Typography Assignment

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

TYPOGRAPHY

ASSIGNMENT
Question 1.:-What do you understand by search engines? What are they used for? Name
any five search Engines.

A Search engine can be defined as a tool to search these disorganized sources of information
available on the Internet. Using a search engine is pretty simple. Just type in the data to be searched,
the space provided at the search engine’s current page, and click search. The result will be displayed
with information corresponding to the search in the form of a list of web-sites that match that word or
phrase. A search engine is a critical tool in finding information, products and businesses on the web.
Five search engines are :-
Google
Rediff
Yahoo
Lycos
Indiatimes
Question 2:- What are the advantages and Limitations of email?

Answer 2:- The following are the advantages of e-mail:


1. Saves paper and is easy to edit.
2. Transmits messages faster than normal communication mediums such, as speed post and courier.
3. Allows us to send and receive messages at our comfort and convenience, i.e. We need not go to buy stamps and
envelopes and then post the letter in the post office.
4. Enables us to transmit a single e-mail to multiple user simultaneously.
5. Provides the mailbox, where we can store our e-mail messages, and delete them, if required, at our convenience
The following are the limitations of e-mail:
1. Requires hardware such as a computer and a network connection device.
2. Changes the message of the sent e-mail according to the operating system used.
3. If we make any mistake, such as sending an e-mail to a wrong recipient, it may be too late to do anything.
4. Lacks the ability to express emotions and feelings.
Question 3.:- Explain following terms
1. e-commerce
2. Online shopping
3. Social Networking

Answer3:- 1.A broad definition of e-commerce is: “The marketing, promoting, buying & selling of goods
electronically, particularly via the Internet”. A narrower definition is “the trading of goods and services in which the
final order is placed over the Internet”. In fact E-Commerce is the subset of E-Business.
2. Online shopping: Refers to the activity of purchasing from different websites on the Internet

3. Social networking: Refers to a convenient method of getting to know people whose interests, opinions, and likes
and dislikes are quite similar to ours and develop friendship with them on the Internet
Question 4.:- What are different components of email address?

Answer4:-. The components of an e-mail address are as follows:


1. User: It is the username or e-mail ID, say any nickname, alias, group or department of any organization. It is
used to identify the user at the e-mail service provider.
2. Divider: The @ (pronounced as ‘at’ or at the rate of) symbol is used as the divider in the e-mail address, which
differentiates between the username and the domain name. It is compulsorily required in all the e-mail addresses.
3. Domain Name: A domain name shows the website name in which the e-mail account has been created.
Question 6.:- List some tips for writing a good email message.

All e-mail systems have a Spam filter, which filters out all the spam e-mails and sends them to the Junk E-mail folder instead of
Inbox. Therefore, to avoid sending your message to the Spam folder, make sure you use a good subject for your message. Avoid
using single words, like Hi, Thanks, etc. And write the complete sentence. The subject of a message should be meaningful,
which can tell the receiver the actual purpose of the e-mail.
Avoid writing lengthy messages. Your message should be such that it is conveyed to the receiver sensibly. Therefore, make it
very simple and short.
1. Never use the abridged format of the language as you use for SMS, that is, avoid using short forms and write the words in
full. You need to take care of the casing also. The message should be in the sentence case only.
2. For formal e-mails, follow the style of the formal letters as you do for the manual letters. Always start with Sir/Madam or
the first name in the greeting. On the other hand, with informal e-mails or for the casual ones like if you are sending an e-
mail to your friend, you can use the casual writing style with emoticons,
3. Always provide your full name in the e-mail so that a new person can easily recognise you. This is necessary if your e-mail
address is not telling about your identity. O Make a habit of reading your typed e-mail before clicking on the Send button.
This will give you an opportunity to correct any spelling mistake that you might have done or missed some information.
Question 7.:- State the various ways to protect your system against viruses.

Answer7.:- Since the viruses are made faster than the vaccines, it is a good practice to follow some simple precautionary measures, which can reduce the possibility of virus attack. These are as under:

Use updated anti-virus program.

Do not copy pirated software on your computer.

Use the legal software from the reliable sources only.

Do not download suspicious shareware programs.

Use a secure operating system.

Avoid letting the system to be used by unauthorized users.

Allow you to schedule scans to automatically run for you.

Scan the computer using Virus Scanner while booting up the system.

Avoid loading of games that are passed as freeware.

Proper backup of all data and program files should be kept.

Remove suspicious and unnecessary files.

Make system files “Read only”.

Use vaccines and immunization programs to immunize computer against virus infection.

Always protect your password.

Keep windows updated.

Use the scanned USB drives.


Answer 8.:- Anti-virus software is a program which is designed to search, detect, prevent and remove software viruses, and other malicious software
like Trojans, worms etc.If the computer system gets infected, despite all possible efforts, then in such cases the virus vaccines assist you to come out of
such difficult
There are so many anti-viruses available in the market. One can choose any one of them on the basis of their characteristics:
Norton Anti-Virus
McAfee
Kaspersky
Webroot
ymantec (Norton)
AVG
Microsoft Security Essentials
Quick Heal
EScan
Question 9:-Differentiate between Computer Virus and Biological Virus

Computer virus is an electronic virus and Biological Viruses (Human Virus) are tiny genetic
codes DNA or RNA that take over the machinery of a living cell and are capable of making
thousands of replicas of the original virus. Like biological virus, the computer virus carries
in it an instructional code that makes copies of itself. In computer, the virus takes temporary
control of the disk operating system and when it comes in contact with an uninfected
computer, the virus passes onto the uninfected computer also.
It is assumed that Biological viruses and Computer viruses are the same entity, because both
cause infection and damage to their host/target. Although some of their features &
characteristics are same but they are quite different from each other.
Question10:- Write full forms

■ FTP = file transfer protocol


■ URL= Uniform Resource Locator.
■ TCP= Transmission Control Protocol
■ C2C= Consumer to Consumer
■ B2B= Business to Business
■ C2B = Consumer to Business
■ APK= Android Application Package
■ HTML= hypertext markup language
■ VIRUS = Vital Information Resources Under Siege.
■ JPG= Joint Photographic Experts Group
■ PDF= portable document format
Question 11:- What are the common symptoms of a virus attack.

A computer virus is a software program attached to a legitimate program that is destructive in nature and infects
other programs in the system by replicating and attaching itself to other healthy programs. These harm the
computer in many ways such as:
 Corrupt and delete the data or files.
 Effect the functionality of software applications.
 Effect the Hard Disk by erasing everything.
 Use e-mail to infect the other computers.
 The processing of the computer is also affected.
 The virus also spread through the files downloaded on Internet.
 The virus cannot infect write protected disks or written documents, already compressed file and computer
hardware, it only infects software.
THANKS FOR WATCHING

You might also like