IT Era
IT Era
Internet or “net” (network of network) is the largest computer network in the world that connects billions of
computer user.
Network is a collection of computers and devices connected via communication channels and transmission media
allow to share resources (hardware, software, data, information).
ARPA – Advanced Research Project Agency January 2, 1969 – started an experimental computer network.
Vinton Gray Cerf is an American Internet pioneer and is recognized as one of "the fathers of the Internet", sharing
this title with TCP/IP co-developer Robert Kahn.
1. Servers – is a computer program that provides service to another computer program and it’s user.
Types of Servers
Application Server – a program in computer that provides the business logic for an application
program.
Web Server – a computer program that serves requested HTML pages or files.
Proxy Server – is a software that acts as an intermediary between an endpoint device, such as
computer and another server from which a user is requesting.
Mail Server – is an application that receives incoming e-mail from local users and remote senders and
forward outgoing e-mail for delivery
File Server – is a computer responsible for central storage and management of data files so that other
computer on the same network can access them.
Policy Server – is a security component of a policy – based network that provides authorization
services and facilities tracking and control of files.
2. IP Address (Internet Protocol) – is a numerical label assigned to each device. This provides identity
to a network device.
3. Browser – is an application program that provides a way to look information on the web.
Example of browsers: Mozilla Firefox, Google Chrome, Microsoft Internet Explorer, Apple Safari, Opera
4. Domain Name System (DNS) – is the phonebook of internet. We access information online through
domain names.
Example of DNS: www.facebook.com, www.pup.edu.ph,www.academia.edu
Name Entity
.com Commercial
.org Organization
.net Network
.edu Education
.gov National and State Government Agencies
.ph Philippines
.au Australia
5. Internet Service Provider (ISP) – is an organization that provides services for accessing, using or
participating in the internet.
Example of ISP: Sky Broadband, PLDT, Converge
Types of ISPs
1. International ISPs:
- Definition: These ISPs operate across multiple countries and often provide global connectivity.
- Examples: Companies like AT&T, Verizon, and Vodafone.
2. National ISPs:
- Definition: These ISPs operate within a specific country but may cover the entire nation. - Characteristics:
They offer a wide range of services and have extensive networks throughout the country, targeting both urban and
rural areas.
3. Regional ISPs:
- Definition: These ISPs provide services within a specific region of a country, such as a group of states or
provinces.
- Characteristics: They may focus on specific communities or areas, offering tailored services that meet local
demand.
4. Local ISPs:
- Definition: These ISPs operate within a small area, such as a city or town.
- Examples: Small, independent companies or municipal ISPs.
C. Uses of Internet
• Look for information
• School works, jobs, and home purposes
• Send and receive electronic mail
• Video teleconferencing (video call, video chat)
• Buy and sell product
• Social networking
• Watch & post videos National and state government Agencies
• Games
• Take college courses
• Monitor home while away
• Financial transactions
• Download music and movies
UPLOAD- Uploading is when you are transferring data from your computer/device to the internet. DOWNLOAD-
Downloading is when you are transferring data from the internet to your computer.
Software updates- It provides new and improved functionality while addressing existing issues, such as bugs and
crashes. And with antivirus updates, the developers often continue to improve their products to keep you safe from
new viruses and malware.
Netiquette, or network etiquette, is concerned with the "proper" way to communicate in an online environment.
Consider the following "rules," adapted from Virginia Shea's the Core Rules of Netiquette, whenever you
communicate in the virtual world.
REMEMBER THE GOLDEN RULE – Even though you may be interacting with a computer screen, you are
communicating with a real person who will react to your message.
AVOID SLANG, ACRONYMS, AND TEXT TALK – Communicating effectively in college and business environments
requires the use of correct terminology, spelling, and grammar that can easily be understood. For example, use “your” instead
of “ur”.
RESPECT DIVERSITY IN VIEWPOINTS - Be constructive and respectful when sharing opinions, beliefs, and
criticisms, or responding to those of others in the conversation.
Lesson 2: Cybercrimes
Cyber - It is the Characteristics of the culture of computers, information, technology and virtual reality.
Cybercrime - is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and
child pornography) is used as a tool to commit an offense.
Cybercriminals may use computer technology to access personal information, business trade secrets or use the
internet for exploitative or malicious purposes.
Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines approved on September
12,2012 which aims to address legal issues concerning online interactions and internet.
Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal information.
COMMON FORMS OF CYBERCRIMES:
a. Copyright - The exclusive legal right, given to an originator or an assignee to print, publish, perform, film,
or record literary, artistic, or musical material, and to authorize others to do the same.
Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive rights through the
unauthorized use of a copyrighted material or work.
b. Plagiarism
An act or instance of using or closely imitating the language and thoughts of another author without authorization.
c. Computer Addiction
• Offline: generally used when speaking about excessive gaming behavior, which can
be practiced both offline and online.
• Online: Also known as “Internet Addiction”, gets more attention in general from scientific research than
offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the
Internet. *Virtual Self -The persona you create about yourself virtually.
CRIMINAL ACTIVITIES
a. Hacking - Unauthorized access of or interference with computer systems, servers, or other information
and communication systems
• Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other information
and communication systems without the computer or system.
b. Computer-related forgery, fraud and/or identity theft - An attempt to obtain sensitive information such
as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.
c. Electronic theft - Illegal Downloading. Obtaining files that you do not have the right to use from the
internet.
d. Cyberbullying - The use of electronic communication to bully a person, typically by sending a message of
an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
e. Cybersex - Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious
exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration
Malware - is one of the more common ways to infiltrate or damage your computer.
1. Viruses
2. Worms
3. Trojan horses
4. Spyware
5. Adware.
Pharming - is a common type of online fraud. A means to point you to a malicious and illegitimate website by
redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
Phishing - is used most often by cyber criminals because it's easy to execute and can produce the results they're
Fake emails, text messages and websites created to look like they're from authentic companies. They're sent by
criminals to steal personal and financial information from you. This is also known as “spoofing”.
Ransomware - is a type of malware that restricts access to your computer or your files and displays a message that
Spam - is one of the more common methods of both sending information out and collecting it from unsuspecting
people. The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily
found on the Internet through things like social networking sites, company websites and personal blogs.
Spyware (Spyware & Adware) - Spyware and adware are often used by third parties to infiltrate your computer.
Trojan horse - may not be a term you're familiar with, but there's a good chance you or someone you know has
A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will
Viruses - Most people have heard of computer viruses, but not many know exactly what they are or what they do.
Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting
your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic
download of a virus.
Wi-Fi eavesdropping is another method used by cyber criminals to capture personal information. Virtual “listening
in” on information that's shared over an unsecure (not encrypted) WiFi network.
Worms - are a common threat to computers and the Internet as a whole. A worm, unlike a virus, goes to work on its