What is the Internet? CIT 100 Norm Downey. Interoperability. The Internet & The World Wide Web. Internet and the Client/Server Model

Size: px
Start display at page:

Download "What is the Internet? CIT 100 Norm Downey. Interoperability. The Internet & The World Wide Web. Internet and the Client/Server Model"

Transcription

1 The Internet & The World Wide Web CIT 100 Norm Downey What is the Internet? A global computer network made up of thousands of privately and public owned computers and computer networks. More than one billion computers are directly connected to the Internet. 2 By the way, Internet is a proper name, and as such, it is always capitalized Interoperability Internet and the Client/Server Model Interoperability enables computers that are of different brands and models, and using different operating systems exchange data and even control each other s operation Example: 3 Joe sends an from his Microsoft Windows PC that is processed by a Unix server and read by Jane on her Apple ipad and Jenny on her Android smart phone Client requests some type of service (such as a file or database access) from the server Server fulfills the request and transmits the results to the client over a network 4 1

2 Client/Server Example You, sitting at your PC in class, type in the web address for the college website into your computers browser. In this case you are the Client. The request you make is processed by a college server (a fast, high capacity computer) sends the page to your PC. 5 The college computer storing/sending the webpage is the Server Protocols Protocols are a set of rules for communication between devices Protocols determine the following: How the data is formatted, How the data is transmitted (data compression method, if any), How the sending device will indicate that it has finished sending a message How the receiving device will indicate that it has received a message 6 TCP/IP Transmission Control Protocol (TCP) Divides transmitted data into small packets for transmission, and reassembles data packets upon delivery into a complete message Internet Protocol (IP) Address 7 Numeric address that uniquely identifies each device on a computer network Four sets of numbers (0-255) each separated by a dot Example: Connecting to the Internet 8 2

3 Internet Service Providers (ISP) A company that provides access to the Internet For a fee, the Internet Service Provider provides you with a username & password that allows you to connect to the ISP s network 9 ISP Responsibilities Providing and maintaining connection to the Internet Supporting hardware and software need for connection Protecting network from viruses, hackers and other illegal activities Providing customer service Providing technical support 10 DNS Domain Name System 11 Internet directory service that converts domain names (words), that humans like, to IP addresses (numbers), which computers like Example DNS servers convert google.com into an IP address Baseband versus Broadband Baseband Type of data transmission that allows only one signal at a time. Example your telephone land line Broadband A transmission medium that transports high volumes of data at high speeds Data transmission in which a single wire can carry several channels (pathways) of data at one time. Example Cable TV & DSL 12 3

4 Baseband versus Broadband 13 Baseband Broadband Bandwidth versus Throughput Bandwidth is the maximum data transfer rate of a communication channel in a specific time period this is a theoretical speed Throughput is the actual amount of data that is transmitted in a specified time period 14 Throughput speed is almost always lower and can never exceed than bandwidth speed Bandwidth Bandwidth versus Throughput An Analogy with Cars and Traffic 15 in theory you could drive from Monroeville to downtown in 12 minutes, if there was no traffic, you had a fast car and you were allowed to drive over 100 mph Throughput the reality is it takes an hour to go from Monroeville to downtown because of rush hour traffic, the tunnels, speed limits, the limits of your car and driving skill, potholes, etc. Bandwidth is a theoretical maximum speed, throughput is the actual speed Bandwidth Usually expressed in bits per second (bps) The greater the bandwidth, the faster the connection and generally, the more expensive the connection Broadband connections provide greater bandwidth than baseband connections What s a bit? Stay tuned we ll get to that next time 16 4

5 The Last Mile Problem Types of Internet Connections The last mile problem refers to the slowest part of a connection, which is generally local cable or phone lines and often the cabling or equipment in your home Maximum bandwidth is limited by the slowest section of the connectivity chain 17 Dial-up Cable DSL Fiber Optics Phone 18 Dial-Up Connections Cable (as in Cable TV) Slowest, cheapest Internet connection that uses regular phone lines. Dial-up is a Baseband connection 19 High speed, always on Internet connection Uses coaxial cable and a cable modem for a broadband Internet connection Copper coaxial cable provides much greater bandwidth than telephone line Cable s last mile problem is that you share your bandwidth with your neighbors 20 5

6 Cable (as in Cable TV) 21 Cable TV Connections 22 How a cable Internet connection looks in your house How a cable Internet connection looks in your neighborhood Cable TV Connections Lowest-capacity coaxial cable has far greater capacity than ordinary telephone lines Coaxial cable bandwidth is divided among 3 activities: TV shows downstream to client Upstream data requests Downstream data (web pages, , etc.) Fast Downstream 1 to 50 Mbps rates 23 Digital Subscriber Line (DSL) High-speed, always-on, Internet access 24 Compresses data to improve transmission speed over regular copper telephone lines DSL s last mile problem is that it still uses ordinary phone lines which can be plagued with noise (interference) Supports throughputs of 1 to 6 Mbps Not available everywhere 6

7 DSL Connection What about Fiber Optics? 25 Central Telephone Switching Station Internet Fiber Optic cable consists of thin strands of glass or plastic that carry data on pulses of light Capable of enormous throughput Fiber optic cable, run directly to your home, virtually eliminates the last mile problem 26 Other Transmission Media 27 Cell Phone Basics 28 Infrared Wireless using light Limited to line of sight of about 100 feet Bluetooth Named for 10 th century Viking king Limited to 30 feet and 8 devices Uses radio signals not limited to line of sight 7

8 Cellular Network A radio network in which a geographic area is divided into cells, with a transmission tower and station at the center of each cell, to support mobile communications There is a short answer question on the quiz that will ask you to explain the difference between the Internet and the World Wide Web The World Wide Web What is the World Wide Web? Billions of specially formatted documents stored on Internet servers and accessed through web browsers These documents are formatted using HTML (Hyper Text Markup Language) HTML supports links to other documents, as well as graphics, audio, and video files Not all Internet servers are part of the World Wide Web 31 Internet versus World Wide Web Internet 32 Network infrastructure (cables, computers, routers, software, etc.) Used to access computers and exchange data in a variety of formats Uses TCP/IP protocols World Wide Web Billions of specially formatted documents Uses the Internet as its transport mechanism Uses HTTP or HTTPS protocols They are NOT the same thing! 8

9 Websites Websites and Web pages 33 Location in cyberspace that makes web pages available A collection of related web pages Web pages Specially formatted, linked documents on a website that includes text, graphics, sound, animation or video What s cyberspace? Virtual territory that is accessible only with a computer Web Browsers 34 Software that displays web documents and provides access to linked documents Runs on the client side of the Client/Server Model Includes: Internet Explorer (Microsoft) Edge (Microsoft comes with Windows 10) Firefox (Mozilla Foundation formerly Netscape) Chrome (Google) Safari (by and for Apple Macs) Opera (Opera Software) Web Servers Computers running special server software that Accepts requests for information, Processes requests and Sends requested documents The server side of the Client/Server Model 35 Hyperlinks 36 Clickable links in webpages that open other web documents Examples: or 9

10 HTML Web documents are created using HTML (Hypertext Markup Language) 37 HTML is a Markup Language used to define the appearance of Web pages CCAC teaches an HTML class CIT 125 How do you know if a website is secure? Look for the lock symbol in Internet Explorer (above). Clicking on the company name in Internet Explorer or Firefox (right) shows security information. 38 Rules for Evaluating Web Pages Who is the author? Are they an expert? Are the sources cited? Are the authors sources respected? Who pays for the web site? Is the presentation one sided? 39 Examples Is the language objective or argumentative? What is the purpose of the page? Is the page accurate? Is the page up to date? If unsure, look for About Us or something similar Search Engines A program that searches documents for specified keywords and returns a list of the web documents where the keywords were found Search engines then use those results to display meaningful results Search Engines include: Google Bing Yahoo Dogpile 40 10

11 URL Uniform Resource Locator Other Terms to Know 41 Web address Character string that precisely identifies an Internet resources type and location Parts of URL Protocol web.acd.ccac Domain indicates CCAC academic webpages edu Top Level Domain Name /~ndowney folder or directory on server 42 CIT140 specific page, resources or file within specified directory Examples of Top Level Domains 43 Cookies 44 Common US Top Level Domain Names.com Commercial.edu Educational.net Network Resource.mil US Military.gov US Government.org Non-profit organization Top Level International Domain Names.ca Canada.au Australia.cn China.jp Japan.mx Mexico.ng Nigeria.ru - Russia Small text files written to your computer s hard drive, generally without users knowledge or consent Used to keep track of user preferences or for compiling information about user s web browsing behavior 11

12 Cookies Uploading versus Downloading Cookies allow websites such as Amazon.com to keep track of recent searches and to present lists of related items to hopefully increase their sales Also used to build web Shopping Carts 45 Uploading Transferring files from your computer to another computer on Internet From client to server Downloading Transferring files from another computer to your computer From server to client 46 Wiki Wikis and Blogs From Hawaiian word wiki-wiki meaning fast Web page on which a visitor can post text or images, read and exchange posted information and track changes Blogs Short for web log Allow user to post thoughts and opinions 47 short for electronic mail Allows sending and receiving messages via a computer network including over the Internet address consist of User name (ndowney) At Host (acd.ccac CCAC s Academic server) Domain (.edu top level domain name) Spam unsolicited advertisements 48 12

13 Social Networking Web sites provide Web-based tools for users to share information about themselves with others on the Web, and find, meet, and converse with other members Facebook Twitter LinkedIn 49 Media Sharing Media-sharing web sites provide methods for members to store and share digital media files on the Web YouTube Flickr PhotoBucket 50 Podcasting 51 An audio file that contains a recorded broadcast distributed over the Internet via the World Wide Web The Internet of Things Connection pf physical world to Internet 52 Physical objects are tagged and can be located, monitored, and controlled using small embedded electronics Network connectivity enables these objects to collect and exchange data 13

14 Phishing Online Safety A type of attack where a phisher (a crook) poses as a legitimate business in an or on a website in an attempt to obtain personal information for purposes of identity theft No bank will ever send you an asking for your PIN number Do not click hyperlinks in suspicious s Malware Short for MALicious software Malicious is defined as 55 being characterized by malice; intending to do harm Malware is a class of software designed to damage or infiltrate a computer or network s data without users consent or knowledge Malware CANNOT do physical harm to hardware Types of Malware Spyware Collects your personal information Monitors your web usage Reports information to others for purposes of identity theft 56 14

15 Types of Malware Viruses Hidden programming code that damages or destroys infected files Designed to self-replicate Run when file is opened or program is started Spread through sharing infected files often via 57 Types of Malware - Trojans A destructive program that pretends to be a useful application Initially appears to perform a desirable function for the user, but (perhaps in addition to the expected function) steals information or does other harm Derives it s name from the Trojan Horse of Greek Mythology 58 How to Steal Passwords Password guessing Your child or pet s names are not good passwords Shoulder surfing Watch out for lurkers Packet sniffing 59 This involves specialized software to capture unencrypted data moving through a network as data packets How to Steal Passwords Dumpster diving Buy a shredder and use it don t leave sensitive paper in the trash Social engineering Sweet talked into giving up your passwords Super user status 60 Giving password or other sensitive data to people you think you can trust like your teacher or the guy from the Helpdesk 15

16 Effective Passwords should be Strong & Long 61 Use words that are unrelated to your interests, mix upper and lowercase letters, numbers, and symbols The longer the password the harder to crack Gibson Research Password Haystack Unique Vary passwords don t use one password for everything Changed regularly Change your passwords at least twice a year Protecting Yourself Online 62 Protecting Yourself Online Virus protection Application that runs your computer and searches viruses and other malware Firewall Program designed to control flow between your computer and the Internet Stops malware from Entering your computer or, if it s already in Sending messages out from your computer 63 Protect Yourself Online Parental controls Controls what children can/cannot see & do on Internet and WWW Utilizes database of unacceptable websites Keep Up-to-date Turn on Windows Automatic Updating feature Keep Anti-Virus programs up-to-date Schedule virus scans 64 16

17 Protect Yourself Online Be careful what you download and install Be sure the source is reputable When downloading software watch out for Trojans Be careful were you web surf and what you do in public on public networks Avoid being scammed Never give out passwords Don t be so trusting 65 The Internet & The World Wide Web CIT 100 Norm Downey 17

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Internet Basics. Basic Terms and Concepts. Connecting to the Internet Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a

More information

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Internet Basics. Basic Terms and Concepts. Connecting to the Internet Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a

More information

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts E-commerce 2015 business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver Chapter 3 E-commerce Infrastructure: The Internet, Web, and Mobile Platform Copyright 2015 Pearson

More information

Computer networks 2013

Computer networks 2013 Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages

More information

INFORMATION TECHNOLOGY 402

INFORMATION TECHNOLOGY 402 NAME : CLASS/ SEC : ROLL: SESSION : QUOTE : PART 1: Working With Accessibility Options 1. Accessibility options: These are the options in Windows Operating System which makes handling of computer easy

More information

Outside the Box: Networks and The Internet

Outside the Box: Networks and The Internet Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011 Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Introduction to the Internet. Part 1. What is the Internet?

Introduction to the Internet. Part 1. What is the Internet? Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected

More information

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Computers Are Your Future Twelfth Edition Chapter 8: Wired and Wireless Communication Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Wired and Wireless Communication Copyright 2012

More information

The Internet and the World Wide Web

The Internet and the World Wide Web Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense

More information

Technology in Action

Technology in Action Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral

More information

Bowie Senior Center Surfing the Web

Bowie Senior Center Surfing the Web Bowie Senior Center Surfing the Web (Without a wetsuit) Introduction Surfing the web is just another term for the activity of searching the Internet for web sites of interest. The Internet is a very powerful

More information

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved. Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,

More information

ONLINE INFORMATION. Internet Basics

ONLINE INFORMATION. Internet Basics ONLINE INFORMATION Internet Basics What is the Internet? A global network connecting millions of computers that: exchanges news, information, and opinions Millions of personal computers connected to thousands

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

ACE Chapter 4 review. Name: Class: Date: True/False Indicate whether the statement is true or false.

ACE Chapter 4 review. Name: Class: Date: True/False Indicate whether the statement is true or false. Name: Class: Date: ACE Chapter 4 review True/False Indicate whether the statement is true or false. 1. Today s Internet joins together networks of over 300 million computers, or Internet hosts, to create

More information

Elementary Computing CSC 100. M. Cheng, Computer Science

Elementary Computing CSC 100. M. Cheng, Computer Science Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans

More information

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved. Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,

More information

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

Internet and  Mini.K.G Senior Scientist, FRAD, CMFRI Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several

More information

Chapter 3. The Basics of Networking

Chapter 3. The Basics of Networking Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

Lecture 12. Application Layer. Application Layer 1

Lecture 12. Application Layer. Application Layer 1 Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers

More information

WEBINAR. Web Browsing 101 1/12/2012 WEBINAR TIPS:

WEBINAR. Web Browsing 101 1/12/2012 WEBINAR TIPS: Browsing 101 WEBINAR TIPS: 1. Power off cell phones. 2. If accessing webinar through telephone, turn down volume of computer speakers (or mute them.) 3. Conference attendees will be muted during webinar

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. CS Chapter 7 Study Guide _ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Throughput, the actual speed of data transfer that is achieved in a

More information

COMPUTER NETWORKING. Terminology of Network:

COMPUTER NETWORKING. Terminology of Network: COMPUTER NETWORKING Network: A computer network is a collection of interconnected computers. Two computers are said to be interconnected if they are capable of sharing hardware, software and exchanging

More information

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different

More information

PROTECTING YOUR BUSINESS ASSETS

PROTECTING YOUR BUSINESS ASSETS PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina

More information

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Q1 What is a computer network? A computer network, often simply referred to as a network, is a collection of computers and other hardware

More information

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013 Protecting your Security and Privacy on the Web Tony Brett Head of IT Support Staff Services IT Services 11 March 2013 Agenda Why bother? Common data leaks Email security Viruses & Trojans Phishing Why

More information

Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web?

Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web? Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web? Answer 1: The Internet and the World Wide Web are

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback ECS 15; Lectures 17 and 18 The Internet What is the internet, and how does it work? TA feedback Python -- Run your code!! Term paper: Start a paragraph with the point of the paragraph, not in modern times

More information

CONTENTS. Internet Basics. Internet Explorer. Search Engines. . Advantages and Disadvantages of the Internet. Some good websites

CONTENTS. Internet Basics. Internet Explorer. Search Engines.  . Advantages and Disadvantages of the Internet. Some good websites USING THE INTERNET CONTENTS Internet Basics Internet Explorer Search Engines E-Mail Advantages and Disadvantages of the Internet Some good websites 2 WHAT IS INTERNET? A computer network Two or more connected

More information

Chapter 2 The Internet and World Wide Web

Chapter 2 The Internet and World Wide Web Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Explain how to access and connect to the Internet Explain how to view pages and search for information on the Web Describe the types of Web

More information

end systems, access networks, links circuit switching, packet switching, network structure

end systems, access networks, links circuit switching, packet switching, network structure Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput

More information

Computers Are Your Future Tenth Edition

Computers Are Your Future Tenth Edition Computers Are Your Future Tenth Edition Chapter 3: Wired & Wireless Communication Copyright 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 All rights reserved. No part of this publication may

More information

Typical Network Uses

Typical Network Uses Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

More information

networks List various types of networks and their

networks List various types of networks and their Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Course Outline (version 2)

Course Outline (version 2) Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

Networking. Prof. Abdul Hameed

Networking. Prof. Abdul Hameed Networking Prof. Abdul Hameed http://informationtechnology.pk http://informationtechnology.pk 0 Chapter Topics Networking Fundamentals Network Architectures and Components Connecting to the Internet Installing

More information

Creating your own Website

Creating your own Website Park Street Camera Club Creating your own Website What is a web site A set of interconnected web pages, usually including a homepage, generally located on the same server, and prepared and maintained as

More information

Home Computer and Internet User Security

Home Computer and Internet User Security Home Computer and Internet User Security Lawrence R. Rogers Version 1.0.4 CERT Training and Education Networked Systems Survivability Software Engineering Institute Carnegie Mellon University Pittsburgh,

More information

FACTFILE: GCE DIGITAL TECHNOLOGY

FACTFILE: GCE DIGITAL TECHNOLOGY FACTFILE: GCE DIGITAL TECHNOLOGY AS2: FUNDAMENTALS OF DIGITAL TECHNOLOGY WEB TECHNOLOGY AND MULTIMEDIA : KEY TERMS Web Applications 1 Learning Outcomes Students should be able explain the terms: WWW The

More information

Web Cash Fraud Prevention Best Practices

Web Cash Fraud Prevention Best Practices Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web

More information

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. Name: Class: Date: The Internet and WWW True/False Indicate whether the sentence or statement is true or false. 1. A search engine is a program that performs keyword searches for information on the Internet.

More information

Chapter 4 The Internet

Chapter 4 The Internet Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3

More information

A global network of computers that share pages of information called webpages or websites. Internet Service Provider

A global network of computers that share pages of information called webpages or websites. Internet Service Provider INTERNET: A global network of computers that share pages of information called webpages or websites Computer Basics 3 Internet CONNECTING TO THE INTERNET Internet Service Provider INTERNET SERVICE PROVIDER

More information

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn...

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn... What You Will Learn... Computers Are Your Future Chapter 3 The definition of bandwidth The bandwidth needs of a typical user How modems change digital signals into analog Transmission media and methods

More information

E-companion. Quiz for IT-knowledge

E-companion. Quiz for IT-knowledge E-companion Quiz for IT-knowledge 1. The is used in combination with other keys to perform shortcuts and special tasks. A) Control (Ctrl) key B) Function key C) Toggle key D) Windows key 2. is the place

More information

1. Web Technology... 6

1. Web Technology... 6 TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling A+ Guide to Managing & Maintaining Your PC, Chapter 16 Networking Types, Devices, and Cabling Objectives Learn about network types and topologies Learn about the hardware used to build local networks Learn

More information

CMPT 165 Intro to Internet & WWW. Sept. 10 th 2015

CMPT 165 Intro to Internet & WWW. Sept. 10 th 2015 CMPT 165 Intro to Internet & WWW Sept. 10 th 2015 Admin Survey on TA office hours Course website 2 My objectives I aim to teach you concepts that will stay with you for a long, long time.. (hopefully really

More information

Available Instructor Resources Resource File Name Found

Available Instructor Resources Resource File Name Found Instructor s Manual Exploring Computing Concepts 2016, Chapter 1: Getting Started with Computer Concepts Student Data Files Solution Files Answer Keys Matching Multiple Choice Concepts Checks Scorecards

More information

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE

More information

Network Connectivity and Mobility

Network Connectivity and Mobility Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network

More information

end systems, access networks, links circuit switching, packet switching, network structure

end systems, access networks, links circuit switching, packet switching, network structure Introduction Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

INTERNET PROGRAMMING INTRODUCTION

INTERNET PROGRAMMING INTRODUCTION INTERNET PROGRAMMING INTRODUCTION Software Engineering Branch / 4 th Class Computer Engineering Department University of Technology ORGANIZATION Lecture Mondays, 08:30-10:30 (Hall 4). Project 1. The project

More information

Chapter 002 The Internet, the Web, and Electronic Commerce

Chapter 002 The Internet, the Web, and Electronic Commerce Chapter 002 The Internet, the Web, and Electronic Commerce Multiple Choice Questions 1. Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially

More information

Review for Internet Introduction

Review for Internet Introduction Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of

More information

E-commerce Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition

E-commerce Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition E-commerce 2014 business. technology. society. tenth edition Kenneth C. Laudon Carol Guercio Traver Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall Chapter 3 E-commerce Infrastructure:

More information

Özgür ZEYDAN (PhD.)

Özgür ZEYDAN (PhD.) Özgür ZEYDAN (PhD.) http://cevre.beun.edu.tr/zeydan/ Computer Network A group of computer systems and other computing hardware devices that are linked together through communication channels. Purpose:

More information

Fundamentals of Information Systems, Seventh Edition

Fundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets Fundamentals of Information Systems, Seventh Edition 1 An Overview of Telecommunications

More information

The process by which a user can associate specific permissions to each username.

The process by which a user can associate specific permissions to each username. Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost

More information

St name:mariam darbi St number :1699

St name:mariam darbi St number :1699 St name:mariam darbi St number :1699 what is the internet &how it work? The internet : is a network of networks and is a global comput er network, it is offspring of the ARPANET project. This idea of connecting

More information

The Internet and World Wide Web. Chapter4

The Internet and World Wide Web. Chapter4 The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History

More information

Chapter 1: introduction

Chapter 1: introduction Chapter 1: introduction our goal: v get feel and terminology v more depth, detail later in course v approach: use Internet as example overview: v what s the Internet? v what s a protocol? v edge; hosts,

More information

Demystifying Internet Basics. Shelley Robinson, Executive Director André Dalle, System and Network Administrator

Demystifying Internet Basics.  Shelley Robinson, Executive Director André Dalle, System and Network Administrator Demystifying Internet Basics www.ncf.ca Shelley Robinson, Executive Director André Dalle, System and Network Administrator NCF history Started in 1992, dial-up Also locally-hosted email, basic webhosting

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Chapter 6 The Internet

Chapter 6 The Internet Chapter The Internet Computer Concepts 2014 Chapter Contents Section A: Internet Technology Section B: Fixed Internet Access Section C: Portable and Mobile Internet Access Section D: Internet Services

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

Discovering Computers Chapter 2 The Internet and World Wide Web

Discovering Computers Chapter 2 The Internet and World Wide Web Discovering Computers 2008 Chapter 2 The Internet and World Wide Web Just remember It took 38 years for radio to reach 50 million users 13 years for television to reach 50 million users Less than 4 years

More information

Acknowledgment and Disclaimer:

Acknowledgment and Disclaimer: What is the Internet Acknowledgment and Disclaimer: This presentation is supported in part by the National Science Foundation under Grant 1240841. Any opinions, findings, and conclusions or recommendations

More information

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Photo Copyright 2012 AgVenture. All Rights Reserved. Welcome Goals of the workshop: Gain a better

More information

The internet and the web

The internet and the web 1 The internet and the web Internet lunched in 1969 National computer network called: Advanced Research Project Agency Network (ARPANET). The internet is : -Large network that connects together smaller

More information

E-commerce Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition

E-commerce Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition E-commerce 2014 business. technology. society. tenth edition Kenneth C. Laudon Carol Guercio Traver Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall e Commerce Course : Chapter 3 E-commerce

More information

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture Network Fundamentals Chapter 7: Networking and Security CS10001 Computer Literacy Network Two or more computers connected by hardware or software so that they can communicate with each other Nodes Devices

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers

More information

How do you connect to the Internet (WWW)? Internet connection alternatives:

How do you connect to the Internet (WWW)? Internet connection alternatives: Peter C. Cronas How do you connect to the Internet (WWW)? Internet connection alternatives: Dial Up Modem 56Kb (a joke right?) Satellite (HughesNet) Modem 10-15 Mbps?? Cable (Cablevision) Cable Modem 1.5-20

More information

Online Security and Safety Protect Your Computer - and Yourself!

Online Security and Safety Protect Your Computer - and Yourself! Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your

More information

ECDL / ICDL IT Security. Syllabus Version 2.0

ECDL / ICDL IT Security. Syllabus Version 2.0 ECDL / ICDL IT Security Syllabus Version 2.0 Module Goals Purpose This document details the syllabus for the IT Security module. The syllabus describes, through learning outcomes, the knowledge and skills

More information

An internet or interconnected network is formed when two or more networks are connected.

An internet or interconnected network is formed when two or more networks are connected. Computers I 3. The Internet An internet or interconnected network is formed when two or more networks are connected. The most notable internet is called the Internet and is composed of millions of these

More information

Principles of Information Systems textbook: Principles of Information Systems, Sixth Edition. Dr.Amer Alzaidi Department of Information Systems

Principles of Information Systems textbook: Principles of Information Systems, Sixth Edition. Dr.Amer Alzaidi Department of Information Systems + Principles of Information Systems textbook: Principles of Information Systems, Sixth Edition Dr.Amer Alzaidi Department of Information Systems Chapter 4 Telecommunications, the Internet, Intranets, and

More information

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question

More information

Basic Internet. Basic Internet

Basic Internet. Basic Internet Basic Internet Basic Internet What is the Internet? The Internet is a global network connecting millions of computers which are linked together around the world, cooperating and communication with each

More information

Introduction to the Internet and Web

Introduction to the Internet and Web Introduction to the Internet and Web Internet It is the largest network in the world that connects hundreds of thousands of individual networks all over the world. The popular term for the Internet is

More information

PRACTICING SAFE COMPUTING AT HOME

PRACTICING SAFE COMPUTING AT HOME PRACTICING SAFE COMPUTING AT HOME WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED PATCHLINK ENGINEER ENTERPRISE INFORMATION SYSTEMS

More information

Broadband Internet Access Disclosure

Broadband Internet Access Disclosure Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided

More information

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued) Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

How many people are online? As of Sept. 2002: an educated guess suggests: World Total: million. Internet. Types of Computers on Internet

How many people are online? As of Sept. 2002: an educated guess suggests: World Total: million. Internet. Types of Computers on Internet Internet Hazelwood East High School How many people are online? As of Sept. 2002: an educated guess suggests: World Total: 605.6 million Africa: 6.31 million Asia/ Pacific: 187.24 million Europe: 190.91

More information

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]

More information