Computer Applications
Case Study 2
Yamini recently tried logging into her social media account. She was able to login and post updates on her account but a few days later when she tried to do the same, she couldn't login and when she saw her account through someone else's profile, she noticed that there were many spam posts and stories on her account which were not posted by her. She reported her complaint to the social media company, her account got deleted and she had to make a new one.
Answer the following questions.
(i) What is the term for stealing of required information by seeking a weakness in a computer?
(ii) What had happened to Yamini's account?
(iii) What does a hacker do?
(iv) Mention any two methods to prevent hacking.
Answer
(i) Hacking is the term for stealing of required information by seeking a weakness in a computer.
(ii) Yamini's account experienced unauthorized access and was likely hacked. The hacker posted spam content and stories on her account without her consent.
(iii) The people who are involved in the cyber crime are called Hackers. They try to gain unauthorized access to computer systems or networks with the intent to exploit, manipulate, or steal information. In this scenario, the hacker gained access to Yamini's social media account and posted spam content.
(iv) Two methods to prevent hacking are:
- We should create complex and unique passwords for the accounts, incorporating a mix of letters, numbers and special characters.
- We should enable Two Factor Authentication. This adds an extra layer of security by requiring a second verification step, such as a code sent to the mobile device, in addition to the password.
Related Questions
An artist has to prepare a table to showcase the type of paintings he has created, their quantity and their price. Help him to make the table. Observe the table and write the code to generate it.

Write the HTML code to design the web page as shown below, considering the specifications that follow. You can write the code for given specifications.

(i) Background color of page is yellow.
(ii) Font style for the page is arial.
(iii) Image used is gov.jpeg.
(iv) Text color of the paragraph is red.
(v) E-mail id for bottom message is
abc@xyz.com.Write the HTML code to design the web page as shown below, considering the specifications that follow. You can write the code for given specifications.

(i) Link color is black, background color is yellow and visited link color is green.
(ii) Image used is "Computer.jpg".
(iii) Caption of table is blue.
(iv) Table border is blue and of size 2. Showcasing the advantages of computers.
(v) The 4 links are monitor.html, system.html, mouse.html and keyboard.html.
Case Study 1
When Neeru visited her facebook account, she saw an update about a job opportunity. She sent her resume on the given E-mail address. When she went back home, she saw her mother talking to Vishwas on laptop, who lives in US. They were discussing about blog written by him. She received a prepaid package from myntra.com, for which she has placed an order. Neeru likes to login in Yahoo! messenger to talk to her friends and is a member of various groups over Internet.
Answer the following questions.
(i) Give the meaning of E-mail address.
(ii) Name the service with the help of which Neeru's mother talked with Viswas.
(iii) Here is a term myntra.com. What is this?
(iv) Neeru is using Yahoo! Messenger to talk with her friends. Give any one advantage of using it.