0% found this document useful (0 votes)
5 views

INTERNET-AND-WORLD-WIDE-WEB

The document provides an overview of the Internet and World Wide Web, including definitions of key terms, how to connect to the Internet, and the importance of web addresses and browsers. It also discusses safe internet practices, the dangers of fake news, and email etiquette. The lesson aims to equip readers with essential knowledge for navigating the online world safely and effectively.

Uploaded by

raven dalimpapas
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

INTERNET-AND-WORLD-WIDE-WEB

The document provides an overview of the Internet and World Wide Web, including definitions of key terms, how to connect to the Internet, and the importance of web addresses and browsers. It also discusses safe internet practices, the dangers of fake news, and email etiquette. The lesson aims to equip readers with essential knowledge for navigating the online world safely and effectively.

Uploaded by

raven dalimpapas
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

INTERNET AND WORLD WIDE

WEB
MARISSA G. FLORES
OBJECTIVES:
At the end of this lesson, you should be able to:
▪ Identify what the Internet is;
▪ Understand different terminologies of the internet;
▪ Understand the World Wide Web;
▪ Define what is web addresses and address bar;
▪ Understand the browsing and searching;
▪ Define different searching techniques;
▪ Identify social issues, fake news, and types of threats;
▪ Understand safe email and internet use;
▪ Understand the etiquette for e-mails.
INTERNET
 The internet is the world’s largest
WAN and is made up of various
nodes that connect via
communication media all over the
world.
 This allows all nodes to connect and
communicate with one another.
 It also allows for various services,
such as the World Wide Web and
email to be hosted over or work on
the internet.
INTERNET ADDRESS
 Each day there are over a billion emails and search
requests sent over the internet. But how does the data
know where to go? How do we make sure that the data
goes to the intended receiver and the correct
destination?
 Every computing device that is connected to the
internet receives a unique address, much like your
street address.
 This address is called, an internet protocol address or IP
address. Whenever a message is sent over the network, it is
sent to a device’s IP address. The most common type of IP
address is known as an IPv4 (Internet Protocol Version 4)
in which each number can range between 0 and 255, and is
be represented by 1 byte (or 8 bits) of information. The IP
address is made up of four sets of these numbers, separated
by dots.
INTERNET CONNECTION
 In order to connect to the internet, you need to have an
internet service provider (ISP).
 The ISP will charge you a fee and in return, permit your
device to use their network to connect to the internet.
Most ISPs may also offer to help clients setup internet
services connections as part of their service offering.
INTERNET SERVICE PROVIDERS (ISPS):
WIRED AND WIRELESS CONNECTIONS
 ISPs can provide you with either a wired or a wireless
connection to the internet. In most cases, your ISP will
provide you with the hardware you need to connect to
the internet. However, if this is not part of their service
offering, you will need to ensure you have the following
hardware equipment:
 a computing device
 the internet connection channel
 an internet communication device.
INTERNET SERVICE PROVIDERS (ISPS):
WIRED AND WIRELESS CONNECTIONS

 The table below summarises the hardware needed for


the different types of internet.

Equipment needed for the different types of internet


THE WORLD WIDE WEB
 The World Wide Web (WWW) is a collection of websites
that you can browse or access through the internet
using a web browser.
 If you think about the IP address as a company’s
physical address, a website on the WWW will be that
part of the company that customers can see.
WEB ADDRESSES AND THE ADDRESS BAR
 Each webpage on the internet has its
very own address called a uniform
resource locator (URL), which indicates
to the internet exactly what page you
want to see on a website.
 When you type a URL in the address bar
of the web browser and press ENTER,
the browser will take you to that specific
page. For example, in the figure below,
we typed www.sars.gov.za in the
address bar, which then loaded the
South African Revenue Services (SARS)
webpage.
WEB ADDRESSES AND THE ADDRESS BAR
 Each segment in a URL is a part that makes up the web
address.
 The domain name is the most important part of an
internet address. This could be a word or a phrase that
an internet site has identified as the name of the
website. People use it to find information on the
internet, for example, businesses use it to get people to
visit their websites.
 http://www.sars.gov.za/ClientSegments/Individuals/
How-Send-Return/
WEB ADDRESSES AND THE ADDRESS BAR

The different parts of a URL


WEB ADDRESSES AND THE ADDRESS BAR
 A webpage is a single page of a website. Hypertext
mark-up language (HTML) is a type of coding language
used on a webpage that enables the display of text,
multi-media and other interactive content.
 The web browser is a piece of software that can interpret
the HTML code and display the content as we see it on a
webpage.
 A website consists of a collection of many of these HTML-
coded webpages that are connected together. When you
have accessed a secure website you will see that the
http prefix has changed to https.
Browsing and searching
 A browser is an application designed specifically to
access and display webpages, including the webpage's
content such as text, images and videos.
 EXAMPLES OF WEB BROWSERS
The five most popular web browsers are:
 Google Chrome
 Mozilla Firefox
 Microsoft internet Explorer
 Microsoft Edge
 Apple Safari.
ACCESSING A WEB BROWSER
 In order to open your web browser, select your web
browser icon (Any of the listed browsers). Once your
browser is open, you need to decide which website you
would like to visit. This is done by either:
 browsing to the correct website
 searching for the correct website.
BROWSING
 When you browse a website, you need to know its unique
web address (such as https://en.wikipedia.org for the
Wikipedia website). Once you know the address, you can
visit the website as follows:
Step 1: Open your web browser.
Step 2: Enter the website’s address or URL in the address bar
at the top of your browser.
Step 3: As soon as you press Enter, the webpage should begin
to load.
Step 4: Once loaded, you can browse the website by clicking
on buttons, links or following the instructions on the page.
SEARCH ENGINES
 Searching: you may want to search the internet for
specific answers or try to find new, interesting websites
to explore. To do this, you can use a search engine to
find the information you are looking for.
 Two popular search engines are:
 Google (www.google.com)
 Microsoft Bing (www.bing.com)
SEARCH ENGINES
 Google is the most popular,
powerful and easy-to-use search
engine of the two. In fact,
Google’s search engine has
become so well known that ‘to
Google something’ has become
a verb that means to search for
something. In future, if someone
asks you a question that you do Google is the most popular search
not know the answer to, you can engine in the world

tell them to just ‘Google it’.


SEARCH ENGINES
 Microsoft’s Bing search engine is also a very popular
English search engine and this is all thanks to its
integration with Microsoft Windows.
 In order to search for information on the internet, enter
the search engine’s address in your address bar. Once the
search engine loads, there will be a space on the page for
you to enter your search criteria. For example, if you want
to find a website to teach you how to play the guitar, you
may search for the phrase ‘learn to play guitar’ and press
Enter.
SEARCH TECHNIQUES
 Search engines search through billions of webpages
stored on hundreds of millions of websites to ñd
information matching your search. Most search engines
try to place the best options near the top of the search
results, with the results becoming worse as you move
to the second and third pages.

 Since the first search results are usually the best, if you
do not find what you are looking for on the first page or
two of the results, you should try a different search
phrase or try to use an advanced search technique.
SEARCH TECHNIQUES
SOCIAL ISSUES
 We use computers and smartphones to do
just about anything. This ranges from
transferring money through online banking to
getting ID documents and passports.
 As a result, if someone can gain access to a
person’s computer and password, they can
gain access to their bank account, identity
and their photos. They can also use their
computer to send spam emails and add
unwanted advertisements. Because of this,
computer users need to understand the
basics of computer malware (malicious
software) and know how to use computers
and the internet safely.
FAKE NEWS
 Never react to any news until you have checked it against
at least one other reputable news site, and remember to
never share fake news, not even as a joke!
 False news stories, which are often of a sensational nature,
are created to be widely shared online for the purpose of
generating ad revenue via web traffic or discrediting a
public figure, a political movement, a company, a fringe
organisation and so forth. In order to spot fake news, you
need to understand what real news looks and sounds like.
 Getting into the habit of visiting trustworthy news sites is
one way to become familiar with real news.
TYPES OF THREATS
 Not all types of computer threats work in the same way
or have the same goals. The table below lists some of
the most common threats in the world today, as well as
the best way to avoid them.
TYPES OF THREATS
TYPES OF THREATS
SAFE EMAIL AND INTERNET USE
 In order to avoid threats, computer experts suggest
following these guidelines:
 use a secure password
 pay careful attention to the websites and links you open
 do not share your sensitive information unnecessarily
 do not open suspicious emails.
ETIQUETTE FOR E-MAILS
 Netiquette is short for network and e-mail etiquette. Netiquette refers to the
use of good manners when communicating electronically or when using the
internet, whether it is in the workplace or on a personal level. This includes
respecting other people’s privacy.
 Look at the following guidelines to practice good netiquette:
 Messages: Do not spam people at work, your friends or family with unwanted
e-mail messages or chain e-mails. Spam is unwanted or irrelevant messages
that are sent over the internet or through e-mails.
 Concise: Make sure that when writing e-mails, it is clear and to the point. Also
make sure that it does not contain spelling and grammatical errors.
 Subject line: Make sure the subject line is clear so that the recipient knows
what the e-mail is about.
 Identify yourself: Always say who and what you are at the beginning of the e-
mail and add your signature at the end of the mail.
ETIQUETTE FOR E-MAILS
 Action required: Let the recipient know right away if any action is required from their side. You
can do that by marking e-mails that do not require any action with FYI in the subject line.
 Capital letters: Do not type e-mails in capital letters as it gives the recipient the idea that you are
shouting.
 Exclamation marks: Avoid using exclamation marks or use them sparingly. The use of
exclamation marks sends a message to the recipient that you are demanding.
 Large attachments: Compress large files before sending them. This helps the recipient to save
time instead of waiting for a long time to download files. You can always ZIP or compress files (as
learnt in Chapter 5) to make it easier to send.
 Gossip, inflammatory remarks and criticism: Avoid gossiping about others through e-mail,
especially at the workplace. Also, do not send insulting, abusive or threatening e-mails. You
cannot withdraw such an e-mail and it can easily be forwarded to unintended recipients. This
could lead to unnecessary disputes and grudges in the workplace and in your personal
environment.
 Focus on what is in the e-mail: Make sure that you read the e-mail properly and address the
sender’s questions.
 Proofread the text: Before sending the e-mail, read through it again to make sure that it is saying
what you want it to say and that there are no spelling and grammar mistakes.
Quote of the Day

You might also like