0% found this document useful (0 votes)
11 views44 pages

Final ppt Lecture L01 and L02

The document provides an overview of the Internet, defining it as a global network of interconnected computer systems that allows users to share information and communicate. It covers the history of the Internet, basic terminology, and concepts such as IP addresses, web browsers, and Internet security. Additionally, it discusses the importance of proper security measures and the role of various Internet services and protocols in facilitating communication and information access.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views44 pages

Final ppt Lecture L01 and L02

The document provides an overview of the Internet, defining it as a global network of interconnected computer systems that allows users to share information and communicate. It covers the history of the Internet, basic terminology, and concepts such as IP addresses, web browsers, and Internet security. Additionally, it discusses the importance of proper security measures and the role of various Internet services and protocols in facilitating communication and information access.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

1

LO1. Access Internet


2
3
what is internet
Definition, use, and basic terminologies of Internet
 The Internet, sometimes called simply "the Net," is a
worldwide system of computer networks - a network
of networks in which users at any one computer can,
if they have permission, get information from any
other computer (and sometimes talk directly to users
at other computers).
Cont… 4

 The internet is computer based global information system.


 It is composed of many interconnected computer networks.
 Each network may link thousands of computers enabling them to
share information.
 The internet has brought a transformation in many aspects of life.
 It is one of the biggest contributors in making the world into a
global village. Use of internet has grown tremendously since it
was introduced. It is mostly because of its flexibility.
Cont… 5

 Theinternet developed from software called


the ARPANET which the U.S military had
developed. It was only restrict to military
personnel and the people who developed it.
Only after it was privatized was it allowed to
be used commercially.
Cont. 6

 The
internet has developed to give many benefits to
mankind.
 Theaccess to information is one of the most
important. Student can now have access to libraries
around the world.
 Some charge a fee but most provide free services.
Before students had to spend hours and hours in the
libraries but now at the touch of a button students
have a huge database in front of them
Basic Internet Terms and 7

Terminology
 ARPANET: The acronym stands for Advanced Research Projects
Agency Network. ARPA of the United States Department of Defense
developed ARPANET, which became the world’s first packet
switching network. Internet is the successor of ARPANET.
 Internet Service Provider: A company, which provides users with
an access to the Internet, is known as an Internet service provider
or Internet access provider. ISP, as it is called, offers email
accounts and other services like remote storage of files for its
customers. Here is a word about choosing a cheap ISP.
8
 IP Address: It is a way of numerically identifying an entity on a
computer network. The original addressing system known as IPv4,
used 32 bit addresses. With the growth of the Internet, IPv6 came
to be used where in the addresses are composed of 128 bits.
 Cyberspace: a computer Network Consisting worldwide network of
computer that use the TCP/IP Network protocols to Facilitate Data
Transmission and Exchange.
 WWW: It is a collection of interlinked documents that are
accessible over the Internet. It consists of millions of web pages
that contain text, images, voice and videos. Sir Tim Berners-Lee, a
British scientist working at CERN, created the World Wide Web.
9
→ Website:A website is a set of web pages consisting of text, audio
and video. Web servers host websites.
→ URL: It specifies the location of a resource on the Internet. It
consists of the basic address and path.
→ Web Page: Web pages are resources of information. They are
generally created in the HTML format and provide the web users
with navigational abilities through hyperlinks to other web pages on
the web.
→ Home Page: The term home page is used to refer to the page that is
the default page of any website. It is the main page of a complex
website.
10
 Web Browser: A web browser is a software
application that facilitates user interaction with the
text, audio, video and other information that is
located on the web.
 Cache: Web browsers maintain a cache of recently
visited web pages. Some of them use an external
proxy web cache, which is a server program through
which web requests pass. This enables the browsers
to cache frequently visited pages. Even search
engines make available already indexed web pages
through their caches.
11

 HTTP: Hypertext Transfer Protocol, abbreviated as HTTP, is a


communications protocol used for the transfer of information over
the Internet. A client makes an HTTP request using a web browser
to which an HTTP response is sent from the server.
 Web Cookie: Also known as an HTTP cookie, it is piece of text that
is exchanged between the web client and the web server. It is sent
by the web server to the web client and returned unchanged by the
client each time it accesses the server.
 Session: It is an exchange of information between a computer and
its user. It is established for a certain period of time after which it
ends.
12
 Hyperlink: A reference in a document to another section of the
document or to another document is termed as a hyperlink.
Hyperlinks are used to redirect the user from one section of a
page content to another.
 Internet Security: It is one of the major concerns today. As the
Internet acts as a communication platform that can be accessed
by millions of users around the world, it becomes necessary that
proper measures be implemented. Issues like Internet Safety that
deal with the content that is made accessible over the Internet
are equally important. Internet Privacy relates to safeguarding
the privacy of the web users and the sensitive information on the
web from hackers and stalkers.
 Internet - A communication Platform: Internet 13
serves as one of the most efficient means of
communication. Computers from different parts of
the world can be connected to each other to
exchange information, thanks to the Internet. Emails
and chats are excellent means of communication over
the Internet. Blogs and online forums give the
Internet users a platform to reach out to the masses.
Here is a list of the basic Internet terms associated
with the Internet as a communication platform. Also
look at some Internet terms related to the security
threats to network communication.
14
 Email: It is a store-and-forward method of writing, sending and
receiving written messages. Electronic mail is an Internet e-mail
system that uses network-based protocols to exchange messages
between network subsystems.
 Email Address: It identifies the network location to which an
email can be delivered. An email address is a combination of the
username of the mail user and the host name of the mailing
system. It is of the form, ‘username@domain-name’. An email
alias is a forwarding email address. It simply forwards emails to
specific email addresses.
 Spamming: The act of sending unwanted substance 15
messages over an email system is known as spamming.
It is an undesirable use of the electronic messaging
systems.
 Phishing: It is a fraudulent activity of acquiring the
sensitive information by the use of a fake identity
during electronic communication. It is implemented by
means of emails and instant messages wherein a user is
lured to enter his/her details, which are actually
captured by a fraudulent
16
 Hacking: Hacking is the activity of programmatically
gaining access to a computer application that is otherwise
inaccessible. The act of gaining an unauthorized access to a
computer is known as hacking. Hacking of passwords that
leads to breach of email privacy is a threat to
communication over the Internet. Internet crimes refer to
all the criminal activities that are carried over the
Internet.
 Email Scams: With the increase in the use of email
systems, its security needs also rose. Fraudulent users
started tampering with the email systems to breach
security.
 Email Virus: It is a computer code that is transmitted 17
through an email in the form of an attachment. The email
attachment causes the destruction of some of the files on
the receiver computer’s hard disk and is programmatically
emailed to the contacts in the address book of the receiver.
 Internet Bookmark: The Internet browsers of the modern
times aim at enabling the users to organize the web pages
they access. Links once visited can be saved in the favorites
or preferences categories. Bookmarks are usually integrated
into browsers. Social book markings a method used by the
Internet users to store and manage web pages.
 Web Directories: It is a directory, which links to other
websites and organizes those links. They should not be
mistaken as being search engines.
18
 Some Funny and Interesting Internet Terms
 Googling: The Google search engine, being the most
popularly used one, has made the word, ‘Google’
synonymous to the concept of search engines. Searching
the Internet by using the Google search engine is known as
googling.
 Copy pasta: If a text is copy pasted from somewhere and
posted in a forum, it is termed as a copy pasta. The source
is often unknown in such cases. Are you into copy pastas?
 Ego surfer: The web users who search over the Internet for
themselves fall under the class of ego surfers. I am sure
most of you play an ego surfer once in a while.
19
 Netiquette: This term is short for net etiquette and refers to the principles
of courtesy and consideration for the people using the Internet. It refers to
certain basic principles to adhere to while using the Internet. The general
ethical principles to be followed in relation to using mailing systems of the
Internet are termed as email etiquettes.
 Trashier: The users who search over the Internet using all possible means,
sometimes even risking the Internet security are known as thrashers.
 Troll: Trolls are the users who try to become infamous on chat by introducing
disturbing links, mimicking other users’ posts and profiles and fighting with
others.
 You tuber: A person who is addicted to watching videos on the Internet is
referred to as a you tuber.
 Makeup and structure of web addresses 20
 Web Sites and URLs
 A Web site is simply data that is stored on a WWW server and which
can be freely accessed by people 'surfing the Net'. For instance
Microsoft have their own Web site from which you can download
information and software.
 The trouble is that you have to know the address of the Web site; in
much the same way as if you want to phone someone you have to
know his or her phone number.
 The address of a Web site is given by something called its URL
(Uniform Resource Locator). The structure of the URL is very
precise. For instance, if you wish to use your Web browser to visit
the Microsoft Web site you would have to use the URL below.
 http://www.microsoft.com 21
 Thus if you wish to visit the Web site of the company
that produced this training material you would use
the URL:
 http://www.cctglobal.com
 Due to the very large number of organizations who
now have Web sites, you can also use a search
engine, in which you can enter a word or phrase
connected with what you wish to find and it will
then display sites that match the information that
you have entered. The results can be overwhelming
however. A recent search using the search words "PC
courseware" displayed a list of 4.5 million sites
containing these words!
What is a hyperlink? 22

A hyperlink is simply part of the text (or graphic)


on a Web page, that when clicked on will
automatically:
 Take you to a different part of the same page
 Take you to a different page within the Web site
 Take you to a page in a different Web site
 Enable you to download a file
 Launch an application, video or sound
E-Mail Privacy
23
 When you send a message by e-mail, the message is broken
into packets and the packets are sent out over the
Internet.
 The number of packets depends on the size of the message.
 Each message has the Internet address of the sender (your
address) and the address of the recipient.
 Packets from a single message may take different routes to
the destination, or may take different routes at different
times. This works well for the Internet and for you since
packets are generally sent through the best path depending
on the traffic load on the Internet, the path doesn't depend
on certain systems being in operation, and all you have to
give is the address of the destination.
Electronic Communications Privacy Act
24
The “electronic communication” means any transfer
of signs, signals, writing, images, sounds, data, or
intelligence of any nature transmitted in whole or in
part by a wire, radio, electromagnetic, photo
electronic or photo optical system that affects
interstate or foreign commerce
Encryption
25
 With public key encryption there are two
keys, one public and the other private.
 The public key needs to be known. To send a
message to a friend, you use her or his
public key to encrypt the message.
 Your friend then uses her or his private key
to decode the message after receiving it.
 Internet Security 26
 When you use a computer system connected
to the Internet, you're able to reach a rich
variety of sites and information. By the
same token, any system connected to the
Internet can be reached in some manner by
any of the other computer systems
connected to the Internet. Partaking of the
material on the Internet also means that
you have to be concerned about the
security of your computer system and other
systems.
 You don't want unauthorized persons accessing your 27
information or information belonging to others who
share your system-you want to protect your system
from malicious or unintentional actions that could
destroy stored information or halt your system. You
don't want others masquerading as you. You need to
be concerned about the security of other systems so
you can have some faith in the information you
retrieve from those systems, and so you can conduct
business transactions.
 A lack of security results in damage, theft, and what
may be worse in some cases, a lack of confidence or
trust.
 If you access the Internet by logging into a
computer system, your primary defense against 28
intrusion is your password. You need to choose a
password that will be difficult to guess. This means
choosing a password that's at least six characters
long. You'll also want to use a password contain
upper and lowercase letters and some non-
alphabetic characters. Additionally, the password
shouldn't represent a word, and it shouldn't be
something that's easy to identify with you such as a
phone number, room number, birth date, or license
number.
Selecting good passwords 29
 Because connecting a network to the Internet
allows access to that network, system
administrators and other persons concerned with
network security are very concerned about
making that connection. One device or part of a
network that can help enhance security is called
a firewall.
Internet Browsers 30
Windows Internet Explorer
 (formerly Microsoft Internet Explorer, commonly
abbreviated IE or MSIE) is a series of graphical web browsers
developed by Microsoft and included as part of the
Microsoft Windows line of operating systems,
 starting in 1995. It was first released as part of the add-on
package Plus! for Windows 95 that year. Later versions were
available as
 free downloads, or in service packs.
31

 Internet Explorer has been the most widely used web


browser since 1999, attaining a peak of about 95% usage
share during 2002 and 2003 with Internet Explorer
5 and Internet Explorer 6
Mozilla Firefox
 Mozilla Firefox is a free and open source web browser 32
descended from the Mozilla Application Suite and managed
by Mozilla Corporation. As of August 2011,
 Firefox is the second most widely used browser, with
approximately 30% of
 worldwide usage share of web browsers.
 The browser has had particular success in
Germany and Poland, where it is the most
 popular browser with
55%usagehttp://en.wikipedia.org/wiki/Firefox - cite_note-
statcounter1-10 and 47%
http://en.wikipedia.org/wiki/Firefox - cite_note-
statcounterpoland-11respectively.
Opera
33
 Opera is a web browser and Internet Suite developed by Opera
Software.
 The browser handles common Internet-related tasks such as
displaying web sites, sending and receiving e-mail messages, managing
contacts, chatting on IRC, downloading files via Bit Torrent, and
reading web feeds.
 Opera is offered free of charge for personal and mobile phones.
 Opera does not come packaged with 34
any desktop operating system. However, it is the
most popular desktop browser in some countries,
such as Ukraine. Opera Mini, which is the most
popular mobile web browser as of May 2011, has
been chosen as the default integrated web
browser in several mobile handsets by their
respective manufacturers.
 Operais known for originating many features later
adopted by other web browsers.
 Operaruns Opera runs on a variety of personal
computer operating systems
LO2. Searching the
35

Internet
Searching the Internet 36
Search engines
 A web search engine is designed to search for
information on the World Wide Web and FTP servers.
 The search results are generally presented in a list of
results and are often called hits. The information may
consist of web pages, images, information and other
types of files. Some search engines also mine
data available in databases or open directories.
Unlike web directories, which are maintained by human
editors, search engines operate algorithmically or are a
mixture of algorithmic and human input
What is search engine ? 37

A program that searches for and identifies


for items in a database that correspond to
the key words or characters specified by
the user
 Web search engine is a software system
that is designed to search information on
the world wide web.
Common Examples of Search engine 38

 Google Search or Google Web Search is


a web search engine owned by Google
Inc. Google Search is the most-used search
engine on the World Wide Web,[3] receiving
several hundred million queries each day
through its various services.[4]
39
 Yahoo!Search is a web search engine, owned
by Yahoo! Inc. and was as of December 2009,
the 2nd largest search engine on the web by
query volume, at 6.42%, after its
competitor Google at 85.35% and
before Baidu at 3.67%, according to Net
Applications
40
 Bing Microsoft Bing search engines
ranks websites based on the
Webpage content, the number and
quality of websites that link in to
your pages
How to Search the Internet 41

Effectively
Use of Phrases
 The most powerful keyword combination is the phrase. Phrases are
combinations of two or more words that must be found in the
documents you're searching for in the EXACT order shown. You enter
a phrase - such as "feta cheese" - into a search engine, within
quotation marks.
 Some searches provide specific options for phrases, while others
don't allow them at all; but most will allow you to enter a phrase in
quotation marks. Check the "Help" files of the search engine you're
using to b
Punctuation and Capitalization 42

 Most search engines are insensitive to case: you


can type your queries in uppercase, lowercase,
or a mix of cases. If you use lowercase, most
engines will match on both upper and lower
case; so for general searches, lowercase is the
safest form to use.
 Notall search engines handle punctuation the
same way. When in doubt, consult the "Help" file.
43

Boolean Basics
 "Boolean" searching (named after George Boole, the 19th-
century mathematician who founded the field of symbolic
logic) is a powerful technique that can narrow your search to
a reasonable number of results, and increase the chance of
those results being useful. Boolean searches are simple to
learn and tremendously effective. The three most commonly
used Boolean commands (or "operators") are AND, OR and AND
NOT.
44
 AND means "I want only documents that contain both/all words."
For instance, the search "London" AND "Big Ben" AND "Buckingham
Palace" AND "Trafalgar Square" would return only documents that
contained all four keywords or phrases. AND is the most frequently
used Boolean command.
 OR means "I want documents that contain either word; I don't care
which." The query "London" OR "Big Ben" OR "Buckingham Palace" OR
"Trafalgar Square" would return all documents that contained even
one of these four keywords or phrases. Use OR to string together
synonyms; be careful about mixing it with AND.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy