Posts

Chapter 10 INTERNET AND PROTOCOLS

Image
 Chapter 10 INTERNET AND PROTOCOLS  Q1    Tick the correct option :- 1.    1   In which year was ARPANET developed? C. 1969 2.    2    Which of the following is not an internet service provider? C. Google 3.    3  Which protocol is used to transfer files from one computer to another? A.           FTP 4.    4   Which of the following is not a network protocol? D. UTP 5 .    5  Which of these is not an example of a VOIP app? Google chrome   B.     Write T for True or F for False 1.     ARPANET was started by the UK Department of Defense.   FALSE 2.     DSL uses radio frequency for connecting to the internet. FALSE 3.     HTTPS is a secure version of HTTP.   TRUE 4.     IMAP is used to download emails from the server to the client computer and delete...

M S EXCEL Practical 30/11/2023

Image
 

HTML FORMS

Image

CLASS X Comment Tag

Image
1.  Comment <!-…- -> Tag This tag is used to insert comments in the source code of the Web page. Comments are not displayed in the browser’s window. All the text inserted inside this tag (<! — … — >) will be ignored by the browser that made invisible for the user. You can use comment to explain your code, it can help you, when you edit the source code later. This is especially useful, when you have a lot of codes. Syntax <! - -.... - -> EXAMPLE- <HTML> <HEAD> <TITLE> Comment </TITLE> </HEAD> <B0DY> <!- - This is a comment. - - > This is body. </BODY> </HTML> 2 What for is Mailto function - The "mailto" function is used to create email links on webpages, allowing users to click on the link and open their default email client with a new message addressed to the specified email address.

Cyber safety class 9

html practice questions 17/11/2023

Image
 

computer ethics class 8

Image
  CHAPTER 10 COMPTUER ETHICS MCQ 11. C Protecting password 22. B. software piracy 33.   B. Plagiarism 44. B. firewall 55. A. spamming B fill in the blanks 1. Computer ethics 2. Hacking means unauthorized access to someone’s computer for viewing, copying or creating data on it. 3. Emails 4. Spamming 5. Footprint c. Match the following- 1.      d. cyberbullying 2.      c. copyright 3.      e. Phishing 4.       b. hacking 5.       a. digital fooprint   SHORT QUESTION ANSWER 1.  Intellectual property rights are the rights given to a person over their creation. IPR protects an individual’s or a company’s ideas and creations, such as research work, product, art, logo, trademark, registration etc.   2.  Renting means lending or renting out software without the permission of...