0% found this document useful (0 votes)
60 views52 pages

Access and Use Internet

The document provides information on the internet including definitions, uses, basic terminology, and concepts. It describes what the internet is, how it originated from ARPANET, and some of the benefits it provides. It also defines common terms related to accessing and using the internet like internet service providers, IP addresses, URLs, web browsers, cookies, and security concerns.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views52 pages

Access and Use Internet

The document provides information on the internet including definitions, uses, basic terminology, and concepts. It describes what the internet is, how it originated from ARPANET, and some of the benefits it provides. It also defines common terms related to accessing and using the internet like internet service providers, IP addresses, URLs, web browsers, cookies, and security concerns.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 52

Training, Teaching and Learning Materials Development Lo

Under

Ethiopian TVET-System

INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level II

LEARNING GUIDE # 22
Unit of Competence: ASSESS THE INTERNET
Module Title: Assessing THE INTERNET
LG Code: ICT ITS2 LO1
TTLM Code: ICT ITS2 TTLM05 0817

LO 1: Access the Internet

Learning guide 21 Date 08-2017 Page 1 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Introduction Learning Guide # 22

This learning guide is developed to provide you the necessary information regarding the following content coverage and topics –

 Introduction to the internet


 Internet browsers review
 basic internet settings and configuration

This guide will also assist you to attain the learning outcome stated in the cover page. Specifically, upon completion of this Learning
Guide, you will be able to –

 Open Internet browser and a home page of personal choice set up by setting internet options
 Adjust display/view modes to suit personal requirements
 Modify toolbar to meet user and browsing needs
 Access and retrieve particular site data
 Load or unload images depending on modem speed, computer and browser capabilities
 Open URL to obtain data and browse link
 Delete cookies and history of internet browser as precaution from virus infection

Learning Activities
1. Read the specific objectives of this Learning Guide.

2. Read the information written in the “Information Sheets 1”.

3. Accomplish the “Self-check” in page.

4. If you earned a satisfactory evaluation proceed to “Information Sheet 2”. However, if your rating is unsatisfactory, see your teacher
for further instructions or go back to Learning Activity #1.

5. Submit your accomplished Self-check. This will form part of your training portfolio.

6. Read the information written in the “Information Sheet 2”.

7. Accomplish the “Self-check” in page.

8. If you earned a satisfactory evaluation proceed to “Information Sheet 3”. However, if your rating is unsatisfactory, see your teacher
for further instructions or go back to Learning Activity #2.

9. Submit your accomplished Self-check. This will form part of your training portfolio.

10. Read the information written in the “Information Sheet 3”.

11. If you earned a satisfactory evaluation proceed to “Operation Sheet” in page . However, if your rating is unsatisfactory, see your
teacher for further instructions or go back to Learning Activity #3.

12. Read the “Operation Sheet” and try to understand the procedures discussed.

13. You can use your working PC to simulate the activity.

14. Do the “LAP test” in page (if you are ready) and show your output to your teacher. Your teacher will evaluate your output either
satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice you on additional work. But if satisfactory you can proceed
to Learning Guide.

Learning guide 21 Date 08-2017 Page 2 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Information Sheet-1 Introduction to the internet

INTERNET
Definition, use, and basic terminologies of Internet
The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of
networks in which users at any one computer can, if they have permission, get information from any other computer (and
sometimes talk directly to users at other computers).

The internet is computer based global information system. It is composed of many interconnected computer
networks. Each network may link thousands of computers
enabling them to share information. The internet has brought a transformation in many aspects of life. It is one of the
biggest contributors in making the world into a global village. Use of internet has grown tremendously since it was
introduced. It is mostly because of its flexibility. Nowadays one can access the internet easily. Most people have
computers in their homes but even the ones who don’t they can always go to cyber cafes where this service is provided.

The internet developed from software called the ARPANET which the U.S military had developed. It was only
restrict to military personnel and the people who developed it. Only after it was privatized was it allowed to be used
commercially.

The internet has developed to give many benefits to mankind. The access to information is one of the most
important. Student can now have access to libraries around the world. Some charge a fee but most provide free services.
Before students had to spend hours and hours in the libraries but now at the touch of a button students have a huge
database in front of them

Basic Internet Terms and Terminology

Here is a look at the buzzwords of the world of Internet.

ARPANET: The acronym stands for Advanced Research Projects Agency Network. ARPA of the United States
Department of Defense developed ARPANET, which became the world’s first packet switching network. Internet is the
successor of ARPANET.

Internet Service Provider: A company, which provides users with an access to the Internet, is known as an
Internet service provider or Internet access provider. ISP, as it is called, offers email accounts and other services like
remote storage of files for its customers. Here is a word about choosing a cheap ISP.

IP Address: It is a way of numerically identifying an entity on a computer network. The original addressing
system known as IPv4, used 32 bit addresses. With the growth of the Internet, IPv6 came to be used wherein the addresses
are composed of 128 bits.

Cyberspace: This term coined by William Gibson, is used to refer to the computer networks connected to each
other and the content they host. It is often used to refer to the Internet.

Learning guide 21 Date 08-2017 Page 3 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
WWW: It is a collection of interlinked documents that are accessible over the Internet. It consists of millions of
web pages that contain text, images, voice and videos. Sir Tim Berners-Lee, a British scientist working at CERN, created
the World Wide Web.

Website: A website is a set of web pages consisting of text, audio and video. Web servers host websites.

URL: It specifies the location of a resource on the Internet. It consists of the basic address and path.

Web Page: Web pages are resources of information. They are generally created in the HTML format and provide
the web users with navigational abilities through hyperlinks to other web pages on the web.

Home Page: The term home page is used to refer to the page that is the default page of any website. It is the main
page of a complex website.

Web Browser: A web browser is a software application that facilitates user interaction with the text, audio, video
and other information that is located on the web.

Cache: Web browsers maintain a cache of recently visited web pages. Some of them use an external proxy web
cache, which is a server program through which web requests pass. This enables the browsers to cache frequently visited
pages. Even search engines make available already indexed web pages through their caches.

HTTP: Hypertext Transfer Protocol, abbreviated as HTTP, is a communications protocol used for the transfer of
information over the Internet. A client makes an HTTP request using a web browser to which an HTTP response is sent
from the server.

Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged between the web client and the
web server. It is sent by the web server to the web client and returned unchanged by the client each time it accesses the
server.

Session: It is an exchange of information between a computer and its user. It is established for a certain period of
time after which it ends.

Hyperlink: A reference in a document to another section of the document or to another document is termed as a
hyperlink. Hyperlinks are used to redirect the user from one section of a page content to another.

Internet Security: It is one of the major concerns today. As the Internet acts as a communication platform that
can be accessed by millions of users around the world, it becomes necessary that proper measures be implemented. Issues
like Internet Safety that deal with the content that is made accessible over the Internet are equally important. Internet
Privacy relates to safeguarding the privacy of the web users and the sensitive information on the web from hackers and
stalkers.

Internet - A communication Platform: Internet serves as one of the most efficient means of communication.
Computers from different parts of the world can be connected to each other to exchange information, thanks to the
Internet. Emails and chats are excellent means of communication over the Internet. Blogs and online forums give the
Internet users a platform to reach out to the masses. Here is a list of the basic Internet terms associated with the Internet as
a communication platform. Also look at some Internet terms related to the security threats to network communication.

Learning guide 21 Date 08-2017 Page 4 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Email: It is a store-and-forward method of writing, sending and receiving written messages. Electronic mail is an
Internet e-mail system that uses network-based protocols to exchange messages between network subsystems.

Email Address: It identifies the network location to which an email can be delivered. An email address is a
combination of the username of the mail user and the host name of the mailing system. It is of the form,
‘username@domain-name’. An email alias is a forwarding email address. It simply forwards emails to specific email
addresses.

Spamming: The act of sending unsolicited bulk messages over an email system is known as spamming. It is an
undesirable use of the electronic messaging systems.

Phishing: It is a fraudulent activity of acquiring the sensitive information by the use of a fake identity during
electronic communication. It is implemented by means of emails and instant messages wherein a user is lured to enter
his/her details, which are actually captured by a fraudulent website.

Hacking: Hacking is the activity of programmatically gaining access to a computer application that is otherwise
inaccessible. The act of gaining an unauthorized access to a computer is known as hacking. Hacking of passwords that
leads to breach of email privacy is a threat to communication over the Internet. Internet crimes refer to all the criminal
activities that are carried over the Internet.

Email Scams: With the increase in the use of email systems, its security needs also rose. Fraudulent users started
tampering with the email systems to breach security.

Email Virus: It is a computer code that is transmitted through an email in the form of an attachment. The email
attachment causes the destruction of some of the files on the receiver computer’s hard disk and is programmatically
emailed to the contacts in the address book of the receiver.

Internet Bookmark: The Internet browsers of the modern times aim at enabling the users to organize the web
pages they access. Links once visited can be saved in the favorites or preferences categories. Bookmarks are usually
integrated into browsers. Social book markings a method used by the Internet users to store and manage web pages.

Web Directories: It is a directory, which links to other websites and organizes those links. They should not be
mistaken as being search engines.

Some Funny and Interesting Internet Terms

Googling: The Google search engine, being the most popularly used one, has made the word, ‘Google’
synonymous to the concept of search engines. Searching the Internet by using the Google search engine is known as
googling.

Copy pasta: If a text is copy pasted from somewhere and posted in a forum, it is termed as a copy pasta. The
source is often unknown in such cases. Are you into copy pastas?

Ego surfer: The web users who search over the Internet for themselves fall under the class of ego surfers. I am
sure most of you play an ego surfer once in a while.

Netiquette: This term is short for net etiquette and refers to the principles of courtesy and consideration for the
people using the Internet. It refers to certain basic principles to adhere to while using the Internet. The general ethical
principles to be followed in relation to using mailing systems of the Internet are termed as email etiquettes.

Learning guide 21 Date 08-2017 Page 5 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Trasher: The users who search over the Internet using all possible means, sometimes even risking the Internet
security are known as trashers.

Troll: Trolls are the users who try to become infamous on chat by introducing disturbing links, mimicking other
users’ posts and profiles and fighting with others.

You tuber: A person who is addicted to watching videos on the Internet is referred to as a you tuber.

Makeup and structure of web addresses

Web Sites and URLs

A Web site is simply data that is stored on a WWW server and which can be freely accessed by people 'surfing
the Net'. For instance Microsoft have their own Web site from which you can download information and software. The
trouble is that you have to know the address of the Web site; in much the same way as if you want to phone someone you
have to know his or her phone number. The address of a Web site is given by something called its URL (Uniform
Resource Locator). The structure of the URL is very precise. For instance, if you wish to use your Web browser to visit
the Microsoft Web site you would have to use the URL below.

http://www.microsoft.com

Thus if you wish to visit the Web site of the company that produced this training material you would use the
URL:

http://www.cctglobal.com

Due to the very large number of organizations who now have Web sites, you can also use a search engine, in
which you can enter a word or phrase connected with what you wish to find and it will then display sites that match the
information that you have entered. The results can be overwhelming however. A recent search using the search words
"PC courseware" displayed a list of 4.5 million sites containing these words!

What is a hyperlink?

A hyperlink is simply part of the text (or graphic) on a Web page, that when clicked on will automatically:

 Take you to a different part of the same page


 Take you to a different page within the Web site
 Take you to a page in a different Web site
 Enable you to download a file
 Launch an application, video or sound

The illustration below displays a fragment of a Web page. The words that are underlined indicate a
hyperlink. By default these text links are normally displayed in blue.

Learning guide 21 Date 08-2017 Page 6 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo

Legal Issues, Ethical Issues, Privacy, and Security

It's useful to take a brief look at the history of the Internet, which is related to some of these issues.

The Internet and the World Wide Web have grown rapidly from a research project into something that involves
millions of people worldwide. Much of the Internet's usefulness comes from the fact that it is shared by users, service
providers, and others, in the sense that each depends on the other and needs to support the other. Hopefully, that sort of
sharing and respect will continue. Your behavior, your expectations for others, and your activities will make the
difference.

"It is important to realize that the Web is what we make it. 'We' being the people who read, the people who teach
children how to surf the Web, the people who put information up on the Web. Particularly the people who make links....
The Web doesn't force anything down your throat. If you are worried that your children are going to read low-quality
information, teach them. Teach them what to read. Teach them how to judge information."

Privacy and Civil Liberties

The Electronic Frontier Foundation (EFF) was formed in 1990 to, among other things, bring issues dealing with
civil liberties related to computing and telecommunications technology to the attention of the public at large, legislators,
and court and law enforcement officials. As a non-profit public interest organization, EFF maintains collections of files
and documents.

E-Mail Privacy

When you send a message by e-mail, the message is broken into packets and the packets are sent out over
the Internet. The number of packets depends on the size of the message. Each message has the Internet address of
the sender (your address) and the address of the recipient. Packets from a single message may take different routes
to the destination, or may take different routes at different times. This works well for the Internet and for you
since packets are generally sent through the best path depending on the traffic load on the Internet, the path
doesn't depend on certain systems being in operation, and all you have to give is the address of the destination.

The packets making up an e-mail message may pass through several different systems before reaching
their destination. This means there may be some places between you and the destination where the packets could
be intercepted and examined.
Learning guide 21 Date 08-2017 Page 7 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Electronic Communications Privacy Act

One example of a law to ensure the privacy of e-mail is the Electronic Communications Privacy Act
(ECPA) passed in 1986 by Congress.

The “electronic communication” means any transfer of signs, signals, writing, images, sounds, data, or
intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photo electronic or
photo optical system that affects interstate or foreign commerce, but does not include (A) any wire or oral
communication; (B) any communication made through a tone-only paging device; (C) any communication from a
tracking device (as defined in section 3117 of this title); or (D) electronic funds transfer information stored by a
financial institution in a communications system used for the electronic storage and transfer of funds.

Title I of the ECPA protects wire, oral, and electronic communications while in transit. It sets down
requirements for search warrants that are more stringent than in other settings.

Title II of the ECPA, the Stored Communications Act (SCA), protects communications held in electronic
storage, most notably messages stored on computers. Its protections are weaker than those of Title I, however, and
do not impose heightened

standards for warrants. Title III prohibits the use of pen register and/or trap and trace devices to record dialing,
routing, addressing, and signaling information used in the process of transmitting wire or electronic
communications without a court order.

The Electronic Communications Privacy Act of 1986 (ECPA Pub. L. 99-508, Oct. 21, 1986, 100 Stat.
1848, 18 U.S.C. § 2510-2522)was enacted by the United States Congress to extend government restrictions
on wire taps from telephone calls to include transmissions of electronic data by computer. Specifically, ECPA
was an amendment to Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (the Wiretap Statute),
which was primarily designed to prevent unauthorized government access to private electronic communications.

The ECPA also added new provisions prohibiting access to stored electronic communications, i.e.,
the Stored Communications Act,18 U.S.C. §§ 2701-12. The ECPA also included so-called pen/trap provisions
that permit the tracing of telephone communications. §§ 3121-27. Later, the ECPA was amended, and weakened
to some extent, by some provisions of the USA PATRIOT Act. In addition, Section 2709 of the Act, which
allowed the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to
disclose records about their customers, was ruled unconstitutional under the First (and
possibly Fourth) Amendments in ACLU v. Ashcroft (2004). It is thought that this could be applied to other uses
of National Security Letters.

Learning guide 21 Date 08-2017 Page 8 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Encryption

With public key encryption there are two keys, one public and the other private. The public key needs to be
known. To send a message to a friend, you use her or his public key to encrypt the message. Your friend then uses her or
his private key to decode the message after receiving it.

You can obtain a version of public key encryption software called PGP, Pretty Good Privacy.

Sexually-Explicit Material and Pornography

There are a number of programs that can be installed on a computer to restrict the material that can be accessed on
the World Wide Web. The programs work with lists of Web and ways of describing the content of Web pages to filter
material. One source of information about these programs and related topics is PEDINFO Parental Control of Internet
Access.

The culture of the Internet has fostered personal rights and liberties, so some argue it's content ought not be
restricted or censored. There are laws banning or restricting pornography; some countries have more stringent laws than
others and some laws restrict the distribution of the material.

Ethical Issues

Some resources for guidelines for Ethics and Net Etiquette

In January 1989 the Internet Architecture Board (IAB) issued a statement of policy concerning Internet ethics.
This document is referred to as RFC 1087 'Ethics and the Internet'.

An extract of RFC 1087 follows:

The IAB strongly endorses the view of the Division Advisory Panel of the National Science Foundation Division
of Network, Communications Research and Infrastructure which, in paraphrase, characterized as unethical and
unacceptable any activity which purposely:

 Seeks to gain unauthorized access to the resources of the Internet.


 Disrupts the intended use of the Internet.
 Wastes resources (people, capacity, computer) through such actions.
 Destroys the integrity of computer-based information.
 Compromises the privacy of users.

Inappropriate Business Practices

It is common to find advertising, marketing, and commercial activities readily available on the World Wide Web,
and most of is done in a responsible manner.

One particularly offensive means of advertising is called spamming. When used in this way the term means
sending a message to many unrelated newsgroups or interest groups. It's not too hard to do, but it almost always is met
with great opposition and feelings of hatred. One way to deal with it is to send a copy of the message and a complaint
to [email protected].
Learning guide 21 Date 08-2017 Page 9 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Libel

 Defamation—also called calumny, vilification, traducement, slander (for transitory statements), and libel (for
written, broadcast, or otherwise published words)—is the communication of a statement that makes a claim,
expressly stated or implied to be factual, that may give an individual, business, product, group, government,
or nation a negative image. It is usually a requirement that this claim be false and that the publication is
communicated to someone other than the person defamed (the claimant).[1]
 In common law jurisdictions, slander refers to a malicious, false, and defamatory spoken statement or report,
while libel refers to any other form of communication such as written words or images. Most jurisdictions allow
legal actions, civil and/or criminal, to deter various kinds of defamation and retaliate against groundless criticism.
Related to defamation is public disclosure of private facts, which arises where one person reveals information that
is not of public concern, and the release of which would offend a reasonable person. "Unlike [with] libel, truth is
not a defense for invasion of privacy."
 False light laws are "intended primarily to protect the plaintiff's mental or emotional well-being." If
a publication of information is false, then a tort of defamation might have occurred. If that communication is
not technically false but is still misleading, then a tort of false light might have occurred.
 In most civil law jurisdictions, defamation is dealt with as a crime rather than a tort.
 A person who harms another's reputation may be referred to as a famacide, defamer, or slanderer.
The Latin phrase famosuslibellus means a libelous writing.

Intellectual Property and Copyright

The notion of ownership of something, whether it has a physical form, does still make sense as intellectual
property. There are a number of laws and agreements throughout the world to protect intellectual property rights. The
right to copy or duplicate materials can be granted only by the owners of the information. This is called the copyright.
Many documents on the Internet contain a statement that asserts the document is copyrighted and gives permission for
distributing the document in an electronic form, provided it isn't sold or made part of some commercial venture. Even
items that don't contain these statements are protected by the copyright laws of the United States, the Universal Copyright
Convention, or the Berne Union.

Most of the copyright conventions or statutes include a provision so that individuals may make copies of portions
of a document for short-term use. If information is obtainable on the Internet, and there is no charge to access the
information, it often can be shared in an electronic form. That certainly doesn't mean you can copy images or documents
and make them available on the Internet, or make copies and share them in a printed form with others. Quite naturally,
many of the folks who create or work at providing material available on the Internet, expect to get credit and be paid for
their work.

Internet Security

When you use a computer system connected to the Internet, you're able to reach a rich variety of sites and
information. By the same token, any system connected to the Internet can be reached in some manner by any of the other
Learning guide 21 Date 08-2017 Page 10 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
computer systems connected to the Internet. Partaking of the material on the Internet also means that you have to be
concerned about the security of your computer system and other systems.

You don't want unauthorized persons accessing your information or information belonging to others who share
your system-you want to protect your system from malicious or unintentional actions that could destroy stored
information or halt your system. You don't want others masquerading as you. You need to be concerned about the security
of other systems so you can have some faith in the information you retrieve from those systems, and so you can conduct
business transactions.

A lack of security results in damage, theft, and what may be worse in some cases, a lack of confidence or trust.

If you access the Internet by logging into a computer system, your primary defense against intrusion is your
password. You need to choose a password that will be difficult to guess. This means choosing a password that's at least
six characters long. You'll also want to use a password contain upper and lowercase letters and some non-alphabetic
characters. Additionally, the password shouldn't represent a word, and it shouldn't be something that's easy to identify
with you such as a phone number, room number, birth date, or license number.

 Selecting good passwords

Because connecting a network to the Internet allows access to that network, system administrators and other
persons concerned with network security are very concerned about making that connection. One device or part of a
network that can help enhance security is called a firewall.

One type of program that causes problems for Internet users is called a virus. This doesn't necessarily copy your
data or attempt to use your system. However, it can make it difficult or impossible to use your system. A virus is a piece
of code or instructions that attaches itself to existing programs. Just like a biological virus, a computer virus can't run or
exist on its own, but must be part of an executing program. When these programs are run, the added instructions are also
executed.

Internet security is very important to many users, as well it should be. We need to make sure that messages are
private and that monetary transaction and data sources are secure.

The Trail You Leave When You Use the Web. A brief description of log files kept by Web servers, cookies, and
the information about how you use the Web that's saved in the browser's cache and history list.

The Different Types of Search Engines

Although the term “search engine” is often used indiscriminately to describe crawler-based search engines,
human-powered directories and everything in between, they are not all the same. Each type of “search engine” gathers
and ranks listings in radically different ways.

Crawler-Based

Crawler-based search engines such as Google and Yahoo, compile their listings automatically. They “crawl” or
“spider” the web and people search through their listings. These listings are what made up the search engine’s index or
catalogue. You can think of the index as a massive electronic filing cabinet containing a copy of every web page the
spider finds. Because spiders scour the web on a regular basis, any changes you make to a website, or links to or from
your own website, may affect your search engine ranking.

Learning guide 21 Date 08-2017 Page 11 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
It is also important to remember that it may take a while for a spidered page to be added to the index. Until that
happens, it is not available to those searching with a search engine.

Search Engine Optimization (SEO) refers to making changes to a website so that it can attain higher search
positions for specific key phrases in organic results.

Organic results refer to the regular search engine results displayed by crawler-based search engines; as opposed to
sponsored results which are paid advertising.

Directories

Directories such as Open Directory depend on human editors to compile their listings. Webmasters submit an
address, title and brief description of their site and then editors review the submission. Unless you sign up for a paid
inclusion program, it may take months for your website to be reviewed. Even then, there’s no guarantee that your website
will be accepted.

After a website makes into a directory however, it is generally very difficult to change its search engine ranking.
So before you submit to a directory, spend some time working on your titles and descriptions or hire a professional to
submit to directories for you.

Paid Inclusion

Most directories offer some form of paid inclusion. Paid inclusion guarantees your website gets reviewed and/or
indexed promptly. Keep in mind that these search engines usually still allow people to submit for free; it just takes longer.

Pay Per Click

PPC advertising is the name for ads you see at the top or on the right of the organic results in most search engines.
Services such as Yahoo SM, Google Ad ward, and MSN Ad Center allow you to pay to show your ads on their search
engine results page. How much you pay (your bid), along with the click-through rate of the ad (CTR) and the relevance
of the landing page, determine the ranking of your PPC ads.

There are companies such as Red Carpet Web Promotion that set up and manage PPC campaigns for companies
that bid on many key phrases (which can number in the thousands) Contact Red Carpet Web Promotion if this or other
web promotion services interest you.

Learning guide 21 Date 08-2017 Page 12 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo

Information Sheet-2 Internet browsers review

Internet Browsers

There were several web browsers that we can use to search from the web. Let’s take a look at some of it.

Netscape Navigator

Netscape Navigator was a


proprietary web browser that was popular
in the 1990s. It was the flagship product of
the Netscape Communications Corporation
and the dominant web browser in terms of
usage share, although by 2002 its usage
had almost disappeared. This was primarily
due to the increased usage of Microsoft's
Internet Explorer web browser software,
and partly because the Netscape
Corporation (later purchased by AOL) did
not sustain Netscape Navigator's technical
innovation after the late 1990s.
The Netscape Navigator web browser
was succeeded by Netscape Communicator.
Netscape Communicator's 4.x source code
was the base for the Netscape-developed
Mozilla Application Suite, which was later renamed Sea Monkey.Netscape's Mozilla Suite also served as the base for a
browser-only spinoff called Mozilla Firefox and Netscape versions 6 through 9.
AOL formally stopped development of Netscape Navigator on December 28, 2007, but continued supporting the
web browser with security updates until March 1, 2008, when AOL canceled technical support. AOL allows downloading
of archived versions of the Netscape Navigator web browser family. Moreover, AOL maintains the Netscape website as
an Internet portal.
Windows Internet Explorer

Windows Internet Explorer


(formerly Microsoft Internet Explorer,
commonly abbreviated IE or MSIE) is a
series of graphical web browsers developed

Learning guide 21 Date 08-2017 Page 13 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
by Microsoft and included as part of the
Microsoft Windows line of operating systems,
starting in 1995. It was first released as part
of the add-on package Plus! for Windows 95
that year. Later versions were available as
free downloads, or in service packs, and
included in the OEM service releases of Windows 95 and later versions of Windows.

Internet Explorer has been the most widely used web browser since 1999, attaining a peak of about 95% usage
share during 2002 and 2003 with Internet Explorer 5 and Internet Explorer 6. Since its peak of popularity, its usage share
has been declining in the face of renewed competition from other web browsers, and is currently 43.55% as of February
2011. Microsoft spent over $100 million USD per year on Internet Explorer in the late 1990s, [1] with over 1000 people
working on it by 1999.

Mozilla Firefox

Mozilla Firefox is a free and open


source web browser descended from the
Mozilla Application Suite and managed by
Mozilla Corporation. As of August 2011,
Firefox is the second most widely used
browser, with approximately 30% of
worldwide usage share of web browsers.
The browser has had particular success in
Germany and Poland, where it is the most
popular browser with 55% usagehttp://en.wikipedia.org/wiki/Firefox - cite_note-statcounter1-10 and 47%
http://en.wikipedia.org/wiki/Firefox - cite_note-statcounterpoland-11respectively.

Firefox runs on various operating systems including Microsoft Windows, GNU/Linux, Mac OS X, FreeBSD, and
many other platforms. Its current stable release is version 6.0, released on August 16, 2011. Firefox's source code is tri-
licensed under the GNU GPL, GNU LGPL, or Mozilla Public License.
Galleon
Galleon is a web browser for GNOME
based on Mozilla’s Gecko layout engine.
Galleon’s self-declared mission was to deliver
Learning guide 21 Date 08-2017 Page 14 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
“the web and only the web.”
At the time of Galleon’s creation, the
most popular web browsers, including
Netscape, Mozilla, and Internet Explorer,
were large multi-functional programs.
This made them slow to start and often
impractical due to their high memory usage
and processor requirements. Galleon was the
first mainstream graphical web browser
which specifically focused on the reduction of peripheral functionality. Galeon is also notable for introducing “Smart
Bookmarks,” bookmarks that take an argument and can be used as toolbar buttons with a text field used to enter the value
for the argument.

Opera

Opera is a web browser and Internet


Suite developed by Opera Software. The
browser handles common Internet-related
tasks such as displaying web sites, sending
and receiving e-mail messages, managing
contacts, chatting on IRC, downloading files
via Bit Torrent, and reading web feeds. Opera
is offered free of charge for personal
and mobile phones.
Opera does not come packaged with any desktop operating system. However, it is the most popular desktop
browser in some countries, such as Ukraine. Opera Mini, which is the most popular mobile web browser as of May 2011,
has been chosen as the default integrated web browser in several mobile handsets by their respective manufacturers.

Opera is known for originating many features later adopted by other web browsers.
Opera runs on a variety of personal computer operating systems, including Microsoft Windows, Mac OS X, Linux,
and FreeBSD. Editions of Opera are available for devices using the Memo, BlackBerry, Symbian, Windows
Mobile, Android, and iOS operating systems, as well as Java ME-enabled devices. Approximately 120 million mobile
phones have been shipped with Opera. Opera is the only commercial web browser available for the Nintendo
DS and Wii gaming systems. Some television set-top boxes use Opera. Adobe Systems has licensed Opera technology for
use in the Adobe Creative Suite.
Phoenix

The Mozilla Firefox project was

Learning guide 21 Date 08-2017 Page 15 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
created by Dave Hyatt and Blake Ross as
an experimental branch of the Mozilla
project.
Hyatt, Ross, Hewitt and Chanial's
browser was created to combat the
perceived software bloat of the Mozilla
Suite (codenamed, internally referred to,
and continued by the community as
Sea Monkey), which integrated features
such as IRC, mail and news, and
WYSIWYG HTML editing into one software
suite.
Firefox retains the cross-platform nature of the original Mozilla browser, using the XUL
user interface markup language. The use of XUL makes it possible to extend the browser's capabilities through the use
of extensions and themes. The development and installation processes of these add-ons raised security concerns, and with
the release of Firefox 0.9, the Mozilla Foundation opened a Mozilla Update website containing "approved" themes and
extensions. The use of XUL sets Firefox apart from other browsers, including other projects based on
Mozilla's Gecko layout engine and most other browsers, which use interfaces native to their respective platforms
(Galleon and Epiphany use GTK+; K-Melon uses MFC; and Camino
uses Cocoa). Many of these projects were started before Firefox, and probably served as inspiration.

Although the Mozilla Foundation had intended to make the Mozilla Suite obsolete and replace it with Firefox, the
Foundation continued to maintain the suite until April 12, 2006 because it had many corporate users and was bundled with
other software. The Mozilla community (as opposed to the Foundation) continues to release new versions of the suite,
using the product name Sea Monkey to avoid confusion with the original Mozilla Suite.

On February 5, 2004, business and IT consulting company AMS categorized Mozilla Firefox (then known as
Firebird) as a "Tier 1" ("Best of Breed") open source product, considering it technically strong and virtually risk-free.

The project which became Firefox started as an experimental branch of the Mozilla Suite called m/b (or Mozilla
/browser). After it had been sufficiently developed, binaries for public testing appeared in September 2002 under the
name Phoenix.

The Phoenix name was kept until April 14, 2003, when it was changed because of a trademark dispute with
the BIOS manufacturer, Phoenix Technologies (which produces a BIOS-based browser called Phoenix First Ware
Connect). The new name, Firebird, met with mixed reactions, particularly as the Firebird database server already carried
the name. In response, the Mozilla Foundation stated that the browser should always bear the name Mozilla Firebird to
avoid confusion with the database software. Continuing pressure from the Firebird community forced another change, and
on February 9, 2004 the project was renamed Mozilla Firefox (or Firefox for short).

Learning guide 21 Date 08-2017 Page 16 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
The name "Firefox" (a reference to the red panda)was chosen for its similarity to "Firebird", but also for its
uniqueness in the computing industry. To ensure that no further name changes would be necessary, the Mozilla
Foundation began the process of registering Firefox
as a trademark with the United States Patent and Trademark Office in December 2003. This trademark process led to a
delay of several months in the release of Firefox 0.8 when the foundation discovered that Firefox had already been
registered as a trademark in the UK for Charlton Company software. The situation was resolved when the foundation was
given a license to use Charlton's European trademark.
Konqueror

Konqueror is a web browser and


file manager that provides file-viewer
functionality to a wide variety of things:
local files, files on a remote ftp server
and files in a disk image. It is designed
as a core part of the KDE desktop
environment. It is developed by volunteers
and can run on most Unix-like operating
systems and on Windows systems, too.
Konqueror, along with the rest of the
components in the KDEBase package, is
licensed and distributed under the GNU General Public License version 2.

The name "Konqueror" is a reference to the two primary competitors at the time of the browser's first release:
"first comes the Navigator, then Explorer, and then the Konqueror". It also follows the KDE naming convention: the
names of most KDE programs begin with the letter K.

Konqueror came with the version 2 of KDE, released on October 23, 2000. It replaces its predecessor, KFM
(KDE file manager). With the release of KDE4, Konqueror was replaced as a file manager by Dolphin.
Lynx

Lynx is a text-based web browser


for use on cursor-addressable character cell
terminals and is very configurable.
Browsing in Lynx consists of
highlighting the chosen link using cursor
keys, or having all links on a page
numbered and entering the chosen link's
number. Current versions support SSL and
many HTML features. Tables are formatted
using spaces, while frames are identified

Learning guide 21 Date 08-2017 Page 17 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
by name and can be explored as if they were separate pages. Lynx cannot inherently display various types of non-text
content on the web, such as images and video, but it can launch external programs to handle it, such as an image viewer or
a video player.

Because of its text-to-speech–friendly interface, Lynx was once popular with visually impaired users, but
better screen readers have reduced the appeal of this application. Lynx is also used to check for usability of websites in
older browsers. It is still included in a number of Unix products and Linux distributions, and is particularly useful for
reading documentation or downloading files when only a text-based environment is available. It is also useful for
accessing websites from a remotely connected system in which no graphical display is available. Despite its text-only
nature and age, it can still be used to effectively browse much of the modern web, including performing interactive tasks
such as editing Wikipedia. The speed benefits of text-only browsing are most apparent when using low bandwidth internet
connections, or older computer hardware that may be slow to render image-heavy content.

Self Check – 2 Written Test

Name: ______________________________________ Date: ________________________________________

Time started: _______________________________ Time finished: _______________________________

Directions: Answer all the questions listed below.

1. Give at least five common web browsers that you know. (5 points)
2. It is a series of graphical web browsers developed by Microsoft and included as part of the Microsoft Windows line
of operating systems, starting in 1995.
(1 point)
3. It is a free and open source web browser and the second most widely used browser worldwide.(1 point)
4. This browser is also known as Mozilla Firefox. (1 point)
5. It is a web browser and Internet suite. It handles common Internet-related tasks such as displaying web sites, sending
and receiving e-mail messages, managing contacts, chatting on IRC, downloading files via Bit Torrent, and reading
web feeds. It is offered free of charge for personal and mobile phones.(1 point)
6. It is a text-based web browser for use on cursor-addressable character cell terminals and is very configurable. (1 point)
7.What three file-viewer functionalities do the Konqueror browser provides?(3 point)

Learning guide 21 Date 08-2017 Page 18 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo

Information Sheet-3 Basic Internet Settings and configuration

Home page
The term home page is used to refer to the page that is the default page of any website. It is the main page of a
complex website.
Setting-up your home page means that when you open your web browser, the web page that you have set will be
immediately launched by your browser. The most common site
that you often use will be your consideration for setting-up your home page. So every time you will open your browser, it
will automatically go to your favorite site.
Location of Temporary Files

Web pages are stored in a temporary Internet files folder the first time you view them in your web browser. This
speeds up the display of pages you frequently visit or have already seen, because Internet Explorer can open them from
your hard disk instead of from the Internet.

Privacy Level

Internet Explorer offers a number of features to help protect your security and privacy when you browse the web.

Under Settings, there were several privacy level options you can choose:

 Block All Cookies. Internet Explorer prevents all Web sites from storing cookies on your computer, and Web
sites cannot read existing cookies on your computer. Per-site privacy actions do not override these settings.

 High. Internet Explorer prevents Web sites from storing cookies that do not have a compact privacy policy—a
condensed computer-readable P3P privacy statement. The browser prevents Web sites from storing cookies that
use personally identifiable information without your explicit consent. Per-site privacy actions override these
settings.

 Medium High. Internet Explorer prevents Web sites from storing third-party cookies that do not have a compact
privacy policy or that use personally identifiable information without your explicit consent. The browser prevents
Web sites from storing first-party cookies that use personally identifiable information without your implicit
consent. The browser also restricts access to first-party cookies that do not have a compact privacy policy so that
they can only be read in the first-party context. Per-site privacy actions override these settings.

Learning guide 21 Date 08-2017 Page 19 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
 Medium (default). Internet Explorer prevents Web sites from storing third-party cookies that do not have a
compact privacy policy or that use personally identifiable information without your implicit consent. The browser
allows first-party cookies that use personally identifiable information without your implicit consent but deletes
these cookies from your computer when you close the browser. The browser also restricts access to first-party
cookies that do not have a compact privacy policy so that they can only be read in the first-party context. Per-site
privacy actions override these settings.

 Low. Internet Explorer allows Web sites to store cookies on your computer, including third-party cookies that do
not have a compact privacy policy or that use personally identifiable information without your implicit consent.
When you close the browser, though, it deletes these third-party cookies from your computer. The browser also
restricts access to first-party cookies that do not have a compact privacy policy so that they can only be read in the
first-party context. Per-site privacy actions override these settings.

 Accept All Cookies. Internet Explorer allows all Web sites to store cookies on your computer, and Web sites that
create cookies on your computer can read them. Per-site privacy actions do not override these settings.
Security Level

Why are security settings for web browsers important?

Your web browser is your primary connection to the rest of the internet, and multiple applications may rely on
your browser, or elements within your browser, to function. This makes the security settings within your browser even
more important. Many web applications try to enhance your browsing experience by enabling different types of
functionality, but this functionality might be unnecessary and may leave you susceptible to being attacked. The safest
policy is to disable the majority of those features unless you decide they are necessary. If you determine that a site is
trustworthy, you can choose to enable the functionality temporarily and then disable it once you are finished visiting the
site.

While every application has settings that are selected by default, you may discover that your browser also has
predefined security levels that you can select. For example, Internet Explorer offers custom settings that allow you to
select a particular level of security; features are enabled or disabled based on your selection. Even with these guides, it is
helpful to have an understanding of what the different terms mean so that you can evaluate the features to determine
which settings are appropriate for you.

How do you know what your settings should be?

Ideally, you would set your security for the highest level possible. However, restricting certain features may limit
some web pages from loading or functioning properly. The best approach is to adopt the highest level of security and only
enable features when you require their functionality.

What do the different terms mean?

Different browsers use different terms, but here are some terms and options you may find:

 Zones - Your browser may give you the option of putting web sites into different segments, or zones, and allow
you to define different security restrictions for each zone.

For example, Internet Explorer identifies the following zones:

 Internet - This is the general zone for all public web sites. When you browse the internet, the settings for this
zone are automatically applied to the sites you visit. To give you the best protection as you browse, you should set
the security to the highest level; at the very least, you should maintain a medium level.
Learning guide 21 Date 08-2017 Page 20 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
 Local intranet - If you are in an office setting that has its own intranet, this zone contains those internal pages.
Because the web content is maintained on an internal web server, it is usually safe to have less restrictive settings
for these pages. However, some viruses have tapped into this zone, so be aware of what sites are listed and what
privileges they are being given.

 Trusted sites - If you believe that certain sites are designed with security in mind, and you feel that content from
the site can be trusted not to contain malicious materials, you can add them to your trusted sites and apply settings
accordingly. You may also require that only sites that implement Secure Sockets Layer (SSL) can be active in this
zone. This permits you to verify that the site you are visiting is the site that it claims to be. This is an optional
zone but may be useful if you personally maintain multiple web sites or if your organization has multiple sites.
Even if you trust them, avoid applying low security levels to external sites—if they are attacked, you might also
become a victim.

 Restricted sites - If there are particular sites you think might not be safe, you can identify them and define
heightened security settings. Because the security settings may not be enough to protect you, the best precaution is
to avoid navigating to any sites that make you question whether or not they're safe.

 JavaScript - Some web sites rely on web scripts such as JavaScript to achieve a certain appearance or
functionality, but these scripts may be used in attacks.

 Java and ActiveX controls - These programs are used to develop or execute active content that provides some
functionality, but they may put you at risk.

 Plug-ins - Sometimes browsers require the installation of additional software known as plug-ins to provide
additional functionality. Like Java and ActiveX controls, plug-ins may be used in an attack, so before installing
them, make sure that they are necessary and that the site you have to download them from is trustworthy.

You may also find options that allow you to take the following security measures:

 Manage cookies - You can disable, restrict, or allow cookies as appropriate. Generally, it is best to disable
cookies and then enable them if you visit a site you trust that requires them.

 Block pop-up windows - Although turning this feature on could restrict the functionality of certain web sites, it
will also minimize the number of pop-up ads you receive, some of which may be malicious.

Setting the types of connection

Internet Connection settings are used to configure how the Web browser will connect to the Internet. These
settings are available from the Internet Options window.

The Connections tab will list any Internet connections currently configured on the computer, including dial-up
and Virtual Private Network (VPN) connections. If a connection to the Internet is through a proxy server, you can use the
LAN Settings button to configure the required proxy settings.

These settings are summarized below.


 Automatically detect settings: Proxy Settings and configuration settings are automatically detected.

Learning guide 21 Date 08-2017 Page 21 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
 Use automatic configuration script: Settings are retrieved from a file created by the network administrator. You
must also specify the URL to the file or file name.
 Use a proxy server for your LAN: Specifies that Internet Explorer must connect to the Internet through a proxy
server. Provide the address and port number of the proxy server. By selecting the Advance button, you can
configure which proxy server and port number to use for different protocols such as HTTP and FTP. You can then
create an exception list. When accessing computers on the exception list, the proxy server is not used.
 Bypass proxy server for local addresses: Select this option if you do not want to use a proxy server for a local
(intranet) addresses. Selecting this option can improve performance when accessing computers on your intranet.

The connection settings also allow you to configure what Internet Explorer should do when a connection to
the Internet is needed. These settings include:

 Never dial a connection – Internet Explorer will not automatically establish a connection when one is not
present but required. A connection must be established manually.
 Dial whenever a network connection is not present – Internet Explorer will attempt to establish a connection
using your default dial-up connections when a network connection is not available.
 Always dial my default connection – Internet Explorer will always attempt to connect using your default dial-up
networking connection.
Setting Browsing History

As you browse the Internet, each of the items you view was saved locally on your hard disk drive. This helps web
pages you visit frequently load faster by loading the files from you hard instead of having to downloading the web page
again. To conserve hard disk drive space or to help keep their Internet browsing private, users may find it necessary to
delete their Internet History, below is how to do this.
Adjusting display/view modes

In recent versions, Windows Internet Explorer has dramatically improved support for established and emerging
industry standards, such as HTML5, Cascading Style Sheets (CSS), Level 3 (CSS3), and Scalable Vector Graphics
(SVG). By default, Internet Explorer properly displays web pages designed to support these standards. Because some of
these standards are still evolving, older websites may not fully support them. In addition, later versions of certain
standards specify different behaviors than earlier versions of the same standard.

As a result, websites designed to support the earlier versions of these standards may display differently when
viewed with web browsers designed to support current versions of the standards, such as Internet Explorer. In order to
help such websites display correctly, Internet Explorer supports a display mode called Compatibility View, which displays
webpages as if they were viewed by an earlier version of the browser.

Customize the Internet Explorer toolbars

Internet Explorer has several toolbars, including the Menu bar, the Favorites or Links bar, and the Command bar.
There is also the Address bar, where you can type a web address, and the status bar, which displays messages such as a
webpage's download progress. All of these toolbars can be customized in one way or another.

Assessing and Retrieving Site Data

Learning guide 21 Date 08-2017 Page 22 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
What Are Cookies?

Cookies are small files which are stored on a user's computer. They are designed to hold a modest amount of data
specific to a particular client and website, and can be accessed either by the web server or the client computer. This allows
the server to deliver a page tailored to a particular user, or the page itself can contain some script which is aware of the
data in the cookie and so is able to carry information from one visit to the website (or related site) to the next.

What's in a Cookie?

Each cookie is effectively a small lookup table containing pairs of (key, data) values - for example (first name,
John) (last name, Smith). Once the cookie has been read by the code on the server or client computer, the data can be
retrieved and used to customize the web page appropriately.

When are Cookies Created?

Writing data to a cookie is usually done when a new webpage is loaded - for example after a 'submit' button is
pressed the data handling page would be responsible for storing the values in a cookie. If the user has elected to disable
cookies then the write operation will fail, and subsequent sites which rely on the cookie will either have to take a default
action, or prompt the user to re-enter the information that would have been stored in the cookie.

Why are Cookies Used?

Cookies are a convenient way to carry information from one session on a website to another, or between sessions
on related websites, without having to burden a server machine with massive amounts of data storage. Storing the data on
the server without using cookies would also be problematic because it would be difficult to retrieve a particular user's
information without requiring a login on each visit to the website.

If there is a large amount of information to store, then a cookie can simply be used as a means to identify a given
user so that further related information can be looked up on a server-side database. For example the first time a user visits
a site they may choose a username which is stored in the cookie, and then provide data such as password, name, address,
preferred font size, page layout, etc. - this information would all be stored on the database using the username as a key.
Subsequently when the site is revisited the server will read the cookie to find the username, and then retrieve all the user's
information from the database without it having to be re-entered.

Loading Images

Images on a web page often make the page load more slowly, especially if you have a relatively slow connection
(e.g., a dial-up connection). To decrease the time it takes to load a page by preventing images from loading you would
need to disable loading of images. But for many instances, you would need to load images to your browser.

Opening URL

Each time that you type a URL in the address bar or click on a link in Internet Explorer browser, the URL address
is automatically added to the history index file. When you type a sequence of characters in the address bar, Internet
Explorer automatically suggests you all URLs that begin with characters sequence that you typed (unless AutoComplete
feature for Web addresses is turned off). However, Internet Explorer doesn't allow you to view and edit the entire URL list
that it stores inside the history file.

Learning guide 21 Date 08-2017 Page 23 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
This utility reads all information from the history file on your computer, and displays the list of all URLs that you
have visited in the last few days. It also allows you to select one or more URL addresses, and then remove them from the
history file or save them into text, HTML or XML file. In addition, you are allowed to view the visited URL list of other
user profiles on your computer, and even access the visited URL list on a remote computer, as long as you have
permission to access the history folder.

Deleting Cookies and Browsing History

A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send
state information to a user's browser and for the browser to return the state information to the origin site. The state
information can be used for authentication, identification of a user session, user's preferences, shopping contents, or
anything else that can be accomplished through storing text data.

Cookies are not software. They cannot be programmed, cannot carry viruses, and cannot install malware on the
host computer. However, they can be used by spyware to track user's browsing activities – a major privacy concern that
prompted European and US law makers to take action. Cookies could also be stolen by hackers to gain access to a victim's
web account, thus, the need to delete cookies.

Learning guide 21 Date 08-2017 Page 24 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Self Check – 3 Written Test

Name: ______________________________________ Date: ________________________________________

Time started: _______________________________ Time finished: _______________________________

Directions: Answer all the questions listed below.

1. What do you call a page that when you set, it will automaticallybe launched by your browser when you open it.(1
point)
2. What are the 6 privacy level options? (6 points)
3. What is the default privacy level setting? (1 point)
4. This settings are used to configure how the Web browser will connect to the Internet. These settings are available from
the Internet Options window.
(1 point)
5. It is a Proxy Settings and configuration settings are automatically detected.
(1 point)
6. It is a Proxy Settings when you do not want to use a proxy server for a local (intranet) addresses. Selecting this option
can improve performance when accessing computers on your intranet.(1 point)

Learning guide 21 Date 08-2017 Page 25 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Operation Sheet Basic internet settings and configuration

Setting-up your Home page

To do it, follow the steps below:

1. On your browser, go to tools, then options


2. On the Internet Options, click on the General tab
3. Type the address that you what for your home page
then click Apply then OK

Location of Temporary Files

This information applies to Windows Internet Explorer 7 and Windows Internet Explorer 8.

To view temporary Internet files

1. Open your Internet Explorer

2. Click the Tools button, and then click


Internet Options.

3. Click the General tab, and then, under


Browsing history, click Settings.

4. In the Settings dialog box,


click View files.

Setting the Privacy Level


Learning guide 21 Date 08-2017 Page 26 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
1. Open your Internet Explorer.
2. Click the Tools button, and then click

Internet Options.

3. Click the Privacy tab.


4. Under Settings, do either of the following:
 To allow or block cookies from specific

websites, click Sites.

 To load a customized settings file, click

Import. These are files that modify the rules that Internet Explorer uses handle cookies. Since these files can override
default settings, you should only import them if you know and trust the source.

Under Settings, move the slider to the privacy level you want:

 Block All Cookies.


 High.
 Medium High
 Medium (default)
 Low.
 Accept All Cookies.

5. When you are finished making changes to your privacy settings, click OK.

Setting the Security Level

1. Open your Internet Explorer.


2. Click the Tools button, and then
click Internet Options.

3. Click the Security tab.


4. Click the Internet icon.
5. Do one of the following:
 To pick a preset security level, move the slider.
 To change individual security settings,
click Custom level. Change the settings as
desired and click OK when you are done.

 To set Internet Explorer back to the default


security level, click Default level.

 Click Reset all zones to default level to clear


any custom settings.

6. When you are finished making changes to the security settings, click OK.

Setting the types of connection

1. Open your Internet Explorer.


Learning guide 21 Date 08-2017 Page 27 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
2. Click the Tools button, and then
click Internet Options.

3. Click the Connections tab.

4. Click Apply then Ok when done.

These settings are summarized below.

- Automatically detect settings


- Use automatic configuration script:
- Use a proxy server for your LAN
- Bypass proxy server for local addresses
How to configure Internet Explorer when a connection to the Internet is needed:

 Never dial a connection


 Dial whenever a network connection is not present
 Always dial my default connection

Setting Browsing History

Viewing History using Internet Explorer

 Microsoft Internet Explorer 7 and above users can view their history files by clicking the
"Tools" menu, "Internet Options", clicking the "Settings" button under the Browsing history,
and then clicking the "View Files" button.
 Microsoft Internet Explorer 6.x users can view their history files by clicking the "Tools"
menu, "Internet Options", clicking the "Settings" button, and then clicking the "View Files"
button.

Deleting History

 Microsoft Windows users running Microsoft Internet Explorer 6.x and 7.x can delete their
history files by clicking the "Tools" menu, "Internet Options", and clicking the "Delete
Files" or "Delete" button. Users also have the option of automatically deleting files each
time the close the browser window by clicking the "Advanced" tab and checking "Empty
Temporary Internet Files folder when browser is closed" under the "Security" section.
 Microsoft Internet Explorer 4.x users on an Apple Macintosh can delete the history by
clicking the "Hard Drive" icon, "System", "Preferences", "Explorer", and moving the
history file into the trash.
 Microsoft Internet Explorer 3.02 and lower users can delete their history by clicking the
"View" menu, "Options", open the tab "Advanced", click the "Settings" tab, and click the
"Empty Folder" button.

Viewing History using Internet Mozilla Firefox

Viewing History

Learning guide 21 Date 08-2017 Page 28 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Press Ctrl + H to open the left-side history bar. or
Click History at the top of the window. or
Users using earlier versions of Mozilla Firefox can also view their history by clicking "Go" and clicking "History."

Deleting History

Mozilla Firefox users can clear their history by clicking the "Tools" menu, "Options", clicking the "Privacy"
button, and under "History" click the "Clear" or "Clear Now" button. or
Press CTRL + Shift + DEL to open the Clear Data Window.
Adjusting display/view modes

The following list describes different ways that enable Compatibility View:

 You click the Compatibility View button in the Address bar when viewing a webpage. When displayed, this
button appears to the left of the Refresh button and contains an image of a broken piece of paper. This enables
Compatibility View for all documents in the domain of the website being viewed.
 The "Display all websites in Compatibility Mode setting" in the Compatibility View Settings is enabled.
 The "Automatically recover from page layout errors with Compatibility View" setting is enabled and a webpage
stops responding or crashes the browser. When this happens, Internet Explorer opens the page in Compatibility
View after recovering from the problem.
 Group policies that identify sites to be opened in Compatibility View are enabled by the administrator of your
computer.
 You have used the F12 developer tools to change the browser mode to identify Internet Explorer as an earlier
version of the browser.
 The Compatibility View List is enabled, which defines a list of websites that are automatically displayed in
Compatibility View.

The Compatibility View List contains a number of websites known to have problems when viewed, by default, with
Internet Explorer; when Internet Explorer opens a webpage from a site on the Compatibility View List, it automatically
displays the page in a way that allows it to be viewed correctly.

Modify Toolbars
Show or hide the Internet Explorer toolbars
You can show or hide the Menu bar, Favorites or Links bar, Command bar, and status bar. Here's how:

1. Open Internet Explorer by clicking the Start button , and then clicking Internet Explorer.
2. Click the Tools button, point to Toolbars, and then click the toolbar you want to show or hide.
3. Customize the Command bar
The Command bar is located at the upper-right side of the Internet Explorer window and offers easy access to
almost any setting or feature in Internet Explorer. You can customize the Command bar buttons to suit your preferences.

To change the buttons on the Command bar

1. Open Internet Explorer by clicking the Start button , and then clicking Internet Explorer.

2. In Internet Explorer 8, right-click the Command bar, point to Customize, and then click Add or Remove
Commands. In Internet Explorer 7, right-click the Command bar, point to Customize Command Bar,
and then click Add or Remove Commands.

3. Make one or more of the following changes:


Learning guide 21 Date 08-2017 Page 29 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
 To add a button, click the button you want to add in the Available toolbar buttons list, and then
click Add.
 To remove a button, click the button you want to remove in the Current toolbar buttons list, and
then click Remove.
 To change the order in which buttons are displayed, click a button in the Current toolbar
buttons list, and then click either Move Up or Move Down.
 To restore the Command bar buttons to their default settings, click Reset.

4. When you're done, click Close.

You should see your changes immediately. If you've added a lot of buttons, you might need to resize the Command
bar to see them all.

Assessing and Retrieving Site Data

How do I Enable or Disable Cookies?

This section will tell you how to enable cookies (turning cookies on) and also how to disable them. Since cookies
are maintained by your web browser, the method of enabling or disabling them will vary depending on which browser you
are using.
Microsoft Internet Explorer 8.0

Select the 'Tools->Internet Options' menu item, and then open the 'Privacy' tab - you can then adjust the slider to
block or allow various categories of cookie. Alternatively by clicking 'Advanced...' you can exercise finer control over the
browser's behavior, choosing whether to accept, block, or prompt for cookies originating either on the website you are
visiting (first party cookies) or originating from websites other than the one you are visiting (third party cookies, typically
used by banner advertisements hosted on an advertiser's website).

Loading Images

To enable that follow these steps: for Internet Explorer 5.x and later for Windows:

1. From the Tools menu, select Internet Options... .

If the menu bar is hidden, press Alt to make it visible.

2. In the window that appears, select the Advanced tab.

3. Scroll down the list to "Multimedia", and check Show Pictures.

4. Click OK.

Opening URL

Learning guide 21 Date 08-2017 Page 30 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
For Internet Explorer 5

1. Open Internet Explorer.

2. Click to highlight whatever is in the address bar (the big white space at the top of the window, next to the word
"Address").

3. Type the Internet address over it, or press Delete on your keyboard and then type.

4. Press Enter on your keyboard to go to the page.

Deleting Cookies and Browsing History – for Internet Explorer 8

Once your browser is open, select the Tools menu and click Internet Options and select the General tab.

1. To delete all cookies, in the Browsing History section, click Delete....


2. Uncheck the top Preserve Favorite Website Data box.
3. Then check the box next to Cookies.... Check the other boxes at your own discretion.
4. Click Delete.

If you wish to delete only specific cookies and keep others, instead of Step 2:
1. Click the Settings button, then click View Files.
2. Scroll through the list and select the cookies you want to delete.
3. Multiple cookies can be selected by holding down the CTRL key while clicking.
4. Press the Delete key.
5. Press OK on any dialog boxes that appear.
Or
Hit Ctrl+Shift+Delete.
Click Delete.

Learning guide 21 Date 08-2017 Page 31 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo

Under

Ethiopian TVET-System
Learning guide 21 Date 08-2017 Page 32 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo

INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level II

LEARNING GUIDE # 23
Unit of Competence: Search the Internet
Module Title: Searching the Internet
LG Code: ICT ITS2 LO2
TTLM Code: ICT ITS2 TTLM05 0817

LO 2: Search the Internet

Introduction Learning Guide # 5

This learning guide is developed to provide you the necessary information regarding the following content coverage and
topics –

This guide will also assist you to attain the learning outcome stated in the cover page. Specifically, upon completion of
this Learning Guide, you will be able to –

 Open search engines and define search requirements using a range of search parameters
Learning guide 21 Date 08-2017 Page 33 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
 Save and present search results as a report according to the information required
 Create bookmarks for required web page and saved in associated bookmark folder
 Modify Page set up options and print web page or the required information
 Shutdown and exit browser
 Observe OHS and netiquette principles through the process

Learning Activities
1. Read the specific objectives of this Learning Guide.
2. Read the information written in the “Information Sheets 1”.
3. Accomplish the “Self-check” in page.
4. If you earned a satisfactory evaluation proceed to “Information Sheet 2”. However, if your rating is unsatisfactory, see
your teacher for further instructions or go back to Learning Activity #1.
5. Submit your accomplished Self-check. This will form part of your training portfolio.
6. Read the information written in the “Information Sheet 2”.
7. Accomplish the “Self-check” in page.
8. If you earned a satisfactory evaluation proceed to “Information Sheet 3”. However, if your rating is unsatisfactory, see
your teacher for further instructions or go back to Learning Activity #2.
9. Submit your accomplished Self-check. This will form part of your training portfolio.
10. Read the information written in the “Information Sheet 3”.
11. If you earned a satisfactory evaluation proceed to “Operation Sheet” in page . However, if your rating is
unsatisfactory, see your teacher for further instructions or go back to Learning Activity #3.
12. Read the “Operation Sheet” and try to understand the procedures discussed.
13. You can use your working PC to simulate the activity.
15. Do the “LAP test” in page (if you are ready) and show your output to your teacher. Your teacher will evaluate your
output either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice you on additional work. But if
satisfactory you can proceed to Learning Guide.

Introduction to the internet and the internet browsers


Information Sheet-1

KEYWORD SEARCHING refers to a search type in which you enter words in a search box representing the concepts you wish to
retrieve. Boolean operators are not used.

On Internet search engines, the options for constructing logical relationships among search terms often modify the traditional practice
of Boolean searching. This will be covered in the section below, Boolean Searching on the Internet.

Learning guide 21 Date 08-2017 Page 34 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Boolean logic consists of three logical operators:

 OR
 AND
 NOT

Each operator can be visually described by using Venn diagrams, as shown below.

OR logic

college OR university

Question: I would like information about college.

 In this search, we will retrieve records in which AT LEAST ONE of the search terms is present. We are searching on the
terms college and also university since documents containing either of these words might be relevant.
 This is illustrated by:

o the shaded circle with the word college representing all the records that contain the word "college"
o the shaded circle with the word university representing all the records that contain the word "university"
o the shaded overlap area representing all the records that contain both "college" and "university"

OR logic is most commonly used to search for synonymous terms or concepts.

Here is an example of how OR logic works:

Search terms Results


college 396,482

university 590,791

college OR university 819,214

OR logic collates the results to retrieve all the unique records containing one term, the other term, or both of them.

Learning guide 21 Date 08-2017 Page 35 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
The more terms or concepts we combine in a search with OR logic, the more results we will retrieve.

college OR university OR campus

For example:

Search terms Results


College 396,482

University 590,791

college OR university 819,214

college OR university OR campus 929,677

AND logic

poverty AND crime

Question: I'm interested in the relationship between poverty and crime.

 In this search, we retrieve records in which BOTH of the search terms are present
 This is illustrated by the shaded area overlapping the two circles representing all the records that contain both the word
"poverty" and the word "crime"
 Notice how we do not retrieve any records with only "poverty" or only "crime"

Here is an example of how AND logic works:


Learning guide 21 Date 08-2017 Page 36 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Search terms Results
poverty 76,342

crime 348,252

poverty AND crime 12,998

The more terms or concepts we combine in a search with AND logic, the fewer results we will retrieve.

poverty AND crime AND gender

For example:

Search terms Results


Poverty 76,342

Crime 348,252

poverty AND crime 12,998

poverty AND crime AND gender 1,220

In addition: a very few search engines make use of the proximity operator NEAR. A proximity operator determines the closeness of
terms within the text of a source document. NEAR is a restrictive AND. The closeness of the search terms is determined by the
particular search engine. Most search engines default to proximity searching by default.

NOT logic

Learning guide 21 Date 08-2017 Page 37 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo

cats NOT dogs

Question: I want information about cats, but I don't want to see anything about dogs.

 In this search, we retrieve records in which ONLY ONE of the terms is present, the one we have selected by our search
 This is illustrated by the shaded area with the word cats representing all the records containing the word "cats"
 No records are retrieved in the area overlapping the two circles where the word "dogs" appears, even if the word "cats"
appears there too

Here is an example of how NOT logic works:

Search terms Results


cats 86,747

dogs 130,424

cats NOT dogs 65,223

NOT logic excludes records from your search results. Be careful when you use NOT: the term you do want may be present in an
important way in documents that also contain the word you wish to avoid. For example, consider a Web page that includes the
statement that " cats are smarter than dogs." The search illustrated above would exclude this document from your results.

Combined AND and OR logic

Question: I want information about the behavior of cats.

Search: behavior AND (cats OR felines)

You can combine both AND and OR logic in a single search, as shown above.

The use of parentheses in this search is known as FORCING THE ORDER OF PROCESSING. In this case, we surround the OR words with
parentheses so that the search engine will process the two related terms as a unit. The search engine will use AND logic to combine
this result with the second concept. Using this method, we are assured that the semantically-related OR terms are kept together as a
logical unit.

Boolean Searching on the Internet

Learning guide 21 Date 08-2017 Page 38 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
When you use an Internet search engine, the use of Boolean logic may be manifested in three distinct ways:

1. Full Boolean logic with the use of the logical operators


2. Implied Boolean logic with keyword searching
3. Boolean logic using search form terminology

1. Full Boolean logic with the use of the logical operators

This is classic Boolean searching. However, few search engines nowadays offer the option to do full Boolean searching with the use
of the logical operators. It is more common for them to offer simpler methods of constructing search statements, specifically implied
Boolean logic and search form terminology. These methods are covered below.

If you want to construct searches using Boolean logical operators, you will need to experiment with search engines and see what
happens. You can try some of the search statements shown below. Keep in mind that the search engine might require that the Boolean
operators be typed in CAPITAL LETTERS. Don't forget that most search engines provide help pages that explain the kind of
searching you can do on their sites.

Question: I need information about cats.

Boolean logic: OR

Search: cats OR felines

Question: I'm interested in dyslexia in adults.

Boolean logic: AND

Search: dyslexia AND adults

Question: I'm interested in radiation, but not nuclear radiation.

Boolean logic: NOT

Search: radiation NOT nuclear

Question: I want to learn about cat behavior.

Boolean logic: AND, OR

Search: behavior cats OR felines

The last example is a tricky search on most search engines. It combines implied AND logic - designated by the space between the
word "behavior" and "cats" - with the use of the Boolean OR operator. You can give this search a try, but the search engine might not
process it as you intended. The safest way to conduct this type of search is to use the advanced search page available on most search
engine sites. This will be shown in option #3 below (search form terminology).
Learning guide 21 Date 08-2017 Page 39 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
2. Implied Boolean logic with keyword searching

KEYWORD SEARCHING refers to a search type in which you enter words in a search box representing the concepts you wish to
retrieve. Boolean operators are not used.

IMPLIED BOOLEAN LOGIC refers to a search in which symbols are used to represent Boolean logical operators. In this type of search,
the absence of a symbol is also significant, as the space between keywords defaults to either OR logic or AND logic.

Nowadays, virtually all general search engines on the Web default to AND logic. In other words, when you type words into a search
box and generate your search, Boolean AND logic is going on behind the scenes.

Implied Boolean logic is so common on Web search engines that it can be considered a de facto standard.

Question: I need information about cats.

Boolean logic: OR

Search: [None]

There are probably no general search engines on the Web that interpret the space between keywords as the Boolean OR. Rather, the
space between keywords is interpreted as AND. To do an OR search, choose either option #1 above (full Boolean logic) or option #3
below (search form terminology).

Question: I'm interested in dyslexia in adults.

Boolean logic: AND

Search: dyslexia adults

Question: I'm interested in radiation, but not nuclear radiation.

Boolean logic: NOT

Search: radiation -nuclear

Notice the minus sign (-) in front of the word "nuclear".

Question: I want to learn about cat behavior.

Boolean logic: AND, OR

Search: [none]

3. Boolean logic using search form terminology

Learning guide 21 Date 08-2017 Page 40 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Many search engines offer an advanced search page with a search form which allows you to choose the Boolean operators from a
menu. Usually the logical operator is expressed with substitute terminology rather than with the operator itself.

Question: I need information about cats

Boolean logic: OR

Search: Any of the words/At least one of the words/Should contain the words

Question: I'm interested in dyslexia in adults.

Boolean logic: AND

Search: All of these words/Must contain the words

Question: I'm interested in radiation, but not nuclear radiation.

Boolean logic: NOT

Search: Must not contain the words/Should not contain the words

Question: I want to learn about cat behavior.

Boolean logic: AND, OR

Search: Combine options if the form allows multiple search logic, as in the example below.

Information Sheet-2 How to Search the Internet Effectively

Search Engines

Internet search sites can search enormous databases of Web pages, using titles, keywords or text. You can
maximize the potential of search engines by learning how they work, and how to use them quickly and
effectively.

Learning guide 21 Date 08-2017 Page 41 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
The challenge is to ask your question the right way, so that you don't end up overwhelmed with too many search
results, underwhelmed with too few, or simply unable to locate the material that you need. As with most skills,
practice makes perfect!

Getting Started

Before doing a search, it's important to define your topic as completely and succinctly as possible. Write down
exactly what information you're looking for, why you're looking for it, and what you're not looking for. This
will help you to discover the best keywords for your search.

Keywords

With the exception of search engines such as AskJeeves.com, which will take questions in the form of actual
queries, most work best if you provide them with several keywords. So how do you determine which keywords
will work best?

Most users submit 1.5 keywords per search, which is not enough for an effective query - the recommended
maximum is 6 to 8 carefully chosen words, preferably nouns and objects. (Search engines consider articles and
pronouns clutter.) Avoid verbs, and use modifiers only when they help to define your object more precisely - as
in "feta cheese" rather than just "cheese."

Now you have your keywords. How do you enter them into the search engine?

Use of Phrases

Your most powerful keyword combination is the phrase. Phrases are combinations of two or more words that
must be found in the documents you're searching for in the EXACT order shown. You enter a phrase - such as
"feta cheese" - into a search engine, within quotation marks.

Some searches provide specific options for phrases, while others don't allow them at all; but most will allow
you to enter a phrase in quotation marks. Check the "Help" files of the search engine you're using to be sure
what it accepts.

Punctuation and Capitalization

Most search engines are insensitive to case: you can type your queries in uppercase, lowercase, or a mix of
cases. If you use lowercase, most engines will match on both upper and lower case; so for general searches,
lowercase is the safest form to use.

Not all search engines handle punctuation the same way. When in doubt, consult the "Help" file.

Boolean Basics

"Boolean" searching (named after George Boole, the 19th-century mathematician who founded the field of
symbolic logic) is a powerful technique that can narrow your search to a reasonable number of results, and
increase the chance of those results being useful. Boolean searches are simple to learn and tremendously
effective. The three most commonly used Boolean commands (or "operators") are AND, OR and AND NOT.

Learning guide 21 Date 08-2017 Page 42 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
AND means "I want only documents that contain both/all words." For instance, the search "London" AND "Big
Ben" AND "Buckingham Palace" AND "Trafalgar Square" would return only documents that contained all four
keywords or phrases. AND is the most frequently used Boolean command.

OR means "I want documents that contain either word; I don't care which." The query "London" OR "Big Ben"
OR "Buckingham Palace" OR "Trafalgar Square" would return all documents that contained even one of these
four keywords or phrases. Use OR to string together synonyms; be careful about mixing it with AND.

AND NOT means "I want documents that contain this word, but not if the document also contains another
word." The query "London" AND "Big Ben" AND NOT "Buckingham Palace" would return documents that
include London and Big Ben, but not those that also include Buckingham Palace. Remember that AND NOT
only applies to the word or phrase that immediately follows it.

Most search engines support the AND NOT command. It is sometimes called BUT NOT or NOT, and is
sometimes indicated by placing a minus sign (-) before the term or phrase to be removed. (Check the search
tips of the engine you're using to see which form of AND NOT it accepts). Before you apply AND NOT, see
what results you get from a simpler search. AND NOT is a great way to weed out results you don't want, such
as pornography.

Quick Tips

 Use nouns as query keywords. Never use articles ("a," "the"), pronouns ("he," "it"), conjunctions ("and,"
"or") or prepositions ("to," "from") in your queries

 Use 6 to 8 keywords per query

 Where possible, combine keywords into phrases by using quotation marks, as in "solar system"

 Spell carefully, and consider alternate spellings

 Avoid redundant terms

 Check the "Help" function of the particular search engine you're using, since they all have their own
quirks and preferences

A successful Internet search can take several tries. But remember: it's estimated that there are between 200 and
800 million documents online - with no master system for organizing this information! No wonder effective
searches take knowhow, patience and ingenuity.

To find out about more about search engines, check out Search Engine Watch. This site has the latest
information about the best search engines available, searching tips, and much more.

Search engines

A web search engine is designed to search for information on the World Wide Web and FTP servers. The
search results are generally presented in a list of results and are often called hits. The information may consist
of web pages, images, information and other types of files. Some search engines also mine data available

Learning guide 21 Date 08-2017 Page 43 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
indatabases or open directories. Unlike web directories, which are maintained by human editors, search engines
operatealgorithmically or are a mixture of algorithmic and human input.

 Snap, Quest finder

1.1.1 What is Snap?

Snap is a new kind of search engine; it not only goes out and retrieves results for you, but the more people use
it, the smarter it gets. From the SnapAbout Us page:

"Instead of just relying on computer algorithms to rank search results, Snap also uses click-stream information
from a network of one million Internet users. By recording and processing which Web sites users spend ti

Learning guide 21 Date 08-2017 Page 44 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
 Ask Jeeves, Google
 Three years after being ushered into retirement as a digital anachronism Jeeves, PG
Wodehouse's all-knowing butler, is being brought back as the brand name of Ask.com
in the search engine's latest multimillion-pound attempt to take on Google.
 Ask.com is to relaunch in the UK as Ask Jeeves three years after ditching the brand.
The butler character will be reintroduced to the search engine's branding
and advertising after a makeover - by Savile Row tailor Gieves& Hawkes, no less -
that will ditch Jeeves's pinstripe trousers and coattail jacket for a trendier look.
 The Jeeves brand will return in a national TV, press, radio and online campaign
kicking off this week after research found that 83% of UK consumers still identified
the search engine by the Ask Jeeves name and butler character.
 As part of the relaunch Jeeves will be given Twitter and Facebookaccounts - the latter
will be updated later this week with a travel diary and "pictures" of where he has been
during his three-year absence - and the butler will be involved in a series of events this
week.

Google Search or Google Web Search is a web search engine owned by Google Inc. Google Search is the
most-used search engine on the World Wide Web,[3] receiving several hundred million queries each day through
its various services.[4]

The order of search results on Google's search-results pages is based, in part, on a priority rank called a
"PageRank". Google Search provides many options for customized search, using Boolean operators such as:
exclusion ("-xx"), inclusion ("+xx"), alternatives ("xx OR yy"), and wildcard ("x * x").[5]

The main purpose of Google Search is to hunt for text in Web pages, as opposed to other data, such as
with Google Image Search. Google Search was originally developed by Larry Page and Sergey Brin in 1997.

Learning guide 21 Date 08-2017 Page 45 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
[6]
Google Search provides at least 22 special features beyond the original word-search capability. [7] These
include synonyms, weather forecasts, time zones, stock quotes, maps, earthquake data, movie showtimes,
airports, home listings, and sports scores. There are special features for numbers, including ranges (70..73),
[8]
prices, temperatures, money/unit conversions ("10.5 cm in inches"), calculations ("3*4+sqrt(6)-pi/2"),
package tracking, patents, area codes,[7] and language translation of displayed pages. In June 2011, Google
introduced "Google Voice Search" and "Search by Image" features for allowing the users to search words by
speaking and by giving images.[9]

The frequency of use of many search terms have reached a volume that they may indicate broader economic,
social and health trends.[10] Data about the frequency of use of search terms on Google (available through
Google Adwords, Google Trends, and Google Insights for Search) have been shown to correlated with flu
outbreaks and unemployment levels and provide the information faster than traditional reporting methods and
government surveys.

 Metacrawler, Alta Vista


MetaCrawler is a metasearch engine that blends the top web search results
from Google, Yahoo!, Bing (formerly Live Search), Ask.com, About.com,MIVA, LookSmart and other popular
search engines. MetaCrawler also provides users the option to search for images, video, news, yellow pages and
white pages. It used to provide the option to search for audio. MetaCrawler is a registered trademark of
InfoSpace, Inc.

Learning guide 21 Date 08-2017 Page 46 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
Contents
[hide]

1 History
2 See also
3 References
4 External links

History

MetaCrawler was originally developed in 1994 at the University of Washington by then graduate student Erik
Selberg, Bobby Kalili, and Professor Oren Etzioni as Selberg's Ph.D. qualifying exam project. Originally, it was
created in order to provide a reliable abstraction layer to early Web search engines such as WebCrawler, Lycos,
and InfoSeek in order to study semantic structure on the Web. However, it became clear that it was a useful
service in its own right, and had a number of research challenges.

By early 1995, MetaCrawler was running on four DEC AlphaStations and handling several hundred thousand
queries per day. This was starting to create significant bandwidth load at UW, as well as appear on the radar of
the search engines MetaCrawler was using. It became clear that MetaCrawler needed to have some kind of
business model to pay for the queries it was forwarding to the primary search engines.

In the summer of 1995, NetBot, Inc. was founded to commercialize MetaCrawler and three other UW
technologies: Ahoy! The HomePage Finder, Occam, and ShopBot. Ahoy! and Occam never actually left UW.
Unable to determine a reasonable business model, MetaCrawler was licensed to another Internet startup,
Go2Net. NetBot then combined the core of MetaCrawler with ShopBot to create a meta-shopping site, Jango.
NetBot was then purchased by Excite, where Jango became part of the Excite Network Shopping Channel. Both
Selberg and Etzioni returned to UW until 1999, when they joined Go2Net for a year, leaving just prior to
Go2Net's acquisition by InfoSpace, Inc. in 2000. InfoSpace now owns and operates the metasearch
engines Dogpile and WebCrawler.

Go2net went public on the Nasdaq in 1998 with its primary asset being MetaCrawler.com. MetaCrawler.com
and Go2net were acquired by InfoSpace in 1999 for $4.2 billion.

Learning guide 21 Date 08-2017 Page 47 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo

AltaVista is a web search engine owned by Yahoo!. AltaVista was once one of the most popular search engines
but its popularity declined with the rise of Google. In 2010, Yahoo! announced that it plans to discontinue the
site
Origins

AltaVista was created by researchers at Digital Equipment Corporation's Western Research Laboratory who
were trying to provide services to make finding files on the public network easier.[3] Although there is some
dispute about who was responsible for the original idea,[4] two key participants were Louis Monier, who wrote
the crawler, and Michael Burrows, who wrote the indexer. The name AltaVista was chosen in relation to the
surroundings of their company at Palo Alto. AltaVista was publicly launched as an internet search engine on 15
December 1995 at altavista.digital.com

At launch, the service had two innovations which set it ahead of the other search engines; It used a fast, multi-
threaded crawler (Scooter) which could cover many more Web pages than were believed to exist at the time and
an efficient search running back-end on advanced hardware. As of 1998, it used 20 multi-processor machines
using DEC's 64-bit Alpha processor. Together, the back-end machines had 130 GB of RAM and 500 GB
of hard disk space, and received 13 million queries per day.[7] This made AltaVista the first searchable, full-
text database of a large part of the World Wide Web. The distinguishing feature of AltaVista was its
minimalistic interface compared with other search engines of the time; a feature which was lost when it became
a portal, but was regained when it refocused its efforts on its search function.

AltaVista's site was an immediate success. Traffic increased steadily from 300,000 hits on the first day to more
than 80 million hits a day two years later. The ability to search the web, and AltaVista's service in particular,

Learning guide 21 Date 08-2017 Page 48 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
became the subject of numerous articles and even some books.[3] AltaVista itself became one of the top
destinations on the web, and by 1997 would earn US$50 million in sponsorship revenue.[4]

 Excite, Info seek


Excite (spelled and stylized as excite) is a collection of Internet sites and services owned by IAC
Search & Media, which is a subsidiary of Interactive Corporation (IAC). Launched in 1994, it is
an online service offering a variety of content, including an Internet portal, a search engine, a email,
instant, stock quotes, and a customizable user homepage. The content is collated from over 100
different sources.[1] In the 1990s, it was one of the most recognized brands on the Internet.

Learning guide 21 Date 08-2017 Page 49 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo

Info seek was a popular search engine founded in 1994 by Steve Kirsch.

Info seek was originally operated by the Info seek Corporation, headquartered in Sunnyvale, California.[1] Info
seek was bought by The Walt Disney Company in 1998, and the technology was merged with that of the
Disney-acquired Starwave to form the Go.com network. Since then it has been replaced with Yahoo! search and
is no longer in use.

Contents
[hide]

1 Features
2 History
3 Domain name
4 References
5 External links

Features

Info seek featured a very complex system of search modifiers, including Boolean modifiers such as the most
basic "OR" and "NOT", parentheses, and quotes, up to being able to say that one wanted one word or phrase to
appear within x number of words from another word or phrase.

Before being bought by Disney, Info seeks also offered a free web hosting package. It was free of advertising,
and had no limit on the amount of file storage space that could be used. Advertising was added after the Disney
purchase.

Learning guide 21 Date 08-2017 Page 50 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo

 Find link, Lycos


 Northern Light, AOL NetFind
 Hotbox, Look Smart
 Yahoo, Netscape
 Yahoo! Search is a web search engine, owned by Yahoo! Inc. and was as of
December 2009, the 2nd largest search engine on the web by query volume, at 6.42%,
after its competitor Google at 85.35% and before Baidu at 3.67%, according to Net
Applications.
 Originally, Yahoo! Search started as a web directory of other websites, organized in a
hierarchy, as opposed to a searchable index of pages. In the late
1990s, Yahoo! evolved into a full-fledged portal with a search interface and, by 2007,
a limited version of selection-based search.
 Yahoo! Search, originally referred to as Yahoo! provided Search interface, would send
queries to a searchable index of pages supplemented with its directory of sites. The
results were presented to the user under the Yahoo! brand. Originally, none of the
actual web crawling and storage/retrieval of data was done by Yahoo! itself. In 2001
the searchable index was powered by Inktomi and later was powered by Google until
2004, when Yahoo! Search became independent.
 On July 29, 2009, Microsoft and Yahoo! announced a deal in which Bing would
power Yahoo! Search.[3] All Yahoo! Search global customers and partners are
expected to be transitioned by early 2012.[4]
 Open Text, WebCrawler
Learning guide 21 Date 08-2017 Page 51 of 52

Author: IT Experts
Training, Teaching and Learning Materials Development Lo
 Meta Search, Go To Dot Com
 Beaucoup, Search.com
 Go2Network, Savvy Search
 Profusion, Dog pile
 Met gopher,

Learning guide 21 Date 08-2017 Page 52 of 52

Author: IT Experts

You might also like