Loading...
Please wait while we prepare your content
Please wait while we prepare your content
Solutions for Computer Science, Class 11, CBSE
Assertion (A): Viruses are malicious programs.
Reasoning (R): Malicious programs are specifically designed to delete, block, modify or copy data in order to disrupt the performance of computers.
Both A and R are true and R is the correct explanation of A.
Explanation
Viruses are malicious programs designed to harm computer systems. A malicious program is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
Assertion (A): An internet troll is a person who deliberately sows discord on the internet by starting quarrels or upsetting people.
Reasoning (R): We can download and use any material available on the internet.
A is true but R is false.
Explanation
A cyber troll is a person who starts quarrels or upsets people on the internet by posing inflammatory, digressive, extraneous or off-topic messages to an online community with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, either for the troll's amusement or for a specific gain. We cannot download and use any material available on the internet, due to copyright issues and legal restrictions.
Assertion (A): Social media are websites or applications that enable users to participate in social networking but they cannot create and share content with others in the community.
Reasoning (R): We should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us.
A is false but R is true.
Explanation
Social media refers to web and mobile technologies and practices that enable users to participate in social networking and share content, opinions, experiences, and perspectives online. We should avoid wasting precious time responding to unnecessary emails or comments unless they are relevant to us.
Assertion (A): Cyberstalkers collect all personal information of the victim.
Reasoning (R): Cyberstalkers post the email of the victim on numerous filthy, obscene or illegal websites.
Both A and R are true and R is the correct explanation of A.
Explanation
Cyberstalking is the use of the internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. Cyberstalkers gather personal information about their victims and post their email addresses on numerous filthy, obscene, or illegal websites to harass them.
Assertion (A): Harassing a person using modern technologies like the internet is called cyber bullying.
Reasoning (R): Cyberbullying is not a cybercrime.
A is true but R is false.
Explanation
Cyberbullying is an attack on an individual or a group through the use of electronic means such as instant messaging, social media, email, and other forms of online communication with the intent to abuse, intimidate, or overpower. Cyberbullying is considered a cybercrime.
Assertion (A): IT Act 2000 provides legal recognition to electronic commerce.
Reasoning (R): IT (Amendment) Act 2008 provides additional focus on information security.
Both A and R are true and R is the correct explanation of A.
Explanation
The Information Technology Act, 2000 is the primary law in India dealing with cybercrime and electronic commerce. A major amendment was made to the IT Act in 2008. It introduced section 69, which gave authorities the power of "interception or monitoring or decryption of any information through any computer resource".
Assertion (A): Cyber law is a generic term which refers to all the legal and regulatory aspects of the internet and the World Wide Web.
Reasoning (R): Cyber law covers all aspects of transactions and activities on and concerning the internet, the World Wide Web and Cyberspace.
Both A and R are true and R is the correct explanation of A.
Explanation
Cyber law is a broad term that encompasses all legal and regulatory aspects related to the internet and the World Wide Web. It includes various rules and regulations governing online activities, transactions, and interactions.
Identity theft
Reason — Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits.
Cookies
Reason — Cookies are small text files, bits of information, left on our computer by websites we have visited which let them 'remember' things about us.
Confidentiality
Reason — Confidentiality of information ensures that only authorized users get access to sensitive and protected data.
Cybercrime
Reason — Any criminal act that is facilitated by the use of electronic gadgets such as computer, smartphones, laptop etc, involving communications or information systems through internet, is referred to as cybercrime.
Ignorance
Reason — Ignorance refers to a lack of knowledge or awareness and does not pose an external threat to a computer or network. External threats, such as Trojan horses, adware, and crackers, involve malicious actions that harm a system.
Stalking
Reason — Stalking involves repeatedly harassing or threatening behaviour, such as following, calling, or sending unwanted messages to a person.
Information Technology (IT) Act, 2000
Reason — The name of the IT law in the Indian legislature is the Information Technology Act, 2000 (IT Act 2000).
Cyber troller
Reason — A cyber troll is a person who starts quarrels or upsets people on the internet by posing inflammatory, digressive, extraneous or off-topic messages to an online community with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, either for the troll's amusement or for a specific gain.
Digital footprints
Reason — Digital Footprints are the records and traces of individual's activities as they use the Internet.
Both (1) and (2)
Reason — Cybercrime involves using a computer both as a tool to commit illegal activities, such as hacking or fraud, and as a target, where the computer or network itself is attacked, for example, through viruses or denial-of-service attacks.
Yes, we should use an incognito window while surfing the internet. It helps protect the confidentiality of information by not saving cookies and browsing history, which reduces the risk of identity theft and keeps our personal data safe.
(a) True
Reason — When we share our IP address on the network with other devices, a website can determine our geographical location.
(b) True
Reason — Cookies are small text files on our computer storing small pieces of information related to our online habits/text.
(c) False
Reason — Using strong internet passwords is essential for maintaining cyber safety as they help protect accounts from unauthorized access.
We can safely browse the internet by following the tips given below:
(a) Before we start browsing the web, make sure to protect ourself by keeping our operating system, web browser, security software, browser plug-ins, and other applications up-to-date.
(b) We can adjust settings in our web browser to work in a more or less secure way. Most web browsers will give us warnings when they detect that we are visiting a malicious website or possibly being exposed to malicious content.
(c) We should use strong, unique passwords online, download files and applications only from trusted websites, and pause to think before clicking on links in emails, messages, or on social networking sites.
(d) While making purchases online check if the site is reputed and has a refund policy.
(e) We should regularly clear cookies from our computer, as they collect information about our activity on websites.
(f) If there are sites we visit regularly, it is a good idea to bookmark them in our browser.
We can safely browse the internet by following the tips given below:
(a) Before we start browsing the web, make sure to protect ourself by keeping our operating system, web browser, security software, browser plug-ins, and other applications up-to-date.
(b) We can adjust settings in our web browser to work in a more or less secure way. Most web browsers will give us warnings when they detect that we are visiting a malicious website or possibly being exposed to malicious content.
(c) We should use strong, unique passwords online, download files and applications only from trusted websites, and pause to think before clicking on links in emails, messages, or on social networking sites.
(d) While making purchases online check if the site is reputed and has a refund policy.
(e) We should regularly clear cookies from our computer, as they collect information about our activity on websites.
(f) If there are sites we visit regularly, it is a good idea to bookmark then in our browser.
The tips for cyber safety are as follows:
(a) Before we start browsing the web, make sure to protect ourself by keeping our operating system, web browser, security software, browser plug-ins, and other applications up-to-date.
(b) We can adjust settings in our web browser to work in a more or less secure way. Most web browsers will give us warnings when they detect that we are visiting a malicious website or possibly being exposed to malicious content.
(c) We should use strong, unique passwords online, download files and applications only from trusted websites, and pause to think before clicking on links in emails, messages, or on social networking sites.
(d) While making purchases online check if the site is reputed and has a refund policy.
(e) We should regularly clear cookies from our computer, as they collect information about our activity on websites.
(f) If there are sites we visit regularly, it is a good idea to bookmark them in our browser.
If cyber safety is overlooked, several dangers can arise, including:
The different types of information used by websites to track us online are as follows:
(a) Robin is experiencing targeted ads due to adware, which collects information about his online activities. Since he searched for wrist watches and sports items, the adware uses this data to display related advertisements.
(b) To avoid this, Robin should use ad blockers, browse in private mode, and be cautious about installing software from untrusted sources.
(c) To get rid of the adware, he should run anti-adware scans using reputable tools, uninstall any suspicious programs, reset his browser settings, and ensure his security software is up-to-date. These steps will help remove the adware and prevent further unwanted advertisements.
Gender discrimination refers to the unfair or unequal treatment of individuals based on their gender.
In the classroom, gender discrimination can significantly hamper the teaching and learning process in several ways:
Viruses are programs that copy themselves throughout a computer or network. Viruses can only be activated when a user opens the program. At their worst, viruses can corrupt or delete data, use the user's email to spread, or erase everything on the hard disk. If not checked, a virus can damage the system or specific files which are important for the functioning of an operating system. It may also slow down our computer as a result of replication of virus in the background without being visible on the screen.
Malware that collects information about the usage of the infected computer and communicates it back to the attacker is known as Spyware.
Adware refers to a type of malware that displays unwanted advertisements on our computer or device.
Spyware | Adware |
---|---|
Malware that collects information about the usage of the infected computer and communicates it back to the attacker is known as Spyware. | Adware refers to a type of malware that displays unwanted advertisements on our computer or device. |
It finds its way into PCs by "piggybacking" onto a file, or gets downloaded from the internet when we visit a particular website. | Adware is commonly activated unknowingly when users are trying to install legitimate applications that adware is bundled with. |
Worm | Trojan horse |
---|---|
Worms are self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks. | Malware disguised in what appears to be legitimate software are known as Trojan horse. |
It can replicate itself and spread automatically. | Trojans do not replicate or reproduce through infection, instead, it performs whatever actions it has been programmed to carry out. |
Malware (Malicious Software) is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants. It includes various forms of malicious software, such as viruses, spyware, trojans and worms.
Worms are a type of malware that are self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.
We need a secure connection while doing net banking to protect sensitive financial information and prevent unauthorized access. Secure connections, indicated by "HTTPS" in the URL and a padlock icon in the browser, encrypt data transmitted between the user’s device and the bank’s server.
Yes, WhatsApp is considered secure due to its use of end-to-end encryption, which ensures that messages, calls, photos, and videos are encrypted and can only be read by the intended recipient, using special keys to decrypt the content.
The URL of a secure website begins with "https" rather than "http". Also, the Internet browsers display a padlock icon in address bar to indicate that the website is secure. These checks help ensure that the website is opened in secure mode.
HTTP | HTTPS |
---|---|
The full form of HTTP is Hypertext Transfer Protocol. | The full form of HTTPS is Hypertext Transfer Protocol Secure. |
HTTP is the set of rules for transferring hypertext on world wide web (WWW). | HTTPS is a secure version of the HTTP protocol that uses the SSL/TLS protocol for encryption and authentication. |
HTTP sends data in plain text. | HTTPS sends the data in encrypted form to make the transmission secure. |
URLs using HTTP start with "http://". | URLs using HTTPS start with "https://". |
Two websites which use https are:
Confidentiality of information can be maintained by observing the following practices:
In India, cyber laws are enforced through the Information Technology Act, 2000, which was notified on October 17, 2000. It is the primary legislation in India dealing with cybercrime and electronic commerce. The IT Act is a key legal framework that provides support to computer users against cybercrime.
Cybercrime impacts our daily lives by causing financial losses, invading our privacy, and disrupting online services. It can lead to stress and damage to personal and professional reputations. Overall, it undermines trust in digital systems and creates extra costs for dealing with the aftermath.
Two effective methods for preventing and protecting against cybercrime are:
Observe safe online behavior:
Online transaction handling: While making purchases online,
The steps to be taken to protect oneself from online fraud are as follows:
Four steps to combat cybercrime are as follows:
Social networking sites play a role in cybercrime in several ways. Since many people use them, some believe they can post anything without facing consequences by using fake email IDs or hiding their identity. This allows them to share false information, spread rumours, or make harmful comments, leading to arguments, harassment, and even causing communal tension. This kind of behaviour not only disturbs social harmony but also encourages cybercrimes like fraud and identity theft.
True
Reason — Digital Footprints are the records and traces of individual's activities as they use the Internet. Digital Footprints are permanently stored and can include data such as social media posts, online searches, and interactions with websites.
True
Reason — A cyber troll is a person who starts quarrels or upsets people on the internet by posting inflammatory, digressive, extraneous or off-topic messages to an online community with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, either for the troll's amusement or for a specific gain.
True
Reason — To avoid tracking by website, we should browse internet privately. This is because websites can collect and track our online data, including browsing history, search queries, and personal information, through various means such as cookies etc.
False
Reason — Cyberbullying is an attack on an individual or group through the use of electronic means such as instant messaging, social media, email, and other forms of online communication, with the intent to abuse, intimidate, or overpower. A barrage of online messages and emails, on the other hand, refers to spamming.