NCERT Solutions for Class 10 Foundation of Information Technology – Societal Impacts of IT
Very Short Answer Type Questions [1 Mark each]
Question 1. Define virus.
Answer: A virus is a harmful program, which on entering a computer, starts creating copies of itself. It then attacks by corrupting the executable files and folders saved on the computer.
Question 2. List the different types of computer viruses.
Answer:
- File system viruses
- Boot sector viruses
- Macro viruses
Question 3. Name some forms of virus attacks.
Answer: Worms, Trojan horse, Computer Virus etc.
Question 4. Give some examples of computer worms.
Answer: MS-Blaster, Mellisa worm, SQL Slammer worm are the common examples of worms.
Question 5. Explain denial of service attack.
Answer: A denial of service attack is a type of attack that consumes all the resources of a computer.
Question 6. What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them?
Answer: Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.
Question 7. Describe hacking.
Answer: Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator’s original purpose.
Question 8. What is the meaning of backup? CBSE 2013
Answer: Backup is a process of making an extra copy of the data on a computer and storing it in a different location on the computer or in an external device.
Question 9. What are the types of data backup?
Answer: There are two types of data backup:
- Full backup
- Differential backup
Question 10. Can you backup the files while your computer is running?
Answer: Yes, we can safely backup open files and programs while they are running.
Question 11. What is encryption of data? CBSE 2014
Answer: Encryption refers to scrambling of data in some encoded format so that it may be transmitted over networks.
Question 12. A digital signature is issued by which organisation?
Answer: A digital signature is«an electronic file that is issued by a Certification Authority. (CA).
Question 13. Name two other means of online security measures.
Answer: Digital signature and Digital certificate
Question 14. Which security provision is used to ensure data integrity and authentication?
Answer: A digital signature helps the user to ensure data integrity and authentication.
Question 15. Give any two shortcomings of online purchase. CBSE 2014
Answer:
- Cannot see the product in reality before a purchase.
- You do not receive the product immediately, there is always some delay.
Short Answer Type Questions [2 & 3 Marks each]
Question 1. How does a virus affect your computer?
Answer: Virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.
Question 2. Give three guidelines to prevent the virus attack.
Answer: Three guidelines to prevent the virus attack are as follows:
- Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click everything in your mailbox. If you get an unexpected file attachment, send an enquiry E-mail to its sender. Ask him about the nature and function of the file attachment.
- In stable reliable antivirus, scanning software and download its updates regularly.
- Scan files downloaded from the Internet or other external sources.
Question 3. If your computer attacked by a trojan horse virus, what damage it may cause?
Answer: If your computer attacked by a trojan horse virus, it can:
- Steal passwords
- Copy sensitive data
- Carry out any other harmful operations etc.
Question 4. Write minimum three ways by which a virus can spread to other systems.
Answer: Three ways by which a virus can spread to other systems are as follows:
- When an infected file is copied through network.
- When virus file is downloaded from Internet.
- When infected file is copied from floppy disk, USB, DVD etc.
Question 5. Write any two tips to avoid spams. CBSE 2016
Answer: You can use the following guidelines to avoid spam, they are as follows:
- Keep your E-mail address private.
- Using appropriate filters to find and alter you about spam.
Question 6. What are the primary interest of online attackers in spyware?
Answer: Primary interest of online attackers in spyware is using it to steal personal information for financial crimes such as carding and identity theft or to sell that information to someone else who then executes more traditional financial crimes.
Question 7. What does an antivirus software do? CBSE 2014
or
What does an antivirus software do? Explain in brief with any two points. CBSE 2013
Answer:
- Antivirus software is a computer program that detects, prevents and takes action to disarm or remove malicious software programs, such as viruses and worms.
- Displays health of your computer system.
Question 8. What precaution you should take before copying file from an external storage media?
Answer: Precaution should be taken to run an antivirus program before copying any file from floppy disk, USB, DVD etc. Also, we have to run antivirus program weekly to scan all the drives in the system.
Question 9. List some commonly available antivirus programs.
Answer: Some of the commonly available antivirus programs in the market are as follows:
- Symantec Norton antivirus
- AVG antivirus
- McAfee scan
- Quick Heal
Question 10. Define information security.
Answer: Information security is all about protecting and preserving information. It’s all about protecting and preserving the confidentiality, integrity, authenticity, availability and reliability of information.
Question 11. Differentiate between full backup and differential backup.
Answer: Differences between full backup and differential backup are as follows:
Full backup | Differential backup |
A complete backup of everything that you want to backup. | The backup software looks at which files have changed, since you last did a full backup. |
Restoration is fast, since you only need one set of backup data. | Faster to create than a full backup. |
Question 12. Write differences between online backup and offline backup. CBSE 2014
Answer: Differences between online backup and offline backup are as follows:
Online backup | Offline backup |
You don’t have direct control over your data. | The data is totally in your control. |
If you have a fire, flood, or theft, your backup is offsite so you don’t have to worry about it. | If you have a fire or flood, your backup might be damaged alongwith your computer. |
Question 13. List two advantages of online backup. CBSE 2012, 2013
Answer: Two advantages of online backup are as follows:
- By having your data stored on a remote hard drive, you run little as there is no risk of losing your data as a result of fire, theft or any other disaster.
- No hardware is needed to maintain or repair the backup.
Question 14. Can firewalls detect virus?
Answer: Firewalls do not screen computer viruses.
As the location of firewalls is a good place for scanning, some firewalls has plug-in virus scanning module.
And some programs scan virus at a point either before or after a firewall.
Question 15. Mention three societal impacts of IT.
Answer: The societal impacts of IT are as follows:
- Opportunities for people with disabilities through artificial intelligence.
- Quality of life improvements due to E-Commerce over Internet.
- Crime fighting and other benefits.
Question 16. Why should we frequently take backup of our data?
Answer: We frequently take backup of our data because
- The hard drive of our computer may fail.
- The data on our computer may get corrupted for a variety of reasons.
- Data loss due to fire, natural disasters etc.
Question 17. Differentiate between digital certificate and digital signature. CBSE 2013
Answer: Differentiate between digital certificate and digital signature are as follows:
Digital certificate | Digital signature |
Digital certificates are typically used in Websites to increase their trustworthiness to its users. | A digital signature is a mechanism that is used to verify that a particular digital document or a message is authentic. |
Digital certificates are used, the assurance is mainly dependent on the assurance provided by the CA. | With digital signatures, the receiver can verify that the information is not modified. |
Question 18. Name one specific software/tool for each of the following categories: CBSE 2011
- Antivirus software
- Data recovery tool
- Online backup tool
Answer:
- Antivirus software – Quick Heal
- Data recovery tool – NTFS Reader
- Online backup tool – Dropbox
Question 19. Give the three terms related to the following:
- Attacks
- Backup
- Security software
Answer:
- Attacks Trojan horse, Worm, Denial of Service.
- Backup Online backup, Full backup, Differential backup.
- Security software Digital signature, Firewall, Antivirus.
Question 20. Name four data backup devices/medium. CBSE 2016
Answer: Four storage media on which data backup may be taken are as follows:
- DVD (Digital Versatile Disk)
- External hard disk
- USB flash drive
- Memory stick
Long Answer Type Questions [5 Marks each]
Question 1. What are the common symptoms of a virus attack?
Answer: Symptoms of Computer Viruses Attack
The list of symptoms of computer viruses attack, which indicate that your system is infected with a computer viruses are as follows:
- Odd messages are displaying on the screen.
- Some files are missing.
- System runs slower.
- PC (Personal Computer) crash or restart again and again.
- Drives are not accessible.
- Antivirus software will not run or installed.
- Unexpected sound or music plays.
- The mouse pointer changes its graphic.
- Receive strange E-mails containing odd attachments or viruses.
- PC starts performing functions like opening or closing windows, running programs on its own.
Question 2. What are the various measures that should be taken to prevent spyware from overtaking your system?
Answer: Preventions of Spyware
Due to the seriousness of spyware and the harm, it can affect your system and personal information, it is highly recommended you to take the given measures to prevent spyware from overtaking your system:
- Download and install anti-spyware software: Most antivirus applications are effective in identifying different types of malware, including spyware, but may not detect all spyware variants. Once you install the anti-spyware software on your computer, you must keep your anti-spyware application updated to keep up with the latest forms of spyware.
- Be cautious when Web surfing: The best defense against spyware is not to download it in the first place. Spyware is often installed on your computer when you visit an infected or malicious Website.
Therefore, you should exercise caution with links to Websites from unknown sources. In addition, you should only download programs from trustful Websites. When downloading a specific program, ensure that you are not downloading pirated software. Spyware can be distributed by exploits, that promote software piracy.
- Lookout for pop-ups: Malware can lure you into installing spyware on your computer by prompting you with a pop-up window. If you see an unwanted or random pop-up alert, do not click “Agree” or “OK” button to close the pop-up window. This will actually install the malware on your computer. Instead, press Alt + F4 or click on the red “X” on the corner on the pop-up alert to close the window.
- Keep current with operating system updates: Important system updates provide significant benefits such as improved security. Just as with any antivirus and anti-spyware software, not keeping up with operating system updates will make your PC vulnerable to the latest malware threats.
- Harden your browser settings: Updated Web browsers may help to prevent exploitation by taking several defensive steps against spyware. Most Web browsers will warn you of executable programs and will suggest a safe course of action. In addition to having an updated Web browser, ensure that you have properly configured your browser and that all of your plug-ins and add-ons are updated, including Java, Flash and Adobe products.
- Enable your firewall: Firewalls monitor the network and are capable of blocking suspicious traffic, which can prevent spyware from infecting your system.
Question 3. Differentiate between hackers and crackers.
Answer: Differences between hackers and crackers are as follows:
Hackers | Crackers |
A hacker is a person intensely interested in the arcane and recondite working of any computer operating system. | A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. |
Hackers obtain advanced knowledge of operating systems and programming languages. | Having gained unauthorised access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets. |
Hackers constantly seek further knowledge, freely share what they have discovered and never intentionally damage data. | Crackers can easily be identified because their actions are malicious. |
Question 4. Explain SET, PCI and Kerberos.
Answer:
- PCI (Peripheral Component Interconnect) is a computer bus for attaching hardware devices in a computer. These devices can take either the form of an integrated circuit fitted onto the motherboard itself, called a planer device in the PCI specification or an expansion card that fits into a slot.
- SET (Secure Electronic Transaction) protocol, which is developed by Visa and Mastercard uses encryption for privacy and digital certificates to verify the three parties -the bank, the customer and the merchant. It ensures secure transactions online.
- Kerberos is a third-party authentication that validates the clients over the network and provides secure communication or access to network resources.
Question 5. Write a short note on social networking.
Answer: It is a grouping of individuals into specific groups, like small rural communities or a neighbourhood subdivision, if you will. A social networking service is an online service, platform or site that focuses on facilitating the building of social networks or social relations among people.
e.g. people who share interests, activities, backgrounds or real life connections. When it comes to online social networking, Websites are commonly used. These Websites are known as Social Sites. The most popular social sites are currently Facebook, MySpace, Orkut etc.
These Websites provide users with simple tool to create a custom profile with text and pictures. Typical profile includes basic information about user, atleast one photo and possibly a blog or other comments published by the user. It may include videos, photos albums, online applications as in Facebook or custom layout (in MySpace). After creating a profile, user can send message to other users and leave comments directly on friends’ profiles.
Question 6. Write the benefits of ICT in education and healthcare.
Answer: Benefits of ICT
ICT has become an integral part of our daily life. And, it has benefited the common man in various ways in every field of life. Some of them are as follows:
In Education
The main purpose of the strategy for ICT implementation in education is to provide the prospects and trends of integrating ICT into the general educational activities.
Some benefits of ICT in education are as follows:
- There is no time boundation on an individual for getting educated by a teacher. A person can attend a class anytime and anywhere.
- Teachers can create interactive classes and make the lessons more interesting.
- Generally, students find images and graphical representation of concepts, more interesting as compared, to the theoretical knowledge. And, using ICT, teachers can explain even the most complex concept in a very simplified manner using graphics, videos and animations.
- An individual can learn on pace he/she is comfortable.
- Learning resoures can be accessed remotely.
In Healthcare
Some benefits of ICT in healthcare are as follows:
- Automated hospital information systems can help to improve quality of care.
- Decreased costs of treatment.
- ICT has significantly enhanced the services being provided and brought behavioural changes.
- This technology helps doctors, hospitals, the general public and all other medical care providers.
- Pharmaceutical industry is the industry that enjoys the biggest benefits of ICT.
- ICT has made E-Health possible.
Question 7. “Virtual schools are better than traditional schools.” Write reasons to support this statement.
Answer: A virtual school is a learning environment offered entirely on the Internet. All student services and courses are conducted through Internet technology. The virtual school differs from the traditional school through the physical medium that links administrators, teachers and students. It refers to an institution that is not “brick and mortar” bound.
Advantages
The advantages of virtual schools are as follows:
- Individualised instruction for all students.
- Lessons can be taught in a way that benefits students with various learning abilities.
- More time can be spent on lessons that are more difficult for students.
- Flexibility for the students to learn whenever and wherever they want.
- Students are self-directed and mature quicker as they manage their studies.
- Students can access learning 24 hours a day and learn at their own pace.
Disadvantages
The disadvantages of virtual schools are as follows:
- Undisciplined students will not succeed in the online environment.
- Puts more stress on the parents to provide guidance and tutoring.
- Parents need to monitor the student all day long as opposed to dropping the student at school where the student is monitored by teachers and staff.
- Students are more isolated and might not developed properly socially.
- Students would not receive personal one-on-one time with teachers.
Question 8. Give one word answer CBSE 2012
- Another name for junk mails.
- It is doing business online.
- It is the crime committed using computers and Internet.
- The programmer that breaks into secure systems with non-malicious intentions.
- Type of malware that is installed on user’s computer and collects information about user without his consent.
Answer:
- Spam
- E-Business/E-Commerce
- Cyber crime
- Hacker
- Spyware
The post NCERT Solutions for Class 10 Foundation of Information Technology – Societal Impacts of IT appeared first on Learn CBSE.