NCERT Solutions Class 11, Computer Science, Chapter- 11, Societal Impact
Exercise
1. After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime? Justify your answer.
a) Hacking
b) Identity theft
c) Cyber bullying
d) Plagiarism
The correct option is :
(b) Identity theft
Explanation:
Getting another person's personal and financial information and using it to perpetrate fraud, including making unauthorised purchases or transactions, is the crime of identity theft.
2. Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do?
a) Inform Garvit so that he may change his password.
b) Give the password of Garvit’s email ID to all other classmates.
c) Use Garvit’s password to access his account.
The correct option is :
a) Inform Garvit so that he may change his password.
3. Suhana is down with fever. So she decided not to go to school tomorrow. Next day, in the evening she called up her classmate, Shaurya and enquired about the computer class. She also requested him to explain the concept. Shaurya said, “Mam taught us how to use tuples in python”. Further, he generously said, “Give me some time, I will email you the material which will help you to understand tuples in python”. Shaurya quickly downloaded a 2-minute clip from the Internet explaining the concept of tuples in python. Using video editor, he added the text “Prepared by Shaurya” in the downloaded video clip. Then, he emailed the modified video clip to Suhana. This act of Shaurya is an example of:
a) Fair use
b) Hacking
c) Copyright infringement
d) Cyber crime
The correct option is :
c) Copyright infringement
4. After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?
a) You sent an email to your friend with a message saying that “I am sorry”.
b) You sent a threatening message to your friend saying “Do not try to call or talk to me”.
c) You created an embarrassing picture of your friend and uploaded on your account on a social networking site.
The correct option is :
(a) You sent an email to your friend with a message saying that “I am sorry”.
Explanation:
A sort of bullying or harassment that uses technology is known as cyber bullying or cyber harassment. Online bullying also includes cyber bullying and cyber harassment.
5. Sourabh has to prepare a project on “Digital India Initiatives”. He decides to get information from the Internet. He downloads three web pages (webpage 1, webpage 2, webpage 3) containing information on Digital India Initiatives. Which of the following steps taken by Sourabh is an example of plagiarism or copyright infringement. Give justification in support of your answer.
a) He read a paragraph on “ Digital India Initiatives” from webpage 1 and rephrased it in his own words. He finally pasted the rephrased paragraph in his project.
b) He downloaded three images of “ Digital India Initiatives” from webpage 2. He made a collage for his project using these images.
c) He downloaded “Digital India Initiative” icon from web page 3 and pasted it on the front page of his project report.
Solution:
Option (a) and (b) both are examples of plagiarism. Because he uses some other author's work without giving credit to the author.
Option (c) is an example of copyright infringement. Because he downloads an image from the Internet and uses it in our project. But if the owner of the copyright of the image does not permit its free usage, then using such an image even after giving reference to the image in our project is a violation of copyright. Just because it is on the Internet, does not mean that it is free for use. Hence, check the copyright status of the writer’s work before using it to avoid copyright infringement.
6. Match the following:
Column A |
Column B |
Plagiarism |
Fakers, by offering special rewards or money prize asked for personal information, such as bank account information |
Hacking |
Copy and paste information from the Internet into your report and then organise it |
Credit card fraud |
The trail that is created when a person uses the Internet. |
Digital Foot Print |
Breaking into computers to read private emails and other files |
Solution:
Column A |
Column B |
Plagiarism |
Copy and paste information from the Internet into your report and then organise it |
Hacking |
Breaking into computers to read private emails and other files |
Credit card fraud |
Fakers, by offering special rewards or money prize asked for personal information, such as bank account information |
Digital Foot Print |
The trail that is created when a person uses the Internet. |
7. You got the below shown SMS from your bank querying a recent transaction. Answer the following:

a) Will you SMS your pin number to the given contact number?
Solution:
No, I will not SMS my pin number to the given contact number because the bank never asks for such private details.
b) Will you call the bank helpline number to recheck the validity of the SMS received?
Solution:
Yes, I will call the bank helpline number to recheck the validity of the SMS received because it can be fraud so the bank can help to save my account.
8. Preeti celebrated her birthday with her family. She was excited to share the moments with her friend Himanshu. She uploaded selected images of her birthday party on a social networking site so that Himanshu can see them. After few days, Preeti had a fight with Himanshu. Next morning, she deleted her birthday photographs from that social networking site, so that Himanshu cannot access them. Later in the evening, to her surprise, she saw that one of the images which she had already deleted from the social networking site was available with their common friend Gayatri. She hurriedly enquired Gayatri “Where did you get this picture from?”. Gayatri replied “Himanshu forwarded this image few minutes back”.
Help Preeti to get answers for the following questions. Give justification for your answers so that Preeti can understand it clearly.
a) How could Himanshu access an image which I had already deleted?
Solution:
Himanshu may take a copy of that image. Like screenshot, download.
b) Can anybody else also access these deleted images?
Solution:
No, Nobody can access these deleted images.
c) Had these images not been deleted from my digital footprint?
Solution:
No