Jemu Assign
Jemu Assign
ID NO: 118/2015
Section: A
4/4/2017
The internet is a vast global network of interconnected computer networks that enables the
exchange of data, communication, and access to information. It functions using standardized
protocols, primarily the Internet Protocol Suite (TCP/IP), to facilitate data transfer across
diverse systems. The internet supports a range of services, including the World Wide Web
(WWW), email, file sharing, and streaming.
1969: The first successful message was sent over ARPANET between UCLA and the
Stanford Research Institute (SRI). The message was "LO" (intended to be "LOGIN" but the
system crashed after the first two letters).
Packet Switching: ARPANET pioneered packet-switching technology, which breaks data into
smaller packets for efficient transmission, a foundational concept for the internet.
1971: The first email was sent over ARPANET by Ray Tomlinson, marking the beginning of
electronic communication.
ARPANET evolved over the next two decades, incorporating additional networks and
technologies, eventually transitioning to the modern internet when TCP/IP protocols were
standardized in 1983. This shift enabled seamless interconnection of various networks, giving
rise to the internet as we know it today.
Q2 Discuss the progression of internet development from the 1970s to the early public
availability in Ethiopia?
1. Initial Steps:
Ethiopia's journey to the internet began in the mid-1990s. Before this, limited digital
communication existed primarily via networks like Fidonet.
In 1997, Ethiopia officially connected to the global internet, facilitated by ETC. This marked
the beginning of public access, though it remained limited to urban centers and institutions
like universities and government offices.
3. Challenges:
Poor infrastructure.
High costs of connectivity.
Internet penetration in the late 1990s and early 2000s remained one of the lowest globally.
4. Growth in Usage:
Over the years, investments in fiber-optic networks and the introduction of mobile internet (in
the 2000s) gradually increased access, although challenges like censorship and infrastructure
gaps persist.
The progression of the internet from the 1970s to public availability in Ethiopia reflects
broader global trends while highlighting unique regional challenges and milestones.
Email, short for "electronic mail," is a method of exchanging digital messages between
people using electronic devices. It was first developed in the early 1970s and has become one
of the most widely used tools for communication globally. Emails can include text, images,
files, and links, and they are sent via the internet or private networks.
Ray Tomlinson is credited with inventing email in 1971. He introduced the use of the "@"
symbol to route messages between users on different computers.
Initial usage was limited to academics and researchers using ARPANET, the precursor to the
modern internet.
Introduction of standardized email protocols, such as SMTP (Simple Mail Transfer Protocol),
facilitated interoperability between different systems.
Emergence of user-friendly email clients like Microsoft Outlook and Lotus Notes.
Internet Service Providers (ISPs) like AOL and Yahoo offered email as part of their services,
making it accessible to the public.
Introduction of webmail services (e.g., Hotmail in 1996) allowed users to access emails via
browsers.
4. Enhanced Features (2000s):
Google’s Gmail revolutionized email in 2004 with features like larger storage, powerful
search, and conversation threading.
Improved spam filters and mobile apps made email more reliable and portable.
Email became integrated with collaborative tools like calendars, task managers, and cloud
storage (e.g., Google Workspace, Microsoft 365).
Rise of security protocols like TLS and multi-factor authentication improved privacy and
safety.
Email remains a critical tool for formal and business communication despite competition
from messaging apps.
AI and machine learning enhance features like spam detection, predictive typing (e.g.,
Gmail’s Smart Compose), and prioritization.
Q4 describe the steps to send and receive an email using Yahoo mail?
Here are the steps to send and receive an email using Yahoo Mail:
To Send an Email:
Open your web browser or the Yahoo Mail app. Enter your email address and password, then
click "Sign In."
2. Click on "Compose":
On the homepage of Yahoo Mail, locate and click the "Compose" button (usually at the top-
left corner).
If you want to include attachments, click the paperclip icon and upload the file(s) from your
device.
2. Go to Your Inbox:
After logging in, you’ll be taken to your inbox. If not, click on the "Inbox" folder in the
navigation pane.
3. Open an Email:
Locate the email you want to read. Click on it to view the full content.
Q5 what is a web browser? list and describe at least three examples of web browser?
A web browser is a software application used to access and view websites on the internet. It
retrieves information from web servers and displays it on your device. Browsers support
multimedia content and allow users to interact with web applications.
1. Google Chrome: Google Chrome, developed by Google, is one of the most widely used
web browsers. It is known for its speed, simplicity, and integration with Google's ecosystem.
3. Microsoft Edge: Description: Microsoft Edge is the default browser for Windows 10 and
later, built on the Chromium engine.
Q6 Explain the process of translating a URE to an IP address and the role of DNS
servers?
When you enter a URL (Uniform Resource Locator) like www.example.com in your web
browser, it needs to be translated into an IP (Internet Protocol) address because computers
and servers use IP addresses to identify each other on the network. This process involves the
Domain Name System (DNS). Here’s how it works:
A user types a URL (e.g., www.example.com) into their web browser's address bar.
The browser checks its DNS cache to see if it has already resolved the IP address for this
domain recently.
If not found, the query is sent to the local operating system’s DNS resolver.
The operating system checks its cache for the corresponding IP address.
If not found, the query is forwarded to the configured DNS server (often provided by the
ISP).
The recursive DNS server (typically your ISP’s DNS or a third-party DNS like Google’s
8.8.8.8) checks if it has the IP address in its cache.
The recursive DNS server contacts a root DNS server, which provides information about the
top-level domain (TLD) server (e.g., .com, .org, .net).
The TLD server directs the query to the authoritative DNS server for the specific domain
(e.g., example.com).
The authoritative DNS server provides the IP address associated with the domain name (e.g.,
192.168.1.1).
This IP address is sent back to the recursive DNS server, then to the user’s browser.
8. Connecting to the Web Server
The browser uses the resolved IP address to establish a connection with the web server
hosting the requested website.
2. TLD Servers: Point to the authoritative DNS servers for the specific domain.
3. Authoritative Servers: Provide the final IP address for the requested domain.
4. Recursive Servers: Handle the user’s request and simplify the process by caching results
for faster future queries.
This translation process allows users to access websites easily using memorable domain
names instead of complex numerical IP
A URL is the web address that specifies the location of a resource on the internet. It tells the
browser where to find the resource and how to retrieve it.
Example: https://www.example.com/page
HTTP is a protocol that defines the rules for transmitting data between a web browser and a
web server. It facilitates communication over the web.
Definition: HTML is the standard markup language used to structure and format content on
web pages. It is the backbone of web design.
Features:
Works in conjunction with CSS and JavaScript to create visually appealing and interactive
websites.
Example:
<html>
<body>
</body>
</html>
Q8 Define and provide examples of the following spamming, phishing, and hacking
1. Spamming
Spamming refers to the act of sending unsolicited, irrelevant, or excessive messages, often for
commercial purposes. These messages are usually sent in bulk and may appear in emails,
social media posts, text messages, or online forums.
Example:
A company sends you emails advertising products you never signed up for.
A social media account floods your inbox with promotional links or irrelevant messages.
2. Phishing
Example:
You receive an email that appears to be from your bank, asking you to click on a link and
confirm your account information. However, the link leads to a fake website designed to steal
your data.
A text message claims you've won a prize and requests you to provide personal details to
claim it.
3. Hacking
Example:
Malicious: A hacker breaches a company's database to steal customer credit card details.
Ethical: A cybersecurity expert identifies weaknesses in a company's system to help improve
security measures.
The internet has revolutionized communication and information exchange, offering numerous
benefits:
1. Instant Communication
Speed: Messages can be sent and received instantly through email, messaging apps, and
video calls.
Availability: Vast amounts of information on nearly any topic are readily accessible through
search engines like Google.
Real-time Updates: News, weather, and other updates are instantly available.
Example: A student researches academic material for an assignment using online libraries or
educational platforms.
3. Cost Efficiency
Reduced Costs: Communication via email or messaging apps is more affordable than
traditional methods like postal mail or long-distance phone calls.
Free Tools: Many platforms (e.g., WhatsApp, Skype) offer free messaging and calling
services.
Example: A business uses free online communication tools to collaborate with remote
employees.
Multimedia Integration: Supports text, images, audio, and video for more dynamic
communication.
Social Media: Platforms like Facebook, Twitter, and LinkedIn allow sharing and discussing
ideas with a wider audience.
Example: An artist shares their work on Instagram to engage with a global audience.
5. Collaborative Opportunities
Teamwork Tools: Platforms like Google Docs or Microsoft Teams enable real-time
collaboration on projects.
Networking: The internet helps individuals and businesses connect with potential partners,
clients, and colleagues.
E-Learning: Online courses, webinars, and tutorials enhance knowledge and skills.
Job Opportunities: The internet facilitates job searching and professional networking.
File Sharing: Cloud storage services like Google Drive or Dropbox make it easy to share files
with others.
Wide Reach: Websites and blogs allow businesses and individuals to share information
globally.
Example: A company distributes its annual report to stakeholders via a shared online link.
Q10 Explain the concept and role of a "web cookie" in internet browsing?
A web cookie, or an HTTP cookie, is a small piece of data stored on a user’s device by a
website. Cookies are created when you visit a website and are used to remember information
about you, such as your preferences, login status, or browsing history. This allows the
website to provide a more personalized and efficient browsing experience.
1. Session Management
Cookies help websites remember your login status, shopping cart items, or preferences during
a browsing session.
Without cookies, you'd have to log in repeatedly or re-add items to your cart every time you
visit a new page.
Example: When you log into your email account, a cookie keeps you logged in until you log
out or close the browser.
2. Personalization
Cookies store user preferences, such as language, themes, or location settings.
Example: An e-commerce site remembers your currency preference and displays prices
accordingly.
Cookies track user behavior, such as pages visited, time spent, or interactions on a site.
This data helps website owners analyze user activity and improve their services.
Example: Google Analytics uses cookies to provide insights into website traffic and user
demographics.
4. Targeted Advertising
Cookies enable advertisers to show relevant ads based on a user’s browsing history and
preferences.
They are often used in retargeting, where ads for a product you viewed appear on other
websites.
Example: After searching for shoes online, you see ads for shoes on social media platforms or
other websites.
5. Enhanced Security
Certain cookies are used to enhance security by verifying users and preventing unauthorized
access during online transactions or account logins.
Example: A bank’s website uses secure cookies to validate your session while you perform
online banking tasks.
Types of Cookies
1. Session Cookies: Temporary cookies that are deleted when you close your browser.
2. Persistent Cookies: Stored on your device for a set period and used for long-term
preferences or login credentials.
Click the "Compose" button, usually located on the top-left side of the screen.
4. Attach Documents
Click the paperclip icon (attachment button), usually located at the bottom of the email
composer.
A file selection window will open. Navigate to the location of the document on your device.
Select the document you want to attach and click "Open" (or "Choose" depending on your
device).
The document will upload to the email. You'll see it listed below the subject line or in the
email body once the upload is complete.
6. Review Attachments
Confirm the correct file is attached. You can click on the attachment to preview it.
Click the "Send" button to send the email with the attached document.
Q12 What is significance of hyperlinks in website navigation and how do they enhance
user experience?
Hyperlinks, or simply links, are clickable elements (text, images, or buttons) on a webpage
that allow users to navigate to other pages, websites, or resources. They are a fundamental
part of the web's structure and play a crucial role in website navigation.
1. Ease of Navigation
Purpose: Hyperlinks enable users to quickly and easily move between pages or sections of a
website.
User Benefit: Reduces the effort needed to find information, making the website more
intuitive.
Purpose: Links make additional resources, references, or related content accessible without
cluttering the main page.
User Benefit: Users can dive deeper into topics of interest without losing their place on the
site.
3. Enhanced Engagement
Purpose: Hyperlinks guide users to other areas of the website, encouraging them to explore
more content.
User Benefit: Keeps users on the site longer, which is beneficial for both user satisfaction and
business goals.
Example: An e-commerce site uses hyperlinks like "You may also like" to suggest related
products.
Purpose: Internal and external links improve website structure and help search engines
understand content relevance.
User Benefit: Well-organized links make it easier for users to find relevant content through
search engines.
Example: A blog post links to authoritative sources or related internal posts, improving its
credibility and ranking.
Purpose: Hyperlinks in CTAs (e.g., "Learn More," "Buy Now") direct users to specific
actions or pages.
User Benefit: Streamlines the user journey by providing clear, actionable steps.
Example: A "Sign Up" hyperlink on a landing page leads directly to a registration form.
Purpose: Hyperlinks are often styled (e.g., underlined or colored) to stand out as clickable
elements.
User Benefit: Improves usability by clearly indicating where users can interact.
Example: A blue, underlined hyperlink signals users that clicking it will open a new page or
perform an action.
Q13 Explain the potential threats of an email virus and how users can protect
themselves?
An email virus is a type of malicious software (malware) that spreads through email
attachments, links, or embedded content. It can cause severe harm to individuals,
organizations, and devices.
2. Identity Theft
Some email viruses steal personal information like passwords, bank details, or social security
numbers, leading to identity theft or financial loss.
3. Unauthorized Access
Viruses can provide attackers with backdoor access to systems, allowing them to monitor
activity, steal sensitive information, or plant additional malware.
4. Spread to Other Systems
Infected emails can automatically send themselves to your contacts, spreading the virus to
colleagues, friends, or family.
6. Financial Loss
Direct costs (e.g., ransomware demands) and indirect costs (e.g., system recovery,
productivity loss) can be significant.
Do not open emails from unknown senders, especially those with vague or urgent subject
lines.
Be cautious of emails claiming you've won prizes or need to verify account details.
Use spam filters provided by your email service to block phishing or malware-laden emails.
Many email providers like Gmail or Yahoo automatically flag suspicious emails.
Regularly update your operating system, browser, and email client to patch vulnerabilities.
6. Educate Yourself
Learn about common phishing tactics and red flags, such as poor grammar, mismatched
URLs, or unusual requests.
Enable 2FA on your email account for an extra layer of security against unauthorized access.
Avoid accessing your email over unsecured public Wi-Fi networks without a VPN, as these
can be exploited by hackers.
Q14 what is a cache, and why is it important for web browsing efficiency?
A cache is a temporary storage system that saves copies of frequently accessed data, such as
website files, images, scripts, and other content, on a user’s device or browser. This allows
the browser to retrieve data locally rather than downloading it from the server each time a
website is visited.
Cached data reduces the time it takes to load a website since the browser doesn’t need to
repeatedly download the same resources from the server.
Example: After visiting a website once, its logo and layout are stored in the cache, making
subsequent visits much faster.
Caching minimizes the amount of data that needs to be transferred over the internet, which is
especially beneficial for users with limited data plans.
Example: If an image is cached, it doesn’t need to be downloaded every time you refresh the
page.
By serving cached resources locally, the cache reduces the number of requests sent to the
website’s server, improving overall server performance.
Example: A popular website can handle more users simultaneously because cached resources
reduce server strain.
Faster page loads and smoother interactions lead to a better browsing experience.
Example: An e-commerce site that loads quickly encourages users to explore more and make
purchases.
5. Offline Access
Cached content can allow users to access some web pages or apps offline.
Example: A news app may display previously loaded articles even without an active internet
connection.
1. When you visit a website, your browser downloads its resources (e.g., HTML, CSS,
JavaScript, images).
3. During future visits, the browser checks the cache for stored data and uses it instead of
downloading the files again, provided the content hasn’t changed.
Outdated Content: If the cached version is old, users might not see the latest updates.
Troubleshooting Issues: Corrupted cache data can cause websites to load improperly.
A search engine is a software system or online platform designed to help users find
information on the internet. It works by indexing websites and retrieving relevant results
based on the user’s query. Common search engines include Google, Bing, Yahoo, and
DuckDuckGo.
1. Information Retrieval
The primary purpose of a search engine is to provide users with the most relevant and
accurate information based on their search queries.
Example: A user searching for "best restaurants near me" will receive a list of nearby dining
options.
2. Efficient Navigation
Example: Instead of typing specific URLs, users can find pages by searching for topics.
3. Content Discovery
Search engines help users discover new websites, services, and resources by suggesting
content that matches their interests or needs.
Example: A search for "online learning platforms" might introduce users to sites like
Coursera, Udemy, or Khan Academy.
4. Answering Questions
Search engines provide direct answers to user queries through features like snippets, maps,
and rich results.
Example: Searching for "weather today" provides the current weather conditions without
visiting another site.
They assist in gathering data, comparing products, and exploring options for informed
decision-making.
Example: A user researching "best smartphones 2024" can compare reviews, specifications,
and prices.
1. Crawling: Search engines use automated bots (crawlers) to scan and collect data from
websites.
3. Ranking: When a query is entered, the search engine ranks results based on relevance,
quality, and other factors.
4. Displaying Results: The engine provides a list of results, often with additional features like
images, videos, or snippets.
Q16 compare and contrast downloading and uploading files in the context usage?
Downloading and uploading are two fundamental processes in the context of file transfer and
data exchange on the internet. Here's a comparison and contrast of their usage:
Downloading:
Transferring data or files from a remote system (such as a server) to a local device (e.g.,
computer, smartphone).
Examples of Usage:
Saving a document or image from a website.
Primary Purpose: To access and use content locally, such as viewing, editing, or installing
files.
Uploading:
Transferring data or files from a local device to a remote system (e.g., a server or cloud
storage).
Examples of Usage:
Q17 define the following terms: ISP ,World Wide Web(WWW), and home page
An organization or company that provides individuals and businesses access to the internet.
Examples include Comcast, AT&T, and Verizon. ISPs also offer additional services like
email, domain hosting, and web browsing.
A system of interlinked hypertext documents and multimedia content accessed via the
internet. It uses web browsers (e.g., Chrome, Firefox) to retrieve and display information
from servers using protocols like HTTP or HTTPS.
3. Home Page:
The main or introductory page of a website, often serving as the starting point for navigation.
It typically contains links to other sections of the site and provides an overview of the site's
content. It can also refer to the default page that loads when you open a web browser.
Q18 what is meant by " sessions" in the context of computer _user interaction, and how
does it work?
1. Initialization:
A session starts when a user accesses a system (e.g., logging into an account, visiting a
website, or launching an application).
A unique session ID is often generated to track and identify the session. This ID is stored in
cookies, URL parameters, or server memory.
The session keeps track of the user's activities, such as navigation, input, or changes made
during the interaction.
Data can include login credentials, shopping cart contents, form inputs, or personalized
settings.
For web-based sessions, technologies like HTTP cookies, session tokens, or server-side
storage handle session tracking.
Sessions often have timeouts for security purposes. If there's no user activity for a specified
period, the session ends to prevent unauthorized access.
Encrypted session IDs and secure storage mechanisms are used to protect against hijacking.
4. Termination:
A session ends when the user explicitly logs out, closes the application, or the system times
out due to inactivity.
At the end of the session, the temporary data is usually cleared unless explicitly saved.
Sessions are crucial for maintaining a seamless user experience, ensuring security, and
efficiently managing user interactions.
Q19 explain the structure of an HTML document based on the provided example
An HTML document has a well-defined structure that consists of several key elements that
help organize the content and define its layout. Below is a breakdown of the typical structure
of an HTML document:
1. <!DOCTYPE html>:
This declaration tells the browser that the document is an HTML5 document, ensuring the
proper rendering of the page.
2. <html> element:
The root element of the HTML document, which contains all other elements. The lang="en"
attribute specifies that the language of the content is English.
3. <head> element:
Contains meta-information about the HTML document that is not displayed on the webpage
itself. It usually includes:
<meta charset="UTF-8">: Specifies the character encoding (UTF-8) for the document.
<title>: Sets the title of the webpage, which appears in the browser tab.
<link>: Links to external resources like stylesheets (e.g., styles.css for styling).
4. <body> element:
Contains the actual content of the webpage, including text, images, links, and other elements.
<header>: A section for introductory content, often including a site title or navigation.
<main>: Represents the main content area, typically containing the central information of the
page.
<section>: Groups related content. In this case, one for "About Us" and another for "Our
Services."
Q20 what is the difference between system software and application software as
categorized in the example?
The main difference between system software and application software lies in their purposes
and functions within a computer system. Here’s a breakdown:
System Software:
Purpose: System software serves as a bridge between the hardware of the computer and the
application software. It helps manage the system resources and provides a platform for
running application software.
Examples:
Operating Systems (OS): Examples include Windows, macOS, Linux, which manage
hardware resources, provide a user interface, and allow applications to run.
Device Drivers: Software that allows the operating system to communicate with hardware
components like printers, graphics cards, or network adapters.
Utility Programs: These are tools for system maintenance, such as antivirus software, disk
management tools, and file compression utilities.
Application Software:
Purpose: Application software is designed to perform specific tasks or functions for the user.
These are programs that help users carry out particular activities, like creating documents,
browsing the web, or editing photos.
Examples:
Word Processors: Software like Microsoft Word or Google Docs is used for creating and
editing documents.
Web Browsers: Software like Google Chrome, Mozilla Firefox, or Safari allows users to
browse the internet.
Media Players: Software like VLC or Windows Media Player for playing audio and video
files.