Creative Commons
 » Cyber Crime
 » Indian Information 
Technology Act (IT Act)
 » E-waste: Hazards and 
Management
 » Impact on Health
6.1 Introduct Ion In recent years, the world around us has 
seen a lot of changes due to use of ‘Digital 
Technologies’. These changes have made a 
dramatic impact on our lives, making things 
more convenient, faster, and easier to handle. 
In the past, a letter would take days to reach, 
and every recipient would get his or her own 
copy and respond separately. Today, one can 
send and receive emails to more than one 
person at a time. The instantaneous nature 
of electronic communications has made us 
more efficient and productive.
From the banking industry to aviation, 
industrial production to e-commerce, 
especially with regard to the delivery of their 
“I think computer viruses should 
count as life. I think it says 
something about human nature 
that the only form of life we have 
created so far is purely destructive. 
We’ve created life in our own 
image.”
—  Stephen Hawking
Chapter
 6
Societal Impacts
Chapter 6.indd   167 10/9/2020   12:36:45 PM
2024-25
Informat Ics Pract Ices 168
 
goods and services, all are now dependent on the use 
of computers and digital technologies. Applications 
of digital technologies have redefined and evolved all 
spheres of human activities. Today more and more people 
are using digital technologies through smartphones, 
computers, etc., with the help of high speed Internet. 
Why did the digital technologies become so 
widespread? The introduction of personal computers 
(PCs) and Internet followed by smartphones has brought 
these technologies to the common man. 
While we reap the benefits of digital technologies, 
these technologies can also be misused. Let’s look at 
the impact of these technologies on our society and the 
best practices that can ensure a productive and safe 
digital environment for us. 
6.2 d Ig Ital Footpr Ints Have you ever searched online for any information? 
Have you ever purchased an online ticket, or responded 
to your friend’s email, or checked the score of a 
game online? Whenever we surf the Internet using 
smartphones, tablets, computers, etc., we leave a 
trail of data reflecting the activities performed by us 
online, which is our digital footprint. 
Our digital footprint can be created and used with 
or without our knowledge. It includes websites we 
visit, emails we send, and any information we submit 
online, etc., along with the computer’s IP address, 
location, and other device specific details. Such data 
could be used for targeted advertisement or could 
also be misused or exploited. Thus, it is good to be 
aware of the data trail we might be leaving behind. 
This awareness should make us cautious about what 
we write, upload or download or even browse online.
There are two kinds of digital footprints we leave 
behind. Active digital footprints which includes data 
that we intentionally submit online. This would 
include emails we write, or responses or posts we 
make on different websites or mobile Apps, etc. The 
digital data trail we leave online unintentionally is 
called passive digital footprints. This includes the 
data generated when we visit a website, use a mobile 
App, browse Internet, etc. as shown in Figure 6.1 
Figure 6.1: Exemplar web 
applications that result in 
digital footprints
Chapter 6.indd   168 10/9/2020   12:36:54 PM
2024-25
Page 3


In this chapter
 » Introduction
 » Digital Footprints
 » Digital Society and 
Netizen
 » Data Protection
 » Creative Commons
 » Cyber Crime
 » Indian Information 
Technology Act (IT Act)
 » E-waste: Hazards and 
Management
 » Impact on Health
6.1 Introduct Ion In recent years, the world around us has 
seen a lot of changes due to use of ‘Digital 
Technologies’. These changes have made a 
dramatic impact on our lives, making things 
more convenient, faster, and easier to handle. 
In the past, a letter would take days to reach, 
and every recipient would get his or her own 
copy and respond separately. Today, one can 
send and receive emails to more than one 
person at a time. The instantaneous nature 
of electronic communications has made us 
more efficient and productive.
From the banking industry to aviation, 
industrial production to e-commerce, 
especially with regard to the delivery of their 
“I think computer viruses should 
count as life. I think it says 
something about human nature 
that the only form of life we have 
created so far is purely destructive. 
We’ve created life in our own 
image.”
—  Stephen Hawking
Chapter
 6
Societal Impacts
Chapter 6.indd   167 10/9/2020   12:36:45 PM
2024-25
Informat Ics Pract Ices 168
 
goods and services, all are now dependent on the use 
of computers and digital technologies. Applications 
of digital technologies have redefined and evolved all 
spheres of human activities. Today more and more people 
are using digital technologies through smartphones, 
computers, etc., with the help of high speed Internet. 
Why did the digital technologies become so 
widespread? The introduction of personal computers 
(PCs) and Internet followed by smartphones has brought 
these technologies to the common man. 
While we reap the benefits of digital technologies, 
these technologies can also be misused. Let’s look at 
the impact of these technologies on our society and the 
best practices that can ensure a productive and safe 
digital environment for us. 
6.2 d Ig Ital Footpr Ints Have you ever searched online for any information? 
Have you ever purchased an online ticket, or responded 
to your friend’s email, or checked the score of a 
game online? Whenever we surf the Internet using 
smartphones, tablets, computers, etc., we leave a 
trail of data reflecting the activities performed by us 
online, which is our digital footprint. 
Our digital footprint can be created and used with 
or without our knowledge. It includes websites we 
visit, emails we send, and any information we submit 
online, etc., along with the computer’s IP address, 
location, and other device specific details. Such data 
could be used for targeted advertisement or could 
also be misused or exploited. Thus, it is good to be 
aware of the data trail we might be leaving behind. 
This awareness should make us cautious about what 
we write, upload or download or even browse online.
There are two kinds of digital footprints we leave 
behind. Active digital footprints which includes data 
that we intentionally submit online. This would 
include emails we write, or responses or posts we 
make on different websites or mobile Apps, etc. The 
digital data trail we leave online unintentionally is 
called passive digital footprints. This includes the 
data generated when we visit a website, use a mobile 
App, browse Internet, etc. as shown in Figure 6.1 
Figure 6.1: Exemplar web 
applications that result in 
digital footprints
Chapter 6.indd   168 10/9/2020   12:36:54 PM
2024-25
 Societal i mpact S 169
Everyone who is connected to the Internet may have 
a digital footprint. With more usage, the trail grows. On 
examining the browser settings, we can find out how it 
stores our browsing history, cookies, passwords, auto 
fills, and many other types of data. 
Besides browser, most of our digital footprints are 
stored in servers where the applications are hosted. 
We may not have access to remove or erase that data, 
neither do we have any control on how that data will 
be used. Therefore, once a data trail is generated, even 
if we later try to erase data about our online activities, 
the digital footprints still remain. There is no guarantee 
that digital footprints will be fully eliminated from the 
Internet. Therefore, we need to be more cautious while 
being online! All our online activities leave a data trace 
on the Internet as well as on the computing device that 
we use. This can be used to trace the user, their location, 
device and other usage details.
6.3 d Ig Ital s oc Iety and n et Izen As our society is inclined towards using more and 
more digital technologies, we end up managing most 
of our tasks digitally. In this era of digital society, our 
daily activities like communication, social networking, 
banking, shopping, entertainment, education, 
transportation, etc., are increasingly being driven by 
online transactions. 
Digital society thus reflects the growing trend of 
using digital technologies in all spheres of human 
activities. But while online, all of us need to be aware 
of how to conduct ourselves, how best to relate with 
others and what ethics, morals and values to maintain. 
Anyone who uses digital technology along with Internet 
is a digital citizen or a netizen. Being a good netizen 
means practicing safe, ethical and legal use of digital 
technology. A responsible netizen must abide by 
net etiquettes, communication etiquettes and social 
media etiquettes.
6.3.1 Net Etiquettes
We follow certain etiquettes during our social 
interactions. Similarly, we need to exhibit proper 
manners and etiquettes while being online as shown 
in Figure 6.2. One should be ethical, respectful and 
responsible while surfing the Internet.
Can your digital 
footprints be used to 
judge your attitude 
and work ethics?
Think and Reflect
Activity 6.1
As a digital citizen, list  
various services that 
you avail online.
Chapter 6.indd   169 10/9/2020   12:36:54 PM
2024-25
Page 4


In this chapter
 » Introduction
 » Digital Footprints
 » Digital Society and 
Netizen
 » Data Protection
 » Creative Commons
 » Cyber Crime
 » Indian Information 
Technology Act (IT Act)
 » E-waste: Hazards and 
Management
 » Impact on Health
6.1 Introduct Ion In recent years, the world around us has 
seen a lot of changes due to use of ‘Digital 
Technologies’. These changes have made a 
dramatic impact on our lives, making things 
more convenient, faster, and easier to handle. 
In the past, a letter would take days to reach, 
and every recipient would get his or her own 
copy and respond separately. Today, one can 
send and receive emails to more than one 
person at a time. The instantaneous nature 
of electronic communications has made us 
more efficient and productive.
From the banking industry to aviation, 
industrial production to e-commerce, 
especially with regard to the delivery of their 
“I think computer viruses should 
count as life. I think it says 
something about human nature 
that the only form of life we have 
created so far is purely destructive. 
We’ve created life in our own 
image.”
—  Stephen Hawking
Chapter
 6
Societal Impacts
Chapter 6.indd   167 10/9/2020   12:36:45 PM
2024-25
Informat Ics Pract Ices 168
 
goods and services, all are now dependent on the use 
of computers and digital technologies. Applications 
of digital technologies have redefined and evolved all 
spheres of human activities. Today more and more people 
are using digital technologies through smartphones, 
computers, etc., with the help of high speed Internet. 
Why did the digital technologies become so 
widespread? The introduction of personal computers 
(PCs) and Internet followed by smartphones has brought 
these technologies to the common man. 
While we reap the benefits of digital technologies, 
these technologies can also be misused. Let’s look at 
the impact of these technologies on our society and the 
best practices that can ensure a productive and safe 
digital environment for us. 
6.2 d Ig Ital Footpr Ints Have you ever searched online for any information? 
Have you ever purchased an online ticket, or responded 
to your friend’s email, or checked the score of a 
game online? Whenever we surf the Internet using 
smartphones, tablets, computers, etc., we leave a 
trail of data reflecting the activities performed by us 
online, which is our digital footprint. 
Our digital footprint can be created and used with 
or without our knowledge. It includes websites we 
visit, emails we send, and any information we submit 
online, etc., along with the computer’s IP address, 
location, and other device specific details. Such data 
could be used for targeted advertisement or could 
also be misused or exploited. Thus, it is good to be 
aware of the data trail we might be leaving behind. 
This awareness should make us cautious about what 
we write, upload or download or even browse online.
There are two kinds of digital footprints we leave 
behind. Active digital footprints which includes data 
that we intentionally submit online. This would 
include emails we write, or responses or posts we 
make on different websites or mobile Apps, etc. The 
digital data trail we leave online unintentionally is 
called passive digital footprints. This includes the 
data generated when we visit a website, use a mobile 
App, browse Internet, etc. as shown in Figure 6.1 
Figure 6.1: Exemplar web 
applications that result in 
digital footprints
Chapter 6.indd   168 10/9/2020   12:36:54 PM
2024-25
 Societal i mpact S 169
Everyone who is connected to the Internet may have 
a digital footprint. With more usage, the trail grows. On 
examining the browser settings, we can find out how it 
stores our browsing history, cookies, passwords, auto 
fills, and many other types of data. 
Besides browser, most of our digital footprints are 
stored in servers where the applications are hosted. 
We may not have access to remove or erase that data, 
neither do we have any control on how that data will 
be used. Therefore, once a data trail is generated, even 
if we later try to erase data about our online activities, 
the digital footprints still remain. There is no guarantee 
that digital footprints will be fully eliminated from the 
Internet. Therefore, we need to be more cautious while 
being online! All our online activities leave a data trace 
on the Internet as well as on the computing device that 
we use. This can be used to trace the user, their location, 
device and other usage details.
6.3 d Ig Ital s oc Iety and n et Izen As our society is inclined towards using more and 
more digital technologies, we end up managing most 
of our tasks digitally. In this era of digital society, our 
daily activities like communication, social networking, 
banking, shopping, entertainment, education, 
transportation, etc., are increasingly being driven by 
online transactions. 
Digital society thus reflects the growing trend of 
using digital technologies in all spheres of human 
activities. But while online, all of us need to be aware 
of how to conduct ourselves, how best to relate with 
others and what ethics, morals and values to maintain. 
Anyone who uses digital technology along with Internet 
is a digital citizen or a netizen. Being a good netizen 
means practicing safe, ethical and legal use of digital 
technology. A responsible netizen must abide by 
net etiquettes, communication etiquettes and social 
media etiquettes.
6.3.1 Net Etiquettes
We follow certain etiquettes during our social 
interactions. Similarly, we need to exhibit proper 
manners and etiquettes while being online as shown 
in Figure 6.2. One should be ethical, respectful and 
responsible while surfing the Internet.
Can your digital 
footprints be used to 
judge your attitude 
and work ethics?
Think and Reflect
Activity 6.1
As a digital citizen, list  
various services that 
you avail online.
Chapter 6.indd   169 10/9/2020   12:36:54 PM
2024-25
Informat Ics Pract Ices 170
(A) Be Ethical 
• No copyright violation: we should not 
use copyrighted materials without the 
permission of the creator or owner. As 
an ethical digital citizen, we need to be 
careful while streaming audio or video 
or downloading images and files from 
the Internet. We will learn more about 
copyright in Section 6.4.
• Share the expertise: it is good to share 
information and knowledge on Internet 
so that others can access it. However, 
prior to sharing information, we need to 
be sure that we have sufficient knowledge 
on that topic. The information shared 
should be true and unambiguous. Also, 
in order to avoid redundant information, 
we should verify that the information is 
not available already on Internet.
(B) Be Respectful 
• Respect privacy: as good digital citizens we 
have the right to privacy and the freedom of 
personal expression. At the same time, we have 
to understand that other digital citizens also 
have the same rights and freedoms. Our personal 
communication with a digital citizen may include 
images, documents, files, etc., that are private 
to both. We should respect this privacy and 
should not share those images, documents, files, 
etc., with any other digital citizen without each 
others’ consent.
• Respect diversity: in a group or public forum,  
we should respect the diversity of the people 
in terms of knowledge, experience, culture and  
other aspects.
(C) Be Responsible
• Avoid cyber bullying: any insulting, degrading 
or intimidating online behaviour like repeated 
posting of rumours, giving threats online, 
posting the victim’s personal information, sexual 
harassment or comments aimed to publicly 
ridicule a victim is termed as cyber bullying. 
It implies repeatedly targeting someone with 
Figure 6.2: Net etiquettes
While surfing the 
Internet, we should 
be cautious about 
our personal and 
confidential data.
 v Think before 
sharing credentials 
with others on an 
online platform.
 v Keep personal 
information safe 
and protected 
through 
passwords.
Chapter 6.indd   170 10/9/2020   12:36:54 PM
2024-25
Page 5


In this chapter
 » Introduction
 » Digital Footprints
 » Digital Society and 
Netizen
 » Data Protection
 » Creative Commons
 » Cyber Crime
 » Indian Information 
Technology Act (IT Act)
 » E-waste: Hazards and 
Management
 » Impact on Health
6.1 Introduct Ion In recent years, the world around us has 
seen a lot of changes due to use of ‘Digital 
Technologies’. These changes have made a 
dramatic impact on our lives, making things 
more convenient, faster, and easier to handle. 
In the past, a letter would take days to reach, 
and every recipient would get his or her own 
copy and respond separately. Today, one can 
send and receive emails to more than one 
person at a time. The instantaneous nature 
of electronic communications has made us 
more efficient and productive.
From the banking industry to aviation, 
industrial production to e-commerce, 
especially with regard to the delivery of their 
“I think computer viruses should 
count as life. I think it says 
something about human nature 
that the only form of life we have 
created so far is purely destructive. 
We’ve created life in our own 
image.”
—  Stephen Hawking
Chapter
 6
Societal Impacts
Chapter 6.indd   167 10/9/2020   12:36:45 PM
2024-25
Informat Ics Pract Ices 168
 
goods and services, all are now dependent on the use 
of computers and digital technologies. Applications 
of digital technologies have redefined and evolved all 
spheres of human activities. Today more and more people 
are using digital technologies through smartphones, 
computers, etc., with the help of high speed Internet. 
Why did the digital technologies become so 
widespread? The introduction of personal computers 
(PCs) and Internet followed by smartphones has brought 
these technologies to the common man. 
While we reap the benefits of digital technologies, 
these technologies can also be misused. Let’s look at 
the impact of these technologies on our society and the 
best practices that can ensure a productive and safe 
digital environment for us. 
6.2 d Ig Ital Footpr Ints Have you ever searched online for any information? 
Have you ever purchased an online ticket, or responded 
to your friend’s email, or checked the score of a 
game online? Whenever we surf the Internet using 
smartphones, tablets, computers, etc., we leave a 
trail of data reflecting the activities performed by us 
online, which is our digital footprint. 
Our digital footprint can be created and used with 
or without our knowledge. It includes websites we 
visit, emails we send, and any information we submit 
online, etc., along with the computer’s IP address, 
location, and other device specific details. Such data 
could be used for targeted advertisement or could 
also be misused or exploited. Thus, it is good to be 
aware of the data trail we might be leaving behind. 
This awareness should make us cautious about what 
we write, upload or download or even browse online.
There are two kinds of digital footprints we leave 
behind. Active digital footprints which includes data 
that we intentionally submit online. This would 
include emails we write, or responses or posts we 
make on different websites or mobile Apps, etc. The 
digital data trail we leave online unintentionally is 
called passive digital footprints. This includes the 
data generated when we visit a website, use a mobile 
App, browse Internet, etc. as shown in Figure 6.1 
Figure 6.1: Exemplar web 
applications that result in 
digital footprints
Chapter 6.indd   168 10/9/2020   12:36:54 PM
2024-25
 Societal i mpact S 169
Everyone who is connected to the Internet may have 
a digital footprint. With more usage, the trail grows. On 
examining the browser settings, we can find out how it 
stores our browsing history, cookies, passwords, auto 
fills, and many other types of data. 
Besides browser, most of our digital footprints are 
stored in servers where the applications are hosted. 
We may not have access to remove or erase that data, 
neither do we have any control on how that data will 
be used. Therefore, once a data trail is generated, even 
if we later try to erase data about our online activities, 
the digital footprints still remain. There is no guarantee 
that digital footprints will be fully eliminated from the 
Internet. Therefore, we need to be more cautious while 
being online! All our online activities leave a data trace 
on the Internet as well as on the computing device that 
we use. This can be used to trace the user, their location, 
device and other usage details.
6.3 d Ig Ital s oc Iety and n et Izen As our society is inclined towards using more and 
more digital technologies, we end up managing most 
of our tasks digitally. In this era of digital society, our 
daily activities like communication, social networking, 
banking, shopping, entertainment, education, 
transportation, etc., are increasingly being driven by 
online transactions. 
Digital society thus reflects the growing trend of 
using digital technologies in all spheres of human 
activities. But while online, all of us need to be aware 
of how to conduct ourselves, how best to relate with 
others and what ethics, morals and values to maintain. 
Anyone who uses digital technology along with Internet 
is a digital citizen or a netizen. Being a good netizen 
means practicing safe, ethical and legal use of digital 
technology. A responsible netizen must abide by 
net etiquettes, communication etiquettes and social 
media etiquettes.
6.3.1 Net Etiquettes
We follow certain etiquettes during our social 
interactions. Similarly, we need to exhibit proper 
manners and etiquettes while being online as shown 
in Figure 6.2. One should be ethical, respectful and 
responsible while surfing the Internet.
Can your digital 
footprints be used to 
judge your attitude 
and work ethics?
Think and Reflect
Activity 6.1
As a digital citizen, list  
various services that 
you avail online.
Chapter 6.indd   169 10/9/2020   12:36:54 PM
2024-25
Informat Ics Pract Ices 170
(A) Be Ethical 
• No copyright violation: we should not 
use copyrighted materials without the 
permission of the creator or owner. As 
an ethical digital citizen, we need to be 
careful while streaming audio or video 
or downloading images and files from 
the Internet. We will learn more about 
copyright in Section 6.4.
• Share the expertise: it is good to share 
information and knowledge on Internet 
so that others can access it. However, 
prior to sharing information, we need to 
be sure that we have sufficient knowledge 
on that topic. The information shared 
should be true and unambiguous. Also, 
in order to avoid redundant information, 
we should verify that the information is 
not available already on Internet.
(B) Be Respectful 
• Respect privacy: as good digital citizens we 
have the right to privacy and the freedom of 
personal expression. At the same time, we have 
to understand that other digital citizens also 
have the same rights and freedoms. Our personal 
communication with a digital citizen may include 
images, documents, files, etc., that are private 
to both. We should respect this privacy and 
should not share those images, documents, files, 
etc., with any other digital citizen without each 
others’ consent.
• Respect diversity: in a group or public forum,  
we should respect the diversity of the people 
in terms of knowledge, experience, culture and  
other aspects.
(C) Be Responsible
• Avoid cyber bullying: any insulting, degrading 
or intimidating online behaviour like repeated 
posting of rumours, giving threats online, 
posting the victim’s personal information, sexual 
harassment or comments aimed to publicly 
ridicule a victim is termed as cyber bullying. 
It implies repeatedly targeting someone with 
Figure 6.2: Net etiquettes
While surfing the 
Internet, we should 
be cautious about 
our personal and 
confidential data.
 v Think before 
sharing credentials 
with others on an 
online platform.
 v Keep personal 
information safe 
and protected 
through 
passwords.
Chapter 6.indd   170 10/9/2020   12:36:54 PM
2024-25
 Societal i mpact S 171
intentions to hurt or embarrass. Perhaps new or 
non-frequent users of the Internet feel that things 
done online have no effect in the real world. We 
need to realise that bullying online can have very 
serious implications on the other person (victim). 
Also, remember our actions can be traced back 
using our digital footprints. 
• Don’t feed the troll: an Internet troll is a person 
who deliberately sows discord on the Internet by 
starting quarrels or upsetting people, by posting 
inflammatory or off topic messages in an online 
community, just for amusement. Since trolls thrive 
on attention, the best way to discourage trolls is 
not to pay any attention to their comments.
6.3.2 Communication Etiquettes
Digital communication includes email, texting, instant 
messaging, talking on the cell phone, audio or video 
conferencing, posting on forums, social networking 
sites, etc. All these are great ways to connect with people 
in order to exchange ideas, share data and knowledge. 
Good communication over email, chat room and other 
such forums require a digital citizen to abide by the 
communication etiquettes as shown in Figure 6.3.
Be 
Precise
Respect 
Time  
Respect 
Data
Limits
Be 
Polite
Be 
Credible   
Communication Etiquettes
Figure 6.3: Communication etiquettes
(A) Be Precise
• Respect time: we should not waste precious time 
in responding to unnecessary emails or comments 
Activity 6.2
Find out how to report 
about an abusive or 
inappropriate post or 
about a sender in a 
social network.
Avoid Spam!!
On receiving 
junk email (called 
Spam), neither 
reply nor open any 
attachment in such 
email. 
Chapter 6.indd   171 10/9/2020   12:36:54 PM
2024-25
Read More
14 docs

FAQs on NCERT Textbook: Societal Impacts - Informatics Practices for Class 12 - Humanities/Arts

1. What are the main societal impacts discussed in the NCERT Humanities/Arts curriculum?
Ans. The NCERT Humanities/Arts curriculum outlines various societal impacts such as cultural awareness, social cohesion, and critical thinking. It emphasizes the role of arts in fostering empathy and understanding diverse perspectives, enhancing community engagement, and encouraging active participation in social issues.
2. How does the study of humanities contribute to personal development?
Ans. The study of humanities contributes to personal development by improving communication skills, critical thinking abilities, and emotional intelligence. Engaging with diverse texts and perspectives allows students to reflect on their values, beliefs, and experiences, fostering a deeper understanding of themselves and their place in society.
3. In what ways can arts influence social change?
Ans. Arts can influence social change by raising awareness about social issues, inspiring action, and providing a platform for marginalized voices. Through various forms of expression such as literature, visual arts, and performing arts, artists can challenge societal norms and provoke thought, ultimately driving conversations and initiatives that lead to change.
4. Why is cultural awareness important in the study of humanities and arts?
Ans. Cultural awareness is crucial in the study of humanities and arts as it promotes respect and appreciation for diversity. Understanding different cultures helps students develop empathy, reduces prejudice, and encourages inclusivity. It prepares individuals to navigate a multicultural world and fosters harmonious coexistence within societies.
5. What skills are developed through studying humanities and arts that are applicable in various careers?
Ans. Studying humanities and arts develops a range of transferable skills such as analytical thinking, effective communication, creativity, and problem-solving. These skills are applicable in various careers, including education, media, social work, law, and public policy, making graduates versatile and well-prepared for the workforce.
Related Searches

NCERT Textbook: Societal Impacts | Informatics Practices for Class 12 - Humanities/Arts

,

study material

,

Sample Paper

,

practice quizzes

,

NCERT Textbook: Societal Impacts | Informatics Practices for Class 12 - Humanities/Arts

,

Free

,

pdf

,

Viva Questions

,

Semester Notes

,

shortcuts and tricks

,

ppt

,

Previous Year Questions with Solutions

,

mock tests for examination

,

MCQs

,

Important questions

,

past year papers

,

NCERT Textbook: Societal Impacts | Informatics Practices for Class 12 - Humanities/Arts

,

Objective type Questions

,

video lectures

,

Extra Questions

,

Exam

,

Summary

;