0% found this document useful (0 votes)
49 views111 pages

Class 10 Computer Applications Top 49

The document discusses various aspects of computer networking, including the importance of networks for resource sharing, reliability, and the client/server model. It also covers topics such as types of IP addresses, the functioning of the World Wide Web, and the advantages of e-business and e-governance. Additionally, it provides insights into mobile technologies, HTML elements, and coding examples for web development.

Uploaded by

next.topper.san
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views111 pages

Class 10 Computer Applications Top 49

The document discusses various aspects of computer networking, including the importance of networks for resource sharing, reliability, and the client/server model. It also covers topics such as types of IP addresses, the functioning of the World Wide Web, and the advantages of e-business and e-governance. Additionally, it provides insights into mobile technologies, HTML elements, and coding examples for web development.

Uploaded by

next.topper.san
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 111

Computer

Applications
Top 49
Questions
Networking
Question
Why do we need computer networks?
Answer
(i) Networks enable resource sharing across the globe.

(ii) Networks provide high reliability by having alternate copies of data. Presence of multiple CPUs means
that if one goes down, the others may be able to take over its work. This ability to work in the face of hardware
problems is of atmost importance in military, banking, air traffic control, nuclear reactor safety, etc.

(iii) Networks enable a client/server model with clients as small computers, one per user, with data kept on
one or more shared file server machines. Eg. Software installation can be on server and this can save cost of
buying license for every machine.
Question
Differentiate between LAN and WAN.
Answer
Question

Distinguish between MAC address and IP address with the help of example of each.
Answer
Question
What are the types of IP addresses?
Answer
IP addresses are of two types:
Static IP Address: Static IP addresses are those types of IP address that never change once they are
assigned to a device on a network. No doubt this type of addressing is cost effective but could have a high
security risk. Static IP addresses are mostly used by web, email and gaming servers who don’t care much
about hiding their locations.

Dynamic Address: A Dynamic IP address changes each time the device logs into a network. This kind of IP
address is very tough to trace and are used by companies and business firms.
Question
How does WWW work?
Answer
The World Wide Web (WWW) is a network of online content that is formatted in HTML and accessed via
HTTP. The term refers to all the interlinked HTML pages that can be accessed over the Internet.
The WWW system is based on the client/sever architecture. A web client sends request for information to
any web server. This is a program upon receipt of which the server sends the document requested to the
requesting client.
Typically the client program (browser) runs on a separate machine from that of the server. the server takes
care of all the issues related to document storage, whereas the task of presenting the information to the
user is left to the client program.
The protocol that web clients and servers use to communicate with each other is called the Hypertext
Transfer Protocol (HTTP). All web clients and servers must use HTTP in order to send/receive hypermedia
documents. For this reason, web servers are often called HTTP servers.
Question
What is the difference between HTTP and HTTPS?
Answer
Question

Explain Telnet with its advantage.


Answer
Telnet is a network protocol which allows the user to get connected to other hosts via remote login. Telnet
remote login is widely used for file sharing.
One can then easily browse the host’s machine and can download or upload files from/to the host. It works
on a standard port number-23.
Telnet allows the user to get access to any remote host machine through remote login.
Using this protocol, one can access the remote computer as his/her own computer.

Advantage of Talnet:
The main advantage of using Telnet is that the user can make changes related to system which is not
possible in any other method. All type of resources can be shared.
Question
Enlist the difference between FTP and TELNET.
Answer
Question

Write a short note on TCP/IP.


Answer
TCP/IP stands for Transmission Control Protocol/ Internet Protocol.
TCP/IP is a set of rules (protocols) governing communications among all computers on the Internet. More
specifically, TCP/IP dictates how information should be packaged (turned into bundles of information
called packets), sent, and received, as well as how to get to its destination. TCP/IP is a combination of two
separate protocols: TCP (Transmission Control Protocol) and IP (Internet Protocol). The Internet Protocol
standard dictates the logistics of packets sent out over networks; it tells packets where to go and how to
get there.
The Transmission Control Protocol is responsible for ensuring the reliable transmission of data across
Internet-connected networks. TCP checks packets for errors and submits requests for retransmissions if
any are found.
Question
What precaution must be taken with regard to making payments while shopping online?
Answer
Share payment information only with known or reputable vendors.
Before entering any personal or payment information, make sure that the URL should start with
https.
Look for a small lock icon in web browser.
Avoid storing information.
Make use of popular and trusted payment portals only.
Question
Write four advantages of e-Business sites.
Answer
Goods sold through e-business are generally cheaper as cost incurred in e-business is less as
compared to setting up a traditional business.
Customers can receive highly customisable service.
Even remote area customers are reached in e-business.
Sellers have better understanding of their customers’ needs as customers communicate through
e-mails.
Question
Write the application of e-Governance and e-Commerce.
Answer
e-Governance:
Filing of online application forms for Aadhar card, passport.
Filing of IT returns online
Registering and online complaint for any grievance related to government.

e-Commerce:
Able to do online transactions.
No need to go to bank for updating the passbook depositing the money.
Online Shopping.
Question
Mention the services which are provided by transactional category of an e-banking.
Answer

There are no geographical barriers and the services that can be offered at a minimum cost.
Through Internet banking, you can check your transactions at any time and as many times as you want
to.
If the fund transfer has to be made outstation, where the bank does not have a branch, the bank would
demand outstation charges, whereas with the help of online banking, it will be absolutely free for you.
Internet banking deploys the Internet as a medium for financial transaction. e.g. a customer login to his
or her bank account by accessing the bank Website
Question
“Use of e-governance has its social and economic impacts.” Justify.
Answer
e-Governance harnesses information technologies (such as Wide Area Networks, the internet, and mobile
computing) to transform relations with citizens, businesses, and other arms of government.
These technologies can serve a variety of different ends; better delivery of government services to citizens,
improved interactions with business and industry, citizen empowerment through access to information, or
more efficient government management. The resulting benefits can be less corruption, increased
transparency, greater convenience, revenue growth, and/or cost reductions.
Question
Write a short note on Video Conferencing.
Answer
Video conferencing is a communications technology that integrates video and audio to connect users
anywhere in the world as if they were in the same room. This term usually refers to communication between
three or more users who are in at least two locations, rather than oneon-one communication, and it often
includes multiple people at each location.
Each user or group of users who are participating in a video conference typically must have a computer, a
camera, a microphone, a video screen and a sound system. Another requirement is a connection to the
communications system that is being used, which in the 21st century usually is the Internet but might also be
a satellite-based system, a broadcast signal or other communications technology.

Advantages:
When using video conferencing, participants can see and hear each other in real time or close to it,
allowing natural face-to-face conversations and visual elements that are not possible with voice-only
communications technology.
It saves time and money

Disadvantages:
Expensive
Lack of familiarity with technology can cause frustration.
Question
Differentiate between TDMA and CDMA.
Answer
Question
Explain Global System for Mobile GSM communications.
Answer
GSM is a digital mobile telephony system that is widely used in Europe and other parts of the
world.
GSM uses a variation of time division multiple access (TDMA) and is the most widely used of the
three digital wireless telephony technologies (TDMA, GSM, and CDMA).
GSM digitizes and compresses data, then sends it down a channel with two other streams of user
data, each in its own time slot.
It operates at either the 900 MHz or 1800 MHz frequency band.
Question

Explain the features of 4G.


Answer
The main features of 4G (Fourth Generation) are:
Capable of provide 10 Mbps-1 Gbps speed
High quality streaming video
Combination of Wi-Fi and Wi-Max
High security
Provides any kind of service at any time as per user requirements anywhere
Expanded multimedia services
Low cost per-bit
Battery use is more
Hard to implement
Needs complicated hardware
Expensive equipment required to implement next generation network.
Question
Write a short note on the generations of mobile technologies.
Answer
1G (First Generation) was introduced in 1980 and was based on narrow band analog cellular technology.
It used circuit switching and only voice calls were available. It used radiowaves for transmission. 1G used
CDMA (Code Division Multiple Access). Each user was allocated a unique code sequence. The sender
encoded the signal using the given code. The receiver also had the unique code and used it to decode
the data.
2G (Second Generation) was introduced in 1990s and was based on GSM technology. It used circuit
switching but provided paging, SMS, voicemail and fax services. GSM (Global System for Mobile
communications) is a combination of FDMA and TDMA. SIM (Subscriber Identification Module) cards
are interchangeable modules which store subscriber and wireless provider information.
2.5G used GPRS (General Packet Radio Service). MMS and sending pictures through email were the
highlights.
The 3G (Third Generation) systems are also known as Universal Mobile Telecommunications System
(UMTS) as they have a single network standard. 3G mobiles use both circuit and packet switched
networks. It allows video, audio and graphics applications. Video streaming was introduced. They
provide data rates upto 2 Mbps. The clarity is more and is close to a real conversation.
4G (Fourth Generation) systems provide speed of upto 100 Mbps and prioritize services. Ex: All
resources are allocated to video calls to enhance the quality of the service.
5G (Fifth Generation) offers high speed, enormous capacity, capability, low latency and provides the
bearer for many applications.
Question
Write a short note on Mobile technologies.
Answer
Mobile technology is indispensable in the modern workplace. Due to its versatility, it offers a range of
benefits, but also comes with considerable risks to the business. It is essential to consider both advantages
and disadvantages of using mobile technology in business. Examples of mobile IT devices include:
Laptop, tablets and netbook computers
Smartphones
Global Positioning System (GPS) devices
Wireless debit/credit card payment terminals

Advantages:
Higher efficiency and productivity of staff
The quality and flexibility of services offered to customer
The ability to accept payments wirelessly
Improved networking capabilities
Disadvantages:
Costs: New technologies and devices are often costly to purchase and require ongoing maintenance and
upkeep.
Workplace distractions: As the range of technologies and devices increases, so does the potential for
them to disrupt productivity and work flow in the business.
Additional training needs: Staff may need instructions and training on how to use new technology.
Increased IT security needs: Portable devices are vulnerable to security risks, especially if they contain
sensitive or critical business data.
HTML
Question

What are HTML elements?


Answer
An HTML element is defined by a starting tag. If the element contains other content, it ends with a closing
tag, where the element name is preceded by a forward slash as shown below with few tags:
Question
What are the limitations of HTML?
Answer
HTML is a programming language and is a simpler text file. Therefore, complex designing cannot be
accomplished. Heavy interactive forms or dynamic pages are a challenge to create using HTML. On
the other hand, languages like ASP (Active Server Pages), JSP, Java Servelets, etc. work wonders in
creating dynamic pages.
Question
Give the coding for giving the heading ‘PACE Computer Education’ of <H1> tag, font style as Comic Sans
MS, text color as blue. Body text color as red, background as green, alignment as center, font style of body
text as Brush script, size = l5. The text for body is as follows:
Education is the
ability to listen to almost
anything without
losing your temper
or your
self confidence.
Answer
<html>
<head>
<title>example</title>
<hl><font color=”blue” face="Comic" Sans MS”>PACE Computer Education </font>
</hl>
</head>
<body bgcolor=”green”text=”red” align=”center”>
<font size="15" face=”Brush script”> Education is the<br>
ability to listen to almost <br>
anything without<br>
losing your temper<br>
or your <br>
self confidence</font>
</body>
</html>
Question
List and explain the different attributes of body tag?
Answer
Question

Write HTML code for the following page?


Answer
<HTML><Head> <TITLE> CHEMICAL FORMULAE </TITLE> </HEAD>
<BODY> <H1> CHEMICAL FORMULAE </H1>
<HR>
<BR>
<p>
H<sub>2</sub>O - Water<br />
O<sub>2</sub> - Oxygen<br />
CO<sub>2</sub> - Carbon dioxide<br />
H<sub>2</sub>SO<sub>4</sub> - Sulphuric acid
</p> </BODY></HTML>
Question

Explain unordered list.


Answer
Unordered list classifies the data items that have equal importance i.e. none of the data items are ranked.

They are identified by a symbol. It may be a square, a circle or a disc. The attribute TYPE helps in using

the symbols to create a list. This attribute takes the value as the name of the symbol.

<ul type=”square”>

<ul type=”disc”>

<ul type=”circle”>

This is a container tag. It has both the opening and the closing tag. The listing is created under it using

the <li> tag. Again <li> tag is a container tag. The data item to be listed is input between the opening <li>

and the closing </li> tag as shown in the following example:


Question

What are nested lists?


Answer
Lists can be nested or placed inside one another.

Example:
Question
How will you nest an unordered list inside an ordered list?
Answer
<html>
<head>
<title> set of list </title>
</head>
<body>
<ol>
<li> First order point
<ul>
<li>First unordered list item</li>
<li>Second unordered list item</li>
</ul>
</li>
<li>Another ordered point</li>
</ol>
</body>
</html>
Question
What are the attributes of audio tag?
Answer
Question

What are the attributes of video tag?


Answer
Question
Carefully study the webpage given below. Identify 10 tags that have been used in creating this webpage
and write the usage of each of them.
Answer
Following are the 10 tags that are used to create the preceding Web page along with their one line
description:
(a) <HTML>: Refers to a structural tag that is used to mark the starting and ending of an HTML document. It
ends with </HTML>.
(b) <BODY>: Refers to a structural tag that contains all the visible content, such as text, images, and link of
a webpage. It ends with </BODY>
(c) <P>: Refers to a formatting tag that is used to begin a new paragraph. It ends with </P>
(d) <B>: Refers to a formatting tag that is used to boldface text in an HTML document. It ends with </B>.
(e) <CENTER>: Refers to a formatting tag that centralises the text on a Web page. It ends with
</CENTER>.
(f) <H1>: Refers to a formatting tag that is used to mark text as largest heading. It ends with </H1>.
(g) <IMG>: Refers to a formatting tag that inserts inline images on a Web page.
(h) <OL>: Refers to a formatting tag that inserts numbered lists. It ends with </OL>.
(i) <LI>: Refers to a formatting tag that marks the list items in a numbered list. It ends with </LI>.
(j) <A>: Refers to a formatting tag that inserts hyperlink on a Web page. It ends with </A>.
Question
Ms. Vani, Head Girl of the school, has to display the sequence of events of upcoming school’s Annual Day
function on the school website. Help her in writing HTML code to create a table in HTML, as shown in the
given screenshot.
Answer
<HTML>
<BODY>
<TABLE BORDER = "2" > <TR> <TH COLSPAN= "3" > ANNUAL SPORT DAY - SEQUENCE OF EVENTS
</TH></TR>
<TR ALIGN="CENTER"> <TD> 8:00 - 9: 00 AM</TD> <TD> 9: 00 - 1: 00 PM</TD> <TD> 1: 00 PM - 2 :
00 PM </TD> </TR>
<TR ALIGN="CENTER"> <TD> OPENING CEREMONY</TD> <TD>PRIZE DISTRIBUTION</TD>
<TD>CULTURAL EVENTS</TD></TR>
</TABLE> </BODY> </HTML>
Question

Observe the below HTML table and write code to generate it


Answer
<HTML>
<HEAD>
<TITLE>Marks</TITLE>
</HEAD>
<BODY>
<table border= “3”>
<tr>
<th><bgcolor=”yellow”> Marks</th>
</tr>
<tr bgcolor=”green”>
<th>English</th>
<th>Maths</th>
<th>Economics</th>
<th>Physics</th>
</tr>
<tr>
<TD>67</TD>
<TD>89</TD>
<TD>77</TD>
<TD>92</TD>
</tr>
</table>
</body>
</html>
Question

Write HTML code to generate code for your school timetable.


Answer
<html>
<body>
<h4>School Timetable:</h4>
<table border=”1” >
<tr>
<th colspan=6> Time Table </th> </tr>
<tr><th rowspan=6> Hours </th> <th> MON </th> <th> TUE </th> <th> WED </th> <th> THU </th>
<th> FRI </th> </tr>
<tr> <td> Maths </td> <td> Eng</td><td> Science</td><td> Arts</td><td> Social</td> </tr> <tr>
<td> Lang </td> <td> Maths </td><td> Computer </td><td>Science</td><td> Music</td> </tr>
<tr> <th colspan=5> LUNCH </th> </tr>
<tr> <td> Science</td> <td> Games</td><td> Lang</td><td> Maths</td><td> Maths</td> </tr>
<tr> <td> English</td> <td> Social</td><td> Social</td><td> Eng</td><td> Science</td>
</tr>
</table>
</body>
</html>

School Timetable:
Question

Why forms are used in Web pages?


Answer
HTML forms are used to pass data to a server. A form can be inserted in HTML documents using the HTML
form element which acts as a container for all the input elements. All the information collected by a form can
be submitted to a processing agent (a file containing a script made to process this information) that’s
usually specified in the “Action” attribute of the Form Tag.
Question

Differentiate between Get & Post methods of Form Tag.


Answer
Get: It appends form data into the URL in name/ value pairs. The length of a URL is limited about 3000
characters. Useful for form submissions where a user wants to bookmark the result. It is better for non
secure data, like query strings in Google.

Post: It appends form data inside the body of the HTTP request (data is not shown in URL). It has no size
limitations. Form submissions with Post cannot be bookmarked.
Question

Mention all the attributes of check box.


Answer

Attributes of checkboxes:

NAME: It adds an internet name to the field so the program that handles the form can identify the fields.
VALUE: It defines what will be submitted if checked.
ALIGN: It defines how the text field will be aligned form.
Valid Entries are: TOP, MIDDLE, BOTTOM, RIGHT, LEFT TEXTTOP, BASELINE, ABSMIDDLE, ABSBOTTOM.
TABINDEX: It defines in which order the different fields should be activated when the visitor clicks the tab
key.
Question

List some advantages and disadvantages of CSS.


Answer

Advantages of CSS are:


1. It controls layout of many documents from one single style sheet.
2. It has more precise control of layout.
3. It applies different layouts to different mediatypes.
4. It has numerous advanced and sophisticated techniques to be applied on web pages.

Disadvantage of CSS are:


1. CSS is very limited in browser compatibility.
2. When you design a web page and you want it to display exactly as you like it. The problem with CSS is that
it displays webpages very different in the different browsers.
Question

Give an example of linking CSS with HTML.


Answer
Question

Explain the different CSS style linking.


Answer
Ans. (a) Internal style sheet: An internal style sheet holds the CSS code for the web page in the head section
of the particular file. This makes it easy to apply styles like classes of id’s in order to reuse the code. The
downside of using an internal style sheet is that changes to the internal style sheet only affect the page the
code is inserted into.

(b) External style sheet: An external style sheet is a separate file where you can declare all the styles that
you want to use on your website. You can then link to the external style sheet from all your HTML pages. A
cascading style sheet file will have an extension as .css and it will be included in HTML files using <link>
tag.

(c) Inline styles: The inline style is specific to the tag itself. It uses the HTML “style” attribute to style a
specific tag
Cyber Ethics
Question

What is secure data transmission?


Answer
Secure data transmission means applying enough technical safeguards so that the data travels safely to its
target, without being compromised or eavesdropped.
Some techniques are:
(i) SSL secure data transmission
(ii) Data encryption
(iii) Using safe protocols e.g. SFTP
Question

What is cryptography?
Answer
Cryptography is a technology which keeps the messages secret from unauthorized access. Sender of the
information encrypts the data using a secret code and only the specified receiver can decrypt the data using
the same or a different secret code.

To encrypt a message, the message is passed to an algorithm that transforms the message using a key into a
meaningless script called cryptogram or ciphertext. The ciphertext can be sent to the intended recipient. The
recipient has a key to decrypt the ciphertext back to the original message.
Question

What is free open source software movement?


Answer

Free/open-source software movement (FOSSM) or free/libre open-source software movement (FLOSSM) is


a social movement with the goal of obtaining and guaranteeing certain freedoms for software users, namely
the freedom to run the software, to study and change the software, and to redistribute copies with or without
changes. Richard Stallman formally founded the movement in 1983 by launching the GNU Project. Stallman,
later established the Free Software Foundation in 1985 to support the movement.
Question
Write a short note on DRM.
Answer
Digital Rights Management (DRM) is a systematic approach to copyright protection for digital media. The
purpose of DRM is to prevent unauthorized redistribution of digital media and restrict the ways consumers
can copy content they’ve purchased.
Digital rights refers to the relationship between copyrighted digital works (such as film, music and art) and
user permissions and rights related to computers, networks and electronic devices. Digital rights also refers
to the access and control of digital information.
The definition of digital rights and responsibilities is having the right and freedom to use all types of digital
technology while using the technology in an acceptable and appropriate manner. As a user of digital
technology, you also have the right to privacy and the freedom of personal expression.
Question
Explain few netiquettes.
Answer
“Netiquette” refers to Internet etiquette. This simply means the use of good manners in online
communication such as e-mail, forums, blogs, and social networking sites to name a few. It is important to
use netiquette because online communication is non-verbal.
(i) Accuracy of information: Misleading others is obviously a major breach of online etiquette. This is true
even if it’s unintentional. Check facts before providing information or giving advice. If you’re not an expert
on a topic, maybe you shouldn’t be acting like you are.
(ii) Use Internet resources ethically: Online study resources should be used to support learning, not
replace it.
(iii) Promote healthy discussions: To get the most out of online forums, a useful netiquette guideline is to
promote healthy discussion. You can help your online community by posing questions, sharing
experiences, providing positive feedback, asking follow-up questions, and referring to information sources.
(iv) Ignore inflammatory comments by trolls: It’s generally best to ignore trolls. These are internet users
who try to bait other users into a reaction.
(v) Respect others as equals: Show a little respect and humility online.
(vi) Remember, your words are permanent: Be careful with what you post online. Once it’s out there, you
may not be able to get it back.
(vii) Make your point in a nice way: Write in a way to get the kind of reaction you want. A little
thoughtfulness, strategy and netiquette can go a long way in online discussion.
Question
What is software piracy?
Answer
Software piracy is any attempt to break the licence terms of a piece of software. This includes
downloading and using a program without paying for it, as well as buying, selling or giving away
illegitimate copies of a game or any other piece of software. It could mean extracting code from a
program, or modifying it without permission inorder to do something that the developers did not wish you
to do. When you buy software, music or films legally, copyright law forbids us from:
giving a copy to a friend
making a copy and then selling it
using the software on a network (unless the licence allows it, eg it is a business licence)
renting the software without the permission of the copyright holder

The practice of copying software is a serious problem in some countries. Copying music, films and
software illegally means that there is less money available to pay the writers, developers and artists.
Question

Write down the essential requirements for safe e-payments?


Answer
Security is an essential part of any transaction that takes place over the internet. Customers will lose
his/her faith in e-business if its security is compromised. Following are the essential requirements for safe
e-payments/transactions −
Confidentiality: Information should not be accessible to any unauthorized person. It should not be
intercepted during the transmission.
Integrity: Information should not be altered during its transmission over the network.
Availability: Information should be available wherever and whenever required within a time limit
specified.
Authenticity: There should be a mechanism to authenticate a user before giving him/her an access to
the required information.
Non-Repudiability: It is the protection against the denial of order or denial of payment. Once a sender
sends a message, the sender should not be able to deny sending the message. Similarly, the recipient
of message should not be able to deny the receipt.
Encryption: Information should be encrypted and decrypted only by an authorized user.
Question

Explain the concept of Digital Divide stating causes for it and measures to reduce the divide.
Answer
The Digital Divide, or the digital split, is a social issue referring to the differing amount of information between
those who have access to the Internet and those who do not have access. The term became popular among
concerned parties, such as scholars, policy makers, and advocacy groups, in the late 1990s. Broadly speaking,
the difference is not necessarily determined by the access to the Internet, but by access to ICT (Information
and Communication Technology) and to media that the different segments of society can use. With regards to
the Internet, the access is only one aspect, other factors such as the quality of connection and related
services should be considered. The problem is often discussed in an international context, indicating certain
countries are far more equipped than other developing countries to exploit the benefits from the rapidly
expanding Internet. The digital divide is not indeed a clear single gap which divides a society into two groups.
Researchers report that disadvantage can take such forms as lowerperformance computers, lower-quality or
high price connections difficulty of obtaining technical assistance, and lower access to subscription-based
contents.
The idea that some information and communication technologies are vital to quality civic life is not
new. Some suggest that the Internet and other ICTs are somehow transforming society, improving
our mutual understanding, eliminating power differentials, realizing a truly free and democratic world
society, and other benefits.
Question

Explain IPR and what are the two main types of IPR?
Answer
IPR (Intellectual Property Rights) allow creators, or owners of patents, trademarks or copyrighted works to
benefit from their own work or investment in a creation. Owners holding IPR can prevent the use of their
intellectual property.

Trade Marks: Trade Marks have been defined as any sign, or any combination of signs capable of
distinguishing the goods or services of one undertaking from those of other undertakings.

Copyright: Copyright is a legal means of protecting an author‘s work. It is a type of intellectual property that
provides exclusive publication, distribution, and usage rights for the author. Therefore, any original content
published on the web is protected by copyright law.

You might also like