0% found this document useful (0 votes)
333 views

11th Chapter-2 Revision Notes

A web browser allows users to access websites on the internet by interpreting web page code and presenting content like text, images, and links. Popular threats to internet security include malware, phishing, identity theft, hacking, and spam. Google Search is a search engine that helps users find information online by returning a list of relevant websites in response to search queries.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
333 views

11th Chapter-2 Revision Notes

A web browser allows users to access websites on the internet by interpreting web page code and presenting content like text, images, and links. Popular threats to internet security include malware, phishing, identity theft, hacking, and spam. Google Search is a search engine that helps users find information online by returning a list of relevant websites in response to search queries.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Class-11th Chapter-2, Revision Notes, by Maninder Singh

1. Define Web Browser:

1. A web browser is a software application that allows you to access and view websites
on the internet.

2. It interprets the code of web pages and presents the content like text, images,
videos, and links in a user-friendly format.

3. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge, and
Safari.

2. Use of Quotation Marks in Online Search:

1. Quotation marks are used in online search to find exact phrases or words in the
search results.

2. Placing a phrase or word in quotation marks tells the search engine to look for that
specific phrase or word together, rather than as individual words.

3. Five Internet Security Threats:

1. Malware: Malicious software designed to harm your computer or steal information.

2. Phishing: Fraudulent attempts to deceive users into revealing sensitive information,


such as passwords or credit card details.

3. Identity Theft: Stealing personal information to impersonate someone else for


fraudulent purposes.

4. Hacking: Unauthorized access to computer systems or networks to steal data or


cause damage.

5. Spam: Unsolicited emails or messages, often containing scams or malware.

4. Explain Google Search Engine:

1. Google Search is a search engine that helps you find information on the internet.

2. You can enter keywords or phrases in the search box, and Google returns a list of
relevant websites.

3. Google's algorithms rank the search results based on relevance, popularity, and
other factors.
Class-11th Chapter-2, Revision Notes, by Maninder Singh

5. Bookmark or Favorites:

1. Bookmarks (or Favorites) are shortcuts to your favorite websites saved within your
web browser.

2. They allow you to quickly access frequently visited websites without having to type
the full URL each time.

6. Explain World Wide Web (WWW):

1. The World Wide Web (WWW) is an interconnected system of websites and web
pages accessible over the internet.

2. It enables users to access and share information, multimedia content, and services
worldwide.

3. The WWW uses hyperlinks to connect web pages, allowing users to navigate
between different websites easily.

7. Four Online Search Techniques:

1. Using Quotation Marks: As mentioned earlier, use quotation marks to search for
exact phrases.

2. Using Specific Keywords: Use relevant and specific keywords to narrow down search
results.

3. Using Advanced Search Filters: Utilize advanced search options to filter results by
date, location, or file type.

4. Checking Cached Pages: If a website is temporarily down, you can access its cached
version from the search results.

8. Advantages and Disadvantages of Online Shopping:

- Advantages:

1. Convenience: Shop from home at any time.

2. Variety: Access to a wide range of products and stores.

3. Price Comparisons: Easily compare prices across different websites.

- Disadvantages:

1. Lack of Physical Examination: Unable to touch or try products before purchase.

2. Shipping Delays: Waiting for delivery of products.

3. Security Concerns: Risk of online fraud and data breaches.


Class-11th Chapter-2, Revision Notes, by Maninder Singh

9. What is Social Networking:

1. Social Networking is an online platform where users can create profiles, connect
with others, and share content.

2. It allows people to communicate, share updates, photos, and videos, and build
virtual social connections.

10. Three Social Networking Sites:

1. Facebook: A popular social networking site for connecting with friends and family.

2. Instagram: A platform for sharing photos and videos with a focus on visual content.

3. Twitter: A microblogging site where users can post short messages called tweets to
share information and engage in discussions.

11. FasTag and its Benefits:

1. FasTag is an electronic toll collection system used for making toll payments without
stopping at toll booths.

2. It is affixed to the vehicle's windshield and contains a radio frequency identification


(RFID) chip.

3. Benefits: Faster toll payments, reduced waiting time at toll plazas, improved traffic
flow, and cashless transactions.

You might also like