Saturday, February 14, 2026

Important Facts about Internet (English)

 

Interesting Facts About the Internet

The Internet is one of the most important inventions that has changed the way the world functions. With every passing day, the internet is becoming important and deeply rooted in our existence. It helps exchange information, do business, run government and whatnot. Here are some facts about the Internet

History

1. Although the internet was formally established in January 1983, its origins trace back to the 1960s with the development of the Advanced Research Projects Agency Network (ARPANET), a system designed to facilitate information sharing among government researchers.

2. The internet was first designed to ensure continuous communication for the United States Department of Defense during a potential nuclear strike in the Cold War. The project became even more pressing after the Soviet Union launched the Sputnik satellite.

3. The development of the internet was the result of collaborative efforts by engineers, researchers, scientists, and programmers. Notably, Vinton Cerf and Robert Elliot Kahn made significant contributions and are therefore commonly recognized as the "fathers of the internet."

4. In 1965, Lawrence Roberts successfully connected two computers, facilitating their first communication. To achieve this connection, Roberts utilized a telephone line and an acoustic modem to transmit message packets carrying digital data.

5. While Nikola Tesla theorized the concept of a "world wireless system" enabling communication without physical lines in the early 1900s, Sir Tim Bernes-Lee invented the World Wide Web in 1989, making information accessible and shareable wirelessly.

6. According to the HuffPost, Mr. Bernes-Lee uploaded the inaugural photograph to the internet via the World Wide Web after its creation. The image depicted four women who collaborated with him at the CERN nuclear research laboratory.

7. Ray Tomlinson, an American computer scientist, developed email in 1974. Although he sent the first email to himself, the contents of that inaugural message remain unknown. At that time, email was limited to plain text due to the absence of formatting features.

8. In 1978, four years after the introduction of email, Gary Thuerk, a computer sales executive, distributed the first unsolicited commercial email via ARPANET, according to Buzzfeed News. His objective was to promote his company's computers through this early form of digital marketing.

9. YouTube was founded on Valentine’s Day in 2005 by Steve Chen, Jawed Karim, and Chad Hurley. All three founders were former employees of PayPal, an American e-commerce company specializing in online financial transactions.

10. On 23 April 2005, Jawed Karim, one of YouTube's co-founders, uploaded the platform's inaugural video. Entitled "Me at the Zoo," it depicted Jawed visiting the San Diego Zoo.

11. Twitter was established in March 2006 in San Francisco, California, by Biz Stone, Evan Williams, Jack Dorsey, and Noah Glass. At launch, Jack Dorsey posted the first-ever tweet: "Just setting up my twttr."

12. According to the Statista Research Department, Twitter recorded over 187 million users worldwide as of the fourth quarter of 2020, with the United States hosting the largest user base.

Usage Statistics

13. According to Statista, there are currently over 4.6 billion internet users worldwide, with 92.6% accessing the internet via mobile devices.

14. Major social media platforms include Facebook, Twitter, YouTube, Instagram, Snapchat, and TikTok. Facebook remains the most widely used platform, boasting at least 2.6 billion active monthly users as reported by Statista.

15. From 2000 to 2020, global internet usage saw an increase of 1,266%, with the Middle East among the regions experiencing the fastest growth.

16. There are more than 1.7 billion websites on the internet today; however, this figure is subject to change as new sites are launched and others are removed.

17. Although the total number of websites is substantial, only approximately 200 million are currently active. Notably, at least 1.5 billion websites are inactive.

18. Google.com is recognized as the world’s most popular website, attracting at least 92.5 billion visits each month.

19. On average, Google.com processes approximately 63,000 search queries per second, totaling over 5.5 billion searches daily and 2 trillion annually, according to HubSpot.

20. A search query is typically answered in 0.2 seconds, involving around one thousand computers, as reported by Internet Live Statistics. The actual retrieval time may vary based on internet connection speed.

21. At least 6,000 tweets are sent globally every second, amounting to roughly 500 million tweets per day.

22. As of 2021, an impressive 99% of internet users in the United States aged between 18 and 29 were active online. Among those aged 65 and above, 75% also utilized the internet, as stated by Statista.

23. Google launched its services in 1998 and subsequently expanded into areas such as social networking, email communication, cloud storage, and video sharing.

24. Google Chrome is presently the leading web browser, with a market share of 64.92%. Other notable browsers include Safari, Firefox, Samsung Internet, UC Browser, Opera, and Internet Explorer, which hold respective market shares of 15.97%, 4.33%, 3.29%, 2.94%, 2.34%, and 1.98%.

25. WordPress, although it is the most frequently targeted content management system (CMS), remains among the most widely used hosting platforms. Specifically, WordPress accounts for a 59.7% market share, supporting more than 22 million active users globally. It hosts several high-profile websites, such as Forbes, Facebook Blog, and The New York Times (NYT).

26. In 2021, over 10 billion devices were connected to the internet, including computers, mobile phones, tablets, wireless routers, car GPS units, and servers. Experts anticipate this figure will continue to rise in the coming years as Internet of Things (IoT) technology becomes increasingly prevalent.

Interesting Facts

27. Marcel Fernandes Filho, a Brazilian teenager, set the Guinness World Record as the world's fastest texter by typing a 25-word message in just 18.19 seconds, according to USA Today. The message was: “The razor-toothed piranhas of the genera Serrasalmus and Pygocentrus are the most ferocious freshwater fish in the world. In reality, they seldom attack a human.”

28. Due to high demand for long-distance information exchange and internet-based technology, the internet reached 50 million users within five years of its launch. Its rate of adoption remains strong as technology continues to attract more users.

29. The online dating industry earns at least $1 billion in annual revenue. Many people in the United States now pay monthly subscription fees on dating platforms to seek relationships.

30. PC Magazine defines internet surfing as searching for information online by clicking hyperlinks to move between websites. The term was coined by Jean Armor Polly, a New York librarian who was among the first to offer public computer and internet access. She's also known as the "Net Mom."

31. Founded in 2009 by Sina Corporation, Sina Weibo is a Chinese social media platform considered one of Asia's most popular websites. For context, Sina Weibo has over 430 million active monthly users, according to the New York Times.

32. Every Facebook user has a unique number linked to their profile for identification. This ID doesn't reveal any personal details but helps differentiate each account. For example, Mark Zuckerberg, Facebook's CEO, has the Facebook ID 4.

33. Nearly half of the world's internet users live in Asia, but India has the largest population without internet access. Around 685 million people in India don't use the internet, followed by China, where 582 million remain offline.

34. On average, a typical United States household spends approximately $1,141 annually on cable and internet services. This amount increased notably during the COVID-19 pandemic due to the rise in remote work among Americans.

35. During the pandemic, most Americans utilized the internet for activities such as browsing social media, gaming, video conferencing, and streaming television. This led to a significant increase in consumption rates, prompting internet providers to impose usage limits, according to the Wall Street Journal (WSJ).

36. The internet stores data exceeding 1,200 petabytes, which is roughly equivalent to 1.2 million terabytes. However, this estimate is based solely on the four largest websites: Google, Facebook, Microsoft, and Amazon.

37. The double slash (//) in internet URLs is unnecessary. According to Berners-Lee, inventor of the World Wide Web, he regrets including the double slash in URL formatting.

38. Taiwan and Yemen represent the countries with the highest and lowest average internet speeds, respectively. Specifically, Taiwan’s average speed is 85.02 Mbps, while Yemen’s is only 0.38 Mbps.

39. Internet outages have substantial economic and operational impacts. They not only cause considerable revenue loss for businesses but also inconvenience students, researchers, scientists, and other professionals who depend on reliable internet access. A 24-hour outage could suspend three billion Google searches and halt the delivery of 196 billion emails.

Testing internet speed. Interesting Facts About The Internet. Image credit – Wil C. Fry

40. The National Aeronautics and Space Administration (NASA) boasts an average internet speed of 91 gigabytes per second, which is approximately 17,800 times faster than that available to the average American consumer.

41. The webcam was originally invented to allow continuous monitoring of a coffee pot. Students at Cambridge University in England created the device so they could check the status of their office coffee pot from their desktop computers.

42. Facebook was initially developed to facilitate communication among Harvard University students using .edu email addresses and photographs. Mark Zuckerberg subsequently introduced this platform to the broader internet, resulting in what became known as Facebook—originally “The Facebook.”

43. Estonia was the first nation to conduct general elections online. Citizens' identification cards contain chips with public-private key pairs, enabling holders to electronically sign documents and vote via the internet.

 

 

Internet Crime

44. While the internet has transformed the world to become better, it is also the reason for the rise of cybercrimes. For instance, according to the Small Business Trends (SBT), at least 40% of cyberattacks target small businesses in the US and beyond. Cybercrime is, so far, the second most reported economic crime in the US.

45. On average, cybercriminals launch about 4,000 ransomware attacks every day and demand at least $1,000 worth of ransom per attack.

46. Yahoo suffered a major data breach in 2013 that led to the exposure of birth dates, security questions, and phone numbers of at least 3 billion of its users.

47. Cybercriminals usually aim for weak passwords to breach networks and devices. It is for this reason that the Maryville University recommends creating strong passwords and updating them regularly to increase network security.

48. WordPress is among the most hacked Content Management Systems (CMS) on the internet. It accounts for approximately 90% of the hacks done on content management systems, as reported by the Digital Information World (DIW).

49. Phishing is a cybercrime term that refers to the use of big-brand fake emails to lure victims into clicking on malicious links, opening spam emails, and login into fake websites. Cybercriminals use phishing to obtain people’s sensitive information such as social security numbers, passwords, and credit card numbers.

50. A study at the University of Maryland revealed that every 39 seconds, hackers attempt to attack computers and other digital devices that are connected to the internet. One in every 3 Americans falls victim to these attacks whenever the hackers succeed in breaching their network systems.

Computer Network Basics in English

 

Fundamental Concepts:

  • Definition: A computer network is a collection of interconnected devices (computers, servers, routers, etc.) that can communicate and share resources.
  • Purpose: Resource sharing (files, printers, internet), communication (email, instant messaging), and data exchange.
  • Nodes: Devices connected to the network.
  • Links: The communication pathways between nodes (wired or wireless).
  • Data Transmission: Data is broken into packets for efficient transmission.

Types of Networks:

  • LAN (Local Area Network): Covers a small geographical area (home, office).
  • WAN (Wide Area Network): Covers a large geographical area (cities, countries).
  • MAN (Metropolitan Area Network): Covers a metropolitan area (city).
  • PAN (Personal Area Network): Covers a very small area, typically for personal devices.
  • WLAN (Wireless Local Area Network): A LAN that uses wireless connections.
  • VPN (Virtual Private Network): Extends a private network across a public network.

Network Topologies:

  • Bus Topology: All devices connected to a single cable (linear).
  • Star Topology: All devices connected to a central hub or switch.
  • Ring Topology: Devices connected in a closed loop.
  • Mesh Topology: Every device connected to every other device (highly redundant).
  • Tree Topology: A combination of star and bus topologies.

Network Devices:

  • Router: Forwards data packets between networks.
  • Switch: Connects devices within a LAN and forwards data packets.
  • Hub: Connects devices within a LAN (less efficient than a switch).
  • Modem: Converts digital signals to analog and vice versa.
  • Firewall: Security device that filters network traffic.
  • Access Point: Enables wireless devices to connect to a wired network.

Network Protocols:

  • TCP/IP (Transmission Control Protocol/Internet Protocol): The foundation of the internet.
  • HTTP/HTTPS (Hypertext Transfer Protocol/Secure): For web browsing.
  • DNS (Domain Name System): Translates domain names to IP addresses.
  • IP (Internet Protocol): Addresses and routes packets.
  • TCP (Transmission Control Protocol): Ensures reliable data delivery.
  • UDP (User Datagram Protocol): Faster but less reliable data delivery.
  • FTP (File Transfer Protocol): For transferring files.
  • SMTP (Simple Mail Transfer Protocol): For sending email.

IP Addressing:

  • IP Address: A unique identifier for a device on a network.
  • IPv4: 32-bit addresses (e.g., 192.168.1.1).
  • IPv6: 128-bit addresses (more addresses, e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
  • Subnet Mask: Defines the network portion of an IP address.
  • Default Gateway: The IP address of the router that connects the local network to other networks.

OSI Model (Open Systems Interconnection):

  • A conceptual framework that standardizes the functions of a telecommunication or computing system, without regard to its underlying internal structure 1 and technology. It characterizes computing functions into a universal set of rules and requirements.  (Ref: 1. brainly.com)
  • 7 Layers:
    • Physical (hardware)
    • Data Link (MAC addressing)
    • Network (IP addressing, routing)
    • Transport (TCP, UDP)
    • Session (managing connections)
    • Presentation (data formatting)
    • Application (user interface).

Security Basics:

  • Firewalls: Prevent unauthorized access.
  • Encryption: Protects data confidentiality.
  • Antivirus/Antimalware: Protects against malicious software.
  • Passwords: Secure access to devices and accounts.
  • VPNs: Create secure connections over public networks.
  • Network segmentation: Isolating parts of the network to limit the damage done by a security breach.

Sunday, February 8, 2026

Computer Basics (MCQ's)


1. URL stands for

(a) Universal Research List
(b) Universal Resource List
(c) Uniform Resource Locator
(d) Uniform Research Locator
(e) None of the above
ANSWER: (c)

2. Which of the following is NOT a goal of the Transaction processing system?
(a) Capture, process and store transactions
(b) Produce a variety of documents related to Routine business activities
(c) Reduce manual effort associated with Processing business transactions
(d) Produce standard reports used for Management decision-making
(e) None of the above
ANSWER: (b)

3. When data changes in multiple lists and all lists are not updated, this causes
(a) Data redundancy
(b) Information overload
(c) Duplicate data
(d) Data inconsistency
(e) None of the above
ANSWER: (d)

4. Data becomes _ when it is presented in a format that people can understand and use.
(1) Processed
(2) Graphs
(3) Information
(4) Presentation
(5) None of these
ANSWER (3)

5. The term _ designates equipment that might be added to a computer system to enhance its functionality.
(1) Digital device
(2) System add-on
(3) Disk pack
(4) Peripheral device
(5) None of these
ANSWER (4)

6. What is the primary difference between viruses and a worm?
(a) A worm has the ability to self-propagate From an infected user’s computer to other Computers
(b) A worm is usually written by a cracker: Script bunnies do not have the skills to Develop a worm program
(c) A virus is very harmful to the computers it Infects: a worm is not a serious, a problem
(d) Anti-virus software is effective in fighting Viruses but not worms
(e) None of the above
ANSWER: (c)

7. You must install this on a network if you want to Share a broadband Internet connection.
(a) router
(b) Modem
(c) Node
(d) Cable
(e) None of these
ANSWER: (a)

8. ______________ is the ability of a device to ‘jump” directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of these
(5) None of these
ANSWER (1)

9. Granting an outside organisation access to Internet web pages is often implemented using a (an)
(a) Extranet
(b) Intranet
(c) Internet
(d) Hacker
(e) None of these
ANSWER: (a)

10. The code that relational database management Systems use to perform their database task is Referred to as
(a) QBE
(b) SQL
(c) OLAP
(d) Sequel Server
(e) None of these
ANSWER: (b)

11. The purpose of the primary key in a database is to
(a) Unlock the database
(b) Provide a map of the data
(c) Uniquely identify a record
(d) Establish constraints on database operations
(e) None of the above
ANSWER: (b)

12. The instructions that tell a computer how to carry out the processing tasks are referred to as computer
(1) Programs
(2) Processors
(3) Input devices
(4) Memory modules
(5) None of these
ANSWER (1)

13. The ________________ is the amount of data that a storage device can move from the storage medium to the
computer per second.
(1) Data migration rate
(2) Data digitizing rate
(3) Data transfer rate
(4) Data access rate
(5) None of these
ANSWER (3)

14. C, BASIC, COBOL and Java examples of _languages.
(1) Low-level
(2) Computer
(3) System programming
(4) High-level
(5) None of the above
ANSWER (2)

15. A______________ is a microprocessor-based computing device.
(1) Personal computer
(2) Mainframe
(3) Workstation
(4) Server
(5) None of these
ANSWER (1)

16. The design of the network is called the network
(a) Architecture
(b) Server
(c) Transmission
(d) Type
(e) None of these
ANSWER: (a)

17. A _____________ converts all the statements in a program in a single batch and the resulting collection of Instructions is placed in a new file.
(1) Converter
(2) Compiler
(3) Interpreter
(4) Instruction
(5) None of these
ANSWER (2)

18. It uses pictures (called icons) and menus Displayed on the screen to send commands to the Computer system
(a) command-based user interface
(b) GUI
(c) System utility
(d) API
(e) None of the above
ANSWER: (b)

19. It contains data descriptions and defines the Name, data type, and length of each field in the Database
(a) Data dictionary
(b) Data table
(C) Data record
(d) Data field
(e) None of these
ANSWER: (a)

20. A is an additional set of commands that the computer displays after you make a selection from the main menu.
(1) Dialog box
(2) Submenu
(3) Menu selection
(4) All of these
(5) None of these
ANSWER (2)

21. Which of the following is NOT a type of Broadband internet connection?
(a) Cable
(b) DSL
(c) Dial-up
(d) Satellite
(e) None of these
ANSWER: (c)

22. in making a field this property shows that it Cannot be left blank
(a) Numeric
(b) Required
(c) Calculated
(d) Validated
(e) None of these
ANSWER: (b)

23. some viruses are triggered by the Passage of time or on a certain date
(a) Boot-sector viruses
(b) Macro viruses
(c) Time bombs
(d) Worms
(e) None of these
ANSWER: (c)

24. What is a backup?
(a) Restoring the information backup
(b) An exact copy of a system’s information
(c) The ability to get a system up and running In the event of a system crash or failure
(d) All of the above
(e) None of the above
ANSWER: (d)

25. The internet is
(a) A large network of networks
(b) An internal communication system for a Business
(c) A communication system for the Indian Government
(d) All of the above
(e) None of the above
ANSWER: (d)

26. Which of the following languages is more suited to a structured program?
A. PL/1
B. FORTRAN
C. BASIC
D. PASCAL
E. None of the above
Answer: Option D

27. A computer-assisted method for the recording and analyzing of existing or hypothetical systems is

A. Data transmission
B. Data flow
C. Data capture
D. Data processing
E. None of the above
Answer: Option B

28. The brain of any computer system is

A. ALU
B. Memory
C. CPU
D. Control unit
E. None of the above
Answer: Option C

29. What difference does the 5th generation computer have from other generation computers?

A. Technological advancement
B. Scientific code
C. Object Oriented Programming
D. All of the above
E. None of the above
Answer: Option A


30. Which of the following computer languages is used for artificial intelligence?
A. FORTRAN
B. PROLOG
C. C
D. COBOL
E. None of the above
Answer: Option B

Important Facts about Internet (English)

  Interesting Facts About the Internet The Internet is one of the most important inventions that has changed the way the world functions. ...