LET’S
REVIEW Page
no. 66.
Identify the type of cybercrime.
1.
Send
bulky email to an address in a short in short time period.
Answer : Email
bombing.
2.
Stealing
someone’s identity to gain financial advantage.
Answer : Identity
Theft.
3.
Unauthorised duplication of products that are protected by
Intellectual Property Rights .
Answer : Software
Piracy.
EXERCISES Page
no. 73.
A.
Tick the correct answers.
1.
It is a type of internet fraud to gain
sensitive information, such as debit/credit card details and password.
a.
Digital footprint
b. Phishing
c. Trade
secret
Answer
:- ( b. ) Phishing.
2.
Which
one of the following is not a cybercrime?
a.
Harassing someone.
b.
Stealing information
c.
Buying Licensed copy of software
Answer :- ( c. ) Buying Licensed copy of software.
3.
It
is a sign, phrase, word, or symbol that distinguishes the goods and services of
one manufacturer from those of others.
a.
Trademark.
b.
Patent
c.
Copyright
Answer
:- (a. ) Trademark.
4.
It
is a technique used to convert plaintext or digital data from a readable form
to an encoded version.
a.
Encryption
b.
Decryption
c.
Hacking
Answer
:- (a . ) Encryption.
5.
It
customizes the web page of the user as per their personal interests.
a.
Backup
b.
Password
c.
Cookies
Answer
:- (c. ) Cookies
B.
Fill in the
blanks.
1.
Ayn illegal activity committed through the
computer and Internet is called cybercrime.
2.
A cyberstalker is
a person who monitors the targeted person’s online activities.
3.
Ethical hackers are also known as White Hat
hackers.
4.
Passwords are used to authenticate the
user’s access to any device.
5.
Biometric is
a security identification and authentication device.
C. Write T for True and F for
False. Page no. 74.
1. It is unfair to leak a trade secret. Answer : T
2. Cyberstalking is an ethical act. Answer : F
3. Cybersquatting is perpetrated against
business houses. Answer : T
4. VIRUS stands for Vital Information
Resource Under Supply. Answer : F
5. A firewall could be implemented as a
hardware or software. Answer : T
D. Answer the following
questions.
1. What do you understand by computer ethics?
Write any two computer ethics.
Answer : Computer ethics is a
set pf procedures, values, and practices that regulate the use of a computer
connected to the Internet. Some computer ethics are listed below.
v
Never steal anyone’s data or information
v Avoid using pirated or suspicious software.
2. Which are intellectual property right?
Explain any two.
Answer : Intellectual
property rights are the rights given to persons over the creations of their
minds. They usually give the creator an exclusive right over the use of his/her
creation for a certain period of time.
Types of intellectual property rights are—
a)
Copyright
b)
Trademark
c)
Patent
d)
Industrial
e)
Trade secret
Copyright
a) Copyright:
A copyright is a legal term that protect the rights of literary, dramatic,
musical, artistic, and original works.
ü Some
protected works are as follows:
Plays, Songs, software, Novels, Advertisements,
Architectural designs, Moves, Photographs.
ü The
copyright laws provide exclusive rights to the creator/owner, for reproduction,
translation, distribution, and adaptation of his/her work. The owner/creator of
the work can sell these rights by transferring the copyrights ownership. The
time period of copyright protection lasts for the lifetime of an author with
additional 70 years.
b) Trademark: A trademark is a sign, phrase, word, symbol, or design that is capable of identifying and distinguishing goods and services of one manufacturer or seller from that of others. Trademark rights provide protection to logos, brand names, and slogans. A trademark does not expire after a set term of years, if it is being used in commerce.
3. What is an antivirus? What tasks does it
perform?
Answer: Antivirus software is a program or set of
programs that are designed to prevent, search for, detect, and remove software viruses, and
other malicious software like worms, trojans, adware, and more. Antivirus is also known as
amti-malware software.
There are various
antivirus software available in the market. Some popular antivirus software are
Quick Heal, Kaspersky, Norton, McAfee, and AVG Antivirus.
The antivirus software performs the following
tasks:
v Examines files
and programs as they are being opened, accessed, copied or downloaded.
v Scans the
incoming emails with attachments.
v Scans the files
and applications stored in the computer in order to detect viruses
v Remove viruses from the computer.
4. What is Firewall? What role does it play?
Answer: A firewall is a security firmware or software that forms a barrier between
networks to allow and block certain traffic. It inspects traffic so that it can block threats
that might harm your systems. Firewalls are designed to authorize low-risk
traffic that might not harm your network.
Role of Firewall are:-
v
Network Security.
v
Computer Security.
v
Personal Firewall.
5. What are cookies? Give an example.
Answer: A cookie is a small file that is automatically sent by
a website to the end user’s computer through a web browser whenever it is
connected to the same website. Example:
When we revisit an online shopping sit, we will notice
that it automatically picks the data of your last session. Thus, it help us to
recall the products we viewed in your last session and more.
2 Comments
Ch 1
ReplyDeletehttps://draft.blogger.com/blog/post/edit/4055131113809727166/928007789488887000
DeleteIf you have any doubts, Please let me know.