Introduction To Internet Notes
Introduction To Internet Notes
H. Gopher – Gopher is a system that enables d) Be careful not to use rude or bad language online.
computer users to find servers and files on the Many providers will terminate your account.
internet. Developed at the University of
Minnesota in 1991, Gopher presents menus and e) Don't break any laws. When you're on the net, follow
submenus users can select to specify their the same rules of behaviour that you would in real life.
search. Each Gopher server contains menus for Remember, if it is against the law in the real world, it is
local servers and files and is linked to other against the law in cyberspace.
Gopher servers; its menus change as the
resources available to the system change. There f) Be universal. Other users have different Web
are hundreds of Gopher servers around the browsers, different online services, different email
world. The system of all Gopher servers is called programs etc. So, don't, for example, send out e-mail
Gopherspace. with text formatting -- boldface, italics, indentations, etc.
-- because many other programs will not be able to read
I. World Wide Web - The World Wide Web is a the formatting and the recipients will receive your e-mail
virtual network of websites connected by filled with muddled codes.
hyperlinks (or "links"). Web sites are stored on
servers on the internet, so the World Wide Web g) Be brief whenever possible. No one wants to read
is a part of the internet. through a lot of unnecessary information. If you are
replying to an e-mail, try editing out unimportant
information and anything that is repeated.
III. NETIQUETTE
h) Always identify yourself. If your parents require you
Netiquette is etiquette on the Internet. Since the to use an online name instead of your real one, that's fine
Internet changes rapidly, its netiquette does too, but it's - use your online name consistently. Never send e-mail
still usually based on the Golden Rule. The need for a without including your name at the bottom of the e-mail.
sense of netiquette arises mostly when sending or Similarly, don't post forum messages without identifying
distributing e-mail, posting on Usenet groups, or yourself, this is seen as rude.
chatting. To some extent, the practice of netiquette
depends on understanding how email, the Usenet, i) Make a good impression. Remember that the written
chatting, or other aspects of the Internet actually work word is the only way you can represent yourself online,
or are practiced. so spelling and grammar count. If you are going to be
writing a large
amount of text for other people to see, make sure you
A. List out the Dos and Don’ts while communicating break it up using paragraphs, it will make it easier on the
online eye for those that will read it.
j) Be patient with newcomers. Once you have become Fixed Internet- Home/Office – Fixed access is
an Internet expert, it is easy to forget that you started usually much faster and reliable than mobile and
out as a newbie too. Learning the rules of cyberspace is is used for connecting homes/offices.
much like learning a new language; it takes practice and The main Access mechanisms are:
includes making mistakes. So, if you come across ADSL – over traditional Phone Lines
someone else's mistakes on the net, don't put them (most common).
down, just politely point them in the right direction for Cable – (limited to cable TV areas)
guidance (send them a copy of these rules to get them Fibre broadband – Currently being
started on their way!). Rolled out
1. PLDT
2. Globe
3. Converge ICT
4. SkyCable B. Browsers
2. Google Chrome
3. Microsoft Edge
Hypertext refers to text elements that contain links to -URL is a location or address identifying where
access blocks of text in the same document or some documents can be found on the Internet.
other document. -Tim Berners-Lee and the Internet Engineering Task
Force working group is credited with developing the URL
in 1994.
All URLs are presented in the following order:
Scheme name
Colon and two slashes
Location of the server
The port (optional) and the location of the
resource on the server
Fragment identifier (optional)
scheme://location:port/file-on-
E. Cookies
server.htm?querystring=1
-A cookie (called an Internet or Web cookie) is the term
This looks more complex that it is. The most common
given to describe a type of message that is given to a web
schemes (protocols) are HTTP and HTTPS, which any
browser by a web server. The main purpose of a cookie
WWW user will recognize. The location of the server is
is to identify users and possibly prepare customized Web
generally a domain name. Given this, the following URLs
pages or to save site login information for you.
are much simpler to understand:
-When you enter a website using cookies, you may be
http://www.google.com/default.htm
asked to fill out a form providing personal information;
https://www.google.com/default.htm like your name, email address, and interests. This
information is packaged into a cookie and sent to your
Both these URLs indicate that there is a file named
Web browser, which then stores the information for later
default.htm on a server with the address of
use. The next time you go to the same Web site, your
"google.com". One uses regular HTTP, while the other
browser will send the cookie to the Web server. The
uses a secure version of this scheme.
message is sent back to the server each time the browser
Two common elements of confusion about URLs: requests a page from the server.
The "www" is not actually part of the technical protocol. -A web server has no memory so the hosted website you
Websites just started using this to indicate the user is are visiting transfers a cookie file of the browser on your
using the World Wide Web. This is why if you go to computer's hard disk so that the site can remember who
http://google.com, it redirects to you are and your preferences. This message exchange
http://www.google.com. allows the Web server to use this information to present
you with customized Web pages. So, for example,
Most users access the Internet via a Web browser, which
instead of seeing just a generic welcome page you might
inserts port 80 on HTTP connections behind the scenes.
see a welcome page with your name on it.
This is why if you go to http://www.google.com:80, you
will see the same website as if there were no port Types of Cookies
number.
Session Cookie - Also called a transient cookie, a cookie
that is erased when you close the Web browser. The
session cookie is stored in temporary memory and is not
Finally, the following URL demonstrates a fragment
retained after the browser is closed. Session cookies do
identifier, more commonly known as a query string:
not collect information from your computer. They
http://www.google.com/some-page?search=hello typically will store information in the form of a session
identification that does not personally identify the user.
This is saying that to use the HTTP protocol to send a
request to the website at google.com (over port 80) and Persistent Cookie - Also called a permanent cookie, or a
to ask for "some-page" and send in the search variable stored cookie, a cookie that is stored on your hard drive
"hello". This is why you'll sometimes see an extremely until it expires (persistent cookies are set with expiration
long URL as many variables are being sent to the Web dates) or until you delete the cookie. Persistent cookies
server in more interactive Web applications. are used to collect identifying information about the
user, such as Web surfing behavior or user preferences
D. Favorites and Bookmarks for a specific Web site.
-A "favorite" or "bookmark" is a website address that you What Information does a Cookie store?
manually save to your Web browser of choice for easy
retrieval. Cookies normally do not compromise security, but there
is a growing trend of malicious cookies. These types of
cookies can be used to store and track your activity
online. Cookies that watch your online activity are called
malicious or tracking cookies. These are the bad cookies
to watch for, because they track you and your surfing engines have a lot in common but may have some
habits, over time, to build a profile of your interests. differing features (algorithms) - types of pages or files it
Once that profile contains enough information there is a can target, how the engine searches the index for the
good chance that your information can be sold to an entered keywords, and ranking systems to determine the
advertising company who then uses this profile order of the results based on relevance.
information to target you with interest specific adverts.
Popular Search Engines
Many antivirus programs today will flag suspicious
spyware or adware cookies when scanning your system 1. Google
for viruses.
2. Bing
Clearing Cookies (In Firefox)
3. Yahoo
4. Wolframalpha
5. DuckDuckGo
Subject Directories
A. Search Techniques
https://www.youtube.com/watch?v=erZ3IyBCXdY
Search Engines