Tuesday, July 9, 2019

Cyber Law and Computer Ethics

Cyber Law and Computer Ethics



1)     What is cyber law?Ans: The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.

2)     Write down the importance of cyber law.Ans: The importance of cyber law is that it controls cyber-crime and misuse of computer. It also touches almost all aspects of transaction and activities on the cyber space.

3)     What is cyber space?Ans: A virtual space created by computer network, internet and telecommunication is called cyber space.

4)     What are the major laws included in cyber law?Ans: The major laws included in cyber law are:
i) Electronic and Digital Signature law
ii) Computer crime / Cyber crime law
iii) Intellectual property law
iv) Data protection and privacy law
v) Telecommunication law

5)     Why is cyber law needed?Ans: Cyber law is needed to legalize the transaction through electronic media to control various types of electronic frauds and to punish a person who does criminal activities through electronic means especially on computers.

6)   What is cyber-crime?Ans: Cyber-crime is an illegal actions involved in any computer, computer system or over all computer network like the internet.
The example of computer crime are:
i.                 Software piracy
ii.               Hacking
iii.             Cracking
iv.             Pornography

7)     What is a digital signature?
Ans: A digital code (generated and authenticated by public key encryption) which is attached to an electronically transmitted document to verify its contents and the sender's identity.

8)     Write down the importance of digital signature.Ans: The importance of digital signature is that it provides legal framework to facilitate and safeguard electronic transaction in the electronic media.

9)     What is computer ethics?Ans: Computer ethics refers to a kind of international law that gives awareness to the user regarding the immoral behaviour and activities in the computing field.
Computer ethics refers to follow the rules and regulation of computer technology and not to harm other computer users knowingly or unknowingly.

10) Define encryption and decryption.Ans: The process of encoding (scrambling) information in such a way that it is unreadable to all is called encryption.
The process of restoring encrypted data to its original form is called decryption.

11) What is hacking?Ans: Computer hacking means stealing and destroying other data, information, files and program.

12) List some commandments of computer ethics.Ans: Some important commandments of computer ethics are:
i) You should not use computer to harm other people.
ii) You should not search the files or records of other people.
iii) You should not destroy, steal and use others computer password of other people.
iv) You should not steal, destroy, erase or edit personal or group records.
v) You should not disclose the secrecy of computer.

13) What are the major issues address by cyber law?
Ans: The major issues addressed by cyber law are:
i.                 Criminal activities on cyberspace.
ii.               Electronic commerce, online transactions and digital signature.
iii.             Intellectual property right, copyright violation
iv.             The provision of e-governance by promoting electronic recording system

14) What is salami saving? Explain
Ans: When a programmer alters a program so that it subtracts a very small amount of money from each account and alters the fund to the embezzler’s account is called salami saving.

15) What are intellectual property rights?
Ans: The legal property rights of someone over his creations of the mind both artistic and commercial are called intellectual property rights.

16) Explain in short data security and privacy law.
Ans: Data protection and privacy refers to the process of ensuring the preservation, integrity and reliability of data.
The law related to it is called data security and privacy law.

17) State any five major aspects of cyber law of Nepal 2004.
Ans: Five major aspects of cyber law of Nepal 2004 are:
i)                Provides legal status for various banking transaction through electronic media, which will be instrumental in boosting economic activities throughout the world via internet.
ii)              Provides a legal framework to facilitate and safeguard electronic transactions in electronic medium.
iii)            Provides a detailed provision for the controller of certifying authorities to regulate certifying authorities.
iv)             Provides punishment who conducts cyber crime.
v)               Provisions under the act in order to control and regulate the criminal activities apparent in Nepal cyber environment.

Multimedia and Its Applications

Multimedia



1)   What is multimedia?Ans: Multimedia is the integration of multiple forms of media, which presents information in more interesting and understandable way.
2)   Name the five types of media used in multimedia technology.Ans: The five types of media used in multimedia technology are:
i) Text                    ii) Audio         iii) Video
iv) Graphics           v) Animation
3)   What are the hardware components required for multimedia?Ans: The hardware components required for multimedia are:
i) Sound Card                                 ii) Speaker                  iii) Headphones
iv) CD/DVD ROM drive               v) Graphics Card        vi) Microphone
vii) Digital camera                                    viii) Projector
4)   Write down the advantages of multimedia technology.Ans: The advantages of multimedia technology are:
i) It makes teaching/learning easier in classroom.
ii) It makes easy to share views, ideas and thoughts among various people.
iii) It can store data and information for longer period.
iv) It makes presentation of related subject matter attractive.
5)   Write down the disadvantages of multimedia technology.Ans: The disadvantages of multimedia technology are:
i) It needs a multimedia computer and a techno-man to prepare multimedia and is expensive initially.
ii) It is not possible to distribute and use in remote area where poor people stay.
6)   Write down the software packages used for multimedia technology.Ans: The software packages used for multimedia technology are:
i) Adobe Photoshop
ii) Macromedia flash player
iii) Animator Pro
iv) 3D studio MAX
v) Maya
vi) Corel Draw etc.
7)   What is animation?Ans: Animation is a simulation of movement created by displaying a series of pictures or frame.
The moving graphic images is called animation.
8)   What is virtual reality?Ans: Virtual reality is an artificial environment created by computer hardware and software and presented to the user in such a way that it appears real.
9)   What is multimedia computer system? What are the hardware required by multimedia computer system?Ans: A multimedia computer is a computer equipped with special hardware and software that makes multimedia possible.
The components of multimedia computer are:
i) Faster CPU                     ii) Larger storage device                    iii) Large main memory
iv) High resolution monitor          v) Sound card and speaker     vi) Keyboard and pointing device
10)   Why is multimedia technology becoming popular?Ans: Multimedia technology is becoming popular because it shares the ideas, views and thoughts of people in an interactive, effective and understandable way.
11)   Write down the application areas of multimedia technology.Ans: The application areas of multimedia technology are Videogame, Advertisement, Presentation, Films, Public accessing, Learning foreign language, etc.

12) What is the role of multimedia in education?
Ans: The role of multimedia in education is that it allows user to manipulate subject matters according to user’s wish in different forms to make more interactive and effective explanation of the related subject matter to the students by the use of presentation.

13) What is the role of multimedia in advertisement?
Ans: The role of multimedia in advertisement is to use computer animation in advertisement so that it can effectively communicate the usefulness of the product or services.

14) How is multimedia useful in entertainment?
Ans: Multimedia is useful in entertainment to develop special effects in movies and animation and also to develop multimedia games.

15) Differentiate between “animation” and “video”.
Ans: Difference between animation and video are:

Animation
Video
·        
It presents the sequence of still frame images of artwork at a rapid speed that looks like the image is moving.
It presents the moving images of the real events.
·        
It displays the images that contains a small change, for example a leg moves slightly or the wheel of the car turns.
It displays a sequence of slightly varied pictures at speed of 15-30 frames per second and provides the appearance of full motion.
·        
It is used to present the information that can’t be explained in short time by the use of video.
It is difficult to explain but remains in memory of people for long time
·        
For example: Cartoons
For example: Movies.

16) Why are CD-ROMs ordinarily used for supplying multimedia programs?
Ans: CD-ROMs are one of the cheapest, portable and high storage multimedia product, so it is ordinarily used for supplying multimedia programs.

17) Define:
           i)          Hypermedia: An extension of hypertext that supports linking graphics, sound and video elements in addition to text elements is called hypermedia.

         ii)          Edutainment: A form of education which is designed to be entertaining in order to keep people interested and engaged is called edutainment.

18) How is multimedia useful in industrial sector?
Ans: Multimedia is used in business to present information  to share holders, superior and co-workers. It is also used for various purposes such as employee training , sales presentation, products, advertisement, consumer education, etc.

19) What is multimedia presentation software?
Ans: Multimedia presentation software is a tool that computer users of varying industries and backgrounds use to dynamically present information to an audience.

20) Which software helps to introduce VR on the internet?
Ans: Virtual Reality Modeling Language (VRML) helps to introduce VR on the internet.

Computer Virus

Computer Virus



1)     What is computer virus?Ans: Computer virus is a type of computer program which is written by the programmer with the intent of destroying or damaging the data and programs residing in the computer system.
2)     Write down the purpose of creating computer virus.Ans: The purpose of creating computer virus are:
i) To stop computer piracy
ii) To entertain user by displaying interesting message and pictures
iii) To destroy data, information and files
iv) To expose the programmers ability
v) To earn money
3)     How does a computer virus spread from one computer to another?Ans: A virus spreads from one computer to another by:
i) Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
ii) Opening a virus infected email, messages and attached files
iii) Downloading files and programs form the websites which are not secure
iv) Exchanging data and information over a network
4)     What are the symptoms of computer virus?Ans: The symptoms of computer virus are:
i) Program takes long time to load.
ii) The floppy disk or hard disk is suddenly accessed without a logical reason.
iii) Increased use of disk space and growth in file size.
iv) Corrupting the system’s data.
v) Renaming all the files with different names.
5)     Write down the effects of computer virus.Ans: The effects of computer virus are:
i) Virus can change the contents of file, and codes of program.
ii) Degrade the overall performance of computer system.
iii) Change in size of file by adding or removing text accordingly.
6)     Write some preventive ways to protect computer system form virus.Ans: Some preventive measures are:
i) Write protect your floppy disks when using them on other computers.
ii) Scan the mail or unknown files of internet before opening in your computers.
iii) Use a good antivirus program to scan floppy disk, CD, etc. before copying.
iv) Do not install pirated software, especially computer games.
v) Do not interchange the internal disks among the computers.
vi) Do not use free distributed software.
7)     Write down the types of viruses.Ans: The types of viruses are:
i) Boot sector virus
ii) File infector virus
iii) Multipartite virus
iv) Stealth virus
v) Macro virus
8)     What is antivirus software?Ans: Antivirus software is software designed to detect and remove virus from computer system to ensure virus free environment.
9)     Write down any four examples of virus.Ans: Any four examples of viruses are:
i) Disk killer                      ii) Flip             iii) Frodo        iv) Word concept
10) Write any four examples of antivirus software.Ans: Four examples of antivirus software are:
i) Kaspersky                       ii) NOD32       iii) Norton antivirus   iv) McAfee
11) What is boot sector virus?Ans: The virus which destroys or infects the boot sector of the disk where master boot record is stored is called boot sector virus. Eg. Danish Boot, Devel 941, Disk Killer etc.
12) How can boot sector virus harm a PC?Ans: The boot sector virus modifies the Master Boot Record (MBR) that prevents the computer system from being able to boot or start up the computer from system disk.
13) What is program or file virus?Ans: The virus that infects the application program is called program virus. Eg. Acid Rain, Alien.298, Crazy A etc.
14) What is stealth virus?Ans: The most dangerous types of virus which rarely gives the information about its presence in the computer system which generally infects program files and boot records is called stealth virus. Eg. Frodo, Joshi, Whale etc.
15) What is multipartite virus?Ans: The virus which infects both application programs and the boot sector of a disk is called multipartite virus. Eg. Invader, Flip, Tequila dtc.
16) What is Macro virus? Ans: The virus that infects the software document or template created using word processing or spread sheet software is called macro virus. Eg. DMV, Nuclear and Word Concept etc.
17) What is Master Boot Record (MBR)?Ans: MBR is a small program which is responsible for booting computer system.

18) What is computer worm?Ans: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

19) What is Trojan horse?Ans: A Trojan horse is a program that appears harmless, but is, in fact, malicious.


24) Write down the common characteristics of computer virus?Ans: Common characteristics of computer virus are:
i. Replicate and spread on the others files.
ii. Destroy data, information, files or programs of a file.
iii. Steal important data and information.
iv. Load and run unwanted applications.
v. Display the unnecessary messages or pictures.
vi. Cripple the operating system of a computer.
vii. Degrade overall performance of the computer system.

Computer Security | Hardware and Software Security

What is computer security?Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.
2.     What are the main objectives of computer security?
Ans: The main objectives of computer security involves ensuring confidentiality, integrity, and availability of assets or information.

3.               What are the major types of security?
Ans: The types of security are:
·       Hardware security
·       Software security

4.     Write down any five possible threats to computer security?
Ans: five possible threats to computer security are:
·       Human error
·       Computer crime
·       Natural disasters
·       War and terrorist activity
·       Hardware failure

5.     Why do we need to provide security to our computer system?
Ans: We need to provide security to our computer system because if we do not take care of a computer system than our valuable data, information and programs may be lost or damaged. We may lose data, information or programs due to computer viruses. The computer system may be damaged due to some physical factors like fluctuation in electric power, dust, overheat, etc. Thus to protect our computer from various negative aspects we should provide security to our computer system.
6.     What is hardware security?Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or intentional harm is known as hardware security.
7.     List some of the hardware security measures.Ans: Some of the hardware security measures are:
i) Regular maintenance
ii) Insurance Policy
iii) Power Regulator Device
iv) Fire detectors
v) Protection from theft

8.     What is software security?Ans: The security given to the software and data from being lost or damaged due to accidental or intentional harm is called software security.
9.     List some of the software security measures.Ans: Some of the software security measures are:
i) Backup
ii) Scandisk
iii) Defragmentation
iv) Password
10.  What is voltage regulator device? Give example.Ans: A voltage regulator device is an electrical regulator device designed to automatically maintain a constant voltage level.
E.g.: Spike guard, Volt guard, etc.

11.  What is the function of voltage regulators?
Ans: The voltage regulator automatically maintains a constant voltage level.

12.  What are power protection devices? Give examples.
Ans: The device that provides clean AC power to sensitive electrical equipment are called power protection devices. Examples are: UPS, Volt Guard, Spike guard, etc.

13.  Why is power protection device needed in a computer system?Ans: Power protection device is needed in a computer system to protect the computer system from damage and expensive data loss.
14.  What is UPS?Ans: A UPS is a device that allows computer to keep running for at least a short time when the primary power source is lost. It provides continuous power supply to the computer system and protects them from power surge and voltage fluctuation.
15.  What is importance of UPS in computer security system?Ans: The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.

16.  Why do the computer system need regular maintenance?
Ans: Computer system need regular maintenance to keep the computer hardware in good working condition and it also helps to find out problems in hardware and correct the problems before they cause several damages.

17.  What should be done to protect computer system from fire and theft?
Ans: Fireguards and fire extinguisher should be installed to protect computer system from fire. Alarms, security lighting and closed circuit television cameras should be used to protect computer system from theft.

18.  What is surge protector?
Ans: A device that shields computer and other electronic devices from surges in electric power or transient voltage, that flow from the power supply.


19.  What is password?Ans: A password is a secret word or phrase that gives a user access to a particular program or system.
20.  Write any four criteria for a strong password.
Ans: Any four criteria for strong password are:
·       Do not keep a password which can be easily guessed such as date of birth, nickname, etc.
·       Do not keep word as password that is currently popular.
·       Keep a password with mixture of alphabet and numbers which is difficult to guess.
·       Keep changing your password regularly.

21.  What is password policy?Ans: A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use them properly is called password policy.
22.  What should be done to protect the system form unauthorized access?Ans: To protect a system from unauthorized access, password should be kept in a system which provides security to the system. A password should be difficult to guess and determine and should be changed regularly and memorized.
23.  What is backup?Ans: Backup is a copy of a file which is used in the event of the original file being corrupted.
24.  Why is backup vital to computer system?Ans: Backup is essential to computer security system to recover the important data and programs from accidental and intentional harm. They are stored in different storage devices like hard disk, CDs and pen drives. When the data and software gets lost or damaged the backup system helps to recover the lost or damaged data or software from the backup copy of data and software.
25.  How can software prevent data loss?Ans: Software prevents the data loss by the following ways:
i) Antivirus software can detect and remove virus from the computer.
ii) Scan disk checks folders, bad sector and other error of the disk and fix them.
iii) Software for backup helps in securing the information by keeping backup.
26.  What is scan disk?Ans: Scan disk is a process which involves in maintaining the disk files and folders using a kind of utility software which checks files, folders, bad sectors, lost clusters, lost chains and any errors of the specific disk and  can fix them if it is possible.
27.  What is defragmentation?Ans: The process of re-writing parts of a file to contiguous sectors on a hard disk to increase the speed of access and retrieval is called defragmentation.

28.  What is fragmentation?Ans: The scattering of the parts of the same disk file over different location is called fragmentation.