Societal Impacts of IT – NCERT Solutions for Class 10 Computer Science: Foundation of Information Technology
Very Short Answer Type Questions [1 Mark each] Impacts of IT
Question 1. Define virus.
Answer: A virus is a harmful program, which on entering a computer, starts creating copies of itself. It then attacks by corrupting the executable files and folders saved on the computer.
Question 2. List the different types of computer viruses.
File system viruses
Boot sector viruses
Question 3. Name some forms of virus attacks.
Answer: Worms, Trojan horse, Computer Virus etc.
Question 4. Give some examples of computer worms.
Answer: MS-Blaster, Mellisa worm, SQL Slammer worm are the common examples of worms.
Question 5. Explain denial of service attack.
Answer: A denial of service attack is a type of attack that consumes all the resources of a computer.
Question 6. What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them?
Answer: Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.
Question 7. Describe hacking.
Answer: Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator’s original purpose.
Question 8. What is the meaning of backup? CBSE 2013
Answer: Backup is a process of making an extra copy of the data on a computer and storing it in a different location on the computer or in an external device.
Question 9. What are the types of data backup?
Answer: There are two types of data backup:
Question 10. Can you backup the files while your computer is running?
Answer: Yes, we can safely backup open files and programs while they are running.
Question 11. What is encryption of data? CBSE 2014
Answer: Encryption refers to scrambling of data in some encoded format so that it may be transmitted over networks.
Question 12. A digital signature is issued by which organisation?
Answer: A digital signature is«an electronic file that is issued by a Certification Authority. (CA).
Question 13. Name two other means of online security measures.
Answer: Digital signature and Digital certificate
Question 14. Which security provision is used to ensure data integrity and authentication?
Answer: A digital signature helps the user to ensure data integrity and authentication.
Question 15. Give any two shortcomings of online purchase. CBSE 2014
Cannot see the product in reality before a purchase.
You do not receive the product immediately, there is always some delay.
Short Answer Type Questions [2 & 3 Marks each]
Question 1. How does a virus affect your computer?
Answer: Virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.
Question 2. Give three guidelines to prevent the virus attack.
Answer: Three guidelines to prevent the virus attack are as follows:
Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click everything in your mailbox. If you get an unexpected file attachment, send an enquiry E-mail to its sender. Ask him about the nature and function of the file attachment.
In stable reliable antivirus, scanning software and download its updates regularly.
Scan files downloaded from the Internet or other external sources.
Question 3. If your computer attacked by a trojan horse virus, what damage it may cause?
Answer: If your computer attacked by a trojan horse virus, it can:
Copy sensitive data
Carry out any other harmful operations etc.
Question 4. Write minimum three ways by which a virus can spread to other systems.
Answer: Three ways by which a virus can spread to other systems are as follows:
When an infected file is copied through network.
When virus file is downloaded from Internet.
When infected file is copied from floppy disk, USB, DVD etc.
Question 5. Write any two tips to avoid spams. CBSE 2016
Answer: You can use the following guidelines to avoid spam, they are as follows:
Keep your E-mail address private.
Using appropriate filters to find and alter you about spam.
Question 6. What are the primary interest of online attackers in spyware?
Answer: Primary interest of online attackers in spyware is using it to steal personal information for financial crimes such as carding and identity theft or to sell that information to someone else who then executes more traditional financial crimes.
Question 7. What does an antivirus software do? CBSE 2014
What does an antivirus software do? Explain in brief with any two points. CBSE 2013
Antivirus software is a computer program that detects, prevents and takes action to disarm or remove malicious software programs, such as viruses and worms.
Displays health of your computer system.
Question 8. What precaution you should take before copying file from an external storage media?
Answer: Precaution should be taken to run an antivirus program before copying any file from floppy disk, USB, DVD etc. Also, we have to run antivirus program weekly to scan all the drives in the system.
Question 9. List some commonly available antivirus programs.
Answer: Some of the commonly available antivirus programs in the market are as follows:
Symantec Norton antivirus
Question 10. Define information security.
Answer: Information security is all about protecting and preserving information. It’s all about protecting and preserving the confidentiality, integrity, authenticity, availability and reliability of information.
Question 11. Differentiate between full backup and differential backup.
Answer: Differences between full backup and differential backup are as follows:
A complete backup of everything that you want to backup.
The backup software looks at which files have changed, since you last did a full backup.
Restoration is fast, since you only need one set of backup data.
Faster to create than a full backup.
Question 12. Write differences between online backup and offline backup. CBSE 2014
Answer: Differences between online backup and offline backup are as follows:
You don’t have direct control over your data.
The data is totally in your control.
If you have a fire, flood, or theft, your backup is offsite so you don’t have to worry about it.
If you have a fire or flood, your backup might be damaged alongwith your computer.
Question 13. List two advantages of online backup. CBSE 2012, 2013
Answer: Two advantages of online backup are as follows:
By having your data stored on a remote hard drive, you run little as there is no risk of losing your data as a result of fire, theft or any other disaster.
No hardware is needed to maintain or repair the backup.
Question 14. Can firewalls detect virus?
Answer: Firewalls do not screen computer viruses.
As the location of firewalls is a good place for scanning, some firewalls has plug-in virus scanning module.
And some programs scan virus at a point either before or after a firewall.
Question 15. Mention three societal impacts of IT.
Answer: The societal impacts of IT are as follows:
Opportunities for people with disabilities through artificial intelligence.
Quality of life improvements due to E-Commerce over Internet.
Crime fighting and other benefits.
Question 16. Why should we frequently take backup of our data?
Answer: We frequently take backup of our data because
The hard drive of our computer may fail.
The data on our computer may get corrupted for a variety of reasons.
Data loss due to fire, natural disasters etc.
Question 17. Differentiate between digital certificate and digital signature. CBSE 2013
Answer: Differentiate between digital certificate and digital signature are as follows:
Digital certificates are typically used in Websites to increase their trustworthiness to its users.
A digital signature is a mechanism that is used to verify that a particular digital document or a message is authentic.
Digital certificates are used, the assurance is mainly dependent on the assurance provided by the CA.
With digital signatures, the receiver can verify that the information is not modified.
Question 18. Name one specific software/tool for each of the following categories: CBSE 2011
Data recovery tool
Online backup tool
Antivirus software – Quick Heal
Data recovery tool – NTFS Reader
Online backup tool – Dropbox
Question 19. Give the three terms related to the following:
Attacks Trojan horse, Worm, Denial of Service.
Backup Online backup, Full backup, Differential backup.
Security software Digital signature, Firewall, Antivirus.
Question 20. Name four data backup devices/medium. CBSE 2016
Answer: Four storage media on which data backup may be taken are as follows:
DVD (Digital Versatile Disk)
External hard disk
USB flash drive
Long Answer Type Questions [5 Marks each]
Question 1. What are the common symptoms of a virus attack?
Answer: Symptoms of Computer Viruses Attack
The list of symptoms of computer viruses attack, which indicate that your system is infected with a computer viruses are as follows:
Odd messages are displaying on the screen.
Some files are missing.
System runs slower.
PC (Personal Computer) crash or restart again and again.
Drives are not accessible.
Antivirus software will not run or installed.
Unexpected sound or music plays.
The mouse pointer changes its graphic.
Receive strange E-mails containing odd attachments or viruses.
PC starts performing functions like opening or closing windows, running programs on its own.
Question 2. What are the various measures that should be taken to prevent spyware from overtaking your system?
Answer: Preventions of Spyware
Due to the seriousness of spyware and the harm, it can affect your system and personal information, it is highly recommended you to take the given measures to prevent spyware from overtaking your system:
Download and install anti-spyware software: Most antivirus applications are effective in identifying different types of malware, including spyware, but may not detect all spyware variants. Once you install the anti-spyware software on your computer, you must keep your anti-spyware application updated to keep up with the latest forms of spyware.
Be cautious when Web surfing: The best defense against spyware is not to download it in the first place. Spyware is often installed on your computer when you visit an infected or malicious Website.
Therefore, you should exercise caution with links to Websites from unknown sources. In addition, you should only download programs from trustful Websites. When downloading a specific program, ensure that you are not downloading pirated software. Spyware can be distributed by exploits, that promote software piracy.
Lookout for pop-ups: Malware can lure you into installing spyware on your computer by prompting you with a pop-up window. If you see an unwanted or random pop-up alert, do not click “Agree” or “OK” button to close the pop-up window. This will actually install the malware on your computer. Instead, press Alt + F4 or click on the red “X” on the corner on the pop-up alert to close the window.
Keep current with operating system updates: Important system updates provide significant benefits such as improved security. Just as with any antivirus and anti-spyware software, not keeping up with operating system updates will make your PC vulnerable to the latest malware threats.
Harden your browser settings: Updated Web browsers may help to prevent exploitation by taking several defensive steps against spyware. Most Web browsers will warn you of executable programs and will suggest a safe course of action. In addition to having an updated Web browser, ensure that you have properly configured your browser and that all of your plug-ins and add-ons are updated, including Java, Flash and Adobe products.
Enable your firewall: Firewalls monitor the network and are capable of blocking suspicious traffic, which can prevent spyware from infecting your system.
Question 3. Differentiate between hackers and crackers.
Answer: Differences between hackers and crackers are as follows:
A hacker is a person intensely interested in the arcane and recondite working of any computer operating system.
A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent.
Hackers obtain advanced knowledge of operating systems and programming languages.
Having gained unauthorised access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets.
Hackers constantly seek further knowledge, freely share what they have discovered and never intentionally damage data.
Crackers can easily be identified because their actions are malicious.
Question 4. Explain SET, PCI and Kerberos.
PCI (Peripheral Component Interconnect) is a computer bus for attaching hardware devices in a computer. These devices can take either the form of an integrated circuit fitted onto the motherboard itself, called a planer device in the PCI specification or an expansion card that fits into a slot.
SET (Secure Electronic Transaction) protocol, which is developed by Visa and Mastercard uses encryption for privacy and digital certificates to verify the three parties -the bank, the customer and the merchant. It ensures secure transactions online.
Kerberos is a third-party authentication that validates the clients over the network and provides secure communication or access to network resources.
Question 5. Write a short note on social networking.
Answer: It is a grouping of individuals into specific groups, like small rural communities or a neighbourhood subdivision, if you will. A social networking service is an online service, platform or site that focuses on facilitating the building of social networks or social relations among people.
e.g. people who share interests, activities, backgrounds or real life connections. When it comes to online social networking, Websites are commonly used. These Websites are known as Social Sites. The most popular social sites are currently Facebook, MySpace, Orkut etc.
These Websites provide users with simple tool to create a custom profile with text and pictures. Typical profile includes basic information about user, atleast one photo and possibly a blog or other comments published by the user. It may include videos, photos albums, online applications as in Facebook or custom layout (in MySpace). After creating a profile, user can send message to other users and leave comments directly on friends’ profiles.
Question 6. Write the benefits of ICT in education and healthcare.
Answer: Benefits of ICT
ICT has become an integral part of our daily life. And, it has benefited the common man in various ways in every field of life. Some of them are as follows:
The main purpose of the strategy for ICT implementation in education is to provide the prospects and trends of integrating ICT into the general educational activities.
Some benefits of ICT in education are as follows:
There is no time boundation on an individual for getting educated by a teacher. A person can attend a class anytime and anywhere.
Teachers can create interactive classes and make the lessons more interesting.
Generally, students find images and graphical representation of concepts, more interesting as compared, to the theoretical knowledge. And, using ICT, teachers can explain even the most complex concept in a very simplified manner using graphics, videos and animations.
An individual can learn on pace he/she is comfortable.
Learning resoures can be accessed remotely.
Some benefits of ICT in healthcare are as follows:
Automated hospital information systems can help to improve quality of care.
Decreased costs of treatment.
ICT has significantly enhanced the services being provided and brought behavioural changes.
This technology helps doctors, hospitals, the general public and all other medical care providers.
Pharmaceutical industry is the industry that enjoys the biggest benefits of ICT.
ICT has made E-Health possible.
Question 7. “Virtual schools are better than traditional schools.” Write reasons to support this statement.
Answer: A virtual school is a learning environment offered entirely on the Internet. All student services and courses are conducted through Internet technology. The virtual school differs from the traditional school through the physical medium that links administrators, teachers and students. It refers to an institution that is not “brick and mortar” bound.
The advantages of virtual schools are as follows:
Individualised instruction for all students.
Lessons can be taught in a way that benefits students with various learning abilities.
More time can be spent on lessons that are more difficult for students.
Flexibility for the students to learn whenever and wherever they want.
Students are self-directed and mature quicker as they manage their studies.
Students can access learning 24 hours a day and learn at their own pace.
The disadvantages of virtual schools are as follows:
Undisciplined students will not succeed in the online environment.
Puts more stress on the parents to provide guidance and tutoring.
Parents need to monitor the student all day long as opposed to dropping the student at school where the student is monitored by teachers and staff.
Students are more isolated and might not developed properly socially.
Students would not receive personal one-on-one time with teachers.
Question 8. Give one word answer CBSE 2012
Another name for junk mails.
It is doing business online.
It is the crime committed using computers and Internet.
The programmer that breaks into secure systems with non-malicious intentions.
Type of malware that is installed on user’s computer and collects information about user without his consent.
Application Oriented Questions
Question 1. Amit installed an antivirus software to remove all the viruses from his computer.
What is antivirus software?
Name two actions performed by an antivirus software.
Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.
Two actions performed by an antivirus software are as follows:
(a) Scanning E-mail messages and their attachments.
(b) Scanning and monitoring files and folders on your computer to ensure that they are not infected.
Question 2. It is an electronic messaging system used by various commercial organisations to send bulk messages to a large number of E-mail addresses. What is it?
Answer: 2. Spam
Question 3. Shreenivasan is working for an IT firm where he needs to backup of his data of around 200 MB to 400 MB at the end of each day. Each day backup needs to archived separately for future reference. Suggest any two economic data backup devices, which he can use for this purpose.
Answer: DVD and Pen drive
Question 4. Mohan has downloaded few attachments in his mail to his system from Internet. When he opened those attachments there were multiple copies of the same file opened. After sometime his system got rebooted automatically. He is unable to find out why his system is not responding properly. Can you tell what happened to his system and give him some solutions? CBSE 2016
Answer: There is a virus (most likely worm) in Mohan’s computer, that has caused damage to data and files on his system. He should install antivirus software, such as Kaspersky, Quick Heal, McAfee etc., as the main defence against online problems. He should take backup of his files regularly.
Question 5. In a small office network, to protect every computer from hackers, virus or worm. Which statement do you think is True or False from the given options?
Set Firewall Turned ON
Install antivirus software.
Allow users to use external disk drives.
Download attachments from reliable source even without scanning. CBSE 2016
Multiple Choice Questions [1 Mark each]
Q1. …………… stands for Malicious Software, is software designed to infiltrate a computer system without the owner’s informed consent. CBSE2011
Answer: (d) Malware designed to interrupt ongoing computer operations, collect private information and gain unauthorised access to your system resources.
Q2. Which one of the following is not a malware? CBSE 2016
(a) Computer virus
(d) Application software
Answer: (d) Application software refers to the condition in which your computer stops working.
(b) Virus attack
(d) None of these
Answer: (a) Hang refers to the condition in which your computer or a software stops working.
Q3. Which of the following is not a symptom of a virus attack?
(a) The computer begins to run slowly
(b) Unusual messages and graphics appear on the screen for inexplicable reasons
(c) Some programs or data files on the computer either become corrupt or are difficult to locate
(d) Your data is copied to another location
Answer: (d) Your data is copied to another location is not a symptom of a virus attack.
Q4. A good way to safeguard access to your computer is to protect it.
Answer: (d) Password is a good way to safeguard access to your computer to protect it.
Q5. Which of the following is the first computer virus?
(c) Elk Cloner
(d) I Love You
Answer: (c) Elk Cloner is the first computer virus created by Richard Skrenta.
Q7. Out of the following, which one will be altered or modified by a computer virus? CBSE 2011
(a) Operating system
(b) Speed of network connectivity
(c) Application software
(d) All of the above
Answer: (d) All of the above
Q8. Which one of the following is not a way to get a computer virus? CBSE 2016
(a) Through E-mail attachments
(b) Through pen drive
(c) By typing on keyboard
(d) By downloading files
Answer: (c) By typing on keyboard is not a way to get a computer virus.
Q9. The at first glance will appear to be useful software but will actually do damage once installed or run on your computer.
Answer: (c) The trojans are unauthorised programs placed inside a legitimate application.
Q10. A …….. is a virus that is often disguised as a useful computer program. CBSE 2012
(a) trojan horse
Answer: (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.
Q11. A ……. is a software program that is designed to copy itself from one computer to another, without human intervention. CBSE 2011
Answer: (c) A worm is a self-replicating software program. It does not require another program to host it.
Q12. Which of the following is not an example of worm?
(c) De bumper
Answer: (c) De bumper is a type of trojan horse.
Q13. Which of the following statements is incorrect in the context of a worm?
(a) It represents a category of malware
(b) It creates infections in a computer
(c) It is self replicating
(d) It cannot travel on its own
Answer: (d) Worm is self replicating software and thus, it can travel on its own.
Q14. A category of software that spies of your computer activities is
Answer: (b) Spyware is a category of software that spies computer activities.
Q15. The electronic equivalent of junk mail is known as CBSE 2014
(b) cyber fraud
Answer: (c) Spam is an electronic equivalent of junk mail.
Q16. Which of the following is not antivirus software?
(a) Norton Antivirus
Answer: (b) Melissa is a macro virus, not an antivirus.
Q17. To avoid problems while working on the Internet, you should follow these precautions.
(a) Install antivirus on your computer
(b) Take the backup of your files regularly
(c) Do not click on unknown links
(d) All of the above
Answer: (d) All of the above
Q18. One limitation of antivirus programs is that they: CBSE 2016
(a) Sometimes start behaving like virus
(b) Are very expensive
(c) Harm the computer
(d) Can detect only those viruses for which they are programmed
Answer: (d) Antivirus can detect only those viruses for which they are programmed.
Q19. The programmers who break into secure systems for malicious purpose are CBSE 2014
Answer: (a) Crackers are the programmers that break into secure systems for malicious purpose.
Q20. A is someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs without malicious intent with a wish to learn and improve security.
Answer: (a) A hacker is a person who enjoys learning programming languages and about computer systems and their working.
Q21. A digital document issued to a Website by a certification authority on the Internet is called
(a) digital signature
(c) digital certificate
Answer: (c) A digital certificate is an electronic file that is issued by a certification authority to Websites.
Q22. You can transmit sensitive information, such as that relating to your credit card, by using
Answer: (c) SSL allows sensitive information such as credit card numbers to be transmitted securely.
(a) Amplifies weak outgoing signals to stronger ones
(b) Is the name of an open source browser
(c) Is the name of computer virus
(d) Prevents intruders from accessing your system
Answer: (d) A firewall can either be software based or hardware based and is used to prevent intruders from accessing your system.
Fill in the Blanks [1 Mark each]
Q1. ………… is the general term to refer to infectious software such as virus, worm, spyware etc.
Q2. A malicious program that is used to remove all information from your computer is known as ………
Q3. A ……….. infects the files of the operating system.
Answer: boot sector virus
Q4. ……. and ………. are the two types of malware. CBSE 2011
Answer: Viruses, Worms
Q5. ……….. can decrease the space on hard disks by duplicating files.
Q6. ……… is a program that appears harmless but actually performs malicious functions. CBSE 2014
Answer: Trojan horse
Q7. ……….. is a software program that is designed to copy itself from one computer to another. CBSE 2016
Q8. Unlike a computer virus, a ……….. can replicate itself automatically. CBSE 2011
Q9. …………. is a type of malware that is installed on a user’s computer and collects information about user without their consent and knowledge. CBSE 2013
Q10. Any crime committed using computers and Internet is termed as ………… CBSE 2013
Answer: cyber crime
Q11. ………. attack eats up all the resources of a system and halts it.
Answer: Denial of service
Q12. ……… is a computer program that detects, prevents and takes action to remove malicious software programs. CBSE 2016
Q13. Copy of data created for safe storage is …………
Q14. ………… backup saves your data from natural disasters. CBSE 2012
Q15. ……. is a type of backup in which only the data that changed, since last backup is saved.
Answer: Differential backup
Q16. A digital code attached to an electronic message to provide it unique identity is called ………… CBSE 2014
Answer: digital signature
Q17. ………. security technology establishes an encrypted link between a Web server and browser.
Q18. …… refers to the disparity of classification of person according to their knowledge of ICT and without it.
Answer: Digital divide
True or False [1 Mark each]
Q1. A virus may corrupt or delete data on your computer. CBSE 2011
Answer: True A virus may corrupt or delete data on your computer.
Q2. A virus is a harmful program, which one entering a computer, starts creating copies of itself.
Answer: True Virus is a malicious program that is designed to make a system sick, just like a real virus.
Q3. A worm is a self-replicating program which eats up the entire disk space. CBSE 2012
Answer: False Virus eats up the entire disk space.
Q4. Spyware is a type of malware but is not capable of collecting personal information. CBSE 2011
Answer: False Spyware is a type of malware used to collect personal information without his or her knowledge.
Q5. Adware is a ‘Software that posts unwanted advertisements on your computer.
Answer: True Adware is a software that is given to the user with unwanted advertisements embedded in the application.
Q6. Always scan the storage media before connecting it to your computer.
Answer: True You should always scan your storage media before connecting it to your computer.
Q7. SmartCop is an antivirus developed in India.
Answer: True SmartCop antivirus is developed in India.
Q8. Junk E-mails are also called spam. CBSE 2016
Answer: True E-mail spam, junk mail or junk newsgroup posting is a widely recognised form of spam.
Q9. Cracker is a person who breaks security to see what we have stored on our computers with mat intentions. CBSE 2016
Answer: True Cracker breaks security with mal intentions.
Q10. It is not necessary to regularly take back-up of important files. CBSE 2011
Answer: False A backup ensures that your computer data is protected or can be recovered.
Q11. CD is a storage device that is used to take the backup of your data.
Answer: True You can use different types of storage devices like CD, DVD to take the backup of your data.
Q12. You cannot keep the backup of your data online.
Answer: False In online backup, you send the data to a remote server through the Internet.
Q13. Backup is duplication of data for restoring purpose at a later time. CBSE 2014
Answer: True Backup is a process to copy the data and restore it, whenever required.
Q14. SET is a protocol developed by Visa and Mastercard.
Answer: True SET is a protocol developed by Visa and Mastercard. It ensures secure transactions over the Internet.