summary of the chapter ѕєяνι¢єѕ σи тнє ιитєяиєт
¢ℓαѕѕ 10
Answers
The Internet connectivity is provided by Internet Service Providers (ISP). These corporations dedicate computers to act as servers - that is they make information (such as Web pages or e-mail) available to users of the Internet. One can look upon the structure of the Internet as having an edge and a core.
hope it helps....
Internet
The Internet can be described as an interconnection of several thousands of computers of different types belonging to various networks all over the world.
E-mail is a message distributed by electronic means from one computer user to or more recipients via a network. It is the services of internet in which messages are sent from and received by the servers. E-mail has several advantages over conventional postal services.
Web Chat
Web chat is a program that enables you to communicate with others in real-time through messages. The user can log on to certain websites and communicate with various other users online by using Internet chat software. Chat software is interactive software that allows user to type comment in one window and receive replies in another from someone who is accessing the same software.
World Wide Web
World Wide Web is the leading information exchange service of the Internet. It gives users access to a vast array of documents that are connected to each other by the help of hypertext or hyperlink.
E-commerce
E-commerce is the commercial transactions conducted electrically on the Internet. It refers to a wide range of online business activities for products and services.
Internet telephony
Internet telephony can be defined as the technology that converts analog speech signals into digital signals and routes them through packet-switched networks of internet.
Video conferencing
Video conferencing means making communication between the users using sounds as well as pictures.
Computer security
Computer security refers to the protection of computer system and its valuable information against unwanted access, damage, modification or destruction.
Some computer hardware security measures
i) Regular maintenance
ii) Insurance
iii) Dust free
iv) Air condition system etc.
And some computer software security measures are as follows:
i) Password protection
ii) Backup system
iii) Defragmentation
iv) Scan disc
Hardware security
The protection of all hardware components used in computer system is known as hardware security. The computer equipment, software and data need to be protected from physical harm like fire, lightening, water, etc. as well as damage or theft, which is possible by hardware security which helps in protection of computer system.
Software security
Software security secure the data and software from getting lost and damaged and helps to insure privacy. It also protects data and software from the computer viruses. So, software security helps to prevent data loss.
Backup
Backup is a copy of a file which is used in the event of the original file being corrupted.
password & good criteria for a strong password
A password is a secret word or phrase that gives a user access to a particular program or system. Any four good criteria for a strong password are as follows:
i. Do not keep a password which can be easily guessed such as date of birth, nickname, etc.
ii. Do not keep a password that is similar to your name or surname.
iii. Do not keep word as a password that is currently popular.
iv. Keep changing your password regularly.
Scandisk
Scandisk is a process, which involves in maintaining the disk files and folders using a kind of utility ѕσfтωαяє