0% found this document useful (0 votes)
8 views

Chapter 2,3,4,5 Solution

The document provides a comprehensive overview of various concepts related to technology, including definitions of social media, digital signatures, digital currency, and cybersecurity. It also discusses the implications of cyber law, cybercrime, and digital citizenship, along with the advantages and disadvantages of social media and e-commerce. Additionally, it covers topics like artificial intelligence, cloud computing, and online payment systems, while offering guidelines for safe internet practices and computer ethics.

Uploaded by

hw110988
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Chapter 2,3,4,5 Solution

The document provides a comprehensive overview of various concepts related to technology, including definitions of social media, digital signatures, digital currency, and cybersecurity. It also discusses the implications of cyber law, cybercrime, and digital citizenship, along with the advantages and disadvantages of social media and e-commerce. Additionally, it covers topics like artificial intelligence, cloud computing, and online payment systems, while offering guidelines for safe internet practices and computer ethics.

Uploaded by

hw110988
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

1. Answer the following questions in one sentence.

[6×1=6]

a. What is social media?


 Social media is an online tool that helps us to stay connected with the whole world.
b. What is digital signature?
 Digital signature is a security mechanism system used on the internet for data and information
transaction by attaching a code at the end of the electronic message that confirms the authenticity of
sent message.
c. What is digital currency?
Ans: Digital currency is a type of electronic money that is stored and exchanged using computers and
other digital devices.
d. Why data decryption is necessary?
 To convert encrypted (coded) data into readable form
e. What is digital citizenship?
Ans: Digital citizenship refers to the responsible and ethical use of technology and the internet which involves
understanding, practicing, and promoting appropriate behavior when using digital tools and resources.
f. Define Cryptography.

Ans: Cryptography is the study of secure communications techniques that allow only the sender
and intended recipient of a message to view its contents
g. Write opportunities and threats in social media.

Ans: Opportunities of social media is It creates awareness and innovate the way people live and
Threats of social media is personal data and privacy can be easily hacked and shared on the internet.
h. What is phishing?
 Phishing is a type of online scam where someone tricks a victim into giving away personal
information, like passwords or bank account details.
i. What is hacking?
 Hacking is the act of compromising digital devices and networks by gaining unauthorized access to
an account or computer system
j. Define cyberbullying with any four examples?
 Cyberbullying is defined as the use of electronic communication to harass, threaten, or humiliate
individuals, particularly through social media, messaging apps, and other online platforms. Examples
of Cyberbullying are: Harassment via Messages, Posting Embarrassing Content, Exclusion from
Online Groups, Impersonation

k. What is the business done through internet?

 The business done through internet is e-commerce.

l. Write any two protection measures for it.


Any two protection measures for software security are: Backup, Password
k. What is e-commerce?
E-Commerce refers to electronic transactions such as buying, selling and exchanging of goods, services
and information over computer communication network such as the Internet.
m. Write any two benefits of cloud computing.

Ans: Any two benefits of cloud computing are


a. It allows to quickly and easily access, store information anywhere, anytime in the whole world,
using an internet connection.
b. It is easier to get back-up and restore the data.
What is e-governance?
Ans: E-Governance refers to the use of the digital technology by government to enhance the
delivery of public services and engage with citizens more effectively.
What is biometric verification?
Ans: Biometric verification is a method of confirming an individual's identity by analyzing and
measuring unique physical or behavioral characteristics like fingerprints, facial patterns and voice
2. Write appropriate technical terms for the following: [2×1=2]
a. Law that governs the legal issues of cyberspace. Cyber Law
b. Digital marks created while using Internet. Digital Footprint
c. A collective online communications channels dedicated to community-based input, interaction, content
sharing and collaboration. Social media
d. Making data and information unreadable by unauthorized person. Encryption
e. A system of copying data and information reading in computer into another location. Backup
f. Computer program that protects computer from computer virus. Antivirus Software
g. The money that is exchanged electrically. Digital currency
h. A powerful program that controls and coordinates a computer’s hardware devices and runs software
and applications. Operating System
i. Secret group of characters which helps to protect file from unauthorized person. Password
j. The protection of computer systems and sensitive information from unauthorized access,
theft or damage. Cybersecurity
k. Hacking done with permission from the client. Ethical Hacking
l. The process of identifying an individual usually based on a username and password. Authentication
m.The network security systems that monitor and control the traffic flow (data packets). Firewall
n. A program that destroys other programs. Computer Virus

3. write the full form of the following. [2*1]

a. ICT = Information and Communication Technology


b. IoT – Internet of Things
c. CCTV: Closed Circuit Television
d. SMPS- Switched Mode Power Supply
e. POS- Point Of Sale
f. B2B = Business to Business
g. VRML- Virtual Reality Modeling Language
h. UPS - Uninterruptible Power Supply
i. G2B - Government-to-Business
j. CVT- Constant Voltage Transformer
k. AC- Alternating Current
l. DC- Direct Current
m. CCA- Controller of Certificate Authority
n. CRA- Consumer Reporting Agencies
o. EDP: Electronic Data Processing
p. EDI: Electronic Data Interchange
q. ETDSA: Electronic Transaction and Digital Signature Act.
4. Answer the following questions.[9×2=18]

a. What is computer ethics? Write any two of them.


Computer ethics is a set of moral principles or code of conducts that regulate the use
of computers systematically without making harm to other users. Any two cyber ethics
are:
• Do not use a computer to publish fake information.
• Do not search the file or record of other people.
b. Write ant two advantages and disadvantages of social media.
Any two advantages of social media are:
i. It creates awareness and innovate the way people live
ii. Social media let us share anything with others around the world
Any two disadvantages of social media are:
i. Personal data and privacy can be easily hacked and shared on the internet.
ii. More chances of creating fake accounts.
c. What is cyber law and cyber-crime?
 The law which governs the legal issues in the cyber space regarding the internet or WWW for digital
data processing and transaction is called cyber law.
Cyber-crime refers to criminal activities that are carried out using computers, networks and the
internet.
d. What is cyber law? Give some examples.
 The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data
processing and transaction is called cyber law . Examples of cyber law are Electronic and Digital
Signature Law, Cyber Crime Law, Intellectual property Law, Data Protection and Privacy Law etc.
e. List four ways to stay safe on social networks. Any four ways to stay safe on social networks
• Pick strong passwords and update them frequently.
• Report harassment or inappropriate content.
• being cautious about friend requests
• avoiding clicking suspicious links
f. Write any four commandments of computer ethics.
Any four commandments of computer ethics are:
i. You should not use a computer to harm other people.
ii. You should not search the file or record of other people.
iii. You should not spread false and illegal information.
iv. You should not destroy, erase or edit personal or group records.
g. What is cyber-ethics? List out any two cybercrimes.
 Cyber ethics is the set of moral standards that govern the use of computer. It is the society's views
about the use of computers, both hardware and software. Phishing and hacking are any two
cybercrimes.
h. What is digital footprint? Write any two tips to maintain digital reputation.
Ans: A digital footprint is a trail of data you create while using the internet.
Any two tips to maintain digital reputation are:
i. Be transparent
ii. Respond to every review
i. What is Digital Citizenship? List any four elements (themes) of Digital Citizenship.

Ans: Digital citizenship refers to the responsible and ethical use of technology and the internet which
involves understanding, practicing, and promoting appropriate behavior when using digital tools and
resources.
Any four elements (themes) of Digital Citizenship are:
Digital Access: The state of full electronic participation in society
Digital Commerce: The act of promoting the purchase of goods through electronic means
Digital Communication: Electronic exchange of information
Digital literacy: Teaching and learning about teaching and technology
j. What is E-Learning? Write some examples of it.
Ans: E-learning is a new concept of delivering digital contents in learner-oriented
environment using information and communication technology (ICT).

Examples are Virtual Classrooms from Zoom and Google Meet, Online textbooks and eBooks, Video
based learning platforms like YouTube etc.
b. What is software security? Write any two measures of hardware security.
 Software security is the protection of computer systems and applications from threats,
such as hacking, virus attacks, and unauthorized access, to ensure their
confidentiality, integrity, and availability.
Any two measures of hardware security are: - Insurance - Power Protection Device
d. What is M-Commerce? Write any two important services.
 M-Commerce refers to the process of buying and selling of goods and services through
wireless handheld devices such as smartphones, tablets or personal digital assistants (PDAs).
Any two important services are: Purchasing airlines tickets, purchasing movie tickets,
Restaurant / Hotel booking and reservation Fund Transfer, Top – Up Charges Fund
Transfer
e. What is IoT? Write any two importance of it.
 IoT is a system of interrelated computing device to exchange information over a network
without human-to-human or human to computer interaction. Any two importance of IoT
are:
 It reduces the human effort, so it saves a lot of time.
 Information is easily accessible from any place at any time on any device.
c) What is computer security? Write any two hardware security measures.
Ans: Computer security refers to protecting computer and its content from damage, theft or misuse
and action to prevent such incidents.
The name of any two hardware security measures are: Regular Maintenance, Power Protection
device (Volt guard, Spike guard, UPS)

Define artificial intelligence (AI). Write any two uses of AI.


Ans: Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent
machines that work and reacts like humans.
Any two uses of AI are
1. AI can be used to detect fraud in financial transactions, such as credit card fraud.
2. AI can be used to diagnose diseases more accurately and efficiently than humans can.

What is computer virus? Give some examples.


A computer virus is a destructive program that copies itself and infects a PC, spreading from one file to another, and
then from one PC to another when the files are copied or shared. E.g. C-Brain, Frodo, Disk Killer, I Love You
etc
(b) Write any two measures to protect hardware and explain.
Any two measures to protect hardware are:
Regular Maintenance
Computer system need regular maintenance to keep the computer hardware in good working condition
and it also helps to find out problems in hardware and correct the problems before they cause several
damages.
Power Protection Device
An electric device that controls electric voltage and provides enough backup to the computer system
when there is power failure. Computer needs 220 volts to 240 volts constantly. Some common power
protection devices are: UPS, Volt Guard, CVT (Constant Voltage Transformer) etc.
a. "Al is for the aid of people not their against. Explain.
AI is an emerging branch in computer science, which interprets the means and method of making
computers think like human beings. AI is for the aid of people not their against. AI reduces labor and
operational costs by automating tasks. AI processes and analyzes data faster than humans, leading to
quicker decision-making. AI can automate repetitive tasks, saving time and reducing errors. AI systems
can work continuously (24/7) without rest.

(e) What is cyber-crime? Explain any one of them


Cyber crime refers to criminal activities that are carried out using computers, networks and the
internet. Phishing is the fake attempt to obtain sensitive information such as usernames, passwords
and credit card details by disguising oneself as a trustworthy entity in an electronic communication
What is cloud computing? Write any two examples of Al.
Cloud computing is a technology that allows users to access and use of computing resources, like
servers and software, over the internet.
Any two examples of Al are: speech recognition (like Siri, Microsoft Cortana, Amazon Echo, Google
Home etc.), and self-driving cars.
d) Define online payment with example.
Ans: Online payment refers to the payment for buying goods or services through the Internet
using different online payment gateway. Eg: eSewa Nepal, iPay, Khalti, etc.
What is firewall in computer. Write its type.
Ans: A firewall is the network security systems that monitors and controls the traffic flow between the
Internet and private network on the basis of a set of user-defined rules. Its Types are:
- Network Firewall: A security system placed between a private internal network and the
internet to monitor and control incoming and outgoing network traffic.
- Host-based Firewall: A software program installed on a single computer or device to monitor
and control incoming and outgoing network traffic for that specific device.

Why mobile computing is necessary in present time? Write any two importance of it.
Ans: Mobile computing refers to a variety of devices that allow people to access data and information
from wherever they are via a mobile device.
Any two importance of mobile computing are:
• It allows people to work and communicate from anywhere at any time.
• It keeps connected to the Internet, allowing to access information all the times.
What is online payment? Write some different modes of electronic payment.
Ans. Online payment refers to the payment for buying goods or services through the Internet using
different online payment gateway. Some modes of electronic payment are:
a) Credit Card
b) Debit Card
c) Smart Card
e) Electronic Fund Transfer (EFT)
d) What is VR? Mention its application areas.
An artificial environment created with computer hardware and software and presented to the user
in such a way that it appears and feels like a real environment is called Virtual Reality. Its
application areas are:
 It can be used in medical studies to enable students to know the human body structure.
 It can be used in driving schools as it give a real look of roads and traffic
b) What is digital footprint? Write any two tips to maintain digital
reputation.
Ans: a digital footprint is a trail of data you create while using the internet.
Any two tips to maintain digital reputation are:
i. Be transparent
ii. Respond to every review
c) What is password policy? Write any two important criteria for creating strong password.
Ans: A password policy defines the password strength rules that are used to determine whether a
new password is valid.
Any two important criteria for creating strong password are:
a) Do not keep a password which can be easily guessed such as date of birth, nickname etc.
b) Keep changing your password regularly.

What is e-commerce? Write any two disadvantages of e-commerce.


Ans: E- Commerce refers to the buying and selling of goods or services using the internet.
Any two disadvantages of e-commerce are:
• Lack of personal touch. We cannot touch the goods physically.
• We cannot do any transaction without Internet access device. So, it is heavily
dependent on Internet technologies

What is IoT? Write any two advantages of it.


Ans: A technology that connects all electronic devices together and prompts them to exchange
information without any human intervention is called IoT. Any two advantages of IoT are:
• It reduces the human effort, so it saves a lot of time.
• Information is easily accessible from any place at any time on any device.

List the types of E-Commerce. Describe any one of them.


Ans: The types of Ecommerce Models are:
Business to Consumer (B2C):
Business to Business (B2B):
Consumer to Consumer (C2C):
Consumer to Business (C2B):
Business to Consumer (B2C):
The most common type of E-Commerce is Business-to-Consumer. B2C establishes the
electronic business relationships between a business organization (merchant) and final
consumers. (e.g. You buy a pair of shoes from an online retailer)
Amazon. com is a good example of B2C e-commerce.
Define computer security How antivirus helps to secure computer software?

Ans: Computer security refers to the measures taken to protect computer systems and networks
from unauthorized access, theft, damage, and disruption.
An antivirus helps to secure computer software by detecting and removing malicious software,
such as viruses, spyware, and Trojans, that can harm the computer or steal sensitive information.
What is Cryptography? How encryption helps in data protection?

Ans: Cryptography is the practice of securing communication and data by converting it into a
code to prevent unauthorized access or manipulation.
Encryption helps in data protection by providing a secure way to store and transmit sensitive information.
What is power protection device? Write its role in computer security.
Ans: Power protection device is device that control the voltage fluctuation and supply required
amount of power to the respective device. Its role in computer security is to keep data and programs
safe.
e) List the types of E-governance. Describe any one of
them. Ans: The types of E-governance are:
· Government-to-Citizen(G2C)
· Government-to-business (G2B)
· Government-to-Government (G2G)
· Government-to-Employee (G2E)
Government-to-Citizen(G2C)

G2C-is transaction between the government to citizens. It includes online registration of birth/
death/marriage certificates, filling of income taxes, electricity bills, license renewals etc.

You might also like