Security Copyright and The Law - Short Questions. Following are the important and more conceptual short questions with answers of Computer, ICS Part-I, Chapter No.6: Security Copyright & The Law, for the interview and final examinations:
Chapter No.6
Security Copyright & The Law
Short Questions & Answers
Q.1: Define
security of data?
Answer:
Security of data is a system of safeguards designed to protect a computer system and data from intentional and accidental damage or access by unauthorized persons.
Q.2: What is
the use of biometrics for data security?
Answer:
In this approach, biometrics means, such as fingerprints, voice recognition, and eye-retina are used to identify a user for data security.
Q.3: Write the
four approaches used for data security?
Answer:
The following four approaches to data security are:
What You Have: Unauthorized access is prevented by providing a key, badge, token or plastic card to authorized users.
What You Know: Authorized users are given a user-id and a password. Only those persons who know the password can access the system.
What You Do: Authorized users are asked to sign a document before allowing access to a computer system.
What You Are: Some data security measures are biometrics. Biological means of identification i.e. fingerprints, voice recognition, and eye retina etc.
Q.4: What is a
computer virus?
Answer:
A virus is a program that attaches itself with other executable files by modifying them so that the virus program is also loaded and executed with the execution of these programs. A virus usually performs destructive operation by deleting or modifying data.
Q.5: What are
the major causes of viruses?
Answer:
The following are the major causes of viruses:
- Internet
- Computer Network
- Removable storage media
- Pirated software
Q.6: Define
the virus cause “Removable Storage Media”?
Answer:
The most common cause of virus spread is use of removable storage media, such as floppy disc, CDs and flash devices. When a virus-infected file is copied from one computer to another through a removable storage media, the virus is also transferred.
Q.7: Define
the virus cause “Pirated Software”?
Answer:
Installing pirated or unlicensed software is also a common cause of virus infection. Someone may intentionally include some code in the software such that the code activates only when the software does not find some special information, like a license key.
Q.8: Define
boot sector?
Answer:
The disk is divided into tracks and sectors. The disk, on which the operating system has been loaded, has a special program in its first sector called the boot sector. When the computer is turned on, the program in the boot sector is automatically loaded into the memory.
Q.9: What is Boot
Sector virus?
Answer:
The boot sector virus modifies the program in the boot sector and is loaded into memory whenever the computer is turned on. From memory the boot virus spreads to every disk that the system reads. The virus is attached with the executable file i.e., .exe, .com, and .dll files.
Q.10: What is Chernobyl
virus?
Answer:
The Chernobyl virus deletes all the
Microsoft Office files and also the partition information from the disk, hence
causing a major loss of data.
Q.11: What is Logic
Bomb?
Answer:
A logic bomb is programming code that is designed to execute under circumstances. It is set to go off at a certain data and time. A logic bomb, when exploded may display or print a message, delete or corrupt data, or have other undesirable effects.
Q.12: What is a
Trojan horse?
Answer:
The Trojan horse places illegal, destructive instructions in the middle of a legitimate program, such as a computer game. Once you run the program, the Trojan horse goes to work, doing its damage while you are blissfully unaware. FormatC is an example of Trojan horse.
Q.13: Define
Redlof virus?
Answer:
Redlof is a polymorphic, VB script virus. It infects .html, .htm, .asp, .php, .jsp, and .vbs files on all drives. The virus copies itself to Windows system files. It changes the default association for .dll files.
Q.14: What is a Macro virus?
Answer:
A virus written in a programming language and embedded inside another document, such as a word processor document or spreadsheet document is called a macro virus.
Q.15: What Worms?
Answer:
Worms copy themselves from computer to computer rather than from file to file. Because they require no human action to do so, they can spread much more rapidly than regular computer viruses. They usually generate excessive e-mails and cause e-mail servers to crash.
Q.16: What is
antivirus software?
Answer:
Antivirus software are special programs that detect and remove viruses from the computer. These not only clean viruses from infected files and disks, they can also prevent new viruses from getting to the computer. The common used anti-virus programs are:
- Norton antivirus program
- MacAfee antivirus program
- Dr. Solomon antivirus program
- Avast antivirus program
- AVG antivirus program
Q.17: How to
safeguard against viruses?
Answer:
The following are the few ways through which you can save your computers from getting infected by a virus:
- Never open unknown email message, and also scan all email messages
- Minimize the use of removable storage media
- Don’t download freeware programs without first checking it for virus
- Always use antivirus program to detect and to delete viruses
- Update antivirus program periodically to detect new viruses
- Keep backup of your data; it will be useful if virus deletes your data
Q.18: Who is Cracker
or Hacker?
Answer:
A person who gains access to a computer system
illegally is called a cracker or hacker. Hackers normally
break into a computer system to use or steal computer resources or corrupt a
computer’s data.
Q.19: Write
the benefits of password?
Answer:
Authorized users are given a user-id and a password. A
password
must be entered to get access to the system. Only those persons who know the
password can access the system.
Q.20: How data
security may be violated?
Answer:
The following are some ways in which security of data may be violated:
- Hardware Theft
- Unauthorized Access
- Information Theft
- Attacks of Viruses and Worms
Q.21: How to
counteract data security threats?
Answer:
The following practices will help prevent the most common threats:
- Keep backups
- Update software periodically
- Ensure physical security
- Educate users about data security threats
- Assign proper rights to users to access data
Q.22: What is
privacy issue?
Answer:
Privacy is the right of a person to
keep his/her personal information away from other people. If a computer system
holds such information then it is the right of the person that this information
is not used or given to anyone without his/her permission.
Q.23: Define
data protection?
Answer:
Data protection rules define that any personal data kept by an organization should never be disclosed to unauthorized persons/organization under any circumstances.
Q.24: What is
data protection legislation?
Answer:
It defines the laws that ensure data protection. Many countries have defined the data protection legislation and in some advanced western countries; this law is enforced properly as well.
Q.25: What is copyright?
Answer:
Copyright is the exclusive right to use a creative work or allow someone else to do so. It allows the creator to benefit from his work. It also gives the creator control on the manner in which his work is used.
➤ Security Copyright & The Law - MCQs
➤ Computer Architecture - MCQs
➤ Applications and Uses of Computer - Short Questions
➤ Applications and Uses of Computer - MCQs
➤ Data Communication - MCQs
➤ Data Communication - Short Questions
➤ Information Networks - Short Questions
➤ Information Networks - MCQs
➤ Basics of IT - MCQs
➤ Basics of IT - Short Questions
Post a Comment
Your feedback is highly appreciated and will help us to improve. So, please give your good suggestions.