🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Copy of Copy of UIT Ch 2 A & B The Internet & WWW Notes .pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

UIT Ch 2 The Internet & WWW l Names: Daniyaal Hashmi, Anirudh Joshi, Sohan Patel UIT Ch 2 A & B The Internet & WWW Notes ARPANET/ The basis for the Internet began in 1969 as ARPANET (for ARPA, the early uses Advanced Research Projects Agency of the U.S. Department of...

UIT Ch 2 The Internet & WWW l Names: Daniyaal Hashmi, Anirudh Joshi, Sohan Patel UIT Ch 2 A & B The Internet & WWW Notes ARPANET/ The basis for the Internet began in 1969 as ARPANET (for ARPA, the early uses Advanced Research Projects Agency of the U.S. Department of Defense), with four linked-together computers at different universities and defense contractors. 1990 ARPANET decommissioned; first ISP comes online (dial-up access); Berners-Lee develops first web browser, WorldWideWeb; 313,000 hosts on Internet (9,300 domains) What % of 67.1% the world uses the internet today (2024)? 2.1 Connecting to the Internet: Narrowband, Broadband, & Access Providers bandwidth/ Bandwidth, or channel capacity, is an expression of how much data– channel text, voice, video, and so on–can be sent through a communications capacity channel in a given amount of time. broadband Several signals are transmitted at once. Highspeed connections. 4 Physical (l) telephone (dial-up) modem (used mostly in rural areas); (2) connection high-speed phone lines, including DSL modem and Tl and T3 lines; (3) options cable modem; and (4) wireless modem, including satellite and other through-the-air links. bit the smallest unit of information used by computers. downloading downloading is the transmission of data from a remote computer to a local computer, such as from a website to your own PC—for example, downloading a movie. uploading Uploading is the transmission of data from a local computer to a remote computer, as from your PC to a website you are constructing or putting one of your videos on YouTube. Data - bps: A computer with an old modem might have a speed of transmission 56,000 bps, which is considered the minimum speed for visiting UIT Ch 2 The Internet & WWW speeds websites with graphics. The bps stands for bits per second (8 bits equals I character [a byte, p. 31], such as A, 3, or #.) - Kbps: Kilobits per second, or Kbps, are 1 thousand bits per second. The speed of a modem that is 56,000 bps may be expressed as 56 Kbps. - Mbps: Faster means of connection are measured in megabits per second, or Mbps—l million bits per second. - Gbps: At the extreme are gigabits per second, or Gbps—l billion bits per second. Modem a modem is a device that sends and receives data over telephone lines to and from computers. A dial-up modem is attached to the telephone wall outlet. ISP Internet service provider (ISP)—a local, regional, or national organization that provides access to the Internet for a fee. WISP A wireless Internet service provider (WISP) enables users with computers con-taining wireless modems—mostly laptops, tablets, and smartphones—to gain access to the Internet. 2.2 How Does the Internet Work? The international network known as the INTERNET consists of hundreds of thousands of smaller networks linking education, commercial, nonprofit, and military organization as well as inidividual. client a computer requesting data or services. server Host computer is a central computer supplying data or services requested of it Internet2 not-for-profit cooperative university/business education and research project that enables high-end users to quickly and reliably move huge amounts of data over high-speed networks username/ A username, or user ID, is a unique combina-tion of characters, such password as letters and/or numbers, that identifies a specific user. A password is a special combination of letters and/or numbers that limits access to information protocols or set of rules, that computers must follow to transmit data electroni-cally. IP address uniquely identifies each computer and device connected to the Internet. UIT Ch 2 The Internet & WWW Dynamic IP Each time you connect to your ISP, it assigns your computer a new IP address, called a dynamic IP address, for your online session Static IP Whereas a dynamic IP address changes each time you connect to the Internet, a static IP address is the same every time you connect New approach This approach, which uses both numbers and characters, provides a nearly unlimited number of IP addresses and allows the connection of non-microcomputer devices, such as smartphones and home electronic equipment. Who “runs” The Internet Society (www.internetsociety.org) is a worldwide the internet professional, nonprofit society counting more than 90 chapters enrolling 145 organiza-tional members (companies, governments, foundations) and 65,000 individual members. 2.3 The World Wide Web Web A web browser, or browser, is software that enables you to find and access browser the various parts of the web. website A website, or simply site, is a loca-tion on a particular computer on the web that has a unique address Web page A web page is a document on the World Wide Web that can include text, pictures, sound, and video. Home page The home page, the starting point, or the main page, of a website that contains links to other pages at the site. URL & The URL (Uniform Resource Locator) is a string of characters that points to elements a specific piece of information anywhere on the web. Consists of: 1. The web protocol 2. The domain name a. A domain is simply a location on the Internet, the particular web server. 3. The directory name on the web protocol 4. The file within that directory (html or htm) Hypertext - Hypertext Transfer Protocol (HTTP), is the communi-cations rules links that allow browsers to connect with web servers. - Hypertext markup language (HTML) is the set of special instructions UIT Ch 2 The Internet & WWW (called "tags" or "markups") that are used to specify document structure, formatting, and links to other multimedia documents on the web. - Hypertext links—are HTML connections to other documents or web pages that contain related information; a word or phrase in one document becomes a connection to a docu-ment in a different place. - Radio Radio buttons are little circles located in front of various options; selecting button an option with the mouse places a dot in the corresponding circle. Individual search engines are programs that enable you to ask questions or use search keywords to help locate information on the web. engine ❖ An individual search engine compiles its searchable database on the web. Subject a subject directory is created and maintained by human editors, not directory electronic spiders, and allows you to search for information by selecting lists of categories or topics, such as "Health and Fitness" Meta search A metasearch engine allows you to search several search engines engine simultaneously. Specialized specialized search engines, help locate specialized subject matter, such as search material about movies, health, and jobs. engine wiki A wiki is a simple piece of software that can be downloaded for free and used to make a website (also called a wiki) that can be corrected or added to by anyone. wikipedia Wikipedia is a free online encyclopedia that anyone around the world can contribute to or edit. It has more than 25 million articles in more than 285 languages. But wikipedia is not reliable. Guidelines 1) On what kind of website does the information appear? for 2) Does the website author appear to be a legitimate authority? evaluating 3) Is the website objective, complete, and current? web resources Serious web 1) Choose your search terms well, and watch your spelling search 2) Type words in lowercase: techniques 3) Use phrases with quotation marks rather than separate words, and add a keyword 4) Put unique words first in a phrase 5) Use Boolean operators—AND, OR, and NOT 6) Use wildcards—asterisks ( *) and question marks (?) UIT Ch 2 The Internet & WWW 7) Read the Help or Search Tips section 8) Try an alternative general search site or a specific search site 2.4 EMAIL, IM, & OTHER WAYS TO COMMUNICATE OVER THE WEB Email An email program enables you to send email from your com-puter, which program interacts with an email server at your Internet access provider to send and receive email Web-based With web-based email, or webmail, you send and receive mes-sages by email interacting via a browser with a website ID parts of The username, or user ID, identifies who is at the addres an email address How to use - Putting your email into folders (also called filters or rules) enables email you to stay organized by sorting messages according to names of (summarize senders or mailing list 4 blue - you can write an email message and use the Attach File command headings & to attach the document. define any - In general, netiquette has two basic rules: (1) Don't waste people's bolded time, and (2) don't say anything to a person online that you wouldn't words say to his or her face. within) - Also, avoid flaming using derogatory, obscene, or inappropriate language—with people with whom you wildly disagree (or think are idiots). Instant lets users communicate instantly—that is, in real time—over an email messaging system with one or more persons who are logged onto that system at the same time. Message a web-based discussion group that does not require a newsreader board thread A collection of messages on a particular subject is called a thread FTP an Internet standard for uploading and downloading files between computers, including those with different operating systems. UIT Ch 2 The Internet & WWW 2.5 ONLINE GOLD MINE VoIP Internet telephony, or VoIP (Voice over Internet Protocol), uses the Internet to make phone calls, either one to one or for audioconferencing Multimedia Multimedia on the web is usually handled by plug-ins and small, special programs (software). - A plug-in (add-on) is a program that adds a specific feature or function to a browser, allowing it to play or view certain files. - applets, small programs that can be quickly downloaded and run by most browsers. Applets ("little applications") are written in Java, a programming language that enables programmers to create animated and interactive web pages. - Streaming video is the process of transferring data in a continuous flow (in real time) so that you can begin viewing a file even before the end of the file is sent. - animation is the rapid sequencing of still images to create the appearance of motion, Push push technology, software that automatically downloads information technology to personal computers Blogosphere the blogosphere, the total universe of blogs microblogging Microblogs, or text messages sent from your cellphone or mobile device, consist of a few short sentences, which take little time to write compared with traditional blogs. podcasting Podcasting involves delivering Internet music, radio, or video from the Internet to a computer. E-commerce E-commerce, or electronic commerce, is the buying and selling of goods and services over the Internet. - B2B COMMERCE: BUSINESS-TO-BUSINESS Business-to-business commerce, or B2B commerce, is the electronic sale or exchange of goods or services directly between companies, cutting out traditional intermediaries. - B2C COMMERCE: BUSINESS-TO-CONSUMER Business-to-consumer commerce, or B2C commerce, is the electronic sale or exchange of goods and services from the UIT Ch 2 The Internet & WWW companies directly to the public, or end users. - C2C COMMERCE: CONSUMER-TO-CONSUMER Consumer-to-consumer commerce, or C2C commerce, is the electronic sale or exchange of goods and services between individuals. Web - Web 1.0 is the read only web 1.0, 2.0 & 3.0 - Web 2.0, can be defined as the move toward a more social, collaborative, interactive, and respon-Sive web that puts information in the hands of the people. - The Web 3.0 browser will probably act as a personal assistant because every user will have a unique Internet profile based on his or her browsing history. Downside of 1. Social communication skills are diminished Social 2. Your supposedly private data is used to sell you stuff networking 3. Your online data may exist forever and can be used against you 4. Social networks may be used to attack others 2.6 INTRUSIVE INTERNET spam The term spam was picked up by the computer world to describe another kind of "noise" that interferes with communication. Now spam refers to unsolicited email, or junk mail, in the form of advertising or chain letters. But the problem of spam has spread well beyond the stage of annoyance. spoofing Spoofing is the forgery of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source. phishing Phishing (pronounced "fishing" and short for password harvesting fishing) is (1) the sending of a forged email that (2) directs recipients to a replica of an existing web page, both of which pretend to belong to a legitimate company. The purpose of the fraudulent sender is to ' 'phish" for, or entice people to share, their personal, financial, or password data. pharming In pharming, thieves implant malicious software on a victim's computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser. cookies Cookies are little text files—such as your username, password, and UIT Ch 2 The Internet & WWW preferences—left on your hard disk by websites you visit. The websites retrieve the data when you visit again. A website that welcomes you by name uses cookies. spyware Spyware is deceptive software that is surreptitiously installed on a computer via the web; once installed on your hard disk, it allows outsiders to gather confidential information without your knowledge Adware, or pop-up generator, is a kind of spyware that tracks web surfing or online buying so that marketers can send you targeted and unsolicited pop-up and other ads. browser hijackers, which change settings in your browser without your knowledge, often changing your browser's home page and replacing it with another web page, and search hijackers, which intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run. Keyloggers, or keystroke loggers, can record each character you type and transmit that information to someone else on the Internet, making it possible for strangers to learn your passwords and other information. Avoiding Some Internet access providers offer spyware scan-and-removal tools, spyware but you can also employ specialized antispyware software. Some of the good ones appear below. Ad-Aware, Malwarebytes, PC Tools, Spycatcher, Superantispyware Malware Malware, for "malicious can attack your computer systems and mobile devices. They include an army of plagues such as worms and Trojan horses, zombies and bots, ransom-ware and rootkits, as we discuss in detail in Chapter 6. Here, however, let us describe just one deadly form of malware, known as a virus, so that you'll know how to protect yourself during your Internet explorations. Reducing The principal defense is to install antivirus software, which scans a malware risk computer to detect viruses and, some-times, to destroy them. Password Never choose a real word or variations of your or your family's name, advice address, phone number, Social Security number, license plate, or birth date. Don't use passwords that can be easily guessed, such as "12345" or "password." Avoid any word that appears in a dictionary. Instead, mix letters, numbers, and punc-tuation marks in an oddball sequence of UIT Ch 2 The Internet & WWW no fewer than eight characters, such as 2b/ orNOT2b% and Alfred!E!Newman7. Or choose a password that is memorable but shift the position of your fingers on the keyboard, so that, for instance, TIMBERWOLVES becomes YO,NRTEP;BRD when you move your fingers one position right. For sen-sitive sites, such as financial accounts, create long passwords, such as 15-character passwords. Don't use the same password for multiple sites, so that if someone obtains the pass-word to one account, that person won't have access to your entire online life. Finally, don't write passwords on sticky notes or in a notebook or tape them under your keyboard. Don't carry the passwords in your wallet. If you have to write down all your passwords, find a safe place to put the paper, or use a software password manager, such as Kaspersky Password Manager, RoboForm Everywhere, or Last Pass Premium. Research & How the Web Can Lead to Plagiarism: Plagiarism For example, the internet has various ways students can receive any (summarize 3 type of term paper from free papers or commercial websites. The parts) free-paper sites give very poorly composed papers; commercial sites may be expensive but do not promise quality. Students directly submit such papers by simply changing the name of the author while some use them to give ideas. 2. How Instructors Catch Cheaters: The instructor detects plagiarism by monitoring the progress of students and making assignments so specific to in-class work that out-of-class plagiarism would be impossible. Instructors employ search programs and plagiarism-checking software like CopyScape and Grammarly to scan the web for matching text. Certain websites create a database of papers, making it impossible for students to reuse a paper that has already been submitted. 3. How the Web Can Lead to Low-Quality Papers: According to Professor David Rothenberg, internet research usually leads to poorly written, unoriginal papers. The telltale signs include no book citations, material that is outdated, graphs and images that have nothing to do with the subject, and a general lack of depth in sources. The material found on the web is so devoid of any semblance of depth so badly needed for serious academic analysis. Citing credible sources is essential in ensuring the quality of any paper. UIT Ch 2 The Internet & WWW

Use Quizgecko on...
Browser
Browser