Page 14 - Computer Genius Class 06
P. 14
Acknowledge the original writer
and the source from where the
material has been taken.
Some tips to
Use “ “ for statements
safeguard from Rephrase the matter.
uoted y another person.
Plagiarism
s soon as you ha e a usiness name
and logo for your idea, you should
register those Trademarks right away
Rules to remember while using Social Media:
Maintain Authenticity: e must e honest a out our identity. e er pretend to e someone
else.
Always use a disclaimer: hile sharing personal ie s a out something e must ma e it clear
that these are personal ie s.
Never pick fights on the Internet: e must con ey our opinions care ully y choosing the right
words.
Protect your Identity: e er list your ull name parents details home address or telephone
number online.
Respect your Audience: aintain good conduct e en on the nternet. e rain rom using slang
personal insults or obscene language.
Respect for other's Feelings: One must always be considerate and mindful of others’ feelings on
sensiti e topics such as politics or religion.
Try to Monitor Comments: ne should pre er to monitor comments so as to maintain the uality
of comments on a personal post/site.
computer also alls sic as harm ul files and applications damage it. There are pre enti e measures
to secure our computer too. Let us read about them in this chapter.
Protecting your Computer from Illegal Access
ou ha e studied a out ho to eep your computer physically fit. t is e ually important to
pre ent damage or misuse of data, software or hardware of a computer and restrict unauthorised
access to it.
ne o the ays to pre ent the misuse o data or so t are is authentication. Authentication is the
process o eri ying a user s identity e ore granting him or her access to a computer system. n
pri ate and pu lic computer net or s including the nternet authentication is commonly done
through the use of login passwords. Knowledge of the password is assumed to guarantee that the
user is authentic.
12 Computer Genius-VI

