INTERNET-AND-WORLD-WIDE-WEB
INTERNET-AND-WORLD-WIDE-WEB
WEB
MARISSA G. FLORES
OBJECTIVES:
At the end of this lesson, you should be able to:
▪ Identify what the Internet is;
▪ Understand different terminologies of the internet;
▪ Understand the World Wide Web;
▪ Define what is web addresses and address bar;
▪ Understand the browsing and searching;
▪ Define different searching techniques;
▪ Identify social issues, fake news, and types of threats;
▪ Understand safe email and internet use;
▪ Understand the etiquette for e-mails.
INTERNET
The internet is the world’s largest
WAN and is made up of various
nodes that connect via
communication media all over the
world.
This allows all nodes to connect and
communicate with one another.
It also allows for various services,
such as the World Wide Web and
email to be hosted over or work on
the internet.
INTERNET ADDRESS
Each day there are over a billion emails and search
requests sent over the internet. But how does the data
know where to go? How do we make sure that the data
goes to the intended receiver and the correct
destination?
Every computing device that is connected to the
internet receives a unique address, much like your
street address.
This address is called, an internet protocol address or IP
address. Whenever a message is sent over the network, it is
sent to a device’s IP address. The most common type of IP
address is known as an IPv4 (Internet Protocol Version 4)
in which each number can range between 0 and 255, and is
be represented by 1 byte (or 8 bits) of information. The IP
address is made up of four sets of these numbers, separated
by dots.
INTERNET CONNECTION
In order to connect to the internet, you need to have an
internet service provider (ISP).
The ISP will charge you a fee and in return, permit your
device to use their network to connect to the internet.
Most ISPs may also offer to help clients setup internet
services connections as part of their service offering.
INTERNET SERVICE PROVIDERS (ISPS):
WIRED AND WIRELESS CONNECTIONS
ISPs can provide you with either a wired or a wireless
connection to the internet. In most cases, your ISP will
provide you with the hardware you need to connect to
the internet. However, if this is not part of their service
offering, you will need to ensure you have the following
hardware equipment:
a computing device
the internet connection channel
an internet communication device.
INTERNET SERVICE PROVIDERS (ISPS):
WIRED AND WIRELESS CONNECTIONS
Since the first search results are usually the best, if you
do not find what you are looking for on the first page or
two of the results, you should try a different search
phrase or try to use an advanced search technique.
SEARCH TECHNIQUES
SOCIAL ISSUES
We use computers and smartphones to do
just about anything. This ranges from
transferring money through online banking to
getting ID documents and passports.
As a result, if someone can gain access to a
person’s computer and password, they can
gain access to their bank account, identity
and their photos. They can also use their
computer to send spam emails and add
unwanted advertisements. Because of this,
computer users need to understand the
basics of computer malware (malicious
software) and know how to use computers
and the internet safely.
FAKE NEWS
Never react to any news until you have checked it against
at least one other reputable news site, and remember to
never share fake news, not even as a joke!
False news stories, which are often of a sensational nature,
are created to be widely shared online for the purpose of
generating ad revenue via web traffic or discrediting a
public figure, a political movement, a company, a fringe
organisation and so forth. In order to spot fake news, you
need to understand what real news looks and sounds like.
Getting into the habit of visiting trustworthy news sites is
one way to become familiar with real news.
TYPES OF THREATS
Not all types of computer threats work in the same way
or have the same goals. The table below lists some of
the most common threats in the world today, as well as
the best way to avoid them.
TYPES OF THREATS
TYPES OF THREATS
SAFE EMAIL AND INTERNET USE
In order to avoid threats, computer experts suggest
following these guidelines:
use a secure password
pay careful attention to the websites and links you open
do not share your sensitive information unnecessarily
do not open suspicious emails.
ETIQUETTE FOR E-MAILS
Netiquette is short for network and e-mail etiquette. Netiquette refers to the
use of good manners when communicating electronically or when using the
internet, whether it is in the workplace or on a personal level. This includes
respecting other people’s privacy.
Look at the following guidelines to practice good netiquette:
Messages: Do not spam people at work, your friends or family with unwanted
e-mail messages or chain e-mails. Spam is unwanted or irrelevant messages
that are sent over the internet or through e-mails.
Concise: Make sure that when writing e-mails, it is clear and to the point. Also
make sure that it does not contain spelling and grammatical errors.
Subject line: Make sure the subject line is clear so that the recipient knows
what the e-mail is about.
Identify yourself: Always say who and what you are at the beginning of the e-
mail and add your signature at the end of the mail.
ETIQUETTE FOR E-MAILS
Action required: Let the recipient know right away if any action is required from their side. You
can do that by marking e-mails that do not require any action with FYI in the subject line.
Capital letters: Do not type e-mails in capital letters as it gives the recipient the idea that you are
shouting.
Exclamation marks: Avoid using exclamation marks or use them sparingly. The use of
exclamation marks sends a message to the recipient that you are demanding.
Large attachments: Compress large files before sending them. This helps the recipient to save
time instead of waiting for a long time to download files. You can always ZIP or compress files (as
learnt in Chapter 5) to make it easier to send.
Gossip, inflammatory remarks and criticism: Avoid gossiping about others through e-mail,
especially at the workplace. Also, do not send insulting, abusive or threatening e-mails. You
cannot withdraw such an e-mail and it can easily be forwarded to unintended recipients. This
could lead to unnecessary disputes and grudges in the workplace and in your personal
environment.
Focus on what is in the e-mail: Make sure that you read the e-mail properly and address the
sender’s questions.
Proofread the text: Before sending the e-mail, read through it again to make sure that it is saying
what you want it to say and that there are no spelling and grammar mistakes.
Quote of the Day