Plz ans. The following question.
Define.
A. Plagiarism,B.virus,C.antivirus,D.firewall
2. Write notes on information security.
3.what do you mean by cyber crime.
Write the uses of internet.
Tqqq
Answers
uses of Internet
1 helps in locating places
2 e newspapers
3 getting answers to questions
A. Plagiarism is the "wrongful appropriation" and "stealing and publication" of another author's "language, thoughts, ideas, or expressions" and the representation of them as one's own original work. Plagiarism is considered academic dishonesty and a breach of journalistic ethics.
B. A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.
C. Anti-virus software is a software utility that detects, prevents, and removes viruses, worms, and other malware from a computer. Most anti-virus programs include an auto-update feature that permits the program to download profiles f new viruses, enabling the system to check for new threats. Antivirus programs are essential utilities for any computer but the choice of which one is very important. One AV program might find a certain virus or worm while another cannot, or vice-versa.
D. In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.
2. Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. The information or data may take any form, e.g. electronic or physical.[1] Information security's primary focus is the balanced protection of the confidentiality, integrity and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a multi-step risk management process that identifies assets, threat sources, vulnerabilities, potential impacts, and possible controls, followed by assessment of the effectiveness of the risk management plan.
3. Cyber crime, or computer-oriented crime, is the crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
4. Electronic mail. ...
Research.
Downloading files.
Discussion groups. ...
Interactive games. ...
Education and self-improvement. ...
Friendship and dating. ...
Electronic newspapers and magazines. etc.
Hope this will help u