Q4. List some cases in which antivirus software does not protect your computer.
Ans. Anti-virus software cannot protect your computer against the following cases:
- Software that you have deliberately installed, which may contain unwanted features
- Online fraud and phishing
- Hackers who break through your computer security
Q3. Write a note on online backup.
Ans. In online data backup, you send your data to a remote server through the Internet. You can easily restore your data in case of data loss by connecting to the remote server. Read More …
Q2. Give examples of some popular antivirus software.
Ans. The examples of some popular antivirus software are:
- Norton Antivirus
- Smart cop
Q1. Write a short note on ethics.
Ans. Ethics play a key role in our life, be it at work or at home. They refer to the way we conduct ourselves in different circumstances.
Applying ethics to the world of the Internet means we must ensure that our actions do not harm or cause inconvenience to other online users. In other words, we must observe proper etiquettes on the Internet.
Q14. What is data backup?
Ans. Data backup is a process of making an extra copy of the data on a computer and storing it in a different location on the computer or in an external device. We can use this data in case of an emergency, For example, when the original data is accidentally deleted.
Q13. What is a denial of service attack?
Ans. A denial of service attack is a a type of attack that consumes all the resources of a computer. As a result, the computer or its applications are not able to function. An example of such attack is flooding the computer with junk mail.
Q12. What is the difference between a digital certificate and digital signature?
Ans. A digital certificate is a electronic file is issued by a certification authority, such as Thawte, to websites. A Digital Certificate helps assure users that the website they are visiting is trustworthy. On the other hand, a digital signature helps the user ensure data integrity and authentication. It is a digital code, which is attached to an electronically transmitted data to uniquely identify the sender.
Q11. Answer the following questions:
- Shreenivasan is working for an IT firm where he needs to take a backup of his data of around 200MB to 400MB at the end of each day. The backup he takes everyday needs to be achieved separately for future reference. Suggest any two economic data backup devices, which he can use for this purpose.
- Differentiate between hackers and crackers with the reference to their intention and motive.
- Name one specific software/ tool for each of the following categories:
1. Anti-virus software
2. Data recovery tool
3. Online backup tool
4. Text editor to create HTML pages
5.Open Source web browser
- CD and DVD
- Hacker is a slang term for a person who is passionate about computers, one who enjoys gathering any type of information about computers and programming languages. The term is sometimes used derogatorily to mean a person who uses this knowledge to break into a computer to steal sensitive information. In simple word, hackers are people who break into a computer with no malicious intention. On the other side, crackers are the people who gain unauthorized access to a computer with the intention of stealing information or causing harm to the computer by destroying its software. However, the popular mass media finds no distinction between the two terms and uses them interchangeably.
1. Anti-virus software: Vipre
2. Data recovery tool: NTFS-reader
3. Online backup tool: Dropbox
4. Text editor to create HTML pages: Notepad2
5.Open Source web browser: Mozilla Firefox
Q10. What are the advantages of online backup?
Ans. The advantages of online backup are as follows:
- Cost less than other modes of backup.
- Does not need hardware, such as CD’s and DVDs, to take the backup; it saves the user from the trouble of maintaining or repairing the hardware.
- Allows the user to restore his/her backup from any location in the world anytime.
- Provides a high level of security as the user’s data is encrypted before it is sent to the remote server.
- Keeps the backup safe from threats such as theft, fire, earthquake, and other such disasters as the backup is stored on a remote computer.
Q9. What are worms? Explain with Examples?
Ans. A worm is a program that harms the computer and destroys data stored in it. A computer is a Self-replicating program that uses the network to send its copy from one computer to another. Worms are considered more harmful than viruses because they rely less (or not at all) on human behavior to spread themselves. Computer worms spread much more rapidly than computer virus. Some examples of computer worms are as follows:
- Sasser worm
- SQL Slammer worm
- Blaster worm
- Melissa worm
- Sobig worm
- Mydoom worm