Page 65 - PYTHON-11
P. 65
(b) The violation of Intellectual Property Rights can happen in the following ways:
(i) Plagiarism: It refers to copying someone else’s work and then passing it off as one’s own. Simply
put, it refers to copying information and not giving the author credit for it. Plagiarism can be
classified as intentional/deliberate or unintentional/accidental.
Intentional plagiarism includes copying someone else’s work, cutting and pasting blocks of text or
any kind of media from electronic sources without documenting and at the same time publishing
it on the web without the permission of creators. Unintentional plagiarism involves careless
paraphrasing, quoting text excessively along with poor documentation.
(ii) Copyright Infringement: It is the use or production of copyrighted material without the permission
of the copyright holder. There are many types and forms of copyright infringement, e.g.,
downloading an image from the internet and using it in a project, recording a film in a movie
theatre, copying any literary or artistic work without a license or written agreement, etc.
35. What are the rules and conventions for writing Python programs? (4)
Ans. The rules and conventions for writing Python programs are as follows:
(i) There is no demarcation or symbol to indicate termination of a statement.
(ii) An expression in a program is a sequence of operators and operands to perform arithmetic or logical
computation.
(iii) Clear and simple instructions must be given to a computer so that the user understands them easily.
(iv) Line length should be of maximum 79 characters.
(v) Avoid multiple statements on one time.
(vi) Blocks of code in Python are denoted by line indentation, which is implemented using 4 spaces per
indentation level.
(vii) Avoid the usage of expressions that give ambiguous results.
(viii) Use appropriate comments while writing Python programs.
Section E (2 × 5 = 10 Marks)
36. Consider the following scenario and answer questions (a) to (e). (5)
SecureNet Solutions Ltd., a cloud storage provider, fell victim to a cyberattack after an employee entered
login credentials into a fake IT support link from a phishing email. Hackers used the stolen credentials to
encrypt important files and demanded ransom.
The IT team responded by restoring data from backups, enhancing firewall rules, training staff on social
engineering threats and enforcing strong passwords and biometric authentication.
(a) Which type of cyberattack occurred when the employee entered login credentials into the fake
website?
(b) What security measure can add an extra layer of protection even when login credentials are
compromised?
(c) In which type of cyberattack are files encrypted and ransom is demanded for decryption?
(d) What software helps block unauthorized network access and monitors traffic?
(e) In which type of cyberattack do users get unknowingly redirected to a fake website?
Ans. (a) Phishing
(b) Multi-Factor Authentication
(c) Ransomware Attack
(d) Firewall
(e) Pharming
37. Write a menu-driven Python program that takes user inputs for required parameters and performs the
following operations. (5)
(a) Calculates the area of a rectangle.
(b) Calculates the perimeter of a rectangle.
(c) Calculates the area of a circle.
(d) Calculates the circumference of a circle.
(e) Calculates the area of a triangle.
M.14