Page 44 - CA_165_V2.0_Flipbook
P. 44
@ (At): The ‘@’ i.e., ‘at the rate’ sign connects the username with the domain name i.e., second part.
Domain: The ‘domain’ or ‘domain name’ is the last name and it shows the host web site or the location
of the e-mail account on the net. Host website is the site in which e-mail ID is created.
3. Explain in detail the measures that can be undertaken to maintain the safety and security of the e-banking
accounts.
Ans. To maintain the safety and security of the accounts, security provisions are also provided in e-banking.
Basically there are two types of security measures:
User Identification: A user can login to the account with his account number only.
The PIN system: PIN stands for Personal Identification Number. It is the secret password that should
remain with the account holder only. It is used to login to the account.
Signature based e-Banking: In this system, the authentication of the account holder is checked digitally.
In such system the signature or authentication is encrypted in a media like smart cards or storage
media. While doing the banking transaction, the account holder has to insert the media in the host
workstation which can authenticate the users to open the account.
4. Give two examples of each of the following:
a. Web browser
b. Web servers
c. Blogging Sites
d. Newsgroup Categories
Ans. a. Opera, Google Chrome b. Apache, IBM Lotus c. Bloglines, Blogscope d. Sci, Biz
D. Application-based questions.
1. Arun wants to urgently book flight tickets to the United States for an official trip. Suggest a suitable
technology that he can use to save time.
2. The passport office has automated the delivery of all its services to ensure fast execution and reduce
corruption. Which Internet application do you think, this advancement falls under?
3. Simran wants to conduct a quick meeting, but she is out of town. Suggest a method that she can adopt to
conduct a meeting at a short notice.
Ans. 1. e-Reservation 2. e-Governance 3. Video Conferencing
SECTION C
(Case-based/Passage-based Type Questions)
A. For communication over the Internet, the communicating devices must follow certain rules. These rules are
called Internet protocols. For email communication, we use SMTP and POP. For communication between
browser and server HTTP and HTTPS protocols are used. We can use TELNET to access services available on a
remote computer. [CBSE Sample Paper 2020-21]
1. Which of the following is an Internet Protocol?
i. HTTP ii. FTP
iii. Both a and b iv. None of these
2. What is the purpose of the SMTP protocol?
i. used for composing an email message
ii. used in receiving incoming emails by pulling the message from server to client
iii. used in sending outgoing emails by pushing the message from client to server
iv. None of these
42 Touchpad Computer Applications-X

