We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 6
€ Page-144
Application Based Questions:
Q1. Neha is confused in deciding
i ateidal-le TASC
has received is a genuine
one or a spam. Can you help
her in identifying the spam
by specifying any indicative
irl alc -¥g
Answer
Spams are unwanted bulk e-mails that
come from strange sources. Indicative
features of soam messages are that
they do not include your e-mail
address in the TO: or CC: fields are
common forms of spam. Some spam
e-mail can contain offensive language
or links to websites with inappropriate
content.
START RECORDING
ae)
Scanned with CamScanner€ Page-144 (restarr)
Application Based Questions:
Q2. Ruby is surfing the Internet
to prepare herself for the Civil
Services Examination. She wants
Lod Caretta 1m Resch)
which she is referring are
secured or not. Suggest her the
way in which she can clear her
doubt.
Answer
The URL of a secured website starts
with https//: and your browser
displays an icon of the closed lock.
START RECORDING
PREVIOUS |
Scanned with CamScanneraor ol aa)
Answer the following:
Q1. What are the advantages of
the Internet?
Answer
The Internet has become a vital part
of our life. It is one of the largest
information databases. The internet
has great advantages in the fields
of education, communication,
business, e-commerce, media and
entertainment, social networking,
and health and fitness.
START RECORDING
[YS
Scanned with CamScannerAnswer the following:
Q2. Write down any four ethical
guidelines which should be
followed while using a computer.
Answer
some of the common ethical
guidelines which should be followed
while using acomputer: 1. Do not
use computer technology to steal
information or to cause disruption
or interference in other users' work.
2. Do not spy on another person's
computer data. 3. Do not contribute
to the spread of wrong information
using computer technology. 4. Do
not use someone else's computer
resources without an authorization.
START RECORDING
ieneeeiccee > ae
Scanned with CamScanner
PREVIAnswer the following:
Q3. Define plagiarism. What
steps can be taken to prevent it?
Answer
Plagiarism is the usage or imitation of
the language and thoughts of another
person and projected as one's own
original work. Students should be
encouraged to present their original
and innovative ideas. However, if
material has to be taken from other
sources, Citation is the best way to
avoid plagiarism. Material should be
paraphrased and direct quotes should
be presented in quotation marks.
START RECORDING
———=1
Scanned with CamScanner€ Page-145 SSN
Answer the following:
Q4. How can you protect your
Intellectual Property Rights from
getting violated?
Answer
Some measures to protect intellectual
property rights are, Patent your
Inventions, Copyright your Art
and Publications, Register your
Trademarks.
START RECORDING
Scanned with CamScanner