Page 276 - CA_Blue( J )_Class9
P. 276

6.  What are the guiding principles of the Data Protection Act?
                    Ans.  The guiding principles of the Data Protection Act are as follows:
                       a.   Fair and Lawful
                       b.   Purpose
                       c.   Adequacy
                       d.  Accuracy
                       e.   Retention
                       f.   Rights
                       g.   Security
                       h.   International transfers
                     7.  Write two disadvantages of electronic mail.
                    Ans.  The two disadvantages of electronic mail are:
                       a.   Malicious e-mails may contain attachments carrying viruses, which may infect or disable our systems.
                       b.  An active Internet connection is required to read and download the mails.
                     8.  Why is a good anti-spam and anti-virus software needed?
                    Ans.  Good anti-spam and anti-virus software are needed to get rid of spam. It not only marks those emails that are spam but
                       also protects the account from malware and viruses that pose a threat to the daily activity of the computer user.
                     9.  What is hacking?
                    Ans.   Hacking refers to the illegal act of breaking into someone else’s computer with the intent of stealing information,
                       installing malware or disrupting their services.
                     10.  What are Intellectual Property Rights?
                    Ans.   It is quite difficult and it takes a lot of work to produce something for the first time. Hence, to protect these creations,
                       there are some legal rights. These legal rights protect the original work of the creators from misuse and unauthorised
                       access.

                     11.  What are the different types of piracy of software?
                    Ans.   The different types of software piracy are:
                       a.   Counterfeiting                              b.   Internet Piracy
                       c.   End user Piracy                             d.   Client-Server Overuse
                       e.   Hard-Disk Loading
                     12.  What is cybercrime?
                    Ans.   Any crime that is done through Internet and by using Computer/Mobile/Laptop and software is known as cybercrime.
                     13.  How do a secret qualify to be Trade Secret?
                    Ans.  To qualify as a trade secret, the information:
                       a.  should have some sort of monetary value
                       b.  should be known to a limited number of people
                       c.   should be reasonably well secured using confidentiality agreements for the people who have access to the
                          information

                     14.  Write some reasons behind Hacking.
                    Ans.   The reasons behind Hacking are as follows:
                       a.   Data Theft                                  b.  Industrial Espionage
                       c.  Publicity                                    d.  Revenge
                       e.  Fun
                     15.  What is a malicious code? Name the different types of malicious codes.
                   Ans:   Malicious codes are some unwanted programs that cause harm to a computer or affect the data stored on a computer's
                       hard disk or memory. Different types of malicious codes are computer viruses, worms, trojan horses, etc.


                   274    Touchpad Computer Applications-IX
   271   272   273   274   275   276   277   278   279   280   281