0% found this document useful (0 votes)
164 views14 pages

Introduction To Internet

Uploaded by

gagod57056
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
164 views14 pages

Introduction To Internet

Uploaded by

gagod57056
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

CHAPTER -5: INTRODUCTION TO INTERNET,


WWW AND WEB BROWSERS
INTRODUCTION
Everything in this world (living or nonliving) is somehow connected to each other. The inter-connections
between all these things is very much essential as it allows us to communicate and share some shorts of
information among each other. Being a part of this world we human beings also love to know, learn and share
our thoughts among ourselves by means of communication. History tells us that the ancient people had very
limited resources to communicate among themselves. However, with the advancement of time we managed
to modify our skills and succeed to develop various kinds of communication devices as per our need. Now
we are surviving in such a world where almost every individual, no matter wherever you stay, is connected to
one another. This gets possible only by means of advancement in technology. Computers as a component of
information technology play a vital role in the human communication system. Almost each and every
computer in our world is interconnected and builds a huge networking system. Thus, in this lesson we will
discuss the network of computers and how this helps us to communicate between us.

OBJECTIVES
The main objectives of this lesson are:
1. To know the basics of computer networks
2. To clear the concept of Internet and its uses.
3. To learn about the World Wide Web.
4. How to connect the Internet and its troubleshooting.
5. To know about the Software and methods of searching in web.
6. To know about the URL.
7. To improve our knowledge about internet threats and how to secure our data from these threats.

BASICS OF COMPUTER NETWORK


As I discussed earlier, computers need to be connected to share information. Thus, when two or more
computers get connected to each other they form a network. Hence, computer networks are nothing but a
setup of interconnected computers. Computer network can be classified as -
 LOCAL AREA NETWORK (LAN) - LAN (Local Area Network) is a type of computer network
where a group of computers is connected to a small area. Mostly they are restricted to that place and it
cannot be accessed outside.
A few of the examples are hospitals, apartments, schools where they have access just in a building or
organization.
Only a few computers are connected through switches and routers.
LAN is always secure as no one outside the connection has access to this network. Hence data shared in this
network is secure. LAN is comparatively smaller in size hence they are faster and speed ranges from 1000
Mbps.
Earlier LAN was limited to wire connection, but these days LAN allows the local networks to work on a
wireless connection. As it covers a small geographical area it is easy to maintain at low cost as well.
 WIDE AREA NETWORK (WAN) - A Wide-area network (WAN) usually provides large area
transmission of data. WAN has a lower rate of data transfer compared to that of LAN as they cover a
larger area.
The setup cost of a WAN in a remote area is higher as the connection needs to be setup.
1
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

However, the setup cost for a public network would be cheaper by using software (VPN). The best example
of a WAN is a
Mobile broadband connection.
WAN network allows us to choose the bandwidth of the network based on our needs. Larger organizations
can choose large bandwidth for faster data while small industries can choose according to their need.

INTERNET
CONCEPT OF INTERNET
Communications and methods of commerce by allowing various computer networks around the world to
interconnect. Sometimes referred to as a “network of networks,” the Internet emerged in the United States in
the 1970s but did not become visible to the general public until the early 1990s. By 2020, approximately 4.5
billion people, or more than half of the world’s population, were estimated to have access to the Internet.
The Internet provides a capability so powerful and general that it can be used for almost any purpose that
depends on information, and it is accessible by every individual who connects to one of
its constituent networks. It supports human communication via social media, electronic mail (e-mail), “chat
rooms,” newsgroups, and audio and video transmission and allows people to work collaboratively at many
different locations. It supports access to digital information by many applications, including the World Wide
Web.

APPLICATIONS OF INTERNET
1. Email.
2. Web-enabled audio/video conferencing services.
3. Online movies and gaming.
4. Data transfer/file-sharing
5. Instant messaging.
6. Internet forums.
7. Social networking.
8. Online shopping.
9. Financial services.

CONNECTING TO THE INTERNET


How to set up a Wi-Fi network?

The Internet is a really powerful tool. It gives us access to


all kinds of information at a moment's notice—think
email, Google search, and Wikipedia. So there's
something a little counterintuitive about only being able
to use the Internet when you sit down at a desktop
computer. What if you could use the Internet from
anywhere in your home or office?
If you already have high-speed (broadband) Internet
service at your house, it's pretty easy to create your
own home wireless network. Commonly known as Wi-Fi (Wireless Fidelity), a wireless network allows
you to connect laptops, smartphones, and other mobile devices to your home Internet service without an
Ethernet cable.
2
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

To create your own Wi-Fi network, you'll need a wireless router. This is the
device that will broadcast the Wi-Fi signal from your Internet modem throughout
your house. Your Internet service provider (ISP) may offer you a wireless router
for a small monthly fee. If you've never set up a Wi-Fi network before, this may
be the easiest option.

Connect the cables


 Once you've acquired a wireless router, you'll need to connect it to your
existing Internet modem.
 Connect an Ethernet cable from your modem to the wireless router (there is usually a short Ethernet
cable included with your wireless router for this purpose).
 Plug in the power cable for the wireless router.
 Wait at least 30 to 60 seconds, and make sure the lights on your router are working correctly.

Configure your router


1) Next, you'll need to use your computer to configure your router's default settings. This includes setting
a unique name and password for your wireless network.
2) Using your web browser, enter the router's default IP address into the address bar, then press Enter.
Your router's instructions should include this information, but some of the most common addresses
include 192.168.0.1, 192.168.1.1, and 192.168.2.1.
3) The router's sign-in page will appear. Again, the exact sign-in details should be included with your
router's instructions, but most routers use a standard user name and password combination, such
as admin and password.
4) Your router's settings page will appear. Locate and select the Network Name setting, then enter a
unique network name.
5) Locate and select the Network Password setting, and choose an Encryption option. There are several
types of encryption you can use, but we recommend WPA2, which is generally considered to be the
most secure.
6) Enter your desired password. Make sure to use a strong password to help ensure no one else can access
your network.
7) Locate and select the Save button to save your settings.

Connect!
That's it! Now you're ready to connect to your Wi-Fi network and make sure it's working. The process for
connecting to a Wi-Fi network will vary slightly depending on what type of computer or device you're using,
but any system will require these basic steps.
1) Locate your computer's network settings, and search for nearby Wi-Fi networks.
2) Select your network, and enter your password.
3) If the connection is successful, open your web browser and try navigating to a webpage
like www.google.com. If the page loads, it means your Wi-Fi connection is working correctly.

Congratulations!
You've just set up your own home wireless network. Way to go!

TROUBLESHOOTING
We love to work smoothly over internet and never wants our network gets disconnected or arouse any problem
that hampers our internet connectivity. Although in some cases we may face these kinds of network problem
and to solve that we need to learn some diagnostic tricks.

3
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

Let's step through the basic process of how to troubleshoot network connectivity problems. That way, next
time you open up your web browser to a Cannot Connect message, you'll know what to do. Like all
troubleshooting, we'll start broadly and narrow down to specifics.
After each step, attempt to connect to a website to verify your connection is working. If it still doesn't work,
continue to the next part.
1) Make Sure It's Actually Your Network Problem: Sometimes what seems like a network outage is
actually a problem on a specific website's end. If you can't get on Twitter, for instance, check another
few websites to make sure that the problem isn't just with a single site.
2) Reboot your PC, as well as your modem and router. To clear the modem and router caches, wait
60 seconds before you turn them back on again. When you plug everything back in, plug your modem
in first and wait for it to power on before connecting your router.
3) Does your network problem persist after rebooting? Before you start diving into settings and tests, the
next step to check is that you're physically connected. If you use an Ethernet cable to connect to your
router, check to make sure that it's not unplugged or damaged. If your laptop has a physical wireless
switch, make sure that it's not set to the off position. Once you've verified a proper connection, check
your equipment. Are the lights on your router and/or modem flashing green as normal? If no lights
come on after the reboot, the device could be dead or malfunctioning. However, if you get red lights,
or a power light but no connection light, your ISP is likely experiencing disruption.
4) Windows includes some built-in troubleshooters that can automatically find and fix issues. To run the
troubleshooter for network problems, right-click the network icon in your System Tray and
choose Troubleshoot Problems. Once the troubleshooter runs, it could fix issues, find issues but fail
to fix them, or find nothing.
5) If the problem doesn’t get solve it is better to call a computer expert.

WORLD WIDE WEB (WWW)


World Wide Web (WWW), commonly known as the Web, the leading information retrieval service of
the Internet (the worldwide computer network). The Web gives users access to a vast array of documents that
are connected to each other by means of hypertext or hypermedia links—i.e., hyperlinks, electronic
connections that link related pieces of information in order to allow a user easy access to them. Hypertext
allows the user to select a word or phrase from text and thereby access other documents that contain additional
information pertaining to that word or phrase. Hypermedia documents feature links to images, sounds,
animations, and movies. The Web operates within the Internet’s basic client-
server format; servers are computer programs that store and transmit documents to other computers on the
network when asked to, while clients are programs that request documents from a server as the user asks for
them. Browser software allows users to view the retrieved documents.

WEB BROWSING SOFTWARES


A web browser (commonly referred to as a browser) is a software application for retrieving, presenting, and
traversing information resources on the World Wide Web (also known as the internet or the Net) e.g. Google
Chrome, Microsoft Edge (formerly Internet Explorer etc. If you have a Windows computer, Microsoft Edge
(or its older counterpart, Internet Explorer) are already installed on your computer. If you are running an Apple
computer, you already have Safari installed on your computer. You may also have other browsers installed on
your computer. If the browser you want to use is not installed on your computer, download it from their
respective sites.

POPULAR WEB BROWSING SOFTWARES


There are many different web browsers, but some of the most common ones include Google
Chrome, Internet Explorer, Safari, Microsoft Edge, and Mozilla Firefox.
4
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

SEARCH ENGINES
The most productive way to conduct a search on the internet is through a search engine. A web search engine
is a software system designed to search for information on the World Wide Web. The search results are
generally presented in a line of results often referred to as search engine results pages (SEROs). The
information may be a mix of web pages, images, and other types of files.

POPULAR SEARCH ENGINES/ SEARCH FOR CONTENT


There are a number of various search engines available and some of them may seem familiar to you. The top
web search engines are Google, Bing, Yahoo, Ask.com, and AOL.com.

ACCESSING WEB BROWSER


Each website has a unique address, called a URL (short for Uniform Resource Locator). It's like a street
address that tells your browser where to go on the Internet. When you type a URL into the browser's address
bar and press Enter on your keyboard, the browser will load the page associated with that URL.

5
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

Address bar

In the example below, we've typed https://nsnis.org/ into the address bar.

Links
Whenever you see a word or phrase on a website that's blue or underlined in blue, it's probably a hyperlink,
or link for short. You might already know how links work, even if you've never thought about them much
before. For example: [email protected]
Links are used to navigate the Web. When you click a link, it will usually take you to a different webpage.
You may also notice that your cursor changes into a hand icon whenever you hover over a link.

Navigation buttons
The Back and Forward buttons allow you to move through websites you've recently viewed. You can also
click and hold either button to see your recent history.

Navigation buttons

6
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

The Refresh button will reload the current page. If a website stops working, try using the Refresh button.
Tabbed browsing
Many browsers allow you to open links in a new tab. You can open as many links as you want, and they'll
stay in the same browser window instead of cluttering your screen with multiple windows.

Tabs

To open a link in a new tab, right-click the link and select Open link in new tab (the exact wording may vary
from browser to browser).

To close a tab, click the X.

Bookmarks and history


If you find a website you want to view later, it can be hard to memorize the exact web address. Bookmarks,
also known as favourites, are a great way to save and organize specific websites so you can revisit them again
and again. Simply locate and select the Star icon to bookmark the current website.

7
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

Bookmark Bar

Your browser will also keep a history of every site you visit. This is another good way to find a site you visited
previously. To view your history, open your browser settings—usually by clicking the icon in the upper-right
corner—and select History.

Downloading files
Links don't always go to another website. In some cases, they point to a file that can be downloaded, or saved,
to your computer.
If you click a link to a file, it may download automatically, but sometimes it just opens within your
browser instead of downloading. To prevent it from opening in the browser, you can right-click the link and
select Save link as (different browsers may use slightly different wording, like Save target as).
8
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

Saving images

Sometimes you may want to save an image from a website to your computer. To do this, right-click the image
and select Save image as (or Save picture as).

Plug-ins
Plug-ins are small applications that allow you to view certain types of content within your web browser. For
example, Adobe Flash and Microsoft Silverlight are sometimes used to play videos, while Adobe Reader is
used to view PDF files.
If you don't have the correct plug-in for a website, your browser will usually provide a link to download it.
There may also be times when you need to update your plug-ins. Review our lesson on Installing and
Updating Plug-ins to learn more.

9
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

URL
A Uniform Resource Locator, more commonly known as a URL, is the global address of documents and
other resources on the World Wide Web. It is the mechanism used by browsers to retrieve any published
resource on the web. For example, www.webopedia.com is the URL used to locate this website. A URL is
the most common type of Uniform Resource Identifier (URI), the generic term used for all types
of names and addresses that refer to objects on the World Wide Web. An IP address can be directly used in
replacement of a URL, but since it's relatively inconvenient, it's not often used.
Parts of a URL
A URL consists of different parts used to load the associated page. Some parts are mandatory while others are
optional. Below, the corresponding part of a URL is bolded to demonstrate which part is being referenced.
There are three key parts of a URL:

Protocol
https://nsnis.org/recruitment/
The beginning of the URL indicates which protocol the browser must use. The most common protocols
are Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS). With more
attention being paid to online privacy and security today, the more secure HTTPS is becoming the dominant
protocol on the World Wide Web. Less common protocols include ftp: (File Transfer Protocol) and mailto:
(to open a mail client). The term "web address" refers to a URL using the HTTP or HTTPS protocol. It is not
mandatory to include the protocol when entering in a URL.

Domain name
https://nsnis.org/recruitment/
Many people use the terms domain name and URL interchangeably, but a URL incorporates a domain name
to create a complete address—it is not one in itself. A domain name is a unique reference that identifies a
website on the World Wide Web. It comes directly after the protocol and is separated by a colon and two
forward slashes.

Path
https://nsnis.org/recruitment/
The path refers to the exact location of a page, post, file, or other asset. The path comes after the domain name
and is separated by a forward slash. Not all URLs will display a path due to websites being able to rewrite
URLs for simplicity.
It's important to note that spaces are not allowed in a URL. Only alphanumeric characters and the !$-_+*'(),
characters can be used. Any other characters that are needed must be encoded.

SURFING THE WEB


How to search the Web?
To perform a search, you'll need to navigate to a search engine in your web browser, type one or
more keywords—also known as search terms—then press Enter on your keyboard. In this example, we'll
search for sports technology.

10
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

After you run a search, you'll see a list of relevant websites that match your search terms. These are
commonly known as search results. If you see a site that looks interesting, you can click a link to open it. If
the site doesn't have what you need, you can simply return to the results page to look for more options.
Most browsers also allow you to perform a web search directly from your address bar, although some have
a separate search bar next to the address bar. Simply type your search terms and press Enter to run the search.

Search suggestions
If you don't find what you're looking for on the first try, don't worry! Search engines are good at finding things
online, but they're not perfect. You'll often need to try different search terms to find what you're looking for.
If you're having trouble thinking of new search terms, you can use search suggestions instead. These will
usually appear as you're typing, and they're a great way to find new keywords you might not have tried
otherwise. To use a search suggestion, you can click it with your mouse, or select it with the arrow keys on
your keyboard.

Search
Suggestions

11
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

Content-specific searches
There may be times when you're looking for something more specific, like a news article, picture, or video.
Most search engines have links at the top of the page that allow you to perform these unique searches.
In the example below, we've used the same search terms to look for images instead of websites. If you see an
image you like, you can click to visit the website it originally came from.
You can use the extra search tools to narrow down your results even more. These tools will change based on
the type of content you're looking for, but in this example we can filter our images by size, color, image type,
and more. So if you wanted to find cookies with pink frosting, you could search for images that are mostly
pink.

Advertisements
One final thing to note: Most search engines include advertisements with search results. For example, you
can see advertisements at the top of the search results below.
These ads are based on your search terms, and they often look similar to other search results. While they may
be useful in some cases, it's usually more helpful to focus on the actual search results.

E-GOVERNANCE WEBSITE
e-Governance can be defined as the application of information and communication technology (ICT) for
providing government services, exchange of information, transactions, integration of previously existing
services and information portals.
The “e” in e-Governance stands for ‘electronic’.

INTERNET SECURITY
Internet security consists of a range of security tactics for protecting activities and transactions conducted
online over the internet. These tactics are meant to safeguard users from threats such as hacking into computer
systems, email addresses, or websites; malicious software that can infect and inherently damage systems; and
identity theft by hackers who steal personal data such as bank account information and credit card numbers.
Internet security is a specific aspect of broader concepts such as cyber security and computer security, being
focused on the specific threats and vulnerabilities of online access and use of the internet.
In today's digital landscape, many of our daily activities rely on the internet. Various forms of communication,
entertainment, and financial and work-related tasks are accomplished online. This means that tons of data and
sensitive information are constantly being shared over the internet. The internet is mostly private and secure,
but it can also be an insecure channel for exchanging information. With a high risk of intrusion by hackers
and cybercriminals, internet security is a top priority for individuals and businesses alike.
12
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

Types of internet security threats


While the web presents users with lots of information and services, it also includes several risks. Cyber-attacks
are only increasing in sophistication and volume, with many cybercriminals using a combination of different
types of attacks to accomplish a single goal. Though the list of potential threats is extensive, here are some of
the most common internet security threats:

Malware: Short for "malicious software," malware comes in several forms, including computer viruses,
worms, Trojans, and dishonest spyware.

Computer worm: A computer worm is a software program that copies itself from one computer to the next.

It does not require human interaction to create these copies and can spread rapidly and in great volume.
Spam: Spam refers to unwanted messages in your email inbox. In some cases, spam can simply include junk
mail that advertises goods or services you aren't interested in. These are usually considered harmless, but some
can include links that will install malicious software on your computer if they're clicked on.

Phishing: Phishing scams are created by cybercriminals attempting to solicit private or sensitive information.
They can pose as your bank or web service and lure you into clicking links to verify details like account
information or passwords.

Botnet: A botnet is a network of private computers that have been compromised. Infected with malicious
software, these computers are controlled by a single user and are often prompted to engage in nefarious
activities, such as sending spam messages or denial-of-service (DoS) attacks.

Choosing the right internet security tactics


Internet security requires a combination of several products and technologies to properly safeguard data. It's
important to consider several types of internet security strategies when taking proper measures to help keep
your network secure. These tactics can include:
Browser selection: Each browser has its own security measures in place, but some can have serious flaws
that allow hackers and cybercriminals to exploit and invade. Ensure that you're using a secure browser to
reduce the risk of compromising your computer or network.
Multi-factor authentication (MFA): MFA is a method of controlling computer access by requiring several
separate pieces of evidence to an authentication mechanism. Websites and email accounts can be made more
secure by requiring at least two factors of authentication by a user.
Email security: Email creates a wave of opportunity for viruses, worms, Trojans, and other unwanted
programs. Establishing a multi-layered and comprehensive email security strategy will help significantly
reduce exposure to emerging threats. Email messages can also be protected by using cryptography, such as
signing an email, encrypting the body of an email message, and encrypting the communication between mail
servers.
Firewalls: Firewalls act as filters that protect devices by allowing or denying access to a network. By applying
a specific set of rules to identify if something is safe or harmful, firewalls can prevent sensitive information
from being stolen and keep malevolent code from being embedded onto networks.

Cyber safety tips - protect yourself against cyber attacks


How can businesses and individuals guard against cyber threats? Here are our top cyber safety tips:
1. Update your software and operating system: This means you benefit from the latest security patches.
2. Use anti-virus software: Security solutions will detect and removes threats. Keep your software
updated for the best level of protection.
3. Use strong passwords: Ensure your passwords are not easily guessable.
13
CHAPTER -5: INTRODUCTION TO INTERNET, WWW AND WEB BROWSERS

4. Do not open email attachments from unknown senders: These could be infected with malware.
5. Do not click on links in emails from unknown senders or unfamiliar websites: This is a common
way that malware is spread.
6. Avoid using unsecure WiFi networks in public places: Unsecure networks leave you vulnerable to
man-in-the-middle attacks.

MODEL QUESTIONS

1. What are the different types of computer network? Explain with an example.
2. What are the applications of the internet?
3. What is the full form of ISP, URL, WiFi, WWW?
4. Difference between Search engines and web browsers?
5. What is the difference between WWW and the Internet?
6. Write the steps to download a document from the internet.
7. How can you protect your computers and data from cyber threats?

14

You might also like