Ans. Data backup is a process of making an extra copy of the data on a computer and storing it in a different location on the computer or in an external device. We can use this data in case of an emergency, For example, when the original data is accidentally deleted.
Ans. A denial of service attack is a a type of attack that consumes all the resources of a computer. As a result, the computer or its applications are not able to function. An example of such attack is flooding the computer with junk mail.
Q12. What is the difference between a digital certificate and digital signature? Ans. A digital certificate is a electronic file is issued by a certification authority, such as Thawte, to websites. A Digital Certificate helps assure users that the website they are visiting is trustworthy. On the other hand, a digital signature helps the user ensure data integrity and authentication. It is a digital code, which is attached to an electronically transmitted data to uniquely identify the sender.
Shreenivasan is working for an IT firm where he needs to take a backup of his data of around 200MB to 400MB at the end of each day. The backup he takes everyday needs to be achieved separately for future reference. Suggest any two economic data backup devices, which he can use for this purpose.
Differentiate between hackers and crackers with the reference to their intention and motive.
Name one specific software/ tool for each of the following categories:
1. Anti-virus software 2. Data recovery tool 3. Online backup tool 4. Text editor to create HTML pages 5.Open Source web browser Ans.
CD and DVD
Hacker is a slang term for a person who is passionate about computers, one who enjoys gathering any type of information about computers and programming languages. The term is sometimes used derogatorily to mean a person who uses this knowledge to break into a computer to steal sensitive information. In simple word, hackers are people who break into a computer with no malicious intention. On the other side, crackers are the people who gain unauthorized access to a computer with the intention of stealing information or causing harm to the computer by destroying its software. However, the popular mass media finds no distinction between the two terms and uses them interchangeably.
1. Anti-virus software: Vipre
2. Data recovery tool: NTFS-reader
3. Online backup tool: Dropbox
4. Text editor to create HTML pages: Notepad2
5.Open Source web browser: Mozilla Firefox
Ans. A worm is a program that harms the computer and destroys data stored in it. A computer is a Self-replicating program that uses the network to send its copy from one computer to another. Worms are considered more harmful than viruses because they rely less (or not at all) on human behavior to spread themselves. Computer worms spread much more rapidly than computer virus. Some examples of computer worms are as follows:
Trojan horse or simply Trojans are unauthorized programs placed inside a legitimate application. An attacker uses a Trojan to illegitimately get access to a computer and view secret information, such as passwords, and harm the computer. Read More …
Ans. The following are the different stages in the life cycle of a virus:
Creation: Represents the stage when a virus is first created. Till a few years back, knowledge of a programming language was required to create a virus. However, today anyone with knowledge of basic programming concepts can create a virus. Read More …
Ans. Information security plays an important role in the growth of e-commerce. It can be defined as a set of rules and regulations that users follow online to ensure that the information they provide is not misused in any way. In other words, information security implies protection of information from illegal access or modification.