0% found this document useful (0 votes)
42 views21 pages

Internet and Browsing

internet and browsing

Uploaded by

jites37686
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views21 pages

Internet and Browsing

internet and browsing

Uploaded by

jites37686
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Universal Typing Master

BASICS OF INTERNET & NETWORKING

PAGE
SR.NO. CONTENTS

R
NO.
1. Introduction to Internet, The concept World Wide Web 2

TE
(WWW)
2. Uses of the Internet 3
3. Choosing an Internet Service 4

AS
4. Hardware Needed to use internet 5
5. Setting Up Your Internet Connection, Using Home Network 6
6. Browser Basics, Navigating to a Web Site 7-8

M
7. Search Engines and Strategies 9
8. Introduction to Email 10
9. Introduction to Networking and Types of Networks 13
10.
11.
12.
What Is Network Policy NG
Types of networking, Components of networking

Questions that frequently asked in exam on Internet &


14
15
17-20
Networking
PI
TY
L
SA
ER
IV
UN

Internet & Networking Basics 1


Universal Typing Master

Introduction to Internet:
The Internet is a global network of billions of computers and other electronic devices. With the Internet, it's
possible to access almost any information, communicate with anyone else in the world, and do much more.

R
You can do all of this by connecting a computer to the Internet, which is also called going online. When
someone says a computer is online, it's just another way of saying it's connected to the Internet.

TE
The foundation of the internet began in 1969, when the US Department of Defense created ARPAnet,
a project to allow military personnel to communicate with each other in an emergency. By 2012, the number
of internet users worldwide reached 2.4 billion—about one third of the world's population. To store all of the

AS
information on the internet, you would need over 1 billion DVDs or 200 million Blu-ray discs.
The internet is the largest computer network in the world, connecting millions of computers. A
network is a group of two or more computer systems linked together.

M
It's no secret that more and more the internet is
becoming an integral part of our everyday lives. But if we are
new to the online experience, it may be a bit overwhelming.
In the early days, most people just used the internet to search
NG
for information. Today's internet is a constantly evolving tool
that not only contains an amazing variety of information, but
also provides new ways of accessing, interacting and
connecting with people and content. As a result, new terms
PI
are constantly appearing as new technologies are introduced.

We may have heard


TY

someone say something like "The server is down" or "We're having problems
with the e-mail server." A server is a computer that "serves" many different
computers in a network by running specialized software and storing
information. For example, web pages are stored on servers. When you access
a web page, your computer is acting as a client. A client runs familiar software
L

such as web browsers or email software, and it communicates with the server
to get the information it requires. In order for your browser to display a web
SA

page, it requests the data from the server where the page is stored. The server
processes the request, then sends the data to your browser, where it is
displayed.
In peer-to-peer (P2P) networks, each computer acts as both a server and a client. Examples of P2P software
ER

include Skype and Bit Torrent.

The concept World Wide Web (WWW) :


When most people think of the internet, the first thing they think about is the
IV

World Wide Web. Nowadays, the terms "internet" and "World Wide Web" are often
used interchangeably—but they're actually not the same thing. The internet is the
physical network of computers all over the world. And the World Wide Web is a
UN

virtual network of web sites connected by hyperlinks (or "links"). Web sites are
stored on servers on the internet, so the World Wide Web is a part of the internet.
The World Wide Web was created in 1989 by Tim Berners-Lee, a software
engineer. Before then, computers could communicate over the internet, but there were no web pages.

Internet & Networking Basics 2


Universal Typing Master

HTML (HyperText Markup Language) : The backbone of the World Wide Web is made
of HTML files, which are specially-formatted documents that can contain links, as well as
images and other media. All web browsers can read HTML files. In addition to HTML, it's
also very common for websites to use technologies like CSS (Cascading Style Sheets) and

R
JavaScript to do more advanced things.

TE
URL (Uniform Resource Locator) : To get to a web page, we can type the URL in a
browser. The URL, also known as the web address, tells the browser exactly where to
find the page. However, most of the time, people get to a web page by following a link
from a different page or by searching for the page with a search engine.

AS
Uses of the Internet
 For Communication: The internet isn't just about finding information. It's also
about connecting with friends, family, and people you've never met before. Today,

M
there are many different ways to communicate online, including social networking,
chat, VoIP, and blogging.


NG
Social Networking : Social networking has become one of the main ways people
keep in touch. Below are a few of the most popular social networking sites:
Facebook is used by about one billion people. If you have family or friends that
live far away, you can use Facebook to keep up with their lives. You can also share
things you've found online that interest you. Twitter lets you share brief messages
PI
(or "tweets") with the entire world, or with just your circle of friends. By following
people with similar interests, you can discover new things that you wouldn't have
found otherwise. LinkedIn is a site that you can use for business networking. It
TY

allows you to connect with other people in your field and find out about new job opportunities.

 Chat and Instant Messaging : Chat and instant messaging programs allow you to have conversations
with your friends or just write them a quick note. Two examples are Yahoo! Messenger and Microsoft
Messenger. Some sites, such as Gmail and Facebook, allow you to chat within your browser.
L


SA

VoIP (Voice over Internet Protocol): VoIP allows you to have telephone service through your internet
connection. Some services also let you do video conferencing, such as Skype and Facebook Video
Calling. Many of these services are free or very inexpensive, and some people use them as a replacement
for a landline, or just to save minutes on their mobile phones.
ER

 Blogs : Today, the average user has the ability to shape the
web by adding to it. If you have knowledge or interests that
you're passionate about, you can create your own blog and
share your thoughts with the world.
IV

There are many sites like blogger.com and wordpress.com


that let you create a blog for free. You don't need any web
design experience—most of the technical stuff has already
UN

been created for you, and you can choose a predesigned


template that has the look and feel that you want.

 Media on the Internet : TV, radio, and the internet used to be completely separate things, but that's no
longer true with today's technology. You can now watch TV shows on your computer, and you can

Internet & Networking Basics 3


Universal Typing Master

connect to the internet on many TVs and DVD/Blu-ray players. In addition, you can listen to online radio
from all over the world, thus granting you greater access to a more diverse range of media.

 Streaming Media: TV and radio on the internet are examples of streaming media, which means the

R
media downloads while it's playing so you don't have to wait for it to download first. Not all media is
streaming. If you've ever bought music on the iTunes store, you probably had to wait for it to download

TE
before you could listen to it.

 Media Players and Embedded Media: Media is often embedded in a web page, which means that it
plays within the web browser. Other times, you'll use a separate program called a media player to play

AS
it. Examples include Windows Media Player and iTunes. An iPod contains built-in media player
software that can play various types of files.

 Online Media on Your TV : You can now access online TV shows, movies, and music on your TV.

M
Many newer TVs are able to connect to an existing internet connection. If yours doesn't have this feature
built-in, you can buy a separate digital media receiver, which is a small device that connects to your TV.
Apple TV and Roku are two examples of digital media
receivers. Many game consoles, such as the Xbox 360 and


NG
PlayStation 3, can also be used to access online content.

Using the Internet in the Future : The internet is always


changing, and the ways in which we access it will also continue
PI
to change. Current trends will become more common and
integrated into our everyday lives. In addition, we'll see many
technologies and devices in the future that will allow us to use
TY

the internet in new and exciting ways.

Choosing an Internet Service


It all depends on where you live and how much speed you need. Internet Service Providers usually
offer different levels of speed based on your needs. If you're mainly using the internet for e-mail and social
L

networking, a slower connection might be all you need, but if you want to download a lot of music or watch
SA

streaming movies, you'll want a faster connection. You'll need to do some research to find out what the
options are in your area.

Choosing an Internet Service Provider (ISP) : Once you have decided which type of internet access you
ER

are interested in, you can determine which ISPs are available in your area that offer the type of internet access
you want. Then, you will need to purchase internet service from one of the available ISPs. Talk to friends,
family members, and neighbors to see what ISP they use.
Below are some things to consider as you research ISPs:
• Speed
IV

• Price
• Ease of Installation
• Service Record
UN

• Technical Support
• Contract Terms
Although dial-up has traditionally been the cheapest option, many ISPs have raised dial-up prices to be the
same as broadband. This is intended to encourage people to switch over to broadband. Generally, you should
only use dial-up if it's the only option available.

Internet & Networking Basics 4


Universal Typing Master

Hardware Needed to use internet:


 Modem : Once you have your computer, you really don't need much
additional hardware to connect to the internet. The primary piece of
hardware you need is a modem.

R
The type of internet access you choose will determine what type of modem
you need. Dial-up access uses a telephone modem, DSL service uses a

TE
DSL modem, cable access uses a cable modem, and satellite service uses
a satellite adapter. Your ISP may give you a modem (often for a fee)
when you sign a contract with them, which helps to ensure that you have
the right kind of modem. However, if you would prefer to shop for a

AS
better or cheaper modem, then you can choose to buy one separately.

 Router: A router is a hardware device that allows you to connect several


computers and other devices to a single internet connection, which is

M
known as a home network. Many routers are wireless, allowing you to
easily create a wireless network. You don't necessarily need to buy a
router to connect to the internet.
It's possible to connect your computer directly to your modem using an
NG
Ethernet cable. Also, many modems now include a built-in router, so you
have the option of creating a network without having to buy more hardware.
Most routers also act as a hardware firewall, which helps prevent people
from gaining access to your computer through the internet.
PI
 A network card: A network card is a piece of hardware that allows
computers to communicate over a computer network. Most newer computers
TY

have a network card built into the motherboard, so it probably is not


something you will need to purchase. The network card will either have an
Ethernet port, a wireless connection, or both. If you have a laptop with a
wireless connection, you can access the internet at any place that offers a Wi-
Fi connection. Many restaurants, coffee shops, bookstores, hotels and other
L

businesses offer free Wi-Fi. In addition, many cities provide free Wi-Fi in
public areas such as parks and downtown areas.
SA

 Web Browsers : A web browser is the tool that you use to access the
World Wide Web. The browser's main job is to display web pages. It
also lets you create Bookmarks (sometimes called Favorites) for sites
ER

you like, so that you can easily find them again later. The World Wide
Web is a virtual network of web sites connected by hyperlinks (or
"links"). Web sites are stored on servers on the internet, so the World
Wide Web is a part of the internet.
IV

Our computer probably came with a browser preinstalled. PCs come


with Internet Explorer, and Macs come with Safari. If we prefer to use a
different browser, you can download Firefox, Google Chrome, or Opera.
UN

All of these browsers are free.

Internet & Networking Basics 5


Universal Typing Master

Setting Up Your Internet Connection: Once we have chosen an ISP


and purchased the appropriate modem, we can use the instructions provided by
your ISP (or included with the modem) to set up our internet connection.
Depending on what type of service we have, our ISP may need to send a

R
technician to our house in order to turn the connection on. After we have
everything set up, we can open our web browser and begin using the internet.

TE
If we have any problems with our internet connection, we can call our ISP's
tech support number.

Using Home Network :

AS
Each computer on a network doesn't just connect to the internet - it also connects to the other
computers and devices on the network. That means you can easily share files with other computers. Some
programs even let you stream music and movies from one computer to another.
One example of this is the Home Sharing feature in iTunes.

M
These types of features are easy to set up, but it's up to you whether you
want to use them.

A home network can be wired (using Ethernet cables) or wireless


NG
(using Wi-Fi). It may also be a mixture of the two, with some devices
connecting with Ethernet and others connecting wirelessly. Wireless is
generally more convenient; however, you'll need to think about wireless
security.
PI
Following are some important security terms that you'll need to know:
A service set identifier (SSID): Commonly called the SSID, is the name of a wireless network. You should
TY

change the default SSID to something unique that you'll remember. You may not want to use your actual
name, but you can use a hobby or other interest.

Encryption password: An encryption password is a series of characters that is used to control access to the
network. For even greater security, some people use a passphrase, which is longer (and therefore more secure)
L

than a password. You should choose a password or passphrase that's easy for you to remember, but hard for
other people to guess.
SA

Encryption: Encryption prevents unauthorized people from reading the data that is transmitted over our
wireless network. The data is coded into an unreadable form, and it can only be decoded by a computer that
has the correct password (or passphrase). The most common types of encryption for wireless networks are
ER

WPA (Wi-Fi Protected Access) and WPA2.


Although it's possible to create a wireless network that doesn't have a password, it is very risky. We
should always create a password or passphrase to protect it from unauthorized access.
IV

Setting Up a Home Network :


Before we set up our home network, we will need to have a working internet connection. The exact process
of creating a network will vary depending on what type of computer we have, as well as what type of internet
UN

service we have. We should use the instructions provided by your ISP when setting up our network. The
following steps will give us an idea of what to expect:
1. If we have a separate router, connect it to the modem, and make sure it has power through the power
adapter. If we have a combined router/modem, we won't have to do this.
2. Connect all non-wireless devices to our router using Ethernet cables. We may also need to connect our
computer to the router until setup is complete, even if our computer has a wireless card.

Internet & Networking Basics 6


Universal Typing Master

3. From our computer, we will need to create the SSID and


password (or passphrase) for our router. We now have a
wireless network that we can begin connecting wireless
devices to.

R
4. On each wireless device, we will need to go to our network
settings and select the name (SSID) of the network that we just

TE
created. We will then be prompted to type in our password.
At this point, our home network setup is complete. If our
network isn't working, the instructions from our ISP should
include some troubleshooting tips. We can also call our ISP's

AS
tech support number if we are still having trouble.

M
Browser Basics: To get the most out of our web browser, there are some basic concepts that we need to
be familiar with, including navigation, downloading, bookmarking, tabbed browsing, and plug-ins.
A web browser is the tool that we use to access the World Wide
Web. In order to get the most out of the Web, it's important to
understand the various features of a browser.

Today, Chrome and Internet Explorer are the most


NG
popular web browsers. Other browsers include Firefox, Safari,
PI
and Opera. Each one has its own look and feel, but they have the
same goal: to display web pages correctly. For most web pages, any
well-known browser will work.
TY

Like most modern programs, browsers use a Graphical


User Interface (GUI), which means we can navigate by pointing
and clicking with a mouse instead of just typing. Some devices such
as mobile phones use different types of GUIs, such as touchscreens. However, many of the principles remain
the same.
L

Navigating to a Web Site : To get the most out of our web browser, there are some basic concepts that
SA

we need to be familiar with


Address Bar: Browsers have an address bar that shows the web address (also called a URL) of the page we
are on. To go to a different page, we can type an address in the address bar and then press Enter (or Return).
Most of the time, we will get to a different page by clicking on a link. A link can be text or an image, and it's
ER

usually formatted to stand out so we know to click on it. Many text links are blue, and they may also be
underlined.
A link may lead to another web page, or it could lead to a document, video, or any other type of file. If we are
not sure if something's a link, wait the mouse over it. The pointer should change to a hand symbol.
IV

Navigation Buttons: Sometimes, after we click on a link, we might want to go back to the previous page. We
can do this using our browser's Back button. Once we have pressed the Back button, we can press the Forward
UN

button to follow the link again.


The Back and Forward buttons : When we use the Back and Forward buttons, our browser may use its
web cache to display the page. The web cache stores recently-viewed web pages so that they don't need to be
downloaded again. That's usually good because it speeds up our web browsing, but sometimes we want to see
the most up-to-date information on the page. We can use the Refresh button (sometimes called Reload) to
tell the browser to load the page again.

Internet & Networking Basics 7


Universal Typing Master

Back
Button

R
Forward Refresh Home Address Adding to Viewing

TE
Button Button Button Bar Bookmark Downloading History

AS
The Refresh button : There are some instances where we don't want to use the navigation buttons. For
example, in some online stores, we shouldn't refresh the page after purchasing an item, as it could cause us to
purchase the item twice.
Search Bar : Some browsers have a built-in search bar for performing web searches. However, many

M
browsers have combined the address bar and the search bar into a single bar where you can type web addresses
or search terms. Some websites may track our activities online, usually for marketing purposes. It's also
possible to encounter malicious sites that could harm our computer.
Adding Bookmarks

NG
If you've found a page you'd like to go back to later, you can add it to your bookmarks (sometimes called
favorites). Bookmarks make it easier to find a page later on. Instead of having to remember the exact web
address, you can just scroll through your bookmarks until you see the name of the page.
• In Internet Explorer 9, you can add a bookmark by clicking the star icon and then selecting Add to
PI
Favorites. Other browsers are similar, but they may use different wording.

Browsing History : Suppose we visited a page a few days ago but forgot to bookmark it. We can find the
TY

page again by using our history, which is a list of web sites we have visited. Usually, pages will stay in the
history for a certain number of days. To maintain privacy, we can delete our history at any time.

Tabbed Browsing : Many browsers allow you to open a link in a new tab. This allows you to keep the current
page open instead of going directly to the new page. For example, if we are reading an article that has a link
L

in it, we can open the link in a new tab so that we can finish reading the article. Then, we can go to the new
tab to view the link. Tabs are designed to make browsing more convenient. We can open as many links as
SA

we want, and they'll stay in the same browser window instead of cluttering up our screen with multiple
windows.
• To open a link in a new tab, right-click the link and click Open in new tab (the wording may vary from
browser to browser). To close a tab, click the "X" on the tab.
ER

Downloading Files : Our browser can display many different types of documents, media, and other files. But
there are times when we want to access a file outside our browser. Downloading enables us to do this by
putting the file on our computer so that we can access it.
IV

For example, suppose you needed to complete and print a form that we found online. We could download it
to our desktop, then open it with the appropriate program (such as Microsoft Word) to edit it.
To download a file we have to click on a link to a file, it may download automatically, but sometimes it just
UN

opens within our browser instead of downloading. To prevent it from opening in the browser, we can right-
click the link and select Save Target As... (different browsers may use slightly different wording). You'll be
able to choose the folder where the file is saved.

Internet & Networking Basics 8


Universal Typing Master

Search Engines and Strategies: With billions of web pages on the World Wide Web, how can we find
exactly what we are looking for? For that we always need a search engine.
Search engines are specialized web sites that help us to find what we are looking for on the Web. All we have
to do is type in one or more keywords, and the search engine will look for matching web sites from all over

R
the Web.
There are numerous search engines out there, but the most popular ones are Google, Yahoo, and Bing.

TE
Each one has its own unique features, but the
process of doing a search is very similar on each.

Using the Search Bar: Many browsers have a Search

AS
built-in search bar, located to the right of the Bar Tabs

address bar. To do a search, just type what we are


looking for (known as the search terms) in the
search bar, and then press Enter. The browser will

M
then take us to the search engine's web site to show
the search results, which is a list of all of the web
sites that contain our search terms. Many browsers Related
allow you to add to or change the search engines Search

used by the search bar.

Assessing the Search Results :After we do a


NG Bar

search, glance over the first page of search results.


PI
Did it return what we are looking for, or is it just a
lot of unnecessary "junk"? If our search results don't
seem very good, we may need to try different search terms. Remember, the search engine can't read our
TY

mind; it just looks for matching words. For example, if we just search for the word polish, the search engine
doesn't know whether we are looking for shoe polish or a history of the Polish language! We could improve
our search results by searching for shoe polish. However, that still may return a wide variety of web sites,
such as:
• Stores that sell shoe polish, • Guides on how to polish shoes, • The history of shoe polish, • And probably
L

much more. To get the best results, ask yourself, What exactly am I looking for? Specific terms usually
return better results.
SA

Related Searches : A search engine will often recommend related searches that may be more specific than
the search terms we used. Related searches are usually listed at the bottom of the page. Bing also lists them to
the left of the search results.
ER

Advertisements : Search engines may include advertisements along with the search results. These ads are
picked by the search engine based on our search terms, and they look a lot like the actual search results. While
they may be useful in some cases, it's usually more effective to focus on the "regular" search results.
Google puts its ads at the top and to the right of the search results.
IV

Improving Your Searches :As we gain experience with search engines, we will be able to do better and better
searches, which means it will become quicker and easier to find what we are looking for. If we are looking for
UN

news articles, images, videos, or online stores? We can use a specialized search to search for a specific type
of content. For example, if we do an image search, the search will find and display images for us, instead of
finding links to pages that may or may not have relevant images.
Generally, a search engine will include links at the top of the page to go to the specialized searches.

Internet & Networking Basics 9


Universal Typing Master

Introduction to Email : We may know that email (electronic mail) is a


way to send and receive messages across the internet, but we don’t know
how individual emails are sent or what they cost or how email compares to
traditional "snail" mail?

R
Email is usually packaged with a calendar, address book, instant
messaging and more for convenience and productivity. If we want to sign up

TE
for accounts like Facebook, or order products from services like Amazon, we
will need an email address, so we can be safely identified and contacted. Email
service providers have tools that allow us to file, label, prioritize, find, group
and filter our emails for easy management. We can even easily control spam,

AS
or junk email.

Uses of Email: Following are the uses of Email


1) To Access to Web Services: We can access any web

M
service by using Email.
2) To Communicate with Multiple People : We can send
an email to multiple people at once allowing us the option
of having a conversation with several people or sending
out a message to a hundred.
NG
3) Privacy: Our email is delivered to our own personal and
private account with a password required for accessing and
viewing emails.
PI
4) Access Anywhere at Anytime: We don't have to be at
home to get our email. We can access it from any computer
or mobile device that gets an internet connection.
TY

5) For Marketing: Now a Days Email marketing is best marketing service to brand our product.

Understanding Email Addresses: To receive emails, we need an email account and an email address. Also,
if we want to send emails to other people, we need to obtain their email addresses. It's important to learn how
to write email addresses correctly, because if we do not enter them exactly right, our emails will not be
L

delivered or they might be delivered to the wrong person.


Email addresses are always written in a standard format that includes a username, the @ (at) symbol and the
SA

email provider's domain. The username is the name you choose to identify yourself and the email provider
is the website that hosts our email account.
Example :1)[email protected] (vision.education is user name and gmail.com is a domain)
2) [email protected] (monavamde522 is user name and yahoo.com is a domain)
ER

Usernames often contain numbers and shortened versions of a name to prevent duplicates.
Some businesses and organizations provide emails with their own website domain
Ex. - [email protected]
IV

Email Providers : In the past, people usually received an email account from the same companies that
provided their internet access. For example, if AOL provided our internet connection, we have an AOL email
UN

address. While this is still true for some people, today it's increasingly common to use a free web-based email
service, also known as webmail. Anyone can use these services, no matter who provides their internet access.
Today, the top three webmail providers are Yahoo!, Microsoft's Hotmail, and Google's Gmail. These
providers are popular because they allow us to access our email account from anywhere with an internet
connection. We can also access webmail on our mobile devices.

Internet & Networking Basics 10


Universal Typing Master

Other Email Providers : Many people also have an email address hosted by their company, school, or
organization. These email addresses are usually for professional purposes. For example, the people who work
for this website have email addresses that end with @ citybridgesoftwares.org. If we are a part of an
organization that hosts our email, they will show us how to access it.

R
Many hosted web domains end with a suffix other than .com. Depending on the organization, our provider's
domain might end with a suffix like .gov (for government websites), .edu (for schools), .mil (for military) or

TE
.org (for non-profit organizations).

Information Management Software : Many companies and organizations use an information management
application, like Microsoft Outlook, for communicating and managing their email. This software can be used

AS
with any email provider, but is most commonly used by organizations that host their own email.

Email Productivity Features : In addition to email access, webmail providers also offer various tools and
features. These features are part of a productivity suite—a set of applications that help you work,

M
communicate, and stay organized. Example - Instant messaging, or chat: Which lets us have text-based
conversations with other users.

Getting Started With Email : When we are ready, we can try one or both of the following:
Get our Own Email Account:
NG
If you want to sign up for our own email account, we can use from one of the three major webmail providers.
Clock on the links below to sign up for an email account:
• Yahoo! Mail: Click Create New Account
• Hotmail: Click Sign Up Now.
PI
• Gmail: Click Create an account.
TY

Creating an Email Account: Follow the following steps to create an Email Account
In Mozilla Firefox or Google Chrome Visit the web site "www.google.com"
 Click on link Gmail
 Click on link use another account
 Then click on link Create account
L

 Click on for myself and Fill your details


SA

 And click on Next then again fill the details with your mobile no.
 And click send
 Then click on verify and now write the OTP you have received on your mobile no.
 And now click on Yes I am in.
ER

 Then click on I agree.


 Then click on next and then ok.
 Then sign out from your account.
IV
UN

Internet & Networking Basics 11


Universal Typing Master

R
Step 3

TE
Step 2
Step 1
Step 4

AS
Understanding the Email Interface: No matter what email service we choose, we need to learn how to
interact with an email interface, including the inbox, the Message pane and the Compose pane. Depending
on the email provider, the interface may look and feel different, but they all function in essentially the same

M
way.
 Inbox : The inbox is where we will view and manage emails we have received. Emails are listed with the
name of the sender, the subject of the message and the date received.


NG
Message Pane : When we select an email in the inbox, it will open in the Message pane. From here, we
can read the message and choose how to respond with a variety of commands.

 Compose Pane: We can click the Compose or New button from our inbox to open the Compose pane
PI
to create our own email message. From here, we need to enter the recipient's email address and a subject.
We also have the option to upload files (photos, documents, etc.) as attachments and add formatting to
the message.
TY

 Sending the email: After composing the email with all details and attachment click on send option to send
the email. We can see our sent emails in Outbox or Sent option.

The attachment (Attached file or document) sent with the email is known as Uploading. And seeing the
L

received email attachment is known as downloading.


SA
ER
IV
UN

Internet & Networking Basics 12


Universal Typing Master

Introduction to Networking :
Computer networking refers to connected computing devices (such as laptops, desktops, servers, smartphones,
and tablets) and an ever-expanding array of IoT devices (such as cameras, door locks, doorbells, refrigerators,

R
audio/visual systems, thermostats, and various sensors) that communicate with one another. In Networking
the main computer on network is called as Server Computer and other connected computers are called

TE
as client computer or Node computer.

Specialized devices such as switches, routers, and access points form


the foundation of computer networks. Switches connect and help to

AS
internally secure computers, printers, servers, and other devices to
networks in homes or organizations. Access points are switches that
connect devices to networks without the use of cables.

M
Routers connect networks to other networks and act as dispatchers.
They analyze data to be sent across a network, choose the best routes
for it, and send it on its way. Routers connect your home and business
to the world and help protect information from outside security threats.
NG
While switches and routers differ in several ways, one key difference is how they identify end devices. A
Layer 2 switch uniquely identifies a device by its "burned-in" MAC (Media Access Control ) address. A
Layer 3 router uniquely identifies a device's network connection with a network-assigned IP (Internet
PI
Protocol) address.

Today, most switches include some level of routing functionality. MAC and IP addresses uniquely define
TY

devices and network connections, respectively, in a network. A MAC address is a number assigned to a
Network Interface Card (NIC) by a device's manufacturer. An IP address is a number assigned to a network
connection.

Types of Networks:
L
SA

1. LAN (Local Area Network) : LAN is a collection of connected devices in one


physical location, such as a home or an office. A LAN can be small or large,
ranging from a home network with one user to a large enterprise network with
thousands of users and devices. A LAN may include both wired and wireless
devices. Regardless of size, a LAN's particular characteristic is that it connects
ER

devices that are in a single, limited area.

2. WAN (Wide Area Network) :A WAN extends over a large


geographical area and connects individual users or multiple LANs. The
IV

Internet can be considered a WAN. Large organizations use WANs to


connect their various sites, remote employees, suppliers, and data
centers so they can run applications and access necessary data.
UN

Physical connectivity in WANs can be achieved by leased lines,


cellular connections, satellite links, and other means.

Internet & Networking Basics 13


Universal Typing Master

3. Enterprise Network : A network built for a large organization, typically


called an enterprise, needs to fulfill exacting requirements. Since networking
is crucial for any modern enterprise to function, enterprise networks must be
highly available, scalable, and robust. These networks have tools that enable

R
network engineers and operators to design, deploy, debug, and remediate
them.

TE
An enterprise may use both LANs and WANs across its campus, branches,
and data centers.

4. Service Provider network: Service providers operate WANs to provide

AS
connectivity to individual users or organizations. They may offer simple
connectivity, in the form of leased lines, or more-advanced, managed
services to enterprises. Service providers also supply Internet and cellular
connectivity to their customers.

M
Types of networking : There are two primary types of computer networking 1) Wired networking and 2)
Wireless networking.

NG
1) Wired networking : Wired networking requires the use of a physical medium
for transport between nodes. Copper-based Ethernet cabling, popular due to its low
cost and durability, is commonly used for digital communications in businesses
and homes. Alternatively, optical fiber is used to transport data over greater
PI
distances and at faster speeds, but it has several tradeoffs, including higher costs
and more fragile components.
TY

2) Wireless networking: Wireless networking uses radio waves to transport data


over the air, enabling devices to be connected to a network without any cabling.
Wireless LANs are the most well-known and widely deployed form of wireless
networking. Alternatives include microwave, satellite, cellular and Bluetooth,
among others.
L

As a general rule, wired networking offers greater speed, reliability and security
SA

compared to wireless networks; wireless networking tends to provide more


flexibility, mobility and scalability.

It should be noted that these types of networking concern the physical layer of the network. Networking can
ER

also be classified according to how it's built and designed, encompassing approaches that include Software-
Defined Networking (SDN) or overlay networks. Networking can also be categorized by environment and
scale, such as LAN, campus, WAN, data center networks or storage area networks.
IV

Components of networking:

Computer networking requires the use of physical network infrastructure -- including switches, routers and
UN

wireless access points -- and the underlying firmware that operates such equipment. Other components include
the software necessary to monitor, manage and secure the network.

Additionally, networks rely on the use of standard protocols to uniformly perform discrete functions or
communicate different types of data, regardless of the underlying hardware.

Internet & Networking Basics 14


Universal Typing Master

For example, Voice over Internet Protocol (VoIP) can transport IP telephony traffic to any endpoint that
supports the protocol. HyperText Transfer Protocol (HTTP) provides a common way for browsers to display
webpages. The internet protocol suite, also known as Transmission Control Protocol/Internet Protocol
(TCP/IP) is a family of protocols responsible for transporting data and services over an IP-based network.

R
What Is Network Policy: Network policy is a collection of rules that govern the behaviors of network

TE
devices. Just as a federal or central government may lay down policies for state or districts to follow to achieve
national objectives, network administrators define policies for network devices to follow to achieve business
objectives.

AS
Benefits of network policy :A network that runs on policies can be automated more easily and therefore
respond more quickly to changing needs. Many common tasks, such as adding devices and users and inserting
new applications and services, can now be easily accomplished. Well-defined policies can benefit a network
in the following ways:

M
 Align the network with business needs
 Provide consistent services across the entire infrastructure


Bring agility through greater automation
Make performance dependable and verifiable NG
An even bigger advantage to enterprises is the security gains from policy. By granularly defining policies that
give users and devices the least amount of access to resources that they need to do their jobs, you can better
PI
protect sensitive data. Violations can be caught and mitigated quickly. Such zero-trust security measures
reduce risk, contain threats, stop lateral movement of malware, and help verify regulatory compliance.
TY

A network that follows well-defined policies capably fills business needs that it is designed to support. Think
of network policies as objectives or goals. Without clear objectives, your network can't be set up to deliver
optimally, and without goals, its performance can't be measured.

Business intent and agility: Network policies reflect business intent. Network controllers ingest business
L

intent and create policies that help achieve the desired business outcomes. Policies are enforced and carried
SA

out by network equipment such as switches, routers, wireless access points, and wireless LAN controllers.
Networks operated in an ad hoc fashion, without guiding policies, will likely fail to deliver optimally.

Consistency of experience: Well-executed policies in the network provide consistency of service throughout
it, regardless of locations, means of connectivity, or devices in use. This means users and things can use the
ER

network from anywhere and still have the same access privileges and quality of network experience.

Network automation: Network devices and their operations can be better automated when guidance exists.
With policies, configurations can be automated and orchestrated so that each device does what's required to
IV

achieve the larger objectives.

Performance monitoring: Once well-understood goals are defined, metrics can be established to measure
UN

how the network is delivering. Continuous analysis of performance helps ensure that policies are being
followed and business objectives are being met.

Network security: With policies in place, any violations can be easier to detect. Security is more easily
enforced, threats more quickly contained, and risk rapidly reduced with security-related policies.

Internet & Networking Basics 15


Universal Typing Master

Following are some questions that frequently asked in exam on Internet & Networking

Sr.
Question Answer
No

R
1 You can send _____________ with E-Mail, by uploading it. Attachment
_____________ is a Microsoft's web Browser that install with windows

TE
2 by default. Internet Explorer
If we have used Backward arrow, we can switch to the next webpage by
3 using _____________ Forward Arrow
If you move the mouse pointer on hyper-links, the pointer changes its

AS
4 shape to a _____________ Hand
5 To go to previous page ___________ key is used in Internet Explorer. Backspace
6 Internet standard domain country code is used by India. .in
Process of saving files to your computer from the internet is called

M
7 ___________ Downloading
8 ___________ Button is used to reopen the web page on the Browser. Refresh
9 You need to pay for sending and receiving e-mails. FALSE
10
11
NG
______________ is necessary to connect our Computer with Internet.
It is possible to forward E-Mail, by clicking of forward button?
If we want to reply any mail then we need to click on ______________
Modem
It is possible

12 button Reply
PI
The client PCs can communicate with each other within the network
13 through ______________ only. Server
We can use internet for ______________ All of above
TY

14
15 Web page has a unique address, which is called ______________ URL
To connect computer is online, it is to ready to send data or receive data
16 from other devices. Modem
When a computer is online, it is to ready to send data or receive data
L

17 from other devices TRUE


The word "Modem" is shortcut of ______________ and Modulation and
SA

18 ______________. Demodulation
Network programs and
19 The special computer that stores a ______________ is called a server. data
20 Which of the following is not required in order to send E-Mail? Webpage
ER

21 ______________ is the most common internet protocol. TCP/IP


22 Browser is a software program for getting information from the WWW. TRUE
23 We can send one E-Mail to ______________ at a time. Many address
IV

Communication in between computers can be established with the help


24 of All of above
25 Using ______________ we can search the Web Site. Search engine
UN

26 E-mail is medium of ______________ Communication


______________ is text which is automatically inserted at the bottom
27 of every E-Mail. Signature
28 Gopher is an internet ______________ Search tool
29 E-Mails sent to other accounts are shown in ______________ menu. Sent Item

Internet & Networking Basics 16


Universal Typing Master

30 You look a www documents using _______________ All of Above


31 A domain name ending with ".gov" is _______________ Government Web Site
32 What is a web Browser? E-Mail client software

R
33 Data in _______________ Cable is transferred through light pulses. Fiber Optic
The equipment need to allow most computers to connect internet is
34 called _______________ Modem

TE
35 Attachment buttons show _______________ icon on it. U pin
36 Number of default web Browser is _______________ One
We can use _______________ to open the webpage we have previously

AS
37 visited. Backward Arrow
With the help of _______________ We connect computer and
38 telephone. Modem
39 Which of the terms as Browser? E-Mail client software

M
40 We can visit another webpage by using _______________ Hyperlinks
41 Every Web Site has a unique address. Which is called? URL
42 _______________ is Web Browser software. Internet Explorer
43
44
45
NG
Files send with E-Mail are called _______________
Deleted E-Mails are permanently removed from E-Mail account.
The _______________ in network is called as Server.
Attachments
Never
Main Computer
46 The internet is a _______________ Network of Networks
PI
With _______________ System people from different locations can Video Conferencing
47 discuss with each other like meeting. System
48 _______________ is an example of Application Software. Browser
TY

49 E-Mail is used to communicate over the internet. TRUE


50 Passwords show in ______________ on the screen. Black dots
51 Which one of the following is the most common internet protocol? TCP/IP
52 Deleted E-Mails are shown in ______________ menu. Trash
L

53 Hypertext is text with many images and sounds. FALSE


SA

54 Forwarding E-Mail means sending ______________ Received E-Mail


We can send E-Mail to multiple accounts by typing all E-Mail id
55 ______________ Separated. Comma (,)
56 Which of the following is used to search content online? Search Engine
ER

57 Which Software below is an E-Mail Client? Gmail


58 Internet Explorer is developed by ______________ Microsoft
59 It is possible to reply received E-Mail. TRUE
All modems are located inside the computer. FALSE
IV

60
While composing E-Mail, we ______________ need to type the E-Mail
61 id. Always
UN

Software such as internet explorer and Firefox, are referred as


62 ______________ Browser
HTTP is the protocol, to transfer the data in the form of
63 ______________ Text
64 An E-Mail program's can stored E-Mail addresses in ______________ Address Book
65 You can get infected by a virus via ______________ Both A and B

Internet & Networking Basics 17


Universal Typing Master

66 What type of software is web Browser? Application Software


67 We can edit mail before forwarding. TRUE
68 A Web Site is a complete collection of webpages and folders. TRUE
It’s not possible

R
69 Is it possible to reply to E-mail, by clicking on forward button?
To send E-mail to someone, we need to type E-Mail id in ___________
70 box. To

TE
71 It is a possible to send as well as received attachments by mail. TRUE
Browser is a software program for getting information from the
72 ___________ World Wide web

AS
73 To show Large Network site ___________ domain code is used. net
74 Destructive programs attached to spam E-Mail are called ___________ Viruses
The world wide interconnected system of a computer networks is called
75 ___________ Internet

M
76 URL is nothing but a ___________ Web address
77 The internet works on ___________ Packets
78 Internet is ___________ Type of network. WAN

79
80
host. NG
A File download means moves a copy of file on local host to remote

E-Mail received us is shown in ___________ Menu.


FALSE
Inbox
The client PCs can communicate with each other within the network
PI
81 through server only. TRUE
82 ___________ is an E-Mail program. Outlook express
83 What allows to create a webpage with interactive content? C
TY

Interconnected
84 Internet is collection of ___________ networks
85 Data in a fiber-optic cable is transferred through Light pulses
86 Is it possible to forward E-Mail, by clicking on composed button? It's not possible
L

87 A File download means moves a copy of the file from ___________ Web Site to computer
In Internet Explorer we can see recently visited web sites using
SA

88 ___________ Option on list toolbar. History


89 Is it possible to delete E-Mail, by clicking on delete button? It is possible
90 ___________ system is use send electronic message. E-mail
Using ___________ will help you to get to web sites without typing the
ER

91 address. Search Engine


92 Browser is a software program for getting information from the www. TRUE
93 In e-mail message ___________ part is very important. E-Mail Address
IV

94 Which one of the following is correct E-Mail address? [email protected]


95 Internet is _____________ system of network. World wide
96 Which one of the following is not a web Browser? Windows Explorer
UN

Server gives the permission to client to share _____________ the


97 networks. Resources
Domain name and
98 Separation of _____________ is done by Dot (.) Domain Code
From _____________ we can recover E-Mail, those are deleted from
99 inbox. Trash

Internet & Networking Basics 18


Universal Typing Master

100 A domain name ending with ".net" is _____________ A network site


101 Internet is the _____________ in the world. Largest Network
A _____________ is a program that provides tools for accessing web
102 sites. Web Browser

R
The software that finds documents for us on the web using keywords
103 _____________ Search Engine

TE
104 Moving from one Web Site to another is called as _____________ Surfing

AS
M
NG
PI
TY
L
SA
ER
IV
UN

Internet & Networking Basics 19

You might also like