0% found this document useful (0 votes)
14 views7 pages

Configure and Use Internet

The document provides an overview of the Internet, including its origins, basic terminology, and key components such as web browsers, URLs, and search engines. It also discusses common computer security threats, online data storage, and various communication tools available over the Internet. Additionally, it highlights the advantages and disadvantages of email as a communication method.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views7 pages

Configure and Use Internet

The document provides an overview of the Internet, including its origins, basic terminology, and key components such as web browsers, URLs, and search engines. It also discusses common computer security threats, online data storage, and various communication tools available over the Internet. Additionally, it highlights the advantages and disadvantages of email as a communication method.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Introduction to the Internet

The Internet is means of connecting a computer to any other computer anywhere in the world
via dedicated routers and servers. When two computers are connected over the Internet, they can
send and receive all kinds of information such as text, graphics, voice, video, and computer
programs. The internet developed from software called the ARPANET which the U.S military
had developed.
Basic Internet Terms and Terminology
Here is a look at the buzzwords of the world of Internet.
 ARPANET: The acronym stands for Advanced Research Projects Agency Network. ARPA
of the United States Department of Defense developed ARPANET, which became the world’s
first packet switching network. Internet is the successor of ARPANET.
 Internet Service Provider: A company, which provides users with an access to the Internet,
is known as an Internet service provider or Internet access provider. ISP, as it is called, offers
email accounts and other services like remote storage of files for its customers. Here is a word
about choosing a cheap ISP.
 IP Address: It is a way of numerically identifying an entity on a computer network. The
original addressing system known as IPv4, used 32 bit addresses. With the growth of the
Internet, IPv6 came to be used wherein the addresses are composed of 128 bits.
 Cyberspace: This term coined by William Gibson, is used to refer to the computer networks
connected to each other and the content they host. It is often used to refer to the Internet.
 WWW: It is a collection of interlinked documents that are accessible over the Internet. It
consists of millions of web pages that contain text, images, voice and videos. Sir Tim
BernersLee, a British scientist working at CERN, created the World Wide Web.
 Website: A website is a set of web pages consisting of text, audio and video. Web servers host
websites.
 URL: It specifies the location of a resource on the Internet. It consists of the basic address and
path.
 Web Page: Web pages are resources of information. They are generally created in the HTML
format and provide the web users with navigational abilities through hyperlinks to other web
pages on the web.
 Home Page: The term home page is used to refer to the page that is the default page of any
website. It is the main page of a complex website.
 Web Browser: A web browser is a software application that facilitates user interaction with
the text, audio, video and other information that is located on the web.
 Cache: is a server program through which web requests pass.
 HTTP: Hypertext Transfer Protocol, abbreviated as HTTP, is a communications protocol used
for the transfer of information over the Internet. A client makes an HTTP request using a web
browser to which an HTTP response is sent from the server.
 Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged between
the web client and the web server. It is sent by the web server to the web client and returned
unchanged by the client each time it accesses the server.
A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin
website to send state information to a user's browser and for the browser to return the state
information to the origin site.
Cookies are not software. They cannot be programmed, cannot carry viruses, and cannot install
malware on the host computer.
 Session: It is an exchange of information between a computer and its user. It is established for
a certain period of time after which it ends.
 Hyperlink: A reference in a document to another section of the document or to another
document is termed as a hyperlink. Hyperlinks are used to redirect the user from one section of
a page content to another.
Internet Browsers or Web browser
A web browser is the software installed on your computer or mobile that allows you to view web
pages. There are many different types of browsers. Some of them are free and some cost money.
There are so many types of internet browsers are used to upload or download files for different
office intercommunication though it. Examples of web or internet browser
 Mozilla Firefox
 Chrome
 Microsoft Edge
 Safari
 Opera
 UC Browser
 Chedot Browser
1 Mozilla Firefox:
Mozilla's Firefox is one of the fastest internet browsers we tested for navigating between sites
and for fully loading pages. It also proved to be the most secure during our in-house tests using
live malware.

Chrome: Best for Google Drive


Google Chrome comes standard on most Android mobile devices, so it is a good choice for cell
phones and tablets. Chrome is also a good choice for Windows and Mac computers.
Microsoft Edge: Best for battery life
Microsoft Edge comes standard with computers running the Windows 10 operating system, but it
also works on both Android and iOS cell phones. It isn’t compatible with older Windows
versions
Opera:
Opera is decently fast, about on par with Firefox and Chrome when it comes to initial startup,
site navigation and page loading. It’s compatible with both Windows and Mac computers, and
works on iOS and Android mobile devices. The URL bar doubles as a search bar, and it has
stacking, which means you can drag and drop open tabs in the order you want them.
1. UC Browser: -
UC Browser is a light, smart browser that gives users the fastest mobile web browsing
experience. The app also has a smart download feature so you can easily download files on spot.
One of the most talked about features is UC News.
Accessing a particular site using its URL
Each website is located at a unique global address called a Uniform Resource Locator (URL).
When you know the address of a web site it is much easier to locate
Uniform Resource Locator (URL) is a unique address for Internet resources that are available
through a web browser, including files or directories.
URL’s specify three pieces of information needed to retrieve a document:
 The protocol to be used
 The server address and port to which to connect
 The path to the information
The format for a URL is: Protocol://server-name: port/path. For example, www.google.com
Top Computer Security Threats
These five common computer security threats could ruin you if left undetected.
1. Botnets
Botnets are a collection of software robots that infect other computers, called zombies.
A zombie is a computer connected to a network that has been compromised by a hacker, a virus
or a Trojan.
2. DDOS Attacks
DDOS stands for distributed denial-of-service.
A server slows down, or worse, a shutdown, spells catastrophe.
3. Mobile Malware
Using infected apps, hackers steal information with mobile malware.
4. Phishing
Also known as spoofing, phishing is a common cyber scam: easy to do with effortless results.
Hackers bait the hook with fake text messages, websites, and emails appearing legitimate. They
ask you to submit information or update an account.
5. Ransomware
One of the worst Internet threats is ransomware. It’s a type of malware designed to restrict access
to your computer
Ransomware has two flavors: lock screen and encryption. Lock screen ransomware prevents you
from accessing your computer. Encryption ransomware locks up your files on your hard drive,
shared network, USB, or the cloud
Observing OHS
Occupational health and safety (OHS) is a practice that deals with the safety, health, welfare and wellbeing of
people when they are at work.

Introduction to Search Engines


A search engine is a tool we use to find websites and information on the Internet. Search engines
will search other computers connected to the Internet and classify the files they find on these
computers.
Common search engines
The most commonly used search engines include:
 Google
 Yahoo
 MSN
 Lycos
 AltaVista
 Netscape
 Ask

Introduction to online Data Storage


Online data storage refers to the practice of storing electronic data with a third-party service
accessed via the internet. It’s an alternative to traditional local storage (such as disk or tape
storages) and portable storages (such as optical medias or flash drives). It can also be called”
hosted storage” or “cloud storage”.
Benefits of online storage
One of the biggest benefits of online storage is the ability to access data from anywhere. As the
number of devices, the average person uses continues to grow, syncing or transferring data
among devices has become more important. Online data storages also offer distinct advantages
for backup and disaster recovery situations because it’s located off site
Introduction to communication
Internet commination
Internet communication refers to communicating with people over the internet. It could be in any
form: messages, voice, or video calls. One of the major advantages of internet communication
over traditional communication is cost savings.
Internet communication is referred to as the sharing of information ideas or simply words over
the World Wide Web or the Internet. The Internet consists of a worldwide string of connected
networks that exchanges data through packet switching using the standardized Internet Protocol
Suite (TCP/IP).
The internet provides many effective communication tools, including e-mail, mailing lists,
discussion groups, chat services, web conferencing, blogs, and RSS feeds. These various tools
allow you to communicate one-to-one or one-to-many, depending on your communication needs.
Measurements of effective commination
The Internet communication has various characteristics to measurements the effectivity
including:
 No physical barriers
 Decentralized
 Ubiquitous
 Ambient
 Global
 24 hours per available 7 days,
 Real time interaction
 Increased data accuracy
 Increased interaction process
 Multiple user participation
 Open and transparent exchange
 Sharing of information
 Increased speed of transmission of information

Communication tools
The process by which people create, exchange, and perceive information using networked
communication classifications. It also includes non-networked computers that facilitate
encoding, transmitting, and decoding information. Basic Communication Tools are: -  Email.
 Telephones.
 SMS/Text Messaging.
 Cell and Data Plans.
 Video and Web Conferencing.
 Social Networking Sites.
 G-Suite and Microsoft 365/Office.
Example 1: - EMAIL
Email is one of the first and most popular forms of electronic communication. It allows the user
to send and receive files and messages over the internet, and can be used on a wide variety of
devices. Here are some of the advantages and disadvantages of email.
Advantages of email
 Email is a free tool.
 Email is quick. Once you have finished composing a message, sending it is as simple as
clicking a button. Once it is sent and delivered, it can be read almost immediately.
 Email is simple. It is easy to use, email allows for the easy and quick access of information
and contacts.
 Email allows for easy referencing. Messages that have been sent and received can stored, and
searched through safely and easily.
 Email is accessible from anywhere – as long as you have an internet connection.
 Email is paperless, and therefore, beneficial for the planet.
 Email allows for mass sending of messages, you can send one particular message to several
recipients all at once.
 Email allows for instant access of information and files.

Disadvantages of email
 Email could potentially cause information overload.
 Email lacks a personal touch.
 Email can be disruptive.
 Email cannot be ignored for a long time.
 Emails can cause misunderstandings.
 Email messages can contain viruses.
 Email should be kept short and brief.
 Email requires timely responses.
Internet protocols for communication
The most important protocols for data transmission across the Internet are TCP (Transmission
Control Protocol) and IP (Internet Protocol). SMTP as the name suggests, Simple Message
Transfer Protocol is responsible for email transfers between email. Simple Message Transfer
Protocol (SMTP) is responsible only for sending emails.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy