1. HTTPS protocol encrypts the information or data using a.....certificate.
  2. ......software are computer programs which identify and remove viruses from our computer.
  3. encrypted data is refferred to as .......text.
  4. when the same sentence structure is used with synonyms for the appropriate words of the sentence,it is called.......plagiarism.
  5. the simplest way to prevent plagiarisam is the....method.

C.State True or flase

  1. plagiarism may occur due to a lack of interest in one's work.( )
  2. piracy is concerned with personal information.( )
  3. patent for innovations is an industrial property.( )
  4. we should never share our password and PIN number with unauthorised personnels.( )
  5. encryption is the process of transforming data into a redable code.( )
  6. the internet offers us convenient ways to shop from our homes or offices for almost everything.( )
  7. good ethics means that the company provides the most reliable information about products or services.( )
  8. boing business legally and ethically only benefits the customers and not the company.( )
  9. renting means unauthorised sharing of software for temporary use for some nominal charges.( )
  10. apache licence version 2.0 is an open source soft ware licence.( )

D.Answer in one word or a sentence

  1. Successful security solutions require a convergence of three components.name these components.
  2. what are the most commom forms of identification and authentication.
  3. name the process of transforming data into an urreadable code.
  4. name the term for any digital information related to you or created by you,which may be stored online?
  5. which type of licences offer users the right to run, study,share,modify,and distribute copies and modified versions of the soft ware with the condition that the same rights be preserved for its derivatives?
  6. what is the other name for literary theft?
  7. name the term used for the right to seek,receive,and impart information and ideas,through any media.
  8. which type of software has no ownership or copyright assoclated withit?
  9. give the full form of BSD licences.
  10. when the user doesnot really understand how to properly paraphrase ,piagiarism is he committing

ANSWERS

1.(d) 2.(c) 3.(a) 4.(b) 6.(a) 7.(b) 8.(d) 9.(b) 10.(d)
1.etticks 2.failure 3.bumpster biving 4.cybertheft 5.shoulder surfing 6.temport layer security (TLS) 7.antivirs 8.cipher 9.mosaic lititions
1.(F)2.(F) 3.(T) 4.(T) 5.(F) 6.(T) 7.(T) 8.(F) 9.(T) 10.(T)
1. techology people and processes 2. identification username and autjentication pass word 3. encryption bigital properity 5. copy left licences 6. plagiarism 7.freedom of expression 8.public domain 9.beriley software bestribution 10. accidental plaguism

Learning Computers with Kips

217

Previous page Home Next page