Internet and Browsing
Internet and Browsing
PAGE
SR.NO. CONTENTS
R
NO.
1. Introduction to Internet, The concept World Wide Web 2
TE
(WWW)
2. Uses of the Internet 3
3. Choosing an Internet Service 4
AS
4. Hardware Needed to use internet 5
5. Setting Up Your Internet Connection, Using Home Network 6
6. Browser Basics, Navigating to a Web Site 7-8
M
7. Search Engines and Strategies 9
8. Introduction to Email 10
9. Introduction to Networking and Types of Networks 13
10.
11.
12.
What Is Network Policy NG
Types of networking, Components of networking
Introduction to Internet:
The Internet is a global network of billions of computers and other electronic devices. With the Internet, it's
possible to access almost any information, communicate with anyone else in the world, and do much more.
R
You can do all of this by connecting a computer to the Internet, which is also called going online. When
someone says a computer is online, it's just another way of saying it's connected to the Internet.
TE
The foundation of the internet began in 1969, when the US Department of Defense created ARPAnet,
a project to allow military personnel to communicate with each other in an emergency. By 2012, the number
of internet users worldwide reached 2.4 billion—about one third of the world's population. To store all of the
AS
information on the internet, you would need over 1 billion DVDs or 200 million Blu-ray discs.
The internet is the largest computer network in the world, connecting millions of computers. A
network is a group of two or more computer systems linked together.
M
It's no secret that more and more the internet is
becoming an integral part of our everyday lives. But if we are
new to the online experience, it may be a bit overwhelming.
In the early days, most people just used the internet to search
NG
for information. Today's internet is a constantly evolving tool
that not only contains an amazing variety of information, but
also provides new ways of accessing, interacting and
connecting with people and content. As a result, new terms
PI
are constantly appearing as new technologies are introduced.
someone say something like "The server is down" or "We're having problems
with the e-mail server." A server is a computer that "serves" many different
computers in a network by running specialized software and storing
information. For example, web pages are stored on servers. When you access
a web page, your computer is acting as a client. A client runs familiar software
L
such as web browsers or email software, and it communicates with the server
to get the information it requires. In order for your browser to display a web
SA
page, it requests the data from the server where the page is stored. The server
processes the request, then sends the data to your browser, where it is
displayed.
In peer-to-peer (P2P) networks, each computer acts as both a server and a client. Examples of P2P software
ER
World Wide Web. Nowadays, the terms "internet" and "World Wide Web" are often
used interchangeably—but they're actually not the same thing. The internet is the
physical network of computers all over the world. And the World Wide Web is a
UN
virtual network of web sites connected by hyperlinks (or "links"). Web sites are
stored on servers on the internet, so the World Wide Web is a part of the internet.
The World Wide Web was created in 1989 by Tim Berners-Lee, a software
engineer. Before then, computers could communicate over the internet, but there were no web pages.
HTML (HyperText Markup Language) : The backbone of the World Wide Web is made
of HTML files, which are specially-formatted documents that can contain links, as well as
images and other media. All web browsers can read HTML files. In addition to HTML, it's
also very common for websites to use technologies like CSS (Cascading Style Sheets) and
R
JavaScript to do more advanced things.
TE
URL (Uniform Resource Locator) : To get to a web page, we can type the URL in a
browser. The URL, also known as the web address, tells the browser exactly where to
find the page. However, most of the time, people get to a web page by following a link
from a different page or by searching for the page with a search engine.
AS
Uses of the Internet
For Communication: The internet isn't just about finding information. It's also
about connecting with friends, family, and people you've never met before. Today,
M
there are many different ways to communicate online, including social networking,
chat, VoIP, and blogging.
NG
Social Networking : Social networking has become one of the main ways people
keep in touch. Below are a few of the most popular social networking sites:
Facebook is used by about one billion people. If you have family or friends that
live far away, you can use Facebook to keep up with their lives. You can also share
things you've found online that interest you. Twitter lets you share brief messages
PI
(or "tweets") with the entire world, or with just your circle of friends. By following
people with similar interests, you can discover new things that you wouldn't have
found otherwise. LinkedIn is a site that you can use for business networking. It
TY
allows you to connect with other people in your field and find out about new job opportunities.
Chat and Instant Messaging : Chat and instant messaging programs allow you to have conversations
with your friends or just write them a quick note. Two examples are Yahoo! Messenger and Microsoft
Messenger. Some sites, such as Gmail and Facebook, allow you to chat within your browser.
L
SA
VoIP (Voice over Internet Protocol): VoIP allows you to have telephone service through your internet
connection. Some services also let you do video conferencing, such as Skype and Facebook Video
Calling. Many of these services are free or very inexpensive, and some people use them as a replacement
for a landline, or just to save minutes on their mobile phones.
ER
Blogs : Today, the average user has the ability to shape the
web by adding to it. If you have knowledge or interests that
you're passionate about, you can create your own blog and
share your thoughts with the world.
IV
Media on the Internet : TV, radio, and the internet used to be completely separate things, but that's no
longer true with today's technology. You can now watch TV shows on your computer, and you can
connect to the internet on many TVs and DVD/Blu-ray players. In addition, you can listen to online radio
from all over the world, thus granting you greater access to a more diverse range of media.
Streaming Media: TV and radio on the internet are examples of streaming media, which means the
R
media downloads while it's playing so you don't have to wait for it to download first. Not all media is
streaming. If you've ever bought music on the iTunes store, you probably had to wait for it to download
TE
before you could listen to it.
Media Players and Embedded Media: Media is often embedded in a web page, which means that it
plays within the web browser. Other times, you'll use a separate program called a media player to play
AS
it. Examples include Windows Media Player and iTunes. An iPod contains built-in media player
software that can play various types of files.
Online Media on Your TV : You can now access online TV shows, movies, and music on your TV.
M
Many newer TVs are able to connect to an existing internet connection. If yours doesn't have this feature
built-in, you can buy a separate digital media receiver, which is a small device that connects to your TV.
Apple TV and Roku are two examples of digital media
receivers. Many game consoles, such as the Xbox 360 and
NG
PlayStation 3, can also be used to access online content.
networking, a slower connection might be all you need, but if you want to download a lot of music or watch
SA
streaming movies, you'll want a faster connection. You'll need to do some research to find out what the
options are in your area.
Choosing an Internet Service Provider (ISP) : Once you have decided which type of internet access you
ER
are interested in, you can determine which ISPs are available in your area that offer the type of internet access
you want. Then, you will need to purchase internet service from one of the available ISPs. Talk to friends,
family members, and neighbors to see what ISP they use.
Below are some things to consider as you research ISPs:
• Speed
IV
• Price
• Ease of Installation
• Service Record
UN
• Technical Support
• Contract Terms
Although dial-up has traditionally been the cheapest option, many ISPs have raised dial-up prices to be the
same as broadband. This is intended to encourage people to switch over to broadband. Generally, you should
only use dial-up if it's the only option available.
R
The type of internet access you choose will determine what type of modem
you need. Dial-up access uses a telephone modem, DSL service uses a
TE
DSL modem, cable access uses a cable modem, and satellite service uses
a satellite adapter. Your ISP may give you a modem (often for a fee)
when you sign a contract with them, which helps to ensure that you have
the right kind of modem. However, if you would prefer to shop for a
AS
better or cheaper modem, then you can choose to buy one separately.
M
known as a home network. Many routers are wireless, allowing you to
easily create a wireless network. You don't necessarily need to buy a
router to connect to the internet.
It's possible to connect your computer directly to your modem using an
NG
Ethernet cable. Also, many modems now include a built-in router, so you
have the option of creating a network without having to buy more hardware.
Most routers also act as a hardware firewall, which helps prevent people
from gaining access to your computer through the internet.
PI
A network card: A network card is a piece of hardware that allows
computers to communicate over a computer network. Most newer computers
TY
businesses offer free Wi-Fi. In addition, many cities provide free Wi-Fi in
public areas such as parks and downtown areas.
SA
Web Browsers : A web browser is the tool that you use to access the
World Wide Web. The browser's main job is to display web pages. It
also lets you create Bookmarks (sometimes called Favorites) for sites
ER
you like, so that you can easily find them again later. The World Wide
Web is a virtual network of web sites connected by hyperlinks (or
"links"). Web sites are stored on servers on the internet, so the World
Wide Web is a part of the internet.
IV
R
technician to our house in order to turn the connection on. After we have
everything set up, we can open our web browser and begin using the internet.
TE
If we have any problems with our internet connection, we can call our ISP's
tech support number.
AS
Each computer on a network doesn't just connect to the internet - it also connects to the other
computers and devices on the network. That means you can easily share files with other computers. Some
programs even let you stream music and movies from one computer to another.
One example of this is the Home Sharing feature in iTunes.
M
These types of features are easy to set up, but it's up to you whether you
want to use them.
change the default SSID to something unique that you'll remember. You may not want to use your actual
name, but you can use a hobby or other interest.
Encryption password: An encryption password is a series of characters that is used to control access to the
network. For even greater security, some people use a passphrase, which is longer (and therefore more secure)
L
than a password. You should choose a password or passphrase that's easy for you to remember, but hard for
other people to guess.
SA
Encryption: Encryption prevents unauthorized people from reading the data that is transmitted over our
wireless network. The data is coded into an unreadable form, and it can only be decoded by a computer that
has the correct password (or passphrase). The most common types of encryption for wireless networks are
ER
service we have. We should use the instructions provided by your ISP when setting up our network. The
following steps will give us an idea of what to expect:
1. If we have a separate router, connect it to the modem, and make sure it has power through the power
adapter. If we have a combined router/modem, we won't have to do this.
2. Connect all non-wireless devices to our router using Ethernet cables. We may also need to connect our
computer to the router until setup is complete, even if our computer has a wireless card.
R
4. On each wireless device, we will need to go to our network
settings and select the name (SSID) of the network that we just
TE
created. We will then be prompted to type in our password.
At this point, our home network setup is complete. If our
network isn't working, the instructions from our ISP should
include some troubleshooting tips. We can also call our ISP's
AS
tech support number if we are still having trouble.
M
Browser Basics: To get the most out of our web browser, there are some basic concepts that we need to
be familiar with, including navigation, downloading, bookmarking, tabbed browsing, and plug-ins.
A web browser is the tool that we use to access the World Wide
Web. In order to get the most out of the Web, it's important to
understand the various features of a browser.
Navigating to a Web Site : To get the most out of our web browser, there are some basic concepts that
SA
usually formatted to stand out so we know to click on it. Many text links are blue, and they may also be
underlined.
A link may lead to another web page, or it could lead to a document, video, or any other type of file. If we are
not sure if something's a link, wait the mouse over it. The pointer should change to a hand symbol.
IV
Navigation Buttons: Sometimes, after we click on a link, we might want to go back to the previous page. We
can do this using our browser's Back button. Once we have pressed the Back button, we can press the Forward
UN
Back
Button
R
Forward Refresh Home Address Adding to Viewing
TE
Button Button Button Bar Bookmark Downloading History
AS
The Refresh button : There are some instances where we don't want to use the navigation buttons. For
example, in some online stores, we shouldn't refresh the page after purchasing an item, as it could cause us to
purchase the item twice.
Search Bar : Some browsers have a built-in search bar for performing web searches. However, many
M
browsers have combined the address bar and the search bar into a single bar where you can type web addresses
or search terms. Some websites may track our activities online, usually for marketing purposes. It's also
possible to encounter malicious sites that could harm our computer.
Adding Bookmarks
NG
If you've found a page you'd like to go back to later, you can add it to your bookmarks (sometimes called
favorites). Bookmarks make it easier to find a page later on. Instead of having to remember the exact web
address, you can just scroll through your bookmarks until you see the name of the page.
• In Internet Explorer 9, you can add a bookmark by clicking the star icon and then selecting Add to
PI
Favorites. Other browsers are similar, but they may use different wording.
Browsing History : Suppose we visited a page a few days ago but forgot to bookmark it. We can find the
TY
page again by using our history, which is a list of web sites we have visited. Usually, pages will stay in the
history for a certain number of days. To maintain privacy, we can delete our history at any time.
Tabbed Browsing : Many browsers allow you to open a link in a new tab. This allows you to keep the current
page open instead of going directly to the new page. For example, if we are reading an article that has a link
L
in it, we can open the link in a new tab so that we can finish reading the article. Then, we can go to the new
tab to view the link. Tabs are designed to make browsing more convenient. We can open as many links as
SA
we want, and they'll stay in the same browser window instead of cluttering up our screen with multiple
windows.
• To open a link in a new tab, right-click the link and click Open in new tab (the wording may vary from
browser to browser). To close a tab, click the "X" on the tab.
ER
Downloading Files : Our browser can display many different types of documents, media, and other files. But
there are times when we want to access a file outside our browser. Downloading enables us to do this by
putting the file on our computer so that we can access it.
IV
For example, suppose you needed to complete and print a form that we found online. We could download it
to our desktop, then open it with the appropriate program (such as Microsoft Word) to edit it.
To download a file we have to click on a link to a file, it may download automatically, but sometimes it just
UN
opens within our browser instead of downloading. To prevent it from opening in the browser, we can right-
click the link and select Save Target As... (different browsers may use slightly different wording). You'll be
able to choose the folder where the file is saved.
Search Engines and Strategies: With billions of web pages on the World Wide Web, how can we find
exactly what we are looking for? For that we always need a search engine.
Search engines are specialized web sites that help us to find what we are looking for on the Web. All we have
to do is type in one or more keywords, and the search engine will look for matching web sites from all over
R
the Web.
There are numerous search engines out there, but the most popular ones are Google, Yahoo, and Bing.
TE
Each one has its own unique features, but the
process of doing a search is very similar on each.
AS
built-in search bar, located to the right of the Bar Tabs
M
then take us to the search engine's web site to show
the search results, which is a list of all of the web
sites that contain our search terms. Many browsers Related
allow you to add to or change the search engines Search
mind; it just looks for matching words. For example, if we just search for the word polish, the search engine
doesn't know whether we are looking for shoe polish or a history of the Polish language! We could improve
our search results by searching for shoe polish. However, that still may return a wide variety of web sites,
such as:
• Stores that sell shoe polish, • Guides on how to polish shoes, • The history of shoe polish, • And probably
L
much more. To get the best results, ask yourself, What exactly am I looking for? Specific terms usually
return better results.
SA
Related Searches : A search engine will often recommend related searches that may be more specific than
the search terms we used. Related searches are usually listed at the bottom of the page. Bing also lists them to
the left of the search results.
ER
Advertisements : Search engines may include advertisements along with the search results. These ads are
picked by the search engine based on our search terms, and they look a lot like the actual search results. While
they may be useful in some cases, it's usually more effective to focus on the "regular" search results.
Google puts its ads at the top and to the right of the search results.
IV
Improving Your Searches :As we gain experience with search engines, we will be able to do better and better
searches, which means it will become quicker and easier to find what we are looking for. If we are looking for
UN
news articles, images, videos, or online stores? We can use a specialized search to search for a specific type
of content. For example, if we do an image search, the search will find and display images for us, instead of
finding links to pages that may or may not have relevant images.
Generally, a search engine will include links at the top of the page to go to the specialized searches.
R
Email is usually packaged with a calendar, address book, instant
messaging and more for convenience and productivity. If we want to sign up
TE
for accounts like Facebook, or order products from services like Amazon, we
will need an email address, so we can be safely identified and contacted. Email
service providers have tools that allow us to file, label, prioritize, find, group
and filter our emails for easy management. We can even easily control spam,
AS
or junk email.
M
service by using Email.
2) To Communicate with Multiple People : We can send
an email to multiple people at once allowing us the option
of having a conversation with several people or sending
out a message to a hundred.
NG
3) Privacy: Our email is delivered to our own personal and
private account with a password required for accessing and
viewing emails.
PI
4) Access Anywhere at Anytime: We don't have to be at
home to get our email. We can access it from any computer
or mobile device that gets an internet connection.
TY
5) For Marketing: Now a Days Email marketing is best marketing service to brand our product.
Understanding Email Addresses: To receive emails, we need an email account and an email address. Also,
if we want to send emails to other people, we need to obtain their email addresses. It's important to learn how
to write email addresses correctly, because if we do not enter them exactly right, our emails will not be
L
email provider's domain. The username is the name you choose to identify yourself and the email provider
is the website that hosts our email account.
Example :1)[email protected] (vision.education is user name and gmail.com is a domain)
2) [email protected] (monavamde522 is user name and yahoo.com is a domain)
ER
Usernames often contain numbers and shortened versions of a name to prevent duplicates.
Some businesses and organizations provide emails with their own website domain
Ex. - [email protected]
IV
Email Providers : In the past, people usually received an email account from the same companies that
provided their internet access. For example, if AOL provided our internet connection, we have an AOL email
UN
address. While this is still true for some people, today it's increasingly common to use a free web-based email
service, also known as webmail. Anyone can use these services, no matter who provides their internet access.
Today, the top three webmail providers are Yahoo!, Microsoft's Hotmail, and Google's Gmail. These
providers are popular because they allow us to access our email account from anywhere with an internet
connection. We can also access webmail on our mobile devices.
Other Email Providers : Many people also have an email address hosted by their company, school, or
organization. These email addresses are usually for professional purposes. For example, the people who work
for this website have email addresses that end with @ citybridgesoftwares.org. If we are a part of an
organization that hosts our email, they will show us how to access it.
R
Many hosted web domains end with a suffix other than .com. Depending on the organization, our provider's
domain might end with a suffix like .gov (for government websites), .edu (for schools), .mil (for military) or
TE
.org (for non-profit organizations).
Information Management Software : Many companies and organizations use an information management
application, like Microsoft Outlook, for communicating and managing their email. This software can be used
AS
with any email provider, but is most commonly used by organizations that host their own email.
Email Productivity Features : In addition to email access, webmail providers also offer various tools and
features. These features are part of a productivity suite—a set of applications that help you work,
M
communicate, and stay organized. Example - Instant messaging, or chat: Which lets us have text-based
conversations with other users.
Getting Started With Email : When we are ready, we can try one or both of the following:
Get our Own Email Account:
NG
If you want to sign up for our own email account, we can use from one of the three major webmail providers.
Clock on the links below to sign up for an email account:
• Yahoo! Mail: Click Create New Account
• Hotmail: Click Sign Up Now.
PI
• Gmail: Click Create an account.
TY
Creating an Email Account: Follow the following steps to create an Email Account
In Mozilla Firefox or Google Chrome Visit the web site "www.google.com"
Click on link Gmail
Click on link use another account
Then click on link Create account
L
And click on Next then again fill the details with your mobile no.
And click send
Then click on verify and now write the OTP you have received on your mobile no.
And now click on Yes I am in.
ER
R
Step 3
TE
Step 2
Step 1
Step 4
AS
Understanding the Email Interface: No matter what email service we choose, we need to learn how to
interact with an email interface, including the inbox, the Message pane and the Compose pane. Depending
on the email provider, the interface may look and feel different, but they all function in essentially the same
M
way.
Inbox : The inbox is where we will view and manage emails we have received. Emails are listed with the
name of the sender, the subject of the message and the date received.
NG
Message Pane : When we select an email in the inbox, it will open in the Message pane. From here, we
can read the message and choose how to respond with a variety of commands.
Compose Pane: We can click the Compose or New button from our inbox to open the Compose pane
PI
to create our own email message. From here, we need to enter the recipient's email address and a subject.
We also have the option to upload files (photos, documents, etc.) as attachments and add formatting to
the message.
TY
Sending the email: After composing the email with all details and attachment click on send option to send
the email. We can see our sent emails in Outbox or Sent option.
The attachment (Attached file or document) sent with the email is known as Uploading. And seeing the
L
Introduction to Networking :
Computer networking refers to connected computing devices (such as laptops, desktops, servers, smartphones,
and tablets) and an ever-expanding array of IoT devices (such as cameras, door locks, doorbells, refrigerators,
R
audio/visual systems, thermostats, and various sensors) that communicate with one another. In Networking
the main computer on network is called as Server Computer and other connected computers are called
TE
as client computer or Node computer.
AS
internally secure computers, printers, servers, and other devices to
networks in homes or organizations. Access points are switches that
connect devices to networks without the use of cables.
M
Routers connect networks to other networks and act as dispatchers.
They analyze data to be sent across a network, choose the best routes
for it, and send it on its way. Routers connect your home and business
to the world and help protect information from outside security threats.
NG
While switches and routers differ in several ways, one key difference is how they identify end devices. A
Layer 2 switch uniquely identifies a device by its "burned-in" MAC (Media Access Control ) address. A
Layer 3 router uniquely identifies a device's network connection with a network-assigned IP (Internet
PI
Protocol) address.
Today, most switches include some level of routing functionality. MAC and IP addresses uniquely define
TY
devices and network connections, respectively, in a network. A MAC address is a number assigned to a
Network Interface Card (NIC) by a device's manufacturer. An IP address is a number assigned to a network
connection.
Types of Networks:
L
SA
R
network engineers and operators to design, deploy, debug, and remediate
them.
TE
An enterprise may use both LANs and WANs across its campus, branches,
and data centers.
AS
connectivity to individual users or organizations. They may offer simple
connectivity, in the form of leased lines, or more-advanced, managed
services to enterprises. Service providers also supply Internet and cellular
connectivity to their customers.
M
Types of networking : There are two primary types of computer networking 1) Wired networking and 2)
Wireless networking.
NG
1) Wired networking : Wired networking requires the use of a physical medium
for transport between nodes. Copper-based Ethernet cabling, popular due to its low
cost and durability, is commonly used for digital communications in businesses
and homes. Alternatively, optical fiber is used to transport data over greater
PI
distances and at faster speeds, but it has several tradeoffs, including higher costs
and more fragile components.
TY
As a general rule, wired networking offers greater speed, reliability and security
SA
It should be noted that these types of networking concern the physical layer of the network. Networking can
ER
also be classified according to how it's built and designed, encompassing approaches that include Software-
Defined Networking (SDN) or overlay networks. Networking can also be categorized by environment and
scale, such as LAN, campus, WAN, data center networks or storage area networks.
IV
Components of networking:
Computer networking requires the use of physical network infrastructure -- including switches, routers and
UN
wireless access points -- and the underlying firmware that operates such equipment. Other components include
the software necessary to monitor, manage and secure the network.
Additionally, networks rely on the use of standard protocols to uniformly perform discrete functions or
communicate different types of data, regardless of the underlying hardware.
For example, Voice over Internet Protocol (VoIP) can transport IP telephony traffic to any endpoint that
supports the protocol. HyperText Transfer Protocol (HTTP) provides a common way for browsers to display
webpages. The internet protocol suite, also known as Transmission Control Protocol/Internet Protocol
(TCP/IP) is a family of protocols responsible for transporting data and services over an IP-based network.
R
What Is Network Policy: Network policy is a collection of rules that govern the behaviors of network
TE
devices. Just as a federal or central government may lay down policies for state or districts to follow to achieve
national objectives, network administrators define policies for network devices to follow to achieve business
objectives.
AS
Benefits of network policy :A network that runs on policies can be automated more easily and therefore
respond more quickly to changing needs. Many common tasks, such as adding devices and users and inserting
new applications and services, can now be easily accomplished. Well-defined policies can benefit a network
in the following ways:
M
Align the network with business needs
Provide consistent services across the entire infrastructure
Bring agility through greater automation
Make performance dependable and verifiable NG
An even bigger advantage to enterprises is the security gains from policy. By granularly defining policies that
give users and devices the least amount of access to resources that they need to do their jobs, you can better
PI
protect sensitive data. Violations can be caught and mitigated quickly. Such zero-trust security measures
reduce risk, contain threats, stop lateral movement of malware, and help verify regulatory compliance.
TY
A network that follows well-defined policies capably fills business needs that it is designed to support. Think
of network policies as objectives or goals. Without clear objectives, your network can't be set up to deliver
optimally, and without goals, its performance can't be measured.
Business intent and agility: Network policies reflect business intent. Network controllers ingest business
L
intent and create policies that help achieve the desired business outcomes. Policies are enforced and carried
SA
out by network equipment such as switches, routers, wireless access points, and wireless LAN controllers.
Networks operated in an ad hoc fashion, without guiding policies, will likely fail to deliver optimally.
Consistency of experience: Well-executed policies in the network provide consistency of service throughout
it, regardless of locations, means of connectivity, or devices in use. This means users and things can use the
ER
network from anywhere and still have the same access privileges and quality of network experience.
Network automation: Network devices and their operations can be better automated when guidance exists.
With policies, configurations can be automated and orchestrated so that each device does what's required to
IV
Performance monitoring: Once well-understood goals are defined, metrics can be established to measure
UN
how the network is delivering. Continuous analysis of performance helps ensure that policies are being
followed and business objectives are being met.
Network security: With policies in place, any violations can be easier to detect. Security is more easily
enforced, threats more quickly contained, and risk rapidly reduced with security-related policies.
Following are some questions that frequently asked in exam on Internet & Networking
Sr.
Question Answer
No
R
1 You can send _____________ with E-Mail, by uploading it. Attachment
_____________ is a Microsoft's web Browser that install with windows
TE
2 by default. Internet Explorer
If we have used Backward arrow, we can switch to the next webpage by
3 using _____________ Forward Arrow
If you move the mouse pointer on hyper-links, the pointer changes its
AS
4 shape to a _____________ Hand
5 To go to previous page ___________ key is used in Internet Explorer. Backspace
6 Internet standard domain country code is used by India. .in
Process of saving files to your computer from the internet is called
M
7 ___________ Downloading
8 ___________ Button is used to reopen the web page on the Browser. Refresh
9 You need to pay for sending and receiving e-mails. FALSE
10
11
NG
______________ is necessary to connect our Computer with Internet.
It is possible to forward E-Mail, by clicking of forward button?
If we want to reply any mail then we need to click on ______________
Modem
It is possible
12 button Reply
PI
The client PCs can communicate with each other within the network
13 through ______________ only. Server
We can use internet for ______________ All of above
TY
14
15 Web page has a unique address, which is called ______________ URL
To connect computer is online, it is to ready to send data or receive data
16 from other devices. Modem
When a computer is online, it is to ready to send data or receive data
L
18 ______________. Demodulation
Network programs and
19 The special computer that stores a ______________ is called a server. data
20 Which of the following is not required in order to send E-Mail? Webpage
ER
R
33 Data in _______________ Cable is transferred through light pulses. Fiber Optic
The equipment need to allow most computers to connect internet is
34 called _______________ Modem
TE
35 Attachment buttons show _______________ icon on it. U pin
36 Number of default web Browser is _______________ One
We can use _______________ to open the webpage we have previously
AS
37 visited. Backward Arrow
With the help of _______________ We connect computer and
38 telephone. Modem
39 Which of the terms as Browser? E-Mail client software
M
40 We can visit another webpage by using _______________ Hyperlinks
41 Every Web Site has a unique address. Which is called? URL
42 _______________ is Web Browser software. Internet Explorer
43
44
45
NG
Files send with E-Mail are called _______________
Deleted E-Mails are permanently removed from E-Mail account.
The _______________ in network is called as Server.
Attachments
Never
Main Computer
46 The internet is a _______________ Network of Networks
PI
With _______________ System people from different locations can Video Conferencing
47 discuss with each other like meeting. System
48 _______________ is an example of Application Software. Browser
TY
60
While composing E-Mail, we ______________ need to type the E-Mail
61 id. Always
UN
R
69 Is it possible to reply to E-mail, by clicking on forward button?
To send E-mail to someone, we need to type E-Mail id in ___________
70 box. To
TE
71 It is a possible to send as well as received attachments by mail. TRUE
Browser is a software program for getting information from the
72 ___________ World Wide web
AS
73 To show Large Network site ___________ domain code is used. net
74 Destructive programs attached to spam E-Mail are called ___________ Viruses
The world wide interconnected system of a computer networks is called
75 ___________ Internet
M
76 URL is nothing but a ___________ Web address
77 The internet works on ___________ Packets
78 Internet is ___________ Type of network. WAN
79
80
host. NG
A File download means moves a copy of file on local host to remote
Interconnected
84 Internet is collection of ___________ networks
85 Data in a fiber-optic cable is transferred through Light pulses
86 Is it possible to forward E-Mail, by clicking on composed button? It's not possible
L
87 A File download means moves a copy of the file from ___________ Web Site to computer
In Internet Explorer we can see recently visited web sites using
SA
R
The software that finds documents for us on the web using keywords
103 _____________ Search Engine
TE
104 Moving from one Web Site to another is called as _____________ Surfing
AS
M
NG
PI
TY
L
SA
ER
IV
UN