0% found this document useful (0 votes)
46 views3 pages

Unit 4 Data and Privacy

The document discusses various topics related to data privacy and computer security including encryption methods, software piracy, and ethical issues. It provides definitions and explanations of terms like confidentiality, integrity, availability, encryption, hacking, and different types of ciphers. The document is a study guide containing questions and answers on these topics.

Uploaded by

JAMIA QASIM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views3 pages

Unit 4 Data and Privacy

The document discusses various topics related to data privacy and computer security including encryption methods, software piracy, and ethical issues. It provides definitions and explanations of terms like confidentiality, integrity, availability, encryption, hacking, and different types of ciphers. The document is a study guide containing questions and answers on these topics.

Uploaded by

JAMIA QASIM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Unit No.

4 Data and Privacy Computer Science 9th

Q.1. What is meant by Privacy of Data or Q.15. What is meant by Patent?


Information? Ans: A patent is a way of protecting an idea. It gives you
Ans: Protecting data from malicious users is called data or the rights to prevent others from inventing and selling
information privacy. something based on that idea.
Q.2. What are the Ethical Data Security Issues? Q.16. What is meant by copyright law?
Ans: Data security issues include Confidentiality and Ans: Copyright is different from patent. According to
Privacy, Fraud & Misuse, Patents, Copyrights, Trade copyright law, no idea or thing can be copied. Copyright
Secrets, Sabotage, etc. is reserved for copying. Usually when something is
Q.3. What is Confidentiality and Privacy? protected under copyright law we put a copyright mark on
Ans: Keeping other people's data (credit card details, it.
polls, arrests and medical records) safe in a computer is Q.17. What is meant by trade
called privacy and confidentiality which has become secret piracy?
difficult in now a day. If the data goes into the wrong Ans: Trade secrets are secrets that are
hands it can be harmful for the related person. valuable, beneficial to a company and
Q.4. What is meant by Piracy? play a significant role in its success.
Ans: Piracy means making illegal copies of any work Keeping trade secrets in computer
(books, poetry, software, movies, paintings, house maps) science field is very important.
that the creator forbade. Q.18. What is meant by Sabotage?
Q.5. What is meant by Open Source Software? Ans: Sabotage is a serious attack on a computer system.
Ans: Open source software has no copyright protections. Some harmful users can attack the system from a distance.
So we can copy the source code. We can edit it and sell it. Someone can send a virus through free software.
Q.6. What is the key to SOFTWARE? Q.19. What is a virus?
Ans: Some software companies sell the software with Ans: A malicious program (written with negative
encrypted text, which is called the key of the software, intention) that can alter or destroy information present in a
which is given only to those who buy the software. computer.
Q.7. Describe the types of Software Piracy. Q.20. What is meant by Confidentiality?
Ans: Types include Ans: Confidentiality means we want to keep our data
softlifting, client server secret. We do not want anyone to be able to access this
overuse, Hard disk data without our consent.
loading, Counterfeiting, Q.21. What is Integrity?
and online piracy. Ans: We want to keep the data accurate. For example, we
don't want our bank's website to show our bank balance
Q.8. What is meant by
less than the amount in the account.
Softlifting?
Ans: Taking a copy of Q.22. What is meant by Availability?
application software from Ans: This means that we can access our data whenever we
someone else and installing it is called softlifting. want because in some cases data become useless if it is
not available when required.
Q.9. What is meant by Client & Server Overuse?
Ans: Installing more copies of the software than you have Q.23. What is meant by computing?
licenses for. Ans: Processing any kind of information through
computer is called computing.
Q.10. What is meant by Hard Disk Loading?
Ans: Installing and selling copies of unauthorized Q.24. What is meant by cookies?
software on refurnished or new computers. Ans: When we use the Internet, our interests, passwords,
etc. are stored in a computer. These are called cookies.
Q.11. What is meant by Counterfeiting?
Ans: Duplicating and selling copy of software without Some companies use cookies to collect, buy, sell and
copyright is called Counterfeiting or forgery. market information.
Q.12. What is meant by Online Piracy? Q.25. What is Encryption?
Ans: Online piracy usually involves downloading illegal Ans: The process of encoding valuable data into
software. Software companies are fighting against unreadable format is called encryption. Its helps us to
software piracy. Courts are making laws to protect protect our data from hackers.
software.
Q.13. What is meant by Fraud & Misuse?
Ans: Illegal use of computers and the Internet to steal
money, services and valuable data information is called
fraud and misuse.
Q.14. What is Phishing?
Ans: Sometimes malicious users try to get your
confidential information by showing you their friend. This
is called phishing.

Abdul Rehman S.S.T(I.T)


Govt. Jamia Qasim-Ul-Uloom H/S Sargodha 1
Unit No. 4 Data and Privacy Computer Science 9th

Q.26. Explain the difference between cipher text and letter Z in the row. Look at the letter where the two have a
plain text? common position. Chose the letter of common location.
Ans: Plain Text: The original message / text that need to
be encrypted is called plain text.
Cipher Text: When It is “I”. Similarly, searching for the remaining letters
plain text is
makes the word "OIXLSUAQ" the encryption of
encrypted, it
becomes cipher text. PAKISTAN.
Cipher text cannot Q.34. What is Interim Ciphertext?
be read without a Ans: In the Vigenere cipher method, if the number of
key. A key is like a characters in the key is less than the number of characters
password that is in the text, the characters in the key will be rewritten from
used to convert the beginning. This method is called Interim Cipher text.
cipher text to plain
text. Q.35. What is meant by Decrypt a Message?
Q.27. What does a hacker do? Ans: To decrypt the message, searches for the letters in
Ans: When data is sent from one place to another it can be the rows of the vigenere table, and then searches for the
stolen. This process is called hacking. A hacker is a letter of the hidden text in that row. For example, to
computer expert who can do this. decrypt OIXLSUAQ in terms of the word ZINDABAD,
Q.28. Describe the benefits or importance of find the letter O in the Z row of the letter. Look at the
encryption in everyday life?
column heading of the letter O which will be the letter P.
Ans:1 . Protection from hackers, 2. Encryption protects
the privacy of personal information, including sensitive Q.36. What is meant by random alternative Caesar
data, 3. Encryption protects the transfer of data across cipher?
different devices. Ans: Coding with Caesar Cipher is easy to decode. Instead
Q.29. What is a Substitution Cipher? Write the of converting an entire word into a secret message in the
names of the methods. same order, replacing each letter of the word with
Ans: Substitution encryption is a method of encryption in randomly different letters is called a random alternative
which the letters of the original text are replaced with
Caesar cipher.
other letters with the help of a fixed predefined system.
Q.30. Who invented Caesar cipher? Q.37. What is meant by Crypto Analysis? Which
Ans: Caesar was a Roman politician and military general word is used the most?
who played a key role in the rise of the Roman Empire. Ans: Cryptanalysis is the study of the frequency of letters
Caesar used an encryption method to send messages to his or groups in a cipher message. This method is used to
soldiers and generals that is called Caesar cipher. break the cipher. The most commonly used word is E.
Q.31. Describe the method of encryption in Caesar Q.38. Describe the defects of Substitution Cipher?
cipher?
Ans: In this method we replace each alphabet with another Ans: The cipher is an easy way because the cipher
letter when writing. The alphabetical order has some fixed alphabet is just a circular layout of the alphabet.
numbers to the left or right of the original alphabet. For Q.39. Describe the relationship between password
example, under this method, the 5 letters of the alphabet and cryptographic keys?
on the right will be replaced by the simple text Ans:
"UFPNXYFS" in Password Cryptographic Keys
PAKISTAN A password is used to Encryption uses keys to
encryption. access a system read the message
Q.32. What is Creating, reading and Key is used to process a
Vigenere remembering passwords is message by any software or
Cipher? a human process person.
Ans: It uses a table Q.40. Describe the characteristics of a good password.
which has 26 rows Ans: 1. It should contain at least eight characters, 2. It
should not contain complete letters, 3. It should be
and 26 columns. In
different from the previous password, 4. It should contain
this method we have uppercase, lowercase letters, numbers and symbols.
an alternate key, which is combined with a simple text to Q.41. What is meant by Cyber-Crime?
form a cipher text. Ans: A crime in which computer networks or devices are
used is called cyber-crime. For example: 1. Identity theft,
Q.33. Describe Vigenere cipher encryption method. 2. Transaction fraud, 3. Advance fee fraud, 4. Hacking.
Ans: Suppose we want to encrypt word “PAKISTAN”
through Key “ZINDABAD”. Look at the place of the
letter P in the column in the table and the place of the
Abdul Rehman S.S.T(I.T)
Govt. Jamia Qasim-Ul-Uloom H/S Sargodha 2
Unit No. 4 Data and Privacy Computer Science 9th

Q.42. What is Identity Theft?


Ans: The most common form of cybercrime is identity 1) Which of the following is a type of software piracy?
i softlifting ii responsibility
theft. Hackers use fake e-mail to obtain passwords and
iii client server overuse iv online piracy
account information.
Q.43. What is Transaction Fraud? 2) Which of the following is not a cyber-crime?
Ans: Transactional fraud occurs when stolen credit card or i hacking ii phishing crime
data is used for an illegal transaction. It also happens that iii identity theft iv declaration
the original cardholder buys something with his credit 3) Which of the following is not a characteristic of
card and claims a chargeback by reporting the card being phishing email?
stolen. official data breach email account updates
Q.44. What is meant by advance fee fraud? i ii
notification
Ans: Hackers congratulate you on winning a big prize and similar domain of the
ask you to pay a small amount so that a reward can be sent iii it reminder iv
actual website
to you. Those who make money easily fall into their trap. 4) Which of the following is not a characteristic of
Q.45. What is hacking? phishing websites?
Ans: Unauthorized access to other’s computer is called similar domain of the using of form to collect
hacking. i ii
actual website visitor
Q.46. What is Spyware? actual link from web
Ans: Software that is downloaded and used from the iii iv email account updates
content
Internet without knowing the details can sometimes 5) Which of the following is not a characteristic of
connect your system to another system without your good password?
knowledge and recorded your activities on that system. the eight-character does not contain
Such software is called spyware. i ii
length username
Q.47. What is the National Response Center? contain uppercase password contains only
Ans: A Pakistani cybercrime law enforcement agency iii iv
letter your name
known to fight cybercrime and subordinate to the FIA. Its
Fill in the blanks.
website is [Link]
1) Making illegal copies of software is called……...
Q.48. What is meant by phishing attack?
2) ……... is a general term for any type of information
Ans: Phishing is a fraudulent attempt to obtain sensitive
processing that can be represented mathematically.
information such as passwords and credit details via
3) ……... is the process of encrypting data.
email.
4) When the key has less no of character than the text to
Q.49. What are the features of phishing email?
encrypt, then repeating letters of the key is
Ans: Such e-mails usually contain a warning, instant
called……...
update, important notice or a trap message in an attractive
5) ……... a cyber-attack to makes machine or network
voice.
resource unusable for the user.
Q.50. What is meant by DOS attack?
Ans: DOS stands for Denial of Service. In computing, a
Give a short answer.
DOS attack is used to make a machine or network useless.
It is a type of cyber-crime. It means that your services stop 1) Explain the cypher text.
working. Ans: See Question No. 26
EXERCISE 2) Why do we need an installation key whereas a
Choose the correct option. software can be saved with a password?
Ans: Installation (Key) ensures that the software is
genuine, not pirated.
3) Define Denial of Service.
Ans: See Question No. 50
4) Give a reason to add Captcha on the website?
Ans: Captcha is a technology that identifies that the user
of the website is a real person, not a spammer or a robot.
5) What is a patent? Why do we need to register it?
Ans: See Question No. 15

Abdul Rehman S.S.T(I.T)


Govt. Jamia Qasim-Ul-Uloom H/S Sargodha 3

You might also like