ѧýlÅ 19

B¨Ìê»ê§Šæ l VýS$Æý‡$ÐéÆý‡… l yìlòÜ…ºÆŠ æl 17 l 2015 Y. Arunveera Kumar Subject Expert IACE, Nellore

ELECTRONIC MAIL (E-MAIL)

E-mail is the backbone of today's communication and it is a convenient medium for communications for all segments of users. First E-mail was sent in 1971 by an engineer Ray Tomlinson. Before this, email was limited to users within a single machine. Tomlinson's was able send messages to other machines on the Internet, using the @ sign to designate the receiving machine. Email messages are normally plain text messages, with or without attachments.

@

E-Mail server

An E-Mail server is an application that receives incoming email from local users and remote senders and forwards outgoing email for delivery. Example: MS Exchange Server, Send Mail, Q Mail etc. All recent E-mail servers work on Simple Mail Transfer Protocol (SMTP).

@

E-Mail clients

E-Mail clients are programs which are used to create, send, receive, and view e-mails. Example: Mozilla Thunderbird,

Resolution of laser printer is.. MS Outlook etc. All recent versions of E-mail clients allow messages to be formatted in plain text or HTML.

@

Some of the e-mail threats are explained below. Eavesdropping Normally all E-mail messages (including user-ids and passwords) are transmitted between computer and E-mail servers as plain text. This is not secure and anyone who can seize this can read your email and obtain your user-ids, passwords and sensitive E-mail content.

@

Spam E-mails

Spam is flooding the internet with many copies of unsolicited bulk E-mail messages. Spam E-mails are usually commercial advertisements like replica watches, cheap drugs, get rich quick and other dubious products. Spam E-mails decreases productivity and increases the cost of email use. Many legitimate E-mails are also filtered by spam filters.

BANK POs, Clerks Special

Computer Awareness

Your E-mail server should be equipped with strong anti-virus application and spam filters to stop spam, viruses, and other unwanted content before they reach your infrastructure and users. Anti-virus application and spam filters should actively protect you against email bombs and other attacks, and greatly reduce the impact of spam and viruses.

@

E-Mail Bombs

Many viruses and worms are spread as attachment of e-mails. Once your computer is infected, the

Email Bombs are a type of Denial of Service (DoS) attack which target mail servers. “Email bombs” occur when you receive a large number of E-mail messages in a very

1) tab bar 2) pop-up helpe 3) tab row 4) address bar 5) None of these A device designed to read information encoded onto a small plastic card is ________. 1) light pen 2) pun chard card 3) magnetic tape 4) magnetic 5) badge reader The vast network of computers that connects millions of people all over the world is called______. 1) LAN 2) web 3) hypertext 4) internet 5) None of these Resolution of laser printer is specified in terms of ________ 1) DPI 2) LPM 3) CPM 4) PPM 5) None of these The binary equivalent of decimal number 98 is_______ 1) 1110001 2) 1110100 3) 1100010 4) 1111001 5) None of these Track ball is _______. 1) programming devices 2) pointing device 3) output device 4) software device 5) printing device Antivirus software is an example of_______. 1) business software 2) an operating system

3) a security utility 4) an office suite 5) None of these Lycos is known as _____ 1) website 2) internet radio 3) search engine 4) messenger 5) None of these By _______, text can be made more attractive in different colors, shapes and sizes. 1) word art 2) picture 3) word art text box 4) mail merge 5) None of these Which of the following has been made by research facility of digital electronic corporation of USA? 1) Yahoo 2) AltaVista 3) Web crawler 4) Google 5) All of these Which of the following function is used to come out (quit) from e-mail account? 1) Sign in 2) Sign up 3) Sign down 4) Sign out 5) Sign X Which tag is given to invoke form from HTML language? 1)
2) 3) 4) < Form> < Involve> 5) None of these Where is your file save by default when works with any

@ E-mail Viruses and Worms

MODEL QUESTIONS 1. Every computer connected to an intranet or extranet must have a distinct________. 1) firewall 2) proxy server 3) IP address 4) domain name 5) None of these 2. A file extension is separated from the main file name with a (n) _______, but no spaces. 1) question mark 2) exclamation mark 3) underscore 4) period 5) None of these 3. A tuple is a______. 1) column of a table 2) two-dimensional table 3) row of a table 4) key of a table 5) None of these 4. Primary memory is used by the_____. 1) user 2) input device 3) CPU 4) All of these 5) None of these 5. _____ was the precursor to internet as we know it today. 1) ARPANET 2) USENET 3) TELNET 4) DBMS 5) None of these 6. The _____________ enables you to simultaneously keep multiple web pages open in one browser window.

E-MAIL THREATS

Viruses and Worms may spread your network computers also. These malwares can send your private information to attackers, destroy your precious data or disrupt productivity.

7.

8.

9.

10.

11.

12.

13.

14.

15.

16.

17.

18.

short time to overflow the mailbox or overload the server. HOW TO MITIGATE E-MAIL THREATS? Your E-mail server should be equipped with a trusted and updated anti-virus application and spam filters to stop spam, viruses, and other unwanted content before they reach your infrastructure and users. Antivirus application and spam filters should actively protect you against email bombs and other attacks, and greatly reduce the impact of spam and viruses. Most popular encryption methods available for E-mails are Secure/Multipurpose Internet Mail Extensions (S/MIME) and PGP.

@

@

Secure/Multipurpose Internet Mail Extensions (S/MIME)

MIME (Multi-Purpose Internet Mail Extensions) is an extension of Simple Mail Transfer Protocol (SMTP). MIME provides the ability to transfer different types of data formats like audio, video, images, compressed files, and applications etc as attachments. The MIME header is inserted at the beginning of the Email, and the E-mail clients use the MIME information to determine which program associated with the attached file. MIME does not provide computer program? 1) My Document 2) My Folder 3) My Shortcut 4) My Computer 5) None of these 19. _________ does works related to exchange of data between the computers. 1) Sound card 2) Modem 3) Expansion slot 4) Network card 5) None of these 20. C++ is a/an ___________ language. 1) unnecessary 2) assembly 3) developed 4) machine 5) object oriented 21. Which of the following is not an input unit?

any security to the E-mails. S/MIME is a protocol that adds digital signatures and encryption to Internet MIME messages. S/MIME provides authentication, message integrity and non-repudiation of origin (using digital signatures) and privacy and data security (using encryption) to E-Mails. E-mail Messages are encrypted using a symmetric encryption and a public-key algorithm is used for key exchange and digital signatures. DES, 3DES, or RC2 encryption can be used for encryption.

@ PGP (Pretty Good Privacy) PGP (Pretty Good Privacy) is another encryption method for Emails. PGP uses both symmetric encryption and asymmetric encryption. PGP uses symmetric encryption algorithm to encrypt the E-mail message to be sent. After encrypting the E-mail message PGP encrypts the symmetric key used to encrypt the Email message with the public key of the intended recipient. The encrypted key and E-mail message are then sent to the intended recipient. At the receiving side, PGP will first decrypt the symmetric key with the private key supplied by the recipient and will then use the decrypted symmetric key to decrypt the E-mail message. 1) Monitor 2) Mouse 3) Scanner 4) Touch pad 5) Microphone 22. Apple was established on April 1 of ___________ 1) 1976 2) 1978 3) 1979 4) 1980 5) 1981 23. “Comic Sans Ms” is example of ____________. 1) font type 2) font design 3) font layout 4) font structure 5) font face

KEY 1) 3; 6) 3; 11) 2; 16) 4; 21) 1;

2) 4; 7) 5; 12) 3; 17) 2; 22) 1;

3) 3; 8) 4; 13) 3; 18) 1; 23) 5.

4) 3; 9) 1; 14) 1; 19) 4;

5) 1; 10) 3; 15) 2; 20) 5;

Tenth Class (EM & TM) New Syllabus

SAKSHI EDUCATION

❁ Bit banks Study Material ❁ Model Papers ❁ 2015 Question Papers ❁

Also, Physics Concepts Science in Daily Life Map Pointing

www.sakshieducation.com

Computer Awareness 17-Dec-15.pdf

Computer Awareness 17-Dec-15.pdf. Computer Awareness 17-Dec-15.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Computer Awareness ...

391KB Sizes 0 Downloads 161 Views

Recommend Documents

Computer Awareness Quiz.pdf
Computer Awareness. Questions and. Answers. Click How 3/1/17 Current Affairs. Page 1. Computer Awareness Quiz.pdf. Computer Awareness Quiz.pdf. Open.

TNPSC Computer Awareness Questions in Tamil - tnpsclink.pdf ...
Computer Tabulating and recording Company எ ப义 தா இꒌ ேபா义 ஐ.ப孶 .எꏌ எ ற ெபய 鿌 . அைழ கꒌ ப䜬கிற义 . 7.

TNPSC Computer Awareness Questions in Tamil - tnpsclink.pdf ...
Page 1 of 2. Stand 02/ 2000 MULTITESTER I Seite 1. RANGE MAX/MIN VoltSensor HOLD. MM 1-3. V. V. OFF. Hz A. A. °C. °F. Hz. A. MAX. 10A. FUSED.

Computer Awareness -1.pdf
3) Directory 4) Data space. 5) None ... 1) If while executing a program the power goes off, all the instructions and data in ... Displaying Computer Awareness -1.pdf.

Tnpsc Computer Awareness Questions and Answers Tamil_tnpsclink.pdf
Page 2 of 2. TNPSC Computer Awareness Questions and Answers in Tamil. WWW.TNPSCLINK.IN. 24. கணݍ ன ம╌ ைஸ (Computer Mouse).

Computer Awareness 02-03-2017.pdf
Model Questions. 1. Which type of computers use the .... 4) Data mining 5) None of these. 30. A hard copy of ... Microsoft PowerPoint and Corel. are examples of ...

Tnpsc Computer Awareness Questions and Answers ...
Page 2 of 2. Tnpsc Computer Awareness Questions and Answers Tamil_tnpsclink.pdf. Tnpsc Computer Awareness Questions and Answers Tamil_tnpsclink.pdf.

Download-SBI-Clerk-Computer-Awareness-Pocket-Knowledge-here ...
Download-SBI-Clerk-Computer-Awareness-Pocket-Knowledge-here.pdf. Download-SBI-Clerk-Computer-Awareness-Pocket-Knowledge-here.pdf. Open. Extract.

Relating pitch awareness to phonemic awareness in ...
May 30, 2011 - suggesting that dyslexia may arise from a difficulty in processing ... 1 Department of Neurology, Beth Israel Deaconess Medical Center, Harvard Medical ... (which we call pitch awareness) should be positively associated.

Nature Awareness Program
Apr 27, 2012 - Nature is exciting, inspiring, refreshing and constantly changing It is full of mysteries to be marveled at and beauty to be admired. However, today's children rarely have an opportunity to explore their connection with nature. Isha Na

Awareness in death
Jan 4, 2017 - a The balance between awareness and pain medication. Sadhguru spiritual leader. Awareness in death uestioner: I recently lost a friend of ...

Crisis Awareness -
Nov 1, 2014 - Esther Chen. - Timer's Introduction. CL Project 4. 2. Katherine Fan. - Grammarian's Introduction & Word of the Day. 2. HelenLiang. - Introduction ...

Fasting in self awareness
Jul 24, 2013 - can identify it they stop the nonsense of. "so many calories, so much protein and so much mineral should be eaten," and just listen to the body.

Cultural Awareness Guide.pdf
of the particular AI/AN community. Service providers should use this guide. to ensure the following Five Elements. of Cultural Competence* are being. addressed ...

Situational Awareness Hazardous Weather Discussion
Jan 29, 2015 - Impacts to New Jersey. Snow, and wintry precipitation overnight Thursday into Friday morning may create slick and snow covered roads. Wind chill temperatures will be low on Friday. We are also watching a system impacting NJ Sunday into

Stalking Awareness Flyer.pdf
Sign in. Page. 1. /. 1. Loading… Page 1 of 1. Page 1. Stalking Awareness Flyer.pdf. Stalking Awareness Flyer.pdf. Open. Extract. Open with. Sign In. Main menu.

BANKING AWARENESS BOOK.pdf
There was a problem loading more pages. Retrying... BANKING AWARENESS BOOK.pdf. BANKING AWARENESS BOOK.pdf. Open. Extract. Open with. Sign In.

Marketing Awareness 290815.pdf
Download. Connect more apps... Try one of the apps below to open or edit this item. Marketing Awareness 290815.pdf. Marketing Awareness 290815.pdf. Open.

2015 Ballin' for Awareness Basketball Tournament Schedule.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 2015 Ballin' for ...

Mindfulness Bibliography Mindful Awareness Research ...
of a mindfulness-based meditation programme for chronic pain management. Journal of ...... on a hospital waiting list: A series of exploratory studies. ..... Luoma, J. B., Kohlenberg, B. S., Hayes, S. C., Bunting, K., & Rye, A. K. (2008). Reducing ..