Page 417 - Computer Science Class 11 With Functions
P. 417

12.  Give any three features of Free and Open Source Licenses.
             Ans.  • developed in a collaborative manner.
                  •  source code is publicly available.
                  •  allows the user to modify the software and distribute the modified version.
              13.  Give any four acts that are considered as cybercrime according to IT Act 2000.
             Ans.  • Tampering with the computer source documents.
                  •  Hacking with computer system.
                  •  Securing access or attempting to secure access to a protected system.
                  •  Breach of confidentiality and privacy.
              14.  List any five preventive measures that can reduce the risk of cybercrime.
             Ans.  • Take regular backup of important data.
                  •  Use antivirus software and keep it updated.
                  •  Download software from known and secure (HTTPS) sites.
                  •  Keep your operating system updated.
                  •  Do not visit or download content from untrusted websites.

              15.  Explain how acid bath is used to dispose of e-waste?
             Ans.   In this method, the e-waste is soaked in solutions of sulphuric, hydrochloric, and nitric acids to get the metal out. The
                  salvaged metal is then used to make other things. However, acid solutions are difficult to dispose of. Releasing acids into
                  water is bad for living things.
              16.  Name any four social issues that we face because of technology.
             Ans.  • Identity theft
                  •  Gaming Addiction
                  •  Health and Fitness
                  •  Cyberbullying
              17.  What should be done to promote learning of computers among disabled students?
                  a.  Different types of instructional aids or materials should be provided for students with various disabilities. For example,
                    students who are blind or have low vision may need Braille keyboards, Braille monitors, and Braille printers in addition to
                    screen readers when working on computers. Software assistants like Google Assistant, Microsoft Narrator, and Cortana,
                    as well as custom text editors, would be useful for visually impaired students.
                  b.  Educational institutes need to train the teachers to handle the students with special needs. For example, a hearing-
                    impaired student needs a teacher who can communicate in sign language.


                   Assertion and Reasoning Based Questions


                  The following questions are assertion(A) and reasoning(R) based. Mark the correct choice as
                  a.  Both A and R are true and R is the correct explanation of A
                  b.  Both A and R are true and R is not the correct explanation of A
                  c.  A is true but R is false
                  d.  A is false but R is true
               1.  Assertion(A):  Some  e-waste can be refurbished.
                  Reasoning(R):   When you get a new smartphone and give your old mobile phone (which is in working condition) as a gift
                              to a vegetable vendor, you are refurbishing the e-waste.

               2.  Assertion(A):  Cyber Bullying is not a punishable offence.
                  Reasoning(R):   A person who posts obscene and objectionable comments about someone on social media in a manner that
                              others are also coerced to do so is committing a crime.
             Ans.  1. c  2. d


                                                                                          Society, Law and Ethics  415
   412   413   414   415   416   417   418   419   420   421   422