Submodule Internet and E-Mail
Submodule Internet and E-Mail
7.3 Definition
Definition of the Internet The Internet is a global system of interconnected
computer networks that use the standard Internet Protocol Suite (TCP/IP) to
serve billions of users worldwide.
It is a network of networks that consists of millions of private and public,
academic, business, and government networks of local to global scope that are
linked by a broad array of electronic and optical networking technologies.
The Internet carries a vast array of information resources and services, most
notably the inter-linked hypertext documents of the World Wide Web (WWW)
and the infrastructure to support electronic mail.
Things worked out differently from what was originally planned. Rather than
the primary benefit of researchers sharing each other’s computer, it rapidly
became clear that enabling the researchers to communicate among themselves
via electronic mail (e-mail) was the key benefit of ARPAnet. One of the primary
goals for ARPAnet was to allow multiple users to send and receive information
simultaneously over the same communication paths. The network operated with
a technique called packet switching, in which digital data was sent in small
packages called packets. The packets contained data addresses, error control and
sequencing information.
The history of the TCP/IP protocol suite can be traced back to one of the first
WANs consisting of computers from different manufacturers running different
operating systems. Before ARPAnet, most computer networks were
homogeneous, consisting of computers from the same hardware manufacturer
running the same operating system. The ARPAnet’s popularity became
apparent, and in 1975, it was converted from an experimental research network
into a fully operational network. Research into network protocols continued and
the Internet Protocol Suite resulted.
The TCP/IP protocols were adopted as Military Standards in 1983, and all
computers connected to the ARPAnet were required to adopt the new protocol.
The ARPAnet was then split into two networks: the MILNET, used for military
communications, and the new, much smaller ARPAnet, used for further
research. MILnet and ARPAnet together became known as the Internet. Initially,
Internet use was limited to the universities, research institutions and the military,
but eventually with time Internet has incorporated commercial applications.
The term internet (notice the lower case i) is now used to refer to any collection of
physically separate networks that share the same communication protocols (not
necessarily TCP/IP) to appear as a single logical network. The term Internet
(notice the upper case I) is used to refer to the worldwide collection of
interconnected computer networks that run the TCP/IP protocols.
The three browsers that particularly dominate the Internet market are:
- Microsoft’s Internet Explorer
- Mozilla Firefox
- Netscape’s Navigator
- Torch
A fast modem is essential. It will reduce the amount of time spent waiting for web
pages, files, or messages from the Internet. Modem speeds are quoted in ‘bps’ (bits per
second). Typical speeds are 9600 bps, 4.4 Kbps (Kilobits per second), 28.8 Kbps, 56
Kbps, etc.
An ISP will usually have a number of host computers. These hosts will typically
provide storage space for electronic mail messages for their users, users’ own web sites
and a set of related facilities such as advice, support software and appropriate security.
Examples of local ISPs include Africa Online, Kenya Web, ISP Kenya, Swift Kenya and
Inter-Connect. When you open an account with an ISP you will be provided with a user
name and a password: Username - Every time you get connected, you require a name to
identify yourself on the Internet. Password - This is needed for security purposes. This
ensures that your Internet account is secure. NB: ISPs charge for the services rendered.
(g) Hyperlinks These are links that connect one page to another which creates
the World Wide Web. These links connect:
1: One web page to another part of the same web page. This is useful if it is a
really large page.
2: One web page to another website somewhere on the Web.
3: A page to a file, such as a sound clip, video, a spreadsheet or a Word
document etc.
These links to other pages can be links to objects stored anywhere on the
Internet. Hypertext links are indicated by underlined text highlighted in blue
(usually). Hyperlinks are also represented by buttons, graphics or pictures.
(l) Spam
Unwanted internet mail and ads.
2. Information
The Internet gives you information on virtually any subject. This is because of the
World Wide Web. The World Wide Web (www) is a global system of linked web
pages containing information - text, pictures, sound and video. You can review
newspapers, magazines, academic papers and much more. Governments,
colleges, universities, companies and individuals all offer free information on the
Internet. For example, you can inquire about universities in Britain or America.
3. Programs
Thousands of programs are available on the Internet. These programs include
word processors, spreadsheets, electronic cards and much more. You can look for
the latest software over the Internet. For example, you can get the latest Anti-
Virus software available and in addition, retrieve a free trial issue.
4. Entertainment
Hundreds of simple games are available on the Internet, including racing cars,
chess, poker, football and much more.
The Internet also lets you review current movies and hear television theme
songs.
7. Newsgroups
These are discussions on a range of topics from recreational activities to scientific
research. Any Internet surfer can access some of these newsgroups, while others
will need subscription. You can read any articles or write articles and post them.
8. Social Networking
By far the most popular and fastest growing communication method made
possible by broadband Internet service, social networking started out as a way
for people to find old friends, stay in touch with current ones, and meet new
ones.
It has now grown into a prolific communication tool for both personal and
business use. You can organize groups, notify people of events, send mass email
messages, chat, and so much more. Facebook, Twitter, and MySpace are
currently the most popular social networking sites, and have attracted billions of
users.
Many businesses have used social networking for advertising and marketing
purposes and seen great results.
9. As a research tool
To learn about new developments or products, competitors, market news and
customer opinions.
In order to insure that the connection to the Internet is secure there are some
basic methods that can be utilized that are fairly cheap and will more than pay
for themselves with the increased security and uptime of the Internet connection.
A business does not need to make sure their network is as tight as an Army base;
they just need to make sure they are more secure than others so that attackers
will target the easier sites and leave theirs alone.
The very first thing that needs to be put in place at each and every Internet
connection is a firewall. All businesses should have a hardware firewall that
protects and separates their business from the Internet. A cable modem with
built-in firewall may be adequate for a household, but a business should look at a
commercially available firewall such as a Juniper firewall 5 series, a SonicWall
firewall, or even a Cisco SOHO. These are all inexpensive and are easy to
manage and configure. A firewall is the first step of protection that keeps out
those who do not need to have access to the internal business network.
Essentially installing a firewall is similar to installing locks on a house. Only
those with the proper keys can access the house just as only those who have been
specifically granted access can access the network behind the firewall.
The patching of the systems will insure that the vulnerabilities that virus/worm
writers are using to exploit and take over machines will not be effective against a
patched machine. By patching the machine the entry door is closed and the
worm will not be able to gain access. Application patches update their tools and
software being used on the machine. With the latest patches this too will make it
more difficult for attackers to exploit machines and gain entry to them.
There are many other steps that can be taken to give a business a stricter security
posture. However, by taking the above steps a business can rest assured that
they have taken the due diligence and installed the most basic security measures
in their business that will make it difficult for an attacker to gain unauthorized
access to a business’s network.
OR
1. On the Windows taskbar, click Start.
2. Select the Programs menu item.
3. From the submenu displayed, select Internet Explorer from the Internet
Explorer group. You may be required to make a connection through your ISP in
order to log on to the Internet.
4. Click in the User name: box and enter your user name.
5. Type in your password in the Password box. The password appears in
asterisk format (*) for added privacy and security.
6. Click Connect to access the Internet. Note: The Dial-up Connection dialog
box will not be displayed if you are connected to the ISP via a proxy server.
A proxy server allows several users to access the Internet account using a single
account.
Upon successful logging on, the Internet Explorer displays the ‘home page’ and a
Connection Indicator appears on the Taskbar to indicate that you are online.
NB: All the time you are connected, you incur a local telephone charge to the
local phone company and access time to the ISP.
Connection indicator
You can find out at what speed you are receiving data, how much time you have
spent online etc., by double
clicking the Connection Indicator.
Other browsers have a similar procedure for opening.
Step-by-Step.
1. From the View menu, select Internet Options….
2. Click the Advanced tab.
3. Scroll down to the Multimedia section.
4. Deselect the options or content that you want turned off e.g Show Pictures,
Play Animations or Play Videos.
5. Click OK.
NB: If the Show pictures check box is cleared, you can still view an individual
picture on a web page by right-clicking its icon and then clicking Show Picture.
Information and Communication Page 8
Once you send a letter, it travels from your computer, through a modem, which
connects your computer to the Internet via the telephone network.
The mail travels through various computers, until it reaches the final
destination.
ii) The second part following the “@” symbol is usually made up of two to three
sub-parts to further identify the individual, organization or ISP. In this case:
• ‘Tropical heat’ identifies the business.
• ‘. com’ is the extension and this identifies the type of the organization.
The table below shows some extensions and what they represent: -
Extension Represents
.org non-profit making organization
.edu an educational institution/organization
.ac an academic institution
.com a commercial organization
.net network service provider
.mil military
.gov government
Disadvantages of emails
• Emails may carry viruses. These are malicious programs that harm your
computer system.
They can read out your email address book and send themselves to a number
of people around the world.
• Many people send unwanted emails to others. These are called spam mails.
It takes a lot of time to filter out the unwanted emails from those that are really
important.
• Emails cannot really be used for official business documents. They may be lost
and you cannot sign them.
If one uses POP3 to receive business email, they are usually restricted to using
one computer for the email. (Each person can have their own email account, but
everyone will be restricted to their own computer.)
Most email addresses that come as part of the internet connection package are
POP3 accounts.
2. IMAP
IMAP stands for Internet Message Access Protocol. It’s an alternative to POP3
which keeps messages stored on a central business email server, along with
information about whether each message has been read or replied to.
With IMAP, you can log in from any computer and see your whole inbox,
complete with the status of messages – so you can see which you’ve read, which
you’ve replied to, and so on.
IMAP is a good way to add extra flexibility to your business email. It’s a well-
established technology and you’ll find many entry-level email services (like those
from web hosting companies) will include IMAP as standard.
3. Microsoft Exchange
The majority of companies use Exchange Server to store email and Outlook
as the client. Like IMAP, Exchange stores messages centrally, so you can log in
from different places. But it also offers lots of extra functions, including centrally
stored calendars, task and contact lists.
Exchange and Outlook integrate well with Windows, but make less sense in a
mixed environment with many Apple desktops and iPhone / Android mobile
users. Often used to create a closed email environment out of security concerns,
where it can be hard to get your email to outside systems.
4. Webmail or HTTP
As the name suggests, webmail services require you to use a web browser (like
Internet Explorer or Firefox) to log in and access your business email. Some
people call them HTTP email services.
Many free business email services – including Hotmail, Yahoo Mail and Google
Mail – are webmail services. To send or receive email, you visit a specific website
and log in with your username and password.
Webmail is convenient because you can log in from anywhere. However, it’s
useless unless you’re connected to the internet, meaning most companies prefer
to use another business email service which also offers webmail as an option. For
instance, Microsoft Exchange includes a webmail interface, so you can check
your business email if you’re not at your own computer.
So do many of the IMAP and POP3-based services available.
Step-by-Step.
1. Launch the e-mail program Microsoft Outlook from the Start menu or a shortcut on
the desktop.
2. Enter the password if prompted and click OK. Alternatively, you may need to select
your profile from the Choose Profile dialog box that appears.
3. In this case, select your profile by clicking the down arrow key of the Profile Name
dialog box and click OK. NB: A User Profile is a group of settings that define how
Outlook is set up for a particular user. It also defines through the information services
how a user can send, store, and receive messages.
4. The Inbox is where all incoming messages are stored when you connect to Outlook.
Displayed are the e-mail messages that you have received. Unopened mail Opened mail
A list of e- mail messages
5. To open and read e-mail messages in the Inbox, choose the message that you want to
read. Then, double click on it to open it.
Message
The lower grid of your screen will have the full message. As you read the items in your
Inbox, you can reply to, forward, or file them in other folders that you create. When you
have finished reading a message, you can close the window by selecting the File menu,
then choosing Close.
This will take you back to the Outlook window. When you do not need to use any other
e-mail services, you can exit the Outlook program by selecting the File menu, then
choosing Close.
If there are any e-mail messages in the Outbox that have not been sent, a message will
appear prompting you to send the e-mail(s) at that particular time or you can choose to
send it later.
If you have read a message, you may want to send a reply to the original sender. If the
original message that you are replying to was also copied to a number of other people,
you may want to send a reply to all of them.
Step-by-Step.
When replying to a mail message, you can choose to reply with or without the original
message insertion. The original message, sometimes referred to as the history, appears
in the body of the message. This is just for reference purposes and can be removed by
selecting the text and pressing the Delete key or setting options in the Options dialog
box.
Cc: stands for "carbon copy". Anyone listed in the Cc: field of a message will
receive a copy of that message when you send it. All other recipients of that
message will be able to see that the person you designated as a Cc: recipient has
received a copy of the message. The Cc: field is useful in instances when you
wish to share a message with someone but are not requesting that they reply or
take any direct action in response.
Bcc: stands for "blind carbon copy". This is similar to the Cc: feature, except that
Bcc: recipients are invisible to all of the other recipients of the message (including
other Bcc: recipients). For example, if you send a message To:
[email protected] and Bcc: [email protected], then johndoe will see himself
as the message's only recipient, while janedoe will see that you have also sent the
message to johndoe. The Bcc: field is useful in instances when you don't wish to
share your recipients' email addresses with everyone who receives your
message.
To send a message, you must always specify at least one recipient in the To: field.
If you don't, an error message will appear when you attempt to send the
message.
4. Type the subject or topic in the Subject box.
5. In the lower grid of the message composition window, type in the message
that you want to send as seen in the illustration above.
You can format the email message using the formatting tools like Bold, Font
size, Underline etc.
When you have finished typing the message, editing, and spellchecked it, click
the Send button.
NB: A message that returns to the sender because it cannot reach its destination
is referred to as a bounced message.
7.13 Reflection
Through ICT we can easily communicate to other people, easily gain
information and the most important is that, we can increased our
leisure time as it makes our work done in less time. Another effect of
ICT in our society is that, It gives people opportunity to work in their
home.