Computer Science, asked by ashking7765, 9 months ago

1. Which of the following entries is different from others? Why? Safari, Chrome, Netscape, Facebook2. Name some social networking sites? 3. Name some protocols that are used for remote logging on a server? 4. Name some file transfer protocols used over internet. 5. What are commonly used mobile technologies?6. Define the terms :A. e-Learning B. e-shopping C. e-reservation D. e-groupE. video conferencing7. What is social networking? What are its benefits?8. What are the dangers associated with social networking?9. What precautions and measures should you take while using Web services such as social networks, e-shopping etc?10. What is the significance of SSH protocol? 11. How is MMS different from SMS?12. What is the difference between 3G and 4G? 13. What is telnet? Why is it used? 14. Why is SFTP called a secure protocol?please tell it is urgent ​

Answers

Answered by Qwafrica
0

Answers for the given questions:

1.  Facebook

2. Facebook. Twitter, LinkedIn, YouTube, Pinterest, Instagram...

3. TELNET and SSH

4. FTP, FTPS, SFTP, SCP. HTTP & HTTPS,  AS2, AS3, & AS4,  PeSIT.

5. SMS, MMS, 4G, 3G, GSM, CDMA, Wi-Fi.

6.  [A]

    E-Learning :

  • The learning which is based on electronic resources it is known as e-learning. The main key components of E-learning are the use of the computers & Internet.

[B]

E-shopping:

  • The online shopping defined as a method of searching for the product and buying products or services over Internet with the use of web browser. The very main attraction of the online shopping is that the consumer can find & buy items that they need without even leaving the house.

[C]

E- Reservation:

E-Reservation it is the most popular in Europe & the United States. Today it slowly entering Asian countries.

We see a few restaurants in the Singapore embracing online way for  the users to make reservations.

[D]

E-Group:

E-Group is functionality that the many social network platform have that lets you build, share, comment, & read from their interest and often over a virtual network. The groups build the smaller network within a larger network and social network service users can establishes joins  leaves & report groupings accordingly.

7.  the social networking services can be provide an accessible & powerful toolkit for the highlighting & acting on the issues & causes that affect & interest  of the young peoples. Social networking services are  can be used for the organising activity, event, or group for showcasing issues and opinions and make the wider audience aware for them.

Benfits for students:

That is to staying connected with the friends.

That is for mean of the communications.

That is keep up-to-date on news more quickly.

That is achieve a more personal connection.

8.   The dangers:

Like, Cyberbullying (bullying using digital technology)

and Invasion of privacy.

and also Identity theft.

9. First check that the website rating and reviews.

   and don't give your personal information.

   and before order collect the details the dealer.

   and next coming step it is product qualities.

    and also check the product specification.

10.  The SSH or the Secure Shell is the network communication protocol that enables 2 computers to communicate & share data.

11. The text message up to 160 characters without any attached files is known as SMS, where text that includes and file as like  picture, video, emoji, or a website link then it becomes an MMS.

12. The 3G technology offers the maximum download rate for about 21 Megabytes per the second.  4G technology can be download videos at  much faster rate, that can even go as high as 1 Gigabyte per the second.

13.  The Telnet is the network protocol used for virtually access the computer & provide  wo-way, collaborative & text-based communication channel between two machines. It follows the user command Transmission Control Protocol or Internet Protocol (TCP/IP) networking protocol to create remote sessions.

14. As the file transfer protocol, SFTP is the secured. SFTP protects the integrity of our file & data by using encryption & it also authenticates the server and as well as the end user in the transfer. Most FTP clients the  support SFTP connections.

#SPJ3

Similar questions