The document discusses various topics related to computer networks and the internet. It defines key terms like computer network, web server, internet, WWW, web browser, and describes different types of network architectures like peer-to-peer and client-server. It also discusses how data is transferred over a network and lists some common instant messaging software and online shopping/transaction websites.
The document discusses various topics related to computer networks and the internet. It defines key terms like computer network, web server, internet, WWW, web browser, and describes different types of network architectures like peer-to-peer and client-server. It also discusses how data is transferred over a network and lists some common instant messaging software and online shopping/transaction websites.
7. What is Web Server? A computer network is an Web Server is a computer that interconnected collection of stores web server software and a autonomous computers and devices to website’s component files. exchange information or share resources. 8. What are uses of a Computer 2. What are different network Network? architectures? i. Resource sharing : We can share i. Peer to peer (P2P): Network in hardware devices, softwares as well as which all computers have an equal data on a network. status are called peer to peer networks. ii. Communication Medium : Network Each computer can act as a server as can provide communication between well as a client. different computers attached to a ii. Client-Server: In this network there network. are specific Computers that share iii. Reduced Cost : Sharing of data ,softwares and hardware resources resources helps in reducing hardware (e.g. printers, modems etc.) called and software cost servers. Other computers that can iv. Centralized Control: We can request for some services from server centrally control the computers are called clients. attached to a network. 3. Explain different types of v. Central storage of data: We can computer Networks ? save data of entire network on single LAN WAN computer. It helps in removing 1. It stands for Local 1. It stands for Wide duplication of data as well as Area Network Area Network maintaining integrity of data. 2. It is a network 9. How to get access to the 2. It is a network across cities, Internet? within a small area countries and To get access to Internet we need such as building. continents. following: 3. Twisted pair cable 3. Optical fiber or ISP: ISP stands Internet Service is preferably used for satellite are used for Provider. It is an organization which communication. communication provides us access of Internet. For eg. 4. Example: 4. Example: Mobile BSNL, JIO, etc. Computer Lab phone network MODEM: MODEM stands for 4. What is Internet? Modulator/Demodulator. It is a device Internet stands for interconnected used to convert analog signal to digital networks. It is interconnection of signal and vice versa. It is basically computers all over the world. used to run internet on your 5. What is WWW? computer/device. WWW stands for World Wide web. It is 10. What are types of Internet a collection of protocols required for Connectivity? transmitting documents on internet. Types of Internet Connectivity can be 6. What is a Web Browser? divided into two categories: It is a software used to display web i. Wired Technology: pages and web sites. Examples of web Dial-up: It uses the telephone line to browsers are connect to a internet connection using a Microsoft Internet Explorer MODEM. User needs to dial a number to Mozilla Firefox get access to internet. They are very These packets are examined at slow. destination. If any packet is missing or DSL: DSL stands for Digital Subscriber damaged, a message is sent to source Line. It provides internet connectivity to resend the packet. This process by transmitting data over using wires of continues until all packets are local telephone network. We get wired completely received. telephone and Data Transmission on These packets are then combined to single telephone line. get original data. Cable Internet Access:– It is 14. What is Instant messaging? broadband Internet service provided It is a form of communication over the through existing cable TV networks. Internet in which users can send ii. Wireless Technology:– messages to each other in real time. 3G 3G stands for 3rd generation of Most instant messaging softwares allow Mobile communication.Its speed was text messages, audio chat, video calling upto 2Mbps. It provided high speed as well as sharing of desktops internet with support for sending and 15. List any five instant messaging receiving large e-mails , Video softwares. conferencing, 3D games and mobile TV. 1. Google Talk High-Speed Downlink Packet Access 2. Yahoo! Messenger (HSDPA) is a 3G protocol that allows 3. Skype higher data transfer rate. 4. Windows Live Messenger 11. What is WI FI? 5. Rediff Bol Wi Fi stands for Wireless Fidelity. It is 16. State any 03 rules and the wireless networking technology that etiquettes to be followed while uses radio waves to provide wireless chatting on the Internet. high-speed Internet and network i. Messages should be short . connections. 2. Always introduce yourself by name. 3. Always ask if the other person has 12. What is WiMax? time to chat. WiMax stands for Worldwide 4. In a business communication, you Interoperability for Microwave Access. should know exactly what you want to It represents fourth generation of discuss. wireless Internet. It allows users to 5. Don’t type messages in uppercase as connect to the high speed wireless it is considered rude. Internet that can cover very large 6. Give people time to respond. distance. 7. It’s important to properly end a 13. How is data transferred on a conversation. network? 17. What are the basic needs to use The data is broken up into pieces of instant messaging (chat) softwares. same size called packets. 1. Instant messaging software must be A header is added to each packet installed on your computer or phone. which contains information about 2.You must have an account on that source as well as destination of data software. and its location with respect to other 3. You should have list of contacts that packets. are available for chat. Each packet travels between multiple 4. If you don’t have any contacts, you computers until it finds its destination. can add contacts by sending an All these packets may not take the invitation to others whom you want to same route. communicate. 18 What is a blog. customers can buy or sell goods/things Blog is a website where you can share over the Internet. information related to a specific topic. Customers must have an active internet 19 Explain features of a blog. connection for viewing goods or i. It is similar to an online personal services offered by a seller. diary Customers can pay online using a ii. It is simple to use. credit, debit card or by internet iii. It can be used to convey messages banking. about events, announcements, news, 26. How is Online shopping useful? reviews etc. Customer can place orders anywhere iv. We need an active internet anytime. connection to make changes. Customer does not need to move out 20 List any 5 websites that provide to visit stores. blog service. There are more choices available. 1.WordPress.com Products or services that is not 2.blogger.com available in the local market are 3.wix.com available online. 4.weebly.com 27. List any five websites that allow 5.blogsome.com online transactions. 21 Difference between web page 1.IRCTC: an online portal for booking and website. flight and train tickets. Web page is a document that supports 2.Flipkart: an online shopping portal for hypertext. buying consumer products. Website is a collection of interconnected 3.EBay: an online portal for buying and web pages. selling goods. 22 Explain the purpose of an offline 4.Redbus, an online portal for booking blog editor. bus tickets. Offline blog editor is a tool that can be 5.Paytm, an online portal for recharge used to create blogs without using and paying bills. internet. We can create blogs offline on 28. List any three payment tools to our computer and publish them use online transactions. whenever internet connectivity is PayTM: It is very popular application available. using which you can make payment for 23 List any five offline blog editors. goods, services as well as international 1.Qumana transactions. It has helped many shops 2.Windows Live Writer to go online. It provides its wallet that 3.Blogdesk can be linked to your bank account. 4.MarsEdit ii. Google Pay: Google Pay is a mobile 5.BlogJet payment app that does not have a 6.Blogo wallet facility. It allows you to make 24 What is an online transaction? bank to bank transfers for free. Online transaction is the method of iii.Bharat Interface for Money transferring money through internet in (BHIM): It is a payment app that lets secure manner. you make simple, easy and quick 25 What is the purpose of online transactions using Unified Payments transaction? Interface (UPI). You can make direct Online transactions can be used for bank payments to anyone using their online shopping. Online shopping is a UPI ID or scanning their QR with the form of electronic commerce where BHIM app. You can also request money Email Spoofing : It is the creation of through the app from a UPI ID. email messages with a fake sender 29. What is Internet Security? address. Internet security is a branch of Pharming: It is the process of computer science that establishes rules redirecting traffic of a website to and measures against attacks over the another website by using illegal Internet. methods. 30. How can we remain secure on Char Spoofing: This is also known as internet? script spoofing. In this case, similar- i. Use strong passwords: a looking characters can be used for combination of alphanumeric and security attacks. special characters should be used for 32. Write about basic safety rules creating a password. to follow at workplace ii Backup your data: Always keep a.Your personal safety is your copies of personal data in CD or pen responsibility. drive b.Dress properly (Cloths as well as iii. Do not share personal shoes) . information: Don’t share your c.Keep work area neat and tidy. personal information like d.Follow the rules. name, age, address, school etc on e.Report workplace accidents. unknown websites. f.Know and follow emergency iv. Secure transactions: If you are procedures. making online transactions you should g.Don’t operate tools or machinery that be careful while entering credit card or you are not trained for. debit card details h.Avoid drugs and alcohol at work. v. Install antivirus : Computers must i.Take breaks appropriately. have antivirus to save your computer 33. How can you provide fire safety from virus and other threats data from at workplace? your computer. a.Don’t overload electrical circuits. vi. Do not respond to e-mails from b.Turn off electrical equipments at the unknown users . end of day. vii. Clear browser cookies c.All kind of rubbish must be cleared. frequently: Cookies are text files d.Welding operations should be done in created on your computer to monitor protected areas. your activities on websites. e.Know the fire safety plan and viii. Keep the operating system and evacuation software applications upto date f.Ensure that hazardous materials are ix. Install firewall: Firewall is properly stored and protected. collection of software and hardware to g. Know how use fire extinguishers. allow or block network traffic on a 34. What are common causes of computer. falls and slips at workplace ? x. Never install software from a.Wet or oily surfaces. unknown sources b.Occasional spills. 31 Explain different kinds of online c.Weather hazards. threats. d.Loose rugs or mats. Phishing: It is a method of trying to e.Flooring or other walking surfaces get personal information by using a that do not have same degree of fake website. traction in all areas. 35. How can we avoid Falls and incorrectly, accidental deletion of data, Slips? forgetting an appointment etc. a.Cleaning of all spills immediately. 41.How can we handle accidents? b.Marking of spills and wet areas. a.Take control of situation. c.Mopping or sweeping debris from b.Provide First aid . floors. c. Call for emergency services d.Removing obstacles from walkways. ( Ambulance, Fire Brigade, Police) e.Always closing file cabinet or drawers. d.Deny access to people who don’t need f.Covering cables . to be on the scene. g.Proper light in working area. e.Identify people and conditions at the h.Replace fuse light bulbs and faulty scene. The people are witnesses to switches. what happened. Tell someone to note 36. What are various Electrical down their names. If you’re alone, try Safety Rules? to notice who’s there. a.Avoid water while working with f.Preserve physical evidence. Evidence electricity. should not be altered or removed. b.Never use equipment with damaged g.Evaluate how bad the loss is, how bad wires or plugs. it could have been, and whether c.Always use insulated tools. additional investigation resources are d. Always use rubber gloves and needed. goggles. h.Owners and upper management must e.Never try to repair electrical be immediately notified. equipment. 42. What are different types of f.N ever use an aluminum or steel Emergencies? ladder. a.Fire or explosions g.Turn off main switch if some electrical b.Medical emergencies repair is there. c.Severe weather 37.What is First Aid? d.Earthquakes It is the basic medical care to someone e.Major power failures experiencing a sudden injury or illness. f.Hazardous material spills 38. What is an Accident? 43.How can we handle An unpleasant event that happens emergencies? unexpectedly and causes damage, a.Take a deep breath. injury or death. b.Tell yourself you can handle the 39. What is Emergency? situation. An emergency is a situation that may c.Protect yourself and the injured be a risk to health, life, property, or person from fire, explosions or other environment. hazards. 40. Explain types of Accidents. d.Try to look at the situation as a i.Physical: Physical accidents happen whole. due to collisions, falls, touching What is the most serious problem and something sharp or hot, accidentally what do you need to do first? kicking the leg of a chair while walking, Treat the most life-threatening accidentally tipping over a glass of problems like bleeding or shock first. water, contacting electricity. If you think the person has a spinal ii.Non-Physical: Non-physical injury, do not move him or her unless accidents include unintentionally the danger is great. revealing a secret , saying something Check for broken bones and other injuries. 44 .What are hazards and sources 46.What do you mean by healthy of hazards? living? A hazard is something that can harm a.Eat healthy and nutritious food. individuals Vegetarian food is considered better for Sources of hazards are: healthy body . So your meal should a.Biological.Biological hazards include have fruits, vegetables, whole grains viruses, bacteria, insects, animals etc., and low-fat milk products in excess. that can cause make you sick. b.Avoid junk food and cold drinks. b.Chemical. These are substances that c.Avoid Tobacco and Alcohol. can cause harm. They can cause skin d.Do exercise, Yoga or play some irritation, respiratory system irritation, outdoor game on regular basis.Get blindness etc. enough sleep. c.Physical. Physical hazards are e.Adopt a hobby. environmental factors that can harm a f.Make good friends and spend some person without touching them, time with them. including heights, noise, radiation and pressure. d.Safety. These hazards create unsafe working conditions. For example, exposed wires or a damaged carpet e.Ergonomic. These hazards occur due to physical factors that result in musculoskeletal injuries. For example, a poor workstation setup in an office, poor posture and manual handling. f.Psychosocial. Psychosocial hazards cause adverse effect on an employee’s mental health. For example harassment, victimisation, stress and violence. 45. Explain General Evacuation Procedures. a.Activate the fire alarm. b.Call 112 immediately . c.Exit the building using emergency maps. d.Take injured individuals to a secure area . e.Ensure that everyone is out of the building. f.Do not use the elevator or lift. g.Use a fire extinguisher if it is safe to do so . h.Report hazardous conditions. i.Stay low if confronted with smoke. Check closed doors for heat before opening. j.Stay away from the building until it is safe to return.