Sie sind auf Seite 1von 3

Q.4 Describe the term multimodal authentication.

Ans: Multimodal Authentication:


Multimodal authentication means combination of two or more types of
authentication methods Normally, authentication methods use a single source of
information for authentication such as features of face. fingerprint, hand geometry,
access cards. etc. Multimodal authentication uses multiple sources of information for
identification.
For example, fingerprint and face recognition can be combined tor a
multimodal biometric authentication system. As another example, a multimodal
authentication can combine access card and PIN to open security gate.
Q.5 Describe computer ethics in information accuracy, information
ownership, intellectual property rights, software piracy and
information privacy.
Ans: Areas of Computer Ethics:
The following are main areas of computer ethics.
• Information accuracy • Information ownership/Intellectual rights
• Intellectual Property • Software piracy
• Information privacy • Internet and Privacy
Information Accuracy:
Information stored on computers must be accurate, up-to-date and complete.
If wrong information is entered in computer, it can be very harmful. People may
suffer because of inaccurate information stored on computer. For example, a credit
card holder may be wrongly blacklisted if wrong information is entered into the
computer.
Information Ownership/Intellectual Rights:
Information ownership or intellectual rights mean persons who create ideas
in any form are the actual owners. Ideas may be in the form of poems, plays,
novels, films, drawings, paintings, software, etc. Intellectual rights protect creative
work from unauthorized use by other people and allow creators to benefit financially
from their work.
Intellectual Property:
Intellectual property means the legal rights of an individual or a corporation
that result from intellectual activity fn literary, artistic, scientific and industrial fields.
Countries have law to protect intellectual property to foster innovation and promote
creativity.

2
Want to Get All Subject Notes of 9th and 10th Class? Visit TopStudyWorld.com
Chapter 6

• Hackers
Software have in-depth knowledge of network programming and can create
Piracy:
tools
x. Name any
Software
andthree
malicious
piracyplaces
software
meanswheremaking
for others to break
authentication-of
illegal copies ofpeople
intc networks and create
is required.
software for use or sale for
problems
Ans: Username and computer
password users
are used
financial benefit When buytolicensed
authorizesoftware,
users to they
have have
accessthe to right to
Example:
use it on a single computer. Software Copyright Law does not allow to makeonillegal
computer systems, e-mail account, bank account and other services available
For example
computer.
copies of software a Hacker develops
and install It onsoftware
other incomputers
which a dictionary
or sell file
it. is
It loaded
allows that
software
contains dictionary
developers to PINS
benefit words. When
arefinancially
most commonlythe software
used with debit and credit cards inword
from their work. is run it tries all the dictionary retailbystores
word
as and
password
Information toother
manyPrivacy:hack places
a computer. This method
for payment worksIt ifisusers
of bills. alsohave
useda simple
with ATM password
cards thatto
exists inInformation
withdrawthe cash
dictionary
from ATM machines •
privacy refers to an individual's right to the privacy of personal
Cracker:
information Access cards
In modern informationare commonly used to
age, people areopen securitythat
concerned gates in offices
computers may where
be
Cracker
unauthorized
taking is a
away theirpeople computer
privacy user
areThe who
not Data
allowed breaks into
to enter.Act
Protection computer
Access(Law)cardssystems
are also
protects without permission
used to
the rights of open
the
using
barriers hacking
in parking tools for are
areas.ofThey personal gainto key orfor opening
damagehoteland room. commits
individuals against misuse personalaninformation
alternative by organizations. Organizations that
cybercrimes
hold the information should not allow unauthorized people to have access to information
• disclose
or Most of the outside
it to anyone crackers do not have professional computer skill to hack
the organization.
Internet computer
and Privacy: systems but they have knowledge about using hacking tools
• Crackers break into computers and cause serious damage. They also break
People
into Webwho use Internet
servers and replaceare worried
the home that pageit may of be eroding with
a website their aprivacy.
page of
their own design.
Internet users post their personal information such as full name, date of birth, place
These criminals
• residence.
of are dangerous
phone numbers, and harder
pictures. videos toetc.catch.on the Web and it stays
Example:
there Internet users enter personal information in websites to sign up or register for
services Forwithoutexample,
realizinga cracker
that thiscan mayinstall
lead ato key logger ofonprivacy.
invasions anotherThis user's computer
information
through Internet A key-logger is software which
can be accessed by hackers and used for harmful purpose. This poses a seriousrecords every typed letter on the
keyboard
threat to Whenprivacytheasuser uses Facebook
unauthorized peopleandcanenters accessthe Facebook account details,
personal information of
it will get recorded
individuals. Therefore, in the cracker's
people are computer.
concerned Now, about he invasion
can easilyofhack the Facebook
computer and
account.technology into people's privacy.
Internet

What types of problems may be faced if computer users do not


ii. comply with the
Differentiate moralhacker
between guidelines
and of computer ethics?
cracker.
1.Ans: Hacker:
Computer users can use Computer to harm other people.
2. Computer
A personusers
whocan use Computer
illegally to break
breaks into intocomputer
others' others' computer
systems systems
is known as
to steal, change or destroy
hacker Hacking is a cybercrime. information
3.• Computer
Hackers areusers can read
computer documents
experts who tryand e-mails
to gain of other users
unauthorized without
access to their
consent.
computer systems for stealing and corrupting information.
4.• Computer
Most of theusers can use
hackers Computer
break to make illegal
into computers copies ofbenefits.
for financial copyrightThey try to
software and sell it for financial^ benefit.
get Credit cart details or bank account information so that they can steal
5. Computer users who have special computer knowledge and ability will
moneymalicious software (such as computer virus) and spread it to other
create
2
computers.
6. Computer users can commit any type of crime with the help of computer
technology.
etc.
7. Computer users can not respect the privacy of others.
Biometrics provides highly secure identification and personal verification
technologies. Biometrics based systems are used for financial transactions,
electronic banking and . personal data privacy.

Das könnte Ihnen auch gefallen