0% found this document useful (0 votes)
15 views7 pages

IT Era

Uploaded by

mikasaacker739
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views7 pages

IT Era

Uploaded by

mikasaacker739
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

LIVING IN THE IT ERA

Lesson 2: The Internet

Internet or “net” (network of network) is the largest computer network in the world that connects billions of
computer user.

Network is a collection of computers and devices connected via communication channels and transmission media
allow to share resources (hardware, software, data, information).

Brief History of Internet

ARPA – Advanced Research Project Agency January 2, 1969 – started an experimental computer network.

Vinton Gray Cerf is an American Internet pioneer and is recognized as one of "the fathers of the Internet", sharing
this title with TCP/IP co-developer Robert Kahn.

Major Components of the Internet

1. Servers – is a computer program that provides service to another computer program and it’s user.
Types of Servers
Application Server – a program in computer that provides the business logic for an application
program.
Web Server – a computer program that serves requested HTML pages or files.
Proxy Server – is a software that acts as an intermediary between an endpoint device, such as
computer and another server from which a user is requesting.
Mail Server – is an application that receives incoming e-mail from local users and remote senders and
forward outgoing e-mail for delivery
File Server – is a computer responsible for central storage and management of data files so that other
computer on the same network can access them.
Policy Server – is a security component of a policy – based network that provides authorization
services and facilities tracking and control of files.

2. IP Address (Internet Protocol) – is a numerical label assigned to each device. This provides identity
to a network device.

3. Browser – is an application program that provides a way to look information on the web.

Example of browsers: Mozilla Firefox, Google Chrome, Microsoft Internet Explorer, Apple Safari, Opera

4. Domain Name System (DNS) – is the phonebook of internet. We access information online through
domain names.
Example of DNS: www.facebook.com, www.pup.edu.ph,www.academia.edu
Name Entity
.com Commercial
.org Organization
.net Network
.edu Education
.gov National and State Government Agencies

.ph Philippines
.au Australia

5. Internet Service Provider (ISP) – is an organization that provides services for accessing, using or
participating in the internet.
Example of ISP: Sky Broadband, PLDT, Converge

Types of ISPs
1. International ISPs:
- Definition: These ISPs operate across multiple countries and often provide global connectivity.
- Examples: Companies like AT&T, Verizon, and Vodafone.
2. National ISPs:
- Definition: These ISPs operate within a specific country but may cover the entire nation. - Characteristics:
They offer a wide range of services and have extensive networks throughout the country, targeting both urban and
rural areas.
3. Regional ISPs:
- Definition: These ISPs provide services within a specific region of a country, such as a group of states or
provinces.
- Characteristics: They may focus on specific communities or areas, offering tailored services that meet local
demand.
4. Local ISPs:
- Definition: These ISPs operate within a small area, such as a city or town.
- Examples: Small, independent companies or municipal ISPs.

C. Uses of Internet
• Look for information
• School works, jobs, and home purposes
• Send and receive electronic mail
• Video teleconferencing (video call, video chat)
• Buy and sell product
• Social networking
• Watch & post videos National and state government Agencies
• Games
• Take college courses
• Monitor home while away
• Financial transactions
• Download music and movies

D. Internet Terms and Definition


Internet - A global network of thousands of computer networks linked by data lines and wireless systems.
Web – a collection of billions of webpages that you can view with a web browser
Email – the most common method of sending and receiving messages online
Social media – websites and apps that allow people to share comments, photos, and videos
Online gaming – games that allow people to play with and against each other over the Internet
Updates
HTML – (Hypertext Markup Language) is a coding language used to tell a browser how to place pictures, text,
multimedia and links to create a web page. When a user clicks on a link within a web page, that link, which is coded
with HTML, links the user to a specific linked web page.
URL – (Uniform Resource Locator) is a web address used to connect to a remote resource on the world wide web.
Bit - is a single digit in the binary numbering system (base 2). For example: 1 is a bit or 0 is a bit.
Byte - generally consists of eight bits.
HTTP - is the acronym for (Hypertext Transfer Protocol), the data communication standard of web pages. When a
web page has this prefix, the links, text, and pictures should work correctly in a web browser.
HTTPS - is the acronym for (Hypertext Transfer Protocol Secure). This indicates that the web page has a special
layer of encryption added to hide your personal information and passwords from others.
Router or router-modem combination is the hardware device that acts as the traffic cop for network signals arriving
at your home or business from your ISP. A router can be wired or wireless or both.
Encryption - the process of converting information or data into a code, especially to prevent unauthorized access.
Web Bot - A term that applies to programs/applets (macros and intelligent agents) used on the Internet. Such bots
perform a repetitive function, such as posting messages to multiple newsgroups or doing searches for information.
Search Engine - specialized software, such as Google and Yahoo, that lets www browser users search for
information on the web by using keywords, phrases.

UPLOAD- Uploading is when you are transferring data from your computer/device to the internet. DOWNLOAD-
Downloading is when you are transferring data from the internet to your computer.

Software updates- It provides new and improved functionality while addressing existing issues, such as bugs and
crashes. And with antivirus updates, the developers often continue to improve their products to keep you safe from
new viruses and malware.

MODULE 4: THE NETIQUETTE AND THE COMPUTER ETHICS


Lesson 1: Netiquette
What is Netiquette? Simple stated, it’s network etiquette – that is the etiquette of cyberspace and “etiquette”
means the forms of required by good breeding or prescribed by authority to be required in social or official life.

Netiquette, or network etiquette, is concerned with the "proper" way to communicate in an online environment.
Consider the following "rules," adapted from Virginia Shea's the Core Rules of Netiquette, whenever you
communicate in the virtual world.

REMEMBER THE GOLDEN RULE – Even though you may be interacting with a computer screen, you are
communicating with a real person who will react to your message.

AVOID SLANG, ACRONYMS, AND TEXT TALK – Communicating effectively in college and business environments
requires the use of correct terminology, spelling, and grammar that can easily be understood. For example, use “your” instead
of “ur”.

PROOFREAD YOUR MESSAGES BEFORE SENDING THEM – Proofreading your


messages before you send them is a best practice for effective and efficient communication.

EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION WITH OTHERS


ONLINE – E-mail and chat messages that you send or receive are considered private and should not be forwarded
or copied to others without gaining the consent of all involved participants.

RESPECT DIVERSITY IN VIEWPOINTS - Be constructive and respectful when sharing opinions, beliefs, and
criticisms, or responding to those of others in the conversation.

Lesson 2: Cybercrimes

Cyber - It is the Characteristics of the culture of computers, information, technology and virtual reality.

Cybercrime - is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and
child pornography) is used as a tool to commit an offense.

Cybercriminals may use computer technology to access personal information, business trade secrets or use the
internet for exploitative or malicious purposes.

Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines approved on September
12,2012 which aims to address legal issues concerning online interactions and internet.

Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal information.
COMMON FORMS OF CYBERCRIMES:
a. Copyright - The exclusive legal right, given to an originator or an assignee to print, publish, perform, film,
or record literary, artistic, or musical material, and to authorize others to do the same.
Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive rights through the
unauthorized use of a copyrighted material or work.

b. Plagiarism
An act or instance of using or closely imitating the language and thoughts of another author without authorization.

c. Computer Addiction
• Offline: generally used when speaking about excessive gaming behavior, which can
be practiced both offline and online.

• Online: Also known as “Internet Addiction”, gets more attention in general from scientific research than
offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the
Internet. *Virtual Self -The persona you create about yourself virtually.

CRIMINAL ACTIVITIES
a. Hacking - Unauthorized access of or interference with computer systems, servers, or other information
and communication systems
• Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other information
and communication systems without the computer or system.

b. Computer-related forgery, fraud and/or identity theft - An attempt to obtain sensitive information such
as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.

c. Electronic theft - Illegal Downloading. Obtaining files that you do not have the right to use from the
internet.

d. Cyberbullying - The use of electronic communication to bully a person, typically by sending a message of
an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)

e. Cybersex - Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious
exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration

f. Child Pornography - Is a form of child sexual exploitation.


• Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography
Act of 2009, committed through a computer system.
g. Cyber Defamation - Is an unprivileged false statement of fact which tends to harm the reputation of a
person or company.
Lesson 3: Internet Threats
Hacking - Hacking is a term used to describe actions taken by someone to gain unauthorized access to a computer.

Malware - is one of the more common ways to infiltrate or damage your computer.

Malicious software that infects your computer, such as computer:

1. Viruses

2. Worms

3. Trojan horses

4. Spyware

5. Adware.

Pharming - is a common type of online fraud. A means to point you to a malicious and illegitimate website by

redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.

Phishing - is used most often by cyber criminals because it's easy to execute and can produce the results they're

looking for with very little effort.

Fake emails, text messages and websites created to look like they're from authentic companies. They're sent by

criminals to steal personal and financial information from you. This is also known as “spoofing”.

Ransomware - is a type of malware that restricts access to your computer or your files and displays a message that

demands payment in order for the restriction to be removed.

Spam - is one of the more common methods of both sending information out and collecting it from unsuspecting

people. The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily

found on the Internet through things like social networking sites, company websites and personal blogs.

Spyware (Spyware & Adware) - Spyware and adware are often used by third parties to infiltrate your computer.

Trojan horse - may not be a term you're familiar with, but there's a good chance you or someone you know has

been affected by one.

A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will

install itself and run automatically once it's downloaded.

Viruses - Most people have heard of computer viruses, but not many know exactly what they are or what they do.

Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting
your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic

download of a virus.

Wi-Fi eavesdropping is another method used by cyber criminals to capture personal information. Virtual “listening

in” on information that's shared over an unsecure (not encrypted) WiFi network.

Worms - are a common threat to computers and the Internet as a whole. A worm, unlike a virus, goes to work on its

own without attaching itself to files or

You might also like