List of Practicals (Digital Empowerment)
List of Practicals (Digital Empowerment)
List of Practicals (Digital Empowerment)
B) Create an Instagram account(if you don't have one). Explore all the security & privacy
measures provided by the platform and demonstrate any of the three security and any two
privacy measures.
3. Explore and document all the features provided by the Google Meet and Google classroom
applications.
4. Create a Digilocker account (if you don’t have one) and explore through all the features provided
by the platform. After exploring the platform, write a small report about the digilocker,
describing its key features and then demonstrate all those features with the help of screenshots
and descriptive captions.
5. Prepare a report about the Digital India Programme and its key visions. Also include the facts
about how those key visions has been realized by the government in the last 8 years.
8. Create an account on blogger.com (if you don’t have one) and perform following activities on it-
a. Create and post a blog about your college experience, you have gained yet.
b. Customize the theme of your blog page.
c. Customize the layout of your blog page.
9. Explain the terms Data breach and Cyber Attack. Followed this, also provide case studies on one
national and one international data breach registered recently. Do the same for cyber attacks.
10. Prepare a report about the blockchain technology and its working in detail. Also include a brief
description of the following related terms-
a. Genesis Block
b. Proof of work
c. Consensus Algorithm
d. Smart Contract
Lastly, provide a case study where blockchain technology has been inculcated to improve the
efficiency of the conventional approach.
11. Explore the csk.gov.in website thoroughly and prepare a report about its key features (i.e. alerts
of current threats, botnet removal tools and best practices to be followed in cyberspace). Also
provide a brief description of following related terms in your report-
a. Bot and its types
b. legitimate vs malicious bots
c. Different use case scenarios for legitimate bots
d. Botnet
e. Bot attack
12. Prepare a report on Netiquettes by explaining the term first, and then briefly discussing any 10
essential netiquettes to promote a safe cyber space.