{"id":3161,"date":"2022-04-19T22:33:42","date_gmt":"2022-04-19T17:03:42","guid":{"rendered":"https:\/\/cbsepython.in\/?p=3161"},"modified":"2022-05-20T09:47:15","modified_gmt":"2022-05-20T04:17:15","slug":"web-applications-and-security-class-10-it","status":"publish","type":"post","link":"https:\/\/cbsepython.in\/web-applications-and-security-class-10-it\/","title":{"rendered":"Web Applications and Security Class 10 IT 402 Questions and Answers"},"content":{"rendered":"<h1><span style=\"color: #000000;\">Web Applications and Security Class 10 IT 402 Questions and Answers<\/span><\/h1>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">1. Define accessibility in terms of computer technology?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. Computer accessibility refers to making technology more user friendly regardless of any disability.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">2. Define Assistive technology.<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. Assistive technology is any device, software or equipment that is used to increase, maintain, or improve functional capabilities of a person with a disability.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">3. Mention four types of disability or impairment which affect the computer accessibility.<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. These are: Visual impairments, Hearing impairments or deafness, motor or dexterity impairments and Speech-language impairment.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">4. What is the purpose of a modem?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. Modem is a device that converts analog to digital signals and vice-versa.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">5. What is NIC?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. A network interface card (NIC) connects your computer to a local data network or the Internet. A network interface card is also known as a network interface controller, network adapter, or Local Area Network (LAN) adapter.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">6. What are Routers?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. On internet, it is not necessary that all the packets will follow the same path from source to destination. A special machine called router tries to load balance between various paths that exist on networks. Routers can attach physically different networks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">7. Define WIMAX.<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communication standard for broadband wireless access (BWA) networks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">8. Define WWW.<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. The WWW is a collection of web pages which are interlinked hypertext documents accessed via the Internet. The main goal of the Web is to organize and retrieve information over Internet. <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">9. Name two communication protocols of Internet.<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. The two protocols are TCP and IP.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #000000;\"><strong>10. Name four broadband ISPs in India.<\/strong> <\/span><\/p>\n<p><span style=\"color: #000000;\">Ans. Four broadband ISPS in India are: MTNL, VSNL, AirTel and Reliance.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"color: #000000;\">Web Applications and Security Class 10 IT 402<\/span><\/h2>\n<p><strong><span style=\"color: #000000;\">11. What is Instant Messaging?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. Instant Messaging Service is a system application by which a client is able to provide (near) real-time messaging capabilities. Instant messaging helps you exchange text messages in real-time through a software.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">12. How can you access web based instant message?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. Web based instant messaging software is accessed using browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, etc.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">13. Define E-Shopping.<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. E-Shopping or online shopping is a form of electronic commerce which allows consumers to directly buy goods or services from a seller over the Internet using a web browser.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">14. List five benefits of E-Commerce.<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. Some key benefits are:<\/span><\/p>\n<p><span style=\"color: #000000;\">There is no need to stand in a queue.<\/span><\/p>\n<p><span style=\"color: #000000;\">Range of goods available in online platform.<\/span><\/p>\n<p><span style=\"color: #000000;\">You can compare goods from many retailers.<\/span><\/p>\n<p><span style=\"color: #000000;\">24&#215;7 availability &#8211; the shop never closes.<\/span><\/p>\n<p><span style=\"color: #000000;\">This is a global market where neither you nor the vendor are restricted to your\/their locality.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">15. What is security?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. The protection of sensitive data and personal information from unintentional and intentional attacks and disclosure is called security.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">16. What is data security?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. In simple terms, data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">17. Mention few threats for a computer when it is connected to internet or any network.<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. Some of these threats are: hacking or identity theft, cracking, eavesdropping, Identity Spoofing (IP Address Spoofing), Cyber Snooping, Email Spoofing, SMS Spoofing, Intellectual Property Crime, virus attack, carding, etc.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">18. What is information technology security?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. IT Security is a term which is more concerned with the protection of hardware, software and a network of an organization, from the perils of disaster and external attacks (through virus, hacking, etc.).<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">19. What is firewall?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. A firewall is a hardware device or software program that prevents unwanted traffic from entering or exiting your computer. When properly configured, these devices allow your computer to send and receive data from the Internet and block unwanted traffic from hackers, viruses, and other undesirable sources.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">20. Shikha is working in an organization as a Network manager. In her organization they use both Internet and Intranet. She authorizes people to access some specific document and not others. Name the device which helps her to control access between the Internet and Intranet.<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. Firewall.<\/span><\/p>\n<h2><\/h2>\n<h3><span style=\"color: #000000;\">Web Applications and Security Class 10 IT 402<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">21. Define data encryption.<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. Encryption scrambles data and is used to protect information that is being held on a computer, copied onto CDs or DVDs or transmitted over a network. It uses technologies such as virtual private networks (VPNs) and secure socket layers.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">22. How is firewall useful in ensuring network security?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. Firewalls are software programs or hardware devices that are useful to filter the traffic (like virus, worms, intruders, hackers, malicious code, etc.) that flows into your PC or your network through a internet connection.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">23. What is Computer virus?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. virus is an application with the ability of multiplying itself, which can cause great danger and damage to files other software on the same machine. A true virus cannot infect another system without human intervention.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">24. How can you protect your computer from virus?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. To protect your computer, you must do the following things:<\/span><\/p>\n<p><span style=\"color: #000000;\">Use a firewall. If you are using Windows 7, make sure the Windows Firewall is turned on.<\/span><\/p>\n<p><span style=\"color: #000000;\">Keep your software up-to-date. In Windows, make sure automatic updating is turned on. Install an anti-virus program. Installing an anti-virus program and keeping it up-to-date can help protect your computer against viruses.<\/span><\/p>\n<p><span style=\"color: #000000;\">Avoid using suspicious links. Don&#8217;t click on links or open attachments from email addresses you don&#8217;t know.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">25. What do mean by your blog?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. Your blog means the computer where you create the blog. This is called host or host computer which has an internet connection. This may be your home computer or a server.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">26. Why do you need a blogging platform?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. A blogging platform is a software or service that you use to publish your content on the internet in the form of a blog.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">27. What is web hosting for a blog?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. Web hosting is what makes your blog visible to others on the web. Without it, no one but you would ever see your blog posts. Hosting typically runs on a server owned by a web hosting company and your blog takes up just a small space on that server.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">28. Name two popular blogging platforms.<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. The most popular blogging platforms are the blogger and WordPress.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">29. Can you host a blog without a blog hosting company?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. No<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">30. Name two blog hosting companies.<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. WordPress and GoDaddy.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">31. What type of content can be placed in a blog?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. The content of a blog typically includes text, pictures, videos, animated GIFs and even scans from old physical offline diaries or journals and other hard copy documents.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">32. What is the difference between blog and website?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. The primary difference between a blog and a website is that a blog is a specific type of content displayed on web pages on a website.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">33. What is the purpose of call-to-action in a website?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. A call-to-action is a prompt on a website that tells the user to take some specified action. A call-to action is typically written as a command, such as &#8216;Sign Up&#8217; or &#8216;Buy Now&#8217; and generally takes the form of a button or hyperlink.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000000;\">34. What is domain name?<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">Ans. A domain name is your website name. A domain name is the address where Internet users can access your website. A domain name is used for finding and identifying computers on the Internet.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Also Check:<\/h2>\n<h2><a href=\"https:\/\/cbsepython.in\/class-10-information-technology-402-term-2-sample-paper-set-2\/\"><span style=\"color: #ff0000;\">IT 402 Term 2 Sample Paper Class 10 Set 2<\/span><\/a><\/h2>\n<h2><span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/cbsepython.in\/class-10-information-technology-402-term-2-sample-paper-set-3\/\">IT 402 Term 2 Sample Paper Class 10 Set 3<\/a><\/span><\/h2>\n<h2><span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/cbsepython.in\/entrepreneurial-skills-questions-it-402-class-10\/\">Entrepreneurial Skills questions IT 402 Class 10 Questions &amp; Answer<\/a><\/span><\/h2>\n<h2><span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/cbsepython.in\/green-skills-questions-it-402-class-10\/\">Green Skills questions IT 402 Class 10 Questions &amp; Answer<\/a><\/span><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Web Applications and Security Class 10 IT 402 Questions and Answers &nbsp; 1. Define accessibility in terms of computer technology? Ans. Computer accessibility refers to making technology more user friendly regardless of any disability. &nbsp; 2. Define Assistive technology. Ans. Assistive technology is any device, software or equipment that is used to increase, maintain, or [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[42],"tags":[],"class_list":["post-3161","post","type-post","status-publish","format-standard","hentry","category-information-technology-for-cbse-class-10"],"_links":{"self":[{"href":"https:\/\/cbsepython.in\/wp-json\/wp\/v2\/posts\/3161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cbsepython.in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cbsepython.in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cbsepython.in\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cbsepython.in\/wp-json\/wp\/v2\/comments?post=3161"}],"version-history":[{"count":0,"href":"https:\/\/cbsepython.in\/wp-json\/wp\/v2\/posts\/3161\/revisions"}],"wp:attachment":[{"href":"https:\/\/cbsepython.in\/wp-json\/wp\/v2\/media?parent=3161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cbsepython.in\/wp-json\/wp\/v2\/categories?post=3161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cbsepython.in\/wp-json\/wp\/v2\/tags?post=3161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}