Podcast
Questions and Answers
What is the primary purpose of the Domain Name System (DNS)?
What is the primary purpose of the Domain Name System (DNS)?
- To provide a numerical IP address to every computer
- To secure internet connections
- To translate numerical addresses into words (correct)
- To create unique domain names for websites
What does a URL typically begin with?
What does a URL typically begin with?
- http:// (correct)
- ws://
- https:// (correct)
- ftp://
Which of the following is NOT a top-level domain?
Which of the following is NOT a top-level domain?
- .mil
- .org
- .edu
- .web (correct)
How can the top-level domain provide insights into the reliability of a website?
How can the top-level domain provide insights into the reliability of a website?
What does the first field of a domain name represent?
What does the first field of a domain name represent?
Which domain code represents Germany?
Which domain code represents Germany?
What does a tilde (~) in a web address typically indicate?
What does a tilde (~) in a web address typically indicate?
Which of the following statements about the '.com' domain is accurate?
Which of the following statements about the '.com' domain is accurate?
What are the top three webmail providers mentioned?
What are the top three webmail providers mentioned?
Which suffix is commonly associated with military email addresses?
Which suffix is commonly associated with military email addresses?
What is primarily located in the inbox of an email interface?
What is primarily located in the inbox of an email interface?
What action can be done from the Compose pane in an email interface?
What action can be done from the Compose pane in an email interface?
Which feature allows you to view details of an email such as the sender's name and subject?
Which feature allows you to view details of an email such as the sender's name and subject?
What is the primary function of the Message pane in an email interface?
What is the primary function of the Message pane in an email interface?
How do hosted email addresses differ from general webmail providers?
How do hosted email addresses differ from general webmail providers?
What common feature is shared among all email providers regarding their user interface?
What common feature is shared among all email providers regarding their user interface?
What is the function of the NEAR operator in a search query?
What is the function of the NEAR operator in a search query?
What might happen if only the AND operator is used in a search query?
What might happen if only the AND operator is used in a search query?
What purpose do asterisks (*) serve in a search query?
What purpose do asterisks (*) serve in a search query?
What effect does enclosing a search term in quotation marks have?
What effect does enclosing a search term in quotation marks have?
What is the purpose of the 'Search tools' tab in Google searches?
What is the purpose of the 'Search tools' tab in Google searches?
How can you search for a specific term within a website?
How can you search for a specific term within a website?
What happens if no operators are used while searching?
What happens if no operators are used while searching?
Which option accurately describes how to filter results by file type?
Which option accurately describes how to filter results by file type?
What is the best file format to use for attachments to ensure they can be opened universally?
What is the best file format to use for attachments to ensure they can be opened universally?
What might make it difficult for recipients to find the exact file they need in an email?
What might make it difficult for recipients to find the exact file they need in an email?
Which of the following should you avoid sending via email due to security risks?
Which of the following should you avoid sending via email due to security risks?
What is phishing in the context of email safety?
What is phishing in the context of email safety?
Which of the following practices is NOT recommended for professional email communication?
Which of the following practices is NOT recommended for professional email communication?
What action is recommended when encountering spam emails?
What action is recommended when encountering spam emails?
What is a safe practice regarding email attachments?
What is a safe practice regarding email attachments?
Why might someone choose to use cloud-based storage like Google Drive over email attachments?
Why might someone choose to use cloud-based storage like Google Drive over email attachments?
What is one important aspect to consider when sending a forwarded message?
What is one important aspect to consider when sending a forwarded message?
Which principle is NOT part of maintaining good online etiquette?
Which principle is NOT part of maintaining good online etiquette?
How should one react to others' mistakes in an online setting according to good etiquette?
How should one react to others' mistakes in an online setting according to good etiquette?
What does 'flaming' refer to in online communication?
What does 'flaming' refer to in online communication?
What should one avoid doing with others' private communications?
What should one avoid doing with others' private communications?
Why were the Ten Commandments of Computer Ethics created?
Why were the Ten Commandments of Computer Ethics created?
What should system administrators be cautious about according to online etiquette?
What should system administrators be cautious about according to online etiquette?
What criticism has been leveled against the Ten Commandments of Computer Ethics?
What criticism has been leveled against the Ten Commandments of Computer Ethics?
Which commandment prohibits the use of a computer for harmful purposes?
Which commandment prohibits the use of a computer for harmful purposes?
What does the sixth commandment specifically address?
What does the sixth commandment specifically address?
Which of the following commandments underscores the significance of considering social consequences in programming?
Which of the following commandments underscores the significance of considering social consequences in programming?
What ethical principle is addressed by the commandment that states 'Thou shalt not snoop around in other people's computer files'?
What ethical principle is addressed by the commandment that states 'Thou shalt not snoop around in other people's computer files'?
Which commandment deals with the ethical use of intellectual property?
Which commandment deals with the ethical use of intellectual property?
Flashcards
NEAR operator
NEAR operator
A search operator that finds webpages where two words appear within a specified range of words.
AND operator
AND operator
A search operator that finds webpages containing both terms, regardless of their order or proximity.
Asterisk (*)
Asterisk (*)
A wildcard character that can replace any word or phrase in a search query.
Time tool in Search Tools
Time tool in Search Tools
Signup and view all the flashcards
Location tool in Search Tools
Location tool in Search Tools
Signup and view all the flashcards
Filetype operator (filetype:[file type])
Filetype operator (filetype:[file type])
Signup and view all the flashcards
Site search (site:[website URL])
Site search (site:[website URL])
Signup and view all the flashcards
Non-academic Google searches
Non-academic Google searches
Signup and view all the flashcards
IP Address
IP Address
Signup and view all the flashcards
Domain Name System (DNS)
Domain Name System (DNS)
Signup and view all the flashcards
Top-Level Domain
Top-Level Domain
Signup and view all the flashcards
URL (Uniform Resource Locator)
URL (Uniform Resource Locator)
Signup and view all the flashcards
'.com' domain
'.com' domain
Signup and view all the flashcards
'.edu' domain
'.edu' domain
Signup and view all the flashcards
'.org' domain
'.org' domain
Signup and view all the flashcards
'.gov' domain
'.gov' domain
Signup and view all the flashcards
Webmail
Webmail
Signup and view all the flashcards
Webmail provider
Webmail provider
Signup and view all the flashcards
Top webmail providers
Top webmail providers
Signup and view all the flashcards
Hosted email address
Hosted email address
Signup and view all the flashcards
Inbox
Inbox
Signup and view all the flashcards
Message pane
Message pane
Signup and view all the flashcards
Compose pane
Compose pane
Signup and view all the flashcards
Email attachment
Email attachment
Signup and view all the flashcards
Thou shalt not use a computer to harm other people.
Thou shalt not use a computer to harm other people.
Signup and view all the flashcards
Thou shalt not interfere with other people's computer work.
Thou shalt not interfere with other people's computer work.
Signup and view all the flashcards
Thou shalt not snoop around in other people's computer files.
Thou shalt not snoop around in other people's computer files.
Signup and view all the flashcards
Thou shalt not use a computer to steal.
Thou shalt not use a computer to steal.
Signup and view all the flashcards
Thou shalt not use a computer to bear false witness.
Thou shalt not use a computer to bear false witness.
Signup and view all the flashcards
Netiquette
Netiquette
Signup and view all the flashcards
Share Expert Knowledge
Share Expert Knowledge
Signup and view all the flashcards
Flaming
Flaming
Signup and view all the flashcards
Hurting Discussion Groups
Hurting Discussion Groups
Signup and view all the flashcards
Reading Other People's Mail
Reading Other People's Mail
Signup and view all the flashcards
Abusing Power
Abusing Power
Signup and view all the flashcards
Pointing Out Mistakes
Pointing Out Mistakes
Signup and view all the flashcards
Forgiving Mistakes
Forgiving Mistakes
Signup and view all the flashcards
Spam
Spam
Signup and view all the flashcards
Phishing Emails
Phishing Emails
Signup and view all the flashcards
Email Etiquette
Email Etiquette
Signup and view all the flashcards
Work Email Use
Work Email Use
Signup and view all the flashcards
Cloud-Based File Sharing
Cloud-Based File Sharing
Signup and view all the flashcards
Universal File Types
Universal File Types
Signup and view all the flashcards
Email Safety
Email Safety
Signup and view all the flashcards
Study Notes
Internet Basics
- The internet is a worldwide telecommunications system connecting millions of networks.
- It originated in 1969 as ARPANET, a US Department of Defense project.
- ARPANET's purpose was to create a decentralized network, resilient to failures.
- The shift from military to scientific use, and then commercially minded use, transformed ARPANET into the internet.
- Servers are central to networks, controlling data transmission among connected devices.
- Internet Service Providers (ISPs) offer access to the internet.
Learning Outcomes
- Explain fundamental concepts and the structure of the internet, focusing on its components and global connectivity.
- Demonstrate effective use of search engines for accurate, reliable information.
- Effectively create, manage, and use email accounts, understanding features like folders, attachments, and settings.
- Apply appropriate online communication etiquette.
- Recognize common internet threats (phishing, malware, and scams) and implement protection strategies for personal and organizational data.
Internet History Timeline
- 1969: ARPANET established by the U.S. Department of Defense.
- 1974: TCP/IP protocols developed.
- 1989: World Wide Web (WWW) invented by Tim Berners-Lee.
- 1990s: Increased internet usage, development of web browsers (e.g., Mosaic).
- 2000-2022: Continual growth, advancements in technology, and broader access.
World Wide Web Components
- Internet and World Wide Web are not synonymous.
- The World Wide Web is a collection of linked multimedia web pages.
- The World Wide Web facilitates seamless resource linkage and communication.
- Numerous interactive components enable communication.
TCP/IP Protocols
- Transmission Control Protocol (TCP) and Internet Protocol (IP) are fundamental protocols for computer communication on the internet.
- They enable all computers to interact.
Domain Name System (DNS)
- DNS translates numerical IP addresses into human-readable domain names.
- This simplifies internet navigation.
- Example:
isu-ilagan.edu.ph
corresponds to a numerical address.
URLs (Uniform Resource Locators)
- URLs are addresses for websites, usually beginning with
http
. - Example:
https://isu-ilagan.edu.ph/
Top-Level Domains (TLDs)
- TLDs represent the type of organization (e.g.,
.com
,.edu
,.org
) or country (e.g.,.ph
,.us
). - They provide context about the website.
Understanding Search Engines
- Search engines are programs that locate and display web content matching search criteria.
- They consist of a search index (a digital library) and algorithms that match results.
- Common search engines include Google, Bing, and others.
Search Engine Optimization (SEO)
- Content creators use SEO to increase website visibility and ranking in search engine results.
- Strategies include keyword placement and quality content.
Boolean Expressions for Search Engines
- Boolean expressions refine search results, allowing searches using specific combinations of words.
- Quotation marks: Find exact phrases.
- Plus operator (+): Include specific words.
- Minus operator (-): Exclude specific words.
- OR: Search for words or phrases.
- NEAR: Search for words within a specified distance.
- Asterisks ():* Wildcards for unknown words in a search phrase.
Basic Internet Search Techniques
- Search specific terms to find relevant information.
- Explore search tools and options to tailor results.
- Use Boolean operators to narrow searches.
Email Fundamentals
- Email is an electronic messaging system for sending and receiving messages. It's similar to traditional mail but with electronic delivery.
- Addresses include a username, the '@' symbol, and a domain.
Email Advantages
- Productivity tools: Integrated calendar, address book, and other functions.
- Web service access: Required for accessing certain services like email accounts.
- Mail management: Organize, label, prioritize, and find messages.
- Confidentiality: Privacy of messages using passwords.
- Multi-person communication: Send messages to multiple people simultaneously.
- Accessibility: Accessible from any internet-connected device, at any time.
Email Etiquette
- Practice good online communication etiquette and safety when using email, by following rules to communicate respectfully and more effectively.
- Know how to protect oneself from risks such as malware, phishing, and other malicious activity.
Email Attachments
- Be mindful about file size and format. Use ZIP (or other compression) for large files.
- Always mention attachments and ensure files are included, to avoid confusion for recipients.
Netiquette
- Netiquette (internet etiquette) is a set of guidelines for polite and respectful online communication.
- It emphasizes respectful communication, regardless of online identity and space.
- Treat others as you would want to be treated.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on the Domain Name System (DNS) and email interfaces with this comprehensive quiz. Explore topics such as top-level domains, webmail providers, and email functionalities. Challenge your understanding of web addresses and how they relate to reliability.