Internet_-_Study_Notes

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

Internet

COMPUTER

Copyright © 2014-2020 TestBook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App

Internet
 The Internet is a huge collection of networks, a networking infrastructure. It
encapsulates millions of computers together globally, forming a network in which
any computer can communicate with any other computer as long as they are both
connected to the Internet. In other words, it is a worldwide system of cross
connected computer networks, connecting millions of devices through which
exchange of information such as data, news and opinions etc. is possible.

 It utilizes the TCP/IP (Transmission Control Protocol/Internet Protocol) to aid billions


of users across the globe. So, TCP/IP can be called the backbone of the Internet. It
is considered as a network of networks that consists of thousands of private and
public, academic, business, and government interconnections. The Internet is often
considered as “The Information Highway”, that implies that there is a straight and
clear way of obtaining information. It connects thousands of computer networks.
Each device connected to the Internet is known as host, and is independent.
Through telephone wires, Fiber optical cable and satellite links, Internet users can
share a variety of information.

 The Internet is defined as an Information super Highway, to access information over


the web. However, It can be defined in many ways as follows:

 The Internet is a world-wide global system of interconnected computer


networks.

 The Internet uses the standard Internet Protocol (TCP/IP).

 Each device connected to the internet is identified by its unique IP address.

 IP Address is a unique set of numbers (such as 109.12.31.115) which


identifies a computer location.

 A special computer DNS (Domain Name Server) is used to give a name to


the IP Address so that the user can locate a computer by a name.

 For example, a DNS server will resolve a name http://www.testbook.com to a


particular IP address to uniquely identify the computer on which this website
is hosted.

 The Internet is available to each and every user across the globe.

COMPUTER | Internet PAGE 2


Download Testbook App

Evolution
 The methodology of Internet was coined in 1969 and has undergone various
technological & Infrastructural amendments that are discussed below:
 The origin of the Internet devised from the concept of Advanced Research Project
Agency Network (ARPANET).
 ARPANET was designed by the Department of Defence of The United States.
 The primary motive of ARPANET was to facilitate communication among the
different bodies of the government.
 At that time, there existed only four nodes, formally named Hosts.
 In 1972, the ARPANET spread over the globe with 23 nodes located in different
countries and thus became known as the Internet.
 By the time, with invention of new technologies such as TCP/IP protocols, DNS,
WWW, browsers, scripting languages etc., the Internet provided a medium to
publish and access information over the web.

COMPUTER | Internet PAGE 3


Download Testbook App

Advantages
 The Internet covers almost every aspect of life, one can think of. Here, we will
discuss some of the advantages of Internet:

 The Internet allows us to communicate with the people sitting at remote locations.
There are various apps available on the web that use the Internet as a medium for
communication. Users can find different social networking sites. Following are
examples of few Social Networking sites:
 Facebook
 Twitter
 Yahoo
 Flickr

 Anyone can surf for various kinds of information using the internet. Information
related to different topics such as Technology, Geographical Information, Health &
Science, Social Studies, Information Technology, Products etc can be surfed using a
search engine.
 Apart from communication and source of information, the internet also serves a
medium for entertainment. Following are the various modes for entertainment over
the internet.

COMPUTER | Internet PAGE 4


Download Testbook App

 Online Television
 Online Games
 Songs
 Videos
 Social Networking Apps
 Internet allows us to use many services like:
 Internet Banking
 Matrimonial Services
 Online Shopping
 Online Ticket Booking
 Online Bill Payment
 Data Sharing
 E-mail
 The Internet facilitates the concept of electronic commerce, that aids the business
deals to be processed on electronic systems.

Disadvantages
 However, Internet is evolved to be a powerful medium of information in almost all
areas, yet there are many associated disadvantages discussed below:

COMPUTER | Internet PAGE 5


Download Testbook App

 There is always the possibility to lose personal information such as name, address,
credit card number. Therefore, users must be very vigilant while sharing this type of
information. Users must use credit cards only via authenticated websites.
 Another disadvantage is the Spamming. Spamming corresponds to the unwanted
emails in bulk. These emails serve no purpose and lead to obstruction of the entire
system.
 Virus can easily be spread to the computers connected to the internet. Such virus
attacks may cause the user's system to crash or the user's important data may get
deleted.
 There are different websites that do not supply the authenticated information. This
leads to misconception among many people.

Intranet
 Intranet is defined as a private network of computers within an organization with its
own server and firewall.
Moreover we can define
Intranet as:
 The Internet is a system
in which multiple PCs are
networked to be
connected to each other.
PCs on the intranet are
not available to the world
outside of the intranet.
 Normally each company
or organization holds their
own Intranet network and
members/employees of
that company collaborate
via access to the computers in their intranet.
 Each computer in Intranet is also identified by an IP Address, which is unique
among the computers in that Intranet.

COMPUTER | Internet PAGE 6


Download Testbook App

Benefits
 Intranet is considered as a very efficient and reliable network infrastructure for any
organization. It is profitable in every aspect such as cost-effectiveness,
collaboration, security, productivity and much more.

 Communication: Intranet facilitates easy and cheap interconnection within an


organization. Employees can communicate through chat, e-mail or blogs.
 Time Saving: Information to be shared on Intranet is shared in real time.
 Collaboration: Information is shared among the employees of the organization
according to the need and it can be traversed by the authorized users, comprising
enhanced teamwork.
 Platform Independency: It is possible to connect computers and other
devices on the Intranet with different architectures.
 Cost Effective: Employees may see the data and other documents through a
browser instead of printing them and distributing duplicate copies to the employees,
which considerably decreases the cost.
 Workforce Productivity: Data and information is available all the time and can
be accessed through company workstation. This aids the employees to work faster.
 Business Management: There is a provision to deploy applications that facilitates
the business operations.

COMPUTER | Internet PAGE 7


Download Testbook App

 Security: Since information distributed over on intranet can only be retrieved


within an organization, therefore there is almost no possibility of being stolen.
 Specific Users: Intranet targets only exclusive users within an organization
that is why, once can exactly know with whom is he/she interacting.
 Immediate Updates: Any changes implemented to information are refl ected at
the same time to all the users.
 Issues: Apart from several benefi ts of Intranet, there also exist some
problems. These issues are described in the given diagram:

Application
 Intranet applications are the same as that of Internet applications. Intranet
applications can be also accessed via a web browser. The only difference is that,
Intranet applications reside on local servers while Internet applications reside on
remote servers. Here, we've discussed some of these applications:

COMPUTER | Internet PAGE 8


Download Testbook App

 Document publication applications: Document publication programs facilitate


publishing documents like manuals, software guide, employee profits etc without
using paper.
 Electronic resources applications: It offers digital resources such as software
applications, templates and tools, to be distributed across the network.
 Interactive Communication applications: Like on the internet, it is possible to
have email and chat like applications for Intranet, hence providing an interactive
communication among employees.
 Support for Internet Applications: Intranet offers an environment to deploy
and test applications before placing them on the Internet.
 Internet vs. Intranet: Apart from similarities there are some differences
between the two. Following are the differences between Internet and Intranet:

Intranet Internet
Localized Network. Worldwide Network
Doesn't have access to Intranet Have access to the Internet.
More Expensive Less Expensive
More Safe Less Safe
More Reliability Less Reliability

Extranet
 Extranet refers to a network
within an organization, using the
internet to connect to the
outsiders in a controlled manner.
It aids to interconnect businesses
with their customers and
suppliers and in turn allows
working in a collaborative
manner.

COMPUTER | Internet PAGE 9


Download Testbook App

Implementation
 Extranet is implemented as a Virtual Private Networks (VPN) because it uses the
internet to connect to corporate organizations and there is always a threat to
information security. VPN facilitates a secure network in public infrastructure
(Internet).

 Key Points
1. The packet is wrapped at the boundary of networks in IPSEC compliant
routers.
2. It utilizes an encryption key to associate packets and IP addresses as well.
3. The packet is decoded only by the IPSEC compliant routers or servers.
4. The digital information is shared over VPN via VPN Tunnel and this process
is called tunneling.
 VPN utilizes Internet Protocol Security Architecture (IPSEC) Protocol to facilitate
secure transactions by implementing an additional security layer to TCP/IP protocol.
This layer is implemented by encapsulating the IP packet to a new IP packet as
described in the following diagram:

COMPUTER | Internet PAGE 10


Download Testbook App

Benefits
 Extranet has proven to be a successful model for various kinds of businesses even
if they are small or big. following are few of the advantages of extranet for business
partners, employees, suppliers, and customers:

Issues
 Apart from advantages there are also some issues associated with extranet. These
issues are discussed below:

Hosting
 Where the extranet pages will be held i.e. who will host the extranet pages. In this
context there are two choices:
1. May host it on the user's own server.
2. May host it along with an Internet Service Provider (ISP) in the similar way as
web pages.
 But hosting extranet pages on a user's own server requires high bandwidth internet
connection which is comparatively very costly.

COMPUTER | Internet PAGE 11


Download Testbook App

Security
 Additional firewall security is required if the user hosts extranet pages on the user's
own server which result in a complex security mechanism and increased workload.

Accessing Issues
 Information cannot be accessed in absence of internet connection. However,
information may be accessed within Intranet with no internet connection.

Decreased Interaction
 It reduces the face to face interaction in the business which results in lack of
communication among customers, business partners and suppliers.

Extranet vs. Intranet


The following table shows differences between Extranet and Intranet:

Extranet Intranet

Internal network that can be accessed externally. Internal network that cannot be
accessed externally.
Extranet is an extension of the company's Intranet. Only limited users of a company.
For controlled external communication between Only for communication within a
customers, suppliers and business partners. company.

Internet Services
 Internet Services allow us to access a huge amount of information such as text,
graphics, sound and software over the internet. The diagram given below shows the
four different categories of Internet Services.

COMPUTER | Internet PAGE 12


Download Testbook App

Communication Services
 There are different communication Services available that facilitate exchange of
information among individuals or groups. The following table provides a brief
introduction to such services:

S. No. Service Description

1 Electronic Mail: Used to send electronic messages over the internet.

2 Telnet: Used to log on to a remote computer that is connected to the internet.


Newsgroup: Provides a forum for people to discuss ideas of common
3
interests.
Internet Relay Chat (IRC): Allows the people from all over the globe to
4
communicate in real time.
Mailing Lists: Used to organize groups of internet users to share common
5
information through email.
Internet Telephony (VoIP): Allows the internet users to talk across the
6
internet to any PC equipped to receive the call.
Instant Messaging: Offers real time chat between individuals and groups of
7
people. Example: Yahoo messenger, MSN messenger.

Information Retrieval Services


 There are various Information retrieval services facilitating simple access to
information available on the internet. The table given below provides a brief
introduction to these services:

S. No. Service Description


1 File Transfer Protocol (FTP): Enable the users to transfer fi les.

Archie: It's an updated database of public FTP sites and their content. It helps
2
to find a file by using its name.
Gopher: It is utilized to retrieve, search, and display documents on remote
3
sites.
VERONICA (Very Easy Rodent Oriented Net wide Index to Computer
4 Achieved): VERONICA is a resource based on gopher. It facilitates access to
the information resource saved on gopher’s servers.

COMPUTER | Internet PAGE 13


Download Testbook App

Web Services
 Web services facilitate exchange of information among applications on the web.
Through web services, applications can simply interact with each other.
 The web services are offered using the concept of Utility Computing.

World Wide Web (WWW)


 WWW is also known as W3. It offers a medium to access documents distributed
over several servers all over the internet. These documents can consist of texts,
graphics, audio, video, hyperlinks. The hyperlinks facilitate the users to navigate
through the documents.

Video Conferencing
 Video conferencing or Video teleconferencing is a way of communicating by two-
way video and audio transmission with help of telecommunication technologies.

Modes of Video Conferencing


Point - to - Point
 This mode of conferencing connects two locations only.

COMPUTER | Internet PAGE 14


Download Testbook App

Multi Point
 Such mode of conferencing established connection between more than two
locations via Multipoint Control Unit (MCU).

Internet Protocols
Transmission Control Protocols (TCP)
TCP is basically a connection oriented protocol and offers end-to-end packet delivery. It
acts as a back bone for connection. It exhibits the following key features:
 Transmission Control Protocol (TCP) works at the Transport Layer of OSI Model.
 TCP is a reliable and connection oriented protocol.
 TCP offers:
 Stream Data Transfer.
 Reliability.
 Efficient Flow Control
 Full-duplex operation.
 Multiplexing.
 TCP offers connection oriented end-to-end packet delivery.
 TCP ensures reliability by sequencing bytes with a forwarding acknowledgement
number that indicates to the destination the next byte the source expects to receive.
 It retransmits the bytes not acknowledged within a specified time period.

COMPUTER | Internet PAGE 15


Download Testbook App

TCP Security
 TCP facilitates the following services to the processes at the application layer:
 Stream Delivery Service
 Sending and Receiving Buffers
 Bytes and Segments
 Full Duplex Service
 Connection Oriented Service
 Reliable Service

1. Stream Deliver Service: TCP protocol is stream oriented as it permits the


sending process to send data as stream of bytes and the receiving process to
retrieve data as stream of bytes.

 Sending and Receiving Buffers: It may not be possible for the sending and
receiving process to produce and obtain data at same speed, therefore, TCP needs
buffers for storage at sending and receiving ends.

 Bytes and Segments: The Transmission Control Protocol (TCP), at the


transport layer, groups the bytes into small entities, or packets. This packet is known
as segment. Prior transmission of such packets, these segments are encapsulated
into an IP datagram.

 Full Duplex Service: Transmission of the data in duplex mode simply defi nes
the flow of data in both the directions at the same time.

 Connection Oriented Service: TCP facilitates connection oriented service in


the given sequence:

 TCP of the first process informs TCP of the second process and gets its
approval.

 TCP of the first process and TCP of the second process and exchange data
in both the two directions.

 After completion of the exchange of data, when buffers on both of the sides
are empty, the two TCP’s destroy their buffers.

6. Reliable Service: For sake of reliability, TCP uses an acknowledgement


mechanism.

COMPUTER | Internet PAGE 16


Download Testbook App

Internet Protocols (IP)


 Internet Protocol is connectionless and unreliable protocol. It ensures no guarantee
of successful transmission of data.
 In order to make it reliable, it should be paired with reliable protocols such as TCP at
the transport layer.
 Internet protocol shares the data in format of so called a datagram as shown in the
following diagram:

 Points to remember:
1. The length of the datagram is variable.
2. The Datagram can be segmented into two parts: header and data.
3. The associated length of its header is around 20 to 60 bytes.
4. The header contains information for routing and delivery of the packet.

User Datagram Protocols (UDP)


 Like IP, UDP is a connectionless and unreliable protocol. It is not required to make a
connection with the host to transmit the data. Since UDP is an unreliable protocol,
there is no mechanism for ensuring that data sent is received.
 UDP distributes the data in the format of a datagram. The UDP datagram contains
five segments as shown in the following diagram:

COMPUTER | Internet PAGE 17


Download Testbook App

 Points to remember:
1. UDP is utilized by the application that typically transmits a small quantity of
data at one time.
2. UDP provides protocol port utilized i.e. UDP message consists of both source
and destination port number, that makes it easier for UDP software at the
destination to divert the message to the right application program.

File Transfer Protocols (FTP)


FTP facilitates copying of files from one host to another. FTP facilitates the mechanism
for the same in given sequence:
1. FTP defines 2 processes, namely, Control Process and Data Transfer
Process at both ends, i.e., at client as well as at server.
2. FTP creates two different types of connections: one is for the purpose of data
transfer and another is for controlling the information.
3. Control connection is established between control processes while Data
Connection is established between <="" b="">
4. FTP utilizes port 21 for the purpose of control connection and Port 20 for the
purpose of data connection.

COMPUTER | Internet PAGE 18


Download Testbook App

Trivial File Transfer Protocols (TFTP)


 Trivial File Transfer Protocol is also utilized for the transfer of the files but it transfers
the files with no authentication. Opposite to the FTP, TFTP does not differentiate
control and data information. As no authentication exists, TFTP has no security
features therefore it is not recommended to opt for TFTP.
 Key points
1. TFTP utilizes UDP for data transport. Every TFTP message is transmitted in
a separate UDP datagram.
2. The first 2 bytes of a TFTP message defines the type of message.
3. The TFTP session is started when a TFTP client requests to upload or
download a file.
4. The request is transferred from an ephemeral UDP port to the UDP port 69 of
the TFTP server.
 Difference between FTP and TFTP
S. No. Parameter FTP TFTP
1 Operation Transferring Files Transferring Files
2 Authentication Yes No
3 Protocol TCP UDP
4 Ports 21 – Control, 20 – Data Port 3214, 69, 4012
5 Control and Data Separated Separated
6 Data Transfer Reliable Unreliable

Telnet
 Telnet is a protocol used to log in to remote computers on the internet. There are a
number of Telnet clients having user friendly interfaces. The following diagram
elaborates that a person is logged into the computer named A, and from there, he
remotely logged into computer named B:

COMPUTER | Internet PAGE 19


Download Testbook App

Hyper Text Transfer Protocols (HTTP)


 HTTP is a communication protocol. It defines a mechanism for communication
between browser and the web server. It is also known as the request and response
protocol as the communication between browser and server takes place in request
and response pairs.

HTTP Request
 HTTP request comprises of lines which contains:
1. Request line
2. Header Fields
3. Message body
 Key Points
1. The first line i.e. the Request line specifies the request method i.e. Get or Post.
2. The second line defines the header which reflects the domain name of the server
from where index.htm is retrieved.

HTTP Response
 Like HTTP requests, HTTP response also has a certain structure. HTTP response
contains:
1. Status line
2. Headers
3. Message body

Basic Internet Terms


Domain

While every computer has its own unique address, every user using the Internet has a
unique address called a domain. A domain recognizes one or more IP addresses. An
example of a domain is weather.com and is part of the URL such as https://
www.weather.com. The standard top-level domains are:

COMPUTER | Internet PAGE 20


Download Testbook App

 com - Commercial business

 edu - Educational institutions

 gov - Government agencies

 mil - Military

 net - Networks organization

 org - Organizations (nonprofit)

There are additional top-level domains that are now recognized on the Internet. They
include:

 aero - Air-transport industry

 biz - Businesses

 coop - Cooperatives

 info - Unrestricted use

 museum - museums

 pro - Accountants, lawyers, physicians, and other professionals

 tv - Television

Browser

A piece of software such as Mozilla Firefox and Internet Explorer that allows a computer
to access and display documents, view pictures, hear sound, and view video clips from
the World Wide Web.

E-mail

Mail that's electronically transmitted by your computer. As opposed to snail mail, e-mail
sends your messages instantaneously, anywhere in the world. It has the capability to
send messages at any time and to anyone.

File Transfer Protocol (FTP)

The standard method for downloading and uploading files over the Internet. With FTP,
you can login to a server and transfer files (meaning you can "send" or "receive" files).

COMPUTER | Internet PAGE 21


Download Testbook App

Homepage

The first page that is viewed when the browser starts. It is also the page of a Web site
that provides the introduction or content with links.

Hypertext Transfer Protocol (HTTP)

The abbreviation for Hypertext Transfer Protocol. It is the set of rules by which Web
pages are transferred across the Internet.

Internet Protocol (IP) Address

The Internet is composed of local, regional, national, and worldwide computer networks.
Each computer on the Internet can be identified by a set of unique numbers that is
called an internet protocol (IP) address. The IP address is composed of four different
numbers separated by periods such as 205.134.120.60.

Link or Hypertext Link

An underlined word(s), phrase(s), or graphics on a Web page that transports the reader
to additional or related information on the Internet.

TelNet

A terminal emulation protocol (or Internet program) used to connect a computer to a


remote host or server. Telnet is one of the oldest Internet activities and is primarily used
to access online databases or to read articles stored on university servers.

Uniform Resource Locator (URL)

An addressing scheme that is used on the Internet to locate resources and/or services
on the World Wide Web. Basically the URL is the address of a computer file that has
been put on a computer server to access the Internet.

Web Page

A single hypertext file or a page that is part of a Web site.

Website

A collection of World Wide Web pages or files.

Address

It is a series of letters and numbers that identify a location.

COMPUTER | Internet PAGE 22


Download Testbook App

Cyberspace

Refers to all computer networks on the internet

Navigate

The act of moving from page to page and website to website online.

Piracy

illegally copying copyrighted software, music or movies.

Spam (electronic junk mail) :

It is an unwanted email from someone we don’t know.

Website :

A collection of “pages” or files linked together and available on the world Wide Web.

Attachment:

This is a file that has been added to an e-mail.

Chat:

A real-time communication over the internet.

Cyber bullying

Sending or posting harmful or cruel text or images using the internet or other digital
communication devices.

Icons:

Small pictures that represent the program on your computer.

Post

To leave a message on a newsgroup or bulletin board.

Query

A request for information about certain topic. It is what you put in the box when you
type something into the search engine.

Blog (Web Log)

Usually defines as a personal or noncommercial web site that uses a dated log format.

COMPUTER | Internet PAGE 23


Download Testbook App

Emoticons

An animated faces that express different emotions

Outbox

This is where all of the messages that you send are kept.

Server

A special software package that connects to a network and provides data.

Surf

To search for information on the web in a random , non-linear way.

Bookmark:

A way to quickly access a favorite web site by saving it in your browser.

Hacker:

A popular term for someone who accesses computer information either legally or
illegally.

Internet Service Provider (ISP)

A company that provides internet access to customers

Spamming

A mass mailing sent as Instant Messages to users.

Hypertext Markup language (HTML)

The coded format language used for creating documents on the world wide web and
controlling how web pages appear.

Cookie :

Also known as an HTTP cookie, web cookie, or browser cookie.A small file downloaded
by some web sites to store a packet of information on your browser.

History:

A list of websites the people are using a particular computer have visited.

Netiquette

Proper use of internet.

COMPUTER | Internet PAGE 24


Download Testbook App

Plug-in

A program that extends the capabilities of your computer.

Softcopy

An electronic version of a file on your computer.

Domain Name

A name given to the numerical or internet protocol (IP) address of a web site.

Firewall

This is a system that creates a special “wall” used by network servers to separate their
intranet from internet

Hypertext Transfer Protocol (HTTP)

The standard method computers use to communicate via the world wide web.

Pharming

An online scam that attacks the browser’s address bar.

Phishing

An online scam that uses e-mail to “fish” for users’ private information by imitating
legitimate companies.

Streaming (media)

The exchange of video clips, sounds or other types of media over the internet.

Transmission Control Protocol/ internet Protocol (TCP/IP)

The protocol or conventions that computers use to communicate over the internet.

Zip File

Large files that have been compressed to make them easier to send over the internet

List of most popular browser


 Firefox

 Google Chrome

COMPUTER | Internet PAGE 25


Download Testbook App

 Microsoft Edge

 Apple Safari

 Opera

 Brave

 Vivaldi

 DuckDuckgo

 Chromium

 Epic

Best Search Engines in The World


1. Google : Google Search Engine is the best search engine in the world and it is
also one of most popular products from Google. Almost 70 percent of the Search
Engine market has been acquired by Google. The tech giant is always evolving and
looking to improve the search engine algorithm to provide best results to the end-user.
Although Google appears to be the biggest search engine, as of 2015 YouTube is now
more popular than Google (on desktop computers).

2. Bing : Bing is Microsoft’s answer to Google and it was launched in 2009. Bing is the
default search engine in Microsoft’s web browser. At Bing, they are always striving to
make it a better search engine but it’s got a long way to go to give Google competition.
Microsoft’s search engine provides different services including image, web and video
search along with maps. Bing introduced Places (Google’s equivalent is Google My
Business), this is a great platform for business to submit their details to optimise their
search results.

3. Yahoo : Yahoo & Bing compete more with each other than with Google. A
recent report on netmarketshare.com tells us that Yahoo have a market share of 7.68
percent. Although a leader as a free email provider, this is declining significantly though
with their recent acknowledgement that User Details & Passwords where hacked last
year.

COMPUTER | Internet PAGE 26


Download Testbook App

4. Baidu : Baidu is the most used search engine in China and was founded in Jan,
2000 by Chinese Entrepreneur, Eric Xu. This web search is made to deliver results for
website, audio files and images. It provides some other services including maps, news,
cloud storage and much more.

5. AOL : Aol.com is also among the top search engines. These are the guys that used
to send out CD’s which you’d load onto your PC to install their browser and modem
software. Once the pre-eminent player they now have a market share of 0.59 percent.
Verizon Communication bought AOL for $4.4 billion. It was started back in 1983 as
Control Video Corporation. It was named America Online in 1991 and in 2009 as AOL
Inc. AOL is a global mass media company which is based in New York. The company
also provides advertising services as AOL Advertising, AOL mail and AOL Platform.

6. Ask.com : Founded in 1995, Ask.com, previously known as Ask Jeeves. Their


key concept was to have search results based on a simple question + answer web
format. It is a question & answer community where you can get the answers for your
question and it integrates a large amount of archive data to answer your question.
Because of this dependency on archived and active user contributions the results will
not be as current as those you get in Google, Bing and Yahoo. They’ve tried to counter
where their resources don’t have the answer they take help from a third-party search
engine. Interestingly they don’t name who this is.

7. Excite : Excite is not widely known but is one that still gets into the top 10.
Excite is an online service portal that provides internet services like email, search
engine, news, instant messaging and weather updates. This also provides us with the
latest trends, topics and search for phrases such as: What can President Trump
actually do?

8. DuckDuckGo : DuckDuckGo is a popular search engine known for protecting


the privacy of the users. Unlike Ask.com they are quite open about who they use to
generate search results; they’ve partnered with Yahoo, Bing and Yummly. It was
founded back in 2008 by Gabriel Weinberg in California and its revenue come from
Yahoo-Bing search alliance network and Affiliates.

9. Wolfram Alpha : Wolfram Alpha is a computational knowledge search engine which


does not give list of documents or web pages as search results. Results are based on
facts & data about that query. Their mission statement is to make all systematic
knowledge computable and broadly accessible. Launched in 2009, they now have a Pro
solution designed with pricing for Students and Educators. Much as it’s targeted, it’s an
awesome tool for the right market.

COMPUTER | Internet PAGE 27


Download Testbook App

10. Yandex : Launched in 1997, Yandex is most used search engine in Russia.
Yandex also has a great presence in Ukraine, Kazakhstan, Belarus and Turkey. It
provides services like Yandex Maps, Yandex Music, online translator, Yandex Money
and many other services.

11. Lycos : Lycos has a good reputation in search engine industry. Its key areas
served are email, web hosting, social networking, and entertainment websites.

12. Chacha.com - December 2016 UPDATE: ChaCha ceased trading due to


declining advertising revenues : Chacha.com is a human-guided search engine and
was founded in 2006. You can ask anything in its search box and you will be answered
in real-time. It also provides mobile search and marketing services. You can also install
its mobile apps on iPhone, iPad and Android.

Social Networking Sites


 Facebook

 WhatsApp

 QQ

 WeChat

 QZone

 Tumblr

 Instagram

 Twitter

 Google+ ( No Longer Available )

 Baidu Tieba

 Skype

 Viber

 Sina Weibo

COMPUTER | Internet PAGE 28


Download Testbook App

 LINE

 Snapchat

 Pinterest

 LinkedIn

 Telegram

 Reddit

 Myspace

Top E-Commerce Site


 Amazon.

 Ali Baba.

 eBay.

 Jingdong.

 Zappos.

 Rakuten.

 Home Depot.

 Flipkart.

 Snapdeal

 Ali Baba

 Snanpdeal

 Myntra

COMPUTER | Internet PAGE 29

You might also like