Page 304 - Informatics_Practices_Fliipbook_Class12
P. 304
5. Give one difference between cyber trolls and cyber bullying.
Ans. Trolls are comments or posts that insult or defame other users or their content. Most of the time, these are done to show
disapproval of a specific person or their posts.
Cyberbullying is when the victim is bullied online on social media or in gaming communities. It is a repeated action that is
meant to scare, anger, or shame people.
6. How is a ethical hacker different from a cracker?
Ans. A cracker (bad hacker) breaks into the system to do something bad, while a ethical hacker (good hacker) tries to break into
the system to find its weaknesses so they can be fixed.
7. Name any three types of viruses.
Ans. Boot sector virus, file infector virus and macro virus.
8. Differentiate between boot sector viruses and macro viruses.
Ans. A boot sector virus is a virus that affects the boot sector of the disks. It gets activated when the drive is started (booted up).
The Michelangelo virus is an example of a boot sector virus.
Macro viruses embed themselves into the documents. A macro refers to specific instructions within an application. The
macro viruses are executable files that may be received as email attachments. When a recipient opens an attachment, the
viruses gets activated and starts affecting the system programs (deleting, creating, or overwriting other files). For example,
the Melissa Virus got spread through a Microsoft Word document sent as an attachment.
9. List any two methods that can be used to protect personal information while browsing the Internet.
Ans. • Incognito or private browsing
• Firewall
• Before using the site, check its security
• Use antivirus software
• Clear cookies and cache
10. Expand the following:
HTTPS, CGPDTM, EULA,
Ans. HTTPS: HyperText Transfer Protocol Secure
CGPDTM: Controller General of Patents, Designs & Trademarks
EUL: End-User License Agreement
11. Give any two applications of open data.
Ans. • It creates chances for businesses to connect with customers.
• It promotes policy and service transparency between the government and citizens.
12. Give any three features of Free and Open Source Licenses.
Ans. • Developed in a collaborative manner
• Source code is publicly available
• Allows the user to modify the software and distribute the modified version.
13. Give any four acts that are considered cybercrime according to IT Act 2000.
Ans. • Tampering with the computer source documents
• Hacking with computer system
• Securing access or attempting to secure access to a protected system
• Breach of confidentiality and privacy
14. List any five preventive measures that can reduce the risk of cybercrime.
Ans. • Take regular backup of important data.
• Use antivirus software and keep it updated.
• Download software from known and secure (HTTPS) sites.
• Keep your operating system updated.
• Do not visit or download content from untrusted websites.
290 Touchpad Informatics Practices-XII

