Web Applications and Security Class 10 IT 402 Questions and Answers
1. Define accessibility in terms of computer technology?
Ans. Computer accessibility refers to making technology more user friendly regardless of any disability.
2. Define Assistive technology.
Ans. Assistive technology is any device, software or equipment that is used to increase, maintain, or improve functional capabilities of a person with a disability.
3. Mention four types of disability or impairment which affect the computer accessibility.
Ans. These are: Visual impairments, Hearing impairments or deafness, motor or dexterity impairments and Speech-language impairment.
4. What is the purpose of a modem?
Ans. Modem is a device that converts analog to digital signals and vice-versa.
5. What is NIC?
Ans. A network interface card (NIC) connects your computer to a local data network or the Internet. A network interface card is also known as a network interface controller, network adapter, or Local Area Network (LAN) adapter.
6. What are Routers?
Ans. On internet, it is not necessary that all the packets will follow the same path from source to destination. A special machine called router tries to load balance between various paths that exist on networks. Routers can attach physically different networks.
7. Define WIMAX.
Ans. WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communication standard for broadband wireless access (BWA) networks.
8. Define WWW.
Ans. The WWW is a collection of web pages which are interlinked hypertext documents accessed via the Internet. The main goal of the Web is to organize and retrieve information over Internet.
9. Name two communication protocols of Internet.
Ans. The two protocols are TCP and IP.
10. Name four broadband ISPs in India.
Ans. Four broadband ISPS in India are: MTNL, VSNL, AirTel and Reliance.
Web Applications and Security Class 10 IT 402
11. What is Instant Messaging?
Ans. Instant Messaging Service is a system application by which a client is able to provide (near) real-time messaging capabilities. Instant messaging helps you exchange text messages in real-time through a software.
12. How can you access web based instant message?
Ans. Web based instant messaging software is accessed using browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, etc.
13. Define E-Shopping.
Ans. E-Shopping or online shopping is a form of electronic commerce which allows consumers to directly buy goods or services from a seller over the Internet using a web browser.
14. List five benefits of E-Commerce.
Ans. Some key benefits are:
There is no need to stand in a queue.
Range of goods available in online platform.
You can compare goods from many retailers.
24×7 availability – the shop never closes.
This is a global market where neither you nor the vendor are restricted to your/their locality.
15. What is security?
Ans. The protection of sensitive data and personal information from unintentional and intentional attacks and disclosure is called security.
16. What is data security?
Ans. In simple terms, data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.
17. Mention few threats for a computer when it is connected to internet or any network.
Ans. Some of these threats are: hacking or identity theft, cracking, eavesdropping, Identity Spoofing (IP Address Spoofing), Cyber Snooping, Email Spoofing, SMS Spoofing, Intellectual Property Crime, virus attack, carding, etc.
18. What is information technology security?
Ans. IT Security is a term which is more concerned with the protection of hardware, software and a network of an organization, from the perils of disaster and external attacks (through virus, hacking, etc.).
19. What is firewall?
Ans. A firewall is a hardware device or software program that prevents unwanted traffic from entering or exiting your computer. When properly configured, these devices allow your computer to send and receive data from the Internet and block unwanted traffic from hackers, viruses, and other undesirable sources.
20. Shikha is working in an organization as a Network manager. In her organization they use both Internet and Intranet. She authorizes people to access some specific document and not others. Name the device which helps her to control access between the Internet and Intranet.
Web Applications and Security Class 10 IT 402
21. Define data encryption.
Ans. Encryption scrambles data and is used to protect information that is being held on a computer, copied onto CDs or DVDs or transmitted over a network. It uses technologies such as virtual private networks (VPNs) and secure socket layers.
22. How is firewall useful in ensuring network security?
Ans. Firewalls are software programs or hardware devices that are useful to filter the traffic (like virus, worms, intruders, hackers, malicious code, etc.) that flows into your PC or your network through a internet connection.
23. What is Computer virus?
Ans. virus is an application with the ability of multiplying itself, which can cause great danger and damage to files other software on the same machine. A true virus cannot infect another system without human intervention.
24. How can you protect your computer from virus?
Ans. To protect your computer, you must do the following things:
Use a firewall. If you are using Windows 7, make sure the Windows Firewall is turned on.
Keep your software up-to-date. In Windows, make sure automatic updating is turned on. Install an anti-virus program. Installing an anti-virus program and keeping it up-to-date can help protect your computer against viruses.
Avoid using suspicious links. Don’t click on links or open attachments from email addresses you don’t know.
25. What do mean by your blog?
Ans. Your blog means the computer where you create the blog. This is called host or host computer which has an internet connection. This may be your home computer or a server.
26. Why do you need a blogging platform?
Ans. A blogging platform is a software or service that you use to publish your content on the internet in the form of a blog.
27. What is web hosting for a blog?
Ans. Web hosting is what makes your blog visible to others on the web. Without it, no one but you would ever see your blog posts. Hosting typically runs on a server owned by a web hosting company and your blog takes up just a small space on that server.
28. Name two popular blogging platforms.
Ans. The most popular blogging platforms are the blogger and WordPress.
29. Can you host a blog without a blog hosting company?
30. Name two blog hosting companies.
Ans. WordPress and GoDaddy.
31. What type of content can be placed in a blog?
Ans. The content of a blog typically includes text, pictures, videos, animated GIFs and even scans from old physical offline diaries or journals and other hard copy documents.
32. What is the difference between blog and website?
Ans. The primary difference between a blog and a website is that a blog is a specific type of content displayed on web pages on a website.
33. What is the purpose of call-to-action in a website?
Ans. A call-to-action is a prompt on a website that tells the user to take some specified action. A call-to action is typically written as a command, such as ‘Sign Up’ or ‘Buy Now’ and generally takes the form of a button or hyperlink.
34. What is domain name?
Ans. A domain name is your website name. A domain name is the address where Internet users can access your website. A domain name is used for finding and identifying computers on the Internet.