KEMBAR78
Web Applications EDITED | PDF | Computer Network | Internet Access
0% found this document useful (0 votes)
14 views7 pages

Web Applications EDITED

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views7 pages

Web Applications EDITED

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Grade 10 WEB APPLICATION AND SECURITY

Fill in the blanks


1)The option in Microsoft Windows XP used for helping users with physical disabilities and
to reduce repetitive strain is Sticky Keys
2) Sound Sentry is designed to help users with auditory impairments
3) The High Contrast option in Microsoft Windows XP is designed to assist people with
vision impairments.
4) Serial Keys is designed to assist people that have difficulty using a keyboard or a mouse.
5)Define networking?
Ans. A computer network is an interconnected collection of computers interconnected by
communication channel that allow sharing of resources and information.
6) Give any three advantages of networking.
Ans. Three advantages of networking are:
1. Data Sharing: One of the main uses of network is to allow the sharing of data
2. Files Transfer: User can send text, audio, video files to the other user
3. Hardware Sharing: Hardware components such as printer, scanner etc can be shared with
multiple users thus saving the cost.
7) Compare LAN with WAN.

Ans.
LAN WAN

It Stands for Local Area Network It Stands for Wide Area Network

It covers a small geographical area . It spreads across countries.

8) Explain P2P Architecture and how it is different from Client Server Architecture?

Ans. Networks in which all computers have an equal status are called peer to peer
networks. Generally, in such a network each terminal has an equally competent CPU.
Networks in which certain computers have special dedicated tasks, providing services to
other computers (in the network) are called client server networks. The computer(s) which
provide services are called servers and the ones that use these services are called clients.
9)Write a note about internet
Ans. The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite to serve billions of users worldwide. It is a network of
networks that consists of millions of private, public, academic, business, and government
networks.

10)Describe WWW?

World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a
system of interlinked hypertext documents accessed via the Internet. With a web
browser, one can view web pages that may contain text, images, videos, and other
multimedia, and navigate between them via hyperlinks.

11) How can we get access to the internet?

Ans. To use the Internet, you need an Internet connection. Internet connections are
provided by Internet Service Providers(ISP’S) such as Bharat Sanchar Nigam Limited
(BSNL), Airtel, Jio, etc.

INTERNET SERVICE PROVIDER

An Internet service provider (ISP) is an organization which provides you with access to
the Internet via a dial-up (using modem) or direct (hard wired) or wireless connection.

MODEM

Á modem is a device that converts digital computer signals into a form (analog signals)
that can travel over phone lines. It also re- converts the analog signals back into digital
signals. The word modem is derived from its function MOdulator/DEModulator.

TYPES OF COMMON INTERNET CONNECTIVITY

Types of Internet Connectivity can be broadly categorized into Wired


Technology and Wireless Technology.
Wired Technology:
1) Dial-up: - It uses the facilities of the Public Switched Telephone Network
(PSTN) to establish a internet connection via telephone lines using a device
called MODEM. Users dial a number and get access to internet. Dial-up
connections are extremely slow.
2) DSL: - DSL is Digital Subscriber Line provides internet connectivity by
transmitting digital data over wires of a local telephone network. It enables
the use of Telephone and Data Transmission on a single telephone line. For
using DSL Connection, we need a DSL modem and a subscription.
3) Cable Internet Access: - It is a form of broadband Internet access that uses
the cable TV infrastructure. It is provided through existing cable TV networks
and it is similar to DSL.
Wireless Technology
1. 3G: It ‘s3rd generation is a set of standards used for used for mobile devices
and mobile telecommunication services and networks . It allows higher
data transfer speed and capacity.
2. WiMax:WiMax(Worldwide interoperability for Microwave Access) is a
wireless communications standard designed to provide mobile broadband
connectivity across cities and countries through a variety of devices. It is a
long-range system covering many kilometres and is typically used where
DSL or cable Internet access cannot be used.
3. Wi-Fi: Wi-Fi is a popular technology that allows an electronic device such as
computers or mobile phones to exchange data wirelessly over network
including high speed Internet connections. WiFi devices such as personal
computer smartphone, video game console etc can connect to a network
resource suggest Internet through a device called the wireless access point.
12)How the data transfer takes place on the internet. Explain?
ANS) Data travels across the internet in packets. Each packet can carry a maximum of
1,500 bytes. ... When you send an e-mail to someone, the message breaks up into
packets that travel across the network. In detail….
 A header is added to each packet explaining where the data has come from,
where to end up and where it fits in with the rest of the packet
 Each packet is sent from computer to computer until its finds destination. Each
computer will decide where to send next packet. All packets may not take the
same route also
 At the destination each packet are examined any packets are missing or
damaged, a message is sent asking to resend it.
 The packets are now reassembled into their original form.
13) Explain the term packet with reference to data transfer.

Ans. Data transfer over the network is divided into small segments called packet. Each
packet is sent from one computer to another computer until it finds its destination.
14) Explain Wifi and its significance.

Ans. Wi-Fi stands for wireless fidelity. Wi-Fi is a popular technology that allows an
electronic device such as computers or mobile phones to exchange data wirelessly over a
network.
Wi-Fi is used where cables cannot be run (such as old buildings, outdoor areas) to provide
network and Internet access.
15) What do you mean by instant messages?

Ans. Instant messaging (IM) is a form of communication over the Internet that offers an
instantaneous transmission of text-based messages from sender to receiver.
16) Give any three key features of Instant Messaging.

Ans. Three key features of Instant Messaging are :


1. Text Messages can be sent to one or more person
2. Audio calling and conferencing.
3. Video calling and conferencing.
17) What are the basic needs to use instant messaging (chat) software.

Ans. The basic needs to use instant messaging (chat) software are :
1. A valid instant messaging account.
2. An active internet Connection.
3. A computer and a browser

18) . What is a blog? Explain its use.

Ans. A blog is a discussion style site used by non-technical (or technical users) users for
creating personal web pages. Blogs are similar to an online personal diary and simple to
use.
We can use a blog to convey messages about events, announcements, news, reviews, etc.
19) List any 5 websites that provide blog service.

Ans. Five websites that provide blog service are :


1. www.WordPress.com
2. www.blogger.com
3. www.blog.com
4. www.weebly.com
5. www.blogsome.com
20) What do you mean by publishing a post?

Ans. Publishing a post means to make the post public. Once we finished typing the
content, we need to publish the post for others to see. To view the post, you can type the
blog address in the address bar of the web browser.
21) Explain the purpose of an offline blog editor.

Ans. When ever we do not have an active internet connection, we can create blogs using a
blog application and publish the blog whenever internet connectivity is available.
22) List any five offline blog editors.

Ans. Five Offline blog editors are :


1. Qumana
2. Windows Live Writer
3. Blogdesk
4. MarsEdit
5. BlogJet
23) Explain the purpose of Online transactions.

Ans. Online transactions have made transactions very convenient and simplified the
workflow in many forms in a business. Online transactions deals with transfer of money
over the internet.
24) List any five websites that allow online transactions.

Ans. Five websites that allow online transactions are :


1. IRCTC
2. Flipkart
3. EBay
4. RedBus
5. Amazon
25) what are the different payment tools to use online transactions?

Ans. payment tools to use online transactions are :


1. Credit card
2. Debit Card
3. UPI
4. Net Banking
5. Paytm
6. PhonePe
26) Give any two benefits of online transactions.

Ans. Two benefits of online transactions are :


1. Money can be transferred immediately.
2. It helps to reduce black marketing to some extent.
27) Name the different kinds of online threats.

Ans. Different online threats are :


1 Phishing
2. Email spoofing
3. Chat spoofing
28) Explain the need to clear data stored in browsers.

Ans. Browsers often prompt to save usernames and passwords when users attempt to
logon to websites. Browsers can also store data such as cookies, visited websites or
webpages data, browsing history, etc. However it is not advisable to leave the web
browser store this data particularly on public or shared computers. So it is advisable to
clear data stored in browsers particularly on public or shared computers.
29) Explain any four best practices to secure data.

Ans. Four best practices to secure data are :


1. Keeping your username and password private.
2. Use updated antivirus and antispyware software.
3. Clear browser cookies frequently.
4. Do not click on link shared by unknown users.
5. Never install software from unknown sources.
6. Install firewalls
30) Explain use of Antivirus and Anti Spyware.

Ans. Antivirus and Antispyware programs offer real-time protection monitoring your
computer for any changes by malware software. Keep your Antivirus and Antispyware
software always up to date, this can help in protecting your computer from any threats.
31) Enlist any three basic safety rules to follow at workplace.

Ans. Basic safety rules to follow at workplace –


1. Fire safety
2. Falls and slips
3. Electrical safety.
32) Give any two basic safety rules for ensuring Falls and Slips safety.

Ans. Two basic safety rules for ensuring Falls and Slips safety are as follows :
a. Keep the moving area clean and clutter free.
b. Workplace must be proper ventilated receive light.
c. Wear non slippery footwear.
d. Floors must be clean and dry.
33) What do you mean by occupational hazards?

Ans. An occupational hazard is the illness one may acquire due to his occupation. for
example people working in a chemical factory may get affected due to presence of certain
chemicals.
34) List any three types of occupational hazards.

Ans. Three types of occupational hazards are as follows :


1. Physical hazards
2. Chemical hazards
3. Biological hazards
35) Explain the terms accident and emergency.

Ans. Accident can be defined as an unfortunate incident that occurs unintentionally


causing hazardous result or injury or unwanted results.
Any unexpected situation that needs immediate attention and action is called emergency.

You might also like