Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Computer Science Guide Pdf Chapter 17 Computer Ethics and Cyber Security Text Book Back Questions and Answers, Notes.

ALKEM Pivot Point Calculator

Tamilnadu Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

11th Computer Science Guide Computer Ethics and Cyber Security Text Book Questions and Answers

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Part -I

Choose The Correct Answer

Question 1.
Which of the following deals with procedures, practices and values?
a) piracy
b) programs
c) virus
d) computer ethics
Answer:
d) computer ethics

Question 2.
Commercial programs made available to the public illegally are known as
a) freeware
b) warez
c) free software
d) software
Answer:
b) warez

Question 3.
Which one of the following are self-repeating and do npt require a computer program to attach themselves?
a) viruses
b) worms
c) spyware
d) Trojans
Answer:
b) worms

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 4.
Which one of the following tracks a user visits a website?
a) spyware
b) cookies
c) worms
d) Trojans
Answer:
b) cookies

Question 5.
Which of the following is not a malicious program on computer systems?
a) worms
d) Trojans
c) spyware
d) cookies
Answer:
d) cookies

Question 6.
A computer network security that monitors and controls incoming and outgoing traffic is
a) Cookies
b) Virus
c) Firewall
d) worms
Answer:
c) Firewall

Question 7.
The process of Converting cipher text to plain text is called
a) Encryption
b) Decryption
c) key
d) proxy server
Answer:
b) Decryption

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 8.
e-commerce means
a) electronic commerce
b) electronic data exchange
c) electric data exchange
d) electronic commercialization.
Answer:
a) electronic commerce

Question 9.
Distributing unwanted e-mail to others is called
a) scam
b) spam
c) fraud
d) spoofing
Answer:
b) spam

Question 10.
Legal recognition for transactions are carried out by
a) Electronic Data Interchange
b) Electronic Data Exchange
c) Electronic Data Transfer
d) Electrical Data Interchange
Answer:
a) Electronic Data Interchange

Part – II

Very Short Answers

Question 1.
What is harvesting?
Answer:
A person or program collects login and password information from a legitimate user to illegally gain access to others account(s).

Question 2.
What are Warez?
Answer:
Commercial programs that are made available to the public illegally are often called warez.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 3.
Write a short note on cracking.
Answer:
Cracking is where someone edits a program source so that the code can be exploited or modified. “Cracking” means trying to get into computer systems in order to steal, corrupt, or illegitimately view data.

Question 4.
Write two types of cyber attacks.
Answer:
The following are cyber attacks:

  • Virus
  • Worms
  • Spyware
  • Ransomware

Question 5.
What is a Cookie?
Answer:
A cookie (also called HTTP cookie, web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing the internet.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Part – III

Short Answers

Question 1.
What is the role of firewalls?
Answer:
Role of firewalls:

  • A firewall is a computer network security based system that monitors and controls incoming and outgoing network traffic based on predefined security rules.
  • A firewall commonly establishes a block between a trusted internal computer network and entrusted computer outside the network.

Question 2.
Write about encryption and decryption.
Answer:
Encryption and decryption are processes that ensure confidentiality that only authorized persons can access the information. Encryption is the process of translating plain text data (plaintext) into random and mangled data (called ciphertext). Decryption is the reverse process of converting the ciphertext back to plaintext. Encryption and decryption are done by cryptography. In cryptography, a key is a piece of information (parameter) that determines the functional output of a cryptographic algorithm.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 1

Question 3.
Explain symmetric key encryption.
Answer:
SYMMETRIC KEY ENCRYPTION:
Symmetric encryption is a technique to use the same key for both encryption and decryption.

The main disadvantage of symmetric key encryption is that all authorized persons involved, have to exchange the key used to encrypt the data before they can decrypt it. If anybody intercepts the key information, they may read all messages.
The following Figure depicts the working of symmetric key encryption.
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 2

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 4.
What are the guidelines to be followed by any computer user?
Answer:
Generally, the following guidelines should be observed by computer users:

  1. Honesty: Users should be truthful while using the internet.
  2. Confidentiality: Users should not share any important information with unauthorized people.
  3. Respect: Each user should respect the privacy of other users.
  4. Professionalism: Each user should maintain professional conduct.
  5. Obey The Law: Users should strictly obey the cyber law in computer usage.
  6. Responsibility: Each user should take ownership and responsibility for their actions.

Question 5.
What are ethical issues? Name some of them.
Answer:
An Ethical issue is a problem or issue that requires a person or organization to choose between alternatives that must be evaluated as right (ethical) or wrong (unethical). These issues must be addressed and resolved to have a positive influence in society.

Some of the common ethical issues are listed below:

  • Cyber crime
  • Software Piracy
  • Unauthorized Access
  • Hacking
  • Use of computers to commit fraud
  • Sabotage in the form of viruses
  • Making false claims using computers

Part IV

Explain in Detail

Question 1.
What are the various crimes happening using computers?
Answer:
Cyber Crime:
Cyber crime is an intellectual, white-collar crime. Those who commit such crimes generally manipulate the computer system in an intelligent manner. For example – illegal money transfer via the internet.

Examples of some Computer crimes and their functions are listed below in the following Table :

Crime Function
Crime Function Hacking, threats, and blackmailing towards a business or a person.
Cyber stalking Harassing online.
Malware Malicious programs can perform a variety of functions including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions, and monitoring user’s computer activity without their permission.
Denial of service attack Overloading a system with fake requests so that it cannot serve normal legitimate requests.
Fraud Manipulating data, for example changing the banking records to transfer money to an unauthorized account.
Harvesting A person or program collects login and password information from a legitimate user to illegally gain access to others’ account(s).
Identity theft It is a crime where the criminals impersonate individuals, usually for financial gain.
Intellectual property theft Stealing practical or conceptual information developed by another person or company.
Salami slicing Stealing tiny amounts of money from each transaction.
Scam Tricking people into believing something that is not true.
Spam Distribute unwanted e-mail to a large number of internet users.
Spoofing It is a malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 2.
What is piracy? Mention the types of piracy? How can it be prevented?
Answer:
Software Piracy:
Software Piracy is about the copyright violation of software created originally by an individual or an institution. It includes stealing codes/programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.

In simple words, Software Piracy is “unauthorized copying of software*’. The following Figure shows a diagrammatical representation of software piracy.
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 3

Types Of Piracy:

Shareware: An entirely different approach to software piracy is called shareware, which acknowledges the futility of trying to stop people from copying software and instead relies on people’s honesty.

Warez: Commercial programs that are made available to the public illegally are often called warez.

Prevention Method:

  • Illegal copying and distribution of commercial software should not be practiced.
  • Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses that program regularly to pay a registration fee to the program’s author directly.

Question 3.
Write the different types of cyber attacks.
Answer:
Types Of Cyber Attacks:
Malware is a type of software designed through which criminals gain illegal access to software and cause damage. Various types of cyber-attacks and their functions are given in the following Table.

No. ‘Cyber Attack

Function

1. Virus A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common viruses is Trojan.

Trojan
A Trojan virus is a program that appears to perform one function (for example, virus removal) but actually performs malicious activity when executed.

2. Worms Worms are self-repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.
3. Spyware Spyware can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software.
4. Ransomware Ransomware is a type of malicious program that demands payment after launching a cyber-attack on a computer system. This type of malware has become increasingly popular among criminals and costs the organization millions each year.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

11th Computer Science Guide Computer Ethics and Cyber Security Additional Questions and Answers

Part I

Choose The Correct Answer

Question 1.
A moral code that is evaluated as right is ………………..
(a) piracy
(b) viruses
(c) cracking
(d) ethics
Answer:
(d) ethics

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 2.
Information Technology is widespread through ________
a) Computers
b) Mobile phones
c) Internet
d) All the above
Answer:
d) All the above

Question 3.
Stealing data from a computer system without knowledge or permission is called ………………..
(a) warez
(b) hacking
(c) cracking
(d) phishing
Answer:
(b) hacking

Question 4.
A(n) ________ is a crime which involves computer and network.
a) Cyber-crime
b) Ethics
c) Cyber-law
d) None of these
Answer:
a) Cyber-crime

Question 5.
……………….. is the intermediary between the end-users and a web browser.
(a) Firewall
(b) Proxy server
(c) Cookies
(d) Warez
Answer:
(b) Proxy server

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 6.
________ is a cybercrime.
a) Phishing
b) Hacking
c) Identity thefts
d) All the above
Answer:
d) All the above

Question 7.
________ is a cybercrime.
a) Pharming
b) Piracy
c) Online financial transaction
d) All the above
Answer:
d) All the above

Question 8.
Ethics means________
a) What is wrong
b) What is Right
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 9.
________ is a set of moral principles that rule the behavior of individuals who use computers,
a) Ethics
b) Cyber-Crime
c) Virus
d) None of these
Answer:
a) Ethics

Question 10.
An individual gains knowledge to follow the right behavior, using morals that are also known as________
a) Ethics
c) Phishing
c) Hacking
d) None of these
Answer:
a) Ethics

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 11.
________ refer to the generally accepted standards of right and wrong in the society,
a) Piracy
b) Morals
c) Virus
d) None of these
Answer:
b) Morals

Question 12.
________ is a cyber world standard.
a) Do not use pirated software
b) Do not hack
c) Do not steal others’ passwords
d) All the above
Answer:
b) Do not hack

Question 13.
________ is a guidelines of computer ethics.
a) Honesty
b) Confidentiality
c) Respect
d) All the above
Answer:
d) All the above

Question 14.
________ is a guidelines of computer ethics.
a) Professionalism
b) Obey the law
c) Responsibility
d) All the above
Answer:
d) All the above

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 15.
Identify the correct statement from the following.
a) Ethics is a set of moral principles that govern the behavior of an individual in a society.
b) Computer ethics is set of moral principles that regulate the use of computers by users.
c) An Ethical issue is a problem or issue that requires a person or organization to choose between alternatives that must be evaluated as right or wrong.
d) All the above
Answer:
d) All the above

Question 16.
Identify the correct statement from the following related to ethics.
a) Users should be truthful while using the internet.
b) Users should not share any important information with unauthorized people.
c) Each user should respect the privacy of other users.
d) All the above
Answer:
d) All the above

Question 17.
Identify the correct statement from the following related to ethics.
a) Each user should maintain a professional conduct.
b) Users should strictly obey the cyber law in computer usage.
c) Each user should take ownership and responsibility for their actions
d) All the above
Answer:
d) All the above

Question 18.
Cybercrime is a(n) ________ crime.
a) Intellectual
b) White-collar
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 19.
Harassing through online is called ________
a) Cyber Stalking
b) Cyber Harassment
c) Cyber torture
d) None of these
Answer:
a) Cyber Stalking

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 20.
________ are malicious programs that can perform a variety of functions on user’s computer activity without their permission.
a) Cyber Stalking
b) Malware
c) Antivirus
d) None of these
Answer:
b) Malware

Question 21.
Malicious programs that can perform a variety of functions including ________ on user’s Computer activity without their permission.
a) Encrypting or Deleting sensitive data
b) Stealing
c) Hijacking core computing functions
d) All the above
Answer:
d) All the above

Question 22.
Overloading a system with fake requests so that it cannot serve normal legitimate requests is called________
a) Cyber Stalking
b) Malware
c) Denial of service attack
d) None of these
Answer:
c) Denial of service attack

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 23.
Manipulating data like changing the banking records to transfer money to an unauthorized account is called ________
a) Cyber Stalking
b) Malware
c) Denial of service attack
d) Fraud
Answer:
d) Fraud

Question 24.
________ means a person or program collects login and password information from a legitimate user to illegally gain access to others accounts.
a) Harvesting
b) Malware
c) Denial of service attack
d) Fraud
Answer:
a) Harvesting

Question 25.
________ is a crime where the criminals impersonate individuals, usually for financial gain.
a) Harvesting
b) Identity theft
c) Denial of service attack
d) Fraud
Answer:
b) Identity theft

Question 26.
________ means stealing practical or conceptual information developed by another person or company.
a) Harvesting
b) Identity theft
c) Intellectual property theft
d) Fraud
Answer:
c) Intellectual property theft

Question 27.
________ meant tricking people into believing something that is not true.
a) Harvesting
b) Scam
c) Intellectual property theft
d) Fraud
Answer:
b) Scam

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 28.
Stealing tiny amounts of money from each transaction means ________
a) Salami slicing
b) Scam
c) Intellectual property theft
d) Fraud
Answer:
a) Salami slicing

Question 29.
Distribute unwanted e-mail to a large number of internet is termed as ________
a) Salami slicing
b) Scam
c) Intellectual property theft
d) Spam
Answer:
d) Spam

Question 30.
________ is a malicious practice in which communication is send from unknown source disguised as a source known to the receiver.
a) Salami slicing
b) Scam
c) Spoofing
d) Spam
Answer:
c) Spoofing

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 31.
Software________ is about the copyright violation of software created originally by an individual or an institution.
a) Piracy
b) Fraud
c) Theft
d) None of these
Answer:
a) Piracy

Question 32.
________ includes stealing of codes / programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.
a) Piracy
b) Scam
c) Salami slicing
d) None of these
Answer:
a) Piracy

Question 33.
To prevent unauthorized access ________ is used.
a) Firewalls/ Intrusion Detection Systems
b) Virus and Content Scanners
c) Patches and Hotfixes
d) All the above
Answer:
d) All the above

Question 34.
IDS means.________
a) Intrusion Detection Systems
b) Intrusion Defective Systems
c) Intrusion Direction Systems
d) Intrusion Detach Systems
Answer:
a) Intrusion Detection Systems

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 35.
________ is intruding into a computer system to steal personal data without the owner’s permission or knowledge.
a) Piracy
b) Hacking
c) IDS
d) None of these
Answer:
b) Hacking

Question 36.
Steal a password is________
a) Piracy
b) Hacking
c) IDS
d) None of these
Answer:
b) Hacking

Question 37.
________ is where someone edits a program source so that the code can be exploited or modified.
a) Piracy
b) Hacking
c) Cracking
d) None of these
Answer:
c) Cracking

Question 38.
A cracker is called as a ________
a) Black hat
b) Dark side hacker
c) Both A and B
d) None of these
Answer:
c) Both A and B

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 39.
Cracking means trying to get into computer systems in order to________ data.
a) Steal
b) Corrupt
c) Illegitimately view
d) All the above
Answer:
d) All the above

Question 40.
A ________ is someone who breaks into someone else’s computer system, often on a network, bypassing passwords or licenses in computer programs.
a) Cracker
b) Programmer
c) Server
d) None of these
Answer:
a) Cracker

Question 41.
Password cracking can be performed by________
a) Using an automated program
b) Can be manually realized
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 42.
IRC means ________
a) International Relay Chat
b) Internet Relay Chat
c) Internal Relay Chat
d) Internet Ready Chat
Answer:
b) Internet Relay Chat

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 43.
The method that uses social engineering crackers is ________ guessing.
a) Password
b) Username
c) Website name
d) URL
Answer:
a) Password

Question 44.
Identify the correct statement from the following related with cracking.
a) It is a method of getting passwords and information using human weakness.
b) Crackers find your personal information from some persona! data/facts and try to guess a password.
c) Crackers may send official e-mail requesting some sensitive information. It may look like a legitimate e-mail from bank or other official institution.
d) All the above
Answer:
d) All the above

Question 45.
________ is a collection of various technologies, processes and measures that reduces the risk of cyber attacks.
a) Cyber Security
b) Cyber Crime
c) Cyber Gateway
d) None of these
Answer:
a) Cyber Security

Question 46.
________ protects organizations and individuals from computer based threats.
a) Cyber Security
b) Cyber Crime
c) Cyber Gateway
d) None of these
Answer:
a) Cyber Security

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 47.
________ is a type of software designed through which the criminals gain iliegal access to software and cause damage.
a) Malware
b) Piracy
c) Cracking
d) None of these
Answer:
a) Malware

Question 48.
A ________ is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file.
a) Virus
b) Piracy
c) Cracking
d) None of these
Answer:
a) Virus

Question 49.
________ is the most common virus.
a) Trojan
b) Melisa
c) Sasser
d) Code Red
Answer:
a) Trojan

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 50.
A ________ is a program that appears to perform one function but actually performs malicious activity when executed.
a) Cracking
b) Trojan virus
c) Piracy
d) None of these
Answer:
b) Trojan virus

Question 51.
________ can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software.
a) Spyware
b) Worms
c) Ransomware
d) None of these
Answer:
a) Spyware

Question 52.
________ is a type of malicious program that demands payment after launching a cyber-attack on a computer system.
a) Spyware
b) Worms
c) Ransomware
d) None of these
Answer:
c) Ransomware

Question 53.
________ type of malware has become increasingly popular among criminals and costs the organizations millions each year.
a) Spyware
b) Worms
c) Ransomware
d) None of these
Answer:
c) Ransomware

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 54.
________ is an example of social engineering.
a) Phishing
b) Pharming
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 55.
Phishing is a type of computer crime used to attack, steal user data, including ________
a) Login name
b) Password
c) Credit card numbers
d) All the above
Answer:
d) All the above

Question 56.
________ occurs when an attacker targets a victim into opening an e-maiior an instant text message.
a) Phishing
b) Pharming
c) Both A and B
d) None of these
Answer:
a) Phishing

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 57.
________ is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent web sites without their knowledge or permission.
a) Phishing
b) Pharming
c) Both A and B
d) None of these
Answer:
b) Pharming

Question 58.
Pharming has been called________
a) Phishing without a trap
b) Phishing with a trap
c) Illegal access
d) None of these
Answer:
a) Phishing without a trap

Question 59.
________ is a cyber-attack intended to redirect a website’s traffic to a fake site.
a) Phishing
b) Pharming
c) Trojan
d) None of these
Answer:
b) Pharming

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 60.
MITM stands for ________
a) Man In The Middle
b) Malware In The Middle
c) Move In The Middle
d) Must In The Middle
Answer:
a) Man In The Middle

Question 61.
________ is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating With each other.
a) Cyber
b) Man-in-the-middle attack
c) Cracking
d) None of these
Answer:
b) Man-in-the-middle attack

Question 62.
MITM is also called as________
a) Janus attack
b) Junk attack
c) Genious attack
d) None of these
Answer:
a) Janus attack

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 63.
A ________ is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing internet,
a) Cookie
b) MITM
c) Cracking
d) Piracy .
Answer:
a) Cookie

Question 64.
A ________ cookie is also called as cookie.
a) HTTP or Web
b) Internet
c) Browser
d) All the above
Answer:
d) All the above

Question 65.
________ can be used to remember arbitrary pieces of information that the user previously entered into form fields such as names, addresses, passwords, and credit card numbers.
a) Cookie
b) MITM
c) Cracking
d) Piracy
Answer:
a) Cookie

Question 66.
An anonymous user is called as________
a) Hacker
b) Malware
c) Cracker
d) None of these
Answer:
a) Hacker

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 67.
Who can access the cookie information and misuse it?
a) Hacker
b) Service provider
c) Cracker
d) None of these
Answer:
a) Hacker

Question 68.
Web sites typically use cookies for the ________ reason.
a) To collect demographic information about who has visited the Web site.
b) Sites often use this information to track how often visitors come to the site and how long they remain on the site.
c) It helps to personalize the user’s experience on the Web site.
d) All the above
Answer:
d) All the above

Question 69.
________ can help to store personal information about users so that when a user subsequently returns to the site.
a) Cookie
b) MITM
c) Cracking
d) Piracy
Answer:
a) Cookie

Question 70.
________ do not act maliciously on computer system.
a) Virus
b) MITM
c) Cracking
d) Cookie
Answer:
d) Cookie

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 71.
________ are merely text files that can be deleted at any time.
a) Cookies
b) MITM
c) Cracking
d) Virus
Answer:
a) Cookies

Question 72.
________ cannot be used to spread viruses and they cannot access our hard drive.
a) MITM
b) Cookies
c) Cracking
d) Virus
Answer:
b) Cookies

Question 73.
A ________ commonly establishes a block between a trusted internal computer network and entrusted computer outside the network.
a) Firewall
b) Cookie
c) Hacking
d) None of these
Answer:
a) Firewall

Question 74.
Firewall category is ________
a) Network-based
b) Host-based
c) Either A or B
d) None of these
Answer:
c) Either A or B

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 75.
________ firewalls are positioned on the gateway computers of LANs [Local Area Network], WANs [Wide Area Network] and intranets.
a) Network-based
b) Host-based
c) Either A or B
d) None of these
Answer:
a) Network-based

Question 76.
________ firewalls are positioned on the network node itself.
a) Network-based
b) Host-based
c) Either A or B
d) None of these
Answer:
b) Host-based

Question 77.
The ________ firewall may be a service as a part of the operating system or an agent application such as endpoint security or protection.
a) Network-based
b) Host-based
c) Either A or B
d) None of these
Answer:
b) Host-based

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 78.
A ________ acts as an intermediary between the end-users and a web server.
a) Proxy server
b) System software
c) Node
d) None of these
Answer:
a) Proxy server

Question 79.
________ typically keep the frequently visited site addresses in its cache which leads to improved response time.
a) Proxy servers
b) System software
c) Node
d) None of these
Answer:
a) Proxy servers

Question 80.
________ is a process that ensures confidentiality that only authorized persons can access the information.
a) Encryption
b) Decryption
c) Both A and B
d) None of these
Answer:
c) Both A and B

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 81.
________ is the process of translating the plain text data (plaintext) into random and mangled data.
a) Encryption
b) Decryption
c) Sampling
d) None of these
Answer:
a) Encryption

Question 82.
The encrypted text is called________
a) Cybertext
b) Cipher-text
c) Secured text
d) None of these
Answer:
b) Cipher-text

Question 83.
________ is the process of converting the cipher¬text back to plaintext.
a) Encryption
b) Decryption
c) Warping
d) None of these
Answer:
b) Decryption

Question 84.
________ is done by cryptography.
a) Encryption
b) Decryption
c) Both A and B
d) None of these
Answer:
c) Both A and B

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 85.
In cryptography, a ________ is a piece of information that determines the functional output of a cryptographic algorithm.
a) Key
b) Parameter
c) Input
d) Output
Answer:
a) Key

Question 86.
Encryption has been used by ________ to facilitate secret communication.
a) Militaries
b) Governments
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 87.
________ now commonly used in protecting information within many kinds of civilian systems.
a) Encryption
b) Sampling
c) Warping
d) None of these
Answer:
a) Encryption

Question 88.
________ is used to protect data in communication system.
a) Encryption
b) Sampling
c) Warping
d) None of these
Answer:
a) Encryption

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 89.
Encryption used in ________
a) Data being transferred via networks
b) Mobile telephones
c) Wireless microphones
d) All the above
Answer:
d) All the above

Question 90.
Encryption used in________
a) Wireless intercom systems
b) Bluetooth devices
c) Bank automatic teller machines
d) All the above
Answer:
d) All the above

Question 91.
Data should be ________ when transmitted across networks in order to protect against the network traffic by unauthorized users.
a) Encrypted
b) Translated
c) Converted
d) None of these
Answer:
a) Encrypted

Question 92.
There are________ types of encryption schemes.
a) three
b) four
c) two
d) five
Answer:
c) two

Question 93.
________ is a encryption scheme.
a) Symmetric Key encryption
b) Public Key encryption
c) Both A and B
d) None of these
Answer:
c) Both A and B

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 94.
encryption is a technique to use the same key for both encryption and decryption.
a) Symmetric Key
b) Public Key
c) Either A and B
d) None of these
Answer:
a) Symmetric Key

Question 95.
In________ encryption all authorized persons involved, have to exchange the key used to encrypt the data before they can decrypt it.
a) Symmetric Key
b) Public Key
c) Either A and B
d) None of these
Answer:
a) Symmetric Key

Question 96.
________ encryption is also called Asymmetric encryption
a) Symmetric Key
b) Public Key
c) Both A and B
d) None of these
Answer:
b) Public Key

Question 97.
________ uses the concept of a key-value pair, a different key is used for the encryption and decryption process.
a) Symmetric Key encryption
b) Public Key encryption
c) Both A and B
d) None of these
Answer:
b) Public Key encryption

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 98.
________ key is used in public key encryption.
a) Private
b) Public
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 99.
The ________ key is kept secret by the owner.
a) Private
b) Public
c) Both A and B
d) None of these
Answer:
a) Private

Question 100.
The ________ key is either shared amongst authorized recipients.
a) Private
b) Public
c) Both A and B
d) None of these
Answer:
b) Public

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 101.
The data encrypted with the recipient’s ________ key can only be decrypted with the
corresponding key.
a) Public, Private
b) Private, Public
c) Public, Protected
d) None of these
Answer:
a) Public, Private

Question 102.
A digital certificate in a client-server model of communication is one of the example of________
a) Asymmetric Encryption
b) Symmetric
c) Either A or B
d) None of these
Answer:
a) Asymmetric Encryption

Question 103.
A________ is a package of information that identifies a user and a server.
a) Signature
b) Signal
c) Certificate
d) None of these
Answer:
c) Certificate

Question 104.
A certificate contains information such as________
a) An organization’s name
b) The organization that issued the certificate
c) The users’ email address and country and user’s public key
d) All the above
Answer:
d) All the above

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 105.
Digital signatures are can provide ________ .
a) Assurances of evidence to origin
b) Identity and status of an electronic document, transaction or message
c) Acknowledging informed by the signer
d) All the above
Answer:
d) All the above

Question 106.
________ law is used to prevent cybercrime.
a) Cyber Law or Cyber Space Law
b) Information Technology Law
c) Internet Law
d) Either A or B or C
Answer:
d) Either A or B or C

Question 107.
In India Cyberlaw and IT Act 2000, modified in ________ are being articulated to prevent computer crimes.
a) 2018
b) 2008
c) 1998
d) None of these
Answer:
b) 2008

Question 108.
EDI stands for ________
a) Electronic Data Interchange
b) Electronic Document Interchange
c) Electronic Data Information
d) Electrical Data Interchange
Answer:
a) Electronic Data Interchange

Question 109.
________ is a term that encapsulates the legal issues related to using of the Internet.
a) Cyberlaw
b) Internet law
c) Either A or B
d) None of these
Answer:
c) Either A or B

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 110.
________ of cybercrime remains unsolved.
a) 75%
b) 50%
c) 25%
d) 10%
Answer:
c) 25%

Question 111.
To protect the information follow________
a) Complex password setting can make your surfing secured.
b) When the internet is not in use, disconnect it.
c) Do NOT open spam mail or emails that have an unfamiliar sender.
d) All the above
Answer:
d) All the above

Question 112.
Identify the correct statement from the following:
a) Information security is the immune system in the body of business.
b) Awareness is the key to security.
c) When using anti-virus software, keep it up-to-date.
d) All the above
Answer:
d) All the above

Part II

Very Short Answers

Question 1.
What is hacking?
Answer:
Hacking is intruding into a computer system to steal personal data without the owner’s permission or knowledge (like to steal a password). It is also gaining unauthorized access to a computer system, and altering its contents.

Question 2.
What is cyber-crime?
Answer:
A cyber-crime is a crime which involves computer and network. This is becoming a growing threat to society and is caused by criminals or irresponsible actions of individuals who are exploiting the widespread use of the Internet.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 3.
Mention any 2 reasons as to why the websites use cookies?
Answer:

  1. To collect demographic information about who has visited the Web site.
  2. It helps to personalize the user’s experience on the Website.

Question 4.
What are the types of Cybercrime?
Answer:
It is depicted in the following diagram:
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 4

Question 5.
Define software piracy.
Answer:
Software Piracy is about the copyright violation of software created originally by an individual or an institution. It includes stealing codes/programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.

Question 6.
What are the standards in the cyber-world?
Answer:
In the cyber-world, there are certain standards such as:

  • Do not use pirated software.
  • Do not use unauthorized user accounts.
  • Do not steal others’ passwords.
  • Do not hack.

Question 7.
What are the core issues in computer ethics?
Answer:
The core issues in computer ethics are based on the scenarios arising from the use of the internets such as privacy, the publication of copyrighted content, unauthorized distribution of digital content, and user interaction with websites, software, and related services.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 8.
What are the changes in society due to the internet?
Answer:

  • With the help of the internet, the world has now become a global village.
  • The Internet has been proven to be a boon to individuals as well as various organizations and businesses.
  • e-Commerce is becoming very popular among businesses as it helps them to reach a wide range of customers faster than any other means;

Question 9.
What are the roles of computer ethics?
Answer:
Computer ethiŒ deals with the proœdures, values, and practices that govern the process of consuming computer technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization, or entity.

Question 10.
What is the difference between ethics and computer ethics?
Answer:

  • Ethics is a set of moral principles that govern the behavior of an individual in a society.
  • Computer ethics is set of moral principles that regulate the use of computers by users.

Question 11.
What is cybercrime? Give an example.
Answer:
Cyber Crime
Cybercrime is an intellectual, white-collar crime. Those who commit such crimes generally manipulate the computer system in an intelligent manner.
For example – illegal money transfer via the internet.

Question 12.
How to prevent unauthorized access?
Answer:
To prevent unauthorized access, Firewalls, Intrusion Detection Systems (IDS), Virus and Content Scanners, Patches and Hotfixes are used.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 13.
What is social engineering? Give an example.
Answer:
Social engineering
A misuse of an individual’s weakness, achieved by making them to click malicious links, or by physically accessing the computer through tricks. Phishing and pharming.

Question 14.
What are Cookies?
Answer:
A cookie is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing the internet.

Question 15.
What are the types of encryption?
Answer:
There are two types of encryption schemes as listed below:

  • Symmetric Key encryption
  • Public Key encryption

Question 16.
What is a certificate?
Answer:
A certificate is a package of information that identifies a user and a server. It contains information such as an organization’s name, the organization that issued the certificate, the users’ email address and country, and the user’s public key.

Question 17.
What is a digital certificate?
Answer:

  • A digital certificate in a client-server model of communication.
  • It is one of the examples of Asymmetric Encryption.

Question 18.
What is a digital signature?
Answer:
Digital signatures are based on asymmetric cryptography and can provide assurances of evidence to origin, identity, and status of an electronic document, transaction, or message, as well as acknowledging informed by the signer.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 19.
Write a note on Cyberlaw or Internet law.
Answer:
Cyberlaw or Internet law is a term that encapsulates the legal issues related to using the Internet.

Question 20.
Write about IT Act 2000.
Answer:
IT Act 2000 is an act to provide legal recognition for transactions carried out by means of Electronic Data Interchange (EDI) and other means of electronic communication.

Part III

Short Answers 3 Marks

Question 1.
What are the guidelines of ethics?
Answer:
GUIDELINES OF ETHICS:
Generally, the following guidelines should be observed by computer users:

  • Honesty: Users should be truthful while using the internet.
  • Confidentiality: Users should not share any important information with unauthorized people.
  • Respect: Each user should respect the privacy of other users.
  • Professionalism: Each user should maintain professional conduct.
  • Obey The Law: Users should strictly obey the cyber law in computer usage.
  • Responsibility: Each user should take ownership and responsibility for their actions

Question 2.
Write a short note on ethics.
Answer:
Ethics means “What is Wrong and What is Right”. It is a set of moral principles that rule the behavior of individuals who use computers. An individual gains knowledge to follow the right behavior, using morals that are also known as ethics. Morals refer to the generally accepted standards of right and wrong in society. Similarly, in the cyber world, there are certain standards such as

  1. Do not use pirated software.
  2. Do not use unauthorized user accounts.
  3. Do not steal others’ passwords.
  4. Do not hack.

Question 3.
Write a note on unauthorized access.
Answer:
UNAUTHORIZED ACCESS:
Unauthorized access is when someone gains access to a website, program, server, service, or another system by breaking into a legitimate user account.

For example, if someone tries guessing a password or user name for an account that was not theirs until they gained access, it is considered unauthorized access.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 4.
What are cyber-attack and cybersecurity?
Answer:

  • Cyber attacks are launched primarily for causing significant damage to a computer system or for stealing important information from an individual or from an organization.
  • Cybersecurity is a collection of various technologies, processes, and measures that reduces the risk of cyber-attacks and protects organizations and individuals from computer-based threats.

Question 5.
What is phishing? Explain with a suitable diagram.
Answer:
Phishing:
Phishing is a type of computer crime used to attack, steal user data, including login name, password and credit card numbers. It occurs when an attacker targets a victim into opening an e-mailer an instant text message.

The attacker uses phishing to distribute malicious links or attachments that can perform a variety of functions including the extraction of sensitive login credentials from victims.

Diagrammatic representation of Phishing
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 5

Question 6.
What is Pharming? Explain with suitable diagram.
Answer:
Pharming:
Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent web sites without their knowledge or permission.

Pharming has been called “phishing without a trap”. It is another way hackers attempt to manipulate users on the Internet. It is a cyberattack intended to redirect a website’s traffic to a fake site.

Diagrammatic representation of Pharming :
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 6

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 7.
What do you mean by Man In The Middle attack or Janus attack? Illustrate in a diagram.
Answer:
Man In The Middle (MITM) :
A man-in-the-middle attack (MITM; also Janus attack) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

Example:
Suppose Alice wishes to communicate with Bob. Meanwhile, Mallory wishes to intercept the conversation to overhear and optionally to deliver a false message to Bob.

An illustration of the man-in-the-middle attack :
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 7

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 5.
Write down the points to be noted to be safe from cybercrime.
Answer:
To protect the information the following points to be noted:

  1. A complex password setting can make your surfing secured.
  2. When the internet is not in use, disconnect it.
  3. Do NOT open spam mail or emails that have an unfamiliar sender.
  4. When using anti-virus software, keep it up to date.

Question 9.
Explain the working of the Proxy Server.
Answer:
A proxy server acts as an intermediary between the end-users and a web server. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resources available from a different server.

The proxy server examines the request, checks authenticity, and grants the request based on that. Proxy servers typically keep the frequently visited site addresses in their cache which leads to improved response time.
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 8

Question 10.
How to prevent cybercrime?
Answer:
To protect the information the following points to be noted:

  • A complex password setting can make your surfing secured.
  • When the internet is not in use, disconnect it.
  • Do NOT open spam mail or emails that have an unfamiliar sender.
  • When using anti-virus software, keep it up-to-date.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Part IV

Explain in Detail

Question 1.
List the computer crimes and their functions.
Answer:

Crime Function
Crime

Function

Hacking, threats, and blackmailing

towards a business or a person.

Cyberstalking Harassing online.
Malware Malicious programs can perform a variety of functions including stealing, encrypting, or deleting sensitive data, altering or hijacking core computing functions, and monitoring user’s computer activity without their permission.
Denial of service attack Overloading a system with fake requests so that it cannot serve normal legitimate requests.
Fraud Manipulating data, for example changing the banking records to transfer money to an unauthorized account.
Harvesting A person or program collects login and password information from a legitimate user to illegally gain access to others’ account(s).
Identity theft It is a crime where the criminals impersonate individuals, usually for financial gain.
Intellectual property theft Stealing practical or conceptual information developed by another person or company.
Salami slicing Stealing tiny amounts of money from each transaction.
Scam Tricking people into believing something that is not true.
Spam Distribute unwanted e-mail to a large number of internet users.
Spoofing It is a malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.

Question 2.
Explain Hacking in detail.
Answer:
HACKING:
Hacking is intruding into a computer system to steal personal data without the owner’s permission or knowledge (like to steal a password). It is also gaining unauthorized access to a computer system, and altering its contents. It may be done in pursuit of criminal activity or it may be a hobby.
Diagrammatic representation of Hacking
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 9

Question 3.
Write short notes on:

  1. Spam
  2. Fraud
  3. Cyberstalking
  4. Spoofing
  5. Virus
  6. Worms

Answer:

  1. Spam: Distribute unwanted email to a large number of internet users.
  2. Fraud: Manipulating data, for example changing the banking records to transfer money to an unauthorized account.
  3. Cyberstalking: Harassing through online.
  4. Spoofing: It is a malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.
  5. Virus: A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common viruses is Trojan.
  6. Worms: Worms are self – repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 4.
Explain the working of the Firewall server. Firewall Server:
Answer:
A firewall is a computer network security-based system that monitors and controls the incoming and outgoing network traffic based on predefined security rules. A firewall commonly establishes a block between a trusted internal computer network and entrusted computer outside the network.

They are generally categorized as network-based or host-based.

Network-based firewalls are positioned on the gateway computers of LANs [local area Network], WANs [Wide Area Network], and intranets.

Host-based firewalls are positioned on the network node itself. The host-based firewall may be a service as a part of the operating system or an agent application such as endpoint security or protection.
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 10

Question 5.
Explain public key encryption.
Answer:
PUBLIC KEY ENCRYPTION:
Public key encryption is also called asymmetric encryption. It uses the concept of a key-value pair, a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.

The private key is kept secret by the owner and the public key is either shared amongst authorized re.dQle.ats. cvr made, available to the public at large.

The data encrypted with the recipient’s public key can only be decrypted with the corresponding private key.
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 11

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 6.
What is a digital signature? Explain the function of the digital signature with a suitable diagram.
Answer:
Digital Signature:
Digital signatures are based on asymmetric cryptography and can provide assurances of evidence to origin, identity, and status of an electronic document, transaction, or message, as well as acknowledging informed by the signer.

To create a digital signature, signing software (email) creates a one-way hash of the electronic data to be signed. The user’s private key encrypts the hash, returning a value that is unique to the hashed data.

The encrypted hash, along with other information such as the hashing algorithm, forms the digital signature. Any change in the data, even to a single bit, results in a different hash value. This attribute enables others to validate the integrity of the data by using the signer’s public key to decrypt the hash.

If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn’t changed since it was signed.

If the two hashes don’t match, the data has either been tampered with in some way (indicating a failure of integrity) or the signature was created with a private key that doesn’t correspond to the public key presented by the signer (indicating a failure of authentication).
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 12

Leave a Reply