0% found this document useful (0 votes)
378 views

Class 7 Comp Chapter 10 Sol

lol

Uploaded by

Pranay Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
378 views

Class 7 Comp Chapter 10 Sol

lol

Uploaded by

Pranay Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 6
€ Page-144 Application Based Questions: Q1. Neha is confused in deciding i ateidal-le TASC has received is a genuine one or a spam. Can you help her in identifying the spam by specifying any indicative irl alc -¥g Answer Spams are unwanted bulk e-mails that come from strange sources. Indicative features of soam messages are that they do not include your e-mail address in the TO: or CC: fields are common forms of spam. Some spam e-mail can contain offensive language or links to websites with inappropriate content. START RECORDING ae) Scanned with CamScanner € Page-144 (restarr) Application Based Questions: Q2. Ruby is surfing the Internet to prepare herself for the Civil Services Examination. She wants Lod Caretta 1m Resch) which she is referring are secured or not. Suggest her the way in which she can clear her doubt. Answer The URL of a secured website starts with https//: and your browser displays an icon of the closed lock. START RECORDING PREVIOUS | Scanned with CamScanner aor ol aa) Answer the following: Q1. What are the advantages of the Internet? Answer The Internet has become a vital part of our life. It is one of the largest information databases. The internet has great advantages in the fields of education, communication, business, e-commerce, media and entertainment, social networking, and health and fitness. START RECORDING [YS Scanned with CamScanner Answer the following: Q2. Write down any four ethical guidelines which should be followed while using a computer. Answer some of the common ethical guidelines which should be followed while using acomputer: 1. Do not use computer technology to steal information or to cause disruption or interference in other users' work. 2. Do not spy on another person's computer data. 3. Do not contribute to the spread of wrong information using computer technology. 4. Do not use someone else's computer resources without an authorization. START RECORDING ieneeeiccee > ae Scanned with CamScanner PREVI Answer the following: Q3. Define plagiarism. What steps can be taken to prevent it? Answer Plagiarism is the usage or imitation of the language and thoughts of another person and projected as one's own original work. Students should be encouraged to present their original and innovative ideas. However, if material has to be taken from other sources, Citation is the best way to avoid plagiarism. Material should be paraphrased and direct quotes should be presented in quotation marks. START RECORDING ———=1 Scanned with CamScanner € Page-145 SSN Answer the following: Q4. How can you protect your Intellectual Property Rights from getting violated? Answer Some measures to protect intellectual property rights are, Patent your Inventions, Copyright your Art and Publications, Register your Trademarks. START RECORDING Scanned with CamScanner

You might also like