Class-X-Solved Exercise:
Unit-6- Web Applications
(Session-7 Online Transactions)
(Session-8 Internet Security)
1. Fill in the blanks:
a. Online shopping is a form of ____________.
Answer: E-commerce.
b. To perform an online transaction, a web browser and an _______is required.
Answer: Active Internet
c. Flipkart, Amazon and India Mart are_____ where you can purchase a variety of goods.
Answer: Online store
d. _________ and ________ programs offer real-time protection monitoring your computer for any changes by malware software.
Answer: Antivirus, Antispyware
e. _______ analyze the network traffic and determine if the traffic should be allowed or not.
Answer: Firewalls
f. ________ are programs that are created on your local computer when you visit websites.
Answer: Cookies
2. Write T for true and F for false against the statement.
a. For online transaction, we just need an internet connection.
Answer: T
b. An Online transaction can be done only if we have a net-banking account.
Answer: F
c. Backup of data must be taken regularly to avoid loss of any data.
Answer: T
d. A strong password is the one that consists of only lowercase alphabets.
Answer: F
e. An e-commerce website is safe and secure only if it contains digital certificate.
Answer: T
3. Multiple choice questions. Tick the correct answer.
1. ______ are most commonly used to identify return visitors to a website.
a. cookies b. logged-in visitors c. digital certificates d. none
Answer: Cookies
2. Customers being able to buy products and services on the internet is a result of :
a. E-business b. E-marketing c. E-purchasing d. E-commerce
Answer: E-commerce
3. A digital certificate.
a. is an electronic message uniquely identifying the message sender.
b. is a summary of a plain text document.
c. is a reliable third party that authenticates the message sender.
d. is used to identify the owner of a private key and related public key.
Answer: is a reliable third party that authenticates the message sender.
4. Which one of the following is not an example of online threat?
a. spam b. Trojan c. phishing d. spoofing
Answer: Spam
5. Which of the following software is used to monitor a user's online activity and pass information to someone else in the background?
a. malware b. spyware c. adware d. none
Answer: Spyware
6. Firewall is a type of
a. virus b. online threat c. malware d. none.
Answer: None
4. Short answer questions.
1. Explain the purpose of online transactions.
Answer: Online transactions helps us to save our time, money, paper etc. Online transaction is easy and it can be done from any where any time.
2. List any three advantages of online transactions.
Answer: Three advantages of online transactions:
1. All time availability
2. Comparison of prices.
3. Saves times and energy.
3. List any five websites that allow online transactions.
Answer: Five websites for online transactions.
1. Amazon
2. Flip cart
3. PayPal
4. Checkout
5. Stripe
4. List any three payment tools to use online transactions.
Answer: Three mode of online payments.
1. Credit card
2. Debit card
3. Net Banking
5. Explain the purpose of internet Security.
Answer: Internet security is a branch of computer security specifically related to the Internet. Internet Security purpose is browser security and network security. Its objective is to establish rules and measures to use against attacks over the Internet.
6. Explain different kinds of online threats.
Answer: Online threats:
1. Trojan: Trojan is one of the most complicated threats among all. Most of the popular banking threats come from the Trojan family.
2. Virus: It is a malicious program where it replicates itself and aims to only destroy a computer.
3. Worms: One of the most harmless threats where it is program designed only to spread.
4. Spyware
5. Phishing
6. Cookies.
7. Explain the use of data encryption.
Answer: Data encryption means translate a message into a code so that only those person can read this message who have secret key or password.
8. What is a firewall?
Answer: A computer firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another.
9. What do you mean by taking backup of data? Why is it required?
Answer: Always keep copies of personal data in additional media such as compact dics, pen drives, etc. This could be helpful in situation when there is a loss of data.
10. What are coolies?
Answer: Coolies are programs that are created on your local computer when you visit websites in order to store browsing information.
11. What is a Digital certificate? What is its significance?
Answer: Digital certificate is a digital password that allow a person to exchange information securely using public key. Digital certificate is also known as public key certificate.
12. What are the characteristics of a strong password?
Answer: Characteristic of strong password.
1. Keep the length of the password at least 12-14 characters if permitted.
2. Avoid keeping passwords based on repetition, dictionary words, letter, number, username etc.
3. Include numbers and symbols is passwords if allowed.
13. List any three ways to protect your data from online threats.
Answer:
Delete Cookies: When you disable and clear cookies you cut down on the personal data cybercriminals can obtain.
Browser extensions and add-ons: Browser extensions and add-ons add extra functionality to your browser such as ad blocking or search bars. These add-ons pose a security risk.
Google chrome security: Google chrome security has security measures in place to help protect you as you browse the web.
14. What is the difference between an Antivirus and an Antispyware software?
Answer: Antivirus is a software which is designed to detect, block and removing viruses from computer system. Antispyware is program or software which is designed to detect specific set of malicious software.
15. List any three ways to ensure secure online transactions.
Answer:
Use Strong Password: Passwords ensure the security and confidentiality of data that is stored on various workstations and servers across campus.
Use Firewalls: A computer firewall controls access between networks. It generally consists of gateways and filter which vary from one firewall to another.
Browser Security: Your browser is the window to the Internet and also the first line of defence against malware threats.
Some other links:
No comments:
Post a Comment