Page 367 - Computer Science Class 11 Without Functions
P. 367

Case Based Questions


               1.  Krishnan has just created his account on Facebook. He became friends with some people on the Facebook. One day, he had
                  an argument  with one of his friends, Arbaaz. When he reached home, he saw that Arbaaz had posted defamatory messages
                  along with his morphed pictures. Which type of crime has Arbaaz committed?  Which legal provision can Krishnan use to
                  get relief for himself?
             Ans:  Krishnan can use IT Act 2000
                  Arbaaz has committed an act of Cyber Bullying
               2.  Noori is a simple girl from a village. She is not very aware of cybercrimes. One day she noticed that her Facebook profile
                  had been changed by someone. She further noticed that certain messages asking for financial help were posted from her
                  account. What should Noori do?
             Ans:  Noori should immediately inform the Cybercrime Cell and post a message to her friends that her account has been hacked.




                                                     Assessment


            A.  Multiple Choice questions
               1.  Which of the following is NOT given legal recognition by IT Act?
                  a.  Digital signatures
                  b.  Transactions made using the Internet and digital devices
                  c.  Transactions done in cash
                  d.  Transactions made through ATMs
               2.  Which of the following is a weak password?
                  a.  Jackie (Your pet’s name)   b. 1HellO#4      c. MySchool#1982      d. CLGTP1234@
               3.  Which of the following is not an example of Cyber Crime,  according to IT Act 2000?
                  a.  Logging in to your father’s account, without his knowledge.
                  b.  Posting defamatory comments on social media about a person.
                  c.  Downloading and installing Office 365 from www.microsoft.com.
                  d.  Installing a pirated software from your friend’s pen drive.
               4.  Which of the following is NOT a legal offense according to IT Act 2000?
                  a.  Copyright infringement
                  b.  Patent registration
                  c.  Trademark infringement
                  d.  Plagiarism
               5.  Which of the following does NOT protect Intellectual Rights?
                  a.  Copyrights           b. Patents             c. Trademarks         d. Antivirus
               6.   Which of the following deals with  public licences for intellectual property?
                  a.  Open Office          b. Creative commons    c. Microsoft          d. Google
               7.  Which of the following is NOT an example of free and open source software?
                  a.  Libre Office         b. Edge                c. Ubuntu             d. Python

            B.  State whether the following statements are True or False:
               1.  Source code is available for software that has an open-source license.                  _________
               2.  Cybercrime is an unlawful act when the computer is used as a tool but not a target.     _________
               3.  The websites that use HTTP are safer than those that use HTTPS.                         _________
               4.  One should agree to accept cookies for all websites.                                    _________


                                                                                          Society, Law and Ethics  365
   362   363   364   365   366   367   368   369   370   371   372