Page 416 - Computer Science Class 11 With Functions
P. 416

b.  Hacking
         Ans.   Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information (such as a
              password or private files) or damage the system or network.
           c.  Trademark
         Ans.   A trademark is a distinctive symbol, pattern, or phrase that sets one source’s goods and services apart from those of other
              sources.

           d.  Open Data
         Ans.   Open data is information that anyone can access, use, and share, possibly with the requirement that the source of the data
              be cited.
           4.  Name the two primary methods of eavesdropping.
         Ans.  There are two primary methods of eavesdropping:
              •  Listening directly to digital or analog voice transmissions.
              •  Intercepting text, images, or videos over a communication channel.

           5.  Give one difference between cyber trolls and cyber bullying.
         Ans:   Cyber trolls are comments or posts that insult or defame other users or their content. Most of the time, these are done to
              show disapproval of a specific person or their posts.
                Cyber bullying is when the victim is bullied online on social media or in gaming communities. It is a repeated action that is
              meant to scare, anger, or shame people.
           6.  How is a ethical hacker different from a cracker?
         Ans.   A cracker (bad hacker) breaks into the system to do something bad, while a ethical hacker (good hacker) tries to break into
              the system to find its weaknesses so they can be fixed.

           7.  Name any three types of viruses.
         Ans.  Boot sector virus, file infector virus and macro virus.

           8.  Differentiate between boot sector viruses and macro viruses.
         Ans:   A boot sector virus is a virus that affects the boot sector of the disks. It gets activated when the drive is started (booted up).
              The Michelangelo virus is an example of a boot sector virus.
                Macro viruses embed themselves into the documents. A macro refers to specific instructions within an application. The
              macro viruses are executable files that may be received as email attachments. When a recipient opens an attachment, the
              viruses gets activated and starts affecting the system programs (deleting, creating, or overwriting other files). For example,
              the Melissa Virus got spread through a Microsoft Word document sent as an attachment.
           9.  List any two methods that can be used to protect personal information while browsing the Internet.
         Ans.  • Incognito or private browsing
              •  Firewall
              •  Before using the site, check its security
              •  Use antivirus software
              •  Clear cookies and cache

          10.  Expand the following:
              a.  HTTPS   b. CGPDTM   c. EULA
         Ans:  a. Hyper Text Transfer Protocol Secure

              b.  Controller General of Patents, Designs & Trademarks
              c.  End-User License Agreement
          11.  Give any two applications of open data.
         Ans.  • It creates chances for businesses to connect with customers.
              •  It promotes policy and service transparency between the government and citizens.




         414   Touchpad Computer Science-XI
   411   412   413   414   415   416   417   418   419   420   421