11th Computer science - Book Back Answers - Chapter 17 - English Medium Guides



    Plus One / 11th Computer Science - Book Back Answers - Chapter 17 - English Medium

    Tamil Nadu Board 11th Standard Computer science - Chapter 17: Book Back Answers and Solutions

        This post covers the book back answers and solutions for Chapter 17 – Computer science from the Tamil Nadu State Board 11th Standard Computer science textbook. These detailed answers have been carefully prepared by our expert teachers at KalviTips.com.

        We have explained each answer in a simple, easy-to-understand format, highlighting important points step by step under the relevant subtopics. Students are advised to read and memorize these subtopics thoroughly. Once you understand the main concepts, you’ll be able to connect other related points with real-life examples and confidently present them in your tests and exams.

        By going through this material, you’ll gain a strong understanding of Computer science Chapter 17 along with the corresponding book back questions and answers (PDF format).

    Question Types Covered:

    • 1 Mark Questions: Choose the correct answer, Fill in the blanks, Identify the correct statement, Match the following 
    • 2 Mark Questions: Answer briefly 
    • 3, 4, and 5 Mark Questions: Answer in detail

    All answers are presented in a clear and student-friendly manner, focusing on key points to help you score full marks.

    All the best, Class 11 students! Prepare well and aim for top scores. Thank you!

    Chapter 17 :Computer Ethics And Cyber Security

    I. Choose the correct answer

    1. Which of the following deals with procedures, practices and values?
    a. piracy
    b. programs
    c. virus
    d. computer ethics
    Answer Key:
    d. computer ethics
     
    2. Commercial programs made available to the public illegally are known as
    a. freeware
    b. warez
    c. free software
    d. software
    Answer Key:
     b. warez

    3. Which one of the following are self-repeating and do not require a computer program to attach themselves?
    a. viruses
    b. worms
    c. spyware
    d. Trojans
    Answer Key:
     b. worms

    4. Which one of the following tracks a user visits a website?
    a. spyware
    b. cookies
    c. worms
    d. Trojans
    Answer Key:
     b. cookies

    5.Which of the following is not a malicious program on computer systems?
    a. worms
    d. Trojans
    c. spyware
    d. cookies
    Answer Key:
     d. cookies

    6. A computer network security that monitors and controls incoming and outgoing traffic is
    a. Cookies
    b. Virus
    c. Firewall
    d. worms.
    Answer Key:
    c. Firewall

    7. The process of converting cipher text to plain text is called
    a. Encryption
    b. Decryption
    c. key
    d. proxy server
    Answer Key:
     b. Decryption

    8. e-commerce means
    a. electronic commerce
    b. electronic data exchange
    c. electric data exchange
    d. electronic commercialization.
    Answer Key:
     a. electronic commerce

    9. Distributing unwanted e-mail to others is called.
    a. scam
    b. spam
    c. fraud
    d. spoofing
    Answer Key:
    b. spam

    10.Legal recognition for transactions are carried out by
    a. Electronic Data Interchange
    b. Electronic Data Exchange
    c. Electronic Data Transfer
    d. Electrical Data Interchange
    Answer Key:
    a. Electronic Data Interchange
     

    II. Very Short Answers

    11th computer science

    III. Short Answers

    11th computer science

    IV. Explain in detail

    11th Computer science

     


     

     

     

     







    0 Comments:

    Post a Comment

    Recent Posts

    Total Pageviews

    Code

    Blog Archive