CHAPTER 10 COMPTUER ETHICS MCQ 11. C Protecting password 22. B. software piracy 33. B. Plagiarism 44. B. firewall 55. A. spamming B fill in the blanks 1. Computer ethics 2. Hacking means unauthorized access to someone’s computer for viewing, copying or creating data on it. 3. Emails 4. Spamming 5. Footprint c. Match the following- 1. d. cyberbullying 2. c. copyright 3. e. Phishing 4. b. hacking 5. a. digital fooprint SHORT QUESTION ANSWER 1. Intellectual property rights are the rights given to a person over their creation. IPR protects an individual’s or a company’s ideas and creations, such as research work, product, art, logo, trademark, registration etc. 2. Renting means lending or renting out software without the permission of...
Lists in HTML Lists are an important part of a document. Whether it is a word document or pdf document or web document. It adds functionality to understand the contents clearly. In your textbook you have seen the list of questions, points are listed in numbers or symbols! This information makes your text and document contents more attractive and readable. Types of Lists in HTML HTML support three types of lists basically. They are: Ordered (Numbered) Lists – A list with numbers. Unordered (Bulleted) Lists – A list with symbols or bullets Description (Definition) Lists – A list to write definitions or terminologies Ordered (Numbered) Lists To generate order lists in HTML following tags are used: OL: The ordered lists always starts with <ol> and ends with </ol>. LI: LI tag specifies list items and written between <ol> and </ol>. For a number of the list items, the same number of <li> tags are required. U...
Comments
Post a Comment