0% found this document useful (0 votes)
194 views7 pages

CHAPTER 2 INTERNET & THE WORLD WIDE WEB - Part2

This document provides an overview of key concepts related to how the internet and world wide web work, including: 1) Browsers allow users to access websites located on computers with unique addresses, and websites contain web pages with text, images, and other media. 2) URLs uniquely identify websites and their locations, and domain names identify the type of organization. 3) Search engines and their databases help users find information on the internet through keywords. 4) Email, instant messaging, and file transfer allow online communication and sharing of files between computers.

Uploaded by

Morpho Clo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
194 views7 pages

CHAPTER 2 INTERNET & THE WORLD WIDE WEB - Part2

This document provides an overview of key concepts related to how the internet and world wide web work, including: 1) Browsers allow users to access websites located on computers with unique addresses, and websites contain web pages with text, images, and other media. 2) URLs uniquely identify websites and their locations, and domain names identify the type of organization. 3) Search engines and their databases help users find information on the internet through keywords. 4) Email, instant messaging, and file transfer allow online communication and sharing of files between computers.

Uploaded by

Morpho Clo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

CHAPTER 2: INTERNET & THE WORLD WIDE WEB - Part2

LEARNING OUTCOMES:

The student must be able to:


• Explain how websites, webpages, browsers, URLs search tools and search engines work
• Create and compose email accounts, attachments, instant messaging and netiquette
• Learn different kinds of online goldmine
• Determine intrusive internet usage

THE WORLD WIDE WEB (WWW)


• Browsers
• Software for web-surfing
• Examples: Internet Explorer, Netscape Navigator, Mozilla FireFox, Opera, Apple Macintosh browser
• Website
• The location on a particular computer that has a unique address
• Example: www.barnesandnoble.com, www.mcgraw-hill.com
• The website could be anywhere – not necessarily at company headquarters
• Web Pages
• The documents and files on a company’s website
• Can include text, pictures, sound, and video
• Home page
• The main entry point for the website
• Contains links to other pages on the website

COMP1-2 Page 1

EXAMPLE OF FIRST GEN BROWSER

• Uniform Resource Locator (URL)


• A character string that points to a specific piece of information anywhere on the web
• A website’s unique address
• It consists of
○ The web protocol, http
○ The domain name of the web server
○ The directory or folder on that server
○ The file within the directory, including optional extension

• Domain names
• Must be unique
• Identify the website, and the type of site it is
○ www.whitehouse.gov is NOT the same as www.whitehouse.org
○ .gov means government
○ .org means professional or nonprofit organization
• HTTP
• The internet protocol used to access the World Wide Web
• HTTPS
• The secure version of HTTP
• Hypertext Markup Language (HTML)
• The language used in writing and publishing web pages
• The set of tags used to specify document structure, formatting, and links to other documents on the web
• Hypertext links connect one web document to another

COMP1-2 Page 2
• Navigation
• History Lists
○ A list of websites you visited since you opened up your browser for this session
○ Allows you to easily return to a particular site
• Bookmarks
○ Allows you to store the URL from a site on your PC so you can find it again in another browser session
○ To save the URL for a site, click on “Bookmark” in Internet Explorer or Mozilla Firefox
• Or just type in the URL of the page you want to visit

• Web portals
• A gateway website that offers a broad array of resources and services, online shopping malls, email support,
community forums, stock quotes, travel info, and links to other categories.
• Examples: Yahoo, AOL, Microsoft Network (MSN), Lycos, or Google
• Most require you to log in, so you can

COMP1-2 Page 3
• Most require you to log in, so you can
○ Check the home page for general information
○ Use the subject guide to find a topic you want
○ Use a keyword to search for a topic

• Search Services
• Organizations that maintain databases accessible through websites to help you find information on the internet
• Examples: portals like Yahoo Search and MSN, and Google, Ask Jeeves, and Gigablast
• Databases are compiled using software programs called spiders
○ Spiders crawl through the World Wide Web
○ Follow links from one page to another
○ Index the words on that site

• Email & Other Ways of Communicating over the Net


• Email Program
• Enables you to send email by running email software on your computer that interacts with an email server at your ISP
• Incoming mail is stored on the server in an electronic mailbox
• Upon access, mail is sent to your client’s inbox
• Examples: Microsoft’s Outlook Express, Netscape’s Mail, Apple Computer’s Apple Mail, QualComm’s Eudora

• Using email
1. Get an email address, following the format [email protected]
2. Type addresses carefully, including capitalization, underscores, and periods
3. Use the reply command to avoid addressing mistakes
4. Use the address-book feature to store email addresses
5. Sort your email into folders or use filters

• Instant Messaging
• Any user on a given email system can send a message and have it pop up instantly on the screen of anyone logged into
that system
• Examples: AOL Instant Messenger, MSN Messenger, ICQ, AT&T IM Anywhere, Yahoo Messenger
• Not all IM systems interoperate
• To get it, you:
○ download the software
○ connect to the internet
○ register with the service

• FTP – File Transfer Protocol


• A software standard for transferring files between computers with different Operating Systems
○ Microsoft Windows → Linux
Unix → Macintosh OS, and so forth

COMP1-2 Page 4
○ Unix → Macintosh OS, and so forth
• You can transfer files from an FTP site on the internet to your PC
• Know your FTP site!
○ If the FTP site is offering copyrighted material such as music and movies for free, you are breaking US law if you
download files!
○ You may also get a virus or spyware on your PC from them

Telephony, Multimedia, Webcasting, Blogs, E-Commerce

• Internet Telephony
• Uses the internet to make phone calls
• Long-distance calls are either very inexpensive or free
○ With no PC, dial a special phone number to packetize your call
○ With a PC that has a sound card, microphone, Internet connection, and internet telephone software such as
Netscape Conference or Microsoft NetMeeting
• Currently inferior in quality to normal phone connections
• Also allows videoconferencing

• Multimedia on the Web


• Allows you to get images, sound, video, and animation
• May require a plug-in, player, or viewer
○ A program that adds a specific feature to a browser so it can view certain files
○ Example: Adobe Acrobat Reader, RealPlayer, QuickTime
• Multimedia Applets
○ Small programs that can be quickly downloaded and run by most browsers
○ Java is the most common Applet language
○ Microsoft’s Visual Studio creates ActiveX and com objects

• Multimedia on the Web


• Animation
○ The rapid sequencing of still images to create the appearance of motion
○ Used in video games and web images that seem to move
• Video
○ Streaming video is process of transferring data in a continuous flow so you can begin viewing a file before it is
all completely sent
• Audio may be transmitted either:
○ Downloaded completely before the file can be played, or
○ Downloaded as streaming audio

• RSS newsreaders
• Programs that scour the web and pull together “feeds” from several websites to one place

COMP1-2 Page 5
• Programs that scour the web and pull together “feeds” from several websites to one place
• Blog
• Short for web log, a diary-style web page
• Have become popular, both privately and in politics
• Podcasting
• Recording internet radio or similar internet audio programs
• Some radio stations webcast their audio programs over the internet

• E-Commerce
• Conducting business activities online
• B2B Commerce is business-to-business e-commerce
• Online Finance now involves online banking, stock trading online, and e-money such as PayPal
• Online auctions link buyers with sellers
○ eBay is the most well-known example of person-to-person auctions
○ OnSale is a vendor-based auction that buys merchandise and sells it at a discount
○ Priceline is an auction site for airline tickets and other items

Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware

The internet was founded as a collaborative tool based on trust


Not everyone on the internet is honest

• Snooping
• Email is not private
○ Corporate management has the right to view employees’ email
○ Email that travels over the internet may be captured and monitored and read by someone else
○ Not all ISPs protect their customers’ privacy
• Spam: Electronic Junk Mail
• Unsolicited email that takes up your time and may carry viruses or spyware
• Delete it without opening the message
• Never reply to a spam message
• When you sign up for something, don’t give your email address
• Use spam filters
• Spoofing
• Using fake email sender names so the message appears to be from a different source, so you will trust it.
• If you don’t know the sender, don’t open it.
• Phishing
• Using trusted institutional names to elicit confidential information
• Some common schemes look like they are from your bank or from eBay and ask you to “update” your account.
• Don’t do it – the legitimate company already knows your account information!
• If you want to update your information, CALL the number in the phone book, not the number in the email!

COMP1-2 Page 6
• If you want to update your information, CALL the number in the phone book, not the number in the email!
• Pharming
• Redirecting you to an imposter web page.
• Thieves implant malicious software on your PC
• Redirects you to an imposter web page even when you type the correct URL!
• To foil it, type the URL with https first (for http secure)
• Cookies
• Little text files left on your hard disk by some websites you visit
• Can include your log-in name, password, and browser preferences
• Can be convenient
• But they can be used to gather information about you and your browsing habits
• Spyware
• Applications that download without your knowledge
• They hide on your PC and capture information about what is on the PC and what you are doing
• That information is then transmitted to the spyware master’s website on the internet
• Information may be used against you to steal your identity, get credit cards in your name, or for other crimes
• To prevent spyware, you must install and use “Antispyware software” at all times
• Examples: Ad Aware, AntiSpyware, Spybot Search & Destroy, Pest Patrol, SpyCatcher, Yahoo toolbar with Anti -
Spy
• Be careful about free and illegal downloads since they are a source of spyware
• Don’t say “I agree” when you are downloading something – read the fine print
• Beware of unsolicited downloads

COMP1-2 Page 7

You might also like