5. Internet and Social Media
5.2 Concept of remote login (such as Any Desk, team viewer),
5.3 Concept of protocols (HTTP, HTTPS),
5.4 Email and its uses
5.5 Appropriate usage of social media and safely accessing web sites
5.6 Introduction to Video conference tools (Zoom, Google Meet, MS Teams) and
5.7 Concept of blogs and its features "
Total 5 Marks
1 MCQ - Knowledge Level [1 Mark]
2 Short Questions - 1 Understanding and 1 Higher Ability Level
[2+2 =4 Marks]
Internet
The Internet is a
global system of interconnected computer networks that uses standard
communication protocols (TCP/IP) to enable worldwide communication, information
sharing, and access to online services.
The first computer
network was ARPANET (Advanced Research Projects Agency Network),
developed in the late 1960s by the U.S. Department of Defense. It
initially connected universities and research centers for sharing information.
ARPANET later evolved and became the foundation of the modern Internet.
Uses of the Internet
·
Communication
through email, chat, and video calls.
·
Education
through online classes, e-books, and research.
·
Business
activities like online shopping and banking.
·
Entertainment
such as movies, music, and games.
·
Accessing
news and government services.
Advantages of the Internet
- Provides
fast and easy communication.
- Gives
access to vast information and knowledge.
- Supports
online education and e-learning.
- Saves
time and effort in daily activities.
- Connects
people all over the world.
Disadvantages of the Internet
- Risk
of cybercrime and hacking.
- Spread
of false or harmful information.
- Internet
addiction among students.
- Privacy
and security problems.
- Exposure
to inappropriate content.
5.1 Concept of WWW, Browser, Search
engine, URL
World Wide Web (WWW)
The World Wide Web
(WWW) is a global system of interlinked web pages, documents, and
multimedia resources that can be accessed over the Internet using web
browsers. It allows users to browse, search, and retrieve information
quickly and easily. Each web page has a unique URL (Uniform Resource
Locator) for identification and access.
The WWW was invented
by Tim Berners-Lee in 1989 at CERN to make information sharing among
scientists simpler and faster.
It works on HTTP/HTTPS
protocols, which enable communication between web browsers and web servers.
The WWW is a service of the Internet, not the Internet itself. While the
Internet is the network connecting computers globally, the WWW is the system
that organizes and presents information on it.
The main components of the WWW are web
browsers, web servers, web pages, websites, URLs, protocols (HTTP/HTTPS), and
search engines, which together allow users to access, share, and search
information on the Internet.
Web Browsers
A Web Browser
is a software application that allows users to access, retrieve, and view
web pages and other resources on the World Wide Web.
The web browser acts
as a client that sends requests to web servers using URLs. The server
responds with the requested web page, which the browser then displays to the
user.
Popular web browsers
include Google Chrome, Mozilla Firefox, Microsoft Edge, Safari, and Opera.
The first browser was Mosaic.
Client
A Client is a
computer or software that requests and receives services or resources
from a web server over a network, usually the Internet.
Web Server
A Web Server is a computer
or software system that stores, manages, and delivers web pages to users
over the Internet when requested by a web browser.
When a user types a website URL in
a browser, the browser sends a request to the web server. The server then processes
the request and sends the requested web page or resource back to the
browser to be displayed. Example: Apache, Nginx, and Microsoft IIS
Uploading
Uploading is the process of sending
data or files from a local device (like a computer, smartphone, or tablet) to a
remote server or another device over the Internet or a network.
Example: When we post a photo on
Instagram or submit an assignment to Google Classroom, we are
uploading the file.
Downloading
Downloading is the process of receiving
data or files from a remote server or another device to a local device over
the Internet or a network.
Example: When we save a PDF from a
website or install software from the Internet, we are downloading
the file.
Web Pages
A web page is
a single document on the World Wide Web that contains text, images, videos,
links, and other multimedia elements.
Home Page
The home page
is the main or first page of a website that appears when a user enters
the website’s domain name. It usually provides an overview of the website
and links to other pages.
Website
A website is a collection
of related web pages hosted on a web server under a common domain name.
Example: www.wikipedia.org is a website with many web pages.
Search Engine
A Search Engine is a
software tool that helps users find information on the World Wide Web by
entering keywords. Examples: Google, Bing, Yahoo, DuckDuckGo.
VPN
A VPN (Virtual
Private Network) is a service that creates a secure and private
connection over the Internet, allowing users to send and receive data
safely.
Example: VPN services like NordVPN,
ExpressVPN, and ProtonVPN help users browse safely and privately.
DNS
The Domain Name
System (DNS) is a system that translates domain names (like
www.google.com) into IP addresses (like 172.217.5.68), allowing browsers
to connect to the correct web server.
It works like the
phonebook of the Internet, helping browsers connect to the correct web server.
URLs (Uniform Resource Locators):
A URL (Uniform Resource Locator)
is the unique address of a web page or resource on the Internet that
allows browsers to locate and access it.
Here are the key components and
concepts associated with a URL:
·
Scheme/Protocol:
The method used to access the resource on the internet. e.g., HTTP, HTTPS, FTP
·
Domain:
The name of the server hosting the website. Example: In https://www.example.com, the
domain is www.example.com.
·
Top-Level
Domain (TLD The last
part of the domain that indicates the type of website. Examples: .com – commercial, .org –
organization, .edu – educational. Example: In www.example.com, .com is
the TLD
·
Path:
Shows the exact location of a resource on the server. Example:
/path/to/resource in https://www.example.com/path/to/resource
5.2 Concept of Remote Login (such
as Any Desk, team viewer)
Remote Login is a process that allows a user to
access and control a computer or server from a different location over a
network or the Internet. It enables users to work on a remote system as if
they are sitting in front of it. Remote login uses protocols like Telnet, SSH
(Secure Shell) or RDP (Remote Desktop Protocol). Applications like AnyDesk,
TeamViewer, and Windows Remote Desktop are popular for this purpose.
Advantages of Remote Login
- Remote
login allows users to access their computers or office networks from
anywhere.
- It
saves time and cost because IT staff can fix problems without visiting
physically.
- Useful
for remote work, online learning, and server management.
- Promotes
collaboration by enabling screen sharing and file transfer.
Disadvantages of Remote Login
- Security
risks such as hacking, phishing, and unauthorized access.
- Needs
a stable Internet connection; poor speed can cause delays.
- May
show slower performance compared to using the computer directly.
- If
not properly secured, it can lead to data loss or privacy issues.
|
Aspect |
AnyDesk |
TeamViewer |
|
Definition |
Remote desktop software to access
and control a computer or device remotely |
Remote desktop software to access,
control, and collaborate on remote computers |
|
Main Functions |
Remote access, control, file
transfer, quick troubleshooting |
Remote access, control,
collaboration, online meetings, video calls, cloud storage |
|
Performance |
Lightweight, fast, works on low
bandwidth |
Slightly heavier but stable;
suitable for corporate use |
|
Security |
Encrypted connections for safe
remote access |
Encrypted connections + advanced
security features |
|
Platform Support |
Windows, macOS, Linux, Android,
iOS |
Windows, macOS, Linux, Android,
iOS |
|
Uses |
Quick troubleshooting and remote
support |
Businesses, team collaboration,
online meetings, teaching |
5.3 Concept of protocols (HTTP,
HTTPS)
Web protocols
Protocols are rules that define how data
is transmitted between computers over a network.
They make sure
information is sent and received correctly. Examples of web protocols include
HTTP, HTTPS, FTP, SMTP, and DNS.
|
HTTP (HyperText Transfer
Protocol) |
HTTPS (HyperText Transfer
Protocol Secure) |
|
HTTP is a protocol used by web
browsers and servers to communicate and transfer web pages over the Internet. |
HTTPS is a secure version of HTTP
that uses encryption (SSL/TLS) to protect data transferred between a
web browser and server. |
|
Not secure; data is transmitted
in plain text |
Secure; uses SSL/TLS to encrypt
data |
|
Works on port 80 by
default. |
Works on port 443 by
default. |
|
Used for normal browsing
(non-sensitive). |
Used for secure browsing
(banking, shopping, logins). |
FTP (File Transfer Protocol)
FTP (File Transfer
Protocol) is a
standard network protocol used to transfer files between a client and a
server over the Internet or a network. It allows users to upload files
from a local computer to a server or download files from a server to a
local computer.
TCP/IP (Transmission Control
Protocol / Internet Protocol)
TCP/IP is a set of communication
protocols used to connect computers and devices over the Internet or any
network, ensuring reliable data transmission and addressing.
- TCP ensures that data is
delivered reliably in correct order.
- IP is responsible for addressing
and routing data packets to the correct destination.
|
Protocol |
Full Form |
Main Function |
Storage/Access |
Port (Basic) |
|
POP |
Post Office
Protocol |
POP (Post Office
Protocol) is a
network protocol used to receive emails from a mail server to a local
client, allowing users to read their messages offline. POP3 is the
latest version and widely used. |
Emails are usually
removed from server after download. |
Port 110 (POP3) |
|
IMAP |
Internet Message
Access Protocol |
MAP (Internet
Message Access Protocol)
is a network protocol used to access and manage emails directly on a mail
server, allowing users to view, organize, and sync messages across
multiple devices without downloading them permanently. |
emails remain on
the server unless explicitly deleted. |
Port 143 |
|
SMTP |
Simple Mail
Transfer Protocol |
SMTP (Simple
Mail Transfer Protocol)
is a network protocol used to send and transfer emails from a client to a
mail server or between mail servers over the Internet. |
Does not store
emails, only transfers them. |
Port 25 |
5.4 Email and its uses
Email
Email (Electronic Mail) is a system
of sending and receiving digital messages over the Internet. It allows people
to share text, images, files, and documents instantly with others anywhere in
the world. Examples of email services are Gmail, Yahoo Mail, and Outlook. Email
was developed by Ray Tomilnson in 1971.
Uses of Email
- Sends
and receives messages instantly over the Internet.
- Shares
files, images, and documents as attachments.
- Helps
in education for submitting assignments and teacher-student communication.
- Widely
used in business communication, job applications, and creating online
accounts.
Advantages of Email
- Fast,
reliable, and cheaper than letters or phone calls.
- Supports
attachments like files, documents, and images.
- Provides
a written record for future reference.
- Useful
for personal, educational, and professional purposes.
Disadvantages of Email
- Needs
Internet access, which may not be available everywhere.
- Users
receive spam or junk mail that wastes time.
- Emails
can be hacked, leading to phishing and cybercrime.
- Too
many emails can overload users and reduce productivity.
5.5 Appropriate usage of social
media and safely accessing web sites
Social Media
Social media refers to online platforms that allow users
to create, share, and interact with content and communities. Examples
include Facebook, Instagram, WhatsApp, TikTok, and YouTube. It is used for
communication, education, business promotion, and entertainment.
Safe web browsing means accessing
websites and online resources while protecting personal data, avoiding cyber
threats, and maintaining privacy.
Appropriate Usage of Social Media
- Share
information responsibly without spreading rumors or fake news.
- Respect
others’ privacy and avoid posting sensitive personal information.
- Use
strong passwords and enable two-factor authentication (2FA).
- Avoid
cyberbullying or offensive content.
- Limit
screen time and balance social media use with real-life activities.
Advantages of Social Media
- Helps
people communicate instantly across the world.
- Useful
for sharing information, photos, videos, and ideas.
- Supports
online education and knowledge sharing.
- Useful
for business promotion, advertising, and branding.
- Raises
awareness about social, health, and environmental issues.
- Provides
entertainment and news updates.
Disadvantages of Social Media
- Can
cause addiction and waste valuable time.
- Leads
to cyberbullying, trolling, and online harassment.
- Creates
privacy risks and danger of data theft.
- Spreads
fake news, misinformation, and rumors quickly.
- Reduces
real-life communication and increases loneliness.
- Overuse
can harm mental health, causing stress or depression.
Examples of Social Media Platforms
- Facebook – For connecting with
friends, sharing posts, photos, videos, and events.
- Instagram – Focused on sharing photos,
videos, stories, and reels.
- Twitter
/ X – For
posting short updates, news, and interacting via tweets.
- WhatsApp
/ Messenger –
Messaging and voice/video calling platform.
- YouTube – Video sharing and streaming
platform for entertainment and education.
- TikTok – Short video creation and
sharing platform.
- LinkedIn – Professional networking,
job search, and career development.
- Snapchat – Sharing images and short
videos that disappear after viewing.
5.6 Introduction to Video
conference tools (Zoom, Google Meet, MS Teams)
Concept of online video meeting
Video
conferencing is a
technology that allows people in different locations to communicate
face-to-face online using audio and video. It is widely used in education,
business, healthcare, and personal communication. Examples include Zoom, Google
Meet, Microsoft Teams, and Skype.
Key Features of Video Conference
Tools:
- Real-Time
Communication:
Video and audio calls in real-time.
- Screen
Sharing:
Share presentations, documents, and desktops.
- Chat
& Messaging:
Text chat during meetings.
- Recording
& Playback:
Record sessions for later reference.
- Participant
Management:
Invite, mute, or remove participants.
- Collaboration
Tools: File
sharing, whiteboards, and integration with apps.
Examples of online video meetings
Zoom
Zoom is a popular
video conferencing software that allows people to communicate online through
video, audio, and chat. It supports features like screen sharing, file sharing,
recording, and breakout rooms. Zoom is widely used in education for online classes,
in businesses for meetings, and by individuals for personal communication.
Google Meet
Google Meet is a
video conferencing platform developed by Google. It allows people to hold
online classes, meetings, and video calls with features like screen sharing,
chat, and live captions. It is widely used in education and business because it
is simple, secure, and easily accessible through Gmail or Google Calendar.
Microsoft Teams (MS Teams)
Microsoft Teams is a
communication and collaboration platform by Microsoft. It combines video
conferencing, chat, file sharing, and integration with Office 365 apps like
Word, Excel, and PowerPoint. It is mostly used in workplaces, schools, and
remote teamwork.
5.7 Concept of blogs and its
features Concept of blog
A blog (short for “web log”) is
a personal or professional online journal or website where individuals or
organizations regularly post articles, opinions, news, or multimedia content.
·
Blogs are usually informal, interactive, and
regularly updated.
·
Readers can often comment and share the posts,
creating engagement.
Advantages of Blogs
1. Easy
information sharing with a wide audience.
2. Promotes
learning and education through tutorials and guides.
3. Enhances
communication and interaction with readers.
4. Supports
marketing and branding for businesses.
5. Builds
personal or professional identity.
6. Low
cost and easy to set up.
Disadvantages of Blogs
- Time-consuming to write, update, and manage.
- Requires Internet access for posting and reading.
- Risk of plagiarism as content can be copied.
- Information overload can overwhelm readers.
- Privacy & security risks with personal or sensitive data.
- Limited monetization unless very popular.
Key Features of Blogs
- Regular
Updates: New
posts published frequently.
- Personal
or Professional Content:
Experiences, tutorials, news, or expert opinions.
- Interactive: Allows readers to comment and
engage.
- Categorized
& Tagged Content:
Organizes posts for easy navigation.
- Multimedia
Support:
Text, images, videos, and links.
- RSS
Feeds / Subscriptions:
Updates delivered automatically to subscribers.
- Searchable
& Shareable:
Can be searched, bookmarked, and shared on social media.
Short Answer Questions
- What
is the Internet? Write any two uses of the Internet.
- Give
two advantages and two disadvantages of the Internet.
- What
is the World Wide Web (WWW)? Name any two components of the WWW.
- Which
protocols does the WWW use? Is WWW the same as the Internet? Give reason.
- Who
developed ARPANET? When and who invented the WWW?
- What
is a web browser? Write any two examples of web browsers.
- Define
URL. What is a client in networking?
- What
is a web server? Give any two examples.
- Define
uploading and downloading with examples.
- What
is a web page? What is a home page?
- What
is a website? Give an example of a website.
- What
is a search engine? Write any two examples of search engines.
- What
does TLD in a URL stand for? Give one example of a TLD.
- What
is remote login? Give any two examples of remote login software.
- Give
two advantages and two disadvantages of remote login.
- What
protocol is used for secure remote login? Which remote login software is
lightweight?
- Which
remote login software is suitable for corporate use? Does remote login
need an Internet connection?
- What
is AnyDesk mainly used for? Can remote login help in online teaching?
- What
is a protocol in networking?
- What
does HTTPS do that HTTP does not?
- What
is TCP/IP? What is FTP used for?
- What
is email? Who developed email?
- Name
one email service and one use of email.
- Give
two advantages and two disadvantages of email.
- What
is social media? Give two examples of social media.
- Name
a social media platform for photos, videos, short videos, and professional
networking.
- What
is safe web browsing? Give two rules for appropriate social media use.
- Why
should you use strong passwords on social media? What can happen if you
share fake news?
- Give
two advantages and two disadvantages of social media.
- Name
one social media app mainly for messaging and one platform that allows
live streaming.
- What
is cyberbullying? Give one way social media can harm mental health.
- How
can social media be useful for business?
- What
is video conferencing? Name any two video conferencing tools.
- What
is a blog? Who can write a blog?
- Give
two advantages and two disadvantages of blogs.
- Explain
the difference between the Internet and the World Wide Web with examples.
- How
do web browsers and web servers interact when you access a website?
- Why
is HTTPS considered more secure than HTTP?
- Compare
AnyDesk and TeamViewer in terms of security and collaboration.
- How
can social media positively and negatively impact society?
- How
does a VPN protect user privacy online?
- Explain
how a blog differs from a static website.
- How
does video conferencing support remote learning?
- Discuss
the risks of not using secure protocols like HTTPS.
- Explain
why remote desktop tools require strong security measures.
- How
can blogs be used as educational tools?
- Explain
the significance of TLDs in domain names.
- Explain
the importance of strong passwords and two-factor authentication (2FA) in
social media.
- How
can remote login tools improve business productivity?
- How
does social media influence public opinion?
- The
Internet is a global system of interconnected __________.
a) computer networks ✅ b) smartphones c) printers d) servers - ARPANET,
the first computer network, was developed in the __________.
a) 1970s b) 1980s c) 1960s ✅ d) 1990s - WWW
stands for:
a) World Wide Web ✅ b) Wide Web World c) Web Wide World d) World Web Wide - WWW
was invented by:
a) Bill Gates b) Tim Berners-Lee ✅ c) Vint Cerf d) Steve Jobs - The
first web browser was:
a) Chrome b) Firefox c) Mosaic ✅ d) Opera - A
URL is used to:
a) Identify a web page ✅ b) Identify a computer c) Identify an IP address d) Identify a protocol - HTTP
stands for:
a) HyperText Transfer Protocol ✅ b) Hyper Transfer Text Protocol
c) HighText Transfer Protocol d) Hyperlink Transfer Protocol - HTTPS
stands for:
a) HyperText Transfer Protocol Secure ✅ b) HyperText Transfer Private Secure
c) Hyper Transfer Text Protocol Secure d) Hyperlink Transfer Protocol Secure - Web
browsers are used to:
a) Send emails b) Access and view web pages ✅ c) Store files d) Transfer files - DNS
translates __________ into __________.
a) URLs → Domain names b) Domain names → IP addresses ✅
c) IP → URLs d) Websites → Protocols - VPN
stands for:
a) Verified Personal Network b) Virtual Private Network ✅
c) Virtual Public Network d) Verified Private Network - A
web server:
a) Requests web pages b) Stores and delivers web pages ✅
c) Only sends emails d) Encrypts data - Downloading
means:
a) Sending files from local to remote b) Receiving files from remote to local ✅
c) Uploading d) Browsing - Uploading
means:
a) Receiving files b) Sending files from local to remote ✅
c) Browsing websites d) Downloading - A
website is a collection of:
a) IP addresses b) Web browsers c) Related web pages ✅ d) Servers
- Remote
login allows a user to __________ a remote computer.
a) Access and control ✅ b) Only browse c) Only send emails d) Only download files - Common
protocols used for remote login include:
a) HTTP b) SSH ✅ c) FTP d) POP - AnyDesk
is used for:
a) Video streaming b) Remote access and control ✅ c) Social media d) Email - TeamViewer
is used for:
a) Remote access and collaboration ✅ b) Only local access c) Only browsing d) Only email - AnyDesk
is __________ in performance.
a) Heavy b) Lightweight and fast ✅ c) Slower d) Only for businesses - TeamViewer
supports __________.
a) Collaboration, online meetings, and file sharing ✅ b) Only remote access
c) Only file transfer d) Only email - Both
AnyDesk and TeamViewer use __________ for secure connections.
a) SSL/TLS encryption ✅ b) HTTP c) FTP d) POP - Remote
login requires:
a) Physical presence b) Internet or network connection ✅
c) Only USB cable d) Offline access - A
disadvantage of remote login is:
a) Security risks ✅ b) Saves time c) Collaboration d) Remote support - Remote
login applications include:
a) AnyDesk ✅ b) Gmail c) YouTube d) Instagram
- Email
stands for:
a) Electronic Mail ✅ b) Easy Mail c) Extra Mail d) Emailing - Email
was developed by:
a) Tim Berners-Le b) Ray Tomlinson ✅ c) Bill Gates d) Steve Jobs - SMTP
is used for:
a) Receiving emails b) Sending emails ✅ c) Storing emails d) Browsing - POP
is used for:
a) Receiving emails ✅ b) Sending emails c) Encrypting emails d) Hosting websites - TCP/IP
is used for:
a) Connecting devices over a network ✅ b) Browsing only
c) Sending emails d) Social media - FTP
is used for:
a) File transfer between client and server ✅ b) Emailing c) Browsing d) Video streaming - HTTPS
uses:
a) SSL/TLS encryption ✅ b) FTP c) POP d) TCP only - DNS
acts like a:
a) Web browser b) Phonebook ✅ c) Server only
d) Email client - A
VPN helps:
a) Encrypt Internet connection ✅ b) Download files only
c)
Browse social media d)
Send emails only
35. Social media platforms allow users
to:
a) Create and share content ✅ b) Only send emails
c) Only
browse websites d) Only
use apps
- Examples
of social media include:
a) Facebook, Instagram ✅ b) Gmail, Outlook
c)
FTP, HTTP d)
Nginx, Apache
- Video
conferencing allows:
a) Face-to-face communication online ✅ b) Only email
c) Only file transfer d) Only browsing - Zoom
is used for:
a) Online meetings ✅ b) Browsing c) Emailing d) File storage - Google
Meet is developed by:
a) Microsoft b) Apple c) Google ✅ d) Facebook - MS
Teams combines:
a) Video, chat, and file sharing ✅ b) Only email ) Only browsing d) Only FTP - A
blog is a:
a) Personal or professional online journal ✅ b) Social media platform
c) Email system d) Protocol - Blogs
are usually:
a) Static b) Regularly updated ✅ c) Only images d) Only text - Key
feature of blogs includes:
a) Multimedia support ✅ b) Only videos c) Only browsing d) Only email - Examples
of blogs:
a) WordPress, Blogger ✅ b) Zoom, Meet c) Facebook, Instagram d) Gmail, Yahoo
- Remote
login allows users to work on a remote system as if they are __________.
a) Present physically ✅ b) Offline c) Without Internet d) Only on LAN - SSH
stands for:
a) Secure Shell ✅ b) Secure Server Host c) System Shell d) Server Side Host - RDP
stands for:
a) Remote Desktop Protocol ✅ b) Remote Data Protocol
c) Reliable Desktop Protocol d) Remote Device Protocol - Telnet
is used for:
a) Secure remote login b) Remote login without encryption ✅
c) Sending emails d) File transfer - AnyDesk
supports:
a) Remote control only b) Remote access, control, and file transfer ✅
c) Only video calls d) Only email - TeamViewer
supports:
a) Remote access only b) Remote access, collaboration, online meetings ✅
c) Only browsing d) Only downloading files - Protocols
define:
a) Rules for data transmission ✅ b) Browsers c) Websites d) Email only - FTP
is mainly used for:
a) Sending emails b) Transferring files ✅ c) Browsing websites d) Video streaming - TCP
ensures:
a) Correct order and reliable delivery of data ✅ b) IP addressing only
c) Encryption only d) Browsing - IP
ensures:
a) Addressing and routing data packets ✅ b) Data encryption
c) File storage d) Email transfer - SMTP
is used for:
a) Sending emails ✅ b) Receiving emails
c) Web browsing d) File transfer
62. Email allows users to share:
a) Only text b) Text,
images, and documents ✅
c) Only files d) Only
videos
- Email
was developed in:
a) 1965 b) 1971 ✅ c) 1989 d) 1995 - Social
media is used for:
a) Only education b) Creating, sharing, and interacting online ✅
c) Only browsing d) Only file transfer - Appropriate
social media usage includes:
a) Posting private info freely b) Respecting privacy and using strong passwords ✅
c) Cyberbullying d) Overuse - Safe
web browsing requires:
a) Ignoring HTTPS b) Protecting personal data ✅
c) Clicking unknown links d) Sharing passwords - Facebook
is used for:
a) Video calls only b) Connecting with friends, sharing posts ✅
c) File transfer only d) Email - Instagram
mainly focuses on:
a) Blogging b) Photos, videos, stories ✅
c) Emails d) Video conferencing - LinkedIn
is used for:
a) Social chatting b) Professional networking and job search ✅
c) Gaming d) Emailing - WhatsApp
allows:
a) Text, voice, and video communication ✅ b) Only text
c) Only email d) Only file transfer - TikTok
is used for:
a) Blogging b) Short video creation and sharing ✅
c) Email d) Video conferencing - YouTube
is for:
a) Sending emails b) Video sharing and streaming ✅
c) Only blogging d) Only social networking - Overusing
social media may cause:
a) Faster learning b) Mental health issues ✅
c) Email efficiency d) Safe browsing - Social
media can spread:
a) Only correct info b) Fake news and misinformation ✅
c) Only emails d) Only blogs
75. Video conferencing allows:
a) Only audio calls b)
Face-to-face communication online ✅
c) Only email d)
Only blogs
- Zoom
supports:
a) Screen sharing, recording, breakout rooms ✅ b) Only chatting
c) Only email d) Only blogging - Blogs
are:
a) Personal or professional online journals ✅ b) Only videos
c) Only emails d) Only websites - Blogs
are usually:
a) Static b) Regularly updated ✅
c) Only text d) Only images - Blogs
allow readers to:
a) Only read b) Comment and interact ✅
c) Only email d) Only browse - WordPress
is a platform for:
a) Blogging ✅ b) Video conferencing
c) Social media d) Email

No comments:
Post a Comment