Worksheet 10 - 16 17 - SA 2
Worksheet 10 - 16 17 - SA 2
Worksheet 10 - 16 17 - SA 2
Gregorios School
Sec-11, Dwarka
Subject: Computer
Class: - X
Session-(2016-2017)
NOTE:-
1.) SA-1 Syllabus: - Chapters 1,2,3,4 and 5 and SA-2 Syllabus:- Chapters 6,7,8,9 and 10.
2.) This is a solved worksheet based on chapters 1 to 10 (Questions and Answers).
3.) Students are also suggested to go through the back exercises of the chapters
mentioned in the syllabus.
CHAPTER-1
Internet
i) Http component?
The first part is a protocol.
ii) www.discoveryadventures component?
The second part identifies the host followed by a domain name.
iii) .com component?
This is the extension of the website which is monitored and regulated by ICANN.
iv) Trips/classic-costa-rica/CRCRD/2011/component?
This is the path which tells the browser that what file is to be used from the domain directory.
Q2) Anushka wants to create a website without using any readymade software. Which language will you
recommend her for the same?
HTML language will be used.
Q3) Suraj has an internet connection but does not know how to view the websites. Kindly advise him the
software that he should use.
He should use web browser.
Q4) It takes Prachi a lot of time to connect to the internet through dial-up connection. Which mode of
connection will you recommend to Prachi?
Wi-Fi connection should be used.
Q5) Shriya wants a broadband connection for accessing her mails and staying informed about the latest
happenings in the field of medicine. Can you suggest her any two Internet Service Providers of India
to be approached for the same?
Airtel, VSNL
Q6) Ishaan is confused between the terms web page and home page and tomorrow he has his computer
exam. As a friend help him in understanding the above concepts.
A home page for a website is the very first page whereas web page is an individual
page of a website.
ARPANET was the network that became the basis for the Internet. Based on a concept first
published in 1967, ARPANET was developed under the direction of the U.S. Advanced Research
Projects Agency (ARPA). In 1969, the idea became a modest reality with the interconnection of four
university computers. The initial purpose was to communicate with and share computer resources
among mainly scientific users at the connected institutions. ARPANET took advantage of the new
idea of sending information in small units called packets that could be routed on different paths and
reconstructed at their destination. The development of the TCP/IP protocols in the 1970s made it
possible to expand the size of the network, which now had become a network of networks.
• To identify operational and technical problems in the Internet and propose solutions to them.
• To specify the development and use of protocols and internet architecture and find solutions to
technical problems.
• To allow smooth transfer of technology from the IRTF to the international Internet community.
• Creating a platform for the exchange of crucial information between users, researchers,
vendors, operators, agency contractors and network managers.
Wireless (or Wi-Fi) hotspots are essentially wireless access points providing network and/or
Internet access to mobile devices like your laptop or smartphone, typically in public locations. To
put it more simply, they're places where you can take your laptop or other mobile device and
wirelessly connect to the Internet. Typical Wi-Fi hotspot venues include cafes, libraries, airports,
and hotels. Though many are free, some hotspots require a subscription or service with a particular
mobile provider.
i) Hypertext- Hypertext is text which contains links to other texts. The term was coined by Ted
Nelson around 1965.
ii) Hyperlink- A hyperlink is a word, phrase, or image that you can click on to jump to a new
document or a new section within the current document.
The World Wide Web (WWW) is one set of software services running on the Internet.
The Internet itself is a global, interconnected network of computing devices. This network
supports a wide variety of interactions and communications between its devices. The World
Wide Web is a subset of these interactions and supports websites and URIs.
Comprises Network of Computers, copper wires, fibre- Files, folders & documents
optic cables & wireless networks stored in various computers
Dependency This is the base, independent of the World It depends on Internet to work
Wide Web
In 1982, the Internet protocol suite (TCP/IP) was standardized, and consequently, the
concept of a world-wide network of interconnected TCP/IP networks, called the Internet, was
introduced. Access to the ARPANET was expanded in 1981 when the National Science
Foundation (NSF) developed the Computer Science Network (CSNET) and again in 1986 when
NSFNET provided access to supercomputer sites in the United States from research and
education organizations. Commercial Internet service providers (ISPs) began to emerge in the
late 1980s and early 1990s. The ARPANET was decommissioned in 1990. The Internet was
commercialized in 1995 when NSFNET was decommissioned, removing the last restrictions
on the use of the Internet to carry commercial traffic.
Since the mid-1990s, the Internet has had a revolutionary impact on culture and commerce,
including the rise of near-instant communication by electronic mail, instant messaging, Voice
over Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and the World
Wide Web with its discussion forums, blogs, social networking, and online shopping sites. The
research and education community continues to develop and use advanced networks such as
NSF's very high speed Backbone Network Service (VBNS), Internet2, and National Lambda
Rail.
Q18) We all know that internet is extremely useful tool today, yet we are cautioned against its
misuse. Can you explain giving some reasons in support of this statement.
Disadvantages:
1) There is a lot of wrong information on the internet. Anyone can post anything, and much
of it is garbage.
2) There are predators that hang out on the internet waiting to get unsuspecting people in
dangerous situations.
3) Some people are getting addicted to the internet and thus causing problems with their
interactions of friends and loved ones.
4) Pornography that can get in the hands of young children too easily.
5) Easy to waste a lot of time on the internet. You can start surfing, and then realize far more
time has passed than you realized. Internet and television together of added to the more
sedentary lifestyles of people which further exacerbate the obesity problem.
6) Internet has a lot of "cheater" sites. People can buy essays and pass them off as their own
far more easily than they used to be able to do.
7) There are a lot of unscrupulous businesses that have sprung up on the internet to take
advantage of people.
8) Hackers can create viruses that can get into your personal computer and ruin valuable
data.
9) Hackers can use the internet for identity theft.
10) It can be quite depressing to be on the internet and realize just how uneducated so many
people have become in today's society.
The amount of information available on the Internet has become so large that it is
difficult to search for specific information. The World Wide Web (WWW) makes
retrieval easy and quick.
The WWW is a search tool that helps you find and retrieve information from a Web
site using links to other sites and documents. The WWW was built on the technology
called Hypertext. This technology increases accessibility to linked documents on the
Internet and helps user to navigate between documents very easily.
Hypertext is identified by underlined text and a different color usually. Some places
will refer to this types of technique as Jump-Off Points. Hypertext can make links
within the same document or to other documents.
WWW lets you search, traverse, and use many types of information at numerous sites
and in multiple forms. This interface is called a browser. Some people refer to a
browser as a 'web browser' Often these terms are used interchangeably.
The WWW is intended to help people share information resources, and services with
the widest possible community of users. Thus a user can access the WWW on Apple,
UNIX, Macintosh, DOS, Windows, and other operating systems.
Just like the Internet, the WWW has a protocol, which is known as HyperText Transfer
Protocol (HTTP). HTTP acts as an interface between a Web Client Software, such
Netscape Navigator.
A major advantage of the WWW is that it also supports TCP/IP services, such as
Gopher, FTP, and Archie in addition to HTTP.
• Create one or more websites. (No I don't mean build a set of web pages. What I mean
is, set up the website in the web server, so that the website can be viewed via HTTP)
• Configure log file settings, including where the log files are saved, what data to include
on the log files etc. (Log files can be used to analyse traffic etc)
• Configure website/directory security. For example, which user accounts are/aren't
allowed to view the website, which IP addresses are/aren't allowed to view the website etc.
• Create an FTP site. An FTP site allows users to transfer files to and from the site.
• Create virtual directories, and map them to physical directories
• Configure/nominate custom error pages. This allows you to build and display user
friendly error messages on your website. For example, you can specify which page is displayed
when a user tries to access a page that doesn't exist (i.e. a "404 error").
• Specify default documents. Default documents are those that are displayed when no file
name is specified. For example, if you open "http://localhost", which file should be displayed?
This is typically "index.html" or similar but it doesn't need to be. You could nominate
"index.cfm" if your website is using ColdFusion. You could also nominate a 2nd choice (in case
there is no index.cfm file), and a 3rd choice, and so on.
1. Internet Activities Board (IAB) - It is comprised of Internet Engineering Task Force (IETF) and
Internet Research Task Force (IRTF). It is a technical body that oversees the development of
the Internet suite of protocols.
2. Internet Network Information Center (InterNic) - It provides various registry services needed
for the Internet to operate effectively.
3. World Wide Web Consortium (W3C) - It is a joint initiative between MIT, CERN and INRIA to
develop standards for the evolution of the web.
Internet Activities Board (IAB) - The technical body that oversees the development of the Internet
suite of protocols. It has two task forces, the IETF and IRTF, which are charged with
investigating a particular area.
Internet Engineering Task Force (IETF) - Develops and maintains the Internet’s communication
protocols. Addresses problems and coordinates new services. Appoints working groups to
define standards, coordinate services between providers and performs the real work.
Internet Research Task Force (IRTF) - Look into long-term research problems that could be
critical in five or ten years.
In addition to the three volunteer groups referenced above, the following projects and
organizations have been formed to assist with the development of the Internet.
Internet Network Information Center (InterNic) - project sponsored by the NSF is conducted by
AT&T and Network Solutions. The purpose is to provide the various registry services needed
for the Internet to operate effectively.
World Wide Web Consortium (W3C) - managed by the laboratory for Computer Science at the
Massachusetts Institute of Technology. It is a joint initiative between MIT, CERN, and INRIA to
develop standards for the evolution of the Web.
CHAPTER-2
Internet Services
Search engines are programs that search documents for specified keywords and returns a list of the
documents where the keywords were found. It is a web-based tool that enables users to locate
information on the World Wide Web.
Examples-Google, Bing and Yahoo! Search enable users to search for documents on the World Wide
Web.
A hit is a request to a web server for a file, like a web page, image, JavaScript, or Cascading Style
Sheet. When a web page is downloaded from a server the number of "hits" or "page hits" is equal to
the number of files requested.
The File Transfer Protocol (FTP) is used to transfer files between two computers over a network and
Internet. Auto FTP Manager is an advanced FTP client that automates file transfers between your
computer and the FTP server.
When files are transferred through FTP, one of two actions is happening – uploading or
downloading. Uploading involves transferring files from a personal computer to a server.
Downloading involves transferring a file from a server to a personal computer. FTP uses TCP/IP
(Transmission Control Protocol/Internet Protocol) to transfer your files. TCP/IP is basically the
language that the Internet uses to carry out commands. One way to use FTP is to go through an FTP
client. FTP clients may make it safer for your computer to download/upload files and help you avoid
malware and viruses.
The IMAP protocol, by default, allows the user The POP protocol, by default, is set
to keep all messages on the server. It to download all the messages from the e-
constantly synchronizes the e-mail program mail server onto your computer. This means
with the server and displays what messages that all the actions performed on the
are currently present. All the actions messages (reading, moving, deleting...) will
performed on the messages (reading, be performed on one's computer.
moving, deleting...) will be done directly on Because everything is kept on the user’s
the server. computer, the user will not be able to reopen
messages from any location other than the
computer where the messages have been
downloaded.
Because everything is kept on the server the Once e-mail is downloaded it can be
user will be able to access the e-mail in the accessed only using the same computer.
inbox from any computer in the world
connected to the Internet and can will always
find the same settings in their e-mail account.
The same as with traditional conference calling, video conferencing removes the cost and hassle of
having to travel to meetings. Cutting company fuel bills and allowing increased productivity from the
time saved, video conferencing gives a tangible return on investment. Participants can be based
anywhere in the world and, time differences permitting, meetings can be arranged simply and easily
at the drop of a hat, with no need for large meeting room facilities. The reduction in travel is also an
environmental win.
Remote working
Video conferencing is a particular advantage for geographically diverse work teams. Impromptu
meetings are able to be set up and held immediately, making it easy for people to come together to
discuss ideas. Being able to take control of a shared screen, participants are able to work through
documents together as if they were in the same room. This kind of collaboration ability enables
remote working to become an effective and realistic option, with people that choose this work style
no longer being put at a disadvantage. For a company, the ability to offer effective remote access
working is a particularly important asset during the current economic climate, where companies
may be less able to use monetary incentives to attract employees.
There will always be situations where a face-to-face meeting is required. However, in most cases,
video conferencing is as good as the real thing. Being able to see the people you are talking with
means that you are better able to read responses through body language. This makes debates easier
and, coupled with the ability to share and review data together in real-time, increases productivity.
Common concerns
Perhaps due to the vast benefits that it can bring, a common misconception is that video
conferencing technology must be expensive, complicated or unreliable. This is simply not the case
anymore. This commonplace technology no longer requires additional training or the need to
employ anyone to set it up. There is no need for expensive or specifically compatible equipment for
call participants and the technology used is as now as reliable as a standard telephone call.
A chat room is a designated virtual channel where users communicate with each other through the
Internet, traditionally in plain text only. More recent developments in Web technology now allow
the transmission of images and emoticons in a chat room as well. The term can mean online
chatting, instant messaging and online forums using either synchronous or asynchronous
conferencing. Some chat rooms require a username and password combination in order to log in or
join a conversation, allowing for privacy among the users.
Online shopping (sometimes known as e-tail from "electronic retail" or e-shopping) is a form
of electronic commerce which allows consumers to directly buy goods or services from a seller over
the Internet using a web browser. Alternative names are: e-web-store, e-shop, e-store, Internet
shop, web-shop, web-store, online store, online storefront and virtual store. Mobile commerce
(or m-commerce) describes purchasing from an online retailer's mobile optimized online site.
An online shop evokes the physical analogy of buying products or services at a bricks-and-
mortar retailer or shopping center; the process is called business-to-consumer (B2C) online
shopping. In the case where a business buys from another business, the process is called business-
to-business (B2B) online shopping. The largest of these online retailing corporations
are Alibaba,Amazon.com, and eBay
A group (often termed as a community, e-group or club) is a feature in many social network services
which allows users to create, post, comment to and read from their own interest- and niche-specific
forums, often within the realm of virtual communities.
Abbreviated as SNS a social networking site is the phrase used to describe any Web site that
enables users to create public profiles within that Web site and form relationships with other users
of the same Web site who access their profile. Social networking sites can be used to describe
community-based Web sites, online discussions forums, chat rooms and other social spaces online.
A social networking service (also social networking site, SNS or social media) is a
platform to build social networks or social relations among people who share similar personal
and career interests, activities, backgrounds or real-life connections.[1] The variety of stand-alone
and built-in social networking services currently available in the online space introduces
challenges of definition, but there are some common features: (1) social networking services are
Web 2.0 internet-based applications, (2) user-generated content (UGC) is the lifeblood of SNS
organisms, (3) users create service-specific profiles for the site or app that are designed and
maintained by the SNS organization and (4) social networking services facilitate the
development of online social networks by connecting a user's profile with those of other
individuals and/or groups. Most social network services are web-based and provide means for
users to interact over the Internet, such as e-mail and instant messaging. Social network sites
are varied and they incorporate new information and communication tools such as mobile
connectivity, photo/video/sharing and blogging. Online community services are sometimes
considered a social network service, though in a broader sense, social network service usually
means an individual-centered service whereas online community services are group-centered.
Social networking sites allow users to share ideas, pictures, posts, activities, events, and
interests with people in their network. While social networking has gone on almost as long as
societies themselves have existed, the unparalleled potential of the Web to facilitate such
connections is only now being fully recognized and exploited, through Web-based groups
established for that purpose. Depending on the social media platform, members may be able to
contact any other member. In other cases, members can contact anyone they have a connection
to, and subsequently anyone that contact has a connection to, and so on. Some services require
members to have a preexisting connection to contact other members.
The main types of social networking services are those that contain category places (such as
former school year or classmates), means to connect with friends (usually with self-description
pages), and a recommendation system linked to trust.
CHAPTER-3
Introduction to databases
Many layers and types of information security control are appropriate to databases, including:
• Access control
• Auditing
• Authentication
• Encryption
• Integrity controls
• Backups
• Application security
• Controlling Data Redundancy -In non-database systems each application program has its own
private files. In this case, the duplicated copies of the same data is created in many places. In
DBMS, all data of an organization is integrated into a single database file. The data is recorded in
only one place in the database and it is not duplicated.
• Sharing of Data-In DBMS, data can be shared by authorized users of the organization. The
database administrator manages the data and gives rights to users to access the data. Many users
can be authorized to access the same piece of information simultaneously. The remote users can
also share same data. Similarly, the data of same database can be shared between different
application programs.
• Data Consistency -By controlling the data redundancy, the data consistency is obtained. If a data
item appears only once, any update to its value has to be performed only once and the updated
value is immediately available to all users. If the DBMS has controlled redundancy, the database
system enforces consistency.
• Integration of Data-In Database management system, data in database is stored in tables. A single
database contains multiple tables and relationships can be created between tables (or associated
data entities). This makes easy to retrieve and update data.
• Data Security-Form is very important object of DBMS. You can create forms very easily and quickly
in DBMS. Once a form is created, it can be used many times and it can be modified very easily. The
created forms are also saved along with database and behave like a software component. A form
provides very easy way (user-friendly) to enter data into database, edit data and display data from
database. The non-technical users can also perform various operations on database through forms
without going into technical details of a database.
• Report Writers-Most of the DBMSs provide the report writer tools used to create reports. The
users can create very easily and quickly. Once a report is created, it can be used may times and it
can be modified very easily. The created reports are also saved along with database and behave
like a software component.
• Control Over Concurrency -In a computer file-based system, if two users are allowed to access
data simultaneously, it is possible that they will interfere with each other. For example, if both
users attempt to perform update operation on the same record, then one may overwrite the
values recorded by the other. Most database management systems have sub-systems to control
the concurrency so that transactions are always recorded with accuracy.
• Backup and Recovery Procedures -In a computer file-based system, the user creates the backup of
data regularly to protect the valuable data from damage due to failures to the computer system or
application program. It is very time consuming method, if amount of data is large. Most of the
DBMSs provide the 'backup and recovery' sub-systems that automatically create the backup of
data and restore data if required.
• Data Independence -The separation of data structure of database from the application program
that uses the data is called data independence. In DBMS, you can easily change the structure of
database without modifying the application program
1. It is bit complex. Since it supports multiple functionality to give the user the best, the underlying
software has become complex. The designers and developers should have thorough knowledge
about the software to get the most out of it.
2. Because of its complexity and functionality, it uses large amount of memory. It also needs large
memory to run efficiently.
3. DBMS system works on the centralized system, i.e.; all the users from all over the world access
this database. Hence any failure of the DBMS, will impact all the users.
4. DBMS is generalized software, i.e.; it is written work on the entire systems rather specific one.
Hence some of the application will run slow.
Features:
RDBMS is a database management system based on relational model defined by E.F.Codd. Data is
stored in the form of rows and columns. The relations among tables are also stored in the form of
the table.
Features:
Data in the relational database must be represented in tables, with values in columns
within rows.
Data within a column must be accessible by specifying the table name, the column
name, and the value of the primary key of the row.
The DBMS must support missing and inapplicable information in a systematic way,
distinct from regular values and independent of data type.
The DBMS must support at least one language that can be used independently and from
within programs, and supports data definition operations, data manipulation, constraints,
and transaction management.
Views must be updatable by the system.
The DBMS must support insert, update, and delete operations on sets.
Integrity constraints must be stored within the catalogue, separate from the application.
The DBMS must support distribution independence. The existing application should run
when the existing data is redistributed or when the DBMS is redistributed.
If the DBMS provides a low level interface (row at a time), that interface cannot bypass
the integrity constraints.
CHAPTER-4
Working With Tables
It is similar to multilevel sorting .It helps to narrow down the records based on a criteria.
Freezing a column means making the selected column appear at the leftmost side in a table and
make them visible at all times irrespective of the direction the page is scrolled.
Hiding a column means not to show the column on the screen or to hide the display of the
selected columns.
Sorting is arranging the records in ascending or descending order whereas filtering means to
show selected records based on certain criteria.
i) Validation text- it is used to set the rule for entering data in the field. If a value is
entered in a field is entered against the rule then a message is displayed.
iv) Field property-used to select any pertinent property for the field from the bottom
pane.
CHAPTER-5
Query in Ms Access
The lower pane of the Design View is where you define the query. To define a query, specify the
database field names to include and the criteria for displaying the fields. To rearrange the columns
in the lower pane of the Design View, drag a column header to a new location, or select the column
and press Ctrl+arrow key.
In the top of the query Design View window, the icons of the Query Design Bar and the Design bar
are displayed.
Primary Key
Primary key uniquely identify a record in the table. Primary Key can't accept null values.
By default, Primary key is clustered index and data in the database table is physically organized in
the sequence of clustered index. We can have only one Primary key in a table.
Foreign Key
Foreign key is a field in the table that is primary key in another table. Foreign key can accept
multiple null values. Foreign key do not automatically create an index, clustered or non-clustered.
You can manually create an index on foreign key. We can have more than one foreign key in a
table.
Q4) What do you understand by criteria?
By adding criteria to the query, the user can focus on information that has key text, dates, region, or
even add wildcards to cover a wider range of data.
Criteria provide a definition for the data pulled during the query. When the query is executed, all
data that does not include the defined criteria will be excluded from the results.
CHAPTER-6
Understanding HTML
Q6)Name the tag that is used to draw a horizontal line across the web page.
<HR> tag.
CHAPTER-7
Using List and Images
Q2) Which attribute allows you to change the style of numbers in as ordered list?
Type attribute allows you to change the style of numbers in as ordered list.
1. Chapter One
1. Section One
2. Section Two
3. Section Three
2. Chapter Two
3. Chapter Three
The key to nesting lists is to remember that the nested list should relate to one specific list item
CHAPTER-8
Links ,Anchors And Tables in HTML
Q2) What are the points to be kept in mind while using Name attribute.
i) The name chosen in the href attribute should match the case in the name attribute.
ii) With the named anchor when you click on the link the section where you place the name
command will appear at the top of the browser screen.
iii) The value of the href attribute should be enclosed within quotation marks otherwise the link
will not work.
iv) Anchors cannot be nested.
Q3) Write the difference between cell spacing and cell padding.
Cell spacing is the amount of space in between the individual table cells. Cell spacing and margin is
the space between cells. Cell padding is space inside cells, between the cell border (even if
invisible) and the cell content.
Q4) What is the difference between border and border color attribute of the <TABLE> tag?
BORDER is an attribute of the table element which specifies how wide a table border shall be.
BORDER="0" specifies no border at all. The default value for the BORDER attribute is 1, so if you
code BORDER and do not specify a value, the border will be one pixel wide
Whereas the bordercolor attribute colors all of the borders of the table including the cell borders
Q6) What is the use of align attribute in <table> and <tr> tag?
The ALIGN attribute of the table element element defines the horizontal alignment of the table
element (in relationship to the next outer "container", usually the body "container", but a table may
be made inside another table. Example: ALIGN="center" would center a table inside the next outer
container
CHAPTER-9
XML
Q2) What is the difference between well formed and valid XML document
A valid XML document is defined in the XML specification as a well-formed XML document which
also conforms to the rules of a Document Type Definition (DTD). According to JavaCommerce.com
XML tutorial, "Well formed XML documents simply markup pages with descriptive tags
A well-formed document in XML is a document that adheres to the syntax rules specified
by the XML 1.0 specification in that it must satisfy both physical and logical structures."
At its base level well-formed documents require that:
• Content be defined.
• Content be delimited with a beginning and end tag
• Content be properly nested (parents within roots, children within parents)
To be a well-formed document, rules must be established about the declaration and treatment
of entities. Tags are case sensitive, with attributes delimited with quotation marks. Empty
elements have rules established. Overlapping tags invalidate a document. Ideally, a well-
formed document conforms to the design goals of XML
Elements are used to encapsulate pieces of data, and attributes are generally used to provide
accompanying information about an element, rather than to encapsulate raw data itself.
Whether you actually use an element or an attribute is up to the needs of your application.
The following list describes the key differences between elements and attributes from a
schema perspective:
• A schema can define whether the ordering of elements is significant, but attributes can occur
in any order.
• Elements can be nested with the <choice> tag, which means one and only one of the listed
elements can appear.
• Elements can occur more than once, but attributes cannot.
CHAPTER-10
Societal Impacts Of IT
Q1) What is the main difference between computer worm and a Trojan?
The main difference between virus and Trojan horse is that the former can’t replicate itself. Trojan
virus comprises of malicious codes that when it is triggered it often result in theft or loss of data.
Trojan horse spreads only when one invites this program onto a system. It can spread instantly if
you download running files from internet or open email attachment.Worm on the other hand is: A
kind of program that can easily replicate itself easily from one system to another without any aid of
a host file. This is a sharp contrast to the feature of virus as it needs an infected swarm file to spread
properly. Often worms exist within other files. Usually worm discharge document that already has
worm macro inside it.
• Encryption − It is a very effecVve and pracVcal way to safeguard the data being transmiXed over
the network. Sender of the information encrypts the data using a secret code and specified
receiver only can decrypt the data using the same or different secret code.
• Digital Signature − Digital signature ensures the authenVcity of the informaVon. A digital
signature is an e-signature authentic authenticated through encryption and password.
• Security Certificates − Security cerVficate is unique digital id used to verify identity of an
individual website or user.
********************************************************************