Computer 9th Grand Test 4,5 Unit Solutions
Computer 9th Grand Test 4,5 Unit Solutions
Section - I
2. Write short answers of any of four parts of the following: (4x2=8)
Section - II
Note: Write answers of any two questions from the following: (8x2=16)
6. Define software Piracy. Also explain its any three types in detail.
7. What is encryption? Explain the importance of encryption for everyday life on
Internet.
Note: Circle the correct answer. Cutting or circle two or more options will result in zero
mark in that question.
1. Some software companies sell software with a confidential text, called the ________
d) width/length
a) All b) width/height c) width/weight 8.
What type of language is HTML?
• Phishing
• Identity Theft
• Cyberbullying
• Hacking
• Software Piracy
iv. What is Vigenere cipher table?
Ans. Sabotage
Sabotage is a serious attack on a computer system. Some malicious user can attack the system
while sitting remotely. One can send virus with some free software. A virus is a computer
written program with negative intentions. It can change/ destroy information
or sabotage a precious data. These software's are designed to harm a computer without the
permission of a user. Virus can delete, modify and damage files. It can also effect programs
and slow down the performance of the computer system.
Examples
Some examples of computer virus are as follows:
• File virus
• Friday 13th
vi.Name some of the data security issues?
Ans. Data Security Issues: Some of the data security issues are as follows
Confidentiality and Privacy
Fraud and misuse
Patent
i. Why do we need an installation key whereas a software can be protected with a
password?
Computers are ubiquitous and are widely used by people of almost all ages. Often
we need to give our personal information to a computer e.g. while creating an email
The main weaknesses and security flaws of substitution ciphers are as follows:
The simplest of all substitution ciphers are those in which the cipher alphabet is
merely a cyclical shift of the plaintext alphabet. The explanation for this weakness
is that the frequency distributions of symbols in the plaintext and in the ciphertext
are identical, only the symbols having been relabelled. Another major problem with simple
substitution ciphers is that the frequencies of letters are not masked at all.
To make a cell span more than one row, rowspan attribute is used.
Example:
<table>
<tr>
<th>Name:</th>
<td>Muhammad Ahmad</td>
</tr>
<tr>
<th rowspan="2">Telephone:</th>
<td>0423-5861923</td>
</tr>
<tr>
<td>0332-4398344</td>
</tr>
</table>
ii. What is meant by Markup language ?
A webpage consists of a series of elements which are represented by tags. For
example, if you need a paragraph of text on your webpage, you use it as:
Ans. Captcha: CAPTCHA stands for Completely Automated Public Turing Test to Tell
Computers and Humans Apart. Its goal is to check if a user (of an app or a website) is
a real person or a bot. To do that, it relies on specific traits that people have and
machines don't. It's widely used in the web industry as a good protection against
spam, bots or DoS attacks.
We can write a program that can access a website and give it a password. It can be
used to hack a password if the program keeps trying different password for long time.
Moreover, a program can also add unnecessary data by filling a form again and again.
To avoid this situation only humans are allowed to use a system instead of a computer
program. So, a picture is shown on a website whenever there is a form and you are
asked to read that image and fill a field. The image contains text in irregular form
which is readable for human but not easily for a machine. This is called captcha.
Iv What tag is used to create a hyperlink?
Create a Hyperlink to a Webpage
The <a> tag is used to create a hyperlink in a webpage. The href attribute is used to
specify the URL of the linked webpage. For example, <a href="http://www.google.com">
Visit www.google.com </a> makes the text "Visit www.google.com" a hyperlink. If you
click on this text in the webpage, it takes you to the website v. What is difference
between hyperlink and anchor?
Ans. Hyperlink
Hyperlink is such an icon, graphic, or text in a webpage, that when clicked, takes you
to some other webpage.
• an anchor
Anchor links allow you to go from one part of the same page to another part. Both
hyperlinks and anchors are defined by the HTML anchor element <a>
Some software companies sell software with a confidential text, called the key of that
software. This key is provided to only those people who buy that software. In this way
illegal copies are stopped to be installed. Some people start searching for that key by
using illegal means. This is called cracking the key. Open source software has no
copyrights reservation. So, we can copy source code, modify it and can even sell it.
Whether we do the piracy intentionally or unintentionally, it is illegal and punishable.
Pirated software takes away the profits of the company or individual which results in
reducing funds for further software development initiatives.
Types of Software Piracy
Types of software piracy include:
• Soft lifting
• Counterfeiting
• Client-server overuse
• Online piracy • Hard-disk loading
a) Soft lifting
Borrowing and installing a copy of a software application from a colleague is called soft
lifting.
b) Client server overuse
Installing more copies of the software than you have licenses for is called client server
overuse.
c) Hard disk loading
Installing and selling unauthorized copies of software on refurbished or new computers
is called hard disk loading.
7. What is encryption? Explain the importance of encryption for everyday life on
Internet.
Ans. Simple Encryption
The process of encoding data in such a way that only authorised person can read it is
called encryption. Encoding means conversion of the data to an unreadable format
which is called ciphertext. A secret code (called key) is required to read the
Encryption-Decryption Process
In ancient times messages were carried by foot for miles, kings and rulers used to encrypt
the letters they would send to allies. This helped to protect the secrecy of the message in
case they were stolen.
A computer expert, who can steal data when it moves from one location to other, is called
hacker. Encryption helps us to save data from hackers.
Importance of encryption for everyday life on the internet:
Encryption is one of the most important methods for providing data security. In everyday
life on the internet, vast amounts of personal information are stored on multiple places.
So, it is important to know how to keep data private.
Encryption is important because it allows you to secure data from illegal access.
Importance of encryption can be described in the following three points.
1. Protection from Hackers:
Hackers don't just steal information; they can also alter the data to commit fraud. For
example, in a bank transaction of online money transfer, they can fraud by changing
the target account number.
2. Encryption Protects Privacy:
Encryption is used to protect sensitive data, including personal information for
individuals. This helps to ensure privacy and minimizing the opportunities for
surveillance by criminals.
3. Encryption Protects Data across Devices:
Multiple (and mobile) devices are a big part of our lives, and transferring data from device
to device is a risky proposition. Encryption technology can help protect stored data across
all devices, even during transfer. Additional security measures like advanced
authentication help later unauthorized users.