Humanities/Arts Exam  >  Humanities/Arts Notes  >  Computer Science for Class 11  >  NCERT Solutions: Societal Impact

Societal Impact NCERT Solutions | Computer Science for Class 11 - Humanities/Arts PDF Download

Q1: After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime? Justify your answer.
(a) 
Hacking
(b)
Identity theft
(c) 
Cyber bullying
(d) 
Plagiarism
Ans:
(b)

Q2: Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do?
(a) 
Inform Garvit so that he may change his password.
(b) 
Give the password of Garvit’s email ID to all other classmates.
(c) 
Use Garvit’s password to access his account.
Ans: (a) 

Q3: Suhana is down with fever. So she decided not to go to school tomorrow. Next day, in the evening she called up her classmate, Shaurya and enquired about the computer class. She also requested him to explain the concept. Shaurya said, “Mam taught us how to use tuples in python”. Further, he generously said, “Give me some time, I will email you the material which will help you to understand tuples in python”. Shaurya quickly downloaded a 2-minute clip from the Internet explaining the concept of tuples in python. Using video editor, he added the text “Prepared by Shaurya” in the downloaded video clip. Then, he emailed the modified video clip to Suhana. This act of Shaurya is an example of:
(a)
Fair use
(b) Hacking
(c) Copyright infringement
(d) Cyber crime
Ans: (c) 

Q4: After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?
(a) 
You sent an email to your friend with a message saying that “I am sorry”.
(b) You sent a threatening message to your friend saying “Do not try to call or talk to me”.
(c) You created an embarrassing picture of your friend and uploaded on your account on a social networking site.
Ans: (a) 

Q5: Sourabh has to prepare a project on “Digital India Initiatives”. He decides to get information from the Internet. He downloads three web pages (webpage 1, webpage 2, webpage 3) containing information on Digital India Initiatives. Which of the following steps taken by Sourabh is an example of plagiarism or copyright infringement. Give justification in support of your answer.
(a) He read a paragraph on “ Digital India Initiatives” from webpage 1 and rephrased it in his own words. He finally pasted the rephrased paragraph in his project.
(b) He downloaded three images of “ Digital India Initiatives” from webpage 2. He made a collage for his project using these images.
(c) He downloaded “Digital India Initiative” icon from web page 3 and pasted it on the front page of his project report.
Ans: 

(a) Plagiarism as Sourabh steal the idea or content and he is presented as his own.
(b) Copyright Infringement : as Sourabh use other person’s work without obtaining their permission to use or we have not paid for it, if it is being sold.
(c) Plagiarism : as Sourabh use other person’s work without obtaining their permission.

Q6: Match the following:
Societal Impact NCERT Solutions | Computer Science for Class 11 - Humanities/Arts

Ans: 
Societal Impact NCERT Solutions | Computer Science for Class 11 - Humanities/Arts


Q7: You got the below shown SMS from your bank querying a recent transaction. Answer the following:
“Bank has noticed that your ATM card was recently used at XYZ online Store on 26 November, 2018 at 1:00 pm for Rs 20010. If the transaction was not carried by you, urgently SMS your PIN number on 03036665458”
(a) Will you SMS your pin number to the given contact number?
(b) Will you call the bank helpline number to recheck the validity of the SMS received?
Ans: 

(a) No, I will not SMS my pin number to the given contact number.
(b) Yes, I will call the bank helpline number to recheck the validity of the SMS received.

Q8: Preeti celebrated her birthday with her family. She was excited to share the moments with her friend Himanshu. She uploaded selected images of her birthday party on a social networking site so that Himanshu can see them. After few days, Preeti had a fight with Himanshu. Next morning, she deleted her birthday photographs from that social networking site, so that Himanshu cannot access them. Later in the evening, to her surprise, she saw that one of the images which she had already deleted from the social networking site was available with their common friend Gayatri. She hurriedly enquired Gayatri “Where did you get this picture from?”.
Gayatri replied “Himanshu forwarded this image few minutes back”.
Help Preeti to get answers for the following questions. Give justification for your answers so that Preeti can understand it clearly.
(a) How could Himanshu access an image which I had already deleted?
(b) Can anybody else also access these deleted images?
(c) Had these images not been deleted from my digital footprint?
Ans: 

(a) Himanshu must have downloaded the image on his mobile or Laptop before deleting by Preeti.

(b) No
(c) No, images has been deleted from digital footprint.

Q9: The school offers wireless facility (wifi) to the Computer Science students of Class XI. For communication, the network security staff of the school have a registered URL schoolwifi.edu. On 17 September 2017, the following email was mass distributed to all the Computer Science students of Class XI. The email claimed that the password of the students was about to expire. Instructions were given to go to URL to renew their password within 24 hours.

Societal Impact NCERT Solutions | Computer Science for Class 11 - Humanities/Arts(a) Do you find any discrepancy in this email?
(b) What will happen if the student will click on the given URL?
(c) Is the email an example of cyber crime? If yes, then specify which type of cyber crime is it. Justify your answer.
Ans: 

(a) Yes there is a discrepancy as the domain spelling schoolwifi.edu is different in the mail shown above.
(b) Clicking on that mail may install Malware on student’s mobile / Laptop which may record all the keys pressed and send it to the hacker.
(c) Yes, the email is an example of Cyber Crime. It is a type of email spoofing as here a fake or forged email address is used and the student presumes it to be from an authentic source.

Q10: You are planning to go for a vacation. You surfed the Internet to get answers for the following queries:
(a) Weather conditions
(b) Availability of air tickets and fares
(c) Places to visit
(d) Best hotel deals
Which of your above mentioned actions might have created a digital footprint?
Ans:
All the above mentioned actions have created a digital footprint as whenever we surf the Internet using smartphones, tablets, computers, etc., we leave a trail of data reflecting the activities performed by us online, which is our digital footprint.

Q11: How would you recognise if one of your friends is being cyber bullied?
(a) Cite the online activities which would help you detect that your friend is being cyber bullied?
(b) What provisions are in IT Act 2000, (amended in 2008) to combact such situations.
Ans: 

(a) Some activities which may help to detect that my friend is being cyber bullied are :
Checking his Social Media Account like Facebook, Twitter etc.
Checking his Email account like Gmail, yahoo etc
Checking all his chatting on WhatsApp, Facebook messenger etc

(b) With the growth of Internet, many cases of cyber crimes, frauds, cyber attacks and cyber bullying are reported. The Government of India’s Information Technology Act, 2000 (also known as IT Act), amended in 2008, provides guidelines to the user on the processing, storage and transmission of sensitive information.

Q12: Write the differences between the following
(a) Copyrights and Patents
(b) Plagiarism and Copyright infringement
(c) Non-ethical hacking and Ethical hacking
(d) Active and Passive footprints
(e) Free software and Free and open source software
Ans: 

(a) Copyrights and Patents
Copyright grants legal rights to creators for their original works like writing, photograph, audio recordings, video, sculptures, architectural works. Copyrights are automatically granted to creators and authors.
A patent is usually granted for inventions. Unlike copyright, the inventor needs to apply (file) for patenting the invention. When a patent is granted, the owner gets an exclusive right to prevent others from using, selling, or distributing the protected invention.
(b) Plagiarism and Copyright infringement
Plagiarism means to copy some contents from Internet, but do not mention the source or the original creator.
Copyright infringement is when we use other person’s work without obtaining their permission to use or we have not paid for it, if it is being sold.
(c) Non-ethical hacking and Ethical hacking
A non ethical hacking is to gain unauthorised access to computers or networks in order to steal sensitive data with the intent to damage or bring down systems. Those who are doing non ethical hacking are called black hat hackers or crackers.
Hacking, when done with a positive intent, is called ethical hacking. Such ethical hackers are known as white hat hackers. An ethical hacker may exploit a website in order to discover its security loopholes or vulnerabilities. Thus, ethical hacking is actually preparing the owner against any cyber attack.
(d) Active and Passive foot prints
Active digital footprints which includes data that we intentionally submit online. This would include emails we write, or responses or posts we make on different websites or mobile Apps, etc.
The digital data trail we leave online unintentionally is called passive digital footprints. This includes the data generated when we visit a website, use a mobile App, browse Internet, etc.
(e) Free and Free and Open Source Software
Free software – Those software for which there is no license fee and can be downloaded, shared without any restrictions but their source code is not available are called Free Software.
Free and Open Source Software : Free and Open Source Software (FOSS) allow users to not only access but also to modify(or improve) them as Source Code is also available.

Q13: If you plan to use a short text from an article on the web, what steps must you take in order to credit the sources used?
Ans:
We can give the credit to others by writing the name of owner in caption to show that the image belongs to someone else.

Q14: When you search online for pictures, how will you find pictures that are available in the free public domain. How can those pictures be used in your project without copyright violations?
Ans: 

If the pictures are downloadable and there is no watermark in the picture then they may be available for the free public domain.
If the picture is in the free public domain then we can use those pictures in the project without copyright violations.

Q15: Describe why it is important to secure your wireless router at home. Search the Internet to find the rules to create a reasonably secure password. Create an imaginary password for your home router. Will you share your password for home router with following people. Justify your answer.
(a) Parents
(b) Friends
(c) Neighbours
(d) Home Tutors
Ans:
It is important to secure wireless router at home so that no authorised person can use my wi-fi connection.
Rules to create Strong password are :

  • Password should be at least 8 characters.
  • Password should have the combination of both uppercase and lowercase letters.
  • Password should have combination of letters and numbers.
  • Password should Include of at least one special character.

There is no specific rule, with whom you should share your password but for safety and security, I will share the password of home router with my parents only.

Q16: List down the steps you need to take in order to ensure
(a) Your computer is in good working condition for a longer time.
(b) Smart and safe Internet surfing.
Ans: 

(a) Our computer will be in good working condition for a longer time when:

  • We keep our system up-to-date.
  • do not use third-party applications.
  • use antivirus and anti-spyware. etc.

(b) 

  • Use a firewall on the computer.
  • Disconnect from the internet when away.
  • keep your email address private.
  • Disable cookies, if possible.
  • Be careful with email.
  • Use caution when downloading files on the internet.

Q17: What is data privacy? Websites that you visit collect what type of information about you?
Ans: 

  • Data privacy or information privacy is a branch of data security concerned with the proper handling of data – consent, notice, and regulatory obligations. More specifically, practical data privacy concerns often revolve around: Whether or how data is shared with third parties.
    The website usually collects data that can be used to personalize the advertisements so that they can make revenue from those ads. It depends on the type of website and what data they will collect, they may collect your usernames, age, gender, and photos.

Q18: In the computer science class, Sunil and Jagdish were assigned the following task by their teacher.
(a) Sunil was asked to find information about “India, a Nuclear power”. He was asked to use Google Chrome browser and prepare his report using Google Docs.
(b) Jagdish was asked to find information about “Digital India”. He was asked to use Mozilla Firefox browser and prepare his report using Libre Office Writer.
What is the difference between technologies used by Sunil and Jagdish?
Ans:
 
Difference is that Sunil is using Google Chrome to find information and Google Docs for writing report, both are free Software while Jagdish is using Mozilla Firefox to find information and Libre Office Writer to write report which is Free and Open Source Software.

Q19. Cite examples depicting that you were a victim of following cyber crime. Also, cite provisions in IT Act to deal with such a cyber crime.
(a) Identity theft
(b) Credit card account theft
Ans:
 
(a) A user’s identifiable personal data like email ID, banking credentials, passport, PAN, Aadhaar number etc. are stolen and misused by the hacker on behalf of the victim. There can be many ways in which the criminal takes advantage of an individual’s stolen identity like :

  • Financial identity theft : when the stolen identity is used for financial gain.
  • Criminal identity theft: Criminals use a victim’s stolen identity to avoid detection of their true identity

(b) Credit card account theft is where someone stolen the credit card detail for financial gain 
Under Section 66C of the IT Act, 2000, whoever, fraudulently stolen the identity of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to lakh.

Q20: Neerja is a student of Class XI. She has opted for Computer Science. Neerja prepared the project assigned to her. She mailed it to her teacher. The snapshot of that email is shown below.
Societal Impact NCERT Solutions | Computer Science for Class 11 - Humanities/Arts

Find out which of the following email etiquettes are missing in it. Justify your answer.
(a) Subject of the mail
(b) Formal greeting
(c) Self-explanatory terms
(d) Identity of the sender
(e) Regards
Ans: 
Following email etiquettes are missing in the given screenshot
(a) Subject of the mail : This is basically the title of the email. A good email subject convinces readers to open your email.
(b) Formal Greeting : Formal Greetings is missing in above screenshot as there is no words like:

  • Hi
  • Hello
  • Dear
  • Respected etc

(c) Self explanatory terms are missing in email screenshot as by reading mail we do not come to know the content of email
(d) Identity of sender is missing in screenshot as only name is there
(e) Regards in email shows your respect towards recipient which is missing in screenshot.

Q21: Sumit got good marks in all the subjects. His father gifted him a laptop. He would like to make Sumit aware of health hazards associated with inappropriate and excessive use of laptop. Help his father to list the points which he should discuss with Sumit.
Ans:
List of the points which he should discuss with Sumit impact of excessive use of laptop:

  • Impact of hearing
  • impact on bones and joints
  • Eye problems
  • Sleep issue
  • Mental health issues
  • Physical symptoms
  • Internet addiction disorders
  • Eating irregularities.
The document Societal Impact NCERT Solutions | Computer Science for Class 11 - Humanities/Arts is a part of the Humanities/Arts Course Computer Science for Class 11.
All you need of Humanities/Arts at this link: Humanities/Arts
33 docs|11 tests
Related Searches

Semester Notes

,

Summary

,

video lectures

,

study material

,

Societal Impact NCERT Solutions | Computer Science for Class 11 - Humanities/Arts

,

Sample Paper

,

Societal Impact NCERT Solutions | Computer Science for Class 11 - Humanities/Arts

,

pdf

,

Extra Questions

,

Important questions

,

Free

,

shortcuts and tricks

,

mock tests for examination

,

past year papers

,

Exam

,

Societal Impact NCERT Solutions | Computer Science for Class 11 - Humanities/Arts

,

Viva Questions

,

Objective type Questions

,

ppt

,

Previous Year Questions with Solutions

,

practice quizzes

,

MCQs

;