Sunday 17 October 2021

Concept of IT, Basics of Internet, E-mail, Audio and Video-conferencing.

 

Concept of IT, Basics of Internet, E-mail, Audio and Video-conferencing.

Basic of Internet:

Ø The Internet is a worldwide telecommunications system that provides connectivity for millions of other, smaller networks; therefore, the Internet is often referred to as a network of networks.

Ø The Internet began in 1969 as the U.S. Department of Defense’s Advanced Research Project Agency (ARPA) for war communication

Ø A browser is a program that allows you to interact and view the internet and contents of the Web. The Web Browser, Internet Explorer, or IE is developed by Microsoft and comes pre-installed when you buy a Windows computer.

Ø A browser is a free software package or mobile app that lets you view web pages, graphics, and most online content. The most popular web browsers include Chrome, Firefox, Internet Explorer, and Safari, but there are many others.

Ø The top-level domain name that designates what kind of site it is; for example, .com (for commercial domains), .org (organizations), .edu (for educational institutions).

Ø  

Ø Uniform Resource Locators—URLs— are the web browser addresses of internet pages and files. URLs consist of three parts to address a page or file:

1.      The protocol is the portion ending in //: Most web pages use the protocol http or https, but there are other protocols.

2.       The host or top-level domain, which frequently ends in .com, .net, .edu or .org  , .gov (Government), .net (Networking Providers ) .org (Non-profit Organization) etc

3.       The filename or page name itself

 

Basic of Email:

 

Ø Electronic mail is a method of exchanging messages between people using electronic devices. Invented by Ray Tomlinson, email first entered limited use in the 1960s and by the mid-1970s had taken the form now recognized as email.

Ø Email, short for Electronic Mail, consists of messages which are sent and received using the Internet. There are many different email services available that allow you to create an email account and send and receive email and attachments, many of which are free.

Ø Today, the top three webmail providers are Yahoo!, Microsoft’s Outlook.com (previously Hotmail), and Google’s Gmail.Email Protocols: IMAP, POP3, SMTP and HTTP:  Protocols are set of rules that help the client to properly transmit the information to or from the mail server.

Ø POP3 (Post Office Protocol 3)- This is a simple, standardized protocol that allows users to access their mailboxes on the Internet and download messages to their computers. The simple design of POP3 allows casual email users who have a temporary Internet connection (dial-up access) to access emails. They can read their emails, draft new emails or reply to emails while they are offline, and can send these emails when they are back online.

Ø IMAP (Internet Message Access Protocol)– This is a standard protocol used for email transfer by users. Like POP3, it also supports both online and offline modes of email access. The email message is downloaded to the user’s machine only when a specific request is made to read it. Users can download mails to their computers while keeping a copy on the server. The mails on the server are the primary copy and anything changed on the local machine is updated by what is on the serve

Ø SMTP (Simple Mail Transfer Protocol)– As the name suggests, SMTP is a simple, text-based protocol that works best when devices are interconnected to each other. However, SMTP protocol can only be used to send emails. Unlike POP3 and IMAP protocols, SMTP does not provide the functionality to the users to retrieve emails from the server. This limits the use of SMTP to some extent. One of the main issues with SMTP is the lack of sender email authentication. SMTP lacks security features too and thus users get spam emails

Basic concept to send Email: When we send an e-mail to only one person, you type the recipient’s address in the “To:” field. When we send a message to more than one person,   we have the option to enter addresses in the “Cc:” and “Bcc:” fields. “Cc” stands for “Carbon Copy,” while “Bcc” stands for “Blind Carbon Copy.”

Cc: A Carbon Copy, message is an e-mail that is copied to one or more recipients. Both the main recipient (whose address is in the “To:” field) and the Cc’d recipients can see all the addresses the message was sent to. When a message is blind carbon copied, neither the main recipient nor the Bcc’d recipients can see the addresses in the “Bcc:” field.

 

Basic of Audio and Video-conferencing:

 

 Audio -conferencing: When a number of participants of a meeting use telephonic instruments to communicate with each other then it is known as audio conferencing.

Video-conferencing: When two or more people use digital platforms communicate and collaborate with each other to achieve a common goal effectively then it is known as a video conferencing mode of communication or a tool of face-to-face conferencing:

Online tools software:

Skype, Zoom,  Cisco WebEx. GoToMeeting, Google meet, Google classroom, Workplace by Facebook ,etc

 

 

QUESTIONS

1.    The statement “the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware” refers to

 (1) Information Technology (IT)  (2) Information and Collaborative Technology (ICT)  (3) Information and Data Technology (IDT)   (4) Artificial Intelligence (AI)

2.    Which of the following represents billion characters? (1) Megabytes (2) Kilobytes (3) Gigabytes (4) Terabytes

3.    If one Giga Byte is equal to 2 30 Bytes of data storage, then 1024 Tera Bytes is equal to _____ bits of data storage.   (1) 2 50 (2) 253  (3) 240 (4) 256

4.    gif, jpg, bmp, png are used as extensions for files which store  (1) audio data (2) image data   (3) video data (4) text data.

5.    The data storage hierarchy consists of : (1) Bits, bytes, fields, records, files and databases (2) Bits, bytes, records, fields, files and databases (3) Bits, bytes, fields, files, records and databases (4) Bytes, bits, fields, records, files and databases

 

6.    With regard to e-mail, what does Bcc : mean ?  (1) Blind Computer Communication : - The users specified in the Bcc : field will get the e-mail and see the addresses in the to : and cc : fields.  (2) Blind Carbon Copy : - The users specified in the Bcc : field will get the e-mail and see the addresses in the to : and cc : fields.  (3) Blind Computer Communication :- The users specified in the Bcc : field will get the e-mail but it will be an audio file because this is how blind people get e-mail.  (4) Blind Carbon Copy : The users specified in the Bcc : field will get the e-mail but will not see the addresses in the to : and cc : fields. 

 

7.    With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is called  (1) Electronic mail (2) Data sourcing  (3) Mail merge (4) Spam mail

8.    Voice  mail         1) is the exchange of text messages  and computer files transmitted via  a communications network   such  as a  local area network or the Internet   2) permits users to converse in real time with each other via  the computer while connected to the Internet     3) functions munch like an answering  machine , allowing callers to leave a voice message for the called party     4) involves using video and computer technology to conduct a meeting between participants at geographically  separate locations   

9.    Which of the following is an instant messaging application for specially image chat?

(a) WhatsApp

(b) Google Talk

(c) Twitter

(d) Snapchat

Select the correct answer from the codes given below:

(1) (a) and (d) only

(2) (c) and (d) only

(3) (d) only

(4) (a), (b) and (c) (d)    

10. Which of the following statements regarding the features of Information and

Communication Technology (ICT)  is true?

I. ICT are the main instruments for the creation of computer networks and the applications based on them.

II. ICT supports the spread of information and knowledge, separating the content from the place where it belongs physically.

III. The digital and virtual nature of most of  ICT  products allow the expenditure for them to be maximized.

Codes:

(1) I and II only

(2) I and III only

(3) II and III only

(4) I, II and III

11. Read the following two statements:  I :  Information and Communication Technology (ICT) is considered a subset of Information Technology (IT).  II :  The ‘right to use’ a piece of software is termed as copyright.  Which of the above statement(s) is/are correct?  (1) Both I and II (2) Neither I nor II  (3) II only (4) I only

12. Which one of the following is not a search engine?  (1) Google (2) Chrome   (3) Yahoo (4) Bing

13. Which is not Online tools software?

(1)Google meet (2)  Cisco WebEx.      (3)  Skype (4) Microsoft

 

14. The Domain Name System (DNS) is a (1)  .net    (2)  edu      (3)  .pdf      (4)  .jpg

15. Hacker often gain entry to a network be pretending to be a network  be pretending to be at a legitimate computer? 1)spoofing     2)forging    3)IP spoofing   4) ID theft   

 

 

 

No comments:

Post a Comment