Page 366 - Computer Science Class 11 Without Functions
P. 366

12.  Give any three features of Free and Open Source Licenses.
         Ans:  • developed in a collaborative manner.
              •  source code is publicly available.
              •  allows the user to modify the software and distribute the modified version.
          13.  Give any four acts that are considered as cybercrime according to IT Act 2000.
         Ans:  • Tampering with the computer source documents.
              •  Hacking with computer system.
              •  Securing access or attempting to secure access to a protected system.
              •  Breach of confidentiality and privacy.
          14.  List any five preventive measures that can reduce the risk of cybercrime.
         Ans:  • Take regular backup of important data.
              •  Use antivirus software and keep it updated.
              •  Download software from known and secure (HTTPS) sites.
              •  Keep your operating system updated.
              •  Do not visit or download content from untrusted websites.

          15.  Explain how acid bath is used to dispose of e-waste?
         Ans:   In this method, the e-waste is soaked in solutions of sulphuric, hydrochloric, and nitric acids to get the metal out. The
              salvaged metal is then used to make other things. However, acid solutions are difficult to dispose of. Releasing acids into
              water is bad for living things.
          16.  Name any four social issues that we face because of technology.
         Ans:  • Identity theft
              •  Gaming Addiction
              •  Health and Fitness
              •  Cyberbullying
          17.  What should be done to promote learning of computers among disabled students?
              a.  Different types of instructional aids or materials should be provided for students with various disabilities. For example,
                students who are blind or have low vision may need Braille keyboards, Braille monitors, and Braille printers in addition to
                screen readers when working on computers. Software assistants like Google Assistant, Microsoft Narrator, and Cortana,
                as well as custom text editors, would be useful for visually impaired students.
              b.  Educational  institutes  need  to  train  the  teachers  to  handle  the  students  with  special  needs.  For  example,  a
                hearing-impaired student needs a teacher who can communicate in sign language.


                Assertion and Reasoning Based Questions


           The following questions are assertion(A) and reasoning(R) based. Mark the correct choice as
           a.  Both A and R are true and R is the correct explanation of A
           b.  Both A and R are true and R is not the correct explanation of A
           c.  A is true but R is false
           d.  A is false but R is true
           1.  Assertion(A):  Some  e-waste can be refurbished.
               Reasoning(R):   When you get a new smartphone and give your old mobile phone (which is in working condition) as a gift
                          to a vegetable vendor, you are refurbishing the e-waste.

           2.  Assertion(A):  Cyber Bullying is not a punishable offence.
               Reasoning(R):   A person who posts obscene and objectionable comments about someone on social media in a manner that
                          others are also coerced to do so is committing a crime.
         Ans.  1. c  2. d

         364   Touchpad Computer Science-XI
   361   362   363   364   365   366   367   368   369   370   371