THE INTERNET AND - PowerPoint PPT Presentation

About This Presentation
Title:

THE INTERNET AND

Description:

Title: PowerPoint Presentation Author: sgawith Last modified by: sgawith Created Date: 1/6/2005 10:02:55 PM Document presentation format: On-screen Show (4:3) – PowerPoint PPT presentation

Number of Views:60
Avg rating:3.0/5.0
Slides: 25
Provided by: sgaw5
Category:
Tags: and | internet | the | etiquette | phone

less

Transcript and Presenter's Notes

Title: THE INTERNET AND


1
THE INTERNET AND THE WORLD WIDE WEB
2
ARPANETPredecessor to the Internet
19694 computers
3
The Internet
  • Massive network of networks connecting
    computers
  • Began in 1969

The World Wide Web
  • Way of accessing information over the Internet
  • Began in 1989
  • Tim Berners-Lee
  • Characterized by Hyperlinks

4
  • How the World Wide Web Works
  •  
  • Berners-Lee developed the three technical
    keystones of the Web
  •  
  • the language for encoding documents (HTML,
    Hypertext Markup Language)
  • (2) the system for linking documents (HTTP,
    Hypertext Transfer Protocol) and the
  • (3) www.whatever system for addressing documents
    (URL, Uniform Resource Locator).

5
HYPERTEXT MARKUP LANGUAGE (HTML) HTML--primary
coding system for Web pages. Hyperlinks are
buttons, highlighted or underlined text that send
the user to a related document.
6
HTTP HYPERTEXT TRANSFER PROTOCOL
A protocol--set of rules and procedures for
exchanging information among computers on a
network.
Hyperlinkmethod of navigating between sites.
7
URL (UNIFORM RESOURCE LOCATOR).
URL--address of an Internet file. Usually 4
parts--protocol, server, path and
filename. http//www.microsoft.com/windows/defaul
t.asp
protocol
server
path
filename
8
  • What are domains?
  • Divide the WWW into categories based on the
    nature of their owner and form part of a sites
    address, or URL.
  • Common domain names are
  • .com commercial enterprises
  • .org non-profit organizations
  • .net for networks
  • .edu for educational organizations
  • .gov for government organizations
  • .mil for military services
  • Based on this, could you guess some URLs?

9
INTERNET SERVICE PROVIDERS
Dial-UpPhone Line Broadband CableTV
Cable DSLPhone Line SatelliteSatellite
Dish WirelessRadio Waves
10
Considerations
  • Cost
  • Speed
  • Reliability
  • Extras provided
  • Tech. Support
  • Other costs fees

11
Dial-Up Cable DSL Satellite Wireless
7-15 40-50 35-50 Up to 100 25-50
People PC Net Zero Cox Time Warner Verizon ATT Hughes Net Skywayusa EagleCom
56 kbps 512kb-20 mbps 125kb-8 mbps up to 6 mbps up to 30 mbps
Affected by number of users Affected by distance from hub Affected by weather
Installation charge? Installation charge? Cost of satellite? Installation? Installation charge?
12
WHAT YOU NEED TO GET ON THE INTERNET
  • HARDWARE (perhaps including a modem)
  • A WEB BROWSER
  • ---Examples Internet Explorer Firefox
  • ---Function Helps you access pages on the WWW
    sets specifications on how those pages appear.
  • AN INTERNET SERVICE PROVIDER

13
WEB BROWSERS
Internet Explorer
Mozilla Firefox
14
SOME BROWSER BUTTONS
Internet Explorer
Favorites/Bookmarks
Refresh
Back
Forward
Mozilla Firefox
Stop
15
Internet Use as Risen Steadily Since 1997
Now in U.S. approximately 75
16
COMMON INTERNET USES
Social NetworksFacebook, Twitter,
etc. E-Mail On-Line Games Classifieds/Auctions
Information Search Videos/MoviesYouTube,
Netflix, etc.
17
E-MAIL ETIQUETTE
  1. Be sure to include a Subject Line.
  2. Use BCC to avoid giving out others e-mail
    addresses.
  3. Keep messages short focused.
  4. Dont use ALL CAPS!
  5. Use discretion in your content.
  6. Use a smiley to avoid being misunderstood.
  7. Include your name at the bottom.

18
SEARCH ENGINES
  • Used to locate information on the Internet.
  • May have different sections, such as Images
    News.
  •  

19
SEARCH ENGINES
Advanced Search options let you look for a
specific type of file, a date, a certain
language, a particular domain type (.com, .edu),
etc.  
20
SEARCH ENGINES
Common Search Engines Google Bing Yah
oo  
21
SECURITY THREATS
Virus--A program that attaches itself to a
program or file spreading infection when it is
sent on. Usually attached to an .exe file can
only spread when a human send it on or opens
it. Worm--A program that spreads from computer
to computer causing problems with your computer.
It has the capability to travel without any human
action. Because it can copy itself it may
eventually take up all your computer memory
cause it to stop operating.  
22
SECURITY THREATS
 Spyware--A program that originally seems like
legitimate software but will do damage when
installed on your computer. Can cause serious
damage by destroying or deleting files
information. PhishingA e-mail that appears to
be legitimate from a known company or bank. They
ask you to enter personal information and then
use it to steal your identity or financial
resources.
23
TIPS TO STAY SAFE
  •  1. Deal with sites that use encryption. This
    keeps your information safe by sending it in a
    coded form.
  • Use anti-virus and anti-spyware software.
  • Be sure your computer has a firewall set.
  • Deal only with companies you know and never give
    out personal or financial information by e-mail.
  • Only open e-mails from addresses that you know.
    Be especially careful of .exe files attached to
    e-mails.

24
INTERNET BASICS Happy Computing!
Write a Comment
User Comments (0)
About PowerShow.com