Page 119 - Trackpad_ipro 4.1_Class6
P. 119
The customers are benefited by way of:
Convenience of banking No geographical restrictions
Lower costs Reduced chances of fraud
Cloud Storage
Previously we store data in various types of devices such as CDs, DVDs and Pen Drives. Now, we
can store our data on cloud storage instead of storing it on local computers. The data stored on
cloud storage can be accessed from anywhere in the world. Cloud storage is a service where the
users are able to store and manage data on a remote server in place of their local computer. This
service has become immensely popular because:
Instead of buying storage devices, you can pay a small fee to store your files online.
The users can access their data from anywhere by logging in to their cloud storage account.
The users can also access software and application for limited use which are very expensive to
purchase.
Some popular service providers offering cloud storage services are Google Drive, Amazon Web
Services, Dropbox, OneDrive, etc.
Safety Measures to Be Kept in Mind While Using the Internet
Following are some of the important guidelines you should remember while using Internet services:
Never provide personal information, such as address, phone number, or school name or location.
Keep your browser's privacy settings ON.
Use the Internet only in the presence of your elders.
Do not share passwords (other than your parents or teachers).
Never meet anyone you've met online without your parents' permission or supervision.
Never respond to a unknown e-mail, message, post, or text.
NETIQUETTES
Etiquettes are the rules that are expected to be followed while meeting or communicating with others.
In online communication, you may not be face-to-face with the person. There may be a situation
when the person may misunderstand your remark. In order to avoid misunderstandings, a set of rules
has been designed. These rules are called Netiquettes, a short form for Network Etiquettes.
Some common netiquettes are:
The subject of the email must be in relation to the matter of the email.
Signatures in an email should be small and simple.
Avoid sending repeated emails just for the publicity of a product or service.
Avoid typing in capital letters as typing in capitals is considered shouting at the person.
While writing an email, the person(s) whom you want to respond must be marked in the ‘To:’
field. The persons marked in the ‘Cc:’ field may or may not respond to the mail.
Avoid using the “Reply to All” option when it is not necessary to answer everyone marked in
the email.
Try to overlook the minor typing mistakes made by the sender.
Online Surfing and Cyber Security 117

