Two Marks Section A
1
What is cyberspace?
Cyberspace is the virtual,
interconnected world created by computer networks like the internet, where
people and organizations can interact, share information, and conduct business.
2
Name any two input device
Two input devices are the keyboard and
the mouse.
3
What is internet?
Internet is a
global communication system that links together thousands of individual
networks. It allows exchange of information between two
or more computers on a network
4
What is cyber crime?
Cybercrime is any illegal activity that
involves a computer, network, or other digital device.
5
What is virus?
A
computer virus is a type of malicious software (malware) that can
replicate itself and spread to other computers.
6
What is Malware?
Malware,
or malicious software, is any software designed to harm, disrupt, or gain
unauthorized access to computer systems.
7
What is social media?
Social media refers to websites
and apps that enable users to create and share content, and participate in
virtual communities and networks.
8
Define hash tag
a word or phrase preceded by
a hash sign (#), used on social
media sites and applications, especially Twitter, to identify digital content
on a specific topic, microblogging and
photo-sharing services
9
What is e-commerce?
E-commerce
is the buying and selling of goods and services over the internet. It includes all online transactions,
from a consumer buying a product on a website to a business-to-business (B2B)
service being provided electronically
10
Name any two popular E-Commerce sites
Two popular e-commerce sites are Amazon
and Flipkart. Amazon is a
multinational company with a massive global presence, while Flipkart is a
successful Indian e-commerce company that serves as a major competitor to
Amazon in the Indian market.
11
Expand UPI
UPI stands for Unified Payments Interface. The National
Payments Corporation of India launched UPI, a mobile platform that facilitates
fast money transfers.
12
What is data backup?
Data backup is the process of
copying and storing data to a secondary location to safeguard it against loss
from hardware failure, accidental deletion, cyberattacks, or natural disasters.
Five Marks Section B
2 What is cyber-attack right types of Cyber attack
3 write a note on financial fraud
4 what are various types of social media platform
5 write any five applications of e-commerce
6 what are the key aspects of mobile phone security
Ten Marks Section C
7 Explain the issue and challenges of cyber security
8 explain cybercrime against women and children
9 explain pros and cons of social medium marketing
10 explain advantages of e-commerce
11 expense cyber security measures and best practices
No comments:
Post a Comment