Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Computer Applications Guide Pdf Chapter 17 Computer Ethics and Cyber Security Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

11th Computer Applications Guide Computer Ethics and Cyber Security Text Book Questions and Answers

Part – I

I. Choose The Correct Answers

Question 1.
Which of the following deals with procedures, practices and values?
a) piracy
b) programs
c) virus
d) computer ethics
Answer:
d) computer ethics

Question 2.
Commercial programs made available to the public illegally are known as ________.
a) freeware
b) worms
c) free software
d) software
Answer:
b) worms

Question 3.
Which one of the following are self-repeating and do not require a computer program to attach themselves?
a) viruses
b) worms
c) spyware
d) Trojans
Answer:
b) worms

Question 4
which of the following tracks a user visits a website?
a) spyware
b) cookies
c) worms
d) Trojans
Answer:
b) cookies

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 5.
Which of the following is not a malicious program on computer systems?
a) worms
d) Trojans
c) spyware
d) cookies
Answer:
d) cookies

Question 6.
A computer network security that monitors and controls incoming and outgoing traffic is ________.
a) Cookies
b) Virus
c) Firewall
d) worms
Answer:
c) Firewall

Question 7.
The process of Converting cipher text to plain text is called ________.
a) Encryption
b) Decryption
c) key
d) proxy server
Answer:
b) Decryption

Question 8.
e-commerce means ________.
a) electronic commerce
b) electronic data exchange
c) electric data exchange
d) electronic commercialization.
Answer:
a) electronic commerce

Question 9.
Distributing unwanted e-mail to others is called ________.
a) scam
b) spam
c) fraud
d) spoofing
Answer:
b) spam

Question 10.
Legal recognition for transactions are carried out by ________.
a) Electronic Data Interchange
b) Electronic Data Exchange
c) Electronic Data Transfer
d) Electrical Data Interchange
Answer:
a) Electronic Data Interchange

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Part – II

II. Very Short Answers

Question 1.
What is harvesting?
Answer:
A person or program collects login and password information from a legitimate user to illegally gain access to others’ account(s) is called harvesting.

Question 2.
What are Warez?
Answer:
Commercial programs that are made available to the public illegally are often called warez.

Question 3.
Write a short note on cracking.
Answer:

  1. Cracking means trying to get into computer systems in order to steal, corrupt, or illegitimately view data.
  2. Cracking is where someone edits a program source so that the code can be exploited or modified.

Question 4.
Write two types of cyber attacks.
Answer:
The following are cyber attacks:

  1. Virus
  2. Worms
  3. Spyware
  4. Ransomware

Question 5.
What is a Cookie?
Answer:
A cookie is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing internet.

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Part – III

III. Short Answers

Question 1.
What is the role of firewalls?
Answer:
Role of firewalls:

  1. A firewall is a computer network security based system that monitors and controls incoming and outgoing network traffic based on predefined security rules.
  2. A firewall commonly establishes a block between a trusted internal computer network and entrusted computer outside the network.

Question 2.
Write about encryption and decryption.
Answer:

  1. Encryption is the process of translating the plain text data (plaintext) into random and mangled data (called cipher-text).
  2. Decryption is the reverse process of converting the cipher-text back to plaintext.
  3. Encryption and decryption are done by cryptography.
    Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 1

Question 3.
Explain symmetric key encryption.
Answer:
Symmetric Key Encryption:
Symmetric encryption is a technique to use the same key for both encryption and decryption. The main disadvantage of the symmetric key encryption is that all authorized persons involved, have to exchange the key used to encrypt the data before they can decrypt it. If anybody intercepts the key information, they may read all message.

The following Figure depicts the working of symmetric key encryption.
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 2

Question 4.
What are the guidelines to be followed by any computer user?
Answer:
To protect the information the following guidelines to be noted:

  1. Complex password setting can make your surfing secured.
  2. When the internet is not in use, disconnect it.
  3. Do NOT open spam mail or emails that have an unfamiliar sender.
  4. When using anti-virus software, keep it up- to-date.

Question 5.
What are ethical issues? Name some of them.
Answer:
An Ethical issue is a problem or issue that requires a person or organization to choose between alternatives that must be evaluated as right (ethical) or wrong (unethical). These issues must be addressed and resolved to have a positive influence in society.

Some of the common ethical issues are listed below:

  1. Cyber crime
  2. Software Piracy
  3. Unauthorized Access
  4. Hacking
  5. Use of computers to commit fraud
  6. Sabotage in the form of viruses
  7. Making false claims using computers

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Part – IV

IV. Explain In Detail

Question 1.
What are the various crimes happening using computer?
Answer:
Cyber Crime:
Cyber crime is an intellectual, white-collar crime. Those who commit such crimes generally manipulate the computer system in an intelligent manner. For example – illegal money transfer via internet.

Examples of some Computer crimes and their functions are listed below in the following Table :
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 3

Question 2.
What is piracy? Mention the types of piracy? How can it be prevented?
Answer:
Software Piracy:
Software Piracy is about the copyright violation of software created originally by an individual or an institution. It includes stealing of codes / programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.

In simple words, Software Piracy is “unauthorized copying of software”. The following Figure shows a diagrammatical representation of software piracy.
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 4

Types of Piracy:

Shareware:
An entirely different approach to software piracy is called shareware, acknowledges the futility of trying to stop people from copying software and instead relies on people’s honesty.

Warez:
Commercial programs that are made available to the public illegally are often called warez.

Prevention Method:

  • Illegal copying and distribution of commercial software should not be practiced.
  • Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses that program regularly to pay a registration fee to the program’s author directly.

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 3.
Write the different types of cyber attacks.
Answer:
Types of Cyber Attacks:
Malware is a type of software designed through which the criminals gain illegal access to software and cause damage. Various types of cyber-attacks and their functions are given in the following Table.

Cyber Attacks and Functions:
Cyber Attacks:

  1. Virus
  2. Worms
  3. Spyware
  4. Ransomware

Function:
1. A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common virus is Trojan.

2. Trojan – A Trojan virus is a program that appears to perform one function (for example, virus removal) but actually performs malicious activity when executed.
Worms are self- repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.

3. Spyware can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software.

4. Ransomware is a type of malicious program that demands payment after launching a cyber-attack on a computer system. This type of malware has become increasingly popular among criminals and costs the organizations millions each year.

11th Computer Applications Guide Computer Ethics and Cyber Security Additional Important Questions and Answers

Part – I

I. Choose The Correct Answers

Question 1.
________ is a communication media which is easily accessible and open to all.
a) Extranet
b) Intranet
c) Internet
d) None of these
Answer:
c) Internet

Question 2.
Information Technology is widespread through ________.
a) Computers
b) Mobile phones
c) Internet
d) All the above
Answer:
d) All the above

Question 3.
Computer systems in general are ________.
a) Vulnerable
b) Safe
c) Secured
d) None of these
Answer:
a) Vulnerable

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 4.
________ is a crime which involves computer and network.
a) Cyber-crime
b) Ethics
c) Cyber-law
d)None of these
Answer:

Question 5.
Cyber-crime poses threats to the ________ of most business systems.
a) Integrity
b) Safety
c) Survival
d) All the above
Answer:
d) All the above

Question 6.
________ is a cyber crime.
a) Phishing
b) Hacking
c) Identity thefts
d) All the above
Answer:
d) All the above

Question 7.
________ is a cyber crime.
a) Pharming
b) Piracy
c) Online financial transaction
d) All the above
Answer:
d) All the above

Question 8.
Ethics means ________.
a) what is wrong
b) What is Right
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 9.
________ is a set of moral principles that rule the behavior of individuals who use computers.
a) Ethics
b) Cyber-Crime
c) Virus
d) None of these
Answer:
a) Ethics

Question 10.
An individual gains knowledge to follow the right behavior, using morals that are also known as ________.
a) Ethics
c) Phishing
c) Hacking
d) None of these
Answer:
a) Ethics

Question 11.
________ refer to the generally accepted standards of right and wrong in the society,
a) Piracy
b) Morals
c) Virus
d) None of these
Answer:
b) Morals

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 12.
________ is a cyber world standard.
a) Do not use pirated software
b) Do not hack
c) Do not steal others passwords
d) All the above
Answer:
c) Do not steal others passwords

Question 13.
________ is a guidelines of computer ethics.
a) Honesty
b) Confidentiality
c) Respect
d) All the above
Answer:
d) All the above

Question 14.
________ is a guidelines of computer ethics.
a) Professionalism
b) Obey the law
c) Responsibility
d) All the above
Answer:
d) All the above

Question 15.
Identify the correct statement from the following.
a) Ethics is a set of moral principles that govern the behavior of an individual in a society.
b) Computer ethics is set of moral principles that regulate the use of computers by users.
c) An Ethical issue is a problem or issue that requires a person or organization to choose between alternatives that must be evaluated as right or wrong.
d) All the above
Answer:
d) All the above

Question 16.
Identify the correct statement from the following related with ethics.
a) Users should be truthful while using the internet.
b) Users should not share any important information with unauthorized people.
c) Each user should respect the privacy of other users.
d) All the above
Answer:
d) All the above

Question 17.
Identify the correct statement from the following related with ethics.
a) Each user should maintain professional conduct.
b) Users should strictly obey the cyber law in computer usage.
c) Each user should take ownership and responsibility for their actions
d) All the above
Answer:
d) All the above

Question 18.
Cyber crime is a(n) crime.
a) Intellectual
b) White-collar
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 19.
Harassing through online is called ________.
a) Cyber Stalking
b) Cyber Harassment
c) Cyber torture
d) None of these
Answer:
a) Cyber Stalking

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 20.
________ are malicious programs that can perform a variety of functions on user’s computer activity without their permission.
a) Cyber Stalking
b) Malware
c) Anti virus
d) None of these
Answer:
b) Malware

Question 21.
Malicious programs that can perform a variety of functions including ________ on user’s Computer activity without their permission.
a) Encrypting or Deleting sensitive data
b) Stealing
c) Hijacking core computing functions
d) All the above
Answer:
d) All the above

Question 22.
Overloading a system with fake requests so that it cannot serve normal legitimate requests is called ________.
a) Cyber Stalking
b) Malware
c) Denial of service attack
d) None of these
Answer:
c) Denial of service attack

Question 23.
Manipulating data like changing the banking records to transfer money to an unauthorized account is called ________.
a) Cyber Stalking
b) Malware
c) Denial of service attack
d) Fraud
Answer:
d) Fraud

Question 24.
________ means a person or program collects login and password information from a legitimate user to illegally gain access to others’accounts.
a) Harvesting
b) Malware
c) Denial of service attack
d) Fraud
Answer:
a) Harvesting

Question 25.
________ is a crime where the criminals impersonate individuals, usually for financial gain.
a) Harvesting
b) Identity theft
c) Denial of service attack
d) Fraud
Answer:
b) Identity theft

Question 26.
________ means stealing practical or conceptual information developed by another person or company.
a) Harvesting
b) Identity theft
c) Intellectual property theft
d) Fraud
Answer:
c) Intellectual property theft

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 27.
________ meant tricking people into believing something that is not true.
a) Harvesting
b) Scam
c) Intellectual property theft
d) Fraud
Answer:
b) Scam

Question 28.
Stealing tiny amounts of money from each transaction means ________.
a) Salami slicing
b) Scam
c) Intellectual property theft
d) Fraud
Answer:
a) Salami slicing

Question 29.
Distribute unwanted e-mail to a large number of internet is termed as ________.
a) Salami slicing
b) Scam
c) Intellectual property theft
d) Spam
Answer:
d) Spam

Question 30.
________ is a malicious practice in which communication is send from unknown source disguised as a source known to the receiver.
a) Salami slicing
b) Scam
c) Spoofing
d) Spam
Answer:
c) Spoofing

Question 31.
Software ________ is about the copyright violation of software created originally by an individual or an institution.
a) Piracy
b) Fraud
c) Theft
d) None of these
Answer:
a) Piracy

Question 32.
________ includes stealing of codes / programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.
a) Piracy
b) Scam
c) Salami slicing
d) None of these
Answer:
a) Piracy

Question 33.
To prevent unauthorized access ________ is used.
a) Firewalls/ Intrusion Detection Systems
b) Virus and Content Scanners
c) Patches and Hot fixes
d) All the above
Answer:
d) All the above

Question 34.
IDS means ________ .
a) Intrusion Detection Systems
b) Intrusion Defective Systems
c) Intrusion Direction Systems
d) Intrusion Detach Systems
Answer:
a) Intrusion Detection Systems

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 35.
________ is intruding into a computer system to steal personal data without the owner’s permission or knowledge.
a) Piracy
b) Hacking
c) IDS
d) None of these
Answer:
b) Hacking

Question 36.
Steal a password is ________.
a) Piracy
b) Hacking
c) IDS
d) None of these
Answer:
b) Hacking

Question 37.
________ is where someone edits a program source so that the code can be exploited or modified.
a) Piracy
b) Hacking
c) Cracking
d) None of these
Answer:
c) Cracking

Question 38.
A cracker is called as a ________ .
a) Black hat
b) Dark side hacker
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 39.
Cracking means trying to get into computer systems in order to data.
a) Steal
b) Corrupt
c) Illegitimately view
d) All the above
Answer:
d) All the above

Question 40.
A ________ is someone who breaks into someone else’s computer system, often on a network, bypassing passwords or licenses in computer programs.
a) Cracker
b) Programmer
c) Server
d) None of these
Answer:
a) Cracker

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 41.
Password cracking can be performed by ________.
a) Using an automated program
b) Can be manually realized
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 42.
IRC means ________.
a) International Relay Chat
b) Internet Relay Chat
c) Internal Relay Chat
d) Internet Ready Chat
Answer:
b) Internet Relay Chat

Question 43.
The method that uses social engineering crackers is guessing.
a) Password
b) Username
c) Website name
d) URL
Answer:
a) Password

Question 44.
Identify the correct statement from the following related with cracking.
a) It is a method of getting passwords and information using human weakness.
b) Crackers find your personal information from some persona! data/facts and try to guess a password.
c) Crackers may send official e-mail requesting some sensitive information. It may look like a legitimate e-mail from bank or other official institution.
d) All the above
Answer:
d) All the above

Question 45.
________ is a collection of various technologies, processes and measures that reduces the risk of cyber attacks.
a) Cyber Security
b) Cyber Crime
c) Cyber Gateway
d) None of these
Answer:
a) Cyber Security

Question 46.
________ protects organizations and individuals from computer based threats.
a) Cyber Security
b) Cyber Crime
c) Cyber Gateway
d) None of these
Answer:
a) Cyber Security

Question 47.
________ is a type of software designed through which the criminals gain illegal access to software and cause damage.
a) Malware
b) Piracy
c) Cracking
d) None of these
Answer:
a) Malware

Question 48.
A ________ is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file.
a) Virus
b) Piracy
c) Cracking
d) None of these
Answer:
a) Virus

Question 49.
________ is the most common virus.
a) Trojan
b) Melisa
c) Sasser
d) Code Red
Answer:
a) Trojan

Question 50.
A ________ is a program that appears to perform one function but actually performs malicious activity when executed.
a) Cracking
b) Trojan virus
c) Piracy
d) None of these
Answer:
b) Trojan virus

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 51.
________ can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software.
a) Spyware
b) Worms
c) Ransomware
d) None of these
Answer:
a) Spyware

Question 52.
________ is a type of malicious program that demands payment after launching a cyber-attack on a computer systemic.
a) Spyware
b) Worms
c) Ransomware
d) None of these
Answer:
c) Ransomware

Question 53.
________ type of malware has become increasingly popular among criminals and costs the organizations millions each year.
a) Spyware
b) Worms
c) Ransomware
d) None of these
Answer:
c) Ransomware

Question 54.
________ is an example of social engineering.
a) Phishing
b) Pharming
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 55.
Phishing is a type of computer crime used to attack, steal user data, including ________.
a) Login name
b) Password
c) Credit card numbers
d) All the above
Answer:
d) All the above

Question 56.
________ occurs when an attacker targets a victim into opening an e-maiior an instant text message.
a) Phishing
b) Pharming
c) Both A and B
d) None of these
Answer:
a) Phishing

Question 57.
________ is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent web sites without their knowledge or permission.
a) Phishing
b) Pharming
c) Both A and B
d) None of these
Answer:
b) Pharming

Question 58.
Pharming has been called ________.
a) Phishing without a trap
b) Phishing with a trap
c) Illegal access
d) None of these
Answer:
a) Phishing without a trap

Question 59.
________ is a cyber-attack intended to redirect a website’s traffic to a fake site.
a) Phishing
b) Pharming
c) Trojan
d) None of these
Answer:
b) Pharming

Question 60.
MITM stands for ________.
a) Man In The Middle
b) Malware In The Middle
c) Move In The Middle
d) Must In The Middle
Answer:
a) Man In The Middle

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 61.
________ is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating With each other.
a) Cyber
b) Man-in-the-middle attack
c) Cracking
d) None of these
Answer:
b) Man-in-the-middle attack

Question 62.
MITM is also called as ________.
a) Janus attack
b) Junk attack
c) Genious attack
d) None of these
Answer:
a) Janus attack

Question 63.
A ________ is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing internet.
a) Cookie
b) MITM
c) Cracking
d) Piracy
Answer:
a) Cookie

Question 64.
A cookie is also called as ________ cookie.
a) HTTP or Web
b) Internet
c) Browser
d) All the above
Answer:
d) All the above

Question 65.
________ can be used to remember arbitrary pieces of information that the user previously entered into form fields such as names, addresses, passwords, and credit card numbers.
a) Cookie
b) MITM
c) Cracking
d) Piracy
Answer:
a) Cookie

Question 66.
An anonymous user is called as ________.
a) Hacker
b) Malware
c) Cracker
d) None of these
Answer:
a) Hacker

Question 67.
Who can access the cookie information and misuse it?
a) Hacker
b) Service provider
c) Cracker
d) None of these
Answer:
a) Hacker

Question 68.
Web sites typically use cookies for the ________ reason.
a) To collect demographic information about who has visited the Web site.
b) Sites often use this information to track how often visitors come to the site and how long they remain on the site.
c) It helps to personalize the user’s experience on the Web site.
d) All the above
Answer:
d) All the above

Question 69.
________ can help to store personal information about users so that when a user subsequently returns to the site.
a) Cookie
b) MITM
c) Cracking
d) Piracy
Answer:
a) Cookie

Question 70.
________ do not act maliciously on computer system.
a) Virus
b) MITM
c) Cracking
d) Cookie
Answer:
d) Cookie

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 71.
________ are merely text files that can be deleted at any time.
a) Cookies
b) MITM
c) Cracking
d) Virus
Answer:
a) Cookies

Question 72.
________ cannot be used to spread viruses and they cannot access our hard drive.
a) MITM
b) Cookies
c) Cracking
d) Virus
Answer:
b) Cookies

Question 73.
A ________ commonly establishes a block between a trusted internal computer network and entrusted computer outside the network.
a) Firewall
b) Cookie
c) Hacking
d) None of these
Answer:
a) Firewall

Question 74.
Firewall category is ________.
a) Network-based
b) Host-based
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 75.
________ firewalls are positioned on the gateway computers of LANs [Local Area Network], WANs [Wide Area Network] and intranets.
a) Network-based
b) Host-based
c) Either A or B
d) None of these
Answer:
a) Network-based

Question 76.
________ firewalls are positioned on the network node itself.
a) Network-based
b) Host-based
c) Either A or B
d) None of these
Answer:
b) Host-based

Question 77.
The firewall may be a service as a part of the operating system or an agent application such as endpoint security or protection.
a) Network-based
b) Host-based
c) Either A or B
d) None of these
Answer:
b) Host-based

Question 78.
A ________ acts as an intermediary between the end users and a web server.
a) Proxy server
b) System software
c) Node
d) None of these
Answer:
a) Proxy server

Question 79.
________ typically keep the frequently visited site addresses in its cache which leads to improved response time. .
a) Proxy servers
b) System software
c) Node
d) None of these
Answer:
a) Proxy servers

Question 80.
________ is a process that ensure confidentiality that only authorized persons can access the information.
a) Encryption
b) Decryption
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 81.
________ is the process of translating the plain text data (plaintext) into random and mangled data.
a) Encryption
b) Decryption
c) Sampling
d) None of these
Answer:
a) Encryption

Question 82.
The encripted text is called ________ .
a) Cyber text
b) Cipher-text
c) Secured text
d) None of these
Answer:
b) Cipher-text

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 83.
________ is the process of converting the cipher¬text back to plaintext.
a) Encryption
b) Decryption
c) Warping
d) None of these
Answer:
b) Decryption

Question 84.
________ is done by cryptpgraphy.
a) Encryption
b) Decryption
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 85.
In cryptography a ________ is a piece of information that determines the functional output of a cryptographic algorithm.
a) Key
b) Parameter
c) Input
d) Output
Answer:
a) Key

Question 86.
Encryption has been used by ________ to facilitate secret communication.
a) Militaries
b) Governments
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 87.
________ now commonly used in protecting information within many kinds of civilian systems.
a) Encryption
b) Sampling
c) Warping
d) None of these
Answer:
a) Encryption

Question 88.
________ is used to protect data in communication system.
a) Encryption
b) Sampling
c) Warping
d) None of these
Answer:
a) Encryption

Question 89.
Encryption used in ________.
a) Data being transferred via networks
b) Mobile telephones
c) Wireless microphones
d) All the above
Answer:
d) All the above

Question 90.
Encryption used in ________.
a) Wireless intercom systems
b) Bluetooth devices
c) Bank automatic teller machines
d) All the above
Answer:
d) All the above

Question 91.
Data should be ________ when transmitted across networks in order to protect against the network traffic by unauthorized users.
a) Encrypted
b) Translated
c) Converted
d) None of these
Answer:
a) Encrypted

Question 92.
There are types of encryption schemes.
a) three
b) four
c) two
d) five
Answer:
c) two

Question 93.
________ is a encryption scheme.
a) Symmetric Key encryption
b) Public Key encryption
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 94.
________ encryption is a technique to use the same key for both encryption and decryption.
a) Symmetric Key
b) Public Key
c) Either A and B
d) None of these
Answer:
a) Symmetric Key

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 95.
In ________ encryption all authorized persons involved, have to exchange the key used to encrypt the data before they can decrypt it.
a) Symmetric Key
b) Public Key
c) Either A and B
d) None of these
Answer:
a) Symmetric Key

Question 96.
________ encryption is also called Asymmetric encryption
a) Symmetric Key
b) Public Key
c) Both A and B
d) None of these
Answer:
b) Public Key

Question 97.
________ uses the concept of a key value pair, a different key is used for the encryption and decryption process.
a) Symmetric Key encryption
b) Public Key encryption
c) Both A and B
d) None of these
Answer:
b) Public Key encryption

Question 98.
________ key is used in public key encryption.
a) Private
b) Public
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 99.
The ________ key is kept secret by the owner.
a) Private
b) Public
c) Both A and B
d) None of these
Answer:
a) Private

Question 100.
The ________ key is either shared amongst authorized recipients.
a) Private
b) Public
c) Both A and B
d) None of these
Answer:
b) Public

Question 101.
The data encrypted with the recipient’s ________ key can only be decrypted with the corresponding key.
a) Public, Private
b) Private, Public
c) Public, Protected
d) None of these
Answer:
a) Public, Private

Question 102.
A digital certificate in a client-server model of communication is one of the example of ________
a) Asymmetric Encryption
b) Symmetric
c) Either A or B
d) None of these
Answer:
a) Asymmetric Encryption

Question 103.
A ________ is a package of information that identifies a user and a server.
a) Signature
b) Signal
c) Certificate
d) None of these
Answer:
c) Certificate

Question 104.
A certificate contains information such as ________.
a) An organization’s name
b) The organization that issued the certificate
c) The users’ email address and country and user’s public key
d) All the above
Answer:
d) All the above

Question 105.
Digital signatures are can provide ________.
a) Assurances of evidence to origin
b) Identity and status of an electronic document, transaction or message
c) Acknowledging informed by the signer
d) All the above
Answer:

Question 106.
________ law is used to prevent cyber crime.
a) Cyber Law or Cyber Space Law
b) Information Technology Law
c) Internet Law
d) Either A or B or C
Answer:
d) Either A or B or C

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 107.
In India Cyber law and IT Act 2000, modified in ________ are being articulated to prevent computer crimes.
a) 2018
b) 2008
c) 1998
d) None of these
Answer:
b) 2008

Question 108.
EDI stands for ________.
a) Electronic Data Interchange
b) Electronic Document Interchange
c) Electronic Data Information
d) Electrical Data Interchange
Answer:
a) Electronic Data Interchange

Question 109.
________ is a term that encapsulates the legal issues related to use of the Internet.
a) Cyber law
b) Internet law
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 110.
________ of cyber crime remains unsolved.
a) 75%
b) 50%
c) 25%
d) 10%
Answer:
c) 25%

Question 111.
To protect the information follow ________.
a) Complex password setting can make your surfing secured.
b) When the internet is not in use, disconnect it.
c) Do NOT open spam mail or emails that have an unfamiliar sender.
d) All the above
Answer:
d) All the above

Question 112.
Identify the correct statement from the following:
a) Information security is the immune system in the body of business.
b) Awareness is the key to security.
c) When using anti-virus software, keep it up-to- date.
d) All the above
Answer:
d) All the above

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Part – II

II. Very Short Answers

Question 1.
How information technology is reaching the people?
Answer:
Information Technology is widespread through computers, mobile phones and internet.

Question 2.
What is cyber-crime?
Answer:
A cyber-crime is a crime which involves computer and network. This is becoming a growing threat to society and is caused by criminals or irresponsible action of individuals who are exploiting the widespread use of Internet.

Question 3.
What are the threats of Cyber-crime?
Answer:
Cyber-crime poses threats to the integrity, safety and survival of most business systems.

Question 4.
What are the types of Cyber crime?
Answer:
It is depicted in the following diagram:
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 5

Question 5.
What is ethics?
Answer:

  1. Ethics means “What is wrong and What is Right”.
  2. It is a set of moral principles that rule the behavior of individuals who use computers.
  3. An individual gains knowledge to follow the right behavior, using morals that are also known as ethics.
    Morals refer to the generally accepted standards of right and wrong in the society.

Question 6.
What are the standards in cyber-world?
Answer:
In cyber-world, there are certain standards such as:

  1. Do not use pirated software.
  2. Do not use unauthorized user accounts.
  3. Do not steal others’ passwords.
  4. Do not hack.

Question 7.
What are the core issues in computer ethics?
Answer:
The core issues in computer ethics are based on the scenarios arising from the use of internet such as privacy, publication of copyrighted content, unauthorized distribution of digital content and user interaction with web sites, software and related services.

Question 8.
What are the changes in the society due to internet?
Answer:

  1. With the help of internet, world has now become a global village.
  2. Internet has been proven to be a boon to individuals as well as various organizations and businesses.
  3. e-Commerce is becoming very popular among businesses as it helps them to reach a wide range of customers faster than any other means;

Question 9.
What are the roles of computer ethics?
Answer:
Computer ethics deals with the procedures, values and practices that govern the process of consuming computer technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity.

Question 10.
What is the difference between ethics and computer ethics?
Answer:

  1. Ethics is a set of moral principles that govern the behavior of an individual in a society.
  2. Computer ethics is set of moral principles that regulate the use of computers by users.

Question 11.
What is cyber crime? Give an example.
Answer:
Cyber Crime:
Cyber crime is an intellectual, white-collar crime. Those who commit such crimes generally manipulate the computer system in an intelligent manner.

For example – illegal money transfer via internet.

Question 12.
How to prevent from unauthorized access?
Answer:
To prevent unauthorized access, Firewalls, Intrusion Detection Systems (IDS), Virus and Content Scanners, Patches and Hot fixes are used.

Question 13.
What is social engineering? Give an example. Social engineering
Answer:
A misuse of an individual’s weakness, achieved by making them to click malicious links, or by physically accessing the computer through tricks. Phishing and pharming.

Question 14.
What are Cookies?
Answer:
A cookie is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing internet.

Question 15.
What are the types of encryption?
Answer:
There are two types of encryption schemes as listed below:

  1. Symmetric Key encryption
  2. Public Key encryption

Question 16.
What is certificate?
Answer:
A certificate is a package of information that identifies a user and a server. It contains information such as an organization’s name, the organization that issued the certificate, the users’ email address and country, and user’s public key.

Question 17.
What is digital certificate?
Answer:

  1. A digital certificate in a client-server model of communication.
  2. It is one of the examples of Asymmetric Encryption.

Question 18.
What is digital signature?
Answer:
Digital signatures are based on asymmetric cryptography and can provide assurances of evidence to origin, identity and status of an electronic document, transaction or message, as well as acknowledging informed by the signer.

Question 19.
Write note on Cyber law or Internet law.
Answer:
Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet.

Question 20.
Write about IT Act 2000.
Answer:
IT Act 2000 is an act to provide legal recognition for transactions carried out by means of Electronic Data Interchange (EDI) and other means of electronic communication.

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Part – III

III. Short Answers

Question 1.
What are the guidelines of ethics?
Answer:
Guidelines of Ethics:
Generally, the following guidelines should be observed by computer users:

  1. Honesty: Users should be truthful while using the internet.
  2. Confidentiality: Users should not share any important information with unauthorized people.
  3. Respect: Each user should respect the privacy of other users.
  4. Professionalism: Each user should maintain professional conduct.
  5. Obey The Law: Users should strictly obey the cyber law in computer usage.
  6. Responsibility: Each user should take ownership and responsibility for their actions

Question 2.
What is ethical issue? List the common ethical issues.
Answer:
An Ethical issue is a problem or issue that requires a person or organization to choose between alternatives that must be evaluated as right (ethical) or wrong (unethical). These issues must be addressed and resolved to have a positive influence in society.

Some of the common ethical issues are listed below:

  1. Cyber crime
  2. Software Piracy
  3. Unauthorized Access
  4. Hacking
  5. Use of computers to commit fraud Sabotage in the form of viruses
  6. Making false claims using computers

Question 3.
Write note on unauthorized access.
Answer:
Unauthorized Access:
Unauthorized access is when someone gains access to a website, program, server, service, or other system by breaking into a legitimate user account.

For example, if someone tries guessing a password or user name for an account that was not theirs until they gained access, it is considered an unauthorized access.

Question 4.
What is cyber attack and cyber security?
Answer:

  1. Cyber attacks are launched primarily for causing significant damage to a computer system or for stealing important information from an individual or from an organization.
  2. Cyber security is a collection of various technologies, processes and measures that reduces the risk of cyber attacks and protects organizations and individuals from computer based threats.

Question 5.
What is phishing? Explain with suitable diagram.
Answer:
Phishing:
Phishing is a type of computer crime used to attack, steal user data, including login name, password and credit card numbers. It occurs when an attacker targets a victim into opening an e-mailer an instant text message.

The attacker uses phishing to distribute malicious links or attachments that can perform a variety of functions including the extraction of sensitive login credentials from victims.

Diagrammatic representation of Phishing
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 6

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 6.
What is Pharming? Explain with suitable diagram.
Answer:
Pharming:
Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent web sites without their knowledge or permission.

Pharming has been called “phishing without a trap”. It is another way hackers attempt to manipulate users on the Internet. It is a cyber¬attack intended to redirect a website’s traffic to a fake site.

Diagrammatic representation of Pharming
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 7

Question 7.
What do you mean by Man In The Middle attack or Janus attack? Illustrate in a diagram,
Answer:
Man In The Middle (MITM):
Man-in-the-middle attack (MITM; also Janus attack) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

Example:
Suppose Alice wishes to communicate with Bob. Meanwhile, Mallory wishes to intercept the conversation to overhear and optionally to deliver a false message to Bob.

An illustration of the man-in-the-middle attack
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 8

Question 8.
Why web sites use cookies?
Answer:
Web sites typically use cookies for the following reasons:

  1. To collect demographic information about who has visited the Web site.
  2. Sites often use this information to track how often visitors come to the site and how long they remain on the site.
  3. It helps to personalize the user’s experience on the Web site.
  4. Cookies can help store personal information about users so that when a user subsequently returns to the site, a more personalized experience is provided.

Question 9.
Explain the working of Proxy Server.
Answer:
A proxy server acts as an intermediary between the end users and a web server. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resources available from a different server.

The proxy server examines the request, checks authenticity and grants the request based on that. Proxy servers typically keep the frequently visited site addresses in its cache which leads to improved response time.

Working of Proxy server:
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 9

Question 10.
How to prevent cyber crime?
Answer:
To protect the information the following points to be noted:

  1. Complex password setting can make your surfing secured.
  2. When the internet is not in use, disconnect it. Do NOT open spam mail or emails that have an unfamiliar sender.
    When using anti-virus software, keep it up- to-date.

Part – IV

IV. Explain In Detail

Question 1.
List the computer crimes and their functions.
Answer:
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 10

Question 2.
Explain Hacking in detail.
Answer:
Hacking:
Hacking is intruding into a computer system to steal personal data without the owner’s permission or knowledge (like to steal a password). It is also gaining unauthorized access to a computer system, and altering its contents. It may be done in pursuit of a criminal activity or it may be a hobby.

Diagrammatic representation of Hacking:
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 11

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Question 3.
Explain Cracking in detail.
Answer:
Cracking:
Cracking is where someone edits a program source so that the code can be exploited or modified. A cracker (also called a black hat or dark side hacker) is a malicious or criminal hacker.

“Cracking” means trying to get into computer systems in order to steal, corrupt, or illegitimately view data. A cracker is someone who breaks into someone else’s computer system, often on a network, bypassing passwords or licenses in computer programs.

Software cracking is the most often used type of cracking which is nothing but removing the encoded copy protection.

There is another type of cracking called password cracking. This is mainly used to crack the passwords. Password cracking can be performed either by using an automated program or can be manually realized.

One more interesting fact about cracking is social engineering. It is a method of getting passwords and information using human weakness The other method that uses social engineering crackers is password guessing. They find your personal information from some personal data/ facts and try to guess a password. Usually a cracker maintains knowledge of the vulnerabilities he or she finds and exploits them for personal advantage, not revealing them to either to the general public or to the manufacturer.

Question 4.
Explain the working of Firewall server.
Answer:
Firewall Server:
A firewall is a computer network security based system that monitors and controls incoming and outgoing network traffic based on predefined security rules. A firewall commonly establishes a block between a trusted internal computer network and entrusted computer outside the network.

They are generally categorized as network- based or host-based:

Network based firewalls are positioned on the gateway computers of LANs [local area Network], WANs [Wide Area Network] and intranets.
Host-based firewalls are positioned on the network node itself. The host-based firewall may be a service as a part of the operating system or an agent application such as endpoint security or protection.

Working of Firewall Server
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 12

Question 5.
Explain public key encryption.
Answer:
Public Key Encryption:
Public key encryption is also called Asymmetric encryption. It uses the concept of a key value pair, a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.

The private key is kept secret by the owner and the public key is either shared amongst authorized made, available the public at large. The data encrypted with the recipient’s public key can only be decrypted with the corresponding private key.

Working of Public Key Encryption:
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 13

Question 6.
What is digital signature? Explain function of digital signature with suitable diagram.
Answer:
Digital Signature:
Digital signatures are based on asymmetric cryptography and can provide assurances of evidence to origin, identity and status of an electronic document, transaction or message, as well as acknowledging informed by the signer.

To create a digital signature, signing software (email) creates a one-way hash of the electronic data to be signed. The user’s private key to encrypt the hash, returning a value that is unique to the hashed data.

The encrypted hash, along with other information such as the hashing algorithm, forms the digital signature. Any change in the data, even to a single bit, results in a different hash value. This attribute enables others to validate the integrity of the data by using the signer’s public key to decrypt the hash.

If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn’t changed since it was signed.

If the two hashes don’t match, the data has either been tampered with in some way (indicating a failure of integrity) or the signature was created with a private key that doesn’t correspond to the public key presented by the signer (indicating a failure of authentication).

Function of Digital Signature:
Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security 14

Samacheer Kalvi 11th Computer Applications Guide Chapter 17 Computer Ethics and Cyber Security

Leave a Reply