9th Computer Notes Chapter 6
Ans: Cybercrime
Cybercrime refers to any crime that is committed by means of computer and Internet technology by having unlawful access to others’ computers.
Computer security refers to protecting computer hardware, software and information stored on the computer from threats.
Computer users often exchange information with each other or communicate over the Internet. This can infect a user’s computer with a virus or other types of malicious software.
Computer security or safety is important for computer users to protect their computers from different threats. It is necessary to install security software such the firewall, antivirus and spyware on computers.
Ans: Common symptoms of Malware Attacks:
A list of common symptoms of infected computers is given below.
Authentication means identifying a person based on a method such as Username and Password, Personal Identification Number (PIN), Access Card or Biometrics. It verifies who the person is.
Authorization means to give someone permission to do something. For example, when a user wants to Iogin to his email account, he is asked to enter username and password to verify his identity. This is authentication.
Ans: Biometrics provides highly secure identification and personal verification technologies.
Biometrics provides more accurate authentication than using a username and password or PIN. Biometrics is associated with an individual. Hence, it cannot be stolen or forgotten.
Ans: Information Privacy:
Information privacy refers to an individual’s right to the privacy of personal information. In the modern information age, people are concerned that computers may be taking their privacy.
Ans: Drawbacks of software piracy:
Ans:
Ans:
Malware is malicious software. It comprises many harmful software that are threats to all computer users. Malware is created for attacks on privacy, spying, destruction and financial benefits.
Most common types of malware are:
A computer virus is a type of malware that spreads by inserting a copy of itself into another program or file.
A worm is a malware that transmits itself over a network to infect other computers.
Spyware programs are developed to spy on computer users by gathering information about their activities on the computer.
Adware is malware that attaches itself to free software on the Internet and infects computers when such software is downloaded.
The following are different ways malware can spread on computers.
Viruses, spyware and other types of malware can infect computers in which anti-malware software is not installed through infected flash drives and CDs.
Software piracy refers to making unauthorized copies of copyrighted software and distributing it. Pirated software on CDs is a very common source of spreading malware on computers because these are often infected.
If users download pirated music, movies, programs, etc. for free, their computers may be infected because pirated downloads often contain viruses, spyware or other malicious programs.
Computers connected to the network get infected with malware when information is exchanged with other computers. Computers are also infected while using the Internet when users download something or browse infected Web sites.
The computer may get, infected with a virus or other malware if the user downloads software such as games, updates, demos and other programs from unreliable sources and installs it on the computer.
Opening e-mail attachments from a stranger or from an unknown address can infect a computer with malware. Even downloading and opening e-mails from a friend or family member can be dangerous. They may pass the user a virus or Other malware without knowing about it.
We must install the following software to safeguard computers against viruses, worms, adware and spyware.
Antivirus software is a computer program that detects and removes viruses and other types of malware.
Anti-spyware is a computer program that detects Spyware infections on the computer and removes them. It helps to protect computers against security threats caused by spyware and other types of malware.
Ans: Authentication Methodologies:
The following are common methodologies used for authentication purposes.
A username is a name that identifies a person on a computer system. It is generally used with a password. Together, they are called login information.
The username and password allow access to computer systems, email accounts, bank accounts, and other services. The username is public, but the password is secret. If someone else knows your password, they could misuse it.
A PIN is a secret numeric password. It is used to confirm a user’s identity on a computer system. When entered, the computer checks the PIN against its database. If it matches, the user is allowed to use the computer.
PINs are mostly used with debit and credit cards in stores and ATMs.
Access cards look like credit cards but do not need a username, password, or PIN. They are used to open security gates in offices and other places. They also open barriers in parking areas and hotel rooms.
Biometrics uses physical traits to confirm someone’s identity, such as facial features, hand shape, retina, voice, and fingerprints.
It provides secure ways to verify identity for financial transactions and data privacy. Biometric is more accurate than usernames, passwords, or PINs. It cannot be borrowed, stolen, or forgotten, and forging it is nearly impossible.
Ans: Computer Ethics:
Computer ethics means acceptable behaviour for using computer technology. It is a code of behaviour for moral and social issues while using computers, especially the Internet.
Computer users should be honest, respect the rights of others online, and obey laws that apply to online behaviour.
We should not use bad language while chatting and on social networks.
We should not pretend to be someone else and fool others. Users should not download copyrighted material like music and movies. People should not do anything on the Internet that is morally wrong or illegal.
The following are some important moral, guidelines for ethical use of computer technology.
i. What is a person who illegally breaks into others’ computer systems called?
A. Computer engineer
B. System programmer
C. Hacker
D. Cracker
ii. What is a person who uses special tools for breaking into computer systems called?
A. Computer engineer
B. System programmer
C. Hacker
D. Cracker
iii. Which malware spreads automatically in computer networks and replicates itself?
A. Virus
B. Worm
C. Adware
D. Spyware
iv. Which of the following malware displays advertisement on the screen?
A. Virus
B. Worm
C. Adware
D. Trojan.
v. Which of the following authentication methods is used for opening security gates?
A. Username and password
B. Personal Identification Number
C. Access card
D. Biometrics
vi. Which of the following authentication methods is most reliable?
A. Username and password
B. Personal Identification Number
C. Access card
D. Biometrics
vii. Which of the following authentication methods is based on features of individuals such as face, fingerprint and voice?
A. Username and password
B. Personal Identification Number
C Access card
D. Biometrics
viii. What is making illegal Copies of copyrighted software for use on other comp or sale called?
A. Information Privacy
B. Intellectual rights
C. Software piracy
D. information ownership
ix. Which Of the following malware gathers information about user activities on the computer?
A. Virus
B. Worm
C. Adware
D. Spyware
x. Which of the following authentication methodologies is used to withdraw cash from an ATM?
A. Username and password
B. Personal Identification Number
C. Access card
D. Biometrics
Unit 8: Entrepreneurship in Digital Age Write answers of the following short response questions. Q.1.…
Unit 7: Digital Literacy Write answers of the following short response questions. Q.1. Differentiate between…
Unit 6: Impacts of Computing Write answers to the following short response questions. Q1. List…
Unit 5: Applications of Computer Science Write answers of the following short response questions. Q1.…
10th Computer Science Unit 4 Data and Analysis Write answers of the following short response…
10th Computer Unit 3: Programming Fundamentals Unit 3: Programming Fundamentals Write answers of the following…