Page 542 - ComputerScience_Class_11
P. 542
B. Fill in the blanks.
1. The main aim of artificial intelligence is to enable computers to perform tasks that require ………………….
2. One of the primary components of IoT is …………………, which connects devices over the Internet.
3. The process of redirecting users from legitimate websites to fake ones is called ………………….
4. In phishing attacks, attackers often impersonate legitimate ………………… to steal sensitive information.
5. The ………………… Project was launched by Richard Stallman to promote free software.
Answers
1. Human intelligence 2. Internet Connectivity 3. Pharming 4. Organisations
5. GNU
C. Answer the following questions:
1. What is a major use of AI in social media platforms?
Ans. AI is used to personalise users’ feeds based on their interests and recommend similar content.
2. What is the difference between AR and VR?
Ans. AR adds virtual elements to the real world, whereas VR immerses users in a completely virtual environment.
3. Define software piracy.
Ans. Software piracy refers to the unauthorised copying, distribution or use of software without permission from the copyright owner.
4. Explain the role of chatbots in customer service.
Ans. Chatbots use AI to simulate conversations and assist customers by providing information and resolving issues efficiently.
5. What is the function of the Indian Cyber Crime Coordination Centre?
Ans. The Centre coordinates between various agencies like banks, telecom companies and police to tackle cybercrimes.
6. Explain the procedure of a typical digital arrest scam.
Ans. Fraudsters impersonate law enforcement agencies, falsely accusing the victim of crimes. They use psychological pressure and
fake documents to trick victims into transferring money or providing sensitive information.
7. What are the ethical issues related to the use of AI in daily life?
Ans. Ethical issues include privacy concerns, data security, bias in AI algorithms and the impact on employment due to automation.
8. Discuss the various types of phishing attacks.
Ans. Types of phishing include email phishing, spear phishing, smishing, vishing and whaling. Each uses different mediums like emails,
SMS or phone calls to steal sensitive information.
9. Describe the role of AI in personal assistants like Siri and Google Assistant.
Ans. AI in personal assistants allows for voice recognition, command processing and personalised responses to perform tasks like
setting reminders, controlling smart devices and answering questions.
10. How can software piracy be prevented?
Ans. Prevention can include purchasing licensed software, educating users about piracy, using activation codes and ensuring software
vendors have robust anti-piracy measures.
D. Higher Order Thinking Skills (HOTS)
1. What ethical issues arise from the digital arrest scams, particularly related to privacy violations and psychological manipulation?
How can law enforcement agencies address these ethical concerns while investigating such crimes?
Ans. The ethical issues in digital arrest scams include:
• Privacy violations: Fraudsters access personal information such as banking details and may even manipulate victims into
granting remote access to their devices, violating personal privacy.
540 Touchpad Computer Science (Ver. 3.0)-XI

