Internet
Internet
1. _______ allows user to send instant messages back and forth to each other.
2. An _______ is a virtual meeting place for individuals who share the same interests.
4. A program that is secretly embedded on a computer system to steal, corrupt or destroy data
is known as _______.
Answer:
1. Online Chatting
2. e-group
3. MALWARE
4. TROJANS
5. Internet TV
2. A signature is a bit of personalised text which is inserted at the bottom of every mail.
Answer:
1. False
2. True
3. False
4. True
5. False
Q3. Mr. Nanda wants to conduct a corporate meeting between all the branches of his company,
across the country. He wants to have a face-to-face conversation with all the Regional Managers.
Which Internet service should he use for this virtual meeting?
Answer: To conduct a corporate face-to-face meeting between all branches across the country by
video conferencing, exchanging video and audio at the same time on the internet. Video
conferencing is the best option to have face-to-face interaction in real-time.
Q4. Rohini wants to send the copy of an official mail to multiple recipients, she does not want to
let them know the other persons receiving the same mail. Which feature should she use for the
same?
Answer: To send the copy of an official mail to multiple recipients but do not let them know the
other person receiving the same mail by mentioning them on Bcc (blind carbon copy).
Answer: E-Learning means electronic learning. Learning with the use of technology that can help
people to learn anything, anywhere and anytime. It is less expensive than traditional learning, and it
can be used to train a large group of people at the same time in a more interactive and interesting
manner.
Q6. Define threat in terms of computer security. Explain any two security threats.
Answer: In terms of computer security, a threat can be described as a possible danger to security. A
threat can be either intentional or accidental. Two types of security threats are:
1. Spyware: It is a type of software that secretly collects information about an online user. It
monitors the surfing habits and web credentials of the user.
Q7. What do you understand by the term Netiquettes? Explain any two.
Answer: The term 'Netiquette' is a combination of two words; Net (Internet) and Etiquette (Good
Manners). It is defined as a special set of rules that govern the behavior of a user communicating
online. It simply means that we should adhere to the same standards of behavior online that we
follow in real life.
1. Include a subject line: Give a descriptive phrase in the subject line of the message header
that conveys the purpose of the message.
2. Respect others' privacy: Do not read or forward another person's mail without seeking their
permission.
Answer: An email address allows us to send and receive messages anywhere around the world, in
real time. Every email account is associated with a unique email address, which means that no two
individuals in the world can have the same email address.
Example: anishjain@gmail.com, msdhoni@gmail.com, viratkh@hotmail.com
Answer: The use of signature in an email is to recognize the sender by contact information or
personalized text.
Answer: Internet radio, it is an online radio service that is broadcasted over the internet on
dedicated radio servers worldwide. It is capable to broadcast graphics, text, and links with audio
without any broadcasting limitations.
Answer:
Advantages:
Disadvantages:
2. Cyber crimes such as child abuse, forgery, phishing, etc. are growing day by day.
Answer:
2. Cyber crimes such as child abuse, forgery, phishing, etc. are growing day by day.
4. Ransomware: Malware that encrypts data and demands a ransom for decryption.
Answer: Hackers attack computer systems on a network for monetary gains. They steal and transfer
money from various bank accounts to their own. Sometimes they are driven by criminal groups to
sabotage a network to destroy important data and create a large-scale network outage disrupting
business activities.
Answer: The Internet has affected our lives in the following manner:
1. Powerful search engines, like Google, Yahoo etc., facilitate finding information on almost
every subject.
2. People can connect with each other in an easy and inexpensive way. Through social
networking and discussion boards, one can find persons who have similar interests. E-mail,
Skype, are just a few examples of service providers that bring the world closer.
3. A handful of online services enable people to carry out their tasks while sitting at home, such
as e-banking, e-reservation, e-shopping, etc.
4. The Internet provides the facility to share information with many users simultaneously in an
easy manner.
1. Email
2. Video Conferencing
3. Internet Radio
4. Internet TV
Answer: The purpose of Social-networking is to build social networks, social relations among people
who share interests, activities, backgrounds, or real-life connections. Social networking can be done
for social purposes, business purposes, or both.
Q18. What are the advantages of Internet Radio over traditional radio broadcasting?
Answer: Internet Radio is an online radio service that is broadcasted over the internet on dedicated
radio servers. It is broadcasted in much the same way as traditional radio with regard to its
presentation and format.
Unlike traditional radio stations, which have a broadcasting limitation (typically up to 100 miles),
Internet radio has no limitation. It is capable of broadcasting graphics, text, and links with audio, thus
serving all the senses of the listeners. Some of the popular Internet radio services are Vividh Bharti,
Radio Mirchi, Pandora, etc.
Answer: Sharing of personal information on the Internet is considered harmful because as more and
more information gets placed online, there is an increased danger of hackers, impersonators, and
malicious interlopers mining our data in ways that undermine personal privacy. In some cases, our
data is outright stolen.