Page 486 - Cs_withBlue_J_C11_Flipbook
P. 486
3. To protect the ideas or innovations created by a particular individual or a group of individuals, there are some legal rights, which
are known as ………………… .
a. Civic Property Right b. Traffic Right
c. Intellectual Property Rights d. None of these
4. ………………… law is used for protecting different literary works such as computer programs, databases, novels, poems, and musical
compositions.
a. Trademarks b. Copyright
c. Patents d. None of these
5. To protect data privacy, we need ………………… .
a. a good firewall b. a good Antivirus
c. both a firewall as well as an antivirus d. None of these
6. Which of the following programming languages are used to implement Artificial Intelligence?
a. LISP b. Prolog
c. Python d. All of these
7. An application of the IoT is the ………………… .
a. Pokemon Go b. Google Cardboard
c. Smart Refrigerators d. Google Earth
8. Four pillars of freedom that are given to free software include ………………… .
a. Freedom to view b. Freedom to modify
c. Freedom to hack d. Freedom of piracy
9. The ………………… license is applied for free and open software.
a. BDS license b. IIT license
c. GPL license d. Proprietary license
10. Illegal duplication, distribution or sale of copyrighted material with the intent of imitating the copyrighted product is called
………………… .
a. Counterfeiting b. Hard disk loading
c. Client server overuse d. Internet piracy
Answers
1. a 2. d 3. c 4. b 5. c 6. d 7. c 8. b 9. c 10. a
B. Fill in the blanks:
1. The word ………………… means free from any public attention, i.e., not being bothered or witnessed by other people.
2. The Internet is a gigantic computer network that connects different computers across the ………………… .
3. The ………………… was implemented in 1998 and was designed to guard private data kept in servers, workstations and personal
computers or in structured record-keeping systems.
4. Due to its versatility, the ………………… has gained a lot of popularity and has become one of the best and easy ways of
communication.
5. The ………………… has to be purchased/taken permission for before using.
6. ………………… is the common term used to represent malicious software used by cyber criminals.
7. ………………… are unsolicited bulk mails sent which are generally commercial advertisements.
8. The ………………… displays using light diffraction concepts, to generate 3D objects in the real world.
9. Google glasses are used in ………………… reality.
10. ………………… are used by companies to converse as efficiently as their human counterparts using natural language processing.
Answers
1. privacy 2. Earth 3. Data Protection Act 4. Electronic mail 5. Commercial Software
6. Malware 7. Spam 8. Holographic 9. Augmented 10. Chatbots
484484 Touchpad Computer Science-XI

