Page 368 - Computer Science Class 11 Without Functions
P. 368

5.  Girls in our society are less encouraged to take computer science as a subject.          _________
           6.  Cookies are stored by a website content for long-run purposes.                           _________
           7.  Patent is granted to the inventor for a fixed period.                                    _________
           8.  Telegram is a free chat software with no restrictions on the media size to be exchanged.   _________
        C.  Fill in the blanks.
           1.  A _________________ is a malware that appears desirable and useful but harms the system.
           2.  A cyberattack in which a machine or network resource is rendered unavailable either temporarily or permanently to its
              intended users is called _____________.
           3.  The right that gives the creators of an original and authenticated work the exclusive right to get paid for their creative work
              is called ___________.
           4.  Starting from the date of the patent application, the term of a patent is typically for a duration of ____________years.
           5.  The use of technology to control and limit access to intellectual property is called _____________.
           6.  An agreement between the person who wants to use the software and the company that owns it is called _________.
           7.  The laws against various forms of cybercrime are called __________.
           8.  Electronics that are no longer needed, are broken, or nearing the end of their useful life are called _____________.
           9.  ___________ keyboard is useful for visually impaired students.
        D.  Answer the following questions:
           1.  Define the following:
              a.  Denial of Service
              b.  Plagiarism
              c.  Privacy Law
              d.  Copyright Infringement
              e.  E-waste

           2.  Give any one example of eavesdropping.
           3.  Differentiate between:
              a.  File viruses and macro viruses
              b.  Adware and Spyware
              c.  Copyright and Patent
              d.  Proprietary License and Free and Open Source License
           4.  Give one example for each of the following:
              a.  File Infector Virus
              b.  Worm
              c.  Online plagiarism checker
           5.  Expand the following:
              IPR, DRM, GPL
           6.  How do cookies and cache help in giving you a better browsing experience?
           7.  Give any two characteristics of open data.
           8.  What information does a software license contain for the user?
           9.  Why is a proprietary license also known as a closed-source license?
          10.  Write a short note on Creative Commons.
          11.  Give two examples of free and open-source licenses.
          12.  Explain the various methods to dispose of e-waste.
          13.  How has technology affected our social and cultural set-up? Explain in detail.
          14.  Do you think that girls in our society are not encouraged to pursue technical courses? Give reasons to support your answer.
          15.  Explain the challenges that are faced by differently-abled students in school?

         366   Touchpad Computer Science-XI
   363   364   365   366   367   368   369   370   371   372   373