Internet
A. State true or false.
1. Email is an online correspondence system. [T]
2. Downloading is generally used when you want to send some photographs, articles or files to your friends, family, etc. [F]
3. The speed of a modem is measured in Kilometre per second. [F]
4. The search results are usually presented in a list, and are commonly called hits. [T]
5. Internet Explorer is a series of graphical web browser developed by Microsoft. [T]
6. AN Anti-virus is a program or a piece of code that is loaded onto your computer without your knowledge. [F]
B. Name the following using the given clues.
1. An example of Online Backup Provider.
= DropBox
2. Getting the data from the host computer(server) to the client computer (user's computer) is known as...
= Downloading
3. A …. is a device that allows communication with other computers.
= Modem
4. A URL is also referred to as a …. address.
= Web
5. …. are the set of rules that has to be followed for communication data on the networking environment.
= Protocols
6. ….. is a vast network of computers which is made up of thousands of networks worldwide.
= Internet
C. Identify the tool and state their purpose.
1. Forward tool;
= After viewing the previous web pages if you want to move to the next page, click on the Forward tool.
2. Home tool;
= It brings the user back to the home page.
3. Refresh tool;
= When the web page information needs to be updated on the screen. the Refresh tool can be used. This tool refreshes the page by sending the information again.
4. Stop tool;
= The Stop tool is used to stop the browser of any website.
5. Favourites tool;
= This tool allows the user to organise and keep records of important or frequently visited websites and web pages.
D. Match the following.
=
1. IAB |
a. Uniform Resource Locator. [2] |
2. URL |
b. Internet Activities Board. [1] |
3. ISP |
c. Hypertext Transfer Protocol. [5] |
4. WWW |
d. Internet Service Provider. [3] |
5. HTTP |
e. World Wide Web. [4] |
E. Answer the following questions.
1. Explain any two uses of Internet.
= Two uses or the Internet are -
i) Information exchange:- The Internet is a virtual treasure trove of information. There is a huge amount of information available on the Internet about every subject. It may range from government laws and services, trade fairs and conferences, market information and new ideas for technical support.
The 'search engines' on the Internet can help you to find data on any subject that you need. Google, Yahoo and Bing are examples of such search engines.
ii) Buy and Sell Products:- You can buy and sell products all over the world through the Internet. This is called online shopping. There are many online stores and sites that can be browsed to see the products that can be bought. You need not leave your house, and can do your shopping from the convenience of your home.
2. Name three governing groups of the Internet.
= The Internet is an interconnection of a number of computers with different types of networks across the globe. Thus, no one actually owns it. But there are three volunteer groups that were formed to help, coordinate and guide the technical parts of the Internet. These are -
i) Internet Activities Board (IAB)
ii) Internet Engineering Task Force(IETF)
iii) Internet Research Task Force(IRTF)
3. State the difference between a computer virus and an internet virus.
= A computer virus is a program or piece of code that is loaded onto your computer without your knowledge. It makes the computer run against your instructions. Viruses can also replicate themselves that is, they can multiply, in numbers. All computer viruses are man-made.
A simple virus that can make a copy of it over and over again is relatively easy to produce. Even a simple virus is dangerous because it will quickly use all the available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
An internet virus is a program that is sent to different people through the Internet in the form of emails or links. These are sent to harm computer systems. At times, you may receive an email with subject 'Very Important', the moment you open it, the system will crash. These computer viruses behave the same way as biological viruses by contaminating any computer systems they come in contact with. These self-executing programs are generally very small and work at damaging the way your computer works.
4. List any three rules of netiquette.
= When you interact with people, you follow some rules to make the interaction pleasant. This set is known as etiquette. Similarly, you have to follow some rules of behaviour when you interact with people on the internet. This set of rules is known as netiquette. It guides you on how you should interact over networks, ranging from net surfing and mailing lists to chats and forums. Three rules of netiquette are -
i) Use simple electronic signatures.
ii) Avoid revealing personal information while chatting.
iii) Do not use objectionable language while mailing or chatting.
5. Discuss the importance of Internet Explorer.
= Internet Explorer is a series of graphical web browser developed by Microsoft. It was included as part of the Microsoft Windows line of operating systems in 1995. It has been one of the most widely used web browsers since then. Internet Explorer opens just like any other software window.