A)Answer the following questions: 1)What do you mean by cyber security? Ans: Cybersecurity refers to the practice of protecting computer
systems, networks, and data from theft, damage, or unauthorized access. It
involves implementing measures to ensure the confidentiality, integrity, and
availability of digital information. 2)What do you mean by Malware? Define
its types. Ans:Malware,
short for malicious software, is a type of software designed to harm or exploit
computer systems. Types of malware include: Viruses: Programs that replicate and spread by attaching to other
programs.
Worms: Self-replicating programs that spread independently over
networks.
Trojans: Programs that appear legitimate but contain malicious code.
Spyware: Software that secretly gathers information about a user.
Ransomware: Malware that encrypts files and demands a ransom for their
release. 3)What are the types of Cyber-attacks. Ans:Types of
cyber-attacks include: Phishing: Deceptive attempts to obtain sensitive information by posing
as a trustworthy entity.
Denial-of-Service (DoS) attacks: Overloading a system to make it
unavailable to users.
Man-in-the-Middle (MitM) attacks: Intercepting communication between two
parties.
SQL Injection: Exploiting vulnerabilities in database query languages.
Cross-Site Scripting (XSS): Injecting malicious scripts into web pages. 4)What are the prevention steps of Cyber-attacks? Ans:Prevention
steps for cyber-attacks include:
Keeping software and systems up-to-date with the latest security
patches.
Using strong, unique passwords and enabling multi-factor authentication.
Implementing firewalls and antivirus software.
Educating users about phishing and social engineering tactics.
Regularly backing up data to prevent loss in case of an attack.
B)State ‘T’ for True or ‘F’ for False: 1)Malware is the common cyber threats. TRUE 2)SL injection is not a type of cyber-attacks.
FALSE 3)E-mail attachment could be infected
with Malware. TRUE 4)Trojan is a type of Malware. TRUE
C)Fill in the blanks: 1)Malware means malicious software . 2)Network Security is a practice of securing a computer
network. 3)Cyber attack is an example of a security breach .
1)Guido Van Rossum invented
python at CWI, Netherland.
2)The full form of CWI is Centrum Wiskunde &Informatica .
3)There are two modes in python
language.
4)IDLE is an acronym of Integrated Development and Learning Environment.
B)Short answer type questions:
1)What is difference between compiler
& Interpreter.
Ans: A compiler translates the entire source code into
machine code before execution, producing a standalone executable file. An
interpreter, on the other hand, translates and executes the source code line by
line without producing a separate executable.
2)What is difference between
Interactive & Script mode.
Ans: Interactive mode allows users to enter commands
directly into the Python shell, and the results are immediately displayed.
Script mode involves saving a sequence of Python commands in a script file and
executing the entire script at once.
3)What is the use of print statement?
Ans: The print statement is used to display output in
Python. It allows you to print text, variables, or expressions to the console,
making it a useful tool for debugging and providing information to the user.
4)What is python?
Ans: Python is a high-level, interpreted programming
language known for its readability and simplicity. It supports multiple
programming paradigms and is widely used in various domains, including web
development, data science, artificial intelligence, and more.
5)Write down any two features of Python
language.
Ans: Two features of Python language are:
Readability: Python code is easy to read and understand, promoting a
clean and concise coding style.
Extensive Libraries: Python has a rich standard library and numerous
third-party libraries, providing pre-built modules for various tasks.
C)State ‘T’ for True or ‘F’ for False:
1)Python is a platform Independent
language. TRUE
2)Python is an example of compiled
language. FALSE
3)Script mode is the command line shell
mode. FALSE
4)Multiline comment is also known as
block comment. TRUE
Ans:Artificial Intelligence (AI) refers to the
capability of machines or computer systems to perform tasks that typically
require human intelligence. This includes tasks like learning, reasoning,
problem-solving, perception, language understanding, and speech recognition.
2)What are the areas or fields where AI ( Artificial
Intelligence)?
Ans:AI is used in various fields, including
healthcare, finance, education, entertainment, autonomous vehicles, robotics,
natural language processing, and many more.
3)What are the advantages and disadvantages of AI?
Ans: Advantages
of AI:
1) Efficiency:
AI can perform tasks faster and with greater accuracy than humans.
2) Automation:
AI can handle repetitive and mundane tasks, allowing humans to focus on more
creative and complex aspects of work.
3) Decision
Making: AI systems can analyze large amounts of data to make informed
decisions.
Disadvantages
of AI:
1)
Job Displacement: Automation through AI can lead to job loss in certain
industries.
2) Lack
of Creativity: AI lacks the ability to think creatively and may struggle with
tasks that require innovative thinking.
3) Ethical
Concerns: AI systems may raise ethical issues related to privacy, bias, and
decision-making.
B)Fill in the blanks using the words from the help box:
1)AI stands for Artificial
Intelligence .
2)Weather forecasting is an example of AI .
3)Artificial Intelligence is used to read and interpret .
4)Same advanced organization use chatbots to interact
with use.
C)State ‘T’ for True or ‘F’ for False:
1)Artificial Indigence is a branch of computer
science.TRUE
2)Reasoning and Problem Solving are examples if AT. TRUE
1)What do you understand by the term ‘SQL Injections’?
Ans:SQL Injections involve
inserting malicious SQL code into input fields, exploiting vulnerabilities in a
database to access, modify, or delete data.
2)Write down any two methods which will protect you
against cyber-attacks?
Ans:Using strong, unique
passwords and keeping software up-to-date are effective methods against cyber-attacks.
Employing antivirus software and being cautious with email attachments also
enhance protection.
3)How do you will define phishing?
Ans:Phishing is a
fraudulent attempt to obtain sensitive information, such as usernames,
passwords, and credit card details, by disguising as a trustworthy entity in
electronic communication.
B)Fill in the blanks using the words from the help box:
1)Malware stands for malicious software .
2)A self replicating program which will infect our
computer system is known as virus.
3)SQL stands for Structured
Query Language.
4)Advertising software which can be used to spread
malware is known as adware.
C)State ‘T’ for True or ‘F’ for False:
1)Spyware could capture credit card details. TRUE
2)Virus do not came from Email attachment. FALSE
3)Malware may be used by cyber criminals to make money. TRUE
4)Kaspersky is one of the Anti-Virus Software. TRUE