Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
3 views6 pages

Chapter 9 - Introduction To Internet and Email

Uploaded by

Kamban Stores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views6 pages

Chapter 9 - Introduction To Internet and Email

Uploaded by

Kamban Stores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Chapter 9​ ​ ​ ​ ​ ​ Name: ________________________________

Introduction to Internet and Email​ Class: XI Section: _____​ Roll No: ____

1. Name the two important protocols for internet?

●​ TCP – Transmission Control Protocol


●​ IP – Internet Protocol

2. What is a network?

​ A network is a group of two or more computers or other electronic devices that are
interconnected for the purpose of exchanging data and sharing resources.

3. What is the role of ICANN?

●​ ICANN (Internet Corporation for Assigned Names and Numbers) administers


the domain name registration.
●​ It helps to avoid a name which is already registered.

4. What is a search engine?

​ A search engine is a software system that is designed to search for information on


the World Wide Web.
​ Eg. Google, Yahoo, Bing

5. What is a browser?

●​ A browser is used to access websites in the World Wide Web.


●​ It translates HTML documents of the website and allows to view it on the screen.
o​ Eg. Google Chrome, Mozilla Firefox, Internet Explorer

6. What are the components of URL addressing?

​ There are four components of URL addressing

●​ Protocol ​ ​ ​ ​
●​ Subdomain ​ ​ ​ ​
●​ Domain name​ ​ ​
●​ TLD (Top Level Domain)

7. What is a website?

●​ A website is a collection of webpages.


●​ For example, if there is a company that owns a website will have several webpages like
Home, About Us, Contact Us, Products, Services, FAQ’s, and others.
●​ The first page of the website is called a Home Page.

8. What is CC and BCC in an email?

CC – Carbon Copy
●​ CC field allows you to specify recipients who are not direct addressees.
BCC - Blind Carbon Copy
●​ BCC field is similar to CC, except the recipients are secret.

Class 11 | Computer Applications ​ ​ 1


9. What is a static webpage?

Static web pages directly run on the browser and do not require any server-side
application program and remains the same whenever it is visited is called Static Website.

10. What is a Dynamic webpage?

​ Dynamic webpage is the webpage of a dynamic website which runs on the


server-side application programs and displays the results.

11. What are the benefits of e-governance?

●​ Reduced corruption
●​ High transparency
●​ Increased convenience
●​ Reduction in overall cost.
●​ Expanded reach of government

12. What is Phishing?

●​ Phishing scams are fraudulent attempts by cybercriminals to obtain private


information.
●​ Phishing scams often email messages designed to appear as they are from original
sources.

PART - III

Short Answers

1. What is TCP/IP?

●​ TCP (Transmission Control Protocol) is used to transmit data via various types of
media.
●​ The IP (Internet Protocol) addressing system is used to keep track of the millions of
users.
●​ TCP/IP allows one computer to talk to another computer via the Internet through
compiling packets of data and sending them to the right location.

2. Write a note on Hotspot internet service.

●​ Hotspots are sites that offer Internet access over a wireless local area network
(WLAN) by way of a router that then connects to an Internet Service Provider.
●​ Hotspots utilize Wi-Fi technology, which allows electronic devices to connect to
the Internet or exchange data wirelessly through radio waves.
●​ Hotspots can be phone-based or free-standing, commercial or free to the public.

3. Differentiate Data Card and Dongles.

Dongle Data Card

It is a removable component used for It is a removable electronic card which is used


enabling extra security. for storing for data.

USB Dongles can be divided into Types of datacard are


• WiFi Dongles • Expansion Card
• BlueTooth Dongle • Memory Card or Flash Card
• Memory Dongle • Identification Card

2​ ​ Class 11 | Computer Applications


4. Write a note on two access methods of connecting to internet.

Indirect Access
●​ This is most common method used in home and office networks.
o​ The device e.g. computer connects to a network using Ethernet or Wi-Fi and
the network connects to the Internet using Asymmetric Digital Subscriber Line
ADSL
Direct Access
●​ This is most common method used when travelling.
o​ The device e.g. smart phone connects directly to the Internet using 3G/4G
mobile networks or public Wi-Fi

5. Differentiate browser and a search engine with suitable examples.

Browser Search Engine

A browser is an application software used to A search engine is a software system that is


access websites and webpages. It designed to search for information on the
translates HTML document of the webpage World Wide Web
all allows you to view it on the screen.

A browser is used to access the Internet To open a search engine, you need a browser.

Example: Example
• Google Chrome • Google
• Internet Explorer • Yahoo

6. Differentiate Website and Webpage.

Webpage Website

Consists of a single document displayed by A collection of multiple documents


a browser displayable by a browser

Shares a unique domain name Has its own unique domain name

Makes up a website Contains one or more webpages

7. What is the difference between static and dynamic web page.

Static Webpage Dynamic Webpage

The content and layout of a web page is fixed The content and layout may change during
run time

Static Web pages never use databases Databases is used to generate dynamic
content through queries

Static web pages directly run on the browser Dynamic web pages run on the server-side
and do not require any server-side application programs and displays the
application program results

Static Web pages are easy to develop Dynamic web page development requires
programming skills

Class 11 | Computer Applications ​ ​ 3


8. What are Advantages of email.

●​ Free delivery - Sending an e-mail is virtually free, outside the cost of Internet service.
There is no need to buy a postage stamp to send a letter.
●​ Global delivery - E-mail can be sent to nearly anywhere around the world, to any
country.
●​ Instant delivery - An e-mail can be instantly sent and received by the recipient over the
Internet.
●​ File attachment - An e-mail can include one or more file attachments, allowing a
person to send documents, pictures, or other files with an e-mail.
●​ Long-term storage - E-mails are stored electronically, which allows for storage and
archival over long periods of time.
●​ Environmentally friendly - Sending an e-mail does not require paper, cardboard, or
packing tape, conserving paper resources

PART - IV
Explain in Detail

1. Explain any five types of internet services.

Wireless
●​ Radio frequency bands are used in place of telephone or cable networks. One of the
greatest advantages of wireless Internet connections is the "always-on" connection that
can be accessed from any location that falls within network coverage.
●​ Wireless connections are made possible through the use of a modem, which picks up
Internet signals and sends them to other devices.

Mobile
●​ Many cell phone and smartphone providers offer voice plans with Internet access.
●​ Mobile Internet connections provide good speeds and allow you to access the Internet.

Hotspots
●​ Hotspots are sites that offer Internet access over a wireless local area network (WLAN)
by way of a router that then connects to an Internet service provider.
●​ Hotspots utilize Wi-Fi technology, which allows electronic devices to connect to the
Internet or exchange data wirelessly through radio waves.
●​ Hotspots can be phone-based or free-standing, commercial or free to the public.

Cable
●​ Cable Internet connection is a form of broadband access.
●​ Through use of a cable modem, users can access the Internet over cable TV lines.
●​ Cable modems can provide extremely fast access to the Internet.

Satellite
●​ In certain areas where broadband connection is not yet offered, a satellite Internet
option may be available.
●​ Similar to wireless access, satellite connection utilizes a modem.

2. Explain any five internet applications with suitable examples.

4​ ​ Class 11 | Computer Applications


1. Job search
●​ Nowadays, many people search for their jobs online using naukri.com, monster.com,
recuritmentindia.com etc as it is quicker.

2. Online Shopping
●​ The internet has also facilitated the introduction of a new market concept consisting of
virtual shops.
o​ Example: amazon.com

3. Stock market updates


●​ Selling or buying shares sitting on computer through internet. Several websites like
ndtvprofit.com, moneypore.com, provide information regarding investment

4. Travel
●​ One can use internet to gather information about various tourist place. It can be used
for booking Holiday tours.
o​ Example: goibibo.com, makemytrip.com, olacabs.com.

5. Video conferencing
●​ It enables direct face-to-face communication across networks via web cameras,
microphones, and other communication tools.
o​ Example: Skype

6. e –commerce
●​ e–commerce (electronic commerce or EC) is the buying and selling of goods and
services, or the transmitting of funds or data.
o​ Example: Flipkart, Snapdeal, Amazon India, Paytm.

7. Online payments
●​ The rising boom of online payments in India has given way too many new entrants in
the industry who are majorly wallet driven payment companies.
o​ Example: Paytm

3. Write a note on any five Internet browsers other than that given in the book.

1. Microsoft Edge

●​ It is the successor to the classic Internet Explorer browser and comes pre-installed on
all new on Windows 10 devices.
●​ This web browser also features built-in inking tools for taking screenshots of pages and
Cortana for looking up words and phrases.

2. Brave

●​ Brave is a web browser with a strong focus on privacy and security.


●​ By default, this internet browser blocks advertising, cookies, phishing, and malware and
provides you with advanced options for enabling HTTPS Everywhere and preventing
browser fingerprinting.

3. The Opera

●​ The Opera web browser launched on Windows in 1996 and is now available on Mac,
Linux, iOS, Android, and even Java phones.
●​ The desktop versions of Opera support a wide range of add-ons that bring extra
functionality to the browser beyond browsing the web.

Class 11 | Computer Applications ​ ​ 5


4. Vivaldi

●​ It is the brainchild of former Opera developers, and like Opera, it does things differently
from the big-name browsers. In this case, very differently.
●​ Vivaldi is all about customization, and you can tweak pretty much everything from the
way navigation works to how the user interface looks.

5. Avast Secure Browser

●​ Avast Secure Browser provides several built-in tools to protect your data and privacy.
●​ The Hack Check tool will determine if your info was leaked in a data breach.

4. Explain the do’s and don’ts of safe surfing on internet.

1. Don’t give out your personal information – Don’t put personal details such as your
home address, telephone numbers or parent’s work address online as cybercriminals can use
this information to create a fake profile with your details

2. What goes online, stays online – Use privacy settings to make sure only your
friends and family can see photos you post. Avoid posting holiday plans as criminals have been
known to track your movements

3. Check your security and privacy settings – Make sure your social network privacy
settings are secured so only your friends can see your personal information and use your
privacy settings to restrict who can see your posts, videos and photos

4. Password safety – Sharing your password with your parents is a sensible idea, but
avoid sharing your password with your friends, even if they promise they won’t tell anyone!
Also, when setting your password, make sure it isn’t something people may guess such as
your pet’s name. Use a mixture of letters, numbers and upper and lower-case characters

5. Always protect your mobile device – Make sure your mobile phone is pin-protected
so all your personal information stored on it is safe. Download a security app which allows you
to remotely wipe any personal data, should your mobile be lost or stolen

6. Don’t talk to strangers online or offline – Don’t meet up with strangers and let your
parents know if a stranger has tried to get in contact with you online.

7. Listen to the adults who know – Adults will always be worried about you. Help set
their mind at rest and avoid chatting online with strangers.

8. Be wary of unsecured or unknown websites – When shopping online, use


reputable and known retailers.

9. Be careful what links you click on – Avoid clicking links in an email, Instant
Message or on your social network unless you are sure the message is from someone you
know

6​ ​ Class 11 | Computer Applications

You might also like