Internet Services and Safety

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best describes the primary function of the Internet?

  • To provide entertainment through online gaming and streaming services.
  • To solely support e-commerce activities, enabling buying and selling of products.
  • To offer advanced software programs for users to download and use on their computers.
  • To serve as a global network facilitating access to information and instant communication. (correct)

Which of the following is NOT a typical use of the Internet?

  • Remotely controlling hardware devices physically disconnected from any network. (correct)
  • Conducting research on various subjects of interest.
  • Exchanging typed messages in real-time with another person online.
  • Accessing and managing banking services and investment opportunities.

What is the main difference between a dial-up connection and a broadband connection?

  • Dial-up connections are more secure than broadband connections.
  • Broadband connections offer higher speed internet access compared to dial-up. (correct)
  • Dial-up requires continuous power, whereas broadband does not.
  • Broadband is easier to set up and requires less equipment than dial-up.

The term 'modem' is derived from which two functions?

<p>Modulate and demodulate. (D)</p> Signup and view all the answers

Which type of broadband service uses fiber-optic cables to provide high-speed internet access?

<p>FTTP (Fiber to the Premises) (A)</p> Signup and view all the answers

What is a key characteristic of a 'fixed wireless' internet connection?

<p>It uses a dish-shaped antenna to communicate with a tower via radio signals. (A)</p> Signup and view all the answers

What is indicated when a hotspot requires a password for access?

<p>The hotspot requires authentication for security. (B)</p> Signup and view all the answers

What is 'tethering' in the context of wireless internet access?

<p>Using a smartphone to create a mobile hotspot. (A)</p> Signup and view all the answers

What is the primary consideration when choosing a photo-sharing site?

<p>The amount of storage space offered by the site. (A)</p> Signup and view all the answers

What distinguishes a 'web app' from a traditional software application?

<p>Web apps are stored on a web server and accessed through a browser. (D)</p> Signup and view all the answers

What is the defining characteristic of e-banking?

<p>It involves performing banking transactions electronically without physically going to the bank. (C)</p> Signup and view all the answers

What primary function do TeamViewer and AnyDesk offer?

<p>Allowing remote control of a desktop for sharing and file transfer. (B)</p> Signup and view all the answers

Which of the following best characterizes a social networking site?

<p>A service facilitating connections among people with shared interests. (A)</p> Signup and view all the answers

What is the purpose of LinkedIn?

<p>To connect professionals for networking and career opportunities. (B)</p> Signup and view all the answers

What distinguishes a blog from other types of websites?

<p>Blogs consist of frequently updated collections of information and entries. (B)</p> Signup and view all the answers

What does FTP (File Transfer Protocol) primarily enable?

<p>File uploading and downloading between computers on the Internet. (B)</p> Signup and view all the answers

What is the key requirement for conducting a video conference?

<p>Video conferencing software, a multimedia computer, and a video camera. (B)</p> Signup and view all the answers

Which activity falls under the umbrella of e-commerce?

<p>Purchasing goods online using a credit card. (D)</p> Signup and view all the answers

In the context of e-commerce, what does 'B2C' typically refer to?

<p>Business-to-Consumer. (C)</p> Signup and view all the answers

What is the primary function of message apps like WhatsApp and Telegram?

<p>Connecting people via messaging, calls, and media sharing. (C)</p> Signup and view all the answers

What is the initial step in effective searching for information on the internet?

<p>Identifying the main idea and related terms for the topic. (B)</p> Signup and view all the answers

What is a 'search engine' in the context of internet searching?

<p>A software program used to locate web pages, websites, and internet. (B)</p> Signup and view all the answers

What action improves search results when using quotation marks?

<p>The search engine finds the exact sequence of words. (B)</p> Signup and view all the answers

What does a subject directory provide?

<p>A categorized list of links arranged by subject. (B)</p> Signup and view all the answers

Which of the following is an example of a meta search engine?

<p>Dogpile (B)</p> Signup and view all the answers

Why is protecting oneself from identity theft important?

<p>To safeguard information from loss, damage, or misuse. (A)</p> Signup and view all the answers

In the context of online security, what does 'https' in a web address signify?

<p>The website has secure communication. (B)</p> Signup and view all the answers

What is the purpose of 'two-factor authentication'?

<p>To add an extra layer of security to online accounts. (B)</p> Signup and view all the answers

Why should you avoid using free, open Wi-Fi and hotspots for sensitive transactions?

<p>They are insecure and can easily allow access to your online activities. (D)</p> Signup and view all the answers

What are web cookies?

<p>Small text files that web servers store on a computer. (D)</p> Signup and view all the answers

What is the primary function of a personal firewall?

<p>To protect network resources from outside intrusions. (C)</p> Signup and view all the answers

What is a key advantage of cloud computing regarding cost?

<p>Shifts the expense of hardware and software away from the user. (D)</p> Signup and view all the answers

What is meant by 'scalability' in the context of cloud computing?

<p>The flexibility to increase or decrease computing requirements as needed. (A)</p> Signup and view all the answers

What does the characteristic of 'elasticity' provide in cloud computing?

<p>The ability of cloud resources to automatically adjust to varying demands. (D)</p> Signup and view all the answers

What is the meaning of 'pay per use' in cloud computing?

<p>Paying only for the computing resources that you use. (B)</p> Signup and view all the answers

What does 'resource pooling' refer to in cloud computing?

<p>Pooling large-scale IT resources to serve multiple cloud consumers. (A)</p> Signup and view all the answers

What defines a 'private cloud'?

<p>A proprietary architecture subscribed to by an organization for internal use. (B)</p> Signup and view all the answers

What is a hybrid cloud?

<p>A combination of private and public cloud environments. (D)</p> Signup and view all the answers

What model are cloud computing services based on?

<p>&quot;Pay as you go&quot; (B)</p> Signup and view all the answers

What is a key characteristic of Infrastructure as a Service (IaaS)?

<p>Providing hardware resources like servers and storage over the internet. (A)</p> Signup and view all the answers

What is the defining characteristic of SaaS (Software as a Service)?

<p>Delivering software applications over the Internet, on demand. (B)</p> Signup and view all the answers

What is the main function of Platform as a Service (PaaS)?

<p>To provide developers with a platform to create, test, and run applications. (C)</p> Signup and view all the answers

What service does Google Drive provide?

<p>A cloud storage service. (B)</p> Signup and view all the answers

How much free online storage does Google Drive offer?

<p>15 GB (A)</p> Signup and view all the answers

Flashcards

What is the Internet?

A global network linking millions of computers, enabling access to information and communication.

What is E-mail?

Sending and receiving messages electronically between computers globally.

What is Chat?

Exchanging messages in real-time with another person online.

Social Networking

Joining groups online to connect with people who share interests.

Signup and view all the flashcards

Dial-up Connection

Connecting to the internet using a computer, modem, and phone line.

Signup and view all the flashcards

Dial-up Modem

A device connecting computers to the internet using a telephone line.

Signup and view all the flashcards

Broadband Connection

A high-speed internet connection, can be wired or wireless.

Signup and view all the flashcards

Wireless Modem

A wireless communication device that connects to the Internet.

Signup and view all the flashcards

What is a Hotspot?

A location that offers wireless Internet access.

Signup and view all the flashcards

What is Tethering?

Using a device's internet connection to create a mobile hotspot.

Signup and view all the flashcards

Photo Sharing Site

A service that allows sharing of digital photos online.

Signup and view all the flashcards

What is a Web App?

An application accessed via a web browser, stored on a web server.

Signup and view all the flashcards

What is E-banking?

Conducting banking transactions electronically over the internet.

Signup and view all the flashcards

Remote Access Software

Software that allows remotely controlling a desktop.

Signup and view all the flashcards

Social Networking

Connecting with others who share personal or professional interests online.

Signup and view all the flashcards

What is LinkedIn?

An online platform for professional networking.

Signup and view all the flashcards

What is Blogging?

An online platform or website where you can post content.

Signup and view all the flashcards

File Transfer Protocol

Internet standard allowing file uploading and downloading.

Signup and view all the flashcards

Video Conferencing

Live meeting using a network to transmit audio and video data.

Signup and view all the flashcards

What is E-commerce?

Financial transactions conducted electronically over the internet.

Signup and view all the flashcards

Message Apps

Used to send messages, calls, photos, videos, and voice messages.

Signup and view all the flashcards

Search Engine

Software designed to find websites, web pages and internet files.

Signup and view all the flashcards

Subject Directory

A search tool that classifies web pages into categories.

Signup and view all the flashcards

Search Text

A word or phrase used in search engine to locate desired information.

Signup and view all the flashcards

What is a Spider?

A program used by search engines to create index of websites.

Signup and view all the flashcards

What are Hits?

A list of results from a search engine.

Signup and view all the flashcards

Identity Theft

Losing of personal information that's misused by attackers.

Signup and view all the flashcards

What is Cybercrime?

Online or Internet-based fraudulent acts.

Signup and view all the flashcards

Two-Factor Authentication

An extra layer of security to ensure online account security.

Signup and view all the flashcards

What are Web Cookies?

Small text files that web servers store on a computer.

Signup and view all the flashcards

What is a Firewall?

Software to protect network from outside intrusions.

Signup and view all the flashcards

Cloud Computing

Technology providing resources and services over the Internet.

Signup and view all the flashcards

Cloud Storage

Internet service that provides storage facility to computer users.

Signup and view all the flashcards

Elasticity

When computing can adapt to changing needs.

Signup and view all the flashcards

Pay Per Use

Pay only for the resources you use.

Signup and view all the flashcards

Private Cloud

Cloud model with proprietary architecture, within an organization.

Signup and view all the flashcards

What is a Public Cloud?

Cloud model not proprietary to any organization.

Signup and view all the flashcards

As-a-Service

Cloud computing service based on 'pay as you go' service model.

Signup and view all the flashcards

Google Drive

Cloud storage and service developed by Google.

Signup and view all the flashcards

Study Notes

Internet Services and Safety

  • This chapter deals with the Internet and its uses, how to connect to it, various Internet services, searching information, and protecting against online identity theft.

Internet

  • The Internet, also called the Net, is a massive network linking millions/trillions of computers globally, serving as a research tool for global information and instant communication.
  • More than one billion users access various Internet services worldwide.
  • The World Wide Web and E-mail are among the most widely used internet services.
  • Use of the internet includes sending messages, meeting friends, banking, investing, shopping, filing taxes, playing games, listening to music, or watching movies and is accessible anywhere.

Uses of Internet

  • Research: The Internet provides access information on any subject, making it a valuable research tool.
  • E-mail (electronic mail): The fastest way to send/receive messages from one computer to another.
  • Entertainment: The Internet offers various forms of entertainment, like radio/television broadcasts, videos, and music.
  • Software Programs: Numerous downloadable software programs are available, including word processors, drawing programs, games, and accounting programs.
  • Buy and Sell: Users can easily buy/sell products online from home.
  • Chat: Users can exchange typed messages with others online.
  • Social Networking: Users can join social networking groups to meet people with similar interests globally.
  • Online Games: Various types of online games are available.

Ways to Connect to the Internet

  • There are two primary ways to connect to the Internet: Dial-up and Broadband connections.
  • Dial-up: A slower connection used by some for its lower cost.
  • Broadband: A high-speed connection used by others.

Dial-up Connection

  • A slow-speed Internet connection using a computer, dial-up modem, and telephone line to connect to an ISP (Internet Service Provider), which provides an easy and inexpensive way for users to connect.
  • Popular ISPs include VSNL, MTNL, BSNL, and Airtel.

Dial-up Modems

  • A dial-up modem is a communication device connecting computers to a telephone line for Internet access, with speed measured in kbps (kilobits per second).
  • "Modem" comes from the combination of "modulate" (convert a digital signal to analog) and "demodulate" (convert analog signal to digital).
  • Both ends of a communication channel require a modem for data transmission.
  • There are two types of dial-up modems: external and internal.
  • external Modem: A small box using a cable to connect with a computer.
  • internal modem: An adapter card inserted into a computer's motherboard expansion slot.

Broadband Connection

  • a high-speed technology, provides a constant connection when the computer is powered on, enabling fast web page downloads, online gaming, and real-time communication.

  • This service is available through wired or wireless connections.

  • Broadband Internet services include:

  • Digital Subscriber Line (DSL): High-speed using regular phone lines.

  • Fiber to the Premises (FTTP): Fiber-optic cable access for homes and businesses.

  • Cable Internet service: connection via the cable television network using a cable modem.

  • Additional broadband options:

    • Fixed wireless: High-speed using a dish antenna communicating with a tower via radio signals.
    • Cellular radio network: High-speed for devices with compatible tech/wireless modems.
    • Satellite Internet service: High-speed via satellite to a satellite dish with a satellite modem.
    • Wi-Fi (Wireless Fidelity) network: Radio signals connect wireless computers/devices.

Wireless Internet Access

  • Computers connect/transfer data globally using wired and wireless transmission.
  • Wireless refers to electrical/electronic operations without wired connections.
  • Wireless communication transfers information over a distance without electrical conductors/wires. Wireless modems are used for internet access without phone lines or physical connections.
  • Wi-Fi: Wireless networks for connecting to the Internet or other Wi-Fi-enabled devices, broadcasting radio waves receivable by Wi-Fi receivers.
  • wireless modem: A wireless modem, also known as dongle, uses wireless communication technology (cellular radio, satellite or Wi-Fi) to connect to the Internet, connecting to a computer and enabling internet access when attached.
  • Hotspot: Wireless networks providing Internet access to mobile devices in public locations like malls, cafes, and hotels, often with unrestricted access but sometimes requiring a password.
  • Personal Wi-Fi hotspots can be created via routers connected to broadband service.
  • Mobile hotspots can be created through tethering, which shares a smartphone’s internet access wirelessly.

Services of the Internet

  • Offers services sharing photos, web apps via cloud storage, social networking, blogging, virtual meetings via video conferencing, e-commerce, e-banking, and information searches.

Sharing Photos on the Web

  • Users can share digital photos after registering on photo sharing sites, allowing uploading, viewing, rating, tagging, and commenting.
  • Storage space is an important site consideration.
  • Free accounts offer basic storage; paid accounts (upgrades) offer more.
    • Flickr. This website enables photo editing, album organization, card/book creation, and viewing control.
    • Google Photos: Another example of a photo sharing website.

Web Application

  • Application stored on a web server and accessed through a browser, interacting directly on a website (the host).
  • Web app hosts typically provide storage for data/information on cloud storage.
  • Many hosts provide free access to software, while some offer part of the app free and charge for comprehensive services (Google Docs Editors).
  • Web app: This is an application stored on a web server that you access through a browser.

E-banking

  • (Electronic banking) is a service allowing customers to perform banking transactions electronically without personally visiting the bank, known as e-banking.
  • The bank has a web-enabled centralized database allowing 24/7 access to banking information.

Remote Services

  • TeamViewer and AnyDesk allow remote desktop control with file sharing between computers, connecting PCs as if sitting in front of them, compatible with multiple platforms.

Social Networking

  • Social networking enables connecting with others sharing personal/professional interests.
  • Members connect as friends or friends of friends, involving understanding what such networking entails.
  • The main function is to track the lives of friends, family, and colleagues, especially those not seen regularly.
  • Facebook, Instagram, and Twitter are popular social networking sites.

LinkedIn

  • It connects professionals globally, aiming to provide exposure, productivity, job opportunities, and recommendations.

Blogging

  • An exciting medium for publishing ideas, opinions, and stories online, with millions of blogs (Weblogs) available.
  • A blog is a regularly updated website focusing on specific subjects, although many are personal. Entries on blogs are called posts, and publishing is called posting.
  • A person maintaining multiple blogs is a blogger.
  • Many blogs feature the person writing the blog as their subject
  • Blogger platforms include Blogger, TypePad, and wix.

File Transfer Protocol (FTP)

  • FTP (File Transfer Protocol) is an Internet standard for uploading/downloading files.
    • Uploading transfers files from a computer to a server.
    • Downloading transfers files from a server to a computer.
  • An FTP server allows users to upload/download files.
  • Web page developers often use FTP to upload web pages to a web server.
  • FileZilla is an example of an FTP service.

Video Conferencing

  • Video conferencing is live meetings for geographically separated people via network/Internet to transmit audio/video data.
  • The requirements include video conferencing software, a multimedia computer, a microphone, and a video camera.
  • Speakers allow members to hear each other.
  • The video camera shows participants in a window.
  • Zoom and Skype are examples of video conferencing apps.

E-commerce

  • (Electronic commerce) is a financial transaction over an electronic network for anyone with a computer/device, Internet, and payment method, involving online shopping with thousands of devoted websites
  • Consumers use e-commerce for shopping, auctions, finance, travel, entertainment, and health.

Three types of e-commerce:

  • Business-to-Consumer (B2C): Selling goods/services to the general public (shopping websites).
  • Consumer-to-Consumer (C2C): Direct sales between consumers (online auctions).
  • Business-to-Business (B2B): Businesses providing goods/services to others (online advertising, recruiting)
  • Examples: Amazon, Flipkart, and Alibaba.

Message Apps

  • WhatsApp is a mobile messaging app for smartphones using Internet connection.
    • It send/receives messages, calls, photos, videos, and voice messages, supporting group chats/videos and connection with contacts, both on mobile and computer.
    • Telegram offers similar functionality and security.

Searching Information on the Internet

  • The Internet is a global information resource.
  • People commonly use the Internet to find specific information (text, pictures, music, and videos), utilizing it as a search tool.
  • Two types of search tools: search engines and subject directories.

Search engine:

  • A program for finding websites, web pages, images, videos, news, maps, and other information.

Subject directory:

  • Classifies web pages into categories or groups like sports/shopping, and related sub-categories.

  • Some websites provide both search engine and subject directory functionality.

  • Search Engine: Software helping to find websites, pages, and files.

    • It locates web pages on particular topics or specific pages when the exact URL is unknown.
    • Search engines require a “search text” describing the information sought.
    • To do their job well, search engines use programs called a “spider.” also called crawler or bot, a spider reads pages on websites in order to create a list or index of hits.
    • Each hit links to a website or page.
  • Search engines sequence the hits based on how close the words in the search text are to one another.

  • Some web browsers feature an Instant Search box, which uses a predefined search engine.

Search Techniques

  • Enter phrases, spaces between words; most search engines display results that include all the words.
  • Techniques to improve searches
    • Use specific nouns and place the most important terms first.
    • Use quotation marks for exact phrases.
    • List possible spellings.
    • Try another search engine if results are unsatisfactory.

Subject Directory

  • Provides a subject-categorized link list, allowing topic location by clicking through levels from general to specific until a satisfying web page is found.
  • Google: Fast, comprehensive, top source.
  • Bing: Focuses on organizing information quickly.
  • Yahoo!: Oldest web directory with websites organized to find relevant information. It is the oldest web directory and has editors organizing information into categories.
  • Dogpile: Results combined across many search engines.
  • Ask Jeeves: Crawler-based results.
  • Lycos: Evolved from early search engine into social media network.

Ethical Internet Use

  • Understand what could be perceived unsafe.
  • Respect privacy.
  • Be trustworthy.
  • Be forgiving.

Protecting Yourself from Identity Theft

  • Internet's dark side requires protection from information loss/damage. The fastest growing online crime is “identity theft,” where personal data is stolen/misused.
  • Cybercrime: Online/Internet-based fraudulent acts (malware, identity theft).
  • The important idea is to be careful, and realize people online are not always sincere.

Techniques to Prevent Personal Data Theft

  • Secure 'https' web addresses when entering confidential information.
  • Use strong passwords to secure Wi-Fi connections.
  • Apply two-factor authentication as an extra safety measure for all online accounts.
  • Use a unique passphrase combining upper/lowercase letters, numbers, and special characters to protect a PC and all accounts.
  • Avoid free/open Wi-Fi and hotspots.
  • Avoid using public computers for banking/email, as they may run keyloggers.
  • Log out of password-protected sites and clear browser cache on public computers.
  • Never use personal details while playing online games.
  • Clear/disable web cookies in your browser.
  • Install/update personal firewalls and antivirus software.
  • Create strong, secret passwords for all online accounts.
  • Shred personal/financial documents before discarding.
  • If identity/passwords are compromised, change passwords immediately.
  • Report disclosed debit/credit card details/OTP to the bank/cyber safety cell.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Protecting Your Online Data Quiz
3 questions
Internet Services and Cyber Security Quiz
10 questions
Introduction to Internet Services Quiz
10 questions
Use Quizgecko on...
Browser
Browser