How Internet Works and Safe Digital Research Presentation
How Internet Works and Safe Digital Research Presentation
• Allows information to be
What is a Computer Network?
• A computer network is a group of
connected devices, such as
computers, printers and routers. These
devices link together to communicate
with each other and share information.
The
Whenweb server finds
accessing the website,
a website, image
searching or song
for an imageyou
or requested anda sends
downloading song, it
your
back tohas
device your
todevice.
make a request to a web server over the Internet.
www.twinkl.co.uk
How Does the Internet Work?
What youThis
haveallrequested
happens using something
may be too largecalled
to sendIP back
packets.
in one piece,
so it is broken down into tiny pieces and each piece placed in its own IP packet.
Imagine these packets are like virtual envelopes
How Does the Internet Work?
This
Theselets
areyou
then
view
sent
your
along
website,
a route
complete
until they
image
arriveoratlisten
theirtodestination,
the where
whole
they are
song
reassembled
you requested.
so that they are in order.
Wordbank
switch
server
router
devices
printer
Internet
workstations
workstation devices
s
How many did
you get right?
Wordbank
switch
switch
server
router router
printer
devices
printer
Internet Internet
workstations
server
How Internet works ?
What Do You Use the Internet For?
browsing the World Wide Web
listening to music
accessing maps
Some
These search engines
browsers you may
also allow you have thought
to access and of are: the
explore
online Google,
World WideYahoo,
WebKidrex
usingand Duckengines.
search Duck Goose.
A search engine playing
shopping is
A aweb
There
Can service
are
you youofuse
browser
many
think uses onhyperlinks
the
different
a web Internet
web
browser toyou
browsers
to help
direct
that you
that
us find
toyou
have webmay online
information viaof,the World Wide games
have
pagesthought
used containing
before? such
graphics, text, Web.
as Google video
Chrome,
andMozilla
sound.
finding Firefox and Microsoft Edge.
information reading the
Can you think of any search engines that you may news
Twinkl Search Get Lucky!
have used before?
finding a
location sending
on a map emails
The Internet vs the World Wide Web
When we go online, we can say that we are ‘using the Internet’
You may have thought of some of the following:
or ‘on the World Wide Web’.
file sharing
Being on the World Wide Web specifically relates
to using web browsers and websites to access
streaming music,
information, videos
but we anddoTVother
can still programmes
things
online.
online gaming
You can’t access the World Wide Web without the Internet.
How Browser Interact with the
Internet?
User Input: You type a website Server Processing: The web
1 address URL) into your browser's server processes the request and 4
address bar. retrieves the requested webpage.
Here are some key tips to ensure your online research is secure:
❑ Reliable Sources: It is one that provides accurate, unbiased, and
up-to-date information.
❑ Credible Websites: Stick to reputable websites like academic
databases, government websites, and well-established news
organizations.
❑ Fact-Checking: Verify information from multiple sources to ensure
accuracy.
❑ Be Wary of Bias: Be mindful of biases that may influence the
information presented.
Online Privacy and Security
Online Privacy refers to the ability of individuals to control
their personal information and how it is used online.
Online Security is the practice of protecting computer systems
and networks from digital attacks.
❑ Strong Passwords: Use strong, unique passwords for all your online
accounts.
❑ Secure Wi-Fi: Avoid using public Wi-Fi for sensitive activities like
online banking or shopping.
❑ Beware of Phishing: Be cautious of suspicious emails and links.
❑ Protect Personal Information: Limit the amount of personal
information you share online.
❑ Use Antivirus Software: Keep your devices protected with up-to-date
antivirus software.
Ethical Research Practice
Ethical research practices are a set of principles that guide
researchers in conducting research in a responsible and ethical
manner.
❑ Citation: Always cite your sources to give credit to the original
authors and avoid plagiarism.
❑ Copyright Laws: Respect copyright laws and obtain permission before
using copyrighted material.
❑ Data Privacy: Be mindful of data privacy regulations and avoid sharing
sensitive information.
❑ Academic Integrity: Adhere to academic integrity standards and avoid
cheating or academic dishonesty.
Critical Thinking and Evaluation