Page 419 - Computer Science Class 11 With Functions
P. 419
B. State whether the following statements are True or False:
1. Source code is available for software that has an open-source license. _________
2. Cybercrime is an unlawful act when the computer is used as a tool but not a target. _________
3. The websites that use HTTP are safer than those that use HTTPS. _________
4. One should agree to accept cookies for all websites. _________
5. Girls in our society are less encouraged to take computer science as a subject. _________
6. Cookies are stored by a website content for long-run purposes. _________
7. Patent is granted to the inventor for a fixed period. _________
8. Telegram is a free chat software with no restrictions on the media size to be exchanged. _________
C. Fill in the blanks.
1. A _________________ is a malware that appears desirable and useful but harms the system.
2. A cyberattack in which a machine or network resource is rendered unavailable either temporarily or permanently to its
intended users is called _____________.
3. The right that gives the creators of an original and authenticated work the exclusive right to get paid for their creative work
is called ___________.
4. Starting from the date of the patent application, the term of a patent is typically for a duration of ____________years.
5. The use of technology to control and limit access to intellectual property is called _____________.
6. An agreement between the person who wants to use the software and the company that owns it is called _________.
7. The laws against various forms of cybercrime are called __________.
8. Electronics that are no longer needed, are broken, or nearing the end of their useful life are called _____________.
9. ___________ keyboard is useful for visually impaired students.
D. Answer the following questions:
1. Define the following:
a. Denial of Service
b. Plagiarism
c. Privacy Law
d. Copyright Infringement
e. E-waste
2. Give any one example of eavesdropping.
3. Differentiate between:
a. File viruses and macro viruses
b. Adware and Spyware
c. Copyright and Patent
d. Proprietary License and Free and Open Source License
4. Give one example for each of the following:
a. File Infector Virus
b. Worm
c. Online plagiarism checker
5. Expand the following:
IPR, DRM, GPL
6. How do cookies and cache help in giving you a better browsing experience?
7. Give any two characteristics of open data.
8. What information does a software license contain for the user?
Society, Law and Ethics 417

