CBSE Web Application and Security Class 10 Questions and Answers

web application and security class 10 questions and answers, web application and security class 10 questions and answers pdf, class 10 it chapters 9 question & answers

These Web Application and Security Class 10 Questions and Answers are very important for your board exam. These Web Application and Security Class 10 Questions and Answers are also necessary for you because in the board exam these types of questions are coming so it is very necessary for you to practice these types of questions.

Web Application and Security Class 10 Questions and Answers
Web Application and Security Class 10 Questions and Answers

If you want to revise this chapter very easily then read this Web Application and Security Class 10 Notes.

Web Application and Security Class 10 Questions and Answers

Multiple-Choice Questions (MCQs)

1. Which of the following is not available in the quick access utilities?

a. Magnifier

b. Narrator

C. On-screen Keyboard

d. Low Contrast

2. Which of the following is not a network topology?

a. Bus

b. Star

C. Comet

d. Ring

3. OSI stands for.

a. Open Systems Interconnection

b. Outer Systems Interconnection

C. Open Software Interconnection

d. Outdoor Systems Interconnection

4. How many layers are there in the OSI model?

a. 4

b. 5

C. 6

d. 7

5. URL stands for.

a. Uniform Resource Locator

b. Unified Resource Locator

C. Unanimous Resource Locator

d. Unique Resource Locator

6. A………….is a file that contains small textual information about the activity of a user over the Internet.

a. Cookie

b. URL

C. Browser

d. History

7. Vapors, fumes, and pesticides are the sources of ……. … hazards.

a. Physical

b. Biological

c. Chemical

d. Psychological

8. Which of the following is a collection of related Web pages linked to each other by hyperlinks?

a. Web server

b. Websites

C. Bookmark

d. Cache

ANSWERS

1. d.

2. C.

3. a.

4. d.

5. a

6. a

7. C.

8. b.

Very Short Answer Questions

1. Define World Wide Web.

Ans. The World Wide Web (or Internet) is a network of interconnected computers.

2. What is data transfer?

Ans. A data transfer mechanism can be anything that helps in moving data and information from one point to another.

3. What is the server?

Ans. A computer that is connected to the Internet all the time is called a server.

Also Read:- Database Management System Class 10 Questions and Answers

4. Define Web accessibility.

Ans. It refers to the phenomenon of designing and developing technologies, tools and web applications so that they can be easily used by people with disabilities.

5. What is networking?

Ans. The term ‘networking’ represents the processes involved in developing, designing, implementing, managing, and upgrading network technologies.

6. What do you mean by SerialKeys?

Ans. SerialKeys is an accessibility feature that is used to feed data into a computer instead of using the keyboard and mouse.

7. Define first aid.

Ans. First aid is the initial aid given to an injured or sick person to save his/her life before the arrival of specialized medical assistance.

8. What is an accident?

Ans. An accident is defined as a fortuneless event that happens unpredictably as well as unintentionally and may lead to harm and injury to people.

Short Answer Questions-l

1. List some benefits of networking.

Ans. Networking provides the following benefits to its users:

  • Communication
  • Data-sharing
  • Resource-sharing
  • Internet access-sharing
  • Data security
  • Performance enhancement

2. What are the basic components of a network?

Ans. A network usually comprises five basic components server, client, channels, operating system, and interface. Servers are powerful host computers that store data and execute applications. Clients are computers connected to the server that uses the network and shared resources. Channels are circuits or pathways connecting networks through which different interconnected computers share information. The network operating system is the operating system software on the server. Interface devices connect servers and clients.

3. Explain network types on the basis of component role.

Ans. On the basis of component role, networks are classified as:

  • Peer-to-peer Network: In this type of network, all the connected computers are equal, i.e., none of these is the sole in charge of the operations of the network. In other words, each computer maintains its information and can serve both as a server as well as a client whenever required.
  • Server-based Network: A dedicated server controls all the network operations and security. The dedicated server stores data, applications, and peripheral resources and makes them accessible to the clients.
  • Client-based Network: They employ the processing power of the client workstation to execute some functions locally and request further processing from the server.

4. Define network topology. What are the common network topologies?

Ans. Network topology refers to the basic geometric layout according to which the server and clients are connected via a channel. The three most common network topologies are bus, ring, and star.

5. List some applications of instant messaging.

Ans. Some applications of instant messaging are as follows:

  • Voice over IP or VolP services
  • Conferencing
  • Video Calls
  • Video Conferencing
  • Job Outsourcing

Check Out:- Database Management System Class 10 Notes Download

Short Answer Questions-ll

1. What are the different types of blogs available on the Internet?

Ans. The blogs can be of various types, some of which are as follows:

  • Personal Blogs: These blogs are developed by a user for his/her personal use. It is just like maintaining a personal diary online. It is generally created by an Individual and not by an organization. Generally, personal blogs are viewed by the immediate family members and friends of the blogger.
  • Corporate and Organizational Blogs: These blogs are created to generate business. These types of blogs are generally used by organizations, corporations, etc.
  • Genre Blogs: These blogs contain information, articles, and discussions related to a particular subject. Examples of genre blogs are art blogs, fashion blogs, music blogs, and political blogs.

2. List some reasons for using an offline blog editor.

Ans. Following are some compelling reasons for using an offline blog editor:

  • No Reliability on the Internet: You do not require an active Internet connection for writing web page content in an offline blog editor. Even if the Internet connection goes down or the server is temporarily suspended, you will not lose any work. Your blog post will be stored in your hard drive until you press the publish button in the editor.
  • Easily and Quickly Upload Videos and Images: With offline editors, you can easily and automatically publish images and videos by merely hitting the publish button.
  • Speed: An offline editor works on your computer system. Therefore, you can easily create web content without relying on an Internet connection. You require the Internet only for publishing the posts. The rest of the work can be quickly done offline.
  • Publish Multiple Blogs: With an offline editor, you can quickly publish multiple blogs at a time without logging in or out for every blog post.
  • Easy ‘Copy and Paste’ Support: An offline blog editor lets you copy and paste content from other programs without adding extra code or useless font size and typefaces.

3. Who are the different actors in an online transaction?

Ans. An online transaction involves many participants, which include the merchant, the customer, and the technology.

  • The merchant must have a merchant account to accept payments on his behalf. The customer requires a bank-approved credit card or debit card. Technology enables the transaction between the merchant and the customer.
  • The technology involves payment gateway software that establishes a link between the shopping cart of a merchant website and the processing network. It also involves a payment processor to move the transaction through the payment processing network, send a billing statement to the customer, and work with the bank account. Very often, the merchant bank takes the role of the payment processor.

4. List the steps involved in payment authorization and payment settlement.

Ans. The payment authorization process involves the following steps:

  • A customer purchases an item on a website using a debit card or credit card.
  • The payment information is received by the payment gateway which encrypts the received data to ensure privacy and forwards the same to the payment processing system.
  • The payment processor sends a payment request to the issuing bank of the customer to ensure the customer has enough credit in his account to pay for the bills.
  • The issuing bank responds with an approval or a denial accordingly. The payment processor forwards the answer back to you confirming the approval of the sale and informs the bank of the merchant to credit your account.
  • The entire authorization process executes in a few seconds. After authorization, the settlement process involves the following steps:
  1. The issuing bank of the cardholder transfers funds to the bank of the merchant which deposits the amount in the merchant’s bank account.
  2. Funds are available to the merchant and you are notified with a credit account confirmation message. Sometimes the settlement process may take a couple of days for effective completion and payment transfer. In some cases, the bank may retain a partial amount called reserve in case the customer returns purchased goods in the future.

Long Answer Questions

1. What are the challenges involved in networking?

Ans. Despite so many advantages, networking also involves some challenges and risks as listed below:

  • Setup Cost: Setting up a network involves investing in software and hardware equipment. The costs may seem inexpensive for a small network or a few computers but can overrun budgets in the case of large companies involving many computers and geographically dispersed offices.
  • Administration Cost: Networked computers require ongoing management and administration. Large companies often need to hire dedicated network administrator teams for managing large networks.
  • Undesirable Sharing: Sometimes people may share undesirable data, such as a virus that causes more harm than good. Mitigating the effects of such data involves high costs, more time, and great administrative efforts.
  • Undesirable Behavior: Sometimes the ease of sharing with networking allows people to misuse company resources by downloading illicit material. Some people encourage software piracy. Such misbehavior reduces productivity and serves as a distraction. Large organizations often implement explicit policies and strict monitoring to control such behavior, thereby further increasing management costs.
  • Data Security: A network that is not properly secured may put critical shared data at risk. Hackers may target and misuse insecure data with unauthorized access.

2. What role does an OSI model play in establishing network communication?

Ans. Communication and informative Open Systems

The interconnection (OS) reference model or the OSI model is used as a fundamental framework to classify and regulate the processes involved with communication and message exchange over the network. OSI provides a structured approach to developing a network. It represents the sequence of processes by which a message is transferred from one computer to another on a network. According to the OSI model, the services and functions of a network can be divided into discrete layers. Each layer provides some services to the upper layer. Changes in one layer do not require changes at another layer as long as the predefined inputs and outputs remain the same, The layers of the OSI model are vertically stacked on top of each one other.

Different hardware, software, and network protocols operate at different layers of the OSI model to transfer a message between devices. In this manner, each layer offers specific services defined by specific protocols. The lower layer provides services to the layer above it. The layers are interconnected via service access points (SAP).

For transferring a message between two systems, the corresponding layers in the respective protocol stacks establish a peer-to-peer relationship wherein a given layer of one system communicates with a counterpart layer of the other system. In this manner, the message and control information is transmitted from an upper sending layer to the lower receiving layer. The process continues up to the lowest layer of the stack. The lowest layer of the sender system transmits the data to the lowest layer of the receiving system which further passes the data through the upper layers until it is received by the counterpart of the sending layer.

3. Write a detailed note on instant messaging authentication.

Ans. To ensure security, instant messaging (IM) systems follow strict authentication. Authentication refers to the process of confirming and verifying the claimed identity of a user requesting a connection to the IM system. Authentication serves as a security mechanism to provide authorized access to the system. Furthermore, users are granted appropriate permissions for using specific IM system resources. This ensures that secure user information remains confidential.

The authentication process uses Single Sign-On (SSO) mechanism in which the user is authenticated only once and automatically logged in to the system. An IM system uses Secure Socket Layer (SSL) protocol to manage security concerns during message transmission. The protocol ensures safe communication and prevents tampering eavesdropping and message forgery. It authenticates the endpoints and transmits encrypted messages. 

Another protocol used by the IM systems to ensure strong authentication and precise encryption for private conversations is the Off-the-Record (OTR). It uses per-message encryption keys to secure message exchange. A common threat faced by IM environments is automatic sign-in to multiple accounts. To overcome this issue, IM systems employ the Completely Automated Public Turing test to tell Computers and Humans Apart or CAPTCHA. It is a challenge-response test to prompt the IM account user for entering the string of characters shown in the image displayed on the user screen.

4. Explain the rules and etiquette followed while chatting.

Ans. Some rules and etiquettes that need to be followed by anyone during chatting are as follows:

  • Begin chatting with formal greetings
  • Ensure that the message should be short and the idea is conveyed.
  • Ensure to match the communication style of the receivers, or else the receivers will lose their interest in chatting.
  • Give recipients time to respond.
  • Know about the abbreviation and shortcuts used in chatting such as COS is used for ‘because’ and KIT is used for “keep in touch.
  • Do not chat with strangers.
  • Be attentive during chatting with multiple persons last you might miss some important information.
  • Ensure that the person with whom you want to chat is not busy.
  • End chatting with a closing message.

5. What do you mean by hazard? Explain any three hazards at the workplace.

Ans. A hazard is defined as a potential source that causes harm to an individual. In an organization, there are several types of hazards that can harm the life and health of an employee or worker. Some common types of hazards at the workplace are as follows:

  • Biological Hazard: Refers to the hazard that includes viruses, bacteria, insects, animal and bird droppings, etc., which can cause an adverse impact on the health of employees. Common sources of biological hazards are mildew, blood, harmful plants, bodily fluids, sewage, dust, insect bites, etc.
  • Ergonomic Hazard: Refers to the hazard in which the working condition and environment, body posture, type of work, etc. put a strain on the body of an employee. The common sources of ergonomic hazards are bad sitting posture, repetitive and awkward movement, stretching the body, lifting heavy objects, etc.
  • Psychological Hazard: Refers to the hazard that affects or harms the employee mentally. The common sources Or psychological hazards are extra workloads, working shifts, harassment, violence at the workplace, work Stress, the partial judgment of seniors, lack of respect, Continuous low-level noise, etc.

Conclusion

With that, we come to the end of our Web Application and Security Class 10 Questions and Answers.

I hope that this blog post will help you to decide on the Web Application and Security Class 10 Questions and Answers. If you have any confusion related to this chapter, then comment below or send me a message our team will assist you and help you to remove confusion.

Thanks For Reading this Article.

You May Also Like:-

FAQs

1. Define World Wide Web.

Ans. The World Wide Web (or Internet) is a network of interconnected computers.

2. What is data transfer?

Ans. A data transfer mechanism can be anything that helps in moving data and information from one point to another.

3. How can I download the Web Application and Security Class 10 Notes PDF?

Ans. Click on the link and download Web Application and Security Class 10 Notes

Rate This Post

Rating of this Post 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

Leave a Comment