Page 14 - Computer Genius Class 06
P. 14

Acknowledge the original writer
                                                          and the source from where the
                                                            material has been taken.







                                                                  Some tips to
                                Use “ “ for statements
                                                                 safeguard from         Rephrase the matter.
                               uoted  y another person.
                                                                   Plagiarism




                                                        s soon as you ha e a  usiness name
                                                        and logo for your idea, you should
                                                      register those Trademarks right away

                  Rules to remember while using Social Media:
                      Maintain Authenticity:  e must  e honest a out our identity.  e er pretend to  e someone
                     else.

                      Always use a disclaimer:  hile sharing personal  ie s a out something   e must ma e it clear
                     that these are personal  ie s.
                      Never pick fights on the Internet:  e must con ey our opinions care ully  y choosing the right
                     words.

                      Protect your Identity:  e er list your  ull name  parents  details  home address  or telephone
                     number online.
                      Respect your Audience:  aintain good conduct  e en on the  nternet.  e rain  rom using slang
                     personal insults or obscene language.
                      Respect for other's Feelings: One must always be considerate and  mindful of others’ feelings on
                     sensiti e topics such as politics or religion.
                      Try to Monitor Comments:  ne should pre er to monitor comments so as to maintain the  uality
                     of comments on a personal post/site.

                    computer also  alls sic  as harm ul files and applications damage it. There are pre enti e measures
                  to secure our computer too. Let us read about them in this chapter.

                  Protecting your Computer from Illegal Access

                   ou ha e studied a out ho  to  eep your computer physically fit.  t is e ually important to
                  pre ent damage or misuse of data, software or hardware of a computer and restrict unauthorised
                  access to it.
                   ne o  the  ays to pre ent the misuse o  data or so t are is authentication. Authentication is the
                  process o   eri ying a user s identity  e ore granting him or her access to a computer system.  n
                  pri ate and pu lic computer net or s  including the  nternet   authentication is commonly done
                  through the use of login passwords. Knowledge of the password is assumed to guarantee that the
                  user is authentic.


                       12    Computer Genius-VI
   9   10   11   12   13   14   15   16   17   18   19