Presentation is loading. Please wait.

Presentation is loading. Please wait.

COMP101-COMPUTER SKILLS Chapter 5 Introduction to the Internet

Similar presentations


Presentation on theme: "COMP101-COMPUTER SKILLS Chapter 5 Introduction to the Internet"— Presentation transcript:

1 COMP101-COMPUTER SKILLS Chapter 5 Introduction to the Internet

2 Introduction to the Internet Types of Internet Connections
Course Contents Introduction to the Internet Types of Internet Connections Web Browsers Internet Advantages and Disadvantages Things on Internet Internet Communication Internet Ethics & Internet Threats Internet security

3 Introduction to the Internet
Internet refers to network of networks. In this network each computer is recognized by a globally unique address known as IP address. Internet is defined as an Information super Highway, to access information over the web.

4 Introduction to the Internet
Development The concept of Internet was originated in 1969. The origin of Internet devised from the concept of Advanced Research Project Agency Network (ARPANET). ARPANET was developed by United States Department of Defense.

5 Introduction to the Internet
WWW (World Wide Web) The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. The Web uses the HTTP protocol to transmit data. Web documents contain graphics, sounds, text and video.

6 Introduction to the Internet
Internet Service Providers (ISP) Internet Service Provider (ISP) is a company offering access to internet. Such as, Omantel and Ooredoo ISP can provide different methods for Internet connections with different characteristics and different costs.

7 Internet Service Providers (ISP)
They offer various services: Internet Access Domain name registration Dial-up access Leased line access

8 Introduction to the Internet
How to Connect to Internet Figure 5.1 Connect to Internet

9 Types of Internet Connections
Dial-Up. DSL ADSL SDSL Wireless. Satellite.

10 Dial-up Dial up connections are the oldest, most out of date connections still available today. They are incredibly slow, unreliable, take up your phone line, and they make the very loud and annoying dial up sound when connecting to the internet. The only real benefit of a dial up connection is that it is reasonably priced .

11 DSL DSL stands for Digital Subscriber Line.
In a DSL connection you are using a 2 way phone line to connect to the internet, without disturbing your phone. DSL is the most common form of home internet connection today, and is also very popular for small businesses. The two basic common types of DSL are ADSL and SDSL.

12 Introduction to the Internet
Figure 5.4 Access Internet DSL connection

13 ADSL and SDSL ADSL is abbreviation of Asymmetric Digital Subscribers Line. Its distinguishing characteristic is that the upload and download speeds are different. Usually the download speed is faster than the upload speed. SDSL stands for symmetric DSL, and its distinguishing characteristic is that the upload and download speeds are the same.

14 Types of Internet Connections
Satellite Internet Connection Satellite Internet connection offers high speed connection to the internet. Satellite Internet connection can help you obtain high-speed Internet if you live in rural areas where cable, DSL, ADSL and fiber-optic Internet are not available.

15 Types of Internet Connections
Figure 5.6 Access Internet satellite connection

16 Wireless Wireless internet is like satellite, however instead of using a satellite orbiting the earth you are using cell phone towers to connect to the internet. This is a little bit faster and cheaper than satellite (generally). It is slightly less convenient; coverage not available everywhere. It is still slower and more expensive than DSL.

17 Web Browser Is the application program used to open any website.
Govern with TCP/IP set of protocols. Examples Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera, Apple Safari.

18 TCP/IP Transmission Control Protocol/Internet Protocol.
TCP/IP is a set of rules (protocols) governing communications among all computers on the Internet. More specifically, TCP/IP dictates how information should be packaged (turned into bundles of information called packets), sent, and received, as well as how to get to its destination.

19 HTTP HTTP - Hyper Text Transfer Protocol
HTTP is a communication protocol. It defines mechanism for communication between (clients) browser and the web server. The communication between browser and server takes place in request and response pairs.

20 Web Address Domain Names or Web Site addresses are composed of the following parts: The Protocol: e.g. http followed by (:) and (//). WWW: This means that this address is a World Wide Web address. Domain Name: the name or the abbreviation of the registered Organization or, may be, the person who are registered to get a web address.

21 Domain Name  Domain names are used to identify one or more IP addresses. Domain Name System helps to resolve the host name to an address. For example : the domain name is unizwa.edu.om

22 Domain Name (continue)
Every domain name has a suffix that indicates which top level domain (TLD) it belongs to.   Top level domain (TLD)  Purpose .gov  Government Agencies .edu Educational Institutions .org  Organizations (nonprofit) .mil Military .com Commercial Business .net  Network Organizations Info Informative Internet Resources Table 5.2 Top level domain (TLD)

23 Domain Name (continue)
Different countries use different suffixes, usually two letters. Abbreviation for Country Country Name .om Oman .ae United Arab Emirates .qa Qatar .kw Kuwait .bh Bahrain .iq Iraq .in India .uk United Kingdom Table 5.3 country domain

24 URL Uniform Resource Locator (URL) refers to a web address which uniquely identifies a document over the internet. The first part of the URL is called a protocol identifier and it indicates what protocol to use. The second part is called a resource name and it specifies the IP address or the domain name where the resource is located. Example -

25 Internet Advantages Faster Communication - Technology
Information Resources Education Entertainment for Everyone Social Networking and Staying Connected Online Services and E-commerce

26 Internet Disadvantages
Theft of Personal information Spamming Malware Threats / Virus threat CyberCrime

27 Things on Internet Internet Services allows us to access huge amount of information such as text, graphics, sound and software over the internet. Communication Services  Information Services  Web Services  WWW-(World Wide Web) Services 

28 Things on Internet E-mail (Electronic Mail)
is an extremely popular method of electronic communication.  It offers an efficient, inexpensive and real time mean of distributing information among people. Every mail box has a unique name referred to as account/address. The most popular domains that provide service are Yahoo, Gmail and Hotmail.

29 Website Website is a location on web and is hosted on a web server.
It is a set of related web pages. It is accessed using Internet address known as Uniform Resource Locator.

30 Website (continue) Static Websites Dynamic Websites
Contain only static information. User can only read the information but can’t do any modification or interact with the information. Dynamic Websites It is possible to change a portion of a web page without loading the entire web page. It’s require server application language like PHP , Asp.NET, JSP etc.

31 Downloading and Uploading Files
To upload can refer to the sending of data from a local system to a remote system such as a server or another client. To download means to receive data to a local system from a remote system. Example : box, YouTube Downloader, uTorrent

32 Internet Communication
Internet communication refers to the number of different ways people can communicate over the World Wide Web.  It includes chat rooms, , instant messaging, forums, social networking sites and voice over IP

33 Internet Communication
The Business Value of Social Media Developing social networks through the use of social media adds value to businesses. In the past, organizations relied on sales people, customer support and public relations to build their social capital.

34 Social Networking Alternatively referred to as a virtual community.
A social networking website that brings people together to talk, share ideas and interests, or make new friends. This type of collaboration and sharing of data is often referred to as social media. Example: Facebook, Twitter.

35 Facebook Facebook is a social networking site that connects users to friends, family, co-workers, groups and businesses. Users create profiles and develop a network in which they can exchange information, share thoughts, photos, news stories and much more.

36 Twitter Twitter is an online social networking service that enables users to send and read short 140-character messages called "tweets". Registered users can read and post tweets, but those who are unregistered can only read them.

37 Internet Communication
Social Networking Chat allows for real-time interactive conversations over the Internet. Chat allows groups of people to communicate. Instant Messaging (IM) is a type of chat service that allows participants to create private channels. Example: Yahoo! Messenger, MSN Messenger and AOL Instant Messenger. Skype, Whatapps, IMO, Viber, Wechat, LINE.

38 Blogs Blogs (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption. It is a kind of web site that is updated regularly, with content about almost anything. Blogs generally represent the personality of the author or reflect the purpose of the Web site that hosts the blog. Blog is a Content Management System (CMS), an easy way of publishing articles on the internet.

39 Web search engine A web search engine is a software system that is designed to search for information on the World Wide Web. The information may be a mix of web pages, images, and other types of files. General search engine - Bing, Google, Yahoo! Metasearch search engine - Blingo, WebCrawler, DeeperWeb. Education search engine - Noodle Education, Google Scholar.

40 Internet Ethics & Internet Threats
Internet privacy Internet privacy is the privacy and security level of personal data published via the Internet. Is the ability to control what information you would accept to be revealed about yourself over the Internet, and control who can access that information.

41 Internet Ethics & Internet Threats
Internet privacy Your personal can be used by third parties without your knowledge. Without you knowledge, third parties can track the websites you have visited.

42 Internet Ethics & Internet Threats
Internet privacy risks The Internet represents an insecure channel for exchanging information, leading to a high risk of Intrusion or Phishing.  Threats A web threat is any threat that uses the World Wide Web to facilitate cybercrime. Web threats use multiple types of malware and fraud.

43 Internet Ethics & Internet Threats
Intrusion Breaking into computers and computer networks, either for profit or just a challenge. Phishing An Internet hacking activity used to steal secure user data, including username, password, bank account number, security PIN or credit card number.

44 Internet Ethics & Internet Threats
Pharming An Internet hacking activity used to redirect a legitimate website visitor to a different IP address. Spyware An offline application that obtains data without a user's consent. When the computer is online, previously acquired data is sent to the spyware source.

45 Internet Ethics & Internet Threats
Malware An application used to illegally damage online and offline computer users through Trojans, viruses and spyware. Viruses Small pieces of software that attach themselves to a real program.  Worms Are self-replicating computer programs.

46 Internet Ethics & Internet Threats
Trojan horses Harmful piece of software that looks legitimate. Adware Software package, which automatically plays, or displays advertisements to a computer. Spam Spam may be defined as unwanted s. Spam is usually considered to be electronic junk mail or junk newsgroup postings.

47 Internet security Internet security
Internet security relies on specific resources and standards for protecting data that gets sent through the Internet. It helps to safeguard data. Internet privacy violation risks may be minimized, as follows: Always use preventative software applications, such as anti-virus, anti-malware, anti-spam and firewalls. Avoid shopping on unreliable websites. Avoid exposing personal data on websites with lower security levels. Clear the browser's cache and browsing history on a consistent basis. Always use very strong passwords consisting of letters, numerals and special characters.

48 Internet security Internet security : Methods to Protect the Transfer of Data Encryption: Is the process of transforming original information into unreadable data before sending through the Internet. Usually encrypted web pages are identified by “https” instead of “http” for the protocol in their web address starter. Firewall: It is hardware or software that controls the access between networks. It is usually used as a shield between private networks and the Internet. All the messages whether incoming or outgoing must pass through the firewall, and only authorized traffic is allowed. 

49 Internet security Antivirus Programs
Antivirus Programs and Internet Security Programs are also useful in protecting computer. Examples: Bitdefender Internet Security Kaspersky Internet Security McAfee Internet Security Norton Internet Security with Backup Avira Internet Security Suite


Download ppt "COMP101-COMPUTER SKILLS Chapter 5 Introduction to the Internet"

Similar presentations


Ads by Google