Write a formular to find the sum of numbers in cell A1, A2 and A3
=A1+A2+A3
What is network security?
Measures and practices to protect computer networks from threats.
Define Online banking
Managing bank accounts using the internet.
Define emerging technology
New technologies or ideas that are still under development and can change the world
Tag to create a table
<table></table>
What is the difference between formula and function?
Formula is user defined, function is pre built
Meaning of CIA in network security
Confidentiality, Integrity and Availability
Mention 3 reasons for cloud storage
Accessible, Scalable, auto backups, Access anywhere, share files, save space, collaborate
List 5 examples of emerging technology
AR, VR, HUMANOID ROBOTS, SELF DRIVING CARS, CRISPR Gene EDITING, NEURALINK, AI,
Tag for a table row
tr
Mention the process involved in search engines
Indexing, Crawling and Ranking
Mention 2 risks of using the internet.
Privacy issues, Online scams or frauds, Misinformation,
Mention 5 terms used in online banking
Deposit, Withdraw, Transfer, Gateway Payment, Credit/Debit Card, Account number, Transaction
Describe Neuralink
Brain computer interface. Human control the computer by just thinking.
tag for a table header
th
What is indexing in search engines?
Indexing is storing and organizing content from websites.
Mention 2 safety measures of securing a network aside from use of password
Authentication, Anti-Malware
4 disadvantages of using cloud storage
Needs internet, cost, security risk, privacy issues
Mention 4 functions of an OS
Managing hardware resources, managing files and folders, User interface, running applications, multitasking
tag to add a border to a table
<table border="1">
What is crawling in search engine?
Crawling in a search engine is the process where automated programs called web crawlers or spiders go through websites on the internet to discover and collect information about their content.
What is Trojan Horse?
A Trojan Horse is a type of malicious software (malware) that disguises itself as a harmless or useful program to trick users into installing it. Once installed, it can secretly perform harmful actions on the computer, such as stealing personal information, giving hackers access to the system, or damaging files.
2 examples of cloud storage platforms
icloud, google drive, one Drive, Dropbox, Mega
Mention 2 challenges of using VR in the classroom.
Distractions, illness, strains, expensive
Html code to create this table
_________________
|firstname|lastname|
<table>
<tr>
<td>firstname</td>
<td>lastname</td>
</tr>
</table>