knowt logo

Networking,Internet and Email basic

hodhana jibriel

NETWORK

Collection of interconnected computers and computing devices that share resources and communicate with each other.

Networking

  • Networking refers to the process of connecting multiple devices together to share resources and communicate with each other.

  • purpose: It allows devices in the network to exchange data, share files, and access the internet.

  • Networks can be classified into two types: Local Area Network (LAN) and Wide Area Network (WAN).

  • LANs are used to connect devices within a limited geographical area, such as a home or office.

  • WANs, on the other hand, connect devices over a larger area, often spanning multiple cities or countries.

  • Medium Used to Connect Computers in the Network

    • Ethernet Cable: Most commonly used medium for connecting computers in a network. It uses twisted pair cables to transmit data signals. Ethernet cables come in different categories, such as Cat5, Cat6, and Cat7, offering varying speeds and bandwidth.

    • Wireless: Wireless networks use radio waves to transmit data between devices. Wi-Fi is the most popular wireless technology, allowing devices to connect to a network without the need for physical cables. It provides flexibility and mobility but can be affected by interference and distance limitations.

    • Fiber Optic Cable: Utilizes thin strands of glass or plastic to transmit data as pulses of light. Fiber optic cables offer high-speed data transmission over long distances and are immune to electromagnetic interference. They are commonly used in high-bandwidth applications like internet backbones and long-distance connections.

    • Coaxial Cable: Consists of a central conductor surrounded by insulation, a metallic shield, and an outer protective layer. Coaxial cables are used for cable television (CATV) and broadband internet connections. They provide good signal quality and can transmit data over longer distances.

    • Powerline: Powerline networking uses existing electrical wiring in a building to transmit data signals. It allows devices to connect to the network through power outlets, eliminating the need for additional cables. Powerline networking can be convenient but may suffer from interference and reduced speeds.

    • Satellite: Satellite networks use communication satellites to transmit data signals between devices. They are commonly used in remote areas where traditional wired connections are not feasible. Satellite networks provide wide coverage but can have higher latency and limited bandwidth.

    • Bluetooth: Bluetooth is a short-range wireless technology used for connecting devices within a small area. It is commonly used for connecting peripherals like keyboards, mice, and headphones to computers. Bluetooth offers low power consumption and ease of use but has limited range and bandwidth.

    • Infrared: Infrared (IR) technology uses infrared light to transmit data signals between devices. It is commonly used for short-range communication, such as remote controls and infrared data transfer between devices. Infrared requires a direct line of sight between devices and has limited bandwidth.

    • NFC: Near Field Communication (NFC) is a short-range wireless technology used for contactless communication between devices. It is commonly used for mobile payments, access control, and data transfer between smartphones and other NFC-enabled devices. NFC has a very short range and low data transfer

    • Medium Used to Transmit Signal in the Network

      • In computer networks, the medium refers to the physical path through which signals are transmitted from one device to another.

      • Different types of mediums are used in network communication, depending on the network architecture and requirements.

      • The choice of medium affects the speed, distance, and reliability of data transmission.

      Wired Mediums

      1. Twisted Pair Cable (TP): copper

        • Consists of pairs of copper wires twisted together to reduce interference.

        • Commonly used in Ethernet networks for short to medium distances.

        • Two types: Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP).

      2. Coaxial Cable:

        • Consists of a central conductor surrounded by insulation, a metallic shield, and an outer protective layer.

        • Used in cable television (CATV) networks and broadband internet connections.

        • Provides higher bandwidth and longer distances compared to twisted pair cables.

      3. Fiber Optic Cable:

        • Utilizes thin strands of glass or plastic to transmit data as pulses of light.

        • Offers high bandwidth, low attenuation, and immunity to electromagnetic interference.

        • Widely used in long-distance communication and high-speed networks.

      Wireless Mediums

      1. Radio Waves:

        • Wireless communication technology that uses radio frequency signals.

        • Commonly used in Wi-Fi networks, Bluetooth devices, and cellular networks.

        • Provides flexibility and mobility but may be susceptible to interference.

      2. Microwaves:

        • Utilizes high-frequency electromagnetic waves for communication.

        • Used in point-to-point communication over long distances, such as satellite links.

        • Requires clear line-of-sight between transmitting and receiving antennas.

      3. Infrared waves πŸ˜†

        • Uses infrared light waves for short-range communication.

        • Commonly found in remote controls, wireless keyboards, and proximity sensors.

        • Limited range and requires a direct line-of-sight between devices.

      4. SatelliteπŸ˜„

        • Communication via satellites orbiting the Earth.

        • Enables long-distance communication in remote areas or for global coverage.

        • Involves transmission to and from satellites, which introduces latency.

      Conclusion

      • The choice of medium in a network depends on factors such as distance, bandwidth requirements, interference, and cost.

      • Wired mediums like twisted pair, coaxial, and fiber optic cables offer reliable and high-speed

    • Protocol

      • A protocol refers to a set of rules used by set of devices in the network to control their communication.

      • rules and guidelines that govern the communication and interaction between different entities or systems.

      • Protocols are essential for ensuring smooth and efficient communication, as they define the format, sequence, and behavior of messages exchanged between entities.

      • Protocols can be found in various domains, including computer networks, telecommunications, and the internet.

      • In computer networks, protocols define how data is transmitted, received, and processed between devices. Examples of network protocols include TCP/IP, HTTP, and FTP.

      • Telecommunication protocols, such as GSM and CDMA, are used for transmitting voice and data over mobile networks.

      • Internet protocols, like IPv4 and IPv6, are responsible for addressing and routing data packets across the internet.

      • Protocols can be classified into different layers, such as the physical layer, data link layer, network layer, transport layer, and application layer, based on their functionalities and responsibilities.

      • Each layer of a protocol stack performs specific tasks and relies on the layers below it to provide services.

      • Protocols often follow a client-server model, where one entity initiates a request (client) and another entity responds to it (server).

      • The development and standardization of protocols are crucial for ensuring interoperability and compatibility between different systems and devices.

      • Protocols are typically documented in technical specifications, which outline the rules, message formats, and procedures to be followed.

      • As technology evolves, new protocols are developed to address emerging needs and challenges, while existing protocols may be updated or replaced to improve performance and security.

Digital and Analog Communication

  • Digital communication involves transmitting and receiving data in the form of discrete signals or binary code (0s and 1s).

  • It is more reliable and less prone to errors compared to analog communication.

  • Examples of digital communication include email, text messaging, and internet browsing.

  • Analog communication, on the other hand, uses continuous signals to transmit information.

  • It is commonly used in traditional telephony, radio broadcasting, and television transmission.

  • Analog signals are susceptible to noise and distortion, which can affect the quality of the communication.

Networking Devices

Networking devices are hardware components that enable communication and data transfer between different devices within a network. They play a crucial role in establishing and maintaining network connections. Here are some commonly used networking devices:

  1. Routers: Routers are essential devices that connect multiple networks together, such as a home network to the internet. They analyze data packets and determine the best path for them to reach their destination. Routers also provide network address translation (NAT) and firewall functionalities.

2 Switches:

  • Switches are used to connect multiple devices/ clients to a network

  • can connect more than two local area network (LAN).

  • They receive data packets and forward them to the appropriate destination based on the device's MAC address.

  • Switches improve network performance by reducing network congestion and enabling simultaneous communication between devices.

  1. Repeater: Device that amplify a signal because an electrical signal can get weaker as it travel over a long distance/attenuation.

  2. Hubs: Hubs are the simplest networking devices that connect multiple devices in a LAN. However, they lack the intelligence of switches and routers. When a hub receives data, it broadcasts it to all connected devices, resulting in network congestion and reduced performance. Hubs are rarely used in modern networks.

    Broadcasting:when a device sends a signal all the other devices connected to the hub receives the signal

  1. Modems: Modems are used to connect a network to the internet by converting digital signals from a computer into analog signals that can be transmitted over telephone lines or cable lines. They also perform the reverse process, converting analog signals from the internet into digital signals for the computer.

  2. Wireless Access Points (WAPs): WAPs enable wireless connectivity by providing a wireless signal for devices to connect to a network. They are commonly used in Wi-Fi networks to extend the range and coverage area. WAPs often include built-in routers and switches.

    /

  3. bridge:a device that is responsible for dividing single network to various networks segments

    This device sits between network segments and conditionally forwards a packet from one network segment to the other

Understanding the functions and capabilities of these networking devices is essential for designing, implementing, and maintaining efficient and secure networks. Each device serves a specific purpose in facilitating communication and data transfer within a network.

Internet and Web Server

Internet

  • The internet is a global network of interconnected computers and devices that communicate with each other using a standardized set of protocols.

  • It allows users to access and share information, communicate, and perform various online activities.

  • The internet is decentralized, meaning it has no central authority controlling it. Instead, it relies on a distributed network of servers and routers to transmit data.

Web Server

  • A web server is a software or hardware system that hosts websites and delivers web content to users over the internet.

  • website: collection of files

  • Https:refers to the protocol that is used to send a file

  • hyperlinks-connections used by files linked together in the website to refer to each other

  • It responds to requests from web browsers by sending the requested files, such as HTML, CSS, images, and videos, to the user's device.

  • Web servers use the Hypertext Transfer Protocol (HTTP) to communicate with web browsers and transfer data.

  • Common web server software includes Apache, Nginx, and Microsoft IIS.

  • Web servers store website files and data, and they can handle multiple requests simultaneously, making websites accessible to many users at once.

  • They also provide security features like authentication, encryption, and access control to protect websites and user data.

  • Web servers can run on various operating systems, such as Linux, Windows, and macOS.

  • URL(UNIFORM RESOURCE LOCATOR): location of a website in the internet

How Web Servers Work

  1. A user enters a website's URL in a web browser.

  2. The browser sends a request to the web server hosting that website.

  3. The web server receives the request and processes it.

  4. The server retrieves the requested files from its storage or generates dynamic content by running scripts.

  5. The server sends the requested files back to the user's browser using HTTP.

  6. The browser receives the files and renders them, displaying the website to the user.

Conclusion

The internet is a global network that connects computers and devices worldwide. Web servers play a crucial role in hosting websites and delivering web content to users. They handle requests from web browsers, retrieve files, and send them back to the users. Understanding the internet and web servers is essential for comprehending how information is accessed and shared online.

Email

  • Email stands for electronic mail, which is a method of exchanging digital messages between individuals or groups using electronic devices connected to a network.

  • It was first introduced in the 1960s and has since become one of the most widely used forms of communication.

  • Email allows users to send and receive messages, documents, images, and other files instantly, regardless of the recipient's location.

  • To send an email, one needs an email address, which consists of a username followed by the domain name of the email service provider (e.g., bintfarah22@gmail.com).

  • Email messages are composed using an email client, such as Microsoft Outlook or Gmail, which provides a user-friendly interface for writing, organizing, and managing emails.

  • The email client connects to an email server, which handles the transmission and delivery of messages.

  • Email servers use various protocols, such as SMTP (Simple Mail Transfer Protocol) for sending emails and POP3 (Post Office Protocol) or IMAP (Internet Message Access Protocol) for receiving emails.

  • Email messages are typically organized into folders, such as the inbox, sent items, and trash, to help users manage their correspondence.

  • Email offers several advantages, including speed, convenience, and cost-effectiveness compared to traditional mail.

  • However, email also poses security risks, such as phishing attacks and spam, which require users to be cautious and employ security measures like strong passwords and spam filters.

QUESTIONS

https://testbook.com/objective-questions/mcq-on-email--5fb69e3c1b5c16e438f9793d

https://www.linkedin.com/pulse/top-50-basic-networking-interview-questions-answers-2023-crawsec

https://testbook.com/objective-questions/mcq-on-email--5fb69e3c1b5c16e438f9793d

List of Internet and Email MCQs

1. What is the internet?

  1. Programming language

  2. Network connecting computers all over the world

  3. Computer program to transfer data

  4. All of these

Answer: B) Network connecting computers all over the world

Explanation:

The Internet is a network connecting computers all over the world.


2. What is e-mail?

  1. Method of exchanging messages via electronic devices

  2. Speed message transfer to location

  3. Musical messaging service

  4. None of these

Answer: A) Method of exchanging messages via electronic devices

Explanation:

E-mail stands for electronic mail which is a method of exchanging messages via electronic devices.


3. E-mail stands for?

  1. Electrical mail

  2. Electronic messaging service

  3. Electronic mail

  4. All of these

Answer: C) Electronic mail

Explanation:

E-mail stands for electronic mail. It is a method of exchanging messages via electronic devices.


4. What does WWW stand for?

  1. Working window web

  2. Web window word

  3. World Wide Web

  4. None of these

Answer: C) World Wide Web

Explanation:

WWW stands for World Wide Web.


5. What is the URL of a website?

  1. It is the location of website on internet

  2. It is used to create internet

  3. It is location of peripheral on internet

  4. None of these

Answer: A) It is the location of website on internet

Explanation:

URL stands for Unified resource locator. It is used to locate a website on the internet.


6. A web page on a website is created using HTML. True or False?

  1. True

  2. False

Answer: A) True

Explanation:

HTML is used to create a web page of a website.


7. Putting files to the server from the computer is?

  1. Downloading

  2. Uploading

  3. Trashing

  4. Transferring

Answer: B) Uploading


8. What does FTP stand for?

  1. Folder Text Protocol

  2. File Transfer Push

  3. Fixed Terminology Placement

  4. File Transfer Protocol

Answer: D) File Transfer Protocol

Explanation:

FTP stands for File Transfer Protocol.


9. The address of a website is also known as?

  1. Location

  2. Mail id

  3. URL

  4. None of these

Answer: C) URL

Explanation:

URL is the address of a website.


10. Which of these is a non-profit domain?

  1. .com

  2. .in

  3. .org

  4. All of these

Answer: C) .org

Explanation:

The ".org" is the domain name used for non-profit organizations.


11. The World Wide Web (WWW) was invented by ___.

  1. Steve Jobs

  2. Tim Berners Lee

  3. Ray Tomliners

  4. All of these

Answer: B) Tim Berners Lee

Explanation:

WWW stands for world wide web which was invented by Tim Berners Lee.


12. Where are Emails received or sent to users?

  1. Physical Address

  2. E-mail Address

  3. Website Location

  4. None of these

Answer: B) E-mail Address

Explanation:

The email address of a user is used to send and receive emails.


13. Which of these is correct email address?

  1. userName@website@com

  2. userName.website.com

  3. userName.website@com

  4. userName@website.com

Answer: D) userName@website.com

Explanation:

The correct email address format is userName@website.com. Example : shivang@includehelp.com


14. Which of these is an e-mail provider?

  1. G-mail

  2. Hotmail

  3. Yahoo

  4. All of these

Answer: A) G-mail

Explanation:

An e-mail provider provides e-mail service to users. Some email providers are g-mail, hotmail and yahoo.


15. In which year email was created?

  1. 1980

  2. 1990

  3. 1971

  4. 1975

Answer: C) 1971

Explanation:

E-mail was invented by Ray Tomlinson in 1971.


16. Who invented email?

  1. Larry Page

  2. Tim Barners

  3. Ray Tomlinson

  4. All of these

Answer: C) Ray Tomlinson

Explanation:

E-mail was invented by Ray Tomlinson in 1971.


17. The "S" in HTTPS stands for?

  1. Selected

  2. Secure

  3. Software

  4. System

Answer: B) Secure

Explanation:

HTTPS stands for HyperText Transfer Protocol Secure.


18. "@" in an email address is used to ___.

  1. Separate username from ISP

  2. Create password for email

  3. Add strength to email

  4. None of these

Answer: A) Separate username from ISP

Explanation:

@ in email is used to separate the username from ISP. example : shivang@includehelp.com


19. ISP stands for?

  1. Internet Security Platform

  2. Internet service Provider

  3. Instant service processor

  4. None of these

Answer: B) Internet service Provider

Explanation:

ISP stands for Internet Services Provider.


20. Which of these can be done using an email?

  1. Share data

  2. Validate accounts

  3. Send or receive email

  4. All of these

Answer: D) All of these

Explanation:

Email is like a digital address which can be used to perform many tasks. Like share data on drives, validate accounts, send or receive emails, etc.


21. Which of these services is owned by Google?

  1. Yahoo mail

  2. G-mail

  3. Facebook

  4. All of these

Answer: B) G-mail

Explanation:

The G-mail platform is owned by Google.


22. Is it possible to send images via email?

  1. Yes

  2. No

Answer: A) Yes

Explanation:

Email can be used to transfer text, image, videos, etc.


23. Which folder contains Junk emails?

  1. Inbox

  2. Unwanted

  3. Spam

  4. None of these

Answer: C) Spam

Explanation:

Spam folder of the ISP is used to store junk emails.


24. Which of these email service providers is free?

  1. Tutanota

  2. Gmail

  3. Mailchimp

  4. All of these

Answer: B) Gmail

Explanation:

G-mail is a free email service provided by Google.


25. SMTP stands for?

  1. Simple Mail Text Processing

  2. Secure Mail Transfer Protocol

  3. Simple Mail Transfer Protocol

  4. Secure Message Transfer Process

Answer: C) Simple Mail Transfer Protocol

Explanation:

SMTP stands for Simple Mail Transfer Protocol.


26. OTP stands for?

  1. One Time Password

  2. Over Time Process

  3. One Time Process

  4. All of these

Answer: A) One Time Password

Explanation:

OTP stands for One Time Password is used to verify emails.


27. Which of these is not required to login to an email?

  1. Email

  2. Physical address

  3. Password

  4. None of these

Answer: B) Physical address

Explanation:

Physical Address is not required to login into an email account.


28. Which of these is required while signing up to an email?

  1. Phone Number

  2. Name

  3. Password

  4. All of these

Answer: D) All of these

Explanation:

While signing up to an email account multiple things are needed to be filled up. These are required by the email service provider to check for authentic users.


29. Is it possible to login to an email without completing verification?

  1. Yes

  2. no

Answer: A) Yes

Explanation:

Practically Yes, a login after sign up is possible but an unverified user will not be able to access some features.


30. A good password must contain?

  1. Capital and small case alphabets

  2. Atleast one number

  3. Atleast one alphanumeric character

  4. All of these

Answer: D) All of these

Explanation:

A strong password must contain:

  • Capital and small case alphabets

  • Atleast one number

  • Atleast one alphanumeric character

It is required in order to enhance the security of the account.


31. What is the initial network communication called?

  1. Micronet

  2. ARPANET

  3. Network

  4. APRENET

Answer: B) ARPANET

Explanation:

The Advanced Research Projects Agency Network (ARPANET) was the first wide-area packet-switched network with distributed control and one of the first networks to implement the TCP/IP protocol suite.


32. Why is the IP address of a computer required?

  1. Identify it on internet

  2. Play music

  3. Access e-mail account

  4. None of these

Answer: A) Identify it on internet

Explanation:

IP address stands for Internet Protocol is required to identify the computer on the internet.


33. What does IP stand for?

  1. Internet Process

  2. Instant processing

  3. Internet Protocol

  4. Information Program

Answer: C) Internet Protocol

Explanation:

IP address stands for Internet Protocol is required to identify the computer on the internet.


34. Internet can be accessed using which of these software's?

  1. Gaming Program

  2. Music Player

  3. Web Browser

  4. All of these

Answer: C) Web Browser

Explanation:

A web browsing software is a program which is used to access the internet.


35. Which of these are web browsers?

  1. Google Chrome

  2. Internet Explorer

  3. Brave

  4. All of these

Answer: D) All of these

Explanation:

A web browser is a software which is used to access the internet. Some web browsing software's are Google Chrome, Mozilla Firefox, Safari, Internet Explorer, Brave, etc.


36. What does XML stand for?

  1. Extra Multiplicative logic

  2. Extensible markup language

  3. Export markup language

  4. None of these

Answer: B) Extensible markup language

Explanation:

XML stands for Extensible Markup Language.


37. What will happen if the email does not contain the subject while sending?

  1. Mail will not be sent

  2. Mail will be sent normally

  3. Prompt asking to send mail without subject

  4. None of these

Answer: C) Prompt asking to send mail without subject

Explanation:

An email can be sent to the receiver without any subject. But before sending there is a prompt asking the user to send mail without subject.


38. Which of these is required to send mail?

  1. Email id

  2. Image

  3. Link

  4. All of these

Answer: A) Email id

Explanation:

Email id of the receiver is required before sending the mail.


39. What is BCC in email?

  1. Block content creation

  2. Behind Content Copy

  3. Blind Carbon Copy

  4. None of these

Answer: C) Blind Carbon Copy

Explanation:

BCC stands for Blind Carbon Copy is used to send mail copy to recipients without showing this information to other recipients.


40. Is there an option to restrict the user to forward the email in Gmail?

  1. Yes

  2. No

Answer: A) Yes

Explanation:

Gmail provides an option to Toggle O confidential mode which restricts the user to forward email.


41. Which of these are jargons in email?

  1. BTW

  2. RSN

  3. TIA

  4. All of these

Answer: D) All of these

Explanation:

Some email jargons are BTW, FYI, PTFM, RSN, TTFN, TIA, etc.


42. What is an email sent to multiple recipients at once called?

  1. Creator email

  2. Bulk email

  3. Digital marketing

  4. None of these

Answer: B) Bulk email

Explanation:

Bulk email is an email which is sent by a brand to multiple recipients at once.


43. TCP stands for?

  1. Total communication Platform

  2. Transmission control protocol

  3. Technical communication platform

  4. All of these

Answer: B) Transmission control protocol

Explanation:

TCP stands for Transmission Control Protocol.


44. Which of these are layer of TCP/IP protocol?

  1. Data link layer

  2. Transport layer

  3. Physical layer

  4. All of these

Answer: D) All of these

Explanation:

All the layers of TCP/IP protocol:

  • Application layer

  • Transport layer

  • Network layer

  • Data link layer

  • Physical layer


45. What does ARP stand for?

  1. Application resolution protocol

  2. Actual resolution project

  3. Address resolution protocol

  4. None of these

Answer: C) Address resolution protocol

Explanation:

ARP stands for Address Resolution Protocol.


46. How many layers does the OSI model have?

  1. 5

  2. 6

  3. 7

  4. 10

Answer: C) 7

Explanation:

OSI model has 7 layers:

  • Physical Layer

  • Data Link Layer

  • Network Layer

  • Transport Layer

  • Session Layer

  • Presentation Layer

  • Application Layer


47. In which year is the OSI model introduced?

  1. 1995

  2. 1972

  3. 1983

  4. 1999

Answer: C) 1983

Explanation:

The OSI model was introduced in 1983.


48. What does OSI stand for?

  1. One Standard Interconnection

  2. Open Source Interconnection

  3. One Source Internet

  4. None of these

Answer: B) Open Source Interconnection

Explanation:

OSI stands for Open-Source Interconnection is a model used to communicate over a network.


49. Which of these is not a layer of the OSI model?

  1. Connection layer

  2. Data link layer

  3. Session layer

  4. Network layer

Answer: A) Connection layer

Explanation:

OSI model has 7 layers:

  • Physical Layer

  • Data Link Layer

  • Network Layer

  • Transport Layer

  • Session Layer

  • Presentation Layer

  • Application Layer


50. Which layer is responsible for encryption of data?

  1. Session layer

  2. Network layer

  3. Data link layer

  4. Presentation layer

Answer: D) Presentation layer

Explanation:

The presentation layer is responsible for encryption of data

HF

Networking,Internet and Email basic

hodhana jibriel

NETWORK

Collection of interconnected computers and computing devices that share resources and communicate with each other.

Networking

  • Networking refers to the process of connecting multiple devices together to share resources and communicate with each other.

  • purpose: It allows devices in the network to exchange data, share files, and access the internet.

  • Networks can be classified into two types: Local Area Network (LAN) and Wide Area Network (WAN).

  • LANs are used to connect devices within a limited geographical area, such as a home or office.

  • WANs, on the other hand, connect devices over a larger area, often spanning multiple cities or countries.

  • Medium Used to Connect Computers in the Network

    • Ethernet Cable: Most commonly used medium for connecting computers in a network. It uses twisted pair cables to transmit data signals. Ethernet cables come in different categories, such as Cat5, Cat6, and Cat7, offering varying speeds and bandwidth.

    • Wireless: Wireless networks use radio waves to transmit data between devices. Wi-Fi is the most popular wireless technology, allowing devices to connect to a network without the need for physical cables. It provides flexibility and mobility but can be affected by interference and distance limitations.

    • Fiber Optic Cable: Utilizes thin strands of glass or plastic to transmit data as pulses of light. Fiber optic cables offer high-speed data transmission over long distances and are immune to electromagnetic interference. They are commonly used in high-bandwidth applications like internet backbones and long-distance connections.

    • Coaxial Cable: Consists of a central conductor surrounded by insulation, a metallic shield, and an outer protective layer. Coaxial cables are used for cable television (CATV) and broadband internet connections. They provide good signal quality and can transmit data over longer distances.

    • Powerline: Powerline networking uses existing electrical wiring in a building to transmit data signals. It allows devices to connect to the network through power outlets, eliminating the need for additional cables. Powerline networking can be convenient but may suffer from interference and reduced speeds.

    • Satellite: Satellite networks use communication satellites to transmit data signals between devices. They are commonly used in remote areas where traditional wired connections are not feasible. Satellite networks provide wide coverage but can have higher latency and limited bandwidth.

    • Bluetooth: Bluetooth is a short-range wireless technology used for connecting devices within a small area. It is commonly used for connecting peripherals like keyboards, mice, and headphones to computers. Bluetooth offers low power consumption and ease of use but has limited range and bandwidth.

    • Infrared: Infrared (IR) technology uses infrared light to transmit data signals between devices. It is commonly used for short-range communication, such as remote controls and infrared data transfer between devices. Infrared requires a direct line of sight between devices and has limited bandwidth.

    • NFC: Near Field Communication (NFC) is a short-range wireless technology used for contactless communication between devices. It is commonly used for mobile payments, access control, and data transfer between smartphones and other NFC-enabled devices. NFC has a very short range and low data transfer

    • Medium Used to Transmit Signal in the Network

      • In computer networks, the medium refers to the physical path through which signals are transmitted from one device to another.

      • Different types of mediums are used in network communication, depending on the network architecture and requirements.

      • The choice of medium affects the speed, distance, and reliability of data transmission.

      Wired Mediums

      1. Twisted Pair Cable (TP): copper

        • Consists of pairs of copper wires twisted together to reduce interference.

        • Commonly used in Ethernet networks for short to medium distances.

        • Two types: Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP).

      2. Coaxial Cable:

        • Consists of a central conductor surrounded by insulation, a metallic shield, and an outer protective layer.

        • Used in cable television (CATV) networks and broadband internet connections.

        • Provides higher bandwidth and longer distances compared to twisted pair cables.

      3. Fiber Optic Cable:

        • Utilizes thin strands of glass or plastic to transmit data as pulses of light.

        • Offers high bandwidth, low attenuation, and immunity to electromagnetic interference.

        • Widely used in long-distance communication and high-speed networks.

      Wireless Mediums

      1. Radio Waves:

        • Wireless communication technology that uses radio frequency signals.

        • Commonly used in Wi-Fi networks, Bluetooth devices, and cellular networks.

        • Provides flexibility and mobility but may be susceptible to interference.

      2. Microwaves:

        • Utilizes high-frequency electromagnetic waves for communication.

        • Used in point-to-point communication over long distances, such as satellite links.

        • Requires clear line-of-sight between transmitting and receiving antennas.

      3. Infrared waves πŸ˜†

        • Uses infrared light waves for short-range communication.

        • Commonly found in remote controls, wireless keyboards, and proximity sensors.

        • Limited range and requires a direct line-of-sight between devices.

      4. SatelliteπŸ˜„

        • Communication via satellites orbiting the Earth.

        • Enables long-distance communication in remote areas or for global coverage.

        • Involves transmission to and from satellites, which introduces latency.

      Conclusion

      • The choice of medium in a network depends on factors such as distance, bandwidth requirements, interference, and cost.

      • Wired mediums like twisted pair, coaxial, and fiber optic cables offer reliable and high-speed

    • Protocol

      • A protocol refers to a set of rules used by set of devices in the network to control their communication.

      • rules and guidelines that govern the communication and interaction between different entities or systems.

      • Protocols are essential for ensuring smooth and efficient communication, as they define the format, sequence, and behavior of messages exchanged between entities.

      • Protocols can be found in various domains, including computer networks, telecommunications, and the internet.

      • In computer networks, protocols define how data is transmitted, received, and processed between devices. Examples of network protocols include TCP/IP, HTTP, and FTP.

      • Telecommunication protocols, such as GSM and CDMA, are used for transmitting voice and data over mobile networks.

      • Internet protocols, like IPv4 and IPv6, are responsible for addressing and routing data packets across the internet.

      • Protocols can be classified into different layers, such as the physical layer, data link layer, network layer, transport layer, and application layer, based on their functionalities and responsibilities.

      • Each layer of a protocol stack performs specific tasks and relies on the layers below it to provide services.

      • Protocols often follow a client-server model, where one entity initiates a request (client) and another entity responds to it (server).

      • The development and standardization of protocols are crucial for ensuring interoperability and compatibility between different systems and devices.

      • Protocols are typically documented in technical specifications, which outline the rules, message formats, and procedures to be followed.

      • As technology evolves, new protocols are developed to address emerging needs and challenges, while existing protocols may be updated or replaced to improve performance and security.

Digital and Analog Communication

  • Digital communication involves transmitting and receiving data in the form of discrete signals or binary code (0s and 1s).

  • It is more reliable and less prone to errors compared to analog communication.

  • Examples of digital communication include email, text messaging, and internet browsing.

  • Analog communication, on the other hand, uses continuous signals to transmit information.

  • It is commonly used in traditional telephony, radio broadcasting, and television transmission.

  • Analog signals are susceptible to noise and distortion, which can affect the quality of the communication.

Networking Devices

Networking devices are hardware components that enable communication and data transfer between different devices within a network. They play a crucial role in establishing and maintaining network connections. Here are some commonly used networking devices:

  1. Routers: Routers are essential devices that connect multiple networks together, such as a home network to the internet. They analyze data packets and determine the best path for them to reach their destination. Routers also provide network address translation (NAT) and firewall functionalities.

2 Switches:

  • Switches are used to connect multiple devices/ clients to a network

  • can connect more than two local area network (LAN).

  • They receive data packets and forward them to the appropriate destination based on the device's MAC address.

  • Switches improve network performance by reducing network congestion and enabling simultaneous communication between devices.

  1. Repeater: Device that amplify a signal because an electrical signal can get weaker as it travel over a long distance/attenuation.

  2. Hubs: Hubs are the simplest networking devices that connect multiple devices in a LAN. However, they lack the intelligence of switches and routers. When a hub receives data, it broadcasts it to all connected devices, resulting in network congestion and reduced performance. Hubs are rarely used in modern networks.

    Broadcasting:when a device sends a signal all the other devices connected to the hub receives the signal

  1. Modems: Modems are used to connect a network to the internet by converting digital signals from a computer into analog signals that can be transmitted over telephone lines or cable lines. They also perform the reverse process, converting analog signals from the internet into digital signals for the computer.

  2. Wireless Access Points (WAPs): WAPs enable wireless connectivity by providing a wireless signal for devices to connect to a network. They are commonly used in Wi-Fi networks to extend the range and coverage area. WAPs often include built-in routers and switches.

    /

  3. bridge:a device that is responsible for dividing single network to various networks segments

    This device sits between network segments and conditionally forwards a packet from one network segment to the other

Understanding the functions and capabilities of these networking devices is essential for designing, implementing, and maintaining efficient and secure networks. Each device serves a specific purpose in facilitating communication and data transfer within a network.

Internet and Web Server

Internet

  • The internet is a global network of interconnected computers and devices that communicate with each other using a standardized set of protocols.

  • It allows users to access and share information, communicate, and perform various online activities.

  • The internet is decentralized, meaning it has no central authority controlling it. Instead, it relies on a distributed network of servers and routers to transmit data.

Web Server

  • A web server is a software or hardware system that hosts websites and delivers web content to users over the internet.

  • website: collection of files

  • Https:refers to the protocol that is used to send a file

  • hyperlinks-connections used by files linked together in the website to refer to each other

  • It responds to requests from web browsers by sending the requested files, such as HTML, CSS, images, and videos, to the user's device.

  • Web servers use the Hypertext Transfer Protocol (HTTP) to communicate with web browsers and transfer data.

  • Common web server software includes Apache, Nginx, and Microsoft IIS.

  • Web servers store website files and data, and they can handle multiple requests simultaneously, making websites accessible to many users at once.

  • They also provide security features like authentication, encryption, and access control to protect websites and user data.

  • Web servers can run on various operating systems, such as Linux, Windows, and macOS.

  • URL(UNIFORM RESOURCE LOCATOR): location of a website in the internet

How Web Servers Work

  1. A user enters a website's URL in a web browser.

  2. The browser sends a request to the web server hosting that website.

  3. The web server receives the request and processes it.

  4. The server retrieves the requested files from its storage or generates dynamic content by running scripts.

  5. The server sends the requested files back to the user's browser using HTTP.

  6. The browser receives the files and renders them, displaying the website to the user.

Conclusion

The internet is a global network that connects computers and devices worldwide. Web servers play a crucial role in hosting websites and delivering web content to users. They handle requests from web browsers, retrieve files, and send them back to the users. Understanding the internet and web servers is essential for comprehending how information is accessed and shared online.

Email

  • Email stands for electronic mail, which is a method of exchanging digital messages between individuals or groups using electronic devices connected to a network.

  • It was first introduced in the 1960s and has since become one of the most widely used forms of communication.

  • Email allows users to send and receive messages, documents, images, and other files instantly, regardless of the recipient's location.

  • To send an email, one needs an email address, which consists of a username followed by the domain name of the email service provider (e.g., bintfarah22@gmail.com).

  • Email messages are composed using an email client, such as Microsoft Outlook or Gmail, which provides a user-friendly interface for writing, organizing, and managing emails.

  • The email client connects to an email server, which handles the transmission and delivery of messages.

  • Email servers use various protocols, such as SMTP (Simple Mail Transfer Protocol) for sending emails and POP3 (Post Office Protocol) or IMAP (Internet Message Access Protocol) for receiving emails.

  • Email messages are typically organized into folders, such as the inbox, sent items, and trash, to help users manage their correspondence.

  • Email offers several advantages, including speed, convenience, and cost-effectiveness compared to traditional mail.

  • However, email also poses security risks, such as phishing attacks and spam, which require users to be cautious and employ security measures like strong passwords and spam filters.

QUESTIONS

https://testbook.com/objective-questions/mcq-on-email--5fb69e3c1b5c16e438f9793d

https://www.linkedin.com/pulse/top-50-basic-networking-interview-questions-answers-2023-crawsec

https://testbook.com/objective-questions/mcq-on-email--5fb69e3c1b5c16e438f9793d

List of Internet and Email MCQs

1. What is the internet?

  1. Programming language

  2. Network connecting computers all over the world

  3. Computer program to transfer data

  4. All of these

Answer: B) Network connecting computers all over the world

Explanation:

The Internet is a network connecting computers all over the world.


2. What is e-mail?

  1. Method of exchanging messages via electronic devices

  2. Speed message transfer to location

  3. Musical messaging service

  4. None of these

Answer: A) Method of exchanging messages via electronic devices

Explanation:

E-mail stands for electronic mail which is a method of exchanging messages via electronic devices.


3. E-mail stands for?

  1. Electrical mail

  2. Electronic messaging service

  3. Electronic mail

  4. All of these

Answer: C) Electronic mail

Explanation:

E-mail stands for electronic mail. It is a method of exchanging messages via electronic devices.


4. What does WWW stand for?

  1. Working window web

  2. Web window word

  3. World Wide Web

  4. None of these

Answer: C) World Wide Web

Explanation:

WWW stands for World Wide Web.


5. What is the URL of a website?

  1. It is the location of website on internet

  2. It is used to create internet

  3. It is location of peripheral on internet

  4. None of these

Answer: A) It is the location of website on internet

Explanation:

URL stands for Unified resource locator. It is used to locate a website on the internet.


6. A web page on a website is created using HTML. True or False?

  1. True

  2. False

Answer: A) True

Explanation:

HTML is used to create a web page of a website.


7. Putting files to the server from the computer is?

  1. Downloading

  2. Uploading

  3. Trashing

  4. Transferring

Answer: B) Uploading


8. What does FTP stand for?

  1. Folder Text Protocol

  2. File Transfer Push

  3. Fixed Terminology Placement

  4. File Transfer Protocol

Answer: D) File Transfer Protocol

Explanation:

FTP stands for File Transfer Protocol.


9. The address of a website is also known as?

  1. Location

  2. Mail id

  3. URL

  4. None of these

Answer: C) URL

Explanation:

URL is the address of a website.


10. Which of these is a non-profit domain?

  1. .com

  2. .in

  3. .org

  4. All of these

Answer: C) .org

Explanation:

The ".org" is the domain name used for non-profit organizations.


11. The World Wide Web (WWW) was invented by ___.

  1. Steve Jobs

  2. Tim Berners Lee

  3. Ray Tomliners

  4. All of these

Answer: B) Tim Berners Lee

Explanation:

WWW stands for world wide web which was invented by Tim Berners Lee.


12. Where are Emails received or sent to users?

  1. Physical Address

  2. E-mail Address

  3. Website Location

  4. None of these

Answer: B) E-mail Address

Explanation:

The email address of a user is used to send and receive emails.


13. Which of these is correct email address?

  1. userName@website@com

  2. userName.website.com

  3. userName.website@com

  4. userName@website.com

Answer: D) userName@website.com

Explanation:

The correct email address format is userName@website.com. Example : shivang@includehelp.com


14. Which of these is an e-mail provider?

  1. G-mail

  2. Hotmail

  3. Yahoo

  4. All of these

Answer: A) G-mail

Explanation:

An e-mail provider provides e-mail service to users. Some email providers are g-mail, hotmail and yahoo.


15. In which year email was created?

  1. 1980

  2. 1990

  3. 1971

  4. 1975

Answer: C) 1971

Explanation:

E-mail was invented by Ray Tomlinson in 1971.


16. Who invented email?

  1. Larry Page

  2. Tim Barners

  3. Ray Tomlinson

  4. All of these

Answer: C) Ray Tomlinson

Explanation:

E-mail was invented by Ray Tomlinson in 1971.


17. The "S" in HTTPS stands for?

  1. Selected

  2. Secure

  3. Software

  4. System

Answer: B) Secure

Explanation:

HTTPS stands for HyperText Transfer Protocol Secure.


18. "@" in an email address is used to ___.

  1. Separate username from ISP

  2. Create password for email

  3. Add strength to email

  4. None of these

Answer: A) Separate username from ISP

Explanation:

@ in email is used to separate the username from ISP. example : shivang@includehelp.com


19. ISP stands for?

  1. Internet Security Platform

  2. Internet service Provider

  3. Instant service processor

  4. None of these

Answer: B) Internet service Provider

Explanation:

ISP stands for Internet Services Provider.


20. Which of these can be done using an email?

  1. Share data

  2. Validate accounts

  3. Send or receive email

  4. All of these

Answer: D) All of these

Explanation:

Email is like a digital address which can be used to perform many tasks. Like share data on drives, validate accounts, send or receive emails, etc.


21. Which of these services is owned by Google?

  1. Yahoo mail

  2. G-mail

  3. Facebook

  4. All of these

Answer: B) G-mail

Explanation:

The G-mail platform is owned by Google.


22. Is it possible to send images via email?

  1. Yes

  2. No

Answer: A) Yes

Explanation:

Email can be used to transfer text, image, videos, etc.


23. Which folder contains Junk emails?

  1. Inbox

  2. Unwanted

  3. Spam

  4. None of these

Answer: C) Spam

Explanation:

Spam folder of the ISP is used to store junk emails.


24. Which of these email service providers is free?

  1. Tutanota

  2. Gmail

  3. Mailchimp

  4. All of these

Answer: B) Gmail

Explanation:

G-mail is a free email service provided by Google.


25. SMTP stands for?

  1. Simple Mail Text Processing

  2. Secure Mail Transfer Protocol

  3. Simple Mail Transfer Protocol

  4. Secure Message Transfer Process

Answer: C) Simple Mail Transfer Protocol

Explanation:

SMTP stands for Simple Mail Transfer Protocol.


26. OTP stands for?

  1. One Time Password

  2. Over Time Process

  3. One Time Process

  4. All of these

Answer: A) One Time Password

Explanation:

OTP stands for One Time Password is used to verify emails.


27. Which of these is not required to login to an email?

  1. Email

  2. Physical address

  3. Password

  4. None of these

Answer: B) Physical address

Explanation:

Physical Address is not required to login into an email account.


28. Which of these is required while signing up to an email?

  1. Phone Number

  2. Name

  3. Password

  4. All of these

Answer: D) All of these

Explanation:

While signing up to an email account multiple things are needed to be filled up. These are required by the email service provider to check for authentic users.


29. Is it possible to login to an email without completing verification?

  1. Yes

  2. no

Answer: A) Yes

Explanation:

Practically Yes, a login after sign up is possible but an unverified user will not be able to access some features.


30. A good password must contain?

  1. Capital and small case alphabets

  2. Atleast one number

  3. Atleast one alphanumeric character

  4. All of these

Answer: D) All of these

Explanation:

A strong password must contain:

  • Capital and small case alphabets

  • Atleast one number

  • Atleast one alphanumeric character

It is required in order to enhance the security of the account.


31. What is the initial network communication called?

  1. Micronet

  2. ARPANET

  3. Network

  4. APRENET

Answer: B) ARPANET

Explanation:

The Advanced Research Projects Agency Network (ARPANET) was the first wide-area packet-switched network with distributed control and one of the first networks to implement the TCP/IP protocol suite.


32. Why is the IP address of a computer required?

  1. Identify it on internet

  2. Play music

  3. Access e-mail account

  4. None of these

Answer: A) Identify it on internet

Explanation:

IP address stands for Internet Protocol is required to identify the computer on the internet.


33. What does IP stand for?

  1. Internet Process

  2. Instant processing

  3. Internet Protocol

  4. Information Program

Answer: C) Internet Protocol

Explanation:

IP address stands for Internet Protocol is required to identify the computer on the internet.


34. Internet can be accessed using which of these software's?

  1. Gaming Program

  2. Music Player

  3. Web Browser

  4. All of these

Answer: C) Web Browser

Explanation:

A web browsing software is a program which is used to access the internet.


35. Which of these are web browsers?

  1. Google Chrome

  2. Internet Explorer

  3. Brave

  4. All of these

Answer: D) All of these

Explanation:

A web browser is a software which is used to access the internet. Some web browsing software's are Google Chrome, Mozilla Firefox, Safari, Internet Explorer, Brave, etc.


36. What does XML stand for?

  1. Extra Multiplicative logic

  2. Extensible markup language

  3. Export markup language

  4. None of these

Answer: B) Extensible markup language

Explanation:

XML stands for Extensible Markup Language.


37. What will happen if the email does not contain the subject while sending?

  1. Mail will not be sent

  2. Mail will be sent normally

  3. Prompt asking to send mail without subject

  4. None of these

Answer: C) Prompt asking to send mail without subject

Explanation:

An email can be sent to the receiver without any subject. But before sending there is a prompt asking the user to send mail without subject.


38. Which of these is required to send mail?

  1. Email id

  2. Image

  3. Link

  4. All of these

Answer: A) Email id

Explanation:

Email id of the receiver is required before sending the mail.


39. What is BCC in email?

  1. Block content creation

  2. Behind Content Copy

  3. Blind Carbon Copy

  4. None of these

Answer: C) Blind Carbon Copy

Explanation:

BCC stands for Blind Carbon Copy is used to send mail copy to recipients without showing this information to other recipients.


40. Is there an option to restrict the user to forward the email in Gmail?

  1. Yes

  2. No

Answer: A) Yes

Explanation:

Gmail provides an option to Toggle O confidential mode which restricts the user to forward email.


41. Which of these are jargons in email?

  1. BTW

  2. RSN

  3. TIA

  4. All of these

Answer: D) All of these

Explanation:

Some email jargons are BTW, FYI, PTFM, RSN, TTFN, TIA, etc.


42. What is an email sent to multiple recipients at once called?

  1. Creator email

  2. Bulk email

  3. Digital marketing

  4. None of these

Answer: B) Bulk email

Explanation:

Bulk email is an email which is sent by a brand to multiple recipients at once.


43. TCP stands for?

  1. Total communication Platform

  2. Transmission control protocol

  3. Technical communication platform

  4. All of these

Answer: B) Transmission control protocol

Explanation:

TCP stands for Transmission Control Protocol.


44. Which of these are layer of TCP/IP protocol?

  1. Data link layer

  2. Transport layer

  3. Physical layer

  4. All of these

Answer: D) All of these

Explanation:

All the layers of TCP/IP protocol:

  • Application layer

  • Transport layer

  • Network layer

  • Data link layer

  • Physical layer


45. What does ARP stand for?

  1. Application resolution protocol

  2. Actual resolution project

  3. Address resolution protocol

  4. None of these

Answer: C) Address resolution protocol

Explanation:

ARP stands for Address Resolution Protocol.


46. How many layers does the OSI model have?

  1. 5

  2. 6

  3. 7

  4. 10

Answer: C) 7

Explanation:

OSI model has 7 layers:

  • Physical Layer

  • Data Link Layer

  • Network Layer

  • Transport Layer

  • Session Layer

  • Presentation Layer

  • Application Layer


47. In which year is the OSI model introduced?

  1. 1995

  2. 1972

  3. 1983

  4. 1999

Answer: C) 1983

Explanation:

The OSI model was introduced in 1983.


48. What does OSI stand for?

  1. One Standard Interconnection

  2. Open Source Interconnection

  3. One Source Internet

  4. None of these

Answer: B) Open Source Interconnection

Explanation:

OSI stands for Open-Source Interconnection is a model used to communicate over a network.


49. Which of these is not a layer of the OSI model?

  1. Connection layer

  2. Data link layer

  3. Session layer

  4. Network layer

Answer: A) Connection layer

Explanation:

OSI model has 7 layers:

  • Physical Layer

  • Data Link Layer

  • Network Layer

  • Transport Layer

  • Session Layer

  • Presentation Layer

  • Application Layer


50. Which layer is responsible for encryption of data?

  1. Session layer

  2. Network layer

  3. Data link layer

  4. Presentation layer

Answer: D) Presentation layer

Explanation:

The presentation layer is responsible for encryption of data