Tuesday, July 9, 2019

Computer Security | Hardware and Software Security

What is computer security?Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.
2.     What are the main objectives of computer security?
Ans: The main objectives of computer security involves ensuring confidentiality, integrity, and availability of assets or information.

3.               What are the major types of security?
Ans: The types of security are:
·       Hardware security
·       Software security

4.     Write down any five possible threats to computer security?
Ans: five possible threats to computer security are:
·       Human error
·       Computer crime
·       Natural disasters
·       War and terrorist activity
·       Hardware failure

5.     Why do we need to provide security to our computer system?
Ans: We need to provide security to our computer system because if we do not take care of a computer system than our valuable data, information and programs may be lost or damaged. We may lose data, information or programs due to computer viruses. The computer system may be damaged due to some physical factors like fluctuation in electric power, dust, overheat, etc. Thus to protect our computer from various negative aspects we should provide security to our computer system.
6.     What is hardware security?Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or intentional harm is known as hardware security.
7.     List some of the hardware security measures.Ans: Some of the hardware security measures are:
i) Regular maintenance
ii) Insurance Policy
iii) Power Regulator Device
iv) Fire detectors
v) Protection from theft

8.     What is software security?Ans: The security given to the software and data from being lost or damaged due to accidental or intentional harm is called software security.
9.     List some of the software security measures.Ans: Some of the software security measures are:
i) Backup
ii) Scandisk
iii) Defragmentation
iv) Password
10.  What is voltage regulator device? Give example.Ans: A voltage regulator device is an electrical regulator device designed to automatically maintain a constant voltage level.
E.g.: Spike guard, Volt guard, etc.

11.  What is the function of voltage regulators?
Ans: The voltage regulator automatically maintains a constant voltage level.

12.  What are power protection devices? Give examples.
Ans: The device that provides clean AC power to sensitive electrical equipment are called power protection devices. Examples are: UPS, Volt Guard, Spike guard, etc.

13.  Why is power protection device needed in a computer system?Ans: Power protection device is needed in a computer system to protect the computer system from damage and expensive data loss.
14.  What is UPS?Ans: A UPS is a device that allows computer to keep running for at least a short time when the primary power source is lost. It provides continuous power supply to the computer system and protects them from power surge and voltage fluctuation.
15.  What is importance of UPS in computer security system?Ans: The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.

16.  Why do the computer system need regular maintenance?
Ans: Computer system need regular maintenance to keep the computer hardware in good working condition and it also helps to find out problems in hardware and correct the problems before they cause several damages.

17.  What should be done to protect computer system from fire and theft?
Ans: Fireguards and fire extinguisher should be installed to protect computer system from fire. Alarms, security lighting and closed circuit television cameras should be used to protect computer system from theft.

18.  What is surge protector?
Ans: A device that shields computer and other electronic devices from surges in electric power or transient voltage, that flow from the power supply.


19.  What is password?Ans: A password is a secret word or phrase that gives a user access to a particular program or system.
20.  Write any four criteria for a strong password.
Ans: Any four criteria for strong password are:
·       Do not keep a password which can be easily guessed such as date of birth, nickname, etc.
·       Do not keep word as password that is currently popular.
·       Keep a password with mixture of alphabet and numbers which is difficult to guess.
·       Keep changing your password regularly.

21.  What is password policy?Ans: A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use them properly is called password policy.
22.  What should be done to protect the system form unauthorized access?Ans: To protect a system from unauthorized access, password should be kept in a system which provides security to the system. A password should be difficult to guess and determine and should be changed regularly and memorized.
23.  What is backup?Ans: Backup is a copy of a file which is used in the event of the original file being corrupted.
24.  Why is backup vital to computer system?Ans: Backup is essential to computer security system to recover the important data and programs from accidental and intentional harm. They are stored in different storage devices like hard disk, CDs and pen drives. When the data and software gets lost or damaged the backup system helps to recover the lost or damaged data or software from the backup copy of data and software.
25.  How can software prevent data loss?Ans: Software prevents the data loss by the following ways:
i) Antivirus software can detect and remove virus from the computer.
ii) Scan disk checks folders, bad sector and other error of the disk and fix them.
iii) Software for backup helps in securing the information by keeping backup.
26.  What is scan disk?Ans: Scan disk is a process which involves in maintaining the disk files and folders using a kind of utility software which checks files, folders, bad sectors, lost clusters, lost chains and any errors of the specific disk and  can fix them if it is possible.
27.  What is defragmentation?Ans: The process of re-writing parts of a file to contiguous sectors on a hard disk to increase the speed of access and retrieval is called defragmentation.

28.  What is fragmentation?Ans: The scattering of the parts of the same disk file over different location is called fragmentation.

No comments:

Post a Comment