Title: THE INTERNET AND
1THE INTERNET AND THE WORLD WIDE WEB
2ARPANETPredecessor to the Internet
19694 computers
3The Internet
- Massive network of networks connecting
computers - Began in 1969
The World Wide Web
- Way of accessing information over the Internet
- Began in 1989
- Tim Berners-Lee
- Characterized by Hyperlinks
4- How the World Wide Web Works
-
- Berners-Lee developed the three technical
keystones of the Web -
- the language for encoding documents (HTML,
Hypertext Markup Language) - (2) the system for linking documents (HTTP,
Hypertext Transfer Protocol) and the - (3) www.whatever system for addressing documents
(URL, Uniform Resource Locator).
5HYPERTEXT MARKUP LANGUAGE (HTML) HTML--primary
coding system for Web pages. Hyperlinks are
buttons, highlighted or underlined text that send
the user to a related document.
6HTTP HYPERTEXT TRANSFER PROTOCOL
A protocol--set of rules and procedures for
exchanging information among computers on a
network.
Hyperlinkmethod of navigating between sites.
7URL (UNIFORM RESOURCE LOCATOR).
URL--address of an Internet file. Usually 4
parts--protocol, server, path and
filename. http//www.microsoft.com/windows/defaul
t.asp
protocol
server
path
filename
8- What are domains?
- Divide the WWW into categories based on the
nature of their owner and form part of a sites
address, or URL. - Common domain names are
- .com commercial enterprises
- .org non-profit organizations
- .net for networks
- .edu for educational organizations
- .gov for government organizations
- .mil for military services
- Based on this, could you guess some URLs?
9INTERNET SERVICE PROVIDERS
Dial-UpPhone Line Broadband CableTV
Cable DSLPhone Line SatelliteSatellite
Dish WirelessRadio Waves
10Considerations
- Cost
- Speed
- Reliability
- Extras provided
- Tech. Support
- Other costs fees
11Dial-Up Cable DSL Satellite Wireless
7-15 40-50 35-50 Up to 100 25-50
People PC Net Zero Cox Time Warner Verizon ATT Hughes Net Skywayusa EagleCom
56 kbps 512kb-20 mbps 125kb-8 mbps up to 6 mbps up to 30 mbps
Affected by number of users Affected by distance from hub Affected by weather
Installation charge? Installation charge? Cost of satellite? Installation? Installation charge?
12WHAT YOU NEED TO GET ON THE INTERNET
- HARDWARE (perhaps including a modem)
- A WEB BROWSER
- ---Examples Internet Explorer Firefox
- ---Function Helps you access pages on the WWW
sets specifications on how those pages appear. - AN INTERNET SERVICE PROVIDER
13WEB BROWSERS
Internet Explorer
Mozilla Firefox
14SOME BROWSER BUTTONS
Internet Explorer
Favorites/Bookmarks
Refresh
Back
Forward
Mozilla Firefox
Stop
15Internet Use as Risen Steadily Since 1997
Now in U.S. approximately 75
16COMMON INTERNET USES
Social NetworksFacebook, Twitter,
etc. E-Mail On-Line Games Classifieds/Auctions
Information Search Videos/MoviesYouTube,
Netflix, etc.
17E-MAIL ETIQUETTE
- Be sure to include a Subject Line.
- Use BCC to avoid giving out others e-mail
addresses. - Keep messages short focused.
- Dont use ALL CAPS!
- Use discretion in your content.
- Use a smiley to avoid being misunderstood.
- Include your name at the bottom.
18SEARCH ENGINES
- Used to locate information on the Internet.
- May have different sections, such as Images
News. -
-
19SEARCH ENGINES
Advanced Search options let you look for a
specific type of file, a date, a certain
language, a particular domain type (.com, .edu),
etc.
20SEARCH ENGINES
Common Search Engines Google Bing Yah
oo
21SECURITY THREATS
Virus--A program that attaches itself to a
program or file spreading infection when it is
sent on. Usually attached to an .exe file can
only spread when a human send it on or opens
it. Worm--A program that spreads from computer
to computer causing problems with your computer.
It has the capability to travel without any human
action. Because it can copy itself it may
eventually take up all your computer memory
cause it to stop operating.
22SECURITY THREATS
Spyware--A program that originally seems like
legitimate software but will do damage when
installed on your computer. Can cause serious
damage by destroying or deleting files
information. PhishingA e-mail that appears to
be legitimate from a known company or bank. They
ask you to enter personal information and then
use it to steal your identity or financial
resources.
23TIPS TO STAY SAFE
- 1. Deal with sites that use encryption. This
keeps your information safe by sending it in a
coded form. - Use anti-virus and anti-spyware software.
- Be sure your computer has a firewall set.
- Deal only with companies you know and never give
out personal or financial information by e-mail. - Only open e-mails from addresses that you know.
Be especially careful of .exe files attached to
e-mails.
24INTERNET BASICS Happy Computing!