Internet Basics UNIT III (Notes) - 1
Internet Basics UNIT III (Notes) - 1
EVOLUTION
In the 1960s, there was already talk of computer networks that would allow general communication
between users of various computers. However, it is not until 1982 that the Internet is considered to be the
year in which it was “born”.
In this year, the Advanced Research Projects Agency Network was founded.
This organisation was made up of some 200 scientists and its aim was to create direct communications
between computers.
This year saw the first connection between computers at Stanford and UCLA. ARPANET was a
computer network that brought together the best ideas from teams at the Massachusetts Institute of
Technology (MIT), the National Physics Laboratory (NPL) and the Rand Corporation (RC).
By 1990, Berners-Lee had developed three technologies: HTML, URLs and the hypertext
transfer protocol HTTP.
Although there were earlier virus cases, the virus created by Rich Skrenta is considered the first. The 15-
year-old student programmed the so-called Elk Cloner for the Apple II, the first computer virus to have
a real spread.
Today, Rich is a Silicon Valley entrepreneur who created the web search engine Blekko.
1994 – The first search engine and the first online shops
The first full-text search engine was WebCrawler. Unlike its predecessors, it allowed users to perform
a keyword search on any website. In addition, Yahoo!, Excite, Infoseek, Inktomi, Northern Light and
Altavista were also launched that year.
Although the first online sales are said to have taken place on the Net Market service, in reality it was not
until 1994 that the first online shops, including Amazon and eBay, were launched.
1996 – Google
Larry Page and Sergey Brin launched today’s quintessential search engine: Google. The initial project
was called BackRub, as that was the name of the technology they used.
Google based the operation of its search engine on the relevance of the contents of each web page for
the users themselves. In other words, it prioritised those results that users considered most relevant to a
specific topic. To do so, it patented its famous PageRank, a series of algorithms that assess the relevance
of a website by assigning it a score from 0 to 10.
2005 – YouTube
2006 – Twitter
2011 – Snapchat
2016 – TikTok
Present
In Spain alone, there are currently 40.7 million social network users, equivalent to 87.1% of the Spanish
population. In addition, 44 million use the Internet daily for an average of 6 hours.
BASIC TRMINOLOGY
Ver1:
There are fifteen basic internet terms that every web savvy person should know while browsing internet.
These internet terms are useful for every internet user.
The Internet is basically the largest, most organized network of small computer networks in every country
worldwide. These networks and computers are all interconnected and share a vast amount of information
through a protocol called TCP / IP, which allows computers to communicate with each other quickly and
efficiently.
01. WHOIS
The acronym WHOIS stands for “WHO” and “is”. A WHOIS search may return the following
information:
Whether or not a particular domain name is registered to an individual, organization, or business – Name,
address and domain name owner phone number; Technical information about the registered domain or
web server; Date of purchase and registration of the domain name; Email addresses; Also includes IP
lookup, DNS lookup, domain search
02. Password
In the web context, a password is a set of letters, numbers, and / or special characters that combine to
form a word or phrase intended to authenticate a user’s entry, registration, or membership on a Web site.
Passwords that are easy to remember are the most useful, kept secret and deliberately unique.
03. Domain
A domain name is a unique, character-based component of a URL. This domain name is available for
registration with the domain registrar by an individual, business or non-profit organization. There are two
components to a domain name.
First component is the original alphabetical word or phrase; For example, “widget”. The second
component is the top-level domain name refers to what kind of site it is; for example, .com (for
commercial domains), .org (organizations), .ed (for educational institutions).
Put these two components together and you have a domain name: “widget.com”.
04. SSL
SSL acronym is Secure Sockets layer . It is a secure encryption web protocol. It keeps data safe when
transmitted over the Internet. SSL is especially used on shopping sites to keep financial data safe but also
on any site that requires sensitive data (such as a password). The presence of HTTPS in the URL of a web
browser’s web site indicates that SSL is used on the web site.
05. Crawler
The word crawler is another word for spider and robot. These are primarily software programs that crawl
web and index site information for search engine databases.
06. Proxy server
A proxy server is a web server that acts as a shield for other web servers, allowing them to hide relevant
information (such as network addresses and locations) from websites and other network users. In the web
context, proxy servers assist in anonymous surfing, as a proxy server acts as a buffer between search and
targeted websites, allowing users to access data while remaining anonymous
07. Temporary Internet files
Temporary Internet files are very important in the context of web search. Each web page visits a search
visit data (pages, videos, audio, etc.) in a specific file folder on their computer hard drive. The next time it
searches the web page, it loads quickly and efficiently because data has already been loaded from
temporary Internet files rather than the web data server.
Temporary Internet files on your computer can eventually take up very little memory space, so it is
important to clear them once.
08. URL
URL stands for Uniform Resource Locator. A URL is a web address that is unique to each website.
09. Firewall
A firewall is a security measure designed to prevent unauthorized computers, users, and networks from
accessing data on another computer or network. Firewalls are particularly useful for web users since they
can protect them from malignant spyware and cyber criminals while they are online.
10. TCP / IP
TCP/IP is an acronym for Transmission Control Protocol/Internet Protocol. TCP / IP are the basic
protocols for sending data over the Internet.
11. Offline
When you’re offline, you’re not connected to the Internet. For example, to refer to the word “offline” as
something outside the Internet, for example, the conversation that started on Twitter continued in the local
coffee shop, “offline”.
12. Web hosting
Web hosting refers to the hosting space for active websites. A web hosting service provides space on a
web server, as well as a direct Internet connection, so that the website can be viewed and communicated
with those who have an Internet connection.
A web host is a business / organization that provides the space, storage, and connectivity to launch a
website that the Internet users view. A variety of web hosting options are available, ranging from a simple
one-page site to just a small amount of space.
Many web hosting companies provide a dashboard for users that allow them to control various aspects of
their web hosting services; it includes FTP, various content management system installation and service
package extensions.
13. Hyperlink
A hyperlink, also known as the most basic building block of the World Wide Web, is a link that links a
document, image, word, or web page to another. Hyperlinks allow to “surf” or browse, pages and
information on the web quickly and easily.
14. Web server
The term web server refers to a dedicated computer system or dedicated server designed specifically to
host or deliver websites.
15. IP address
Signature address / number of your computer connected to the Internet. Country-based blocks show these
addresses so (for the most part) an IP address identifies the name that originates from the computer.
Ver2
The internet is a global network of smaller networks and computers. The World Wide Web, or web for
short, is the space where digital content is served to internet users. Said another way, the web is a part
of the internet.
Browser
A browser is a free software program or mobile app that displays web pages, graphics, and other online
content. Popular web browsers include Chrome, Firefox, Microsoft Edge, and Safari, but there are
many others.
Internet users access the web through web browser software, which is included in or can be
downloaded on computers and mobile devices. Each web page has a unique address called a URL,
which can be entered in a browser's address bar to navigate directly to a site.
Browser software is specifically designed to convert HTML and XML computer code into human-
readable documents.
Web Page
A web page is what you see in a web browser when you're on the internet. You are on a web page right
now. Think of the web page as a page in a magazine. You may see text, photos, images, diagrams,
links, advertisements, and more on any page you view.
Often, you click or tap on a specific area of a web page to expand the information or move to a related
web page. Clicking a link, which is a snippet of text that appears in a color different from the rest of the
text, takes you to a different web page. If you want to go back, use the arrow buttons provided for that
purpose.
URL
Uniform Resource Locators (URLs) are the web browser addresses of internet pages and files. With
a URL, you can locate and bookmark specific pages and files in a web browser.
Here is an example format of a URL:
http://www.examplewebsite.com/mypage
This format is frequently shortened to this:
www.examplewebsite.com/mypage
Sometimes URLs are longer and more complicated, but all follow acknowledged rules for naming.
URLs consist of three parts:
Protocol: The protocol is the portion ending in //:. Most web pages use the protocol http or
https, but there are other protocols.
Host: The host or top-level domain frequently ends in .com, .net, .edu, or .org but can also end
in one of many others that have been officially recognized.
Filename: The filename or page name.
Router
A router or router-modem combination is the hardware device that acts as the traffic cop for network
signals arriving at your home or business from your ISP. A router can be wired or wireless or both.
A router provides a defense against hackers and directs content to the specific computer, device,
streaming device, or printer that should receive it.
Often your ISP provides the network router it prefers for your internet service. When it does, the router
is configured appropriately. If you choose to use a different router, you may need to enter information
into it.
Email
Email is electronic mail. It is the sending and receiving of typewritten messages from one screen to
another. Email is usually handled by a webmail service, such as Gmail or Yahoo Mail, or an installed
software package, such as Microsoft Outlook or Apple Mail.
Beginners start by creating one email address that they give to their family members and friends.
However, you aren't limited to one address or email service. You may choose to add other email
addresses for online shopping, business, or social networking purposes.
Social Media
Social media is the broad term for any online tool that enables users to interact with thousands of other
users. Facebook and Twitter are among the largest social networking sites. LinkedIn is a combination
of a social and professional site. Other popular sites include YouTube, Instagram, Pinterest, Snapchat,
Tumblr, and Reddit.
Social media sites offer free accounts to everyone. When selecting the ones that interest you, ask your
friends and family which ones they belong to. That way, you can join a group where you know people.
As with all things internet-related, protect your personal information when you sign up for sites. Most
social media sites offer a privacy section where you can choose what to reveal to other users of the
website.
E-Commerce
E-commerce is electronic commerce, the transactions of selling and buying online. Every day, billions
of dollars exchange hands through the internet and the World Wide Web.
Internet shopping has exploded in popularity with internet users, to the detriment of traditional brick-
and-mortar stores and malls. Every well-known retailer has a website that showcases and sells its
products. Joining them are dozens of small sites that sell products and enormous sites that sell just
about everything.
E-commerce works because reasonable privacy can be assured through HTTPS secure web pages that
encrypt personal information and because reliable businesses value the internet as a transaction medium
and make the process simple and safe.
When shopping on the internet, you'll be asked to enter a credit card, PayPal information, or other
payment information.
Cloud Computing
Cloud computing began as a term to describe software that was online and borrowed, instead of
purchased and installed on a computer. Web-based email is one example of cloud computing. The
user's email is stored and accessed in the cloud of the internet.
The cloud is the modern version of the 1970s mainframe computing model. As part of the cloud
computing model is software as a service (SaaS). SaaS is a business model that assumes people would
rather rent software than own it. With their web browsers, users access the cloud on the internet and log
in to their online rented copies of their cloud-based software.
Increasingly, services offer cloud storage to access files from more than one device. It is possible to
save files, photos, and images in the cloud and then access those files from a laptop, smartphone, tablet,
or another device. Cloud computing makes collaboration among individuals on the same files in the
cloud possible.
Firewall
Firewall is a generic term to describe a barrier against destruction. In the case of computing, a firewall
consists of software or hardware that protects a computer from hackers and viruses.
Computing firewalls range from small antivirus software packages to complex and expensive software
and hardware solutions. Some firewalls are free . Many computers ship with a firewall you can activate.
All computer firewalls offer some kind of safeguard against hackers vandalizing or taking over a
computer system.
Just like everyone else, beginners to the internet should activate a firewall for personal use to protect
their computers from viruses and malware.
Malware
Malware is a broad term that describes any malicious software designed by hackers. Malware includes
viruses, Trojans, keyloggers, zombie programs, and other software that seeks to do one of four things:
Vandalize your computer in some way.
Steal your private information.
Take remote control of your computer (zombie your computer).
Manipulate you into purchasing something.
Malware programs are the time bombs and wicked minions of dishonest programmers. Protect yourself
with a firewall and knowledge of how to prevent these programs from reaching your computer.
Trojan
A Trojan is a special kind of hacker program that relies on the user to welcome it and activate it.
Named after the famous Trojan horse tale, Trojan programs masquerade as legitimate files or software
programs.
Sometimes, it is an innocent-looking movie file or an installer that pretends to be actual anti-hacker
software. The power of the Trojan attack comes from users naively downloading and running the
Trojan file.
Protect yourself by not downloading files that are sent to you in emails or that you see on unfamiliar
websites.
Phishing
Phishing is the use of convincing-looking emails and web pages to lure you into typing your account
numbers and passwords or PINs. Often in the form of fake PayPal warning messages or phony bank
login screens, phishing attacks can be convincing to anyone who is not trained to watch for the subtle
clues.
As a rule, all users should distrust any email link that says, "You should log in and confirm this."
Blogs
A blog is a modern online writer's column. Amateur and professional writers publish blogs on all kinds
of topics: hobby interests in paintball or tennis, opinions on health care, commentaries on celebrity
gossip, photoblogs of favorite pictures, or tech tips. Absolutely anyone can start a blog.
Blogs are usually arranged chronologically and with less formality than a website. Many blogs accept
and respond to comments. Blogs vary in quality from amateurish to professional. Some savvy bloggers
earn reasonable incomes by selling advertising on their blog pages.
VER 3:
The internet is an immense network of computer systems that are linked together. It is made up of
millions of processing and mathematical devices. Desktop computers, cell phones, laptops, tablets,
gaming consoles, GPS units, as well as other computing devices are all included. All of these are linked
to the internet.
As a digital citizen, you have many technologies at your disposal that aimed to make your life easier.
However, if you aren’t aware of the basic terminologies, it might be difficult for you to navigate through day-
to-day living.
Browser
A browser is an open-source software or even a mobile app that shows web pages, images, and other forms
of online material. Firefox, Internet Explorer, Microsoft Edge, and Safari are among the most popular web
browsers, however, there are many more.
Web browser application, which is incorporated in or may be installed on computers and mobile phones, is
used by Internet users to access the internet. Every web page has a unique address known as a URL, which
may be typed in the browser’s address bar to travel straight to a site.
Browser software is specially intended to transform computer code such as HTML and XML into human-
readable texts.
3.6 billion people use the Internet right now, which means that more than half of the world's population is
connected to the internet, just like you.
Bandwidth
The greatest data throughput, frequently across a network, is referred to as bandwidth. The greater the
bandwidth, the more activities you can process at the same time.
For instance, if you're watching Netflix in 4K on your TV while downloading large files on your computer,
your internet gaming experience will almost suffer greatly. This is owing to the point that you only have so
much bandwidth, and you're utilizing the majority of it for streaming and downloading.
Once you've completed these tasks, your bandwidth will be available for other purposes.
URL
Uniform Resource Locators (URLs) are the addresses of internet sites and files in web browsers. In a web
browser, you may use a URL to find and bookmark certain sites and files.
Here's an instance of a URL format:
http://www.examplewebsite.com/mypage
This format is commonly abbreviated as follows:
www.examplewebsite.com/mypage
Although URLs might be longer and more intricate at times, they all follow the same naming conventions.
URLs are made up of three parts:
1. Protocol: The protocol is the section that ends with /:. The protocol HTTP or HTTPS is used by the
majority of online pages, although there are others.
2. Host: The host or top-level domain usually ends in.com,.net,.edu, or.org, but it can also finish in any
of the numerous other formally recognized domain extensions.
3. Filename: The name of the file or page.
404
A 404 error is among the most common mistakes found on the internet, and it simply signifies that the page
you're seeking does not exist. Usually, you'll encounter this if you follow a link to a defunct page or input an
erroneous URL into your browser.
Domain Name
This is a user-friendly naming scheme for addressing web pages and servers. It describes a computer's
position on the Internet. A dot usually divides a domain name, such as www.google.com or
www.slashdigit.com.
Furthermore, Domain Names are a component of DNS (Domain Name System) a database of domain
names and their corresponding IP addresses). In addition, a domain name is subject to specific rules and
algorithms in the DNS.
IP Address
A number issued to each device connecting to the Internet is an IP address. Every gadget on your local
network does have an internal IP address that only the technologies on your network can really see. However,
the internet sees only one external IP address for your whole network.
Walking sticks, umbrellas, shirts, water bottles, tails (for festival attendees), and cutlery are among the
strangest gadgets that currently link to the Internet.
ISP
To obtain access to the Internet, you need to have an internet service provider (ISP). In a school, in a
library, at the office, you can access a free ISP, or find a private ISP at home. An ISP is a government or
corporation which connects you to the Internet.
An ISP offers a range of services at different prices: accessing online pages, e-mails, hosting web pages etc.
Many ISPs offer a monthly charge to different internet data speeds. If you want to stream movies, you may
spend extra for a faster internet connection, or you can choose a less expensive plan if you primarily use the
internet for light surfing and emails.
Search Engine
A search engine is a software program that explores the World Wide Web for content. Yahoo, Google, and
Bing are popular examples of internet search engines. These apps let you browse the internet for data
using words and phrases.
Following links and crawling web pages is part of the search engine's discovery phase. For example, Google
utilizes bots, sometimes known as "spiders," to crawl a website and follow connections to pages on it.
One of the major reasons webmasters develop sitemaps that include all links in current blogs or content pages
is to facilitate search engine indexing. For instance, Google utilizes bots to verify these sitemaps as well as
other web URLs gathered from prior crawls.
Router
The physical device that functions as the traffic cop for network signals coming at your house or company
from your ISP is known as a router or router-modem combo. A router could be hardwired, wireless, or a
combination of the two.
A router protects against hackers and routes contents into a particular computer, gadget, streaming device
or printer to receive them.
Your ISP often supplies your preferred Internet service network router. When this occurs, the router is
properly configured. You may need to add information to it if you wish to use another router.
Spam
Unwanted messages on the internet are referred to as spam. Spam may take many forms, including email
spam, repeated posts on forums, "spamdexing" search engine results, garbage sites on social media, and a
variety of other ways.
Malware
Malware is a wide word for any harmful program created by hackers. Malware is comprised of
viruses, Trojans, keyloggers, zombie programs, and other software that aims to perform one of four things:
In some manner, vandalize your PC.
Take your personal information.
Take command of your computer from a distance (zombie your computer).
You've been duped into buying something.
Malware programs are landmines and the evil minions of shady programmers. Protect yourself by installing
a firewall and learning how to prevent malicious applications from accessing your computer.
Internet of Things
The Internet of Things (IoT) relates to the spread of internet connectivity to formerly "dumb" daily objects.
Lights, fridges, and radiators are examples of such devices. Unlike computers and cell phones, which require
human interaction to interact, IoT devices could communicate without our assistance, which is known as
‘smart’, for example, smartphones or smart TVs.
There are already about 150 million smart homes in use throughout the world; it won't be long before these
internet-connected homes become the standard.
Phishing
Phishing is the practice of using convincing-looking emails as well as websites to trick you into entering
your banking information, passwords, or PINs. Phishing assaults, which frequently take the shape of bogus
PayPal warning letters or phony bank login screens, may be convincing to anybody who is not trained to look
for the tiny indications.
As a general guideline, any email link that states, "You must log in and verify this" should be avoided.
Hotspot
A hotspot is a device or place that allows you to connect to the internet using Wi-Fi.
Hotspot could also relate to the ability of mobile phones to transmit their own Wi-Fi networks across mobile
data networks. Furthermore, portable hotspots are specialised gadgets supplied by cell phone providers that
deliver Wi-Fi anywhere it is available.
Host (Network)
A computer or any other device that links to a computer network is known as a Network Host. It gives other
computers and their user’s access to information and services. Furthermore, when multiple computer systems
communicate via a modem and perhaps other internet connection routes, the word host might be used.
Firewall
A firewall is a general word for a protective barrier against attack. A firewall in networking is hardware or
software that secures a machine from viruses and hackers.
Small antivirus software programs to large and costly software and hardware systems are all examples of
computing firewalls. Many firewalls are available for free. Many PCs come with a firewall that you may use.
All computer firewalls provide some level of protection against hackers causing damage to or gaining control
of a computer system.
Server
A computer or software program that delivers a particular type of service to client software operating on other
computers. The word might refer to a specific software program, such as a WWW server, or it can refer to the
computer on which the program is operating, for example.
Cloud Computing
Cloud computing started as a phrase to represent software that could be accessed and rented online rather
than bought and downloaded on a computer. One instance of cloud computing is web-based emailing. The
recipient's email is saved and accessible on the internet's cloud.
The cloud is the contemporary equivalent of the mainframe computer paradigm of the 1970s. Software as a
service (SaaS) is a component of the cloud computing concept.
SaaS is a business strategy based on the assumption that customers prefer to rent software rather than own it.
Users connect to their online leased versions of cloud-based applications using their web browsers to connect
the cloud on the internet.
Cloud storage is becoming more popular as a way to access data from several devices. Files, photographs,
and images may be saved on the cloud and accessed from a laptop, cellphone, iPad, or even other devices.
Individuals can collaborate on the very same files on the cloud using cloud computing.
Bits, Bytes
At its most basic, all computer data is simply a sequence of 0s and 1s. Each of them is alluded to as a "binary
digit," with "bit" just being an acronym. A byte is (usually) an eight-bit collection, so named due to the
obvious pun with bit and bite. Likewise, a group of four bits (half a byte) is frequently referred to as a
"nybble."
Several prefixes are often used to refer to high amounts of bits and bytes, as in:
1 kilobyte = 1024 (or 1000) bytes
1 megabyte = 1024 (or 1000) kilobytes
1 gigabyte = 1024 (or 1000) megabytes
1 terabyte = 1024 (or 1000) gigabytes
1 petabyte = 1024 (or 1000) terabytes
HTML–(Hypertext Markup Language)
The fundamental language for building hypertext documents on the World Wide Web. That is used in simple,
plain ASCII-text documents, but once those documents are interpreted (named rendering) by a Web
browser like Netscape, they can exhibit formatted text, colour, a variation of fonts, visual designs, digital
effects, hypertext leaps to other Web locations, as well as information aspects.
Intranet
An intranet is really a computer network that is exclusively available to a company's workers. It is a
specialized and private hub where employees may communicate and share data in a secure environment. It is
comparable to a private club with exclusive services and benefits that are not available to the general public.
The intranet uses a local area network (LAN), a computer network that connects the computers of the
various intranet members' offices. In contrast, a corporation can build up an extranet, which is a private
network for securely sharing information over the Internet with a chosen group of clients, vendors, and
consumers.
Piracy
Piracy is the unlawful duplication of content, like computer software or branded products, in order to sell it
for a fraction of the price it would ordinarily command. This transaction does not pay the rightful owner of
the content. Piracy has grown into a multibillion-dollar industry that is illegal in many nations.
It's the same as slipping into a train or bus without paying the fee. You profit from it, but the transportation
firm that provides the service suffers as a result.
A web browser is a software application that is used to access the world wide web(www) or as known by
everyone on the Internet. It is an interface between us and the information available on the web.
This information might be pictures, audio, videos, or some other files that are shown on our screens
through a web page.
The web browser can be called a client program as it requests the webserver for the information
demanded by the user. Some of the common browsers are Google, Mozilla Firefox, Safari, internet
explorer, Netscape Navigator, etc.
It sends the requested information to the web server through HTTP- hypertext transfer protocol. Once the
request is received, the server gathers the related information it forwards it through web pages.
When a URL is entered, supposedly artoftesting.com the web browser first requests the DNS (Domain
name server) the IP address of the artoftesting.com. The DNS is a phonebook of the internet and
therefore, it stores the system names and their corresponding IP addresses.
Next, once the IP address is found the address is used to request the servers of the ‘ArtOfTesting’ website
for the content. This is then fulfilled and displayed on the client’s screen.
1. User Interface
The user interface is the first page that you see when you open the web browser. This page has the
address bar, forward/ backward button, menu, bookmarking option, and a few more options.
2. Browser Engine
The browser engine acts as an interface between the rendering engine and the UI of the browser. Based on
the input, it manipulated the rendering engine to provide output.
3. Rendering engine
The rendering engine is responsible for producing requested content to the browser and displaying it on
the screen. It parses the HTML documents and then converts them to readable form. All the browsers we
know have their own rendering engines.
Safari uses WebKit.
Chrome and Opera use Blink ( fork of WebKit).
Internet explored use Trident.
Firefox uses Gecko.
WebKit is an open-source rendering engine and was made for Linux. It has been modified the Apple to
support Mac and Windows too.
4. Networking
The network layer is responsible for security and communication on the internet. It is also used for HTTP
requests and to cache the documents retrieved in order to reduce network traffic.
5. UI Backend
It is for drawing basic boxes and windows/ widgets. This is for a generic interface and is independent of
any specific platform. Behind all this, it uses an Operating system for UI methods.
6. JavaScript Interpreter
As we all know JavaScript is responsible for all the websites/ webpages. All these pages are written in
JavaScript language. Therefore this interpreter translates these pages and these are sent to the rendering
engine to display the final results.
7. Data persistence
Data persistence or storage is for saving the data locally, like cookies. The browsers support storage
mechanisms like IndexedDB, WebSQL, File System, etc. to store databases locally on your computer.
This way user data is handled like cache, bookmarks, cookies, etc.
Safari
Although Safari is specially created for Apple users it can be used on PCs as well. However, its
uniqueness can only be seen on Mac or Apple devices. It is a cross-compatible software and can integrate
your data on multiple platforms. Another fascinating feature is the iCloud keychain that lets you access
the passwords saved on your Apple device.
Mozilla Firefox
This one is another popular choice among users. Although people have always preferred this one as an
option due to its speed. It takes much more time than Chrome or Safari.
Opera
Opera is also one of the commonly used browsers. It has its own range of add-on extensions that you
might need to check out. It also can be synced among multiple devices. So do not miss out on this one.
Microsoft Edge
This one comes pre-installed on Windows 10 devices. This was developed to replace internet explorer
and thus acts as a default browser. It is gaining popularity because of its new rendering feature, easy-to-
use UI, freestyle writing over webpage displays, and much more.
Kingpin
The reason this software is gaining popularity is because of its security feature. This browser always
works in incognito mode.
APPLICATIONS OF INTERNET
Applications that require the Internet to run or use those applications are called Internet applications. Or
you can also say that those applications have been made to run from the Internet itself.
Because all the data of internet applications is on their servers, if you want to use these applications then
you must have an internet connection. So that through the internet your request goes to the server and in
return you get information. You can also exchange your information through these applications.
In any case, you need internet service to use the internet application. Without internet service, you cannot
access the information of these applications.
And one thing, to use internet applications, you also need a digital device with an internet connection,
only then you can use those applications. Digital devices such as smartphones, tablet
PCs, laptops, desktops, etc.
What are the Applications of Internet?
Today is the era of Internet applications, today there is a specific application to do every work, using
which you can do those tasks very easily. Today we will know in detail about the same applications of the
Internet.
There are various applications of internet in points, which are given below.
Communication
Job Search
Online Shopping
Web Browsing
Stock Market Updates
Travel
Research
E-Commerce
Online Payments
Social Networking
E-banking
Education
Entertainment
1. Communication
Communication is also one of the most used applications of the Internet because today it is very easy to
talk through the Internet and today almost everyone is communicating with each other through the
Internet.
Today it is very cheap to communicate through the Internet, as compared to other mediums, so people
today are using Internet applications to communicate.
Today, there are thousands of such Internet applications for communication, through which you can
communicate with someone else. But we will tell you about some popular communication applications.
Through these communication applications, you can talk to anyone in many ways.
For example, you can talk to someone through chat, you can talk through voice call, you can talk through
video call, etc.
We will tell you about similar applications that run through the Internet.
There are some popular communication internet applications, which are given below.
Email
Skype
Google Meet
Zoom
WhatsApp
Facebook Messenger
Email
The full form of email is electronic mail. If it is understood in simple language, then email means, a
message sent through electronic means. In earlier times, people used to send messages to someone
through a postman, which took a lot of time, but in today's time, people use email to send messages to
someone.
Through email, you can also send an email to someone in a few seconds and can also receive email from
anyone. You just need to have an internet connection to send or receive emails. Do you know there are
many advantages and disadvantages of email?
Through email, you can send text messages, program files, spreadsheets, photos, videos, etc to anyone.
Email is mostly used by professional people. There are various Uses of Email.
Skype
Skype is a telecommunications application run by Skype Technologies. Skype is a VoIP-based
application. VoIP means Voice-over-Internet Protocol. Through Skype you can do video conferencing,
voice calls, messaging, file transfer, etc. Skype is a very popular videoconferencing application.
Google Meet
Google Meet is also a video-communication internet application, which was launched by Googler
company on March 9, 2017. Through Google Meet, you can have online meetings, take online classes,
give tuition to children online or you can also talk to anyone in a normal way.
But Google Meet is mostly used for online meetings or online teaching. There are many features of
Google Meet, which helps you a lot in online meetings.
Zoom
Zoom is also a proprietary video telephony Internet application, which was launched by Zoom Video
Communications company on October 12, 2011.
Through Zoom, you can hold online meetings, take online classes, give tuition to children online or you
can even talk to anyone in a normal way.
But Zoom is mostly used for conducting webinars or teaching online. Zoom has both free and paid plans,
that is, you can also use Zoom for free, but there are some limitations in the free plan, as you can have
100 users at a time in the free plan of Zoom.
WhatsApp
WhatsApp is a social messaging internet application developed by Meta company. Today, WhatsApp is
used by millions of people around the world, it is a very popular messaging application.
Through WhatsApp, you can send text messages to anyone or you can also share images, documents, and
your live location with anyone, and through WhatsApp, you can talk to anyone by voice and video calls.
Messenger
Messenger is also an internet application, which is made by Meta company. You can also send text
messages, photos, videos, audio, and documents to anyone through messenger and you can also talk to
anyone through a voice call and video call through this application.
2. Job Search
Due to covid 19, many people lost their jobs today or if they say, millions of people around the world
have become unemployed due to covid epidemic, and it is very difficult to find jobs again.
To find Job, you have to round the many offices and still do not get a good job. But now you don't have to
worry.
In today's digital world it is very easy to find the job of your choice, yes you have read it right. Today you
can easily find jobs related to your skills through the internet and give a direct interview to HR.
Now you will say that how can we find jobs from the internet, so let us tell you that today there are many
such applications of internet, which help you in finding jobs.
Through these internet job applications, you can find jobs for yourself sitting at home, these job portals
have all kinds of jobs for all types of people, all you have to do is use these job applications and just send
your resume. We have given below the names of some jobs providing internet applications.
Naukri.com
Monster.com
Freshersworld.com
Indeed.com
Glassdoor
ZipRecruiter
3. Online Shopping
Everything is possible in today's era, in earlier times people could not even imagine that without going to
the market, anything could be bought, but in today's time, it is possible. We and you know that we can
buy anything without going to the market without going to the shop.
Today the whole world is doing online shopping through the internet, that too sitting at home and you can
also shop online from home through the internet.
Today there are many such applications on the Internet, through which you can buy anything online. Such
as - Mobile, Tablet PC, Computers, Watch, Smart Watch, Television, Fan, Table Fan, LED Bulb, Glasses,
Ring, Jewellers, Camera, Home Appliances, clothes, etc.
Through these shopping applications, you can order any item of your need sitting at home. We have given
below the names of some shopping applications, from which you can shop.
Amazon
FlipKart
Paytm Mall
ShopClues
Myntra
Snapdeal
Meesho
4. Web Browsing
Today's web browsers come with more features than the earlier browsers, because today's web browsers
are made of the latest technology, which has many advantages to use such as - saving password, incognito
mode, history, zoom, Print, Bookmark etc.
Today there are many types of web browsers, using which you can access the Internet. The names of
those web browsers are given below.
Internet Explorer.
Google Chrome.
Mozilla Firefox.
Safari.
Opera.
Konqueror.
Lynx.
Tor Browser.
UC Browser.
Brave Browser.
Today many people are earning a lot of money from the stock market, today people know which stock to
invest in and when to sell which stock so that more money can be earned.
But just think, it was not like this a few years ago, because you had to take the help of a broker to buy or
sell someone, so that that broker also used to take commission from you.
But today through internet application you can buy or sell any stock without any broker and can also read
the information of stock market moment by moment.
Today there are many such stock applications, using which you can earn a good amount from the stock
market very easily. The names of those stock applications are given below.
6. Travel
Due to the Covid epidemic all over the world, people have stopped traveling, and as the effect of the
Covid epidemic is working, people are now starting to leave their homes.
But before saying anything, there are many questions in your mind. Like - how to go there, where will
they stay, which places they should visit, etc.
But if you have to travel this way, now you have no need to worry, because you can get all the
information about your journey through the internet.
Today, there are many such Internet applications, so they make your journey even easier. You can book
travel tickets, hotels, taxis, etc. through these internet applications.
Or you can now book the same trip through these applications, such as Goa, Manali, Jammu Kashmir,
Delhi, Agra, Nainital, Gangtok, MALDIVES, Darjeeling, etc. This internet application gives you all the
facilities, whose names are given below.
MakeMyTrip.
Cleartrip.
Goibibo.
Agoda.
Booking.com.
Yatra.
OYO Rooms.
7. Research
Research means to do deep research about a subject or to know everything about that subject. Doing
research is no small task, it takes a lot of time and effort to do research about anything. Research is not
done by common people, but by scientists or Ph.D. students.
If you are a Ph.D. student and you have to do research on any topic, then you do not need to worry,
because with the use of the internet you can do your research very easily, but you will have to work hard.
Today there are many such internet applications that make your research easier and you do not have to
work harder too. If you are a Ph.D. student then this internet application is very useful for you.
All you have to do is use these applications to complete your research. The names of some search
applications are given below.
Mendeley
Flipboard
Researcher
Google Keep
Curiosity
Paperity
Slack
DropBox
8. E-Commerce
E-commerce is also a good applications of internet platforms. Today e-commerce is in full swing all over
the world. Today, at present, millions of merchants around the world are selling their products through e-
commerce.
E-commerce means putting your shop online and selling any of your items online. By doing this, your
business becomes local to global, that is, you can sell your goods to the people of other cities as well.
You can do your shop online through the internet, but you must have an internet connection to sell your
goods online.
Today there are many such Internet applications that help you to sell your goods online and in return
charge you a small commission. On these internet applications, you have to register your business and
upload your product on these applications.
We have given below the names of some applications, using which you can sell your goods online and
earn more profit.
Amazon
Flipkart
Meesho
Shopify
Paytm Mall
Dukaan
9. Online Payments
Today is the era of online payments, in today's digital age, now everyone is paying any bill online instead
of giving cash. Today online payments are in full swing all over the world.
You can make online payments only through the internet, without an internet connection you cannot
make an online payment.
There are many benefits of online payment. For example - you do not need to carry cash, there is no need
to spare money in taking any item.
You can pay any bill through an online payment. For example, electricity bill, mobile bill, telephone bill,
water bill, cylinder bill, movie bill, hotel bill, restaurant bill, shopping bill, etc.
There are many such internet applications today that gives you the facility to make online payments, the
names of those applications are given below.
Paytm
PhonePe
Google Pay
BharatPe
Amazon Pay
Freecharge
BHIM
MobiKwik
You can also promote your business through social networking sites. Today, there are many such Internet
networking applications that you can use to do your kind of work.
You must have an internet connection to use social networking sites because without an internet
connection you cannot use these social networking sites.
There are some famous social Networking applications given below.
Facebook
Instagram
Twitter
LinkedIn
YouTube
Pinterest
Tumblr
Reddit
Snapchat
WhatsApp
11. E-Banking
E-banking is also known as online banking and internet banking. E-banking is one of the best features of
the banking sector because, through e-banking, bank customers can now do all banking work sitting at
home.
There are many benefits of using e-banking. Such as - online account opening, money transfer, NEFT,
passbook check, bill payment, loan, etc.
Online banking is generally a core banking facility operated by a bank. To use e-banking, you must have
an internet connection, otherwise, you cannot use the e-banking facility.
Today there are many such e-banking internet applications, each bank has its own different internet
application, whose name is given below.
Kotak- 811
ICICI iMobile
YONO SBI
HDFC PayZapp
Bank of Baroda M-Connect Plus
12. E-Learning
Today is the era of e-learning in the present time, e-learning means electronic learning which means you
can now study from anywhere through e-learning.
If you understand it in an easy language, now you can do your studies by staying in any corner of the
world, now you do not need to go to any college or institute to study, You can study from online live class
through e-learning sitting at home.
There are many benefits of e-learning, just imagine the students who live in the village, and the city is far
away from their village, so those students can now study online by staying in their village through e-
learning without going to the city.
To study through e-learning, you must have a smart device and internet connection, only then you can
study online.
Through e-learning, you can study any subject or you can also prepare for any competitive exam. There
are many Internet applications through which students can study. The names of those applications are
given below.
Byjus
Topper
Vedantu
Unacademy
Quick Learn Computer
13. Entertainment
Applications of Internet for Entertainment
If you are getting bored alone, then there is no need for you to worry, because today you can be
entertained through the medium of the internet.
Today there are many such internet applications that can entertain you. You can watch anything on these
entertainment applications. Like - Movies, Web series, Cartoons, Serials, Cricket, News, Comedy, etc.
Netflix
VOOT
Disney+ Hotstar
Amazon Prime
Sony Liv
ALT Balaji
YouTube
8. TELNET(Terminal Network)
TELNET is a standard TCP/IP protocol used for virtual terminal service given by ISO. This enables
one local machine to connect with another. The computer which is being connected is called a remote
computer and which is connecting is called the local computer. TELNET operation lets us display
anything being performed on the remote computer in the local computer. This operates on the
client/server principle. The local computer uses the telnet client program whereas the remote computer
uses the telnet server program.
10. IPv4
The fourth and initially widely used version of the Internet Protocol is called IPv4 (Internet Protocol
version 4). It is the most popular version of the Internet Protocol and is in charge of distributing data
packets throughout the network. Maximum unique addresses for IPv4 are 4,294,967,296 (232), which
are possible due to the use of 32-bit addresses. The network address and the host address are the two
components of each address. The host address identifies a particular device within the network,
whereas the network address identifies the network to which the host belongs. In the “dotted decimal”
notation, which is the standard for IPv4 addresses, each octet (8 bits) of the address is represented by its
decimal value and separated by a dot (e.g. 192.168.1.1).
11. IPv6
The most recent version of the Internet Protocol, IPv6, was created to address the IPv4 protocol’s
drawbacks. A maximum of 4.3 billion unique addresses are possible with IPv4’s 32-bit addresses.
Contrarily, IPv6 uses 128-bit addresses, which enable a significantly greater number of unique
addresses. This is significant because IPv4 addresses were running out and there are an increasing
number of devices that require internet access. Additionally, IPv6 offers enhanced security features like
integrated authentication and encryption as well as better support for mobile devices. IPv6 support has
spread among websites and internet service providers, and it is anticipated to gradually displace IPv4 as
the main internet protocol.
12. ICMP
ICMP (Internet Control Message Protocol) is a network protocol that is used to send error messages
and operational information about network conditions. It is an integral part of the Internet Protocol (IP)
suite and is used to help diagnose and troubleshoot issues with network connectivity. ICMP messages
are typically generated by network devices, such as routers, in response to errors or exceptional
conditions encountered in forwarding a datagram. Some examples of ICMP messages include:
Echo Request and Echo Reply (ping)
Destination Unreachable
Time Exceeded
Redirect
ICMP can also be used by network management tools to test the reachability of a host and measure the
round-trip time for packets to travel from the source to the destination and back. It should be noted that
ICMP is not a secure protocol, it can be used in some types of network attacks
like DDoS amplification.
13. UDP
UDP (User Datagram Protocol) is a connectionless, unreliable transport layer protocol. Unlike TCP, it
does not establish a reliable connection between devices before transmitting data, and it does not
guarantee that data packets will be received in the order they were sent or that they will be received at
all. Instead, UDP simply sends packets of data to a destination without any error checking or flow
control. UDP is typically used for real-time applications such as streaming video and audio, online
gaming, and VoIP (Voice over Internet Protocol) where a small amount of lost data is acceptable and
low latency is important. UDP is faster than TCP because it has less overhead. It doesn’t need to
establish a connection, so it can send data packets immediately. It also doesn’t need to wait for
confirmation that the data was received before sending more, so it can transmit data at a higher rate.
14. IMAP
IMAP (Internet Message Access Protocol) is a protocol used for retrieving emails from a mail server. It
allows users to access and manage their emails on the server, rather than downloading them to a local
device. This means that the user can access their emails from multiple devices and the emails will be
synced across all devices. IMAP is more flexible than POP3 (Post Office Protocol version 3) as it
allows users to access and organize their emails on the server, and also allows multiple users to access
the same mailbox.
15. SSH
SSH (Secure Shell) is a protocol used for secure remote login and other secure network services. It
provides a secure and encrypted way to remotely access and manage servers, network devices, and
other computer systems. SSH uses public-key cryptography to authenticate the user and encrypt the
data being transmitted, making it much more secure than traditional remote login protocols such as
Telnet. SSH also allows for secure file transfers using the SCP (Secure Copy) and SFTP (Secure File
Transfer Protocol) protocols. It is widely used in Unix-based operating systems and is also available for
Windows. It is commonly used by system administrators, developers, and other technical users to
remotely access and manage servers and other network devices.
16. Gopher
Gopher is a type of file retrieval protocol that provides downloadable files with some description for
easy management, retrieving, and searching of files. All the files are arranged on a remote computer in
a stratified manner. It is an old protocol and it is not much used nowadays.
VER 2:
Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the
internet. Each computer -- known as a host -- on the internet has at least one IP address that uniquely
identifies it from all other computers on the internet.
IP is the defining set of protocols that enable the modern internet. It was initially defined in May 1974 in
a paper titled, "A Protocol for Packet Network Intercommunication," published by the Institute of
Electrical and Electronics Engineers and authored by Vinton Cerf and Robert Kahn.
At the core of what is commonly referred to as IP are additional transport protocols that enable the actual
communication between different hosts. One of the core protocols that runs on top of IP is the
Transmission Control Protocol (TCP), which is often why IP is also referred to as TCP/IP. However, TCP
isn't the only protocol that is part of IP.
IP packets
While IP defines the protocol by which data moves around the internet, the unit that does the actual
moving is the IP packet.
An IP packet is like a physical parcel or a letter with an envelope indicating address information and the
data contained within.
An IP packet's envelope is called the header. The packet header provides the information needed to route
the packet to its destination. An IP packet header is up to 24 bytes long and includes the source IP
address, the destination IP address and information about the size of the whole packet.
The other key part of an IP packet is the data component, which can vary in size. Data inside an IP packet
is the content that is being transmitted.
What is an IP address?
IP provides mechanisms that enable different systems to connect to each other to transfer data. Identifying
each machine in an IP network is enabled with an IP address.
Similar to the way a street address identifies the location of a home or business, an IP address provides an
address that identifies a specific system so data can be sent to it or received from it.
An IP address is typically assigned via the DHCP (Dynamic Host Configuration Protocol). DHCP can be
run at an internet service provider, which will assign a public IP address to a particular device. A public
IP address is one that is accessible via the public internet.
A local IP address can be generated via DHCP running on a local network router, providing an address
that can only be accessed by users on the same local area network.
IP network protocols
IP is a connectionless protocol, which means that there is no continuing connection between the end
points that are communicating. Each packet that travels through the internet is treated as an independent
unit of data without any relation to any other unit of data. The reason the packets are reassembled in the
right order is because of TCP, the connection-oriented protocol that keeps track of the packet sequence in
a message.
In the OSI model (Open Systems Interconnection), IP is in layer 3, the networking layer.
There are several commonly used network protocols that run on top of IP, including:
1. TCP. Transmission Control Protocol enables the flow of data across IP address connections.
2. UDP. User Datagram Protocol provides a way to transfer low-latency process communication that is
widely used on the internet for DNS lookup and voice over Internet Protocol.
3. FTP. File Transfer Protocol is a specification that is purpose-built for accessing, managing, loading,
copying and deleting files across connected IP hosts.
4. HTTP. Hypertext Transfer Protocol is the specification that enables the modern web. HTTP enables
websites and web browsers to view content. It typically runs over port 80.
5. HTTPS. Hypertext Transfer Protocol Secure is HTTP that runs with encryption via Secure Sockets
Layer or Transport Layer Security. HTTPS typically is served over port 443.
LANGUAGE OF INTERNET
The 5 Programming Languages That Built the Internet
KEY TAKEAWAYS
The internet couldn’t possibly run without someone somewhere writing some code, but in internet
history, there are a few particular languages that provided the foundation upon which the web we know
today is built. These five languages have helped shape the modern internet. (To do some background
reading, check out Computer Programming: From Machine Language to Artificial Intelligence.)
Lisp
This language is actually not widely used on the internet, but is responsible for building the internet in
many ways. Invented by John McCarthy in the late 1950s, Lisp, despite its odd name, tied together the
research community that helped create the internet.
Spreading out of MIT, Lisp offered some modern features for the first time, such as conditionals. But
what was really mind-blowing about Lisp was that it made no distinction between code and data. Lisp
could treat code as data and data as code. Lisp makes it possible to extend the language in ways that its
designers never intended, giving rise to the term "programmable programming language."
Lisp became the lingua franca of the artificial intelligence community, the community that DARPA called
on to build what eventually became the internet in the late 1960s. With the "AI Winter" in the late '80s,
Lisp’s fortunes sank somewhat, although it still had its fans. One of them, Paul Graham, later to found the
startup incubator Y Combinator, used it to build one of the first e-commerce companies, Viaweb, which
was later purchased by Yahoo. Graham credited the ability to write powerful software by himself as one
of the reasons for its success. The first version of the popular social news website Reddit was also built in
Common Lisp.
C
The single most influential programming language today might be C. Invented at Bell Labs in the '70s, it
was one of the first high-level programming languages to have an operating system written in it. And that
operating system just happens to be Unix. Because it was written in C, it was possible to move Unix to
different platforms.
Rewriting Unix in C was a major breakthrough. Previously, operating systems were written in assembly
language, as they had to be really close to the hardware. C, on the other hand, was a higher-level language
but was still close enough to the hardware to write an operating system in. This made Unix one of the first
portable operating systems. A C program could be compiled to run on different operating systems, but
since most of the early C programmers also happened to be Unix programmers, they tended to assume
that their programs would be run under Unix and developed their code accordingly. Because it was
relatively easy to port Unix to other computers, lots of people did so.
C has obviously had a lot of success outside of Unix. Windows is coded in C, as are many other
applications. As C creator Dennis Ritchie wrote, "C is quirky, flawed, and an enormous success. While
accidents of history surely helped, it evidently satisfied a need for a system implementation language
efficient enough to displace assembly language, yet sufficiently abstract and fluent to
describe algorithms and interactions in a wide variety of environments." (To learn more about C, see The
History of the C Programming Language.)
Perl
Perl isn’t as talked-about as it was in the '90s, but it is still a major part of the internet. In fact, it owes its
popularity to the internet. Perl was invented in the late '80s by Larry Wall when he was working for
NASA’s Jet Propulsion Laboratory, as recounted in a book called "Programming Perl." Wall needed
a configuration management system to talk to several Unix computers on opposite coasts. None of the
existing Unix tools could do the job, so he took the lazy route and invented a whole new programming
language.
Wall, as recounted, released it in 1987 over Usenet and it attracted an instant community of developers
across the growing internet, one of the first major open-source projects to gain traction before Linux.
When the web took off, Perl found a niche as one of the languages of choice for developing dynamic web
pages. Syntactically, it resembled C, but was implemented at an even higher level, without the need to
manually manage memory. This meant that developers could write, test and debug programs quickly. Perl
is very flexible, leading to some ugly code. Its combination of ugliness and usefulness has given it the
moniker of "the duct tape of the internet."
Although Python and PHP have stolen a bit of Perl’s thunder, its importance to the spread of the internet
is undeniable. (Learn the basics of Perl in Perl 101.)
PHP
Speaking of PHP, this language has dethroned Perl as one of the major building blocks of modern
dynamic web pages. Like Perl, it has a reputation for letting people write ugly code, yet it still runs a lot
of websites that people use every day, including Facebook. It was created in 1994 by Rasmus Lerdorf.
(Learn the basics of PHP in PHP 101.)
PHP might make computer scientists scoff, but if you want to be taken seriously as a web developer, it’s a
skill you should have on your resume.
The reason that it’s become so popular is that PHP code can be embedded right into a web page. This
means you don’t have to put your PHP script in a separate program and generate HTML code using Perl
or C. This makes it very easy for people who already know HTML to learn PHP and add interactivity to
their pages. It’s also easy to integrate PHP with a SQL server such as MySQL. Which leads to…
SQL
SQL stands for Structured Query Language. It’s a way to form queries for relational databases. It’s also
relatively easy to learn, as it uses English-like commands. There are plenty of implementations, such
as MySQL and PostgreSQL, which are popular open-source relational database servers. SQLite is a
smaller variant used in a lot of applications, such as Apple’s iTunes.
Although invented by Edgar F. Codd in the 1970s, SQL and the relational database took a while to
become popular. Oracle first popularized relational databases, then MySQL made it a must-have
technology for building websites. The relational model provided a simple and efficient way to mange
large amounts of data.
You can create a good web app or service in any language, but you can’t go wrong picking one of the
languages that have influenced the way the web has developed.
Features Of Voicemail
Voicemail comes with features like a user interface to enable selecting, playing, and managing of
messages. There are delivery features for the sender of the voicemail to either play or deliver the message.
There are also notification features that notify voicemail recipients of waiting messages.
Introduction
Setting up a Gmail account is easy. You will begin by creating a Google account, and during the quick
sign-up process you will choose your Gmail account name. In this lesson, we'll show you how to set
up your Google account for Gmail, add and edit contacts, and edit your mail settings.
Setting up a Gmail account
To create a Gmail address, you'll first need to create a Google account. Gmail will redirect you to the
Google account sign-up page. You'll need to provide some basic information like your name, birth
date, gender, and location. You will also need to choose a name for your new Gmail address. Once you
create an account, you'll be able to start adding contacts and adjusting your mail settings.
To create an account:
1. Go to www.gmail.com.
3. The sign-up form will appear. Follow the directions by entering the required
information.
4. Next, enter your phone number to verify your account. Google uses a two-step
verification process for your security.
5. You will receive a text message from Google with a verification code. Enter the
code to complete the account verification.
6. Next, you will see a form to enter some of your personal information, like your name and
birthday.
7. Review Google's Terms of Service and Privacy Policy, then click I agree.
Mail settings
Occasionally, you may want to make adjustments to Gmail's appearance or behavior. For example, you
could create a signature or vacation reply, edit your labels, or change the theme. These adjustments can
be made from your mail settings.
To access your mail settings:
1. Click the gear icon in the top-right corner of the page, then select Settings.
2. From here, you can click any of the categories at the top to edit the desired settings.
Adding contacts
Like all major email providers, Gmail lets you keep an address book of contacts so you don't have to
memorize everyone's email addresses. You can also add other contact information, like phone
numbers, birthdays, and physical addresses.
To add a contact:
1. Click the Google apps button.
3. Your contacts screen will appear. Click the Add new contact button in the lower-right
corner.
To edit a contact:
1. In the Google apps drop-down menu, select Contacts.
2. Locate the contact you want to edit, then click Edit Contact.
3. You can now make any changes you want to the contact.
By default, when you send an email to a new address, Gmail adds the address to your contacts. You can
then go to your contacts to edit the person's information as needed.
Importing mail and contacts
You may already have a contact list from another email address, and it would be a lot of work to re-enter
all of this information manually. Gmail allows you to import your contacts from another email account,
and you can even import all of your email messages from that account. Several email providers are
supported, including Yahoo!, Hotmail, and AOL.
Ver 1:
NetMeeting was one of the first collaboration and conferencing tools launched by Microsoft in 1996. This
software was incredibly versatile and included features like whiteboarding, application sharing, and video
calling over the internet. NetMeeting was even bundled with Windows, making it a popular choice
amongst users.
Despite its popularity, NetMeeting was eventually discontinued in 2003 due to the development of newer
and more advanced communication tools such as instant messaging and online meeting services.
Microsoft launched Office Live Meeting as a replacement for NetMeeting, which was acquired through
its acquisition of PlaceWare.
Ver 2:
Definition:
Protocol (Voice over IP, VoIP) used for multipoint audio and video conferencing. Video conferencing
comes into limelight through this application as it is cheap, effective, reliable, and easy to use.
Features:
MS NetMeeting has various features which make this application unique and suitable for any
organization.
Microsoft introduced the NetMeeting application to allow for VoIP (Voice over Internet Protocol)
communications and videoconferencing. NetMeeting used the H.323 protocol for videoconferencing and
was also compatible with OpenH323 clients like Ekiga and ILS (Internet Locator Service). It also allowed
for application and desktop sharing, remote desktop sharing and transfer of files between client
computers.
NetMeeting was available for use starting with later versions of Internet Explorer 3 and Windows 95
OSR2 and continued up through Windows XP. NetMeeting was a popular application for
videoconferencing, until free videoconferencing solutions appeared in applications like Yahoo!
Messenger, MSN (Microsoft Network) Messenger, and Skype. Microsoft changed course at this point and
focused on Windows Messenger and Microsoft Office Live Meeting for its offering of videoconferencing
capabilities.
Ver 4:
NetMeeting was a popular audio/videoconferencing and instant messaging (IM) application that was
included with Microsoft Windows versions 95 OSR2 to Windows XP. NetMeeting was replaced by
Windows Meeting Space when Windows Vista was released.
NetMeeting provided desktop audio/video sharing, chat and file transfer functionalities. NetMeeting was
initially associated with later Internet Explorer (IE) 3 versions and IE 4.0’s early version.
This was before free IM clients were the norm. NetMeeting is now no longer used in any significant
sense.
CHATTING:
Ver1:
Internet nowadays is very common and available to all at cheap rates and can be used as a good means
of communication. Using the internet we can make text conversations with anyone. Send your message
to anyone and will get a reply, it’s known as instant messaging. You can talk over the internet with
anyone, which is known as voice chatting, and even with the help of a webcam, we can also have video
calls or video chatting.
Chatting refers to the kind of communication done with the help of the internet which present live
transmission of text messages from sender to receiver. Online chatting can be termed as the point-to-
point, one sender-to-one receiver, or one sender-to-many receiver. It also features voice, video, and also
web conferencing services. Chatting can be done as a chat-based as well as video-based (using
webcams). Chatting nowadays has evolved uniquely. In today’s world, we have a lot of applications
and websites which are widely used across the world. Chatting over the internet has made it a lot easier
to have a conversation with anyone. People from any corner of the world are now able to contact the
person on the other edge.
Following are the most common type of chatting:
Instant Messaging: It is the most common way of chatting. It is text-based communication. It
happens between two people or groups of people.
Internet Relay Chat: It is known as IRC. It is also a text-based chat. It is not owned by any
company and to use IRC we need a client program. Using IRC we can participate in discussion
channels or can communicate with only two partners or users.
ICQ: It is known as I seek you. It is the most useful communication program. Using ICQ we can
send files, URLs, and more. It is just like instant messaging but allows you to enter into the chat
room and can chat with multiple people at a time.
Voice Chatting: We can chat not only with text but also with sounds as well. It is known as voice
chatting. Voice chatting can be used with the internet just as a phone call. Internet voice call is free
and unlimited, it only needs a good internet connection.
Video chatting: Video chatting is also a kind of chatting which is also done with the help of the
internet and it also requires a webcam as it is a face to face chatting. Internet speed required by
video chatting is higher as compared to text and video chatting. And a good quality camera too.
Chat Room
A chat room is a part of an online service where users can have conversations with each other through
the internet. It can also be termed a virtual room. First users need to register to the server after
registration users can log in with the help of a username and password. In the chat room, users are
allowed to have conversations in multiple mediums such as text voice, or even video calls.
Transmission of multimedia ( images, videos, etc.) can also be done in the chat room.
Chat Etiquette
Following are some chat etiquette that we should follow while chatting:
Never use abusive words during a chat session.
Don’t create too many groups unless necessary.
Never share sensitive information on chat especially in groups.
Don’t share viral posts unless it’s verified.
During chats, banking details must not be shared.
Never share private messages of user/friend/ person without asking their permission.
Always remember no one is perfect so always respect people.
Chatting Platforms
Nowadays there are many chatting platforms available for users. Some of them are mentioned below:
Facebook: Facebook is one of the oldest and most used platforms for chatting. It was founded in
February 2004. Facebook offers text, voice, and video chat to its users. Users can also post some
materials on Facebook. Facebook is available for users in many different languages. Facebook is
currently owning different chatting applications. (WhatsApp, Instagram, Facebook Messenger).
WhatsApp: WhatsApp is also one of the most used platforms. It is owned by the Facebook group.
WhatsApp too offers all types of chatting (Text, voice, and video). It is available in many different
languages.
Skype: Skype was initially released in August 2003. It is mostly used for live meetings. It is
available in 101 different languages.
Telegram: Telegram is a popular chatting application widely used across the world. It also allows
group as well as individual conversations. It is a multiplatform application, it can be used on
different operating systems for example mac, windows, Linux, ios, android.
Snapchat: Snapchat is a mobile application for both Android as well as ios. One of the core
concepts of Snapchat is that the message sends to anyone whether it’s a videos message, text, or
audio it will only last for a short period.
Hike: Hike messenger also known as hike sticker chat is a mobile application. Its main feature is
that it comes with sticker chatting which is unique as compared to other apps whatever text you
want to send it can be converted into a sticker.
Chatting also has some risks which one should be aware of:
During Chatting always be aware of fake profiles, fake profiles are very dangerous as they will
allure you to share some confidential information, which can be used in blackmail.
Never use that application or platforms which don’t offer proper end-to-end encryption. Using such
platforms can lead to chat leaks.
Cyberbullying is a major of risk chatting over the internet, it includes sending threatening
messages, spreading lies about anyone, commenting bad or abusive language on someone’s online
profile, or blackmailing someone to bash their looks or reputation.
Never share your profile passwords with anyone, it can be missed in multiple ways ad can get down
your reputation.
While chatting keep the following points in mind for safely chat:
Never share personal information with any unknown user.
Before chatting always check the profile of the user, and try to determine if it’s fake or real.
Only chat with those users who have a genuine profile picture.
Don’t trust anyone. Never trust any unknown user to share banking details or any personal
information.
Always keep your guard. During online chat never keep your guard off, always be aware if
someone is trying to peek into the device.
Do complain (tell your parents) instantly if noticed some unsuspicious activity.
Ver2:
What is chatting?
While the term chatting or chitchat refers in general to communication between two or more parties that
can occur in person, in today's modern age, it can also occur over the internet via Short Message Service
(SMS) text message and Multimedia Messaging Service (MMS) or, for example, through tools
like Slack and Microsoft Teams and social media platforms like Facebook and Twitter.
On the internet, the definition of chat refers to talking to other people who are using the internet at the
same time you are.
Usually, this talking is the exchange of typed-in messages requiring one site as the repository for the
messages -- or chat site -- and a group of users who take part from anywhere on the internet.
An
example of chat occurring over Slack covering a specific topic
Chats can be ongoing or scheduled for a particular time and duration. Most chats are focused on a
particular topic of interest or project, and some involve guest experts or famous people who talk to
anyone joining the chat.
There are other platforms, such as Zoom, that facilitate voice chatting between two or more parties and
offer the option to be on video during the call. This type of software is used mostly by businesses to
replace in-person meetings.
TOOL BAR
Ver1:
Toolbar is a set of icons or buttons that are part of a software program's interface or an open window.
When it is part of a program's interface, the toolbar typically sits directly under the menu bar. For
example, Adobe Photoshop includes a toolbar that allows you to adjust settings for each selected tool. If
the paintbrush is selected, the toolbar will provide options to change the brush size, opacity, and flow.
Microsoft Word has a toolbar with icons that allow you to open, save, and print documents, as well as
change the font, text size, and style of the text. Like many programs, the Word toolbar can be customized
by adding or deleting options. It can even be moved to different parts of the screen.
The toolbar can also reside within an open window. For example, Web browsers, such as Internet
Explorer, include a toolbar in each open window. These toolbars have items such as Back and Forward
buttons, a Home button, and an address field. Some browsers allow you to customize the items in toolbar
by right-clicking within the toolbar and choosing "Customize..." or selecting "Customize Toolbar" from
the browser preferences. Open windows on the desktop may have toolbars as well. For example, in Mac
OS X, each window has Back and Forward buttons, View Options, a Get Info button, and a New Folder
button. You can customize the Mac OS X window toolbars as well.
Ver2:
A toolbar is a pre-arranged list of command “buttons” for a computer program. These buttons, and the
toolbar itself, are usually shortcuts that allow the user to control programming functions without
searching through a list of commands. Computer operating systems also include toolbars, usually at the
top or bottom of the screen. Some toolbars are designed so users can reposition them on the screen for
greater efficiency, or hide them altogether.
The toolbar is a kind of programming feature called a graphical user interface, sometimes called a GUI
or a widget. While these terms may be mostly known to computer specialists and programming
enthusiasts, GUIs are widely used across the globe. They are a form of user-friendly interfaces that allow
computer users to manipulate device functions without knowing programming language or protocols.
GUIs of one kind or another are found in almost any device that employs a computer, including personal
media players, cars, televisions, thermostats and telephones.
Toolbars typically appear at the top or bottom of an application and include shortcuts to a
variety of functions.
Toolbars have a variety of designs and functions. An operating system toolbar will usually be present
any time the computer is active. Graphics programs may have several toolbars, some of which are always
visible and others that only appear when certain functions are activated. Web browsing programs will
have their own toolbars, separate from the operating system, and individual websites will often add yet
another toolbar while the user is visiting the site. Useable screen space can actually be compromised by
too many toolbars.
Another disadvantage is that some websites or companies will add toolbars to a computer without the
user’s consent, or by convincing the user there is some advantage to adding the function. Some of these
toolbars can be spyware programs that track a user’s web activity for marketing purposes. These toolbars
can be difficult for inexpert computer users to remove. Operating systems and web browsers offer the
option of locking toolbars to prevent such unnecessary add-ons.
Not all such add-on toolbars have sinister intent. Some aid web searches or offer shortcuts to frequently
visited websites. “Bookmark” or “favorite” toolbars are examples of this kind of GUI. Most major search
engines also offer toolbars to save web users the step of navigating to their search page. Increasing
computer screen size means that many users can add these extra toolbars without losing significant screen
space. Modern phones and portable devices also have these toolbars, despite their smaller screens. It
could be said that the entire interface on some of these advanced handheld devices is nothing more than a
high-functioning toolbar.
Ver3:
The toolbar, also called bar or standard toolbar, is a row of buttons, often near the top of an application
window, that controls software functions. The boxes are below the menu bar and often contain images
corresponding with the function they control, as demonstrated in the image below.
A toolbar often provides quick access to functions commonly performed in the program. For example,
a formatting toolbar in early versions of Microsoft Excel lets you make text bold or change text alignment
with other common buttons. In an Internet browser, toolbars add functionality that may not come pre-
installed. For example, with the Google toolbar, you could access exclusive Google features.
Tip
If you are missing an application's toolbar, try pressing Alt on the keyboard, as some programs hide the
toolbar until Alt is pressed. In Windows 8 and Windows 10, some programs only show a hidden toolbar if
the mouse pointer is at the top of the window.
Tip
In most Microsoft Windows programs, the toolbars can be adjusted, hidden, or displayed by
clicking View at the top of the window, and then select Toolbars. In programs that do not have
a View menu, look in the Settings or Properties section.
Below are examples of software bars and toolbars you may encounter and use on a computer.
A standard bar or standard toolbar describes the traditional toolbar in most program windows. These
terms are needed because programs like Microsoft Office programs have moved away from the standard
toolbar and are using a Ribbon. Other programs have hidden the standard toolbar behind a hamburger
menu.
Below are the two most command hardware bars you may encounter and use on or with a computer.
Port bar - A device that allows your laptop to connect to other devices.
Spacebar - A key on a keyboard that creates a space.