Chapter 6 Security Copyright And The Law Computer Science 11th Class Punjab Short Questions
Question No. 1 - What is logic bomb?
Answer No. 1 - A logic bomb is a piece of code inserted an operating system of software application implements a malicious function after certain amount of time or specific conditions are met.
Question No. 2 - Who is Hacker?
Answer No. 2 - A computer hacker is someone who tries to break into computer system especially in order to get secret information. A computer user who gains unauthorized access the computer system of a Company, Government etc.
Question No. 3 - What is computer misuse Act 1990?
Answer No. 3 - The computer misuse act 1990 to make provision for security Computer material against unauthorized access or modification and for connected purposes. The computer Misuse Act 1990 was passed to deal with the problem of hacking of computer system.
Question No. 4 - What is biometrics?
Answer No. 4 - Bio metrics technique is used to security identification and authentication.Bio metrics technology is used in the following different ways such as:
. Biometric Security
. Airport
. Consumer Biometric
. Biometric Security
. Airport
. Consumer Biometric
Question No. 5 - How does virus spread through email?
Answer No. 5 - Now a day most of the virus programs spread by attaching themselves with email message, when user opens such an infected message, the virus is also loaded into the computer memory and attaches copies of itself with many files.
Question No. 6 - Give two biometric method to prove your identity to log on a system.
Answer No. 6 - Biometric is biological means of identification i.e finger print, voice recognition eye retina.
Question No. 7 - Define the term backup.
Answer No. 7 - Back up of data is necessary and important way to save your self from the destruction of virus attack is that should always keep back up of your data. The back up will be useful if a virus attack deletes your data or modifies it.
Question No. 8 - Define Chernobyl Virus.
Answer No. 8 - The famous Chernobyl Virus deletes all the Microsoft office files and also the partition information from the disk hence coursing major loss of data.
Question No. 9 - List some types of viruses.
Answer No. 9 - Types of viruses:
. Boot Sector Virus
. Chernobyl Virus
. Logic Bomb
. Trojan Horse
. Red Lof
. Boot Sector Virus
. Chernobyl Virus
. Logic Bomb
. Trojan Horse
. Red Lof
Question No. 10 - Explain Virus activation in computer.
Answer No. 10 - A computer virus is a software program designed to replicate itself and spread to other machine.
A virus usually performs destructive operation by deleting or modifying data stored on the storage device attached to the computer. It is very important to note that virus is a set of mistructions that can not physically destroy hardware.
A virus usually performs destructive operation by deleting or modifying data stored on the storage device attached to the computer. It is very important to note that virus is a set of mistructions that can not physically destroy hardware.
Question No. 11 - State the purpose of password.
Answer No. 11 - A secret word or expression used by authorized person to prove their right to access, information, etc.
Question No. 12 - How security is maintained on computers?
Answer No. 12 - There are the following ways to security maintained on computer.
. Make sure your firewall is turned on
. Update your operating system
. Install Antivirus
. Use Complex Passwords
. Software update
. Make sure your firewall is turned on
. Update your operating system
. Install Antivirus
. Use Complex Passwords
. Software update
Question No. 13 - Define Software Privacy.
Answer No. 13 - Software privacy is the illegal copying distribution "Business" that it has caught the attention of organized crime group in a number of countries.
Question No. 14 - What is meant by Copyright?
Answer No. 14 - The principle law giving software privacy in the copyright Act 1976. Some amendments were made in this in 1983 and now software privacy is believed to be a punishable crime involving huge amounts of penalties.
Question No. 15 - What is Read lof?
Answer No. 15 - Red lof: The Redlof virus is polymorphic virus written in visual basic script.The virus relies in the Microsoft Active x component vulnerability to automatically execute itself. When execute the virus locates Folders. Hat and infects that file, the hat is part of Microsoft windows active desktop feature.
Question No. 16 - Explain Data Security.
Answer No. 16 - Data Security refers to protection digital unauthorized access to computer, database and websites. Data security also protects data from corruption. It is an essential aspect of it for organizations for every size and type.
Question No. 17 - What is Privacy issue?
Answer No. 17 - A individual has right to see data kept about him and also has a right to stop the processing of his data by the organization is allowed to disclose or use the data kept by its organization and if he fails to abide by his committing a Crime.
Question No. 18 - What is mean by Security?
Answer No. 18 - Security in Information Technology is the defense of digital information and IT assets against internal and external malicious and accidental threats.
Question No. 19 - Explain Security Violation.
Answer No. 19 - An event that may result in disclosure of sensitive information to unauthorized individuals.
A security violation may also result in unauthorized modification of system data.
Loss of Computer or computer system processing Capability, loss, or theft of computer system resources.
A security violation may also result in unauthorized modification of system data.
Loss of Computer or computer system processing Capability, loss, or theft of computer system resources.
Question No. 20 - Why data protection in important?
Answer No. 20 - The Data protection rules refer to such that any personal data kept bu some organization should never be disclosed and circumstances.
Question No. 21 - Give three suggestion to protect your computer from virus.
Answer No. 21 - 1. Keep your data backup.
2. Minimize the data transfer.
3. Never open unknown emails.
2. Minimize the data transfer.
3. Never open unknown emails.
Question No. 22 - How pirated software spread virus?
Answer No. 22 - Some Companies may intentionally put some virus programs into their software. This program will only activated. When it does not find some special files like license files on your computer.
Question No. 23 - What is Antivirus?
Answer No. 23 - Antivirus is a software utility that detects, prevents and removes virus worm and other malware from a computer. Most antivirus Programs include an auto-update feature that permits the program to download profiles of new viruses enabling the system to check for new threats.
Question No. 24 - Define Pirated Software.
Answer No. 24 - Pirated software is a software which has been duplicate and distributed without authorization. The unauthorized copying of software.
Previous Question
1-24
Next Question
Computer Science
11th Class Punjab Short Questions
11th Class Online Classes 2026
Updated on: 22-05-2026
11th Class Online Preparation
11th Class 2026 Online
11th Class 2026
Add a Comment
Comments will be shown after admin approval.
Spam comments will not be approved at all.
Matric Result 2026 Punjab
10th Class Result 2026 Punjab
9th Class Result 2026 Punjab Boards
10th Class Result Gazette 2026 Punjab
Punjab Past Papers Matric 9th 10th
Primary Results 5th & 8th Class
BISE Results Intermediate & Matric
BISE Punjab Boards
Sindh Educational Boards
KPK Examination Boards
Technical Boards
Public Service Commission
University Results Gruaduation, Masters Classes
Subscribe by Email
Subscribe by Email
Position Holders Matric 2026
Position Holders 9th Class 2026
Position Holders Inter 2026
Position Holders 11th Class 2026









