9th Class Computer Chapter 4 Data and Privacy Short Questions Answer

9th Class Computer Chapter 4 Data and Privacy Short Questions Answer

We are providing all Students from 5th class to master level all exams preparation in free of cost. Now we have another milestone achieved, providing all School level students to the point and exam oriented preparation question answers for all science and arts students.

After Online tests for all subjects now it’s time to prepare the next level for Punjab board students to prepare their short question section here. We have a complete collection of all classes subject wise and chapter wise thousands questions with the right answer for easy understanding.

Here we are providing complete chapter wise Computer questions and Answers for the 9th class students. All the visitors can prepare for their 9th class examination by attempting below given question answers.

In this List we have included all Punjab boards and both Arts and Science students. These Boards students can prepare their exam easily with these short question answer section

Lahore Board 9th classes short questions Answer

Rawalpindi Board 9th classes short questions Answer

Gujranwala Board 9th classes short questions Answer

Multan Board 9th classes short questions Answer

Sargodha Board 9th classes short questions Answer

Faisalabad Board 9th classes short questions Answer

Sahiwal Board 9th classes short questions Answer

DG Khan Board 9th classes short questions Answer

Bahwalpur Board 9th classes short questions Answer

All above mention Punjab Boards students prepare their annual and classes test from these online test and Short question answer series. In coming days we have many other plans to provide all kinds of other preparation on our Gotest website.

How to Prepare Punjab Board Classes Short Question Answer at Gotest

  • Just Open the desired Class and subject which you want to prepare.
  • You have Green bars which are Questions of that subject Chapter. Just click on Bar, it slides down and you can get the right answer to those questions.
  • You can also Rate those question Answers with Helpful or not to make it more accurate. We will review all answers very carefully and also update time to time.

Now you can start your preparation here below

What are computer ethics?

Computer ethics are the moral rules and guidelines that determine the proper use of computer system. The computer should be used according to the ethics in order to avoid any problem in the society.

List any five issues related to data security?

Five issues related to data security are confidentiality & privacy, piracy, patent, copyright and trade secret.

Define confidentiality?

Confidentiality is the responsibility to keep other’s personal information private. It is a matter of taking care of other people.

What is data privacy?

Data privacy refers to the right of an individual or an organization to keep personal information private. It is typically related to the personal information stored on the computer.

Why confidentiality and privacy has become critical?

The privacy and confidentiality have become very critical due to the use of computers and the Internet. The potential threat to the personal data includes the ‘improper use of computerized data.

What is meant by piracy?

Piracy refers to the process of making illegal copies of any work protected by the copyright law. It can be a book, software, song, movie, poetry, painting or house design etc.

Differentiate between authorized and unauthorized access.

The process of accessing a computer system and its resources legally is called authorized access. The process of accessing a computer system and its resources illegally is called unauthorized access.

What do you mean by software piracy?

Software piracy is the illegal copying, distribution or use of copyright software. Most licensed software can only be used by one user on one computer. The user can copy the software for backup but it is illegal to use it on different computer.

What type of software is available at no cost?

The open source software is available at no cost. Anyone can modify the code and redistribute it.

What is key?

The software companies sell software along with a confidential text called key. The software can be activated using the key. The key is only given to the users who legally buy the software.

Define cracking?

Some people try to get software key using illegal means. This process is known as cracking.

List five types of software piracy?

Five types of software piracy are soft lifting, client-server overuse, hard disk loading counterfeiting and online piracy.

What is softlifiing?

Softlifiing is a process of borrowing a software application from a colleague and, installing it on your device.

What is client-server overuse?

Client-server overuse is a process of installing more copies of the software than number of licenses. It is typically done in client-server network.

What is hard disk loading?

Hard disk loading is a process of installing and selling unauthorized copies of the software on new or refurbished computers.

What is counterfeiting?

Counterfeiting is process of selling the duplicate copies of software.

What is meant by online piracy?

Online piracy is a process of downloading the illegal copies of software.

How are computers used for fraud and misuse?

Fraud and misuse refer to the unauthorized activities. The computers and the internet are frequently used to perform such activities. It includes theft of money by electronic means, theft of services and theft of valuable data.

What is patent?

Patent is a right that is granted to the owner for a certain period of time. It is effective way to protect the idea. It can be for any invention such as device, substance, method or process. Any other person or organization cannot copy that idea for a certain period of time.

Why is it important to register a patent?

It is important to register a patent if someone is doing research in any field and has a new idea. It stops other people to make or sell anything on the basis of that idea. The owner of the idea can exclusively use the idea to make and sell anything.

What do you mean by copyright?

A copyright is a type of legal protection that protects some idea or product from being copied. It is illegal to use any copyrighted material such as book, software, picture, video or music. The copyright symbol is usually used with copyrighted material.

What is meant by trade secrets?

Trade secrets refer to the secret information of a company that play important role for its success. They have a lot of value and importance for the company. They provide the company an advantage over the other companies.

Why is it important to protect trade secrets?

The trade secrets must be protected carefully. It ensures that the company has competitive advantage over others. The unauthorized use of trade secrets can harm the company.

What is sabotage?

Sabotage is a serious attack on a computer system. A malicious user can attack the computer system remotely over the network. The attacker may include virus with some free software. It may change or destroy information and sabotage important data on the system.

Gove five examples of the organizations that store data of the people in computers?

Five examples of these organizations are hospitals, NADRA, schools, Board of intermediate and Secondary Education and passport offices.

What is meant by data brokers?

There are many companies that collect, buy and sell the consumer information. These companies are known as data brokers. They use this information to know the interests of the people.

What are cookies?

A lot of information is generated when the user browses the Internet. This information is usually stored with the Web surfer known as cookies. The cookies can track the interests of the people when they visit different websites.

Define encryption.

Encryption is the process of encoding plain data into unreadable format.

What is cipher text?

The unreadable format of data is called cipher text. It is performed in encryption.

Define decryption?

The process of converting cipher-text back to plain text is called decryption.

When does hacking usually happen?

Hacking usually happens when user downloads a file from the Internet and executes it. The software connects hacker to the computer. The hackers typically access the information for financial benefits such as stealing money from bank account or using credit card.

What is spyware?

Spyware is a type of software that is used in hacking. It connects the hacker to the computer to access important information without user knowledge. It runs in the background and collects information such as bank details and passwords.

What is National Response Center against cybercrime?

The National Response Center for cybercrime is a law enforcement agency of Pakistan. It is dedicated to fight cybercrimes, it is working under Federal investigation Agency (FIA). Its website is www.nr3c.gov.pk.

What is phishing attack?

A phishing attack is a criminal activity in which the criminal uses fake email and website to get sensitive information such as username, password and credit card details.

What is meant by denial of service?

A Denial of Service (DOS) is a cyber-attack that makes a machine or network resource unavailable. The attack makes the resource too busy by sending many requests for it. The actual user cannot get it. It sometimes overloads system so much that network is shut down.

You Can Learn and Gain more Knowledge through our Online Quiz and Testing system Just Search your desired Preparation subject at Gotest.

One Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button