Sunteți pe pagina 1din 12

Chapter

Chapter15
3

Security Issues of IT

A. Multiple choice questions:


1. Programmers that break into secure systems for malicious purpose are
a. Crackers

b. Hackers

c. Breakers

d. Burglars

Ans. b. Hackers
2. A good way to safeguard access to your computers is to ________________ protect it.
a. deadbolt

b. copyright

c. safemode

d. password

c. spam

d. packets

Ans. d. password
3. The electronic equivalent of junk mail is known as
a. adware

b. cyber fraud

Ans. c. spam
4. Copy of data that can be used to restore and recover data is ________________.
a. the copied data

b. backup

c. restoration data d. none of these

Ans. b. backup
5. A program designed to replicate and eat up a computers storage is called
a. Virus

b. Spam

c. Worm

d. Mail

Ans. c. Worm
6. A digital document issued to a site by a certification authority of internet
a. e-code

b. digital certificate

c. digital signature d. digital id

Ans. b. digital certificate


7. To avoid problems while working with internet you should follow this precaution:
a. Install antivirus on your computer

b. Take the backup of your files regularly

c. Do not click on unknown links

d. All of these

Ans. d. All of these


8. A hardware or a software that filters the data that enters a system when connected to a network is called:
a. Filter

b. Encoder

c. Firewall

d. Decoder

Ans. c. Firewall
9. Which among the following is not a Social Networking site?
a. Facebook

b. Google+

c. Twitter

d. Rediffmail

Ans. d. Rediffmail
10. Which among the following refers to the act of copying copyrighted material?
a. Hacking

b. Cracking

c. Piracy

Ans. c. Piracy
68

d. Phishing

B. Fill in the blanks:


1. Malware is the general term to refer to infectious software such as virus, worm, spyware, etc.
2. Trojans is a program that appears harmless but actually performs malicious functions.
3. Spyware is a software that is downloaded onto your computer to track your activities without your
knowledge.
4. Anti-Virus protects a server, a network and an individual PC from attack by viruses from other
systems.
5. Both Pharming and Phishing makes an imposter site look like a genuine site.
6. Shareware is software that is distributed free of cost usually for evaluation but requires to pay in case
it is in continued use after a specific period.
7. Differential backup copies all the files or data that has been changed since the last full backup.
8. Incremental backup allows you to copy only those files which have been altered since the last full
backup.
9. Backup is the act of duplicating documents or databases with the goal that they will be protected if
there should arise an occurrence of equipment failure or other calamity.
10. Quarantine refers to the act of moving infected files to a safe location that is managed by the
antivirus software.
C. State whether the following statements are true or false:
1. Spyware is software that spies on a users activities on computer and reports it.
[True]
2. Backup is duplication of data for restoring purpose at a later time.
[True]
3. To avoid spam never click on links that come from someone you do not know.
[True]
4. Hacker is a person who breaks security with mal-intention to start what we have stored on our
computers.
[False]
5. Local Backups allows various websites to backup your memory.
[False]
6. Browser Hijacker is a malicious program that hijacks your browser.
[True]
7. Phishing refers to the use of electronic messaging systems to send unwanted bulk messages (spam),
especially advertising, indiscriminately.
[False]
8. Spyware programs secretly gather information from the computer it has infected and transmit the
information to a different location.
[True]
9. Mail worms are embedded as an e-mail attachment.
[True]
10. Polymorphic Viruses are made in such a way that makes it almost impossible to detect.
[True]
D. Answer the following questions:
1. State two reasons for having security in a Computer System.
Ans. The reasons for computer security are:

i. It is used to ensure data protections.

ii. It is used to ensure that the computer performs well and gives accessibility to only
authorised persons at any point of time.

2. What is a Virus? Name any two viruses.


Ans. Virus is a program, which is intended to disrupt the normal functioning of the computer
system.
69

Example of viruses-Scotts Valley, Seven Dust.

3. State the difference between Worms and Trojans.


Ans.

Virus
The virus is the program code that attaches
itself to application program and when
application program run it runs along with it.
It inserts itself into a file or executable
program.
It has to rely on users transferring infected
files/ programs to other computer systems.
Infection effect may lead to deletion or
modification of files. Sometimes a virus also
changes the location of files.
The infection speed of virus is slower than
worm.

Worms
The worm is code that replicate itself in order to
consume resources to bring it down.
It exploits a weakness in an application or operating
system by replicating itself.
It can use a network to replicate itself to other
computer systems without user intervention.
Infection usually do not lead to deletion or
modification of files but only monopolize the CPU
and memory.
Infection speed of worm is faster than virus E.g. the
code red worm affected 3 lack PCs in just 14 Hrs.

4. State any three ways through which a computer gets infected.


Ans. The three ways in which a virus can spread in a computer are:

A virus can spread if you are using an infected media like Pen drives, CD, DVD, etc.,
which may have itself got infected from some other computer.

Certain virus may attach itself to other software thus every time you run the software, the
virus replicates by attaching itself to other software.

Your computer may get infected when you boot your computer using an infected media.

5. What is a Boot Sector virus? Give two examples.


Ans. A boot sector virus is a computer virus that infects a storage devices (usually hard disk)
master boot record (MBR). Thus the infected computer is unable to boot.

Example: Brain and Michelangelo

6. How are File viruses different from Macro Viruses?


Ans. File Virus or Parasitic Virus attaches itself to an arbitrary file. Therefore whenever the host
file gets executed the virus also gets executed. Macro Viruses on the other hand uses a
programming language embedded in certain software. Thus a document having the macro
virus when opened gets the macro virus executed.
7. Write short notes on:
a. Multipartite Virus

b. Polymorphic Virus

c. Stealth Virus

Ans. a. Multipartite viruses infect both hard disk sectors along with the executable files. That
is why it is also called multipartite or hybrid virus. These viruses has complex mode of
replicating itself making it difficult to remove. Emperor, Tequilla and Natas are some
examples of these viruses.

b. Polymorphic viruses have the capability of changing itself after infecting a computer. Thus
copies of viruses that are present in the computer may be slightly different from each
other, which make it difficult for anti-virus software to detect and remove it. Satan Bug,
Elkern and Proud are some examples of these viruses.
70

c. Stealth viruses are made in such a way that makes it almost impossible to detect. Even
if they attach itself to a program, the program may appear normal, thus remaining
undetected by any anti-virus software. Whale and Zer Bug are some examples of stealth
viruses.

8. What is a Spamming? State different ways of stopping spamming.


Ans. Spamming refers to the use of electronic messaging systems to send unwanted bulk
messages (spam), especially advertising, indiscriminately. The most widely recognized
form of spam is e-mail (electronic mail) spam. However the term is also applied to similar
abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search
engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging
spam, Internet forum spam, junk fax transmissions, social networking spam, social spam,
television advertising and file sharing spam.

Spamming remains economically viable because advertisers have very little or sometimes
no operating costs beyond the management of their mailing lists, and it is almost impossible
to hold senders accountable for their mass mailings. On the other hand it costs huge to the
sender and may sometime even get dubbed.

9. What is Spyware?
Ans. Spyware programs secretly gather information from the computer it has infected and
transmit the information to a different location. It may be used for identifying user habits
and post advertisements accordingly or sometimes even vital information like username or
passwords may be transmitted.
10. W
 hat is an Anti-Virus Software? Explain three options that you generally get with an AntiVirus software.
Ans. Antivirus software is used to remove viruses and other malware programs from your
computer. It uses two of these techniques to secure your computer.

Scan files for known viruses that match with the virus definition list that is built within
it. But this requires you to continuously update your antivirus software to add new
definition to the list. Otherwise your antivirus software goes obsolete and will not be
able to remove newer viruses.

Identifies suspicious behaviour of a computer program that may had been infected.

Fix: It cleans a file that is infected with a virus.


Quarantine: Certain virus may be too difficult to be removed completely, this virus are
disabled and kept in a safe place so that it cannot infect other files.


Delete: It deletes an infected file along with the virus. Since this option also deletes the
original file which got infected, it should only be used when the previous two options do
not work.

The three options that you generally get with an Antivirus Software are:

11. What does the term Backup mean? Name the different types of Backups.
Ans. Backup is the action of duplicating documents or databases with the goal that they will be
protected if there should arise an occurrence of equipment failure or other calamity. Backup
is typically a routine piece of the operation of huge organizations with centralized servers
and also the administrators of more diminutive business machines.
71

12. How is incremental backup different from differential backup?


Ans. Incremental Backup creates copies of all the files, or parts of files that have changed since
previous backups of any type (full, differential or incremental).

For example if you did a full backup on Sunday. An incremental backup made on Monday,
would only contain files changed since Sunday, and an incremental backup on Tuesday,
would only contain files changed since Monday, and so on.

Differential Backup on the other hand looks at which files have changed since you last did
a full backup. Then creates copies of all the files that are different from the ones in the full
backup. If you do a differential backup more than once, it will copy all the files, or parts of
files that have changed since the last full backup, even if you already have identical copies of
those files in a previous differential backup. For restoring all the data, you will only need the
last full backup, and the last differential backup.

13. Write short notes on:


i. Software Piracy

ii. Cybercrime

Ans. i. The activities involving unauthorized copying, reproduction, use, or manufacture of


software products is called software piracy. Most retail programs are licensed in such a way
that it may be used at just one computer or for use by only one user at any time. Whenever
you buy a software, you become a licensed user rather than an owner and therefore you are
only allowed to make copies of the program for backup purposes, but cannot give copies to
friends and colleagues, which is against the law.

ii. Cybercrime is a term which is used to refer to criminal activity performed using
computers and the Internet. This may include instigating or intimidating someone over
the internet, downloading illegal files and stealing millions of dollars from online bank
accounts. Other offences like creating and distributing viruses and/or malicious code on
other computers or posting confidential business information on the Internet are also part
of cybercrime. Conceivably the most prominent form of cybercrime is using the internet
to steal personal information from other users leading to identity theft. To do this they
usually uses two common methods phishing and pharming.
14. How is hacking different from cracking?
Ans. H
 acking, is the act of stealing personal or private data, without the owners knowledge
or consent, it could also include other things like stealing passwords, creating a bot net,
or pretty much any act that breaches someones privacy, without their knowledge, or
consent. Cracking on the other hand involves editing a programs source code, or creating a
program, like a key generator (more commonly known as a keygen), patch, or some sort of
application that tricks an application in to thinking that a particular process has occurred.
For example, a key generator and a patch for the

Adobe Master Collection would trick the software in to thinking that the key entered is
correct, and not let it verify the key with the Adobe master server. Cracking is pretty much
looking for a back door in software, and exploiting it for malicious use or for a copyright
breaching act.

Thus the difference is that a hacker is someone that uses their extensive knowledge of
computer logic and code for malicious purposes, while a cracker - looks for back doors in
programs, and exploits those back doors. Cracking is generally less harmful than hacking.
Hackers are usually involved with web related hacking, like MySQL interception, or
phishing, other forms of hacking would include things like brute force, or password lifting.
72

15. What is the significance of Digital Certificate?


Ans. A digital certificate is used to verify that a user sending a message is who he or she claims
to be, and to provide the receiver with the means to encode a reply. This is done over the
Internet using the public key infrastructure (PKI).
16. What is data encryption?
Ans. Data Encryption refers to scrambling information and utilizing it to secure data that is
constantly hung on a machine, replicated onto CDs or DVDs or transmitted over a system. It
utilizes innovations, for example, Virtual Private Networks (VPNs) and secure socket layers.
E. Application-based questions:
1. i. Shrinivasan is working for an IT firm where he needs to backup his data of around 200MB
to 400MB at the end of each day. Each day backup needs to be archived separately for future
reference. Suggest any two economic data backup devices, which he can use for this purpose.
Ans. He may either use a portable external hard disk or a pen drive to take backup.
ii. Differentiate between hacker and cracker with reference to their intention and motive.
Ans. Hacking, is the act of stealing personal or private data, without the owners knowledge or consent,
it could also include other things like stealing passwords, creating a bot net, or pretty much any
act that breaches someones privacy, without their knowledge, or consent. Cracking on the other
hand involves editing a programs source code, or creating a program, like a key generator (more
commonly known as a keygen), patch, or some sort of application that tricks an application in to
thinking that a particular process has occurred. For example, a key generator and a patch for the

Adobe Master Collection would trick the software in to thinking that the key entered is correct,
and not let it verify the key with the Adobe master server. Cracking is pretty much looking for a
back door in software, and exploiting it for malicious use or for a copyright breaching act.

Thus the difference is that a hacker is someone that uses their extensive knowledge of
computer logic and code for malicious purposes, while a cracker - looks for back doors in
programs, and exploits those back doors. Cracking is generally less harmful than hacking.
Hackers are usually involved with web related hacking, like MySQL interception, or
phishing, other forms of hacking would include things like brute force, or password lifting.

iii. Name one specific software tool for each of the following categories:
a. Antivirus
b. Data recovery tool c. Online backup tool
Ans. a. QuickHeal
b. Hyper V Recovery Manager from Microsoft

c. Google Drive d. Notepad
2. i. Give any two shortcomings of online purchase.

d. Text editor

Ans. In case you have a spyware, your bank account details may be compromised.

The site may not be authentic and there may be Phishing attack.

ii. What is encryption of data?


Ans. Data Encryption refers to scrambling information and utilizing it to secure data that is
constantly hung on a machine, replicated onto CDs or DVDs or transmitted over a system. It
utilizes innovations, for example, Virtual Private Networks (VPNs) and secure socket layers.
iii. Name one antivirus software/tool.
Ans. Quick Heal
73

Chapter
Chapter16
3

Benefits of ICT

A. Multiple choice questions:


1. The process of using electronic media for learning is called ________________.
a. E-learning

b. Media-Learning

c. Learning

d. Internet

Ans. a. E-learning
2. Which among the following is not a characteristics of E-learning?
a. Learners have the option to choose learning materials that meets their level of knowledge and interest.
b. Learners do not have the flexibility to choose their own time or schedule.
c. Learners have the flexibility to study anywhere they have access to a computer and Internet connection
d. Self-paced learning modules allow learners to work at their own pace.
Ans. b. Learners do not have the flexibility to choose their own time or schedule.
3. Which among the following e-learning sites is most suitable for web designing?
a. www.khanacademy.org

b. http://ocw.mit.edu

c. www.w3schools.com

d. www.math-bridge.org

Ans. c. www.w3schools.com
4. Which among the following is connected to e-health?
a. Health Information

b. Education and Training

c. Health Systems Management

d. All of these

Ans. d. All of these


5. A subsidiary of United Nations(UN) whose objective is to look after international health.
a. CMS

b. eHospital

c. eHealth

d. WHO

Ans. d. WHO
6. Which among the following is not the characteristics of ehealth?
a. It allows methods to access electronic medical records, and the ability

to access information about alternative approaches to medical treatment.

b. Saves on time one of the major constraints of conventional health care services.
c. It improves patient safety a complete overview of clinical and medication history helps to avoid
potential errors and complications.
d. It cannot provide access to specialist care at distant geographic areas.
Ans. d. It cannot provide access to specialist care at distant geographic areas.
7. Which among the following is the national portal of India?
a. india.gov.in

b. nationindia.gov.in

Ans. a. india.gov.in
74

c. india.net.in

d. india.nic.in

8. What is the full form of DeitY?


a. Department of Electronics and Indian Technology
b. Development of Electronics and Information Technology
c. Digital Electronics and information Technology
d. Department of Electronics & Information Technology
Ans. d. Department of Electronics & Information Technology
9. Knowledge Economy combines knowledge and education into a _________________.
a. business Product

b. productive Asset

c. either a or b

d. none of these

Ans. c. either a or b
10. ______________________ refers to the disparity of classification of person according to their
knowledge of ICT and without it.
a. Digital Divide

b. Digital Disparity

c. Developmental Delay d. Digital Unity

Ans. a. Digital Divide


B. Fill in the blanks:
1. In e-learning self-paced learning modules allow learners to work at their own pace.
2. E Health Points are units owned and operated by Health point Services India (HSI) that provide
families in rural villages about various health issues.
3. A health insurance plan sold over the internet is called eHealthInsurance.
4. Using ICT for making government services to every corner of the country 24x7 is called
e-governance.
5. Knowledge Economy refers to the combining of knowledge and education as a product.
6. Virtual schools are also called Cyber schools.
7. A knowledge based society refers to the type of society that is needed to compete and succeed in the
changing economic and political dynamics of the modern world.
8. Infomania refers to those individuals that have compulsive desire to check or accumulate news and
information.
9. Digital Unity refers to the collaboration of people at different geographical location to unite together
10. People living in Remote areas do not get the benefits of e-governance because of the lack of
infrastructure.
C. State whether the following statements are true or false:
1. E-governance has increased the transparency of the government by putting an end in corruption by
removing the middle-men and touts play.
[True]
2. E-governance services are available online and helpful for people having no internet connectivity.
[False]
3. Lack of literacy resulted in lack of awareness, which prevents people from benefitting from
e-governance.

[True]

4. E-health allows methods to access electronic medical records and the ability to access information
about alternative approaches to medical treatment.
[True]
5. WHO in general looks after the finance in United Nations.
75

[False]

6. The E Health Point concept builds upon and combines proven models to achieve unique synergies
and efficiencies.
[True]
7. In e-learning the learners do not choose learning materials.

[False]

8. In e-learning, the user can choose their own flexible timings.

[True]

9. W3Schools is an e-learning sites that has a variety of video lessons for free.

[False]

10. E-learning gives the flexibility to learn as par his own time.
D. Answer the following questions:

[True]

1. How do you think ICT has helped in the field of education?


Ans. In recent years there has been a upsurge in the interest of how ICT can best be harnessed
to improve the efficiency and effectiveness of education at all levels and in both formal and
non-formal settings. Even though, ICT remain at its infancy in most developing nations,
where books or printed media remains the cheapest, most accessible and therefore most
dominant delivery mechanism. Thus developing countries, like India combine the use of
print, recorded audio and video, broadcast radio and television, and audio-conferencing
technologies to cater to the need of education.
2. What is e-learning? Mention names of two sites that provide e-learning for free.
Ans. Learning that occurs through electronic media, popularly over the Internet is called
E-learning.

Websites: www.e-learningforkids.org and ocw.umb.edu

3. Give two advantages and disadvantages of e-learning.


Ans. Advantages of e-learning:

i. Learners have the option to choose learning materials that meets their level of knowledge
and interest.

ii. Learners have the flexibility to choose their own time or schedule.

Disadvantages of e-learning:

i. It has been that learners with low motivation or bad study habits may fall behind.

ii. Learners who are more used to with traditional teachers may get lost or confused about
course activities and deadlines.

4. What is E-Health? What are areas in which E-Health encompasses?


Ans. The transfer of health-care resources by electronic means is termed as E-health.

The areas in which E-Health encompasses are:


Health Information: The Internet and telecommunications plays a great role in
delivering health information to health professionals and health consumers.


Education and Training: The education and training of health workers to improve
public health services using the power of IT and e-commerce.


Health Systems Management: Usage of e-commerce and e-business practices in health
systems management.

5. How does ICT help the government in providing health care services? How does such services
help the common man?
76

Ans. The ageing of the population in general has resulted in number of citizens with chronic
diseases increasing, especially among elderly people throughout the world. Coupled with
not proportional amount health care services has made health a major issue for developing
nations. The challenge is to keep both the well-being of the citizens and the public health
care systems proper. Here where

ICT comes into the picture to provide health care solutions that solve much of the problems.

It helps the common man by:

1. It allows methods to access electronic medical records, and the ability to access
information about alternative approaches to medical treatment.

2. Saves on time one of the major constraints of conventional health care services.

3. It improves patient safety a complete overview of clinical and medication history helps
to avoid potential errors and complications.

6. Give two advantages and disadvantages of e-health.


Ans.

Advantages

i. It allows methods to access electronic medical records, and the ability to access
information about alternative approaches to medical treatment.

ii. Saves on time one of the major constraints of conventional health care services.

Disadvantages

iii. Too much of information, might in most situation, lead to confusion.

iv. Since physical presence of the health care consumers is mostly absent, they do not benefit
from the clinical experience of the physician.

7. What is e-governance? Name three sites that provides e-governance.


Ans. E-governance is the application of ICT for transferring of various government services to the
citizens of a country. The services are 247 and not bounded by any geographical region.

Sites:

i. india.gov.in

ii. deity.gov.in

iii. passportindia.gov.in

8. State two advantages and disadvantages of e-governance.


Ans. Advantages of E-governance

i. The efficacy of the administration and service delivery has drastically improved by
E-governance.

iii. Reduced waiting time is one of the benefits of e-governance.

Disadvantages of E-governance

i. People living in remote areas do not get the benefits of e-governance because of the lack
of infrastructure.

ii. Completely computerization of all services is yet to be completed and therefore manual
methods are still prevalent.
77

9. What is Knowledge Economy?


Ans. Knowledge Economy is the combining the knowledge and education based on creating,
evaluating, and trading knowledge. Thus making it a business product and a productive
asset.
10. State three ways in which ICT has affected our society.
Ans. The three ways in which ICT has changed our society are:

i. Knowledge Based Society

ii. Digital Unity


iii. Digital Divide
E. Application-based questions:
1. Mr Surendra is a Medical Representative in Zev Pharmaceuticals. He usually has to make heavy
travelling meeting different doctors and recommending them various medicines. As such he
hardly has much time left for leisure. He loves studies, particularly Chemistry. He had studied
Chemistry during his graduation and left studies after he joined as a Medical Representative.
He wants to pursue his studies in Chemistry.
a. What would you suggest him so that he can pursue his studies, without affecting his current job
profile?
Ans. He can go for any online E-Learning Course.
b. Mention few resources for the above solution.
Ans. MIT site and IGNOU site
2. The primary objective of e-health care is to provide different services related to health to
different people, even to the most remote areas. State three advantages of using e-health care
services. Also state three drawbacks of using such services.
Ans.

Advantages of E-health care services

i. It allows methods to access electronic medical records, and the ability to access
information about alternative approaches to medical treatment.

ii. Saves on time one of the major constraints of conventional health care services.

iii. It improves patient safety a complete overview of clinical and medication history helps
to avoid potential errors and complications.

Disadvantages of E-health care services

i. Too much of information, might in most situation, lead to confusion.

ii. Since physical presence of the health care consumers is mostly absent, they do not benefit
from the clinical experience of the physician.

iii. First time users may sometimes find it difficult to access the health care services.

3. One of the major advantage of using ICT in providing government services to the mass is
e-governance. The efficacy of the administration and service delivery has drastically improved
by e-governance.
a. What is e-governance?
78

b. State at least three ways how it helps common people.


Ans.

a. E-governance is the application of ICT for transferring of various government services


to the citizens of a country. The services are 247 and not bounded by any geographical
region.

b.

i. The efficacy of the administration and service delivery has drastically improved by
E-Governance.

ii. Reduced waiting time is one of the benefits of e-governance.

iii. Citizens that benefit from e-governance does at a minimal cost or no cost at all.

4. In traditional classrooms, it is often important for students to adopt a pace that suits the
classroom, so that no one lags behind others and no one gets too far ahead.
a. What is the alternative to traditional classrooms that takes ICT as its major tool?
b. State three advantages and disadvantages of using such a medium.
Ans.

a. Virtual Schools and E-learning are alternative to traditional classrooms.

b. Advantages:

1. In many cases, virtual schools allow families and educators to evaluate a student and
provide a customized education geared towards helping the student learn and develop.

2. Each child has unique educational strengths, weakness, needs and preferences, and
virtual schooling allows families and educators to address these differences.

3. Adopting an average pace is often important, in such cases, to keeping the flow of
learning consistent and preventing students from becoming bored and frustrated.

Disadvantages:

1. Virtual schools also lack the structure found in traditional schools.

2. They also have difficulties adapting to paper and pencil tests and assignments.

3. They also miss out on personal instruction from teachers as well as classroom
discussion Also, unlike brick and mortar schools, students are not under the constant
supervision of a teacher.

79

S-ar putea să vă placă și