Page 369 - Computer Science Class 11 Without Functions
P. 369

Assertion and Reasoning Based Questions


               The following questions are assertion(A) and reasoning(R) based. Mark the correct choice as
               a.  Both A and R are true and R is the correct explanation of A
               b.  Both A and R are true and R is not the correct explanation of A
               c.  A is true but R is false
               d.  A is false but R is true
               1.  Assertion(A):  Women pursue IT-based courses less often than men.
                  Reasoning(R):  Women have reduced access to IT services and IT education.
               2.  Assertion(A):  Python is a free and open source software.
                  Reasoning(R):  Python can be downloaded free of charge, but the source code cannot be modified.
               3.  Assertion(A):  Malware is a program that aims to hurt a computer, server, client, or network.
                  Reasoning(R):  A computer virus is an example of malware.


                   Case Based Questions


               1.  Amarjit has recently purchased a software for his manufacturing unit to manage the inventory. Recently, he received an
                  email stating that his company will not be able to access the software or the data stored suing the software until an amount
                  of 5000 bitcoins is paid. Do you think Amarjit is the victim of a cyber crime?
               2.  Kashvi is a fashion designer. She creates her own designs and uploads them on her blog. Recently, she came to know that
                  one of her competitors has copied her design and sold to one of her clients. Can Kashvi get legal protection? If yes, under
                  which law and what is the punishable offence committed by Kashvi’s competitor?























              Multiple Choice Questions
              1. (b)     2. (d)      3. (d)     4. (b)     5. (d)      6. (b)     7. (c)     8. (d)      9. (c)
              10. (a)    11. (c)     12. (b)    13. (c)    14. (a)     15. (c)    16. (a)    17. (a)     18. (b)
              19. (d)    20. (a)     21. (d)    22. (c)    23. (b)     24. (a)    25. (d)
              True or False
              1. (T)     2. (F)      3. (T)     4. (F)     5. (T)      6. (T)     7. (F)     8. (F)      9. (T)
              10. (T)    11. (T)     12. (F)    13. (T)    14. (F)     15. (T)
              Fill in the blanks
              1. digital footprint   2. advertisements   3. fabrication        4. X handle
              5. computer fraud     6. identity theft    7. Eavesdropping      8. Spam
              9. malware            10. File Infectors



                                                                                          Society, Law and Ethics  367
   364   365   366   367   368   369   370   371   372   373   374