Unit 4 – Data and Privacy (Short Questions)

Q.1  What are computer ethics?

Q.2  List any five issues related to data security.

Q.3  Define confidentiality.

Q.4  What is data privacy?

Q.5  Why confidentiality and privacy has become critical?

Q.6  What is meant by piracy?

Q.7  Differentiate between authorized and unauthorized access.

Q.8  What do you mean by software piracy?

Q.9  What type of software is available at no cost?

Q.10  What is key?

Q.11  Define cracking.

Q.12  List five types of software piracy.

Q.13  What is softlifting?

Q.14  What Is client-server overuse?

Q.15  What Is hard disk loading?

Q.16  What Is counterfeiting?

Q.17  What is meant by online piracy?

Q.18  How are computers used for fraud and misuse?

Q.19  What Is patent?

Q.20 Why Is It Important to register a patent?

Q.21 What do you mean by copyright?

Q.22 What Is meant by trade secrets?

Q.23 Why is It important to protect trade secrets?

Q.24 What Is sabotage?

Q.25 Give five examples of the organizations that store data of the people in computers?

Q.26 Give five examples of the organizations that store data of the people in computers?

Q.27 What are cookies?

Q.28 Define encryption.

Q.29 What is ciphertext?

Q.30 Define decryption.

Q.31 How Is the encrypted data converted into plain data?

Q.32 Why is encryption performed?

Q.33 What is substitution cipher method?

Q.34 What is Caesar cipher method?

Q.35 Who was Caesar?

Q.36 Write any two quotes of was Caesar?

Q.37 What is Vigenere cipher method?

Q.38 What Is Vigenere cipher table?

Q.39 What is meant by interim cipher?

Q.40 What is Vigenere cipher widget?

Q.41 What ls random substitution method?

Q.42 What do you know about frequency analysis?

Q.43 What is the purpose of password?

Q.44 Write any three characteristics of a good password.

Q.45 Differentiate between cryptographic key and password.

Q.46 What is CAPTCHA?

Q.47 What is cybercrime?

Q.48 How do the criminals access personal information?

Q.49 List any three types of cybercrimes.

Q.50 What Is identity theft?

Q.51 How does transaction fraud occur?

Q.52 How does advance fee fraud occur?

Q.53 What is hacking and hacker?

Q.54 When does hacking usually happen?

Q.55 What is spyware?

Q.56 What is National Response Centre against cybercrime?

Q.57 What is phishing attack?

Q.58 What Is meant by denial of service?


Q.1. What are computer ethics?
Answer:
Computer ethics are the moral rules and guidelines that determine the proper use of computer system. The computer should be used according to the ethics in order to avoid any problem in the society.

Q.2. List any five issues related to data security.
Answer:
Five issues related to data security are confidentiality & privacy, piracy, patent, copyright and trade secret.

Q.3. Define confidentiality.
Answer:
Confidentiality is the responsibility to keep other’s personal information private. It is a matter of taking care of other people.

Q.4. What is data privacy?
Answer:
Data privacy refers to the right of an individual or an organization to keep personal information private. It is typically related to the personal information stored on the computer.

Q.5. Why confidentiality and privacy has become critical?
Answer:
The privacy and confidentiality has become very critical due to the use of computer and the Internet. The potential threat to the personal data includes the improper use of computerized data.

Q.6. What is meant by piracy?
Answer:
Piracy refers to the process of making illegal copies of any work protected by the copyright law. It can be a book, software, song, movie, poetry, painting or house design etc.

Q.7. Differentiate between authorized and unauthorized access.
Answer:
The process of accessing a computer system and its resources legally is called authorized access. The process of accessing a computer system and its resources illegally is called unauthorized access.

Q.8. What do you mean by software piracy?
Answer:
Software piracy is the illegal copying, distribution of use of copyright software. Most licensed software can only be used by one user on one computer. The user can copy the software for backup but it is illegal to use it on different computer.

Q.9. What type of software is available at no cost?
Answer:
The open source software is available at no cost. Anyone can modify the source code and redistribute it.

Q.10. What is key?
Answer:
The software, companies sell software along with a confidential text called key. The software can be activated using the key. The key is only given to the users who legally buy the software.

Q.11. Define cracking.
Answer:
Some people try to get software key using illegal means. This process is known as cracking.

Q.12. List five types of software piracy.
Answer:
Five types of software piracy are soft lifting, client-server overuse, hard disk loading, counterfeiting and online piracy.

Q.13. What is softlifting?
Answer:
Sott1ifting is a process of borrowing a software application from a colleague and installing it on your device.

Q.14. What is client-server overuse?
Answer:
Client-server overuse is a process of installing more copies of the software than number of licenses. It is typically done in client-server network.

Q.15. What is hard disk loading?
Answer:
Hard disk loading is a process of installing and selling unauthorized copies of the software on new or refurbished computers

Q.16. What is counterfeiting?
Answer:
Counterfeiting is a process of selling the duplicate copies of the software.

Q.17. What is meant by online piracy?
Answer:
Online piracy is a process of downloading the illegal copies of software.

Q.18. How are computers used for fraud and misuse?
Answer:
Fraud and misuse refers to the unauthorized activities. The computers and the Internet are frequently used to perform such activities. It includes theft of money by electronic means, theft of services and theft of valuable data.

Q.19. What is patent?
Answer:
A patent is a right that is granted to the owner for a certain period of time. It is effective way to protect the idea. It can be for any invention such as device. substance, method or process. Any other person or organization cannot copy that idea for a certain period of time.

Q.20. Why is it important to register a patent?
Answer:
It is important to register a patent if someone is doing research in any field and has a new idea. It stops other people to make or sell anything on the basis of that idea. The owner of the idea can exclusively use the idea to make and sell anything.

Q.21. What do you mean by copyright?
Answer:
A copyright is a type of legal protection that protects some idea or product from being copied. It is illegal to use any copyrighted material such as book, software, picture, video or music. The copyright symbol is usually used with copyrighted material.

Q.22. What Is meant by trade secrets?
Answer:
Trade secrets refer to the secret information of a company that play important role for its success. They have a lot of value and importance for the company. They provide the company an advantage over the other companies.

Q.23. Why is it important to protect trade secrets?
Answer:
The trade secrets must be protected carefully. It ensures that company has a competitive advantage over others. The unauthorized use of trade secrets can harm the company.

Q.24. What is sabotage?
Answer:
Sabotage is a serious attack on a computer system. A malicious user can attack the computer system remotely over the network. The attacker may include virus with some free software. It may change or destroy information and sabotage important data on the system.

Q.25. Give five examples of the organizations that store data of the people in computers?
Answer:
Five examples of these organizations are hospitals, NADRA, schools, Board of Intermediate and Secondary Education and passport offices.

Q.26. What is meant by data brokers?
Answer:
There are many companies that collect buy and sell the consumer information. These companies are known as data brokers. They use this information to know the interests of the people.

Q.27. What are cookies?
Answer:
A lot of information is generated when the user browse the Internet. This information is usually stored with the Web surfer known as cookies. The cookies can track the interests of the people when they visit different websites.

Q.28. Define encryption.
Answer:
Encryption is the process of encoding plain data into unreadable format.

Q.29. What is ciphertext?
Answer:
The unreadable format of data is called ciphertext. It is performed in encryption.

Q.30. Define decryption.
Answer:
The process of converting ciphertext back to plain text is called decryption.

Q.31. How Is the encrypted data converted into plain data?
Answer:
A secret code is required to convert the encrypted data into plain data in order to read it. The secret code is called key and is just like a password.

Q.32. Why is encryption performed?
Answer:
The encryption is performed to ensure that only authorized persons can read the data. It is an important method of providing data security. It ensures protection from hackers and privacy. The dote is protected when transferred across devices.

Q.33. What is substitution cipher method?
Answer:
Substitution cipher method is a method of encryption in which the characters of original text are replaced with some other characters. The substitution is done by a fixed predefined system. Two types of substitution cipher methods are Caesar cipher and vigenere cipher.

Q.34. What is Caesar cipher method?
Answer:
Caesar cipher method replaces each alphabet in the plain text with another alphabet. Each alphabet is replaced with the alphabet that is at a fixed number of positions to the left or right of original alphabet.

Q.35. Who was Caesar?
Answer:
Caesar was a Roman politician and military general. He was born in July 13, 100 BC, Rome, Italy. He played on important role in the rise of Roman Empire, He was killed on March 15, 44 BC.

Q.36. Write any two quotes of was Caesar?
Answer:
Experience is the teacher of things. Men freely believe that which they desire.

Q.37. What is vigenere cipher method?
Answer:
Vigenere cipher method uses a table known as Vigenere Cipher table. The Vigenere cipher method works with substitution key. The key is combined with the plaintext to generate the ciphertext.

Q.38. What is Vigenere cipher table?
Answer:
The Vigenere cipher table consists of 26 rows and 26 columns. The first row contains the original alphabets from A to Z. The alphabet is shifted one letter to the left in each subsequent row. The rows and columns are labeled by alphabets from A to Z.

Q.39. What is meant by interim cipher? .
Answer:
In some cases, the key in Vigenere method may have less number of cases than the  plaintext. The letters from the beginning of the plaintext are used to make the length of the key  same as the plaintext. It is known as interim ciphertext.

Q.40. What is Vigenere cipher widget?
Answer:
The Vigenere cipher widget shows animation of the encryption and decryption of  plaintext. It uses Vigenere cipher method according to the given key.

Q.41. What is random substitution method?
Answer:
The messages encrypted with Caesar cipher method are easy to crack. This method can be modified by shifting the letter to a random letter. This is called random substitution cipher method.                         –

Q.42. What do you know about frequency analysis?

The frequency analysis is the study of the frequency of letters or group of letters in a Ciphertext. This method is used as an aid to break the classical ciphers.

Q.43. What is the purpose of password?
Answer:
The purpose of password is to protect data stored on a computer. It protects data from  being lost, misused or deleted by any person. The system can be accessed by a person who  knows the password. Password can be changed only by authorized person:

Q.44. Write any three characteristics of a good password.
Answer:
A good password consists of at least eight characters. It does not contain username, real name, children name or company name. It is different from previous passwords.

Q.45. Differentiate between cryptographic key and password.
Answer:
The cryptographic key is used to read an encrypted message whereas password is used  for authentication to enter a system whereas. A key is not same as a password in computer  security but a password can be used as a key. A password is generated, read, remembered  and reproduced by humans but a key is used by software or humans to process a message.

Q.46. What is CAPTCHA?
Answer:
CAPTCHA is a set of random letters and numbers that appear as a distorted image and  a textbox. The user needs to type the characters in the image into the textbox to gain access  to the system. CAPTCHA text is only readable by humans not the computer.

Q.47. What is cybercrime?
Answer:
A cybercrime is a criminal activity carried out by means of computers and the Internet. In some cybercrimes, the computer is used to commit a crime such as fraud, kidnapping, murder and stealing money from bank account or credit card.

Q.48. How do the criminals access personal information?
Answer:
The criminals use Internet to access the personal information such as username,  password and credit card number.

Q.49. List any three types of cybercrimes.
Answer:
Three tyPE3S of cybercrimes are identity theft, transaction fraud and hacking.

Q.5O. What Is identity theft?
Answer:
The identity theft is a criminal activity in which the hacker traps someone to give the  account details and password. The hacker can then use the account of the user to perform  any malicious activities.

Q.51. How does transaction fraud occur?
Answer:
The transaction fraud is a criminal activity in which the scammer performs an illegal  transaction. For example, the scammer offers an item for online. Someone buys the items and  makes the payment but the scammer never delivers the item.

Q.52. How does advance fee fraud occur?
Answer:
The advance fee fraud is a criminal activity in which the criminal informs the user that he has won a prize or lottery. He then asks the user to submit a processing fee so the prize may be  dispatched. It is very common type of cybercrime in which people lose the money.

Q.53. What is hacking and hacker?
Answer:
An act of unauthorized access to the computer or network is called hacking. The person  who gains unauthorized access to the computer system is called hacker. The hackers are  computer experts and use their knowledge to break into the computer system and network.

Q.54. When does hacking usually happen?
Answer:
Hacking usually happens when user downloads a file from the Internet and executes it. The software connects hacker to the computer. The hackers typically access the information  for financial benefits such as stealing money from bank account or using credit card.

Q.55. What is spyware? 
Answer:
Spyware is a type of software that is used in hacking. It connects the hacker to the computer to access important information without user knowledge. It runs in the background and collects information such as bank details and passwords.

Q:56. What is National Response Centre against cybercrime?
Answer:
The National Response Centre for cybercrime is a law enforcement agency of Pakistan. It is dedicated to fight cybercrimes. It is working under Federal Investigation Agency (FIA). Its website is www.nr3c.gov.pk.

Q.57. What is phishing attack?
Answer:
A phishing attack is a criminal activity in which the criminal uses fake email and website  to get sensitive information such as username, password and credit card details.

Q.58. What Is meant by denial of service?
Answer:
A Denial of Service (DoS) is a cyber-attack that makes a machine or network resource unavailable. The attack makes the resource too busy by sending many requests for it. The actual user cannot get it. It sometimes overloads system so much that network is shut down.