Page 488 - Cs_withBlue_J_C11_Flipbook
P. 488
10. What is meant by the term BSA?
Ans. The Business Software Alliance (BSA) is a non-profit trade association created to advance the goals of the software industry and
its hardware partners.
11. What are the different types of Software Piracy?
Ans. The different types of Software Piracy are:
Counterfeiting
Internet Piracy
End-User Piracy
Client-Server Overuse
Hard-Disk Loading
12. Define Cybercrime.
Ans. Any crime that is done via the Internet and by using a computer/mobile/laptop and software is known as Cybercrime.
13. What is meant by the term Malicious Code? Name the different types of Malicious Codes.
Ans. Malicious codes are unwanted programs that are intentionally written to harm the working of a computer and/or affect the
different data stored on a computer. The different types of malicious codes are computer viruses, worms, trojan horses and
malicious data files.
14. Differentiate between AR and VR.
Ans. Augmented Reality Virtual Reality
AR technology places virtual 3D objects in the real world. The real world is replaced with a 3D virtual world.
AR content is overlaid on the detected user location. The detection of the user location is not required.
A Higher bandwidth of above 100 Mbps is required. A lower bandwidth of at least 50 Mbps is required.
This can be achieved using even a smartphone. A VR headset is needed.
15. Differentiate between Open-source Software and Free Software.
Ans. Open-source software Free software
The programmer has more control over the program. The programmer has lesser control over the program.
Open-source software can work with other proprietary software. Free software does not allow the same.
Unsolved Questions
A. Tick ( ) the correct answer:
1 . ………………… means only the owner of the innovation has the sole right to produce, use and sell the item, at least for the first five
years.
a. Patents b. Trademarks
c. Data Privacy d. Data Protection
2. ………………… are unsolicited mails sent mainly with the idea of online business schemes.
a. Patents b. Spams
c. Anti-virus d. Commercial Software
3. When there is illegal duplication, distribution or sale of copyrighted material, with the intent of imitating the copyrighted product,
then it is known as the ………………… of software.
a. Internet Piracy b. End-user piracy
c. Counterfeiting d. None of these
4. If a Legal user breaks the copyright rules and makes copies of the software without authorisation, it is called .………………… .
a. Internet Piracy b. End-user piracy
c. Counterfeiting d. None of these
5. .………………… is an unwanted program that is installed without the user’s permission, but generally does not have any criminal
intentions.
a. Spyware b. Adware
c. Trojan horse d. Antivirus
486486 Touchpad Computer Science-XI

