Recents in Beach

JESUS & MARY ACADEMY

AI and You STD 7th 2020-2021 CH. 05 Cybercrimes and Cyber Security


     

LET’S REVIEW                                                                                                            Page no. 66.

Identify the type of cybercrime.

1.     Send bulky email to an address in a short in short time period.

Answer : Email bombing.

2.     Stealing someone’s identity to gain financial advantage.

Answer : Identity Theft.

3.     Unauthorised duplication of products that are protected by Intellectual Property Rights .

Answer : Software Piracy.

 

EXERCISES                                                                                                                  Page no. 73.

A.     Tick the correct answers.                                                                        

1.     It is a type of internet fraud to gain sensitive information, such as debit/credit card details and password.

a.     Digital footprint   

b.    Phishing

c.     Trade secret

Answer :- ( b. ) Phishing.

2.     Which one of the following is not a cybercrime?

a.     Harassing someone.         

b.     Stealing information

c.      Buying Licensed copy of software

Answer :- ( c. )  Buying Licensed copy of software.

3.     It is a sign, phrase, word, or symbol that distinguishes the goods and services of one manufacturer from those of others.

a.     Trademark.

b.     Patent

c.      Copyright

Answer :- (a. )  Trademark.

4.     It is a technique used to convert plaintext or digital data from a readable form to an encoded version.

a.     Encryption                        

b.     Decryption

c.      Hacking

Answer :- (a . ) Encryption.

5.     It customizes the web page of the user as per their personal interests.

a.     Backup

b.     Password

c.      Cookies

Answer :- (c. ) Cookies

B.     Fill in the blanks.

1.     Ayn illegal activity committed through the computer and Internet is called cybercrime.

2.     A cyberstalker is a person who monitors the targeted person’s online activities.

3.     Ethical hackers are also known as White Hat hackers.

4.     Passwords are used to authenticate the user’s access to any device.

5.     Biometric is a security identification and authentication device.

 

C.     Write T for True and F for False.                                  Page no. 74.

1.     It is unfair to leak a trade secret. Answer : T

2.     Cyberstalking is an ethical act. Answer : F

3.     Cybersquatting is perpetrated against business houses. Answer : T

4.     VIRUS stands for Vital Information Resource Under Supply. Answer : F

5.     A firewall could be implemented as a hardware or software. Answer : T

 

D.     Answer the following questions.

1.      What do you understand by computer ethics? Write any two computer ethics.

Answer :              Computer ethics is a set pf procedures, values, and practices that regulate the use of a computer connected to the Internet. Some computer ethics are listed below.

v Never steal anyone’s data or information

v Avoid using pirated or suspicious software. 

2.      Which are intellectual property right? Explain any two.

Answer :              Intellectual property rights are the rights given to persons over the creations of their minds. They usually give the creator an exclusive right over the use of his/her creation for a certain period of time.

Types of intellectual property rights are—

a)     Copyright

b)     Trademark

c)     Patent

d)     Industrial

e)     Trade secret

Copyright

a)     Copyright: A copyright is a legal term that protect the rights of literary, dramatic, musical, artistic, and original works.

ü  Some protected works are as follows:

Plays, Songs, software, Novels, Advertisements, Architectural designs, Moves, Photographs.

ü  The copyright laws provide exclusive rights to the creator/owner, for reproduction, translation, distribution, and adaptation of his/her work. The owner/creator of the work can sell these rights by transferring the copyrights ownership. The time period of copyright protection lasts for the lifetime of an author with additional 70 years.

b)     Trademark: A trademark is a sign, phrase, word, symbol, or design that is capable of identifying and distinguishing goods and services of one manufacturer or seller from that of others. Trademark rights provide protection to logos, brand names, and slogans. A trademark does not expire after a set term of years, if it is being used in commerce.

3.      What is an antivirus? What tasks does it perform?

Answer: Antivirus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more. Antivirus is also known as amti-malware software.

There are various antivirus software available in the market. Some popular antivirus software are Quick Heal, Kaspersky, Norton, McAfee, and AVG Antivirus.

 The antivirus software performs the following tasks:

v Examines files and programs as they are being opened, accessed, copied or downloaded.

v Scans the incoming emails with attachments.

v Scans the files and applications stored in the computer in order to detect viruses

v Remove viruses from the computer.

4.      What is Firewall? What role does it play?

Answer: A firewall is a security firmware or software that forms a barrier between networks to allow and block certain traffic. It inspects traffic so that it can block threats that might harm your systems. Firewalls are designed to authorize low-risk traffic that might not harm your network.

Role of Firewall are:- 

v Network Security.

v Computer Security.

v Personal Firewall.

5.      What are cookies? Give an example.

Answer:  A cookie is a small file that is automatically sent by a website to the end user’s computer through a web browser whenever it is connected to the same website. Example:

               When we revisit an online shopping sit, we will notice that it automatically picks the data of your last session. Thus, it help us to recall the products we viewed in your last session and more.

Post a Comment

2 Comments

If you have any doubts, Please let me know.