0% found this document useful (0 votes)
50 views

Internet & Emails Pt2-1-1

The document provides information about internet, email, web browsers, hyperlinks, search engines and web directories. It defines key terms and concepts related to using the internet and email, including how they work and their importance.

Uploaded by

Abra Abra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Internet & Emails Pt2-1-1

The document provides information about internet, email, web browsers, hyperlinks, search engines and web directories. It defines key terms and concepts related to using the internet and email, including how they work and their importance.

Uploaded by

Abra Abra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 86

VOCATIONAL EDUCATION AND

TRAINING AUTHORITY

KIHONDA RVTSC

04/10/2024 PREPARED BY PAN


INTERNET & EMAIL:
Huge network that link together millions
of small networks.
Telephone lines and cables connect
networks all over the world, By a very
powerful computer called Routers.
INTERNET & EMAIL cont:
INTERNET & EMAIL:
Importance of Internet can be seen in:
Research,
Information Disseminations,
Leisure,
Communication,
Business, (offers goods and services on
line)
Education (Learning)
Promotion & Advertisement: (Business).
INTERNET & EMAIL:
The World Wide Web:
 Is a multimedia-based collection of information,
services and websites via internet.
 Internet is a technology Infrastructure that makes
the web possible.
 The web, www or w3 consist of HYPERTEXT and
HYPERMEDIA documents.
 When this type of document is placed on the www,
it is called a WEBPAGE.
 To surf the web to access different web pages or
websites, you need a BROWSER:
INTERNET & EMAIL:
WEBSITE:
Is a collection of web pages.
Every, page has its own address, called a
URL (Uniform/Universal resource
locator).
Make pages easier to find. A URL is
similar to an e-mail address,
INTERNET & EMAIL:
e. g http://www. ippmedia. com/home/html
Where:
http_ protocol
Ippmedia_ host-name of the comp. on
which the page is stored.
.com_domain-purpose of the site
Home_file name.
html_ computer language created a web
page.
Internet addresses

An Internet or Web address (sometimes


called a URL, or Universal/Uniform
Resource Locator) typically is composed
of four parts:
A protocol name (a protocol is a set of
rules and standards that enable computers
to exchange information)
Internet addresses
The location of the site
The name of the organization that
maintains the site
A suffix that identifies the kind of
organization it is (such as .com for a
commercial organization)
Internet addresses (cont)
For example, the address
http://www.yale.edu/
provides the following information:
Internet addresses (cont)
Protocol http:
This Web server uses Hypertext Transfer
Protocol (HTTP).
Location www
This site is on the World Wide Web.
Mainted by yale
The Web server is at Yale University.
Type .edu This is an educational
institution.
Internet addresses (cont)
Each address on the WWW is unique and
should be read from right to left, but there
can be similarities and variations. For
example, there are many different suffixes
used to identify the type of site: notice
above .org.uk This means this site is
maintained in the UK (country code) and
is run as a non profit organization (.org).
A few examples of other countries/groups
are:
Domain:
Describes the main purpose of the website
Name of the website eg. Com.-
commercial ,gov.- government, ac/edu-
educational institution
WEB BROWER:

Is a program used/helps to find, retrieve, view and


send hypertext and hypermedia Documents over the
web.

Examples of popular BROWSERS available today


are:
Internet Explorer.
Netscape navigator
Fire fox Mozilla
Safari
Mosaic
In order of release:
WorldWideWeb, February 25, 1991
Mosaic, April 22, 1993
Netscape Navigator and Netscape Communicator,
October 13, 1994
Internet Explorer, August 16, 1995
Opera, 1996, see History of the Opera web browser
Mozilla Navigator, June 5, 2002[19]
Safari, January 7, 2003
Mozilla Firefox, November 9, 2004
Google Chrome, September 2, 2008
With most Browsers, you can do some
or all of:
Send and receive message.
Downloads games, music and computer software
View hundreds of millions of webpage
Chatting by joining discussion groups
See and hear live or recorded broadcasting
Shop online
Participating in conferencing using voice
conferencing Software in conjunction with
soundcards, speaker and microphone
View channels
HYPERLINK:
It is a shortcut to another webpage
It allows visit to another website without
typing new address each time.
It can be in the form of underlined text,
Buttons or even images
Cont:
HYPERTEXT:
Document that contains a HYPERLINK to
another document.
HYPERMEDIA:
Document that contains links to text, graphics,
sounds or video files
Note: A computer that stores and makes available
hypertext and hypermedia Documents is called
SERVER (or WEBSERVER) and a computer that
requests such a Document is called a CLIENT
HYPERTEXT TRANSFER PROTOCOL (HTTP)

Is a set of rules that controls how data


travels between server and Client.
It is done within a BROWSER.
HYPERTEXT MAKER_UP LANGUAGE (HTML)

It is a computer language used to create


Hypermedia (web pages).
HTML contains standard codes that are
used to specify how a web is Structured
and formatted.
It contains tags used to create
HYPERLINKS.
ADRESS MENU: (HISTORY BAR)
Brower (Internet Explorer) maintains the
list of all the sites that you visit regularly.
It helps not to type the web address every
times
URL (WEB ADRESS)
Is the Address of the website on the
INTERNET.
E. g http.// www . Raha . com
1 2 3 4
Protocol web
host domain
Examples of domain and country short
forms:
ca
. Canada
.jp Japan
.it Italy
.us United States
.au Australia
.fr France
.com Commercial site
.gov Government
.firm Company
.rec Leisure
.mil Military
.net Network management
.info Information
.arts Cultural groups
SEARCH ENGINES:

Is a program which helps user to find the


information He/she wants
Are huge database of web-pages files that
have been assembled automatically by
machine.

Examples of search Engines:
 .Alta vista.
 .Dog pile
 .Go
 .Google
 .Hotbot
 .Look smart
 .Lycos
 .Mamma
 .Metacrawler
 .nothernlight
 .Search, com
 .NBCi
 .WebCrawler
 .Yahoo!
 .Open directory project
Search engine break down into three
categories:
The major search engines on the Web these
are: Indexes, Directories and mega
searchers.
1.Indexes: Identify specific information,
person details eg MSN search and google,
they search individual pages that match
your criteria
2.Directories: Identify general information

Eg yahoo!, yellowpages
1.Indexes:
Identify specific information, person details.
List of Indexes:
Alta Vista http://altavista.com/
Alta Vista Canada:
http://altavistacanada.com
Lycos http://www.lycos.com
Excite http://excite.com
Infoseek http://infoseek.go.com/
Hotbot http://www.hotbot.com
Google http://www.google.com
2.Directories:
 2.Directories: Identify general information. Eg yahoo!, yellowpages
Advantage:
The search is more precise. The number of sites is shown not the number of pages.
Disadvantage:
Fewer sites given.
The important thing to remember is to have key words on which to build the
search.

 A list of well-known directories


 Yahoo http://www.yahoo.com
 La Toile du Quebec (French) http://www.toile.qc.ca
 About.com* http://www.about.com

*Recommended site because all the categories are actively maintained through
human intervention, therefore, a search here will often be more precise and
more fruitful.
3. Megasearch:

 Through this tool the search scans many directories


at the same time. This can cut down the search time
but often the results are not very specific.

 Examples:
 Dogpile http://www.dogpile.com
 Profusion http://www.profusion.com
 Argus Clearinghouse http://www.clearinghouse.net/
 Web Crawler http://www.webcrawler.com
3. Megasearch:
The problem with many search engines is
that they do not always provide exactly
the answers you want.
The problem is, if you give three words
for a search, then after exhausting this
combination the search engine takes each
word independently and search for it.
Hence, the enormous numbers.
Cont:
Note: English mathematician George
Boole developed algebra of LOGIC that
has become the basic for
Computer DATABASE searches.
WEB DIRECTORIES:

Is a list of almost all the subject


categories and sub categories.
INTERNET & EMAIL
Electronic mail, most commonly referred
to as email or e-mail since 1993
e-mail: is a method of exchanging digital
messages from an author to one or more
recipients. Modern email operates across
the Internet or other computer networks
Email (electronic mail):
Email (electronic mail) lets you type and
send a message to anyone, anywhere in
the world who has an Internet connection
and an email account.
Once sent, the message usually arrives
within seconds. However, before sending
mail you have to learn how to compose
your messages.
INTERNET & EMAIL cont:
An Internet email message consists of
three components, the message envelope,
the message header, and the message
body. The message header contains
control information, including, minimally,
an originator's email address and one or
more recipient addresses. Usually
descriptive information is also added,
such as a subject header field and a
message submission date/time stamp.
Email address:
E.g [email protected]
Example- username,
@- part of address
Yahoo- host
.com- domain
INTERNET & EMAIL cont:
Email features:

 Email Header Section: contain details about


the email
 From: display who sent or is sending the email
 To: display email address of the receiver of the
mail
 cc: stands for carbon copy.
 Display Additional email addresses that will
receive carbon copied on this email.
 bcc: enable email copied to another email
address that wont be visible to other recipient.
Cont:
Junk Mail: unsolicited mail that consists
mainly of promotional materials, catalogs,
and requests for donations.
Spam: is most often considered to be
electronic junk mail or junk newsgroup
postings. Some people define spam even
more generally as any unsolicited email.
Attaching A Document:

Sometimes, it is necessary to add a separate document


to your Email.
Perhaps you want to include a financial statement
prepared in Excel, or a report in Word. In that case
you need the attachment feature.
1.Compose the message as usual. Click on
2.From the dialogue box, select the location of the file
you want to send. Point at the file and click on Attach.
3.You will return to your original message and see
below the main text an icon which represents the
document you have attached.
INTERNET & EMAIL cont:
The transmission of electronic mail
within the Internet uses the
Simple Mail Transfer Protocol (SMTP),
Switch board – a directory of email
addresses and maps
E-mails
EMAIL:
An electronic message that is sent over the
internet or a private computer network.
EMAIL ACCOUNT
A room in web mail sever where users exchange
emails within internet.
FORWARD
Sending an email you’ve received onto somebody
else.
INBOX
Where new incoming emails appear.
REPLY
An email sent in response to a previous email.
Password

A PASSWORD is a string of characters used to


verify the identity of a user during
the AUTHENTICATION process.
 Passwords are typically used in conjuncture
with a USERNAME; they are designed to be
known only to the user and allow that user to
gain access to a device, application or website.
 This combination is often referred to as a login.
While usernames are generally PUBLIC
information, passwords are PRIVATE to each
user.
Login:(logon or sign-in or sign-on)

The act of providing username and


password in order to access device,
application or website.
The user credentials are typically some
form of "USERNAME" and a matching
"PASSWORD", and these credentials
themselves are sometimes referred to as a
LOGIN
When access is no longer needed, the user
can log out (log off, sign out or sign off).
Strong Passwords
It is Information Technology Services (ITS) policy
that passwords used to access computing systems.
ITS strongly encourages the use of strong
passwords for all other computing systems.
A strong password is one that is more secure and
difficult for a machine or a human to guess.
Password strength can be achieved by incorporating
the following characteristics; the more
characteristics you incorporate into your password,
the stronger it will be.
Characteristics of strong passwords

At least 8 characters—the more


characters, the better
A mixture of both uppercase and
lowercase letters
A mixture of letters and numbers
Inclusion of at least one special
character, e.g., ! @ # ? ]
Note:
Note: do not use < or > in your
password, as both can cause problems in
Web browsers
A strong password is hard to guess, but it
should be easy for you to remember.
A password that has to be written down
is not strong, no matter how many of the
above characteristics are employed.
Examples Of Weak Passwords
Any word that can be found in a dictionary, in any language
(e.g., airplane or aeroplano).
A dictionary word with some letters simply replaced by
numbers (e.g., a1rplan3 or aer0plan0).
A repeated character or a series of characters (e.g., AAAAA
or 12345).
A keyboard series of characters (e.g., qwerty or poiuy).
Personal information (e.g., birthdays, names of pets or
friends, Social Security number, addresses).
Anything that’s written down and stored somewhere near your
computer.
Tips for Keeping your Password Secure
Change it regularly—once every three to six months.
Change it if you have the slightest suspicion that the
password has become known by a human or a machine.
Never use it for other websites.
Avoid typing it on computers that you do not trust; for
example, in an Internet café.
Never save it for a web form on a computer that you do
not control or that is used by more than one person.
Never tell it to anyone.
Never write it down.
Tips For Creating A Strong Password

Think of a word or phrase, and then


substitute the letters with numbers and
special characters and mix the case. For
example:
Snoopy and
Woodstock becomes Sno0py&ws
In the dog house becomes !nTh3dawgHs
Let’s have dinner at 8:00
p.m. becomes Lhd@800pm
Advantages Of The Internet

The Internet is one of the greatest creations


and gives everyone in the world with
Internet access instant access to an endless
supply of knowledge and entertainment.
Below is a complete list of all of the
advantages of the Internet.
Electronic Communications:
With the introduction of the Internet, we now
have the ability to send and receive messages
through electronic mail- virtually
instantaneously
Online Shopping:
With the Internet came the convenience of
online shopping. Rather than having to drive to
a mall and wait in long lines to make a
purchase, you can now do all of your shopping
with a few clicks of the mouse. In addition, the
Internet made it easier for individuals to price
compare between different online retailers to
see which one offers the best selections and
prices.
Online Banking:
Nowadays, online banking is practically the norm.
You log into your online accounts to pay bills, transfer
funds, or just to check your balance. Prior to online
banking, you would have to drive to your local bank
and wait in line for the next teller to have your
transactions completed. With the Internet, you can
avoid the line all together simply by remotely logging
into your account on your computer and completing
your transaction from there any time of day or night.
Information, knowledge, and learning

As mentioned earlier, the Internet contains an endless supply

of knowledge and information that allows you to learn about


almost any topic or question you may have. Using a
search engine like Google, you can ask virtually any
question and find a web page with an answer to that
question. There are also millions of videos on sites like
YouTube that help explain various topics and even online
courses that can be taken to help teach you about many
different subjects.
Connectivity, communication, and sharing
In the past, it would take days and sometimes even
months to receive a letter from someone else. Today, with
the Internet, you can send an e-mail to anyone in the
world and often have it delivered in less than a minute.
Other forms of communication, such as chat and VOIP,
also allow you to have instant communication with anyone
in the world.
Online forums are also places where people who share
common interests can connect with each other and talk
about what they enjoy or ask other experts in the field
questions.
Address, mapping, and contact information
With the help of GPS technology, the Internet can help
map and direct you to almost every place in the world.
You can quickly route to your location or find businesses
in your area that may sell or provide you with a service
you need. Today's search engines are also smart
enough to know your location and help give you the most
relevant searches for your area. For example, if you
need a plumber and search for plumber, you will be
given local plumbers in your area.
Banking, bills, and shopping

The Internet gives you access to your bank account to


view your balance, make transactions, and send money.
Also, many services enable you to view and pay your bills
electronically.
Online shopping is another huge advantage of the
Internet, giving anyone with Internet access the ability to
find products that interest them and buy them without
having to visit a store. The Internet gives everyone easy
access to compare prices between companies and even
see what others think about a product through online
reviews to help make better purchasing decisions.
Selling and making money

If you are a business or want to sell anything, the Internet is


a perfect place to sell most goods. Because anyone in the
world with Internet access can find your website, you have
access to more people than you ever could with a local retail
store. The Internet is always on and always available, which
means you have the potential of selling goods every day at
all times. The Internet also gives all businesses the ability to
advertise their product or service to everyone in the world or
specify an exact demographic they want to reach.
There are other ways someone can make money online by
performing other online services.
Collaboration, work from home, and access to a global workforce

 The Internet is the perfect place to work with other people from
around the world. There are dozens of online services that allow
you to work with other people and, with the ability to have instant
communication, it can even make producing new products and
services faster.
 An Internet connection provides many people with the ability to
work from home or have a virtual office. Today, many businesses
allow their employees to work from home using their computers
and Internet connection. Working from home can help save
people money by not having to pay for child care and save them
money and time by eliminating the daily commute to and from
Donations and funding

With access to a much wider audience,


anyone with an Internet connection can
quickly make a donation to their
favorite charity or help fund projects
and ideas that interest them. Also,
those looking for charity can find
many online services that help make it
easier to help donate or support their
causes.
Entertainment

The Internet gives everyone access to


an endless supply of entertainment,
with access to watch videos, watch
movies, listen to music, and even
play games online.
Internet of Things
 The Internet helps make devices in your home
connected and smarter by giving them access to
the Internet. For example, the Nest thermostat can
be connected to the Internet to help control the
heating and cooling in your home. Also, once these
devices are connected, they can be controlled
remotely using your computer or smartphone. By
connecting IoT (Internet of Things) devices to your
home, it can become smarter and more efficient
and help save energy, money, and time.
Cloud computing and cloud storage
The Internet connects your computers and Internet-enabled
devices to cloud services, like cloud computing and cloud storage.
With cloud computing, a device can have access to more powerful
computers and even supercomputers to perform complex tasks
while you or your business works on other tasks.
Cloud storage synchronizes data across any of your Internet-
connected devices, so you have access your files from anywhere.
It makes backing up information easier, and safer — your data is
securely stored in a professionally-maintained server. So, if you
are using a cloud storage backup service and your home or office
burned down, you would not lose all your valuable data.
Briefly Disadvantages of internet
o Get addicted to internet
o Meet bad people
o Get robbed
o Harmful to your eyesight and spine
o Full of violence and pornography
o viruses destroy computer
Unemployment

Even though the internet has improved


many sectors, it has resulted in job
unemployment through outsourcing,
downsizing, and redundancies. For
example, a factory can replace skilled
personnel with robots which can work
faster and for longer hours.
Privacy

Although the internet has made


communication easier, quicker and
convenient, privacy problems have
emerged. From email hacking to
phone signal interceptions, more and
more people are now troubled about
their private information.
3. Lack of job security

Since technology keeps on changing,


job security has become a problem.
This means that IT experts need to be
continuously learning to keep up with
the changes if they want to retain
their jobs.
4. Overruling cultures

While the internet has made the


universe a global village, some
cultures have consumed others. For
instance, teenagers in western
countries have influenced most
teenagers in other parts of the world
on how they dress, act and behave.
What is a VPN?

A VPN, or virtual private network, is a


secure tunnel between your device and the
internet. VPNs protect you from online
snooping, interference, and censorship.
As you connect to a secure VPN server,
your internet traffic goes through
an encrypted tunnel that nobody can
see into, including hackers, governments,
and your internet service provider.
VPN server
The websites you visit can no longer see
your original IP address, only the IP
address of the VPN server, which is
shared by many other users and changes
regularly.
VPN
THREE Types of VPN

Commercial VPN
A commercial VPN, also called a
personal VPN or a consumer VPN, is a
private service offered directly to
individuals, usually for a fee.
ExpressVPN is such a VPN service
because it directly caters to the privacy
needs of its customers.
Corporate VPN

A corporate VPN, also called a business


VPN, allows an organization’s remote
employees to connect securely to the
internet as if they were physically present
in the office.
Unlike commercial VPNs, however,
corporate VPNs are meant to protect the
privacy of the company and not
necessarily the individual.
Self-setup VPN

Some tech experts and DIY hobbyists


choose to set up their own VPN using
their own equipment.
Self-setup VPNs, however, do not provide
the protection of shared IP addresses,
server locations in multiple countries, or
many other features enjoyed by
commercial VPN users.
Benefits and advantages of VPN
Protect your privacy
Changing your IP address with a VPN
helps shield your identity from websites, apps,
and services that want to track you. Good VPNs
also prevent your internet provider, mobile
carrier, and anyone else who may be listening
from seeing your activity, thanks to a layer of
strong encryption.
Increase your security

Using a VPN protects you from security


breaches in many forms, including packet
sniffing, rogue Wi-Fi networks, and man-in-the-
middle attacks. Travelers, remote workers, and
all kinds of on-the-go individuals use a VPN
whenever they’re on an untrusted network like
free public Wi-Fi.
Unblock websites

If you’re in a part of the world that


restricts access to Google, Wikipedia, YouTube,
or other sites and services, using a VPN will let
you regain access to the free internet. You can
also use a VPN to break through firewalls on
school or office networks.
intranet

An intranet is a private network contained


within an enterprise that is used to securely
share company information and computing
resources among employees.
An intranet can also be used to facilitate
working in groups and teleconferences.
Security can also be increased within the
intranet by establishing a database that
maintains all of the usernames of people who
are allowed access to the network.
What is the difference between an
intranet and the internet?
Intranets emerged in tandem with the
internet in the 1990s. The difference
between the internet and the intranet is
simple: the internet is a public network that
is not owned by an entity, while an intranet
is privately owned and not accessible to just
anyone who can get online.
uses of intranet

Share company updates


Store files
Connect employees
Collaborate with teams across boraders
Increase productivity
Give employees a voice in the company
Extranet

An extranet is a controlled private


network that allows access to partners,
vendors and suppliers or an authorized set
of customers – normally to a subset of the
information accessible from an
organization's intranet.
Advantages of extranets include:

The ability to exchange large volumes of


data using electronic data interchange
Sharing product data or catalogs with
business partners
Joint company collaboration and training
Sharing services such as online banking
applications among affiliated banks
Global Positioning System
(GPS)
 The Global Positioning System (GPS), originally
NAVSTAR GPS, is a satellite-based radio navigation
system owned by the United States government and
operated by the United States Space Force.
 It is one of the global navigation satellite systems
(GNSS) that provides geolocation and time
information to a GPS receiver anywhere on or near
the Earth where there is an unobstructed line of sight
to four or more GPS satellites.
 Obstacles such as mountains and buildings block the
relatively weak GPS signals.
GPS cont.
 The GPS does not require the user to transmit any
data, and it operates independently of any
telephonic or internet reception, though these
technologies can enhance the usefulness of the
GPS positioning information.
 The GPS provides critical positioning capabilities
to military, civil, and commercial users around
the world. The United States government created
the system, maintains it, and makes it freely
accessible to anyone with a GPS receiver.
GPS cont.
The GPS project was started by the U.S.
Department of Defense in 1973, with the
first prototype spacecraft launched in
1978 and the full constellation of 24
satellites operational in 1993. Originally
limited to use by the United States
military, civilian use was allowed from
the 1980s following an executive order
from President Ronald Reagan
General Packet Radio Service (GPRS)
General Packet Radio Service (GPRS) is a
packet oriented mobile data standard on the
2G and 3G cellular communication network's
global system for mobile communications
(GSM). GPRS was established by European
Telecommunications Standards Institute
(ETSI) in response to the earlier CDPD and
i-mode packet-switched cellular
technologies. It is now maintained by the 3rd
Generation Partnership Project (3GPP).

You might also like