Page 146 - CA 165 ver 1.0 Class 10
P. 146

Shareware (also termed trialware or demowar5. is proprietary software that is provided to users without
                          any payment on a trial basis.

                          Software that can be used without paying any price i.e., which is free of any charge are termed as freeware.
                          OSS  (Open  Source  Softwar5.  are  those  software  that  are  free  to  be  used  and  whose  source  code
                          (Programmed Codes) is also available to make further change and to customize as per the need of any
                          programmer.

                      3.   Mention any 4 netiquettes to be followed while working on Internet.
                      Ans. Four netiquettes that should be followed while working on Internet:
                             Behave in the same manner as you would behave in real life. Treat others as you would like to be
                              treated yourself.
                            Respect other people’s privacy.
                            Share legitimate and authentic information. Avoid spreading rumors.
                             Think twice before posting or sharing anything. It should not hurt others sentiments. Do not trust
                              people easily, you meet online. They may not disclose their complete identity.
                      4.     What is e-Commerce? Explain the steps to achieve a secure data transmission in e-commerce.

                      Ans. e-Commerce, also known as electronic commerce or Internet commerce, refers to the buying or selling of
                          goods or services over the Internet. Following are the essential requirements for secure data transmission:

                             Confidentiality: Information uploaded during e-Commerce transaction should not be accessible to
                              an unauthorized user. It should not be intercepted during the transmission of details.

                            Integrity: Information should not be altered during its transmission over the network.
                            Authenticity: There should be a mechanism to authenticate a user before giving him/her an access to
                              the required information.
                            Encryption: Information should be encrypted and decrypted only by an authorized user.
                            Auditability: Data should be recorded in such a way that it can be audited for integrity requirements.
                  C.  Application Based Question.
                      Raman is working on the Internet. Identify which of the following should be adopted as formal guidelines while
                      working on the Internet:
                      i.    Do not send insensible messages.

                      ii.   Do not be sensitive while communicating online.
                      iii.   Disclose all personal information.
                      iv.   Never rely the people you meet online, they may not be disclosing their complete identity.
                      v.    Always respect other people’s privacy.

                      vi.   Always share authentic information only.
                      Ans.   i., iv., v. and vi. should be adopted while working online.


                  Unsolved Exercise


                                                                 PART A
                  A.  Very short answer type questions.
                      1.   What occurs when a criminal (fraudster) approaches a merchant and proposes for a business transaction
                          using fraudulent means such as a stolen or fake credit card to pay for transactions?
                      2.   What leads to poor economic growth and reduced spread of knowledge to the rural parts of a country?


                   144   Touchpad Computer Applications-X
   141   142   143   144   145   146   147   148   149   150   151