KnowledgeBoat Logo
|
OPEN IN APP

Chapter 10

Cybersecurity

Class 10 - KIPS Robotics & AI



Activity 10.1

Question 1

Write any two methods that you/your parents are using to protect your digital hardware.

Answer

Two methods that I / my parents are using to protect our digital hardware are:

  1. We always keep our hardware assets in a safe place.
  2. We have set up an authentication mechanism (such as a password) on our devices to protect them.

Activity 10.2

Question 1

With the help of your teacher, identify three emails that can be considered spam or seem that they have been sent for phishing purposes.

Answer

Three emails that can be considered spam or sent for phishing purposes are:

  1. An email that appears to be from a bank official asking the user to click on a link for online document verification and enter personal details.
  2. An email or message that looks like it is sent from a well-known organisation, containing a suspicious link that redirects to a fake website.
  3. An email requesting personal or financial information such as account number, password, or credit card details through links or attachments.

Activity 10.3

Question 1

Write down any two safety measures that you or your parents are following to protect your computer from being hacked.

Answer

Any two safety measures that I / my parents are following to protect our computer from being hacked are:

  1. We use strong passwords and update them frequently.
  2. We are cautious while opening emails or messages and do not click on suspicious links or attachments.

Activity 10.4

Question 1

Write down any two observations that you have noticed in the degradation in a computer that has become 7 to 10 years old.

Answer

Any two observations noticed in the degradation of a computer that has become 7 to 10 years old are:

  1. The booting time of the computer increases and it takes longer to start.
  2. The overall performance becomes slow, which may be due to hardware degradation, memory occupancy, or malware attacks.

State True or False

Question 1

Unauthorised access of computer hardware may result in data theft.

Answer

True

Reason — Unauthorised access to computer hardware may result in data theft, as an unauthorised person can access personal information such as contacts, data, and history stored on the device.

Question 2

A user connects a USB drive to a work computer that they do not own is an example of unauthorised access.

Answer

True

Reason — When a user connects a USB drive to a work computer that they do not own, it means the computer hardware is being used without permission, which is considered unauthorised access to hardware.

Question 3

Data privacy is not an important concern in unauthorised access of hardware.

Answer

False

Reason — Privacy is an important concern in unauthorised access of hardware because an unauthorised person can access personal information like contacts, data, and the history of a person.

Question 4

Malware are developed to harm computer software.

Answer

True

Reason — Malware is a software developed to harm a computer system. These software can be installed on the computer unknowingly and can be used to steal personal information, by getting a backdoor entry into the computer.

Question 5

Virus does not affect computer functioning.

Answer

False

Reason — A virus is a harmful program that can harm or steal data from a computer system and can affect the functioning of the computer.

Question 6

Making false commitment regarding a product’s feature is normal.

Answer

False

Reason — Making false commitments regarding a product’s features is an ethical issue and can mislead customers, leading to financial loss and loss of trust.

Question 7

Using someone's open email account to send an email without their permission is an ethical practice.

Answer

False

Reason — Using someone else’s email account without their permission is an example of unauthorised use, which is not an ethical practice.

Question 8

We should always use a strong password to protect our digital assets.

Answer

True

Reason — Using strong passwords helps protect digital assets by preventing unauthorised access to computers and networks.

Select the correct option

Question 1

Which of the following is not an example of unauthorised access to hardware?

  1. Using friend’s computer without his permission
  2. Using your own computer
  3. Using computer of an organisation without access permission
  4. None of these

Answer

Using your own computer

Reason — Unauthorised access means using computer hardware without permission. Using our own computer does not involve accessing someone else’s hardware, so it is not an example of unauthorised access.

Question 2

What could be the consequences of unauthorised access to hardware?

  1. Data theft
  2. Information sharing
  3. Damage to hardware
  4. All of these

Answer

All of these

Reason — Unauthorised access to hardware can lead to data theft, information sharing, and may also cause damage to hardware, resulting in serious security and privacy issues.

Question 3

What is the meaning of software theft?

  1. To use trial versions of software
  2. Borrowing software
  3. Using pirated software
  4. None of these

Answer

Using pirated software

Reason — Software theft means the unauthorised use of software, whether by copying or modifying it. Pirated software is a form of software theft and means the illegal download or copying of software from the internet.

Question 4

Why software theft is an important concern for software developers and companies?

  1. Helps in increasing sale
  2. Helps in promotion
  3. Results in financial losses
  4. Encourages competition

Answer

Results in financial losses

Reason — Software theft causes financial losses to software developers and companies because their software is used or distributed without authorisation or payment.

Question 5

Which of the following is the right way to get a software?

  1. Use licence cracker and take pirated copy
  2. Purchase software from authorised vendor
  3. Take licence key from friend
  4. Copy software from friend’s computer

Answer

Purchase software from authorised vendor

Reason — Software should always be purchased from authorised vendors or official websites to avoid software theft and illegal use of software.

Question 6

Which of the following means the illegal download or copying of software from the internet?

  1. Contractual disputes
  2. Malware
  3. Digital piracy
  4. Phishing

Answer

Digital piracy

Reason — Digital piracy means the illegal download or copying of software from the internet.

Question 7

Disputed rights to products occur with ............... .

  1. Intellectual property infringement
  2. Contractual disputes
  3. Property disputes
  4. All of these

Answer

All of these

Reason — Disputed rights to products occur due to intellectual property infringement, contractual disputes, and property disputes between different parties.

Question 8

Which of the following can harm a computer?

  1. Operating system
  2. Device driver
  3. Malware
  4. None of these

Answer

Malware

Reason — Malware is a software developed to harm a computer system.

Fill blanks

Question 1

Fill in the blanks:

  1. Patent is an example of .................
  2. ................ means to crack software protection key.
  3. Infected pen drive could be a medium to transfer ................ .
  4. Using someone else’s computer with ................ will be an authorised access.
  5. Disputed rights for products mean ................ between different parties.

Answer

  1. Patent is an example of Intellectual property right.
  2. Warez cracking means to crack software protection key.
  3. Infected pen drive could be a medium to transfer viruses.
  4. Using someone else’s computer with permission will be an authorised access.
  5. Disputed rights for products mean disagreement between different parties.

Short answer type questions

Question 1

Give an example of unauthorised access.

Answer

An example of unauthorised access is using someone else’s computer hardware without their permission.

Question 2

What do you mean by hacking? Explain with the help of an example.

Answer

Using someone else’s computer, software, or network in an unauthorised manner is called hacking. The purpose of the hackers behind this is to steal data, modify the software, install malware, or observe every activity of the software.

Example: A hacker may install malware in an organisation’s website’s database to collect the visitor’s information.

Question 3

What are the various safety measures to avoid hacking?

Answer

The various safety measures to avoid hacking are:

  1. Organisations must take precautions to protect themselves against hacking and data theft.
  2. Strong security measures should be put in place, such as employing strong passwords, encrypting data, and using firewalls.
  3. Employees should be trained to recognise and report suspicious behaviour.
  4. Organisations should be informed of the most recent hacking and data theft strategies and threats.

Question 4

What do you mean by virus? Explain with the help of an example.

Answer

A virus is a harmful program that can harm or steal data from a computer system. Viruses can be transmitted by email attachments, malicious websites, or infected USB sticks.

Example: The Stuxnet virus was a malware designed to attack Iran’s nuclear programme. It infiltrated computers in nuclear plants and caused considerable damage to the systems.

Question 5

What are the various ways to avoid or reduce the degradation of systems?

Answer

The various ways to avoid or reduce the degradation of systems are:

  1. Keep the software updated.
  2. Use trusted antivirus and antimalware programs.
  3. Purchase hardware from a well-known company by analysing its history and current scenario.

Long answer type questions

Question 1

Draw a labelled diagram that illustrates the unauthorised use of hardware.

Answer

Labelled diagram illustrating unauthorised use of hardware:

Draw a labelled diagram that illustrates the unauthorised use of hardware. Components of Visualisation, Design, and Creation of Components, KIPS ICSE Robotics & Artificial Intelligence Solutions Class 9.

Question 2

What are the ways to resolve disputed rights to products?

Answer

The dispute may be resolved using the following methods:

  1. Parties may negotiate on some common points and resolve the issue.
  2. A mediator or third party can help in resolving the conflicts.
  3. In arbitration, a neutral third party renders a legally binding ruling once the parties have mutually agreed to submit their dispute to it.
  4. The parties can go through the more formal and time and money consuming process of litigation and file a lawsuit in court.

Question 3

What could be the safety measures to avoid software theft?

Answer

The various safety measures to avoid software theft are:

  1. Be aware of the consequences of using pirated software.
  2. Keep all your software at a safe place.
  3. Always purchase software from authorised vendors or official websites.
  4. To discourage such practices, take action against dealers or distributors of pirated software.

Question 4

Explain computer fraud with the help of an example.

Answer

Computer fraud is the use of computers to perpetrate fraud, which is any deception or misrepresentation designed to result in financial or personal advantage.

Example: A person receives an email that appears to be from a bank official with instructions for online document verification. A link is provided in the email. When the person clicks on the link, it opens a fake website of that bank. The person enters all the details on that website, and all the information is stolen by the fraudster.

Question 5

What could be the various safety measures to avoid computer fraud?

Answer

The various safety measures to avoid computer fraud are:

  1. Be cautious about the information you share online and do not provide personal details unless you are confident the website is genuine.
  2. Keep your software up to date, as updates include security fixes that help protect against viruses.
  3. Be wary of emails or SMS messages requesting personal information and do not click on suspicious links or attachments.
  4. Use secure passwords and update them frequently.

Higher Order Thinking Skills (HOTS)

Question 1

Explain the risks and implications of unauthorised access with an illustrative example.

Answer

Unauthorised access means using computer hardware without permission. This access can be used to manipulate system settings and data, and the implications of this act could be very harmful for an individual or an organisation.

Risks and implications of unauthorised access:

  • Privacy: It may be an attack on the privacy of a user or organisation. An unauthorised person can access personal information like contacts, data, and the history of a person.

  • Security: The unauthorised access to hardware may result in security issues. The websites or networks used by that unauthorised access may be susceptible to different security concerns, like hackers attacking your hardware through those sites.

Example: If a person uses someone else’s computer in a public place without permission and accesses files or browses websites, it is an example of unauthorised access. This may expose the system to malicious websites or allow the person to misuse personal data stored on the computer.

Question 2

What are the preventive measures that can be taken by organisations and individuals to prevent unauthorised use of hardware and its associated risks?

Answer

The preventive measures that can be taken by organisations and individuals to prevent unauthorised use of hardware and its associated risks are:

  1. Always keep hardware assets in a safe place.
  2. Set up an authentication mechanism on devices to protect them.
  3. Take permission from the owner before using their computer or any digital device.
  4. Always log out of all accounts, especially when working on a public computer.
PrevNext