Page 364 - Computer Science Class 11 Without Functions
P. 364
B. State whether the following statements are True or False:
1. The users can post their comments on videos uploaded on YouTube. _________
2. The information you leave willingly on the Internet is a passive digital footprint. _________
3. The people who follow you on X will be able to see your post in their feeds. _________
4. It is not possible to create private accounts on X. _________
5. We should not accept friend requests from unknown people without verifying their profiles. _________
6. Secretly listening to the conversation of others without their knowledge is an example of eavesdropping. _________
7. The term hacker is always used to refer to unethical hackers. _________
8. A worm is a malicious program that cannot replicate itself. _________
9. Ransomware may be distributed through phishing emails. _________
10. The advertisements generate revenue for developers of a website. _________
11. One should turn on the firewall at all times. _________
12. A cookie is stored only on a web server. _________
13. The person who owns a patent is allowed to sue anyone who uses the patented invention without
their permission. _________
14. A trademark can be obtained only by a business organization. _________
15. A software license states the rights of the developer. _________
C. Fill in the blanks.
1. A ______________is a trail of personal data that one leaves behind while using the Internet.
2. The free version of YouTube includes some interruptions in the form of _________________while watching a video or
listening to audio.
3. The malicious act where illegitimate information is inserted along with authentic data is __________________.
4. A user name on X is known as a _______________.
5. A _______________ is the illicit use of a computer, the Internet, or both to steal, modify, or access electronic data.
6. When someone steals your personal information to commit fraud, it is known as _______________.
7. ____________ is listening in on someone else’s private conversation or conversation with someone without that person’s
permission in order to get information.
8. ____________________ is unsolicited unwanted junk mail sent in bulk for advertising purposes.
9. Any program that is meant to harm your device or your data is _____________.
10. _______________ are viruses that attach themselves to executable files by overwriting a part of their code or appending
their code to the files.
D. Answer the following questions:
1. Differentiate between active and passive digital footprints.
Ans: The information that you leave willingly is known as an active digital footprint while the data that companies collect
without your knowledge or approval is called passive digital footprint.
2. Explain the four-point policy YouTube.
Ans: YouTube has a 4-point policy with four R's:
• Remove the content that violates its policies.
• Reduce the speed of harmful misinformation.
• Raise up the authoritative sources for news.
• Reward trusted creators and artists.
3. Define the following:
a. Phishing
Ans: Phishing is the act of sending a user a phoney email purporting to be from a trustworthy, well-known source, like a bank or
a government agency.
362 Touchpad Computer Science-XI

