0% found this document useful (0 votes)
16 views

Solution

The document talks about different topics like layers in images, HTML tags, loops in programming, PDF file format, hacking, cyberbullying, filters in Photoshop, retouching tools, strong passwords and data backup for security.

Uploaded by

angel lovely
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Solution

The document talks about different topics like layers in images, HTML tags, loops in programming, PDF file format, hacking, cyberbullying, filters in Photoshop, retouching tools, strong passwords and data backup for security.

Uploaded by

angel lovely
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

3A.1)Layers are images, text and objects added on top of each other.

They are like sheets of


stacked features. You can edit, move and delete one layer without affecting the other layer.
Layers act as a transparent sheet that helps you to see an image on top of another image
2) The Comment tag <!--Content--> is used to write comments in the HTML code. It is not
displayed in the browser. Comments are used to specify the purpose of codes if you have a
very long code.
3) The Loop statements execute a statement or group of statements multiple times until the
statement is true or until the condition is met. The FOR loop is a commonly used loop in
QBasic programming. Let us learn how to use the FOR-NEXT loop and DO-WHILE loop
statements.
4) You can access PDF format presentation slides without using MS PowerPoint. When you
save a presentation as PDF, the format, layout, font and images remain the same. PDF is a
secure file-format to share online or to the audience because it cannot be edited or changed
5) Hacking is a crime conducted by an individual, who secretly and remotely breaks into your
computer system without your permission. A hacker looks for the weakness in your computer
system or network and accesses sensitive information Hackers can be programmers who have
advanced knowledge of computers
B)
1) Cyberbullying, also known as online bullying, is a crime that takes place using the
Internet. It is done by harassing, threatening or embarrassing a targeted person.
Cyberbullying is done through text messages, e-mails, social media, online chatting websites,
etc. It is done with an intent to harm another user using technology. It can ruin someone's life
as a result of posting or sharing negative comments, videos, photos and false rumours causing
humiliation or insult.
2) Elements An HTML element is used to create web pages. It consists of an opening tag,
closing tag and content between the tags.
An HTML tag displays the content on the web browser as defined in the tags. Tags consist of
an opening tag and a closing tag. Some tags do not require a closing tag.
3) Photoshop provides you with the filters option to retouch your images, apply special
effects and create unique transformation and lighting effects. Filters are applied to images to
give special effects. Types of fiters include Blur, Distort, Noise, Pixelate, Render, etc ) Let us
learn how to apply a Mosaic filter to an image.
4) Photoshop consists of many retouching tools that help in removing unwanted objects, fix
damaged images, etc. Various retouching image tools include Spot Healing, Healing Brush,
Patch, Content- Aware Move, Red Eye, Clone Stamp and Pattern Stamp
5) You can access PDF format presentation slides without using MS PowerPoint. When you
save a presentation as PDF, the format, layout, font and images remain the same. PDF is a
secure file-format to share online or to the audience because it cannot be edited or changed
6) Use strong passwords of at least six to eight characters consisting of letters, numbers and
symbols. This will minimise the chance of getting hacked and keep your account safe. Do not
disclose your personal information or bank details to anyone on call or over the Internet.

These types of messages and calls can be a fraud. Use an anti-virus software to protect your
computer from malware and keep updating your anti- virus software from time to time.

Backup your data regularly to avoid losing important data.

Do not share your personal information, such as phone number, address, e-mail, birth date,
etc. on social media platforms. Beware before you share your live location online. Someone
can use this information for wrong purposes. 3-6

You might also like