Page 307 - Informatics_Practices_Fliipbook_Class12
P. 307
3. The right that gives the creators of an original and authenticated work the exclusive right to get paid for their creative work
is called ____________.
4. Starting from the date of the patent application, the term of a patent is typically for a duration of ____________ years.
5. The use of technology to control and limit access to intellectual property is called ____________.
6. An agreement between the person who wants to use the software and the company that owns it is called ____________.
7. The laws against various forms of cybercrime are called ____________.
8. Electronics that are no longer needed, are broken, or nearing the end of their useful life are called ____________.
9. ____________ keyboard is useful for visually impaired students.
D. Answer the following questions:
1. Define the following:
a. Denial of Service b. Plagiarism c. Privacy Law d. Copyright Infringement
e. E-waste
2. Give any one example of eavesdropping.
3. Differentiate between:
a. File viruses and macro viruses b. Adware and Spyware
c. Copyright and Patent d. Proprietary License and Free and Open Source License
4. Give one example of each of the following:
a. Boot Sector Virus b. File Infector Virus c. Macro Virus d. Worm
e. Online plagiarism checker
5. Expand the following:
IPR, DRM, GPL
6. How do cookies and cache help in giving you a better browsing experience?
7. Give any two characteristics of open data.
8. What information does a software license contain for the user?
9. Why is a proprietary license also known as a closed-source license?
10. Write a short note on Creative Commons.
11. Give two examples of free and open-source licenses.
12. Explain the various methods to dispose of e-waste.
13. Explain the health concerns related to the use of technology.
Assertion Reasoning Based Questions
The following questions are assertion(A) and reasoning(R) based. Mark the correct choice as
a. Both A and R are true and R is the correct explanation of A
b. Both A and R are true and R is not the correct explanation of A
c. A is true but R is false
d. A is false but R is true
1. Assertion(A): Women pursue IT-based courses less often than men.
Reasoning(R): Women have reduced access to IT services and IT education.
2. Assertion(A): Python is a free and open source software.
Reasoning(R): Python can be downloaded free of charge, but the source code cannot be modified.
3. Assertion(A): Malware is a program that aims to hurt a computer, server, client, or network.
Reasoning(R): A computer virus is an example of malware.
Societal Impacts 293

