Page 358 - Computer Science Class 11 Without Functions
P. 358

State whether the following statements are True or False:
                   1.  Open data is freely available for download.
                   2.  EULA is the legal definition between the licensor and the licensee.
                   3.  Microsoft Office is an example of Free and Open Source software.
                   4.  Creative Commons License allows the intellectual work to be used without contacting the creator.
                   5.  GPL gives the permission to edit and redistribute the software.
                   6.  Defaming someone online is not a cybercrime.
                   7.  One may not update the operating system but should always update the antivirus regularly.
                   8.  The IT Act 2000 does not validate digital signature.
                   9.  Cyber forensics is also known as computer forensics.



        14.11 Technology and Society

        Information technology has impacted people’s lives and changed how they learn, think, and communicate. People’s
        health has been hurt by the fact that they use technology too much, which makes them less active. IT makes people’s
        lives better, but e-waste is bad for the environment and could be a big problem for the next generation. Further, IT has
        given birth to cybercrimes, a new form of crime.
        14.11.1 E-Waste Management

        Electronic products that are no longer needed, are broken, or have reached the end of their useful lives are called
        “e-waste.” The e-waste includes smartphones, desktops, laptops, hard drives, cables, batteries, routers, switches, and
        hubs which are no longer required. The poisonous substances that are released from the metals as a result of chemical
        reactions in e-waste are harmful to our environment. E-waste management is a holistic approach to remove electronic
        trash from the environment. It aims to reduce, reuse, and recycle electronic waste.
        Proper Disposal of used Electronic Gadgets

        The following methods can be used to dispose off the e-waste:
        Landfills: This is the approach to e-waste disposal that is most frequently used. The e-waste is buried in deep dirt
        trenches. But since e-waste contains dangerous materials such as lead, mercury, and other materials that leak into the
        earth and destroy the soil and underground water, it is not considered a good practice to dispose off e-waste.
        Incineration: The incineration process involves burning e-waste at high temperatures in incinerators. This reduces the
        amount of trash, and the energy that is released can also be used. However, burning e-waste releases toxic chemicals
        that are bad for the environment.
        Acid Bath: In this method, the e-waste is soaked in solutions of sulphuric, hydrochloric, and nitric acids to get the
        metal out. The salvaged metal is then used to make other things. However, acid solutions are difficult to dispose off.
        Releasing acids into water is bad for living beings.
        Mechanical recycling: The most effective and environmentally responsible method is to recycle. In this method, used
        circuit boards, ICs, motherboards, and other parts are taken from e-waste and recycled by dry physical separation.
        A printed circuit board (PCB) recycling machine may be used to separate precious metals like copper, lead, and other
        metals from e-waste.
        14.11.2 Societal Issues and Cultural Changes

        Technology has had a great impact on our social and cultural environment. The technology revolution, especially
        the Internet, has changed everything, from education to entertainment to health to how we celebrate holidays and
        how we talk to our friends, family, and coworkers. While IT has opened up new entertainment options, excessive
        online gaming and other forms of entertainment are bad for our health because they make us less active. IT has also
        introduced new avenues for criminals in the form of cybercrimes.

         356   Touchpad Computer Science-XI
   353   354   355   356   357   358   359   360   361   362   363