Computer Applications
Case Study 2
While discussing about security in Internet, Shreya's uncle told her that there are different protocols used for different purposes on Internet. These protocols are necessary because millions of people exchange a large amount of information on net. If there will be no security protocols then, the worldwide data would not be secure and the net users will lose their faith, security of data is essential in case of online transactions, social media platforms etc. Shreya's uncle told her about one such security protocol which is the SSL protocol.
Answer the questions given below.
(i) What is SSL (Secure Sockets Layer)?
(ii) How is data flow secured in SSL?
(iii) Write two advantages of SSL.
(iv) Name the protocol used for secure login into a remote computer system.
Answer
(i) SSL (Secure Sockets Layer) is a standard security protocol which ensures data security by establishing encrypted online links between a web server and a browser. It encrypts the transmitted data and keeps it secure.
(ii) SSL uses encryption algorithms to scramble data during transit. It provides a way for the user's browser to verify the identity of the server and ensures that the data transferred between the user and the server remains intact and has not been tampered with during transit. Data is decrypted before it can be used by the receiving system.
(iii) Two advantages of SSL are:
- SSL provides a secure and encrypted connection, protecting sensitive information from unauthorized access and ensuring the confidentiality of data.
- SSL provides the means for establishing the authenticity of the websites we are connecting to.
(iv) SSH (Secure SHell).
Related Questions
Yamini is the class coordinator of a school. She has to prepare a table of the names of students, class and the subjects they are good at. Help Yamini to generate the code for displaying this table.
Roll_No Name Class Subject 1 Neha Vth Maths 2 Amit 10th English 3 Sneha IIIrd G.K. Write the HTML code to generate the web page as shown below, considering the specifications that follow. You can write the code for given specifications.

(i) Active link color is Green and Visiting link color is Red.
(ii) Image is from the file "computer.jpg".
(iii) Use horizontal rule wherever required.
(iv) Use ordered and unordered lists wherever required.
(v) The pages are linked as follows:
Page Link Super Computers Super.html Mainframe Computers Main.html Mini Computers Mini.html Micro Computers Micro.html Desktops Desk.html Laptops Laptop.html PDA PDA.html Note: You can use any other attributes that are not mentioned above to produce a similar output.
Write the HTML code to generate the web page as shown below, considering the specifications that follow. You can write the code for given specifications.

(i) Title of the page is "Indian Food".
(ii) Font face of heading is "arial".
(iii) Image used as food1.jpg.
(iv) Table border is 4px and border color is maroon.
(v) Use link as
For Available Food as F1.html
For Dishes Price as F2.html
For Get Recipes as F3.htmlCase Study 1
Mary has a prepaid Internet plan. She has a data limit of 14 GB. The average size of an E-mail with an attachment that Mary downloads is 1.4 MB.
Answer the questions given below.
(i) Approximately, how many E-mails can Mary download without exceeding her data limit?
(ii) What is E-mail?
(iii) Mary's friend is not able to understand the term attachment in E-mail. Help her to know this.
(iv) Name any two website who provide E-mail services.