0% found this document useful (0 votes)
5 views

Computer 9th Grand Test 4,5 Unit Solutions

The document is a Computer Science Grand Test for SSC-I students at District Public School Higher Secondary School Chakwal, consisting of multiple sections including short answer questions and multiple-choice questions. Topics covered include data security, cybercrime, HTML structure, software piracy, and encryption. The test assesses students' understanding of these concepts through various question formats.

Uploaded by

vaelarion14
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Computer 9th Grand Test 4,5 Unit Solutions

The document is a Computer Science Grand Test for SSC-I students at District Public School Higher Secondary School Chakwal, consisting of multiple sections including short answer questions and multiple-choice questions. Topics covered include data security, cybercrime, HTML structure, software piracy, and encryption. The test assesses students' understanding of these concepts through various question formats.

Uploaded by

vaelarion14
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

District Public School Higher Secondary School Chakwal

Computer Science (Essay Type) Grand Test


(SSC-I)
Time: 1hr. 45 Minutes Marks: 40

Name: __________________ Roll No:_______

Section - I
2. Write short answers of any of four parts of the following: (4x2=8)

i. In which aspects, we want to iv. What is Vigenere cipher table??


secure our data?
v. What is meant by Sabotage?
ii. What is Cypher text?
vi. Name some of the data security
iii. Name some of cybercrimes. issues?

3.Write short answers of any of four parts of the following: (4x2=8)


i. Why do we need an iv. How can we avoid from
installation key whereas a transactional fraud?
software can be protected with a v. What is meant by
password? ii. Define data cybercrime?
privacy.
vi. Describe two weaknesses
iii. What are the two sections of of substitution cypher method?
HTML document?

4.Write short answers of any of four parts of the following: (4x2=8)


i. Create a basic table with Iv What tag is used to create a
following attribute: (i) rowspan ? hyperlink?
ii. What is meant by Markup v. What is difference
language ? between hyperlink and anchor?
iii. Give a reason to add Captcha vi. What is meant by opening
on websites. and closing tags. Give example?

Section - II
Note: Write answers of any two questions from the following: (8x2=16)

5. State the purpose of Password and write characteristics of good password?

6. Define software Piracy. Also explain its any three types in detail.
7. What is encryption? Explain the importance of encryption for everyday life on
Internet.
Note: Circle the correct answer. Cutting or circle two or more options will result in zero
mark in that question.

1. Some software companies sell software with a confidential text, called the ________

a) Key of that software b) Encryption c) Password d) Description

2. In Hyperlink images are define with ____ tag

a) <img> b) <im> c) <pic> d) <scr>


3. Which one of the following tags is used to insert a line break or start a new paragraph:

a) <lr> b) <br> c) <rb> d) <tr>

4. A hyperlink can be applied to ________.?

a) image b) text c) Both A and B d) None of above


5. Which of the following is not a cybercrime?

a) Decryption b) Identity Theft c) Phishing crime d) Hacking

6. An individual list item can contain another entire list called


a) Definition list b) Nested list 7The attribute used c) Unordered list d) Ordered list
with <img> tag are:

d) width/length
a) All b) width/height c) width/weight 8.
What type of language is HTML?

a) Markup b) Object oriented c) Scripting d) Programming


9. ______ means making illegal and unauthorized copies of the software without owner’s
permission.

a) Privacy b) Piracy c) Browsing d) Right

10. Which of the following is not a cybercrime?

a) Decryption b) Identity Theft c) Phishing crime d) Hacking Solution:


Write short answers of any of four parts of the following: (4x2=8)
i. In which aspects, we want to secure our data?
Confidentiality, Integrity, Authenticity, and Availability, privacy
ii. What is Cypher text?
Ciphertext is the encrypted form of a message, meaning it has been transformed from
its original readable form (plaintext) into an unreadable format using a cipher (encryption
algorithm). The purpose of ciphertext is to protect sensitive information from unauthorized
access.

iii. Name some of cybercrimes.

• Phishing
• Identity Theft
• Cyberbullying
• Hacking
• Software Piracy
iv. What is Vigenere cipher table?

Vigenere Cipher Table


The Vigenere Cipher Table consists of 26 rows and 26 columns, where the 1st row
contains the original alphabets from A - Z. In each subsequent row the alphabet is shifted
by one letter to the right. All the columns are labeled by alphabets from A - Z and all the
rows are also labeled by alphabets from A - Z.
v.What is meant by Sabotage?

Ans. Sabotage

Sabotage is a serious attack on a computer system. Some malicious user can attack the system
while sitting remotely. One can send virus with some free software. A virus is a computer
written program with negative intentions. It can change/ destroy information
or sabotage a precious data. These software's are designed to harm a computer without the
permission of a user. Virus can delete, modify and damage files. It can also effect programs
and slow down the performance of the computer system.
Examples
Some examples of computer virus are as follows:
• File virus
• Friday 13th
vi.Name some of the data security issues?
Ans. Data Security Issues: Some of the data security issues are as follows
Confidentiality and Privacy
Fraud and misuse
Patent
i. Why do we need an installation key whereas a software can be protected with a
password?

An installation key is required to verify the authenticity of software and prevent


unauthorized installations, ensuring only licensed users can install or activate it. A
password, on the other hand, protects access to the software after installation. The
installation key helps prevent piracy, while a password secures user access.

ii. Define data privacy.

Ans. Data Privacy

Computers are ubiquitous and are widely used by people of almost all ages. Often

we need to give our personal information to a computer e.g. while creating an email

account, shopping online, visiting a hospital or taking admission in a school. We except


that provided information will not be shared with others. Protecting data from malicious

users is called data privacy or information privacy.

iii. What are the two sections of HTML document?


Ans. Sections of an HTML document:
An HTML document primarily consists of two sections:
• Head section
• Body section
Head Section: Head section typically defines the document title, styles and
otherinformation about the whole document. Head section starts with `<head>` tag
andends with `</head>`. To specify title of the webpage, you use `<title>` tag
inside`<head>` `</head>` tags.
Body Section: Body section contains the actual contents of a webpage that are
visible inside a webpage. This section starts with `<body>` tag and ends with
`</body>`.
iv. How can we avoid from transactional fraud?
To avoid transactional fraud, use secure payment methods, enable two-factor
authentication (2FA), verify HTTPS on websites, avoid public Wi-Fi, monitor bank
statements, beware of phishing scams, set transaction alerts, and use strong
passwords for online banking.
v. What is meant by cybercrime?
Ans. Cybercrime
Any criminal activity which is performed by using computers and the Internet is
known as cybercrime. A cybercrime can be downloading illegal music files or stealing
millions of dollars from online bank accounts. It also includes crime like identity
theft, threatening someone using Internet, etc.
vi. Describe two weaknesses of substitution cypher method?

The main weaknesses and security flaws of substitution ciphers are as follows:
The simplest of all substitution ciphers are those in which the cipher alphabet is
merely a cyclical shift of the plaintext alphabet. The explanation for this weakness

is that the frequency distributions of symbols in the plaintext and in the ciphertext

are identical, only the symbols having been relabelled. Another major problem with simple
substitution ciphers is that the frequencies of letters are not masked at all.

4.Write short answers of any of four parts of the following: (4x2=8)


i. Create a basic table with following attribute:
(i) rowspan ?
rowspan

To make a cell span more than one row, rowspan attribute is used.
Example:
<table>
<tr>
<th>Name:</th>
<td>Muhammad Ahmad</td>
</tr>
<tr>
<th rowspan="2">Telephone:</th>
<td>0423-5861923</td>
</tr>
<tr>
<td>0332-4398344</td>
</tr>
</table>
ii. What is meant by Markup language ?
A webpage consists of a series of elements which are represented by tags. For
example, if you need a paragraph of text on your webpage, you use it as:

<p> Some Text Here </p>


Here <p> shows marking of paragraph opening
tag and </p> means marking of paragraph
closing tag. Due to marking of each element, it
is called a markup language.

<p> My Name is Ali </p> iii. Give a reason to


add Captcha on websites.

Ans. Captcha: CAPTCHA stands for Completely Automated Public Turing Test to Tell
Computers and Humans Apart. Its goal is to check if a user (of an app or a website) is
a real person or a bot. To do that, it relies on specific traits that people have and
machines don't. It's widely used in the web industry as a good protection against
spam, bots or DoS attacks.
We can write a program that can access a website and give it a password. It can be
used to hack a password if the program keeps trying different password for long time.
Moreover, a program can also add unnecessary data by filling a form again and again.
To avoid this situation only humans are allowed to use a system instead of a computer
program. So, a picture is shown on a website whenever there is a form and you are
asked to read that image and fill a field. The image contains text in irregular form
which is readable for human but not easily for a machine. This is called captcha.
Iv What tag is used to create a hyperlink?
Create a Hyperlink to a Webpage
The <a> tag is used to create a hyperlink in a webpage. The href attribute is used to
specify the URL of the linked webpage. For example, <a href="http://www.google.com">
Visit www.google.com </a> makes the text "Visit www.google.com" a hyperlink. If you
click on this text in the webpage, it takes you to the website v. What is difference
between hyperlink and anchor?
Ans. Hyperlink

Hyperlink is such an icon, graphic, or text in a webpage, that when clicked, takes you
to some other webpage.
• an anchor
Anchor links allow you to go from one part of the same page to another part. Both
hyperlinks and anchors are defined by the HTML anchor element <a>

vi. What is meant by opening and closing tags. Give example?


An opening tag begins a section of page content, and a closing tag ends it. For
example, to markup a section of text as a paragraph, you would open the paragraph
with an opening paragraph tag <p> and close it with a closing paragraph tag </p>
(closing tags always proceed the element with a /).

Section – II(Long Questions)

5. State the purpose of Password and write characteristics of good password?


Ans. Characteristics of a Good Password
A good password should be difficult to guess or crack. It helps to prevent unauthorized
people from accessing files, programs and other resources.
A good password has the following characteristics:
• A password is at least eight characters long.
• It does not contain user name, real name, kids name or company name.
• It does not contain a complete word.
• A good password is significantly different from previous passwords.
• A good password contains uppercase letters, lowercase letters, numbers and
symbols.
6. Define software Piracy. Also explain its any three types in detail.
Ans. Software Piracy
Piracy means making illegal copies. It can be book, software, movie, poetry, painting,
house architecture or any other work protected by copyright law. Software piracy is
the illegal copying, distribution or usage of software.

Some software companies sell software with a confidential text, called the key of that
software. This key is provided to only those people who buy that software. In this way
illegal copies are stopped to be installed. Some people start searching for that key by
using illegal means. This is called cracking the key. Open source software has no
copyrights reservation. So, we can copy source code, modify it and can even sell it.
Whether we do the piracy intentionally or unintentionally, it is illegal and punishable.
Pirated software takes away the profits of the company or individual which results in
reducing funds for further software development initiatives.
Types of Software Piracy
Types of software piracy include:
• Soft lifting
• Counterfeiting
• Client-server overuse
• Online piracy • Hard-disk loading
a) Soft lifting
Borrowing and installing a copy of a software application from a colleague is called soft
lifting.
b) Client server overuse
Installing more copies of the software than you have licenses for is called client server
overuse.
c) Hard disk loading
Installing and selling unauthorized copies of software on refurbished or new computers
is called hard disk loading.
7. What is encryption? Explain the importance of encryption for everyday life on
Internet.
Ans. Simple Encryption
The process of encoding data in such a way that only authorised person can read it is
called encryption. Encoding means conversion of the data to an unreadable format
which is called ciphertext. A secret code (called key) is required to read the
Encryption-Decryption Process
In ancient times messages were carried by foot for miles, kings and rulers used to encrypt
the letters they would send to allies. This helped to protect the secrecy of the message in
case they were stolen.
A computer expert, who can steal data when it moves from one location to other, is called
hacker. Encryption helps us to save data from hackers.
Importance of encryption for everyday life on the internet:
Encryption is one of the most important methods for providing data security. In everyday
life on the internet, vast amounts of personal information are stored on multiple places.
So, it is important to know how to keep data private.
Encryption is important because it allows you to secure data from illegal access.
Importance of encryption can be described in the following three points.
1. Protection from Hackers:
Hackers don't just steal information; they can also alter the data to commit fraud. For
example, in a bank transaction of online money transfer, they can fraud by changing
the target account number.
2. Encryption Protects Privacy:
Encryption is used to protect sensitive data, including personal information for
individuals. This helps to ensure privacy and minimizing the opportunities for
surveillance by criminals.
3. Encryption Protects Data across Devices:
Multiple (and mobile) devices are a big part of our lives, and transferring data from device
to device is a risky proposition. Encryption technology can help protect stored data across
all devices, even during transfer. Additional security measures like advanced
authentication help later unauthorized users.

You might also like