Page 153 - Computer - 7
P. 153

D.  Write two examples for each of the following.

              1.  Media Streaming services.          __________________________________________________

              2.  Antivirus software.                __________________________________________________
              3.  Utility apps.                      __________________________________________________

              4.  Stealth viruses.                   __________________________________________________

              5.  E-reading apps.                    __________________________________________________

          E.  Give the answer for each of the following in one word.

              1.  Method for storing data in the cloud that provides servers and applications
                  access to data through shared file systems.                                            __________

              2.  Machine Learning AI approach that works with a small, labeled dataset and a
                  large unlabeled dataset.                                                               __________

              3.  Malware that hides its destructive intentions by disguising itself as a game, useful
                  application, or utility.                                                               __________
                                                                                                         __________
              4.  Use of advertising to spread malware.
              5.  The use of information technology by the national or local government to

                  provide information and services to its citizens.                                      __________

          F.  Answer the following questions in brief.

              1.  How is a Fuzzy Logic system different from an Expert system?
              2.  What is a Social Networking site? Give two examples.

              3.  How is smishing different from vishing?

              4.  What is a botnet?
              5.  What is CSS? Write the syntax for writing a CSS rule.


          G.  Answer the following questions.

              1.  What is malware? Write any five measures you should follow to protect your computer from
                  malware.

              2.  List the different ways in which you can insert CSS in an HTML document.
              3.  What are the three types of apps? Explain each in brief.

              4.  What is an HTML tag? Differentiate between a container tag and an empty tag.

              5.  Write short notes on each of the following:
                  (a) E-learning                     (b) E-commerce







                                                                                                             151
   148   149   150   151   152   153   154   155   156   157   158