Computer Applications
Case Study 1
Mary has a prepaid Internet plan. She has a data limit of 14 GB. The average size of an E-mail with an attachment that Mary downloads is 1.4 MB.
Answer the questions given below.
(i) Approximately, how many E-mails can Mary download without exceeding her data limit?
(ii) What is E-mail?
(iii) Mary's friend is not able to understand the term attachment in E-mail. Help her to know this.
(iv) Name any two website who provide E-mail services.
Internet
4 Likes
Answer
(i) Data limit of Mary is 14 GB and 1 GB = 1024 MB.
Thus, 14 GB = 1024 x 14 = 14,336 MB
The average size of an email with attachment is 1.4 MB.
To find out the number of emails Mary can download without exceeding her data limit, we need to divide her data limit by the average size of an email with an attachment:
Number of Emails = Data Limit / Average Size of Email
Number of Emails = 14,336 / 1.4
Number of Emails = 10,240
Therefore, Mary can download approximately 10,240 emails without exceeding her data limit.
(ii) E-mail is the most widely used tool to send and receive electronic messages between users over a network such as the Internet.
(iii) Attachments refer to files or documents that are included with an email message. These files can be of various types, such as documents, images, spreadsheets, or any other file format that can be attached to an email.
(iv) Two popular websites that provide email services are:
- Gmail
- Yahoo
Answered By
2 Likes
Related Questions
Yamini is the class coordinator of a school. She has to prepare a table of the names of students, class and the subjects they are good at. Help Yamini to generate the code for displaying this table.
Roll_No Name Class Subject 1 Neha Vth Maths 2 Amit 10th English 3 Sneha IIIrd G.K. Write the HTML code to generate the web page as shown below, considering the specifications that follow. You can write the code for given specifications.

(i) Active link color is Green and Visiting link color is Red.
(ii) Image is from the file "computer.jpg".
(iii) Use horizontal rule wherever required.
(iv) Use ordered and unordered lists wherever required.
(v) The pages are linked as follows:
Page Link Super Computers Super.html Mainframe Computers Main.html Mini Computers Mini.html Micro Computers Micro.html Desktops Desk.html Laptops Laptop.html PDA PDA.html Note: You can use any other attributes that are not mentioned above to produce a similar output.
Write the HTML code to generate the web page as shown below, considering the specifications that follow. You can write the code for given specifications.

(i) Title of the page is "Indian Food".
(ii) Font face of heading is "arial".
(iii) Image used as food1.jpg.
(iv) Table border is 4px and border color is maroon.
(v) Use link as
For Available Food as F1.html
For Dishes Price as F2.html
For Get Recipes as F3.htmlCase Study 2
While discussing about security in Internet, Shreya's uncle told her that there are different protocols used for different purposes on Internet. These protocols are necessary because millions of people exchange a large amount of information on net. If there will be no security protocols then, the worldwide data would not be secure and the net users will lose their faith, security of data is essential in case of online transactions, social media platforms etc. Shreya's uncle told her about one such security protocol which is the SSL protocol.
Answer the questions given below.
(i) What is SSL (Secure Sockets Layer)?
(ii) How is data flow secured in SSL?
(iii) Write two advantages of SSL.
(iv) Name the protocol used for secure login into a remote computer system.