Introduction To Internet
Introduction To Internet
OBJECTIVES
The main objectives of this lesson are:
1. To know the basics of computer networks
2. To clear the concept of Internet and its uses.
3. To learn about the World Wide Web.
4. How to connect the Internet and its troubleshooting.
5. To know about the Software and methods of searching in web.
6. To know about the URL.
7. To improve our knowledge about internet threats and how to secure our data from these threats.
However, the setup cost for a public network would be cheaper by using software (VPN). The best example
of a WAN is a
Mobile broadband connection.
WAN network allows us to choose the bandwidth of the network based on our needs. Larger organizations
can choose large bandwidth for faster data while small industries can choose according to their need.
INTERNET
CONCEPT OF INTERNET
Communications and methods of commerce by allowing various computer networks around the world to
interconnect. Sometimes referred to as a “network of networks,” the Internet emerged in the United States in
the 1970s but did not become visible to the general public until the early 1990s. By 2020, approximately 4.5
billion people, or more than half of the world’s population, were estimated to have access to the Internet.
The Internet provides a capability so powerful and general that it can be used for almost any purpose that
depends on information, and it is accessible by every individual who connects to one of
its constituent networks. It supports human communication via social media, electronic mail (e-mail), “chat
rooms,” newsgroups, and audio and video transmission and allows people to work collaboratively at many
different locations. It supports access to digital information by many applications, including the World Wide
Web.
APPLICATIONS OF INTERNET
1. Email.
2. Web-enabled audio/video conferencing services.
3. Online movies and gaming.
4. Data transfer/file-sharing
5. Instant messaging.
6. Internet forums.
7. Social networking.
8. Online shopping.
9. Financial services.
To create your own Wi-Fi network, you'll need a wireless router. This is the
device that will broadcast the Wi-Fi signal from your Internet modem throughout
your house. Your Internet service provider (ISP) may offer you a wireless router
for a small monthly fee. If you've never set up a Wi-Fi network before, this may
be the easiest option.
Connect!
That's it! Now you're ready to connect to your Wi-Fi network and make sure it's working. The process for
connecting to a Wi-Fi network will vary slightly depending on what type of computer or device you're using,
but any system will require these basic steps.
1) Locate your computer's network settings, and search for nearby Wi-Fi networks.
2) Select your network, and enter your password.
3) If the connection is successful, open your web browser and try navigating to a webpage
like www.google.com. If the page loads, it means your Wi-Fi connection is working correctly.
Congratulations!
You've just set up your own home wireless network. Way to go!
TROUBLESHOOTING
We love to work smoothly over internet and never wants our network gets disconnected or arouse any problem
that hampers our internet connectivity. Although in some cases we may face these kinds of network problem
and to solve that we need to learn some diagnostic tricks.
3
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS
Let's step through the basic process of how to troubleshoot network connectivity problems. That way, next
time you open up your web browser to a Cannot Connect message, you'll know what to do. Like all
troubleshooting, we'll start broadly and narrow down to specifics.
After each step, attempt to connect to a website to verify your connection is working. If it still doesn't work,
continue to the next part.
1) Make Sure It's Actually Your Network Problem: Sometimes what seems like a network outage is
actually a problem on a specific website's end. If you can't get on Twitter, for instance, check another
few websites to make sure that the problem isn't just with a single site.
2) Reboot your PC, as well as your modem and router. To clear the modem and router caches, wait
60 seconds before you turn them back on again. When you plug everything back in, plug your modem
in first and wait for it to power on before connecting your router.
3) Does your network problem persist after rebooting? Before you start diving into settings and tests, the
next step to check is that you're physically connected. If you use an Ethernet cable to connect to your
router, check to make sure that it's not unplugged or damaged. If your laptop has a physical wireless
switch, make sure that it's not set to the off position. Once you've verified a proper connection, check
your equipment. Are the lights on your router and/or modem flashing green as normal? If no lights
come on after the reboot, the device could be dead or malfunctioning. However, if you get red lights,
or a power light but no connection light, your ISP is likely experiencing disruption.
4) Windows includes some built-in troubleshooters that can automatically find and fix issues. To run the
troubleshooter for network problems, right-click the network icon in your System Tray and
choose Troubleshoot Problems. Once the troubleshooter runs, it could fix issues, find issues but fail
to fix them, or find nothing.
5) If the problem doesn’t get solve it is better to call a computer expert.
SEARCH ENGINES
The most productive way to conduct a search on the internet is through a search engine. A web search engine
is a software system designed to search for information on the World Wide Web. The search results are
generally presented in a line of results often referred to as search engine results pages (SEROs). The
information may be a mix of web pages, images, and other types of files.
5
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS
Address bar
In the example below, we've typed https://nsnis.org/ into the address bar.
Links
Whenever you see a word or phrase on a website that's blue or underlined in blue, it's probably a hyperlink,
or link for short. You might already know how links work, even if you've never thought about them much
before. For example: [email protected]
Links are used to navigate the Web. When you click a link, it will usually take you to a different webpage.
You may also notice that your cursor changes into a hand icon whenever you hover over a link.
Navigation buttons
The Back and Forward buttons allow you to move through websites you've recently viewed. You can also
click and hold either button to see your recent history.
Navigation buttons
6
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS
The Refresh button will reload the current page. If a website stops working, try using the Refresh button.
Tabbed browsing
Many browsers allow you to open links in a new tab. You can open as many links as you want, and they'll
stay in the same browser window instead of cluttering your screen with multiple windows.
Tabs
To open a link in a new tab, right-click the link and select Open link in new tab (the exact wording may vary
from browser to browser).
7
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS
Bookmark Bar
Your browser will also keep a history of every site you visit. This is another good way to find a site you visited
previously. To view your history, open your browser settings—usually by clicking the icon in the upper-right
corner—and select History.
Downloading files
Links don't always go to another website. In some cases, they point to a file that can be downloaded, or saved,
to your computer.
If you click a link to a file, it may download automatically, but sometimes it just opens within your
browser instead of downloading. To prevent it from opening in the browser, you can right-click the link and
select Save link as (different browsers may use slightly different wording, like Save target as).
8
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS
Saving images
Sometimes you may want to save an image from a website to your computer. To do this, right-click the image
and select Save image as (or Save picture as).
Plug-ins
Plug-ins are small applications that allow you to view certain types of content within your web browser. For
example, Adobe Flash and Microsoft Silverlight are sometimes used to play videos, while Adobe Reader is
used to view PDF files.
If you don't have the correct plug-in for a website, your browser will usually provide a link to download it.
There may also be times when you need to update your plug-ins. Review our lesson on Installing and
Updating Plug-ins to learn more.
9
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS
URL
A Uniform Resource Locator, more commonly known as a URL, is the global address of documents and
other resources on the World Wide Web. It is the mechanism used by browsers to retrieve any published
resource on the web. For example, www.webopedia.com is the URL used to locate this website. A URL is
the most common type of Uniform Resource Identifier (URI), the generic term used for all types
of names and addresses that refer to objects on the World Wide Web. An IP address can be directly used in
replacement of a URL, but since it's relatively inconvenient, it's not often used.
Parts of a URL
A URL consists of different parts used to load the associated page. Some parts are mandatory while others are
optional. Below, the corresponding part of a URL is bolded to demonstrate which part is being referenced.
There are three key parts of a URL:
Protocol
https://nsnis.org/recruitment/
The beginning of the URL indicates which protocol the browser must use. The most common protocols
are Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS). With more
attention being paid to online privacy and security today, the more secure HTTPS is becoming the dominant
protocol on the World Wide Web. Less common protocols include ftp: (File Transfer Protocol) and mailto:
(to open a mail client). The term "web address" refers to a URL using the HTTP or HTTPS protocol. It is not
mandatory to include the protocol when entering in a URL.
Domain name
https://nsnis.org/recruitment/
Many people use the terms domain name and URL interchangeably, but a URL incorporates a domain name
to create a complete address—it is not one in itself. A domain name is a unique reference that identifies a
website on the World Wide Web. It comes directly after the protocol and is separated by a colon and two
forward slashes.
Path
https://nsnis.org/recruitment/
The path refers to the exact location of a page, post, file, or other asset. The path comes after the domain name
and is separated by a forward slash. Not all URLs will display a path due to websites being able to rewrite
URLs for simplicity.
It's important to note that spaces are not allowed in a URL. Only alphanumeric characters and the !$-_+*'(),
characters can be used. Any other characters that are needed must be encoded.
10
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS
After you run a search, you'll see a list of relevant websites that match your search terms. These are
commonly known as search results. If you see a site that looks interesting, you can click a link to open it. If
the site doesn't have what you need, you can simply return to the results page to look for more options.
Most browsers also allow you to perform a web search directly from your address bar, although some have
a separate search bar next to the address bar. Simply type your search terms and press Enter to run the search.
Search suggestions
If you don't find what you're looking for on the first try, don't worry! Search engines are good at finding things
online, but they're not perfect. You'll often need to try different search terms to find what you're looking for.
If you're having trouble thinking of new search terms, you can use search suggestions instead. These will
usually appear as you're typing, and they're a great way to find new keywords you might not have tried
otherwise. To use a search suggestion, you can click it with your mouse, or select it with the arrow keys on
your keyboard.
Search
Suggestions
11
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS
Content-specific searches
There may be times when you're looking for something more specific, like a news article, picture, or video.
Most search engines have links at the top of the page that allow you to perform these unique searches.
In the example below, we've used the same search terms to look for images instead of websites. If you see an
image you like, you can click to visit the website it originally came from.
You can use the extra search tools to narrow down your results even more. These tools will change based on
the type of content you're looking for, but in this example we can filter our images by size, color, image type,
and more. So if you wanted to find cookies with pink frosting, you could search for images that are mostly
pink.
Advertisements
One final thing to note: Most search engines include advertisements with search results. For example, you
can see advertisements at the top of the search results below.
These ads are based on your search terms, and they often look similar to other search results. While they may
be useful in some cases, it's usually more helpful to focus on the actual search results.
E-GOVERNANCE WEBSITE
e-Governance can be defined as the application of information and communication technology (ICT) for
providing government services, exchange of information, transactions, integration of previously existing
services and information portals.
The “e” in e-Governance stands for ‘electronic’.
INTERNET SECURITY
Internet security consists of a range of security tactics for protecting activities and transactions conducted
online over the internet. These tactics are meant to safeguard users from threats such as hacking into computer
systems, email addresses, or websites; malicious software that can infect and inherently damage systems; and
identity theft by hackers who steal personal data such as bank account information and credit card numbers.
Internet security is a specific aspect of broader concepts such as cyber security and computer security, being
focused on the specific threats and vulnerabilities of online access and use of the internet.
In today's digital landscape, many of our daily activities rely on the internet. Various forms of communication,
entertainment, and financial and work-related tasks are accomplished online. This means that tons of data and
sensitive information are constantly being shared over the internet. The internet is mostly private and secure,
but it can also be an insecure channel for exchanging information. With a high risk of intrusion by hackers
and cybercriminals, internet security is a top priority for individuals and businesses alike.
12
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS
Malware: Short for "malicious software," malware comes in several forms, including computer viruses,
worms, Trojans, and dishonest spyware.
Computer worm: A computer worm is a software program that copies itself from one computer to the next.
It does not require human interaction to create these copies and can spread rapidly and in great volume.
Spam: Spam refers to unwanted messages in your email inbox. In some cases, spam can simply include junk
mail that advertises goods or services you aren't interested in. These are usually considered harmless, but some
can include links that will install malicious software on your computer if they're clicked on.
Phishing: Phishing scams are created by cybercriminals attempting to solicit private or sensitive information.
They can pose as your bank or web service and lure you into clicking links to verify details like account
information or passwords.
Botnet: A botnet is a network of private computers that have been compromised. Infected with malicious
software, these computers are controlled by a single user and are often prompted to engage in nefarious
activities, such as sending spam messages or denial-of-service (DoS) attacks.
4. Do not open email attachments from unknown senders: These could be infected with malware.
5. Do not click on links in emails from unknown senders or unfamiliar websites: This is a common
way that malware is spread.
6. Avoid using unsecure WiFi networks in public places: Unsecure networks leave you vulnerable to
man-in-the-middle attacks.
MODEL QUESTIONS
1. What are the different types of computer network? Explain with an example.
2. What are the applications of the internet?
3. What is the full form of ISP, URL, WiFi, WWW?
4. Difference between Search engines and web browsers?
5. What is the difference between WWW and the Internet?
6. Write the steps to download a document from the internet.
7. How can you protect your computers and data from cyber threats?
14