Courses
Courses for Kids
Free study material
Offline Centres
More
Store Icon
Store

NCERT Solutions for Class 11 Computer Science Chapter 11 Societal Impact

ffImage
banner

Stepwise Answers and Key Concepts for Societal Impact Class 11

Get ready to master NCERT Solutions for Class 11 Computer Science Chapter 11 Societal Impact! Here, you’ll find the latest stepwise answers for CBSE 2025–26, making complex topics easier and exam prep stress-free.


Our exercise-wise solutions, key definitions, and free PDF help you structure perfect answers—just like CBSE expects. Focus on scoring criteria and include the important terms for every question in your revision.


Download the Societal Impact Class 11 NCERT Solutions PDF to revise anytime. With clear guidance and handy marking-scheme tips, you’re all set to boost your confidence and score higher in the exams!


Stepwise Answers and Key Concepts for Societal Impact Class 11

NCERT Solutions for Computer Science Chapter 11 Societal Impact (2025-26)

  1. After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime? Justify your answer.
    a) Hacking
    b) Identity theft
    c) Cyber bullying
    d) Plagiarism
    Answer: b) Identity theft.
    Revaan used Atharv’s account pretending to be him, which is identity theft. Since he sent inflammatory messages, it can also be cyber bullying, but the main crime is using someone else's identity illegally.
  2. Rishika found a crumpled paper under her desk. It contained Garvit’s email ID and password. What is ethically correct for Rishika to do?
    1. Inform Garvit so that he may change his password.
    2. Give the password of Garvit’s email ID to all other classmates.
    3. Use Garvit’s password to access his account.
    Answer: (a) Inform Garvit so that he may change his password.
  3. Shaurya adds “Prepared by Shaurya” to a downloaded video clip and emails it to Suhana. This act is an example of:
    a) Fair use
    b) Hacking
    c) Copyright infringement
    d) Cyber crime
    Answer: c) Copyright infringement.
    Adding one’s own name to someone else’s work without permission is copyright infringement.
  4. After a fight with your friend, which of the following is not cyber bullying?
    1. You sent an email to your friend with a message saying “I am sorry”.
    2. You sent a threatening message to your friend saying “Do not try to call or talk to me”.
    3. You created an embarrassing picture of your friend and uploaded on your account on a social networking site.
    Answer: (a) You sent an email to your friend with a message saying “I am sorry”.
    This is not cyber bullying; the other options are.
  5. Sourabh downloads web pages and images for project on “Digital India Initiatives”. Which steps are plagiarism or copyright infringement? Give justification.
    1. He read a paragraph and rephrased it in his own words and pasted it.
    2. He downloaded images and made a collage for his project.
    3. He downloaded “Digital India Initiative” icon and used it on the front page of project.
    Answer:
    • (a) Not plagiarism, as he rephrased in his own words.
    • (b) May be copyright infringement if images are protected and source not cited or permission not taken.
    • (c) Using official icons/logos without permission is copyright/trademark infringement.
  6. Match the following:
    Plagiarism — Copy and paste information from the Internet into your report and then organise it
    Hacking — Breaking into computers to read private emails and other files
    Credit card fraud — Fakers, by offering special rewards or money prize, asked for personal information, such as bank account info
    Digital Footprint — The trail that is created when a person uses the Internet.

    Questions Answer
    Plagiarism Copy and paste information from the Internet into your report and then organise it
    Hacking Breaking into computers to read private emails and other files
    Credit card fraud Fakers, by offering special rewards or money prizes, asked for personal information, such as bank account info
    Digital Footprint The trail that is created when a person uses the Internet

  7. You got an SMS from your bank querying a transaction.
    a) Will you SMS your pin to the given contact?
    b) Will you call the bank helpline to recheck?
    Answer:
    a) No, you should never share your PIN or sensitive information through SMS.
    b) Yes, you should call the official bank helpline to confirm the authenticity of the message.
  8. Preeti deleted her birthday photos from a social network, but Himanshu still forwarded the photo to Gayatri.
    a) How could Himanshu access a deleted image?
    b) Can anybody else access these deleted images?
    c) Had these images not been deleted from my digital footprint?
    Answer:
    • a) Himanshu may have saved/downloaded the image before it was deleted, or had access via backup or cached data.
    • b) Yes, if someone saved or downloaded the image earlier or if the platform retains it on servers.
    • c) Deleted images may persist in your digital footprint on the server or via others who accessed them.
  9. A suspicious email (about expiring wifi password) was mailed to students.
    a) Do you find any discrepancy in this email?
    b) What happens if a student clicks the URL?
    c) Is the email an example of cyber crime? If yes, specify type and justify.
    Answer:
    • a) The email is suspicious, possibly not from an official source, and may contain fake/bad links.
    • b) Clicking the URL might lead to phishing—stealing personal data or installing malware.
    • c) Yes, it's a cyber crime—more specifically, phishing/fraud email.
  10. You surf the internet for vacation – which actions have created a digital footprint? Answer:
    • Visiting travel websites
    • Booking tickets online
    • Searching for destinations
    • Posting/reviewing on travel forums/social media
    All these leave a digital record behind.
  11. How would you recognise if your friend is being cyber bullied? What provisions are in IT Act 2000 (amended in 2008) to combat such situations?
    Answer:
    • Signs: friend appears withdrawn, upset after using the Internet, changes in mood or social behaviour, receives threatening/abusive messages.
    • IT Act: Provides for penalties and legal action against cyber bullying, the right to file a complaint in cyber cell/police station.
  12. Differences:
    1. Copyrights and Patents
      Answer:
      Copyrights protect creative works (books, music, software); patents protect inventions or processes. Copyright is automatic; patent requires registration.
    2. Plagiarism and Copyright infringement
      Answer:
      Plagiarism: Presenting others' ideas as your own (ethical issue). Copyright infringement: Using others' work without permission (legal issue).
    3. Non-ethical hacking and Ethical hacking
      Answer:
      Non-ethical hacking: Unauthorized and malicious breach for harm. Ethical hacking: Authorized breach for security testing.
    4. Active and Passive footprints
      Answer:
      Active: Data you intentionally provide online. Passive: Data you leave unknowingly, e.g., browsing history.
    5. Free software and Free and open source software
      Answer:
      Free software: No cost but may not provide source code. FOSS: Free plus source code is open for modification.
  13. If you use a short text from an article on web, what steps must you take to credit the source?
    Answer: Mention the source/author, use quotation marks if directly copied, and provide a reference or citation.
  14. How will you find pictures available in free public domain for your project?
    Answer: Use websites like Wikimedia Commons, Pixabay, Unsplash, or search for images labeled for reuse/public domain with clear licensing information.
  15. Why is it important to secure your wireless router at home? Create an imaginary password. Will you share it with:
    a) Parents
    b) Friends
    c) Neighbours
    d) Home Tutors
    Answer: To prevent unauthorized access, misuse or data theft.
    Imaginary password: Jx7!iTg2
    Share only with parents and trusted home tutors if necessary, not with friends or neighbours.
  16. What steps should you take to ensure:
    1. your computer is in good working condition
      Answer:
      • Regular cleaning
      • Safe from heat/moisture
      • Avoid food/drinks near devices
    2. smart and safe Internet surfing
      Answer:
      • Use strong passwords
      • Avoid suspicious links/sites
      • Keep antivirus updated
  17. What is data privacy? What information do websites collect about you?
    Answer: Data privacy means safeguarding your personal, sensitive information from unauthorized access. Websites collect information like name, email, location, IP address, browsing habits, cookies, and purchase history.
  18. Difference between technologies used by Sunil (Google Chrome, Google Docs) and Jagdish (Mozilla Firefox, Libre Office Writer).
    Answer: Sunil uses proprietary (Google) cloud-based tools (Chrome browser, Docs for word processing). Jagdish uses open source alternatives (Firefox browser, Libre Office Writer for word processing).
  19. Cite examples of being a victim of identity theft or credit card theft. What does the IT Act say about it?
    Answer:
    • Example: Someone using your card to buy items without your consent, or accessing your account to impersonate you.
    • IT Act: Treats identity theft and fraudulent transactions as punishable offences; offenders can be legally prosecuted.
  20. Which email etiquettes are missing in Neerja's email to her teacher? a) Subject b) Greeting c) Terms d) Identity e) Regards
    Answer: Subject, Greeting, Regards, and possibly clear identification (identity) if not signed.
  21. List health points Sumit’s father should discuss with him regarding excessive laptop usage.
    Answer:
    • Maintain correct posture (ergonomics)
    • Take regular breaks, limit screen time
    • Protect eyes from strain (20-20-20 rule)
    • Balance online and offline activities
    • Avoid eating/drinking near devices

Understanding Societal Impact in Computer Science

NCERT Solutions for Computer Science Chapter 11 Societal Impact help students master important concepts like digital footprint, data protection, and cyber crime. Grasping these topics is key to excelling in board exams and navigating today’s digital world responsibly.


Chapter 11 covers vital subjects such as safeguarding privacy, understanding cyber laws, and healthy internet habits. Practicing the exercise-based solutions will boost your confidence in solving case study and real-life application questions in Computer Science exams.


For best results, revise each topic on NCERT Solutions Computer Science Chapter 11 Societal Impact regularly and follow the guidelines for secure online behaviour. This will help you achieve high marks and stay ahead in your academic journey.


FAQs on NCERT Solutions for Class 11 Computer Science Chapter 11 Societal Impact

1. What are NCERT Solutions for Class 11 Computer Science Chapter 11 Societal Impact?

NCERT Solutions for Class 11 Computer Science Chapter 11 Societal Impact provide stepwise answers to all intext and back exercise questions, following the CBSE marking scheme. These include:

  • Detailed stepwise solutions for each exercise question
  • Key definitions, diagrams, and important points for revision
  • Exam-oriented presentation to help score full marks
  • Practice with MCQ, short, and long answer formats

2. How can I write stepwise NCERT answers to score full marks in Chapter 11 Societal Impact?

To score full marks in Class 11 Computer Science Chapter 11 Societal Impact answers, follow these steps:

  • Start with a clear introduction or definition using textbook terms
  • Break the answer into points or steps, adding bullets or numbering
  • Include diagram or example where required, labelled neatly
  • End the answer with a short conclusion or summary
  • Highlight key words and phrases as per CBSE style

3. Which questions are frequently asked from Societal Impact Class 11 in school exams?

Commonly asked questions from Societal Impact Class 11 in school exams include:

  • Definitions like e-waste, digital footprint, cyber safety
  • Short notes on IT Act, privacy, plagiarism, copyright
  • Difference between open source and proprietary software
  • List advantages and disadvantages of IT in society
  • Case-based, scenario Qs on cyberbullying and netiquettes

4. Are diagrams or definitions mandatory in NCERT answers for this chapter?

Including definitions and diagrams as per question requirement in Societal Impact Class 11 answers is recommended:

  • Definitions must be precise for key terms and usually fetch direct marks
  • Diagrams, flowcharts, or tables can enhance clarity and earn extra marks (especially for lists/processes)
  • Follow marking scheme by reading all parts of the question carefully

5. How should I structure long answers in Computer Science Chapter 11 for better marks?

For long answers in Computer Science Chapter 11, use this structure:

  • Start with a clear introduction/definition
  • Divide your answer into headings and sub-points
  • Use numbered or bulleted lists for clarity
  • Incorporate relevant examples, diagrams, or real-life cases
  • Write a conclusion/summary linking back to main themes

6. Where can I download the NCERT Solutions Computer Science Chapter 11 Societal Impact PDF?

You can download NCERT Solutions Computer Science Chapter 11 Societal Impact PDF for free from most trusted educational websites. Look for:

  • Free PDF download buttons on chapter solution pages
  • Available with stepwise, exam-aligned answers
  • Also includes revision notes and MCQ practice

7. Are NCERT solutions enough for scoring well in Class 11 Computer Science exams?

NCERT solutions are essential and sufficient for strong exam performance in Class 11 Computer Science:

  • Covers all concepts as per the CBSE syllabus
  • Provides exam-style answers and examples
  • Helps understand marking pattern and step distribution
  • Use alongside exemplar Qs and sample papers for extra practice

8. What are key topics covered in NCERT Solutions Computer Science Chapter 11 Societal Impact?

Major topics in Class 11 Computer Science Chapter 11 Societal Impact include:

  • E-waste, privacy, and data protection
  • IT Act and Cyber Laws
  • Digital society and digital divide
  • Cyber safety, security, malware, netiquettes
  • Plagiarism, copyright, and open source vs proprietary software

9. How do I revise Societal Impact Class 11 quickly before exams?

To revise Societal Impact Class 11 quickly:

  • Read chapter summaries and key notes
  • Practice NCERT exercise and MCQ questions
  • Memorise definitions, important acts, and case studies
  • Revise with free PDF solution downloads

10. How does CBSE evaluate stepwise answers for Class 11 Computer Science Societal Impact?

CBSE awards marks in stepwise fashion for each part of the answer in Class 11 Computer Science Societal Impact:

  • Each correct point or step scores partial marks
  • Key terms, proper structuring, and presentation fetch full marks
  • Diagrams and examples add value where required
  • Even with mistakes in one part, correct steps can get marks

11. Do examiners award partial marks for correct steps even if the final answer is wrong?

Yes, CBSE examiners usually award partial marks for each correct step or point, even if the final answer is not fully accurate. Especially in step-marked questions:

  • Accurate definitions, examples, or diagram labels receive partial credit
  • Only completely irrelevant or missing steps lose marks

12. What are common mistakes to avoid in Societal Impact Class 11 answers?

Common mistakes in Societal Impact Class 11 answers include:

  • Missing out on definitions or supporting examples
  • Writing unclear or incomplete steps
  • Not labelling diagrams or maps properly
  • Ignoring CBSE marking keywords

Avoid these by reviewing stepwise NCERT solutions and marking schemes.