Computer Science, asked by athemeemlol4, 8 months ago

1. What is the difference between RAM and ROM? Name two types of RAM.
[2]
2. Define each of the following:
a) byte
b) kilobyte
[1]
3. Distinguish between the following:
Interactive mode and Script mode
[2]
4. What is cyber bullying and cyber stalking?
[2]
5. What is confidentiality of information? How do you ensure it?
[2]
6. What is digital footprint? Why is it so important?
[2]
7. What do you understand by identity theft? Mention any 2 methods to prevent
it?
[2]
8. What are cookies? How are they used by websites to track you?
[2]

Answers

Answered by ItzShinyQueen13
14

\huge\purple{\mathbb{AnsWerS:}}

1. A ROM chip is a non-volatile storage medium, which means it does not require a constant source of power to retain the information stored on it. By contrast, a RAM chip is volatile, which means it loses any information it is holding when the power is turned off.

● There are two main types of RAM: Dynamic RAM (DRAM) and Static RAM (SRAM).

  • DRAM (pronounced DEE-RAM), is widely used as a computer's main memory.
  • SRAM (pronounced ES-RAM) is made up of four to six transistors.

\\

2. Byte: The byte is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to encode a single character of text in a computer and for this reason it is the smallest addressable unit of memory in many computer architectures.

Kilobyte: The kilobyte is a multiple of the unit byte for digital information. The International System of Units defines the prefix kilo as 1000; per this definition, one kilobyte is 1000 bytes. The internationally recommended unit symbol for the kilobyte is kB.

\\

3. The basic differences between these two modes are as follows: Interactive mode is used when an user wants to run one single line or one block of code. It runs very quickly and gives the output instantly. Script Mode, on the other hand , is used when the user is working with more than one single code or a block of code.

\\

4. Cyberbullying: Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.

Cyberstalking: Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization.[1] It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass.

\\

5. Data confidentiality is about protecting data against unintentional, unlawful, or unauthorized access, disclosure, or theft. Confidentiality has to do with the privacy of information, including authorizations to view, share, and use it. Social Security numbers, which must remain confidential to prevent identity theft.

\\

6. Your “digital footprint” includes all traces of your online activity, including your comments on news articles, posts on social media, and records of your online purchases. When you know the boundaries of your digital footprint and take steps to contain it, you can help protect your identity and your reputation. It is important to be aware of it because anything posted online is permanent and stays there forever regardless of being deleted.

\\

7. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964.

10 Ways to Prevent Theft

  • Freeze Your Credit Report.
  • Order Your Free Credit Reports.
  • Buy Your Credit Reports.
  • Monitor Your Accounts Online.
  • Enroll in Credit Monitoring.
  • Keep Your Social Security Number Safe.
  • Pick Up Your Check Order.
  • Stop Pre-Approved Credit Card Offers.

\\

8. The data in cookies doesn't change, cookies themselves aren't harmful. They can't infect computers with viruses or other malware, although some cyber attacks can hijack cookies and, therefore, browsing sessions. The danger lies in their ability to track individuals' browsing histories.

Cookies are most commonly used to track website activity. When you visit some sites, the server gives you a cookie that acts as your identification card. Upon each return visit to that site, your browser passes that cookie back to the server. Servers can use cookies to provide personalized web pages.

\\\\

♥ʜᴏᴘᴇ ɪᴛ ʜᴇʟᴘs ʏᴏᴜ. ㋛

♥ᴘʟᴇᴀsᴇ ғᴏʟʟᴏᴡ ᴍᴇ ᴀɴᴅ ᴍᴀʀᴋ ᴀs ʙʀᴀɪɴʟɪᴇsᴛ. ㋛

Similar questions