Monday, February 4, 2013

Std - 8 - Chapter 8

1.
What do you mean by privacy?

Privacy is unethical to infringe in the privacy of other people without the consent of the person.
2.
Define the term ethics.

Ethics and beliefs are rules.  These rules state what is right and what is wrong.
3.
Name the different forms of piracy.

End-User Piracy, Internet Piracy, Pre-Installed Software Piracy, Counterfeiting, Online Auction Piracy are the various forms of piracy.
4.
What are the limitations of pirated software?

·         No warranty protection
·         Contain viruses
5.
What does a copyright symbol indicate?

Copyright means All Rights Reserved.  This symbol shows the sole property of the owner.  It is unlawful and unethical to use them without the permission of the owner.
6.
Explain the importance of ethics.

·         Satisfying Basic Human Needs
·         Creating Credibility
·         Uniting People and Leadership
·         Improving Decision Making
·         Long Term Gains
·         Securing the Society
7.
What are intellectual property rights?

The rights related to literary or artistic work, inventions, discoveries, etc. are called Intellectual Property Rights.
8.
What is software piracy?

Software piracy is the illegal reproduction and distribution of software applications.
9.
Explain software breaches in computer.

Hardware breaches: can be both intentional and accidental.  Cables, modems, phone lines are often vulnerable to security breaches.
Software breaches: include computer viruses, password cracking.
Network breaches: are used to transmit data and information, they may be trapped by unethical people to access information about a company.
Natural disasters: like hurricanes, earthquakes, floods are security breaches.
Computer security controls are established and implemented to reduce security breaches.
10.
What is the difference between hacker and cracker?

A hacker is a person who breaks into a computer system to get illegal access to the information stored there.  Hacker may not cause any harm to the system or organization.
A cracker is a person who breaks into a computer system just like a hacker, with the intention to steal passwords, files or programs for unauthorized use.  They may sell the information to some other people for money.
11.
What do you mean by referencing?

If some material is downloaded, we must acknowledge the author sincerely.  This is called referencing.

for extra reading:  http://www.managementstudyguide.com/importance-of-ethics.htm

Std - 8 - Chapter 7


1.
What is the importance of ethics in e-commerce?

There are many aspects of ethics that can affect electronic commerce systems, but perhaps the most notable and worrying to both consumers and developers is that of trust.
2.
What are newsgroups?

The places on Internet where you can exchange your views and ideas on different subjects with other people are called Newsgroups.
3.
List some e-commerce websites.

amazon.com, ebay.com, electricpages.in, indiatimes.com, bookselleronline.com, fabmart.com
4.
Mention some websites which provide online news facility.

ndtv.com, Hindustantimes.com, kidnews.com, mathrubhumi.com, malayalamanorama.com etc.
5.
What do you mean by Business to Consumer e-commerce?

Business to Consumer refers to a company which establishes website for its products and services.
6.
What do you mean by Business to Business e-commerce?

Business to Business refers to a company selling or buying products or services from/to other companies.
7.
Explain the term Social Networking.

Social Networking websites function like an online community of Internet users.  They provide a virtual community in which the members with common interests in hobbies, religion, or politics may communicate with each other.  Facebook, Orkut, and LinkedIn are some examples of Social Networking.
8.
Explain the term Blog.

A blog is a type of website, usually maintained by an individual.  It contains regular entries of commentary, descriptions of events, or other material such as graphics or videos.  Blog also, means “to maintain or add contents to a blog”.
9.
What is video conferencing? Where is it used?

Video conferencing provides face to face conversation with different people who are at different locations.  This is widely used in big companies, TV Shows, chatting etc.
10.
Write the steps to buy a product online.

a)      Open any e-commerce site.
b)      Enter the product name in search box and press enter key.
c)       Double click the product you are interested from the list.
d)      Click on “Add to Cart”
e)      Click on “Proceed to checkout”
f)       Enter the email address and password then provide your shipping address.
g)      Select the payment options and enter your card’s details.
11.
What do you mean by term e-commerce? Write some advantages of e-commerce.

E-commerce means buying and selling any product online using internet technologies. 
Advantages:
a)      You do not need to go to showrooms or shops.
b)      You do not need to carry cash from home to shop with a fear of losing it.
c)       There are no geographical or time barriers.
d)      Even small companies can go global.
e)      You can save time, money and effort.

Std - 8 - Chapter 6


1.
What is Adobe Flash CS3 Professional?

Adobe Flash CS3 software is used to create animations, games, cartoons, text, graphics, design movies on the web and other special effects without using programming skills.
2.
How do you group and ungroup objects?

To group objects:
a)      Draw all the shapes and select all of them using Selection Tool.
b)      Click on the Modify menu and click Group.
To ungroup objects: select an object and click Modify menu and click Ungroup.
3.
How do you insert a key frame?

a)      Click on the frame below the number where you want to insert a Key frame.
b)      Click on the Insert menu -> Timeline.
c)       Select Frame or Key frame.
4.
What is a symbol?  Write the steps to create a symbol.

A symbol is an object created in Flash.  Graphics, Buttons and Movie clips are the three types of symbols. 
To create symbol:
a)      Click Modify menu -> Convert to Symbol option.
b)      Type the name and choose the Type: Graphic, Button or Movie Clip.
5.
Write steps to use paint bucket tool.

a)      Draw the shape and click at Paint Bucket Tool.
b)      Choose colour from the Property Inspector.
c)       Click on the shape you want to fill.
6.
Write steps to create motion tween animation.

a)      Draw a shape.
b)      Right-Click the frame till where you want the animation to continue.
c)       Click the first frame and select the Tween as Motion from the Property Inspector.
d)      Select the inserted Key frame.
e)      Set the position of the object by dragging it wherever you want.
7.
What is the use of time line panel in Flash?

Timeline is made up of Frames and Layers.  It controls file content over time.  It compiles the movie reel, sequencing the scene to be played.
8.
Explain the three types of animations in Flash?

a)      Motion Tween: can be referred to an object that travels from one point to another and involves no change of shape over time.
b)      Shape Tween: means an object that involves change of the shape over the period of time.  We can also tween the location, size, and colour of shapes.  Shape Tween does not work on symbols.
c)       Frame by Frame animation: means creation of an object for each frame, so as to produce an animation sequence.  This type of animation is used in real movies.
9.
What does animation refers to?

Animation refers to a series of images linked together through a loop to create an illusion of movement.
10.
What is a Key Frame?

A Key Frame is a frame in which you define a change in the object for an animation.

Std 7 - Chapter - 7 More on Internet

Chapter - 7 More on Internet 1. What is World Wide Web? The World Wide Web (abbreviated as WWW...