You are on page 1of 24

1. What is Internet/net/web?

Internet is a global network providing a variety of information and communication facilities, consisting
of interconnected networks using standardized communication protocols. It’s also referred to web or
net.
Reference: Google direct Q&A

2. What is www?
The World Wide Web (abbreviated WWW or the Web) is an information space where documents and
other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext
links, and can be accessed via the internet. English scientist Tim Berners-Lee invented the World Wide
Web in 1989.
Reference: Wikipedia

3. What is the difference between web & www?


The Internet is a massive network of networks, a networking infrastructure. It connects millions of
computers together globally, forming a network in which any computer can communicate with any
other computer as long as they are both connected to the Internet. Information that travels over the
Internet does so via a variety of language known as protocols.

On the other hand the World Wide Web, or simply Web, is a way of accessing information over the
medium of the Internet. It is an information-sharing model that is built on top of the Internet. The
Web uses the HTTP protocol, only one of the languages spoken over the Internet, to transmit data.
Web services, which use HTTP to allow applications to communicate in order to exchange business
logic, use the Web to share information. The Web also utilizes browsers, such as Internet Explorer or
Firefox, to access Web documents called Web pages that are linked to each other via hyperlinks. Web
documents also contain graphics, sounds, text and video.

The web is just one of the ways that information can be disseminated over the Internet. The Internet,
not the Web, is also used for email, which relies on SMTP, Usenet news groups, instant messaging and
FTP. So the Web is just a portion of the Internet, albeit a large portion, but the two terms are not
synonymous and should not be confused.
Reference: Webopedia

4. What is TCP/IP Address?


TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or
protocol of the Internet. It can also be used as a communications protocol in a private network (either
an intranet or an extranet). When you are set up with direct access to the Internet, your computer is
provided with a copy of the TCP/IP program just as every other computer that you may send messages
to or get information from also has a copy of TCP/IP.

TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the
assembling of a message or file into smaller packets that are transmitted over the Internet and
received by a TCP layer that reassembles the packets into the original message. The lower
layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination.
Each gateway computer on the network checks this address to see where to forward the message.
Even though some packets from the same message are routed differently than others, they'll be
reassembled at the destination.
TCP/IP uses the client/server model of communication in which a computer user (a client) requests
and is provided a service (such as sending a Web page) by another computer (a server) in the network.
TCP/IP communication is primarily point-to-point, meaning each communication is from one point
(or host computer) in the network to another point or host computer. TCP/IP and the higher-level
applications that use it are collectively said to be "stateless" because each client request is considered
a new request unrelated to any previous one (unlike ordinary phone conversations that require a
dedicated connection for the call duration). Being stateless frees network paths so that everyone can
use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is
concerned. Its connection remains in place until all packets in a message have been received.)

Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to
get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP), the File
Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple
Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as
a "suite."

Personal computer users with an analog phone modem connection to the Internet usually get to the
Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP). These
protocols encapsulate the IP packets so that they can be sent over the dial-up phone connection to an
access provider's modem.

Protocols related to TCP/IP include the User Datagram Protocol (UDP), which is used instead of TCP for
special purposes. Other protocols are used by network host computers for
exchanging router information. These include the Internet Control Message Protocol (ICMP), the
Interior Gateway Protocol (IGP), the Exterior Gateway Protocol (EGP), and the Border Gateway
Protocol (BGP).
Reference: http://searchnetworking.techtarget.com/definition/TCP-IP

5. What is networking?
In information technology, networking is the construction, design, and use of a network, including the
physical (cabling, hub, bridge, switch, router, and so forth), the selection and use of
telecommunication protocol and computer software for using and managing the network, and the
establishment of operation policies and procedures related to the network.
Reference: http://searchnetworking.techtarget.com/definition/networking

6. What are the differences between 1G, 2G, 3G, 4G and 5G?
Ever since mobile telecommunications standards were first laid down in the 1980s (the First
Generation or 1G), there has been a continuous effort to increase the data rates available to the end
users. Once certain levels of data rates are achieved by the industry, they set even higher targets,
driven of course by the ever increasing demand by the users.

1G, 2G, 3G and 4G basically refer to these standards that were successively laid and met by the
telecommunication sector (both the industry and the academia). The current thrust is towards
reaching the 5th Generation of mobile communications. Behind each of these generations, there have
been one or more breakthrough technologies that helped achieve the quantum inter-generation leaps
in the data rates. I will elaborate upon those below:

First Generation (1G):


Completely Analog
Modulation Scheme - Analog FM modulation
Multiple Access Scheme - FDMA with Frequency Division Duplexing. Examples: AMPS (Advanced
Mobile Phone Services)

Second Generation (2G):


Digital Communication introduced
Still designed only for phone calls (using phones to access internet was still unthinkable) ~ 10 kbps
Multiple Access Scheme - FDMA, TDMA (for GSM) and CDMA. Examples: GSM (Global System for
Mobile Communication) and CDMA (Code Division Multiple Access)

2.5G:
Realization dawned that people wanted phones for both voice and data and thus this intermediate
standard was introduced. Recall how you used to access internet using GPRS (General Packet Radio
Service). Up until 2G, only circuit switched networks were in use which were unsuitable for internet.
With the advent of GPRS, packet switching was introduced which was more suited for internet.
Examples: GPRS ~ 50 kbps, EDGE (Enhanced Data for GSM Evolution) ~ 200 kbps

Third Generation (3G):


This time the target was to be able to provide sufficient data rate for both voice and mobile internet
~ 384 kbps. Examples: WCDMA (Wideband CDMA), CDMA 2000 and UMTS (Universal Mobile
Telecomm Standard)

3.5G:
This is what most of urban India currently uses. HSDPA/HSUPA (High Speed Downlink/Uplink Packet
Access) are the standards used and they offer data rates of 5-30 Mbps.

Fourth Generation (4G):


In essence, Mobile Broadband. They now want to offer you broadband-like data rates on mobile
devices ~ 100-200 Mbps. The key technologies that have made this possible are MIMO (Multiple Input
Multiple Output) and OFDM (Orthogonal Frequency Division Multiplexing). For those who are from
engineering background, MIMO leverages spatial multiplexing to provide diversity gain while OFDM is
more adept at managing channel distortion and ISI. The two important 4G standards are WiMAX (has
now fizzled out) and LTE (has seen widespread deployment). LTE has only recently been introduced in
India.

5G:
Gigabit Internet (Whoa!)
This is what the academia and the industry is working towards now. Expected to arrive in 2020.
Key technologies to look out for: Millimeter Wave Mobile Communications, Massive MIMO
Reference: https://www.quora.com/What-are-the-differences-between-1G-2G-3G-4G-and-5G

7. How modem works?


The word "modem" is a contraction of the words modulator-demodulator. A modem is typically used
to send digital data over a phone line.

The sending modem modulates the data into a signal that is compatible with the phone line, and the
receiving modem demodulates the signal back into digital data. Wireless modems convert digital data
into radio signals and back.
Modems came into existence in the 1960s as a way to allow terminals to connect to computers over
the phone lines. A typical arrangement is shown below:

In a configuration like this, a dumb terminal at an off-site office or store could "dial in" to a large,
central computer. The 1960s were the age of time-shared computers, so a business would often buy
computer time from a time-share facility and connect to it via a 300-bit-per-second (bps) modem.

A dumb terminal is simply a keyboard and a screen. A very common dumb terminal at the time was
called the DEC VT-100, and it became a standard of the day (now memorialized in terminal emulators
worldwide). The VT-100 could display 25 lines of 80 characters each. When the user typed a character
on the terminal, the modem sent the ASCII code for the character to the computer. The computer
then sent the character back to the computer so it would appear on the screen.

When personal computers started appearing in the late 1970s, bulletin board systems (BBS) became
the rage. A person would set up a computer with a modem or two and some BBS software, and other
people would dial in to connect to the bulletin board. The users would run terminal emulators on their
computers to emulate a dumb terminal.

People got along at 300 bps for quite a while. The reason this speed was tolerable was because 300
bps represents about 30 characters per second, which is a lot more characters per second than a
person can type or read. Once people started transferring large programs and images to and from
bulletin board systems, however, 300 bps became intolerable. Modem speeds went through a series
of steps at approximately two-year intervals:
 300 bps - 1960s through 1983 or so
 1200 bps - Gained popularity in 1984 and 1985
 2400 bps
 9600 bps - First appeared in late 1990 and early 1991
 19.2 kilobits per second (Kbps)
 28.8 Kbps
 33.6 Kbps
 56 Kbps - Became the standard in 1998
 ADSL, with theoretical maximum of up to 8 megabits per second (Mbps) - Gained popularity
in 1999
Reference: http://computer.howstuffworks.com/modem1.htm

8. How broadband works?


The term broadband simply means a broad band of frequencies has been used. It is a radio term and
normally means that multiple frequency carriers are used to carry one signal. It describes the way
ADSL (Asymmetric Digital Subscriber Line) services work so has become a term to describe a fast
internet connection. The term is then being rather confusingly used to describe fiber connections
which are not broadband at all, but use a single frequency laser.

Normal telephone service is an analogue of sound waves. It carries sound using electrical signals that
work in the same way as they do though air. In terms of frequency this means that telephone calls use
very low frequency signals on the telephone line.

The line itself can carry signals at a much higher frequency. The limiting factor is the quality and length
of the cable used. Normal telephone lines are a copper pair (two insulated copper conductors twisted
around each other) that can go for several miles from the local telephone exchange to your premises.
ADSL makes use of the rest of the capabilities of the cable. It carries data using a wide range of
frequencies much higher than that used for telephone calls. The fact that it uses this broad band of
frequencies is why it is called broadband.
Reference: https://www.aaisp.net.uk/kb-broadband-how.html

9. What is Wi-Fi and How Does it Work?


Wi-Fi is a technology that uses radio waves to provide network connectivity. A Wi-Fi connection
established using a wireless adapter to create hotspots - areas in the vicinity of a wireless router that
are connected to the network and allow users to access internet services. Once configured, Wi-Fi
provides wireless connectivity to your devices by emitting frequencies between 2.4GHz - 5GHz, based
on the amount of data on the network.

You may be surprised to hear that many people don't actually know that Wi-Fi is an abbreviated term.
Even those who do don't always know what Wi-Fi stands for. There are a number of theories about
what the term means, but the most widely accepted definition for the term in the tech community
is Wireless Fidelity.

Wireless technology has widely spread lately and you can get connected almost anywhere; at home,
at work, in libraries, schools, airports, hotels and even in some restaurants.

Wireless networking is known as Wi-Fi or 802.11 networking as it covers the IEEE 802.11 technologies.
The major advantage of Wi-Fi is that it is compatible with almost every operating system, game device,
and advanced printer.

Like mobile phones, a Wi-Fi network makes use of radio waves to transmit information across a
network. The computer should include a wireless adapter that will translate data sent into a radio
signal. This same signal will be transmitted, via an antenna, to a decoder known as the router. Once
decoded, the data will be sent to the Internet through a wired Ethernet connection.

As the wireless network works as a two-way traffic, the data received from the internet will also pass
through the router to be coded into a radio signal that will be received by the computer's wireless
adapter.

A wireless network will transmit at a frequency level of 2.4 GHz or 5GHz to adapt to the amount of
data that is being sent by the user. The 802.11 networking standards will somewhat vary depending
mostly on the user's needs.

The 802.11a will transmit data at a frequency level of 5GHz. The Orthogonal Frequency-Division
Multiplexing (OFDM) used enhances reception by dividing the radio signals into smaller signals before
reaching the router. You can transmit a maximum of 54 megabits of data per second.

The 802.11b will transmit data at a frequency level of 2.4GHz, which is a relatively slow speed. You
can transmit a maximum of 11 megabits of data per second.

The 802.11g will transmit data at 2.4GHz but can transmit a maximum of 54 megabits of data per
second as it also uses an OFDM coding.

The more advanced 802.11n can transmit a maximum of 140 megabits of data per second and uses a
frequency level of 5GHz.
Reference: http://ccm.net/faq/298-what-is-wifi-and-how-does-it-work
10. What are Hotspots?
The term hotspot is used to define an area where Wi-Fi access is available. It can either be through a
closed wireless network at home or in public places such as restaurants or airports.

In order to access hotspots, your computer should include a wireless adapter. If you are using an
advanced laptop model, it will probably include a built-in wireless transmitter already. If it doesn't,
you can purchase a wireless adapter that will plug into the PCI slot or USB port. Once installed, your
system should automatically detect the Wi-Fi hotspots and request connection. If not, you should use
a software to handle this task for you.
Reference: http://ccm.net/faq/298-what-is-wifi-and-how-does-it-work

11. What is surfing?


Alternatively referred to as web surfing, surfing describes the act of browsing the Internet by going
from one web page to another web page using hyperlinks in an Internet browser. The term "surfing"
was first used by Mark McCahill.
Reference: https://www.computerhope.com/jargon/s/surfing.htm

12. What is browser?


A browser is an application program that provides a way to look at and interact with all the information
on the World Wide Web. The word "browser" seems to have originated prior to the Web as a generic
term for user interfaces that let you browse (navigate through and read) text files online.

Technically, a Web browser is a client program that uses HTTP (Hypertext Transfer Protocol) to make
requests of Web servers throughout the Internet on behalf of the browser user. Most browsers
support e-mail and the File Transfer Protocol (FTP) but a Web browser is not required for those
Internet protocols and more specialized client programs are more popular.

The first Web browser, called World Wide Web, was created in 1990. That browser's name was
changed to Nexus to avoid confusion with the developing information space known as the World Wide
Web. The first Web browser with a graphical user interface was Mosaic, which appeared in 1993.
Many of the user interface features in Mosaic went into Netscape Navigator. Microsoft followed with
its Internet Explorer (IE).

As of September 2006, Internet Explorer is the most commonly used browser, having won the so-
called browser wars between IE and Netscape. Other browsers include:
 Firefox, which was developed from Mozilla (the open source version of Netscape).
 Flock, an open source browser based on Firefox and optimized for Web 2.0 features such
as blogging and social bookmarking .
 Safari, a browser for Apple computers.
 Lynx, a text-only browser for UNIX shell and VMS users.
 Opera, a fast and stable browser that's compatible with most relatively operating systems.
Reference: http://searchwindevelopment.techtarget.com/definition/browser

13. What is Search Engine?


Search engines are programs that search documents for specified keywords and returns a list of the
documents where the keywords were found. A search engine is really a general class of programs,
however, the term is often used to specifically describe systems like Google, Bing and Yahoo! Search
that enable users to search for documents on the World Wide Web.

Typically, Web search engines work by sending out a spider to fetch as many documents as possible.
Another program, called an indexer, then reads these documents and creates an index based on the
words contained in each document. Each search engine uses a proprietary algorithm to create its
indices such that, ideally, only meaningful results are returned for each query.

As many website owners rely on search engines to send traffic to their website, and entire industry
has grown around the idea of optimizing Web content to improve your placement in search engine
results.
Reference: http://www.webopedia.com/TERM/S/search_engine.html

14. Which search engine is better?


"Better" is a tough thing to define because it's based in opinion, but there are plenty of options. I think
Google is still the superior engine, but Bing (which also powers Yahoo) is a formidable search engine.

For the math lovers, Wolfram Alpha is a great tool: Computational Knowledge Engine

For those worried about Google knowing too much, DuckDuckGo doesn't save any of your search
history: duckduckgo.com

For interesting facts and answers, Ask is still a good search: Ask.com - What's Your Question?

Blekko is a newer engine, but people don't know much about it: blekko

And for the nostalgic bunch, Dogpile and Lycos are still around.

Yahoo is rumored to be working on their own search engine again (they shut theirs down a few years
ago and use Bing results currently).
Reference: https://www.quora.com/What-search-engine-is-better-than-Google

15. What is web pages?


A web page or web page is a document commonly written in Hyper Text Markup Language (HTML)
that is accessible through the Internet or other network using an Internet browser. A web page is
accessed by entering a URL address and may contain text, graphics, and hyperlinks to other web pages
and files. The page you are reading now is an example of a web page.

To view a web page requires a browser (e.g. Internet Explorer, Edge, Safari, Firefox, or Chrome). For
example, you are reading this web page using a browser. Once in a browser, you can open a web page
by entering the URL in the address bar. For example, typing
"https://www.computerhope.com/esd.htm" opens the Computer Hope ESD page. If you don't know
the URL of the website you want to visit, you can use a search to find the web page or use the search
on the website containing the web page.

The first web page was created at CERN by Tim Berners-Lee on August 6, 1991. You can visit and
browse the first website and first web page at the http://info.cern.ch/address
A website refers to a central location that contains more than one web page. For example, Computer
Hope is considered a website, which includes thousands of different web pages, including this web
page you are reading now.

In the above example, of a URL, the web page is "url.htm" and is always the last part of the URL. For
URL's that do not have an ending of .htm, .html, .php, .cgi, .pl, or other file extension, the server is
loading the default index.htm web page in that directory. For example, on our contact page URL
(https://www.computerhope.com/contact/), there is no web page. In this case, the default index file
loads from the contact/ directory.

As mentioned earlier, this page that you are reading now is an example of an HTML web page and
what a typical web page looks like on the Internet. This web page consists of several elements
including CSS, images, and JavaScript.

Although the body of a web page is created using HTML, that


HTML code can be created using an HTML editor and written by a
human or generated using server-side scripts or other scripts.
Typically a web page created by a human ends with a .htm or
.html file extension. For example, this page has the file name
"webpage.htm". Pages generated by a script can end in .cgi, .php,
.pl, and other extensions.

Every web page is different. However, most pages contain some


or all of the elements contained on this web page. Below is a
breakdown of each of the major elements of an Internet web page
to help give a web designer an idea of what to include and new
computer users and idea of where things are found.

1. The website, blog name, logo, or company name is almost always in the top-left corner of
each web page. It's also a good idea to include a slogan or a brief statement about the page
to give new visitors an instant understanding of the site. Also, this section of the web page is
usually a link that can link you back to the homepage.
2. The search allows a visitor to quick search a website for other related information and should
be available on every page.
3. The navigation bar or menu for a web page is typically always found on the top or left-hand
side of each web page and should include links to each of the major sections of the website.
4. Advertisement banners can be shown in different places on a web page and are used to help
pay for the expenses of running a website and company. Typically ad banners will be found at
the top, left, right, or bottom of a page and may also be included within the content.
5. Social share links allow visitors to share your site with other co-workers, friends, and family
on social networking sites.
6. The breadcrumbs help give the visitor an immediate understanding of where they are on the
website as well as a way to backtrack to other main sections of the website.
7. The heading should be included on the top of every web page and should be created using
the <h1> HTML tag.
8. The opening paragraph is one of the most important paragraphs on the web page and should
help draw the visitor into reading the web page. One way to help draw the visitors’ eyes is to
include a hero image near the opening paragraph.
9. Each web page should be broken up into other headings that allow the visitor to easily skim
and find what is most interesting on the page. When creating a web page these can be done
using the <h2> to <h6> HTML tags.
10. Having a method of allowing a visitor to provide feedback is also a requirement for most web
pages. Giving the visitor links or buttons to click for feedback is a good step to let you know if
a web page is helpful or not.
11. Additional information and tools such as a button to print the page can also be helpful for
users on most web pages.
12. The footer should include any other information that is important to the company or website
and should be included on all web pages to help the visitor continue to other web pages.
13. The Copyright and any legal or privacy notice should also be on all web pages. Not only can
this link to relevant legal information it is an indication for most visitors that they have reached
the end of the web page.
14. Finally, a back to the top button or link at the bottom of the footer can also be helpful for
visitors to quickly get back to the top of the web page to access any of the menu links or other
tools found at the top of the page.

On most websites, you read the information contained on each web page, and if there are any
interesting hyperlinks, you follow those links by clicking on them to find more information or to
perform a task. You can also listen to music, watch videos, shop, communicate, and much more on
many websites.
Reference: https://www.computerhope.com/jargon/w/webpage.htm

16. What are the web languages?

Back-end (Server-side) table in most popular websites

Reference: https://en.wikipedia.org/wiki/Programming_languages_used_in_most_popular_websites

17. What do you mean by front end & back end?


Two terms thrown around a lot in the web industry are front-end and back-end. It can be a little
frustrating since the difference between the front-end and back-end isn't always perfectly clear.
They're terms often used to describe aspects of the web industry. The front-end is also referred to as
the client-side and is sometimes considered "web design". The back-end of the web industry is often
called the server-side. Often when someone says they're a "web developer" they're saying they work
on the back-end of sites. While that explanation seems simple, the line between the two is often
blurry. Here are some basic guidelines to help tell the difference between the front-end and back-end
or at least be able to begin to understand what someone does when they say they're a "front-end
developer."

The front-end is everything involved with what the user sees, including design and some languages
like HTML and CSS. Most of the web courses created at Digital will be for the front-end and focused
on design, but there are already a bunch of front-end specific courses available at Plural sight as well.
There are a lot of different jobs associated with the front-end. Keep in mind that a lot of these titles
are subjective, and while front-end developer may mean something at one company, it can mean
something completely different at another company. A common front-end job title is "web designer."
A web designer, you guessed it, designs websites. The job title of web designer is pretty broad, though.
A web designer could just be someone who designs the sites in a program like Photoshop or Fireworks
and will never touch the code. But in another location, a web designer could do all the design comps
in Photoshop, and then be responsible for creating all the HTML and CSS (and sometimes
even JavaScript) to go along with it. A User Interface (UI) Designer is basically a visual designer and is
generally focused on design. They're not usually involved in the implementation of the design, but
they might know light HTML and CSS so they can communicate their ideas more effectively to the
developers. User Experience (UX) designers work in the front-end and study and researches how
people use the sites and make changes through a lot of testing. A front-end designer or developer can
create a site without any back-end development. The sites they would create without a web
developer, or using the back-end, is a static site. A static site is something like a site for a restaurant
or hair salon. It doesn't require any information to be stored in a database. The pages will almost
always stay the same, unless it's time for a redesign. A front-end developer may be required to have
a grasp on testing, as well as be well versed in HTML, CSS and JavaScript. This person may or may not
have experience with creating the design in a design program. A different version of this title is front-
end engineer. Specific front-end languages like "JavaScript developer" are also considered front-end
developers.

The back-end, or the "server-side", is basically how the site works, updates and changes. This refers
to everything the user can't see in the browser, like databases and servers. Usually people who work
on the back-end are called programmers or developers. Back-end developers are mostly worried
about things like security, structure and content management. They usually know and can use
languages like HTML and CSS, but that's definitely not their focus. Back-end developers, or at least
back-end development, is required to create a dynamic site. A dynamic site is a site that's constantly
changing and updated in real-time. Most sites are dynamic sites, as opposed to static sites. Facebook,
Google Maps and this blog are all considered dynamic sites. Blogs are dynamic sites, since their
content is constantly changing and updating. A dynamic site requires a database to work properly. All
information, like user profiles or images they've uploaded, or blog posts, are stored in the database.
Web developers’ work with programming languages like PHP or .Net, since they need to work with
something the database understands. The code they write communicates with the server and then
tells the browser what to use from the database.
Reference: https://www.pluralsight.com/blog/film-games/whats-difference-front-end-back-end

18. What is designing web?


Briefly, website design means planning, creation and updating of websites. Website design also
involves information architecture, website structure, user interface, navigation ergonomics, website
layout, colors, contrasts, fonts and imagery (photography) as well as icons design.
Reference: http://www.arawebsitedesign.com/what_is_website_design_66.htm
19. What's the difference between server & database?
As far as web applications are considered, a server is a machine where the application code resides
and database is a machine which acts as a data repository for the application.

Actually database also resides on a server and we call it as database server.

The different types of servers that I know are as follows:


Database Server --- where the data of the application is stored.
App Server --- where the code and dynamic functionality of the application resides.
Web Server --- where the static content like images, css, js and html pages reside.
Mail server --- which acts as a sender and receiver for mails.
FTP server --- which acts as a repository for files. This is used for uploading and downloading files.
Reference: https://www.quora.com/What-is-the-difference-between-a-server-and-a-database

20. What do you mean by hyperlinks?


A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a new
section within the current document. Hyperlinks are found in nearly all Web pages, allowing users to
click their way from page to page. Text hyperlinks are often blue and underlined, but don't have to be.
When you move the cursor over a hyperlink, whether it is text or an image, the arrow should change
to a small hand pointing at the link. When you click it, a new page or place in the current page will
open.

Hyperlinks, often referred to as just "links," are common in Web pages, but can be found in other
hypertext documents. These include certain encyclopedias, glossaries, dictionaries, and other
references that use hyperlinks. The links act the same way as they do on the Web, allowing the user
to jump from page to page. Basically, hyperlinks allow people to browse information at hyper speed.
Reference: https://techterms.com/definition/hyperlink

21. What is proxy server?


A proxy server, also known as a "proxy" or "application-level gateway", is a computer that acts as a
gateway between a local network (e.g., all the computers at one company or in one building) and a
larger-scale network such as the Internet. Proxy servers provide increased performance and security.
In some cases, they monitor employees' use of outside resources.

A proxy server works by intercepting connections between sender and receiver. All incoming data
enters through one port and is forwarded to the rest of the network via another port. By blocking
direct access between two networks, proxy servers make it much more difficult for hackers to get
internal addresses and details of a private network.

Some proxy servers are a group of applications or servers that block common Internet services. For
example, an HTTP proxy intercepts web access, and an SMTP proxy intercepts email. A proxy server
uses a network addressing scheme to present one organization-wide IP address to the Internet. The
server funnels all user requests to the Internet and returns responses to the appropriate users. In
addition to restricting access from outside, this mechanism can prevent inside users from reaching
specific Internet resources (e.g., certain websites). A proxy server can also be one of the components
of a firewall.
Reference: https://kb.iu.edu/d/ahoo
22. What is cloud?
A cloud server is a logical server that is built, hosted and delivered through a cloud computing platform
over the Internet. Cloud servers possess and exhibit similar capabilities and functionality to a typical
server but are accessed remotely from a cloud service provider.

A cloud server may also be called a virtual server or virtual private sever.

A cloud server is primarily an Infrastructure as a Service (IaaS) based cloud service model. There are
two types of cloud server: logical and physical. A cloud server is considered to be logical when it is
delivered through server virtualization. In this delivery model, the physical server is logically
distributed into two or more logical servers, each of which has a separate OS, user interface and apps,
although they share physical components from the underlying physical server.

Whereas the physical cloud server is also accessed through the Internet remotely, it isn’t shared or
distributed. This is commonly known as a dedicated cloud server.
Reference: https://www.techopedia.com/definition/29019/cloud-server

23. What is upload, download & ping?


In the context of the Web, to upload something means to send data from an individual user's computer
to another computer, network, Web site, mobile device, or some other remotely connected
networked location.

To download something on the Web means to transfer data from a website or network, saving that
information on your computer. All sorts of information can be downloaded on the Web: books,
movies, software, etc.

A ping is a term used to refer to a tool that checks to see if a website is down or not. In the context of
Web search, pinging a Web site basically means that you're endeavoring to determine whether a
specific Web site is having issues; it could also help narrow down connectivity problems when you're
attempting to upload or download something.
Reference: https://www.lifewire.com/uploading-and-downloading-online-3985950

24. What is social networks?


Social networking is the practice of expanding the number of one's business and/or social contacts by
making connections through individuals, often through social media sites such as Facebook, Twitter,
LinkedIn and Google+.

Based on the six degrees of separation concept (the idea that any two people on the planet could
make contact through a chain of no more than five intermediaries), social networking establishes
interconnected online communities (sometimes known as social graphs) that help people make
contacts that would be good for them to know, but that they would be unlikely to have met otherwise.

Depending on the social media platform, members may be able to contact any other member. In other
cases, members can contact anyone they have a connection to, and subsequently anyone that contact
has a connection to, and so on. Some services require members to have a preexisting connection to
contact other members.

While social networking has gone on almost as long as societies themselves have existed, the
unparalleled potential of the Web to facilitate such connections has led to an exponential and ongoing
expansion of that phenomenon. In addition to social media platforms, the capacity for social
interaction and collaboration is increasingly built into business applications.
Reference: http://whatis.techtarget.com/definition/social-networking

25. How do large Web sites handle the load of millions of visitors a day?
One of the surprising things about Web sites is that, in certain cases, a very small machine can handle
a huge number of visitors. For example, imagine that you have a simple Web site containing a number
of static pages (in this case, "static" means that everybody sees the same version of any page when
they view it). If you took a normal 500MHz Celeron machine running Windows NT or Linux, loaded the
Apache Web server o­n it, and connected this machine to the Internet with a T3 line (45 million bits
per second), you could handle hundreds of thousands of visitors per day. Many ISPs will rent you a
dedicated-machine configuration like this for $1,000 or less per month. This configuration will work
great unless:

You need to handle millions of visitors per day.


The single machine fails (in this case, your site will be down until a new machine is installed and
configured).
The pages are extremely large or complicated.
The pages need to change dynamically on a per-user basis.
Any back-end processing needs to be performed to create the contents of the page or to process a
request on the page.
Since most of the large Web sites meet all of these conditions, they need significantly larger
infrastructures.

There are three main strategies for handling the load:

The site can invest in a single huge machine with lots of processing power, memory, disk space and
redundancy.
The site can distribute the load across a number of machines.
The site can use some combination of the first two options.

When you visit a site that has a different URL every time you visit (for example www1.xyz.com,
www2.xyz.com, www3.xyz.com, etc.), then you know that the site is using the second approach at the
front end. Typically the site will have an array of stand-alone machines that are each running Web
server software. They all have access to an identical copy of the pages for the site. The incoming
requests for pages are spread across all of the machines in one of two ways:

The Domain Name Server (DNS) for the site can distribute the load. DNS is an Internet service that
translates domain names into IP addresses. Each time a request is made for the Web server, DNS
rotates through the available IP addresses in a circular way to share the load. The individual servers
would have common access to the same set of Web pages for the site.

Load balancing switches can distribute the load. All requests for the Web site arrive at a machine that
then passes the request to one of the available servers. The switch can find out from the servers which
one is least loaded, so all of them are doing an equal amount of work. This is the approach that How
Stuff Works uses with its servers. The load balancer spreads the load among three different Web
servers. One of the three can fail with no effect on the site.

The advantage of this redundant approach is that the failure of any one machine does not cause a
problem -- the other machines pick up the load. It is also easy to add capacity in an incremental way.
The disadvantage is that these machines will still have to talk to some sort of centralized database if
there is any transaction processing going on.

Microsoft's TerraServer takes the "single large machine" approach. TerraServer stores several
terabytes of satellite imagery data and handles millions of requests for this information. The site uses
huge enterprise-class machines to handle the load. For example, a single Digital Alpha Server 8400
used at TerraServer has eight 440 MHz 64-bit processors and 10 GB of error checked and corrected
RAM.
Reference: http://computer.howstuffworks.com/internet/basics/question342.htm

26. What is net crawling?


A Web crawler, sometimes called a spider, is an Internet bot that systematically browses the World
Wide Web, typically for the purpose of Web indexing (web spidering). Web search engines and some
other sites use Web crawling or spidering software to update their web content or indices of others
sites' web content.
Reference:
https://www.google.com/search?q=What+is+net+crawling%3F&oq=What+is+net+crawling%3F&sou
rceid=chrome&ie=UTF-8

27. What is URL?


A Uniform Resource Locator (URL), colloquially termed a web address, is a reference to a web resource
that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific
type of Uniform Resource Identifier (URI), although many people use the two terms interchangeably.
URLs occur most commonly to reference web pages (http), but are also used for file transfer (ftp),
email (mailto), database access (JDBC), and many other applications.

Most web browsers display the URL of a web page above the page in an address bar. A typical URL
could have the form http://www.example.com/index.html, which indicates a protocol (http), a
hostname (www.example.com), and a file name (index.html).
Reference: https://en.wikipedia.org/wiki/URL

28. What is LAN, WAN, MAN, SAN, CAN, PAN and GAN?
Generally, networks are distinguished based on their geographical span. A network can be as small as
distance between your mobile phone and its Bluetooth headphone and as large as the internet itself,
covering the whole geographical world.

A computer network consists of two or more computers that are interconnected with each other and
share resources such as printers, servers, and hardware and exchange the data in the form of files,
facilitating electronic communication. Computers on a network can be connected through twisted pair
cables, telephone lines, radio waves, satellites or optical fiber cables. The first computer network
designed was the ‘Advanced Research Projects Agency Network (ARPANET)’ by the United States
Department of Defense. Since then, myriads of new computer networking technologies have been
designed. This tutorial only covers the first three network technologies i.e. LAN, WLAN, WAN, MAN,
SAN, CAN, PAN and GAN.

Computer networks can be classified into different types based on their scale of operation. They
include:
LAN: A local-area network (LAN) is a computer network that spans a relatively small area. Most often,
a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected
to other LANs over any distance via telephone lines and radio waves. Local Area Networks cover a
small physical area, like a home, office, or a small group of buildings, such as a school or airport.

WAN: A computer network that spans a relatively large geographical area, generally having a radius
of more than 1 km. Typically, a WAN consists of two or more local-area networks (LANs). Computers
connected to a wide-area network are often connected through public networks, such as the
telephone system. They can also be connected through leased lines or satellites.

MAN: A metropolitan area network (MAN) is a network that interconnects users with computer
resources in a geographic area or region larger than that covered by even a large local area network
(LAN) but smaller than the area covered by a wide area network (WAN).

SAN: SAN (storage area network) is a high-speed network of storage devices that also connects those
storage devices with servers. It provides block-level storage that can be accessed by the applications
running on any networked servers. Storage Area Networks help attach remote computer storage
devices, such as disk arrays, tape libraries, and optical jukeboxes, to servers in such a manner that that
they appear to be locally attached to the operating system.

CAN: A Controller Area Network (CAN bus) is a vehicle bus standard designed to allow microcontrollers
and devices to communicate with each other in applications without a host computer.

PAN: A personal area network (PAN) is a computer network used for data transmission amongst
devices such as computers, telephones, tablets, personal digital assistants, fax machines and printers,
that are located close to a single user.

GAN: A global area network (GAN) is a network used for supporting mobile across an arbitrary number
of wireless LANs, satellite coverage areas, etc.

INTERNETWORK: Internetworking is the practice of connecting a computer network with other


networks through the use of gateways that provide a common method of routing information packets
between the networks. The resulting system of interconnected networks are called an internetwork,
or simply an internet.

Computer networks are an integral part of our lives. It is only because of networking that telephones,
televisions, radios, and the Internet are at our fingertips.
Reference: http://www.cmscomputer.in/blog/what-is-lan-wan-man-san-can-pan-and-gan/

29. What is Intranet, Extranet?


The Internet, extranets, and intranets all rely on the same TCP/IP technologies. However, they are
different in terms of the levels of access they allow to various users inside and outside the organization
and the size of the network. An intranet allows for restricted access to only members of an
organization; an extranet expands that access by allowing non-members such as suppliers and
customers to use company resources. The difference between the Internet and extranets is that while
the extranet allows limited access to non-members of an organization, the Internet generally allows
everyone to access all network resources.
Reference:
https://superuser.com/questions/135164/whats-the-difference-between-intranet-extranet-and-
internet
30. What is Ethernet?
A system for connecting a number of computer systems to form a local area network, with protocols
to control the passing of information and to avoid simultaneous transmission by two or more systems.
Reference: Google Q&A

31. What is link?


A link page is a type of web page found on some websites. The page contains a list of links the web
page owner, a person or organization, finds notable to mention. Often this concerns an enumeration
of partner organizations, clients, friends or related projects.
Reference:
https://www.google.com/search?q=What+is+link+of+page%3F&oq=What+is+link+of+page%3F&sou
rceid=chrome&ie=UTF-8

32. What is VPN?


A VPN or Virtual Private Network is a method used to add security and privacy to private and public
networks, like Wi-Fi Hotspots and the Internet. VPNs are most often used by corporations to protect
sensitive data.
Reference:
https://www.google.com/search?q=What+is+VPN%3F&oq=What+is+VPN%3F&sourceid=chrome&ie
=UTF-8

33. What is Anti-Virus Software?


Anti-virus software is a program or set of programs that are designed to prevent, search for, detect,
and remove software viruses, and other malicious software like worms, Trojans, adware, and more.

These tools are critical for users to have installed and up-to-date because a computer without anti-
virus software installed will be infected within minutes of connecting to the internet. The
bombardment is constant, with anti-virus companies update their detection tools constantly to deal
with the more than 60,000 new pieces of malware created daily.

There are several different companies that build and offer anti-virus software and what each offers
can vary but all perform some basic functions:

Scan specific files or directories for any malware or known malicious patterns
Allow you to schedule scans to automatically run for you
Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time.
Remove any malicious code detected –sometimes you will be notified of an infection and asked if you
want to clean the file, other programs will automatically do this behind the scenes.
Show you the ‘health’ of your computer
Always be sure you have the best, up-to-date security software installed to protect your computers,
laptops, tablets and smartphones.
Reference: Google Q&A
34. How virus affects internet?
Every now and then, even technology takes a sick day. Computer viruses are a common type of
malware designed to wreak havoc on your computer system. When a virus infects your computer, its
code can corrupt data, damage programs, delete files, reformat your hard drive and even spread itself
to other unsuspecting victims. In a lot of ways, computer viruses work like actual viruses—just with
freezing instead of sneezing.

So, you’re experiencing internet speed-induced headaches. You’ll need some information to diagnose
what’s getting your computer down. Think of it like this: a runny nose could be a symptom of anything
from seasonal allergies to a sinus infection. Slow internet speed doesn’t point to a single problem; it
can result from a variety of different underlying issues.

If you’re dealing with predictably slow internet at certain times of the day, your internet service
provider could be to blame. Since coaxial cables are often shared, they can get overloaded during peak
hours of internet use. You may want to consider upgrading to a fiber-optic network, which has a higher
base capacity for digital data.

Slow internet speed can also indicate that your computer has contracted a virus. Some types of
malware infect computer applications—including web browsers. The slow speeds you’re seeing could
be the result of malware opening multiple browser tabs and windows in the background. This floods
your network with traffic that it can’t support—resulting in subpar connection speeds.
Reference: Webopedia

35. What is Data Transfer Rate?


The data transfer rate (DTR) is the amount of digital data that is moved from one place to another in
a given time. The data transfer rate can be viewed as the speed of travel of a given amount of data
from one place to another. In general, the greater the bandwidth of a given path, the higher the data
transfer rate.

In telecommunications, data transfer is usually measured in bits per second. For example, a typical
low-speed connection to the Internet may be 33.6 kilobits per second (Kbps). On Ethernet local area
networks, data transfer can be as fast as 10 megabits per second. Network switches are planned that
will transfer data in the terabit range. In earlier telecommunication systems, data transfer was
sometimes measured in characters or blocks (of a certain size) per second. Data transfer time between
the microprocessor or RAM and devices such as the hard disk and CD-ROM player is usually measured
in milliseconds. In computers, data transfer is often measured in bytes per second.
Reference: http://searchunifiedcommunications.techtarget.com/definition/data-transfer-rate

36. What is "ping", "download speed", and "upload speed"?


The ping is the reaction time of your connection–how fast you get a response after you've sent out a
request. A fast ping means a more responsive connection, especially in applications where timing is
everything (like video games). Ping is measured in milliseconds (ms).

The download speed is how fast you can pull data from the server to you. Most connections are
designed to download much faster than they upload, since the majority of online activity, like loading
web pages or streaming videos, consists of downloads. Download speed is measured in megabits per
second (Mbps).
The upload speed is how fast you send data from you to others. Uploading is necessary for sending
big files via email, or in using video-chat to talk to someone else online (since you have to send your
video feed to them). Upload speed is measured in megabits per second (Mbps).
Reference:
https://support.speedtest.net/hc/en-us/articles/203845290-What-is-ping-download-speed-and-
upload-speed-

37. What is private IP address?


A private IP address is a non-Internet facing IP address on an internal network. Private IP addresses
are provided by network devices, such as routers, using network address translation (NAT).

Private IP addressing uses addresses from the class C range reserved for NAT (192.168.0.0 –
192.168.255.255). Private addresses can be assigned by the router using DHCP or be manually set,
after which those addresses can communicate with one another through the router.

Private IP addresses can only be guaranteed unique to an internal network, excepting conflicts. If a
directly connected computer does not have a static IP address assigned, even assigning a private IP
address manually will not enable communication.

Private IP addresses cannot be directly contacted over the Internet as a computer with a public IP
address can. This situation affords an extra layer of security: A network NAT device communicates
with the Internet using its public IP address from an ISP and checks to see if any incoming data was
requested by one of the private IP-assigned computers. If so, it is directed to that computer; if not it
is typically discarded.

Another benefit of using NAT, for those who do tend to have incoming requests -- like websites, file
and game servers – is the ability to quickly switch servers in the event of a crash, as the incoming
traffic can all be forwarded to a back-up server very easily.
Reference: http://whatis.techtarget.com/definition/private-IP-address

38. What is firewall?


A firewall is a network security system, either hardware- or software-based, that uses rules to control
incoming and outgoing network traffic.

A firewall acts as a barrier between a trusted network and an untrusted network. A firewall controls
access to the resources of a network through a positive control model. This means that the only traffic
allowed onto the network is defined in the firewall policy; all other traffic is denied.
Reference: http://searchsecurity.techtarget.com/definition/firewall

39. How Do Firewalls Prevent Computer Viruses?


You’ve likely heard the word ‘firewall’ used to describe a measure of prevention against cyber
criminals. But that doesn’t mean you know how a firewall actually works, does it?

Don’t worry—the truth is that most people don’t how a firewall works; they just expect it to do its job.
But it’s actually a lot simpler than you might think. Once you learn a little more about firewalls, you
might feel more confident about installing one on your home computer, if you haven’t already. If
you’re already using a firewall to prevent cyber-attacks, perhaps learning more about how it works
will improve your ability to manage the firewall with greater personalization at home and in the office.
It’s not really a wall at all—it’s more like a filter. It would actually be more accurate if firewalls were
called ‘firefilters’ because they’re not built to keep everything out. Instead, firewalls are designed to
filter threatening communications.

Firewalls function using a system of either inclusive or exclusive parameters, allowing specific types of
communication in or excluding others. Generally, a firewall is controlled by an access control list,
which has a particular set of guidelines that allow or resist access to specific computer
communications. These guidelines can be customized to fit any need on just about any device capable
of going online.

There are two types of firewalls: network firewalls and host-based firewalls. Network firewalls are
typically used by businesses that contain a comprehensive network of multiple computers, servers,
and users. The network firewall monitors the communications occurring between the company
computers and outside sources. If a company wishes to restrict certain websites, IP addresses, or
services like Instant Messenger, it can do so using a network firewall.

Aside from controlling employee behavior on office equipment, this type of firewall safeguards the
sensitive internal data of the company, such as customer databases and employee information.
Firewalls stop intruders from accessing this information and protect the business from cyber-attacks.

Host-based firewalls work similarly but are stored locally on a single computer. Every home computer
should have some kind of host-based firewall installed on it. This functions as the first line of defense
against cyber criminals and various online scams and attacks.

Host-based firewalls are also recommended for business computers that are network connected but
not protected by a network firewall. They can also be useful for homes with multiple computers
sharing the same network.

Most of the time, home computers are covered by a hardware firewall, like a router, which protects
the network. But every home computer should also have a host-based system kind in place to guard
against specific types of attacks.

Host-based firewalls are easy to install and protect your computer from malware, cookies, email
viruses, pop-up windows, and more. Along with desktop computers, mobile devices can be installed
with firewalls to protect online activity on the go.

Most smartphones include basic security settings like PIN numbers. While this may be enough to keep
your best friend from using your phone, it’s not ever going to be enough to ward off sophisticated
online attackers.

Mobile firewalls provide a barrier against certain kinds of attacks. For example, when certain settings
like file share or networking are enabled on the device, the phone is designed to respond to outside
requests automatically. First of all, these settings should be kept off whenever possible. What’s more,
a firewall would stop these kinds of automatic response from happening in the first place.
Reference:
https://community.norton.com/en/blogs/norton-protection-blog/how-do-firewalls-prevent-
computer-viruses-0
40. What is Gateway?
A gateway is a network node that connects two networks using different protocols together. While a
bridge is used to join two similar types of networks, a gateway is used to join two dissimilar networks.

The most common gateway is a router that connects a home or enterprise network to the internet. In
most IP-based networks, the only traffic that doesn't go through at least one gateway is traffic flowing
among nodes on the same local area network (LAN) segment -- for example, computers connected to
the same switch.
Reference: http://internetofthingsagenda.techtarget.com/definition/gateway

41. What is good password?


According to the traditional advice — which is still good — a strong password is:

Has 12 Characters, Minimum: You need to choose a password that’s long enough. There’s no minimum
password length everyone agrees on, but you should generally go for passwords that are a minimum
of 12 to 14 characters in length. A longer password would be even better.

Includes Numbers, Symbols, Capital Letters, and Lower-Case Letters: Use a mix of different types of
characters to make the password harder to crack.

Isn’t a Dictionary Word or Combination of Dictionary Words: Stay away from obvious dictionary words
and combinations of dictionary words. Any word on its own is bad. Any combination of a few words,
especially if they’re obvious, is also bad. For example, “house” is a terrible password. “Red house” is
also very bad.

Doesn’t Rely on Obvious Substitutions: Don’t use common substitutions, either — for example,
“H0use” isn’t strong just because you’ve replaced an o with a 0. That’s just obvious.

Try to mix it up — for example, “BigHouse$123” fits many of the requirements here. It’s 12 characters
and includes upper-case letters, lower-case letters, a symbol, and some numbers. But it’s fairly
obvious — it’s a dictionary phrase where each word is capitalized properly. There’s only a single
symbol, all the numbers are at the end, and they’re in an easy order to guess.
Reference: https://www.howtogeek.com/195430/how-to-create-a-strong-password-and-remember-
it/

42. What is ipconfig?


ipconfig (sometimes written as IPCONFIG) is a command line tool used to control the network
connections on Windows NT/2000/XP machines. There are three main commands: "all", "release",
and "renew". ipconfig displays all current TCP/IP network configuration values and refreshes Dynamic
Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without
parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.
Reference: http://www.webopedia.com/TERM/I/ipconfig.html

43. What is client server?


Client/server is a program relationship in which one program (the client) requests a service or resource
from another program (the server).
Reference: http://searchnetworking.techtarget.com/definition/client-server
44. What is DNS?
Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory
of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because,
although domain names are easy for people to remember, computers or machines, access websites
based on IP addresses.
Reference: Google Q&A

45. What do you mean by encryption on network?


Network encryption is the process of encrypting or encoding data and messages transmitted or
communicated over a computer network. It is a broad process that includes various tools, techniques
and standards to ensure that the messages are unreadable when in transit between two or more
network nodes.
Reference: Google Q&A

46. What is meant by server down?


Typically, when we say a server is down, what we mean is that the program that is designed to respond
to requests from the network is not doing so. There are a number of reasons that could happen, and
each of them call for a different solution. Here are some example: The power to the computer it runs
on was cut.
Reference: Google Q&A

47. Can server be hacked?


Yes, a server can be hacked. In general, no computer is one hundred percent secure, which is an
impossible goal to achieve. But we can make it as secure as possible by following security guidelines.

Firewall is imperative but you also need to know how to create rules for protection. IDS and IPS
systems might help you too. If you have a network, security policies have to be set to rule the
environment.
Reference: https://www.quora.com/Can-a-server-be-hacked

48. What is the difference between IPv4 & IPv6?


The Internet Protocol version 4 (IPv4) is a protocol for use on packet-switched Link Layer networks
(e.g. Ethernet). IPv4 provides an addressing capability of approximately 4.3 billion addresses.

The Internet Protocol version 6 (IPv6) is more advanced and has better features compared to IPv4. It
has the capability to provide an infinite number of addresses. It is replacing IPv4 to accommodate the
growing number of networks worldwide and help solve the IP address exhaustion problem.

One of the differences between IPv4 and IPv6 is the appearance of the IP addresses. IPv4 uses four 1
byte decimal numbers, separated by a dot (i.e. 192.168.1.1), while IPv6 uses hexadecimal numbers
that are separated by colons (i.e. fe80::d4a8:6435:d2d8:d9f3b11).

Advantages of IPv6 over IPv4:

IPv6 simplified the router’s task compared to IPv4.


IPv6 is more compatible to mobile networks than IPv4.
IPv6 allows for bigger payloads than what is allowed in IPv4.
IPv6 is used by less than 1% of the networks, while IPv4 is still in use by the remaining 99%.
Reference: http://www.linksys.com/us/support-article?articleNum=139604

49. What is host?


A host (also known as "network host") is a computer or other device that communicates with other
hosts on a network. Hosts on a network include clients and servers -- that send or receive data, services
or applications.
Reference: http://searchnetworking.techtarget.com/definition/host

50. What do you mean by cookies?


Cookies are small files which are stored on a user's computer. They are designed to hold a modest
amount of data specific to a particular client and website, and can be accessed either by the web
server or the client computer.
Reference: Google Q&A

51. What do you mean by Search Engine Ranking?


Search engine ranking refers to the position at which a particular site appears in the results of a search
engine query. A site is said to have a high ranking when it appears at or near the top of the list of
results. Just to confuse things, results are typically numbered starting at 1 and increasing down the list
of results, thus a higher ranking corresponds to a lower number, 1 being ideal.
Reference: http://www.web1marketing.com/glossary.php?term=search+engine+ranking

52. What is the difference between web directory & search engine? (Yahoo vs Google)
“Search engine” and “Web directory” are two different search services available to the Web
community; although they are often mistakenly confused. Search engines have indices that are built
up by robots or crawlers; whereas Web directories build up their indices through human editors. Many
search engines and directories contain both a computer-generated index and a human generated
index, and are referred to as hybrids.

Google, Inktomi, AltaVista, AlltheWeb and the like are all forms of search engines. These search
engines write programs known as robots, crawlers and/or spiders that have the following functions:
(1) to locate Web pages, (2) to read the contents of the Web pages and (3) report its findings back to
the search engine’s indices or databases. Many search engines update their index either on a bi-
monthly or monthly basis. When Web searchers use a search engine to locate Web sites that are
relevant to the keyword search, they are searching the search engine’s index. A search engine with a
larger and more up-to-date index is a better representation of the information available in the Web.
Reference:
http://www.seochat.com/c/a/marketing/web-directories/fundamental-differences-between-search-
engines-and-web-directories/

53. What is the difference between organic & paid search results?
When a search engine returns its search results, it gives you two types: organic and paid. Organic
search results are the Web page listings that most closely match the user’s search query based on
relevance. Also called “natural” search results, ranking high in the organic results is what SEO is all
about.
Paid results are basically advertisements — the Web site owners have paid to have their Web pages
display for certain keywords, so these listings show up when someone runs a search query containing
those keywords.

On a search results page, you can tell paid results from organic ones because search engines set apart
the paid listings, putting them above or to the right of the organic results, or giving them a shaded
background, border lines, or other visual clues. The following figure shows the difference between
paid listings and organic results.

The typical Web user might not realize they’re looking at apples and oranges when they get their
search results. Knowing the difference enables a searcher to make a better informed decision about
the relevancy of a result. Additionally, because the paid results are advertising, they may actually be
more useful to a shopping searcher than a researcher (as search engines favor research results).
Reference:
http://www.dummies.com/web-design-development/search-engine-optimization/the-difference-
between-organic-and-paid-search-engine-results/

54. What is local host?


In computer networking, local host is a hostname that means this computer. It is used to access the
network services that are running on the host via its loopback network interface. Using the loopback
interface bypasses any local network interface hardware.

The local loopback mechanism is useful for testing software during development, independently of
any networking configurations. For example, if a computer has been configured to provide a website,
directing a locally running web browser to http://localhost may display its home page.
Reference: https://en.wikipedia.org/wiki/Localhost

55. What is pop-up?


A pop-up is a graphical user interface (GUI) display area, usually a small window that suddenly appears
("pops up") in the foreground of the visual interface. Pop-ups can be initiated by a single or double
mouse click or rollover (sometimes called a mouse over), and also possibly by voice command or can
simply be timed to occur. A pop-up window must be smaller than the background window or interface;
otherwise, it's a replacement interface.

On the World Wide Web, JavaScript (and less commonly Java applet s) are used to create interactive
effects including pop-up and full overlay windows.

A menu or taskbar pull-down can be considered a form of pop-up. So can the little message box you
get when you move your mouse over taskbars in many PC applications.
Reference: http://whatis.techtarget.com/definition/pop-up

56. What are browser extensions?


A browser extension is a plug-in that extends the functionality of a web browser. Some extensions are
authored using web technologies such as HTML, JavaScript, and CSS. Others are developed using
machine code and application programming interfaces (APIs) provided by web browsers, such as
NPAPI and PPAPI. Browser extensions can change the user interface of the web browser without
directly affecting viewable content of a web page; for example, by adding a browser toolbar.
Reference: https://en.wikipedia.org/wiki/Browser_extension
57. HTTP vs. HTTPS
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which
data is sent between your browser and the website that you are connected to. The 'S' at the end of
HTTPS stands for 'Secure'. It means all communications between your browser and the website are
encrypted.
Reference:
https://www.google.com/search?q=http+vs+https&oq=http+vs+https&sourceid=chrome&ie=UTF-8

58. Why is the ShareIt app faster than Bluetooth?


ShareIt app uses Wi-Fi hotspot method of sharing. I really doubt if the Wi-Fi Direct method way of
sharing exists, because I don't see that feature in the new version. And I have never tried looking for
it in the old version, so I don't know.

And many people confuse hotspot method of sharing with Wi-Fi Direct method. Both are Different.

In Wi-Fi Direct, the two devices connect to each other in a peer to peer network. It's like an exclusive
connection between the two. But in hotspot, many devices can connect to the hotspot created by the
sender or receiver device. Not really an exclusive connection.

And in hotspot method, the maximum link speed is 65Mb/s which is 8MB/s and link speed changes
based on Wi-Fi signal strength. If Share It app is able to use maximum bandwidth, then it can send at
a speed of about 8 MB/s. Of course it is faster than Bluetooth.
Reference: https://www.quora.com/Why-is-the-SHAREit-app-faster-than-Bluetooth

59. What is the difference between Internet and internet?


The internet can be any interconnected-network of computers or similar things between any
organization(s) or group of people which may not be known or accessible to the public.

Internet is the kind of inter-network or internet in short which we are using now, i.e. "www" (World
Wide Web). Internet is the largest internet we have in this world which comprises of trillions of
computers being connected to each other. Because of its size, it is very much public.
Reference: https://www.quora.com/What-is-the-difference-between-Internet-and-internet-2

-----

You might also like