DOWNLOAD PDF
1.What is the internet?
And.The internet is a global system of interconnected computer networks to serve billions of users worldwide. It is also called a network of networks.
2.What is WWW?
Ans.World Wide Web, which is also known as a Web, is a collection of websites or web pages stored in web servers and connected to local computers through the internet. These websites contain text pages, digital images, audios, videos, etc.
3.Write some advantages of internet?
Ans.
It has increased connectivity and communication among people by instant delivering of messages.
It has enabled people to learn and gain knowledge about any topic of their desire by browsing internet or by online courses.
It helps us in performing various tasks such as online 3 shopping, booking tickets, paying bills, banking and much more.
It entertains us in our leisure time and keeps us busy.
4.Write some Disadvantages of the internet.
Ans.
Internet is a place to offer so much to its users and hence becomes the biggest factor in distracting one from his/her task.
People actively using internet can face cases of internet bullying and crimes.
Hacking of personal profile and account has become another cause of concern.
Attack of viruses is also a threat of using internet.
5.What is ethics?
Computer ethics are acceptable moral standards that regulate the use of computers and the internet.
6. Write some ethical values related to computer?
Some ethical values related to computers and its use are given below:
Respect other people views and be considerate while posting any thing online.
Do not engage in spreading false information over the internet.
Do not share private information or images of other people without their consent.
Do not try to steal sensitive information or data.
Do not accept or forward emails from unknown source.
6.What is plagiarism?
Ans.Plagiarism is a type of intellectual theft that occurs when someone presents another person's ideas or work as their own, without giving proper credit. This can include using someone else's words, designs, art, music, or images without their permission or acknowledgement.
7.What is cyberbullying?
Ans.Cyberbullying is a form of bullying using digital technology such as internet, emails, social networking sites, mobile phones, personal computers, etc. With the digitisation and easy access to technology, it has become increasingly common, especially among teenagers.
8.Write Some of the common ways through which cyber bullying takes place.
Ans.
Threatening messages by email, text or through comments on a social networking page.
Trapping someone and then sharing personal information widely with others.
Hacking email accounts to get into their social networking accounts and posting embarrassing or offensive contents.
9.What is Hacking?
Ans.Hacking refers to the act of gaining unauthorized access to computer or network resources.
10.Who is Hacker?
Ans.A hacker is the person who hacks the computer or network without the intention of destroying or harming the data.
11.Who is cracker?
Ans. A cracker is the person who hacks the computer resources with the intention of causing malicious damage.
12.Write some reasons for hacking.
Ans. some of the reasons are given below:
To steal data from the computer or server which otherwise is not in their reach.
To boast their skills as hackers, they engage in such illegal activities.
To target personal and confidential information such as passwords, credit card details, bank details.
13.How to measure hacking?
Ans.The following measures must be taken to avoid hacking:
Don't share your personal information with unknown or suspicious sources.
Don't create a password based on your personal information like last name, telephone number, etc.
Don't share your password with anyone even although he/she is your close friend.
Don't access and download material from illegitimate sites.
Don't try to open and download unknown software and email attachments that may contain
viruses.
Use strong antivirus software for your computer.
14.What is phishing?
Ans.Phishing is a form of illegal act where fraudulently sensitive information is acquired such as passwords, debit or credit card details by a person often posing as a trustworthy or a business communication.
15.Write some indications of phishing.
Ans.
If an email addresses a user in a generic fashion (Dear, eBay member), it is likely to be an attempt at phishing.
The appearance of links in the message is also an attempt at phishing.
16.What is spamming?
And.The titles of these messages are very fascinating and compel the receiver to read them. Most of the Spams contain commercial advertising, unconvinced products or get rich quick schemes. Spam not only wastes the valuable time of the user but also occupies memory space of the system.
17.What is software piracy?
Ans.Software piracy is an act of making and distributing copies of software without buying the required license or copyright.
18.Write some ways to avoid software piracy.
Ans.
Always buy your software from a reputed organisation.
Make sure that your software comes with a license agreement, original disk and authentic packaging with copyright.
Avoid buying multiple software titles from different publishers on a single disk.
If the seller provides the directions to obtain a serial number, it indicates that the software is not authentic.
19.What is intellectual property right?
Ans.Intellectual property means Ownership of Ideas, It refers to the work created by various artists, scholars, inventors, etc. using their skill and mental ability. The Intellectual Property Rights are the legal rights of these creators of their creations.
20.What is Patents?
And.The patent right is given to the programmer for an invention of a particular software. Patent laws can be used to restrict the freedom of copying, using, distributing and modifying published information.
21.Define Copyright?
Ans. Copyright prohibits the users of a software program for making copies of it without the permission of the person/company concerned which issues the license for
the program
22.Define Trademark?
Ans. Trademark is an identity to preserve the software. A trademark sometimes becomes such a success that it is actually worth more than a product. It becomes the business of selling an image of an identity rather than a product.
23.Write sone Safety Measures while using Computer and Internet.
We should ensure the following safety measures while using computers and the internet:
Avoid posting your personal information on sites where it can be accessed easily by others.
Add only those people on social networking sites who are known to you.
Protect and secure your social media and other accounts. There are various features available that allow you to secure your account.
24.What is the firewall?
Ans.Firewall is defined as a network security device that allows or rejects network access between an untrusted zone (such as the internet) and a trusted zone (a private network). It is designed to filter incoming traffic and to protect unauthorized access from an unknown network.
25.What is proxy firewall?
Ans.A proxy firewall is a network security device that acts as a gateway between internal users and the internet, providing security by monitoring and blocking traffic.
26.What is digital footprint?
Ans.Digital footprints are the information of various activities performed by an individual on the internet. This includes websites visited, emails sent, information submitted online, videos watched and much more activities performed by a user on an electronic device.