Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

INFORMATION TECHNOLOGY (402): CLASS-X (Session 2020-21)

UNIT 4 : WEB APPLICATIONS & SECURITY

ASSIGNMENT-1 SOLUTIONS (Based on sessions 1, 2, 3, 4)

To be done in notebooks. Copy the questions also.

I. Fill in the blanks:

1. The three toggle keys are Caps Lock, Num Lock and Scroll Lock.
2. Local area Network (LAN) is used to connect computers and devices within a small geographical area.
3. The full form of DSL is Digital Subscriber Line.
4. Most Instant Messaging (IM) software includes the option to transfer files, audio chat, video, images etc.
5. Two kinds of IM Software are Application based and Web based.
II. Write any two etiquettes to be followed while chatting on the internet.
Ans. i.) Always introduce yourself by name if your screen name doesn’t reflect it.
ii.) Give people time to respond - Multiple questions sent to a recipient before they’ve had a chance to
answer can seem more like an interrogation rather than a conversation.
(note- out of the 8 etiquettes given in study material pdf, any two can be written)

ASSIGNMENT-2 (Based on sessions 5,6,7,8)

To be done in notebooks. Copy the questions also. Answer very briefly.

1. Attackers have been sending emails that feed on concerns about COVID-19 to spread malware, trick them
into sharing account credentials, or opening malicious attachments. This is an example of which of the
following Online threat: Phishing, email spoofing or Chat Spoofing?
ANS. This is an example of Phishing.
2. Write strong or weak in front of the following passwords:

S.NO. PASSWORD TYPE (STRONG/WEAK)


1. BankLogin WEAK
2. kitty WEAK
3. &eBay.44 STRONG
4. Dogs WEAK
5. D3ltagamm@ STRONG

You might also like