Use app×
Join Bloom Tuition
One on One Online Tuition
JEE MAIN 2026 Crash Course
NEET 2026 Crash Course
CLASS 12 FOUNDATION COURSE
CLASS 10 FOUNDATION COURSE
CLASS 9 FOUNDATION COURSE
CLASS 8 FOUNDATION COURSE
+3 votes
1.9k views
in Computer by (43.0k points)
closed by

NCERT Solutions Class 11, Computer Science, Chapter- 11, Societal Impact

To gain a strong grasp of the fundamental concepts covered in this chapter and to prepare effectively for CBSE exams and competitive tests, consult the NCERT Solutions provided. Created by experts in the field, these solutions offer a detailed examination of each concept and align with the current CBSE syllabus, ensuring comprehensive preparation.

In these NCERT Solutions for Class 11 Computer Science, we have discussed all types of NCERT intext questions and exercise questions.

Concepts covered in Class 11 Computer Science chapter- 11 Societal Impact, are :

  • Digital Footprint
  • Digital Society and Netizen
  • Data Protection
  • Cyber Crime
  • Indian IT Act
  • Impact on Health

Our NCERT Solutions for Class 11 Computer Science provide detailed explanations to assist students with their homework and assignments. Proper command and ample practice of topic-related questions provided by our NCERT solutions is the most effective way to achieve full marks in your exams. Begin studying right away to ace your exams.

Now, all the solutions and practice questions are readily accessible to help you get started.

3 Answers

+2 votes
by (43.0k points)
selected by
 
Best answer

NCERT Solutions Class 11, Computer Science, Chapter- 11, Societal Impact

Exercise

1. After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime? Justify your answer.

a) Hacking

b) Identity theft

c) Cyber bullying

d) Plagiarism

The correct option is :

(b) Identity theft

Explanation:

Getting another person's personal and financial information and using it to perpetrate fraud, including making unauthorised purchases or transactions, is the crime of identity theft.

2. Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do?

a) Inform Garvit so that he may change his password.

b) Give the password of Garvit’s email ID to all other classmates.

c) Use Garvit’s password to access his account.

The correct option is :

a) Inform Garvit so that he may change his password.

3. Suhana is down with fever. So she decided not to go to school tomorrow. Next day, in the evening she called up her classmate, Shaurya and enquired about the computer class. She also requested him to explain the concept. Shaurya said, “Mam taught us how to use tuples in python”. Further, he generously said, “Give me some time, I will email you the material which will help you to understand tuples in python”. Shaurya quickly downloaded a 2-minute clip from the Internet explaining the concept of tuples in python. Using video editor, he added the text “Prepared by Shaurya” in the downloaded video clip. Then, he emailed the modified video clip to Suhana. This act of Shaurya is an example of:

a) Fair use

b) Hacking

c) Copyright infringement

d) Cyber crime

The correct option is :

c) Copyright infringement

4. After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?

a) You sent an email to your friend with a message saying that “I am sorry”.

b) You sent a threatening message to your friend saying “Do not try to call or talk to me”.

c) You created an embarrassing picture of your friend and uploaded on your account on a social networking site.

The correct option is :

(a) You sent an email to your friend with a message saying that “I am sorry”.

Explanation:

A sort of bullying or harassment that uses technology is known as cyber bullying or cyber harassment. Online bullying also includes cyber bullying and cyber harassment.

5. Sourabh has to prepare a project on “Digital India Initiatives”. He decides to get information from the Internet. He downloads three web pages (webpage 1, webpage 2, webpage 3) containing information on Digital India Initiatives. Which of the following steps taken by Sourabh is an example of plagiarism or copyright infringement. Give justification in support of your answer.

a) He read a paragraph on “ Digital India Initiatives” from webpage 1 and rephrased it in his own words. He finally pasted the rephrased paragraph in his project.

b) He downloaded three images of “ Digital India Initiatives” from webpage 2. He made a collage for his project using these images.

c) He downloaded “Digital India Initiative” icon from web page 3 and pasted it on the front page of his project report.

Solution:

Option (a) and (b) both are examples of plagiarism. Because he uses some other author's work without giving credit to the author.

Option (c) is an example of copyright infringement. Because he downloads an image from the Internet and uses it in our project. But if the owner of the copyright of the image does not permit its free usage, then using such an image even after giving reference to the image in our project is a violation of copyright. Just because it is on the Internet, does not mean that it is free for use. Hence, check the copyright status of the writer’s work before using it to avoid copyright infringement.

6. Match the following:

Column A Column B
Plagiarism Fakers, by offering special rewards or money prize asked for personal information, such as bank account information
Hacking Copy and paste information from the Internet into your report and then organise it
Credit card fraud The trail that is created when a person uses the Internet.
Digital Foot Print Breaking into computers to read private emails and other files

Solution:

Column A Column B
Plagiarism Copy and paste information from the Internet into your report and then organise it
Hacking Breaking into computers to read private emails and other files
Credit card fraud Fakers, by offering special rewards or money prize asked for personal information, such as bank account information
Digital Foot Print The trail that is created when a person uses the Internet.

7. You got the below shown SMS from your bank querying a recent transaction. Answer the following:

phone

a) Will you SMS your pin number to the given contact number?

Solution:

No, I will not SMS my pin number to the given contact number because the bank never asks for such private details.

b) Will you call the bank helpline number to recheck the validity of the SMS received?

Solution:

Yes, I will call the bank helpline number to recheck the validity of the SMS received because it can be fraud so the bank can help to save my account.

8. Preeti celebrated her birthday with her family. She was excited to share the moments with her friend Himanshu. She uploaded selected images of her birthday party on a social networking site so that Himanshu can see them. After few days, Preeti had a fight with Himanshu. Next morning, she deleted her birthday photographs from that social networking site, so that Himanshu cannot access them. Later in the evening, to her surprise, she saw that one of the images which she had already deleted from the social networking site was available with their common friend Gayatri. She hurriedly enquired Gayatri “Where did you get this picture from?”. Gayatri replied “Himanshu forwarded this image few minutes back”.

Help Preeti to get answers for the following questions. Give justification for your answers so that Preeti can understand it clearly.

a) How could Himanshu access an image which I had already deleted?

Solution:

Himanshu may take a copy of that image. Like screenshot, download.

b) Can anybody else also access these deleted images?

Solution:

No, Nobody can access these deleted images.

c) Had these images not been deleted from my digital footprint?

Solution:

No

+2 votes
by (43.0k points)

9. The school offers wireless facility (wifi) to the Computer Science students of Class XI. For communication, the network security staff of the school have a registered URL schoolwifi.edu. On 17 September 2017, the following email was mass distributed to all the Computer Science students of Class XI. The email claimed that the password of the students was about to expire. Instructions were given to go to URL to renew their password within 24 hours.

email

a) Do you find any discrepancy in this email?

Solution:

Yes, the given link in question is different from the link given in the email.

b) What will happen if the student will click on the given URL?

Solution:

If the student will click on the given URL then may be viruses or malware and other things come into the device of students.

c) Is the email an example of cyber crime? If yes, then specify which type of cyber crime is it. Justify your answer.

Solution:

Yes, an email is an example of Cyber Crime. It is a type of email spoofing, here In a spoofing attack, a hacker or malicious individual impersonates another user or device on a network, duping users or systems into believing they are legitimate or authentic.

10. You are planning to go for a vacation. You surfed the Internet to get answers for the following queries:

a) Weather conditions
b) Availability of air tickets and fares
c) Places to visit
d) Best hotel deals

Which of your above mentioned actions might have created a digital footprint?

Solution:

All options above mentioned actions might have created a digital footprint whenever we surfed the Internet.

11. How would you recognise if one of your friends is being cyber bullied?

a) Cite the online activities which would help you detect that your friend is being cyber bullied?

Solution:

Some activities which may help to detect that my friend is being cyberbullied are:

  • Checking his Social Media accounts like Facebook, Twitter, WhatsApp, etc.
  • Checking his Email account like Gmail, yahoo, etc.

b) What provisions are in IT Act 2000, (amended in 2008) to combact such situations.

Solution:

To deal with such menaces, many countries have come up with legal measures for the protection of sensitive personal data and to safeguard the rights of Internet users. The Government of India’s The Information Technology Act, 2000 (also known as IT Act), amended in 2008, provides guidelines to the user on the processing, storage, and transmission of sensitive information. In many Indian states, there are cyber cells in police stations where one can report any cybercrime. The act provides the legal framework for electronic governance by giving recognition to electronic records and digital signatures. The act outlines cyber crimes and penalties for them.

12. Write the differences between the following

a) Copyrights and Patents

Solution:

Copyrights:-

  • Copyright grants legal rights to creators for their original works like writing, photograph, audio recordings, video, sculptures, architectural works, computer software, and other creative works like literary and artistic work.

  • The rights include the right to copy (reproduce) a work, the right to create derivative works based upon it, the right to distribute copies of the work to the public, and the right to publicly display or perform the work.

  • It prevents others from copying, using, or selling the work.

Patents:-

  • A patent is usually granted for inventions. Unlike copyright, the inventor needs to apply (file) for patenting the invention. When a patent is granted, the owner gets an exclusive right to prevent others from using, selling or distributing the protected invention.

  • A patent gives full control to the patentee to decide whether or how the invention can be used by others. Thus it encourages inventors to share their scientific or technological findings with others.

  • A patent protects an invention for 20 years, after which it can be freely used. Recognition and/or financial benefit foster the right environment and provide motivation for more creativity and innovation.

b) Plagiarism and Copyright infringement

Solution:

Plagiarism:

  • Presenting someone else’s idea or work as one’s own idea or work is called plagiarism.

  • If we copy some content from the Internet but do not mention the source or the original creator, then it is considered an act of plagiarism.

  • If someone derives an idea or a product from an already existing idea or product but instead presents it as a new idea, then also it is plagiarism.

  • If we take contents that are open for public use, we should cite the author or source to avoid plagiarism.

Copyright infringement:

  • Copyright infringement is when we use another person’s work without obtaining their permission to use it or we have not paid for it if it is being sold.

  • Anything on the Internet does not mean that it is free for use.

c) Non-ethical hacking and Ethical hacking

Solution:

Non-ethical hacking:

  • A non-ethical hacker is one who tries to gain unauthorized access to computers or networks in order to steal sensitive data with the intent to damage or bring down systems.

  • They are called black hat hackers or crackers.

  • Their primary focus is on security cracking and data stealing.

  • They use their skill for illegal or malicious purposes. Such hackers try to break through system securities for identity theft, monetary gain, to bring a competitor or rival site down, to leak sensitive information, etc.

Ethical hacking:

  • Hacking, when done with positive intent, is called ethical hacking.

  • Such ethical hackers are known as white hat hackers.

  • They are specialists in exploring any vulnerability or loophole during the testing of the software. Thus, they help in improving the security of software.

  • An ethical hacker may exploit a website in order to discover its security loopholes or vulnerabilities. He then reports his findings to the website owner.

  • Ethical hacking is actually preparing the owner against any cyber attack.

d) Active and Passive footprints

Solution:

Active footprints:

  • Active digital footprints include data that we intentionally submit online. This would include emails we write or responses or posts we make on different websites or mobile Apps, etc.

Passive footprints:

  • The digital data trail we leave online unintentionally is called passive digital footprints. This includes the data generated when we visit a website, use a mobile App, browse the Internet, etc.

e) Free software and Free and open source software

Solution:

Free software:

  • Freedom to run programs for any purpose.

  • Freedom to study the program.

  • Freedom to distribute copies of software.

  • Freedom to modify/improve programs and release improvements to the public.

Free and open source software:

  • It has the distribution of licenses.

  • Availability of source code.

  • Free distribution.

  • The integrity of the Author's Source Code.

+2 votes
by (43.0k points)

13. If you plan to use a short text from an article on the web, what steps must you take in order to credit the sources used?

Solution:

I can give the credit by writing the name of the owner or by giving details of the owner.

14. When you search online for pictures, how will you find pictures that are available in the free public domain. How can those pictures be used in your project without copyright violations?

Solution:

If the pictures are downloadable and there is no watermark in the picture then they may be available for the free public domain.

If the picture is in the free public domain then we can use those pictures in the project without copyright violations.

15. Describe why it is important to secure your wireless router at home. Search the Internet to find the rules to create a reasonably secure password. Create an imaginary password for your home router. Will you share your password for home router with following people. Justify your answer.

a) Parents

b) Friends

c) Neighbours

d) Home Tutors

Solution:

It is important to secure your wireless router at home so that an unknown person cannot miss use internet.

  • A strong password consists of at least a lowercase letter, an uppercase letter, a number, and some special characters and must be of tale 8 characters in length.

  • You can share your passwords with anyone whom you can trust. If you trust your friends, neighbors, and home tutors then you can share with them but make sure they don't forward it to someone.

16. List down the steps you need to take in order to ensure

a) your computer is in good working condition for a longer time.

Solution:

Our computer will be in good working condition for a longer time when:

  • We keep our system up-to-date.
  • do not use third-party applications.
  • use antivirus and anti-spyware. etc.

b) smart and safe Internet surfing.

Solution:

  • Use a firewall on the computer.
  • Disconnect from the internet when away.
  • keep your email address private.
  • Disable cookies, if possible.
  • Be careful with email.
  • Use caution when downloading files on the internet.

17. What is data privacy? Websites that you visit collect what type of information about you?

Solution:

Data privacy or information privacy is a branch of data security concerned with the proper handling of data – consent, notice, and regulatory obligations. More specifically, practical data privacy concerns often revolve around: Whether or how data is shared with third parties.

The website usually collects data that can be used to personalize the advertisements so that they can make revenue from those ads. It depends on the type of website and what data they will collect, they may collect your usernames, age, gender, and photos.

18. In the computer science class, Sunil and Jagdish were assigned the following task by their teacher.

a) Sunil was asked to find information about “India, a Nuclear power”. He was asked to use Google Chrome browser and prepare his report using Google Docs.

b) Jagdish was asked to find information about “Digital India”. He was asked to use Mozilla Firefox browser and prepare his report using Libre Office Writer.

What is the difference between technologies used by Sunil and Jagdish?

Solution:

Here Sunil is using free software which is Google Chrome and Google Docs while Jagdish is using free and open source software which is Mozilla Firefox and Libre Office Writer.

19. Cite examples depicting that you were a victim of following cyber crime. Also, cite provisions in IT Act to deal with such a cyber crime.

a) Identity theft

Solution:

Identity theft occurs when someone uses another person's personal information such as name, Adhaar number, driver's license number, credit card number, or other identifying information to take on that person's identity in order to commit fraud or other crimes.

b) Credit card account theft

Solution:

Credit card theft is also a type of identity theft. It occurs when someone accesses your credit card account and uses it to make unauthorized purchases.

20. Neerja is a student of Class XI. She has opted for Computer Science. Neerja prepared the project assigned to her. She mailed it to her teacher. The snapshot of that email is shown below.

email

Find out which of the following email etiquettes are missing in it. Justify your answer.

a) Subject of the mail

b) Formal greeting

c) Self-explanatory terms

d) Identity of the sender

e) Regards

Solution:

The following email etiquettes are missing in the given screenshot:

The subject of the mail: Neerja missed the subject of the mail. This is basically the title of the email. A good email subject convinces readers to open your email.

Formal Greeting: Neerja missed formal greetings which is not a good habit. She can give greetings like:

Hi, sir/mam

Hello, sir/mam

Respected, sir/mam, etc

Self-explanatory terms: Neerja missed self-explanatory terms that the reader cannot understand in the email.

Regards: There should be respectful towards the recipient which is missing in that screenshot.

21. Sumit got good marks in all the subjects. His father gifted him a laptop. He would like to make Sumit aware of health hazards associated with inappropriate and excessive use of laptop. Help his father to list the points which he should discuss with Sumit.

Solution:

List of the points which he should discuss with Sumit impact of excessive use of laptop:

  • Impact of hearing
  • impact on bones and joints
  • Eye problems
  • Sleep issue
  • Mental health issues
  • Physical symptoms
  • Internet addiction disorders
  • Eating irregularities.

Welcome to Sarthaks eConnect: A unique platform where students can interact with teachers/experts/students to get solutions to their queries. Students (upto class 10+2) preparing for All Government Exams, CBSE Board Exam, ICSE Board Exam, State Board Exam, JEE (Mains+Advance) and NEET can ask questions from any subject and get quick answers by subject teachers/ experts/mentors/students.

Categories

...