Concept
of IT, Basics of Internet, E-mail, Audio and Video-conferencing.
Basic of Internet:
Ø The
Internet is a worldwide telecommunications system that provides connectivity
for millions of other, smaller networks; therefore, the Internet is often referred
to as a network of networks.
Ø The
Internet began in 1969 as the U.S. Department of Defense’s Advanced Research
Project Agency (ARPA) for war communication
Ø A
browser is a program that allows you to interact and view the internet and
contents of the Web. The Web Browser, Internet Explorer, or IE is developed by
Microsoft and comes pre-installed when you buy a Windows computer.
Ø A
browser is a free software package or mobile app that lets you view web pages,
graphics, and most online content. The most popular web browsers include
Chrome, Firefox, Internet Explorer, and Safari, but there are many others.
Ø The
top-level domain name that designates what kind of site it is; for example,
.com (for commercial domains), .org (organizations), .edu (for educational
institutions).
Ø
Ø Uniform
Resource Locators—URLs— are the web browser addresses of internet pages and
files. URLs consist of three parts to address a page or file:
1.
The protocol is the portion ending in //:
Most web pages use the protocol http or https, but there are other protocols.
2.
The
host or top-level domain, which frequently ends in .com, .net, .edu or
.org , .gov (Government), .net
(Networking Providers ) .org (Non-profit Organization) etc
3.
The
filename or page name itself
Basic of Email:
Ø Electronic
mail is a method of exchanging messages between people using electronic
devices. Invented by Ray Tomlinson, email first entered limited use in the
1960s and by the mid-1970s had taken the form now recognized as email.
Ø Email,
short for Electronic Mail, consists of messages which are sent and received
using the Internet. There are many different email services available that
allow you to create an email account and send and receive email and
attachments, many of which are free.
Ø Today,
the top three webmail providers are Yahoo!, Microsoft’s Outlook.com (previously
Hotmail), and Google’s Gmail.Email Protocols: IMAP, POP3, SMTP and HTTP: Protocols are set of rules that help the
client to properly transmit the information to or from the mail server.
Ø POP3
(Post Office Protocol 3)- This is a simple, standardized protocol that allows
users to access their mailboxes on the Internet and download messages to their
computers. The simple design of POP3 allows casual email users who have a
temporary Internet connection (dial-up access) to access emails. They can read
their emails, draft new emails or reply to emails while they are offline, and
can send these emails when they are back online.
Ø IMAP
(Internet Message Access Protocol)– This is a standard protocol used for email
transfer by users. Like POP3, it also supports both online and offline modes of
email access. The email message is downloaded to the user’s machine only when a
specific request is made to read it. Users can download mails to their
computers while keeping a copy on the server. The mails on the server are the
primary copy and anything changed on the local machine is updated by what is on
the serve
Ø SMTP
(Simple Mail Transfer Protocol)– As the name suggests, SMTP is a simple,
text-based protocol that works best when devices are interconnected to each
other. However, SMTP protocol can only be used to send emails. Unlike POP3 and
IMAP protocols, SMTP does not provide the functionality to the users to
retrieve emails from the server. This limits the use of SMTP to some extent.
One of the main issues with SMTP is the lack of sender email authentication.
SMTP lacks security features too and thus users get spam emails
Basic concept to send Email:
When we send an e-mail to only one person, you type the recipient’s address in
the “To:” field. When we send a message to more than one person, we have the option to enter addresses in the
“Cc:” and “Bcc:” fields. “Cc” stands for “Carbon Copy,” while “Bcc”
stands for “Blind Carbon Copy.”
Cc: A Carbon Copy,
message is an e-mail that is copied to one or more recipients. Both the main
recipient (whose address is in the “To:” field) and the Cc’d recipients can see
all the addresses the message was sent to. When a message is blind carbon
copied, neither the main recipient nor the Bcc’d recipients can see the
addresses in the “Bcc:” field.
Basic of Audio and Video-conferencing:
Audio
-conferencing: When a number of participants of a meeting use telephonic
instruments to communicate with each other then it is known as audio
conferencing.
Video-conferencing: When
two or more people use digital platforms communicate and collaborate with each
other to achieve a common goal effectively then it is known as a video
conferencing mode of communication or a tool of face-to-face conferencing:
Online tools software:
Skype, Zoom,
Cisco WebEx. GoToMeeting, Google meet, Google classroom, Workplace by
Facebook ,etc
QUESTIONS
1. The
statement “the study, design, development, implementation, support or
management of computer-based information systems, particularly software
applications and computer Hardware” refers to
(1) Information
Technology (IT) (2) Information and
Collaborative Technology (ICT) (3)
Information and Data Technology (IDT)
(4) Artificial Intelligence (AI)
2. Which
of the following represents billion characters? (1) Megabytes (2) Kilobytes (3) Gigabytes (4) Terabytes
3. If
one Giga Byte is equal to 2 30 Bytes of data storage, then 1024 Tera
Bytes is equal to _____ bits of data storage.
(1) 2 50 (2) 253 (3) 240 (4) 256
4. gif,
jpg, bmp, png are used as extensions for files which store (1) audio data (2) image
data (3) video data (4) text
data.
5. The
data storage hierarchy consists of : (1) Bits, bytes,
fields, records, files and databases (2) Bits, bytes, records, fields,
files and databases (3) Bits, bytes, fields, files, records and databases (4)
Bytes, bits, fields, records, files and databases
6. With
regard to e-mail, what does Bcc : mean ?
(1) Blind Computer Communication : - The users specified in the Bcc : field
will get the e-mail and see the addresses in the to : and cc : fields. (2)
Blind Carbon Copy : - The users specified in the Bcc : field will get
the e-mail and see the addresses in the to : and cc : fields. (3) Blind Computer Communication :- The users
specified in the Bcc : field will get the e-mail but it will be an audio file
because this is how blind people get e-mail.
(4) Blind Carbon Copy : The users specified in
the Bcc : field will get the e-mail but will not see the addresses in the to :
and cc : fields.
7. With
regard to a word processing software, the process of combining static
information in a publication together with variable information in a data
source to create one merged publication is called (1) Electronic mail (2) Data sourcing (3) Mail merge
(4) Spam mail
8. Voice mail
1) is the exchange of text messages
and computer files transmitted via
a communications network
such as a local area network or the Internet 2) permits users to converse in real time
with each other via the computer while
connected to the Internet 3) functions munch like an answering machine , allowing callers to leave a voice
message for the called party
4) involves using video and computer technology to conduct a meeting
between participants at geographically
separate locations
9.
Which
of the following is an instant messaging application for specially image chat?
(a) WhatsApp
(b) Google Talk
(c) Twitter
(d) Snapchat
Select the correct answer
from the codes given below:
(1) (a) and (d) only
(2) (c) and (d) only
(3) (d) only
(4) (a), (b) and (c) (d)
10. Which of the
following statements regarding the features of Information and
Communication Technology (ICT) is true?
I. ICT are the main instruments for the
creation of computer networks and the applications based on them.
II. ICT supports the spread of information
and knowledge, separating the content from the place where it belongs
physically.
III. The digital and virtual nature of
most of ICT products allow the expenditure for them to be
maximized.
Codes:
(1) I and II only
(2) I and III only
(3) II and III only
(4) I, II and III
11. Read
the following two statements: I : Information and Communication Technology
(ICT) is considered a subset of Information Technology (IT). II :
The ‘right to use’ a piece of software is termed as copyright. Which of the above statement(s) is/are
correct? (1)
Both I and II (2) Neither I nor II
(3) II only (4) I only
12. Which
one of the following is not a search engine?
(1) Google (2) Chrome (3) Yahoo (4) Bing
13. Which
is not Online tools software?
(1)Google meet
(2) Cisco WebEx. (3)
Skype (4) Microsoft
14.
The
Domain Name System (DNS) is a (1) .net
(2) edu (3)
.pdf (4) .jpg
15. Hacker
often gain entry to a network be pretending to be a network be pretending to be at a legitimate computer?
1)spoofing 2)forging 3)IP spoofing 4) ID theft
No comments:
Post a Comment