0% found this document useful (0 votes)
17 views16 pages

24 Internet

Uploaded by

yedireg464
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views16 pages

24 Internet

Uploaded by

yedireg464
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

SECRET CRPF E-Learning Portal SECRET

INTERNET

Introduction:- Internet, a system architecture that has revolutionized


communications and methods of commerce by allowing various computer networks
around the world to interconnect. Sometimes referred to
as a ―network of networks,‖ the Internet emerged in the
United States in the 1970s but did not become visible to
the general public until the early 1990s. By 2015,
approximately 3.2 billion people, or nearly half of the
world’s population, were estimated to have access to the
Internet.The Internet provides a capability so powerful
and general that it can be used for almost any purpose
that depends on information, and it is accessible by every
individual who connects to one of its constituent
networks. It supports human communication via
electronic mail (e-mail), ―chat rooms,‖ newsgroups, and audio and video
transmission and allows people to work collaboratively at many different locations.
It supports access to digital information by many applications, including the World
Wide Web.

In This Chapter We Will Cover Following Topics To Understand The Internet N


Better Way:

 Origin and development


 Foundation of the Internet
 Commercial expansion
 Society and the Internet
 Instant broadcast communication
 Social gaming and social networking
 Love and sex
 Advertising and e-commerce
 Education:-
 Uses of Internet in Education
 File sharing
 Politics and culture
 Privacy and the Internet

Origin and development:-The first computer networks were dedicated special-


purpose systems such as SABRE (an airline reservation system) and AUTODIN I (a
defense command-and-control system), both designed and implemented in the late

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

1950s and early 1960s.. These ideas were first realized in ARPANET, which
established the first host-to-host network connection on Oct. 29, 1969. It was
created by the Advanced Research Projects Agency (ARPA) of the U.S. Department
of Defense. ARPANET was one of the first general-purpose computer networks. It
connected time-sharing computers at government-supported research sites,
principally universities in the United
States, Tools and applications—
such as the simple mail transfer
protocol (SMTP, commonly referred
to as e-mail), for sending short
messages, and the file transfer
protocol (FTP), for longer
transmissions. In order to achieve
cost-effective interactive
communications between
computers, which typically
communicate in short bursts of
data, ARPANET employed the new technology of packet switching. Packet switching
takes large messages and breaks them into smaller, manageable pieces (known as
packets) that can travel independently over any available circuit to the target
destination, where the pieces are reassembled. DARPA (Defense Advanced Research
Projects Agency; formerly `ARPA) supported initiatives for ground-based and
satellite-based packet networks. The ground-based packet radio system provided
mobile access to computing resources, while the packet satellite network connected
the United States with several European countries and enabled connections with
widely dispersed and remote regions. Similarly, the packet satellite network was
used by DARPA to link the United States with satellite terminals serving the United
Kingdom, Norway, Germany, and Italy. These terminals, however, had to be
connected to other networks in European countries in order to reach the end users.

Foundation of the Internet:- By the 1980s other U.S. governmental bodies were
heavily involved with networking, including the National Science Foundation (NSF),
the Department of Energy, and the National Aeronautics and Space Administration
(NASA). While DARPA had played a seminal role in creating a small-scale version of
the Internet among its researchers, NSF worked with DARPA to expand access to
the entire scientific and academic community and to make TCP/IP the standard in
all federally supported research networks. In 1985–86 NSF funded the first five
supercomputing centres—at Princeton University, the University of Pittsburgh, the
University of California, San Diego, the University of Illinois, and Cornell
University. In the 1980s NSF also funded the development and operation of the
NSFNET, a national ―backbone‖ network to connect these centres. A few
commercial networks also began in the late 1980s; these were soon joined by
others, and the Commercial Internet Exchange (CIX) was formed to allow transit
traffic between commercial networks that otherwise would not have been allowed
on the NSFNET backbone.

Commercial expansion

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

The rise of commercial Internet services and applications helped to fuel a rapid
commercialization of the Internet. This phenomenon was the result of several other
factors as well. One important factor was the introduction of the personal computer
and the workstation in the early 1980s. Another factor, which took on increasing
importance, was the emergence of ethernet and other ―local area networks‖ to link
personal computers.. In 1988 the Corporation for National Research Initiatives
received approval to conduct an experiment linking a commercial e-mail service
(MCI Mail) to the Internet. This application was the first Internet connection to a
commercial provider that was not also part of the research community. Approval
quickly followed to allow other e-mail providers access, and the Internet began its
first explosion in traffic.

In 1993 federal legislation allowed NSF to open the NSFNET backbone to


commercial users.

Also in 1993 the


University of
Illinois made
widely available
Mosaic, a new type
of computer
program, known as a browser, that ran on most types of computers and, through
its ―point-and-click‖ interface, simplified access, retrieval, and display of files
through the Internet. Mosaic incorporated a set of access protocols and display
standards originally developed at the European Organization for Nuclear Research
(CERN) by Tim Berners-Lee for a new Internet application called the World Wide
Web (WWW). In 1994 Netscape Communications Corporation (originally called
Mosaic Communications Corporation) was formed to further develop the Mosaic
browser and server software for commercial use. Shortly thereafter, the software
giant Microsoft Corporation became interested in supporting Internet applications
on personal computers (PCs) and developed its Internet Explorer Web browser
(based initially on Mosaic) and other programs. These new commercial capabilities
accelerated the growth of the Internet, which as early as 1988 had already been
growing at the rate of 100 percent per year.

By the late 1990s there were approximately 10,000 Internet service providers (ISPs)
around the world, more than half located in the United States. However, most of
these ISPs provided only local service and relied on access to regional and national
ISPs for wider connectivity. Consolidation began at the end of the decade, with
many small to medium-size providers merging or being acquired by larger ISPs.
Among these larger providers were groups such as America Online, Inc. (AOL),
which started as a dial-up information service with no Internet connectivity but
made a transition in the late 1990s to become the leading provider of Internet

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

services in the world—with more than 25 million subscribers by 2000 and with
branches in Australia, Europe, South America, and Asia.

While the precise structure of the future Internet is not yet clear, many directions
of growth seem apparent. One is the increased availability of wireless access.
Wireless services enable applications not previously possible in any economical
fashion. For example, global positioning systems (GPS) combined with wireless
Internet access would help mobile users to locate alternate routes, generate precise
accident reports and initiate recovery services, and improve traffic management
and congestion control. In addition to wireless laptop computers and personal
digital assistants (PDAs), wearable devices with voice input and special display
glasses are under development.

Another future direction is toward higher backbone and network access speeds.
Backbone data rates of 10 billion bits (10 gigabits) per second are readily available
today, but data rates of 1 trillion bits (1 terabit) per second or higher will eventually
become commercially feasible. If the development of computer hardware, software,
applications, and local access keeps pace, it may be possible for users to access
networks at speeds of 100 gigabits per second. At such data rates, high-resolution
video—indeed, multiple video streams—would occupy only a small fraction of
available bandwidth.

It is clear that communications connectivity will be an important function of a


future Internet as more machines and devices are interconnected. In 1998, after
four years of study, the Internet Engineering Task Force published a new 128-bit IP
address standard intended to replace the conventional 32-bit standard. By allowing
a vast increase in the number of available addresses (2128, as opposed to 232),
this standard will make it possible to assign unique addresses to almost every
electronic device imaginable.

Society and the Internet

. As the Pew Charitable Trust observed in 2004, it took 46 years wire 30 percent of
the United States for electricity; it took only 7 years for the Internet to reach that
same level of connection to American homes.
By 2005, 68 percent of American adults and
90 percent of American teenagers had used
the Internet. Europe and Asia were at least as
well connected as the United States. Nearly
half of the citizens of the European Union are
online, and even higher rates are found in the

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

Scandinavian countries. There is a wide variance in Asian countries; for example,


by 2005 Taiwan, Hong Kong, and Japan had at least half of their populations
online, whereas India, Pakistan, and Vietnam had less than 10 percent. South
Korea was the world leader in connecting its population to the Internet through
high-speed broadband connections.

Instant broadcast communication

For the individual, the Internet opened up new communication possibilities. E-mail
led to a substantial decline in traditional ―snail mail.‖ Instant messaging (IM), or
text messaging, expanded, especially among youth, with the convergence of the
Internet and cellular telephone access to the Web. Indeed, IM became a particular
problem in classrooms, with students often surreptitiously exchanging notes via
wireless communication devices. More than 50 million American adults, including
11 million at work, use IM.

From mailing lists to ―buddy lists,‖ e-mail and IM have been used to create ―smart
mobs‖ that converge in the physical world. Examples include protest organizing,
spontaneous performance art, and shopping. Obviously, people congregated before
the Internet existed, but the change wrought by mass e-mailings was in the speed
of assembling such events. In February 1999, for example, activists began planning
protests against the November 1999 World Trade Organization (WTO) meetings in
Seattle, Washington. Using the Internet, organizers mobilized more than 50,000
individuals from around the world to engage in demonstrations—at times violent—
that effectively altered the WTO’s agenda.

More than a decade later, in June 2010 Egyptian computer engineer Wael Ghonim
anonymously created a page titled ―We Are All Khaled Said‖ on the social media site
Facebook to publicize the death of a 28-year-old Egyptian man beaten to death by
police. The page garnered hundreds of thousands of members, becoming an online
forum for the discussion of police brutality in Egypt. After a popular uprising in
Tunisia in January 2011, Ghonim and several other Internet democracy activists
posted messages to their sites calling for similar action in Egypt. Their social media
campaign helped spur mass demonstrations that forced Egyptian Pres. Ḥosnī
Mubārak from power.

In the wake of catastrophic disasters, citizens have used the Internet to donate to
charities in an unprecedented fashion. Others have used the Internet to reunite
family members or to match lost pets with their owners. The role of the Internet in
responding to disasters, both natural and deliberate, remains the topic of much
discussion, as it is unclear whether the Internet actually can function in a disaster
area when much of the infrastructure is destroyed. Certainly during the September

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

11, 2001, attacks, people found it easier to communicate with loved ones in New
York City via e-mail than through the overwhelmed telephone network.

Following the earthquake that struck Haiti in January 2010, electronic media
emerged as a useful mode for connecting those separated by the quake and for
coordinating relief efforts. Survivors who were able to access the Internet—and
friends and relatives abroad—took to social networking sites such as Facebook in
search of information on those missing in the wake of the catastrophe. Feeds from
those sites also assisted aid organizations in constructing maps of the areas
affected and in determining where to channel resources. The many Haitians lacking
Internet access were able to contribute updates via text messaging on mobile
phones.

Social gaming and social networking

Online gaming is a kind of video game that is played through Internet or social
network. It allows multiple players online at the same time and it could be
implemented on mobile devices or PCs. Online games including social games,
MOBA games (Multiplayer Online Battle Arena), and first-person shooters. All of
them are a source of entertainment and a way to maintain positive relationships
with family and friends. Therefore, games become a significant part of the overall
experience of social media. people could establish different relationships in games,
such as friends or lovers. Most of players enjoy these relationships, and some of
them become lovers and get married in reality through games, just as Facebook or
Tender do.

Online games corporate with


social media and affect
human being normal life, it
create new way to build
relationship and increase
frequency of
communications. People
could not only communicate but also express their emotions, and games link
families and friends, they always have common topics when they are together.
Games are social activities, Malaby points out, game must be understood as a
mode of experiencing reality. So, when we research social media, it is difficult to
ignore the great degree to online games have found their niche (Hinton and Hjorth,
2013). Actually, games are more like social media than traditional social media.

Love and sex

By the start of the 21st century, approximately 20 percent of the Internet


population had used it at some time to meet others, with Internet dating services
collecting nearly half a billion dollars per year in matchmaking fees.

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

Pornography is another domain in which nichification is prevalent. By the 21st


century there were some four million Web sites devoted to pornography, containing
more than a quarter of a billion pages—in other words, more than 10 percent of the
Web. Forty million American adults regularly visit pornographic sites, which
generate billions of dollars in yearly revenues. All of society’s vices, as well as its
virtues, have manifested themselves on the Internet.

Advertising and e-commerce

Nichification allows for consumers to find what they want, but it also provides
opportunities for advertisers to find consumers. For example, most search engines
generate revenue by matching ads to an individual’s particular search query.
Among the greatest challenges facing the Internet’s continued development is the
task of reconciling advertising and commercial needs with the right of Internet
users not to be bombarded by ―pop-up‖ Web pages and spam

Nichification also opens up important e-commerce opportunities. A bookstore can


carry only so much inventory on its shelves, which thereby limits its collection to
books with broad appeal. An online bookstore can ―display‖ nearly everything ever
published. Although traditional bookstores often have a special-order department,
consumers have taken to searching and ordering from online stores from the
convenience of their homes and offices

EDUCATION:-

The development of Internet technologies has raised the education level in all
countries and it has changed the way students are being taught at schools. That’s
why it is very important for the present generation that they provide internet
education for their young generations.

uses of Internet in Education

 Students can search what they


want to learn about by the use of
Google or other search engines like
Bing, Yahoo etc.
 Students can learn and take online
classes anytime and anywhere.
 Notes and researched paper all are
available on the internet and just a
click away.
 Students can get tuition online and they can watch Videos on
YouTube related to mathematics, English language, physics or any
other information about any topic related to their school homework.
 Teachers can use social media to connect with students and share
motivational quotes as well as subject related articles and notes.

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

 Teachers can teach by the use of animation, powerpoint slides, and


images to capture the student’s attention.
 Teachers can record their own lectures or topics on camera and
upload them to YouTube.
 Parents can also see what their student’s teachers are doing on
Facebook.
 Parents can also help children by watching the same topic on the
internet. They also can learn on the internet for their personal
development so that later they can contribute to their kid’s education.
Here is more about it: What is the importance of computers in our
parent’s life?
 Parents can interact, communicate or chat with teachers and school
authorities about their kid’s performance and attitude in school.
 School principals, teachers can create Facebook Groups to teach
students.
 Students can post topic and can ask questions about their topic on
the Internet to get advice from other teachers and others who are
willing to teach.
 Students can connect with other school students for the same topic by
the use of the internet.

The Internet in education can play thousands of practical roles to improve


talent in kids. But this is only possible if we are going to teach our students
what they really need. You can’t explain an algebra lesson on Facebook but
you can interact with students about the topic. And government should pay
some money for teachers to use social media.

File sharing

College students have been at the leading edge of the growing awareness of the
centrality of intellectual property in a digital age. When American college student
Shawn Fanning invented Napster in 1999, he set in motion an ongoing legal battle
over digital rights. Napster was a file-sharing system that allowed users to share
electronic copies of music online. The problem was obvious: recording companies
were losing revenues as one legal copy of a song was shared among many people.
Although the record companies succeeded in shutting down Napster, they found
themselves having to contend with a new form of file sharing, P2P (―person-to-
person‖). In P2P there is no central administrator to shut down as there had been
with Napster. Initially, the recording industry sued the makers of P2P software and
a few of the most prolific users—often students located on university campuses
with access to high-speed connections for serving music and, later, movie files—in
an attempt to discourage the millions of people who regularly used the software.
Still, even while some P2P software makers have been held liable for losses that the
copyright owners have incurred, more-devious schemes for circumventing
apprehension have been invented.

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

The inability to prevent file sharing has


led the recording and movie industries
to devise sophisticated copy protection
on their CDs and DVDs. In a
particularly controversial incident, Sony
Corporation introduced CDs into the
market in 2005 with copy protection
that involved a special viruslike code
that hid on a user’s computer. This
code, however, also was open to being exploited by virus writers to gain control of
users’ machines

Politics and culture

The Internet has broadened political participation by ordinary citizens, especially


through the phenomenon of blogs. Many blogs are simply online diaries or
journals, but others have become sources of information and opinion that
challenge official government pronouncements or the mainstream news media. By
2005 there were approximately 15 million blogs, a number that was doubling
roughly every six months. The United States dominates the blog universe, or
―blogosphere,‖ with English as the lingua franca, but blogs in other languages are
proliferating. In one striking development, the Iranian national language, Farsi, has
become the commonest Middle Eastern language in the blogosphere. Despite the
Iranian government’s attempts to limit access to the Internet, some 60,000 active
Farsi blogs are hosted at a single service provider, PersianBlog.

The Internet poses a particular problem for autocratic regimes that restrict access
to independent sources of information. The Chinese government has been
particularly successful at policing the public’s access to the Internet, beginning
with its ―Great Firewall of China‖ that automatically blocks access to undesirable
Web sites. The state also actively monitors Chinese Web sites to ensure that they
adhere to government limits on acceptable discourse and tolerable dissent. In 2000
the Chinese government banned nine types of information, including postings that
might ―harm the dignity and interests of the state‖ or ―disturb social order.‖ Users
must enter their national identification number in order to access the Internet at
cybercafés. Also, Internet service providers are responsible for the content on their
servers. Hence, providers engage in a significant amount of self-censorship in order
to avoid problems with the law, which may result in losing access to the Internet or
even serving jail time. Finally, the authorities are willing to shut Web sites quickly
and with no discussion. Of course, the state’s efforts are not completely effective.
Information can be smuggled into China on DVDs, and creative Chinese users can
circumvent the national firewall with proxy servers—Web sites that allow users to
move through the firewall to an ostensibly acceptable Web site where they can
connect to the rest of the Internet.

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

Others have taken advantage of the Internet’s openness to spread a variety of


political messages. The Ukrainian Orange Revolution of 2004 had a significant
Internet component. More troubling is the use of the Internet by terrorist groups
such as al-Qaeda to recruit members, pass along instructions to sleeper cells, and
celebrate their own horrific activities. The Iraq War was fought not only on the
ground but also online as al-Qaeda operatives used specific Web sites to call their
followers to jihad. Al-Qaeda used password-protected chat rooms as key
recruitment centres, as well as Web sites to test potential recruits before granting
them access to the group’s actual network. On the other hand, posting material
online is also a potential vulnerability. Gaining access to the group’s ―Jihad
Encyclopaedia‖ has enabled security analysts to learn about potential tactics, and
Arabic-speaking investigators have learned to infiltrate chat rooms and gain access
to otherwise hidden materials

Privacy and the Internet

Concerns about privacy in cyberspace are an issue of international debate. As


reading and writing, health care and shopping, and sex and gossip increasingly
take place in cyberspace, citizens around the world are concerned that the most
intimate details of their daily lives are being monitored, searched, recorded, stored,
and often misinterpreted when taken out of context. For many, the greatest threats
to privacy come not from state agents but from the architecture of e-commerce
itself, which is based, in unprecedented ways, on the recording and exchange of
intimate personal information.

The threats to privacy in the new Internet age were crystallized in 2000 by the case
of DoubleClick, Inc. For a few years DoubleClick, the Internet’s largest advertising
company, had been compiling detailed information on the browsing habits of
millions of World Wide Web users by placing ―cookie‖ files on computer hard drives.
Cookies are electronic footprints that allow Web sites and advertising networks to
monitor people’s online movements with telescopic precision—

Privacy of cell phone communication also has become an issue, as in 2010 when
BlackBerry smartphone maker RIM reacted to demands from the United Arab
Emirates (U.A.E.), Saudi Arabia, and India that security forces from those countries
be given the ability to intercept communications such as e-mail and instant
messages from BlackBerry users within their borders. The U.A.E. later canceled a
planned ban on the BlackBerry service, saying that it had reached an agreement
with RIM, which declined to reveal its discussions with the governments of other
countries. The demands were part of a rising tide of security demands from
national governments that cited the need to monitor criminals and terrorists who
used wireless communications.

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

The United States is not immune to these controversies. In 2010 Pres. Barack
Obama’s administration said that in order to prevent terrorism and identify
criminals, it wanted Congress to require that all Internet services be capable of
complying with wiretap orders. The broad requirement would include Internet
phone services, social networking services, and other types of Internet
communication, and it would enable even encrypted messages to be decoded and
read—something that required considerable time and effort. Critics complained
that the monitoring proposal challenged the ideals of privacy and the lack of
centralized authority for which the Internet had long been known

FAQ(Frequently asked question)


1. What Is Internet ?

The Internet, sometimes called simply "the Net," is a worldwide system of computer
networks -- a network of networks in which users at any one computer can, if they
have permission, get information from any other computer (and sometimes talk
directly to users at other computers.

2.What is the Internet used for?

The Internet makes it possible to quickly find information, communicate with


people around the world, manage your finances, shop from home, listen to music,
watch videos, and much more.

3.What is an Arpanet and why is it important?

A computer network developed by the Advanced Research Project Agency (now the
Defense Advance Research Projects Agency) In The 1960s And 1970s As A Means
Of Communication Between Research Laboratories And Universities. Arpanet Was
The Predecessor To The Internet. Arpanet. Short For Advanced Research Projects
Agency Network, Arpanet Was Created To Make It Easier For People To Access
Computers, Improve Computer Equipment, And To Have A More Effective
Communication Method For The Military.

4. What is SMTP and FTP?

SMTP is part of the application layer of the TCP/IP protocol. Using a process called
"store and forward," SMTP moves your email on and across networks. It works
closely with something called the Mail Transfer Agent (MTA) to send your
communication to the right computer and email inbox.

File Transfer Protocol (FTP) is a client/server protocol used for transferring files to
or exchanging files with a host computer. ... Anonymous FTP allows users to access
files, programs and other data from the Internet without the need for a user ID or
password.simple mail transfer protocol (SMTP, commonly referred to as e-mail), for
sending short messages, and the file transfer protocol (FTP), for longer
transmissions.

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

5.What Is Packet Switching?

Packet switching is a digital network transmission process in which data is broken


into suitably-sized pieces or blocks for fast and efficient transfer via different
network devices. ... These packets are then routed by network devices to the
destination.

6.What Is Time Sharing Network?

Time-sharing is a technique which enables many people, located at various


terminals, to use a particular computer system at the same time. Time-sharing or
multitasking is a logical extension of multiprogramming. Processor's time which is
shared among multiple users simultaneously is termed as time-sharing.

7.What Is The Roll Of NSF And DARPA To Expend Of Internet?

While DARPA had played a seminal role in creating a small-scale version of the
Internet among its researchers, NSF worked with DARPA to expand access to the
entire scientific and academic community and to make TCP/IP the standard in all
federally supported research networks. In 1985–86 NSF funded the first five
supercomputing centres—at Princeton University, the University of Pittsburgh, the
University of California, San Diego, the University of Illinois, and Cornell
University. In the 1980s NSF also funded the development and operation of the
NSFNET, a national ―backbone‖ network to connect these centres.

8. What is the role of Internet in e-commerce?

Since it is a large network of people and information around the world, the Internet
is an enabler for e-commerce as because it allows businesses to showcase and sell
their products and services online.

9. What is an ecommerce store?

Ecommerce, also known as electronic commerce, is a business model which


involves transactions taking place on the internet. Stores that sell their products
online are ecommerce stores or businesses. For example, Amazon.com is one of the
most popular online stores in the ecommerce industry.

10. How did the internet impact Our society?

Internet impact on society is now making economic, social, and political changes
around the globe. It's obvious because the billions of users, communities, cultures
using the internet in their daily life. And our actions, thoughts and communication
skills on the internet is impacting society positively or negatively.

11. What is the impact of social networking on society?

Social media has revolutionized the way people communicate and socialize on the
web. There is a positive effect on business, politics, socialization as well as some

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

negative effects such as cyberbullying, privacy, and fake news. Social media has
definitely made us closer to different parts of the world.

12. What is the role of Internet in education?

It can improve the quality of education in many ways. It opens doorways to a


wealth of information, knowledge and educational resources, increasing
opportunities for learning in and beyond the classroom. Teachers use online
materials to prepare lessons, and students to extend their range of learning.

13. What is a file sharing network?

File sharing is the public or private sharing of computer data or space in a network
with various levels of access privilege. FTP can be used to access (read and possibly
write to) files shared among a particular set of users with a password to gain access
to files shared from an FTP server site.

14. What Do You Means By Privacy?

Privacy is the ability of an individual or group to seclude themselves, or information


about themselves, and thereby express themselves selectively. The boundaries and
content of what is considered private differ among cultures and individuals.

Multipal Choice Questions(MCQs):-


1. Internet Is:

(A) A Small Network Of Computer

(B) A World Wide Network Of Computer

(C)A Private Network

(D)None Of The Above

2. The Transfer Of Documents On Www Takes Place Using:

(A)Ftp Protocol

(B) Http Protocol

(C) Transmission Protocol

(D) None Of Above

3.The Centerlized Computer Having Huge Storage Capacity And Vert High Proccessing
Peed Are Called As:

(A)Server

(B)Workstation

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

(C)Tree

(D)Mesh

4. The Documents In Web Sites That Display Information Are Called As:

(A) Server

(B) Web Page

(C) ISP

(D) LAN

5.The Communication Protocol Used By Internet Is:

(A)HTTP

(B) FTP

(C)TCP/IP

(D) WWW

6. The First Network That Planted The Seeds Of Internet Was:

(A)ARPANET

(B) NSFNET

(C)VNET

(D) Both (A) And (B)

7. Voice Mail, E-mail , Online Service The Internet And WWW Are Example Of:

(A)Computer Categroies

(B) Connectivity

(C)Telecommuting

(D) None Of Above

8.Computers On The Internet Owned And Operated By Education Institution Form


Part Of The:

(A) Com Domain

(B) Edn Domain

(C)Mil Domain

(D) None Of Above

9. Link Between Arpanet,NSFnet And Other Network Is Called As:

(A) Internet

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

(B) Network

(C) Software

(D) Process

10. Internet Was Originally A Project Of :

(A) ARPA

(B)NSF

(C) NSA

(D) ISO

11. ISP Stands For:

(A)None Of These

(B)Internet Service Provider

(C)Interner Server Provider

(D) Internationalservice Provider

12.WWW Is Short Form Of:

(A)World Wide Web

B) None Of These

(C) Word Wild Web

(D)Word Wide Web

13.Long Form Of FTP :

(A)File Transfer Protocol

(B)Frequently Tranfer Protocol

(C) None Of These

(D) File Transmission Protocol

14. Long Form Of SMTP _

(A)Single Mail Trnafer Protocol

(B) Simple Mail Transfer Protocol

(C)Simple Markup Transmission Protocol

(D) None Of These

15. Internet Works On –

(A) Packet Switching

SECRET CRPF E-Learning Portal SECRET


SECRET CRPF E-Learning Portal SECRET

(B)Circuit Switching

(C) Both (A) & (B)

(D) None Of These

ANSWER:- 1.B 2.A 3.A 4.B 5.C 6.A 7.C 8.B 9.A 10.A 11.B

12.A 13.A 14.B 15.A

References:
IT FOR SCHOOL BY MICA EDUCO BOOKS

HTTPS://BRITANNICA.COM

HTTPS://TUTORIALSPOINT.COM

HTTPS://SANFOUNDRY.COM

HC/RO DHARAM DUTT

CTC T & IT) , CRPF. RANCHI

CONTACT:- 8708398741

SECRET CRPF E-Learning Portal SECRET

You might also like