Transcript File

WWW and Internet
Communication
Compiled by G.F Kalumuna
January 2015
Introduction
• The Internet (Net) is a loose association of
thousands of networks and millions of computers
across the world that all work together to share
information. It is a global system of computers that
carries data and makes the exchange of
information possible.
• The World Wide Web is a subset of the Net. The
World Wide Web enables simple and intuitive
navigation of Internet sites through a graphical
user interface (GUI). Computers having the proper
hardware can connect to the Internet via an
Internet Service Provider (ISP).
What is the internet?
• The Internet is a worldwide system of
computers joined by a common set of
networking and software protocols.
• Each computer in this global system of
computers has its own unique address - the
Internet Protocol (IP) address.
History
The Internet (Net) launched in 1969 by
Advanced Research Project Agency Network
(ARPANET)
• ARPANET, US computer network
• Google why ARPANET was created?
What is the internet?...
• Since 1983, the Internet has grown beyond its
expectation into an increasingly commercial
and popular medium.
• By the mid-1990s the Internet connected
millions of computers throughout the world.
What is the internet?...
• We often hear the Internet referred to as the
"information superhighway" and this analogy
describes the Internet accurately.
• “Think of the Internet as a huge mass transit system
with a few main subway lines that intersect at
certain points. Connecting to the main subway lines
are commuter rails, bus lines, and ferry boats that
spread out and crisscross the area”
• The main lines carry the bulk of the traffic and are
collectively known as the Internet backbone.
• The biggest networks in the system form this
backbone, which is owned by the major Internet
Service Providers (ISPs).
Simple definition of internet
• A vast network of networked computers
covering the whole world
• Collection of various networks around the
world
What is the internet?...
WWW
• Also called the web, or www
• Introduced in 1992 in Switzerland by
the Centre for European Nuclear
Research (CERN)
What is the WWW?
• The World Wide Web (WWW) is a subset of the
Net--a collection of interlinked documents that
work together using a specific Internet protocol
called Hypertext Transfer Protocol (HTTP).
• In other words, the Internet exists independent of
the Web, but the Web can't exist without the
Internet.
• Web pages are written in Hypertext Markup
Language (HTML), which tells the Web browser
what to display.
What is the WWW?
• The significant feature of the Web is its ability
to link pages to one another. Just click a link,
and you're at a Web site on the other side of
the world.
Simple definition of WWW
• A multimedia based collection of information,
services, and web sites supported by the
Internet
Note:
• Prior to the discovery of the Web, the Internet
was all text
How do we get connected?
• Nearly anyone can connect their computer to
the Internet and immediately communicate
with other computers on the Net. With the
advent of high-speed modems for digital
communication over common phone lines and
now cable lines, many people and
organizations take advantage of the network's
advanced and global communications.
How do we get connected?...
• To get connected you need the following Two
Resources:
1. Connection to the Internet via a modem or
network connection
The most common way to get connected now a
days is through your cable line, telephone line,
modem etc ALL through Internet Service
Providers (ISPs)
2. A web browser such as Internet Explorer
Web browsers
• Web browsers are software applications that provide
access to and allow viewing of Internet resources.
• By using a web browser you can view information in
either a text-only format, using a browser such as Lynx,
or in a graphical text format using a browser such as
Internet Explorer.
• Graphics can refer to images, animations, or movies.
• Other well-known web browsers include Firefox,
Google Chrome, and Safari.
• Web browsers are primarily used to view web pages,
although most can also be used to access newsgroups
and email as well.
Movement of Information on the Internet
• Information moves from one computer to
another following a communications protocol
• A communications protocol is a set of rules
computers follow to transfer information
How does the Internet work?
• When you request or send information such as a
webpage or email, the computer breaks the request into
smaller, more manageable pieces called packets. Each of
these packets contains both the sender's Internet
address and the receiver's address. Every packet is sent
first to a gateway computer that understands a small
portion of the Internet.
• This gateway computer reads the destination address
and forwards the packet to an adjacent gateway, closer
to the packets destination, it will in turn read the
destination address and so forth across the Internet
until a gateway recognizes the packet as belonging to a
computer within its immediate neighborhood or
domain.
How does the Internet work?...
• Regardless of what operating system you use (Mac,
PC, or Unix) to connect to the Internet, the
computers all basically speak the same language,
which allows you to exchange information with
someone next door or across the planet.
• Because a message can be divided in numerous
packets, each packet may be sent by a different
route across the Internet. Because the IP just
delivers the packets, they can arrive in a different
order than the order they were sent in. The
Transmission Control Protocol (TCP) has the job of
putting them back in the right order.
How does the Internet work?...
Communications Protocol
• Transfer Control Protocol/Internet
Protocol (TCP/IP)
Basic communications protocol
for the Internet to work
• Hypertext Transfer Protocol (http)
Supports the movement of info
over the web
Hence, web site addresses start with
http
• File Transfer Protocol (FTP)
Allows the transfer of files from one
computer to another
Online Safety
• When you are connected to the internet you
enter a very public place. You need to be
cautious and minimize your personal risk
while online.
• Your computer can be exposed to various
types of computer viruses, worms, phishing
scams, hoaxes, adware, and spyware.
Why is my computer not secure? Over
the Internet
• Every time you connect to the Internet you enter a very
public space. This means what you do online may be
visible or monitored by people, such as network
administrators, that may be invisible to you.
• Also, unwanted program such as virus, worm, spyware
etc may affect your computer or system.
• Hackers (attackers), may also affect your computer or
system
• Therefore, it is very important to be responsible when
connected to the internet and minimize your personal
risk.
What is a virus?
A computer virus is a small program written to
alter the way a computer operates, without the
permission or knowledge of the user. A virus
must meet two criteria:
• It must execute itself. It will often place its own
code in the path of execution of another
program.
• It must replicate itself. For example, it may
replace other executable files with a copy of the
virus infected file. Viruses can infect desktop
computers and network servers alike.
What is a virus?...
• Some viruses are benign; however, most are malignant.
• A benign virus will do no real damage to your computer.
They simply conceal themselves and display a message of
some sort at some time. Some simply replicate and take up
resources such as disk space or CPU time.
• A malignant virus tries to inflict damage to your computer.
Malignant viruses may alter one or more of your files or
programs so that they do not work properly. The virus may
also cause programs to terminate abnormally, cause
incorrect information to be written to your documents,
alter directory information, delete files, or even erase your
entire hard disk.
What is a virus?...
• Specifically, a computer virus is a threat to the
security and integrity of your computer
system which could cause the loss or
alteration of programs and data and can
spread from program to program, computer to
computer, or system to system without direct
human intervention or even intention.
What is a worm?
• Worms are programs that replicate
themselves from system to system without
the use of a host file. This is in contrast to
viruses, which requires the spreading of an
infected host file. A worm only depends on
active network connections.
What is a Trojan Horse?
• Trojan Horses are impostors--files that claim to be
something desirable but, in fact, are malicious. A
very important distinction between Trojan horse
programs and true viruses is that they do not
replicate themselves. Trojans contain malicious
code that when triggered cause loss, or even
theft, of data. For a Trojan horse to spread, you
must, invite these programs onto your
computers--for example, by opening an email
attachment or downloading and running a file
from the Internet. The PWSteal.Trojan is a Trojan.
How do I protect my computer from
viruses?
There is no absolute protection to prevent computer viruses entirely,
but protection is necessary to limit the chance of an infection. Some
ways to protect your computer are:
–
–
–
–
–
–
–
–
–
Implement safe computing practices.
Use up-to-date antivirus software.
Have clean, up-to-date backups of all your important data.
Have a clean, and fairly new boot diskette.
Scan all removable media, downloads, and email attachments; always
scan any new files before executing them.
Take removable media out of the computer when finished with them
and especially before starting or restarting the computer.
Don't let your email system automatically open documents or execute
file attachments.
Don't use illegal software, since they have a higher chance of being
infected than legitimate commercial or shareware software.
Make sure anyone who uses your computer also follows your safe
computing practices.
How do I protect my computer from
viruses?...
• The most effective way to protect your computer is to
install antivirus software on to your computer. Symantec
Norton Antivirus, Dr. Solomon's Anti-Virus, or McAfee
Virus Scan, are just a few antivirus software applications
which find virus infections and can automatically contain
or delete them. You need to update your computer’s
virus definitions to help protect your computer from
viruses. Virus definitions are files that provide
information to antivirus software to find and repair
viruses. Since new viruses are created all the time it is
crucial that you keep your virus definitions up-to-date.
Simply installing virus protection and never updating the
virus definitions will not protect your computer.
How do I protect my computer from
viruses?...
• Virus definitions must be kept up to date since
viruses are constantly changing. Please update as
often as possible. You must be online to complete
the following steps.
1. Open your anti-virus software client from your
programs menu, or by double clicking on the icon
at the bottom right hand corner of your screen.
– For Symantec Anti-Virus, double click on the gold
shield.
How do I protect my computer from
viruses?...
2. Check the date for the virus definitions. The
date should be recent. Click on the Update
button and follow the on screen instructions
to complete the install.
– For Symantec anti-virus, click on the Live Update
button and click on Next until the update finishes.
*You may have to close the window and reopen
for the Version date to refresh.
How do I protect my computer from
viruses?...
What is Phishing?
• Phishing is an attempt to get you to reveal logins,
passwords, account numbers and other personal
information. Phishers send an email or pop-up message
that claims to be from a business or organization that you
deal with - for example, your Internet service provider
(ISP), bank, credit card company, online payment service
(such as PayPal), or even a government agency. The
message usually says that you need to "update" or
"validate" your account information. It might threaten
some dire consequence if you do not respond. The
message directs you to a Web site that looks just like a
legitimate organization's site, but it is not. The purpose of
the bogus site is to trick you into divulging your personal
information so the phishers can steal your personal
information.
How do I respond to a phishing
attempt?
• If you get an email or pop-up message that asks
for personal or financial information, do not reply
or click on the link in the message. Legitimate
companies do not ask for this information via
email. If you are concerned about your account,
contact the organization in the email using a
telephone number you know to be genuine, or
open a new Internet browser session and type in
the company's correct Web address. In any case,
do not cut and paste the link in the message.
What is a Hoax?
• Hoaxes usually arrive in the form of an email.
Please disregard the hoax emails - they contain
bogus warnings usually intent only on frightening
or misleading users. The best course of action is
to merely delete these hoax emails. Although it is
possible to be emailed an infected executable file
or document containing a macro virus, by simply
reading your email, you will not get a computer
virus. You would have to open the file attachment
to actually get a virus. Therefore, precautions
should be taken when dealing with such
attachments.
What are Adware and Spyware?
• Adware is unwanted advertising banners, popups, pop-unders, etc. in your web browser.
Spyware is a catchall term for several types of
malicious software. The consequences of a
moderate to severe spyware infection (privacy
issues aside) generally include a substantial loss
of system performance and major stability issues
(crashes and hangs). Spyware consists of
computer software that gathers information
about a computer user without the user’s
knowledge or informed consent, and then
transmits this information to an external entity.
What are Adware and Spyware?...
How does it get onto your computer?
• It often arrives attached to other software that you
intentionally install. Many ‘freeware’ and ‘Shareware’
programs that you download over the net include from
one to several parasite programs that will silently
install themselves as you install the software that you
actually wanted. Some may also arrive through email.
Unlike viruses, these usually announce themselves.
Many install themselves on your system when you
simply visit a web site that hosts them. These are know
as ‘Drive-by Installations’.
Surfing the WWW
Introduction
• With the knowledge you now have about the
Internet and the WWW, you can utilize this
knowledge to find valuable and not so valuable
information on the web. The fastest way to find
information is to use a search engine. In this
lesson, we will discuss navigating the WWW,
using search engines, downloading plug-ins, and
most importantly protecting your computer from
viruses.
How do I navigate the WWW?
• Every computer connected to the Internet has its own
unique address: a number whose format is defined by
the Internet Protocol (IP), which is the standard that
defines how messages are passed from one machine to
another and how each connected computer is
addressed on the Internet. Each item on a computer
such as a web page has its own unique address as well,
called the Uniform Resource Locator (URL). Think of it
as a web address. Every web page on the Internet has a
unique URL address that identifies the location of that
page on a server. For example, a web page address may
look like the following:
How do I navigate the WWW?...
How do I navigate the WWW?...
• HTTP: The first part of the address (http) is the
protocol. The protocol identifies a manner for
interpreting transmitted computer
information. Internet web pages
use http (Hypertext Transfer Protocol). Web
pages can be exchanged over the Internet
because web browsers (which read the pages)
and Web servers (which store and serve the
pages) both understand HTTP.
How do I navigate the WWW?...
•
•
•
•
There are also other various types of protocols
you need to be familiar with. These are:
ftp (File Transfer Protocol) - used to transfer
files to another computer via the Internet.
news - used by Usenet newsgroups.
telnet - used to login to other computers.
mailto - used to send email.
How do I navigate the WWW?...
• WWW is the hostname. The hostname combined with
the domain name specifies the computer your are
connected to. Another example of a host name would
be "library" in the following URL
address: http://library.stedwards.edu/
• stedwards.edu is the domain name. Understanding the
parts of the domain name is helpful in deciphering
what type of web page you will be viewing. The
domain in this example is stedwards.edu.
This can be broken down into smaller parts:
– stedwards - is the second-level domain.
– edu - is the top level domain.
How do I navigate the WWW?...
• stedwards - is the second-level domain.
• edu - is the top level domain.
The last part of the URL is the pathname. The pathname
identifies the location of the web page on the server. This
usually consists of one or more folder names followed by
a file name with a file extension, such as html. In the
existing example, the following is the pathname where
the web page is located:
it_dept/competency/index.html
How do I navigate the WWW?...
• An URL is case sensitive, except for the host
and domain name. This means that the
pathname and filename of the URL address
have to be typed in exactly the way it is
shown. When a URL is spoken, unless the
person specifies, then it is usually all in lower
case.
Using Hyperlinks
• The simplest way to navigate the web is to click on links,
technically known as hyperlinks. Links are the connectors
which one document automatically references other
documents, located anywhere around the world. They are
usually text or images that have a specific URL address
associated with them, which makes them a connector to
another web page. For example, on the St. Edward's home
page, it has links to the Library, Site Index, and the
Welcome statement. We can tell they are links because
when you move your mouse pointer over the words, it is
transformed from an arrow to a "pointing hand.“
• Once you click on one of these links, say the Library link,
the SEU library web page will appear on your screen.
Search Engines
• Search engines can be very powerful tools
when gathering information for research
projects, listings for local movies, or
businesses.
• Many of you have probably already used a
search engine, whether you realize it or not.
• You may use search engine to find information
for research projects, reports, dissertation,
thesis etc.
Search Engines...
• Below is a table that consists of many helpful
sites that contain search engines. You can use
many of these search engines to help you in
your everyday life.
Search Engines...
No
Site
URL
Description
1
Alta Vista
http://altavista.com
Search engine
2
Ask Jeeves
http://www.ask.com/
Allows you to enter search
in spoken language
3
Dog Pile
http://www.dogpile.com/
Search engine
4
Google
http://www.google.com
Search engine
5
Yahoo
http://www.yahoo.com
Search engine: listing in
categories
Search Tips and techniques
• Use only lower case letters to enter your search criteria.
• Use quotation marks to search for an exact phrase. For example, to search
for articles on Edgar Allen Poe, enter "Edgar Allen Poe" into the text box. If
you entered just his full name without the quotation marks, you will find
every page with Edgar or Allen or Poe in the title. That will be a much
larger group of entries to sift through to the find information you need.
• Be as descriptive as possible. For example, try using “19th century tables”
instead of old furniture.
• Including and excluding words. Use a plus (+) sign in front of a word to
require that the word appear in the results. Use a minus (-) sign in front of
a word to exclude it from the results. For example, you want to search on
all trucks except Ford, try: trucks –Ford
• Use of the words Either/Or should be in all caps. For example, search for:
Colorado skiing OR snowboarding
• Use of AND, OR & ANDNOT (all in capital letters)
Boolen Operators
• Use of AND, OR & ANDNOT (all in capital
letters)
• +, • Discuss why Boolean operator important in
searching information via search engine?
Keywords
• Discuss what is Keyword used in search
engines? Why the use of keyword important
in searching information?
Boolean Operators and KEYWORDS
• Discuss how will you use Boolen operators and
Keywords to find what you want from the
search engine?
Credibility of Internet Information
Authority
Look for authors’
qualifications and
affiliation
Cf The domain name
• com - commercial
• edu – Educational
institution
• org – organisation
• Gov/go- government
Accuracy
• Error free content
• Motive for the site
Objectivity
• Any element of bias
Currency
• Date of publication
• Date of revision
• Up to date links
Usability
• User friendly, layout
Importance of the Internet
Communication
• Via telephones, emails, mobile phones
• Discussion forums
• Chat rooms
• Chat, emailing etc
Buying and Selling Goods
• Known as electronic commerce (e-commerce)
• Via cheques, credit cards or electronic
cash
Searching for information
• Access libraries, latest news
Entertainment
• Access movies, music, magazines & computer
games
Education
• Also known as e-learning, online learning,
virtual learning etc
• Take classes in any subject
Uses of Internet in education
• Discuss the uses of internet in education
• Discuss the uses of internet in classroom
situation
• Discuss the uses of internet in school
Social media
• Define what is social media?
Type of social media
• Mention type of social media?
Characteristics of social media
• Mention characteristics of social media?
Question on social media
• Why social media important in education
setting?
Email
Introduction
• The information covered in this first lesson will familiarize
you with some common vocabulary and will give you a
general idea about email. In order to send and receive
email, you must have a computer with a connection to the
Internet and an email application.
• Also, this lesson will give you an understanding of how
client-based and web-based email function along with the
differences between them. The advantages and
disadvantages of each will also be discussed. After this
lesson you will have an understanding of when client based
and/or Web-based email is your best selection for using
email.
Email Overview
• When you type a message in an email
program (such as Eudora or WebMail) and hit
Send, the electronic signal travels over the
network or modem connection to the mail
server. The mail server then relays the
electronic signal out onto the Internet.
Email Overview...
• The Internet, sometimes called simply "the Net," is a
worldwide system of computer networks. Information
(such as your email message) is broken into pieces-or
packets-which make it easier and faster to transmit.
The number of packets that a single message may
break into depends on the amount of electronic traffic
on the Internet at that time. The email message you
sent is reassembled once it reaches the destination
mail server. Mail servers are set up for each domain
name on a computer network. The servers are the
computers that store your mail messages until they are
retrieved, read and deleted by an e-mail application.
Email Overview...
• The image below gives you a general idea of
how this happens.
Email Overview...
•
•
•
•
•
A user at Computer A generates an email.
The email is broken into four packets.
Two of the packets are routed to Computer B.
The other two packets are routed to Computer C.
Computers B and C route the packets to
Computer D.
• Computer D is the final destination computer.
• The email message is reassembled and read by
the recipient.
Parts of an Email Address
• Every email user on the Internet has a unique
e-mail address that identifies an electronic
post office box on a network where e-mail can
be sent. Different types of networks have
different formats for e-mail addresses. On the
Internet, all e-mail addresses have a similar
form. All addresses must have a user name
and a domain.
Parts of an Email Address...
• For example, an email address at IAE might look like this:
• [email protected] (username@domain)
• The first part of the address <info> is also known as the
user name. This is the unique name recognized by the mail
server.
• The @ symbol separates the unique user name from the
domain. The domain in this case is iae.org. The domain
name may also be broken down into parts. Understanding
the parts of the domain name is helpful in deciphering the
origin of an email address.
• The mail server at IAE for all departments, staff, and
students may be <iae>. (please go and check the actual
email of IAE in the official site!) what is that email??____
Parts of an Email Address...
• The last part of the address, <org>, is the top-level
domain (TLD) in the hierarchical Domain Name System.
Examples of top-level domains include:
–
–
–
–
–
–
–
gov - Government agencies
edu - Educational institutions
org - Organizations (nonprofit)
mil - Military
com - Commercial business
net - Network organizations
ca - Canada or th - Thailand - both of these are examples
of country domains.
Parts of an Email Message
• Email messages, like other forms of
correspondence, have the same general format
regardless of the email program you choose.
– The To: field is required in all email messages to alert the mail server
to the message's destination.
– The From: field will give the recipient of the email an idea whom the
message is from.
– The Cc: field allows you to send the same message to multiple
recipients. When you send a Cc: message, all recipients are aware of
who received copies of the message. Cc: stands for carbon copy and is
a holdover from the days when letters were typed with carbon paper
between the pages to create identical letters for multiple recipients.
– The Bcc: field allows you to send an identical message to multiple
recipients, however, those recipients whose addresses appear in the
BCC: field cannot be seen by the other recipients.
Parts of an Email Message...
• Almost all email messages have a subject line.
In most email applications, the only
information a recipient will see about a
message is whom it is from, when, and what
the subject is. Subject lines are a good idea as
a courtesy to those reading your messages
and also to help the recipient focus on the
topic of your message.
Parts of an Email Message...
• At the end of a message, you may see a block of
information such as name, title, business address, phone
numbers, web addresses, and sometimes even quotes from
famous (or infamous) people. This block of information can
be inserted in a standardized format (so you do not have to
type it every time you mail a message) by using a signature
file (also known as a .sig file). The block of information is
known as the sig line or signature line. Keep in mind that
some email applications do not receive these blocks of text
exactly how you formatted them.
• It is also a good idea to use a signature file sparingly. If you
are sending jokes to your family members, it is not
necessary to send them the contents of your business card
at the end of the message.
Sending and Receiving Mail
• To send an email message using an email
application, such as WebMail or Eudora, you
need to complete the following steps:
– Specify the recipient's address.
– Enter a subject line for your message.
– Type your message. Most e-mail systems include a
rudimentary text editor for composing messages, but
many allow you to edit your messages using any
editor you want.
– You then send the message to the recipient
Sending and Receiving Mail..
• Sent messages are stored in electronic mailboxes, on a
computer designated as a mail server, until the
recipient connects to the Internet and instructs their
email program to retrieve the incoming messages from
the mail server. To see if you have any mail, you may
have to check your electronic mailbox periodically,
although many systems alert you when mail is
received.
• To retrieve your mail from any email system, you must
be able to access the mail server. As you have learned,
you may have one primary domain name at IAE. The
domain name may be, iae.org, (please check the actual
one in the official site), what??
Mailing an Attachment
• Most of the time, email is just simple text
typed into a mail message. Occasionally, you
may need to "attach" a file to a mail message
such as a picture or a homework assignment.
Many email programs allow you to send
attached files with an email message.
• Discuss importance of attachment when you
send an email to your students?
Client-based vs. Web-based Email
What is Client-based Email?
•
•
•
•
•
•
•
•
•
Mail sent to your IAE's account is stored on a IAE mail server until you download it
or delete it.
Client Based Email use email protocols such as POP3 mail (Post Office Protocol 3)
which is one among the most popular email protocols. POP3 uses the SMTP
(Simple Mail Transport Protocol) messaging protocol.
Messages are downloaded onto your computer's hard drive using an email client.
Some common clients are Eudora, Netscape, Thunderbird, and Outlook.
Depending on how your preferences are set, once you have downloaded your
email, it is deleted from the mail server.
Your downloaded messages are available whether or not you are online.
If you reply or write new mail while offline, the mail is stored on your computer
and sent the next time you log in.
You can only use an email client on your own computer;
if you want to check your mail from other location (for example outside IAE
building) , you would need to use web-based email such as WebMail.
Web-based Email
What is Client-based Email?
• Web-based email allows you to manage your
email via a web browser. The interface is
implemented as a Web site that provides access
to the various functions like reading, sending or
organizing messages. Email isn't downloaded to
your computer but instead is left on the mail
server until you delete it. Common web mail
systems are Yahoo!, Hotmail, MSN, and GMail.
You can only read and write mail when you are
online and logged into your web mail account.
Advantages and Disadvantages
• An advantage to client-based mail is you can store as much email on
your computer as you want and save it for as long as you would like.
The only limit is the size of your hard drive, and today's multigigabyte systems can hold almost limitless amounts. Another
advantage is being able to read, write and reply to email while you
are off-line. A disadvantage to Client-based is accessibility; you can
only check your email from a computer that has an email-client
configured for your account.
• A big advantage to Web-based email is you can access it from any
computer in the world that has an Internet connection. Some of the
disadvantages are Web-based email usually limits the amount of
email messages you can store on the server, and it may seem a little
slower because the commands you give must travel to the
connecting website.
Definitions
• Adware - is unwanted advertising banners, pop-ups, pop-unders,
etc. in your web browser.
• Antivirus Software - is a program which scans and/or removes
computer viruses. It can be used on your hard drive or on diskettes.
Antivirus software should be kept up-to-date and be able to detect
all viruses currently being distributed and the known existing
computer viruses.
• Attachment – Documents, spreadsheets, graphics, web link, and
any other files associated with an electronic message.
• Client-based server - A mail server used to store messages until
users log on and download their mail.
• Edshare - a file and print server which allows the user to store any
files and print from computer labs.
• Email - is an electronic message sent from one computer to
another.
Definitions...
• FTP (File Transfer Protocol) - used to transfer files to another
computer via the Internet.
• Hoax - usually arrive in the form of an email containing bogus
warnings usually intent only on frightening or misleading users.
• Home page - For a Web user, the home page is the first Web page
that is displayed after starting a Web browser.
• Hyperlink - a cross-reference in an electronic document that, when
activated, causes the application reading the document to load a
different section of the document, a new document, or a resource
that the application can display or use.
• Hypertext Markup Language (HTML) - The language for publishing
hypertext on the World Wide Web.
• Hypertext Transfer Protocol (HTTP) - The protocol for transporting
HTML documents across the Internet.
• Internet – is a world-wide system of computer networks
Definitions...
•
•
•
•
•
•
•
•
Internet Protocol (IP) – The protocol for sending data from one computer to
another on the Internet. Every computer on the Internet has at least one IP
address uniquely identifying it from all other computers on the Internet.
Internet Service Provider (ISP) - A company that provides individuals and other
companies access to the Internet and other related services.
Mail Server – is a computer or device on a network that manages mail.
PDF (Portable Document Format) - a file format that can be created and read on
any computer, regardless of operating system. Because PDF files are highly
compressed they take a short time to download.
Phishing - is an attempt to get you to reveal logins, passwords, account numbers
and other personal information.
Plug-ins - Programs that are installed as part of the browser to extend the basic
functionality built into the browser. Plug-ins allow different file formats to be
viewed as part of a standard HTML document.
Protocols - Controls the way data is transferred between server and client
computers on the Internet.
Server - Is the part of the network that responds to requests from other
computers in the network with documents or other information which they
requested.
Definitions...
•
•
•
•
•
•
•
•
Spam – unsolicited e-mail, also known as junk email. It's a form of bulk email
obtained by companies that specialize in creating e-mail distribution lists.
Spyware - is a catchall term for several types of malicious software.
Transmission Control Protocol (TCP) - is a set of rules used to keep track of the
individual packets that a message is divided into for efficient routing through the
Internet.
Trojan Horse - a file that claims to be something desirable but, in fact are malicious
and can cause data loss or theft.
Uniform Resource Locator (URL) - The technical name for a text string that
supplies an Internet or Intranet address and the method by which it can be
accessed.
Virus program written to alter the way a computer operates, without the
permission or knowledge of the user.
VirusDefinitions - are files that provide information to antivirus software to find
and repair viruses.
Worm - a program that replicates itself from system to system without the use of a
host file.