Page 74 - CA_165_V2.0_C9_Flipbook
P. 74

C.  Assertion and Reasoning questions.
                        The following questions consist of two statements – Assertion (A) and Reasoning (R). Answer these
                      questions by selecting the appropriate option given below:
                      i.     Both Assertion (A) and Reason (R) are true and Reason (R) is the correct explanation of Assertion (A).

                      ii.      Both Assertion (A) and Reason (R) are true but Reason (R) is not the correct explanation of Assertion (A).
                      iii.    Assertion (A) is true, but Reason (R) is false.
                      iv.    Assertion (A) is false, but Reason (R) is true.
                      1.   Assertion (A): Using incognito mode prevents websites from tracking users.

                          Reason (R): Incognito mode does not save history, cookies, or login data.
                      2.   Assertion (A): A strong password should contain a mix of characters, numbers, and symbols.

                          Reason (R): A simple password is easier to remember, making it more secure.
                      Ans. 1. iv      2. iii




                                                               SECTION B
                                                       (Subjective Type Questions)

                  A.  Very short answer type questions.
                      1.     Name the crime which involves use of the Internet to harass or threaten other people on the network, by
                          following them online.
                      2.   What is misuse of data and resources available online called?
                      3.     Name the malware that replicates itself inside the computer’s memory and slows down the functioning of
                          the computer.
                      4.     What is an unwanted computer program which can be injected into a network to infect and slow down the
                          systems called?
                      5.   Name the malware that intrudes into a computer and quietly steals the data without the user’s consent.

                      6.   What is unwanted and unsolicited messages sent for the purpose of advertisement or promotion called?
                      7.   Give an example of a spyware.

                      Ans. 1. Cyberstalking    2. Cyber Crime    3. Worms    4. Virus    5. Spyware    6. Spam
                          7. Keylogger
                  B.  Short answer type questions.

                      1.   What is meant by Cyber Crime?
                      Ans.  Tampering, stealing and manipulating the information, unauthorised use of data or intrusions that lead to
                          image alteration causing loss & problem in someone’s life by using the resources of Internet is Cybercrime.
                      2.   Give two uses of a Firewall system.
                      Ans. Two uses of a Firewall system are:

                          ●   It analyses the network traffic (flow of data) and determines whether the traffic should be allowed or
                              not in the network.
                          ●  It also blocks unauthorised users to access data on the system.






                   72    Touchpad Computer Applications (Ver. 2.0)-IX
   69   70   71   72   73   74   75   76   77   78   79