LIVING-IN-IT-ERA-INTERNET-REVIEWER.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

LIVING IN IT ERA - INTERNET THE INTERNET The Internet or 'net' (network of network) is the largest computer network in the world that connects billions of computer users. The word internet comes from the combination between 'interconnection' and 'network'. Network is a collection of...

LIVING IN IT ERA - INTERNET THE INTERNET The Internet or 'net' (network of network) is the largest computer network in the world that connects billions of computer users. The word internet comes from the combination between 'interconnection' and 'network'. Network is a collection of computers and devices connected via communication channels and transmission media that allow sharing resources (hardware, software, data, information). BRIEF HISTORY The Internet started in the 1960s as a way for government researchers to share information. Another catalyst in the formation of the Internet was the heating up of the Cold War. The Soviet Union's launch of the Sputnik satellite spurred the U.S. Defense Department to consider ways information could still be disseminated even after a nuclear attack, This eventually led to the formation of the ARPANET (Advanced Research Projects Agency Network), the network that ultimately evolved into what we now know as the Internet. ARPANET was a great success but membership was limited to certain academic and research organizations who had contracts with the Defense Department. During the 1970s, a new communications protocol was established called Transfer Control Protocol/Internetwork Protocol (TCP/IP). This allowed different kinds of computers on different networks to "talk" to each other. It was later adopted as the protocol standard for ARPANET on January 1, 1983, hence the birth of the Internet. All networks could now be connected by a universal language. The most popular network protocol in the world, TCP/IP protocol suite, was designed by 2 DARPA scientists-Vinton Gray Cerf and Bob Kahn, persons most often called the fathers of the Internet. Vinton Gray Cerf and Bob Kahn - Fathers of the Internet The general public gained access to the Internet in 1986. And between 1987-1988, the number of hosts increased from 10,000 to 60,000. ○ The World Wide Web (WWW) developed in 1991 and the Internet was growing fast. ○ In 1993, the most important development was released and it was the first graphical web browser software. ○ In 1994, the first shopping mall, Internet radio station, and the first cyber bank appeared on the Internet. ○ In 1998, the Internet continued to grow and now in the present, we are using the most advanced and developed Internet services. MAJOR COMPONENTS OF THE INTERNET 1. Server is a computer program that provides service to another computer program and its user. TYPES OF SERVERS ○ Application Server a program in computer that provides the business logic for an application program. ○ Web Server a computer program that serves requested HTML pages or files. ○ Proxy Server is a software that acts as an intermediary between an endpoint device, such as a computer and another server from which a user is requesting. ○ Mail Server is an application that receives incoming e-mail from local users and remote senders and forward outgoing e-mail for delivery ○ File Server is a computer responsible for central storage and management of data files SO that other computer on the same network can access them. ○ Policy Server - is a security component of a policy based network that provides authorization services and facilities tracking and control of files. 2. IP Address (Internet Protocol) is a numerical label assigned to each device. This provides identity to a network device. 3. Browser is an application program that provides a way to look information on the web. Example of browsers: Google Chrome, Safari, Internet Explorer, etc. 4.Domain Name System (DNS) is the phonebook of the internet. We access information through online domain names. Examples: www.facebook.com 5.Internet Service Provider (ISP) is an organization that provides services for accessing, using or participating in the internet TWO TYPES OF ISP National ISP - provided internet to a specific geographic access area. Regional ISP - business that provides internet access in cities and towns nationwide. Example of ISP: Sky Broadband, PLDT,Converge USES OF INTERNET Look for information School works, jobs, and home purposes Send and receive electronic mail Video teleconferencing (video call, video chat) Buy and sell product Social networking Watch & post videos Games Take college courses Monitor home while away Financial transactions Download music and movies IMPORTANT TERMS & DEFINITION Internet - A global network of thousands of computer networks linked by data lines and wireless systems. Web a collection of billions of webpages that you can view with a web browser. Email - the most common method of sending and receiving messages online Online gaming - games that allow people to play with and against each other over the Internet. Software Updates operating system and application updates typically downloaded from the internet. URL or Uniform Resource Locator is a web address used to connect to a remote resource on the world wide web. HTML - Hypertext Markup Language is a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page. Bit is a single digit in the binary numbering system For example: 1 is a bit or O is a bit. Byte generally consists of eight bits. Upload To upload is to transfer data from your computer to another computer. Download - To download is to transfer data from another computer to your computer. HTTP is the acronym for Hypertext Transfer Protocol, the data communication standard of web pages. Router or router-modem is the hardware device that acts as the traffic cop for network signals arriving at your home or business from your ISP. A router can be wired or wireless or both. Encryption is the mathematical scrambling of data so that it is hidden from eavesdroppers, Encryption uses complex math formulas to turn private data into meaningless gobbledygook that only trusted readers can unscramble, Web Bot A term that applies to - programs/applets (macros and intelligent agents) used on the Internet. Such bots perform a repetitive function, such as posting messages to multiple newsgroups or doing searches for information. Search Engine specialized software, such as Google and Yahoo, that lets www browser users search for information on the web by using keywords, phrases. COMPUTER PARTS Computer - A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. Alan Turing - Father of Modern Computer Science Elements of a Computer 1. Hardware the physical part of the computer system, the machinery and equipment. This includes the central processing unit (CPU), keyboard, monitor, mouse, printer and speaker. 2. Software - is a single/collection of programs that performs a particular task. Also called a Program. - Different softwares are used to solve different problems. TYPES OF SOFTWARE SYSTEM SOFTWARE APPLICATION SOFTWARE Gives path to software application to Is designed and built for specific task run Is a general purpose software Is a specific software Low language is used High language is used Programming is complex when Programming is simple when compared to application software compared to system software Interacts with the hardware directly Does not take the hardware into consideration, as it does not interact directly Installed by the manufacturers Installed by the users as needed Works in the background Works in the forefront Is a packaged program Can be said to be resources sharing client server Example: Operating System, Example: Word Doc, Spreadsheet, Programming Language, Database, Internet Explorer Communication Software, etc Shortcuts Uses of Shortcut keys Shortcuts Uses of Shortcut keys Alt + E It Edits options in the current Ctrl + Y This redo the last action. program. Alt+Tab this is used to switch between Ctrl + K It insert hyperlink for the the open windows selected text. Alt + F Shows file menu options in the Windows key + L This lock the computer, current program. requiring password entry to access again. Alt + F4 This closes the current window Windows key + X Access the Power User Tasks Menu in Windows 8 and Windows 10. Alt + Page Up It scrolls up the Entire Screen. Windows key + It Minimize the active program Down arrow window. Alt + Page Down It scrolls down the Entire Windows key + Up It Maximize the active program Screen arrow window. Alt + Left Arrow shows the previous history if it Ctrl + Left arrow This key used to move one is present in Bowser. word to the left at a time. Alt + Right Arrow Go forward in the browser Ctrl + Right arrow This is used for move one window. word to the right at a time. Alt + Enter It shows the property of the Ctrl + Esc It activates the start menu. selected item. Ctrl + A It is used to select all text. Alt + Enter It is used to open the properties window for the selected icon or program. Ctrl + X It cuts the selected item Windows key + X Access the Power User Tasks Menu in Windows 8 and Windows 10. Ctrl + Del It deletes selected items Windows key + ↓ Minimize the active program window. (That format Should be used) Ctrl+C/Ctrl+Ins Used to copy the selected item. Windows key + L Lock the computer, requiring password entry to access again. Ctrl+V/Shift + Ins Used to paste the selected Windows key + ↑ Maximize the active program item. window. Ctrl + Home It is used to go to the beginning Ctrl + ← Move one word to the left at a of the document. time. Ctrl + End Go to the end of a document Ctrl+ → Move one word to the right at a time. Ctrl + S Open the save as a dialogue Ctrl + Home Go to the beginning of the box. document. Ctrl + Z Undo the last action. Ctrl + End Go to the end of the document. Ctrl + Alt + Del Opens Windows task manager. Ctrl + Shift + Esc Open Windows Task Manager. Ctrl+J Open the download tab/bar. Shift + Home Highlight from the current position to the beginning of the line. Ctrl+F It starts the find utility. Shift + End Highlight from the current position to the end of the line. Ctrl+P Open the print dialogue box. F2 Used to rename the selected icon. Ctrl+Esc Open the Windows start menu. F3 This Find anything from our desktop. Ctrl + "+" Increases the zoom level. F4 This is used in Windows 95 to XP to open the locate window. Ctrl + "-" Decreases the zoom level. F5 It is used to refresh the contents of your Windows system. Ctrl + W/Ctrl + F4 Closes the current tab. Alt + F4 Used to close the ongoing program. Ctrl+T Open a new tab. Ctrl + F4 This shortcut is used to swiftly close a document. Home Takes the user to the start of Ctrl + Plus Key This adjusts the widths of all the current line. columns automatically, in Windows Explorer. End This is used to go to the end of Alt + Print Screen / It is used to take a screenshot the current line Win+PrtScn of the current page. Shift + Delete files will be deleted Ctrl + Alt + Del Used to Reboot/Windows task permanently. manager. Ctrl+N Open New Window/Document Ctrl+H Open theHistory tab/bar Components of Computer 1. Input - any data or instructions entered into memory of a computer; any hardware component which allows user to enter data instruction into a computer. Keyboard the most basic input device to enter data on the system or any other device with the help of the keys (numbers, letters, characters and function); establish a connection with the computer via Bluetooth, WiFi or by a USB system ○ Computer Shortcut Keys significantly enhance productivity and efficiency. These handy combinations of keys provide quick access to various functions and commands, allowing us to navigate in Computers. Microphone - it is a built-in voice input device that take sound signals and convert them into digital form. Webcam - capture used to pictures/videos while using the computer. Mouse - used for pointing and clicking items on computer screen. ○ Ball Mouse - an input device operated by rolling its ball across a flat surface. It is used to control the on-screen pointer by pointing the clicking, double clicking, or dragging objects on the screen. ○ Optical Mouse - hand-supported input device that allows users to move the cursor on the screen. It works on a flat surface with a wheel between the left and right buttons. It was invented by Douglas C. Engelbart. 2. Output it supplies information and results of computation of the outside world. It may be in image, graphic, textual or audio form. Monitor important the most output device responsible for showing the visual made of pixels to the users. The pixels decide the image sharpness. Printer device an output that produces tangible information. Information is in printed form. TYPES OF PRINTER 1. Impact Printers they have a ribbon on the front which prints characters on the paper by pressing it. They can be noisy yet are very popular. Good for bulk print and consumable cost is less. Character Printers - prints only one character at a time. Types of Character Printer Dot Matrix Printer each character print has dots pattern of the size creating a complete symbol Daisy Wheel - it prints nice quality characters and are mostly present at word processing offices that need a few letters only. DOT MATRIX PRINTER DAISY WHEEL Dot Matrix Printers produces low- Daisy Wheel Printers has high- quality outputs. quality outputs. They are noisy printers. Noise is They are silent or quieter. created when pins strike the paper. Dot matrix printers are faster in Daisy wheel printers are slower producing outputs. compared to dot matrix printers. Dot Matrix Printer support multiple Daisy Wheel Printers are Limited fonts and styles. to the characters. Offers a wider range of character Supports the English language sets and languages. only. The price is affordable. r sets and They are expensive. languages. Support various styles and sizes. Support limited styles and sizes. Line Printers - prints only one line at a time. Types of Line Printer Drum Printer - a drum-like shape with track division equal to paper size. Chain Printer uses a character chain to print like 48, 64 or 96 characters. 2. Non-Impact Printers it does not use a ribbon to print but instead print an entire page in one go. Laser Printers it is used for producing dots to form characters on a page; it has a great quality output but it can't print multiple copies at a time. Inkjet Printers - The new generation printers that use the spray to print the papers. It produces high-quality. characters with a focus on details. Plotter Printers specialist type a of printer which is able to draw high quality images on very large. pieces of paper, for example 3 foot wide by 10 foot long. Flatbed plotters - These hold the paper still while the pens move Drum plotters - These roll the paper over a cylinder Pinch-roller plotters - These are a mixture of the two types above 3. RANDOM ACCESS MEMORY (RAM) It provides temporary storage for the operating system (OS) and application software in current use so that they can be quickly reached by the computer's processor. READ-ONLY MEMORY (ROM) Also known as firmware; an integrated circuit programmed with specific data when it is manufactured; used as a permanent storage RAM ROM RAM stands for Random Access Memory ROM stands for Read only Memory It is volatile in nature. Its contents are It is non-volatile in nature. Its contents are erased when power is turned off. non erased when power is turned off. We can read as well as write through this We can only read this memory and memory cannot write through it VIDEO GRAPHICS ARRAY PORT (VGA) an analog interface standard for computer video output. It defines both a display hardware specification and a 15-pin connector type used to connect video sources (like computers) to display devices (like monitors) COOLING FAN Cooling fans are there to decrease overheating. Many computers have more than one cooling fan to help users who run their computer heavily, such as video streaming or gaming. 4. CENTRAL PROCESSING UNIT (CPU) the primary component of a computer that acts as its "control center." The CPU, also referred to as the "central" or "main" processor, is a complex set of electronic circuitry that runs the machine's operating system and apps. In the past, the CPU used to be the primary processor in a computer. Today, the CPU still performs some calculations, but its main job is to manage the way data flows and coordinate task completion. CORE COMPONENTS Arithmetic logic unit (ALU): Performs arithmetic operations (addition, subtraction, multiplication, division) and logical operations (comparisons, bitwise operations) on data. Control unit (CU): Fetches instructions from memory, decodes them, and then signals the ALU and other components to execute the instructions. Registers: Small, high-speed storage locations within the CPU that hold the data and instructions that are currently being processed. Etiquette in the Internet Netiquette describes the rules of conduct for respectful and appropriate communication on the internet. Netiquette is often referred to as etiquette on the internet. Your online behavior can be used to empower or disempower others and yourself. Consider these expectations when engaging with others online. Think of the person who your post is about and how they might feel or react to it. Be careful in chatrooms and only meet up with people your family knows personally. stop and think before posting. Make sure you are not emotionally reacting. Respect the privacy of yourself and others online. Understand your digital footprint and cyber trail. Carefully consider future implications this might have for you. Interact positively online and empower others and yourself. If you wouldn't say it to someone's face, you shouldn't be saying it online. Remember that anything you post online is viewable by the whole world, regardless of privacy restrictions in place. Use respectful and empowering language. Only post images of others if you have their consent. Avoid posting images of identifiable uniforms and logos on clothing. Be courteous and respond promptly. Consider the use of sarcasm and the way that it can be interpreted by others. Understand the law and consequences for cyber abuse. Cyberbullying Laws in the Philippines Cybercrime Prevention Act of 2012 (Republic Act No. 10175) Anti-Photo and Video Voyeurism Act of 2009 (Republic Act No. 9995) Cybercrime Prevention Act of 2012 The Cybercrime Prevention Act includes provisions that penalize cyberbullying. defined broadly as acts of using information and communications technology to intimidate, harass, or cause emotional distress. The law covers a wide range of online behaviors, from posting defamatory statements to uploading unauthorized photos or videos. However, the boundary between cyberbullying and lawful expression can sometimes blur. especially when it comes to posting content aimed at public awareness or social justice. While the intent may be noble, such actions can sometimes inadvertently lead to defamation, libel, or even invasion of privacy. In Philippine jurisprudence, online libel is considered an offense if an individual posts false accusations that harm the reputation of another person.

Use Quizgecko on...
Browser
Browser