0% found this document useful (0 votes)
92 views

10 STD CPT 1

The document provides information on the topic of societal impacts of IT through a lesson plan format. It includes fill in the blank questions about computer viruses, worms, passwords, spam and other cyber threats. It also has true/false questions and multiple choice questions testing understanding of malware, hackers, backups and other IT security concepts. The document aims to educate users about the threats posed by viruses, worms and other cyber risks as well as mitigation techniques like passwords, encryption and backups.

Uploaded by

nisha suguna
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views

10 STD CPT 1

The document provides information on the topic of societal impacts of IT through a lesson plan format. It includes fill in the blank questions about computer viruses, worms, passwords, spam and other cyber threats. It also has true/false questions and multiple choice questions testing understanding of malware, hackers, backups and other IT security concepts. The document aims to educate users about the threats posed by viruses, worms and other cyber risks as well as mitigation techniques like passwords, encryption and backups.

Uploaded by

nisha suguna
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

INDEX

SL NO DATE TOPIC SIGN

 1  25/08/2020  Societal Impacts of IT  

       

       

       

       

       

       

       

       

       

       

       

       

       

       
LESSON NO 1
SOCIETAL IMPACTS OF IT
I. FILL IN THE BLANKS. 
1. To protect data and important information unique password and pin are
given to every user.
2. Computer virus is a program or set of programs that disrupts the normal
functioning of a computer.
3. A worm is similar to work virus in design and considered to be the subclass
of a virus.
4. Crackers are technical people who are experts in breaking into systems.
5. Unwanted bulk emails that comes from strange sources are called spam.
6. Trojan comes into parts a client and a server part.
7. A spammer is a person who creates electronic spam and sends them out in
large quantities to flood the internet.
8. Key loggers program are used to check uses keystrokes and get important
information like passwords.
9. Decryption is a process which converts the encrypted information readable
again.
10.White hat in internet terminology refers to an ethical hacker who breaks the
security for non-malicious reasons. 

II. STATE TRUE OR FALSE. 


1. Virus infects or destroys data. TRUE
2. Blaster worm allows malicious users to control a computer remotely. TRUE
3. Trojan Horse is a virus that is often disguised as a useful computer program.
TRUE
4. Malware is a generic term for useful software. FALSE
5. Norton is a kind of virus. FALSE
6. Spyware can gather information about password email addresses and even
credit card numbers. TRUE
7. Hard disk is commonly used storage media. TRUE
8. Hacking which is done for good purpose is known as ethical hacking. TRUE
9. We can safeguard other computer from unauthorized access using password.
TRUE
10.Data backup basically means retrieving back the lost and inaccessible data.
TRUE
III. MULTIPLE CHOICE QUESTIONS.

1. Virus stands for Vital Information Reform Under Seize.


a. Virtual impact resource under seize
b. Vital information Reform under seize
c. Vital information resource under seize
d. None of the above

2. Stone virus is an example of boot virus.


a. worm b. Trojan horse c. stone virus d. all of these

3. Hacking a web server or taking control of another person's website is called


web hijacking.
a. web hiking  b. web cracking  c. web hijacking  d. none of these

4. Ankit Fadia is a renowned ethical hacker from India.


a. Ankit Vadia b. Ankita nadia c. Ankit Fadia d. Ankit Tandon 

5. A software program which secretly monitors the user’s computing is called a


spyware.
a. antivirus b. hacker c. spyware d. Trojan horse

6. McAfee is an example of antivirus.


a. spam b. antivirus c. Worm d. spyware

7. Highly technical people who break into computers to steal or destroy


important data are called hackers.
a. spy b. burglars c. Hackers d. both a & b

8. The process of making duplicate copy of data which can be used to restore
and the recover data is called backup.
a. virus b. backup c. copy d. none of these
IV. ANSWER IN ONE WORD OR SENTENCE.
1. Write the name of the process, which keeps sending bulk mails till the server
gets full.
 ANS: Mail bombing.

2. Write the name of the virus which is difficult to detect by antivirus software
as they use various methods to avoid detection.
 ANS: Stealth virus.

3. Who wrote the first program virus called Elk Cloner?


ANS: Richard Skrenta.

4. Write the name of the software that protects a server a network or an


individual PC from almost every Attack by viruses and hacker.
 ANS: Antivirus/ Firewall. 

5. Write the name of the process which can be used to restore the original data
in case of any data loss event.
 ANS: Backup.

6. Name the process which transforms data into an unreadable code.


 ANS: Encryption.
V. ANSWER THE FOLLOWING.
1. What is a virus? Write its types?
 ANS: A virus is a set of programs that disrupts the normal functioning of a
computer. It enters into the computer without any knowledge of the user and
infects and destroys the data. The type of viruses are:
i. Boot virus:  This type of virus infection the boot records which are
responsible for loading the operating system in the memory of computer.
This gets activated at the time of booting the machine. For example, disk
killer and stone virus.
ii. Program file virus:  This is in fact the executive files or programs with
extension .com .exe, .sys, etc. They become active in memory by replicating
itself and infecting files on the disk. For example, Sunday and Cascade.

2. What is the function of an antivirus software?


 ANS: The function of antivirus software are:
i. It scans the computer files and emails to look for viruses.
ii. It identifies the suspicious behavior of a computer programs.
iii. It prevents and removes viruses from the computer.

3. What is a Firewall?
 ANS: Firewall is a software or hardware tool that protects a server, a network or a
PC from almost every Attack by viruses and hackers.

4. Define spam.
ANS: Spam are unwanted e-mails that come from strange sources. These are
generally sent in a large number of for commercial advertising. Millions of copies
of the same message are send to email users worldwide.

5. Compare hackers and crackers.


 ANS: Hackers and crackers both explore computers, access data and applications
without owner’s permission. But hackers do it for both ethical and non-ethical
purpose, whereas cracker are always destructive.

6. Define recovery utilities.


 ANS: Recovery utilities are used to restore data from logical damage. They
recover every readable bit from the surface and recover logical file structure of the
storage media. Some of the recovery utilities are PhotoRec, Recuva, Android photo
recovery. 
7. What are the various security provision in e-commerce?
 ANS: The various security provision in e-commerce are:
i. Privacy using encryption:  To ensure data security, it is transformed into
unreadable code through the encryption process.
ii. Passwords and pin numbers:  To protect data and important information,
unique passwords and pin numbers are given to every user. It protects our
data from unauthorized access.
iii. Firewalls:  These are software or hardware tool that protect a server, a
network or a PC from almost every Attack by viruses and hackers.

8. What do you understand by the term worm?


 ANS: A bomb is considered to be a sub-class of virus. It has the capability to
replicate itself on a system and causes the huge Devastating Effect. Due to its
copying nature, it results in to heavy consumption of system memory.

9. Describe the term Trojan horse.


 ANS: Trojan Horse is a program that appears to be useful, but actually damages
the computer once it is installed. This virus irritates the user by changing the text
top and adding silly desktop icons. Sometimes. it can cause serious damage by
deleting files and destroying information.

10. List the problems that can be caused by a virus in a computer


 ANS: A virus can cause the following problems:
1. It decreases in the speed of the computer by decreasing the memory.
2. It displays unusual messages on the screen.
3. It reformats the hard disc and delete or damages the files.
4. It displays a change in data against the file name in the directory.

11. What do you understand by data backup? Explain any two techniques of
data backup.
 ANS: Data backup is a process of making duplicate copies of data, which can be
used to restore the original data in case of any data loss event. Regular data backup
is very important practice. The techniques of data backup are:
i. Offline backup:  In the system, user attach a storage media to a computer
and copy files.
ii. Online backup:  Such systems can be seen in Big organization that send
copy of the fresh data to their database servers frequently. This way they
can get a copy of every piece of important data anytime, in case of data
loss. 

You might also like