KnowledgeBoat Logo
OPEN IN APP

Chapter 2

Internet Services and Mobile Technologies

Class 10 - Sumita Arora CBSE Computer Code 165



Objective Type Questions

Question 1

In web services, the communication takes place between ............... .

  1. Two electronic devices
  2. Two human beings
  3. Two spiders
  4. None of the above

Answer

Two electronic devices

Reason — Web services are the software based services that take place when two electronic devices connected via network, communicate over WWW's HTTP.

Question 2

An email can be sent via, ............... .

  1. PC
  2. Tablet
  3. Smart phone
  4. All the above

Answer

All the above

Reason — An email can be sent via PC, tablet or smart phone.

Question 3

In an email address, the characters following '@' character represent ............... .

  1. User name
  2. E-mail Recipient
  3. Domain name
  4. None of these

Answer

Domain name

Reason — In an email address, the characters following '@' character represent the domain name for the host server.

Question 4

In the email address "hithere@edupillar.com", what is the domain name ?

  1. the whole email address
  2. .com
  3. edupillar.com
  4. hithere

Answer

edupillar.com

Reason — In an email address, the characters following '@' character represent the domain name for the host server.

Question 5

............... field of email-compose box allows to send same message to multiple recipients without getting them know about other recipients.

  1. cc
  2. To
  3. bcc
  4. Message

Answer

bcc

Reason — bcc stands for Blind Carbon Copy. bcc field of email-compose box allows to send same message to multiple recipients without letting them know about other recipients.

Question 6

Which of the following is not a legal domain in context of web address ?

  1. edu
  2. com
  3. tv
  4. work

Answer

work

Reason — edu, com and tv are legal domain names of web addresses and they represent educational firms, commercial firms and television channels respectively.

Question 7

Chatting on Internet is :

  1. Talking face to face
  2. Talking on phone
  3. Online textual talk
  4. None of these

Answer

Online textual talk

Reason — Online textual talk is called chatting.

Question 8

Chat Rooms are actual rooms where chat session takes place.

Answer

False

Reason — Chat rooms are not actual rooms but websites or a part of some online services that provide an online venue for communities of users with a common interest to communicate in real time.

Question 9

To participate in a chat, you must be logged in the same site and communicate live with others by typing words on your computer. (T/F)

Answer

True

Reason — To participate in a chat, you must be logged in the same site and communicate live with others by typing words on your computer.

Question 10

A ............... room or online forum allows users to communicate through typed messages which are displayed almost instantly.

  1. Mail
  2. Buddy
  3. Chat
  4. Message

Answer

Chat

Reason — A chat room or online forum allows users to communicate through typed messages which are displayed almost instantly.

Question 11

Online textual talk is called ............... .

  1. Video Conferencing
  2. Telephony
  3. Text Phone
  4. Chat

Answer

Chat

Reason — Online textual talk is called chatting.

Question 12

Electronic mail cannot be used for ............... .

  1. Sending documents
  2. Sending bulk data (say over 2GB)
  3. Sending attachments
  4. Sending messages

Answer

Sending bulk data (say over 2GB)

Reason — Email can be used to send documents, attachments and messages. There are limitations on attachment size imposed by email providers.

Question 13

A two way video phone conversation among multiple participants is called ............... .

  1. Video chatting
  2. Video talking
  3. Video conferencing
  4. Video watching

Answer

Video conferencing

Reason — A two way video phone conversation among multiple participants is called Video conferencing.

Question 14

Which of the following is not a feature / service of the web ?

  1. E-mail
  2. Telnet
  3. CPU
  4. Chat

Answer

CPU

Reason — CPU (Central Processing Unit) is a part of computer and not a feature / service of the web. E-mail, chat and telnet are feature / service of the web.

Question 15

You can use email to send messages but not files across Internet. (T/F)

Answer

False

Reason — E-mails can be used to send messages as well as files of a limited size.

Question 16

Pick the odd one out.

  1. Amazon
  2. e-bay
  3. twitter
  4. naaptol

Answer

twitter

Reason — While Amazon, eBay and Naaptol are all e-commerce platforms or online marketplaces, Twitter is a social media platform primarily focused on micro-blogging and social networking.

Question 17

The benefit of E-learning is :

  1. Class work can be scheduled around work and family
  2. Reduces travel time and travel costs for off-campus students
  3. Students can study anywhere they have access to a computer and Internet connection
  4. All the above

Answer

All the above

Reason — E-learning reduces travel time and travel costs for off-campus students, allows remote learning facilities and scheduling of class work around work and family.

Question 18

Fill in the blanks

  1. A ............... is a set of rules that are needed for communication.
  2. ............... enables the actual sending and receiving of messages.
  3. The symbol, '@' is pronounced as ............... and this remains same in every email address.

Answer

  1. A protocol is a set of rules that are needed for communication.
  2. SMTP (Simple Mail Transfer Protocol) enables the actual sending and receiving of messages.
  3. The symbol, '@' is pronounced as at the rate or at and this remains same in every email address.

Question 19

Out of the following which one is the most used feature of Internet :

  1. E-mail
  2. FTP
  3. Telnet
  4. Usenet ?

Answer

E-mail

Reason — E-mail is the most used feature of Internet as it is publicly used for sending messages.

Question 20

e-Reservation is a process of making reservations of ............... .

  1. Tickets
  2. Hotel rooms
  3. Tourist packages
  4. All of these

Answer

All of these

Reason — e-Reservation is a process of making reservations of tickets, hotel rooms and tourist packages.

Question 21

Buying goods by placing orders online is called ............... .

  1. e-Commerce
  2. e-Shopping
  3. e-buying
  4. all the above

Answer

e-Shopping

Reason — e-Shopping means buying goods by placing orders online.

Question 22

Which of the following is the major reason cited for e-Shopping's popularity ?

  1. unique offers
  2. price
  3. impulse
  4. convenience

Answer

convenience

Reason — Convenience is the major reason cited for e-Shopping's popularity.

Question 23

Which of the following is/are immensely popular services of Internet ?

  1. e-commerce
  2. blogs
  3. social-networking
  4. e-shopping

Answer

social-networking

Reason — Social-networking is a popular service of the internet.

Question 24

Which of the following is/are example(s) of e-governance ?

  1. Applying for passport online
  2. Sending email to your school friend
  3. Buying books online
  4. Enquiring about the status of Aadhaar application.

Answer

Applying for passport online & Enquiring about the status of Aadhaar application

Reason — e-governance refers to the application of electronic means in governance. Since applying for passport and enquiring about the status of Aadhaar involves using online services provided by the government, they are examples of e-governance.

Theoretical Questions

Question 1

Out of the following which one is the most used feature of Internet ?

  1. e-mail
  2. FTP
  3. Telnet
  4. Usenet

Answer

E-mail is the most used feature of Internet as it is publicly used for sending messages.

Question 2

What are the two parts of an e-mail address ? Which character is used to separate these two parts ?

Answer

An e-mail address has two parts separated by '@' symbol :

  1. Username — On the left side of @ operator is the username.
  2. Domain name for the host server — The portion to the right of @ identifies the server or host or network that services our e-mail.

Question 3

In an e-mail account, which folder stores the received emails ?

Answer

Inbox folder stores the received emails.

Question 4

What is emoticon ? What is its usage ?

Answer

An emoticon is a symbol, most often used in computer-mediated communications.

It is used to represent a facial expression that communicates the emotional state of the sender.

Question 5

Why is it necessary to be online while chatting ?

Answer

We need to be online while chatting for the following reasons :

  1. Chatting is a web service which requires internet. If we want to chat, we need to log on to a server that provides chat facility.
  2. Chat platforms often rely on instant messaging, where messages are delivered and received instantly.
  3. Being online while chatting allows us to engage in real-time conversations with other users. This allows for immediate responses and facilitates smooth and dynamic communication.

Question 6

Explain the structure of an e-mail address.

Answer

E-mail addresses are commonly written in the form given below:

username@hostname

An email-address has two parts separated by '@' symbol.

  1. Username — On the left side of @ separator is the user name. A user name can not have blanks.
  2. Domain name for the host server — The portion to the right of @ identifies the server or host or network that services your e-mail. It is sometimes also called the e-mail server.

For example, pacas@gmail.com, hello@kboat.in, etc.

Question 7

Explain the structure of an e-mail message. Also differentiate between Cc: and Bcc: fields.

Answer

The general structure of an e-mail message is as follows:

  1. From — This is the address of the sender of the e-mail.
  2. To — This is the address or addresses to which the e-mail is sent.
  3. CC — It stands for Carbon Copy. Here we specify the address/addresses of those to whom we want to send a copy of the e-mail. The CC recipient's name is visible to all recipients.
  4. BCC — It is for Blind Carbon Copy. This is also a list of addresses that will receive a copy of the e-mail but BCC recipient's name is not visible to other recipients. The BCC recipients can see the TO and CC addresses.
  5. Subject — A short title for the mail which speaks about contents of the message.
  6. Body — It is the actual message.
  7. Attachments — We can attach one or more pictures and documents or any other file with our e-mail.
  8. Date — This is the date and time on which the message was sent from the sender's computer.
  9. Message-id — Every message will have a unique id, which is used to track replies to it. The message id is not visible to us. It is used internally by the e-mail program and the e-mail system.

The difference between cc and bcc is as follows:

CcBcc
It stands for Carbon Copy.It stands for Blind Carbon Copy.
The e-mail addresses of all the recipients are displayed in the message.It hides the e-mail addresses of all recepients such that they are not visible in the message.
It does not protect the privacy of our recipients.It protects the privacy of our recipients.

Question 8

To find out about e-mail address of one of your friends, which utility will you use and how ?

Answer

I can use the website — www.123people to find out about e-mail address of my friend.

To find the e-mail address of a person, follow these steps:

  1. Log onto www.123people.com.
  2. We will see the people search page on our screen. Now type the first name and last name of the person whose email-id is to be searched.
  3. Click Search button and the search engine will search for the name given in its database and display the results on the screen.

Question 9

What do you understand by video conferencing ? What all things must be installed on your computer in order to have video conferencing ?

Answer

A two-way videophone conversation among multiple participants is called Video Conferencing.

The things that must be installed on a multimedia computer in order to have video conferencing are :

  1. a camera hardware
  2. a video compression hardware
  3. access to Internet over an ordinary telephone line
  4. videophone software

Question 11

What are the uses and misuses of social networking sites ?

Answer

Major uses of social networking sites are :

  1. It is easier to connect with people from all across the world on social networking site.
  2. With social networking, conducting discussions and collecting views or opinions on anything has become easier.
  3. Social networking sites provide interactive involvement with other people.
  4. Interactive involvement in online and social networking forums helps in improving the world awareness.

Major misuses of social networking sites are :

  1. Some people with wrong intentions can misuse the personal information posted by innocent users such as date-of-birth, address, school address, phone numbers etc.
  2. Some people with bad intentions use social networking sites for spreading baseless 'facts' resulting in a complete abuse of the 'freedom of expression'.
  3. There are numerous fake user profiles in these sites.
  4. With growing use of social networking sites undesirable elements have crept up who resort to needless bullying, defamation, harmful commenting and pranks and persecute hapless, innocent victims and pages.
  5. In order to fit under peer-pressure, often people lie or put exaggerated information about them. This leads to consequences born out of jealousy and harmful reactions.

Question 12

Name some social networking sites.

Answer

Some social networking sites are as follows:

  1. Facebook
  2. Twitter
  3. Reddit
  4. LinkedIn

Question 13

What precautions and measures should you take while using web services such as social networks, e-shopping etc.?

Answer

We should take the following precautions and measures while using web services such as social networks, e-shopping, etc. :

  1. One should carefully upload the contents, pictures, videos etc. as it may also involve others and posting these may violate other users' privacy.
  2. One should deliberately keep away from indulging in illegal and unethical activities like hacking and posting of threatening online messages.
  3. One should treat every other user equal and no less in any way.
  4. Any of our action must not hinder in any way the betterment of the society and promoting common good of the users.
  5. One should use strong, unique passwords for each online account to minimize the risk of unauthorized access.
  6. One should review and configure privacy settings on social networks to control the visibility of personal information.
  7. One should be cautious of suspicious emails, messages, or links that may lead to phishing websites.
  8. One should regularly update software and devices.
  9. Read terms and conditions carefully before signing up or using a web service.
  10. One should regularly monitor and review accounts.

Question 14

What are blogs ? How are they useful ?

Answer

A blog refers to an online journal where entries are posted.

Blogs are useful in the following ways:

  1. Information sharing — Blogs allow sharing valuable information and expertise.
  2. Personal expression — Blogs provide a platform for personal experiences and stories.
  3. Community building — Blogs foster a sense of community and encourage discussions.
  4. Authority and credibility — Blogs establish expertise and professional credibility.
  5. Marketing and promotion — Blogs promote businesses, products, or services.
  6. Creative and professional development — Blogs enhance writing skills and foster growth.

Question 15

What is video conferencing ? Name some popular video conferencing software.

Answer

A two-way videophone conversation among multiple participants is called Video Conferencing.

Some popular video conferencing software include Skype, Zoom, Google Meet, ooVoo, etc.

Question 16

What is the utility of e-learning ?

Answer

The utilities of e-learning are as follows:

  1. Reduced Overall Cost — It's less expensive to produce. e-training is virtually free once the break-even point is reached.
  2. e-Learning is self-directed and self-paced — Learners control the amount of time they spend on any particular topic.
  3. e-Learning is interactive and hands-on — The use of a variety of multimedia in e-Learning increases student involvement and reinforces the learning experience.
  4. e-Learning is flexible — Learning can take place anytime and anywhere, as long as the necessary equipment is accessible.
  5. Consistent delivery — e-learning eliminates the problems associated with different instructors teaching slightly different material on the same subject.
  6. Easily Manageable — Today's e-learning software allow a group of people to keep track of the course offerings, schedule and track their progress and results.

Question 17

What is e-reservation ?

Answer

Making reservations of tickets or hotel rooms or tourist packages etc., through Internet is known as e-Reservation or online reservation.

Question 18

Name some protocols that are used for remote logging on a server.

Answer

Some protocols that are used for remote logging on a server are :

  1. Telnet
  2. SSH (Secure SHell) Protocol

Question 19

Name some file transfer protocols used over Internet.

Answer

Some file transfer protocols used over Internet are:

  1. FTP (File Transfer Protocol)
  2. SFTP (Secure FTP) Protocol
  3. SCP (Secure CoPy) Protocol

Question 20

What is the significance of SSH protocol ?

Answer

The traditional Internet protocols like Telnet, FTP, even email, share data/information in unencrypted form over Internet, which can easily be eavesdropped. Since the data is unencrypted, it is unsecure and hence any hacker can easily grab that data such as username and password, other data shared etc.
On the other hand, if we use SSH, it secures our data by creating a secure connection with encrypted data. This ensures that only the client and the server will have access to actual data.

Question 21

What are commonly used Mobile technologies?

Answer

Commonly used mobile technologies are :

  1. SMS (Short Message Service) — It is also commonly referred to as a "text message". With an SMS, one can send a message of up to 160 characters to another mobile device. Most cell phones support this type of text messaging.
  2. MMS (Multimedia Messaging Service) — It is a standard way to send messages that include multimedia content (such as pictures, video, or audio content) to and from mobile phones.
  3. 3G (Third Generation) — It enabled wireless devices to operate at speeds which made web browsing a more enjoyable experience on mobile devices.
  4. 4G (Fourth Generation) — 4G is the next generation of mobile technologies with enhanced download and upload speeds, and better connectivity. A 4G network offers peak data rates of at least 100 megabits per second for high mobility communication.
  5. 5G (Fifth Generation) — 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices.

Question 22

How is an MMS different from SMS ?

Answer

SMS (Short Message Service) lets us send only short text messages of up to 160 characters over mobile phones. SMS cannot include pictures, video or audio content.

MMS (Multimedia Messaging Service) is a standard way to send messages that include multimedia content to and from mobile phones. MMS can include various types of media in it, such as pictures, video, or audio content.

Question 23

Give one difference between 3G and 4G.

Answer

A 3G network can produce a download data rates of upto 384 kbps under normal conditions and up to 2 Mbps in some instances while a 4G network offers peak data rates of at least 100 megabits per second for high mobility communication (users in cars, trains, etc.) and at least 1 Gigabit per second for low mobility communication (pedestrians and stationary users).

Question 24

A mobile phone, though supports a 4G service, is receiving only 3G. What could be the reason ?

Answer

The reason could be the network coverage. The network in area might be 3G only and 4G coverage might not be available there. Hence, even though the mobile phone supports 4G service, it will only receive 3G.

Question 25

What is Telnet ? Why is it used ?

Answer

Telnet is an Internet utility that lets us log onto remote computer systems.

Uses of Telnet are :

  1. It is used to login onto remote systems and do work.
  2. It can also be used to connect to thousands of catalogs at libraries around the world and find out the availability of books.

Question 26

Why is SFTP called a secure protocol ?

Answer

SFTP (Secure File Transfer Protocol) is called a secure protocol for file transfer as it takes the following measures to ensure data safety :

  1. SFTP requires that the client user must be authenticated by the server and the data transfer must take place over a secure channel (SSH).
  2. All data is encrypted before being sent across the network.
  3. SFTP encrypts both commands and data providing effective protection against common network security risks.

Question 27

What is SSH ? How is it related to SFTP and SCP protocols ?

Answer

SSH (Secure SHell) is remote logging protocol that logs into remote machine via a shell where all data between the client and server is encrypted.

The SSH protocol ensures security shell using other protocols like SCP and SFTP. The SCP (Secure Copy) protocol allows transmission of files from one machine to another over Internet with the encryption benefits of SSH. Similarly, SFTP (Secure File Transfer Protocol) is a secure protocol for file transfer and it ensures security of data based on the SSH protocol.

Application Oriented Questions

Question 1

When an e-mail is received it can be sent on to other e-mail addresses. This is :

  1. forwarding
  2. replying
  3. mailing
  4. attaching

Answer

forwarding

Reason — A received message can be sent on to other e-mail addresses by using the 'Forward' option.

Question 2

PJM Bank has a Head Office based in Bangalore and a large number of branches nationwide. The Head Office uses video conferencing to communicate with the branch managers.

(a) Identify the requirements to be fulfilled by each branch for video conferencing.

(b) Describe three benefits to the bank of using video conferencing.

(c) Describe three problems that may occur when using video conferencing.

Answer

(a) For video conferencing, each branch should fulfill the following requirements :

  1. Multimedia PCs
  2. Video Cameras
  3. Microphones
  4. Internet connection
  5. Video conferencing software

(b) Three benefits to the bank of using video conferencing are:

  1. Cost and time savings — It reduces travel expenses for the bank and saves valuable time for the branch managers by reducing the need to travel to the head office for meetings.
  2. Enhanced communication and collaboration — It improves communication and collaboration resulting in faster decision-making.
  3. Increased efficiency and productivity — It enables sharing documents and presentations during meetings making it easier to provide updates, have real-time discussions and conduct training sessions for branch managers and staff.

(c) Three problems that may occur when using video conferencing are:

  1. Technical difficulties — Video conferencing relies heavily on technology, and technical issues like poor internet connection, poor quality video camera or microphone, etc. can disrupt or degrade the quality of meetings.
  2. Distractions and multitasking — Participants in video conferences may face distractions from their immediate environment, such as noise, interruptions, or personal devices.
  3. Lack of non-verbal cues — The video camera might not be able to see all parts of the room at the same time leading to potential misunderstandings or misinterpretations during discussions.

Question 3

(a) Give two ways, other than video conferencing, in which branches are able to communicate. Give one advantage for each.

(b) There has been a large increase in the number of customers who use the Internet banking facilities offered by PJM Bank. Give, two reasons why customers choose to use Internet banking.

Answer

(a) Two ways, other than video conferencing, in which branches can communicate are:

S.
No.
MethodAdvantage
1.E-mailEmails can be sent and read at different times, allowing flexibility for recipients to respond when convenient.
2.Instant MessagingInstant Messaging allows for instant exchanges, facilitating quick decision-making and problem-solving.

(b) Two reasons that customers choose to use Internet banking are:

  1. Customers don't need to visit the branch. It saves their time and travel cost.
  2. Customers can do their banking transaction at anytime as per their convenience without being restricted by the business hours of the bank.

Question 4

(a) Juhi uses a computer to send e-mails to her sister in America.

  1. Juhi has a photograph stored on her computer that she wants to send to her sister. Describe the process of sending an e-mail with a photograph.
  2. Explain what all types of files can she send with e-mail ?

(b) Juhi is researching Indian freedom struggle history on the Internet. She uses a search engine to help her.

  1. The computer sometimes takes a long time to respond when Juhi enters a question into the search engine. Give two reasons why this might happen.
  2. The search engine returned a large number of links when she entered 'Gandhi'. Give two things Juhi can do to reduce the number of links.

Answer

(a) Juhi uses a computer to send e-mails to her sister in America :

  1. To send mail to her sister, Juhi needs to first log in to her e-mail account and then follow these steps :
    Step 1 — Click on Compose button to compose a new mail message.
    Step 2 — In the Compose Message window, type the e-mail address of her sister in the To field.
    Step 3 — Fill in the subject of the message in the Subject field.
    Step 4 — Click on the Attach a file link below Subject box. Browse through the computer and select the photograph to be sent. Then click on Open.
    Step 5 — Write the message in the box designated for it.
    Step 6 — Click on Send button.

  2. Juhi can send the following types of files through e-mail:

    1. Documents — This includes files in formats such as DOCX (Microsoft Word), PDF (Portable Document Format), XLSX (Microsoft Excel), PPTX (Microsoft PowerPoint), and TXT (plain text files).
    2. Images — Popular image formats like JPEG, PNG, GIF, and BMP can be attached to emails. These files can include digital photos, illustrations, or graphics.
    3. Audio files — Formats like MP3, WAV, and AAC can be sent as email attachments. These files can include music, sound effects, or voice recordings.
    4. Video files — Common video file formats such as MP4, AVI, MOV, and WMV can be attached to emails. These files can include recorded videos or video clips.
    5. Compressed files — Archives or compressed files, like ZIP or RAR, can be sent as email attachments. These files are used to combine multiple files into a single compressed file for easier sharing.
    6. Presentations — Presentation files, such as PPTX (PowerPoint) or Keynote files, can be sent via email.
    7. Spreadsheets — Spreadsheet files, like XLSX (Excel) or CSV (Comma-Separated Values), can be attached to emails.

(b) Juhi is using a search engine to research Indian freedom struggle history :

  1. Two reasons why computer is taking longer to respond are :

    1. Slow internet connection — If Juhi has a slow internet connection, it can significantly affect the response time of the search engine.
    2. High server load — The search engine's servers may be experiencing a high volume of requests, leading to slower response times.
  2. Two things Juhi can do to reduce the number of links are:

    1. Use specific keywords — Instead of using a broad term like 'Gandhi', Juhi can refine her search by including more specific keywords related to her research topic. For example, she can search for 'Mahatma Gandhi Indian freedom struggle' or 'Gandhi's role in Indian independence movement'. Adding relevant keywords will help narrow down the search results to more specific and relevant information.
    2. Utilize advanced search operators — Juhi can use operators like quotation marks (" ") to search for exact phrases or hyphen (-) to exclude specific words or terms. For example, she can search for "Mahatma Gandhi" -movie to exclude links related to movies about Gandhi.

Question 5

Swirlpool is a company that sells washing machines from its website. Sophie buys a washing machine from the Swirlpool website.

(a) What is this way of shopping called ?

(b) Describe one advantage to the customers of e-sales.

(c) Swirlpool encourages its employees to study online and enhance their skills. What is the term that describes this form of learning ?

Answer

(a) This way of shopping is called e-shopping.

(b) e-shopping is very convenient for the customers. They don't have to visit the shops. They can shop from anywhere which saves their time and travel cost.

(c) Studying online is called e-learning.

PrevNext