Page 441 - computer science (868) class 11
P. 441

6.  The Clause 2 of the BSD license allows .………………… .
                       a.  Redistributions of source code              b.  Redistributions in binary form
                       c.  Endorsement of software by contributors       d.  Copyright
                    7.  .………………… is used to protect different literacy works such as different computer programs, databases, novels, poems and
                       musical compositions.
                       a.  Copyright                                   b.  Trademark
                       c.  Patent                                      d.  Copyleft
                    8.  .………………… refer to criminal activities where spam email messages are sent to different people to get personal information like
                       usernames, passwords, card details, etc.
                       a.  Fishing                                     b.  Spamming
                       c.  Phishing                                    d.  Password guessing
                    9.  The ………………… is an AR device that helps us focus on the object, by using projectors that display a transparent screen in front
                       of the user.
                       a.   smart glasses                              b.  holographic displays
                       c.  smartphone                                  d.  HUD
                    10.  .………………… offers voice commands, voice searching and voice-activated device controls that allow the user to perform many
                       tasks just by giving commands.
                       a.  Apple’s Siri                                b.  Google cardboard
                       c.  Chatbot                                     d.  LISP

                 B.  Fill in the blanks:
                    1.  A good Anti-spam and Anti-Virus software is required to get rid of ………………… .
                    2.  The ………………… software has to be purchased/taken permission before using.
                    3.  The ………………… is a non-profit trade association created to advance the goals of the software industry and its hardware partners.
                    4.  Any crime that is done via the Internet and by using a Computer/Mobile/Laptop and software is known as a ………………… .
                    5.  The word ………………… means anything that is having or showing a desire to cause harm to others.
                    6.  ………………… allows anyone who redistributes the software, with or without changes, to pass along the freedom to further copy
                       and change it.
                    7.  OSI stands for ………………… .
                    8.  According to FSF freedom 0, this is the freedom to ………………… the software for any purpose.
                    9.  The ………………… malware disguises itself as a legitimate program.
                    10.  The IoT has ………………… platforms that are used to store data collected through IoT devices, for processing or identifying errors
                       within the system.

                 C.  Answer the following questions:
                    1.  What do you understand by the term ‘Intellectual Property’?
                    2.  What are the three types of Intellectual Property Rights?
                    3.  Define Patent.
                    4.  Define Software Piracy. Is it legal or illegal?
                    5.  State four applications of artificial intelligence.
                    6.  What are some of the measures that can be taken to control Software Piracy?
                    7.  Write two applications of IoT.
                    8.  State a few Netiquettes we must observe while using the Internet.
                    9.  Mention and briefly describe two types of Cybercrime that are frequently heard of these days.
                    10.  Write two applications of Virtual Reality.

                 D.  Assertion and Reasoning Based Question.
                    Assertion: Null loop is also known as Endless loop.
                    Reason: A loop that does not contain any statement inside the body of the loop is called Null Loop.
                    (a)  Both Assertion and Reason are true, and Reason is the correct explanation for Assertion.
                    (b)  Both Assertion and Reason are true, but Reason is not the correct explanation for Assertion.
                    (c)  Assertion is true and Reason is false.
                    (d)  Assertion is false and Reason is true.


                                                                                                                       439
                                                                                    Trends in Computing and Ethical Issues  439
   436   437   438   439   440   441   442   443   444   445   446