SlideShare a Scribd company logo
1 of 8
SOCIETY, LAW AND ETHICS
CLASS XII PYTHON
IDENTITY THEFT
Identity Theft
यह तब होता है जब कोई व्यक्तत हमारी पहचान या व्यक्ततगत जानकारी
जैसे कक हमारा नाम, हमारा लाइसेंस, या हमारी अद्वितीय संख्या को बबना
अपराध या धोखाधडी की अनुमतत के चुराता है।
Meaning in Hindi
It occurs when someone steal our identity or personal information such
as our name, our license, or our Unique number without our permission
to commit a crime or fraud.
most common ways identity thieves get hold of our data:
1. Data Breaches: A data breach happens when someone gains access to an
organization's data without authorization.
एक डेटा ब्रीच तब होता है जब कोई प्राधिकरण के बबना ककसी संगठन के डेटा तक पहंच
प्राप्त करता है
2. Unsecure Browsing: if you share any information on an unsecure website
or a website that's been compromised by hackers you could be putting
your sensitive information directly in the hands of a thief.
यदि आप ककसी असरक्षित वेबसाइट या हैकसस द्वारा समझौता की गई वेबसाइट पर
कोई भी जानकारी साझा करते हैं, तो आप सीिे चोर के हाथों में अपनी संवेिनशील
जानकारी डाल सकते हैं।
most common ways identity thieves get hold of our data:
3. Dark Web Marketplaces: The dark web is often where your personally
identifying information ends up after it's been stolen. Hackers may not
necessarily be stealing your information to use it for themselves, but
will instead choose to sell it to others
डाकस वेब अक्सर वह जगह होती है जहां आपकी व्यक्क्तगत पहचान की जानकारी
चोरी होने के बाि समाप्त हो जाती है। हैकसस जरूरी नहीं कक आपकी जानकारी को
अपने ललए इस्तेमाल करने के ललए चरा रहे हों, बक्कक इसे िूसरों को बेचना पसंि
करेंगे।
4. Malware Activity: Malware is malicious software that's designed to steal
your data or spy on your computer activity without you knowing.
मैलवेयर एक िभासवनापूणस सॉफ़्टवेयर है क्जसे आपके कं प्यूटर गततववधि पर आपके
डेटा या जासूसी को चोरी करने के ललए डडजाइन ककया गया है, क्जसे आप जाने बबना।
most common ways identity thieves get hold of our data:
5. Credit Card Theft: One of the simplest forms of identity theft is credit card
theft. If a thief can gain access to your credit card information, they can
use it to make unauthorized purchases.
पहचान की चोरी के सबसे सरल रूपों में से एक क्रे डडट काडस चोरी है। यदि कोई चोर आपके
क्रे डडट काडस की जानकारी तक पहंच प्राप्त कर सकता है, तो वे इसका उपयोग अनधिकृ त
खरीिारी करने के ललए कर सकते हैं
6. Phishing and Spam Attacks: Some scammers use email and text
messages and other forms of electronic communication to steal your
sensitive information. The message often looks like it's coming from a
reputable source and asks victims to give up one or more types of
information.
कछ स्कै मर आपकी संवेिनशील जानकारी को चराने के ललए ईमेल और पाठ संिेश और
इलेक्रॉतनक संचार के अन्य रूपों का उपयोग करते हैं। संिेश अक्सर ऐसा लगता है जैसे
यह एक सम्मातनत स्रोत से आ रहा है और पीड़ितों को एक या अधिक प्रकार की
जानकारी िेने के ललए कहता है।
How to protect identity online:
1. Protect your computer and smartphone with strong, up-to-date security
software.
अपने कं प्यूटर और स्माटसफोन को मजबूत, अप-टू-डेट सरिा सॉफ़्टवेयर के साथ सरक्षित
रखें।
2. Learn to spot spam and scams.
स्पैम और घोटाले िेखना सीखें।
3. Use strong passwords
मजबूत पासवडस का उपयोग करें
4. Freeze your credit
अपने क्रे डडट को फ्रीज करें
5. Only use reputable websites when making purchases
खरीिारी करते समय के वल सम्मातनत वेबसाइटों का उपयोग करें
Biometrics
Biometrics are physical or behavioral human characteristics to that can be used
to digitally identify a person to grant access to systems, devices or data.
Types of biometrics
Fingerprints
Photo and video
Facial recognition
Voice
Signature
DNA
बॉयोमीदरक्स भौततक या व्यवहार संबंिी मानवीय ववशेषताएं हैं क्जनका उपयोग ककसी
व्यक्क्त को लसस्टम, डडवाइस या डेटा तक पहंच प्रिान करने के ललए डडक्जटल रूप से पहचान
करने के ललए ककया जा सकता है।
Unique ID
It is a numeric or alphanumeric string that is associated with a single entity
within a given system. UIDs make it possible to address that entity, so that it can
be accessed and interacted with.
यह एक संख्यात्मक या अकफान्यूमेररक क्स्रंग है जो ककसी दिए गए लसस्टम के भीतर एकल
इकाई से ज़िा होता है। यूआईडी उस इकाई को संबोधित करना संभव बनाता है, ताकक इसे
एक्सेस ककया जा सके और इसके साथ बातचीत की जा सके ।

More Related Content

What's hot

Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
SIKKIM SCIENCE PROJECT
SIKKIM SCIENCE PROJECTSIKKIM SCIENCE PROJECT
SIKKIM SCIENCE PROJECTYuvalbeats
 
Comparison between delhi and sikkim
Comparison between delhi and sikkimComparison between delhi and sikkim
Comparison between delhi and sikkimDevenverma5
 
CYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURCYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURDr. Sushma H.B
 
Sikkim project | Project on Sikkim | Sikkim ppt | PowerPoint presentation
Sikkim project | Project on Sikkim | Sikkim ppt | PowerPoint presentationSikkim project | Project on Sikkim | Sikkim ppt | PowerPoint presentation
Sikkim project | Project on Sikkim | Sikkim ppt | PowerPoint presentationNarenderKushwaha
 
Geography of Bihar by Eithasab Ahmed
Geography of Bihar by Eithasab AhmedGeography of Bihar by Eithasab Ahmed
Geography of Bihar by Eithasab AhmedPonnuru Varun
 
ppt on bihar
ppt on biharppt on bihar
ppt on biharRahul Raj
 
Resources Of Odisha And Maharashtra | Art Integrated Project | Social Science...
Resources Of Odisha And Maharashtra | Art Integrated Project | Social Science...Resources Of Odisha And Maharashtra | Art Integrated Project | Social Science...
Resources Of Odisha And Maharashtra | Art Integrated Project | Social Science...PritamPriyambadSahoo
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 

What's hot (20)

Ladakh
LadakhLadakh
Ladakh
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
SIKKIM SCIENCE PROJECT
SIKKIM SCIENCE PROJECTSIKKIM SCIENCE PROJECT
SIKKIM SCIENCE PROJECT
 
Comparison between delhi and sikkim
Comparison between delhi and sikkimComparison between delhi and sikkim
Comparison between delhi and sikkim
 
CYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURCYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOUR
 
Sikkim project | Project on Sikkim | Sikkim ppt | PowerPoint presentation
Sikkim project | Project on Sikkim | Sikkim ppt | PowerPoint presentationSikkim project | Project on Sikkim | Sikkim ppt | PowerPoint presentation
Sikkim project | Project on Sikkim | Sikkim ppt | PowerPoint presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Geography of Bihar by Eithasab Ahmed
Geography of Bihar by Eithasab AhmedGeography of Bihar by Eithasab Ahmed
Geography of Bihar by Eithasab Ahmed
 
ppt on bihar
ppt on biharppt on bihar
ppt on bihar
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Resources Of Odisha And Maharashtra | Art Integrated Project | Social Science...
Resources Of Odisha And Maharashtra | Art Integrated Project | Social Science...Resources Of Odisha And Maharashtra | Art Integrated Project | Social Science...
Resources Of Odisha And Maharashtra | Art Integrated Project | Social Science...
 
Bihar
BiharBihar
Bihar
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Sikkim
SikkimSikkim
Sikkim
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 

More from vikram mahendra

Python Project On Cosmetic Shop system
Python Project On Cosmetic Shop systemPython Project On Cosmetic Shop system
Python Project On Cosmetic Shop systemvikram mahendra
 
Python Project on Computer Shop
Python Project on Computer ShopPython Project on Computer Shop
Python Project on Computer Shopvikram mahendra
 
PYTHON PROJECT ON CARSHOP SYSTEM
PYTHON PROJECT ON CARSHOP SYSTEMPYTHON PROJECT ON CARSHOP SYSTEM
PYTHON PROJECT ON CARSHOP SYSTEMvikram mahendra
 
BOOK SHOP SYSTEM Project in Python
BOOK SHOP SYSTEM Project in PythonBOOK SHOP SYSTEM Project in Python
BOOK SHOP SYSTEM Project in Pythonvikram mahendra
 
FLOW OF CONTROL-NESTED IFS IN PYTHON
FLOW OF CONTROL-NESTED IFS IN PYTHONFLOW OF CONTROL-NESTED IFS IN PYTHON
FLOW OF CONTROL-NESTED IFS IN PYTHONvikram mahendra
 
FLOWOFCONTROL-IF..ELSE PYTHON
FLOWOFCONTROL-IF..ELSE PYTHONFLOWOFCONTROL-IF..ELSE PYTHON
FLOWOFCONTROL-IF..ELSE PYTHONvikram mahendra
 
FLOW OF CONTROL-INTRO PYTHON
FLOW OF CONTROL-INTRO PYTHONFLOW OF CONTROL-INTRO PYTHON
FLOW OF CONTROL-INTRO PYTHONvikram mahendra
 
OPERATOR IN PYTHON-PART1
OPERATOR IN PYTHON-PART1OPERATOR IN PYTHON-PART1
OPERATOR IN PYTHON-PART1vikram mahendra
 
OPERATOR IN PYTHON-PART2
OPERATOR IN PYTHON-PART2OPERATOR IN PYTHON-PART2
OPERATOR IN PYTHON-PART2vikram mahendra
 
USE OF PRINT IN PYTHON PART 2
USE OF PRINT IN PYTHON PART 2USE OF PRINT IN PYTHON PART 2
USE OF PRINT IN PYTHON PART 2vikram mahendra
 
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]vikram mahendra
 
USER DEFINE FUNCTIONS IN PYTHON
USER DEFINE FUNCTIONS IN PYTHONUSER DEFINE FUNCTIONS IN PYTHON
USER DEFINE FUNCTIONS IN PYTHONvikram mahendra
 
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
FUNCTIONS IN PYTHON[RANDOM FUNCTION]FUNCTIONS IN PYTHON[RANDOM FUNCTION]
FUNCTIONS IN PYTHON[RANDOM FUNCTION]vikram mahendra
 
INTRODUCTION TO FUNCTIONS IN PYTHON
INTRODUCTION TO FUNCTIONS IN PYTHONINTRODUCTION TO FUNCTIONS IN PYTHON
INTRODUCTION TO FUNCTIONS IN PYTHONvikram mahendra
 

More from vikram mahendra (20)

Communication skill
Communication skillCommunication skill
Communication skill
 
Python Project On Cosmetic Shop system
Python Project On Cosmetic Shop systemPython Project On Cosmetic Shop system
Python Project On Cosmetic Shop system
 
Python Project on Computer Shop
Python Project on Computer ShopPython Project on Computer Shop
Python Project on Computer Shop
 
PYTHON PROJECT ON CARSHOP SYSTEM
PYTHON PROJECT ON CARSHOP SYSTEMPYTHON PROJECT ON CARSHOP SYSTEM
PYTHON PROJECT ON CARSHOP SYSTEM
 
BOOK SHOP SYSTEM Project in Python
BOOK SHOP SYSTEM Project in PythonBOOK SHOP SYSTEM Project in Python
BOOK SHOP SYSTEM Project in Python
 
FLOW OF CONTROL-NESTED IFS IN PYTHON
FLOW OF CONTROL-NESTED IFS IN PYTHONFLOW OF CONTROL-NESTED IFS IN PYTHON
FLOW OF CONTROL-NESTED IFS IN PYTHON
 
FLOWOFCONTROL-IF..ELSE PYTHON
FLOWOFCONTROL-IF..ELSE PYTHONFLOWOFCONTROL-IF..ELSE PYTHON
FLOWOFCONTROL-IF..ELSE PYTHON
 
FLOW OF CONTROL-INTRO PYTHON
FLOW OF CONTROL-INTRO PYTHONFLOW OF CONTROL-INTRO PYTHON
FLOW OF CONTROL-INTRO PYTHON
 
OPERATOR IN PYTHON-PART1
OPERATOR IN PYTHON-PART1OPERATOR IN PYTHON-PART1
OPERATOR IN PYTHON-PART1
 
OPERATOR IN PYTHON-PART2
OPERATOR IN PYTHON-PART2OPERATOR IN PYTHON-PART2
OPERATOR IN PYTHON-PART2
 
USE OF PRINT IN PYTHON PART 2
USE OF PRINT IN PYTHON PART 2USE OF PRINT IN PYTHON PART 2
USE OF PRINT IN PYTHON PART 2
 
DATA TYPE IN PYTHON
DATA TYPE IN PYTHONDATA TYPE IN PYTHON
DATA TYPE IN PYTHON
 
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
 
USER DEFINE FUNCTIONS IN PYTHON
USER DEFINE FUNCTIONS IN PYTHONUSER DEFINE FUNCTIONS IN PYTHON
USER DEFINE FUNCTIONS IN PYTHON
 
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
FUNCTIONS IN PYTHON[RANDOM FUNCTION]FUNCTIONS IN PYTHON[RANDOM FUNCTION]
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
 
INTRODUCTION TO FUNCTIONS IN PYTHON
INTRODUCTION TO FUNCTIONS IN PYTHONINTRODUCTION TO FUNCTIONS IN PYTHON
INTRODUCTION TO FUNCTIONS IN PYTHON
 
Python Introduction
Python IntroductionPython Introduction
Python Introduction
 
GREEN SKILL[PART-2]
GREEN SKILL[PART-2]GREEN SKILL[PART-2]
GREEN SKILL[PART-2]
 
GREEN SKILLS[PART-1]
GREEN SKILLS[PART-1]GREEN SKILLS[PART-1]
GREEN SKILLS[PART-1]
 
Dictionary in python
Dictionary in pythonDictionary in python
Dictionary in python
 

Recently uploaded

knowledge and curriculum Syllabus for B.Ed
knowledge and curriculum Syllabus for B.Edknowledge and curriculum Syllabus for B.Ed
knowledge and curriculum Syllabus for B.Edsadabaharkahaniyan
 
बाल साहित्य: इसकी प्रमुख विशेषताएँ क्या हैं?
बाल साहित्य: इसकी प्रमुख विशेषताएँ क्या हैं?बाल साहित्य: इसकी प्रमुख विशेषताएँ क्या हैं?
बाल साहित्य: इसकी प्रमुख विशेषताएँ क्या हैं?Dr. Mulla Adam Ali
 
ali garh movement part2.pptx THIS movement by sir syed ahmad khan who started...
ali garh movement part2.pptx THIS movement by sir syed ahmad khan who started...ali garh movement part2.pptx THIS movement by sir syed ahmad khan who started...
ali garh movement part2.pptx THIS movement by sir syed ahmad khan who started...lodhisaajjda
 
Email Marketing Kya Hai aur benefits of email marketing
Email Marketing Kya Hai aur benefits of email marketingEmail Marketing Kya Hai aur benefits of email marketing
Email Marketing Kya Hai aur benefits of email marketingDigital Azadi
 
Kabir Ke 10 Dohe in Hindi with meaning
Kabir Ke 10 Dohe in Hindi with meaningKabir Ke 10 Dohe in Hindi with meaning
Kabir Ke 10 Dohe in Hindi with meaningDr. Mulla Adam Ali
 
2011 Census of India - complete information.pptx
2011 Census of India - complete information.pptx2011 Census of India - complete information.pptx
2011 Census of India - complete information.pptxRAHULSIRreasoningvlo
 

Recently uploaded (6)

knowledge and curriculum Syllabus for B.Ed
knowledge and curriculum Syllabus for B.Edknowledge and curriculum Syllabus for B.Ed
knowledge and curriculum Syllabus for B.Ed
 
बाल साहित्य: इसकी प्रमुख विशेषताएँ क्या हैं?
बाल साहित्य: इसकी प्रमुख विशेषताएँ क्या हैं?बाल साहित्य: इसकी प्रमुख विशेषताएँ क्या हैं?
बाल साहित्य: इसकी प्रमुख विशेषताएँ क्या हैं?
 
ali garh movement part2.pptx THIS movement by sir syed ahmad khan who started...
ali garh movement part2.pptx THIS movement by sir syed ahmad khan who started...ali garh movement part2.pptx THIS movement by sir syed ahmad khan who started...
ali garh movement part2.pptx THIS movement by sir syed ahmad khan who started...
 
Email Marketing Kya Hai aur benefits of email marketing
Email Marketing Kya Hai aur benefits of email marketingEmail Marketing Kya Hai aur benefits of email marketing
Email Marketing Kya Hai aur benefits of email marketing
 
Kabir Ke 10 Dohe in Hindi with meaning
Kabir Ke 10 Dohe in Hindi with meaningKabir Ke 10 Dohe in Hindi with meaning
Kabir Ke 10 Dohe in Hindi with meaning
 
2011 Census of India - complete information.pptx
2011 Census of India - complete information.pptx2011 Census of India - complete information.pptx
2011 Census of India - complete information.pptx
 

Society, law and ethics identitytheft

  • 1. SOCIETY, LAW AND ETHICS CLASS XII PYTHON IDENTITY THEFT
  • 2. Identity Theft यह तब होता है जब कोई व्यक्तत हमारी पहचान या व्यक्ततगत जानकारी जैसे कक हमारा नाम, हमारा लाइसेंस, या हमारी अद्वितीय संख्या को बबना अपराध या धोखाधडी की अनुमतत के चुराता है। Meaning in Hindi It occurs when someone steal our identity or personal information such as our name, our license, or our Unique number without our permission to commit a crime or fraud.
  • 3. most common ways identity thieves get hold of our data: 1. Data Breaches: A data breach happens when someone gains access to an organization's data without authorization. एक डेटा ब्रीच तब होता है जब कोई प्राधिकरण के बबना ककसी संगठन के डेटा तक पहंच प्राप्त करता है 2. Unsecure Browsing: if you share any information on an unsecure website or a website that's been compromised by hackers you could be putting your sensitive information directly in the hands of a thief. यदि आप ककसी असरक्षित वेबसाइट या हैकसस द्वारा समझौता की गई वेबसाइट पर कोई भी जानकारी साझा करते हैं, तो आप सीिे चोर के हाथों में अपनी संवेिनशील जानकारी डाल सकते हैं।
  • 4. most common ways identity thieves get hold of our data: 3. Dark Web Marketplaces: The dark web is often where your personally identifying information ends up after it's been stolen. Hackers may not necessarily be stealing your information to use it for themselves, but will instead choose to sell it to others डाकस वेब अक्सर वह जगह होती है जहां आपकी व्यक्क्तगत पहचान की जानकारी चोरी होने के बाि समाप्त हो जाती है। हैकसस जरूरी नहीं कक आपकी जानकारी को अपने ललए इस्तेमाल करने के ललए चरा रहे हों, बक्कक इसे िूसरों को बेचना पसंि करेंगे। 4. Malware Activity: Malware is malicious software that's designed to steal your data or spy on your computer activity without you knowing. मैलवेयर एक िभासवनापूणस सॉफ़्टवेयर है क्जसे आपके कं प्यूटर गततववधि पर आपके डेटा या जासूसी को चोरी करने के ललए डडजाइन ककया गया है, क्जसे आप जाने बबना।
  • 5. most common ways identity thieves get hold of our data: 5. Credit Card Theft: One of the simplest forms of identity theft is credit card theft. If a thief can gain access to your credit card information, they can use it to make unauthorized purchases. पहचान की चोरी के सबसे सरल रूपों में से एक क्रे डडट काडस चोरी है। यदि कोई चोर आपके क्रे डडट काडस की जानकारी तक पहंच प्राप्त कर सकता है, तो वे इसका उपयोग अनधिकृ त खरीिारी करने के ललए कर सकते हैं 6. Phishing and Spam Attacks: Some scammers use email and text messages and other forms of electronic communication to steal your sensitive information. The message often looks like it's coming from a reputable source and asks victims to give up one or more types of information. कछ स्कै मर आपकी संवेिनशील जानकारी को चराने के ललए ईमेल और पाठ संिेश और इलेक्रॉतनक संचार के अन्य रूपों का उपयोग करते हैं। संिेश अक्सर ऐसा लगता है जैसे यह एक सम्मातनत स्रोत से आ रहा है और पीड़ितों को एक या अधिक प्रकार की जानकारी िेने के ललए कहता है।
  • 6. How to protect identity online: 1. Protect your computer and smartphone with strong, up-to-date security software. अपने कं प्यूटर और स्माटसफोन को मजबूत, अप-टू-डेट सरिा सॉफ़्टवेयर के साथ सरक्षित रखें। 2. Learn to spot spam and scams. स्पैम और घोटाले िेखना सीखें। 3. Use strong passwords मजबूत पासवडस का उपयोग करें 4. Freeze your credit अपने क्रे डडट को फ्रीज करें 5. Only use reputable websites when making purchases खरीिारी करते समय के वल सम्मातनत वेबसाइटों का उपयोग करें
  • 7. Biometrics Biometrics are physical or behavioral human characteristics to that can be used to digitally identify a person to grant access to systems, devices or data. Types of biometrics Fingerprints Photo and video Facial recognition Voice Signature DNA बॉयोमीदरक्स भौततक या व्यवहार संबंिी मानवीय ववशेषताएं हैं क्जनका उपयोग ककसी व्यक्क्त को लसस्टम, डडवाइस या डेटा तक पहंच प्रिान करने के ललए डडक्जटल रूप से पहचान करने के ललए ककया जा सकता है।
  • 8. Unique ID It is a numeric or alphanumeric string that is associated with a single entity within a given system. UIDs make it possible to address that entity, so that it can be accessed and interacted with. यह एक संख्यात्मक या अकफान्यूमेररक क्स्रंग है जो ककसी दिए गए लसस्टम के भीतर एकल इकाई से ज़िा होता है। यूआईडी उस इकाई को संबोधित करना संभव बनाता है, ताकक इसे एक्सेस ककया जा सके और इसके साथ बातचीत की जा सके ।