Chapter-5-The Internet and Its Uses
Chapter-5-The Internet and Its Uses
The differences between the internet and the World Wide Web (WWW)
5.1 Uniform resource locators
Web browsers (often simply referred to as ‘browsers’) are software that allow users to access and display web
pages or play multimedia from websites on their devices. The browser interprets hypertext mark-up language
(HTML) sent from the websites. Uniform resource locators (URLs) are text addresses used to access websites. A
URL is typed into a browser address bar using the following format:
http and https
Hypertext transfer protocol (http) is a set of rules that must be obeyed when transferring files across the internet.
If some form of security is employed, it becomes https (s = secure) and you may also see a green padlock in the
browser address window.
Web browsers
Browsers interpret (translate) HTML from websites and show the results of the translation (either as a website page
or play multimedia). The main features of a typical browser include:
• a home page and address bar
• the ability to store favourite websites and web pages (bookmarks)
• keeping a history of websites visited (user history)
• the ability to allow the user to navigate forwards and backwards through a website
• allowing many web pages to be open at the same time by using multiple tabs
• making use of cookies
Retrieval and location of web pages
To retrieve pages from a website, a browser needs to know the IP address. A domain name server (DNS) is
used to find the IP address from the domain name in the URL typed into the browser window.
hoddereducation.co.uk/cambridge-igcse-computerscience
Cookies
Cookies are small files or
code stored on a user’s
computer (permanently or
temporarily). Cookies are
sent by a web server to the
browser on a user’s
computer.
To obtain personal data/details // by example
Displays web pages
Passwords are the most common form of authentication (they are often associated with usernames).
Biometrics
Biometrics can be used as a type of password and are based on certain unique human characteristics, such as:
• fingerprint scans
• retina scans
• face recognition
• voice recognition
Two-step verification
Two-step verification requires two methods of authentication to verify who a user is.
Firewalls
A firewall can be either software or hardware. It sits between the user’s computer and an external network (for
example, the internet) and filters information in and out of the computer.
Firewalls are the primary defence to any computer system to help protect it from hacking, malware (viruses and
spyware), phishing and pharming.
The address window in the browser when https protocol is being applied, rather than just http protocol, is quite
different: