Computer Notes Class 10th
Computer Notes Class 10th
l -------- .. .
'
NETIQUETTES
The word Netiquette originated from two words: Internet and Etiquette. It is a set of rut
or guidelines of normal and good behavior that should be followed while communicating :
the Internet.
Some of the rules are given as:
Rule 1: Keep your Personal Details Private
Never share your personal details with anyone whom you met online. Also posting your
personal information like name, address, photograph, etc, in a wrong website/location can
hav~ serious consequences. So, always think twice while sharing your personal details om.
'
Rule 2: Be Tolerant and Careful
Do not ask inappropriate questions on the Internet. Do a detailed research on the topic for
which you are posting a question. People using the internet come from different backgrounds
and have their own views regarding any topic. Always be open to listen to others' view. Be
ethical and do not jump on to the conclusion.
Rule 3: Be Respectful to Others who are Online
Do not abuse others while chatting or during any discussion forum. Also don't expect anyone
else to agree to your perception.
Rule 4: Avoid using All Text in Capital Letters
Do not type a message in all uppercase characters, as it is considered that you are SHOUTJNG.
Rule 5: Don't Try to Steal the Information
Contents visible on the internet are protected by copyright laws. Don't try to steal tbe
information and make it your own.
Rule 6: Even on the Internet, We Are All Human .- t
. 1 ·
U se appropnate anguage m a message. Your text should not be harsh or rude. It should . noin
hurt other people's feelings. Don't ever send offensive comments chning the chatting ses,gon ct
an e-mail on Internet
Rule 7: Don't Indulge in Spamming as
When the site;.owners and mail boxes are flooded with unwanted e-mails, it is referred toailS·
.
e-maii spammmg. D on ' t m
· du Ige yourself by sendmg,
· · to useless e-tll
forwarding or replymg
Rule 8: Use Internet Acronyms . te
Acronyms are some shortcuts of words/sentences that are used frequently to co JI11111Jll1ca
on Internet.
· ns ... ~
A Textbook of Computer AppllcatiO
I
nt acronyms are listed below:
fbe differe .--.,t~~
'
oynas Description Acronyms Description
.''I
~!!l~IT1oi.
l'i ~ - - -.
·o:· )
s ··------·-----~-.Ii
t0oftware License is defined as the proprietary software distributed under a licensing agreement
auth0 nsed
· persons only.
~er Ethics
It .includes free software with no usage charge but users or. li~ensees a~e legally required to
abide by agreement terms. With proprietary software, the ongma~ c~pynght owner maintains
ownership. By granting a license, which is not always legally bmdmg, the copyright OW]}
is more or less renting or leasing copyrighted materials to licensees. er
Free or open source licenses do not always require signed agreements. However, if a licens
or owner skips this option, the iicensee may not realize all open source licensing benefi:
because an agreement is usually required to redistribute free or open source copyrighted
material. Free licenses provide a licensee with rights similar to the original owner.
An open software is defined as a software distributed under a licensing agreement which
permits the code to be shared and edited by other parties. The main benefit of an open source
software is that it is distributed under a licensing agreement that permits the code to be shared
and edited by other parties. Open source software is available for the general public to use
and modify from its original design free of charge.
DEFI--ITIO_.
°"Intellectual property right are the rights for the creations of human intellect including
inventions; literary and artistic works; and symbols, names and images eti\
Types of Intellectual Property Rights
1. Copyright: It protects music films literature and other creative works like sourcthe
' Copyright
'
code for computer programs etc. applies for 70 years after the death 0 f e
copyright holder.
2. Patents: It provides protection for novel technical solutions to problems. A Pstent
provides patent owners with protection for their inventions. Patent applications are
published after 18 months. A t . right
patent applies for a maximum of k~O~ A patent is defined as an exc1us,ve
20 years. MORE L...:g:....ra_n_te_d_ fo_r_a_n_ in_ve_n_n_·o_n_. _ _ __
A Textbook of Computer Applications - )(
Trademark protection: It is protection for a symbol for a company, a produc t or
3
· a service. The tradem ark must be unique and be distinguishable from other similar
'
products or servic~s. Tra~emark protection applies for a period of ten years and can
then be extended mdefimtely by ten years ~t a time.
4 Design protection: It prote_cts the appear ance and shape of a produc t, but not the
actual functio n or the underl ying idea. Design protec tion applies for a maxim um
-·-
·
of 25 years.
ion
Intellectual proper ty was first recognized in the Paris Convention for the Protect
rA&I of Industrial Proper ty (1883) and the Berne Convention for the Protect ion of
and Artistic Works (1886).
Literary
c.----
State whether True or False.
1. Intellectual Proper ty Rights are the rights given to the persons over the
creation of their mind.
2. A patent is defined as an exclusive right granted for an invention.
3. Design protect ion applies for a maximum of 20 years.
PLAGIARISM
ping
The word plagiar ism comes from the Latin word for kidnapping. You know that kidnap
's
is called as abducting a person. In the same way, Plagiarism is called as stealing a person
ideas and writing. In Plagiarism, you steal author's ideas, experience, thought, langua
ge, etc.
is your own.
Plagiarism is the practice of using someone else's work and pretending that it
else's work
In other words, plagiarism is an act of fraud. It involves both stealing someo ne
and lying about it afterwa rd.
ledge
Plagiarism occurs when you use other's words, ideas, data, or figures and do not acknow
that you have done so.
must
If you use the words, ideas, or phrasing of another person or from published material, you
• Use quotation marks around the words and cite the source, or
• Paraphrase or summarize acceptably and cite the source.
Types of Plagiarism
t
l./ Direct Plagia rism: It is the act of copying other person's work word to word withou
changing a single word.
2· Paraph rase plagiar ism: It involves making a few changes to someone else's work,
then passing it off as your own.
3• Mosaic plagiarism: It is a combination of both direct and paraphrase plagiarism. It
involves incorporating various words, phrases, and sentences into your essay withou t
providing quotation marks or attributions.
4· Accidental plagiarism: It occurs when citations are missing or sources are cited incorrectly.
'-._223\
Cyber Ethics
How to Avoid Plagiarism
~ avoid plagiarism, you should follow some rules:
r-------------~
1. Instead of copyjng the language k.-OW If you want to check for plagiarism you
of the book as it is, try to put it MORE can use the Turnitin software.
in your own language/words. L, - -.L- - - - - - - - - - - - - 1
2. One should have a clear understanding of Plagiarism.
3. If copying someone else's work is your task, word to word, then do not forget enclosing
it in quotes and also mention its source.
4. If you are not sure that you are documenting your sources correctly (whether by using
parenthetical references or a fully formatted bibliography), ask your instructor~
DIGITAL RIGHTS
Digital rights are the process of relationship between copyrighted digital works and user
permissions and rights related to computers, networks and electronic devices.
i_:"J"ft~- - - - : - ~ -- - - - - - - - - - -- - - -
GHECKIP.Ol~T
-_.__.. :.--·- ....
~ ~ ...,.... . , . ; . . - , . - ~ ~ -
DIGITAL DIVIDE
It refers to the gap between individuals, households, businesses and geographic areas at
different socio-economic levels with regard both to their opportunities to access Information
and Communications Technologies (ICT's) and to their use of the Internet for a wide variety
of activities. It includes the imbalance both in physical access to technology and the resources
and skills needed to effectively participate as a digital citizen. Knowledge, typically gender,
income, race and by location. The term global digital divide refers to differences in access
between countries in regards to the Internet and its means of information flow. ·
a first step to allow two parties to agree upon a key for symmetric secret key encryptio Ii
sender and recipient use keys that are ge~erat~d for the pa~icular mess~ge by a third :~d ~e
key distribution centre. The keys are not identical but each 1s shared with the·key distrib ~- a
. k ution
center, which allows the message to be read. Then, th e symrnetnc eys are encrypted • th
RSA manner and rules set under various protocols. Naturally, the private keys have~~
kept secret, and most security lapses indeed arise here.
• Security certificate is defined as a unique digital id and it is used to verify the identity of a user.
• Digital signature is a process that verify the authenticity of the message (i.e. the message has
not been altered by someone.)
,;,iciPoi~iiT ~- ------------------
-~~ ·~~-~--
State whether True or False.
1. The full form of TCP is Transaction Control Protocol.
was indeed received.
2. In Non-repudiation, proo f is needed that the message
PC from attack by
3. Firewalls prote ct a server, a netw ork and an individual
viruses and hackers.
~ r Ethics