You are on page 1of 12

Q) What is E-Commerce? Write its Advantage and disadvantage?

E-Commerce or Electronics Commerce is a methodology(method) of modern business which addresses


the need of business organizations, vendors and customers to reduce cost and improve the quality of goods and
services while increasing the speed of delivery. E-commerce refers to paperless exchange of business
information using following ways.

 Electronic Data Exchange (EDI)/ EDP(Electronic data processing)


 Electronic Mail (e-mail)
 Electronic Bulletin Boards
 Electronic Fund Transfer (EFT)
 Other Network-based technologies.

Advantages of Ecommerce

 Faster buying/selling procedure, as well as easy to find products.


 Buying/selling 24/7.
 More reach to customers, there is no theoretical geographic limitations.
 Low operational costs and better quality of services.
 No need of physical company set-ups.
 Easy to start and manage a business.
 Customers can easily select products from different providers without moving around physically.

Disadvantages of Ecommerce

 Any one, good or bad, can easily start a business. And there are many bad sites which eat up
customers’ money.
 There is no guarantee of product quality.
 Mechanical failures can cause unpredictable effects on the total processes.
 As there is minimum chance of direct customer to company interactions, customer loyalty is always on
a check.
 There are many hackers who look for opportunities, and thus an ecommerce site, service, payment
gateways, all are always prone to attack.

Q) What is security of business transaction(SBT)/ Secure electronic transation(SET)? Discuss its future
prospects?

Security is an essential part of any transaction that takes place over the internet. Customer will loose
his/her faith in e-business if its security is compromised. Following are the essential requirments for safe e-
payments/transactions −

 Confidential − Information should not be accessible to unauthorized person. It should not be


intercepted during transmission.
 Integrity − Information should not be altered during its transmission over the network.
 Availability − Information should be available wherever and whenever requirement within time limit
specified.
 Authenticity − There should be a mechanism to authenticate user before giving him/her access to
required information.
 Non-Repudiabiity − It is protection against denial of order or denial of payment. Once a sender sends
a message, the sender should not able to deny sending the message. Similary the receipient of message
should not be able to deny receipt.
 Encryption − Information should be encrypted and decrypted only by authorized user.
 Auditability − Data should be recorded in such a way that it can be audited for integrity requirements.

Future prospects of SBT are:-

 Online shopping web sites for retail sales direct to consumers


 Providing or participating in online marketplaces, which process third-party business-to-consumer or
consumer-to-consumer sales
 Business-to-business buying and selling
 Gathering and using demographic data through web contacts and social media
 Business-to-business (B2B) electronic data interchange
 Marketing to prospective and established customers by e-mail or fax (for example, with newsletters)
 Engaging in pretail for launching new products and services
 Online financial exchanges for currency exchanges or trading purposes

Q) What are different types of E-commerce?

E-Commerce or Electronics Commerce business models can generally categorized in following categories.

 Business - to - Business (B2B)


 Business - to - Consumer (B2C)
 Consumer - to - Consumer (C2C)
 Consumer - to - Business (C2B)
 Business - to - Government (B2G)
 Government - to - Business (G2B)
 Government - to - Citizen (G2C)

Business - to - Business (B2B)

Website following B2B business model sells its product to an intermediate buyer who then sells the product to
the final customer. As an example, a wholesaler places an order from a company's website and after receiving
the consignment, sells the end product to final customer who comes to buy the product at wholesaler's retail
outlet.

Business - to - Consumer(B2C)

Website following B2C business model sells its product directly to a customer. A customer can view products
shown on the website of business organization. The customer can choose a product and order the same. Website
will send a notification to the business organization via email and organization will dispatch the product/goods
to the customer.

Consumer - to - Consumer (C2C)

Website following C2C business model helps consumer to sell their assets like residential property, cars,
motorcycles etc. or rent a room by publishing their information on the website. Website may or may not charge
the consumer for its services. Another consumer may opt to buy the product of the first customer by viewing the
post/advertisement on the website.
Consumer - to - Business (C2B)

In this model, a consumer approaches website showing multiple business organizations for a particular service.
Consumer places an estimate of amount he/she wants to spend for a particular service. For example, comparison
of interest rates of personal loan/ car loan provided by various banks via website. Business organization who
fulfills the consumer's requirement within specified budget approaches the customer and provides its services.

Business - to - Government (B2G)

B2G model is a variant of B2B model. Such websites are used by government to trade and exchange
information with various business organizations. Such websites are accredited by the government and provide a
medium to businesses to submit application forms to the government.

Government - to - Business (G2B)

Government uses B2G model website to approach business organizations. Such websites support auctions,
tenders and application submission functionalities.

Government - to - Citizen (G2C)

Government uses G2C model website to approach citizen in general. Such websites support auctions of
vehicles, machinery or any other material. Such website also provides services like registration for birth,
marriage or death certificates. Main objectives of G2C website are to reduce average time for fulfilling people
requests for various government services.
Q) What is EDP(Electronic data processing)/ EDI? Write its advantage and disadvantage?

Electronic Data Processing (EDP) refers to the use of automated measures using simple, repetitive
actions -  and  computer technology - to organise and store documents and sometimes to transfer them from
paper to a digital format.

Advantages of EDI

1. Speedy transmission:  It requires only few seconds to communicate through electronic media because it
supports quick transmission.

2. Wide coverage: World has become a global village and communication around the globe requires a second
only.

3. Low cost: Electronic communication saves time and money. For example Text sms is cheaper than traditional
letter.

4. Exchange of feedback: Electronic communication allows instant exchange of feedback. So communication


becomes perfect using electronic media.

5. Managing global operation: Due to advancement of electronic media, business managers can easily control


operation across the globe. Video or teleconferencing e-mail and mobile communication are helping managers
in this regard.

Disadvantages of EDI

1. Volume of data: The volume of telecommunication information is increasing in such a fast rate that business
people are unable to absorb it within relevant time limit.

2. Cost of development: Electronic communication requires huge investment for infrastructural development.


Frequent change in technology also demands for further investment.

3. Legal status: Data or information, if faxed, may be distorted and will cause zero value in the eye of law.

4. Undelivered data: Data may not be retrieved due to system error or fault with the technology . Hence
required service will be delayed

5. Dependency: Technology is changing everyday and therefore poor countries face problem as they cannot
afford new or advanced technology. Therefore poor countries need to be dependent towards developed countries
for sharing global network

Q) Write short notes on cyber crime?

Cybercriminals may use computer technology to access personal information, business trade secrets, or
use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication and
document or data storage. Criminals who perform these illegal activities are often referred to as hackers.

Cybercrime may also be referred to as computer crime.

Types of Cyber Crimes


Computer Intrusion
Computer intrusion is any malicious activity that harms a computer, or causes a computer or a
computer network to work in an unexpected manner. These attacks involves spreading of virus, denial of
services or exploitation of the operating system or a software feature.
Social Engineering
The term “social Engineering” means to fool a user by sending him an email or calling him to provide
confidential data like passwords etc.
Denial of Service (DOS Attack)
This type of attack intent is to make resources or service unavailable to its intended users. Such DOS
attacks are carried out on Websites to stop them from functioning.
Email Bombing
Email bombing means sending thousands of email to a victim causing the victim’s mail account or mail
server to crash.
Logic Bomb
A logic Bomb is an event driver attack. This type of attack activates only if certain even occurs.

Q) Write short notes on software piracy?

Software piracy is the illegal copying, distribution, or use of software.

Types of software piracy include:

 Soft lifting: Borrowing and installing a copy of a software application from a colleague.
 Client-server overuse: Installing more copies of the software than you have licenses for.
 Hard-disk loading: Installing and selling unauthorized copies of software on refurbished or new
computers.
 Counterfeiting: Duplicating and selling copyrighted programs.
 Online piracy: Typically involves downloading illegal software from peer-to-peer network, Internet
auction or blog.

Q) Write short notes on internet security?

Internet security refers to securing communication over the internet. It includes specific security protocols such
as:

 Internet Security Protocol (IPSec)


 Secure Socket Layer (SSL)

Internet Security Protocol (IPSec)

It consists of a set of protocols designed by Internet Engineering Task Force (IETF). It provides security at
network level and helps to create authenticated and confidential packets for IP layer.

Secure Socket Layer (SSL)

It is a security protocol developed by Netscape Communications Corporation. ). It provides security at transport


layer. It addresses the following security issues:

 Privacy
 Integrity
 Authentication
 Q) Write short notes on VPN?
 A virtual private network (VPN) is a network that is constructed using public wires — usually
the Internet — to connect to a private network, such as a company's internal network. There are a
number of systems that enable you to create networks using the Internet as the medium for transporting
data. It secures the private network as these systems use encryption and other security mechanisms to
ensure that only authorized users can access the network and that the data cannot be intercepted.
OR

 A VPN is designed to provides a secure, encrypted tunnel in which to transmit the data
between the remote user and the company network. The information transmitted between the two
locations via the encrypted tunnel cannot be read by anyone else because the system contains several
elements to secure both the company's private network and the outside network through which the
remote user connects through.
Q) Write short notes on digital signature?

Digital signatures are the public-key primitives of message authentication. In the physical world, it is common
to use handwritten signatures on handwritten or typed messages. They are used to bind signatory to the message.

Importance of Digital Signature

 Message authentication − When the verifier validates the digital signature using public key of a
sender, he is assured that signature has been created only by sender who possess the corresponding
secret private key and no one else.
 Data Integrity − In case an attacker has access to the data and modifies it, the digital signature
verification at receiver end fails. The hash of modified data and the output provided by the verification
algorithm will not match. Hence, receiver can safely deny the message assuming that data integrity has
been breached.
 Non-repudiation − Since it is assumed that only the signer has the knowledge of the signature key, he
can only create unique signature on a given data. Thus the receiver can present data and the digital
signature to a third party as evidence if any dispute arises in the future.
 Q) What is GIS? Write down its features and component ?
 A geographic information system (GIS) is a computer system for capturing, storing, checking,
and displaying data related to positions on Earth’s surface. GIS can show many different kinds of data
on one map. This enables people to more easily see, analyze, and understand patterns and relationships.

With GIS technology, people can compare the locations of different things in order to discover
how they relate to each other. For example, using GIS, the same map could include sites that produce
pollution, such as gas stations, and sites that are sensitive to pollution, such as wetlands. Such a map
would help people determine which wetlands are most at risk.

GIS can use any information that includes location. The location can be expressed in many
different ways, such as latitude and longitude, address, or ZIP code. The system can include data about
people, such as population, income, or education level. It can include information about the land, such
as the location of streams, different kinds of vegetation, and different kinds of soil.

Q) What is E-mail, Write its advantages and disadvantages?

Short for electronic mail, e-mail or email is information stored on a computer that is exchanged between two
users over telecommunications. It is a message that may contain text, files, images, or other attachments sent
through a network to a specified individual or group of individuals.
Advantages Disadvantages

Both you and the person receiving the email


Sending an email to someone is very easy, people must have an email address and access to a
need little training to learn how to do this. computer or device that can access the
Internet.

If you don't know the email address of the


Emails are free to send -so long as you have an
other person then you can't send them a
email account and a connection to the Internet.
message

Emails are usually received fairly quickly, most of Some people change their email addresses
the time a couple of seconds after they are sent fairly often as they switch ISPs or jobs

Emails can be sent any time of the day or night, 365


Email attachments can contain viruses
days a year

Q) What is internet access? Write down the type of internet access?


Internet access is the process that enables individuals and organisations to connect to the Internet
using computer terminals, computers, mobile devices, sometimes via computer networks.
Following are the type of internet access:
1. Dial-up Connection
2. ISDN
3. DSL
4. Cable TV Internet connections
5. Satellite Internet connections
6. Wireless Internet Connections
Dial-up Connection
Dial-up connection uses telephone line to connect PC to the internet. It requires a modem to setup dial-
up connection. This modem works as an interface between PC and the telephone line.
There is also a communication program that instructs the modem to make a call to specific number provided by
an ISP.
Dial-up connection uses either of the following protocols:
1. Serial Line Internet Protocol (SLIP)
2. Point to Point Protocol (PPP)
ISDN
ISDN is acronym of Integrated Services Digital Network. It establishes the connection using the
phone lines which carry digital signals instead of analog signals.
There are two techniques to deliver ISDN services:
1. Basic Rate Interface (BRI)
2. Primary Rate Interface (PRI)
DSL
DSL is acronym of Digital Subscriber Line. It is a form of broadband connection as it provides
connection over ordinary telephone lines.
Following are the several versions of DSL technique available today:
1. Asymmetric DSL (ADSL)
2. Symmetric DSL (SDSL)
3. High bit-rate DSL (HDSL)
4. Rate adaptive DSL (RDSL)
5. Very high bit-rate DSL (VDSL)
6. ISDN DSL (IDSL)
All of the above mentioned technologies differ in their upload and download speed, bit transfer rate and level of
service.
Cable TV Internet Connection
Cable TV Internet connection is provided through Cable TV lines. It uses coaxial cable which is
capable of transferring data at much higher speed than common telephone line.
Satellite Internet Connection
Satellite Internet connection offers high speed connection to the internet. There are two types of
satellite internet connection: one way connection or two way connection.
In one way connection, we can only download data but if we want to upload, we need a dialup access through
ISP over telephone line.
In two way connection, we can download and upload the data by the satellite. It does not require any dialup
connection.
Wireless Internet Connection
Wireless Internet Connection makes use of radio frequency bands to connect to the internet and offers a
very high speed. The wireless internet connection can be obtained by either WiFi or Bluetooth.

Q) What is internet addressing? Discuss about different types of DNS?


An IP address is a unique number that identifies computers on the Internet; every computer directly
connected to the Internet has one. Every client, server and network device must have a unique IP address for
each network connection (network interface).

There are three types of name servers: Primary, Secondary, and Master.

A primary server has the original copy of a zone file. Any changes made to the zone file are made to
the file on the primary server. When a primary server receives a query about a host name in its own zone, it
retrieves the host resolution locally from its own zone files.
A secondary server gets a copy of zone files from another server. This secondary zone file is a read-
only copy of the file; any changes made to the zone are made at the originating zone file. Then the changes are
copied down to the secondary server through replication. When zone files are copied from another server it is
called a zone transfer.
The server from which a secondary server receives a zone transfer is called the Master Name Server.
The TCP/IP address of the Master Name Server is configured at the secondary server. The master server can be
a primary or a secondary server. If the master is a primary, then the zone transfer comes directly from the
source. If the master name server is a secondary server, the file received from the master server via a zone
transfer is a copy of the read-only zone file.
Q) Write short notes on DNS?
A DNS Server has information about the domain name space that it has already obtained either from a
local copy of a zone file or by making a query of another DNS Server.
There are three types of name servers: Primary, Secondary, and Master.
A primary server has the original copy of a zone file. Any changes made to the zone file are made to
the file on the primary server. When a primary server receives a query about a host name in its own zone, it
retrieves the host resolution locally from its own zone files.
A secondary server gets a copy of zone files from another server. This secondary zone file is a read-
only copy of the file; any changes made to the zone are made at the originating zone file. Then the changes are
copied down to the secondary server through replication. When zone files are copied from another server it is
called a zone transfer.
The server from which a secondary server receives a zone transfer is called the Master Name Server.
The TCP/IP address of the Master Name Server is configured at the secondary server. The master server can be
a primary or a secondary server. If the master is a primary, then the zone transfer comes directly from the
source. If the master name server is a secondary server, the file received from the master server via a zone
transfer is a copy of the read-only zone file.
Q) What is ARP? Also discuss network identifiers?
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address)
to a physical machine address that is recognized in the local network.
Network identity (network ID) is a portion of the TCP/IP address that is used to identify individuals or
devices on a network such as a local area network or the Internet. Network ID is designed to ensure the security
of a network and related resources.
Network IDs are critical to the management and tracking of user resources, including data,
applications, devices and equipment.
A network ID is also known as network identification or NetID.
Q) What is gateway?
A gateway is a network node connecting two networks that use different protocols.
Gateways can take several forms -- including routers or computers -- and can perform a variety of
tasks. These range from simply passing traffic on to the next hop on its path to offering complex traffic filtering,
proxies or protocol translations at various network layers.
Q) What is domain name and how is it different from an IP address?
I.P. Address is the Internet protocol address of a Machine which can help locate the exact location of
the machine may if be Personal Computer,Printers, Laptop or Mobiles Phones using different networks to log
on.
Domain Name e.g. www.example.com is registered name and once registered can not be allotted to
another person. It may be country specific like www.example.in for India and www.example.au for australia
Q) Explain the use of search engine. Give some example of search engine.
Search engines are programs that search documents for specified keywords and returns a list of the
documents where the keywords were found.
A search engine is really a general class of programs, however, the term is often used to specifically
describe systems like Google, Bing and Yahoo! Search that enable users to search for documents on the World
Wide Web.

Q)What does Internet Telephony mean? Writes it’s types?


Ans) Internet telephony is a type of communications technology that allows voice calls and other telephony
services like fax, SMS and other voice-messaging applications to be transmitted using the Internet as a
connection medium. Software under this technology is cost-effective and convenient because it allow the user to
communicate through fax, voice and video calls anywhere in the world as long as there is an Internet
connection. In this way, users are able to bypass the charges that are common in traditional telephone services.
However, the quality of this service is not as good as that of traditional circuit-switched networks used in
traditional telephone services because it is very dependent on the quality and speed of the Internet connection.

Internet telephony is also called IP telephony or broadband telephony or voip.

Internet telephony is of three types:-

1) PC-to-PC telephony

2) PC to Phone, and

3)Phone to Phone.

PC-to-PC Calling

PC-to-PC telephony makes you to call another person who is online at the same time you are, using the same
telephony client. To use your PC to talk to another person through his PC, you'll need compatible software, a
microphone and speakers and Internet access.

PC-to-Phone Calling

PC-to-phone telephony allows you to make calls from your computer to regular telephones. The technology is
similar to PC-to-PC calling.. To use PC-to-Phone services, you need to have the same equipment used for PC-
to-PC calling; a microphone and speakers, and Internet access.
Phone-to-Phone Calling

A relatively new type of Internet telephony service, which is quickly gaining in popularity with consumers and
business. Phone-to-phone telephony also allow telephone calls to be placed over the Internet, but it different
from the other types of Internet telephony. Phone-to-phone telephony does not require users to have special
software, or even a computer to use it. Phone-to-phone uses traditional telephones on both ends.

To make phone-to-phone telephony calls, you need to have an Internet Telephony Service Provider (ITSP). The
ITSP will have gateways in different areas around the world. When you place a call, that call is routed over the
Internet to a gateway located the closest to the receiving party. The gateway will then send the call over the
PSTN to the receiving party's regular telephone.  Because much of the transmission for the call takes place over
the Internet, Phone-to-phone telephony is cheaper than using a regular telephone service provider. Your ITSP
will be the one who handles your subscription and billing

Q) What is chatting? Discuss about it’s feature?

Internet Chat
Internet chatting involves real-time instant text messaging between two or more users in chat rooms. They are
many different types of Internet chats all with different purposes

Benefits

Internet chat rooms allow you to communicate with different kinds of people from all over the world. They
allow you to meet different kinds of people who share similar interests, goals, hobbies and desires. Internet chats
can also be a great learning center ( e.g. chatting forums) where people can ask questions and receive answers
on products and services, computer troubleshooting and more.

Types
Singles chat rooms are probably the most common chats on the internet. They managed and run by dating
websites. Video/Webcam chats are also common forms of chatting because they allow you to view your contact
as you chat. While video chatting is the most interactive form of chatting, they are also the most dangerous.
Other Internet chats include business chat rooms which allow speedy exchange of trade stock tips and business
related information. Christian chat rooms are other popular chats which users turn to for fellowship and good
conversation.
Features
Internet chats not only allow you to send and receive instant messages, they also allow you to share pictures, and
files. Some Internet chat rooms include emoticons which are smiley faces used to describe what your present
emotion is. Some Internet chats include sound effects which range from serious to silly and allow you to. Other
chat rooms allow you to change color combinations to create a theme or background that works for you as you
are chatting.

Q) what is internet? Discuss about backbone and application?


Ans) The Internet is the global system of interconnected computer networks that use the Internet protocol suite
(TCP/IP) to link devices worldwide. It is a network of networks that consists of private, public, academic,
business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and
optical networking technologies. The Internet carries an extensive range of information resources and services,
such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail,
telephony, and peer-to-peer networks for file sharing.
An Internet backbone is a very high-speed data transmission line that provides networking facilities to
relatively small but high-speed Internet service providers all around the world.
Internet backbones are the largest data connections on the Internet. They require high-speed bandwidth
connections and high-performance servers/routers. Backbone networks are primarily owned by commercial,
educational, government and military entities because they provide a consistent way for Internet service
providers (ISPs) to keep and maintain online information in a secure manner
Application of internet are as follows:-
1. Communication 2. Job searches 3. Finding books and study material 4. Health and medicine 5. Travel 6.
Entertainment 7. Shopping 8. Stock market updates 9.Research 10. Business use of internet: different ways by
which intenet can be used for business.
Q) Discuss about the features of www?
World Wide Web Features
The amount of information available on the Internet has become so large that it is difficult to search for
specific information. The World Wide Web (WWW) makes retrieval easy and quick.
The WWW is a search tool that helps you find and retrieve information from a Web site using links to
other sites and documents. The WWW was built on the technology called Hypertext. This technology increases
accessibility to linked documents on the Internet and helps user to navigate between documents very easily.
Hypertext is identified by underlined text and a different color usually. Some places will refer to this
types of technique as Jump-Off Points. Hypertext can make links within the same document or to other
documents.
Each time you access a new document by choosing a link, there is a connection made with the web
server that the document is on. Once the appropriate document is retrieved the connection is broken. There is no
point in maintaining the link while you are viewing it. This is one reason why the WWW is so efficient.
WWW lets you search, traverse, and use many types of information at numerous sites and in multiple
forms. This interface is called a browser. Some people refer to a browser as a 'web browser' Often these terms
are used interchangeably.
The WWW is intended to help people share information resources, and services with the widest
possible community of users. Thus a user can access the WWW on Apple, UNIX, Macintosh, DOS, Windows,
and other operating systems.
Just like the Internet, the WWW has a protocol, which is known as Hypertext Transfer Protocol
(HTTP). HTTP acts as an interface between a Web Client Software, such Netscape Navigator.
A major advantage of the WWW is that it also supports TCP/IP services, such as Gopher, FTP, and
Archie in addition to HTTP.
Q) Discuss about the features of ISP?
An Internet service provider (ISP) is a company that provides customers with Internet access. Data may
be transmitted using several technologies, including dial-up, DSL, cable modem, wireless or dedicated high-
speed interconnects.
Typically, ISPs also provide their customers with the ability to communicate with one another by
providing Internet email accounts, usually with numerous email addresses at the customer’s discretion. Other
services, such as telephone and television services, may be provided as well. The services and service
combinations may be unique to each ISP.
An Internet service provider is also known as an Internet access provider (IAP).
Q) Discuss about the characteristics and features of web page and web site and web address ?
The characteristics and features of web page and web site and web address are:-
1. Easy to read. If background colors or images are used, the text on top of the background should be in a color
that can easily be seen. Use a color scheme that complements and is pleasing to the eye. White space between
images and sections of text make a page easier to view.
2. Easy to navigate. A visitor should be able to find the information they are looking for without hassle and
frustration. The site's navigation buttons should be grouped together. If image links are used, text links should
also be provided for those people who have images turned off on their browser or are using an older browser
that doesn't support images.
3. Comfortably viewed. A Web site should be easily viewable in all screen sizes without a visitor having to
scroll horizontally (left to right).
4. Quick to download. Graphics and sounds add download time to a Web page. Don't make your visitors wait
too long for your site to download or they will click away and probably won't return.
5. Avoid dead links. Make sure that links on all your pages are working, whether they are internal links to pages
within your site, or links to external Web sites.
6. Keep the content fresh. People are more apt to return to your Web site if they find new and interesting
material. Post articles on your site, offer a newly updated "Internet Special" or provide fresh, helpful links. All
these things cause visitors to bookmark your site as a reference tool.
7. Clear and to the point. Visitors should have a clear understanding of what your Web site is about when they
visit. Studies have shown that people do not like to read computer screens, so keep your Web site copy
interesting to read and to the point.
8. Keep your target audience in mind. Think about the people who would be interested in visiting your Web site.
If you are designing a web site about razor blades and shaving cream for men, the site should have a masculine
feel to it. Decorating the page with pink hearts and roses would not be a good idea!
9. Provide a form for visitors to contact you. Visitors are more likely to fill out a form to contact you than
clicking on an e-mail link. Always make things easy for your visitors... especially contacting you.
10. Browser compatible. Check your Web site in the most popular browsers to make sure everything is
displayed properly. The top two browsers used are Internet Explorer and Netscape Navigator, but there are
others such as the AOL browser, Mosaic, Opera and Web TV to name a few. Various versions of the same
browser also display differently. It is a good idea to have a program on your computer that checks browser and
version compatibility.
Q) Discuss about the features of IRC?
Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form
of text. The chat process works on a client/server networking model. IRC clients are computer programs that a
user can install on their system. These clients communicate with chat servers to transfer messages to other
clients. IRC is mainly designed for group communication in discussion forums, called channels, but also allows
one-on-one communication via private messages as well as chat and data transfer, including file sharing.
Q) What is internet? Write it’s advantage and disadvantage?
Ans) The Internet is the global system of interconnected computer networks that use the Internet protocol suite
(TCP/IP) to link devices worldwide. It is a network of networks that consists of private, public, academic,
business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and
optical networking technologies. The Internet carries an extensive range of information resources and services,
such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail,
telephony, and peer-to-peer networks for file sharing.

Advantages: 

1) Information on almost every subject. 


2) Powerful search engines 
3) Ability to do research from your home versus research libraries. 
4) Information at various levels of study. Everything.
5) Message boards where people can discuss ideas on any topic. 
6) The internet provides the ability of emails. 
7) Platform for products like SKYPE, which allow for holding a video conference with anyone in the world who
also has access. 
8) News, of all kinds is available.

Disadvantages: 

1) There is a lot of wrong information on the internet. Anyone can post anything, and much of it is garbage. . 
2) Some people are getting addicted to the internet and thus causing problems with their interactions of friends
and loved ones. . 
3) Internet has a lot of "cheater" sites
4) Hackers can create viruses that can get into your personal computer and ruin valuable data. 
5) Hackers can use the internet for identity theft. .
Q) What is Internet protocol? Discuss about types of Internet protocol?
IP address a unique string of numbers separated by full stops that identifies each computer using the
Internet Protocol to communicate over a network.
In order to provide computer to computer communication via Internet, we need a global addressing
scheme. Such an addressing is provided by Internet Protocol (IP) at the network layer.
It is a 32-bit address This is called an IP address or logical address. Which is made up of the network
ID, plus a unique host ID. These numbers are assigned by ISP (Internet Service Provider), and IP address can be
used to identify the country or region from which a computer is connecting to the WEB. The IP address can
either be Static or dynamic. 
In static address is to be given manually. But in dynamic a DHCP server is to be configured to give ip
address to the connected hosts automatically. This address is used to uniquely identify each Network host over
the network.

Q) Categories of IP?
IP address is divided into 5 category usually called classes. This allocation has come to be called class
full addressing.
Following are the classes of ip:- 

             

          CLASSES                  Range                                          

            Class A                         1.0.0.0      to 127.255.255.255     

            Class B                         128.0.0.0  to 191.255.255.255

            Class C                         192.0.0.0  to 223.255.255.255

            Class D                          224.0.0.0  to 239.255.255.255    

            Class E                          240.0.0.0  to 255.255.255.255

 
.

IP address format
The 32-bit IP address is grouped eight bits at a time, separated by dots and represented in decimal
format. This is known as dotted decimal notation as shown in fig.
• Each bit in the octet has a binary weight (128,64,32, 16,8,4,2, 1).
• The minimum value for an octet is 0, and the maximum value for an octet is 255.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

      

You might also like