Page 420 - Computer Science Class 11 With Functions
P. 420
9. Why is a proprietary license also known as a closed-source license?
10. Write a short note on Creative Commons.
11. Give two examples of free and open-source licenses.
12. Explain the various methods to dispose of e-waste.
13. How has technology affected our social and cultural set-up? Explain in detail.
14. Do you think that girls in our society are not encouraged to pursue technical courses? Give reasons to support your answer.
15. Explain the challenges that are faced by differently-abled students in school?
Assertion and Reasoning Based Questions
The following questions are assertion(A) and reasoning(R) based. Mark the correct choice as
a. Both A and R are true and R is the correct explanation of A
b. Both A and R are true and R is not the correct explanation of A
c. A is true but R is false
d. A is false but R is true
1. Assertion(A): Women pursue IT-based courses less often than men.
Reasoning(R): Women have reduced access to IT services and IT education.
2. Assertion(A): Python is a free and open source software.
Reasoning(R): Python can be downloaded free of charge, but the source code cannot be modified.
3. Assertion(A): Malware is a program that aims to hurt a computer, server, client, or network.
Reasoning(R): A computer virus is an example of malware.
Case Based Questions
1. Amarjit has recently purchased a software for his manufacturing unit to manage the inventory. Recently, he received an
email stating that his company will not be able to access the software or the data stored suing the software until an amount
of 5000 bitcoins is paid. Do you think Amarjit is the victim of a cyber crime?
2. Kashvi is a fashion designer. She creates her own designs and uploads them on her blog. Recently, she came to know that
one of her competitors has copied her design and sold to one of her clients. Can Kashvi get legal protection? If yes, under
which law and what is the punishable offence committed by Kashvi’s competitor?
Multiple Choice Questions
1. (b) 2. (d) 3. (d) 4. (b) 5. (d) 6. (b) 7. (c) 8. (d) 9. (c)
10. (a) 11. (c) 12. (b) 13. (c) 14. (a) 15. (c) 16. (a) 17. (a) 18. (b)
19. (d) 20. (a) 21. (d) 22. (c) 23. (b) 24. (a) 25. (d)
True or False
1. (T) 2. (F) 3. (T) 4. (F) 5. (T) 6. (T) 7. (F) 8. (F) 9. (T)
10. (T) 11. (T) 12. (F) 13. (T) 14. (F) 15. (T)
Fill in the blanks
1. digital footprint 2. advertisements 3. fabrication 4. X handle
5. computer fraud 6. identity theft 7. Eavesdropping 8. Spam
9. malware 10. File Infectors
418 Touchpad Computer Science-XI

