0% found this document useful (0 votes)
21 views10 pages

Computer Notes Class 10th

Uploaded by

bangtanfanboy007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views10 pages

Computer Notes Class 10th

Uploaded by

bangtanfanboy007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

~ ~stfons

~ rt answe q ~~tio -~---·- -


--n
A, sho . .
_rwhat is cop yng t
h_ ?
1 for com put er
tec ts mu sic, film s, lite ratu re and oth er creative works like source code
AIIS· copyright pro
ht holder.
programs etc. Cop yrig ht applies for
70 years afte r the dea th of the copyrig
en whi le using inte rne t. ~
, Writ e any two pre cau tion s tha t sho uld be tak
2
be taken whi le using inte rne t are:
Ans, Any two precautions tha t sho uld personal
re you r per son al det ails : Peo ple should not reveal the ir ide ntit y or
a. Never sha personal details
ne number, photograph or any oth er
info rma tion like nam e, address, pho
online.
e arguments and
ine: Never indulge yo~rself into hug
b. Avoid being par t of a discussion onl
discussions onl ine .
info rma tion ? .
3. What do you me an by free dom of
t is held by the state.
ess info rma tion of a citizen's righ t tha
Ans. Freedom of info rma tion is used to acc
ported as a constitutional right.
In some countries, this free dom is sup
on and general public
government accountability, educati
It was recognized for transparency, es wit h gov ern me nt
and corruption. Mo re tha n 70 countri
protection against mis ma nag em ent Related human rights
res ent ation app rov ed the orig ina l freedom of information legislation.
rep tion and righ t to
free dom of exp res sion , dat a pro tection (privacy), freedom of associa
contain
development.
m?
4. What should you do to avoid plagiaris
some rules:
Ans. _To avoid plagiarism, you should foll ow ords.
ying the lang uag e of the boo k as it is, try to put it in your own language/w
a. Instead of cop
ding of Plagiarism.
b. One should have a clear understan et enclosing it
ying som eon e else 's wo rk is you r task, wor d to word, the n do not forg
c. If cop
.
in quotes and also me ntio n its source {whether by using
documenting you r sources correctly
d. If you are not sure tha t you are
atte d bibliography), ask your instructor.
parenthetical references or a full y form

l -------- .. .
'

1'. Multi P1e choice questions.


1
• What is the full form of ORG?
b. Open Regional Group
a. Open Rights G;oup
d. None of these
c. Open rational Group
2
• What is the acronym CUL stands for? None of these
er b. Com e You late r c. Cat ch You late·r d.
a. Call You Lat
3 wit h a nose?
• What is the emoticon of happy face
b. ;-) c. :-{
a. :-0
OO o s I stand for?
• Netiquettes
• Intellectual property rights
• Plagiarism • Digital rights
· • Freedom of information • Digital divide
L_~___::ommerce_s~ curi~ issues • Secure socket layers

PROTECTING YOURSELF ON THE INTERNET


The Internet is a network of networks that you all use for different types of works, like,
searching information, buying and selling of goods, etc.
As you know that the Internet can be used for a number of different acti~ties and used by
millions of people. Yet, it is not completely safe. It is very important to· protect yourself
while providing personal details like debit card, etc. on the web. Protecting yourself means
· identifying and taking preventive measures against a number of security and privacy issues.

PRECAUTIONS TO BE TAKEN WHILE USING INTERNET


These are some general guidelines that must be followed while using internet.

Never Share Your Personal Details


People should not reveal their identity or personal information like name, address, phone
number, photograph or any other personal details online.

Never Have Face-to-face Conversation


Never agree to have a face-to-face meeting with the person with whom you met online. If
You have to meet the person, met online, take an adult with you and arrange the meeting in
some public place.

Avoid Being Part of a Discussion Online ·


Never indulge yourself into huge arguments and ~iscussions online.

E><press Yourself Clearly


~ message you want to convey, write it clearly and precisely so that end users are able to
erstand. Always give special attention to spelling and grammatical errors.
Check the Reliability of Information
All the information posted on the Internet may not be correct. Check the authen
the information with some other sources too.

Check the Authenticity of an Email


Never open all the emails that you have received, as it may contain viruses. Accept and
only those emails sent by a known person. oPen

NETIQUETTES
The word Netiquette originated from two words: Internet and Etiquette. It is a set of rut
or guidelines of normal and good behavior that should be followed while communicating :
the Internet.
Some of the rules are given as:
Rule 1: Keep your Personal Details Private
Never share your personal details with anyone whom you met online. Also posting your
personal information like name, address, photograph, etc, in a wrong website/location can
hav~ serious consequences. So, always think twice while sharing your personal details om.
'
Rule 2: Be Tolerant and Careful
Do not ask inappropriate questions on the Internet. Do a detailed research on the topic for
which you are posting a question. People using the internet come from different backgrounds
and have their own views regarding any topic. Always be open to listen to others' view. Be
ethical and do not jump on to the conclusion.
Rule 3: Be Respectful to Others who are Online
Do not abuse others while chatting or during any discussion forum. Also don't expect anyone
else to agree to your perception.
Rule 4: Avoid using All Text in Capital Letters
Do not type a message in all uppercase characters, as it is considered that you are SHOUTJNG.
Rule 5: Don't Try to Steal the Information
Contents visible on the internet are protected by copyright laws. Don't try to steal tbe
information and make it your own.
Rule 6: Even on the Internet, We Are All Human .- t
. 1 ·
U se appropnate anguage m a message. Your text should not be harsh or rude. It should . noin
hurt other people's feelings. Don't ever send offensive comments chning the chatting ses,gon ct
an e-mail on Internet
Rule 7: Don't Indulge in Spamming as
When the site;.owners and mail boxes are flooded with unwanted e-mails, it is referred toailS·
.
e-maii spammmg. D on ' t m
· du Ige yourself by sendmg,
· · to useless e-tll
forwarding or replymg
Rule 8: Use Internet Acronyms . te
Acronyms are some shortcuts of words/sentences that are used frequently to co JI11111Jll1ca
on Internet.
· ns ... ~
A Textbook of Computer AppllcatiO
I
nt acronyms are listed below:
fbe differe .--.,t~~
'
oynas Description Acronyms Description
.''I

As Soon As Possible UR Your


;.sAP
~ Have a Nice Day U2 You Too
~ By The Way TH)( Thanks
aTW
i..-----
Catch You Later TC Take Care
CUL
i---
Check Your Mail TTFN Ta Ta For Now
cYM
i..---

aFN Bye For Now OIC Oh, I See


-
CUL8R See You Later LMK. Let Me Know
-DND Do Not Disturb LOL Laughing Out Loud
FYI For Your Information L8R Later
JK Just Kidding K OK
Rule 9: Use of Emoticons
The word emoticon is derived from two words: emotion and icon. Emoticons are the pictures
that depict different human emotions such as smiling, sad, yelling, crying and angry. Use
emoticons to communicate your feelings and emotions.
Some popular emoticons are listed below:
Emoticons Description Emoticons Description
:) Happy face : ( Sad face
:-) Happy face with a nose :-{ Sad face with a nose
:-D Laughing face XD Laughing hard
;-) Winking face :-L Being tired
:0 Surprise, Shock >:O AngryNeiling

SOFTWARE LICENSE AND OPEN SOURCE SOFTWARE


Softw~e licensing is defined as the legal rights that apply to the authorized use of digital
lllatenal. It provides legal binding guidelines for the distribution of software.
It Offers nght
· to the end user to one or more copies of the software WI.thout VIo . latmg
.
coPYrights. It defines the responsibilities of the parties entering into the license agreement
and may unpose
. .
restrictions on how the software can be used. It may be propnetary, free or
0
Pen source.
' -....ti..

~!!l~IT1oi.
l'i ~ - - -.
·o:· )
s ··------·-----~-.Ii
t0oftware License is defined as the proprietary software distributed under a licensing agreement
auth0 nsed
· persons only.

~er Ethics
It .includes free software with no usage charge but users or. li~ensees a~e legally required to
abide by agreement terms. With proprietary software, the ongma~ c~pynght owner maintains
ownership. By granting a license, which is not always legally bmdmg, the copyright OW]}
is more or less renting or leasing copyrighted materials to licensees. er
Free or open source licenses do not always require signed agreements. However, if a licens
or owner skips this option, the iicensee may not realize all open source licensing benefi:
because an agreement is usually required to redistribute free or open source copyrighted
material. Free licenses provide a licensee with rights similar to the original owner.
An open software is defined as a software distributed under a licensing agreement which
permits the code to be shared and edited by other parties. The main benefit of an open source
software is that it is distributed under a licensing agreement that permits the code to be shared
and edited by other parties. Open source software is available for the general public to use
and modify from its original design free of charge.

Difference between Open Source code and software License


• Source code of open software is easily available. We can view, modify or share the
source code with anyone. But in case of Software License, we cannot view, modify,
or share the source code with any person.
• Quality of source code is better in open software because a lot of people can change
the source code to make a good software but in case of software Licence, Quality of
source code is not as good as open Source software.
• The open source software is technically free, but there is long term cost associated
with it in the form of implementation, support, innovation etc. but in case of software
license, the cost is depending upon the complexity of the solution you want.

INTELLECTUAL PROPERTY ·RIGHTS


Intellectual Property Rights are the rights given to the persons over the creation of their mind
Intellectual property rights reward creativity and human endeavor, which fuel the progress of
humankind. The purpose of Intellectual property right is the giving of copyright to the creator
of created idea, product, etc.

DEFI--ITIO_.
°"Intellectual property right are the rights for the creations of human intellect including
inventions; literary and artistic works; and symbols, names and images eti\
Types of Intellectual Property Rights
1. Copyright: It protects music films literature and other creative works like sourcthe
' Copyright
'
code for computer programs etc. applies for 70 years after the death 0 f e
copyright holder.
2. Patents: It provides protection for novel technical solutions to problems. A Pstent
provides patent owners with protection for their inventions. Patent applications are
published after 18 months. A t . right
patent applies for a maximum of k~O~ A patent is defined as an exc1us,ve
20 years. MORE L...:g:....ra_n_te_d_ fo_r_a_n_ in_ve_n_n_·o_n_. _ _ __
A Textbook of Computer Applications - )(
Trademark protection: It is protection for a symbol for a company, a produc t or
3
· a service. The tradem ark must be unique and be distinguishable from other similar
'
products or servic~s. Tra~emark protection applies for a period of ten years and can
then be extended mdefimtely by ten years ~t a time.

4 Design protection: It prote_cts the appear ance and shape of a produc t, but not the
actual functio n or the underl ying idea. Design protec tion applies for a maxim um

-·-
·
of 25 years.
ion
Intellectual proper ty was first recognized in the Paris Convention for the Protect

rA&I of Industrial Proper ty (1883) and the Berne Convention for the Protect ion of
and Artistic Works (1886).
Literary

c.----
State whether True or False.
1. Intellectual Proper ty Rights are the rights given to the persons over the
creation of their mind.
2. A patent is defined as an exclusive right granted for an invention.
3. Design protect ion applies for a maximum of 20 years.

PLAGIARISM
ping
The word plagiar ism comes from the Latin word for kidnapping. You know that kidnap
's
is called as abducting a person. In the same way, Plagiarism is called as stealing a person
ideas and writing. In Plagiarism, you steal author's ideas, experience, thought, langua
ge, etc.

is your own.
Plagiarism is the practice of using someone else's work and pretending that it
else's work
In other words, plagiarism is an act of fraud. It involves both stealing someo ne
and lying about it afterwa rd.

ledge
Plagiarism occurs when you use other's words, ideas, data, or figures and do not acknow
that you have done so.
must
If you use the words, ideas, or phrasing of another person or from published material, you
• Use quotation marks around the words and cite the source, or
• Paraphrase or summarize acceptably and cite the source.
Types of Plagiarism
t
l./ Direct Plagia rism: It is the act of copying other person's work word to word withou
changing a single word.
2· Paraph rase plagiar ism: It involves making a few changes to someone else's work,
then passing it off as your own.
3• Mosaic plagiarism: It is a combination of both direct and paraphrase plagiarism. It
involves incorporating various words, phrases, and sentences into your essay withou t
providing quotation marks or attributions.
4· Accidental plagiarism: It occurs when citations are missing or sources are cited incorrectly.
'-._223\
Cyber Ethics
How to Avoid Plagiarism
~ avoid plagiarism, you should follow some rules:
r-------------~
1. Instead of copyjng the language k.-OW If you want to check for plagiarism you
of the book as it is, try to put it MORE can use the Turnitin software.
in your own language/words. L, - -.L- - - - - - - - - - - - - 1
2. One should have a clear understanding of Plagiarism.
3. If copying someone else's work is your task, word to word, then do not forget enclosing
it in quotes and also mention its source.
4. If you are not sure that you are documenting your sources correctly (whether by using
parenthetical references or a fully formatted bibliography), ask your instructor~

DIGITAL RIGHTS
Digital rights are the process of relationship between copyrighted digital works and user
permissions and rights related to computers, networks and electronic devices.

Certain digital right/digital rights management (DRM) DEfl~IIIO~ __. r


subcategories are of growing concern - such as information/ ~ 'Qigitai rights are defined as the
Internet privacy and freedom of information. ptocess of accessing and contro-
lling of digital information.
Digital rights advocacy groups include:
a. Entertainment Consumers Association (ECA): It is a U.S based non-profit organi7.ation
that is dedicated to the interests of computer and video game players in the U.S. and
Canada.
b. Free Software Foundation (FSF): It is a Non-profit organization and supports the
free software movement.
c. Electronic Frontier ·Foundation (EFF): It is an International non-profit organization
that oversees digital rights advocacy and legal affairs.
d. Digital Rights Ireland i))RI): It works for civil liberties related to digital rights.
e. European Digital Rights (EDRi): It is focused on copyright, security, privacy and
freedom of expression._
f. - _Open Rights Group (ORG): It is focused on controlling issues like censorship,
knowledge access, privacy, '"freedom of information and electronic voting.
,-- .... ·- --
... ... ...., ....., .............. ~.,....,.~ ~

i_:"J"ft~- - - - : - ~ -- - - - - - - - - - -- - - -
GHECKIP.Ol~T
-_.__.. :.--·- ....
~ ~ ...,.... . , . ; . . - , . - ~ ~ -

Multiple choice questions.


1. The full form of ORG is
~--------
a. Open Rights Groap . :. b. Open Rest Group
c. Orient Rest Group d. Orient Rights Group
2. The word plagiarism conies from the - - - - - - word for kidnapping.
a. Greek b. Rom~n - c. Latin d. None of these

A Textbook of Computer Applications - )(


M Of INFORMATION
f~EE DO f information is used to access information of a citizen's right that is held by the
freedotJls:mecountries, this freedom is supported as a constitutional right.
state, In_ .
Jfl_.11i1! -'
p..,.. of information is defined as the citizen .rights to be informed in writing if a
)f(eedomental agency holds certain information and to request its disclosure.
govern_m_ -------------------- ------1------..J
recognized for transparency, government accountability, education and general public
It wastion against mismanagement and corruption. More than 70 countries with government
protecentation approved the original freedom of information legislation.
repres .
Related human ~ghts contam freedom of expression, data protection (privacy), freedom of
association and nght to development.

DIGITAL DIVIDE
It refers to the gap between individuals, households, businesses and geographic areas at
different socio-economic levels with regard both to their opportunities to access Information
and Communications Technologies (ICT's) and to their use of the Internet for a wide variety
of activities. It includes the imbalance both in physical access to technology and the resources
and skills needed to effectively participate as a digital citizen. Knowledge, typically gender,
income, race and by location. The term global digital divide refers to differences in access
between countries in regards to the Internet and its means of information flow. ·

E-COMMERCE SECURITY ISSUES


Security is an important part of any transaction that takes place over the internet.
Following are some E-commerce security issues:
Customer Security
Basic Principles
Most ecommerce merchants leave the mechanics to their hosting company or IT staff: but it helps
to understand the basic principles. Any system has to meet four requirements:
• Privacy: Information must be kept from unauthorized parties.
• Integrity: Message must not be altered or tampered with.
• Authentication: Sender and recipient must prove their identities to each other.
• Non-repudiation: Proof is needed that the message was indeed received.
~vacy is handled by encryption. In PKI (Public Key Infrastructure), a message is encrypted
~ a public key and decrypted by a private key. The public key is widely distributed, but
0
sm.Y the recipient has the private key. For authentication (proving the identity of the sender,
thi;::~y ~he sender has the particular key) the encrypted message is encrypted again, but
basis f With a private key. Such procedures form the .__,_ __ _ _ _ _ _ __
Pep~ RsA (used by b~nks and governments) and D£fl--lT10-'
lJ retty Good Privacy, used to encrypt emails). E-commerce security is defined as
lar~~:unately, PKI is not an efficient way of sending a set of protocols that safely guide
mounts of information and is often used only as ecommerce transactions.
Cyber Ethics
111111
l

a first step to allow two parties to agree upon a key for symmetric secret key encryptio Ii
sender and recipient use keys that are ge~erat~d for the pa~icular mess~ge by a third :~d ~e
key distribution centre. The keys are not identical but each 1s shared with the·key distrib ~- a
. k ution
center, which allows the message to be read. Then, th e symrnetnc eys are encrypted • th
RSA manner and rules set under various protocols. Naturally, the private keys have~~
kept secret, and most security lapses indeed arise here.

Digital Signatures and Certificates \


Digital signatures meet the need for authentication and integrity. To vastly simplify matters a
plain text message is run through a hash function and so given a value: the message digest
is formed. This digest, the hash function and the plain text encrypted with the recipient's
public key is sent to the recipient. The recipient decodes the message with its private key
and runs the message . through the supplied hash function so that the message digest value
remains unchanged (message has not been tampered with). Very often, the message is also
time stamped by a third-party agency, which provides non-repudiation.
What about authentication? How does a customer know that the website receiving sensitive
information is not set up by some other party posing as the merchant? They check the digital
certificate. This is a digital document issued by the CA (Certification Authority: Verisign,
Thawte, etc.) that uniquely identifies the merchant. -~- - - - .-- - - - - - - - - - - .
Digital certificates are sold for emails, e-merchants ·DO YOU igital signature is an
and web-servers. Digital signature is also known as e-signature that is valid
k--0~ through encryption. J
a public key certificate or identity certificate.

• Security certificate is defined as a unique digital id and it is used to verify the identity of a user.
• Digital signature is a process that verify the authenticity of the message (i.e. the message has
not been altered by someone.)

V ECURE SOCKET LAYERS


Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission
Control Protocol/Internet Protocol). The information is broken up into packets, nwnbeJed
sequentially and an error control attached. Individual packets are sent by different routesd
TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses ~Kl 8?.
digital certificates to ensure privacy and authentication. The procedure is something like ~~-
. u. g PIV,
the chent sends a message to the server, which replies with a digital certificate. slll ·atl
server and client negotiate to create session keys, which are symmetrical secret keys sp~ltio~
created for that particular transmission. Once the session keys are agreed upon coJllIIlUlllca
continues with these session keys and the digital certificates.
SSL has the following requirements:
1. Authentication
2. Encryption
3. Integrity
4. Non-repudiability
· ns - 'I.
rcat10
1
A Textbook of Computer APP
Et firewalls and Kerberos
1fii, ~ ~d details can be safel y sent with SSL, but once store
d on the serve r they are
network. A PCI (Peripheral
cre<fi~~le to outsiders hack ing into the serve r and acco mpan ying
protection. Therefore, anoth er
~ onent Inter co~n ect) hard ware card is often adde d for
ColllP ch altogether 1s adop ted: SET (Sec ure Elec troni c Tran
saction). Deve loped by Visa
icates to authenticate the three
sppro~astercard, SET uses PKI for priva cy and digital certif
information is not seen
aJld. . 01ercba nt, cust ome rk and bank . More importantly, sensitive
..arttes. d .
wilie merchant an IS not ept on the merc hant' s server.
idual PC from attack
F' walls (software or hard ware ) prote ct a server, a netw ork and an indiv
malice or carelessness within
bin:yiruses and hack ers. Equa lly impo rtant is protection from
h uses symmetric secre t key
te system, and many comp anies use the Kerberos protocol, whic
cryptography to restr ict acce ss to autho rized employees.

,;,iciPoi~iiT ~- ------------------
-~~ ·~~-~--
State whether True or False.
1. The full form of TCP is Transaction Control Protocol.
was indeed received.
2. In Non-repudiation, proo f is needed that the message
PC from attack by
3. Firewalls prote ct a server, a netw ork and an individual
viruses and hackers.

[ fAI.UE WO~DS I . .~- --··- ·


I •Digitaesses
l Divid e: Digital Divide refers to the gap _between !ndiv
iduals,. households.
and geographic areas at different soc1o-econom1c level
s with regard to
busin
their oppo rtuni ties to access ICT.
al and good behaviour that
• Netiquettes: It is a set of rules or guidelines of norm
~~ ---- ~-- ______.,
should be follo wed while communica - ~........ting
on the Inter... net. _.
~ ~-~ ------ -- --
lir,•s R1u1.1. 1- - - ~ ~ - - - - ---..--- --~- word s: Inter net a
nd e~iquette. . ;
• The word Neti quet te origi nate d from two
• Software licensing is defin ed as the legal rights apply
to !he_aut~onz~d U:,:.f~I :
· material. It prov ides legal bind ing guidelines for ation the d•stnbution _otesollect 1......, :.._ ,
• , th e ere . s of human in etc. • ~ . . _ ·
l • Int II the rights ,or
Im =that it is ~
t e ectual prop erty right s are d
artis tic work s; and symb ols, name s ao
t inventions· litera ry and
I• Plagiarism' is the practice of using someone else's work and
preten •
. . ~ fi&htthat
I own. · . . .
of a attzen
• Freedom of infor mati on Is used to access information
by the state. · ·
• Digital divid e inclu des the imbalance both in p~y~lcal
ac~s s to
as ~
resources and skills needed to effec tively part1c1pate
• Digital right s are the process of relationshiP.: betw'-l
$ Permissions and right s relat ed to~ mR ter.4
~,...,,._... - •
-Jot • ... ,.._,4_ .w-~C ~,_...':,t;L_.. -.,;

~ r Ethics

You might also like