0% found this document useful (0 votes)
62 views49 pages

Internet Basics UNIT III (Notes) - 1

The document outlines the evolution of the Internet from its inception in the 1960s to the present day, highlighting key milestones such as the founding of ARPA, the introduction of HTML and HTTP, and the emergence of social media and e-commerce. It also provides a glossary of essential internet terminology, including definitions for terms like URL, SSL, IP address, and encryption. The document emphasizes the importance of understanding these concepts for navigating the modern digital landscape.

Uploaded by

joyal9488
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views49 pages

Internet Basics UNIT III (Notes) - 1

The document outlines the evolution of the Internet from its inception in the 1960s to the present day, highlighting key milestones such as the founding of ARPA, the introduction of HTML and HTTP, and the emergence of social media and e-commerce. It also provides a glossary of essential internet terminology, including definitions for terms like URL, SSL, IP address, and encryption. The document emphasizes the importance of understanding these concepts for navigating the modern digital landscape.

Uploaded by

joyal9488
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 49

INTERNET BASICS

EVOLUTION
In the 1960s, there was already talk of computer networks that would allow general communication
between users of various computers. However, it is not until 1982 that the Internet is considered to be the
year in which it was “born”.

1958 – Founding of the ARPA

In this year, the Advanced Research Projects Agency Network was founded.

This organisation was made up of some 200 scientists and its aim was to create direct communications
between computers.

1967 – ARPANET is born

This year saw the first connection between computers at Stanford and UCLA. ARPANET was a
computer network that brought together the best ideas from teams at the Massachusetts Institute of
Technology (MIT), the National Physics Laboratory (NPL) and the Rand Corporation (RC).

1980 – HTML language, URL and HTTP


Tim Berners-Lee joined the European Organisation for Nuclear Research (CERN) that year as a
software engineer. In 1989 he presented a solution to the problems of data loss thanks to a distributed
hypertext system.

By 1990, Berners-Lee had developed three technologies: HTML, URLs and the hypertext
transfer protocol HTTP.

1982 – First virus

Although there were earlier virus cases, the virus created by Rich Skrenta is considered the first. The 15-
year-old student programmed the so-called Elk Cloner for the Apple II, the first computer virus to have
a real spread.

Today, Rich is a Silicon Valley entrepreneur who created the web search engine Blekko.

1994 – The first search engine and the first online shops

The first full-text search engine was WebCrawler. Unlike its predecessors, it allowed users to perform
a keyword search on any website. In addition, Yahoo!, Excite, Infoseek, Inktomi, Northern Light and
Altavista were also launched that year.

Although the first online sales are said to have taken place on the Net Market service, in reality it was not
until 1994 that the first online shops, including Amazon and eBay, were launched.

1996 – Google

Larry Page and Sergey Brin launched today’s quintessential search engine: Google. The initial project
was called BackRub, as that was the name of the technology they used.

Google based the operation of its search engine on the relevance of the contents of each web page for
the users themselves. In other words, it prioritised those results that users considered most relevant to a
specific topic. To do so, it patented its famous PageRank, a series of algorithms that assess the relevance
of a website by assigning it a score from 0 to 10.

2004 – Social networks

The 21st century began with the creation


of Wikipedia, Safari, MySpace, LinkedIn, Skype and WordPress. However, it was not until 2004
that Facebook, Vimeo, Flickr and Gmail appeared.

2005 – YouTube

2006 – Twitter

2008 – Google Chrome

2010 – Instagram y Pinterest

2011 – Snapchat

2016 – TikTok
Present

In Spain alone, there are currently 40.7 million social network users, equivalent to 87.1% of the Spanish
population. In addition, 44 million use the Internet daily for an average of 6 hours.

BASIC TRMINOLOGY

Ver1:

There are fifteen basic internet terms that every web savvy person should know while browsing internet.
These internet terms are useful for every internet user.

The Internet is basically the largest, most organized network of small computer networks in every country
worldwide. These networks and computers are all interconnected and share a vast amount of information
through a protocol called TCP / IP, which allows computers to communicate with each other quickly and
efficiently.

01. WHOIS
The acronym WHOIS stands for “WHO” and “is”. A WHOIS search may return the following
information:
Whether or not a particular domain name is registered to an individual, organization, or business – Name,
address and domain name owner phone number; Technical information about the registered domain or
web server; Date of purchase and registration of the domain name; Email addresses; Also includes IP
lookup, DNS lookup, domain search
02. Password
In the web context, a password is a set of letters, numbers, and / or special characters that combine to
form a word or phrase intended to authenticate a user’s entry, registration, or membership on a Web site.
Passwords that are easy to remember are the most useful, kept secret and deliberately unique.
03. Domain
A domain name is a unique, character-based component of a URL. This domain name is available for
registration with the domain registrar by an individual, business or non-profit organization. There are two
components to a domain name.
First component is the original alphabetical word or phrase; For example, “widget”. The second
component is the top-level domain name refers to what kind of site it is; for example, .com (for
commercial domains), .org (organizations), .ed (for educational institutions).
Put these two components together and you have a domain name: “widget.com”.
04. SSL
SSL acronym is Secure Sockets layer . It is a secure encryption web protocol. It keeps data safe when
transmitted over the Internet. SSL is especially used on shopping sites to keep financial data safe but also
on any site that requires sensitive data (such as a password). The presence of HTTPS in the URL of a web
browser’s web site indicates that SSL is used on the web site.
05. Crawler
The word crawler is another word for spider and robot. These are primarily software programs that crawl
web and index site information for search engine databases.
06. Proxy server
A proxy server is a web server that acts as a shield for other web servers, allowing them to hide relevant
information (such as network addresses and locations) from websites and other network users. In the web
context, proxy servers assist in anonymous surfing, as a proxy server acts as a buffer between search and
targeted websites, allowing users to access data while remaining anonymous
07. Temporary Internet files
Temporary Internet files are very important in the context of web search. Each web page visits a search
visit data (pages, videos, audio, etc.) in a specific file folder on their computer hard drive. The next time it
searches the web page, it loads quickly and efficiently because data has already been loaded from
temporary Internet files rather than the web data server.
Temporary Internet files on your computer can eventually take up very little memory space, so it is
important to clear them once.
08. URL
URL stands for Uniform Resource Locator. A URL is a web address that is unique to each website.
09. Firewall
A firewall is a security measure designed to prevent unauthorized computers, users, and networks from
accessing data on another computer or network. Firewalls are particularly useful for web users since they
can protect them from malignant spyware and cyber criminals while they are online.
10. TCP / IP
TCP/IP is an acronym for Transmission Control Protocol/Internet Protocol. TCP / IP are the basic
protocols for sending data over the Internet.
11. Offline
When you’re offline, you’re not connected to the Internet. For example, to refer to the word “offline” as
something outside the Internet, for example, the conversation that started on Twitter continued in the local
coffee shop, “offline”.
12. Web hosting
Web hosting refers to the hosting space for active websites. A web hosting service provides space on a
web server, as well as a direct Internet connection, so that the website can be viewed and communicated
with those who have an Internet connection.
A web host is a business / organization that provides the space, storage, and connectivity to launch a
website that the Internet users view. A variety of web hosting options are available, ranging from a simple
one-page site to just a small amount of space.
Many web hosting companies provide a dashboard for users that allow them to control various aspects of
their web hosting services; it includes FTP, various content management system installation and service
package extensions.
13. Hyperlink
A hyperlink, also known as the most basic building block of the World Wide Web, is a link that links a
document, image, word, or web page to another. Hyperlinks allow to “surf” or browse, pages and
information on the web quickly and easily.
14. Web server
The term web server refers to a dedicated computer system or dedicated server designed specifically to
host or deliver websites.
15. IP address
Signature address / number of your computer connected to the Internet. Country-based blocks show these
addresses so (for the most part) an IP address identifies the name that originates from the computer.

Ver2

The internet is a global network of smaller networks and computers. The World Wide Web, or web for
short, is the space where digital content is served to internet users. Said another way, the web is a part
of the internet.

Browser
A browser is a free software program or mobile app that displays web pages, graphics, and other online
content. Popular web browsers include Chrome, Firefox, Microsoft Edge, and Safari, but there are
many others.
Internet users access the web through web browser software, which is included in or can be
downloaded on computers and mobile devices. Each web page has a unique address called a URL,
which can be entered in a browser's address bar to navigate directly to a site.
Browser software is specifically designed to convert HTML and XML computer code into human-
readable documents.
Web Page
A web page is what you see in a web browser when you're on the internet. You are on a web page right
now. Think of the web page as a page in a magazine. You may see text, photos, images, diagrams,
links, advertisements, and more on any page you view.
Often, you click or tap on a specific area of a web page to expand the information or move to a related
web page. Clicking a link, which is a snippet of text that appears in a color different from the rest of the
text, takes you to a different web page. If you want to go back, use the arrow buttons provided for that
purpose.

URL
Uniform Resource Locators (URLs) are the web browser addresses of internet pages and files. With
a URL, you can locate and bookmark specific pages and files in a web browser.
Here is an example format of a URL:
http://www.examplewebsite.com/mypage
This format is frequently shortened to this:
www.examplewebsite.com/mypage
Sometimes URLs are longer and more complicated, but all follow acknowledged rules for naming.
URLs consist of three parts:
 Protocol: The protocol is the portion ending in //:. Most web pages use the protocol http or
https, but there are other protocols.
 Host: The host or top-level domain frequently ends in .com, .net, .edu, or .org but can also end
in one of many others that have been officially recognized.
 Filename: The filename or page name.

HTTP and HTTPS


HTTP is the acronym for Hypertext Transfer Protocol—the data communication standard of web pages.
When a web page has this prefix, the links, text, and pictures should work correctly in a web browser.
HTTPS is the acronym for Hypertext Transfer Protocol Secure. This indicates that the web page has a
special layer of encryption added to hide your personal information and passwords from others.
Whenever you log in to your online bank account or a shopping site that you enter credit card
information into, look for https in the URL for security.

HTML and XML


Hypertext Markup Language (HTML) is the programming language of web pages. HTML commands a
web browser to display text and graphics in a specific fashion. Beginning internet users don't need to
know HTML coding to enjoy the web pages the programming language delivers to browsers.
XML is eXtensible Markup Language, a cousin to HTML. XML focuses on cataloging and databasing
the text content of a web page.
XHTML is a combination of HTML and XML.
IP Address
Your computer and every device that connects to the internet uses an Internet Protocol (IP) address for
identification. In most cases, IP addresses are assigned automatically. Beginners don't usually need to
assign an IP address.
An IP address may look something like this:
202.3.104.55
Or, like this:
21DA:D3:0:2F3B:2AA:FF:FE28:9C5A
Every computer, smartphone, and mobile device that accesses the internet is assigned an IP address for
tracking purposes. It may be a permanently assigned IP address, or the IP address may change
occasionally, but it is always a unique identifier.
Wherever you browse, whenever you send an email or instant message, and whenever you download a
file, your IP address serves as the equivalent of an automobile license plate to enforce accountability
and traceability.
ISP
You need an internet service provider (ISP) to gain access to the internet. You may access a free ISP at
school, a library, or work, or you may pay for a private ISP at home. An ISP is the company or
government organization that plugs you into the internet.
An ISP offers a variety of services for a variety of prices: web page access, email, web page hosting,
and so on. Most ISPs provide various internet connection speeds for a monthly fee. You may choose to
pay more for a higher-speed internet connection if you like to stream movies or select a less expensive
package if you use the internet mostly for light browsing and email.

Router
A router or router-modem combination is the hardware device that acts as the traffic cop for network
signals arriving at your home or business from your ISP. A router can be wired or wireless or both.
A router provides a defense against hackers and directs content to the specific computer, device,
streaming device, or printer that should receive it.
Often your ISP provides the network router it prefers for your internet service. When it does, the router
is configured appropriately. If you choose to use a different router, you may need to enter information
into it.

Email
Email is electronic mail. It is the sending and receiving of typewritten messages from one screen to
another. Email is usually handled by a webmail service, such as Gmail or Yahoo Mail, or an installed
software package, such as Microsoft Outlook or Apple Mail.
Beginners start by creating one email address that they give to their family members and friends.
However, you aren't limited to one address or email service. You may choose to add other email
addresses for online shopping, business, or social networking purposes.

Email Spam and Filters


Spam is the jargon name of unwanted and unsolicited email. Spam email comes in two main categories:
high-volume advertising, which is annoying, and hackers attempting to lure you into divulging your
passwords, which is dangerous.
Filtering is the popular, but imperfect, defense against spam. Filtering is included in many
email clients. Filtering uses software that reads incoming emails for keyword combinations and
then either deletes or quarantines messages that appear to be spam. Look for a spam or junk folder in
your mailbox to view quarantined or filtered email.
To protect yourself against hackers who want your personal information, be suspicious. Your bank
won't email you and ask for your password. The fellow in Nigeria doesn't need your bank account
number. Amazon isn't handing you a free $50 gift certificate.
Anything that sounds too good to be true probably isn't true. If you are unsure, do not click any links in
the email and contact the sender (your bank or whomever) separately for validation.

Social Media
Social media is the broad term for any online tool that enables users to interact with thousands of other
users. Facebook and Twitter are among the largest social networking sites. LinkedIn is a combination
of a social and professional site. Other popular sites include YouTube, Instagram, Pinterest, Snapchat,
Tumblr, and Reddit.
Social media sites offer free accounts to everyone. When selecting the ones that interest you, ask your
friends and family which ones they belong to. That way, you can join a group where you know people.
As with all things internet-related, protect your personal information when you sign up for sites. Most
social media sites offer a privacy section where you can choose what to reveal to other users of the
website.

E-Commerce
E-commerce is electronic commerce, the transactions of selling and buying online. Every day, billions
of dollars exchange hands through the internet and the World Wide Web.
Internet shopping has exploded in popularity with internet users, to the detriment of traditional brick-
and-mortar stores and malls. Every well-known retailer has a website that showcases and sells its
products. Joining them are dozens of small sites that sell products and enormous sites that sell just
about everything.
E-commerce works because reasonable privacy can be assured through HTTPS secure web pages that
encrypt personal information and because reliable businesses value the internet as a transaction medium
and make the process simple and safe.
When shopping on the internet, you'll be asked to enter a credit card, PayPal information, or other
payment information.

Encryption and Authentication


Encryption is the mathematical scrambling of data so that it is hidden from eavesdroppers. Encryption
uses complex math formulas to turn private data into meaningless gobbledygook that only trusted
readers can unscramble.
Encryption is the basis for how we use the internet as a pipeline to conduct trusted business, like online
banking and online credit card purchasing. When reliable encryption is in place, banking information
and credit card numbers are kept private.
Authentication is directly related to encryption. Authentication is the complex way that computer
systems verify that you are who you say you are.
Downloading
Downloading is a broad term that describes transferring something you find on the internet or the
World Wide Web to your computer or another device. Commonly, downloading is associated with
songs, music, software, and media files. For example, you might want to download a song or a trial
copy of Microsoft Office or 365.
The larger the file you are copying, the longer the download takes to transfer to your computer. Some
downloads take seconds; some take minutes or longer, depending on your internet speed.
Web pages that offer material that can be downloaded are usually clearly marked with
a Download button (or something similar).

Cloud Computing
Cloud computing began as a term to describe software that was online and borrowed, instead of
purchased and installed on a computer. Web-based email is one example of cloud computing. The
user's email is stored and accessed in the cloud of the internet.
The cloud is the modern version of the 1970s mainframe computing model. As part of the cloud
computing model is software as a service (SaaS). SaaS is a business model that assumes people would
rather rent software than own it. With their web browsers, users access the cloud on the internet and log
in to their online rented copies of their cloud-based software.
Increasingly, services offer cloud storage to access files from more than one device. It is possible to
save files, photos, and images in the cloud and then access those files from a laptop, smartphone, tablet,
or another device. Cloud computing makes collaboration among individuals on the same files in the
cloud possible.

Firewall
Firewall is a generic term to describe a barrier against destruction. In the case of computing, a firewall
consists of software or hardware that protects a computer from hackers and viruses.
Computing firewalls range from small antivirus software packages to complex and expensive software
and hardware solutions. Some firewalls are free . Many computers ship with a firewall you can activate.
All computer firewalls offer some kind of safeguard against hackers vandalizing or taking over a
computer system.
Just like everyone else, beginners to the internet should activate a firewall for personal use to protect
their computers from viruses and malware.

Malware
Malware is a broad term that describes any malicious software designed by hackers. Malware includes
viruses, Trojans, keyloggers, zombie programs, and other software that seeks to do one of four things:
 Vandalize your computer in some way.
 Steal your private information.
 Take remote control of your computer (zombie your computer).
 Manipulate you into purchasing something.
Malware programs are the time bombs and wicked minions of dishonest programmers. Protect yourself
with a firewall and knowledge of how to prevent these programs from reaching your computer.

Trojan
A Trojan is a special kind of hacker program that relies on the user to welcome it and activate it.
Named after the famous Trojan horse tale, Trojan programs masquerade as legitimate files or software
programs.
Sometimes, it is an innocent-looking movie file or an installer that pretends to be actual anti-hacker
software. The power of the Trojan attack comes from users naively downloading and running the
Trojan file.
Protect yourself by not downloading files that are sent to you in emails or that you see on unfamiliar
websites.

Phishing
Phishing is the use of convincing-looking emails and web pages to lure you into typing your account
numbers and passwords or PINs. Often in the form of fake PayPal warning messages or phony bank
login screens, phishing attacks can be convincing to anyone who is not trained to watch for the subtle
clues.
As a rule, all users should distrust any email link that says, "You should log in and confirm this."

Blogs
A blog is a modern online writer's column. Amateur and professional writers publish blogs on all kinds
of topics: hobby interests in paintball or tennis, opinions on health care, commentaries on celebrity
gossip, photoblogs of favorite pictures, or tech tips. Absolutely anyone can start a blog.
Blogs are usually arranged chronologically and with less formality than a website. Many blogs accept
and respond to comments. Blogs vary in quality from amateurish to professional. Some savvy bloggers
earn reasonable incomes by selling advertising on their blog pages.

VER 3:

The internet is an immense network of computer systems that are linked together. It is made up of

millions of processing and mathematical devices. Desktop computers, cell phones, laptops, tablets,

gaming consoles, GPS units, as well as other computing devices are all included. All of these are linked

to the internet.
As a digital citizen, you have many technologies at your disposal that aimed to make your life easier.
However, if you aren’t aware of the basic terminologies, it might be difficult for you to navigate through day-
to-day living.

Browser
A browser is an open-source software or even a mobile app that shows web pages, images, and other forms
of online material. Firefox, Internet Explorer, Microsoft Edge, and Safari are among the most popular web
browsers, however, there are many more.
Web browser application, which is incorporated in or may be installed on computers and mobile phones, is
used by Internet users to access the internet. Every web page has a unique address known as a URL, which
may be typed in the browser’s address bar to travel straight to a site.
Browser software is specially intended to transform computer code such as HTML and XML into human-
readable texts.
3.6 billion people use the Internet right now, which means that more than half of the world's population is
connected to the internet, just like you.

Bandwidth
The greatest data throughput, frequently across a network, is referred to as bandwidth. The greater the
bandwidth, the more activities you can process at the same time.
For instance, if you're watching Netflix in 4K on your TV while downloading large files on your computer,
your internet gaming experience will almost suffer greatly. This is owing to the point that you only have so
much bandwidth, and you're utilizing the majority of it for streaming and downloading.
Once you've completed these tasks, your bandwidth will be available for other purposes.

World Wide Web


The World Wide Web is also one of the core Internet terminologies. The World Wide Web, or www, is a
digitized collection of material that is saved and exchanged. This is an accumulation of data from several
websites that are divided into web pages. It was created in 1989 at the CERN laboratory by Tim Bernes-
Lee.
As soon as you’re connected to the internet, the World Wide Web may be accessed from anywhere. To
browse www through the internet, you could use a wireless router, Wi-Fi, or an Ethernet connection.

URL
Uniform Resource Locators (URLs) are the addresses of internet sites and files in web browsers. In a web
browser, you may use a URL to find and bookmark certain sites and files.
Here's an instance of a URL format:
http://www.examplewebsite.com/mypage
This format is commonly abbreviated as follows:
www.examplewebsite.com/mypage
Although URLs might be longer and more intricate at times, they all follow the same naming conventions.
URLs are made up of three parts:
1. Protocol: The protocol is the section that ends with /:. The protocol HTTP or HTTPS is used by the
majority of online pages, although there are others.
2. Host: The host or top-level domain usually ends in.com,.net,.edu, or.org, but it can also finish in any
of the numerous other formally recognized domain extensions.
3. Filename: The name of the file or page.

404
A 404 error is among the most common mistakes found on the internet, and it simply signifies that the page
you're seeking does not exist. Usually, you'll encounter this if you follow a link to a defunct page or input an
erroneous URL into your browser.

Domain Name
This is a user-friendly naming scheme for addressing web pages and servers. It describes a computer's
position on the Internet. A dot usually divides a domain name, such as www.google.com or
www.slashdigit.com.
Furthermore, Domain Names are a component of DNS (Domain Name System) a database of domain
names and their corresponding IP addresses). In addition, a domain name is subject to specific rules and
algorithms in the DNS.

HTTP and HTTPS


HTTP is an abbreviation for Hypertext Transfer Protocol, which is the data transmission protocol used by
online sites. When this prefix appears on a web page, the links, text, and images should function properly in a
web browser.
HTTPS is an abbreviation for Hypertext Transfer Protocol Secure. This signifies that a unique layer of
encryption has been applied to the web page to protect personal information as well as passwords from
prying eyes. Search for HTTPS in the URL anytime you sign in to your online bank account or perhaps a
shopping site where you submit credit card details for protection.

IP Address
A number issued to each device connecting to the Internet is an IP address. Every gadget on your local
network does have an internal IP address that only the technologies on your network can really see. However,
the internet sees only one external IP address for your whole network.
Walking sticks, umbrellas, shirts, water bottles, tails (for festival attendees), and cutlery are among the
strangest gadgets that currently link to the Internet.
ISP
To obtain access to the Internet, you need to have an internet service provider (ISP). In a school, in a
library, at the office, you can access a free ISP, or find a private ISP at home. An ISP is a government or
corporation which connects you to the Internet.
An ISP offers a range of services at different prices: accessing online pages, e-mails, hosting web pages etc.
Many ISPs offer a monthly charge to different internet data speeds. If you want to stream movies, you may
spend extra for a faster internet connection, or you can choose a less expensive plan if you primarily use the
internet for light surfing and emails.

Search Engine
A search engine is a software program that explores the World Wide Web for content. Yahoo, Google, and
Bing are popular examples of internet search engines. These apps let you browse the internet for data
using words and phrases.
Following links and crawling web pages is part of the search engine's discovery phase. For example, Google
utilizes bots, sometimes known as "spiders," to crawl a website and follow connections to pages on it.
One of the major reasons webmasters develop sitemaps that include all links in current blogs or content pages
is to facilitate search engine indexing. For instance, Google utilizes bots to verify these sitemaps as well as
other web URLs gathered from prior crawls.

Router
The physical device that functions as the traffic cop for network signals coming at your house or company
from your ISP is known as a router or router-modem combo. A router could be hardwired, wireless, or a
combination of the two.
A router protects against hackers and routes contents into a particular computer, gadget, streaming device
or printer to receive them.
Your ISP often supplies your preferred Internet service network router. When this occurs, the router is
properly configured. You may need to add information to it if you wish to use another router.

Spam
Unwanted messages on the internet are referred to as spam. Spam may take many forms, including email
spam, repeated posts on forums, "spamdexing" search engine results, garbage sites on social media, and a
variety of other ways.
Malware
Malware is a wide word for any harmful program created by hackers. Malware is comprised of
viruses, Trojans, keyloggers, zombie programs, and other software that aims to perform one of four things:
 In some manner, vandalize your PC.
 Take your personal information.
 Take command of your computer from a distance (zombie your computer).
 You've been duped into buying something.
Malware programs are landmines and the evil minions of shady programmers. Protect yourself by installing
a firewall and learning how to prevent malicious applications from accessing your computer.

Addons and Plugins


Custom software changes are known as add-ons. The user can choose to install addons to enhance the
functionality of their Web browsers or office software. A customized eBay toolbar for your Web browser is
one example, as is a new search option for your Outlook email. The majority of addons are free and can be
accessed and downloaded from the Internet.
Plugins are a type of web browser add-on. Plugins are important add-ons if you want to access highly
customized websites. Adobe Flash or Shockwave player, Microsoft Silverlight player, and Adobe Acrobat
pdf reader are a few examples.

Cache and Cookie


When you access (read) a web page, the material is "cached," which means it is saved on your computer
momentarily. Rather than asking the file from the webserver the very next occasion you want that page, your
web browser just retrieves it from the cache, allowing the page to load swiftly. The disadvantage is that when
the cached web page is frequently updated, you might miss the most recent version. If you think that the web
page you're viewing isn't the most recent version, click your browser's "refresh" button.
A cookie is piece of code or data generated by a web server and saved on the computer of a user. It is used to
record the user's use habits and preferences.

Internet of Things
The Internet of Things (IoT) relates to the spread of internet connectivity to formerly "dumb" daily objects.
Lights, fridges, and radiators are examples of such devices. Unlike computers and cell phones, which require
human interaction to interact, IoT devices could communicate without our assistance, which is known as
‘smart’, for example, smartphones or smart TVs.
There are already about 150 million smart homes in use throughout the world; it won't be long before these
internet-connected homes become the standard.

Phishing
Phishing is the practice of using convincing-looking emails as well as websites to trick you into entering
your banking information, passwords, or PINs. Phishing assaults, which frequently take the shape of bogus
PayPal warning letters or phony bank login screens, may be convincing to anybody who is not trained to look
for the tiny indications.
As a general guideline, any email link that states, "You must log in and verify this" should be avoided.

Hotspot
A hotspot is a device or place that allows you to connect to the internet using Wi-Fi.
Hotspot could also relate to the ability of mobile phones to transmit their own Wi-Fi networks across mobile
data networks. Furthermore, portable hotspots are specialised gadgets supplied by cell phone providers that
deliver Wi-Fi anywhere it is available.

Encryption and Authentication


Encryption is the statistical scrambling of data to make it unreadable to prying eyes. Encryption is a method
of converting confidential data into nonsensical gibberish that can only be decoded by trustworthy readers.
Encryption is the foundation for how we utilize the internet as a conduit for conducting secure transactions
like online banking and credit card purchases. Account information and credit card details are kept secret
when robust encryption is in effect.
Encryption and authentication are inextricably linked. Authentication is the complicated process through
which computer systems confirm that you are who you claim to be.

Host (Network)
A computer or any other device that links to a computer network is known as a Network Host. It gives other
computers and their user’s access to information and services. Furthermore, when multiple computer systems
communicate via a modem and perhaps other internet connection routes, the word host might be used.

Firewall
A firewall is a general word for a protective barrier against attack. A firewall in networking is hardware or
software that secures a machine from viruses and hackers.
Small antivirus software programs to large and costly software and hardware systems are all examples of
computing firewalls. Many firewalls are available for free. Many PCs come with a firewall that you may use.
All computer firewalls provide some level of protection against hackers causing damage to or gaining control
of a computer system.

Server
A computer or software program that delivers a particular type of service to client software operating on other
computers. The word might refer to a specific software program, such as a WWW server, or it can refer to the
computer on which the program is operating, for example.

Cloud Computing
Cloud computing started as a phrase to represent software that could be accessed and rented online rather
than bought and downloaded on a computer. One instance of cloud computing is web-based emailing. The
recipient's email is saved and accessible on the internet's cloud.
The cloud is the contemporary equivalent of the mainframe computer paradigm of the 1970s. Software as a
service (SaaS) is a component of the cloud computing concept.
SaaS is a business strategy based on the assumption that customers prefer to rent software rather than own it.
Users connect to their online leased versions of cloud-based applications using their web browsers to connect
the cloud on the internet.
Cloud storage is becoming more popular as a way to access data from several devices. Files, photographs,
and images may be saved on the cloud and accessed from a laptop, cellphone, iPad, or even other devices.
Individuals can collaborate on the very same files on the cloud using cloud computing.

Bits, Bytes
At its most basic, all computer data is simply a sequence of 0s and 1s. Each of them is alluded to as a "binary
digit," with "bit" just being an acronym. A byte is (usually) an eight-bit collection, so named due to the
obvious pun with bit and bite. Likewise, a group of four bits (half a byte) is frequently referred to as a
"nybble."
Several prefixes are often used to refer to high amounts of bits and bytes, as in:
 1 kilobyte = 1024 (or 1000) bytes
 1 megabyte = 1024 (or 1000) kilobytes
 1 gigabyte = 1024 (or 1000) megabytes
 1 terabyte = 1024 (or 1000) gigabytes
 1 petabyte = 1024 (or 1000) terabytes
HTML–(Hypertext Markup Language)
The fundamental language for building hypertext documents on the World Wide Web. That is used in simple,
plain ASCII-text documents, but once those documents are interpreted (named rendering) by a Web
browser like Netscape, they can exhibit formatted text, colour, a variation of fonts, visual designs, digital
effects, hypertext leaps to other Web locations, as well as information aspects.

Intranet
An intranet is really a computer network that is exclusively available to a company's workers. It is a
specialized and private hub where employees may communicate and share data in a secure environment. It is
comparable to a private club with exclusive services and benefits that are not available to the general public.
The intranet uses a local area network (LAN), a computer network that connects the computers of the
various intranet members' offices. In contrast, a corporation can build up an extranet, which is a private
network for securely sharing information over the Internet with a chosen group of clients, vendors, and
consumers.

Piracy
Piracy is the unlawful duplication of content, like computer software or branded products, in order to sell it
for a fraction of the price it would ordinarily command. This transaction does not pay the rightful owner of
the content. Piracy has grown into a multibillion-dollar industry that is illegal in many nations.
It's the same as slipping into a train or bus without paying the fee. You profit from it, but the transportation
firm that provides the service suffers as a result.

GETTING INTO THE NET


BROWSERS

A web browser is a software application that is used to access the world wide web(www) or as known by
everyone on the Internet. It is an interface between us and the information available on the web.

This information might be pictures, audio, videos, or some other files that are shown on our screens
through a web page.
The web browser can be called a client program as it requests the webserver for the information
demanded by the user. Some of the common browsers are Google, Mozilla Firefox, Safari, internet
explorer, Netscape Navigator, etc.

How does a browser work?


The whole process of gathering information begins with the user when enters the URL of the desired
website in the address bar. The browser is a part of the client-server model where it plays the part of the
client.

It sends the requested information to the web server through HTTP- hypertext transfer protocol. Once the
request is received, the server gathers the related information it forwards it through web pages.
When a URL is entered, supposedly artoftesting.com the web browser first requests the DNS (Domain
name server) the IP address of the artoftesting.com. The DNS is a phonebook of the internet and
therefore, it stores the system names and their corresponding IP addresses.

Next, once the IP address is found the address is used to request the servers of the ‘ArtOfTesting’ website
for the content. This is then fulfilled and displayed on the client’s screen.

Element of a Web Browser


The web browser is made of 7 main components that work in sync to make the web browser function-
able. These are-

1. User Interface
The user interface is the first page that you see when you open the web browser. This page has the
address bar, forward/ backward button, menu, bookmarking option, and a few more options.
2. Browser Engine
The browser engine acts as an interface between the rendering engine and the UI of the browser. Based on
the input, it manipulated the rendering engine to provide output.
3. Rendering engine
The rendering engine is responsible for producing requested content to the browser and displaying it on
the screen. It parses the HTML documents and then converts them to readable form. All the browsers we
know have their own rendering engines.
 Safari uses WebKit.
 Chrome and Opera use Blink ( fork of WebKit).
 Internet explored use Trident.
 Firefox uses Gecko.
WebKit is an open-source rendering engine and was made for Linux. It has been modified the Apple to
support Mac and Windows too.
4. Networking
The network layer is responsible for security and communication on the internet. It is also used for HTTP
requests and to cache the documents retrieved in order to reduce network traffic.
5. UI Backend
It is for drawing basic boxes and windows/ widgets. This is for a generic interface and is independent of
any specific platform. Behind all this, it uses an Operating system for UI methods.
6. JavaScript Interpreter
As we all know JavaScript is responsible for all the websites/ webpages. All these pages are written in
JavaScript language. Therefore this interpreter translates these pages and these are sent to the rendering
engine to display the final results.
7. Data persistence
Data persistence or storage is for saving the data locally, like cookies. The browsers support storage
mechanisms like IndexedDB, WebSQL, File System, etc. to store databases locally on your computer.
This way user data is handled like cache, bookmarks, cookies, etc.

Features of a Web Browser


Some of the features of the web browser include-
1. Home button – Clicking the ‘Home’ button brings the user directly back to the home page of the
browser. We can set any webpage as the home page. Usually, people prefer to have search
engines like – Google.com as their home page.
2. Address bar – The address bar is where the URL of the desired website is entered. This bar helps
us to navigate to the desired website of our choice.
3. Refresh button – The refresh button is to reload the page. In some cases, the page locally stores
and saves the information. This prevents users from seeing the updated information. Therefore,
the refresh button is helpful in such cases.
4. Bookmarks – This option is to save a particular website for reference later in the future. It is used
to mark pages that might be important or prove to be useful in the future.
5. Tabbed browsing – This feature helps to open new screens on the same browser for multiple
browsing at the same time.

Popular Web Browsers


Google Chrome
Google Chrome is the most popular and used web browser. There is a high chance you are using it
yourself right now. The reason behind its popularity is its speed. It is one of the fastest browsers – opens
and loads quickly, and the search results are retrieved within seconds. Another reason might be its simple
and easy-to-use UI.

Safari
Although Safari is specially created for Apple users it can be used on PCs as well. However, its
uniqueness can only be seen on Mac or Apple devices. It is a cross-compatible software and can integrate
your data on multiple platforms. Another fascinating feature is the iCloud keychain that lets you access
the passwords saved on your Apple device.

Mozilla Firefox
This one is another popular choice among users. Although people have always preferred this one as an
option due to its speed. It takes much more time than Chrome or Safari.

Opera
Opera is also one of the commonly used browsers. It has its own range of add-on extensions that you
might need to check out. It also can be synced among multiple devices. So do not miss out on this one.
Microsoft Edge
This one comes pre-installed on Windows 10 devices. This was developed to replace internet explorer
and thus acts as a default browser. It is gaining popularity because of its new rendering feature, easy-to-
use UI, freestyle writing over webpage displays, and much more.

Kingpin
The reason this software is gaining popularity is because of its security feature. This browser always
works in incognito mode.

APPLICATIONS OF INTERNET
Applications that require the Internet to run or use those applications are called Internet applications. Or
you can also say that those applications have been made to run from the Internet itself.

Because all the data of internet applications is on their servers, if you want to use these applications then
you must have an internet connection. So that through the internet your request goes to the server and in
return you get information. You can also exchange your information through these applications.

In any case, you need internet service to use the internet application. Without internet service, you cannot
access the information of these applications.

And one thing, to use internet applications, you also need a digital device with an internet connection,
only then you can use those applications. Digital devices such as smartphones, tablet
PCs, laptops, desktops, etc.
What are the Applications of Internet?
Today is the era of Internet applications, today there is a specific application to do every work, using
which you can do those tasks very easily. Today we will know in detail about the same applications of the
Internet.

There are various applications of internet in points, which are given below.

 Communication
 Job Search
 Online Shopping
 Web Browsing
 Stock Market Updates
 Travel
 Research
 E-Commerce
 Online Payments
 Social Networking
 E-banking
 Education
 Entertainment

1. Communication
Communication is also one of the most used applications of the Internet because today it is very easy to
talk through the Internet and today almost everyone is communicating with each other through the
Internet.

Today it is very cheap to communicate through the Internet, as compared to other mediums, so people
today are using Internet applications to communicate.
Today, there are thousands of such Internet applications for communication, through which you can
communicate with someone else. But we will tell you about some popular communication applications.

Through these communication applications, you can talk to anyone in many ways.

For example, you can talk to someone through chat, you can talk through voice call, you can talk through
video call, etc.

We will tell you about similar applications that run through the Internet.

There are some popular communication internet applications, which are given below.

 Email
 Skype
 Google Meet
 Zoom
 WhatsApp
 Facebook Messenger

Email
The full form of email is electronic mail. If it is understood in simple language, then email means, a
message sent through electronic means. In earlier times, people used to send messages to someone
through a postman, which took a lot of time, but in today's time, people use email to send messages to
someone.

Through email, you can also send an email to someone in a few seconds and can also receive email from
anyone. You just need to have an internet connection to send or receive emails. Do you know there are
many advantages and disadvantages of email?

Through email, you can send text messages, program files, spreadsheets, photos, videos, etc to anyone.
Email is mostly used by professional people. There are various Uses of Email.

Skype
Skype is a telecommunications application run by Skype Technologies. Skype is a VoIP-based
application. VoIP means Voice-over-Internet Protocol. Through Skype you can do video conferencing,
voice calls, messaging, file transfer, etc. Skype is a very popular videoconferencing application.

Google Meet
Google Meet is also a video-communication internet application, which was launched by Googler
company on March 9, 2017. Through Google Meet, you can have online meetings, take online classes,
give tuition to children online or you can also talk to anyone in a normal way.
But Google Meet is mostly used for online meetings or online teaching. There are many features of
Google Meet, which helps you a lot in online meetings.

Zoom
Zoom is also a proprietary video telephony Internet application, which was launched by Zoom Video
Communications company on October 12, 2011.

Through Zoom, you can hold online meetings, take online classes, give tuition to children online or you
can even talk to anyone in a normal way.

But Zoom is mostly used for conducting webinars or teaching online. Zoom has both free and paid plans,
that is, you can also use Zoom for free, but there are some limitations in the free plan, as you can have
100 users at a time in the free plan of Zoom.

WhatsApp
WhatsApp is a social messaging internet application developed by Meta company. Today, WhatsApp is
used by millions of people around the world, it is a very popular messaging application.

Through WhatsApp, you can send text messages to anyone or you can also share images, documents, and
your live location with anyone, and through WhatsApp, you can talk to anyone by voice and video calls.

Messenger
Messenger is also an internet application, which is made by Meta company. You can also send text
messages, photos, videos, audio, and documents to anyone through messenger and you can also talk to
anyone through a voice call and video call through this application.

2. Job Search
Due to covid 19, many people lost their jobs today or if they say, millions of people around the world
have become unemployed due to covid epidemic, and it is very difficult to find jobs again.

To find Job, you have to round the many offices and still do not get a good job. But now you don't have to
worry.

In today's digital world it is very easy to find the job of your choice, yes you have read it right. Today you
can easily find jobs related to your skills through the internet and give a direct interview to HR.

Now you will say that how can we find jobs from the internet, so let us tell you that today there are many
such applications of internet, which help you in finding jobs.

Through these internet job applications, you can find jobs for yourself sitting at home, these job portals
have all kinds of jobs for all types of people, all you have to do is use these job applications and just send
your resume. We have given below the names of some jobs providing internet applications.

 Naukri.com
 Monster.com
 Freshersworld.com
 Indeed.com
 Glassdoor
 ZipRecruiter

3. Online Shopping
Everything is possible in today's era, in earlier times people could not even imagine that without going to
the market, anything could be bought, but in today's time, it is possible. We and you know that we can
buy anything without going to the market without going to the shop.

Today the whole world is doing online shopping through the internet, that too sitting at home and you can
also shop online from home through the internet.

Today there are many such applications on the Internet, through which you can buy anything online. Such
as - Mobile, Tablet PC, Computers, Watch, Smart Watch, Television, Fan, Table Fan, LED Bulb, Glasses,
Ring, Jewellers, Camera, Home Appliances, clothes, etc.
Through these shopping applications, you can order any item of your need sitting at home. We have given
below the names of some shopping applications, from which you can shop.
 Amazon
 FlipKart
 Paytm Mall
 ShopClues
 Myntra
 Snapdeal
 Meesho

4. Web Browsing

Applications of Internet for Web Browsing


Web browser is also an important Internet application, in earlier times, any user used to have a lot of
trouble to do Internet travel, because at that time there were no good browsers so that people could do
web browsing. But today there is more than one web browser, which you can use to search anything on
the Internet.

Today's web browsers come with more features than the earlier browsers, because today's web browsers
are made of the latest technology, which has many advantages to use such as - saving password, incognito
mode, history, zoom, Print, Bookmark etc.

The browser was invented by Tim Berners-Lee.

Today there are many types of web browsers, using which you can access the Internet. The names of
those web browsers are given below.
 Internet Explorer.
 Google Chrome.
 Mozilla Firefox.
 Safari.
 Opera.
 Konqueror.
 Lynx.
 Tor Browser.
 UC Browser.
 Brave Browser.

5. Stock Market Updates


In the earlier times, no one knew about the stock market, what is the stock market, but today everyone
knows about the stock market, what is the stock market and how to invest money in it.

Today many people are earning a lot of money from the stock market, today people know which stock to
invest in and when to sell which stock so that more money can be earned.

But just think, it was not like this a few years ago, because you had to take the help of a broker to buy or
sell someone, so that that broker also used to take commission from you.

But today through internet application you can buy or sell any stock without any broker and can also read
the information of stock market moment by moment.

Today there are many such stock applications, using which you can earn a good amount from the stock
market very easily. The names of those stock applications are given below.

 Upstox Pro App


 Zerodha Kite
 Angel Broking
 Groww app
 5paisa
 Sharekhan App
 Fyers App
 HDFC Securities
 Stock Edge
These all are examples of stock market applications.

6. Travel
Due to the Covid epidemic all over the world, people have stopped traveling, and as the effect of the
Covid epidemic is working, people are now starting to leave their homes.

But before saying anything, there are many questions in your mind. Like - how to go there, where will
they stay, which places they should visit, etc.

But if you have to travel this way, now you have no need to worry, because you can get all the
information about your journey through the internet.
Today, there are many such Internet applications, so they make your journey even easier. You can book
travel tickets, hotels, taxis, etc. through these internet applications.

Or you can now book the same trip through these applications, such as Goa, Manali, Jammu Kashmir,
Delhi, Agra, Nainital, Gangtok, MALDIVES, Darjeeling, etc. This internet application gives you all the
facilities, whose names are given below.

 MakeMyTrip.
 Cleartrip.
 Goibibo.
 Agoda.
 Booking.com.
 Yatra.
 OYO Rooms.

7. Research
Research means to do deep research about a subject or to know everything about that subject. Doing
research is no small task, it takes a lot of time and effort to do research about anything. Research is not
done by common people, but by scientists or Ph.D. students.

If you are a Ph.D. student and you have to do research on any topic, then you do not need to worry,
because with the use of the internet you can do your research very easily, but you will have to work hard.
Today there are many such internet applications that make your research easier and you do not have to
work harder too. If you are a Ph.D. student then this internet application is very useful for you.

All you have to do is use these applications to complete your research. The names of some search
applications are given below.

 Mendeley
 Flipboard
 Researcher
 Google Keep
 Curiosity
 Paperity
 Slack
 DropBox

8. E-Commerce
E-commerce is also a good applications of internet platforms. Today e-commerce is in full swing all over
the world. Today, at present, millions of merchants around the world are selling their products through e-
commerce.

E-commerce means putting your shop online and selling any of your items online. By doing this, your
business becomes local to global, that is, you can sell your goods to the people of other cities as well.

You can do your shop online through the internet, but you must have an internet connection to sell your
goods online.

Today there are many such Internet applications that help you to sell your goods online and in return
charge you a small commission. On these internet applications, you have to register your business and
upload your product on these applications.

We have given below the names of some applications, using which you can sell your goods online and
earn more profit.

 Amazon
 Flipkart
 Meesho
 Shopify
 Paytm Mall
 Dukaan

9. Online Payments
Today is the era of online payments, in today's digital age, now everyone is paying any bill online instead
of giving cash. Today online payments are in full swing all over the world.

You can make online payments only through the internet, without an internet connection you cannot
make an online payment.

There are many benefits of online payment. For example - you do not need to carry cash, there is no need
to spare money in taking any item.

You can pay any bill through an online payment. For example, electricity bill, mobile bill, telephone bill,
water bill, cylinder bill, movie bill, hotel bill, restaurant bill, shopping bill, etc.
There are many such internet applications today that gives you the facility to make online payments, the
names of those applications are given below.

 Paytm
 PhonePe
 Google Pay
 BharatPe
 Amazon Pay
 Freecharge
 BHIM
 MobiKwik

10. Social Networking


Social networking is also a good platform, through which you talk to people. Today millions of people
around the world are using social networking sites. Through social networking sites, you can make
connections with friends, family, classmates, customers, and clients.

You can also promote your business through social networking sites. Today, there are many such Internet
networking applications that you can use to do your kind of work.

You must have an internet connection to use social networking sites because without an internet
connection you cannot use these social networking sites.
There are some famous social Networking applications given below.

 Facebook
 Instagram
 Twitter
 LinkedIn
 YouTube
 Pinterest
 Tumblr
 Reddit
 Snapchat
 WhatsApp

11. E-Banking
E-banking is also known as online banking and internet banking. E-banking is one of the best features of
the banking sector because, through e-banking, bank customers can now do all banking work sitting at
home.

There are many benefits of using e-banking. Such as - online account opening, money transfer, NEFT,
passbook check, bill payment, loan, etc.

Online banking is generally a core banking facility operated by a bank. To use e-banking, you must have
an internet connection, otherwise, you cannot use the e-banking facility.

Today there are many such e-banking internet applications, each bank has its own different internet
application, whose name is given below.
 Kotak- 811
 ICICI iMobile
 YONO SBI
 HDFC PayZapp
 Bank of Baroda M-Connect Plus

12. E-Learning
Today is the era of e-learning in the present time, e-learning means electronic learning which means you
can now study from anywhere through e-learning.

If you understand it in an easy language, now you can do your studies by staying in any corner of the
world, now you do not need to go to any college or institute to study, You can study from online live class
through e-learning sitting at home.

There are many benefits of e-learning, just imagine the students who live in the village, and the city is far
away from their village, so those students can now study online by staying in their village through e-
learning without going to the city.

To study through e-learning, you must have a smart device and internet connection, only then you can
study online.

Through e-learning, you can study any subject or you can also prepare for any competitive exam. There
are many Internet applications through which students can study. The names of those applications are
given below.

 Byjus
 Topper
 Vedantu
 Unacademy
 Quick Learn Computer

13. Entertainment
Applications of Internet for Entertainment
If you are getting bored alone, then there is no need for you to worry, because today you can be
entertained through the medium of the internet.

Today there are many such internet applications that can entertain you. You can watch anything on these
entertainment applications. Like - Movies, Web series, Cartoons, Serials, Cricket, News, Comedy, etc.

We have given below the names of some popular entertainment applications.

 Netflix
 VOOT
 Disney+ Hotstar
 Amazon Prime
 Sony Liv
 ALT Balaji
 YouTube

What are the 4 major applications of the Internet?


4 major applications of internet, which are given below.

 Social Media Internet Applications


 Communications Internet Applications
 Entertainment Internet Applications
 Travel Internet Applications
What are the 3 features of Internet?
There are various features of internet. which are given below.
 Easy to Use
 Low Cost
 Security
 Accessibility
 Flexibility of Communication

INTRODUCTION TO INTERNET PROTOCOLS


VER 1:
Internet Protocols are a set of rules that governs the communication and exchange of data over the
internet. Both the sender and receiver should follow the same protocols in order to communicate the
data. In order to understand it better, let’s take an example of a language. Any language has its own set
of vocabulary and grammar which we need to know if we want to communicate in that language.
Similarly, over the internet whenever we access a website or exchange some data with another device
then these processes are governed by a set of rules called the internet protocols.
Working of Internet Protocol
The internet and many other data networks work by organizing data into small pieces called packets.
Each large data sent between two network devices is divided into smaller packets by the underlying
hardware and software. Each network protocol defines the rules for how its data packets must be
organized in specific ways according to the protocols the network supports.
Need of Protocols
It may be that the sender and receiver of data are parts of different networks, located in different parts
of the world having different data transfer rates. So, we need protocols to manage the flow control of
data, and access control of the link being shared in the communication channel. Suppose there is a
sender X who has a data transmission rate of 10 Mbps. And, there is a receiver Y who has a data
receiving rate of 5Mbps. Since the rate of receiving the data is slow so some data will be lost during
transmission. In order to avoid this, receiver Y needs to inform sender X about the speed mismatch so
that sender X can adjust its transmission rate. Similarly, the access control decides the node which will
access the link shared in the communication channel at a particular instant in time. If not the
transmitted data will collide if many computers send data simultaneously through the same link
resulting in the corruption or loss of data.
What is IP Addressing?
An IP address represents an Internet Protocol address. A unique address that identifies the device over
the network. It is almost like a set of rules governing the structure of data sent over the Internet or
through a local network. An IP address helps the Internet to distinguish between different routers,
computers, and websites. It serves as a specific machine identifier in a specific network and helps to
improve visual communication between source and destination.
Types of Internet Protocol
Internet Protocols are of different types having different uses. These are mentioned below:
1. TCP/IP(Transmission Control Protocol/ Internet Protocol)
2. SMTP(Simple Mail Transfer Protocol)
3. PPP(Point-to-Point Protocol)
4. FTP (File Transfer Protocol)
5. SFTP(Secure File Transfer Protocol)
6. HTTP(Hyper Text Transfer Protocol)
7. HTTPS(HyperText Transfer Protocol Secure)
8. TELNET(Terminal Network)
9. POP3(Post Office Protocol 3)
10. IPv4
11. IPv6
12. ICMP
13. UDP
14. IMAP
15. SSH
16. Gopher

1. TCP/IP(Transmission Control Protocol/ Internet Protocol)


These are a set of standard rules that allows different types of computers to communicate with each
other. The IP protocol ensures that each computer that is connected to the Internet is having a specific
serial number called the IP address. TCP specifies how data is exchanged over the internet and how it
should be broken into IP packets. It also makes sure that the packets have information about the source
of the message data, the destination of the message data, the sequence in which the message data
should be re-assembled, and checks if the message has been sent correctly to the specific destination.
The TCP is also known as a connection-oriented protocol.
2. SMTP(Simple Mail Transfer Protocol)
These protocols are important for sending and distributing outgoing emails. This protocol uses the
header of the mail to get the email id of the receiver and enters the mail into the queue of outgoing
mail. And as soon as it delivers the mail to the receiving email id, it removes the email from the
outgoing list. The message or the electronic mail may consider the text, video, image, etc. It helps in
setting up some communication server rules.
3. PPP(Point-to-Point Protocol)
It is a communication protocol that is used to create a direct connection between two communicating
devices. This protocol defines the rules using which two devices will authenticate with each other and
exchange information with each other. For example, A user connects his PC to the server of an Internet
Service Provider and also uses PPP. Similarly, for connecting two routers for direct communication it
uses PPP.
4. FTP (File Transfer Protocol)
This protocol is used for transferring files from one system to the other. This works on a client-server
model. When a machine requests for file transfer from another machine, the FTO sets up a connection
between the two and authenticates each other using their ID and Password. And, the desired file
transfer takes place between the machines.

5. SFTP(Secure File Transfer Protocol)


SFTP which is also known as SSH FTP refers to File Transfer Protocol (FTP) over Secure Shell
(SSH) as it encrypts both commands and data while in transmission. SFTP acts as an extension to SSH
and encrypts files and data then sends them over a secure shell data stream. This protocol is used to
remotely connect to other systems while executing commands from the command line.

6. HTTP(Hyper Text Transfer Protocol)


This protocol is used to transfer hypertexts over the internet and it is defined by the www(world wide
web) for information transfer. This protocol defines how the information needs to be formatted and
transmitted. And, it also defines the various actions the web browsers should take in response to the
calls made to access a particular web page. Whenever a user opens their web browser, the user will
indirectly use HTTP as this is the protocol that is being used to share text, images, and other
multimedia files on the World Wide Web.
Note: Hypertext refers to the special format of the text that can contain links to other texts.

7. HTTPS(HyperText Transfer Protocol Secure)


HTTPS is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication
over a computer network with the SSL/TLS protocol for encryption and authentication. So, generally, a
website has an HTTP protocol but if the website is such that it receives some sensitive information such
as credit card details, debit card details, OTP, etc then it requires an SSL certificate installed to make
the website more secure. So, before entering any sensitive information on a website, we should check if
the link is HTTPS or not. If it is not HTTPS then it may not be secure enough to enter sensitive
information.

8. TELNET(Terminal Network)
TELNET is a standard TCP/IP protocol used for virtual terminal service given by ISO. This enables
one local machine to connect with another. The computer which is being connected is called a remote
computer and which is connecting is called the local computer. TELNET operation lets us display
anything being performed on the remote computer in the local computer. This operates on the
client/server principle. The local computer uses the telnet client program whereas the remote computer
uses the telnet server program.

9. POP3(Post Office Protocol 3)


POP3 stands for Post Office Protocol version 3. It has two Message Access Agents (MAAs) where one
is client MAA (Message Access Agent) and another is server MAA(Message Access Agent) for
accessing the messages from the mailbox. This protocol helps us to retrieve and manage emails from
the mailbox on the receiver mail server to the receiver’s computer. This is implied between the receiver
and the receiver mail server. It can also be called a one-way client-server protocol . The POP3 WORKS
ON THE 2 PORTS I.E. PORT 110 AND PORT 995.

10. IPv4
The fourth and initially widely used version of the Internet Protocol is called IPv4 (Internet Protocol
version 4). It is the most popular version of the Internet Protocol and is in charge of distributing data
packets throughout the network. Maximum unique addresses for IPv4 are 4,294,967,296 (232), which
are possible due to the use of 32-bit addresses. The network address and the host address are the two
components of each address. The host address identifies a particular device within the network,
whereas the network address identifies the network to which the host belongs. In the “dotted decimal”
notation, which is the standard for IPv4 addresses, each octet (8 bits) of the address is represented by its
decimal value and separated by a dot (e.g. 192.168.1.1).
11. IPv6
The most recent version of the Internet Protocol, IPv6, was created to address the IPv4 protocol’s
drawbacks. A maximum of 4.3 billion unique addresses are possible with IPv4’s 32-bit addresses.
Contrarily, IPv6 uses 128-bit addresses, which enable a significantly greater number of unique
addresses. This is significant because IPv4 addresses were running out and there are an increasing
number of devices that require internet access. Additionally, IPv6 offers enhanced security features like
integrated authentication and encryption as well as better support for mobile devices. IPv6 support has
spread among websites and internet service providers, and it is anticipated to gradually displace IPv4 as
the main internet protocol.
12. ICMP
ICMP (Internet Control Message Protocol) is a network protocol that is used to send error messages
and operational information about network conditions. It is an integral part of the Internet Protocol (IP)
suite and is used to help diagnose and troubleshoot issues with network connectivity. ICMP messages
are typically generated by network devices, such as routers, in response to errors or exceptional
conditions encountered in forwarding a datagram. Some examples of ICMP messages include:
 Echo Request and Echo Reply (ping)
 Destination Unreachable
 Time Exceeded
 Redirect
ICMP can also be used by network management tools to test the reachability of a host and measure the
round-trip time for packets to travel from the source to the destination and back. It should be noted that
ICMP is not a secure protocol, it can be used in some types of network attacks
like DDoS amplification.

13. UDP
UDP (User Datagram Protocol) is a connectionless, unreliable transport layer protocol. Unlike TCP, it
does not establish a reliable connection between devices before transmitting data, and it does not
guarantee that data packets will be received in the order they were sent or that they will be received at
all. Instead, UDP simply sends packets of data to a destination without any error checking or flow
control. UDP is typically used for real-time applications such as streaming video and audio, online
gaming, and VoIP (Voice over Internet Protocol) where a small amount of lost data is acceptable and
low latency is important. UDP is faster than TCP because it has less overhead. It doesn’t need to
establish a connection, so it can send data packets immediately. It also doesn’t need to wait for
confirmation that the data was received before sending more, so it can transmit data at a higher rate.

14. IMAP
IMAP (Internet Message Access Protocol) is a protocol used for retrieving emails from a mail server. It
allows users to access and manage their emails on the server, rather than downloading them to a local
device. This means that the user can access their emails from multiple devices and the emails will be
synced across all devices. IMAP is more flexible than POP3 (Post Office Protocol version 3) as it
allows users to access and organize their emails on the server, and also allows multiple users to access
the same mailbox.

15. SSH
SSH (Secure Shell) is a protocol used for secure remote login and other secure network services. It
provides a secure and encrypted way to remotely access and manage servers, network devices, and
other computer systems. SSH uses public-key cryptography to authenticate the user and encrypt the
data being transmitted, making it much more secure than traditional remote login protocols such as
Telnet. SSH also allows for secure file transfers using the SCP (Secure Copy) and SFTP (Secure File
Transfer Protocol) protocols. It is widely used in Unix-based operating systems and is also available for
Windows. It is commonly used by system administrators, developers, and other technical users to
remotely access and manage servers and other network devices.

16. Gopher
Gopher is a type of file retrieval protocol that provides downloadable files with some description for
easy management, retrieving, and searching of files. All the files are arranged on a remote computer in
a stratified manner. It is an old protocol and it is not much used nowadays.

VER 2:
Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the
internet. Each computer -- known as a host -- on the internet has at least one IP address that uniquely
identifies it from all other computers on the internet.
IP is the defining set of protocols that enable the modern internet. It was initially defined in May 1974 in
a paper titled, "A Protocol for Packet Network Intercommunication," published by the Institute of
Electrical and Electronics Engineers and authored by Vinton Cerf and Robert Kahn.
At the core of what is commonly referred to as IP are additional transport protocols that enable the actual
communication between different hosts. One of the core protocols that runs on top of IP is the
Transmission Control Protocol (TCP), which is often why IP is also referred to as TCP/IP. However, TCP
isn't the only protocol that is part of IP.

How does IP routing work?


When data is received or sent -- such as an email or a webpage -- the message is divided into chunks
called packets. Each packet contains both the sender's internet address and the receiver's address.
Any packet is sent first to a gateway computer that understands a small part of the internet. The gateway
computer reads the destination address and forwards the packet to an adjacent gateway that in turn reads
the destination address and so forth until one gateway recognizes the packet as belonging to a computer
within its immediate neighborhood -- or domain. That gateway then forwards the packet directly to the
computer whose address is specified.
Because a message is divided into a number of packets, each packet can, if necessary, be sent by a
different route across the internet. Packets can arrive in a different order than the order they were sent.
The Internet Protocol just delivers them. It's up to another protocol -- the Transmission Control Protocol
-- to put them back in the right order.

IP packets
While IP defines the protocol by which data moves around the internet, the unit that does the actual
moving is the IP packet.
An IP packet is like a physical parcel or a letter with an envelope indicating address information and the
data contained within.
An IP packet's envelope is called the header. The packet header provides the information needed to route
the packet to its destination. An IP packet header is up to 24 bytes long and includes the source IP
address, the destination IP address and information about the size of the whole packet.
The other key part of an IP packet is the data component, which can vary in size. Data inside an IP packet
is the content that is being transmitted.

What is an IP address?
IP provides mechanisms that enable different systems to connect to each other to transfer data. Identifying
each machine in an IP network is enabled with an IP address.
Similar to the way a street address identifies the location of a home or business, an IP address provides an
address that identifies a specific system so data can be sent to it or received from it.
An IP address is typically assigned via the DHCP (Dynamic Host Configuration Protocol). DHCP can be
run at an internet service provider, which will assign a public IP address to a particular device. A public
IP address is one that is accessible via the public internet.
A local IP address can be generated via DHCP running on a local network router, providing an address
that can only be accessed by users on the same local area network.

Differences between IPv4 and IPv6


The most widely used version of IP for most of the internet's existence has been Internet Protocol Version
4 (IPv4).
IPv4 provides a 32-bit IP addressing system that has four sections. For example, a sample IPv4 address
might look like 192.168.0.1, which coincidentally is also commonly the default IPv4 address for a
consumer router. IPv4 supports a total of 4,294,967,296 addresses.
A key benefit of IPv4 is its ease of deployment and its ubiquity, so it is the default protocol. A drawback
of IPv4 is the limited address space and a problem commonly referred to as IPv4 address exhaustion.
There aren't enough IPv4 addresses available for all IP use cases. Since 2011, IANA (Internet Assigned
Numbers Authority) hasn't had any new IPv4 address blocks to allocate. As such, Regional Internet
Registries (RIRs) have had limited ability to provide new public IPv4 addresses.
In contrast, IPv6 defines a 128-bit address space, which provides substantially more space than IPv4, with
340 trillion IP addresses. An IPv6 address has eight sections. The text form of the IPv6 address is
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx, where each x is a hexadecimal digit, representing 4 bits.
The massive availability of address space is the primary benefit of IPv6 and its most obvious impact. The
challenges of IPv6, however, are that it is complex due to its large address space and is often challenging
for network administrators to monitor and manage.

IP network protocols
IP is a connectionless protocol, which means that there is no continuing connection between the end
points that are communicating. Each packet that travels through the internet is treated as an independent
unit of data without any relation to any other unit of data. The reason the packets are reassembled in the
right order is because of TCP, the connection-oriented protocol that keeps track of the packet sequence in
a message.
In the OSI model (Open Systems Interconnection), IP is in layer 3, the networking layer.
There are several commonly used network protocols that run on top of IP, including:
1. TCP. Transmission Control Protocol enables the flow of data across IP address connections.
2. UDP. User Datagram Protocol provides a way to transfer low-latency process communication that is
widely used on the internet for DNS lookup and voice over Internet Protocol.
3. FTP. File Transfer Protocol is a specification that is purpose-built for accessing, managing, loading,
copying and deleting files across connected IP hosts.
4. HTTP. Hypertext Transfer Protocol is the specification that enables the modern web. HTTP enables
websites and web browsers to view content. It typically runs over port 80.
5. HTTPS. Hypertext Transfer Protocol Secure is HTTP that runs with encryption via Secure Sockets
Layer or Transport Layer Security. HTTPS typically is served over port 443.

LANGUAGE OF INTERNET
The 5 Programming Languages That Built the Internet

KEY TAKEAWAYS

Without these programming languages, the internet wouldn't exist.

The internet couldn’t possibly run without someone somewhere writing some code, but in internet
history, there are a few particular languages that provided the foundation upon which the web we know
today is built. These five languages have helped shape the modern internet. (To do some background
reading, check out Computer Programming: From Machine Language to Artificial Intelligence.)

Lisp
This language is actually not widely used on the internet, but is responsible for building the internet in
many ways. Invented by John McCarthy in the late 1950s, Lisp, despite its odd name, tied together the
research community that helped create the internet.
Spreading out of MIT, Lisp offered some modern features for the first time, such as conditionals. But
what was really mind-blowing about Lisp was that it made no distinction between code and data. Lisp
could treat code as data and data as code. Lisp makes it possible to extend the language in ways that its
designers never intended, giving rise to the term "programmable programming language."

Lisp became the lingua franca of the artificial intelligence community, the community that DARPA called
on to build what eventually became the internet in the late 1960s. With the "AI Winter" in the late '80s,
Lisp’s fortunes sank somewhat, although it still had its fans. One of them, Paul Graham, later to found the
startup incubator Y Combinator, used it to build one of the first e-commerce companies, Viaweb, which
was later purchased by Yahoo. Graham credited the ability to write powerful software by himself as one
of the reasons for its success. The first version of the popular social news website Reddit was also built in
Common Lisp.

C
The single most influential programming language today might be C. Invented at Bell Labs in the '70s, it
was one of the first high-level programming languages to have an operating system written in it. And that
operating system just happens to be Unix. Because it was written in C, it was possible to move Unix to
different platforms.

Rewriting Unix in C was a major breakthrough. Previously, operating systems were written in assembly
language, as they had to be really close to the hardware. C, on the other hand, was a higher-level language
but was still close enough to the hardware to write an operating system in. This made Unix one of the first
portable operating systems. A C program could be compiled to run on different operating systems, but
since most of the early C programmers also happened to be Unix programmers, they tended to assume
that their programs would be run under Unix and developed their code accordingly. Because it was
relatively easy to port Unix to other computers, lots of people did so.

C has obviously had a lot of success outside of Unix. Windows is coded in C, as are many other
applications. As C creator Dennis Ritchie wrote, "C is quirky, flawed, and an enormous success. While
accidents of history surely helped, it evidently satisfied a need for a system implementation language
efficient enough to displace assembly language, yet sufficiently abstract and fluent to
describe algorithms and interactions in a wide variety of environments." (To learn more about C, see The
History of the C Programming Language.)

Perl
Perl isn’t as talked-about as it was in the '90s, but it is still a major part of the internet. In fact, it owes its
popularity to the internet. Perl was invented in the late '80s by Larry Wall when he was working for
NASA’s Jet Propulsion Laboratory, as recounted in a book called "Programming Perl." Wall needed
a configuration management system to talk to several Unix computers on opposite coasts. None of the
existing Unix tools could do the job, so he took the lazy route and invented a whole new programming
language.

Wall, as recounted, released it in 1987 over Usenet and it attracted an instant community of developers
across the growing internet, one of the first major open-source projects to gain traction before Linux.
When the web took off, Perl found a niche as one of the languages of choice for developing dynamic web
pages. Syntactically, it resembled C, but was implemented at an even higher level, without the need to
manually manage memory. This meant that developers could write, test and debug programs quickly. Perl
is very flexible, leading to some ugly code. Its combination of ugliness and usefulness has given it the
moniker of "the duct tape of the internet."

Although Python and PHP have stolen a bit of Perl’s thunder, its importance to the spread of the internet
is undeniable. (Learn the basics of Perl in Perl 101.)
PHP
Speaking of PHP, this language has dethroned Perl as one of the major building blocks of modern
dynamic web pages. Like Perl, it has a reputation for letting people write ugly code, yet it still runs a lot
of websites that people use every day, including Facebook. It was created in 1994 by Rasmus Lerdorf.
(Learn the basics of PHP in PHP 101.)

PHP might make computer scientists scoff, but if you want to be taken seriously as a web developer, it’s a
skill you should have on your resume.

The reason that it’s become so popular is that PHP code can be embedded right into a web page. This
means you don’t have to put your PHP script in a separate program and generate HTML code using Perl
or C. This makes it very easy for people who already know HTML to learn PHP and add interactivity to
their pages. It’s also easy to integrate PHP with a SQL server such as MySQL. Which leads to…

SQL
SQL stands for Structured Query Language. It’s a way to form queries for relational databases. It’s also
relatively easy to learn, as it uses English-like commands. There are plenty of implementations, such
as MySQL and PostgreSQL, which are popular open-source relational database servers. SQLite is a
smaller variant used in a lot of applications, such as Apple’s iTunes.

Although invented by Edgar F. Codd in the 1970s, SQL and the relational database took a while to
become popular. Oracle first popularized relational databases, then MySQL made it a must-have
technology for building websites. The relational model provided a simple and efficient way to mange
large amounts of data.

You can create a good web app or service in any language, but you can’t go wrong picking one of the
languages that have influenced the way the web has developed.

E-MAIL AND VOICE MAIL


Electronic mail, commonly known as email, is a method of exchanging messages over the internet.

Here are the basics of email:


1. An email address: This is a unique identifier for each user, typically in the format of
[email protected].
2. An email client: This is a software program used to send, receive and manage emails, such as
Gmail, Outlook, or Apple Mail.
3. An email server: This is a computer system responsible for storing and forwarding emails to their
intended recipients.
To send an email:
1. Compose a new message in your email client.
2. Enter the recipient’s email address in the “To” field.
3. Add a subject line to summarize the content of the message.
4. Write the body of the message.
5. Attach any relevant files if needed.
6. Click “Send” to deliver the message to the recipient’s email server.
7. Emails can also include features such as cc (carbon copy) and bcc (blind carbon copy) to send
copies of the message to multiple recipients, and reply, reply all, and forward options to manage the
conversation.
Electronic Mail (e-mail) is one of most widely used services of Internet. This service allows an
Internet user to send a message in formatted manner (mail) to the other Internet user in any part of
world. Message in mail not only contain text, but it also contains images, audio and videos data. The
person who is sending mail is called sender and person who receives mail is called recipient. It is just
like postal mail service. Components of E-Mail System : The basic components of an email system
are : User Agent (UA), Message Transfer Agent (MTA), Mail Box, and Spool file. These are explained
as following below.
1. User Agent (UA) : The UA is normally a program which is used to send and receive mail.
Sometimes, it is called as mail reader. It accepts variety of commands for composing, receiving and
replying to messages as well as for manipulation of the mailboxes.
2. Message Transfer Agent (MTA) : MTA is actually responsible for transfer of mail from one
system to another. To send a mail, a system must have client MTA and system MTA. It transfer
mail to mailboxes of recipients if they are connected in the same machine. It delivers mail to peer
MTA if destination mailbox is in another machine. The delivery from one MTA to another MTA is
done by Simple Mail Transfer Protocol .
3. Mailbox : It is a file on local hard drive to collect mails. Delivered mails are present in this file.
The user can read it delete it according to his/her requirement. To use e-mail system each user must
have a mailbox . Access to mailbox is only to owner of mailbox.
4. Spool file : This file contains mails that are to be sent. User agent appends outgoing mails in this
file using SMTP. MTA extracts pending mail from spool file for their delivery. E-mail allows one
name, an alias, to represent several different e-mail addresses. It is known as mailing list,
Whenever user have to sent a message, system checks recipient’s name against alias database. If
mailing list is present for defined alias, separate messages, one for each entry in the list, must be
prepared and handed to MTA. If for defined alias, there is no such mailing list is present, name
itself becomes naming address and a single message is delivered to mail transfer entity.
Services provided by E-mail system :
 Composition – The composition refer to process that creates messages and answers. For
composition any kind of text editor can be used.
 Transfer – Transfer means sending procedure of mail i.e. from the sender to recipient.
 Reporting – Reporting refers to confirmation for delivery of mail. It help user to check whether
their mail is delivered, lost or rejected.
 Displaying – It refers to present mail in form that is understand by the user.
 Disposition – This step concern with recipient that what will recipient do after receiving mail i.e
save mail, delete before reading or delete after reading.
Advantages Or Disadvantages:
Advantages of email:
1. Convenient and fast communication with individuals or groups globally.
2. Easy to store and search for past messages.
3. Ability to send and receive attachments such as documents, images, and videos.
4. Cost-effective compared to traditional mail and fax.
5. Available 24/7.
Disadvantages of email:
1. Risk of spam and phishing attacks.
2. Overwhelming amount of emails can lead to information overload.
3. Can lead to decreased face-to-face communication and loss of personal touch.
4. Potential for miscommunication due to lack of tone and body language in written messages.
5. Technical issues, such as server outages, can disrupt email service.
6. It is important to use email responsibly and effectively, for example, by keeping the subject line
clear and concise, using proper etiquette, and protecting against security threats.
What Is Voicemail?
A voicemail is an electronically stored voice message that is left by a caller to be retrieved later by the
intended recipient. The recipient can retrieve the stored message through phone, desktop, email and other
communications devices, depending on the business phone system the recipient's company uses.

Features Of Voicemail
Voicemail comes with features like a user interface to enable selecting, playing, and managing of
messages. There are delivery features for the sender of the voicemail to either play or deliver the message.
There are also notification features that notify voicemail recipients of waiting messages.

Advantages And Benefits Of Voicemail


24/7 Accessibility
Voicemail ensures that your business and employees are always reachable. While voicemail is often less
desirable than reaching someone live, it's a better experience than not being able to reach a person at all.
This is especially useful for roles where employees are typically away from the phone, like traveling
salespeople or service people, or even just when average employees are unable to answer their phones
while they attend meetings.

Eliminate On-Hold Calls


Being put on hold is a frustrating experience for most people. With voicemail, a client or customer gets to
communicate their concerns promptly without feeling that their time has been wasted by being put on
hold. Then, the recipient can return their call as soon as they're available, which reduces on-hold wait
time time for the caller.
Many Clients Prefer Voicemails
Voicemails enable clients and customers express their concerns efficiently without being interrupted. A
client or customer gets to focus on their main concerns without diverging into irrelevant information.
Cost-Effective
Voicemail may reduce staff expenses while still maintaining certain levels of customer satisfaction. With
voicemail, a business may not need as much customer service staff. A business can also cut down on
overtime pay in customer service staff by allowing voicemail to answer calls during certain times of day.
Call Screening
Voicemail enables your staff to screen incoming calls. The high priority calls to get immediate attention
and non-urgent matters may be sent to voicemail to be acted upon at a later time.
CREATING MAIL ADDRESS
Gmail

Introduction
Setting up a Gmail account is easy. You will begin by creating a Google account, and during the quick
sign-up process you will choose your Gmail account name. In this lesson, we'll show you how to set
up your Google account for Gmail, add and edit contacts, and edit your mail settings.
Setting up a Gmail account
To create a Gmail address, you'll first need to create a Google account. Gmail will redirect you to the
Google account sign-up page. You'll need to provide some basic information like your name, birth
date, gender, and location. You will also need to choose a name for your new Gmail address. Once you
create an account, you'll be able to start adding contacts and adjusting your mail settings.

To create an account:
1. Go to www.gmail.com.

2. Click Create account.

3. The sign-up form will appear. Follow the directions by entering the required
information.

4. Next, enter your phone number to verify your account. Google uses a two-step
verification process for your security.

5. You will receive a text message from Google with a verification code. Enter the
code to complete the account verification.

6. Next, you will see a form to enter some of your personal information, like your name and
birthday.

7. Review Google's Terms of Service and Privacy Policy, then click I agree.

8. Your account will be created.


Just like with any online service, it's important to choose a strong password—in other words, one that is
difficult for someone else to guess. For more information, review our lesson on creating strong
passwords.

Signing in to your account


When you first create your account, you will be automatically signed in. Most of the time, however, you'll
need to sign in to your account and sign out when you're done with it. Signing out is especially important
if you're using a shared computer (for example, at a library or office) because it prevents others from
viewing your emails.
To sign in:
1. Go to www.gmail.com.
2. Type your user name (your email address) and password, then click Next.
To sign out:
In the top-right corner of the page, locate the circle that has your first initial (if you've already selected an
avatar image, it will show the image instead). To sign out, click the circle and select Sign out.

Mail settings
Occasionally, you may want to make adjustments to Gmail's appearance or behavior. For example, you
could create a signature or vacation reply, edit your labels, or change the theme. These adjustments can
be made from your mail settings.
To access your mail settings:
1. Click the gear icon in the top-right corner of the page, then select Settings.

2. From here, you can click any of the categories at the top to edit the desired settings.

Adding contacts
Like all major email providers, Gmail lets you keep an address book of contacts so you don't have to
memorize everyone's email addresses. You can also add other contact information, like phone
numbers, birthdays, and physical addresses.

To add a contact:
1. Click the Google apps button.

2. Click the Contacts button in the drop-down menu.

3. Your contacts screen will appear. Click the Add new contact button in the lower-right
corner.

4. Enter the contact information, then click Save.

To edit a contact:
1. In the Google apps drop-down menu, select Contacts.

2. Locate the contact you want to edit, then click Edit Contact.

3. You can now make any changes you want to the contact.

By default, when you send an email to a new address, Gmail adds the address to your contacts. You can
then go to your contacts to edit the person's information as needed.
Importing mail and contacts
You may already have a contact list from another email address, and it would be a lot of work to re-enter
all of this information manually. Gmail allows you to import your contacts from another email account,
and you can even import all of your email messages from that account. Several email providers are
supported, including Yahoo!, Hotmail, and AOL.

To add other accounts:


1. Click the gear icon in the top-right corner of the page, then select Settings.
2. Go to Accounts and click Add a mail account. You can then follow the instructions on
the screen to import your mail.

MEANING OF NET MEETING AND CHATTING


Net Meeting:

Ver 1:

NetMeeting was one of the first collaboration and conferencing tools launched by Microsoft in 1996. This
software was incredibly versatile and included features like whiteboarding, application sharing, and video
calling over the internet. NetMeeting was even bundled with Windows, making it a popular choice
amongst users.

Despite its popularity, NetMeeting was eventually discontinued in 2003 due to the development of newer
and more advanced communication tools such as instant messaging and online meeting services.
Microsoft launched Office Live Meeting as a replacement for NetMeeting, which was acquired through
its acquisition of PlaceWare.

Ver 2:

Definition:

Built on Microsoft’s Internet Explorer Web browser, Microsoft NetMeeting is a Voice-over-Internet

Protocol (Voice over IP, VoIP) used for multipoint audio and video conferencing. Video conferencing

comes into limelight through this application as it is cheap, effective, reliable, and easy to use.

Features:

MS NetMeeting has various features which make this application unique and suitable for any

organization.

 Provides instantaneous communication.


 Shares any desktop Windows within same scope and variant.
 Allows meeting of organizations over Internet or intranet.
 Facilitates chat sessions, whiteboard and application sharing.
 Supports many synchronized users according to need, in a call.
 Registers users automatically.
 Searches users in same group or panel with advanced services like Internet Locator Services
(ILS).
 Offers best of the class security services.
 Available in various versions to support different users with different knowledge.
Ver 3:

Microsoft introduced the NetMeeting application to allow for VoIP (Voice over Internet Protocol)
communications and videoconferencing. NetMeeting used the H.323 protocol for videoconferencing and
was also compatible with OpenH323 clients like Ekiga and ILS (Internet Locator Service). It also allowed
for application and desktop sharing, remote desktop sharing and transfer of files between client
computers.

NetMeeting was available for use starting with later versions of Internet Explorer 3 and Windows 95
OSR2 and continued up through Windows XP. NetMeeting was a popular application for
videoconferencing, until free videoconferencing solutions appeared in applications like Yahoo!
Messenger, MSN (Microsoft Network) Messenger, and Skype. Microsoft changed course at this point and
focused on Windows Messenger and Microsoft Office Live Meeting for its offering of videoconferencing
capabilities.

Ver 4:

NetMeeting was a popular audio/videoconferencing and instant messaging (IM) application that was
included with Microsoft Windows versions 95 OSR2 to Windows XP. NetMeeting was replaced by
Windows Meeting Space when Windows Vista was released.

NetMeeting provided desktop audio/video sharing, chat and file transfer functionalities. NetMeeting was
initially associated with later Internet Explorer (IE) 3 versions and IE 4.0’s early version.

This was before free IM clients were the norm. NetMeeting is now no longer used in any significant
sense.

CHATTING:

Ver1:

Internet nowadays is very common and available to all at cheap rates and can be used as a good means
of communication. Using the internet we can make text conversations with anyone. Send your message
to anyone and will get a reply, it’s known as instant messaging. You can talk over the internet with
anyone, which is known as voice chatting, and even with the help of a webcam, we can also have video
calls or video chatting.
Chatting refers to the kind of communication done with the help of the internet which present live
transmission of text messages from sender to receiver. Online chatting can be termed as the point-to-
point, one sender-to-one receiver, or one sender-to-many receiver. It also features voice, video, and also
web conferencing services. Chatting can be done as a chat-based as well as video-based (using
webcams). Chatting nowadays has evolved uniquely. In today’s world, we have a lot of applications
and websites which are widely used across the world. Chatting over the internet has made it a lot easier
to have a conversation with anyone. People from any corner of the world are now able to contact the
person on the other edge.
Following are the most common type of chatting:
 Instant Messaging: It is the most common way of chatting. It is text-based communication. It
happens between two people or groups of people.
 Internet Relay Chat: It is known as IRC. It is also a text-based chat. It is not owned by any
company and to use IRC we need a client program. Using IRC we can participate in discussion
channels or can communicate with only two partners or users.
 ICQ: It is known as I seek you. It is the most useful communication program. Using ICQ we can
send files, URLs, and more. It is just like instant messaging but allows you to enter into the chat
room and can chat with multiple people at a time.
 Voice Chatting: We can chat not only with text but also with sounds as well. It is known as voice
chatting. Voice chatting can be used with the internet just as a phone call. Internet voice call is free
and unlimited, it only needs a good internet connection.
 Video chatting: Video chatting is also a kind of chatting which is also done with the help of the
internet and it also requires a webcam as it is a face to face chatting. Internet speed required by
video chatting is higher as compared to text and video chatting. And a good quality camera too.

Chat Room

A chat room is a part of an online service where users can have conversations with each other through
the internet. It can also be termed a virtual room. First users need to register to the server after
registration users can log in with the help of a username and password. In the chat room, users are
allowed to have conversations in multiple mediums such as text voice, or even video calls.
Transmission of multimedia ( images, videos, etc.) can also be done in the chat room.

Chat Etiquette

Following are some chat etiquette that we should follow while chatting:
 Never use abusive words during a chat session.
 Don’t create too many groups unless necessary.
 Never share sensitive information on chat especially in groups.
 Don’t share viral posts unless it’s verified.
 During chats, banking details must not be shared.
 Never share private messages of user/friend/ person without asking their permission.
 Always remember no one is perfect so always respect people.

Chatting Platforms

Nowadays there are many chatting platforms available for users. Some of them are mentioned below:
 Facebook: Facebook is one of the oldest and most used platforms for chatting. It was founded in
February 2004. Facebook offers text, voice, and video chat to its users. Users can also post some
materials on Facebook. Facebook is available for users in many different languages. Facebook is
currently owning different chatting applications. (WhatsApp, Instagram, Facebook Messenger).
 WhatsApp: WhatsApp is also one of the most used platforms. It is owned by the Facebook group.
WhatsApp too offers all types of chatting (Text, voice, and video). It is available in many different
languages.
 Skype: Skype was initially released in August 2003. It is mostly used for live meetings. It is
available in 101 different languages.
 Telegram: Telegram is a popular chatting application widely used across the world. It also allows
group as well as individual conversations. It is a multiplatform application, it can be used on
different operating systems for example mac, windows, Linux, ios, android.
 Snapchat: Snapchat is a mobile application for both Android as well as ios. One of the core
concepts of Snapchat is that the message sends to anyone whether it’s a videos message, text, or
audio it will only last for a short period.
 Hike: Hike messenger also known as hike sticker chat is a mobile application. Its main feature is
that it comes with sticker chatting which is unique as compared to other apps whatever text you
want to send it can be converted into a sticker.

Risk from Chatting

Chatting also has some risks which one should be aware of:
 During Chatting always be aware of fake profiles, fake profiles are very dangerous as they will
allure you to share some confidential information, which can be used in blackmail.
 Never use that application or platforms which don’t offer proper end-to-end encryption. Using such
platforms can lead to chat leaks.
 Cyberbullying is a major of risk chatting over the internet, it includes sending threatening
messages, spreading lies about anyone, commenting bad or abusive language on someone’s online
profile, or blackmailing someone to bash their looks or reputation.
 Never share your profile passwords with anyone, it can be missed in multiple ways ad can get down
your reputation.

How Chat Safely?

While chatting keep the following points in mind for safely chat:
 Never share personal information with any unknown user.
 Before chatting always check the profile of the user, and try to determine if it’s fake or real.
 Only chat with those users who have a genuine profile picture.
 Don’t trust anyone. Never trust any unknown user to share banking details or any personal
information.
 Always keep your guard. During online chat never keep your guard off, always be aware if
someone is trying to peek into the device.
 Do complain (tell your parents) instantly if noticed some unsuspicious activity.

Ver2:
What is chatting?
While the term chatting or chitchat refers in general to communication between two or more parties that
can occur in person, in today's modern age, it can also occur over the internet via Short Message Service
(SMS) text message and Multimedia Messaging Service (MMS) or, for example, through tools
like Slack and Microsoft Teams and social media platforms like Facebook and Twitter.
On the internet, the definition of chat refers to talking to other people who are using the internet at the
same time you are.
Usually, this talking is the exchange of typed-in messages requiring one site as the repository for the
messages -- or chat site -- and a group of users who take part from anywhere on the internet.

Different types of chatting


As explained above, modern chatting can occur in a variety of ways aside from direct, in-person contact.
Let's explore those now.
Chat rooms
Chat rooms have been around since the early days of the internet. Back then, chat rooms were held on
online services like AOL, which also offered instant messaging, a form of one-to-one private messaging
between two users.
Users would connect to the service, choose a chat room from a list of available rooms, and then type in a
screen name that would identify you to other users in the room.
These days, there are many different chat rooms available on the internet, including those focused on
specific topics, interests or even just for chatting with friends.
Group chat situations like this can also be hosted by bulletin board forum services and by websites.
Several websites exist solely for the purpose of conducting chats.
Communication/collaboration software
Additionally, communication platforms like Slack and Google Chat provide a chat session for remote or
dispersed companies to facilitate team communication and collaboration in a work setting.
These tools enable real-time online chatting, as well as video and audio chatting, and share features like
group chat rooms, file sharing and searchable history.

An
example of chat occurring over Slack covering a specific topic

Chats can be ongoing or scheduled for a particular time and duration. Most chats are focused on a
particular topic of interest or project, and some involve guest experts or famous people who talk to
anyone joining the chat.
There are other platforms, such as Zoom, that facilitate voice chatting between two or more parties and
offer the option to be on video during the call. This type of software is used mostly by businesses to
replace in-person meetings.

Video chatting over Zoom

Smartphone chat apps


Of course, chatting doesn't just happen on computers. With the advent of smartphones, there are now
dozens of apps that enable users to chat with one another.
While chat software like Slack has mobile apps that can be installed on smartphones and mobile devices,
these smart devices also typically come with chat software specifically for these mobile devices.
For example, WhatsApp is a chatting app that is available for both iPhone and Android devices. This app
uses the internet to send text messages, images, video, user location and audio media messages from one
smartphone to another.
It also enables voice and video calls between users. Another similar smartphone app is Facebook
Messenger, which is used to chat with friends on the platform. Chatting can occur in a private window or
within the Messenger app, but it also enables face-to-face conversions.
FaceTime is another chatting option that is available on Apple iOS devices. This app uses the device's
front-facing camera to enable video chat between two people.
While it doesn't offer group chatting or other features, it's a quick and easy way to have a conversation
with someone using an iPhone, iPad, iPod touch or Mac.
FaceTime enables users to conduct one-on-one and group video chats over wireless or cellular networks.

What are chatbots?


Chatbots are a little different from traditional chat rooms and chat software. These are computer programs
with artificial intelligence (AI) that mimic human conversation. Users may even interact with a chatbot
without even realizing it.
For example, when people visit a website and are asked by what appears to be a person on the other end
of a chat window to provide their name, email address and other information in order to receive a
newsletter or access to certain content, that's a chatbot in action.
Additionally, some companies use chatbots as customer service representatives. For example, users may
chat with a chatbot on Facebook Messenger when inquiring about a product or service.
Typically, a chatbot starts as an AI-enabled interaction but eventually leads to transferring the human on
the other end to the appropriate representative for further help.
Chatting can take many different forms in the modern age. It's a great way to communicate with others,
whether they're right next to you or on the other side of the world, and has applications in both personal
and professional environments.

TOOL BAR

Ver1:

Toolbar is a set of icons or buttons that are part of a software program's interface or an open window.
When it is part of a program's interface, the toolbar typically sits directly under the menu bar. For
example, Adobe Photoshop includes a toolbar that allows you to adjust settings for each selected tool. If
the paintbrush is selected, the toolbar will provide options to change the brush size, opacity, and flow.
Microsoft Word has a toolbar with icons that allow you to open, save, and print documents, as well as
change the font, text size, and style of the text. Like many programs, the Word toolbar can be customized
by adding or deleting options. It can even be moved to different parts of the screen.

The toolbar can also reside within an open window. For example, Web browsers, such as Internet
Explorer, include a toolbar in each open window. These toolbars have items such as Back and Forward
buttons, a Home button, and an address field. Some browsers allow you to customize the items in toolbar
by right-clicking within the toolbar and choosing "Customize..." or selecting "Customize Toolbar" from
the browser preferences. Open windows on the desktop may have toolbars as well. For example, in Mac
OS X, each window has Back and Forward buttons, View Options, a Get Info button, and a New Folder
button. You can customize the Mac OS X window toolbars as well.

Toolbars serve as an always-available, easy-to-use interface for performing common functions.

Ver2:

A toolbar is a pre-arranged list of command “buttons” for a computer program. These buttons, and the
toolbar itself, are usually shortcuts that allow the user to control programming functions without
searching through a list of commands. Computer operating systems also include toolbars, usually at the
top or bottom of the screen. Some toolbars are designed so users can reposition them on the screen for
greater efficiency, or hide them altogether.
The toolbar is a kind of programming feature called a graphical user interface, sometimes called a GUI
or a widget. While these terms may be mostly known to computer specialists and programming
enthusiasts, GUIs are widely used across the globe. They are a form of user-friendly interfaces that allow
computer users to manipulate device functions without knowing programming language or protocols.
GUIs of one kind or another are found in almost any device that employs a computer, including personal
media players, cars, televisions, thermostats and telephones.

Toolbars typically appear at the top or bottom of an application and include shortcuts to a
variety of functions.

Toolbars have a variety of designs and functions. An operating system toolbar will usually be present
any time the computer is active. Graphics programs may have several toolbars, some of which are always
visible and others that only appear when certain functions are activated. Web browsing programs will
have their own toolbars, separate from the operating system, and individual websites will often add yet
another toolbar while the user is visiting the site. Useable screen space can actually be compromised by
too many toolbars.
Another disadvantage is that some websites or companies will add toolbars to a computer without the
user’s consent, or by convincing the user there is some advantage to adding the function. Some of these
toolbars can be spyware programs that track a user’s web activity for marketing purposes. These toolbars
can be difficult for inexpert computer users to remove. Operating systems and web browsers offer the
option of locking toolbars to prevent such unnecessary add-ons.
Not all such add-on toolbars have sinister intent. Some aid web searches or offer shortcuts to frequently
visited websites. “Bookmark” or “favorite” toolbars are examples of this kind of GUI. Most major search
engines also offer toolbars to save web users the step of navigating to their search page. Increasing
computer screen size means that many users can add these extra toolbars without losing significant screen
space. Modern phones and portable devices also have these toolbars, despite their smaller screens. It
could be said that the entire interface on some of these advanced handheld devices is nothing more than a
high-functioning toolbar.

Ver3:

The toolbar, also called bar or standard toolbar, is a row of buttons, often near the top of an application
window, that controls software functions. The boxes are below the menu bar and often contain images
corresponding with the function they control, as demonstrated in the image below.

A toolbar often provides quick access to functions commonly performed in the program. For example,
a formatting toolbar in early versions of Microsoft Excel lets you make text bold or change text alignment
with other common buttons. In an Internet browser, toolbars add functionality that may not come pre-
installed. For example, with the Google toolbar, you could access exclusive Google features.

Tip

If you are missing an application's toolbar, try pressing Alt on the keyboard, as some programs hide the
toolbar until Alt is pressed. In Windows 8 and Windows 10, some programs only show a hidden toolbar if
the mouse pointer is at the top of the window.

Tip

In most Microsoft Windows programs, the toolbars can be adjusted, hidden, or displayed by
clicking View at the top of the window, and then select Toolbars. In programs that do not have
a View menu, look in the Settings or Properties section.

Common computer software toolbars and other bars

Below are examples of software bars and toolbars you may encounter and use on a computer.

 App bar - Windows 8 bar.


 Bar chart - A chart consisting of horizontal or vertical bars.
 Barcode - A series of lines that identifies an address, product, or other information.
 Browser toolbar - Any toolbar in an Internet browser.
 Bookmarks bar - Bar showing frequently visited bookmarks.
 Command bar - A bar that shows available commands in a program.
 Dock - A bar found at the bottom of macOS that gives quick access to programs.
 Favorites bar - Bar showing frequently visited favorites.
 Formatting toolbar - Toolbar that shows text formatting options.
 Formula bar - Bar in a spreadsheet program that lets you edit a formula.
 Menu bar - A bar at the top of the screen that gives access to all of the menus.
 Navigation bar - Gives access to all navigation features in a browser.
 Places bar - A pane that shows common places to access files.
 Progress bar - An indicator that shows how long it takes until something is completed.
 Scroll bar - A bar on the bottom or side of the window to scroll through a page.
 Split bar - A bar that divides the window into multiple sections.
 Status bar - One of the few bars at the bottom of the window that shows the status.
 Taskbar - The bar found at the bottom of the Microsoft Windows operating system since
Windows 95.
 Title bar - A bar at the top of a window that describes the program or window.

What is a standard toolbar?

A standard bar or standard toolbar describes the traditional toolbar in most program windows. These
terms are needed because programs like Microsoft Office programs have moved away from the standard
toolbar and are using a Ribbon. Other programs have hidden the standard toolbar behind a hamburger
menu.

Computer hardware bars

Below are the two most command hardware bars you may encounter and use on or with a computer.

 Port bar - A device that allows your laptop to connect to other devices.
 Spacebar - A key on a keyboard that creates a space.

You might also like