My Content

 Internet - Web browsers, W.W.W. , Email, Search Engines, Meta and Entity Search Engines
Internet
Internet protocols
       TCP (Transmission Contral Protocal)
       IP (Internet Protocol)
      UDP (User Datagram Protocol)
      TFTP (Trivial File Transfer Protocol)
      Telnet
      HTTP (Hyper Text Transfer Protocol)
      HTTPS
Web Browsers
Types of web browsers
          Text Web Browsers
          Graphical Web Browsers
Popular Graphical Web Browsers
           NETSCAPE
           INTERNET EXPLORER
           Mozilla Fire Fox
           Google Chrome
           Safari
           EDGE
WWW (World Wide Web) 1989
E-mail (Electronic-mail)
Email Structure
Search Engines
Search Engine Components
           web crawler
           Index / Database
           Search Interface or results
Search Engine Working
Different types of Search Engines
            Semantic search/Major Search Engines
            Meta Search Engines
            Advance Search Engines
            People Search Engines
            Industry / organization search
            Collective Media Search Engines
            Knowledge Base Search Engines
Meta and Entity Search Engines
                                                                                                                                                                       

 Internet - Web browsers, W.W.W. , Email, Search    Engines, Meta and Entity Search Engines           


  Internet                                                                                                

 • Internet full from International Network. 

 • Internet is a network of computer, which links many different types of computer all over the world. 

 • VINT CURF is known as father of computer. 

 • Internet is a network that connects computers all over the world through  the internet, people can shaw information and  communication from anywhere with an  internet connection. 

 • The data move around the internet is controlled by protocols. 

 • It uses TCP/IP protocol (Transmission Control Protocal / Internet Protocol) in which a file is broken into small a parts called as PACKETS by file servecs. 

 • In 1969 university of California at las Angeles and university of UTAM begining of ARPANET. 

 • ARPANET full form Advanced Research Projects Agency Network. 

 • It was the world's first operational switching network. 

 • The goal of this project is to connect computers at different universities and us defence. 

 • Inmid 80 another federal agency. 

 • NSF (National Science Foundation) started  a new high capacity network called NSF net which  was move capable than ARPANETA. 

 • Drowback - The only drawback of NSF net was that it allowed only the academic research an its network and not any kind of private business on it. 

 • IPS reffers to the company that provides internet connections to the uses. 

 • Some POP was ISP are Airtel, Vodafone etc. 

 • First ISP in India was launched by VSNL (Videsh Sanchar Nigam limited). 

 • First ISP in the world was Telnet which was introduced in 1974. 



   Internet protocols                                                                               

 • TCP (Transmission Contral Protocal) 

 TCP is a connection oriented protocol and offers end to end packet delivery. It acts as back bone for connection. It exhibits the following key features: Transmission Control Protocol (TCP) corresponds to the Transport Layer of OSI Model. TCP offers connection oriented end to end Packet delivery. TCP ensures reliability by sequencing bytes with a forwarding acknowledgement number that indicates to the destination the next byte the source expect to receive. 


 IP (Internet Protocol) 

 Internet protocol is connectionless and unreliable protocol. It ensures on guarantee  of successfully transmission of data. In order to make it reliable, it must be paired with reliable protocol such as TCP at the transport layer. 


 UDP (User Datagram Protocol) 

 Like IP, UDP is connectionless and unreliable  protocol. It doesn't require making a connection  with the host to exchange  data. Since UDP is unreliable protocol, there is no mechanism for ensuring that data sent its received. 


 TFTP (Trivial File Transfer Protocol) 

 Trivial File Transfer Protocol is also used to transfer the files but it transfers the files without authentication. Unlike FTP, TFTP does not separate control and data information. Since there is no authentication exists, TFTP lacks in security features therefore it is not recommended to use TFTP. 


 Telnet 

 Telnet is a protocol used to log in to remote computer on the internet. There are a number of telnet clients having user friendly user interface. The following  diagram shows a person is logged into computer A, and from there, he remote logged into computer B.  


HTTP (Hyper Text Transfer Protocol)  

HTTP is a communication protocal. It defines mechanism for communication between browser and the web server. It its also called request and response protocol because the communication between  browser and server takes place in request and response pairs. HTTP is used to access the data w.w.w.

 HTTP are the combination of FTP and SMTP (Simple Mail Transfer Protocol). HTTP massages are delivaed immediately. HTTP uses the services of TCP on well known port no 80 . 

 HTTPS - Hyper Text Transfer Protocal Security. 



 Web Browsers                                                                                       

• Web browsers is a software application. 

 • It is used to locate, retrieve and also display content on the world wide web (W.W.W.) 

 • Web browsers are basically used to explore the internet. 

 • More than one web browser can be installed on a single computer.  



  Types of web browsers                               

 i. Text Web Browsers 

 A web browser that displays only text based information is known as text web browsers. Example LYNX which provides access to the internet in text mode only. 


 ii. Graphical Web Browsers 

 • A web browser that supports both text and graphic information is known as graphical web browser. 

 • Major graphical web browsers are internet explore, firefox, chrome, safari, opera mini, opera. 

 • The first graphical web browser was NCSA. (National Centre for Supercomputers Application).



  Popular Graphical Web Browsers    

 1. NETSCAPE 

 • Netscape was introduced on 4 April 1994. 

 • Netscape browser was once dominant but lost to internet explorer and other competitors in the SD called first  browser was. 

 • Market shaw fallen from more than 90% in the mid 1990 to less than 1% in 2006. 


 2. INTERNET EXPLORER 

 • It is a product of Microsoft. 

 • This was introduced in 1995 along with windows 95 launch and it has passed netscape popularity in 1998. 

 • It was once the most widely used web browser attaining a peak of about 95% usage shace by 2003. 

 • Usage shace declined with the launch of fire Fox (2004) and chrome (2008). 


 3. Mozilla Fire Fox 

 It was published in 2004 and grown to be the second most popular web browser. 


 4. Google Chrome 

 This web browser was developed by google in 2008. 


 5. Safari 

 This web browsers was developed by Apple Incorporation in 2003. 

 6. EDGE 

 Microsoft weared in edge web browser in 2015 as part of windows 10. 





    WWW (World Wide Web) 1989                                                         

The internet is often confused with the world wide web. The misperception is that these teo terms are synonymous. The internet is the collection of the many different systems and protocols. 

 The world wide web developed in 1989 in Tim Berners lee is actually one of these different protocol. As the name implies, it allows resources of be linked with great ease in an almost seamless fashion. The would wide web contains a vast collection of linked multimedia pages that is even changing. However, there are several basic components  of the web that allow users to communicate  with each other. Below you will f ind selected components and their descriptions. 

 One reason was that commercial companies and the general public were allowed to connect to the internet. Another reason was that www and mosaic were invented and the use of the internet became much friendier. 



   E-mail (Electronic-mail)                                                                   

 An e-mail server organizes its information in units called mail messages. Messages are stored in mail boxes. When mail messages are transferred between e-mail servers, a protocol called SMTP, Simple Mail Transfer Protocol, is used. When you retrieve messages from the e-mail  server to your computer a protocol called POP3 (Post Office Protocol) version 3 is used. 

 Email Structure 

 From - Won E-mail ID 

 To - Send E-mail ID 

CC - (Carbon Copy)  

BCC (Bline Carbon Copy) 

 Subject -  Compose email - Type your email. 

 • Short for electronic mail, e-mail or email is information stored on a computer that is exchanged between two users over telecommunications. More plainly, email is a message that may contain text, files, images or other attachments sent through a network to a specified individual or group of individuals. 

 • The first e-mail was send by Roy Tomlinson in 1971 

 CC - A cc, short for "Carbon Copy" is a copy of an email message sent to a  recipient whose email address appears  in the message's CC header field. 

 Email Address : An email address is a name for an electronic postbox that can receive (and send) email messages on a network (such as the internet or a local network not connected to the wider internet.) 

 Email Body : An email body is the main part of an email message that contains the message's text, images and other data (such as attached files)

Email Client : An email client is a program (on a computer or mobile device, for example) used to read and send electronic memages. 

 SMTP (Simple Mail Transfer Protocol) SMTP, short for Simple Mail Transfer. Protocol, is the protocol used for email on the internet. It defines a message format and a procedure to route messages through the internet from source to destination via email servers. 

 IMAP (Internet Messaging Access Protocol) IMAP shopt for Internet Messaging Accesse Protocol, is an internet standard that describes a protocol for retrieving mail from an email (IMAP) server. IMAP allows email programs to access not only new messages but also folders on the server. Actions are synchronized between multiple email programs connected through IMAP. 

 Mail to - Mailto is an HTML tag that allows visitors to a site to click on a link that creates a new message in their default email program. It is possible to set not only a default email recipient but also default subject and message body content. 

 Phishing - Phishing is a fraudulent practice in which private data is captured on websites or through an email designed to look like a trusted third party. Typically, phishing (from "Password  f ishing") scams involve an email alerting the user to a problem with their bank or another account. 

POP (Post Office Protocol) - POP is an internet standard that defines an email server and a way to retrieve  mail from it. In contrast to IMAP, POP only lets the email client download recent messages, to be managed in the program and on the device. 

 Spam - Spam is unsolicited email. Not all unsolicited  email is spam, however. Most spam is sent in bulk  to a large number of email addresses and advertises some product or - considerably less often - political viewpoint. 

 Spammer - 1 A spammer is a person on entity (such as a company) that sends spam emails. 

 To : The To. line of an email contains its primary recipient or recipients. All recipients in the To: line is visible to all other recipients, possibly by default. 

 Unicode : Unicode is a way to represent characters  and symbols on computers and devices  with support for most of the world's writing systems (including African, Arabic, Asian and western). 

 Subject : The subject of an email message should ba a short summary of its contents. Email programs usually display it in a mailbox display together with the sender. 

 Threadjacking : Threadjacking (also thereadwhacking) is to steer off the original topic in an email thread, especially on a mailing list. Threadjacking can also apply to other conversations on the internet, of course, say on message boards, blogs or social networking sites. Whether the threadjacker changes the subject line to reflect the change in subject or retains the original email subject to take over a thread can be regarded as threadjacking in either case.

Worm : A worm is a program or script that replicates itself and moves through a network, typically traveling by sending new copies of itself via email. Many worms have no negative effect except  resource consumption, but some will perform malicious actions. 



 Search Engines                                                                                    

 Search Engine refers to a huga database of internet resources such as web pages, newsgroups, programs, images etc. It helps to locate information on world wide web. User can search for any information by passing query in form of keywords or phrase. It them searches for relevant information in its database and return to the user. 

 Search Engine are complex computer software programmes designed to search an information on the world wide web and provide users the best results in fastest possible way. google, yahoo, bing are most used search engines. 


 Search Engine Components             

 Generally there are three basic components of a search engine as listed below :  

i. web crawler : It is also known as spider or bots. It is a software component that traverses the web to gather information. 

 ii. Index / Database : All the information on the web is stored in database. It consists of huge web resources. 

 iii. Search Interface or results : This component is an interface between user and the database. It helps the user to search through the database. 



   Search Engine Working        

 Web crawler, database and the search interface  are the major component of a search engine that actually makes search engine  to work. Search engines make use of Boolean expression AND, OR, NOT to restrict and widen the results of a search. Following are the steps that are performed by the search engine :  

i. The search engine looks for the keyword in the index for predefined database instead of going directly to the web to search for the keyword. 

 ii. It then uses software to search for the information in the database. This software component is known as web crawler. 

 iii. Once web crawler finds the pages, the search engine then shows the relevant web pages as a result. These retrieved web pages generally include title of pages, size of text portion, first several sentences etc. 

 Examples. — Google, Bing - 2009, Ask - 1996,  Alta Vista - 1995, AOL. Search, Lycos, Alexa.



   Different types of Search Engines          


1. Semantic search/Major Search Engines 

 • DuckDuckGo 

 • KNGINE 


 2. Meta Search Engines  

• Poly Meta 

 • Ixquick 


 3. Advance Search Engines 

 • Mamma  


4. People Search Engines 

 • Spokeo 

• Peek you 


 5. Industry / organization search

 • Linkedln 

 • Glassdoor 


 6. Collective Media Search Engines 

 • Social mention 

 • Social Searcher 

 7. Knowledge Base Search Engines 

 • Health Mash 



 Meta and Entity Search Engines                                                        

Blank












                                                                     Notes                                                                









                                                                     Question                                                           

1. World Wide Web was first designed by 
A. Charles Babbage            B. F.W. Lancaster 
C. Ted Nelson                     D. Tim Berner’s Lee
Ans:

2. Internet’s POP3 and X400 are the 
A. E-mail systems         B. DOT systems 
C. UNIX shell               D. T.C.P.
Ans:

3. World Wide Web is an facility on 
A. NICNET                B. INDONET 
C. INTERNET            D. DELNET
Ans: 

4. In which form E-mail transmits the message or document?
A. In book form               B. In electronic form 
C. In printed form            D. In micro form
Ans: 

5. What facilities are not available in Email service of the computers? 
A. Preparation of many copies of the mail           B. Store of mail for delayed delivery 
C. Forwarding of the mail                                    D. Delivery of message to the user at his home
Ans: 

6. What types of important services are provided by a data communication system ? 
A. D-mail only                                                                                   B. E-mail and voice mail only 
C. E-mail, Bulletin Board, voice mail and video-conferencing        D. None of these
Ans: 

7. What is correct about E-mail service? 
A. Every user is provided one mail box 
B. Mail box is the store of information 
C. The presence of receiver is not essential at computer 
D. The message resides in the mail box until it is read by receiver
Ans: 

8. Through what E-mail service is distributed ? 
A. By electric             B. By courier 
C. By speed post        D. By Computer and Modem
Ans: 

9. Match the following : 
     List – I                      List – II 
a. Altavista             i. Subject search engine
b. Lycos                 ii. Meta search engine 
c. Geoindex          iii. Regional search engine 
d. Savvysearch     iv. General search engine 
Codes: 
      (a) (b) (c) (d) 
A. iii ii i iv 
B. iii iv ii i 
C. iv iii i ii 
D. iv i ii iii
Ans: 

10. Who mainly provides Internet services in India? 
A. Dept. of Electronics                B. CMS Limited 
C. NIC                                          D. VSNL
Ans: 

11. Which network converted the libraries into virtual libraries? 
A. Internet                 B. BLAISE 
C. Janet                     D. I Net
Ans: 

12. What are the components required to take Internet connection? 
A. Personal computer (IBM-PC 486 / Pentium Macintosh)                  B. Telephone connection
C. Modem with speed 14000 to 28800 bps                                           D. All of the above
Ans: 

13. ARPANET was the network of which country? 
A. England                  B. Japan 
C. Canada                    D. USA
Ans: 

14. In 1990, Internet became virtual hypertext network, it is called 
A. WWW                            B. Gofer 
C. Vais                                 D. FTD
Ans: 

15. Internet is the enlargement of which network? 
A. JANET                     B. ARPANET 
C. WLN                        D. RLIN
Ans: 

16. Which department of USA government set up the Arpanet basically? 
A. Department of Commerce                                  B. Department of Defence 
C. State Government of New York                         D. Department of Science
Ans: 

17. What do you know about INTERNET? 
A. It is a library                                         B. In is a management system 
C. It is an information system                   D. It is network of networks
Ans: 

18. Internet provides which type of access of information? 
A. Direct access of information             B. Off-line access of information 
C. On-line access of information           D. Indirect access of information
Ans: 

19. What is the name of bulletin board service of Internet? 
A. Bulletin board                   B. Netware 
C. USENET                           D. Netware
Ans: 

20. What types of services, Internet has been providing to its users? 
A. E-mail, file transfer, Bulletin board, www           B. Bulletin Board www 
C. E-mail and file transfer                                         D. All the above
Ans: 

21. What is called that language in which web pages are written? 
A. Computer language                      B. FORTRAN 
C. Machine language                        D. HTML
Ans: 

22. The E-mail on Internet is sent to other networks through interconnections? What are called these interconnections? 
A. Gateways                  B. Password 
C. Address                     D. Home page
Ans: 

23. How large databases are searched on Internet? 
A. With the help of WAIS                        B. With the help of home page 
C. With the help of browsing                   D. With the help of Golpher
Ans: 

24. How E-mail is distributed in Internet system? 
A. Courier                             B. Speed post 
C. Air-mail                            D. Computer and modem
Ans: 

25.Why browsing service permits the users?
A. To disseminate information from remote computers 
B. To view information from remote computers without knowing the names of files 
C. To remote computers without any disturbances 
D. To retrieve information without any disturbances 
Ans: 

26. How VSNL make us member for Internet ? 
A. By providing a Serial number                                      B. Password which is to identify 
C. By providing a Password with one account name        D. By providing an Account name
Ans: 

27. What is false about browsing? 
A. It is a dynamic service provided by Internet         B. It allows to obtain and display information 
C. It is the same as information retrieval                   D. It does not provide mechanism to the users
Ans:

28. What is called the service that allows an individual to conveniently obtain and display information that is stored on a remote computer? 
A. Hacking               B. Browsing 
C. Chatting               D. Filing
Ans: 

29. The electronic groups that centre around broad topic in the Internet is known as 
A. Subscribe serve               B. List serve 
C. Mail serve                       D. Group serve
Ans: 

30. Why Internet is facing several problems in browsing and navigating the relevant information? 
A. Due to unloading on Internet                                       B. Due to chatting on Internet 
C. Due to over loading of information of Internet           D. Due to hacking on Internet
Ans: 

31. The practice of browsing through the contents of news groups, web or other information services on Internet is known is 
A. Surfing                  B. Rowing 
C. Exploration           D. Navigation
Ans: 

32. The programmes that act as an interface between the user and Internet is known as 
A. Browser                B. Service Provider 
C. Access Point         D. Protocol
Ans: 

33. What is the main function of Archie? 
A. Helps to find information located any where on Internet 
B. Helps to find information by a Password 
C. Help to find information on the www of Internet 
D. Helps to find information on Internet
Ans: 

34. Assertion (A): Libraries are facing a threat and are bound to disappear soon. 
Reason (R): Internet and WWW provide access to Oceans of information Worldwide. 
Codes : 
A. (A) is true, but (R) is false 
B. (A) is false, but (R) is true 
C. Both (A) and (R) are true 
D. Both (A) and (R) are false
Ans: 

35.  LYCOS is a 
A. search engine               B. programming language 
C. database                       D. database vendor
Ans: 

36. The ability to travel between electronic documents using any number of alternative paths to find relevant information is known as 
A. Linking                   B. Browsing 
C. Searching                D. Navigating
Ans: 

37. Which of the following are web browsers? 
1. Yahoo                   2. Google 
3. Netscape              4. Internet Explorer 
A. 1 and 2 are correct 
B. 2 and 3 are correct 
C. 1 and 4 are correct 
D. 3 and 4 are correct
Ans: 

38. A series of interconnected documents stored on the Internet is called 
A. Websites              B. Domain Name 
C. Home Page          D. Web Page
Ans: 

39. The following is the search engine for scientific information only 
A. Google                B. SCIRUS 
C. Yahoo                  D. Alta Vista
Ans: 

40. The first page of Website is known as 
A. Cover Page             B. Home Page 
C. Title Page               D. Half Title Page
Ans: 

41. The owner of Internet is 
A. American Mathematical Society      B. Department of Science and Technology, Government of India 
C. British Standard Institute                 D. None of the above
Ans: 

42.  Match the following 
       List - I                                  List-II 
a. Protocol                                 i. Java 
b. Language                              ii. Internet Explorer 
c. Browser                                 iii. Altavista 
d. Search Engine                       iv. Dos 
                                                   v. HTTP 
Code: 
    (a) (b) (c) (d) 
A. (iv), (v), (i), (iii) 
B. (v), (i), (ii), (iii) 
C. (ii), (iv), (v), (i) 
D. (i), (v), (iv), (ii)
Ans: 

43. Match the following 
                List - I                    List - II 
a. Search Engine                  i. PASCAL 
b. Browser                           ii. UNIX 
c. Operating System            iii. Yahoo 
d. Programming                   iv. Netscape Language 
                                             v. HTTP 
Codes : 
    (a) (b) (c) (d) 
A. (i) (iv) (v) (ii) 
B. (iv) (iii) (ii) (i) 
C. (iii) (iv) (ii) (i) 
D. (iv) (ii) (i) (v)
Ans: 

44.  Match the following 
          List-I                      List-II 
a. Search Engine          i. Internet Explorer 
b. Subject Gateway     ii. Dogpile  
c. Net Browser             iii. FTP 
d. Meta Search              iv. SOSIG Engine 
                                      v. Altavista 
Code: 
    (a) (b) (c) (d) 
A. (iv) (iii) (ii) (i) 
B. (v) (iv) (i) (ii) 
C. (v) (i) (ii) (iii) 
D. (v) (i) (iv) (ii)
Ans: 

45.  Match the following 
           List-I                           List-II 
a. E-Mail                     i. Bulletin Board 
b. FTP                         ii. Remote Log In 
c. TELNET                 iii. Library Network 
d. USENET                 iv. Moving/Downloading Files 
                                     v. Exchanging Message 
Code: 
     (a) (b) (c) (d) 
A. (iv) (iii) (v) (i) 
B. (v) (iv) (ii) (i) 
C. (ii) (iv) (i) (iii) 
D. (v) (i)(iv) (iii)
Ans: 

46. tch the following 
         List-I                                   List-II 
a. Search Engine                        i. Pascal 
b. Browser                                 ii. UNIX 
c. Operating System                  iii. Yahoo 
d. Programming Language        iv. Netscape 
Codes : 
    (a) (b) (c) (d) 
A. (iii) (iv) (ii) (i) 
B. (ii) (i) (iv) (iii) 
C. (i) (iii) (iv) (ii) 
D. (iv) (ii) (i) (iii)
Ans: 

47. Match the following 
          List-I                         List-II 
a. Search Engine            i. PASCAL 
b. Browser                     ii. UNIX 
c. Operating System       iii. Yahoo 
d. Programming               iv. Netscape Language 
                                         v. HTTP
Codes : 
(a) (b) (c) (d) 
A. (i) (iv) (v) (ii) 
B. (iv) (iii) (ii) (i) 
C. (iii) (iv) (ii) (i) 
D. (iv) (ii) (i) (v) 
Ans: 

48.