IT fourth

Welcome to your IT fourth

Attachments to e-mail messages can be documents or images.

You want to purchase a mobile phone on the website - Flip-kart.com. When doing this, you are using .......... activity of the Internet.

Using the Internet, you cannot listen to songs online.

Parents can use this type of a program to block access to selected websites.

Every day, you receive e-mail messages from unknown senders. What is the term for this type of security threat?

You want to build your own professional web page. You will be able to create web pages by using ………… programming language.

The most common way to access the Internet is through _______.

You cannot buy products online.

Programs that automatically start and operate as a part of your browser are called _______.

Which of the following is an example of a web browser?