“Computer Science” Class 11th CBSE Chapters for Reading
Society, Law and Ethics
Society, law, and ethics in computer science describe how technology interacts with people, rules, and moral values. Together, they ensure that technology is used safely, fairly, and for the benefit of everyone. Understanding these concepts helps individuals use computers responsibly and contribute to a secure and trustworthy digital environment.
- Society includes users and organizations that create and use computers, shaping how technology affects daily life.
- Law refers to legal rules that regulate computer use, prevent cybercrime, and protect data and privacy.
- Ethics involves moral principles that guide responsible behavior, such as honesty, respect for privacy, and avoiding misuse of information.
Digital Footprint
- Digital footprint means collection of data or records generated after any activity
- Done by an individual on internet.
- Now a days Digital Footprint plays an important role in making an Individual’s reputation
- Everyone who is connected to internet has Digital Footprint
- Digital Footprints are permanent
- Digital Footprints are also called Digital tattoos.
Types of Digital Footprint : Active digital footprint and passive digital footprint
Active Digital Footprint
Collection of data or records generated after any activity done intentionally by an individual on internet. Exp-
- Sharing any information on Social Media sites
- Filling Online forms
- login to any type of account such as email, shopping id etc.
- sending and receiving mails
- accepting cookies knowingly
Passive Digital Footprint
Data or records are generated from individual without their knowledge. Exp-
- Turning on Geo location
- cookies installed automatically without concern of user
- like or dislike any activity on social media sites
Digital Society and Netizen
Net Etiquettes
“ Responsible, Safe, positive, legal and ethical use of Internet (digital technology) “
| Do’s | Dont’s |
| Respect other’s Privacy | Do not violate copyright laws. |
| Respect other’s diversity | Respond to Internet Trollers |
| Avoid Cyber Bullying | Spamming |
| Careful while sharing information | Share personal and sensitive information |
| Update credentials regularly | practice unauthentic sites |
| Aware with digital footprint | Use sarcasm |
Digital Communication Etiquette
- Don’t respond to junk mails or spam or any unnecessary mail.
- Avoid including large attachments
- Do not use abusive language during communication
- Avoid using sarcasm.
- Be careful and responsible which making any comment
Social Media Etiquette
- Do not use abusive language during communication
- Beware of fake information
- Be careful and responsible which making any comment
- Do not connect with unknowns
- Keep accounts secured with strong password and update regularly
- Do not meet online, no matter how genuine someone is appearing online.
Data Protection
- Security and control on data stored digitally to avoid any inconvenience, harm, loss, embarrassment and unfairness to an individual.
- Each country has its own data protection law to ensure right protection of data from any changes or breach.
Protective measures of data
- Strong data encryption
- do not share sensitive and personal information
- check your data status regularly
- share information on social media carefully and responsibly and avoid oversharing
- ensure proper security measures for your system
- avoid opening unknown and unauthenticated mails
- avoid unexpected verification calls
- take data backups regularly
- take digital breaks occasionally
Intellectual Property Rights
- Intellectual property refers to the products developed by a person or organization by his own intelligence and idea such as any literary works, inventions, artwork, research, software, information etc.
- Intellectual Property Rights stipulates that the creator has full rights over an intellectual property and can protect it.
- IPR also enables the creator or copyright owner to earn recognition or financial benefit by using their creation or invention.
- Intellectual Property is legally protected through
- Copyrights
- Patents
- Trademarks
Copyright
- It protects form of expression of Idea.
- It protects any original literary, artistic, dramatic, musical, creative work.
- Copyright lasts for 60 years.
- It is automatically granted to creator or authors.
Patent
- It protects functional expression of Idea.
- It protects inventions
- It is applied in Industries, Machines, Processes, manufactures etc.
- It is registered right, which means one need to legally register and get patent from govt agencies.
Trademark
- A trademark is a word, symbol, design, label or phrase that identifies specific product and distinguish it from similar products.
- It should be unique
IPR Violations
It may happen in following ways:
- Plagiarism
- Copyright Infringement
- Trademark Infringement
Plagiarism
- Copying or stealing Intellectual properties without giving credit to its creator or owner.
- Presenting someone else’s idea or work as one’s own idea or work
- Using someone else’s work without giving credit to him/her
- providing incorrect source of information
- using someone else’s work wrongly intended originally something else
- modifying someone else’s work without attributing to creator
How to avoid Plagiarism
- Give credit to creator or owner of intellectual property being used.
- Preset quote of others as it is.
- Paraphrase quotes
- Create own Intellectual properties.
Copyright Infringement
Unauthorized use of copyright protected property without the permission of copyright holder. for example
- using copyright images in your document
- using someone’s song as background in your work
- download movie from unauthorized source
- record TV program and distributing with others
Trademark Infringement
Unauthorized use of Trademark of others in any product or service.
Licensing
- Legal contract or agreement between user and creator permitting to use original creation with limitations
- License provide rules and guidelines for others to use the existing work
- user can get license of copyrighted material by paying some price
Open Source Software and Licensing
Open Source Software (OSS) is software with source code freely available, modifiable, and distributable. Key characteristics include.
- Free to use and distribute.
- Source code is open for modification.
- Community-driven development.
- Examples: Linux, Apache, Firefox.
Software Licensing
- Legal contract or agreement between user and software developer permitting to use and distribute software.
- It’s a legal text document defines that outlines.
- Responsibilities of parties to use software with imposed restrictions.
- End user rights such as installation, warranties etc
- Protection of developer’s intellectual property.
- It ensures source code availability to user or not.
Common Features
- Provides authority to use, distribute, code modification
- Provide source code that can rebuild new version of software
- It encourage developers to improve the design, performance of software so that whole community benefited.
- Public licenses (GNU GPL and CC) also referred as open source license allows users to contribute to existing project without seeking permission from anyone.
GNU General Public License
- GNU GPL is free software license, which provides end users the freedom to run, study, share and modify the software, besides getting regular updates.
- Agencies who distribute GPL license may or may not charge a fee for copies.
- It forces to provide Source code with the software being licensed.
Creative Common
- Creative Common is non-profit organization provides public CC license free of charge.
- CC license is governed by Copyright law.
- CC is used for all kind of creative works like websites, music, film, literature, etc. CC enables the free distribution of an otherwise copyrighted work.
- There are six different Creative Commons licenses: CC BY, CC BY-SA, CC BY-NC, CC BY-ND, CC BY-NC-SA, CC BY-NC-ND.
- CC BY is the most open license.
Apache
Apache is a popular open-source web server software. It hosts websites, handles HTTP requests, and serves content. Key features:
- Cross-platform (Linux, Windows, macOS)
- Highly customizable via modules
- Supports HTTP/1.1 and HTTPS
- Used by millions of websites worldwide.
Cyber Crime
- Any Criminal offence involves the use of computer, Internet ,communication System or digital technology in any which ways.
- Cyber crime can be categorized in two ways
- Crime that targets computer or technology. For exp – Hacking, Phishing, Virus, DoS etc.
- Crime that uses computer or technology. for exp – Identity theft, Cyber bullying, Illegal downloads, Spamming etc.
Types of Cyber Crime
Hacking
- Gaining unauthorized and illegal access of any computer information system with the intention of stealing or damaging that information system.
- Hacking with positive intent is called ethical hacking
- Ethical hackers are also known as White hat hackers
- Hackers practice hacking with negative intentions (Non-ethical) are known as Black hat hackers.
Preventing Hacking
- Install Antivirus in System
- Update System regularly
- Use Secure Wi-Fi
- Keep strong password for accounts and change it frequently
- Avoid clicking and opening unknown and suspicious mails
- Must use authorized software and applications
- Do safe browsing
Phishing
- The illegal process of obtaining sensitive information of a user by impersonating as a legitimate entity is called phishing.
- Phishing is carried out using emails, text messages or phone calls. most commonly email is involved in such illegal activities
- Phishing is practiced to get
- User Credentials
- Social ID
- Bank Details
- Debit/Credit card details
- Personal Info
Prevent Phishing
- Ignore unknown and suspicious mail
- Do not open Unwanted and unknown attachments
- Do not click on suspicious links
- use anti phishing toolbar
- check email timings
Fraud emails
It is also known as phishing emails, are deceptive messages designed to trick recipients into revealing sensitive info or sending money. Watch out for:
- Urgent or threatening tone
- Suspicious sender email
- Requests for personal data or payment
- Spelling/grammar mistakes
Verify sender authenticity before responding.
Eavesdropping
It refers to intercepting and accessing data transmitted over a network without authorization. This can compromise sensitive info like passwords, emails, or financial data. Use encryption (HTTPS, VPNs) to prevent eavesdropping.
Ransomware
It is a type of malware that encrypts a victim’s files and demands a ransom payment in exchange for the decryption key. It often targets individuals, businesses, and institutions, causing significant data loss and financial damage. Paying the ransom does not guarantee that the data will be recovered.
Cyber trolls
These are individuals who post inflammatory or provocative content online to elicit a reaction from others. They often seek attention and try to disrupt online discussions. Blocking or reporting trolls can help manage their impact.
Cyber bullying
It is a form of harassment that occurs through digital means, such as social media, text messages, or emails. It can lead to significant emotional distress for the victim. Incidents of cyber bullying should be reported to the relevant authorities or platform administrators
Preventing Cyber Crime
- Install Antivirus in System
- Update System regularly
- Use Secure Wi-Fi
- Keep strong password for accounts and change it frequently
- Avoid clicking and opening unknown and suspicious mails
- Must use authorized software and applications
- Do safe browsing
- Do not open Unwanted and unknown attachments
- Do not click on suspicious links
- Use anti phishing toolbar
- Do not share your personal info with anyone
- do not browse untrusted websites
- Ignore cookies of unknown sites
- Do online transaction with secured and authentic websites
Cyber safety
It refers to the practices and measures you take to protect yourself from online threats, such as malware, phishing, and cyber attacks. You can ensure cyber safety by being cautious with links, using strong passwords, and keeping software up-to-date to prevent harm.
Safely browsing the web
It involves taking steps to minimize risks while online, such as verifying website authenticity, avoiding suspicious links, and using antivirus software. You should be aware of your online activities and take precautions.
Identity protection
It is the process of safeguarding your personal information, such as your name, address, and financial data, from unauthorized access or theft. You can protect your identity by using strong passwords, monitoring accounts, and being cautious with sharing personal info.
Confidentiality
It refers to the protection of sensitive information, such as financial data or personal communications, from unauthorized access or disclosure. You should use encryption and secure channels to maintain confidentiality online.
Malware
It is software that is designed to harm or exploit your device, data, or network. It can take many forms, including viruses, trojans, and adware, and can cause significant damage if left unchecked.
Viruses
These are a type of malware that replicate and spread to other files, causing damage and disruption to your system. They can be spread through infected downloads, emails, or infected networks, and can be difficult to remove.
Trojans
These are a type of malware that disguise themselves as legitimate software, allowing hackers to gain unauthorized access to your device or data. They can be used to steal sensitive information or install additional malware.
Adware
It is a type of malware that displays unwanted advertisements on your device, often collecting your personal data and browsing habits. It can be installed without your knowledge or consent, and can be difficult to remove.
E-Waste
- E-waste is all about Electronic waste that includes all electrical and electronic gadgets and components that are n longer of use
- Globally, e-waste constitutes more than 5 percent of the municipal solid waste.
- Electronic waste generally contains deadly elements like cadmium, beryllium, mercury etc.
E-Waste Hazard
- Acidification of soil , Air pollution, ground water pollution, landfills with lead and heavy metals, Our Health, Lung Cancer, Asthma, Damage of heart, kidney, Break central, nervous system, DNA damage etc
E-Waste Management
The most popular way to manage e-waste is RRR that is
- Reduce- Try to reduce the consumption of electronic and electrical gadgets as much as possible. Purchase only when needed
- Reuse – it refers to reusing electronic goods instead of throwing it. donate or resell to someone willing to use it
- Recycle – Recycling is the process of conversion of electronic devices into something that can be used again and again in some or the other manner
Indian IT Act
The Information Technology Act, 2000 is a legislation that regulates electronic records, digital signatures, and cybercrime in India. It gives digital signatures the same legal status as physical signatures and defines various cybercrimes, including hacking and data alteration, with associated penalties and fines.
Recent IT (Amendment) Rules, 2025 : It focuses on regulating AI-generated content, deepfakes, and misinformation, with requirements for labelling and verification.
Technology and Society
Technology shapes society by influencing how people communicate, work, learn, and solve problems. Society also shapes technology by via tech design, Cultural values, economic conditions, and government policies.
Technology improves productivity and quality of life, but it also creates challenges such as privacy concerns, digital addiction. People must use technology responsibly to ensure that it benefits everyone.
Gender Issues while Teaching and Using Computers
Gender issues arise when unequal opportunities, biases affect access of computers. Teachers sometimes encourage boys more than girls to explore technology, which reduces girls’ confidence and participation. Society may also expect males to pursue technical skills.
Schools must provide equal access to computers and create an inclusive environment for all genders. Teachers should use gender-neutral language, encourage participation, and highlight female role models in technology.
Disability Issues while Teaching and Using Computers
Disability issues arise when students with physical, sensory, or cognitive impairments face barriers in using computers. Standard devices and software may not meet their needs, which limits their ability to learn effectively.
For example, visually impaired students require screen readers, while hearing-impaired students benefit from captions and visual aids. Teachers must ensure accessibility by using assistive technologies and inclusive teaching methods.
They should design content that all learners can understand and interact with easily. Schools must provide proper infrastructure and support services. So that, they create equal opportunities and empower students with disabilities to participate fully in digital learning environments.