Tamil Nadu Board 11th Standard Computer science - Chapter 17: Book Back Answers and Solutions
This post covers the book back answers and solutions for Chapter 17 – Computer science from the Tamil Nadu State Board 11th Standard Computer science textbook. These detailed answers have been carefully prepared by our expert teachers at KalviTips.com.
We have explained each answer in a simple, easy-to-understand format, highlighting important points step by step under the relevant subtopics. Students are advised to read and memorize these subtopics thoroughly. Once you understand the main concepts, you’ll be able to connect other related points with real-life examples and confidently present them in your tests and exams.
By going through this material, you’ll gain a strong understanding of Computer science Chapter 17 along with the corresponding book back questions and answers (PDF format).
Question Types Covered:
- 1 Mark Questions: Choose the correct answer, Fill in the blanks, Identify the correct statement, Match the following
- 2 Mark Questions: Answer briefly
- 3, 4, and 5 Mark Questions: Answer in detail
All answers are presented in a clear and student-friendly manner, focusing on key points to help you score full marks.
All the best, Class 11 students! Prepare well and aim for top scores. Thank you!
Chapter 17 :Computer Ethics And Cyber Security
I. Choose the correct answer
a. piracy
b. programs
c. virus
d. computer ethics
Answer Key:
d. computer ethics
2. Commercial programs made available to the public illegally are known as
a. freeware
b. warez
c. free software
d. software
Answer Key:
3. Which one of the following are self-repeating and do not require a computer program to attach themselves?
a. viruses
b. worms
c. spyware
d. Trojans
Answer Key:
4. Which one of the following tracks a user visits a website?
a. spyware
b. cookies
c. worms
d. Trojans
Answer Key:
5.Which of the following is not a malicious program on computer systems?
a. worms
d. Trojans
c. spyware
d. cookies
Answer Key:
6. A computer network security that monitors and controls incoming and outgoing traffic is
a. Cookies
b. Virus
c. Firewall
d. worms.
Answer Key:
7. The process of converting cipher text to plain text is called
a. Encryption
b. Decryption
c. key
d. proxy server
Answer Key:
8. e-commerce means
a. electronic commerce
b. electronic data exchange
c. electric data exchange
d. electronic commercialization.
Answer Key:
9. Distributing unwanted e-mail to others is called.
a. scam
b. spam
c. fraud
d. spoofing
Answer Key:
10.Legal recognition for transactions are carried out by
a. Electronic Data Interchange
b. Electronic Data Exchange
c. Electronic Data Transfer
d. Electrical Data Interchange
Answer Key:
a. Electronic Data Interchange
II. Very Short Answers
11th computer scienceIII. Short Answers
11th computer scienceIV. Explain in detail
11th Computer science
0 Comments:
Post a Comment