Friday, 27 December 2024

Grade-10 Ch-3 Computer Security RoseBud

 

Chapter-3: Computer Security RoseBud

1. Fill in the blanks.

a) education, health and business b) damaged, hacked c) 210 to 240 Celsius d) fire e) UPS and volt-guard f) organism, it is a computer program g) password

2. Tick the best answer

a) Hard Disk b) malwares c) Both i and ii d) Theft e) Securing data and information f) data

3. State true or false:

a) True b) False c) True d) True e) True

4. Technical terms

a) Antivirus b) Backup c) UPS (Uninterruptible Power Supply) d) Password e) Encryption

5. Match the following:

a) Backup= Duplicate copy of data b) Password = Allows user to access system c) Scan Disk = Checks and fixes errors of storage devices d) Computer Virus = Software that destroys data

6. Write short notes on:

a) Firewall : A firewall consists of software and hardware set up between an internal computer network and the Internet. A computer network manager sets up the rules for the firewall to filter out unwanted disturbances. These rules are set up in such a way that unauthorized access is much more difficult. b) Trojan Horse : A Trojan horse or Trojan, is a malware program that comes as an application. The software initially appears to perform a desirable function for the user prior to installation or execution, but steals information or harms the system. Unlike viruses Trojan horses do not replicate themselves, but they can be just as destructive.

c. Insurance Policy An insurance policy is a contract between a person and an insurance company that provides financial protection against risks like accidents, illnesses, or property damage. It requires regular payments, called premiums, in exchange for coverage when needed.

d. Scandisk Scandisk is a tool used to check and repair errors on a computer's hard drive or storage device. It helps in fixing issues like corrupted files or bad sectors, ensuring the system runs smoothly.

e. Hacking Hacking is the act of unauthorized access to computer systems or networks, often with the intent to steal information or cause damage. It is illegal and can lead to serious consequences.

f. Fire Detectors Fire detectors are devices that sense the presence of smoke or heat to alert people of a potential fire. They are commonly installed in homes and buildings to provide early warning and save lives.

7. Answer the following questions in short.

a. What is a computer worm? Answer: A computer worm is a self-replicating malicious program that spreads across networks without human intervention.

b. What is a rootkit? Answer: A rootkit is a set of software tools designed to gain unauthorized access to a computer system and hide its presence.

c. List any two hardware threats. Answer: Two hardware threats are physical theft of devices and damage to hardware components from electrical surges.

d. What is encryption? Answer: Encryption is the process of converting data into a coded format to prevent unauthorized access.

e. What is software security? Answer: Software security involves measures and practices to protect software from vulnerabilities, bugs, or malicious attacks.

f. List any two points for creating a strong password. Answer: Two points for creating a strong password are using a combination of uppercase and lowercase letters, numbers, and symbols, and avoiding common words or predictable patterns.

8. Answer the following questions.

a. Define computer security. List any three hardware and software security measures. Answer: Computer security involves protecting computer systems and networks from unauthorized access, data theft, and damage. Three security measures are using firewalls, installing anti-virus software, and enabling encryption for sensitive data.

b. What is a power regulating device? Write functions of UPS in brief. Answer: A power regulating device controls the voltage and power supplied to electronic devices. The functions of an Uninterruptible Power Supply (UPS) include providing backup power during outages and regulating voltage to protect devices from power surges.

c. What is a computer virus? Give two examples of it. Answer: A computer virus is a malicious program designed to replicate itself and spread to other computers, often damaging files or systems. Two examples are the "ILOVEYOU" virus and the "MyDoom" virus.

d. Define anti-virus software. Give two examples of it. Answer: Anti-virus software is a program designed to detect, prevent, and remove malicious software from a computer. Two examples are Norton AntiVirus and McAfee.

e. What is a backup? Why are backups vital to data and software security? Answer: A backup is a copy of data stored separately from the original, used to restore data in case of loss or corruption. Backups are vital because they ensure that important data can be recovered after hardware failure, cyberattacks, or accidental deletion.

f. What is authentication? Explain biometric in brief. Answer: Authentication is the process of verifying the identity of a user or system. Biometric authentication uses unique physical characteristics, such as fingerprints or facial recognition, to verify identity.

g. What is data security? Write any two data security measures. Answer: Data security involves protecting data from unauthorized access, corruption, or theft. Two data security measures are encryption and secure access controls.

h. Difference between encryption and decryption. Answer: Encryption is the process of converting data into a coded form to prevent unauthorized access, while decryption is the process of converting encrypted data back into its original form to be accessed by authorized users.

i. What is hardware security? Explain any two hardware security measures. Answer: Hardware security involves protecting physical devices from unauthorized access or damage. Two hardware security measures are using biometric access control systems and securing devices with hardware encryption keys.

No comments:

Post a Comment

Popular Posts