Chapter 10|ICT and Cyber Crime

 


Write very short answer of the following questions

a.     Who used the ICT in a report to UK government in 1997?

Ans: Dennis Stevenson used the ICT in a report to UK government in 1997.

b.     Is mobile a mean of ICT?

Ans: Yes mobile is a mean of ICT.

c.      Give  example of ICT in health sector.

Ans: ICT is used in health sector to keep patients records, treatment analysis, getting information on.

d.     Write any two common hardware tools used in ICT.

Ans: Computer and mobile phone are two common hardware tools used in ICT.

e.      Mention any two software used as ICT tools.

Ans: Ms-Power point, Adobe Photoshop are two software used as ICT tools.

f.        Is online chatting a computer crime?

Ans: No, online chatting is not computer crime.

Write short answer of the following questions:

a.     What is meant by ICT? Write common ICT tools.

Ans: ICT stands for Information Communication Technology. It is a set of technological tools and resources used to process raw data and communicate, disseminate, store and manage information. The common ICT tools are: radio, television, phones, computers and internet etc.

b.     What is cyber crime? Write any four examples.

Ans: Cyber crime is a illegal activity associated with computer system, networks, Internet etc to seal and destroy data as well as harm the ICT related properties is cyber crime. Password Guessing, Hacking, Cracking, Software piracy are the four example of cyber crime.

c.      What is the different between hacking and cracking?

Ans: Hacking is the process of gaining unauthorized access to individual computers or computer network.

Cracking is the process of breaking into copyrighted software or an information system with the intend of releasing software so that it can be used without paying royalties.

d.     List any four positive impact of ICT in the society.

Ans: Four positive impact of ICT in the society are:

·        Near perform any task quickly and accurately.

·        To maintain document secrecy.

·        To process error free result.

·        To transmit information globally.

Write long answer of the following questions:

a.     Explain the role of ICT in different fields.

Ans: The role of ICT in different fields are described below.

1.     ICT in education

·        Enhances learning through interactive tools, e-learning platforms, and digital resources.

·        Facilitates online courses, virtual classrooms, and access to a vast array of educational content.

2.     ICT in communication

·        Enables instant communication through emails, video conferencing, and social media platforms.

·        Facilitates global connectivity, allowing people to communicate across distances easily.

3.     ICT in offices and bank

·        Streamlines office operations with automated processes, digital document management, and efficient data storage.

·        Enhances banking services through online banking, ATMs, and secure electronic transactions.

4.     ICT in health

·        Supports telemedicine, allowing remote consultations and access to healthcare services.

·        Enhances patient care through electronic health records, medical imaging, and diagnostic tools.

b.     Dicuss any five common types of cyber crimes arising in our society these days with their effect.

Ans: The five common types of cyber crimes arising in our society these days with their effect are:

1. Piracy:

 Description: Unauthorized copying, distribution, or use of copyrighted material, such as software, music, movies, and books.

Effect: Causes significant financial losses to creators and companies, undermines intellectual property rights, and can result in legal action against perpetrators.

2. Pornography:

Description: The illegal creation, distribution, or consumption of explicit content, often involving exploitation, including child pornography.

Effect: Contributes to social harm, exploitation, and the degradation of societal values. It can also lead to criminal charges and severe psychological impact on victims.

3. Hacking:

Description: Unauthorized access to computer systems, networks, or devices to steal, manipulate, or destroy data.

Effect: Leads to data breaches, loss of confidential information, financial damage, and compromised personal or national security.

4. Phishing:

Description:Fraudulent attempts to acquire sensitive information by pretending to be a trustworthy entity in digital communication.

Effect: Results in identity theft, financial losses, and breaches of personal or corporate security.

5. Ransomware:

Description:Malware that locks or encrypts a victim’s files, demanding payment for the decryption key.

Effect: Causes financial loss, disrupts business operations, and can lead to the permanent loss of data if the ransom is not paid.

Post a Comment

0 Comments