Thursday, September 3, 2020

Computer Security – SEE Computer Science – Grade X [New Course] #2076B.S. #Solved Objectives of Asia Publications

 Computer Security – SEE Computer Science – Grade X [New Course] #2076B.S. #Solved Objectives of Asia Publications



1.               Fill in the blanks:

 Set 1

 a)     Computer Security is the process of preventing and detecting unauthorized use of your computer.

b)     Confidentiality refers to protecting information from disclosure.

c)     Computer Emergency Response Team (CERT) has defined threats as “any circumstances or events

that have potential to cause harm to a system or a network.”

d)     A firewall is a system design to prevent unauthorized access to or from a private network.

e)     Antivirus software is a program designed to detect and remove viruses from the computer system.

 

Set 2

 

a)     Hardware security protects the machine and peripheral hardware from theft, electronic, intrusion

and damage.

b)     The temperature in the computer system should be maintained between 210C to 240C.

c)     Security lighting and closed-circuit television cameras are the methods of hardware protection.

d)     UPS is a device that allows your computer to keep running for at least a short time when the primary

power source is lost.

e)     Voltage regulator is a device or circuit that maintains a load voltage nearly constant over a range of

variations of input voltage and load current.

 

 

2. Tick the correct response and correct the wrong one:

 

Set 1

 

a)     Security attacks comprise all actions that breaches the computer security. True

b)     Information Security programs are build around 3 objectives, commonly known as  CIA

(Confidentiality, Integrity, Availability). True

c)     Availability refers to ensuring that the data or information is not corrupted or modified by

unauthorized users. False

d)     Firewalls prevent unauthorized internet users from accessing private networks connected to the

internet, especially intranets. True

e)     The encrypted information is called plain text. False

 

Set  2

 

a)     Routine servicing of hardware is a must to keep equipment in good operating condition and to find and correct problems before they develop into severe malfunctions. True

b)     The temperature in the computer system should be maintained between 31°C to 34°C. False

c)     Computer equipment should be used and stored at a relative humidity of 50 percent with 5 percent variation. True

d)     Security lighting and closed-circuit television cameras are the methods of software protection. False

e)     A computer requires a constant source of electrical power.  True

 


 

3. Write the technical terms for the following statements:

 

Set  1

 

a)     The practice of preventing unauthorized access, use, disclosure, disruption, disruption, modification, inspection, recording or destruction of information. Information security

b)     A set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. Password policy

c)     The process of identifying individuals for authentication. Biometric

d)     A system designed to prevent unauthorized access to or form a private network. Firewall

e)     The process of converting ordinary plain text into unintelligible text and vice-versa. Cryptography

 

Set  2

 

a)     A program designed to detect and remove viruses from the computer system. Antivirus software

b)     A type of security that protects the machine and peripheral hardware from theft, electronic intrusion and damage. Hardware security

c)     A device that allows your computer to keep running for at least a short time when the primary power source is lost. UPS

d)     A device or circuit that maintains a load voltage nearly constant over a range of variations of input voltage and load current. Voltage regulator

e)     A device that shields computer and other electronic devices from surges in electrical power, or transient voltage, that flow from the power supply. Surge suppressor

 

4. Give the full forms of the following abbreviations:

a)     CIA – Confidentiality, Integrity, Availability

b)     CERT- Computer Emergency Response Team

c)     UPS – Uninterruptible Power Supply

 

5. Select the best answer from the list of choices. [MCQ]

 

            Set-1

 

a.      The ................... threats arise from hackers who intrude into systems posing as authorized users.

i.

Authorization

ii.

Application

iii.

Physical security

iv.

All of the above

b.     ...............is a method of storing and transmitting data in a particular form so that only those for it is intended can resd and process it.

i.

Firewall

ii.

Biometrics

iii.

Cryptography

iv.

All of the above

c.      ....................... protect the machine and peripheral hardware from theft, electronic intrusion and damage.

i.

Information security

ii.

Hardware security

iii.

Software security

iv.

None of the above

 

                    Set-2

 

a.      Some of the methods of hardware protetion are ...................

i.

Fire Alarms

ii.

Security lighting

iii.

Closed-circuit cameras

iv.

All  of the above

b.     The temperature in the computer system should be maintained between .................to............................

i.

210C and 240C

ii.

200C and 250C

iii.

230C and 280C

iv.

None of the above

c.      ........................ is a device that protect your PC against power surges and spikes.

i.

UPS

ii.

Voltage regulator

iii.

Surge suppressor

iv.

All  of the above

 

6. Match the following:

 

a)     Information security

c) The process of preventing and  detecting unauthorized use of your computer

b)     Biometrics

a) The practice of preventing unauthorized access, use, disclosure, disruption,  modification, inspection, recording or destruction of information.

c)     Computer security

b) The process of identifying individuals for authentication.

d)     Cryptography

e) A system designed to prevent unauthorized access to or from a private network.

e)     Firewall

d) The process of converting ordinary plain text into unintelligible text and vice-versa.

 

 #ThankYou Bandana Khadka, Shreyasha Dhakal and Aadesh Rai for Typing support

 

 

 

                                                                           

           

 

 

Thursday, July 23, 2020

Solved - Computer Fundamentals - Grade 10 [Computer Science]

Solved - Computer Fundamentals - Grade 10 [Computer Science]


3. Give appropriate technical terms of the following.

a) Data transmission in one direction only that is to send or receive only

- Simplex Mode

b) Device used to connect a PC with a telephone line

-MODEM

c) A network limited with a room or building

-LAN

d) The computer on which users run applications

-Client

e) Cabling structure of LAN

-Topology

f) Each computer or device on a network

-Node

g) A device that controls two dissimilar networks

-Gateway

h) The amount of data that can be transmitted through communication channels

in a fixed time period

-Bandwidth

i) A server where incoming emails are collected in mailbox

-Mail server

j) A computer that provides services to other computer

-Server

k) Operating system that can handle network

-NOS

l) A cable that transmits light signals

-Fiber-optic cable

m) Connection of two or more computers to share information

-Computer Network

n) The network of networks

-Internet

o) Sending and receiving messages electronically through the Internet

-E-mail

p) Buying and selling of goods, products, or services over the Internet

-E-commerce

q) The websites that search documents for specified keywords in WWW

-Search Engine

r) A port on the back of the system unit to connect a computer in network

-NIC Card

4. Choose the correct answer

a. Which is not a communication media?

i) wire ii) microwave iii) satellite iv) NIC

b. A hub is connected in……..

i) Ring Topology ii) Bus Topology

iii) Star Topology iv) None of above

c. A ………… is two or more LANs connected together, generally across a

large geographical area.

i) CAN ii) MAN iii) WAN iv) SAN

d. A term relating to sending data to a satellite is……

i) downlink ii) modulate iii) uplink iv) download

e. Which communication media is the highest bandwidth?

i) Twisted pair ii) Co-axial cable iii) Fiber optics iv) Microwave

f. Which is the service of Internet?

i) IRC ii) Telnet iii) Email iv) All of above

g. Which is bounded media?

i) fiber optic ii) microwave iii) infrared iv) laser

h. ……… is used to transfer file from one computer to another through Internet.

i) FAQ ii) IRC iii) FTP iv) TPF

i. Which is the service of remote login?

i) Video Conference ii) FTP iii) Telnet iv) TCP/IP

j. The connection pattern of computers in network is…….

i) protocol ii) topology iii) twisted pair iv) all of them

k. Which is the network software?

i) POP ii) FTP iii) TCP/IP iv) Unix

5. Fill in the blanks.

a) Simplex Mode is a unidirectional mode of data transmission.

b) BNC and T connectors are the most popular connector used in co-axial

cable.

c) Repeaters  are used to amplify the signal for long distance communication

in microwave.

d) The interconnection of many computers to share information is Computer network.

e) NIC stands for Network Interface Card.

f) MODEM can convert analog signal to digital signal and the vice versa.

g) Novell Netware is the popular NOS.

h) NCP was the first protocol.

i) MAN is a network within area like valley, city, metropolitan, etc.

connected through wire or wireless technology.

j) HUB is the central device and all other computers are connected to the

central device.

k) Internet was originated in 1969 AD.

l) World Wide Web was developed by Tim Berners Lee.


Publisher:

Government of Nepal

Ministry of Education, Science and Technology

Curriculum Development Centre

Sanothimi, Bhaktapur

Printing: Janak Education Materials Centre Ltd.

Sanothimi Bhaktapur