Page 368 - Trackpad 402_Class-X_Final
P. 368

Step 4:   After you are logged in, you are presented with the screen to fill in details of the passengers, which include
                Name,  Age,  Gender,  Nationality  and  Seat  preference  of  Lower,  Middle  or  Upper.  You  can  add  up  to  6
                passengers. After that there are options to take travel Insurance, and Upgrade to Higher category of seat,
                which are optional.

        Step 5:   After you have put in the passenger details, it gives you an option to select Payment Mode that can be
                Internet Banking, Card or UPI Id details.

        Step 6:   After all details and payment processed it shows you your booked ticket details, which carry your ticket PNR
                number, which is unique identification for this booking and seat number and other details that you had filled
                in during the reservation process.

        So this is another example of online shopping, where you do not buy the product but the service. Similarly, you can
        book other services like Movie Tickets, Air Travel Tickets, any theatre show, seat in a restaurant or any other kind. Enjoy
        this by trying yourself!



                WHAT IS INTERNET SECURITY?
        The Internet has become a necessity for all of us whether at home or at school or in an office. For our daily life
        whether it's entertainment using OTT platforms or shopping online our favourite clothes, buying groceries, playing
        games online- although have made our lives easier but at the same time have been exposed to risks of all types.

























        Internet security is a branch of computer security that is responsible to establish rules and measures to be followed in
        case of security breach attacks over the internet. The primary objective of internet security is to provide solutions to
        protect users from attacks that travel over the internet. The internet being a hugely used service by people of all walks
        of life, is insecure and is vulnerable to cyber threats like phishing, spoofing, etc.



          368   Trackpad Information Technology-X
   363   364   365   366   367   368   369   370   371   372   373