Page 391 - Trackpad 402_Class-X_Final
P. 391

5.  Sneha frequently chats with her friend using Snapchat and Google Chat. She found some of her friends do not follow
                  general rules and etiquettes of chatting. She wants to write those rules for her friends. Help her to do so.
               6.  It is always a good practice to browse safely when using the internet. We may face the problems of phishing and spoofing.
                  a.  Explain the above two terms- phishing and spoofing.
                  b.  Explain any three guidelines that we can follow to prevent cybercrime.
                  c.  Give any two rules that we can follow to keep our passwords strong.
                  d.  Why do we need a firewall for our computers?



                                            Previous Years' Questions


               1.                provides Internet access by transmitting digital data over wires of a local telephone network.   [2023]
                  a. HSDPA                                          b. P2P

                  c. DSL                                            d. Modem
               2.  Expand and Explain the term WAN.                                                            [2023]

               3.  a. Identify the following network/internet connectivities as wired or wireless:             [2023]
                   (i)  Dial-Up                          (ii) WiMax
                  b. Give any one feature of Instant messaging.

               4.                is an organisation which provides you with access to the Internet via a dial-up or direct or wireless
                  connection.                                                                                  [2022]
               5.  What is the special name given to the discussion style site used by non-technical (or technical) users for creating personal
                  web pages? Give any two examples of websites that help us to create such discussion style sites for free.   [2022]
               6.  Differentiate between LAN ond WAN with two points only.                                     [2022]

               7.  When a combination of hardware and software enables a person with a disability or impairment to use a computer, it is
                  known as               .                                                                     [2020]
                  a. Mechanical assistance                          b. Assertiveness
                  c. Assistive Technology                           d. Assistance and communication
               8.                in Control Panel are used to customise the way your keyboard, display, or mouse function.   [2020]

               9.  Explain Blog. Give any two websites that offer free blog services.                          [2020]
              10.  Differentiate between linking and embedding a document. Does embedding an object increase the size of the document?
                  List any two websites that offer free clipart.                                               [2020]
              11.  Explain any three types of impairments that impact computer usage.                          [2020]

              12.  Explain Client-Server architecture and Peer-to-Peer architecture.                           [2020]
              13.  Sound Sentry is designed to help users with      impairments.                               [2019]

              14.  ISP stands for           .                                                                  [2019]
              15.  What do you mean by P2P?                                                                    [2019]

              16.  Write down the process for transferring data on the Internet.                               [2019]
              17.  Write short notes on the following:                                                         [2019]
                  a. Web server
                  b. Dial up
                  c. WiFi


                                                                                    Web Applications and Security  391
   386   387   388   389   390   391   392   393   394   395   396