Page 129 - Viva ICSE Computer Studies 6 : E-book
P. 129
• Web radio, also called e-radio or Internet radio is a medium that is used to communicate and
transmit messages to the users on various radio servers much like the traditional radio.
• Use of Internet worldwide also brings along the related threats to the data and information.
• A computer virus can copy itself, attach itself to other applications or fi les and infect a computer.
• To send or receive e-mails, you need to have an address called the e-mail address. An e-mail
address functions like the postal address.
• An e-mail address usually consists of three parts: the username, the @ symbol and the domain
name.
• An e-mail address can be created easily through an e-mail client website. The mail servers in
such websites assign every user with a unique e-mail address.
• The step for entering into a personal e-mail account is called log in. To log in an account,
you must supply a proper e-mail address and a password.
• On successfully logging into an e-mail account, several options like Inbox, Drafts, Compose
and Sent Mail are visible on the screen.
• You can send a picture, photograph, text fi le or a voice message as an attachment to your mail.
• A user can add signature in the form of contact information in every e-mail he/she sends.
A. Fill in the blanks.
1. The Internet can be defi ned as a technology for _______________________ into a huge
global computer network.
2. ______________ refers to a learning system based on technology.
3. E-mail has become so popular that now people prefer it to ______________.
4. An ______________ is a group that comes with various social networking sites thus allowing
the users to share their interests.
5. The spams include ___________, ___________ and ___________.
B. State whether the given statements are true or false.
1. Video conferencing has completely changed the atmosphere of the
modern offi ces. __________
2. The information shared on e-group can be viewed by all the users
even those who are not a part of it. __________
3. Web publishing is replacing paper books with electronic books. __________
4. Viruses stay active even after the system is shut down. __________
5. As per the Copyright laws, the user cannot copy content and claim
it as his/her own content. __________
117