1.
|
What do you mean by privacy?
|
Privacy is unethical to infringe in the privacy of other people without
the consent of the person.
|
|
2.
|
Define the term ethics.
|
Ethics and beliefs are rules. These
rules state what is right and what is wrong.
|
|
3.
|
Name the different forms of
piracy.
|
End-User Piracy, Internet Piracy, Pre-Installed Software Piracy,
Counterfeiting, Online Auction Piracy are the various forms of piracy.
|
|
4.
|
What are the limitations of pirated
software?
|
·
No warranty protection
·
Contain viruses
|
|
5.
|
What does a copyright symbol
indicate?
|
Copyright means All Rights Reserved.
This symbol shows the sole property of the owner. It is unlawful and unethical to use them
without the permission of the owner.
|
|
6.
|
Explain the importance of
ethics.
|
·
Satisfying Basic
Human Needs
·
Creating Credibility
·
Uniting People and
Leadership
·
Improving Decision
Making
·
Long Term Gains
·
Securing the Society
|
|
7.
|
What are intellectual property
rights?
|
The rights related to literary or artistic work, inventions,
discoveries, etc. are called Intellectual Property Rights.
|
|
8.
|
What is software piracy?
|
Software piracy is the illegal reproduction and distribution of
software applications.
|
|
9.
|
Explain software breaches in
computer.
|
Hardware breaches: can be
both intentional and accidental. Cables,
modems, phone lines are often vulnerable to security breaches.
Software breaches: include
computer viruses, password cracking.
Network breaches: are used
to transmit data and information, they may be trapped by unethical people to
access information about a company.
Natural disasters: like
hurricanes, earthquakes, floods are security breaches.
Computer security controls
are established and implemented to reduce security breaches.
|
|
10.
|
What is the difference between
hacker and cracker?
|
A hacker is a person who
breaks into a computer system to get illegal access to the information stored
there. Hacker may not cause any harm
to the system or organization.
A cracker is a person who
breaks into a computer system just like a hacker, with the intention to steal
passwords, files or programs for unauthorized use. They may sell the information to some other
people for money.
|
|
11.
|
What do you mean by referencing?
|
If some material is downloaded, we must acknowledge the author
sincerely. This is called referencing.
for extra reading: http://www.managementstudyguide.com/importance-of-ethics.htm |
Monday, February 4, 2013
Std - 8 - Chapter 8
Std - 8 - Chapter 7
1.
|
What is the
importance of ethics in e-commerce?
|
|
There are many aspects of ethics that can affect
electronic commerce systems, but perhaps the most notable and worrying to
both consumers and developers is that of trust.
|
2.
|
What are
newsgroups?
|
|
The places on Internet where you can exchange your
views and ideas on different subjects with other people are called
Newsgroups.
|
3.
|
List some
e-commerce websites.
|
|
amazon.com, ebay.com, electricpages.in,
indiatimes.com, bookselleronline.com, fabmart.com
|
4.
|
Mention some
websites which provide online news facility.
|
|
ndtv.com, Hindustantimes.com, kidnews.com,
mathrubhumi.com, malayalamanorama.com etc.
|
5.
|
What do you
mean by Business to Consumer e-commerce?
|
|
Business to Consumer refers to a company which
establishes website for its products and services.
|
6.
|
What do you
mean by Business to Business e-commerce?
|
|
Business to Business refers to a company selling
or buying products or services from/to other companies.
|
7.
|
Explain the
term Social Networking.
|
|
Social Networking websites function like an online
community of Internet users. They provide
a virtual community in which the members with common interests in hobbies,
religion, or politics may communicate with each other. Facebook, Orkut, and LinkedIn are some
examples of Social Networking.
|
8.
|
Explain the
term Blog.
|
|
A blog is a type of website, usually maintained
by an individual. It contains regular
entries of commentary, descriptions of events, or other material such as
graphics or videos. Blog also, means “to
maintain or add contents to a blog”.
|
9.
|
What is
video conferencing? Where is it used?
|
|
Video conferencing provides face to face
conversation with different people who are at different locations. This is widely used in big companies, TV
Shows, chatting etc.
|
10.
|
Write the
steps to buy a product online.
|
|
a) Open
any e-commerce site.
b) Enter
the product name in search box and press enter key.
c) Double
click the product you are interested from the list.
d) Click
on “Add to Cart”
e) Click
on “Proceed to checkout”
f) Enter
the email address and password then provide your shipping address.
g) Select
the payment options and enter your card’s details.
|
11.
|
What do you mean by term e-commerce? Write some
advantages of e-commerce.
|
|
E-commerce means buying and selling any product
online using internet technologies.
Advantages:
a) You
do not need to go to showrooms or shops.
b) You
do not need to carry cash from home to shop with a fear of losing it.
c) There
are no geographical or time barriers.
d) Even
small companies can go global.
e) You
can save time, money and effort.
|
Std - 8 - Chapter 6
1.
|
What is
Adobe Flash CS3 Professional?
|
Adobe Flash CS3 software is used to create
animations, games, cartoons, text, graphics, design movies on the web and
other special effects without using programming skills.
|
|
2.
|
How do you
group and ungroup objects?
|
To group
objects:
a) Draw
all the shapes and select all of them using Selection Tool.
b) Click
on the Modify menu and click Group.
To ungroup
objects: select an object and click Modify
menu and click Ungroup.
|
|
3.
|
How do you
insert a key frame?
|
a) Click
on the frame below the number where you want to insert a Key frame.
b) Click
on the Insert menu -> Timeline.
c) Select
Frame or Key frame.
|
|
4.
|
What is a
symbol? Write the steps to create a
symbol.
|
A symbol is an object created in Flash. Graphics, Buttons and Movie clips are the
three types of symbols.
To create symbol:
a) Click
Modify menu -> Convert to Symbol option.
b) Type
the name and choose the Type: Graphic, Button or Movie Clip.
|
|
5.
|
Write steps
to use paint bucket tool.
|
a) Draw
the shape and click at Paint Bucket Tool.
b) Choose
colour from the Property Inspector.
c) Click
on the shape you want to fill.
|
|
6.
|
Write steps
to create motion tween animation.
|
a) Draw
a shape.
b) Right-Click
the frame till where you want the animation to continue.
c) Click
the first frame and select the Tween as Motion from the Property Inspector.
d) Select
the inserted Key frame.
e) Set
the position of the object by dragging it wherever you want.
|
|
7.
|
What is the
use of time line panel in Flash?
|
Timeline is made up of Frames and Layers. It controls file content over time. It compiles the movie reel, sequencing the
scene to be played.
|
|
8.
|
Explain the
three types of animations in Flash?
|
a) Motion Tween: can be referred to an
object that travels from one point to another and involves no change of shape
over time.
b) Shape Tween: means an object that
involves change of the shape over the period of time. We can also tween the location, size, and
colour of shapes. Shape Tween does not
work on symbols.
c) Frame by Frame animation: means
creation of an object for each frame, so as to produce an animation
sequence. This type of animation is
used in real movies.
|
|
9.
|
What does animation
refers to?
|
Animation refers to a series of images linked
together through a loop to create an illusion of movement.
|
|
10.
|
What is a
Key Frame?
|
A Key Frame is a frame in which you define a change
in the object for an animation.
|
Subscribe to:
Posts (Atom)
Std 7 - Chapter - 7 More on Internet
Chapter - 7 More on Internet 1. What is World Wide Web? The World Wide Web (abbreviated as WWW...
-
Chapter - 5 Computer Virus 1. What are the symptoms of a computer virus? Symptoms of a virus include com...
-
Chapter - 2 More on MS Windows 7 1. What is the use of Select all option? Select all option is used to selec...
-
MS Access 2007: Queries, Forms and Reports 1. When do you use a Form? Form is a graphical representation of a table. Forms are use...