Chapter 2,3,4,5 Solution
Chapter 2,3,4,5 Solution
[6×1=6]
Ans: Cryptography is the study of secure communications techniques that allow only the sender
and intended recipient of a message to view its contents
g. Write opportunities and threats in social media.
Ans: Opportunities of social media is It creates awareness and innovate the way people live and
Threats of social media is personal data and privacy can be easily hacked and shared on the internet.
h. What is phishing?
Phishing is a type of online scam where someone tricks a victim into giving away personal
information, like passwords or bank account details.
i. What is hacking?
Hacking is the act of compromising digital devices and networks by gaining unauthorized access to
an account or computer system
j. Define cyberbullying with any four examples?
Cyberbullying is defined as the use of electronic communication to harass, threaten, or humiliate
individuals, particularly through social media, messaging apps, and other online platforms. Examples
of Cyberbullying are: Harassment via Messages, Posting Embarrassing Content, Exclusion from
Online Groups, Impersonation
Ans: Digital citizenship refers to the responsible and ethical use of technology and the internet which
involves understanding, practicing, and promoting appropriate behavior when using digital tools and
resources.
Any four elements (themes) of Digital Citizenship are:
Digital Access: The state of full electronic participation in society
Digital Commerce: The act of promoting the purchase of goods through electronic means
Digital Communication: Electronic exchange of information
Digital literacy: Teaching and learning about teaching and technology
j. What is E-Learning? Write some examples of it.
Ans: E-learning is a new concept of delivering digital contents in learner-oriented
environment using information and communication technology (ICT).
Examples are Virtual Classrooms from Zoom and Google Meet, Online textbooks and eBooks, Video
based learning platforms like YouTube etc.
b. What is software security? Write any two measures of hardware security.
Software security is the protection of computer systems and applications from threats,
such as hacking, virus attacks, and unauthorized access, to ensure their
confidentiality, integrity, and availability.
Any two measures of hardware security are: - Insurance - Power Protection Device
d. What is M-Commerce? Write any two important services.
M-Commerce refers to the process of buying and selling of goods and services through
wireless handheld devices such as smartphones, tablets or personal digital assistants (PDAs).
Any two important services are: Purchasing airlines tickets, purchasing movie tickets,
Restaurant / Hotel booking and reservation Fund Transfer, Top – Up Charges Fund
Transfer
e. What is IoT? Write any two importance of it.
IoT is a system of interrelated computing device to exchange information over a network
without human-to-human or human to computer interaction. Any two importance of IoT
are:
It reduces the human effort, so it saves a lot of time.
Information is easily accessible from any place at any time on any device.
c) What is computer security? Write any two hardware security measures.
Ans: Computer security refers to protecting computer and its content from damage, theft or misuse
and action to prevent such incidents.
The name of any two hardware security measures are: Regular Maintenance, Power Protection
device (Volt guard, Spike guard, UPS)
Why mobile computing is necessary in present time? Write any two importance of it.
Ans: Mobile computing refers to a variety of devices that allow people to access data and information
from wherever they are via a mobile device.
Any two importance of mobile computing are:
• It allows people to work and communicate from anywhere at any time.
• It keeps connected to the Internet, allowing to access information all the times.
What is online payment? Write some different modes of electronic payment.
Ans. Online payment refers to the payment for buying goods or services through the Internet using
different online payment gateway. Some modes of electronic payment are:
a) Credit Card
b) Debit Card
c) Smart Card
e) Electronic Fund Transfer (EFT)
d) What is VR? Mention its application areas.
An artificial environment created with computer hardware and software and presented to the user
in such a way that it appears and feels like a real environment is called Virtual Reality. Its
application areas are:
It can be used in medical studies to enable students to know the human body structure.
It can be used in driving schools as it give a real look of roads and traffic
b) What is digital footprint? Write any two tips to maintain digital
reputation.
Ans: a digital footprint is a trail of data you create while using the internet.
Any two tips to maintain digital reputation are:
i. Be transparent
ii. Respond to every review
c) What is password policy? Write any two important criteria for creating strong password.
Ans: A password policy defines the password strength rules that are used to determine whether a
new password is valid.
Any two important criteria for creating strong password are:
a) Do not keep a password which can be easily guessed such as date of birth, nickname etc.
b) Keep changing your password regularly.
Ans: Computer security refers to the measures taken to protect computer systems and networks
from unauthorized access, theft, damage, and disruption.
An antivirus helps to secure computer software by detecting and removing malicious software,
such as viruses, spyware, and Trojans, that can harm the computer or steal sensitive information.
What is Cryptography? How encryption helps in data protection?
Ans: Cryptography is the practice of securing communication and data by converting it into a
code to prevent unauthorized access or manipulation.
Encryption helps in data protection by providing a secure way to store and transmit sensitive information.
What is power protection device? Write its role in computer security.
Ans: Power protection device is device that control the voltage fluctuation and supply required
amount of power to the respective device. Its role in computer security is to keep data and programs
safe.
e) List the types of E-governance. Describe any one of
them. Ans: The types of E-governance are:
· Government-to-Citizen(G2C)
· Government-to-business (G2B)
· Government-to-Government (G2G)
· Government-to-Employee (G2E)
Government-to-Citizen(G2C)
G2C-is transaction between the government to citizens. It includes online registration of birth/
death/marriage certificates, filling of income taxes, electricity bills, license renewals etc.