Loading...
Please wait while we prepare your content
Please wait while we prepare your content
Solutions for Computer Applications, Class 10, CBSE
Successful security solutions require a convergence of three components. Name these components.
The components are:
What are the most common forms of identification and authentication.
Identification → Username
Authentication → Password
Name the process of transforming data into an unreadable code.
Encryption
Name the term for any digital information related to you or created by you, which may be stored online?
Digital property
Which type of licences offer users the right to run, study, share, modify, and distribute copies and modified versions of the software with the condition that the same rights be preserved for its derivatives?
Copyleft licences
What is the other name for literary theft?
Plagiarism
Name the term used for the right to seek, receive, and impart information and ideas, through any media.
Freedom of expression
Which type of software has no ownership or copyright associated with it?
Public-domain software
Give the full form of BSD licences.
Berkeley Software Distribution
When the user does not really understand how to properly paraphrase, quote, and cite the research, which type of plagiarism is he committing?
Accidental Plagiarism
Asmita belongs to an affluent family, and she wants to do something to bridge the digital divide in her community. What can she do at an individual level to bring this change?
Asmita can take the following steps at an individual level to bridge the digital divide in her community:
Abhay is going to make his first Online purchase. How should his parents guide to make him aware of the common e-commerce frauds? List the steps to prevent him from becoming a victim.
Abhay's parents should make him aware of the common e-commerce frauds by educating him about the various kinds of e-commerce frauds which are as follows:
Abhay can take the following steps to prevent him from becoming a victim of e-commerce fraud:
............... is a system of moral principles that differentiates between good and bad practices.
Ethics is a system of moral principles that differentiates between good and bad practices.
............... to practice ethical code of conduct constitutes fraud.
Failure to practice ethical code of conduct constitutes fraud.
............... is a technique used to retrieve personal information of a user from his discarded documents.
DumpsterDiving is a technique used to retrieve personal information of a user from his discarded documents.
............... is stealing confidential, personal, and financial information from a computer or a mobile phone and misusing it to harm the user.
Cyber theft is stealing confidential, personal, and financial information from a computer or a mobile phone and misusing it to harm the user.
............... is obtaining personal information through direct observation by looking over a person's shoulder.
Shoulder Surfing is obtaining personal information through direct observation by looking over a person's shoulder.
HTTPS Protocol encrypts the information or data using a ............... certificate.
HTTPS Protocol encrypts the information or data using a Transport Layer Security (TLS) certificate.
............... software are computer programs which identify, prevent, and remove viruses from our computer.
Antivirus software are computer programs which identify, prevent, and remove viruses from our computer.
Encrypted data is referred to as ............... text.
Encrypted data is referred to as Cipher text.
When the same sentence structure is used with synonyms for the appropriate words of the sentence, it is called ............... plagiarism.
When the same sentence structure is used with synonyms for the appropriate words of the sentence, it is called Mosaic plagiarism.
The simplest way to prevent plagiarism is the ............... method.
The simplest way to prevent plagiarism is the Citation method.
Which of the following is not a form of software piracy?
Encrypting
Reason — Encryption is the process of transforming data into an unreadable code. It is not a form of software piracy. Softlifting, counterfeiting and hard disk loading are forms of software piracy.
............... is the process of transforming data into an unreadable code.
Encryption
Reason — Encryption is the process of transforming data into an unreadable code.
............... refers to flooding the user's inbox with unwanted advertisements and messages.
Spamming
Reason — Spamming refers to flooding the user's inbox with unwanted advertisements and messages.
The right which is concerned with the design and algorithm of the product rather than the entire product is called ............... .
Patent
Reason — The right which is concerned with the design and algorithm of the product rather than the entire product is called Patent.
E-commerce stands for ............... .
Electronic commerce
Reason — E-commerce stands for Electronic commerce.
When someone else uses your online identity to create fraudulent messages or commit crimes, it is known as ............... .
Identity theft
Reason — When someone else uses your online identity to create fraudulent messages or commit crimes, it is known as identity theft.
............... is defined as the right to control what happens with your personal information.
Privacy
Reason — Privacy is defined as the right to control what happens with your personal information.
............... licences are a family of permissive free software licences.
BSD
Reason — BSD (Berkeley Software Distribution) licences are a family of permissive free software licences.
............... software is a copyrighted software.
Proprietary
Reason — Proprietary software is a copyrighted software.
............... Rights refer to intellectual property rights given to persons over the digital property created by them.
Digital Property
Reason — Digital Property Rights refer to intellectual property rights given to persons over the digital property created by them.
Plagiarism may occur due to a lack of interest in one's work.
True
Reason — Lack of interest in one's work is a factor contributing to plagiarism.
Piracy is concerned with personal information.
False
Reason — Software Piracy refers to theft of software through illegal copying of genuine programs or counterfeiting and circulation of products which are duplicate copies of the original.
Patent for innovations is an Industrial property.
True
Reason — Industrial Property includes trademarks, patents for innovations, industrial design rights, and geographical indications (GI) of source.
We should never share our password and PIN number with unauthorised personnels.
True
Reason — We should never share our password and PIN number with unauthorised personnels as it may lead to crimes like identity theft.
Encryption is the process of transforming data into a readable code.
False
Reason — Encryption is the process of transforming data into an unreadable code.
The Internet offers us convenient ways to shop from our homes or offices for almost everything.
True
Reason — The Internet offers us online stores and websites to shop from our homes or offices for almost everything.
Good ethics means that the company provides the most reliable information about products or services.
True
Reason — Good ethics in business involve being honest, transparent, and providing reliable and accurate information to customers about products or services. This prioritizes integrity, trustworthiness, and customer well-being.
Doing business legally and ethically only benefits the customers and not the company.
False
Reason — Legal and ethical business practices create a win-win situation where both customers and the company benefit from a positive and sustainable business environment.
Renting means unauthorised sharing of software for temporary use for some nominal charges.
True
Reason — Renting means unauthorised sharing of software for temporary use for some nominal charges.
Apache licence version 2.0 is an open source software licence.
True
Reason — Apache licence version 2.0 is an open source software licence.
What is fraud? Cite any two reasons why online fraud has been increasing.
Failure to practice ethical code of conduct constitutes fraud. Fraud means purposefully misrepresenting facts to deceive another person for personal gains.
Online fraud has been increasing because of the following two reasons:
Enlist any three netiquettes to be followed when online.
Three netiquettes to be followed when we are online are as follows:
Define Plagiarism. Write any three steps to prevent plagiarism.
Plagiarism means using or imitating the language and thoughts of some other person and projecting that representation as to our original work.
Three steps to prevent plagiarism are:
Define Identity theft.
Identity theft refers to an act of stealing someone's personal information such as name, login details etc. and then posing as that person online. Malicious activities like fraudulent posts, rumour mongering, riots fueling, fraudulent financial transactions, etc. can be carried out through identity theft.
What is the difference between an Open Source and Free software?
Differences between Open Source software and Free software:
S. No. | Open Source Software | Free Software |
---|---|---|
1. | Open source software refers to software whose source code is made available to the public, allowing anyone to view, use, modify, and distribute the code. | Free software refers to software that respects users' freedoms. |
2. | Open source emphasizes the practical benefits of transparency, collaboration, and the ability to modify and distribute software freely. | Free software emphasizes the philosophical and ethical aspects of software freedom focusing on users' rights to control and modify the software they use. |
3. | Open source software can be released under various licenses, some of which are more permissive like BSD, MIT, Apache 2. | Free software adheres to specific licenses like the GNU General Public License (GPL) that ensures users' freedoms. |
Explain the philosophy of Open Source. Enlist any four criteria that qualifies a program to be Open source software.
Open source is a philosophy that promotes the free access and distribution of an end product, usually software or a program. It may extend to the implementation and design of other products. Such software, generally, gives users the freedom to run the software for any purpose, to use and modify the software, and to redistribute copies of the original and modified versions to others. These permissions are enforced through an open source licence.
Four criteria that qualify a program to be Open source software are:
What do you mean by Digital Property Rights?
Digital Property Rights refer to intellectual property rights given to persons over the digital property created by them. They usually give the creator an exclusive right over the use of his/her creation for a specific period.
Mention any three ways to bridge the digital divide.
Three ways to bridge the digital divide are:
What is Proprietary software? Mention three features of proprietary software.
Proprietary software is a copyrighted software. This software may not be freely used, modified, distributed, and is restricted by conditions predefined by its publisher, vendor, or developer.
Three features of Proprietary Software are:
What do you mean by copyleft licences?
Copyleft licences offer users the right to run, study, share, modify, and distribute copies and modified versions of the software with the condition that the same rights be preserved for its derivatives. Copyleft licences require that the source code must be made available to the recipients. For example, GNU General Public License (GNU GPL), Eclipse Public Licence (EPL), Common Development and Distribution Licence (CDDL) etc.