Class IX

Monday, 21 November 2016

Chapter 15 Class 9

Chapter – 15
Societal Impact of Information Technology

Part II

I Objective type questions:

Part A Fill int he blanks:
1. communication
2. Plagiarism
3. Hacking
4. piracy
5. programmer

Part B Multiple Choice Questions:
1. Plagiarism
2. Back up
3. Antivirus
4. Encryption
5. Data entry operator

II. Descriptive Type Questions:

Part A    Very short answer questions

             1.        EFTPOS ( Electronic Funds Transfer at Point of Sale)
      2.       Agricultural and Automative Industries
      3.       Password
      4.     The security system to protect a computer from hacker attacks is firewall.
      5.      The technology that involves masking important data to prevent unauthorized access is data masking.


Part B  Short answer questions:

1.  ICT has helped in education in the following ways:
a.       It creates interactive classroom teaching; students enjoy the environment and it results in improved concentration
b.       An e-learning program allows students to learn at their own pace, at any time, and from any place.

2. (i) Trademark - It is a word, a name , or a symbol used to identify and distiguish the product of one manufacturer or seller from that of others.
(ii) Patent - It is a legal right that allows the creator of an invention the sole right to make, use, and sell that invention for a set period of time.
3. a. Back data regularly
    b. Data encryption and password protection
4. In order to avoid plagiarism, one needs to obtain written permission from a copyright owner and/or cite the source when using that information.
5. Two skills required to make a career in the field of IT industry are:
    a. Logical Thinking                       b. Creative thinking

Part C  Long Answer questions
      1.       ICT stands for Information Communication Technology.  It deals with the use of computers and other electronic means to store, process, transmit, and retrieve data or information.
 ICT in governance is used in the following manner:
a)       Greater attention to improve the service delivery mechanism
b)      Enhancing the efficiency of departments.

       2.       In the context of IT, Privacy refers to the ability to control the information revealed by someone about him/her online and to control who can access that information. This information includes one’s Web surfing habits, IP address etc.It is affected by spyware, phishing, and e-mail web bugs as the often deliver specific advertisements or cookies to collect personal information by unlawful means and is used to cheat users and/ or harm their computers.
   
     3.       Security of information means preventing unauthorized access to it and ensuring that it is kept safe from corruption (i.e., errors occurring during its transmission or retrieval).
Integrity of Information refers to the authenticity and reliability of information.
The following are the technologies are used to prevent the security and integrity of information:
a)       Password – it is a secret sequence of characters
b)      Antivirus Software – To detect  and remove viruses and other malicious software
c)       Firewall – it is a security system designed to protect a computer from hacker attacks.
   
     4.       Intellectual Property Rights are the legal rights over creations of mind such as asliterary or artistic works, music, ideas, discoveries, and designs.
a.       Copyright – This law typically protect creative works such as books, movies, music, paintings, photographs and software. They give the creator/ owner the exclusive right to control the reproduction or adaption of such works for a certain period for time.
b.       Patent – It is a legal right that allows the creator of an invention the sole right to make, use, and sell that invention for a set period of time.

      5.       Difference between:
Knowledge Engineers
Networking Engineers
1.       Design computer systems with artificial intelligence.
1.       They are responsible for designing and management of computer networks and implementation of support and services for the same.
2.       They should be trained in fifth- generation languages such as LISP, Prolog, and STRIPS, and should have sound numerical and statistical ability.
2.  They should have knowledge of the ports, hardware components,  device drivers, and compatibility options of hardware and software.

Part D Application Based Questions:

1. The teacher instructs rightly to the students to change their passwords. The new passwords should be strong so that no other person can hack into any student's account.

2. The teacher understands that copying someone's work without their consent s illegal.
The term related is plagiarism.
 In order to avoid plagiarism, one needs to obtain written permission from a copyright owner and/or cite the source when using that information.

3. To prevent unauthorized access of fees and academic data, the school should get data masking implemented on the important data.

4. Data encryption should be done to send important information over the internet safely. Data encryption is a technology that protects information by converting it into an unreadable code that cannot be deciphered easily by unauthorized people.

5. The principal has instructed the office incharge to make a copy of the fee data so as to maintain a proper database regularly and avoid data conflicts.

No comments:

Post a Comment