0% found this document useful (0 votes)
5 views

Unit 2

Notes Ai Human Resume

Uploaded by

afnan ansari
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Unit 2

Notes Ai Human Resume

Uploaded by

afnan ansari
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Concept of the Internet

The Internet is a global network of interconnected


computers that allows for the exchange of
information and communication across vast distances.
It works by using standardized communication
protocols (most commonly TCP/IP) to ensure data
can be transmitted across diverse systems and
platforms. Originally developed for research and
military purposes, the Internet has evolved into a vast
public platform for commerce, education,
entertainment, and social interaction.
Key functions include:
 Information Access: Users can retrieve
data from anywhere in the world via
websites, databases, and cloud services.
 Communication: Services such as email,
messaging apps, and video conferencing
enable real-time interaction.
 Commerce: Online shopping, banking, and
business transactions are integral to the
modern digital economy.
 Social Networking: Platforms like social
media enable users to create communities
and share experiences.
Evolution of the Internet
 Early Beginnings: The Internet’s roots trace back to the 1960s with the
development of ARPANET by the U.S. Department of Defense. This was a
limited network of computers designed for research.

 1980s: As more educational institutions and governments adopted


ARPANET, the foundation for modern networking protocols (TCP/IP) was
established. By the end of the decade, the system began transitioning from
a military network to a global information infrastructure.

 1990s - The Web Era: The creation of the World Wide Web by Tim
Berners-Lee in 1991 revolutionized the Internet, making it accessible to
the general public. Web browsers such as Netscape and Internet Explorer
allowed users to navigate the web with ease. Commercial use of the
Internet began during this time, leading to the rise of e-commerce.

 2000s-Present: High-speed broadband, mobile Internet, and the rise of


social media transformed the Internet into a critical part of everyday life.
The introduction of cloud computing, IoT (Internet of Things), and AI-
powered platforms further expanded its functionality.
Characteristics of the Internet
 Global Connectivity: The Internet connects millions of networks
worldwide, making communication and data sharing instantaneous
and borderless.

 Decentralization: There is no central governing body controlling


the Internet, though there are standards organizations like ICANN
that manage domain names and IP addresses.

 Open Architecture: The Internet uses open standards and


protocols (like HTTP, TCP/IP), making it accessible and adaptable for
various applications and systems.

 Scalability: The Internet can accommodate new users, networks,


and services, growing continually without a loss of functionality.

 Interactive and Participatory: Unlike traditional one-way media


(e.g., television), the Internet allows for two-way communication
where users can actively participate by creating content, interacting
in real time, and collaborating.
•Anonymity and Privacy: The Internet offers varying levels of
anonymity. Users can communicate and access information
without always revealing their identity, though this also creates
challenges with privacy and security.

•Accessibility: The Internet is generally accessible to anyone


with a device and connection. Efforts continue to increase
accessibility to underserved and remote areas globally.

•Dynamic and Evolving: The Internet is constantly changing,


with new websites, technologies, and services emerging
regularly. This dynamism allows for innovation in areas like AI,
blockchain, and the metaverse.

•Interoperability: Different systems and devices (computers,


smartphones, IoT devices) can communicate and interact with
each other via the Internet, fostering a seamless digital
experience.
Concept of Email

Email (short for "electronic mail") is a method of


exchanging digital messages over the Internet. It
allows users to send and receive text, files, images,
and other multimedia content across a global
network. Emails are one of the earliest and most
widely used forms of communication on the Internet,
known for their speed, efficiency, and convenience.
Components of an Email
 Sender's Address: The email address of the person or
system sending the message (e.g.,
[email protected]).
 Recipient's Address: The email address(es) of the
person or group receiving the email (e.g.,
[email protected]).
 Subject Line: A brief summary or title of the email's
content, giving the recipient a quick idea of the message’s
purpose.
 Body: The main content of the email, which can be in the
form of text, links, images, or attachments.
 Attachments: Files (e.g., documents, images, videos)
that are sent along with the email.
 Signature: An optional block at the end of the email
containing the sender's contact information, name, and
often a closing remark.
How Email Works
 Message Composition: The user creates a message using
an email client (e.g., Gmail, Outlook).
 Sending: Once the message is composed, the user clicks
'send.' The message is sent to a mail server, which forwards it
to the recipient’s server using the SMTP (Simple Mail Transfer
Protocol) for outgoing mail.
 Receiving: The recipient’s mail server receives the message
and stores it until the recipient accesses their inbox using an
email client. The recipient can then view, read, or respond to
the message.
 Protocols: Email uses multiple protocols for functioning:
 SMTP (Simple Mail Transfer Protocol): For sending
emails.
 IMAP (Internet Message Access Protocol) or POP3
(Post Office Protocol 3): For receiving and managing
emails.
Features of Email
 Speed and Convenience: Emails are sent almost instantly, and
recipients can read and respond at their convenience.
 Low Cost: Email is usually free, requiring only Internet access and
a device, making it a cost-effective communication tool.
 Mass Communication: Emails can be sent to multiple recipients
simultaneously, making it effective for group communications.
 Attachments: Emails allow the sharing of files, documents, images,
and other multimedia elements.
 Asynchronous Communication: Emails don’t require the
sender and receiver to be online at the same time, unlike instant
messaging.
 Searchable: Modern email clients allow users to search through
their messages easily, making it easier to retrieve past
communications or important documents.
 Organizational Tools: Email clients often provide features like
folders, labels, filters, and rules, enabling users to organize their
inbox effectively.
Advantages of Email
 Efficiency: Quick exchange of messages and
information.
 Global Reach: Anyone with an Internet
connection can send and receive emails
globally.
 Record Keeping: Email provides a written
record of communications that can be
archived for future reference.
 Multimedia Support: Emails support the
inclusion of different file types as
attachments (e.g., documents, PDFs, photos).
Disadvantages of Email
 Spam: Unsolicited emails (junk or
promotional messages) often clutter
inboxes.
 Security Risks: Emails can be targets of
hacking, phishing attacks, or malware.
 Overload: Users can become overwhelmed
with large volumes of emails.
 Miscommunication: Emails, lacking tone
and body language, can sometimes lead to
misunderstandings.
Email Etiquette
 Use clear subject lines to indicate the purpose
of the email.
 Keep messages concise and to the point.
 Be mindful of tone since written words can be
misinterpreted.
 Use professional language in formal contexts.
 Avoid using all caps, as it can be perceived as
shouting.
 Acknowledge receipt of important emails
when appropriate.
 Proofread your message before sending to avoid
errors.
World Wide Web (WWW)

The World Wide Web (WWW) is a system of


interlinked hypertext documents and multimedia
that can be accessed via the Internet. It was
invented by Tim Berners-Lee in 1989 and allows
users to navigate from one web page to another
through hyperlinks.
Components of the WWW
 Web Pages: Documents that can contain
text, images, videos, and links, typically
written in HTML (Hypertext Markup
Language).
 Hyperlinks: Text or images that, when
clicked, take the user to another web page.
 Web Browsers: Software like Chrome,
Firefox, or Safari that allows users to view
web pages and navigate the web.
 Web Servers: Computers that store and
serve web pages to users.
Key Characteristics
 Global Accessibility: The WWW makes
information available to users globally.
 Interactivity: Users can interact with the web
through forms, videos, comments, etc.
 Hypertext Navigation: Users can click on links
to move between pages seamlessly.
 Multimedia: Web pages can incorporate
different types of media, such as text, images,
audio, and video.
 Searchability: Users can search for specific
information using search engines like Google,
Bing, etc.
Working of the WWW
 Client Request: A user enters a URL
(Uniform Resource Locator) into the
browser.
 Server Response: The browser sends a
request to the web server.
 Page Rendering: The server responds
by sending back the requested page,
which the browser then renders for the
user to view.
File Transfer Protocol (FTP)
File Transfer Protocol (FTP) is a standard network
protocol used to transfer files between a client and a
server over the Internet. FTP was developed in the
1970s as one of the earliest ways to exchange files
across networks.
Components of FTP:
FTP Client: Software that allows a user to connect to
an FTP server to upload or download files.
FTP Server: A remote server that stores files and
allows access for downloading or uploading via FTP.
Username and Password: Most FTP servers require
authentication for access, though some offer
anonymous FTP, which doesn’t require a password.
Key Characteristics:
 File Uploading and Downloading: FTP allows users to
upload files from their local computer to a remote server or
download files from a server to their device.
 Connection Types: FTP can operate in active or passive
mode, depending on how the client and server exchange
data.
 Anonymous Access: Some servers allow anonymous
FTP, where users can download files without needing a
username or password.
 Directory Navigation: FTP supports directory structures,
allowing users to navigate folders on the server.
 Security Considerations: Traditional FTP is not secure as
it sends data, including usernames and passwords, in plain
text. Secure alternatives like FTPS and SFTP encrypt data
during transmission.
Common FTP Commands:
 GET: Used to download a file from the server.
 PUT: Used to upload a file to the server.
 LIST: Displays a list of files and directories in the current
directory.
 CD: Changes the directory on the server.

 Example of FTP Usage:


 Connect to Server: The user uses an FTP client (like
FileZilla) to connect to an FTP server using credentials.
 File Transfer: The user selects files for uploading to or
downloading from the server.
 Connection Close: After the transfer is complete, the
connection between the client and the server is closed.
Applications of FTP
 Website Management: Web developers use FTP to
upload or modify files on a web server.
 Data Backup: FTP can be used for remotely storing
backups.
 File Sharing: Businesses and organizations use FTP
for exchanging large files between remote teams or
clients.

 Secure Variants:
 FTPS (FTP Secure): Uses SSL/TLS encryption to
secure the file transfers.
 SFTP (SSH File Transfer Protocol): Provides file
transfer over a secure shell (SSH) connection.
Telnet

Telnet is an application protocol used to provide a


command-line interface for communicating with a
remote device or server over the Internet or a local
network. It allows users to control and manage a
device remotely by establishing a connection through a
terminal emulator.
Characteristics of Telnet:

 Command-Line Interface: Telnet


operates through text-based command
inputs and outputs.
 Remote Access: It provides access to
another machine or server, allowing users to
execute commands as if they were physically
present at the remote device.
 Port Number: Telnet typically runs on
port 23.
 No Encryption: Telnet transmits data,
including usernames and passwords, in plain
text, making it insecure for sensitive data.
Usage
 Remote System Management: Administrators
use Telnet to remotely manage servers, routers, or
other network devices.
 Testing Network Services: Telnet can be used to
test network services and troubleshoot issues by
checking port availability.
 Accessing Old Systems: Some legacy systems,
which don’t support modern protocols, still use
Telnet for remote access.
 Limitation of Telnet:
 Due to its lack of encryption, Telnet has largely been
replaced by SSH (Secure Shell), which provides
encrypted communications for secure remote access.
Intranet & Extranet
 An Intranet is a private network used
within an organization to securely share
information, applications, and resources
among employees. It operates on the
same principles as the Internet but is
limited to authorized users within the
organization.
Characteristics of an Intranet:
 Private Network: Access is restricted to
employees or members of the organization.
 Security: Since it is isolated from the Internet,
the Intranet is typically more secure, protecting
sensitive internal data.
 Internal Communication: It’s used for internal
communication, such as employee portals,
document sharing, or project management tools.
 Customization: Intranets can be tailored to
meet the specific needs of an organization,
providing tools for collaboration, communication,
and resource management.
Applications of an Intranet:
 HR Portals: Employees can access benefits,
policies, and payroll information.
 Knowledge Sharing: Centralized databases
for company documentation, training materials,
or internal news.
 Collaboration Tools: Project management
tools, internal messaging systems, and file
sharing.
Extranet
 An Extranet extends the functionality of
an Intranet by allowing access to
authorized external users, such as
partners, suppliers, or customers. It
provides a secure way to collaborate and
share information with people outside the
organization.
Characteristics of an Extranet
 Extended Access: External users can access
certain parts of the organization’s Intranet
through secure channels.
 Security: Extranets employ encryption,VPNs,
or firewalls to ensure that external access
remains secure.
 Controlled Sharing: Access to resources is
controlled, ensuring that only authorized
external users can view certain documents or
applications.
Applications of an Extranet
 Supply Chain Management: Businesses use
extranets to collaborate with suppliers on
inventory, orders, or deliveries.
 Customer Support: Companies may provide
external clients with secure access to support
documents, software updates, or product
information.
 Collaboration: Organizations working with
external partners on joint projects may use
extranets to share progress reports, documents,
or data.
Limitations of the Internet
 1. Security Threats
 Cybercrime: Hackers can steal personal information, financial
data, or intellectual property through cyberattacks like phishing,
malware, ransomware, etc.
 Data Privacy: User data can be collected, stored, and misused by
companies or third parties, raising concerns over privacy.
 Identity Theft: Sensitive personal information can be
compromised, leading to identity fraud and other related crimes.

 2. Overload of Information
 Information Overload: The sheer amount of information
available on the Internet can be overwhelming, making it difficult to
discern useful and credible content.
 Misinformation: False or misleading information can spread
quickly, leading to misunderstandings or social harm, especially with
fake news and misinformation campaigns.
3. Accessibility and Digital Divide
Unequal Access: Not everyone has access to the Internet, particularly
in remote or underdeveloped areas. This digital divide can prevent
individuals or communities from accessing essential information and
opportunities.
Infrastructure Gaps: Some regions lack the necessary infrastructure
(broadband, fiber optics) for stable, fast Internet connections.

4. Dependency
Over-Reliance: Many people and organizations rely heavily on the
Internet for work, entertainment, and social interaction. This
dependence can cause problems when there are disruptions (e.g.,
outages, cyberattacks) or lead to reduced productivity due to
distractions (e.g., social media).
Social Isolation: Excessive use of the Internet, particularly social
media, can lead to reduced face-to-face interactions and feelings of
isolation.
5. Quality and Speed of Connection
Slow Internet Speeds: In some areas, the quality of the
Internet connection is poor, leading to slow browsing or
difficulty accessing high-bandwidth services like video
streaming.
Latency Issues: High latency can affect real-time activities
like gaming, video conferencing, and VoIP calls.

6. Cost
Expensive Internet Services: High-speed Internet can
be expensive, particularly in remote or rural areas, making
it inaccessible for some users.
Cost of Hardware: Internet access requires devices like
computers, smartphones, and networking equipment,
which can be costly for individuals or businesses.
7. Legal and Ethical Issues
Censorship: In some countries, governments restrict or
control access to certain information or websites, limiting
freedom of expression.
Intellectual Property Violations: Online piracy of
copyrighted material (movies, music, books) is widespread,
posing challenges for content creators and businesses.

8. Health and Psychological Effects


Physical Health: Long periods of Internet use, especially
sitting at a computer, can lead to health problems like eye
strain, poor posture, and sedentary lifestyle issues.
Mental Health: Overuse of the Internet, particularly
social media, can contribute to stress, anxiety, depression,
and low self-esteem.
Hardware Requirements
Computer/Device:
A desktop, laptop, tablet, or smartphone with basic
processing capabilities is required to access the internet.
Minimum specifications for general use:
CPU: Dual-core processor or better
RAM: 4 GB or more for smooth browsing
Storage: 128 GB or more (SSD recommended for
better speed)
Display: Standard resolution (1280x720 or better)
Modem:
A modem connects your device to your internet service
provider (ISP) through a cable, fiber optic, or DSL line.
Router:
A router connects multiple devices to the internet, often
creating a Wi-Fi network for wireless access. Many ISPs provide
a combined modem/router device.
Network Interface Card (NIC):
Devices must have a wired (Ethernet) or wireless (Wi-Fi)
network card to connect to a network.
For wireless connections, a device must have a built-in Wi-Fi
adapter or an external one.
Internet Connection (ISP):
Access to the internet through an ISP that provides broadband,
fiber, DSL, or satellite services. The speed may vary:
Minimum: 1-5 Mbps (basic web browsing and emails)
Recommended: 10-25 Mbps (HD video streaming, multiple
devices)
High Performance: 100 Mbps and above (online gaming, 4K
streaming)
Cables & Accessories:
Ethernet cables for wired connections, which are generally
faster and more stable than wireless.
Power adapters and backup power solutions like UPS for
uninterrupted access.
Software Requirements:

 Operating System (OS):


 An OS capable of managing network connections. Examples
include:
◦ Windows 10/11 for PCs
◦ macOS for Apple computers
◦ Linux distributions (Ubuntu, Fedora, etc.)
◦ Android or iOS for smartphones and tablets
 Web Browser:
 A browser to navigate and access websites, such as:
◦ Google Chrome
◦ Mozilla Firefox
◦ Microsoft Edge
◦ Safari
◦ Opera
•Network Drivers:
•Drivers for the network interface card (NIC) or Wi-Fi
adapter should be installed and up-to-date to ensure
proper connectivity.

•Antivirus/Firewall Software:
•Internet security software helps protect the device
from viruses, malware, and hacking attempts.
•Examples include Norton, McAfee, Windows
Defender, or Kaspersky.

•Plug-ins and Extensions:


•Certain web activities (like viewing media, editing
documents, etc.) may require plug-ins like
JavaScript, Adobe Flash (deprecated but still in use
on some sites), or PDF readers.
Email Client (Optional):
If email is accessed through an application, software
like Microsoft Outlook, Mozilla Thunderbird, or
Apple’s Mail App is required.

VPN Software (Optional):


For secure access, especially for remote work or
browsing in restricted regions, a VPN (Virtual
Private Network) may be used. Examples include
NordVPN, ExpressVPN, etc.

Cloud Storage/Backup Solutions (Optional):


For backing up data, services like Google Drive,
Dropbox, or OneDrive are widely used.
Searches Engines

A search engine is an online tool that helps


users find information on the internet. It does
this by crawling, indexing, and ranking web
pages so that when a user enters a search
query, the most relevant results are displayed.
Key Components of a Search Engine:

 Web Crawlers: These are programs (often called spiders or bots)


that explore the internet, visiting websites, and gathering
information about the content on each page. This information is
then stored in the search engine's database.
 Indexing: Once web crawlers collect data from websites, the
search engine organizes this data in an index. This index is like a
giant library catalog of the internet, which helps the search engine
quickly retrieve relevant results.
 Search Algorithm: When a user enters a search query, the search
engine uses a set of complex algorithms to analyze its index and
return the most relevant web pages. Factors such as keywords,
page content, user location, and the popularity of a website can
influence which results are displayed.
 Ranking: Search engines rank the results based on various factors,
including relevance, the quality of content, and the authority of the
website. The goal is to present the best possible answer to the
user's query at the top of the results.
Types of Search Engines
 General Search Engines: Examples include
Google, Bing, and Yahoo, which search a wide
range of topics and websites.

 Vertical Search Engines: These specialize in a


particular domain, like YouTube for videos,
Amazon for shopping, or PubMed for scientific
literature.
Key Terms
 SEO (Search Engine Optimization):
Techniques used by website owners to improve
their site's visibility and ranking on search
engines. SERP

 (Search Engine Results Page): The page


displayed by a search engine in response to a
user's query.

You might also like