Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Computer Applications Guide Pdf Chapter 9 Introduction to Internet and Email Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 11th Computer Applications Solutions Chapter 9 Introduction to Internet and Email

11th Computer Applications Guide Introduction to Internet and Email Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
What is the expansion of WLAN?
a) Wireless Local Area Network
b) Wired local Area Network
c) Wireless Local Area Netware
d) Wireless Area Netbande
Answer:
a) Wireless Local Area Network

Question 2.
Range of Campus Network is
a) 10 KM
b) 5 KM
c) 25 KM
d) 20 KM
Answer:
b) 5 KM

Question 3.
Each computer on net is called
a) host
b) server
c) workstation
d) node
Answer:
a) host

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 4.
The internet is governed by
a) ICANM
b) ICANN
c) ICMA
d) ICNNA
Answer:
b) ICANN

Question 5.
Expansion of W3C
a) World Wide Web Consortium
b) Wide World Web Consortium
c) World Web Wide Consortium
d) World Wide Web Consortium
Answer:
a) World Wide Web Consortium

Question 6.
W3C was established in 1994 by
a) Tim Berners-Lee
b) Tim Burnard Lee
c) Kim Berners
d) Kim Bernard Lee
Answer:
a) Tim Berners-Lee

Question 7.
Hotspot uses which type of network services?
a) LAN
b) PAN
c) WLAN
d) CAN
Answer:
c) WLAN

Question 8.
USB WiFi adapters are often called as
a) Data Card
b) Pen Drive
c) Dongles
d) Memory Card
Answer:
c) Dongles

Question 9.
Looking for information on the internet is called
a) Surfing
b) Searching
c) Finding
d) glancing
Answer:
a) Surfing

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 10.
Safari web browser was developed by
a) Google
b) Apple
c) Microsoft
d) Linux Corpn.
Answer:
b) Apple

Question 11.
How many types of websites are available?
a) 3
b) 2
c) 4
d) 6
Answer:
b) 2

Part – II

II. Very Short Answers

Question 1.
List any four types of available networks.
Answer:
Depending upon geographical area covered by a network, it is classified as:

  1. Local Area Network (LAN)
  2. Metropolitan Area Network (MAN)
  3. Wide Area Network (WAN)
  4. Personal Area Network (PAN)
  5. Campus Area Network (CAN)
  6. Wireless Local Area Network (W-LAN)

Question 2.
Name the two important protocols for internet.
Answer:
The internet uses TCP / IP – Transmission Control Protocol / Internet Protocol to transmit data via various types of media.

Question 3.
What is a network?
Answer:
A network is a collection of interconnected devices such as computers, printers, etc.

Question 4.
What is the role of ICANN?
Answer:
Internet Corporation for Assigned Names and Numbers (ICANN) administers the domain name registration. It helps to avoid a name which is already registered.

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 5.
What is a search engine?
Answer:
A search engine is a software system that is designed to search for information on the World Wide Web.
Examples of popular search engines are Yahoo, Lycos, Altavista, Hotbot, Google and Askjeeves.

Question 6.
What is a browser?
Answer:

  1. A browser is used to access websites and web pages.
  2. Internet Explorer, Chrome, Firefox and Safari are the most popular web browsers.
  3. A browser is used to access the Internet whereas in order to open a search engine we need a browser.

Question 7.
What are the components of url addressing ?
Answer:
A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for Uniform Resource Locator (URL).
The components of url addressing
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 1

Question 8.
What is a website?
Answer:
Website:
A website is a collection of webpages. For example if there is a company that owns sricompany.com then this website will have several webpages like Home, About Us, Contact Us, Testimonials, Products, Services, FAQ’s, and others. The first page of the website is called a Home Page. All of these pages together make up a Website.

Question 9.
What is CC and BCC in an email?
Answer:
The CC (Carbon Copy) field allows us to specify recipients who are not direct addressees (listed in the “To” field). This field is optional.

The BCC (Blind Carbon Copy) field is similar to CC, except the recipients are secret. Each BCC recipient will receive the e-mail, but will not see who else received a copy. The addressees (anyone listed in the “To” field) remain visible to all recipients. This field is optional.

Question 10.
What is a Static Web Page?
Answer:
Web pages are called Static websites as they remain the same whenever it is visited. Examples of static websites are website owned by small business organizations, school websites etc.

Static Web Page:

  • The content and layout of a web page is fixed.
  • Static web pages never use databases.
  • Static web pages directly run on the browser and do not require any server side application program.
  • Static web pages are easy to develop.

Question 11.
What is a Dynamic web page?
Answer:
Websites that displays marks of Public Examinations and Entrance Examinations changes when different register numbers are given. Such websites are called as Dynamic Websites. Eg. Websites of Government and Entrance Exams.

Dynamic Web Page

  • The content and layout may change during run time.
  • Databases are used to generate dynamic content through queries.
  • Dynamic web page runs on the server side application programs and displays the results.
  • Dynamic web page development requires programming skills.

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 12.
What are the benefits of e-governance?
Answer:
Benefits of E-governance:

  • Reduced corruption.
  • High transparency.
  • Increased convenience.
  • Reduction in overall cost.
  • Expanded reach of government.

Question 13.
What is Phishing?
Answer:
Phishing:
Phishing scams are fraudulent attempts by cyber criminals to obtain private information. Phishing scams often appear in the guise of email messages designed to appear as though they are from legitimate sources.

For example, the message would try to lure us into giving our personal information by pretending that our bank or email service provider is updating its website and that we must click on the link in the email to verify our account information and password details.

Part – III

III. Short Answers

Question 1.
Answer:
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 2

Question 2.
What is TCP/IP?
Answer:

  1. The internet uses TCP/IP(Transmission Control Protocol/ Internet Protocol) to transmit data via various types of media.
  2. TCP/IP is not a single networking protocol – it is a suite of protocols named after the two most important protocols or layers within it – TCP and IP.
  3. As with any form of communication, two things are needed: a message to transmit and the means to reliably transmit the message.
  4. The internet protocol (IP) addressing system is used to keep track of the millions of users.

Question 3.
Write a note on Hotspot internet service.
Answer:
Hotspots:

  1. Hotspots are sites that offer Internet access over a wireless local area network (WLAN) by way of a router that then connects to an Internet service provider.
  2. Hotspots utilize Wi-Fi technology, which allows electronic devices to connect to the Internet or exchange data wirelessly through radio waves.
  3. Hotspots can be phone-based or free-standing, commercial or free to the public.

Question 4.
Differentiate Data Card and Dongles.
Answer:
Dongle:
Refers to any removable component used for enabling extra security. USB Dongles can be divided into

  • WiFi Dongle
  • Blue Tooth Dongle
  • Memory Dongle

Data Card:
It is a removable electronic card which is used for storing for data. Types of data card are:

  • Expansion Card
  • Memory Card or Flash Card
  • Identification Card

Question 5.
Write a note on two access methods of connecting to internet.
Answer:
There are two access methods Direct and Indirect and these can be either fixed or mobile.

Indirect Access:

  • This is most common method used in home and office networks.
  • The device e.g. computer connects to a network using Ethernet or WiFi and the network connects to the Internet using Asymmetric digital subscriber line ADSL (cable or fibre).

Direct Access:

  • This is most common method used when travelling.
  • The device e.g. smart phone connects directly to the Internet using 3G/4G mobile networks or public Wi-Fi.

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 6.
Differentiate browser and a search engine with suitable examples.
Answer:

  • A browser is used to access websites and web pages whereas a search engine is used to search for particular information.
  • Internet Explorer, Chrome, Firefox and Safari are the most popular web browsers while Google and Yahoo are the most popular search engines.
  • A browser is used to access the Internet whereas in order to open a search engine we need a browser.

Question 7.
Differentiate Website and Webpage.
Answer:

Webpage Website
Consists of a single document displayed by a browser. A collection of multiple documents displayable by a browser.
Shares a unique domain name. Has its own unique domain name.
Makes up a website. Contains one or more webpages.

Question 8.
What is the difference between Static and dynamic web page?
Answer:

Static Web Page Dynamic Web Page
The content and layout of a web page is fixed. The content and layout may change during run time.
Static Web pages never use databases. Databases is used to generate dynamic content through queries.
Static web pages directly run on the browser and do not require any server side application program. Dynamic web pages runs on the server side application programs and displays the results.
Static Web pages are easy to develop. Dynamic web page development requires programming skills.

Question 9.
Write a note on W3C.
Answer:
1. W3C stands for “World Wide Web Consortium.” The W3C is an international community that includes a full-time staff, industry experts, and several member organizations. These groups work together to develop standards for the World Wide Web.

2. The World Wide Web Consortium (W3C) is an international organization committed to improving the web. It is made up of several hundred member organizations from a variety of related IT industries.

3. W3C sets standards for the World Wide Web (WWW) to facilitate better communication ability and cooperation among all web stakeholders.

4.It was established in 1994 by the creator of the WWW, Tim Berners-Lee.

Question 10.
What are Advantages of email?
Answer:
Advantages of email:

  1. Free delivery – Sending an e-mail is virtually free, outside the cost of Internet service. There is no need to buy a postage stamp to send a letter.
  2. Global delivery – E-mail can be sent to nearly anywhere around the world, to any country.
  3. Instant delivery – An e-mail can be instantly sent and received by the recipient over the Internet.
  4. File attachment – An e-mail can include one or more file attachments, allowing a person to send documents, pictures, or other files with an e-mail.
  5. Long-term storage – E-mails are stored electronically, which allows for Storage and archival over long periods of time.
  6. Environmental friendly – Sending an e-mail does not require paper (Paperless), cardboard, or packing tape, conserving paper resources.

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Part – IV

IV. Explain In Brief

Question 1.
Compare the different geographical types of Network.
Answer:
Depending upon geographical area covered by a network, it is classified as:

  • Local Area Network (LAN)
  • Metropolitan Area Network (MAN)
  • Wide Area Network (WAN)
  • Personal Area Network (PAN)
  • Campus Area Network (CAN)
  • Wireless Local Area Network (W-LAN)

LAN – LOCAL AREA NETWORK:
Range : Upto 10 Km
Location : Refers to same office; same building, same company and in same schools
Speed : Upto 10-100 Mbps
Advantages : Low Cost, Resource Sharing, Security.
Disadvantages : Area Covered-Limited. When number of nodes increases, performance Decreases.
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 3

MAN – Metropolitan Area Network:
Range : 10 to 15 Miles
Location : MAN is a network designed to extend
over an entire city.
Speed : Upto 5-10 Mbps
Advantages : Wider than LAN
Disadvantages : Data rate is slow compared to LAN. Cost higher than LAN.
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 4

WAN – Wide Area Network:
Range : Above 1000 Kms
Location: It span entire countries and continents
Speed : Upto 256 Kbps to 2 Mbps
Advantages : Large geographical Area
Disadvantages : Complicated and Complex. High Cost. Requires high Performance devices. Low security. Cost higher than LAN.
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 5

PAN – Personal Area Network:
Range : Upto 100 meters
Location : Used for shorter distance, controlled
by a single person within a single building.
Speed : upto 250 Kbps
Advantages : Efficient, Cost effective and convenient. Controlled by a single person Hotspot may connect upto 8 devices.
Disadvantages : Shorter distance upto 10 meters only. Data rate is low compared to other network.
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 6

CAN – Campus Area Network:
Range : Upto 5 Kms
Location : Larger than LAN, but smaller than MAN, University, School or Small business, Enterprise.
Speed : 40 KB/s TO 1 MB/s
Advantages : Cost effective, Wired or Wireless Network, High Bandwidth Multi-departmental Network access.
Disadvantages : Difficult to manage.
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 7

WLAN – Wireless Local Area Network:
Range : Upto 50 Kms
Location : Ranges from a single room to an entire campus. Uses Wifi or Bluetooth, Radio waves.
Speed : 1 Mbps to 54 Mbps
Advantages : Portable Installation is quick and easy.
Disadvantages : Low Bandwidth due to interference
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 8

Question 2.
Explain any five types of internet services. Common types of Internet service:
Answer:
Wireless:
Radio frequency bands are used in place of telephone or cable networks. One of the greatest advantages of wireless Internet connections is the “always-on” connection that can be accessed from any location that falls within network coverage. Wireless connections are made possible through the use of a modem, which picks up Internet signals and sends them to other devices.

Mobile:
Many cell phone and smartphone providers offer voice plans with Internet access. Mobile Internet connections provide good speeds and allow you to access the Internet.

Hotspots:
Hotspots are sites that offer Internet access over a wireless local area network (WLAN) by way of a router that then connects to an Internet service provider, Hotspots utilize Wi-Fi technology, which allows electronic devices to connect to the Internet or exchange data wirelessly through radio waves. Hotspots can be phone-based or free-standing, commercial or free to the public.

Broadband:
This high-speed Internet connection is provided through either cable or telephone companies. One of the fastest options available, broadband Internet uses multiple data channels to send large quantities of information. The term broadband is shorthand for broad bandwidth.

Broadband Internet connections such as DSL and cable are considered high-bandwidth connections. Although many DSL connections can be considered broadband, not all broadband connections are DSL.

DSL:
DSL, which stands for Digital Subscriber Line, uses existing 2-wire copper telephone line connected to one’s home so service is delivered at the same time as landline telephone service. Customers can still place calls while surfing the Internet.

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 3.
Explain any five internet applications with suitable examples.
Answer:
Internet Applications
1. Internet telephony:
Internet telephony (e.g. Skype) is another common communications service made possible by the creation of the Internet. VoIP stands for Voice-over-Internet Protocol, referring to the protocol that underlies all Internet communication.

2. Job search:
Nowadays, many people search for their jobs online as it is quicker and there is a larger variety of job vacancies present. People can publish resume online for prospective job. Some of the websites providing this service are naukri.com, monster.com, summerjob. com, recuritmentindia.com etc.

3. Online Shopping:
The internet has also facilitated the introduction of a new market concept consisting of virtual shops. They provide information about products or services for sale through www servers. Using the internet services customers can submit specific product queries and request specific sales quotes.

For example amazon.com is a www based bookshop on the internet where information on all types of international books can be found and books can be ordered online.

4. Stock market updates:
Selling or buying shares sitting on computer through internet. Several websites like ndtvprofit.com, moneypore.com, provide information regarding investment.

5. Travel:
One can use internet to gather information about various tourist place. It can be used for booking holiday tours, hotels, train, bus, flights and cabs. Some of the websites providing this service are goibibo. com, makemytrip.com, olacabs.com.

6. Research:
Research papers are present online which helps in the researcher doing a literature review.

Question 4.
Write a note on any five Internet browsers other than that given in the book.
Answer:
Internet browsers:
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 9
Opera is a web browser for Windows, macOS, and Linux operating systems developed by Norwegian company Opera Software AS. Features of the Opera web browser include private browsing, tabbed browsing, download manager, mouse gestures and browser extensions.

UC Browser is a web browser developed by the Chinese mobile Internet company UCWeb, which is in turn owned by the Alibaba Group. UC Browser is available on several smartphone and feature phone platforms. It has the feature of “fast download” which increases the downloading speed using multiple thread connection download technique.
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 10

Brave is a free and open-source pay-to- surf web browser developed by Brave Software Inc. based on the Chromium web browser and Its Blink engine. The browser blocks ads and website trackers. Currently, the company is developing a feature that allows users to opt in to receiving ads sold by Brave Software in place of the blocked ads.
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 11

Green Browser is a freeware web browser based on Internet Explorer’s core. GreenBrowser is based upon the Trident rendering engine used in Internet Explorer. Green Browser is a full-featured browser, highly customizable but compact in size and low in memory requirements.
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 12

Torch is a Chromium-based web browser and Internet suite developed by Torch Media. The browser handles common Internet- related tasks such as displaying websites, sharing websites via social networks, downloading torrents, accelerating. downloads and grabbing online media, all directly from the browser. Torch Browser is commercial freeware.
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 13

Question 5.
Classify and explain any five e-commerce parties with suitable examples.
Answer:
Classifying e-commerce according to the parties involved:
1. Business to consumer (B2C):
Transactions happen between businesses and consumers. In B2C ecommerce, businesses are the ones selling products or services to end-users (i.e. consumers).

2. Business to business (B2B):
As its name states, B2B e-commerce pertains to transactions conducted between two businesses. Any company whose customers are other businesses operate on a B2B model.

3. Consumer to business (C2B):
Consumer to business e-commerce happens when a consumer sells or contributes monetary value to a business. Many crowd sourcing campaigns fall under C2B e-commerce.

4. Consumer to consumer (C2C):
As we might have guessed, C2C e-commerce happens when something is bought and sold between two consumers. C2C commonly takes place on online marketplaces such as eBay, in which one individual sells a product or service to another.

5. Government to business (G2B):
G2C transactions take place when a company pays for government goods, services, or fees online. Examples could be a business paying for taxes using the Internet.

6. Business to government (B2G):
When a government entity uses the Internet to purchases goods or services from a business, the transaction may fall under B2G e-commerce. Let’s say a city or town hires a web design firm to update its website. This type of deal may be considered a form of B2G.

7. Consumer to government (C2G):
People paying for traffic tickets or paying for their car registration renewals online may fall under this category.

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 6.
Explain the different types of interactions in e-governance.
Answer:
Types of Interactions in e-Governance
1. G2G (Government to Government):
When the exchange of information and services is within the periphery of the government, is termed as G2G interaction. This can be both horizontal, i.e. among various government entities and vertical, i.e. between national, state and local government entities and within different levels of the entity.

2. G2C (Government to Citizen):
The interaction amidst the government and general public is G2C interaction. Here an interface is set up between government and citizens, which enables citizens to get access to wide variety of public services. The citizens has the freedom to share their views and grievances on government policies anytime, anywhere.

3. G2B (Government to Business):
In this case, the e-governance helps the business class to interact with the government seamlessly. It aims at eliminating red-tapism, saving time, cost and establish transparency in the business environment, while interacting with government.

4. G2E (Government to Employees):
The government of any country is the biggest employer and so it also deals with employees on a regular basis, as other employers do. ICT helps in making the interaction between government and employees fast and efficient, along with raising their level of satisfaction by providing perquisites and add-on benefits.

11th Computer Applications Guide Introduction to Internet and Email Additional Important Questions and Answers

Part – I

Choose The Correct Answers:

Question 1.
A(n) …………… is a collection of interconnected devices.
a) network
b) wifi
c) internet
d) modem
Answer:
a) network

Question 2.
Networks decrease ……….
a) cost
b) time
c) effort
d) all the above
Answer:
d) all the above

Question 3.
…………… help in resource optimization.
a) network
b) wifi
c) internet
d) modem
Answer:
a) network

Question 4.
……………. helps to share resources.
a) network
b) wifi
c) internet
d) modem
Answer:
a) network

Question 5.
Depending upon geographical area covered by a network, it is classified as ……………..
types.
a) 3
b) 4
c) 5
d) 6
Answer:
d) 6

Question 6.
What is the expansion of LAN?
a) Local Area Network
b) Linear Access Network
c) Less Access Network
d) Local Access Network
Answer:
a) Local Area Network

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 7.
What is the expansion of MAN?
a) Multiple Access Network
b) Manual Access Network
c) Metropolitan Area Network
d) Multi-purpose Access Network
Answer:
c) Metropolitan Area Network

Question 8.
What is the expansion of WAN?
a) Work Area Network
b) Wide Area Network
c) Wired Area Network
d) Wireless Access Network
Answer:
b) Wide Area Network

Question 9.
What is the expansion of PAN?
a) Public Area Network
b) Popular Access Network
c) Private Area Network
d) Personal Area Network
Answer:
d) Personal Area Network

Question 10.
What is the expansion of CAN?
a) Computer Aided Network
b) Campus Area Network
c) Central Access Network
d) Circular Access Network.
Answer:
b) Campus Area Network

Question 11.
The range of LAN is ………….
a) Upto 10 Km
b) Upto 1-10 Miles
c) Upto 1-100 Km
d) Upto 10-100 Meters
Answer:
a) Upto 10 Km

Question 12.
The range of MAN is ………….
a) Upto 10-100 Meters
b) 10 to 15 Miles
c) Upto 1-100 Miles
d) Upto 10-100 Miles.
Answer:
b) 10 to 15 Miles

Question 13.
The range of PAN is ………………
a) Upto 10-1000 Meters
b) Upto 1-10 Meters
c) Upto 100 Miles
d) Upto 100 Meters
Answer:
d) Upto 100 Meters

Question 14.
The range of CAN is …………….
a) Upto 5 Km
b) Upto 1-10 Km
c) Upto 1-100 Miles
d) Upto 10-100 Km
Answer:
a) Upto 5 Km

Question 15.
The range of WLAN is …………..
a) Upto 5 Km
b) Upto 50 Meters
c) Upto 100 Meters
d) Upto 1-10 Km
Answer:
b) Upto 50 Meters

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 16.
The speed of LAN is ……………..
a) Upto 2 Kbps
b) Upto 1-10 Kbps
c) Upto 1-10 Mbps
d) Upto 10-100 Mbps
Answer:
d) Upto 10-100 Mbps

Question 17.
The speed of MAN is ……………….
a) Upto 5-10 Mbps
b) 10 to 15 Mbps
c) Upto 1-100 Mbps
d) Upto 10-100 Kbps
Answer:
a) Upto 5-10 Mbps

Question 18.
The speed of WAN is …………….
a) Upto 10-100 Mbps
b) Upto 10 to 15 Mbps
c) Upto 1-100 Kbps
d) Upto 256 Kbps-2 Mbps
Answer:
d) Upto 256 Kbps-2 Mbps

Question 19.
The speed of PAN is ……………
a) Upto 10-100 Mbps
b) Upto 1-10 Mbps
c) Upto 250 Kbps
d) Upto 100 Mbps
Answer:
c) Upto 250 Kbps

Question 20.
The speed of CAN is ……………..
a) Upto 5 Kbps
b) Upto 40Kbps -1 Mbps
c) Upto 1-100 Mbps
d) Upto 10-100 Gbps
Answer:
b) Upto 40Kbps -1 Mbps

Question 21.
The speed of WLAN is ……………
a) Upto 10-100 Mbps
b) Upto 1 Mbps -54 Mbps
c) 256Kbps -2 Mbps
d) Upto 10-100 Gbps
Answer:
b) Upto 1 Mbps -54 Mbps

Question 22.
Several networks, small and big all over the world, are connected together to form a Global network called the ……………
a) internet
b) extranet
c) intranet
d) none of these
Answer:
a) internet

Question 23.
The internet uses …………… protocol.
a) TCP
b) IP
c) HTTP
d) Both A and B
Answer:
d) Both A and B

Question 24.
TCP stands for …………..
a) Transmission Control Protocol
b) Transfer Control Protocol
c) Transmission Control Procedure
d) Transmission Channel Protocol
Answer:
a) Transmission Control Protocol

Question 25.
IP stands for …………….
a) International Protocol
b) Internet Protocol
c) Internal Protocol
d) Information Protocol
Answer:
b) Internet Protocol

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 26.
…………… addressing system is used to keep track of the millions of users.
a) The internet protocol (IP)
b) WiFi
c) Modem
d) None of these
Answer:
a) The internet protocol (IP)

Question 27.
Each computer on net is called as …………
a) server
b) host
c) PC
d) None of these
Answer:
b) host

Question 28.
The ………….. is the most cost-effective method of communications in the world.
a) Internet
b) LAN
c) PAN
d) CAN
Answer:
a) Internet

Question 29.
Internet service ¡s
a) Email
b) Web-enabled audio/video conference services
c) Online movies and gaming
d) All the above
Answer:
d) All the above

Question 30.
Internet service is _____ .
a) Data transfer/file-sharing
b) Instant messaging
c) Internet forums
d) All the above
Answer:
d) All the above

Question 31.
Internet service is
a) Social networking
b) Online shopping
c) Financial services
d) All the above
Answer:
d) All the above

Question 32.
________ allows one computer to talk to another computer via the Internet through compiling packets of data and sending them to right location.
a) TCP/IP
b) H1TP
c) Telnet
d) All the above
Answer:
a) TCP/IP

Question 33
In ____ ¡s a private network that uses Internet technology and the public telecommuncation system to securely share part of a business’s information’.
a) Intranet
b) extranet
c) WAN
d) MAN
Answer:
b) extranet

Question 34
An …………… is a website used by organizations to provide a place where employees can access company information.
a) Intranet
b) extranet
c) WAN
d) MAN
Answer:
a) Intranet

Question 35.
Who is called ac father of internet?
a) Bob Kahn
b) Vinton Gray Cerf
c) Bjarne Stroustroop
d) Ken Thompson
Answer:
b) Vinton Gray Cerf

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 36.
Vinton Gray Cerf involved in the formation of
a) W3C
b) ICANN
c) WWW
d) None of these
Answer:
b) ICANN

Question 37.
_______ Is a name or an identity which become a online identity and can be access by the web browser when connected to internet.
a) Browser
b) Search Engine
c) Domain Name
d) None of these
Answer:
c) Domain Name

Question 38.
……………… is the domain name for commercial organisation.
a) .gov
b) .org
c) .net
d) .com
Answer:
d) .com

Question 39.
…………… is the domain name for government institution.
a) .gov
b) .org
c) .net
d) .com
Answer:
a) .gov

Question 40.
………………. is the domain name for non-profit organisation.
a) .gov
b) .org
c) .net
d) .com
Answer:
b) .org

Question 41.
…………….. is the domain name for network support group.
a) .gov
b) .org
c) .net
d) .com
Answer:
c) .net

Question 42.
……………… is the domain name for educational institution.
a) .gov
b) .org
c) .net
d) .edu
Answer:
d) .edu

Question 43.
The heart of intranets and the internet is called as the …………..
a) Domain Name System
b) http
c) Web Sites
d) Browsers
Answer:
a) Domain Name System

Question 44.
uses Internet address information and the DNS to deliver mail and other information from computer to computer
a) HTTP
b) Internet Protocol
c) HTTPS
d) None of these
Answer:
b) Internet Protocol

Question 45.
…………….. is the country level domain name for India.
a) .au
b) .us
c) .jp
d) .in
Answer:
d) .in

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 46.
…………….. is the country level domain name for Australia.
a) .au
b) .us
c) .jp
d) .in
Answer:
a) .au

Question 47.
……………… is the country level domain name for United States of America.
a) .au
b) .us
c) .jp
d) .in
Answer:
b) .us

Question 48.
……………. is the country level domain name for Japan.
a) .au
b) .us
c) .jp
d) .in
Answer:
c) .jp

Question 49.
…………….. is the country level domain name for Russia.
a) .au
b) .us
c) .jp
d) .ru
Answer:
d) .ru

Question 50.
…………….. is the country level domain name for Singapore.
a) .au
b) .us
c) .jp
d) .sg
Answer:
d) .sg

Question 51.
Every server on the internet has an ………… number.
a) IP
b) PIN
c) Secret
d) None of these
Answer:
a) IP

Question 52.
……………. is a unique number consisting of four parts separated by dots.
a) IP Number
b) PIN
c) Secret
d) None of these
Answer:
a) IP Number

Question 53.
The IP number is the server’s …………..
a) password
b) address
c) username
d) none of these
Answer:
b) address

Question 54.
HTTP means …………….
a) Heavy Text Transfer Protocol
b) Hyper Text Transfer Program
c) Hyper Text Tuning Protocol
d) Hyper Text Transfer Protocol
Answer:
d) Hyper Text Transfer Protocol

Question 55.
The URL and the IP number are ……………
a) one and the same
b) different
c) neither same nor different
d) same or different
Answer:
a) one and the same

Question 56.
A ……………. is an address that shows where a particular page can be found on the World Wide Web.
a) HTTP
b) URL
c) Web Page
d) None of these.
Answer:
b) URL

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 57.
URL means ……………..
a) Unique Resource Locator
b) Uniform Resource Launcher
c) Uniform Resource Locator
d) Uniform Resource Loader
Answer:
c) Uniform Resource Locator

Question 58.
Identify the correct statement.
a) The internet as a whole does not have a single controller.
b) ICANN was created on September 18, 1998, and incorporated on September 30, 1998, in the US State of California.
c) Web site addresses are given “word-based” addresses called URL.
d) All the above
Answer:
d) All the above

Question 59.
Expand ICANN.
a) Internet Corporation for Assigned Name and Numbers
b) International Corporation for Assigned Name and Numbers
c) Intermediate Corporation for Assigned Name and Numbers
d) Internet Consortium for Assigned Name and Numbers
Answer:
a) Internet Corporation for Assigned Name and Numbers

Question 60.
W3C stands for ……………..
a) World Wide Web Council
b) World Wide Web Computer
c) World Wide Web Consortium
d) Worldwide Web Corporation
Answer:
c) World Wide Web Consortium

Question 61.
………………. develop standards for the World Wide Web.
a) W3C
b) ICANN
c) TCP/IP
d) None of these
Answer:
a) W3C

Question 62.
W3C was established in the year ……………
a) 1994
b) 1995
c) 1993
d) 1984
Answer:
a) 1994

Question 63.
W3C was established by ……………..
a) Bob Kahn
b) Tim Berners-Lee
c) Bjarne Stroustroop
d) Kerl Thompson
Answer:
b) Tim Berners-Lee

Question 64.
The creator of the WWW ……………
a) Bob Kahn
b) Tim Berners-Lee
c) Bjarne Stroustroop
d) Ken Thompson
Answer:
b) Tim Berners-Lee

Question 65.
……………… is internet service type.
a) Wireless
b) Mobile
(c) Hotspot
d) All the above
Answer:
d) All the above

Question 66.
…………….. is internet service type.
a) Broadband
b) DSL
c) Cable
d) All the above
Answer:
d) All the above

Question 67.
…………….. is internet service type.
a) Satellite
b) ISDN
c) Dongles
d) All the above
Answer:
d) All the above

Question 68.
…………….. are sites that offer Internet access over a wireless local area network (WLAN) by way of a router that then connects to an Internet service provider.
a) Hotspots
b) ISDN
c) DSL
d) None of these
Answer:
a) Hotspots

Question 69.
……………. utilize Wi-Fi technology.
a) Hotspots
b) ISDN
c) DSL
d) None of these
Answer:
a) Hotspots

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 70.
Identify the correct statement from the following.
a) Wireless connections are made possible through the use of a modem, which picks up Internet signals and sends them to other devices.
b) Mobile Internet connections provide good speeds and allow you to access the Internet.
c) Hotspots can be phone-based or free-standing, commercial or free to the public.
d) All the above
Answer:
d) All the above

Question 71.
High-speed Internet connection is provided through ………………
a) Telephone companies
b) Cable
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 72.
DSL stands for …………….
a) Digital Subscriber Locater
b) Digital Subscriber Licence
c) Digital Subscriber Link
d) Digital Subscriber Line
Answer:
d) Digital Subscriber Line

Question 73.
Customers can place calls while surfing the Internet using …………..
a) Hotspots
b) ISDN
c) DSL
d) None of these
Answer:
c) DSL

Question 74.
ISDN stands for ……………..
a) Integrated Services Digital Network
b) Integrated Services Direct Network
c) integrated Services Dual Network
d) Integrated Services Discrete Network
Answer:
a) Integrated Services Digital Network

Question 75.
……………. allows users to send data, voice and video content over digital telephone lines or standard telephone wires.
a) Hotspots
b) ISDN
c) DSL
d) None of these
Answer:
b) ISDN

Question 76.
USB Wi-Fi adapters are often called ……………..
a) dongles
b) Hotspot
c) ISDN
d) DSL
Answer:
a) dongles

Question 77.
……………. dongle allows to connect to the Internet even when Wi-Fi is not available.
a) Built-in Wi-Fi chips
b) Mobidata adapters
c) Both A and B
d) None of these
Answer:
c) Both A and B

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 78.
USB Dongle is …………….
a) WiFi Dongles
b) Bluetooth Dongle
c) Memory Dongle
d) All the above
Answer:
d) All the above

Question 79.
Type of datacard is ……………
a) Expansion Card
b) Memory Card or Flash Card
c) Identification Card
d) All the above
Answer:
d) All the above

Question 80.
There are …………….. access methods of internet.
a) two
b) three
c) four
d) five
Answer:
a) two

Question 81.
……………… method Is most common method used in home and office networks.
a) Direct access
b) Indirect access
c) Both A and B
d) None of these
Answer:
b) Indirect access

Question 82.
ADSL stands for ……………..
a) Asynchronous digital subscriber line
b) Advanced digital subscriber line
c) Asymmetric digital subscriber line
d) All digital subscriber line
Answer:
c) Asymmetric digital subscriber line

Question 83.
……………… access method of internet is most common method used when travelling.
a) Direct access
b) Indirect access
c) Both A and B
d) None of these
Answer:
a) Direct access

Question 84.
The smart phone connects directly to the Internet using ……………..
a) 3G/4G mobile networks
b) public Wi-Fi
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 85.
There are …………….. ways to look for the information on the web.
a) two
b) three
c) four
d) five
Answer:
a) two

Question 86.
If is the URL is not known, then ………………. will help us to get the information.
a) Search Engines
b) Browsers
c) Websites
d) None of these
Answer:
a) Search Engines

Question 87.
A ……………… is a software system that is designed to search for information on the World Wide Web.
a) Search Engine
b) Browsers
c) Websites
d) None of these
Answer:
a) Search Engine

Question 88.
………………. is a search engine.
a) Yahoo and Lycos
b) Altavista and Hotbot
c) Google and Askjeeves
d) All the above
Answer:
d) All the above

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 89.
A …………….. is used to access websites and web pages.
a) Browser
b) Search engine
c) WWW
d) None of these
Answer:
a) Browser

Question 90.
……………. is used to search for particular information.
a) Browser
b) Search engine
c) WWW
d) None of these
Answer:
b) Search engine

Question 91.
…………… is a browser.
a) Internet Explorer
b) Chrome
c) Firefox and Safari
d) All the above
Answer:
d) All the above

Question 92.
SERP means ………………
a) Search Engine Result Page
b) Search Engine Request Page
c) Search Engine Reset Page
d) Search Engine Router Page
Answer:
a) Search Engine Result Page

Question 93.
VoIP stands for …………..
a) Voice-over-Integrated Protocol
b) Voice-over-Internet Page
c) Voice-over-Internal Protocol
d) Voice-over-Internet Protocol
Answer:
d) Voice-over-Internet Protocol

Question 94.
……………… referring to the protocol that underlies all Internet communication.
a) VoIP
b) Telnet
c) TCP/IP
d) All the above
Answer:
a) VoIP

Question 95.
……………….. is a job search web site.
a) naukri.com and monster.com
b) summerjob.com
c) recuritmentindia.com
d) All the above
Answer:
d) All the above

Question 96.
………………….. is used for online shopping.
a) amazon.com
b) flipkart.com
c) snapdeal.com
d) all the above
Answer:
d) all the above

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 97.
………………… websites provide information regarding investment.
a) ndtvprofit.com
b) moneypore.com
c) nseindia.com
d) all the above
Answer:
d) all the above

Question 98.
………………. web site providing travel services.
a) goibibo.com
b) makemytrip.com
c) olacabs.com
d) all the above
Answer:
d) all the above

Question 99.
………………. is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the Internet,
a) e-Commerce
b) Commerce
c) Internet commerce
d) None of these
Answer:
a) e-Commerce

Question 100.
Largest e-commerce company in India is ………………
a) Flipkart and Snapdeal
b) Amazon India
c) Paytm
d) All the above
Answer:
d) All the above

Question 101.
…………………… is the use of internet-based social media programs to make connections with friends, family, classmates, customers and clients.
a) Intranet
b) Social networking
c) Extranet
d) None of these
Answer:
b) Social networking

Question 102.
Example of social networking is ……………..
a) Facebook
b) Twitter
c) Telegram
d) All the above
Answer:
d) All the above

Question 103.
……………. is an electronic payment system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial institution’s website.
a) e-Banking
b) Online banking
c) Internet banking
d) All the above
Answer:
d) All the above

Question 104.
……………. is course that is specifically delivered via the internet to somewhere other than the classroom where the professor is teaching.
a) e-Learning
b) Smart learning
c) Virtual learning
d) None of these
Answer:
a) e-Learning

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 105.
……………. is not a course delivered via a DVD or CD-ROM, video tape or over a television channel.
a) e-Learning
b) Smart learning
c) Virtual learning
d) None of these
Answer:
a) e-Learning

Question 106.
The first mail was sent by ………………
a) Ray Tomlinson
b) Tim Berners-Lee
c) Vinton Gray Cerf
d) Bill Gates
Answer:
a) Ray Tomlinson

Question 107.
The first mail was sent in ……………….. year.
a) 1972
b) 1971
c) 1981
d) None of these
Answer:
b) 1971

Question 108.
The first mail was sent as a test e-mail message containing the text like ……………..
a) QWERTYUIOP
b) First Mail
c) ZXCVBNMUIOP
d) None of these
Answer:
a) QWERTYUIOP

Question 109.
……………. is information stored on a computer that is exchanged between two users over telecommunications.
a) E-Learning
b) Electronic mail
c) Browsing
d) Surfing
Answer:
b) Electronic mail

Question 110.
is a message that may contain text files, images or any other attachments sent through a network to a specified individual or group of individuate.
a) Email
b) SMS
c) Chatting
d) All the above
Answer:
a) Email

Question 111.
………………. is a field in e-mail.
a) To and From
b) CC and BCC
c) Subject
d) All the above
Answer:
d) All the above

Question 112.
While sending an e-mail, the ……………… field is where we type the e-mail address of the person who is the recipient of our message.
a) To
b) From
c) BCC
d) All the above
Answer:
a) To

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 113.
While sending an e-mail, the ……………… field should contain our e-mail address.
a) To
b) From
c) BCC
d) All the above
Answer:
b) From

Question 114.
If we are replying to a message, the field is automatically filled out.
a) To and From
b) CC and BCC
c) Subject
d) All the above
Answer:
a) To and From

Question 115.
While sending an e-mail, the ………………. field consist of a few words describing the e-mail’s contents.
a) To
b) From
c) BCC
d) Subject.
Answer:
d) Subject.

Question 116.
While sending an e-mail, the …………….. field is an optional.
a) CC
b) BCC
c) Subject
d) All the above
Answer:
d) All the above

Question 117.
The …………….. field lets the recipient see what the e-mail is about, without opening and reading the full e-mail.
a) To
b) From
c) BCC
d) Subject
Answer:
d) Subject

Question 118.
While sending an e-mail, the ……………… field allows us to specify recipients who are not direct addressees.
a) To
b) CC
c) From
d) Subject
Answer:
b) CC

Question 119.
While sending an e-mail,the …………….. is the location we type our main message.
a) To
b) CC
c) From
d) Message Body
Answer:
d) Message Body

Question 120.
What is sent in an e-mail?
a) A picture
b) PDF file
c) Word processor document
d) All the above
Answer:
d) All the above

Question 121.
A computer …………….. is a small piece of software that can spread from one infected computer to another.
a) virus
b) anti-virus
c) Either A or B
d) none of these
Answer:
a) virus

Question 122.
Malware means ……………..
a) Malicious software
b) Malicious hardware
c) Malicious socialware
d) None of these
Answer:
a) Malicious software

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 123.
Malware could be computer …………….
a) Viruses
b) Worms
c) Trojan horses
d) All the above
Answer:
d) All the above

Question 124.
…………….. software that records every keystroke on our keyboard.
a) Keylogger
b) Mouselogger
c) Operating Ssytem
d) All the above
Answer:
a) Keylogger

Question 125.
A computer ………………….. is a software program that can copy itself from one computer to another, without human interaction.
a) Worm
b) Anti-virus
c) Game
d) None of these
Answer:
a) Worm

Question 126.
A …………….. is a group of computers connected to the Internet that have been compromised by a hacker using a computer virus or Trojan horse.
a) Keylogger
b) botnet
c) Rootkit
d) None of these
Answer:
b) botnet

Question 127.
An individual computer in the botnet group is known as a ……………… computer.
a) Zombie
b) Worm
c) Rootkit
d) None of these
Answer:
a) Zombie

Question 128.
………….. is an unwanted message in our email inbox.
a) Rootkit
b) Trash
c) Spam
d) None of these
Answer:
c) Spam

Question 129.
………….. is a nuisance as it can clutter your mailbox as well as potentially take up space on your mail server.
a) Spam
b) Electronic junk mail
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 130.
……………… scams are fraudulent attempts by cybercriminals to obtain private information.
a) Phishing
b) Botnet
c) Rootkit
d) All the above
Answer:
a) Phishing

Question 131.
A ……………… is a collection of tools that are used to obtain administrator-level access to a computer or a network of computers.
a) Phishing
b) Botnet
c) Rootkit
d) All the above
Answer:
c) Rootkit

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 132.
…………… may contain spyware that monitors and records keystrokes.
a) Phishing
b) Botnet
c) Rootkit
d) All the above
Answer:
c) Rootkit

Question 133.
Looking for information on the internet is called ……………
a) surfing
b) browsing
c) surfing or browsing
d) None of these
Answer:
c) surfing or browsing

Question 134.
To browse the internet, a software called the …………… is used.
a) web browser
b) browser
c) web browser or browser
d) None of these
Answer:
c) web browser or browser

Question 135.
………….. translates HTML documents of the website and allows to view it on the screen.
a) Web browser
b) Spam
c) Phishing
d) None of these
Answer:
a) Web browser

Question 136.
Google Chrome is a freeware familiar web browser developed by …………..
a) Google Inc
b) Mozilla Corporation
c) Apple Inc
d) Microsoft
Answer:
a) Google Inc

Question 137.
Mozila Firefox is a free and open source web browser developed by …………..
a) Google Inc
b) Mozilla Corporation
c) Apple Inc
d) Microsoft
Answer:
b) Mozilla Corporation

Question 138.
Internet Explorer is developed by ………..
a) Google Inc
b) Mozilla Corporation
c) Apple Inc
d) Microsoft
Answer:
d) Microsoft

Question 139.
Safari is a web browser developed by ……………..
a) Google Inc
b) Mozilla Corporation
c) Apple Inc
d) Microsoft
Answer:
c) Apple Inc

Question 140.
……………. browser exclusively used in Apple Mac system.
a) Google Inc
b) Mozilla Corporation
c) Apple Inc
d) Microsoft
Answer:
c) Apple Inc

Question 141.
……………. is default browser in Ubuntu.
a) Google Chrome
b) Mozilla Firefox
c) Safari
d) Internet Explorer
Answer:
b) Mozilla Firefox

Question 142.
…………….. supports Windows, Mac OS X, Linux and Android system.
a) Google Chrome
b) Mozilla Firefox
c) Safari
d) Internet Explorer
Answer:
b) Mozilla Firefox

Question 143.
…………………. supports on Android 4.0 or higher, iOS 6.0 or higher, Mac OSX 10.6 or higher and Windows XP or higher and Linux system.
a) Google Chrome
b) Mozilla Firefox
c) Safari
d) Internet Explorer
Answer:
a) Google Chrome

Question 144.
……………. is best for its speed, simplicity, security, privacy and customization features.
a) Google Chrome
b) Mozilla Firefox
c) Safari
d) Internet Explorer
Answer:
a) Google Chrome

Question 145.
A ……………… is a collection of webpages.
a) Website
b) Surfing
c) Browsing
d) None of these
Answer:
a) Website

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 146.
The first page of the website is called a ……………… Page.
a) Start
b) Home
c) Default
d) None of these
Answer:
b) Home

Question 147.
…………….. is a webpage.
a) Home / About Us
b) Contact Us / Testimonials
c) Products / Services / FAQ’s,
d) All the above
Answer:
d) All the above

Question 148.
A webpage is a …………….. of a Website.
a) Page
b) Screen
c) Home page
d) None of these
Answer:
a) Page

Question 149.
A web page can be accessed by a ……………… in a browser.
a) URL
b) Protocol
c) Home page
d) None of these
Answer:
a) URL

Question 150.
Every webpage has a unique address called
a) URL
b) Protocol
c) Home page
d) None of these
Answer:
a) URL

Question 151.
The ……………… locates the pages on the internet.
a) URL
b) Protocol
c) Home page
d) None of these
Answer:
a) URL

Question 152.
Web pages are classified as ……………… types.
a) 4
b) 2
c) 5
d) 3
Answer:
b) 2

Question 153.
Web pages are classified as …………… webpages.
a) Static
b) Dynamic
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 154.
Web pages are called ……………. websites as they remain the same whenever it is visited.
a) Static
b) Dynamic
c) Both A and B
d) None of these
Answer:
a) Static

Question 155.
Web pages are called ……………… websites as they change during run time.
a) Static
b) Dynamic
c) Both A and B
d) None of these
Answer:
b) Dynamic

Question 156.
Website owned by Small business organizations, School .websites etc. are ………………. websites.
a) Static
b) Dynamic
c) Both A and B
d) None of these
Answer:
a) Static

Question 157.
Websites of Government and Entrance Exams are ……………. websites.
a) Static
b) Dynamic
c) Both A and B
d) None of these
Answer:
b) Dynamic

Question 158.
………………… is the activity of buying or selling of products on online services or over the Internet.
a) E-commerce
b) EDI
c) Amazon
d) None of these
Answer:
a) E-commerce

Question 159.
EDI means ………………
a) External Data Interchange
b) Essential Data Interchange
c) Endless Data Interchange
d) Electronic Data Interchange
Answer:
d) Electronic Data Interchange

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 160.
B2C means ……………
a) Business to Corporate
b) Business to Customer
c) Business to Consumer
d) Business to Company
Answer:
c) Business to Consumer

Question 161.
B2B means ………………..
a) Business to Broadrange
b) Business to Business
c) Business to Bank
d) Business to Broker
Answer:
b) Business to Business

Question 162.
C2B means ……………
a) Consumer to Business
b) Corporate to Business
c) Consumer to Bank
d) Company to Business
Answer:
a) Consumer to Business

Question 163.
C2C means ……………
a) Consumer to Company
b) Consumer to Consumer
c) Consumer to Citizen
d) Consumer to Corporate
Answer:
b) Consumer to Consumer

Question 164.
G2B means ………………
a) Government to Business
b) Government to Bank
c) Goods to Business
d) Global to Business
Answer:
a) Government to Business

Question 165.
B2G means …………….
a) Bids to Government
b) Brokers to Government
c) Business to Government
d) Bank to Government
Answer:
c) Business to Government

Question 166.
G2C means …………..
a) Government to Consumer
b) Government to Corporate
c) Government to Contractor
d) Government to Citizen
Answer:
d) Government to Citizen

Question 167.
G2G means ………………
a) Government to Government
b) Government to Goods
c) Government to Global
d) Government to Group
Answer:
a) Government to Government

Question 168.
G2E means ……………
a) Government to Exporters
b) Government to Employees
c) Government to Experts
d) Government to Endusers
Answer:
b) Government to Employees

Question 169.
ICT means ………………
a) Information and Communication Technology
b) Information and Communication Technic
c) Information and Communication Trend
d) International Communication Technology
Answer:
a) Information and Communication Technology

Question 170.
………………… is a type of Interactions in e-Governance.
a) Government to Government
b) Government to Employees
c) Government to Citizen
d) All the above
Answer:
d) All the above

Question 171.
Theme of Safer Internet Day is …………..
a) Create
b) Connect
c) Share respect
d) All the above
Answer:
d) All the above

Question 172.
Safer Internet Day is celebrated around the world in …………….. of every year.
a) February
b) May
c) December
d) October
Answer:
a) February

Question 173.
When setting our password, use a mixture of …………….
a) Letters
b) Numbers
c) Upper and Lower case characters
d) All the above
Answer:
d) All the above

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 174.
……………… is a software managing technique through which programs that are suspected to be infected with a virus can be run.
a) Sandboxing
b) IoT
c) Social Network
d) None of these
Answer:
a) Sandboxing

Question 175.
IoT means …………….
a) Internet of Trade
b) Internet of Techniques
c) Information of Things
d) Internet of Things
Answer:
d) Internet of Things

Question 176.
……………. is the network of physical devices, such as vehicles, home appliances.
a) Internet of Trade
b) Internet of Techniques
c) Information of Things
d) Internet of Things
Answer:
d) Internet of Things

Part – II

II. Very Short Answers

Question 1.
Define: Internet.
Answer:
Several networks, small and big all over the world, are connected together to form a Global network called the internet.

Question 2.
What do you mean by host?
Answer:
Each computer on net is called as host.

Question 3.
What are the protocols used by internet?
Answer:
The Internet works by using a protocol called TCP/IP. TCP/IP allows one computer to talk to another computer via the Internet through compiling packets of data and sending them to right location.

Question 4.
What is extranet?
Answer:
An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business’s information or operations with suppliers, vendors, partners, customers, or other businesses.

Question 5.
What is intranet?
Answer:
An Intranet is a website used by organizations to provide a place where employees can access company information, tools and collaborate to social sharing tools similar to facebook.

Question 6.
Write note on domain name.
Answer:
It is a name or an identity which become an online identity and can be access by the web browser when connected to internet.
Example: .com/.edu

Question 7.
Write about domain name system.
Answer:
The heart of intranets and the internet is called as the Domain Name System(DNS), the way computers can contact each other and do things such as exchange electronic mail or display Web pages. The Internet Protocol (IP) uses this Internet address information and the DNS to deliver mail and other information from computer to computer.

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 8.
What is URL?
Answer:
Every server on the internet has an IP number, a unique number consisting of four parts separated by dots. The IP number is the server’s address.

Example:
165.113.245.2
128.143.22.55
Addresses are given “word-based” addresses called URL. The URL and the IP number are one and the same.

Question 9.
Who Governs the Internet?
Answer:
1. The internet as a whole does not have a single controller. But the internet society, which is a voluntary membership organization, takes the responsibility to promote global information exchange through the internet technology.

2. Internet Corporation for Assigned Names and Numbers (ICANN) administers the domain name registration. It helps to avoid a name which is already registered.

Question 10.
What is e-mail?
Answer:

  • Electronic mail or email is information stored on a computer that is exchanged between two users over telecommunications.
  • Email is a message that may contain text, files, images or any other attachments sent through a network to a specified individual or group of individuals.

Question 11.
What is sent in an email?
Answer:
In addition to text messages being sent over e-mail, it is also possible to attach a file or other data in an e-mail. For example, an attachment could be a picture, PDF, wordprocessor document, or any file stored on the computer.

Question 12.
What is computer virus?
Answer:
Computer virus:
A computer virus is a small piece of software that can spread from one infected computer to another. The virus could corrupt, steal, or delete data on our computer-even erasing everything on our hard drive. A virus could also use other programs like our email program to spread itself to other computers.

Question 13.
What is malware?
Answer:
Malware:
Malware is short for “malicious software”. Malware is used to mean a “variety of forms of hostile, intrusive, or annoying software or program code.” Malware could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious rootkits.

Question 14.
Write about Trojan horse.
Answer:
Trojan horse:
Users can infect their computers with Trojan horse software simply by downloading an application they thought was legitimate but was in fact malicious. Once it enters inside the computer, a Trojan horse can do anything from recording our passwords by logging its keystrokes, hijacking our webcam to watch and record every movement.

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 15.
Write about malicious spyware.
Answer:
Malicious spyware:
1. Malicious spyware is used to describe the Trojan application that was created by cyber criminals to spy on their victims.

2. An example would be key logger software that records a victim’s ever/ keystroke on our keyboard. The recorded information is periodically sent back to the originating cyber criminal over the Internet.

3. Keylogging software is widely available and is marketed to parents or businesses that want to monitor their kids’ or employees’ Internet usage.

Question 16.
Write note on botnet.
Answer:
Botnet:
A botnet is a group of computers connected to the Internet that have been compromised by a hacker using a computer virus or Trojan horse. An individual computer in the group is known as a “zombie” computer.

Question 17.
What is spam?
Answer:
Spam:
Unwanted messages in our email inbox. Spam, or electronic junk mail, is a nuisance as it can clutter our mailbox as well as potentially take up space on our mail server. However, spam messages can contain links that when clicked on could go to a website that installs malicious software onto our computer.

Question 18.
What is rootkit?
Answer:
Rootkit:
A rootkit is a collection of tools that are used to obtain administrator-level access to a computer or a network of computers. A rootkit could be installed on our computer by a cyber criminal exploiting a vulnerability or security hole in a legitimate application on our PC and may contain spyware that monitors and records keystrokes.

Question 19.
Define Browsing or Surfing.
Answer:
Looking for information on the internet is called surfing or browsing. To browse the internet, software called the web browser or browser is used.

Question 20.
What is sandboxing?
Answer:
Sandboxing is a software managing technique through which programs that are suspected to be infected with a virus can be run. The programs are run is a separated memory area and therefore cannot damage the operating systems.

Question 21.
What is the theme of SID?
Answer:
Safer Internet Day (SID) 2018 is celebrated around the world in February of every year with a theme of “Create, connect and share respect: A better internet starts with you”.

Question 22.
Write note on ISDN.
Answer:
1. ISDN (Integrated Services Digital Network) allows users to send data, voice and video content over digital telephone lines or standard telephone wires.
2. The installation of an ISDN adapter is required at both ends of the transmission on the part of the user as well as the Internet access provider.

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Part – III

III. Short Answers

Question 1.
What are the different methods of accessing the Internet?
Answer:
Indirect Access:
This is most common method used in home and office networks. The device e.g. computer connects to a network using Ethernet or WiFi and the network connects to the Internet using Asymmetric digital subscriber line ADSL (cable or fibre).

Direct Access:
This is most common method used when traveling. The device e.g. smart phone connects directly to the Internet using 3G/4G mobile networks or public Wi-Fi. There are two ways to look for the information on the web.

Question 2.
What are the ways to look for the information on the web?
Answer:

  1. If the URL of the website is known, enter it on the address bar.
  2. If is the URL is not known, then “Search Engines” will help us to get the information.

Question 3.
Write note on e-commerce, e-commerce:
Answer:

  1. e-commerce (electronic commerce or EC) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the Internet.
  2. These business transactions occur either business-to-business, business-to-consumer, consumer-to-consumer or consumer-to- business.
  3. Largest e-commerce companies in India are Flipkart, Snapdeal, Amazon India, Paytm.

Question 4.
Write about social networking.
Answer:
Social Networking:
Social networking is the use- of internet- based social media programs to make connections with friends, family, classmates, customers and clients. Social networking can be done for social purposes, business purposes or both.

The programs show the associations . between individuals and facilitate the acquisition of new contacts. Examples of social networking includes Facebook.

Question 5.
What do you mean by e-banking?
Answer:
e-banking:
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 14
e-banking (Online banking), also known as internet banking, it is an electronic payment system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial institution’s website.

The online banking system will typically connect to or be part of the core banking system operated by a bank and. is in contrast to branch banking which was the traditional way customers accessed banking services.

Question 6.
Write about e-learning.
Answer:

  1. It is a program delivered completely online. E-learning is interactive in that we can also communicate with teachers, professors or other students in a class.
  2. Sometimes it is delivered live, where we can “electronically” raise our hand and interact in real time and sometimes it is a lecture that is prerecorded.
  3. There is always a teacher/professor interacting/ communicating, grading participation, giving assignments and conducting tests.

Question 7.
What is computer worm?
Answer:
Computer worm:
A computer worm is a software program that can copy itself from one computer to another, without human interaction. Worms can replicate in great volume and with great speed. For example, a worm can send copies of itself to every contact in our email address book and then send itself to all the contacts in our contacts’ address books.

Because of their speed of infection, worms often gain notoriety overnight infecting computers across the globe as quickly as victims around the world and switch them on to open their email.

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 8.
Write about Webpage.
Answer:
Webpage:
A webpage is a page of a Website. A webpage can be accessed by a URL in a browser and that page can be copied and or send to a friend for review whereas websites are collections of multiple page that must be navigated to view other content.

Question 9.
Explain IoT.
Answer:
The Internet of Things (IoT) is the network of physical devices, such as vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators and connectivity which enables these things to connect and exchanges data creating opportunities for more direct integration of the physical world into computer – based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions.

Question 10.
Write about broadband.
Answer:
Broadband:
This high-speed Internet connection is provided through either cable or telephone companies. One of the fastest options available, broadband Internet uses multiple data channels to send large quantities of information. The term broadband is shorthand for broad bandwidth.

Broadband Internet connections such as DSL and cable are considered high-bandwidth connections. Although many DSL connections can be considered broadband, not all broadband connections are DSL.

Part – IV

IV. Explain In Brief

Question 1.
What are the different browsers? Explain.
Answer:
Familiar Internet Browser:
1. Google Chrome is a freeware familiar web browser developed by Google Inc. It is best for its speed, simplicity, security, privacy and customization features. Google Chrome supports on Android 4.0 or higher, iOS 6.0 or higher, Mac OSX 10.6 or higher and Windows (XP or higher) and Linux system.

2. Mozila Firefox is a free and open source web browser developed by Mozilla Foundation and Mozilla Corporation. Firefox is default browser in Ubuntu. It supports Windows, Mac OS X, Linux and Android system.

3. Internet Explorer commonly known as Microsoft Internet Explorer or Windows Internet Explorer is the first or default browser for a Windows PC. It is developed by Microsoft.

4. Safari is a web browser developed by Apple Inc. and comes with OS X and iOS. Some version of safari browser also supports in. Windows Operating System. Exclusively used in Apple Mac system.

Question 2.
What are the do’s and don’t of safe Surfing on Internet?
Answer:
1. Don’t give out our personal information – Don’t put personal details such as our home address, telephone numbers or parent’s work address online as cyber criminals can use this information to create a fake profile with our details.

2. What goes online, stays online – Use privacy settings to make sure only our friends and family can see photos we post. Avoid posting holiday plans as criminals have been known, to track our movements.

3. Check our security and privacy settings – Make sure our social network privacy settings are secured so only our friends can see our personal information and use our privacy settings to restrict who can see our posts, videos and photos.

4. Password safety – Sharing our password with our parents is a sensible idea, but avoid sharing our password with our friends, even if they promise they won’t tell anyone Also, when setting our password, make sure it isn’t something people may guess such as our pet’s name. Use a mixture of letters, numbers and upper and lower case characters.

5. Always protect our mobile device – Make sure our mobile phone is pin-protected so all our personal information stored on it is safe. Download a security app which allows us to remotely wipe any personal data, should our mobile be lost or stolen.

6. Don’t talk to strangers online or offline – Don’t meet up with strangers and let our parents know if a stranger has tried to get in contact with us online.

7. Listen to the adults who know – Adults will always be worried about us. Help set their mind at rest and avoid chatting online with strangers.

8. Be wary of unsecured or unknown websites – When shopping online, use reputable and known retailers.

9. Be careful what links we click on – Avoid clicking links in an email, Instant Message or on our social network unless we are sure the message is from someone we know.

Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email

Question 3.
Explain the structure of email.
Answer:
Structure of email:
Click the Compose button and then writing an e-mail contents.
Samacheer Kalvi 11th Computer Applications Guide Chapter 9 Introduction to Internet and Email 15
When sending an e-mail message, several fields are required to be filled: The To field is where we type the e-mail address of the person who is the recipient of our message.

The From field should contain our e-mail address.

1. If we are replying to a message, the To and From fields are automatically filled out; if it’s a new message, we’ll need to enter them manually.

2. The Subject should consist of a few words describing the e-mail’s contents. The Subject lets the recipient see what, the e-mail is about, without opening and reading the full e-mail. This field is optional.

3. The CC (Carbon Copy) field allows us to specify recipients who are not direct addressees (listed in the “To” field). This field is optional.

4. The BCC (Blind Carbon Copy) field is similar to CC, except the recipients are secret. Each BCC recipient will receive the e-mail, but will not see who else received a copy. The addressees (anyone listed in the “To” field) remain visible to all recipients. This field is optional.

5. Finally, the Message Body is the location we type our main message. It often contains our signature at the bottom; similar to a hand-written later.

Leave a Reply