Courses
Courses for Kids
Free study material
Offline Centres
More
Store Icon
Store

NCERT Solutions For Class 11 Computer Science Chapter 11 Societal Impact - 2025-26

ffImage
banner

Stepwise Answers and Key Concepts for Societal Impact Class 11

Get ready to master NCERT Solutions for Class 11 Computer Science Chapter 11 Societal Impact! Here, you’ll find the latest stepwise answers for CBSE 2025–26, making complex topics easier and exam prep stress-free.


Our exercise-wise solutions, key definitions, and free PDF help you structure perfect answers—just like CBSE expects. Focus on scoring criteria and include the important terms for every question in your revision.


Download the Societal Impact Class 11 NCERT Solutions PDF to revise anytime. With clear guidance and handy marking-scheme tips, you’re all set to boost your confidence and score higher in the exams!


Stepwise Answers and Key Concepts for Societal Impact Class 11

Exercise — Question & Answer


Question:

1. After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime? Justify your answer.

a) Hacking
b) Identity theft
c) Cyber bullying
d) Plagiarism

Answer:

(b) Identity theft. Revaan is impersonating Atharv by using his logged-in account to send messages. That is unauthorized use of someone’s digital identity (identity theft/impersonation). The content may be abusive, but the primary offence described is impersonation, not hacking (no break-in shown) or plagiarism.


Question:

2. Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do?

a) Inform Garvit so that he may change his password.
b) Give the password of Garvit’s email ID to all other classmates.
c) Use Garvit’s password to access his account.

Answer:

(a) Inform Garvit immediately so he can change his password.
Options (b) and (c) violate privacy and constitute unethical/illegal access.


Question:

3. Suhana is down with fever. So she decided not to go to school tomorrow. Next day, in the evening she called up her classmate, Shaurya and enquired about the computer class. She also requested him to explain the concept. Shaurya said, “Mam taught us how to use tuples in python”. Further, he generously said, “Give me some time, I will email you the material which will help you to understand tuples in python”. Shaurya quickly downloaded a 2-minute clip from the Internet explaining the concept of tuples in python. Using video editor, he added the text “Prepared by Shaurya” in the downloaded video clip. Then, he emailed the modified video clip to Suhana. This act of Shaurya is an example of:

a) Fair use
b) Hacking
c) Copyright infringement
d) Cyber crime

Answer:

(c) Copyright infringement. He reused and edited someone else’s video and added his own credit without permission/licence or attribution.


Question:

4. After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying? a) You sent an email to your friend with a message saying that “I am sorry”. b) You sent a threatening message to your friend saying “Do not try to call or talk to me”. c) You created an embarrassing picture of your friend and uploaded on your account on a social networking site.

Answer:

(a) An apology is not bullying. Options (b) and (c) are threatening/harassing or humiliating online behaviour, which are forms of cyberbullying.


Question:

5. Sourabh has to prepare a project on “Digital India Initiatives”. He decides to get information from the Internet. He downloads three web pages (webpage 1, webpage 2, webpage 3) containing information on Digital India Initiatives. Which of the following steps taken by Sourabh is an example of plagiarism or copyright infringement. Give justification in support of your answer.

a) He read a paragraph on “ Digital India Initiatives” from webpage 1 and rephrased it in his own words. He finally pasted the rephrased paragraph in his project.

b) He downloaded three images of “ Digital India Initiatives” from webpage 2. He made a collage for his project using these images.

c) He downloaded “Digital India Initiative” icon from web page 3 and pasted it on the front page of his project report.

Answer:


  • (a) Plagiarism if there is no citation. Paraphrasing still requires crediting the source.

  • (b) Copyright infringement unless the images are licensed for reuse (e.g., CC/public domain) and licence conditions (attribution, share-alike, etc.) are followed.

  • (c) Copyright/trademark infringement unless the icon is free to reuse under stated terms or explicit permission is obtained.


Question:

6. Match the following:

Column A

Column B

Plagiarism

Fakers, by offering special rewards or money prize asked for personal information, such as bank account information

Hacking

Copy and paste information from the Internet into your report

Credit card fraud

The trail that is created when a person uses the Internet

Digital Foot Print

Breaking into computers to read private emails and other files



Answer:

Correct matching:

  1. Plagiarism → Copy and paste information from the Internet into your report and then organise it.

  2. Hacking → Breaking into computers to read private emails and other files.

  3. Credit card fraud → Fakers asking for personal/bank information (a phishing scam leading to card fraud).

  4. Digital Foot Print → The trail that is created when a person uses the Internet.



Question:

7. You got the below shown SMS from your bank querying a recent transaction. Answer the following:

You got the below shown SMS from your bank querying a recent transaction. Answer the following:


a) Will you SMS your pin number to the given contact number?
b) Will you call the bank helpline number to recheck the validity of the SMS received?

Answer:

(a) No. Never share PIN/OTP/password by SMS or phone.

(b) Yes. Call the official bank helpline printed on your card/website (not the number in the SMS) to verify the message.


Question:

8. Preeti celebrated her birthday with her family. She was excited to share the moments with her friend Himanshu. She uploaded selected images of her birthday party on a social networking site so that Himanshu can see them. After few days, Preeti had a fight with Himanshu. Next morning, she deleted her birthday photographs from that social networking site, so that Himanshu cannot access them. Later in the evening, to her surprise, she saw that one of the images which she had already deleted from the social networking site was available with their common friend Gayatri. She hurriedly enquired Gayatri “Where did you get this picture from?”. Gayatri replied “Himanshu forwarded this image few minutes back”. Help Preeti to get answers for the following questions. Give justification for your answers so that Preeti can understand it clearly.

a) How could Himanshu access an image which I had already deleted?
b) Can anybody else also access these deleted images?
c) Had these images not been deleted from my digital footprint?

Answer:

(a) He may have saved/down­loaded/screen-captured it earlier, or accessed it from cached/shared copies.

(b) Yes, anyone who saved/shared it before deletion can still access their copy; some platforms/backups/caches can also persist for a while.

(c) Deleting removes it from your profile, but digital footprints persist through copies, forwards, caches and backups.


Question:

9. The school offers wireless facility (wifi) to the Computer Science students of Class XI. For communication, the network security staff of the school have a registered URL schoolwifi.edu. On 17 September 2017, the following email was mass distributed to all the Computer Science students of Class XI. The email claimed that the password of the students was about to expire. Instructions were given to go to URL to renew their password within 24 hours.

email claimed that the password of the students


a) Do you find any discrepancy in this email?
b) What will happen if the student will click on the given URL?
c) Is the email an example of cyber crime? If yes, then specify which type of cyber crime is it. Justify your answer.

Answer:

(a) Yes—unsolicited urgency, suspicious link, and sender authenticity are red flags (typical of phishing).

(b) The link may open a fake site to steal credentials or download malware.

(c) Yes—this is phishing (a social-engineering cybercrime aimed at credential/identity theft).



Question:

10. You are planning to go for a vacation. You surfed the Internet to get answers for the following queries: a) Weather conditions b) Availability of air tickets and fares c) Places to visit d) Best hotel deals Which of your above mentioned actions might have created a digital footprint?

Answer:

All of them. Every search/visit can log your IP, device details, queries, clicks and, when you book or sign in, personal data—forming your digital footprint.


Question:

11. How would you recognise if one of your friends is being cyber bullied?

a) Cite the online activities which would help you detect that your friend is being cyber bullied?

b) What provisions are in IT Act 2000, (amended in 2008) to combact such situations.

Answer:

(a) Signs: frequent abusive messages/tags/DMs, fake profiles, public shaming posts, exclusion from groups, sudden account/privacy changes, withdrawal/anxiety about going online.

(b) Relevant provisions include: Sec. 66C (identity theft), 66D (cheating by personation via computer), 66E (violation of privacy), 67/67A/67B (publishing/transmitting obscene/sexually explicit material), plus IPC sections (e.g., 354D stalking, 499/500 defamation, 503 criminal intimidation) depending on conduct.


Question:

12. Write the differences between the following- a) Copyrights and Patents A+B b) Plagiarism and Copyright infringement c) Non-ethical hacking and Ethical hacking d) Active and Passive footprints e) Free software and Free and open source software

Answer:


  1. Copyrights vs Patents: Copyright protects creative expression (text, music, code) automatically; patents protect new, useful inventions/technical ideas after examination; copyright bans copying expression, patents ban making/using the claimed invention.

  2. Plagiarism vs Copyright infringement: Plagiarism is an ethical issue—using others’ work without credit. Copyright infringement is a legal issue—using protected work without permission/licence (even with credit) beyond fair use.

  3. Non-ethical vs Ethical hacking: Non-ethical (black-hat) is unauthorized, harmful access. Ethical hacking (white-hat) is authorized testing to improve security, with consent and disclosure.

  4. Active vs Passive footprints: Active: data you deliberately share (posts, forms). Passive: data collected about you automatically (cookies, IP, location, tracking).

  5. Free software vs FOSS: Free Software (FS) emphasizes user freedoms (run, study, modify, share). FOSS (Free and Open-Source Software) combines those freedoms with open development and openly available source code (often used interchangeably; emphasis differs).


Question:

13. If you plan to use a short text from an article on the web, what steps must you take in order to credit the sources used?

Answer:

Use quotation marks for exact text; for paraphrase, still cite. Give author, article title, website/publisher, URL, and access/publish date. Follow any licence terms. Include a references/bibliography section.


Question:

14. When you search online for pictures, how will you find pictures that are available in the free public domain. How can those pictures be used in your project without copyright violations?

Answer:

Filter by usage rights (e.g., “Creative Commons/Public domain”) and use trusted sources (Wikimedia Commons, government sites, Public Domain repositories). Check the licence: if public domain, you may use without permission; for CC licences, follow the conditions (usually attribution; sometimes share-alike/no-derivatives/non-commercial).


Question:

15. Describe why it is important to secure your wireless router at home. Search the Internet to find the rules to create a reasonably secure password. Create an imaginary password for your home router. Will you share your password for home router with following people. Justify your answer.
a) Parents
b) Friends
c) Neighbours
d) Home Tutors

Answer:

Securing Wi-Fi prevents misuse of your connection, protects devices/data, and avoids legal risk.

Strong password rules: long (12–16+ chars), mix of letters/numbers/symbols, no personal words, unique, not reused; enable WPA2/WPA3, change default SSID/admin password, keep firmware updated.

Example password: Lotus!River_92@Door (sample; do not reuse).

Sharing: (a) Parents: Yes (household). (b) Friends: Prefer guest network with time limit. (c) Neighbours: No (privacy/bandwidth/liability). (d) Home Tutors: If needed, guest network only, temporary.


Question:

16. List down the steps you need to take in order to ensure a) your computer is in good working condition for a longer time. b) smart and safe Internet surfing.

Answer:

(a) Good working condition: keep OS/software updated; use antivirus; clean dust and ensure ventilation; avoid liquid/impact; use surge protection/UPS; back up data; manage storage; uninstall bloat; run diagnostics occasionally.

(b) Smart & safe surfing: use strong unique passwords + MFA; beware of phishing; verify URLs/certificates; limit public Wi-Fi or use VPN; adjust privacy settings; clear cookies; download from trusted sites; think before you share.


Question:

17. What is data privacy? Websites that you visit collect what type of information about you?

Answer:

Data privacy is the right/control over how your personal data is collected, used, shared and protected. Sites may collect: name/email/phone, login IDs, IP address, device/browser details, location, cookies/IDs, pages viewed, clicks, search terms, purchase history, and sometimes payment info or demographics.


Question:

18. In the computer science class, Sunil and Jagdish were assigned the following task by their teacher. a) Sunil was asked to find information about “India, a Nuclear power”. He was asked to use Google Chrome browser and prepare his report using Google Docs. b) Jagdish was asked to find information about “Digital India”. He was asked to use Mozilla Firefox browser and prepare his report using Libre Office Writer. What is the difference between technologies used by Sunil and Jagdish?

Answer:

Sunil’s stack (Chrome + Google Docs) is proprietary, cloud/SaaS-based; documents live online and require internet sign-in. Jagdish’s stack (Firefox + LibreOffice Writer) is open-source; LibreOffice runs locally/offline and the software/code is community-maintained with open licences.


Question:

19. Cite examples depicting that you were a victim of following cyber crime. Also, cite provisions in IT Act to deal with such a cyber crime.
a) Identity theft
b) Credit card account theft

Answer:

(a) Identity theft: Someone created a fake social profile in my name and messaged contacts. Laws: IT Act Sec. 66C (identity theft), 66D (cheating by personation); IPC 419/420 for cheating.

(b) Credit card account theft: Unauthorised online purchases using my card details. Laws: IT Act Sec. 66C (unauthorised use of electronic signature/password), 66D (personation), and Sec. 43/66 for unauthorised access; IPC cheating provisions.


Question:

20. Neerja is a student of Class XI. She has opted for Computer Science. Neerja prepared the project assigned to her. She mailed it to her teacher. The snapshot of that email is shown below.

snapshot of that email


Find out which of the following email etiquettes are missing in it. Justify your answer.

a) Subject of the mail
b) Formal greeting
c) Self-explanatory terms
d) Identity of the sender e) Regards

Answer:

Typically missing items in poor emails are: clear subject (e.g., “CS Project – Neerja XI-A”), formal greeting (“Dear Ma’am/Sir”), self-explanatory body (context + attachments named properly), identity/signature (full name, class, roll no.), and courteous closing (“Regards/Thank you”). Any absent element should be corrected.


Question:

21. Sumit got good marks in all the subjects. His father gifted him a laptop. He would like to make Sumit aware of health hazards associated with inappropriate and excessive use of laptop. Help his father to list the points which he should discuss with Sumit.

Answer:

Discuss: maintain ergonomic posture (eye level screen, back supported), 20-20-20 eye breaks, limit screen time (avoid late-night blue light), keep safe viewing distance, use external keyboard/mouse to avoid wrist strain, take regular movement breaks, avoid using on soft surfaces (overheating), ensure good lighting, and balance online time with sleep, study, exercise and offline hobbies.

Understanding Societal Impact in Computer Science

NCERT Solutions for Computer Science Chapter 11 Societal Impact help students master important concepts like digital footprint, data protection, and cyber crime. Grasping these topics is key to excelling in board exams and navigating today’s digital world responsibly.


Chapter 11 covers vital subjects such as safeguarding privacy, understanding cyber laws, and healthy internet habits. Practicing the exercise-based solutions will boost your confidence in solving case study and real-life application questions in Computer Science exams.


For best results, revise each topic on NCERT Solutions Computer Science Chapter 11 Societal Impact regularly and follow the guidelines for secure online behaviour. This will help you achieve high marks and stay ahead in your academic journey.


CBSE Class 11 Computer Science Chapter-wise NCERT Solutions



CBSE Class 11 Computer Science Study Materials

FAQs on NCERT Solutions For Class 11 Computer Science Chapter 11 Societal Impact - 2025-26

1. What are NCERT Solutions for Class 11 Computer Science Chapter 11 Societal Impact?

NCERT Solutions for Class 11 Computer Science Chapter 11 Societal Impact provide stepwise answers to all intext and back exercise questions, following the CBSE marking scheme. These include:

  • Detailed stepwise solutions for each exercise question
  • Key definitions, diagrams, and important points for revision
  • Exam-oriented presentation to help score full marks
  • Practice with MCQ, short, and long answer formats

2. How can I write stepwise NCERT answers to score full marks in Chapter 11 Societal Impact?

To score full marks in Class 11 Computer Science Chapter 11 Societal Impact answers, follow these steps:

  • Start with a clear introduction or definition using textbook terms
  • Break the answer into points or steps, adding bullets or numbering
  • Include diagram or example where required, labelled neatly
  • End the answer with a short conclusion or summary
  • Highlight key words and phrases as per CBSE style

3. Which questions are frequently asked from Societal Impact Class 11 in school exams?

Commonly asked questions from Societal Impact Class 11 in school exams include:

  • Definitions like e-waste, digital footprint, cyber safety
  • Short notes on IT Act, privacy, plagiarism, copyright
  • Difference between open source and proprietary software
  • List advantages and disadvantages of IT in society
  • Case-based, scenario Qs on cyberbullying and netiquettes

4. Are diagrams or definitions mandatory in NCERT answers for this chapter?

Including definitions and diagrams as per question requirement in Societal Impact Class 11 answers is recommended:

  • Definitions must be precise for key terms and usually fetch direct marks
  • Diagrams, flowcharts, or tables can enhance clarity and earn extra marks (especially for lists/processes)
  • Follow marking scheme by reading all parts of the question carefully

5. How should I structure long answers in Computer Science Chapter 11 for better marks?

For long answers in Computer Science Chapter 11, use this structure:

  • Start with a clear introduction/definition
  • Divide your answer into headings and sub-points
  • Use numbered or bulleted lists for clarity
  • Incorporate relevant examples, diagrams, or real-life cases
  • Write a conclusion/summary linking back to main themes

6. Where can I download the NCERT Solutions Computer Science Chapter 11 Societal Impact PDF?

You can download NCERT Solutions Computer Science Chapter 11 Societal Impact PDF for free from most trusted educational websites. Look for:

  • Free PDF download buttons on chapter solution pages
  • Available with stepwise, exam-aligned answers
  • Also includes revision notes and MCQ practice

7. Are NCERT solutions enough for scoring well in Class 11 Computer Science exams?

NCERT solutions are essential and sufficient for strong exam performance in Class 11 Computer Science:

  • Covers all concepts as per the CBSE syllabus
  • Provides exam-style answers and examples
  • Helps understand marking pattern and step distribution
  • Use alongside exemplar Qs and sample papers for extra practice

8. What are key topics covered in NCERT Solutions Computer Science Chapter 11 Societal Impact?

Major topics in Class 11 Computer Science Chapter 11 Societal Impact include:

  • E-waste, privacy, and data protection
  • IT Act and Cyber Laws
  • Digital society and digital divide
  • Cyber safety, security, malware, netiquettes
  • Plagiarism, copyright, and open source vs proprietary software

9. How do I revise Societal Impact Class 11 quickly before exams?

To revise Societal Impact Class 11 quickly:

  • Read chapter summaries and key notes
  • Practice NCERT exercise and MCQ questions
  • Memorise definitions, important acts, and case studies
  • Revise with free PDF solution downloads

10. How does CBSE evaluate stepwise answers for Class 11 Computer Science Societal Impact?

CBSE awards marks in stepwise fashion for each part of the answer in Class 11 Computer Science Societal Impact:

  • Each correct point or step scores partial marks
  • Key terms, proper structuring, and presentation fetch full marks
  • Diagrams and examples add value where required
  • Even with mistakes in one part, correct steps can get marks

11. Do examiners award partial marks for correct steps even if the final answer is wrong?

Yes, CBSE examiners usually award partial marks for each correct step or point, even if the final answer is not fully accurate. Especially in step-marked questions:

  • Accurate definitions, examples, or diagram labels receive partial credit
  • Only completely irrelevant or missing steps lose marks

12. What are common mistakes to avoid in Societal Impact Class 11 answers?

Common mistakes in Societal Impact Class 11 answers include:

  • Missing out on definitions or supporting examples
  • Writing unclear or incomplete steps
  • Not labelling diagrams or maps properly
  • Ignoring CBSE marking keywords

Avoid these by reviewing stepwise NCERT solutions and marking schemes.