1.
Write a brief note on the following providing an example for each:
a. Virus
A virus is a malicious program that attaches itself to a legitimate file or program and spreads
when the infected file is executed. It can corrupt, delete, or steal data.
Example : The ILOVEYOU virus spread via email in 2000, causing billions of dollars in damage
by overwriting files.
b. Worm
A worm is a self-replicating malware that spreads across networks without human
intervention, often exploiting vulnerabilities.
Example : The WannaCry worm in 2017 encrypted files on infected systems and demanded
ransom.
c. Trojan Horse
A Trojan Horse disguises itself as legitimate software but performs malicious activities once
installed, such as stealing data or creating backdoors.
Example : The Zeus Trojan stole banking information by logging keystrokes.
2. Differentiate between Spyware and Adware:
- Spyware : Secretly monitors user activity, collects sensitive data, and sends it to third
parties without consent.
- Adware : Displays unwanted advertisements, often bundled with free software, but does
not necessarily steal data.
3. Specify any 2 damages caused by Spamming:
1. Wastes Resources : Spam emails consume bandwidth and storage space, slowing down
systems.
2. Phishing Risks : Spam often contains phishing links that can lead to identity theft or
financial loss.
4. What is the difference between Phishing and Pharming? What is the common solution
to both?
- Phishing : Fraudulent attempts to steal sensitive information by pretending to be a
trustworthy entity via email or messages.
- Pharming : Redirects users to fake websites by manipulating DNS settings or exploiting
vulnerabilities.0020
- Common Solution : Use anti-phishing tools, enable two-factor authentication, and verify
website URLs.
5. Does Eavesdropping affect normal operation of transmission and communication
(Yes/No)? Explain its effect:
Yes . Eavesdropping intercepts and monitors communication, compromising confidentiality
and integrity. It can lead to data theft, privacy breaches, and unauthorized access.
6. Mention any 4 solutions to avoid Virus, Adware, and Spyware:
1. Install and update antivirus software.
2. Avoid downloading files from untrusted sources.
3. Use a firewall to block unauthorized access.
4. Regularly update operating systems and software.
7. What is the purpose of a Firewall? Briefly explain its types:
- Purpose : A firewall monitors and controls incoming and outgoing network traffic based on
security rules, acting as a barrier between trusted and untrusted networks.
- Types :
1. Packet-Filtering Firewall : Filters traffic based on IP addresses, ports, and protocols.
2. Stateful Inspection Firewall : Tracks active connections and makes decisions based on
context.
3. Proxy Firewall : Acts as an intermediary between users and the internet, filtering traffic at
the application layer.
8. Questions on Situations/Instances/Damages to identify Malware/Solution/Procedure:
- Example: If a computer slows down and displays pop-ups, it may be infected with Adware .
The solution is to run an anti-malware scan and remove the detected threats.
1. What do you understand by IPR?
IPR (Intellectual Property Rights) refers to legal rights protecting creations of the mind, such
as inventions, literary works, and designs, ensuring creators benefit from their work.
2. Give 3 differences between:
a. Copyright and Trademark :
1. Copyright protects original works like books, music, and software, while Trademark
protects brand names, logos, and slogans.
2. Copyright is automatic upon creation, while trademarks require registration.
3. Copyright lasts for the creator's lifetime plus 70 years, while trademarks can be renewed
indefinitely.
b. Copyright and Patent :
1. Copyright protects creative works, while Patent protects inventions and processes.
2. Copyright is automatic, while patents require a detailed application process.
3. Copyright lasts longer than patents, which typically expire after 20 years.
3. Give 3 example situations that will be considered as "Plagiarism":
1. Copying and pasting text from a website without citation.
2. Submitting someone else’s essay as your own.
3. Using copyrighted images without permission or attribution.
4. Write a short note on Digital assets and how would you protect them:
Digital assets include any content or data stored digitally, such as photos, videos,
documents, and cryptocurrencies. To protect them:
- Use strong passwords and two-factor authentication.
- Regularly back up data.
- Encrypt sensitive files.
5. Give 2 examples of Copyright infringement:
1. Downloading and sharing pirated movies or music.
2. Using copyrighted software without a valid license.
6. Briefly explain the following terms:
a. Open Source Software (OSS) : Software with source code freely available for modification
and distribution.
b. Creative Commons Licenses (CC) : Licenses allowing creators to specify how others can
use their work.
c. General Public License (GPL) : A license ensuring software remains free and open-source.
7. Differentiate between:
a. CC and GPL : CC is for creative works, while GPL is for software.
b. Apache and CC : Apache License is for software, while CC is for creative content.
c. GPL and Apache : GPL requires derivative works to be open-source, while Apache allows
proprietary use.
8. What are E-wastes? What should you be careful about while discarding them?
E-wastes are discarded electronic devices like phones, computers, and TVs. Be cautious
about:
- Data security: Wipe all personal data.
- Environmental impact: Recycle through certified e-waste facilities.
9. Discuss any 2 E-waste disposal methods:
1. Recycling : Sending e-waste to certified recycling centers to recover valuable materials.
2. Donation : Giving functional devices to schools or nonprofits.
10. "There are far fewer girls than boys who take up Computer Science" - recent study.
Specify 2 reasons why this is the case:
1. Stereotypes : Societal norms often discourage girls from pursuing STEM fields.
2. Lack of Role Models : Fewer visible female role models in tech.
11. What are we lacking for specially abled students to learn computers?
- Accessible hardware and software.
- Training for teachers to support diverse learning needs.
12. Name any 2 software features/voice assistants that visually impaired students can use:
1. Screen Readers : Software like JAWS or NVDA that reads text aloud.
2. Voice Assistants : Tools like Siri or Google Assistant for hands-free navigation.