Loading...
Please wait while we prepare your content
Please wait while we prepare your content
Solutions for Computer Applications, Class 9, CBSE
While working, Mrs Sharma's system stopped functioning suddenly. After her system got repaired, she tried to log in to her e-mail account but could not do so. There was an error of incorrect user name or password.
a. What might be the reason for this?
b. How do you think her password might be altered, if at all?
c. What precautions she should have taken to protect her login details?
a. The reason might be that Mrs Sharma's email account got hacked and the hacker changed her password locking her out of her email account.
b. Mrs. Sharma may have used the web browser's auto-login feature, which saves her username and password for automatic website login. While her system was undergoing repairs, an unauthorized individual could have gained access and altered her password.
c. Mrs. Sharma should have taken the following precautions to protect her login details:
Nimmi is planning to spend her vacations abroad and surfed the internet to get details about some of the places. Now she keeps getting e-mails from various unknown sources regarding travel, tourism, hotel booking, etc. What could have been the reason for this and how can she prevent it?
The reason Nimmi is receiving these emails is likely due to sharing of e-mail id. Nimmi must have shared her mail id with websites while surfing the internet to get details about various locations for vacation. She might have unknowingly subscribed for newsletters as well.
To prevent receiving such unsolicited emails, Nimmi can take the following steps:
Aakriti copied a game from her friend's system into her laptop. But after she executed this game, some of the data from her laptop was lost. What kind of malware do you think it is and what precautions should be taken to work with it?
The malware that infected Aakriti's laptop is a Trojan Horse. At first glance, the Trojan Horse seems to be useful but once it is activated, it harms the system by deleting files or by modifying useful information.
Aakriti can take the following precautions to safeguard her system from malware:
............... is the process of stealing confidential, personal information, and financial information.
Cyber theft is the process of stealing confidential, personal information, and financial information.
VPN stands for ............... .
VPN stands for Virtual Private Network.
The two common cyber crimes are ............... and ............... .
The two common cyber crimes are Cyber stalking and Cyber bullying.
............... is temporary in nature.
Session cookie is temporary in nature.
............... are permanently stored on your system.
Super cookies are permanently stored on your system.
To prevent tracking of browsing history, we can use ..............., ............... or ............... .
To prevent tracking of browsing history, we can use Proxy server, Incognito browsing or VPN.
A ............... is a dedicated computer or a software system which acts as an intermediary between an end point device, such as a computer, and another server.
A Proxy server is a dedicated computer or a software system which acts as an intermediary between an end point device, such as a computer, and another server.
A VPN allows you to hide your true identity by ............... the data and web traffic.
A VPN allows you to hide your true identity by encrypting the data and web traffic.
Turning your ............... settings to "off" can keep your family's where-about more private.
Turning your GPS location settings to "off" can keep your family's where-about more private.
............... and ............... can serve in cutting your data charges and are helpful in completing work efficiently.
Open Wi-Fi and Hotspot can serve in cutting your data charges and are helpful in completing work efficiently.
A ............... is just like a key to your personal information.
A password is just like a key to your personal information.
A password should be minimum ............... characters long.
A password should be minimum eight characters long.
The strength of a password is determined by length, complexity and ............... .
The strength of a password is determined by length, complexity and unpredictability.
............... is a technique similar to the Dictionary attack but with a little difference that it detects the password using algorithm.
Brute force attack is a technique similar to the Dictionary attack but with a little difference that it detects the password using algorithm.
The term ............... describes a person actively involved in online communities or the Internet in general.
The term Netizen describes a person actively involved in online communities or the Internet in general.
In Windows operating system, the ............... keeps track of a system's hardware and software.
In Windows operating system, the registry keeps track of a system's hardware and software.
What do you mean by online identity? List some threats to your online identity.
Online identity is a social identity that an internet user establishes in online communities and websites.
Some threats to our online identity are as follows:
How can you safeguard your confidential information from getting hacked?
We can use the following measures to safeguard our confidential information from getting hacked:
https:\\
. The letter 's' specifies that it is a safe site to be browsed.What is the relevance of private browsing? Explain with the help of an example.
Private browsing is a means by which we can safeguard our identity and browsing details when online. By enabling incognito browsing mode in our web browsers, we can prevent:
For example, when we search for flights tickets or hotel rooms online, tracking cookies are generated through which websites remember our travel plans. If we don't do the booking in that browsing session, it can lead to higher prices when we return. In incognito mode, prices typically stay the same because the site can't track our previous visits.
Mention any two ways by which websites can track you.
Two ways by which websites can track us are as follows:
Explain the term malware and its types. What precautions should be taken to prevent the entry of malware?
Malware is a malicious program that enters into a computer and damages it without the user's knowledge. It not only interrupts the normal working of a computer, but also steals important information of a user.
The different types of malware are:
Some precautions that should be taken to prevent the entry of malware are:
Explain any four types of Cybercrimes.
Four types of Cyber crimes are:
What is confidentiality of information? Mention any three practices to protect your confidential information.
Confidentiality of information means that only authorized users can access the personal and sensitive information of any person like their bank details, credit card numbers, aadhaar number, etc.
Three practices to protect our confidential information are as follows:
Write a note on User Agent.
User agent refers to the software program such as our browser or a session initiating application. When we initiate a web session, these applications pass our information such as application type, operating system used, software source, version, etc. This information can be tracked and stored by web servers to determine the user's web activities and behaviour.
Write down the steps to protect your password from being hacked.
We should follow the following steps to protect our password from being hacked:
Write down the ways to report a cyber-crime.
In case of any cyber crime, the matter should immediately be reported to either parents or school authorities.
http://www.cybercrimehelpline.com/
................ is a social identity that a user establishes during online communities and websites.
Internet identity
Reason — Internet identity is a social identity that a user establishes during online communities and websites.
............... is a technique used to fetch personal details of a user from his discarded documents.
Dumpster Diving
Reason — Dumpster Diving is a technique used to fetch personal details of a user from his discarded documents.
Name the tool which is used for tracking and reporting the traffic received on a particular website.
Google Analytics
Reason — Google Analytics is used for tracking and reporting the traffic received on a particular website.
Which key combination launches the private mode in Firefox?
Ctrl + Shift + P
Reason — Ctrl + Shift + P key combination launches the private mode in Firefox.
............... is a technique used to gather web pages across the web and feed them into search engines for web indexing.
Spidering
Reason — Spidering is a technique used to gather web pages across the web and feed them into search engines for web indexing.
............... is a software which keeps a track of all your activities and sends your confidential information to hacker.
Spyware
Reason — Spyware is a software which keeps a track of all your activities and sends your confidential information to hacker.
............... involves an attack coupled with a demand for money to stop further attacks.
Cyber extortion
Reason — Cyber extortion involves an attack coupled with a demand for money to stop further attacks.
Which one of the following is not a password cracking technique?
User Agent
Reason — User agent refers to the software program, such as our browser or a session initiating application. It is not a password cracking technique.
In which year Cyber law was introduced?
2000
Reason — With the increase in number of crimes related to the Internet, urgent need was felt to introduce an act of law against such crimes. With this view in mind, the Indian Government introduced Information Technology Act 2000 on October 17, 2000.
Mention the cyber crime in which the attacker harasses a victim by using the electronic communication.
Cyber stalking
Reason — Cyber stalking is a cyber crime in which the attacker harasses a victim by using the electronic communication.
Which software is designed to capture keystrokes without being identified by the user or security program?
Keyloggers
Reason — Keyloggers software is designed to capture keystrokes without being identified by the user or security program.
Name the malware program that send unwanted advertisements to the user's computer which may disrupt user's working.
Adware
Reason — Adware is a malware program that sends unwanted advertisements to the user's computer which may disrupt user's working.
Which program can create multiple copies of itself and can consume large portion of system memory?
Worm
Reason — Worm can create multiple copies of itself and can consume large portion of system memory.
Which type of cookies, websites store to get details of a user's search history and the web browsing history?
Third party cookie
Reason — Third party cookies are stored by websites to get details of a user's search history and the web browsing history.
When we enter the password, which text box displays password strength?
Strength text field
Reason — When we enter the password, the Strength Text field box displays password strength.
Which program sends message to the user system that the system is locked and the user will not be able to work on it until one pays a certain amount.
Ransomware
Reason — A Ransomware program sends message to the user system that the system is locked and the user will not be able to work on it until one pays a certain amount.
Name the software that helps the other malware to enter in your system and harm it.
Backdoors
Reason — Backdoors help the other malware to enter in our system and harm it.
Which of the following are the types of malicious software?
Viruses, worms, trojans
Reason — Malware is a malicious program that enters into a computer and damages it without the user's knowledge. These softwares include viruses, worms and trojans.
Which one of the following is not the best practice to protect the confidential information?
Slowing down the network speed
Reason — Slowing down the network speed is not the best practice to protect the confidential information.
How can you prevent the entry of virus into your system?
We can prevent the entry of virus into our system by following the given safety measures:
How are the first party cookies different from third party cookies?
First party cookies are generally used to store our login id, password, autofill information etc. for the frequently visited websites.
Third party cookies are the cookies that websites store to get details of our search history and web browsing history. These are most often used by advertising companies to track us across multiple websites that we visit.
What do you mean by Cybercrime?
Cybercrime refers to any online illegal activity facilitated by the use of electronic communication devices like mobile phones, computers or through networks like the Internet. For example, cyberstalking, cyberbullying, cyberespionage, cyberwarfare, etc.
What precautions should be taken to safeguard one's online identity?
Some of the precautions that one should take to safeguard their online identity are:
How does a proxy server work to protect your data?
A proxy server is a dedicated computer or a software system that runs on a computer and acts as an intermediary between an endpoint device, such as a computer and another server from which a user or client is requesting a service. So, the tracking website will get the information on the proxy server and we can still browse the site without disclosing our IP address or location.
What do you mean by Cyber terrorism?
Cyber terrorism is the act of conducting terrorism through the use of computers and the internet in order to cause fear and panic. Cyber terrorism involves large scale disruption of computers, telecommunication networks, or information system so as to compel the government or its people to fulfill some social, religious, or political objectives. Attacks on military installations, power plants, air traffic control, banks, etc. are some examples of cyberterrorism.
How firewall can safeguard your data on the network?
A firewall is a security system that regulates network traffic based on set rules, using hardware, software, or a combination. It safeguards our computer system and data from any unauthorized external source. It blocks all unauthorised users and doesn't allow them to gain access to our data.
What is Phishing?
Phishing is the act of illegally acquiring personal and sensitive information such as, online banking details, credit card details, and other login details, of an individual by sending malicious e-mails or by creating web pages that can collect this information as they appear to come from very famous organizations.
How can you check that the website you are visiting is open in secure mode?
The URL of a secure website begins with "https" rather than "http". Also, the Internet browsers display a padlock icon in address bar to indicate that the website is secure. These checks help ensure that the website is opened in secure mode.