Educational

HSLC Computer Science Solution: Chapter 13 (Societal Impact of Information Technology)

Contents:

 

 

  • Objective Type Questions:

1. Fill in the blanks:

a. Any crime committed using computers and the Internet is called ………………….
ans: cyber crime

b. A …………………. is a person who gains unauthorized access to a computer system for the purpose of stealing and corrupting data.
ans: cracker

c. A …………………. attaches itself to an executable file and infects the computer when it is run.
ans: virus

d. …………………. are programs that run independently and travel from one computer to another across the network.
ans: Computer Worms

e. …………………. is a software designed to prevent, scan, and remove computer viruses.
ans: Antivirus

f. The digital code attached to a message that uniquely identifies a message is called ………………….
ans: digital signature

g. Regular …………………. saves your data from natural disasters.
ans: backup

2. True and False

a. Always scan storage devices before connecting it to your computer.
ans: True

b. Spam is an unsolicited mail sent in bulk.
ans: True

c. You can keep a password same as your own name so that it can be easily remembered.
ans: False

d. In SSL connection, a key icon appears in the address bar of the browser.
ans: False

e. A hacker is a person who gains unauthorized access to a computer system for the purpose of stealing and corrupting data.
ans: True

f. Malware includes computer viruses, worms, Trojan horses, and spyware.
ans: True

g. You should avoid using pirated software in your computer.
ans: True

h. Spyware is a computer program that is installed on a user’s computer with his consent.
ans: False

3. Choose the correct option.

a. A category of software that spies on your computer activities is called
i.spyware
ii. freeware
iii. software
iv. hardware

ans: i.spyware

b. Which one of the following is not malware?
i. virus
ii. worm
iii. Trojan horse
iv.antivirus

ans: iv.antivirus

c. Which one of the following does not cause the spread of a computer virus?
i. downloading files
ii. working with pen drives
iii. e-mail attachment
iv. typing through keyboard

ans: iv. typing through keyboard

d. SSL means
i. Switch Sockets Layer
ii. Secure Sockets Layer
iii. Systematic Sockets Layer
iv. System Sockets Layer

ans: ii. Secure Sockets Layer

e. A digital certificate should contain
i. serial number
ii. validity period
iii. digital signature
iv. all of these

ans: iv. all of these

f. The information security system in e-commerce should meet requirements such as
i. privacy
ii. authentication of sender and recipient
iii. integrity and non-repudiation
iv. all of these

ans: iv. all of these

g. It is a program that appears useful at first sight but is actually programmed to pass the user’s data or access rights to someone else.
i. Virus
ii. Worm
iii. Trojan horse
iv. Spyware

ans: iii.Trojan horse

h. You can take a backup of 100 GB in a/an
i. CD or DVD
ii. pen drive
iii.external hard disk
iv. all of these

ans: iii.external hard disk

  • Descriptive Type Questions

1. Short Answer Questions

a. What is the difference between a virus and a worm?
ans: A virus is a program that attaches itself to other programs in order to alter their behavior, often in a harmful way. Whereas, a worm is a program capable of reproducing and spreading itself to another computer, usually by means of a computer network.

b. Write two advantages of online backup.
ans: Two advantages of online backup:
(a) Data can be restored to any computer online
(b) Data is stored safely at some other place, i.e far away from original data.

c. What is the difference between hackers and crackers?
ans: Hacker is the term used for a computer enthusiast, i.e., a person who enjoys learning programming languages and computer systems, and can often be considered as an expert on the subject. Whereas, Cracker is the term used to refer to an individual who gains unauthorized access to a computer system for the purpose of stealing and corrupting the data.

d. What is a digital certificate?
ans: A digital certificate is a kind of digital code or credential that authenticates the identity of the server.

e. How is a web address starting with https:// different from the one starting with http://?
ans: HTTPS is HTTP with encryption. The only difference between the two protocols is that HTTPS uses SSL to encrypt normal HTTP requests and responses. As a result, HTTPS is far more secure than HTTP.

f. Mention any two uses of ICT in hospitals.
ans: ICT in hospitals is used for:
(a) tests such as CT-Scan, MRI, ultrasound, etc., thereby helping doctors diagnose diseases
(b) assessing patient information, which is easily available online.

g. What is meant by digital divide?
ans: Digital divide is the gap between people who have access to modern information technology, such as mobile phones, computer, Internet, etc., and the knowledge to use them, and people who do not have access and/or the knowledge to use them.
h. Define ICT. What impact does ICT have on society?
ans: ICT is a term used to signify the integration of information technology tools with broadcasting technologies, audio and video processing equipment, and telecommunication equipment.
The rise of ICT has had many positive effects, but it has also divided the world into two halves:
• People who are used to do quite a bit of their personal and professional work on the computer and make use of the Internet extensively as a routine matter. For example, the use of e-banking, e-learning, e-governance sites, etc.
• People who do not have access to a computer and/or the Internet and have no knowledge of using the facilities available on a computer or the Internet.

2. Long answer questions

a. What is the use of an antivirus software? Write any two points.
ans: An antivirus software is a program designed to detect and remove malicious programs, i.e., viruses, worms, and Trojan horses.

b. What is spam? How can you avoid getting spam mail? Write any two points.
ans: Spam refers to any unsolicited and unwanted e-mail. It may carry advertisements or serve as a means of spreading malware such as viruses and worms.
Some ways to avoid spam mail are:
(1) Do not give your e-mail address to unknown people or enter the same at unreliable websites.
(2) Delete spam mails without reading them.

c. Why do we require a password? What are the rules to create a secure password?
ans: We require a password because it provides the first line of defense against unauthorized access to your computer and personal information.
The rules to create a secure password are as follows:
(a) Password Length: We must create a password that is at least 8-10 characters in length. This is because, the large number of characters will make it difficult for an attacker to crack the password. However, keeping the password too long and complex may make it hard to remember. Usually a ten-character password should be sufficiently secure.
(b) Password Complexity: Preferably, a password should contain at least one character from

each of the following groups for it to be a strong one:
• lowercase alphabet letters
• uppercase alphabet letters
• numbers
• special characters
(c) The following should be avoided while creating a password, as they can be easily identified:
Duplicating your user name as your password
Using your own name, a family member’s name, or your date of birth as password.
Consecutive letters of the alphabet (e.g., Imnopq) or consecutive numbers (e.g., 12345)

d. What is cybercrime? Briefly describe any two types of cybercrimes.
ans: Computer crime or cyber crime refers to any crime that involves a computer and the Internet. The term “cyber-crime” was first coined by Barry Collins in 1980’s. Some examples are hacking, sending obscene or offensive messages, harassment through e-mails and Web messages, creating and distributing spam mails, etc.

e. What is the difference between encryption and decryption?
ans: 

Encryption

Decryption

1.

Encryption refers to the process of converting data into code so that unauthorized users cannot access it.

Decryption is the process of converting encrypted data into a human-readable format

2.

It is the method of sending data in the form of secret codes that is not understandable and enables the security of the data.

It is the method of receiving the coded data and converting it again into its original, useful form.

 

f. “Use of e-governance has social and economic impacts”. Justify.
ans: E-governance has a very good impact on economic and social life. It contributes:
a. Delivering government services efficiently.
b. Integrating various standalone systems and services between the government and the citizens.
c.Making government service available to citizens in a convenient, efficient,and transparent manner.

g. What steps can be taken by us to bridge the digital divide?
ans: Steps can be taken by us to bridge the digital gap are:
a. If we have an old computer, provide it to someone who cannot buy one.
b. If we can help someone learn about computers, assist them through demonstrations and by taking computer classes at regular intervals.

 

Interested? Have any questions?

support@ujudebug.com

For more info Call us

+918011624355

Published by

Recent Posts

Understanding the Distinctions Between Product and Brand Marketing

Marketing is a multifaceted discipline, often categorized into various specialized areas to achieve specific goals.…

2 days ago

Revolutionizing Document Management with Digital Portals

In today’s fast-paced business landscape, efficient document management is critical for success. Traditional methods of…

2 days ago

Duplicate Content Penalty: What It Is and How to Avoid It?

Duplicate and plagiarized content works like a Trojan horse. You think it's a blessing, but…

3 weeks ago

TopTierSMM Will Elevate Your Social Media Experience

In today’s fast-paced and dynamic social media environment, having a social media account with high…

4 weeks ago

Beyond Static Websites: Building Interactive Experiences with Progressive Web Apps

In the early days of the web, static websites were common. They presented repetitive material,…

1 month ago

How to Ensure Your Content is Unique Before Publishing it?

Are you ready to publish your work online? Wait a second! Is your content unique…

1 month ago