Chapter – 15
Societal Impact of Information
Technology
Part II
I Objective type questions:
Part A Fill int he blanks:
1. communication
2. Plagiarism
3. Hacking
4. piracy
5. programmer
Part B Multiple Choice Questions:
1. Plagiarism
2. Back up
3. Antivirus
4. Encryption
5. Data entry operator
II. Descriptive Type Questions:
Part A Very short answer questions
Part A Fill int he blanks:
1. communication
2. Plagiarism
3. Hacking
4. piracy
5. programmer
Part B Multiple Choice Questions:
1. Plagiarism
2. Back up
3. Antivirus
4. Encryption
5. Data entry operator
II. Descriptive Type Questions:
Part A Very short answer questions
1. EFTPOS ( Electronic Funds Transfer at Point of
Sale)
2. Agricultural and Automative Industries
3. Password
4. The security system to protect a computer from hacker attacks is firewall.
5. The technology that involves masking important data to prevent unauthorized access is data masking.
2. Agricultural and Automative Industries
3. Password
4. The security system to protect a computer from hacker attacks is firewall.
5.
Part B Short answer questions:
1. ICT has helped in education in the following ways:
1. ICT has helped in education in the following ways:
a.
It creates interactive classroom teaching;
students enjoy the environment and it results in improved concentration
b.
An e-learning program allows students to learn
at their own pace, at any time, and from any place.
2. (i) Trademark - It is a word, a name , or a symbol used to identify and distiguish the product of one manufacturer or seller from that of others.
(ii) Patent - It is a legal right that allows the creator of an invention the sole right to make, use, and sell that invention for a set period of time.
3. a. Back data regularly
b. Data encryption and password protection
4. In order to avoid plagiarism, one needs to obtain written permission from a copyright owner and/or cite the source when using that information.
5. Two skills required to make a career in the field of IT industry are:
a. Logical Thinking b. Creative thinking
2. (i) Trademark - It is a word, a name , or a symbol used to identify and distiguish the product of one manufacturer or seller from that of others.
(ii) Patent - It is a legal right that allows the creator of an invention the sole right to make, use, and sell that invention for a set period of time.
3. a. Back data regularly
b. Data encryption and password protection
4. In order to avoid plagiarism, one needs to obtain written permission from a copyright owner and/or cite the source when using that information.
5. Two skills required to make a career in the field of IT industry are:
a. Logical Thinking b. Creative thinking
Part C Long Answer questions
1.
ICT stands for Information Communication
Technology. It deals with the use of
computers and other electronic means to store, process, transmit, and retrieve
data or information.
ICT in governance is used in the following
manner:
a)
Greater attention to improve the service delivery
mechanism
b)
Enhancing the efficiency of departments.
2.
In the context of IT, Privacy refers to the
ability to control the information revealed by someone about him/her online and
to control who can access that information. This information includes one’s Web
surfing habits, IP address etc.It is affected by spyware,
phishing, and e-mail web bugs as the often deliver specific advertisements or
cookies to collect personal information by unlawful means and is used to cheat
users and/ or harm their computers.
3. Security of information means preventing unauthorized access to it and ensuring that it is kept safe from corruption (i.e., errors occurring during its transmission or retrieval).
Integrity of Information refers to the
authenticity and reliability of information.
The following are the technologies are used
to prevent the security and integrity of information:
a)
Password – it is a secret sequence of characters
b)
Antivirus Software – To detect and remove viruses and other malicious
software
c)
Firewall – it is a security system designed to
protect a computer from hacker attacks.
4. Intellectual Property Rights are the legal rights over creations of mind such as asliterary or artistic works, music, ideas, discoveries, and designs.
a.
Copyright – This law typically protect creative
works such as books, movies, music, paintings, photographs and software. They
give the creator/ owner the exclusive right to control the reproduction or
adaption of such works for a certain period for time.
b.
Patent – It is a legal right that allows the
creator of an invention the sole right to make, use, and sell that invention
for a set period of time.
5.
Difference between:
Knowledge Engineers
|
Networking Engineers
|
1. Design
computer systems with artificial intelligence.
|
1. They
are responsible for designing and management of computer networks and implementation
of support and services for the same.
|
2. They
should be trained in fifth- generation languages such as LISP, Prolog, and
STRIPS, and should have sound numerical and statistical ability.
|
2. They should have knowledge of the ports,
hardware components, device drivers,
and compatibility options of hardware and software.
|
Part D Application Based Questions:
1. The teacher instructs rightly to the students to change their passwords. The new passwords should be strong so that no other person can hack into any student's account.
2. The teacher understands that copying someone's work without their consent s illegal.
The term related is plagiarism.
In order to avoid plagiarism, one needs to obtain written permission from a copyright owner and/or cite the source when using that information.
3. To prevent unauthorized access of fees and academic data, the school should get data masking implemented on the important data.
4. Data encryption should be done to send important information over the internet safely. Data encryption is a technology that protects information by converting it into an unreadable code that cannot be deciphered easily by unauthorized people.
5. The principal has instructed the office incharge to make a copy of the fee data so as to maintain a proper database regularly and avoid data conflicts.
No comments:
Post a Comment