Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Students can Download Computer Science Chapter 17 Computer Ethics and Cyber Security Questions and Answers, Notes Pdf, Samacheer Kalvi 11th Computer Science Book Solutions Guide Pdf helps you to revise the complete Tamilnadu State Board New Syllabus and score more marks in your examinations.

Tamilnadu Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Samacheer Kalvi 11th Computer Science Computer Ethics and Cyber Security Text Book Back Questions and Answers

PART – 1
I. Choose The Correct Answer

Question 1.
Which of the following deals with procedures, practices and values?
(a) piracy
(b) programs
(c) virus
(d) computer ethics
Answer:
(d) computer ethics

Question 2.
Commercial programs made available to the public illegally are known as ……………….
(a) freeware
(b) warez
(c) free software
(d) software
Answer:
(b) warez

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 3.
Which one of the following are self – repeating and do not require a computer program to attach themselves?
(a) viruses
(b) worms
(c) spyware
(d) Trojans
Answer:
(b) worms

Question 4.
Which one of the following tracks a user visiting a website?
(a) spyware
(b) cookies
(c) worms
(d) Trojans
Answer:
(b) cookies

Question 5.
Which of the following is not a malicious program on computer systems?
(a) worms
(b) Trojans
(c) spyware
(d) cookies
Answer:
(d) cookies

Question 6.
A computer network security that monitors and controls incoming and outgoing traffic is ……………….
(a) cookies
(b) virus
(c) firewall
(d) worms
Answer:
(c) firewall

Question 7.
The process of converting cipher text to plain text is called ……………….
(a) Encryption
(b) Decryption
(c) key
(d) proxy server
Answer:
(b) Decryption

Question 8.
e – commerce means ……………….
(a) electronic commerce
(b) electronic data exchange
(c) electric data exchange
(d) electronic commercialization
Answer:
(a) electronic commerce

Question 9.
Distributing unwanted e-mail to others is called.
(a) scam
(b) spam
(c) fraud
(d) spoofing
Answer:
(b) spam

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 10.
Legal recognition for transactions are carried out by ……………….
(a) Electronic Data Interchange
(b) Electronic Data Exchange
(c) Electronic Data Transfer
(d) Electrical Data Interchange
Answer:
(a) Electronic Data Interchange

PART – 2
II. Answers to all the questions

Question 1.
What is harvesting?
Answer:
A person or program collects login and password information from a legitimate user to illegally gain access to others’ account(s) is called harvesting.

Question 2.
What is Warez?
Answer:
Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses that program regularly to pay a registration fee to the program’s author directly. Commercial programs that are made available to the public illegally are often called warez.

Question 3.
Write a short note on cracking.
Answer:

  • Cracking means trying to get into computer systems in order to steal, corrupt, or illegitimately view data.
  • Cracking is where someone edits a program source so that the code can be exploited or modified.

Question 4.
Write two types of cyberattacks.
Answer:
Cyber Attack:

  1. Virus
  2. Worms

Function:

  1. A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common viruses is Trojan.
  2. Worms are self – repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.

Question 5.
What is a Cookie?
Answer:
A cookie is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing the internet.

PART – 3
III. Answers to all the questions

Question 1.
What is the role of firewalls?
Answer:
A firewall is a computer network security-based system that monitors and controls the incoming and outgoing network traffic based on predefined security rules. A firewall commonly establishes a block between a trusted internal computer network and entrusted computer outside the network. They are generally categorized as network-based or host-based. Network-based firewalls are positioned on the gateway computers of LANs [local area Network], WANs [Wide Area Network], and intranets.

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
Write about encryption and decryption.
Answer:

  • Encryption is the process of translating plain text data (plaintext) into random and mangled data (called cipher-text).
  • Decryption is the reverse process of converting the cipher-text back to plaintext.
  • Encryption and decryption are done by cryptography.

Question 3.
Explain symmetric key encryption.
Answer:
Symmetric encryption is a technique to use the same key for both encryption and decryption. The main disadvantage of symmetric key encryption is that all authorized persons involved, have to exchange the key used to encrypt the data before they can decrypt it. If anybody intercepts the key information, they may read all messages.

Question 4.
What are the guidelines to be followed by any computer user?
Answer:
To protect the information the following guidelines to be noted:

  • A complex password setting can make your surfing secured.
  • When the internet is not in use, disconnect it.
  • Do NOT open spam mail or emails that have an unfamiliar sender.
  • When using anti-virus software, keep it up-to-date.

Question 5.
What are ethical issues? Name some.
Answer:
An Ethical issue is a problem or issue that requires a person or organization to choose between alternatives that must be evaluated as right (ethical) or wrong (unethical). These issues must be addressed and resolved to have a positive influence in society.
Some of the common ethical issues are listed below:

  1. Cybercrime
  2. Software Piracy
  3. Unauthorized Access
  4. Hacking
  5. Use of computers to commit fraud.
  6. Sabotage in the form of viruses.

PART – 4
IV. Answers to all the questions

Question 1.
What are the various crimes happening using computers?
Answer:
Crime:

  1. Crime Function
  2. Cyberstalking
  3. Malware
  4. Harvesting
  5. Identity theft
  6. Intellectual property theft
  7. Salami slicing

Function:

  1. Hacking, threats, and blackmailing towards a business or a person.
  2. Harassing online.
  3. Malicious programs can perform a variety of functions including stealing, encrypting, or deleting sensitive data, altering or hijacking core computing functions, and monitoring user’s computer activity without their permission.
  4. A person or program collects login and password information from a legitimate user to illegally gain access to others’ account(s).
  5. It is a crime where the criminals impersonate individuals, usually for financial gain.
  6. Stealing practical or conceptual information developed by another person or company.
  7. Stealing tiny amounts of money from each transaction.

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
What is piracy? Mention the types of piracy? How can it be prevented?
Answer:
Software Piracy is about the copyright violation of software created originally by an individual or an institution. It includes:
1. stealing of codes/programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.

2. Downloading software from illegal network sources.
An entirely different approach to software piracy is called shareware, which acknowledges the futility of trying to stop people from copying software and instead relies on people’s honesty.

Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses that program regularly to pay a registration fee to the program’s author directly. To prevent unauthorized access, Firewalls, Intrusion Detection Systems (IDS), Virus and Content Scanners, Patches, and Hotfixes are used.

Question 3.
Write the different types of cyberattacks.
Answer:
Cyber Attack:

  1. Virus
  2. Worms
  3. Spyware
  4. Ransomware

Function:

  1. A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common viruses is Trojan.
  2. Worms are self – repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.
  3. Spyware can be installed on the computer automatically when the attachments are open, by clicking on links, or by downloading infected software.
  4. Ransomware is a type of malicious program that demands payment after launching a cyber – attack on a computer system. This type of malware has become increasingly popular among criminals and costs organizations millions each year.

Samacheer Kalvi 11th Computer Science Computer Ethics and Cyber Security Additional Questions and Answers

PART – 1
I. Choose the correct answer

Question 1.
________ is a communication media which is easily accessible and open to all.
a) Extranet
b) Intranet
c) Internet
d) None of these
Answer:
c) Internet

Question 2.
……………….. is a crime where the criminals impersonate individuals for financial gain.
(a) intellectual-property theft
(b) Identity theft
(c) Salami slicing
(d) Spoofing
Answer:
(b) Identity theft

Question 3.
Computer systems in general are
a) Vulnerable
b) Safe
c) Secured
d) None of these
Answer:
a) Vulnerable

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 4.
One of the most common viruses is ………………..
(a) Ransomware
(b) Spyware
(c) worms
(d) Trojan
Answer:
(d) Trojan

Question 5.
Cyber-crime poses threats to the ________ of most business systems,
a) Integrity
b) Safety
c) Survival
d) All the above
Answer:
d) All the above

Question 6.
________ means stealing practical or conceptual information developed by another person or company.
a) Harvesting
b) Identity theft
c) Intellectual property theft
d) Fraud
Answer:
c) Intellectual property theft

Question 7.
________ meant tricking people into believing something that is not true.
a) Harvesting
b) Scam
c) Intellectual property theft
d) Fraud
Answer:
b) Scam

Question 8.
Stealing tiny amounts of money from each transaction means ________
a) Salami slicing
b) Scam
c) Intellectual property theft
d) Fraud
Answer:
a) Salami slicing

Question 9.
Distribute unwanted e-mail to a large number of the internet is termed as ________
a) Salami slicing
b) Scam
c) Intellectual property theft
d) Spam
Answer:
d) Spam

Question 10.
________ is a malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.
a) Salami slicing
b) Scam
c) Spoofing
d) Spam
Answer:
c) Spoofing

Question 11.
Software________ is about the copyright violation of software created originally by an individual or an institution.
a) Piracy
b) Fraud
c) Theft
d) None of these
Answer:
a) Piracy

Question 12.
________ includes stealing of codes/programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.
a) Piracy
b) Scam
c) Salami slicing
d) None of these
Answer:
a) Piracy

Question 13.
To prevent unauthorized access ________ is used.
a) Firewalls/ Intrusion Detection Systems
b) Virus and Content Scanners
c) Patches and Hotfixes
d) All the above
Answer:
d) All the above

Question 14.
Identify the correct statement from the following related with cracking.
a) It is a method of getting passwords and information using human weakness.
b) Crackers find your personal information from some persona! data/facts and try to guess a password.
c) Crackers may send an official e-mail requesting some sensitive information. It may look like a legitimate e-mail from bank or other official institution.
d) All the above
Answer:
d) All the above

Question 15.
________ is a collection of various technologies, processes, and measures that reduces the risk of cyberattacks.
a) Cyber Security
b) Cyber Crime
c) Cyber Gateway
d) None of these
Answer:
a) Cyber Security

Question 16.
________ protects organizations and individuals from computer-based threats.
a) Cyber Security
b) Cyber Crime
c) Cyber Gateway
d) None of these
Answer:
a) Cyber Security

Question 17.
________ is a type of software designed through which the criminals gain illegal access to software and cause damage.
a) Malware
b) Piracy
c) Cracking
d) None of these
Answer:
a) Malware

Question 18.
A ________ is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file.
a) Virus
b) Piracy
c) Cracking
d) None of these
Answer:
a) Virus

Question 19.
________ is the most common virus.
a) Trojan
b) Melisa
c) Sasser
d) Code Red
Answer:
a) Trojan

Question 20.
A ________ is a program that appears to perform one function but actually performs malicious activity when executed.
a) Cracking
b) Trojan virus
c) Piracy
d) None of these
Answer:
b) Trojan virus

Question 21.
Data should be ________ when transmitted across networks in order to protect against the network traffic by unauthorized users.
a) Encrypted
b) Translated
c) Converted
d) None of these
Answer:
a) Encrypted

Question 22.
There are________ types of encryption schemes.
a) three
b) four
c) two
d) five
Answer:
c) two

Question 23.
________ is a encryption scheme.
a) Symmetric Key encryption
b) Public Key encryption
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 24.
encryption is a technique to use the same key for both encryption and decryption.
a) Symmetric Key
b) Public Key
c) Either A and B
d) None of these
Answer:
a) Symmetric Key

Question 25.
In________ encryption all authorized persons involved, have to exchange the key used to encrypt the data before they can decrypt it.
a) Symmetric Key
b) Public Key
c) Either A and B
d) None of these
Answer:
a) Symmetric Key

Question 26.
________ encryption is also called Asymmetric encryption
a) Symmetric Key
b) Public Key
c) Both A and B
d) None of these
Answer:
b) Public Key

Question 27.
________ uses the concept of a key-value pair, a different key is used for the encryption and decryption process.
a) Symmetric Key encryption
b) Public Key encryption
c) Both A and B
d) None of these
Answer:
b) Public Key encryption

Question 28.
________ key is used in public key encryption.
a) Private
b) Public
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 29.
The ________ key is kept secret by the owner.
a) Private
b) Public
c) Both A and B
d) None of these
Answer:
a) Private

Question 30.
The ________ key is either shared amongst authorized recipients.
a) Private
b) Public
c) Both A and B
d) None of these
Answer:
b) Public

PART – 2
II. Short Answers

Question 1.
How information technology is reaching people?
Answer:
Information Technology is widespread through computers, mobile phones, and the internet.

Question 2.
What is a proxy server? Explain its working.
Answer:
A proxy server acts as an intermediary between the end-users and a web server. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resources available from a different server. The proxy server examines the request, checks authenticity, and grants the request based on that. Proxy servers typically keep the frequently visited site addresses in their cache which leads to improved response time.

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 3.
What are the threats of Cyber-crime?
Answer:
Cyber-crime poses threats to the integrity, safety, and survival of most business systems.

Question 4.
What is meant by MITM?
Answer:
Man in the middle attack (MITM; also Janus attack) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

Question 5.
What is ethics?
Answer:

  • Ethics means “What is Wrong and What is Right”.
  • It is a set of moral principles that rule the behavior of individuals who use computers.
  • An individual gains knowledge to follow the right behavior, using morals that are also known as ethics.
  • Morals refer to the generally accepted standards of right and wrong in society.

Question 6.
What is a digital certificate?
Answer:

  • A digital certificate in a client-server model of communication.
  • It is one of the examples of Asymmetric Encryption.

Question 7.
What is a digital signature?
Answer:
Digital signatures are based on asymmetric cryptography and can provide assurances of evidence to origin, identity, and status of an electronic document, transaction, or message, as well as acknowledging informed by the signer.

PART – 3
III. Short Answers

Question 1.
What is cybercrime?
Answer:
Cybercrime is a crime which involves computer and network. This is becoming a growing threat to society and is caused by criminals or irresponsible actions of individuals who are exploiting the widespread use of the Internet. It presents a major challenge to the ethical use. of information technologies. Cybercrime also poses threats to the integrity, safety, and survival of most business systems.
Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
What is an ethical issue? List the common ethical issues.
Answer:
An Ethical issue is a problem or issue that requires a person or organization to choose between alternatives that must be evaluated as right (ethical) or wrong (unethical). These issues must be addressed and resolved to have a positive influence in society.
Some of the common ethical issues are listed below:

  • Cybercrime
  • Software Piracy
  • Unauthorized Access
  • Hacking
  • Use of computers to commit fraud
  • Sabotage in the form of viruses
  • Making false claims using computers

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 3.
Differentiate Spyware and Ransomware.
Answer:
Spyware:
Spyware can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software.

Ransomware:
Ransomware is a type of malicious program that demands payment after launching a cyber-attack on a computer system. This type of malware has become increasingly popular among criminals and costs organizations millions each year.

Question 4.
What are the types of encryption?
Answer:
There are two types of encryption schemes as listed below:
1. Symmetric Key encryption: Symmetric encryption is a technique to use the same key for both encryption and decryption.
Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security
2. Public Key encryption: Public key encryption is also called asymmetric encryption. It uses the concept of a key-value pair, a different key is used for the encryption and decryption
Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 8.
Why web sites use cookies?
Answer:
Web sites typically use cookies for the following reasons:

  • To collect demographic information about who has visited the Web site.
  • Sites often use this information to track how often visitors come to the site and how long they remain on the site.
  • It helps to personalize the user’s experience on the Web site.
  • Cookies can help store personal information about users so that when a user subsequently returns to the site, a more personalized experience is provided.

PART – 4
IV. Explain in Detail

Question 1.
Explain public key encryption and asymmetric encryption in the digital certificate.
Answer:
Public key encryption is also called asymmetric encryption. It uses the concept of a key-value pair, a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key. The private key is kept secret by the owner and the public key is either shared amongst authorized recipients or made available to the public at large.

The data encrypted with the recipient’s public key can only be decrypted with the corresponding private key. A digital certificate in a client-server model of communication is one of the examples of Asymmetric Encryption. A certificate is a package of information that identifies a user and a server.

It contains information such as an organization’s name, the organization that issued the certificate, the users’ email address and country, and the user’s public key. When a server and a client require secure encrypted communication, they send a query over the network to the other party, which sends back a copy of the certificate. The other party’s public key can be extracted from the certificate. A certificate can also be used to uniquely identify the holder.

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
Explain Cracking in detail.
Answer:
CRACKING:
Cracking is where someone edits a program source so that the code can be exploited or modified. A cracker (also called a black hat or dark side hacker) is a malicious or criminal hacker.

“Cracking” means trying to get into computer systems in order to steal, corrupt, or illegitimately view data.

A cracker is someone who breaks into someone else’s computer system, often on a network, bypassing passwords or licenses in computer programs.

Software cracking is the most often used type of cracking which is nothing but removing the encoded copy protection.

There is another type of cracking called password cracking. This is mainly used to crack the passwords. Password cracking can be performed either by using an automated program or can be manually realized.

One more interesting fact about cracking is social engineering. It is a method of getting passwords and information using human weakness

The other method that uses social engineering crackers is password guessing. They find your personal information from some personal data/ facts and try to guess a password.

Usually, a cracker maintains knowledge of the vulnerabilities he or she finds and exploits them for personal advantage, not revealing them to either the general public or to the manufacturer.

Question 3.
Explain digital signature with a functional diagram.
Answer:
Digital signatures are based on asymmetric cryptography and can provide assurances of evidence to origin, identity, and status of an electronic document, transaction, or message, as well as acknowledging information given by the signer. To create a digital signature, signing software (email) creates a one-way hash of the electronic data to be signed.

The user’s private key to encrypt the hash, returning a value that is unique to the hashed data. The encrypted hash, along with other information such as the hashing algorithm, forms the digital signature. Any change in the data, even to a single bit, results in a different hash value. This attribute enables others to validate the integrity of the data by using the signer’s public key to decrypt the hash.

If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn’t changed since it was signed. If the two hashes don’t match, the data has either been tampered with in some way (indicating a failure of integrity) or the signature was created with a private key that doesn’t correspond to the public key presented by the signer (indicating a failure of authentication).
Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security