0% found this document useful (0 votes)
7 views5 pages

Internet

Uploaded by

sewanti2
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
0% found this document useful (0 votes)
7 views5 pages

Internet

Uploaded by

sewanti2
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 5

Q1. Fill in the blanks.

1. _______ allows user to send instant messages back and forth to each other.

2. An _______ is a virtual meeting place for individuals who share the same interests.

3. _______ is a short form of malicious software.

4. A program that is secretly embedded on a computer system to steal, corrupt or destroy data
is known as _______.

5. _______ can be defined as a medium of delivering television content over an Internet


connection.

Answer:

1. Online Chatting

2. e-group

3. MALWARE

4. TROJANS

5. Internet TV

Q2. State True or False.

1. A worm attacks a computer by attaching itself to other files or computers.

2. A signature is a bit of personalised text which is inserted at the bottom of every mail.

3. Bcc stands for Blue Carbon Copy.

4. A file larger than 25 MB cannot be sent as an attachment.

5. E-learning is more expensive as compared to traditional ways of learning.

Answer:

1. False

2. True

3. False

4. True

5. False

Q3. Mr. Nanda wants to conduct a corporate meeting between all the branches of his company,
across the country. He wants to have a face-to-face conversation with all the Regional Managers.
Which Internet service should he use for this virtual meeting?
Answer: To conduct a corporate face-to-face meeting between all branches across the country by
video conferencing, exchanging video and audio at the same time on the internet. Video
conferencing is the best option to have face-to-face interaction in real-time.

Q4. Rohini wants to send the copy of an official mail to multiple recipients, she does not want to
let them know the other persons receiving the same mail. Which feature should she use for the
same?

Answer: To send the copy of an official mail to multiple recipients but do not let them know the
other person receiving the same mail by mentioning them on Bcc (blind carbon copy).

Q5. Write a short note on E-learning.

Answer: E-Learning means electronic learning. Learning with the use of technology that can help
people to learn anything, anywhere and anytime. It is less expensive than traditional learning, and it
can be used to train a large group of people at the same time in a more interactive and interesting
manner.

Q6. Define threat in terms of computer security. Explain any two security threats.

Answer: In terms of computer security, a threat can be described as a possible danger to security. A
threat can be either intentional or accidental. Two types of security threats are:

1. Spyware: It is a type of software that secretly collects information about an online user. It
monitors the surfing habits and web credentials of the user.

2. Viruses: It is a program that is secretly embedded or planted on a computer system to steal,


corrupt, or destroy data.

Q7. What do you understand by the term Netiquettes? Explain any two.

Answer: The term 'Netiquette' is a combination of two words; Net (Internet) and Etiquette (Good
Manners). It is defined as a special set of rules that govern the behavior of a user communicating
online. It simply means that we should adhere to the same standards of behavior online that we
follow in real life.

1. Include a subject line: Give a descriptive phrase in the subject line of the message header
that conveys the purpose of the message.

2. Respect others' privacy: Do not read or forward another person's mail without seeking their
permission.

Q8. Explain the use of e-mail address by giving some examples.

Answer: An email address allows us to send and receive messages anywhere around the world, in
real time. Every email account is associated with a unique email address, which means that no two
individuals in the world can have the same email address.
Example: anishjain@gmail.com, msdhoni@gmail.com, viratkh@hotmail.com

Q9. What is the use of signature in an e-mail?

Answer: The use of signature in an email is to recognize the sender by contact information or
personalized text.

Q10. Write a short note on Internet Radio.

Answer: Internet radio, it is an online radio service that is broadcasted over the internet on
dedicated radio servers worldwide. It is capable to broadcast graphics, text, and links with audio
without any broadcasting limitations.

Q11. Write any two advantages and disadvantages of the Internet.

Answer:

Advantages:

1. Facility to find information on almost every subject.

2. Facility to share information with many users simultaneously in an easy manner.

Disadvantages:

1. Hackers attack computer systems on a network for monetary gains.

2. Cyber crimes such as child abuse, forgery, phishing, etc. are growing day by day.

Q11. Write any two advantages and disadvantages of Internet.

Answer:

The advantages of Internet are:

1. Facility to find information on almost every subject.

2. Facility to share information with many users simultaneously in an easy manner.

The disadvantages of Internet are:

1. Hackers attack computer system on a network for monetary gains.

2. Cyber crimes such as child abuse, forgery, phishing, etc. are growing day by day.

Q12. What are the types of cybercrimes?

Answer: The types of cybercrimes are:

1. Hacking: Unauthorized access to computer systems or networks.


2. Phishing: Deceptive emails or websites to steal personal information.

3. Malware: Software designed to damage or gain unauthorized access to a computer.

4. Ransomware: Malware that encrypts data and demands a ransom for decryption.

5. Identity theft: Stealing personal information to commit fraud or other crimes.

6. Online harassment: Cyberbullying, cyberstalking, or online threats.

7. Data breaches: Unauthorized access or release of sensitive data.

8. Online fraud: Scams and fraudulent schemes on the internet.

Q13. Why do hackers attack computer systems?

Answer: Hackers attack computer systems on a network for monetary gains. They steal and transfer
money from various bank accounts to their own. Sometimes they are driven by criminal groups to
sabotage a network to destroy important data and create a large-scale network outage disrupting
business activities.

Q14. How has the Internet affected our lives?

Answer: The Internet has affected our lives in the following manner:

1. Powerful search engines, like Google, Yahoo etc., facilitate finding information on almost
every subject.

2. People can connect with each other in an easy and inexpensive way. Through social
networking and discussion boards, one can find persons who have similar interests. E-mail,
Skype, are just a few examples of service providers that bring the world closer.

3. A handful of online services enable people to carry out their tasks while sitting at home, such
as e-banking, e-reservation, e-shopping, etc.

4. The Internet provides the facility to share information with many users simultaneously in an
easy manner.

Q15. Mention any four internet services.

Answer: Four internet services are:

1. Email

2. Video Conferencing

3. Internet Radio

4. Internet TV

Q16. What is e-Learning?


Answer: e-Learning refers to learning with the use of technology that enables people to learn
anytime or anywhere. It is less expensive than traditional learning and can be used to impart training
to a large group of students at the same time, in an interactive and interesting manner.

Q17. What is the purpose of Social-networking?

Answer: The purpose of Social-networking is to build social networks, social relations among people
who share interests, activities, backgrounds, or real-life connections. Social networking can be done
for social purposes, business purposes, or both.

Q18. What are the advantages of Internet Radio over traditional radio broadcasting?

Answer: Internet Radio is an online radio service that is broadcasted over the internet on dedicated
radio servers. It is broadcasted in much the same way as traditional radio with regard to its
presentation and format.

Unlike traditional radio stations, which have a broadcasting limitation (typically up to 100 miles),
Internet radio has no limitation. It is capable of broadcasting graphics, text, and links with audio, thus
serving all the senses of the listeners. Some of the popular Internet radio services are Vividh Bharti,
Radio Mirchi, Pandora, etc.

Q19. Why is sharing of personal information on the Internet considered harmful?

Answer: Sharing of personal information on the Internet is considered harmful because as more and
more information gets placed online, there is an increased danger of hackers, impersonators, and
malicious interlopers mining our data in ways that undermine personal privacy. In some cases, our
data is outright stolen.

You might also like