Page 14 - CG_v2.1_flipBooks_class_6
P. 14

Acknowledge the original writer
                                                          and the source from where the
                                                            material has been taken.







                                                                  Some tips to
                                Use “ “ for statements
                                                                 safeguard from         Rephrase the matter.
                              quoted by another person.
                                                                   Plagiarism




                                                       As soon as you have a business name
                                                        and logo for your idea, you should
                                                      register those Trademarks right away

                  Rules to remember while using Social Media:
                      Maintain Authenticity: We must be honest about our identity. Never pretend to be someone
                     else.

                      Always use a disclaimer: While sharing personal views about something, we must make it clear
                     that these are personal views.
                      Never pick fights on the Internet: We must convey our opinions carefully by choosing the right
                     words.

                      Protect your Identity: Never list your full name, parents’ details, home address, or telephone
                     number online.
                      Respect your Audience: Maintain good conduct, even on the Internet. Refrain from using slang,
                     personal insults or obscene language.
                      Respect for other's Feelings: One must always be considerate and  mindful of others’ feelings on
                     sensitive topics such as politics or religion.
                      Try to Monitor Comments: One should prefer to monitor comments so as to maintain the quality
                     of comments on a personal post/site.

                  A computer also falls sick as harmful files and applications damage it. There are preventive measures
                  to secure our computer too. Let us read about them in this chapter.

                  Protecting your Computer from Illegal Access

                  You have studied about how to keep your computer physically fit. It is equally important to
                  prevent damage or misuse of data, software or hardware of a computer and restrict unauthorised
                  access to it.
                  One of the ways to prevent the misuse of data or software is authentication. Authentication is the
                  process of verifying a user’s identity before granting him or her access to a computer system. In
                  private and public computer networks (including the Internet), authentication is commonly done
                  through the use of login passwords. Knowledge of the password is assumed to guarantee that the
                  user is authentic.


                       12    Computer Genius (V2.1)-VI
   9   10   11   12   13   14   15   16   17   18   19