1.
What is computer security? List its types.
Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.
Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.
The types of security are:
a)
Hardware security
b)
Software security
2. What
are the main objectives of computer security?
Ans: The main objectives of
computer security involve ensuring confidentiality (privacy), integrity
(reliability), and availability of assets or information.
3. Write
down any five possible threats to computer security?
Ans: five possible threats to
computer security are:
a)
Human error
b)
Computer crime
c)
Natural disasters
d)
War and terrorist activity
e)
Hardware failure
4. Why
do we need to provide security to our computer system?
Ans: We need to provide security to
our computer system because if we do not take care of a computer system than
our valuable data, information and programs may be lost or damaged. We may lose
data, information or programs due to computer viruses. The computer system may
be damaged due to some physical factors like fluctuation in electric power,
dust, overheat, etc. Thus to protect our computer from various negative aspects
we should provide security to our computer system.
5. What
is hardware security?
Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or intentional harm is known as hardware security.
Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or intentional harm is known as hardware security.
6. List
some of the hardware security measures.
Ans: Some of the hardware security measures are:
i) Regular maintenance
ii) Insurance Policy
iii) Power Regulator Device
iv) Fire detectors
v) Protection from theft
Ans: Some of the hardware security measures are:
i) Regular maintenance
ii) Insurance Policy
iii) Power Regulator Device
iv) Fire detectors
v) Protection from theft
7. What
is software security?
Ans: The security given to the software and data from being lost or damaged due to accidental or intentional harm is called software security.
Ans: The security given to the software and data from being lost or damaged due to accidental or intentional harm is called software security.
8. List
some of the software security measures.
Ans: Some of the software security measures are:
i) Backup
ii) Scandisk
iii) Defragmentation
iv) Password
Ans: Some of the software security measures are:
i) Backup
ii) Scandisk
iii) Defragmentation
iv) Password
9. What is voltage
regulator device? Give example.
Ans: A voltage regulator device is an electrical regulator device designed to automatically maintain a constant voltage level.
E.g.: Spike guard, Volt guard, etc.
Ans: A voltage regulator device is an electrical regulator device designed to automatically maintain a constant voltage level.
E.g.: Spike guard, Volt guard, etc.
10. What is the function
of voltage regulators?
Ans: The voltage
regulator automatically maintains a constant voltage level.
11. What are power
protection devices? Give examples.
Ans: The device that provides clean
AC power to sensitive electrical equipment are called power protection devices.
Examples are: UPS, Volt Guard, Spike guard, etc.
12. Why is power
protection device needed in a computer system?
Ans: Power protection device is needed in a computer system to protect the computer system from damage and expensive data loss.
Ans: Power protection device is needed in a computer system to protect the computer system from damage and expensive data loss.
13. What is UPS?
Ans: A UPS is a battery supported power protection device that controls the electric voltage and supplies clean and continuous power supply to the computer even during power failures.
Ans: A UPS is a battery supported power protection device that controls the electric voltage and supplies clean and continuous power supply to the computer even during power failures.
14. What is importance of
UPS in computer security system?
Ans: The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.
Ans: The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.
15. Why do the computer
system need regular maintenance?
Ans: Computer system need regular
maintenance to keep the computer hardware in good working condition and it also
helps to find out problems in hardware and correct the problems before they
cause several damages.
16. What should be done to
protect computer system from fire and theft?
Ans: Fireguards and fire
extinguisher should be installed to protect computer system from fire. Alarms,
security lighting and closed circuit television cameras should be used to
protect computer system from theft.
17. What is surge
protector?
Ans: A device that shields computer
and other electronic devices from surges in electric power or transient
voltage, that flow from the power supply.
18. What is password?
Ans: A password is a secret word or phrase that gives a user access to a particular program or system.
Ans: A password is a secret word or phrase that gives a user access to a particular program or system.
19. Write any four criteria
for a strong password.
Ans: Any four criteria for strong
password are:
·
Do not keep a password which can be easily guessed such as date of birth,
nickname, etc.
·
Do not keep word as password that is currently popular.
·
Keep a password with mixture of alphabet and numbers which is difficult to
guess.
·
Keep changing your password regularly.
20. What is password
policy?
Ans: A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use them properly is called password policy.
Ans: A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use them properly is called password policy.
21. What should be done to
protect the system from unauthorized access?
Ans: To protect a system from unauthorized access, password should be kept in a system which provides security to the system. A password should be difficult to guess and determine and should be changed regularly and memorized.
Ans: To protect a system from unauthorized access, password should be kept in a system which provides security to the system. A password should be difficult to guess and determine and should be changed regularly and memorized.
22. What is backup? Why is
backup vital to computer system?
Ans: Backup is a copy of a file which is used in the event of the original file being corrupted.
Backup is essential to computer security system because when data and software are corrupted or lost, we can recover from the backup copy as backups are kept in different locations such as hard disk, compact disks, tapes and on the internet.
Ans: Backup is a copy of a file which is used in the event of the original file being corrupted.
Backup is essential to computer security system because when data and software are corrupted or lost, we can recover from the backup copy as backups are kept in different locations such as hard disk, compact disks, tapes and on the internet.
23. How can software
prevent data loss?
Ans: Software prevents the data loss by the following ways:
i) Antivirus software can detect and remove virus from the computer.
ii) Scan disk checks folders, bad sector and other error of the disk and fix them.
iii) Software for backup helps in securing the information by keeping backup.
Ans: Software prevents the data loss by the following ways:
i) Antivirus software can detect and remove virus from the computer.
ii) Scan disk checks folders, bad sector and other error of the disk and fix them.
iii) Software for backup helps in securing the information by keeping backup.
24. What is scan disk?
Ans: Scan disk is a process which involves in maintaining the disk files and folders using a kind of utility software which checks files, folders, bad sectors, lost clusters, lost chains and any errors of the specific disk and can fix them if it is possible.
Ans: Scan disk is a process which involves in maintaining the disk files and folders using a kind of utility software which checks files, folders, bad sectors, lost clusters, lost chains and any errors of the specific disk and can fix them if it is possible.
25. Define fragmentation
and defragmentation?
Ans: The scattering of the parts of the same disk file over different location is called fragmentation.
Ans: The scattering of the parts of the same disk file over different location is called fragmentation.
The process of re-writing parts of
a file to contiguous sectors on a hard disk to increase the speed of access and
retrieval is called defragmentation.
***