Class 10 Exam  >  Class 10 Notes  >  Information & Computer Technology (Class 10) - Notes & Video  >  NCERT Solutions -Network Security, Information & Computer Technology Class 10

Network Security, Information & Computer Technology Class 10 NCERT Solutions | Information & Computer Technology (Class 10) - Notes & Video PDF Download

 Answer the following questions:

Q1. Differentiate between a workstation license and a site license.
Answer
Workstation licenses are licenses that permit the installation of an application on a single computer. Before installing it on a different machine the software must be removed from the first machine.
Site licenses permit the use of software on any computer at a specified site. Unlimited site licenses allow the installation of the software on any number of computers as long as those computers are located at the specified site.

Q2. Write a short note on your understanding of ‘cracking’ a software.
Answer
Cracking a software usually mean to harm the software, the hardware using this software or the end user of the software. These works are done by Crackers who modify or disable features of a software
application.

Q3. What are the categories of Cyber crime. Explain them.
Answer
Categories of Cyber crimes are:
1. General Intrusions: It includes Hacking, spyware, phishing, pharming, Sending computer viruses & worms to invade computers. Causing denial of service attacks. Creating bots, Trojan horses, zombie machines.
2. Nuisances (usually non-violent activities): Sending spam, Changing web page text and images, Redirecting websites.
3. Personal Identity Theft (using someone else’s name or credit):  Phishing for private information, passwords, code numbers, Making unauthorized purchases with stolen credit cards or ID, Destroying personal reputation, Damaging personal credit ratings.
4. Theft of Intellectual Property (stealing ideas or creations of others): Downloading copyrighted music & videos,  Plagiarism, cheating,  Software piracy.
5. Physical or Mental Damage: Cyberbullying, harassment, Cyberstalking,  Sexual exploitation of minors, child pornography.
6. Terrorism:  Stealing military and private industry secrets - espionage, Brainwashing and recruiting new followers, Building terrorist communications network.

Q4. Define the following terms:
Answer
(a) Spyware: Spyware is simply software that literally spies on what is being done on a computer.
(b) Malware: Malware is used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
(c) Virus: A computer virus is a program that replicates itself. A computer virus attaches itself to a program or file to help it spread from one computer to another.
(d) Worms:A worm is similar to a virus and is considered to be a sub-class of a virus. It spreads from computer to computer, as it has the capability to travel without any human action.

Q5. Read about ethical hacking and write a short note on your understanding of the topic.
Answer
Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. This act is performed by computer and network expert known as Ethical hacker. An ethical hacker operates with the knowledge and permission of the organization for which they are trying to defend. Ethical hacking is also known as penetration testing, intrusion testing and red teaming. First examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems.

Q6. Why cyber security should be taken care by the user while working on internet?
Answer
To remain safe from dramatic virus attacks, hackers, and other interesting Internet phenomena cyber security should be taken care by the user while working on internet.

Q7. Discuss all the point which should be kept in mind while working on computers.
Answer
We should follow below point while working on computers:
1. Set secure passwords and don’t share them with anyone. Avoid using common words, phrases, or personal information and update regularly.
2. Restrict access and make personal information secure to prevent identity theft.
3. Be suspicious of unsolicited contact from individuals seeking internal organizational data or personal information.
4. Limit the amount of personal information you post. Do not post information that would make you vulnerable, such as your address or information about your schedule or routine.
5. Take advantage of privacy and security settings. Use site settings to limit the information you share with the general public online.
6. Be suspicious of unknown links or requests sent through email or text message. Do not click on unknown links or answer strange questions sent to your mobile device, regardless of who the sender appears to be.
7. Download only trusted applications from reputable sources or marketplaces.

Q8. What is Deniel of Service attack? How it affects the systems performance?
Answer
Denial of service (dos) attacks that are designed to prevent legitimate access to a system.
It affect system by web attacks that attempts to breach a website. Two of the most common such attacks are SQL injection and cross-site scripting.

Q9. What is the difference between Shareware and Freeware softwares?
Answer
Shareware are copyrighted software that can be shared for a limited on a trial basis with
the understanding that if the user decides to use it, he will pay for it.
Freeware software is made available for use, free of charge for an unlimited time. The copyright still remains with the producer / owner for any future development.

Q10. Mention the list of the licenses used by the users.
Answer
List of License:
1. Proprietary license
2. General Public Licenses(GNU)
3. End User License Agreement(EULA)
4. Workstation licenses
5. Concurrent use licenses
6. Site licenses
7. Perpetual licenses
8. Non-perpetual licenses
9. License with Maintenance

Q11. What do you mean by open source softwares? How are they different from properitary softwares?
Answer
Open-source software (OSS) is computer software with its source code made available. It is very often developed in a public, collaborative manner. A license for open sources software allows the end user to study, change and distribute the software for any purpose.Proprietary license where the copyright stays with the producer and the user is granted the right to use the software.

Categorize the following under ethical/safety/security precaution:

Q1. Do not share your password.
Ans: Ethical

Q2. Do not use foul language.
Ans:
Ethical

Q3. Immediately report any suspect data or security breaches to your supervisor and/or authorities.
Ans:
Safety

Q4. Install firewalls and antivirus softwares.
Ans:
Security Precaution

Q5. Do not copy information from the Internet and claim it as yours (plagiarism).
Ans:
Ethical

Q6. Be wary of strangers and cautious of potentially misleading or false information.
Ans:
Safety

Q7. Manage your computer settings to allow only data that comes from a known or safe place.
Ans:
Security Precaution

Q8. Do not download copyrighted materials.
Ans:
Ethical

Q9. Download only trusted applications from reputable sources or marketplaces.
Ans:
Safety

Q10. Pay attention to the URLs of websites you visit.
Ans:
Safety

Q11. Do not use someone else’s password or break into his computer.
Ans:
Safety

Q12. Restrict access and make personal information secure to prevent identity theft.
Ans:
Security Precaution

The document Network Security, Information & Computer Technology Class 10 NCERT Solutions | Information & Computer Technology (Class 10) - Notes & Video is a part of the Class 10 Course Information & Computer Technology (Class 10) - Notes & Video.
All you need of Class 10 at this link: Class 10
6 videos|20 docs|6 tests

Top Courses for Class 10

FAQs on Network Security, Information & Computer Technology Class 10 NCERT Solutions - Information & Computer Technology (Class 10) - Notes & Video

1. What is network security?
Ans. Network security refers to the measures taken to protect a computer network from unauthorized access, misuse, modification, or denial of network services. It involves implementing various technologies, policies, and procedures to prevent unauthorized access and ensure the confidentiality, integrity, and availability of network resources.
2. What are the common threats to network security?
Ans. There are several common threats to network security, including: 1. Malware: Malicious software such as viruses, worms, and Trojans that can infect and damage network systems. 2. Phishing: A fraudulent attempt to obtain sensitive information such as passwords or credit card details by disguising as a trustworthy entity through electronic communication. 3. Denial of Service (DoS) attacks: An attempt to make a network or website unavailable to its intended users by overwhelming it with excessive traffic or resource requests. 4. Unauthorized access: Gaining unauthorized access to a network or system, usually through weak passwords, misconfigured access controls, or exploiting vulnerabilities. 5. Data breaches: Unauthorized access, disclosure, or theft of sensitive information.
3. How can network security be enhanced?
Ans. Network security can be enhanced through various measures, such as: 1. Using strong passwords: Implementing strong, unique passwords for network devices, systems, and user accounts to prevent unauthorized access. 2. Regularly updating software: Keeping network devices, operating systems, and applications up to date with the latest security patches and updates to address vulnerabilities. 3. Implementing firewalls: Using firewalls to monitor and control incoming and outgoing network traffic, blocking unauthorized access and filtering out malicious content. 4. Encrypting data: Encrypting sensitive data during transmission and storage to protect it from unauthorized access or interception. 5. Conducting security audits: Regularly assessing and testing the network's security posture through vulnerability scanning, penetration testing, and security audits.
4. What is the role of antivirus software in network security?
Ans. Antivirus software plays a crucial role in network security by detecting, preventing, and removing malware infections. It scans the network and devices for known patterns or signatures of malicious software and takes appropriate actions to mitigate the threat. Antivirus software also provides real-time protection by monitoring network activities and blocking suspicious or malicious behavior. It helps in maintaining the integrity and security of the network by regularly updating its virus definitions to identify and remove new threats.
5. How does encryption contribute to network security?
Ans. Encryption is a technique that converts data into an unreadable format, known as ciphertext, using cryptographic algorithms. It contributes to network security by ensuring the confidentiality and integrity of sensitive information. When data is encrypted, even if it is intercepted during transmission or accessed by unauthorized individuals, it remains unreadable without the decryption key. Encryption also prevents unauthorized modification of data, as any changes made to the encrypted data would render it unreadable. By implementing encryption protocols such as SSL/TLS, VPNs, and secure communication protocols, network security is significantly enhanced, protecting data from eavesdropping and unauthorized access.
6 videos|20 docs|6 tests
Download as PDF
Explore Courses for Class 10 exam

Top Courses for Class 10

Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev
Related Searches

Summary

,

Extra Questions

,

Information & Computer Technology Class 10 NCERT Solutions | Information & Computer Technology (Class 10) - Notes & Video

,

mock tests for examination

,

study material

,

Important questions

,

ppt

,

Exam

,

Sample Paper

,

Free

,

Network Security

,

Semester Notes

,

Objective type Questions

,

MCQs

,

pdf

,

Previous Year Questions with Solutions

,

Network Security

,

video lectures

,

Viva Questions

,

practice quizzes

,

Network Security

,

Information & Computer Technology Class 10 NCERT Solutions | Information & Computer Technology (Class 10) - Notes & Video

,

Information & Computer Technology Class 10 NCERT Solutions | Information & Computer Technology (Class 10) - Notes & Video

,

shortcuts and tricks

,

past year papers

;