Gujarat Board Class 9 Solution Computer Chapter 14 Email and Security in Internet Exercise Solution here in this Post.
Board |
GSEB Gujarat State |
Textbook |
9 Class |
Medium |
English |
Subject |
Computer Studies |
Chapter |
14 |
Chapter Name |
Email and Security in Internet |
Gujarat Board Class 9 Computer Chapter 14 Email and Security in Internet Solution:
1) What are the benefits of email?
Ans:- The benefits of email are as follows:-
i) Fast:- The delivery of the mesages which are sent and recieved on e-mail are very fast somewhat in seconds.
ii) Global:- The messages which are sent and recieved through email are sent/recieved across the world wide which means it does not have geographic limitations.
iii) At free of cost:- The mails which are sent/recieved over internet is at free of cost. There are some email service providers like G-mail, Hotmail, Yahoo etc. who provide service at free of cost to its users. You need to have Computer with internet connection.
iv) Personal:- Like mobile phones, the user can send/recieve informal mails through emails.
v) More productive:- Email is grouped with the services of calendars, address book, and templates which are mostly useful in quick messaging .
vi) Opportunity to think/ editing the contents:- Before sending the mail, email provides you the chance to rethink twice upon the content or edit the content or check the spelling /grammar.
vii) Documentation proof of communication:- The mesages which are sent or recieved over email are been stored in computer or prints can also be taken for future use.
viii) Reaching to many people:- Email provides the facility of sending the same message to many people or to a single person.
ix) Gateway to many web services:- With the help of email you can link your email id and sign up to various social sites like Facebook, Instagram, Tiktok etc. or you may utilise some services which are available on internet. You can even play online games by signing up with the email id.
2) Explain the structure of e-mail ?
Ans:-
When you have the connection of internet, you can search for the free mail service provider like G-mail, yahoo.m, Rediffmail, Hotmail etc. You have to register yourself on one of the mail service provider. select the username with password, other details to register your mail address with the mail service provider. The process of registering is called as Sign Up. This process can be done once only. After successfully signing up, you can sign in to your mail address whenever you require. Email is consisting some parts Which are:
i) Header:- contains the address of the person whom we want to send the mail.
ii) Subject:- Topic/reason for sending the mail.
iii) Attachments:- If you want to send any image or document, video or audio to another person through mail, you can send it.
iv) Message Body:- This is an empty area which is used for typing the message that you want to sent.
Some typical operations in email include Send, Compose, Reply, forward. You can even attach one or more files with limited size to your mail. Such files can multimedia like image, Document, music, etc.
3) How e-mail works ?
Ans:-
When the user sends the email, it is directly sent from a computer to the address/network of the person who is sending it and then it’s transfer to Internet. when it reaches to Internet, it goes to the recievers/ the person whom we are sending the mail by using the facility of routers ( for finding an best way). Before transferring the mails to the firewall, it has to go through the security features like spam, or virus filters. After fininshing up with the security check it goes to recievers network and then its been directly send to the recievers address.
4) What are the typical operations that can be performed on an e-mail ? Explain each in one line ?
Ans:- Typical operations which can be performed on an e-mail are as follows:-
i) Send :- This button/option is used to send the newly composed mail to the other person.
ii) Compose:- If you want to create a new mail of your choice and sent it to other person, by clicking on compose button/option will help you out.
iii) Reply:- By clicking on Reply option will help the user to give the feedback/opinion/response against the message recieved.
iv) Forward mail:- This helps the user to send the same message(which is been recieved) to the other users .
5) What is a threat ? How it can be avoided ?
Ans:-
The availability, operations, functionality of a shared network or system can be disturbed by a Thread. Disruptcy can be done by malicious, accidental or by natural way. In short It can be said as causing of harm due to malicious or accidental to the network shared system which results stopping of functions.
6) Define the following terms:-
a) Vulnerabilities b) Virus c) Trojan horse d) Worm e) Logic bomb f) Trap door
Ans:- i) Vulnerabilities:- In computer term Vulnerabilities can be referred as the weakness in the computer system which allows the threats to attack/access the system information. It’s a procedure which exploits systems information to the threats.
ii) Virus:- It is a program, which completely tampers, or infects/damages the program files and folders available in the system, which as result creates a problem/slow in smooth functioning of the system. Whenever we try to download any files from internet (malicious sites), or through pendrives, mails, the virus enters into the computer. When the host program is executed, the virus spreads very fast. The virus tries to multiply itself in the system when the virus enters in the system. There are some softwares/programs created to save the program files/folders from the system and guards it. This software is used for scanning the virus in the program/system and removing it thoroughly. There are some popular antivirus such as Net Protector Antivirus, Quick Heal, AVG etc. This progams are much effective against known viruses.
iii) Trojan horse:- Trojan horse is a program which is hidden in a file/program itself and harms the resources of the computer system. The idea of giving the name as Trojan Horse is given as per Greek mythology/ the story of Troy. The story of Troy tells us that how the group of soldiers hidden themselves in the giant horses for entering the gates of Troy which was much essential in conquering the Troy. Like that Trojans are the harmful programs which acts as they are much useful/performs fancy functions like emails with attachments, free games or screen savers. When the user tries to execute such programs automatically the harmful hidden programs are executed. Password grabber is the example of a Trojan horse. The login.exe file is been replaced by new login.exe shows us that it’s trojan.When the user enters username and password in the system stores information of the user and displays message as incorrect password. The system passes the control to actual login.exe which asks the user to enter username and password for the second time. The user innocently enters the username and password again for the second time but is unaware mean while his username and password is been stoled/grabbed.
iv) Worm:- Worms are the independent program designed to infects the system which are connected to a network. Network is source for harming the system. A virus is not an independent program where as the worm is an independent program. The virus like Mellisa is combination of Viruses and worms.
v) Logic bomb:- when some conditions are met, the logic bomb triggers. When the particulars dates are matching, lots of amount in the bank balance, or when the senseful information recieved from the companies Databases are some examples of logical condition. In such conditions logic bomb tries to change the dates or amount of the bank balance, or steals some important information from the company’s system. At the time of delivery or development of the system, the developer or a vendor prepare the logical condition from being triggered.
Beisdes from these above methods, unauthorised access of the system can be done scanning systems unique ip address, listening to ports and resources (sniffing), password breaking, hijacking of sessions, renaming of server which is called as spoofing,. Hacking is not the main intention of a hacker, but to disrupt the function of the system, denial of service attacks are designed. Such attacks results the system to inoperative which means users can’t access the system. Spam mails can be used for such type of attacks. Firewalls, antivirus software, accessing of users by different ways (usernames and passwords) are some methods which can take much care of security and viruses. Cryptography are used to deal with such type of attacks.
vi) Trap door:- Trap door is program which grabs/access the system or resources in a illegal way. When the system is developed,this way is not mentioned or Documented. Such thing is done by the developer of the system. If incase there ‘safight between company and developer, and the developer needs to access the system or system resources in a illegal way . Such method is used to illegally access the system or process of the system. Trap door is also known as backdoor.
7) Differentiate between Virus and worm
Ans:- Virus:-It is a program, which completely tampers, orinfects/damages the program files and folders available in the system, which as result creates a problem/slow in smooth functioning of the system. Whenever we try to download any files from internet (malicious sites), or through pen drives, mails, the virus enters in to the computer. When the host program is executed, the virus spreads very fast. The virus tries to multiply its elfin the system when the virus enters in the system. There are some softwares/program screated to save the program files/folders from the system and guards it. This software isused for scanning the virus in the program/system and removing it thoroughly. There are some popular antivirus such as Net Protector Antivirus ,Quick Heal, AVG etc .This programs are much effective against known viruses.
Worm:-Worms are the in dependent program designed to in facts the system which are connected to a network. Network is source for harming the system. A virus is not an independent program where as the worm is an independent program. The virus like Mell Is a is combination of Viruses and worms.
8) Explain the term cipher. How it is related with security and cryptography ?
Ans:- The algorithm for converting simple message into unintelligible/coded form/unreadable form by using some technique is called as Cipher. Whereas cryptography is a tool used for hiding/ provides privacy for accessing the identities of the communicating persons, keep the messages secured.
9) Define the following terms:-
a) Cryptology b) Cryptanalysis c) Cryptography
Ans:- a) Cryptology:- It’s the combination of Cryptology and Cryptography.
b) Cryptanalysis:- Cryptanalysis is a study of principles and methods of converting a encrypted/coded message into the useful information without having the knowledge of the key is called as Cryptanalysis.
c) Cryptography:- In simple words, Cryptography means Crypto(secret) and graphy (writings). Cryptography is a program which uses the technique/method of converting simple messages into a coded/ unintelligible form and vice versa.cryptography is a too lused for hiding/provides privacy for accessing the identities of the communicating persons, keep the messages secured.
10) List any three popular mail clients of your choice ?
Ans:- Thunderbird, Evolution, Claws Mail are the three popular mail clients.
11) Choose the most appropriate option from the given below:-
1) What type of information can be send through an E-mail ?
Answer: d) All of these.
2) What is an alternative name of Junk mails?
Answer: c) Unwanted mails.
3) Which of the followings is needed to send an email besides computers and basic internet facilities ?
Answer: a) E-mail id or e-mail addresses.
4) Which of the following is a parasite program that comes along with software that does some harm to the system ?
Answer: b) Virus.
5) Which of the following is used to transform the original message into unintelligible message by some logic ?
Answer: b) cipher
6) Which of the following is an application of various techniques and principles to transform simple message into unintelligible secret message and to retransform the message back to its original form ?
Answer: a) Cryptography
7) Which of the following is known as the process of converting a cipher-text into original plain text ?
Answer: d) Decryption
8) Cryptanalysis is also called
Answer: a) code breaking
9) What is the collective name of booth Cryptography and Cryptanalysis?
Answer: c) Cryptology