0% found this document useful (0 votes)
5 views

selfstudys_com_file (14)

Hj

Uploaded by

gitakumari7609
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
5 views

selfstudys_com_file (14)

Hj

Uploaded by

gitakumari7609
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 24
Web Applications and Security Fastracl« Revision > Computer Accessibility: Computer accessibility refers to the options that make a computer system easy to use for all, even for the people having disabilities. Accessibility options are also referred as Assistive Technology as these help disabled people to use computers in a comfortable and efficient manner so they canalso take Full advantage of the computer. > Ease of Access Center: The Ease of Access Center ‘window has various utilities to enhance accessibility of the computer. Let us learn about them. > Start Magnifier: This tool has a display utility to increase text readability by displaying a magnified selected text in a separate window or screen. > Start Narrator: This tool has a text-to-speech utility to read the contents displayed on screen > Start On-Screen Keyboard: This tool has a virtual keyboard displayed on the screen to enable typing of data using a joystick or any other pointing device. > Set-up High Contrast: This tool has a utility to increase the colour contrast on the screen for making it easier toread. » Launching Ease of Access Center: Click on start + All programs -* Accessories > Ease of Access > Ease of ‘Access Center, to open the Ease oF Access Center. » Other Basic Accessibility Features: The other basic accessibility Features listed under the Explore all settings section on the Ease of Access Center are as follows. Let us learn about them. > Use the Computer Without a Display: This feature is very useful for the people who are unable to view things on the screen and are having severely impaired vision. > The Turn on narrator option enables the Narrator to read aloud the text displayed on the screen and explains the various events such as appearance of error messages and notifications while using the computer. > The Turn on Audio Descriptor option describes what is happening in a video. > The Turn off All Unnecessary animations option is Used for turning off all the animations that are not required or are unnecessary suchas fading effects, etc. > Make the Computer Easier to See: This Feature lets Us adjust various settings related to the visual display of the computer screen. It is useful For the people who have eyesight problem. + The Choose a High Contrast Theme setting allows Us to adjust a high-contrast colour scheme which allows some text and images on the computer screen to appear differently and easier to recognise. ‘+ The Turn on Audio Description setting allows audio descriptions to play whenever we log on to our computer. + The Adjust the colour and transparency borders setting enables us to change the look of window borders For making them easler to see. > Use the Computer Without a Mouse or Keyboard: This Feature Is useful for the people who are not capable ‘enough or have some difficulty in using the keyboard or mouse. The Use On-Screen Keyboard setting Is used to activate the on-screen keyboard, > Make the Mouse Easier to Use: This feature helps in deciding the looks of a pointer on screen or making it appear larger on the screen so thata person with visual disability can see the pointer on the screen. > Make the Keyboard Easier to Use: This feature(s useful for making the usage of keyboard easier For the people ‘whe have difficulty in using the keyboard, normally. + The Turn on Mouse Keys option allows using of arrow keys on our keyboard or the numeric keypad to move the pointer on screen instead of using mouse. + The Turn on Sticky Keys option lets us use multiple shortcut keys (such as Ctrl + Alt + Delete) by pressing one key at a time instead of pressing all the three keys together. ‘+ The Turn on Toggle Keys option plays a tone when the Caps Lock, Num Lock, or Scroll Lock keys are pressed. + The Turn on Filter Keys option is helpful for ignoring keystrokes that have taken place in rapid succession, or keystrokes that are being pressed for several seconds inadvertently. > Serial Key: Serial key is a string of characters or equivalent access code that Is input into 2 program to activate it. It is an accessibility Feature that assists people that have difficulty using a keyboard or a mouse or both. > Computer Network: A computernetworkisa collection oF computers or other hardware devices that are connected together using special hardware and software, which enables us to exchange information and resources. > Node: Each computer in the network is called 3 node. There is no limit to the distance between two computers in a network. > Advantages of a Computer Network: > Exchange of information/File Sharing > Resource Sharing > Reduced Costs > Better Storage Capacity > Disadvantages of a Computer Network: > Data Security > Lack of Robustness > Expensive Set-up Cost > Threat to Virus and Malware > ARPANET: Networks came into existence when Advance Research Project Agency (ARPA) started working onanetwork, in 1962. ARPA launched its first successful long distance communication network, in 1969, with the name ARPANET. Ie consisted of Four universities, which interconnected the researchers working on the project at that time. > Computer Network Components: The following are the basic components of a computer networ > Sender/Transmitter: The transmitter is the device, such as a computer, workstation, telephone handset or video camera, that sends a message. > Recelver: It Is also a device such as a computer, workstation, telephone handset ora video camera, that receives a message. > Medium: The physical path by which a message travels, from the sender to receiver is called as a transmission medium. For example, twisted palr cable, fibre-optic cable, coaxial cable, laser or radio waves. > Message: The messages the actual data whichis to be transmitted for communication > Protocol: A protocol is a set of guidelines that controls, the data communication 4. Message “3, Medium 1. Transmitter 2. Receiver << —. setot_ | —————> | setor Rules | Agreement betweenthe | Rules ‘communicating devices L_., awa} Fig, Relationship among the five components of network > Types of Computer Network: Computer networks can be classified on the basis oF geographical area covered by a network, into the Following categories: > Personal Area Network (PAN): PAN is the smallest network which is very personal to a user. This may include Bluetooth-enabled handheld devices or infrared enabled devices. PAN's connectivity range is up to 10 metres. PAN may include wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless printers, TV remotes and much more. > Local Area Network (LAN): LAN covers a small area. It isa privately-owned small network that spreads across ‘a small campus or @ building or from one room to 3 campus of a Few kilometres. Usually, Local Area Network can be utlisedin offices, schools, colleges or universities. The network inside your school’s computer lab or a network within 2 ‘small office are some examples of LAN. > Metropolitan Area Network (MAN): MAN is an extension of Local Area Network that can connect computers in a big city. MANS are mainly owned by large organisations to interconnect all their branches, across acity. > wide Area Network (WAN): WAN is the biggest type of network available for the computer systems. As the name suggests, this network covers @ wide area which may spread across the cities or different countries A Wide Area Network contains many sophisticated and costly devices that are generally not used in other networks, such as Local and Metropolitan Area Networks. The examples of Few of these devices are satellites, mobile phones, routers, bridges and gateways. > Network Architecture: Network Architecture is an overall design of a computer hardware and their Functional organisation and configuration. Computer networks are designed in two different ways. Network Architecture Peer-to-Peer Network Client-Server Network > Peer-to-Peer Network: Peer means equal and therefore in a peer-to-peer network, each computer or node is equal to other computers in terms oF the resources that it can access and share. > Client-Server Network: in a client-server network, there is @ powerful central computer which has more resources than the other computers connected to the network. This central computer is known as the Server and the other computers are known as Clients or Nodes or Workstations, > Network Topology: Network topology refers to the basic geometric layout according to which the server and clients are connected via @ channel. The three most common network topologies are bus, ring and star. > Bus Topology: Bus topology is most commonly used in LANs wherein the server, clients and shared resources are all directly connected to a single common channel This common channel is called as the bus. The channel runs through the network from one end to another. The common channel has terminators at each end. Only ‘one computer can transmit over the network at a time, > Ring Topology: In Ring topology, all the computers are connected in a large closed-loop circuit so that each computer is linked to two adjacent computers, on either side. in this topology, the message sent by 2 sender is received by every client in the network. But the message is read only by the receiver to which it was addressed. > Star Topology: In Star topology, all the clients are individually connected to a centrally located server via 2 direct channel. This topology was commonly used with the mainframe computers. The entire communication over the network takes place through the central server. Network Devices: Network devices are the components that help us to connect computers or other electronic devices together so that they can share data or resources, like printers or scanners. > Hub: A network hub is a networking device thats used to help us in connecting multiple network hosts. A network hub is also used for data transfer. > Switch: A switch is more intelligent than @ hub. While a hub only Forwards the data, a switch does filtering and forwarding which is a more prudent way of dealing with the data packets. > Router: A router is a network device which is responsible For routing data traffic from one jammed network to another free network > Bridge: A bridge connects two subnetworks, which are a part of same network. A bridge works as a router that connects two different types of networks. > Repeater: A repeater is an electronic device that amplifies the received signal. It receives a signal and retransmits it with a higher level or a higher power so that the signal can travel longer distances before Fading out. > Gateway: A gateway is a network node that provides access to another network that uses different protocols and enables data to be transmitted from one node to another. Internet: The term Internet stands for International Network. Its a worldwide system of computer networks. It is the largest public network that allows users to get connected with each other all over the world and to exchange information with each other. An Intranet is @ private network that Is contained within an enterprise. It may consist of many interlinked Local Area Network and also use leased lines in the Wide Area Network Working of the Internet: The Internet network is based on the Client and Server architecture of the network model. Server: A Server computer is a core component of the network, which provides services to the clients and controls the access to hardware, software and other resources. CCllents: Clients are the computers that normally request and receive Information or the services over the network Clients and Server Network Model: The client computer isthe computer onto which we want to access the Internet. After acquiring a physical internet connection, a request Is sent to the server computer requesting for a web page Using an application program known as the web browser. The web browser sends the request to a server computer, which accepts the request and starts sending the Information from the server computer to the client computer. > World Wide Web: The World Wide Web (WWW), often calledasthe Web, isa collection of information arranged in the Form of documents that may contain text, hyperlinks, multimedia (Le, audio and video). It is an information- sharing model that is built on the Internet. > Basics of WWW: The working of WWW is based on the Following web technologies: > HTML (Hypertext Markup Language): A language that is used to create web content that travel over the web, > HTTP (Hypertext Transfer Protocol: It isthe protocol that communicates and transports documents over @ large network like the internet. > Web Servers: These are the host computers that store all the web content > Web Browser: Aweb browser san application program installed at client's computer that sends the request to a web server for viewing the web content, for example, the Internet Explorer, Mozilla Firefox, Baidu, Google Chrome, ete. > Ways to Connect to the Internet Services: Internet services enable the user to access and gain information through the use of the Internet. There are different ways to connect laptops, desktops, mobile phones and tablets to the Internet, For example, dial-up, broadband, wireless services and much more. Let us learn about them. > Dial-Up: in the dial-up connection, a user needs to link his/her telephone line to the computer through 2 modem. A modem connects to the Internet after the computer dials a phone number. It works as an interface between the computer and the telephone line. tt converts analog signals to digital signals and sent them through telephone lines, in order to connect tothe internet. > Broadband: It is 2 high-speed Internet connection It is provided through either the cable or telephone companies. It Is the one of the fastest options to transfer data > Cable Internet Connection: It is also a form of broadband access. It provides the Internet through 2 cable modem, which is provided by the cable operator. > Wireless: Wireless networking s also known as WIFI. It is a way of getting the Internet without wires. It allows you to connect several computers at once and from any location which sin its network range. > Mobile: Many cell phone and smartphone providers offer different plans to access the Internet. For this, you require a device called a dongle. Mobile Internet connections have very good speeds to access the Internet. > Satellite: In a satellite Internet connection, the transfer of data is through a satellite. Satelite Internet equipment is made up of three main components: an orbiting satellite in space, 2 satellite dish mounted fon your home and a modem that transmits Internet signals from the dish to your computer. > ISP: An Internet Service Provider (ISP) Is an organisation that provides services accessing and using the Internet. > Hotspot: Hotspot is based on the WiFi technology. It allows electronic devices to connect to the Intemet or exchange data wirelessly through radio waves in place of the telephone or cable networks. Instant Messaging: A communication service over the Internet which allows instant transmission of text-based messages from the sender to receiver is known as Instant Messaging (IM). ‘Types of Instant Messaging Softwares: There are two types of instant messaging software: > Web-Based Instant Messaging Software: These are accessed via a web browser. There is no need to download and install any software on the computer system for using them. Example: Meebo, Kool IM, Yahoo! > Application-Based Messenger Software: Application- based messenger software are the messengers that are downloaded and installed to a user's computer. Example: Skype, Google Talk, Hike Messenger Google Hangouts: Google Hangouts is a free instant messenger software developed by Google. It can easily be downloaded for free from the Internet. It supports different platforms such as Windows, Linux , Mac OS, etc. Blog: A website in which articles are posted regularly and displayed on reverse sequential order is known as 2 blog Blogger: The person who writes a blog. Blogging: Authoring, maintaining or adding an article on the existing blog is known as blogging. Types of Blogs: The blogs can be of different types, some oF which are as Follows: > Personal Blogs: These blogs are developed by a user for his/her personal use. It is just like maintaining 8 personal diary, online > General Blogs: These blogs contain information, articles and discussions related to a particular subject. > Organisational Blogs: These blogs are created to generate business. These types of blogs are generally used by organisations, corporations, etc. Blog Desk: Blog Desk isa free offline blog editor that can easily be downloaded free From the Internet and installed ona computer system. Online Transaction: An online transaction is a financial transaction that happens in real-time using the Internet. Cookies: Cookies are small files which are stored on a User's computer. These files contain the programs that are created on our local computer when we visit websites. Virus Threats: The term VIRUS stands for Vital Information Resource Under Seize. A computer virus Is similar to a biological virus. When a biological virus attacks Us, it makes us Feel sick. It disrupts us From Functioning normally and often requires something powerful to get rid oF it. In the same manner, a computer virus Is capable to replicate itself persistently. Computer viruses infect computer programs and Files Symptoms of a Computer Virus: Some of the common symptoms that are exhibited by a computer, in case of a Virus attack, are as Follows: > Unusual messages start appearing on the screen while working > The computer tends to run slower than the normal. > The space on the disk is reduced. > Applications take 2 long time to load and may not work propery. > Types of Computer’ of computer viruses: > Resident Viruses: They are permanent viruses that reside in the RAM of a system. They can interfere and disturb the normal working of a computer. Some examples of such viruses are Jerusalem, Onehalf, Magistr, Junkie and Satanbug. > Non-resident Viruses: They are similar to the resident viruses except that these do not reside in the RAM of a system, rather they reside in a module of a program. > Program Viruses: These infect the files with the extension EXE, COM, SYS, OV and.SCR. The program Files are used by the virus as they are easy to attack and they have simple Format to which the virus can attach itself. > Macro Viruses: Macro language is used in the Macro virus, for its programming. It is a set of commands written by the user to be executed later. Data files are affected by these viruses. > Trojan Horse: It is a program which appears to be Useful. Confidential information is stolen and passed Using this virus. A Trojan horse enters the computer with the help of the users. The users install it under the wrong impression that it is a useful and harmless program. > Malware: It refers to the program which harms the computer and comes into the computer without the user's consent. Malware is the short name of Malicious Software. It slows down the computer and networks. It is actively destructive and annoying > Spyware: Spyware Is a kind of malware that Is sent to someone's computer intentionally to steal information such as e-mail passwords, credit card password, etc. > Worms: This virus is 2 program which is capable of reproducing and spreading Itself to another computer system with the help of the computer network. This type of virus does not cause direct damage to the files and the programs, > Boot Virus: The boot records of hard disk are infected by this virus. These viruses are more dangerous than the program virus. Some examples of these viruses are Disk killer and Stoned virus. > Spamming: The unwanted e-mails that come in bulk from strenge and unknown sources are called spam. Spamming Is the process of sending same copies of e-mails to a large number of people, worldwide, Usually spams are sent with the purpose of advertising by commercial agencies. > Phishing: Phishing is a form of fraud in which the attacker tries to steal or take out information such as login credentials or account information. > E-mail Spoofing: E-mail spoofing is the Forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source > Accident: It Is an unplanned, undesigned and unexpected event that may happen all of a sudden and may lead to unwanted or unprecedented results/outcomes. 5: There are many different types > Emergency: Any unexpected situation that needs immediate attention, intervention or action to prevent a ‘worse situation is an emergency. > Hazards: A hazard may be any object, situation or behaviour that has the potential to cause injury, ill health cor damage to property or the environment. » Types of Hazards: Hazards can be of different types, depending on the industry and the environment in which the employees work. The different types of hazards are as follows: > Physical Hazards: They are environmental Factors that canharm an employee without necessarily touching them. Chemical Hazards: They are present when a worker is exposed to any chemical preparation in the workplace, in any Form (solid, liquid or gas) > Multiple choice Questions y Which of the followin networks? a. Less cost b. Less reliability < Down performance d Rigid working environment a benefit of the computer Q2. Which of the following is a type of network? a. SAN b.NAN TAN MAN Q3. Which of the following devices is a network connecting device? a. Hub b. Mouse Printer ¢. Monitor 4. Which type of network is used to connect two computers and a printer? a. PAN b LAN WAN MAN 5. Which of the following is the full form of LAN? ‘a Local Area Network — b. Land Area Network Large Area Network d, None of these Which of the following is the full form of IM? a. Instant Messaging C.Internal Messaging d. None of these What is the full form of HTML? a. Hypertext Manipulating Links bb. Hypertext Manipulation Language Hypertext Managing Links d. Hypertext Markup Language What is the full form of Internet? a. Internet Network b. International Network Inter Network Intra Network Q6. b. Instant Message Q7. Q8. Q9. .. Quo. qu Qua. Qus. Qu. Qus. Que. Qu. Biological Hazards: They include exposure to harm or disease From working with animals, people or Infectious plant materials. Viruses, bacteria, insects, animals, etc, ‘can cause adverse health impacts. Safety Hazards: These are hazards that create unsafe working conditions which can cause injury, death or illness. For example, exposed wires or a damaged ‘carpet might result ina tripping hazard. Ergonomic Hazards: They are the result of physical Factors that can cause musculoskeletal injuries. Psychosocial Hazards: They include those hazards that can have an adverse effect on an employee's mental health or well-being, For example, sexual harassment, victimisation, stress and workload demands. xB Practice Exercise is an accessibility function which is designed for people who have vision impairment or cognitive disabilities. [ces 2023) a. Fitter Keys b. Sound Keys Toggle Keys , Sticky Keys Which of the following you must have in order to use Google Hangouts? ‘a. Yahoo id © Microsoft Id b. Google id d. None of these In which of the following, title of the blog is specified? a, Menu bar b. Blog area € Title box d. Category list Which of the following is a concern related to the Internet security? 2, Data privacy b. Confidentiality c Integrity d. All of these Which of the following viruses can infect an Excel document? 2. Boot virus b. Program virus © Macro virus d. All of these What is the full form of VIRUS? a, Vital Information Resource Under Seize b. Vast Information Resource Under Seize € Vital Information Record Under Seize d. None of the above Which of the following viruses resides in the RAM of a computer system? ‘a. Non-resident virus. Resident virus Boot Sector virus d. Creeper virus What involves the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source? 2. Spamming b. Phishing Hacking d. E-mail spoofing A . is an unplanned event that may happen all ofa sudden and may lead to unwanted or unprecedented results/outcomes. [cose 2023) a. emergency b. hazard ¢ accident lines Q16. Qu9. Q20. QL. . Qzz. 923. Q24. Q2s. Q26. Qa. Q28. Q29. Q30. Which of the following hazards are the result of physical factors that can cause musculoskeletal injuries? a. Blological hazards —_b, Safety hazards Ergonomic hazards — , Psychosocial hazards Which of the following is not a benefit of the computer network? a. Less cost b. Increased reliability c. Improved performance 0. Lack of robustness Which of the following is not a type of network? a. TAN b. LAN WAN 0. MAN provides Internet access by transmitting digital data over wires of a local telephone network. [cose 2025] a. HSDPA b, P2P DSL d. Modem, Which type of network will be used to connect five computers and a printer? 2. PAN b. LAN WAN 0. MAN Which of the following is the full form of MAN? ‘2. Metropolitan Access Network bb. Metro Access Network Metro Area Network d. Metropolitan Area Network Which of the following is the full form of ISP? 2. Internet Service Provider b. internet Service Promoter Internet Service Promotion 4. None of the above Which of the following terms defines an area where access is available? 2. Hotlink b. Hypertink c. Hyperspot d. Hotspot What is the other name for wireless networking? a. Android b. Mobile c. WiFi d. None of these Which of the following are used as satellite Internet equipment? 2. Satellite b. Dish c. Modem 4. Allof these Which is no physical wired connection between sender and receiver to communicate, called? a. Dial-up b. Wireless: . Broadband d, Allof these Which of the following folders in the Control Panel contains accessibility options? a. Device Manager b, Ease af Access Center c Font d, Personalisation Which of the following options activates the Sticky keys? a. Turn on Sticky Keys Tur on Toggle Keys b. Turn on Filter Keys J. None of these 31 Google Hangouts is the product of which company? a. Microsoft b, Google € Yahoo Oracle Q.32. When was Google talk discontinued? 2.205 —b, 2010 ©2008 4. 2004 Q.33. Which of the following is an example of blogging website? a. wwwyahoocom ——_b. wwigmailcom cc. wwnwblogspotcam — d. wwwgaogle.com 034. Which of the following is an offline blog editor developed by Microsoft? a. BlogDesk b. Qumana c Windows Live Writer d, Marsedit Q35. Which of the following blog editor is especially mean for MAC computers and is a paid software? a. BlogDesk b. Qumana Windows Live Writer d. Marsedit Q.36. Which of the following is the correct full form of wysiwyG? a. What You Saw Is What You Get b. What You See Is What You Get What You Saw Is What You Got d. None of the above 37. Which of the following contains commands that are used to write, edit, format, save and publish blogs? a. Menu bar b, Blog area c Title box d. Category list Q.38. Which of the following is the correct full form of EFT? a. Electric Funds Transfer b. Electronic Funds Transfer © Electronic Funds Transformation d. None of the above Q.39. Which of the following is an example of Web-based instant messaging software? a. MS Word b. Facebook Meebo 4. Gmail Q.40. Networks in which certain computers have special dedicated tasks, providing services to other computers (in the network) are called .. networks. [c0st 2023} a. hlerarchicat b. dedicated server © peer-to-peer d. client-server Qa. is the process of emptying a place in case of an emergency, disaster. [case 2023) a. Emergency b. Accident c Drill . Evacuation 942. Which of the following viruses infects the boot records on the hard disk? a. Macro b. Malware © Boot Virus d. Worm Q.43. Which of the following is an example of an antivirus software? ‘a. Quick Heal Total Security b. Nortan Antivirus c McAfee Antivirus J. All of the above Q44. 45. 46. gar. 48. Q49. Qs. Qs. sz. 53. Qs. ass. Q 56. Qs7. Q se. Q59. 60. Qa. ez. 63. A worker will always perform to the best to his ability. [cose 2023] a. fast working b. highly educated happy and healthy —d. stressed Computer accessibility or friendliness of computer is known as a. technology b. assistance technology assistive technology d. None of these Identify the cognitive impairment from the following: a. Dystexi b. ADHD < Autism d. All of these Keyboard accessibility options are useful for those which have a. Physical Disabilities € Both a. and b. Fill in the Blanks type Questions y b. Vision Impairment d. None of these device. on a computer Computers have evolved into a We can share different network. Computers have really converted the world into 2 small zs Accessibility options are also referred as Ease of Access Centre is also a part of folder. Computers include options which make the computer more easy to use for the people having disabilities. The... is also known as web or net. Each computer in a network is called a MAN is an extension of.. . is an example of Wide Area Network. Name the device that converts digital signal to analog that can travel over phone lines. [cose Sop 2022, Term-2] key is an accessibility function which is designed for people who have vision impairment or cognitive disabilities. [case sop 2022, Term2] Networks in which certain computers have special dedicated tasks, providing services to other computers (in the network) are called. network [case Sop 2022, Term-2] is an organisation which provides you with access to the internet via dial-up or direct or wireless connection. [case Sop 2022, Term-2] is the software or hardware security device that analyses the network traffic and determines ifthe traffic should be allowed or not. [cose Sop 2022, Tarm-2] immediate assistance is provided to the injured to save life and minimise health loss till the proper medical aid/facility is provided. [case Sop 2022, Term-2] Assertion & Reason type Questions y Directions (Q. Nos. 64-74): In the questions given below, there are two statements marked as Assertion (A) and Reason (R). Read the statements and choose the correct option. a. Both Assertion (A) and Reason (R) are true and Reason (A) s the correct explanation of Assertion (A). b. Both Assertion (A) and Reason (R) are true, but Reason (R) Is not correct explanation of Assertion (A). Assertian (A) is true, but Reason (R) is false. d. Assertion (A) is false, but Reason (R) is true 64. Assertion (A): Make the computer easier to see feature lets you adjust various settings related to the visual display of the computer screen. It is useful for the people who have eyesight problem. Reason (R): The change the colour and size of mouse pointers setting is helpful in increasing the size of mouse pointer, or changing the colour to make it easier to view on the screen. Q65. Assertion (A): The Turn on Mouse Keys option lets you use multiple shortcut keys (such as Ctrl + Alt + Delete) by pressing one key at a time instead of pressing all the three keys together. This option is helpful for the people who can work with both hands and use all fingers. Reason (R): The Use On-Screen Keyboard setting is used to activate the on-screen keyboard. You can press the keys of the on-screen keyboard by using the pointing device such as mouse or joystick. 066. Assertion (A): Computer networks have made our lives easier. From the World Wide Web (WWW) to the Local Area Network (LAN), computers have become indispensable in our daily life. Reason (R): Toggle key is a string of characters or equivalent access code that is input into a program to activate it. It is an accessibility feature that assists people that have difficulty using a keyboard or a mouse or both. 67. Assertion (A): A computer network is a collection ‘of computers or other hardware devices that are connected together using special hardware and software, which enables us to exchange information and resources. Reason (R): There is no limit to the distance between two computers in a network. It can vary from a few meters to thousands of kilometers. Each computer in the network is called a node. Q68. Assertion (A): Through a computer network, peripherals such as, printers, scanners, fax machines ‘and modems can be shared among different users. Reason (R): In a computer network, application programs and other costly software are installed on one central computer. Users connected to a network can access these programs or software through the central computer. 69. Assertion (A): The protocol is the device, such as 36.(b) 37. (2) 38. tb) 39.) 40. (6) 2 computer, workstation, telephone handset, or 4L@) 42 43 @) 44) 45.10) video camera that sends a message. 46.() 47. (0) Reason (R): The physical path by which a message 48. versatile 49. peripherals travels from the sender to receiver is called as a 50. global village 51. assistive technology transmission medium. For example, twisted pair 52 accessories 53. accessibility cable, fiber-optic cable, coaxial cable, laser or radio 54. Internet 55. node waves. . 56. Local Area Network 57. Internet Q70. Assertion (A): PAN is the smallest network which 58. MODEM 59. Toggle Key is very personal to a user. This may include eorciaecaa euaise Bluetooth-enabled handheld devices or infrared enabled devices. PAN's connectively range is up to Serie Ss GEA 10 meters. 64.(6) 65. (6) 66.1) 67. (b) 68. () Reason (R): PAN may include wireless computer 69.(4) 70.(a) 7b) 72. tb) 73. (d) keyboard and mouse, Bluetooth enabled headphones, 74.(0) wireless printers, TV remotes and much more. Q7L Assertion (A): In a client-server network, there is a powerful central computer which has more resources than the other computers connected to Case Study 1 the network. The school offers WiFi to the students of Class Reason (R):Client-Servernetworks typical t een eee tet at te edi XIL. For communication, the network security- of two parts. The front-end of the application e , is what tha user seasrand Interacts cleccthy The staff of the school is having a registered URL Case Study Based type Questions y back-end part interacts with the shared resources “schoolwifi.edu". On 17th September, 2017, such as databases, printers, or high power e-mails were received by all the students processors. regarding expiry of their passwords. Instructions 72. Assertion (A): Network topology refers to the basic were also given renew their password within geometric layout according to which the server 24 hours by clicking on particular URL provided. and clients are connected via a channel. QL Specify which type of cybercrime is it? Reason (R): The computers on the network need. a. Spamming b. Phishing to be arranged according to a specific topology to Identity theft 0. Hacking provide specific level of access to the network. Q2. URL stands for.. Q73. Assertion (A): Ring topology is most commonly a. Universal Resource Loader used in LANs wherein the server, clients and b. Uniform Resource Locator shared resources are all directly connected to a United Research Loader single common channel. This common channel is 4. Uniform Resource Loader called as the bus. Q3. Unsolicited commercial e-mail is known as: Reason (R): The channel runs through the network a Malware b. Virus from one end to another. The common channel has Spam a Spyvare terminators at each end. Only one computer can (ae WF stands for transmit over the network at a time. Q74. Assertion (A): Network devices are the components that help us to connect computers or other electronic devices together so that they can share data or resources, like printers or scanners. a Wireless internet Frequent interface b. Wireless Functioning c. Wireless Fidelity 4. Wire Free Internet Reason (R): Through a computer network,peripherals ‘Answers a such as, printers, scanners, fax machines and modems can be shared among different users LO) 2) 3 KO ‘Answers « Case Study 2 le 20 2 40 SO E-mail: It is an electronic version of sending and receiving leters. The e-mail is. transmitted ae fe FO Ro Be between computer systems, which exchange fe a o et &) messages or pass them onto other sites according, 16.() 17.) 18) 19.) 20.) tocertain Internet protocols or rules forexchanging, 2-22) -23.(6) 2A. (2) 25.) e-mail. You can send ¢-mail from your computer 26.) 27.) 28.(b) 23. (6) 30. @) at any time to any address around the world and 31(b) 32.3) 33. 34. (9 35.) your electronic letter or e-mail will arrive at its destination in seconds after you send it, even if the from unknown people. Everytime he goes online, receiver is not online. For sending and receiving he finds someone chasing him online. an e-mail, you must have an e-mail account, which Q1. Smridh is a victim of which attack? is either a web based online e-mail account or an Q2. What is the term used for a set of moral e-mail account on your ISP server. Web based it : Salnie'e all acne cas RE eae a aaa principles that governs the behaviour of a sites like Gmail, Yahoo mail, Redifmail, etc Group or individual and regulates the use of QL. Which of the following is always a part of computers? e-mail address? Q3. Smridh needs to protect his personal information a. Perlod() b. Space) or data from unintentional and intentional attacks © Atsign(@) .Underscore(_) and disclosure. Name the term. 2. Which among the following is an area of e-mail i that is short description of the message? 4. Define Phishing, a. Subject b.Ce - Answers + c Bcc d. Attachment 3. Identify the software that helps you in sending \ Cyber ataliiig and receiving an e-mail. 2. Computer ethics a. MS-Office b.internet explorer 3. The term used is Privacy bade aad d.Neneot these, 4, The act of fraudulently acquiring someone's per- Q4. Junk mail is also called: Tand 5 hae oni “a8 —_ sonal and private information. such as online ac- c Spam 4 Shiffer script count names, login information and passwords {s called as Phishing. Answers Case Study 5 1 = 20) 30 46 ‘Types of Computer Network: Generally, Case Study 3 networks are classified on the basis of Sumit has to prepare a project on “Swachh Bharat geographical area covered. A network can be Shreshth Bharat”. He decides to get information as small as the distance between your mobile from the intermet. He downloads three webpages Phone and its bluetooth headphone and can be (Webpapel, webpage 2, avebpage 3) conldining as large as the Internet covering the whole Earth. information on the given topic. ‘Computer networks can be classified on the basis He read a paragraph on from webpage | and of geographical area covered by a network, into rephrased it in his own words. He finally the following categories: pasted the rephrased paragraph in his project. (@) Personal Area Network (ii) He downloaded three images of from webpage Gi) Local Area Network 2. He made a collage for his project using (iii) Metropolitan Area Network these images. (iv) Wide Area Network (Gi) He also downloaded an icon from webpage 3 QL. Define PAN. ang) ae iene front pags SEIS project Q2. The network inside your school’s computer Lab rape a or a network within a small office are examples 1. What is described in step 1? of which type of network? Od: What eee af act ls defined instep 2? Q3. Whatis the maximum PAN’ connectivity range? 28. What type of acts defined in step 37 Q4. Which is the biggest type of network available S14: What Is'a Website? for the computer systems? Answers ‘Answers | 1. Step Tan example of paraphrasing & doth ovenutsisgeen 1. Personal Area Network (PAN) is 2 computer 3 network that connects computersidevices with Step 3 Is an act of copyright infringement. in the range of an Individual person. As PAN provides a network range within a person's 4. Awebsite is a collection of webpages. Case Study 4 range typically within a range of 10 meters (33 Smridh has recently changed his school, so he is feet) itis called as Personal Area Network. not aware of the people, but someone is posting 2. LAN (Local Area Network) negative, demeaning comments on his social 10 metres. media profile. He is also getting repeated mails 4, WAN (Wide Area Network). @ Very Answer type Questions Qn Ans. Q4. Ans. Qs. Ans. Q6. Ans. Q7. Ans. Q8. Ans. Q9. Ans. What do you mean by the term accessibility? Accessibility refers to the options that make a computer system easy to use for all even for the people having disabilties. Accessibility options are also referred as Assistive Technology. . Write the steps to open Ease of Access Center. . Click on Start + All program —» Accessories ~» Ease of Access —» Ease of Access Center are the steps to ‘open the Ease of Access Center. |. Write the advantages of Turn on Narrator accessibility feature. ;- The Turn on Narrator option enables the Narrator to read aloud the text displayed on the screen and explains the various events such as appearance of error messages and notifications while using the computer What is the use of fine tune display accessibility feature? The fine tune display effects setting enables us to customise how various items appears on our desktop. Define filter keys. The filter keys option is helpful for ignoring keystrokes that have taken place in rapid succession, or keystrokes that are being pressed for several seconds inadvertently, Write the advantage of the feature that make the mouse easier to use. This feature helps in deciding the looks of a pointer ‘on screen or making it appear larger on the screen 50 that a person with visual disablity can see the pointer on the screen. Explain the Turn on Audio Description. The Tum on Audio Description setting allows audio descriptions to play whenever we log on to our computer. Define the term Serial key. Serial key is a string of characters or equivalent ‘access code that is input into a program to activate it Its an accessibility feature that assists people ‘who have difficulty using a keyboard or a mouse or both Explain the Underline keyboard shortcuts and access keys option, The Underline keyboard shortcuts and access keys option is helpful in making the keyboard accessibility easier in dialog boxes by highlighting access keys for the controls present in them. Quo. Ans. Qu. Ans. giz. Qs. Ans. Qu. Ans. Qis. Ans. Qs. Qu. Ans. ‘What do you mean by the Turn on Text captions for spoken dialog? ‘The Turn on text captions for spoken dialog option allows Windows to display text captions instead of sounds for indicating the happening of an activity on the computer. Define Computer Network. A computer network is a collection of computers or other hardware devices that are connected together Using special hardware and software, which enables Us to exchange information and resources. What is a node? Each computer attached in a network is called a node How can software be shared in a network? In a computer network. application programs and other costly software are installed on one central computer. Users connected to a network can access these programs or software through the central computer. Into how many categories can computer networks be classified, on the basis of geographical area? Computer networks can be classified on the basis of geographical area covered by a network. into the following categories: (i) Personal Area Network (i) Local Area Network (il) Metropoutan Area Network (iv) Wide Area Network Expiain Personal Area Network with example. PAN Is the smallest network which Is very personal to_a user This may include Bluetooth-enabled handheld devices or infrared enabled devices. PANS connectivity range is up to 10 metres Example: PAN may Include wireless computer keyboard and mouse, bluetooth enabled head- phones. wireless printers. TV remotes and much more. Define the following terms: () Server i) Cllent, . (i) Server: The central computer In the cllent-server network is known as server. It is responsible For providing all the information and resources to the clients. Client: The other computer_rather than the central computer in the client-server model is known as client. It is also known as clients or nodes or workstations Describe the parts of client-server networks. Client-Server networks typically consist of two parts. The front-end _of the application is what the user sees and interacts directly. The back-end part interacts with the shared resources such as databases, printers, or high power processors. (i) Que. Ans. Qu. Ans. Q20. Ans. gai. Ans. Qzz. Ans. gaa. Ans. Q24. Ans. Q2s. Ans, Q 26. Ans. What do you mean by Network Topology? Network topology refers to the basic geometric layout according to which the server and clients are connected vio a channel The three most common network topologies are bus, ring and star. What do you understand by the term Network devices? Network devices are the components that help us to connect computers or other electronic devices Together so that they can share data or resources, like printers or scanners Explain Router. A router Is a network device which Is responsible for routing data traffic from one jammed network toanother free network ‘What do you mean by the term Intranet? ‘An Intranet is a private network that is contained within_an_enterprise. It may consist oF many interlinked Local Area Network and also use leased lines in the Wide Area Network Write one advantage and one disadvantage of the Internet. Advantage: The Internet provides information on any topic. Search engines are the best examples of ‘retrieving information from the internet. Disadvantage: A lot of incorrect information is also available on the internet, Anyone can post anything and it can be misleading Write any two characteristics of Internet. The characteristics of Internet are as follows: (i) Aweb browser is an application program that is, used to access the websites and web pages an the Internet. (i) The Internet utilises the TCP/P protacal and Is accessed using a computer modem, broadband 3G. 4G, or network that is connected through an isp Define the term medium in computer network. The physical path by which a message travels from the sender to receiver Is called as a transmission ‘medium. For example. twisted pair cable. fibre-optic cable, coaxial cable, laser or radio waves. Write any one major use of computer network. One of the major use of computer network Is communication. Using a computer network different people can communicate with each other across the globe. People can communicate at a very low cost using tools. such as e-mail. chatting, telephone, video conferencing, groupware and SMS services What is Broadband? Broadband [s a high-speed Internet _cannectlon, It is provided through either the cable or telephone ‘companies, Itis one of the fastest options to transfer data. Qa. Ans. Q2e. Q29. Ans. (ii) W3C What do you understand by the term protocol? A protocol is a set_of guidelines that_controls the data communication. It represents a natural agreement between the communicating devices. Define the term web browser with example. ‘A web browser is an application program installed at clent's computer that sends the request to a web server for viewing the web content. For example, the Internet Explorer. Mozilla Firefox, Baidu. Google Chrome, etc. Write the full form of following terms: ( ISP i) Ww (vy) HTTP (i) ISP: Internet Service Provider (i) Www: world Wide Web (ii) W3C: World Wide Web Consortium (iv) HTTP: Hypertext Transfer Protocol Q30. Ans. al. Ans. Q 32. Q33. Ans. 934. Ans. 035. . Authoring, maintaining or adding an article an the 936. Ans. What do you understand by Hotspot? Hotspot is based on the WiFi technology. It allows electronic devices to connect to the Internet or exchange data wirelessly through radio waves In place of the telephone or cable networks. Define the term WAP. WAP stands for Wireless Access Point. It is a device that connects wireless communication devices to form a wireless network Give some examples of application. Some examples of the instant Messaging application are Jabber, Hike Messenger. Yahoo! Messenger. Google Talk, Google Hangouts, Skype, etc What do you mean by the term Google Hangouts? Google Hangouts is a free instant_messenger software developed by Google. It can easily be Gownlaaded for free fram the internet. It supports different platforms such as Windows. Linux . Mac 05. etc Define Organisational blogs. Organisational blogs are the blogs created to generate business. These types of blogs are generally used by organisations. corporations. etc Define blogging. Instant Messaging existing blog is known as blogging Explain the term BlogDesk. The BlogDesk Is an offline desktop blog editar used for offline blog creation, BlogDesk is a free offline blog editor that can easily be downloaded free from the Internet and installed on a computer system. Q37. Define the following terms: () Qumana (ji) MarsEdit ‘Qumana: itis a free offline blog editor that supports both windows and Mac operating system: (il) Mars€dit: It Is an offiine blog editor especial meant for Mac computers. Itis a paid software Q38. Give some examples of the websites using which you can create and publish your blogs. ‘Ans. Some of the blogging websites that allow us to create and publish our blogs are wwwublogspot. com, www blogger.com, WordPress.com. et. 39. Write any two features of BlogDesk. ‘Ans. The two features of BlogDesk are as follows: (i) It ls an offline blog editor. so we can work in it even if we are nat connected to the Internet. (li) It also has inbuilt help facility to help us while working init |. Distinguish between browsing history and download history. ‘Ans. Browsing History: This is the list of all the web pages that we have visited. Download History: This isthe Ust of all the files that we have downloaded (Q4L What are the factors on which the effectiveness of 2 password depends? ‘Ans. The effectiveness of a password depends on the following factors: (i) Security mechanism of the software. (W) User's involvernent_in generating a_strong password. wledge BOOSTER Password effectiveness is checked by most of the ‘54 websites when a user attempts to register for the first time or when they change password. 0.42, What are the different threats to Internet security? ‘Ans. Virus attacks. spamming. phishing hacking of Ans. Q.46. What do you mean by chat spoofing? ‘Ans. When a computer system or a user of a computer, Masquerades to be another while engaging in 2 ‘chat. it is known as chat spoofing, Q47. Explain Evacuation. ‘Ans. Evacuation is the process of emptying a place in case of an emergency or disaster 0.48. What is 360 Total Security program? ‘Ans. 360 Total Security is a complete free security suite. provided by the leading Chinese security compani Qihoo. it can easily be downloaded free fram the Internet and can be used to safeguard the system against different security threats, Q.49. What do you mean by Phishing? ‘Ans. Phishing is a form of fraud in which the attacker tries to steal or take out information such as login Credentials or account information. Q50. Define the term Cookies. ‘Ans. Cookies are small files which are stored on a user's, computer. These files contain the programs that are created on our local computer when we visit websites. QSL. Differentiate between cookies and cache files. ‘Ans. Cookies: Cookies store website specific information that may or may not be important. Cache: It stores HTML files and images from the website we have visited and displays those iit does not delete any changes to them when we choose to Visit the site again. Q52. Write any two basic fire safety rules in an organisation. Ans. The two basic fire safety rules in an organisation are: (i) Regularly take care of the maintenance of safety equipment. (i) install Fire escape plans at proper level information, etc. are different types of threats to information security that may lead to loss of information and corruption of data How is a computer virus different from a biological virus? ‘Ans. & computer virus Is different from a biological virus as biological _virus harms human body whereas computer virus harms the computer system. 0.44. What type of virus was Melissa? ‘Ans, Melissa virus (March 1999) was so powerful virus that it forced Microsaft_and many other_large companies to turn off their e-mail systems until the virus could be removed completely. Q45. Explain Boot virus. ‘Ans. Boot virus is one that infects the boot records of hard disk. These viruses are more dangerous than the program virus. Some examples of these viruses ‘are Disk killer and Stoned virus. Q43. 83. What do you understand by the term Accident? Ans. Accident is an unplanned, _undesigned and unexpected event that may happen all of a sudden and may lead to unwanted or unprecedented results/outcomes, Q54, Define the term Hazard. Ans. Any unexpected situation that_needs immediate attention. intervention or action to prevent a worse situation is an emergency, 55. Differentiate between Ergonomic hazards and Psychosocial hazards. ‘Ans. Ergonomic Hazards: They are the result of physical factors that can cause musculoskeletal injuries. Psychosocial Hazards: They include those hazards that can have an adverse effect on an employee's mental health or well-being. for example sexual harassment. victimisation. stress and workload demands. 56. Ans. qs7. Ans. 958. Ans. 959. Ans. Q 60. Ans. QoL Ans. Qo Ans. Q63. Ans. 64. What does a healthy lifestyle includes? Anealthy lifestyles includes: () Abalanced diet and healthy eating habits (i) Staying hydrated (i) Good-quality steep {iv) Thinking positive Define networking, ‘A computer network is a collection of computers that allow sharing of resources and information. Give any four advantages of networking. Four advantages of networking are: () Data Sharing (i) Files Transfer (ill) Hardware Sharing (iv) Internet Access Sharing Explain the term packet with reference to data transfer. Data transfer over the network is divided into small ‘Segments called packet. Each packet Is sent from ‘one computer to another computer until it finds its destination Explain WiFi and its significance. WiFi stands for wireless fidelity. WIFI is a popular technology that allows an electronic device such ‘as computers or mobile phones to exchange data wirelessly over a network WIFI Is used where cables cannot be run (such as ‘old buildings, outdoor areas) to provide network and Internet access. Expand and explain the term WAN. (CBSE 2023) WAN stands for Wide Area Network. WAN is the biggest type of network available for the computer system. This network covers a wide area which may spread across the cities or different countries. It enables the users and computers in one location to communicate with users and computers in other locations. List any four application based instant messa software. Four application based instant messaging software are () Google Talk (i) Yahoo! Messenger (ii) Skype (iv) Windows Live Messenger What do you mean by instant messages? Instant Messaging (IM) is a form af communication over the Internet that offers an instantaneous {ransmission of text-based messages from sender to receiver (i) Identify the following network/Intemet connectivities as wired or wireless: (@) Dial-up (b) WiMax Ans. 65. Ans. 66. Ans. Qo7. Ans. 68. Ans. Q69. Ans. Q70. Ans. ) Give any one feature of Instant Messaging. () @) Wired (b) Wireless Two key features of instant Messaging are: (i) (2) Text Messages can be sent to one or more person. (b) Audio and Video calling and conferencing (Any one) State any two rules and etiquettes to be followed while chatting on the Internet. Two rules and etiquettes to be followed while chatting on the Internet are () Messages should be short and to the point. (i) Always introduce by name If the screen name doesnt reflect it What are the basic needs to use instant messaging (chat) software? The basic needs to use instant messaging (chat) software are: () A valid instant messaging account (ii) An active internet connection. Differentiate between web page and website. A single HTML document is called a web page. A Collection of web pages is called web site Explain the purpose of Internet Security. Internet security is a branch of computer security Specifically related to the Internet. Its ablective Is to establish rules and measures to use against attacks over the internet Name different kinds of online threats. Different kinds of online threats are (i) Phishing (i) E-mail spoofing (ii) Chat spoofing Enlist any two basic safety rules to follow at workplace. Basic safety rules to follow at workplace are ()) Fire safety (il) Falls and stps -& Short Answer type Questions Qu Ans. Write the advantages of a Computer Network. ‘Advantages of a Computer Network: The following are the main advantages of computer networks, (i) Exchange of Information/File Sharing: The major advantage of a computer network is that it allows file sharing. Users on a network can easily share or exchange files or information ‘among themselves. (ii) Resource Sharing: Resource sharing is another Important advantage of a computer network (Ili) Reduced Costs: When we share software and hardware resources. the cost_of buying resources is reduced a2. Ans. a3. Ans. Q4. Ans. Q5. Ans. Q6. Ans. Q7. Ans. (iv) Flexible Working Environment: A user can log ‘on toa computer anywhere on the network and Gateway: A gateway is a network node that provides access to another network that uses different an access his/her files and data. This offers a flexible working environment Discuss flexible working environment as an advantage of the computer networks. ‘A user can log on to a computer anywhere in the network and can access his/her files and data. This offers a flexible working environment. For examale. if a person Is not able to go to office because of ‘any reason, he/she can get connected with his/her ‘company’s network and thus. can work from home. Differentiate between LAN and MAN. Local Area Network (LAN): LAN covers a small area, itis a privately-owned small_network that spreads ‘cross a small campus or a building or from one room toa campus of a few kilometres. Metropolitan Area Network (MAN): MAN is an extension of Local Area Network that can connect computers in a big city MANs are mainly owned by large organisations to interconnect all their branches, across a city What is Peer-to-Peer network? Peer means equal and therefore in a peer-to-peer network, each computer or node is equal to other computers in terms of the resources that it can ‘access and share. All the computers in this type oF network act both as the supplier as well as the consumers of resources. It treats all the devices 2s having the equivalent capability. In this network. each computer shares its resources such as CPU, hard disk or hardware such as printers, with other computers on the network Define Ring Topology. In Ring topology. all the computers are connected ina large closed-loop circuit so that each computer is linked to two adjacent computers. on either side. in this topology, the message sent by a sender is, received by every client in the network But the message Is read only by the receiver to which it was addressed Distinguish between Hub and Switch. Hub: A network hub is a networking device that is used to help _us in connecting multiple network hosts. A network hub is also used for data transfer. ‘Switch: A switch is more intelligent than a hub. While a hub only forwards the data, a switch does filtering and forwarding which is a more prudent way of dealing with the data packets. Differentiate between Repeater and Gateway. Repeater: A repeater is an electronic device that amplifies the recelved signal. It recelves a signal and retransmits it with a higher level or a higher power so that the signal can travel longer distances before fading out. Q8. Ans. Q9. Ans. Quo. Ans. protocols and enables data to be transmitted from cone nade to anather. How to clear the cache and cookies on web browser? Follow the steps below for how to clear web history on the Mozilla Firefox browser: (i) Glick on the upper right of the browser toolbar. (i) Click History (ii) Click Clear Recent History. (iv) Glick the drop-down menu next to Time range to clear and select Everything (v) Place a check mark next to the following options User Details: (2) Browsing and Download History (0) Form and Search History (©) Cookies (d) Cache (©) Active Logins (f) Offline Website Data {g) Site Preferences (vi) Click on Clear Now button. The window will close and the tems we have selected wil be cleared Write some features of an Instant Messaging software. The following are some distinct features of an Instant messaging software: (i) These softwares can be used for one-to-one or {group conversation, in the form of conference in real-time (i) They offer chat rooms where we can chat with multiple people at the same time (ii) Files can easily be transferred to any account inthese by simply dragging and dropping in the chat window. (v) Messages can be replied. Forwarded to a single person or toa whole group. How many types of instant messaging software are there? Write about them. ‘There are two types of instant messaging software. (i) Web-based instant messaging softwere. (ii) Application-based instant messaging software. Web-based instant messaging software are the instant messengers that are accessed vio a web browser. There is no need to download and install any software on the computer system for using them, We can use a messenger in a web browser. Application-based messenger software are the messengers that are downloaded and installed to a user's computer. Many of such application-based instant messengers are available for free on the Internet and can easily be downloaded and installed ona computer.

You might also like