Page 365 - Computer Science Class 11 Without Functions
P. 365

b.  Hacking
             Ans:   Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information (such as a
                  password or private files) or damage the system or network.
               c.  Trademark
             Ans:   A trademark is a distinctive symbol, pattern, or phrase that sets one source’s goods and services apart from those of other
                  sources.

               d.  Open Data
             Ans:   Open data is information that anyone can access, use, and share, possibly with the requirement that the source of the data
                  be cited.
               4.  Name the two primary methods of eavesdropping.
             Ans:  There are two primary methods of eavesdropping:
                  •  Listening directly to digital or analog voice transmissions.
                  •  Intercepting text, images, or videos over a communication channel.

               5.  Give one difference between cyber trolls and cyber bullying.
             Ans:   Cyber trolls are comments or posts that insult or defame other users or their content. Most of the time, these are done to
                  show disapproval of a specific person or their posts.
                    Cyber bullying is when the victim is bullied online on social media or in gaming communities. It is a repeated action that is
                  meant to scare, anger, or shame people.
               6.  How is a ethical hacker different from a cracker?
             Ans:   A cracker (bad hacker) breaks into the system to do something bad, while a ethical hacker (good hacker) tries to break into
                  the system to find its weaknesses so they can be fixed.

               7.  Name any three types of viruses.
             Ans:  Boot sector virus, file infector virus and macro virus.

               8.  Differentiate between boot sector viruses and macro viruses.
             Ans:   A boot sector virus is a virus that affects the boot sector of the disks. It gets activated when the drive is started (booted up).
                  The Michelangelo virus is an example of a boot sector virus.
                    Macro viruses embed themselves into the documents. A macro refers to specific instructions within an application. The
                  macro viruses are executable files that may be received as email attachments. When a recipient opens an attachment, the
                  viruses gets activated and starts affecting the system programs (deleting, creating, or overwriting other files). For example,
                  the Melissa Virus got spread through a Microsoft Word document sent as an attachment.
               9.  List any two methods that can be used to protect personal information while browsing the Internet.
             Ans:  • Incognito or private browsing
                  •  Firewall
                  •  Before using the site, check its security
                  •  Use antivirus software
                  •  Clear cookies and cache

              10.  Expand the following:
                  a.  HTTPS   b. CGPDTM   c. EULA
             Ans:  a. Hyper Text Transfer Protocol Secure

                  b.  Controller General of Patents, Designs & Trademarks
                  c.  End-User License Agreement
              11.  Give any two applications of open data.
             Ans:  • It creates chances for businesses to connect with customers.
                  •  It promotes policy and service transparency between the government and citizens.





                                                                                          Society, Law and Ethics  363
   360   361   362   363   364   365   366   367   368   369   370