Teachers and Examiners (CBSESkillEduction) collaborated to create the Societal Impact Class 11 NCERT Solutions. All the important Information are taken from the NCERT Textbook Computer Science (083) class 11.
Societal Impact Class 11 NCERT Solutions
1. After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime? Justify your answer.
a) Hacking
b) Identity theft
c) Cyber bullying
d) Plagiarism
Answer – Identity theft
2. Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do?
a) Inform Garvit so that he may change his password.
b) Give the password of Garvit’s email ID to all other classmates.
c) Use Garvit’s password to access his account.
Answer – Inform Garvit so that he may change his password.
3. Suhana is down with fever. So she decided not to go to school tomorrow. Next day, in the evening she called up her classmate, Shaurya and enquired about the computer class. She also requested him to explain the concept. Shaurya said, “Mam taught us how to use tuples in python”.
Further, he generously said, “Give me some time, I will email you the material which will help you to understand tuples in python”. Shaurya quickly downloaded a 2-minute clip from the Internet explaining the concept of tuples in python. Using video editor, he added the text “Prepared by Shaurya” in the downloaded video clip. Then, he emailed the modified video clip to Suhana. This act of Shaurya is an example of:
a) Fair use
b) Hacking
c) Copyright infringement
d) Cyber crime
Answer – Copyright infringement
4. After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?
a) You sent an email to your friend with a message saying that “I am sorry”.
b) You sent a threatening message to your friend saying “Do not try to call or talk to me”.
c) You created an embarrassing picture of your friend and uploaded on your account on a social networking site.
Answer – You sent an email to your friend with a message saying that “I am sorry”.
5. Sourabh has to prepare a project on “Digital India Initiatives”. He decides to get information from the Internet. He downloads three web pages (webpage 1, webpage 2, webpage 3) containing information on Digital India Initiatives. Which of the following steps taken by Sourabh is an example of plagiarism or copyright infringement. Give justification in support of your answer.
a) He read a paragraph on “ Digital India Initiatives” from webpage 1 and rephrased it in his own words. He finally pasted the rephrased
paragraph in his project.
b) He downloaded three images of “ Digital India Initiatives” from webpage 2. He made a collage for his project using these images.
c) He downloaded “Digital India Initiative” icon from web page 3 and pasted it on the front page of his project report.
Answer –
a) Plagiarism – Plagiarism occurs even when someone uses an idea or a product that has already been developed but portrays it as their own.
b) Plagiarism – Because the artist stole existing photos and presented them as his own.
c) Copyright infringement – When we utilise someone else’s creative work without asking permission or, if the work is being sold, without paying for it, we are violating their copyright.
6. Match the following:
Answer –
Plagiarism – Copy and paste information from the Internet into your report and then organise it
Hacker – Breaking into computers to read private emails and other files.
Credit and fraud – Fakers, by offering special rewards or money prize asked for personal information, such as bank account information
Digital FootPrint- The trail that is created when a person uses the Internet.
7. You got the below shown SMS from your bank querying a recent transaction. Answer the following:
a) Will you SMS your pin number to the given contact number?
b) Will you call the bank helpline number to recheck the validity of the SMS received?
Answer –
a) I will not SMS my pin because my bank never requests such sensitive data.
b) The bank needs to be notified because it can be a fraud case so they can assist in finding the crooks.
8. Preeti celebrated her birthday with her family. She was excited to share the moments with her friend Himanshu. She uploaded selected images of her birthday party on a social networking site so that Himanshu can see them. After few days, Preeti had a fight with Himanshu. Next morning, she deleted her birthday photographs from that social networking site, so that Himanshu cannot access them.
Later in the evening, to her surprise, she saw that one of the images which she had already deleted from the social networking site was available with their common friend Gayatri. She hurriedly enquired Gayatri “Where did you get this picture from?”. Gayatri replied “Himanshu forwarded this image few minutes back”. Help Preeti to get answers for the following questions. Give justification for your answers so that Preeti can understand it clearly.
a) How could Himanshu access an image which I had already deleted?
b) Can anybody else also access these deleted images?
c) Had these images not been deleted from my digital footprint?
Answer –
a) Because Himanshu must have had Preeti’s consent to duplicate those images as he must have a copy of her photos before she deleted them.
b) After deleting no one can access but previously any one have downloaded then they can share the images
c) Although Himanshu attempted to duplicate these photos in a wrong manner, they are still available even if they have been deleted from her digital trace.
9. The school offers wireless facility (wifi) to the Computer Science students of Class XI. For communication, the network security staff of the school have a registered URL schoolwifi.edu. On 17 September 2017, the following email was mass distributed to all the Computer Science students of Class XI. The email claimed that the password of the students was about to expire. Instructions were given to go to URL to renew their password within 24 hours.
a) Do you find any discrepancy in this email?
b) What will happen if the student will click on the given URL?
c) Is the email an example of cyber crime? If yes, then specify which type of cyber crime is it. Justify your answer.
Answer –
a) Yes, I have already registered with schoolwifi.edu for wifi connection and the link shared in the mail is started with same domain name.
b) The student’s device could become infected with malware or viruses if they click on the provided URL.
c) Email is a type of cybercrime, yes. This is a form of email spoofing. A hacker or other malicious person poses as another user or device on a network in a spoofing attack to trick other users or systems into thinking they are real or authentic.
10. You are planning to go for a vacation. You surfed the Internet to get answers for the following queries:
a) Weather conditions
b) Availability of air tickets and fares
c) Places to visit
d) Best hotel deals
Which of your above mentioned actions might have created a digital footprint?
Answer – All the option mentioned above will create a digital footprint.
11. How would you recognise if one of your friends is being cyber bullied?
a) Cite the online activities which would help you detect that your friend is being cyber bullied?
b) What provisions are in IT Act 2000, (amended in 2008) to combat such situations.
Answer – a) Cite the online activities which would help you detect that your friend is being cyber bullied?
12. Write the differences between the following-
a) Copyrights and Patents
b) Plagiarism and Copyright infringement
c) Non-ethical hacking and Ethical hacking
d) Active and Passive footprints
e) Free software and Free and open source software
Answer –
a) Copyrights – Copyright provides creators with legal protection for their original written, photographic, audio, and other works. Creators and authors are given copyrights by default.
Patents – Typically, inventions are granted a patent. In contrast to copyright, the creator must submit an application (file) to patent the innovation. After receiving a patent, the owner gains the only authority to bar anyone from making, using, or selling the invention.
b) Plagiarism – Plagiarism is defined as the act of copying text or images from the Internet without crediting the author or source.
Copyright infringement – When we utilise someone else’s creative work without asking permission or, if the work is being sold, without paying for it, we are violating their copyright.
c) Non-ethical hacking – Gaining unauthorised access to computers or networks in order to steal sensitive data with the purpose of causing harm or taking down systems is a common practise.
Ethical hacking – It is a method that involves utilising a website to detect security gaps or vulnerabilities, then informing the website owner with the information obtained. Thus, ethical hacking actually serves to protect the owner from cyberattacks.
d) Active footprints –Data that we intentionally publish online, such as emails we write, comments or postings we make on various websites or applications, etc., is included in our active digital footprints.
Passive footprints – Passive digital footprints are the inadvertent digital data traces we leave online. This includes the data created when we use a mobile app, surf the internet, or visit a website. It appears as though you are the only one using the internet and supplying data, yet both the browser and the Internet Service Provider can record your online behaviour.
13. If you plan to use a short text from an article on the web, what steps must you take in order to credit the sources used?
Answer – The most crucial step is to keep track of the original source from which you will be copying the text and to make sure that you explicitly identify it everywhere you use it in your paper.
14. When you search online for pictures, how will you find pictures that are available in the free public domain. How can those pictures be used in your project without copyright violations?
Answer – There is a written note at the end of every image indicating whether the image is free to use or whether it is protected by copyright, in which case you will need to either pay to use it or provide attribution to the original creator.
15. Describe why it is important to secure your wireless router at home. Search the Internet to find the rules to create a reasonably secure password. Create an imaginary password for your home router. Will you share your password for home router with following people. Justify your answer.
a) Parents
b) Friends
c) Neighbours
d) Home Tutors
Answer – Because anyone with a Wi-Fi signal nearby can connect to the wireless router and use it for himself or to attack your devices and data, it is crucial to secure it. A password that is at least eight characters long and contains lowercase, uppercase, a number, and a few special characters is considered to be reasonably secure.
16. List down the steps you need to take in order to ensure
a) your computer is in good working condition for a longer time.
b) smart and safe Internet surfing.
Answer –
Don’ts-
1. Never go to websites you don’t trust.
2. Put infected programme.
3. Opt for unregistered, free antivirus software.
Do’s-
1. Set up a purchased copy of a reliable antivirus programme with a powerful firewall.
17. What is data privacy? Websites that you visit collect what type of information about you?
Answer – The area of information technology that deals with the disclosure of personal data to third parties is data privacy. Birthdates, biometric data, and other personal identity details are all considered to be personal information.
Websites typically gather information that can be used to tailor adverts so they can generate revenue from those ads. Depending on the website’s nature, the information they get may include your username, age, gender, and photographs.
18. In the computer science class, Sunil and Jagdish were assigned the following task by their teacher.
a) Sunil was asked to find information about “India, a Nuclear power”. He was asked to use Google Chrome browser and prepare his report using Google Docs.
b) Jagdish was asked to find information about “Digital India”. He was asked to use Mozilla Firefox browser and prepare his report using
Libre Office Writer.
What is the difference between technologies used by Sunil and Jagdish?
Answer – Jagdish has utilised open source software (here) Mozilla Firefox and Libre Office Writer while Sunil has used free software (here) Google Chrome and Google Docs.
19. Cite examples depicting that you were a victim of following cyber crime. Also, cite provisions in IT Act to deal with such a cyber crime.
a) Identity theft
b) Credit card account theft
Answer –
a) This kind of offence is described in Section 66C of the IT Act 2008. Paragraph 66C: Identity theft is punishable by imprisonment of either kind for a term that may not exceed three years, as well as by a fine that may not exceed one lakh rupees. This punishment depends on how dishonestly or fraudulently the offender used the electronic signature, password, or other unique identification feature of another person.
b) When someone gains access to your credit card account and uses it to make unlawful purchases, it is considered a kind of identity theft.
20. Sumit got good marks in all the subjects. His father gifted him a laptop. He would like to make Sumit aware of health hazards associated with inappropriate and excessive use of laptop. Help his father to list the points which he should discuss with Sumit.
Answer –
The risks of heavy laptop use include headache and eyestrain.
a. Overusing a laptop could keep him from studying.
b. He won’t be able to manage his time effectively. not engaging in games.
c. limiting laptop use.
Computer Science Class 11 Notes
- Unit 1 : Basic Computer Organisation
- Unit 1 : Encoding Schemes and Number System
- Unit 2 : Introduction to problem solving
- Unit 2 : Getting Started with Python
- Unit 2 : Conditional statement and Iterative statements in Python
- Unit 2 : Function in Python
- Unit 2 : String in Python
- Unit 2 : Lists in Python
- Unit 2 : Tuples in Python
- Unit 2 : Dictionary in Python
- Unit 3 : Society, Law and Ethics
Computer Science Class 11 MCQ
- Unit 1 : Basic Computer Organisation
- Unit 1 : Encoding Schemes and Number System
- Unit 2 : Introduction to problem solving
- Unit 2 : Getting Started with Python
- Unit 2 : Conditional statement and Iterative statements in Python
- Unit 2 : Function in Python
- Unit 2 : String in Python
- Unit 2 : Lists in Python
- Unit 2 : Tuples in Python
- Unit 2 : Dictionary in Python
- Unit 3 : Society, Law and Ethics
Computer Science Class 11 NCERT Solutions
- Unit 1 : Basic Computer Organisation
- Unit 1 : Encoding Schemes and Number System
- Unit 2 : Introduction to problem solving
- Unit 2 : Getting Started with Python
- Unit 2 : Conditional statement and Iterative statements in Python
- Unit 2 : Function in Python
- Unit 2 : String in Python
- Unit 2 : Lists in Python
- Unit 2 : Tuples and Dictionary in Python
- Unit 3 : Society, Law and Ethics