Approach of NCERT Solutions for Class 11 Computer Science引 Solution to these problemsThe answers to those issues are in this sense: One of the answers might be Orchids International School, which is a pioneer in providing excellent quality resources to students so that they can deal with hard subjects without trouble. One of the important areas in greater importance is class 11 Societal Impact, and molded respectively to it as per our Syllabus are available on chapter 11: Computer science Chapter-Telecommunication systems with an emphasis upon its societal impacts. This chapter is centered largely around the ethical and social repercussions of digital progress. Class 11 computer science chapter 11 pdf You may also view the Following for a digital formatPC that is always readily available and allows students in analyzing concerning societal influences of computing. Consequently, whether it is exam preparation or gaining complete knowledge of a subject, these NCERT Solutions are the key assisting tools that help in building strong concepts and sharpening problem solving skills thereby making students absolutely experience his scholastic journey.
The NCERT Solutions for Class 11 chapter 11 : Societal Impact are tailored to help the students master the concepts that are key to success in their classrooms. The solutions given in the PDF are developed by experts and correlate with the CBSE syllabus of 2023-2024. These solutions provide thorough explanations with a step-by-step approach to solving problems. Students can easily get a hold of the subject and learn the basics with a deeper understanding. Additionally, they can practice better, be confident, and perform well in their examinations with the support of this PDF.
Download PDF
Students can access the NCERT Solutions for Class 11 chapter 11 : Societal Impact. Curated by experts according to the CBSE syllabus for 2023–2024, these step-by-step solutions make Computer-Science much easier to understand and learn for the students. These solutions can be used in practice by students to attain skills in solving problems, reinforce important learning objectives, and be well-prepared for tests.
After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharvs email account. Revaans activity is an example of which of the following cybercrime? Justify your answer.
OPTIONS
a. Hacking
b. Identity theft
c. Cyber bullying
d. Plagiarism
Identity theft
Explanation:
Getting another person's personal and financial information and using it to perpetrate fraud, including making unauthorised purchases or transactions.
Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck-off text was the email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do?
OPTIONS
a. Inform Garvit so that he may change his password.
b. Give the password of Garvit's email ID to all other classmates.
c. Use Garvit's password to access his account.
Inform Garvit so that he may change his password.
Suhana is down with fever. So, she decided not to go to school tomorrow. Next day, in the evening she called up her classmate, Shaurya and enquired about the computer class. She also requested him to explain the concept. Shaurya said, "Mam taught us how to use tuples in python". Further, he generously said, "Give me some time, I will email you the material which will help you to understand tuples in python". Shaurya quickly downloaded a 2-minute clip from the Internet explaining the concept of tuples in python. Using video editor, he added the text "Prepared by Shaurya" in the downloaded video clip. Then, he emailed the modified video clip to Suhana. This act of Shaurya is an example of:
OPTIONS
a. Fair use
b. Hacking
c. Copyright infringement
d. Cyber crime
Copyright infringement
After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?
OPTIONS
a. You sent an email to your friend with a message saying that "I am sorry".
b. You sent a threatening message to your friend saying "Do not try to call or talk to me".
c. You created an embarrassing picture of your friend and uploaded on your account on a social networking site.
d. None of the above
You sent an email to your friend with a message saying that "I am sorry".
Sourabh has to prepare a project on "Digital India Initiatives". He decides to get information from the Internet. He downloads three web pages (webpage 1, webpage 2, webpage 3) containing information on Digital India Initiatives. Which of the following steps taken by Sourabh is an example of plagiarism or copyright infringement? Give justification in support of your answer.
a. He read a paragraph on " Digital India Initiatives" from webpage 1 and rephrased it in his own words. He finally pasted the rephrased paragraph in his project.
b. He downloaded three images of " Digital India Initiatives" from webpage 2. He made a collage for his project using these images.
c. He downloaded the "Digital India Initiative" icon from web page 3 and pasted it on the front page of his project report.
Option (a) and (b) both are examples of plagiarism. Because he uses some other author's work without giving credit to the author.
Option (c) is an example of copyright infringement. Because he downloads an image from the Internet and uses it in our project. But if the owner of the copyright of the image does not permit its free usage, then using such an image even after giving reference to the image in our project is a violation of copyright. Just because it is on the Internet, does not mean that it is free for use. Hence, check the copyright status of the writer's work before using it to avoid copyright infringement.
Preeti celebrated her birthday with her family. She was excited to share the moments with her friend Himanshu. She uploaded
selected images of her birthday party on a social networking site so that Himanshu can see them. After a few days, Preeti had a
fight with Himanshu. The next morning, she deleted her birthday photographs from that social networking site, so that
Himanshu cannot access them. Later in the evening, to her surprise, she saw that one of the images which she had already
deleted from the social networking site was available with their common friend Gayatri. She hurriedly enquired Gayatri "Where
did you get this picture from?". Gayatri replied, "Himanshu forwarded this image a few minutes back".
Help Preeti to get answer to the following question. Give justification for your answer so that Preeti can understand them
clearly.
How could Himanshu access an image which I had already deleted?
One Line Answer
SOLUTION
Himanshu may take a copy of that image. Like screenshot, download.
Preeti celebrated her birthday with her family. She was excited to share the moments with her friend Himanshu. She uploaded selected images of her birthday party on a social networking site so that Himanshu can see them. After a few days, Preeti had a fight with Himanshu. The next morning, she deleted her birthday photographs from that social networking site, so that Himanshu cannot access them. Later in the evening, to her surprise, she saw that one of the images which she had already deleted from the social networking site with their common friend Gayatri. She hurriedly enquired Gayatri "Where did you get this picture from?". Gayatri replied, "Himanshu forwarded this image a few minutes back".
Help Preeti to get the answer to the following question. Give justification for your answer so that Preeti can understand them clearly.
Can anybody else also access these deleted images?
No, Nobody can access these deleted images.
The school offers a wireless facility (wifi) to the Computer Science students of Class XI. For communication, the network security staff of the school has a registered URL schoolwifi.edu. On 17 September 2017, the following email was mass distributed to all the Computer Science students of Class XI. The email claimed that the password of the students was about to expire. Instructions were given to go to the URL to renew their password within 24 hours.
Do you find any discrepancy in this email?
Yes, the given link in question is different from the link given in the email.
The school offers a wireless facility (wifi) to the Computer Science students of Class XI. For communication, the network security staff of the school has a registered URL schoolwifi.edu. On 17 September 2017, the following email was mass distributed to all the Computer Science students of Class XI. The email claimed that the password of the students was about to expire. Instructions were given to go to the URL to renew their password within 24 hours.
What will happen if the student will click on the given URL?
If the student will click on the given URL then there may be viruses or malware and other things that come into the device of students.
The school offers a wireless facility (wifi) to the Computer Science students of Class XI. For communication, the network security
staff of the school has a registered URL schoolwifi.edu. On 17 September 2017, the following email was mass distributed to all
the Computer Science students of Class XI. The email claimed that the password of the students was about to expire.
Instructions were given to go to the URL to renew their password within 24 hours.
Is email an example of cybercrime? If yes, then specify which type of cybercrime is it. Justify your answer.
Admissions Open for 2025-26