Class IX

Sunday, 27 November 2016

Class X Chapter 12 Societal Impact of Information Technology

CHAPTER - 12(Class 10)

SOCIETAL IMPACT OF INFORMATION TECHNOLOGY
I.
A. Fill ups:-
1. Trojan Horse
2. Malware
3. Worm
4. Cybercrime
5. Encryption

B. True or False:-
1. True
2. True
3. True
4. True
5. True

C. Multiple Choice Questions:-
1. (b)Trojan Horse
2. (b)Spyware
3. (b)Typing Through Keyboard
4. (a)Online Backup
5. (b)Cracker

II.

A. Very Short Answers:-
1. Antivirus
2. Spam
3. E-commerce
4. When user downloads something from the internet.
5. Data Backup means to make copies of data in a removable, long term storage device.


B. Short Answers:-
1. Infomaniac has a habit of continuously responding to electronic communication such as e-mails, SMSs, etc.

2. A digital certificate is a kind of a digital code or credential that authenticates the identity of the server.

3. Malware is a generic term used for any program designed to infiltrate a computer without the user's consent.

4. A computer virus is a program that attaches itself to other programs in order to alter their behaviour, often in a harmful way.
 Two ways in which virus can spread into our computer system are as follows:-
      (a)    Sharing of infected files over a network, through infected CD-ROMs and through e-mails.
  (b) Downloading any applications from internet or any web sites.

5. HACKER: It is a term used for a computer enthusiast i.e. a person who enjoys learning programming languages and computer systems, and can often be considered an expert on the subjects.
   CRACKER: It is a term used to refer to an individual who gains unauthorized access to a computer system for the purpose of stealing and corrupting data


C. Long Answers:-

1. Antivirus Program is designed to detect and remove malicious programs.
It runs in the background all the times.
It is updated regularly so that it recognizes new versions of malicious programs.

2. Online Backup refers to copying of data to some other computer     on the internet for online storage.
Two advantages of online backup are:
(a) Data is stored safely at some remote location that is far away from the original data.
(b) Privacy and security of data are assured with encryption and password protection.

3. Spam refers to any unsolicited, unwanted e-mails.
  Ways of avoiding getting spam are as follows:
 Use the spam filter of your e-mail program to block unwanted e-mails.
Delete spam mails without reading them.

4. E-commerce takes place in the following ways:
 Suppose Alina wants to buy a portable music player online:
1. Alina's computer is connected to the internet. She opens a web browser and types the URL of the website in the address bar and press enter key.
2. The web server responds by sending its digital certificate, which includes its public key, to Alina's computer.
3. The browser verifies the digital certificate of the browser.
4. The browser will generate a one time, unique session key.
5. The web server decrypts the encrypted session key using the private key and gets the session key.
When Alina chooses the desired product and proceeds to buy it:
1. The URL of the website now starts with https: instead of http:.
2. A lock icon appears after the address bar of the browser, indicating that the browser is now in the secure mode. When the browser is running in the normal mode, this icon doesn't appear.

5. ICT is a broad term that signifies the integration of information technology tools broadcasting technology, audio and video processing equipment, and telecommunication equipment. 
Use of ICT in Healthcare:
a. It is used by the Government in controlling the spread of communicable diseases,
b. It is used to promote medical education and training.
Use of ICT in governance:
a. It helps the government to deliver services effectively
b. It maintains transparency in the system and keeps a check on malpractices.


D. Application based:
1.
a. Worm has affected the computer.
b. She should install antivirus.
c. She can install kaspersky Antivirus, Quick Heal to get rid of this situation.
d. Not regularly but should be updated over a period of time.

2.a.
 A password should have atleast 8-10 characters in length.
The password should have atleast one character of: lowercase alphabet letters, numbers, special characters and uppercase alphabet letters.
Do not duplicate your username, real name.

b.It is essential for the company to have workable backup strategy for data because their data is not secure and anyone can steal it.

c. The company should have:
Privacy
Authentication of sender and recipient
Integrity and non-repudiation
Public and private key encryption
Digital certificate


3.
a. SPAM
b. No, she should not open these emails.
c.to avoid SPAM:
 Do not give your email address to unknown people.
Use the SPAM filter.
Delete SPAM mails without reading.


4.a. The condition of Srikant's brothers is called INFOMANIA.
b. Infomania condition can affect people to such an extent that adults waste their productive time in the office, neglecting their duties, whereas students waste their study time by frequently checking emails, etc.


5.
a. BACKUP
b. He can use CD,DVD,USB flash drive or external hard drive.
c. Data loss can occur because of file corruption, fire, theft, hard disk crash, etc. If we regularly make backup copies of files on our hard disk and keep them at a separate place, we can get the lost data back if anything happens to the original files on our computer.

No comments:

Post a Comment