IT1404 Internet and World Wide Web Multiple Choice Question Paper

Size: px
Start display at page:

Download "IT1404 Internet and World Wide Web Multiple Choice Question Paper"

Transcription

1 UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2009/ st Year Examination Semester 1 IT1404 Internet and World Wide Web Multiple Choice Question Paper 07 th March, 2010 (TWO HOURS) Important Instructions : The duration of the paper is 2 (two) hours. The medium of instruction and questions is English. The paper has 50 questions and 13 pages. All questions are of the MCQ (Multiple Choice Questions) type. All questions should be answered. Each question will have 5 (five) choices with one or more correct answers. All questions will carry equal marks. There will be a penalty for incorrect responses to discourage guessing. The mark given for a question will vary from 0 to +1 (All the correct choices are marked & no incorrect choices are marked). Answers should be marked on the special answer sheet provided. Note that questions appear on both sides of the paper. If a page is not printed, please inform the supervisor immediately. Mark the correct choices on the question paper first and then transfer them to the given answer sheet which will be machine marked. Please completely read and follow the instructions given on the other side of the answer sheet before you shade your correct choices. 1

2 1. Internet (a) is an open global network of interconnected computer networks which use a common communication protocol, TCP/IP. (b) is becoming more and more safe and important for children. (c) always provides a secure and reliable way of transaction. (d) has become an important tool that enables communication among members of society. (e) always contains precise, reliable information. 2. Which of the following is(are) not broadband internet connections? 3. Fill in the blank. (a) DSL (b) IPTV (c) Leased lines (d) Cable Internet (e) Dial-Up... is a high speed Internet connection that uses the normal phone wires with special modems at either end. With this connection one can connect his computer to the Internet and talk on the phone at the same time on the same phone line. (a) WiMAX (b) Dial-Up (c) Leased line (d) DSL (e) Cable Internet 4. A Uniform Resource Locator (URL) tells the browser the (a) transfer protocol to use when transporting a resource. (b) domain name of the computer on which the resource resides. (c) path name of the folder/directory on the computer on which the resource resides. (d) name of the resource to be retrieved. (e) IP address of the computer on which the resource resides. 5. Which of the following methods will work in getting the IP address of a computer connected to the Internet running on a Windows operating system? (a) Typing the Ipconfig at command prompt (b) Typing the ping command at command prompt (c) Properties of Internet protocol, lists the IP address (d) Getting the IP address of any other computer connected to the same network (e) Referring to the IP address found last time as it is always the same 6. Web 2.0 is commonly associated with web applications which facilitate interactive information sharing, interoperability, user-centered design and collaboration on the World Wide Web. Which of the following is (are) included in Web 2.0? (a) Social networking sites (b) Wikis (c) Blogs (d) Mashups (e) Video sharing sites 7. Identify mailing list servers from among the following. (a) Listserv (b) Listproc (c) ebay (d) Addressbook (e) Google groups 2

3 8. Consider the following scenario. A uses Thunderbird as the client and B uses Eudora as the client. Which of the following statements is(are) correct in relation to the above scenario? 9. Match column X with Y. (a) messages sent by A can be received by B. (b) messages sent by B can be received by A. (c) A or B cannot receive messages sent by other clients. (d) A can never receive messages sent by B but B can receive messages sent by A. (e) B can never receive messages sent by A, but A can receive messages sent by B. Column X Column Y i IMAP Protocol A used by the Mail Transfer Agent (MTA) to deliver to the recipient's mail server ii POP3 Protocol B is not a protocol dedicated for communications, but it can be used for accessing your mailbox iii SMTP Protocol C is a client/server protocol in which is received and held for you by your Internet server iv HTTP Protocol D used to download messages from the mail server to a local computer (a) i -A, ii -B, iii -C, iv-d (c) i- B, ii -C, iii -D, iv-a (e) i -C, ii -B, iii -A, iv-d (b) (i) -D, ii -C, iii -B, iv-a (d) (i) -C, ii -D, iii -A, iv-b 10. Consider the following statements with regard to Multipurpose Internet Mail Extensions (MIME). i MIME adds multi-media extensions to the existing system by changing the SMTP protocol. ii MIME is also used for information exchange between web browsers and web servers. iii MMIME redefines the format of messages to allow for multi-part message bodies. Which of the above Statements is /are correct? (a) i only. (b) ii only. (c) i and ii only. (d) ii and iii only. (e) All. 11. Consider the following statements related to Blind Carbon Copy (BCC) feature available in an client. i An address in the BCC field is visible to recipients in CC field. ii Addresses in the BCC field are not displayed on incoming messages. iii If there are no valid address in the To or CC field, then some programs will indicate a notation like "Recipient list suppressed" in the To field, which tells the recipient that there is at least one BCC address. Which of the above statements is (are) correct? (a) i only. (c) i and iii only. (e) All (b) ii only. (d) ii, and iii only. 3

4 12. Consider the following scenario and the statements. Scenario: An user observed that the time in his computer is correct, but when he sends , the timestamp in his is an hour ahead. Statements: i. The "one hour off" is actually a clue that his time zone is set incorrectly. ii. The change of time stamp depends on what program or service is being used. iii. The Selection of the correct "time zone" is not one of the reasons for this situation experienced by the user. Identify the correct statements from above with regard to the above scenario. (a) i only. (b) ii and iii only. (c) i and iii only. (d) i and ii only. (e) All. 13. Identify the correct statement(s) related to Pull and Push technologies in . (a) Pull technology requires the user to actively go and retrieve the information. (b) Push technology delivers information to the user and hence user has only to receive it. (c) One of the reasons has been a success is because it is a Pull technology. (d) An advantage of Push technologies is the ease of use, they require a minimum of effort on the part of the recipient. (e) Push technology is used when surfing the World Wide Web to seek out and download information. 14. Select correct statement(s) related to . (a) Any file type can be sent as an attachment. (b) The recipient should have an MS Excel program to receive an MS Excel file as an attachment. (c) To send and receive attachments, both the sender and the receiver must use the same operating system. (d) Uuencode can be used to encode attachments. (e) Only the encoding programs which are known to the mail servers can be used to encode attachments. 15. Consider the following statements given below with regard to filtering of . i One of the most common uses of filters is automatic transfer of incoming into different mailboxes. ii Messages from individuals/groups can be directed into a special folder using e- mail filters. iii One can set up his own set of rules to create an application level spam blocker. Which of the above statements is (are) correct? (a) i only. (b) i and ii only. (c) i and iii only (d) ii and iii only (e) All 4

5 16. Hyperlink is 17. HTML documents (a) an image which connects to another web page. (b) a piece of text that connects to another part of the same document. (c) used in defining the internet. (d) used to format text. (e) a tag used to play background sound. (a) describe web pages. (b) contain HTML tags and plain text. (c) are called web pages (d) contain 3D definitions. (e) are used for server side scripting. 18 Which of the following statements is/are correct in relation to <pre> tag used in HTML? (a) Text inside this tag is displayed in a fixed-width font and preserves both spaces and line breaks. (b) It displays the text in size 12 font. (c) It displays the text in size 24 font. (d) Default font for this tag is Courier. (e) Default font for this tag is Arial. 19. Identify the correct statement(s) about URI s and URL s. (a) URL is a deprecated element as per the w3c definition. (b) URI means Universal Resource Identifier. (c) URL is a subset of URI. (d) URI is a subset of URL. (e) URI specifies the server name or IP address. 20. Select the set(s) of tags which contains invalid core attributes of HTML. (a) meta, param, pre, bold (c) style, title, meta, param (e) subscript, font, img, head (b) head, base, html, script (d) pre, form, bold, superscript 21. Which of the following can be used to edit HTML? (a) gedit (b) Emacs (c) Ogre (d) Unreal Engine (e) Vi 22. Find the correct set(s) of words which contain(s) only search engines? (a) Ask, Google, Yahoo, Hotmail (c) Ask, Yahoo, Google, Cricinfo (e) Java Search, Google, Hotmail, Yahoo (b) Hotmail, Yahoo, Gmail, Ogre (d) MSN, Google, Ask, Yahoo 5

6 23. Identify the search engine techniques from among the following. (a) Crawler based systems (c) Ray tracing based techniques (e) Acyclic searching techniques (b) Human powered directories (d) Collision based techniques 24. Which of the following is(are) true about spider based searching? (a) Spiders initially read the content after visiting a site. (b) After reading the content, spiders move through the site by using the links. (c) Spidered sites are often revisited after an elapse of a specified time period. (d) This is not a web search technique. (e) Spiders are mechanical devices which crawl servers physically. 25. Select the correct statement(s) related to web directories and search engines. (a) Web directories use a different approach from search engines to build useful indexes of information on the web. (b) One of the oldest directories on the web is Yahoo!. (c) A search engine differs form a web directory as it is already selected and organized into categories. (d) Web directory is a listing of hyperlinks to web pages which is organized into hierarchical categories. (e) In a web directory, the database is searched in response to a visitors query. 26. Consider the part of the web page given below. Which of the following is(are) indicated by the small padlock that appears at the right edge of the status bar in above? (a) Web page is blocked by the network administrator (b) Not authorized to access the information on the web site (c) Web site is authenticated properly and the communication is secure (d) Cannot upload to the web site (e) Cannot download from the web site 6

7 27. Consider the following HTML page. Select the most compact HTML code snippet from among the following to depict the above output. (a) <html> <h1> Hello World!<h1> / </html> (c) <html> <title> Internet and WWW </title> <h1> Hello World!</h1> </html> (b) <html> <head> Internet and WWW </head> </html> (d) <html> <head> <title> Internet and WWW </title> </head> <h1> Hello World!</h1> </html> (e) There is no HTML code that is capable of deriving the above output. 28. Consider the following output. Which of the following HTML code snippets would give the output shown above? (a) < html > Can you do this? < /html > (c) < html < Can you do this? < /html < (e) < html > < body> Can you do this? < /html > (b) > html > Can you do this? > /html > (d) > html < Can you do this? > /html < 7

8 29. Consider the following HTML code. <dl> <dt>coffee</dt> <dd>black hot drink</dd> <dt>milk</dt> <dd>white cold drink</dd> </dl> What is the correct output of the above HTML code snippet when run on a browser? (a) Coffee Black hot drink Milk White cold drink (c) Coffee Black hot drink Milk White cold drink (b) Coffee Black hot drink Milk White cold drink (d) Coffee Black hot drink Milk White cold drink (e) Coffee Black hot drink Milk White cold drink 30. Consider the HTML code given below. <head> </head> <style type="text/css"> body {background-color: red} p {margin-left: 20px} </style> The Cascading Style Sheet defined in the above code snippet is defined as (a) external to the document. (c) an inline style. (e) a graphical style. (b) internal to the document. (d) an abstract linear style. 31. How can an HTML developer create a link such that it opens in a new browser window? (a) <a href="url" target="_blank"> (c) <a href="url" target="_new"> (e) <a href="url" target="_parent"> (b) <a href="url" new> (d) <a href="url" target="_self"> 32. Consider the following statement. Input fields are predominantly used in web forms. Select the set(s) which contain(s) valid names for the type of the input field. (a) text, submit, radio, dropdown (c) text, radio, textbox, reset (e) radiobutton, textarea, dropdown, combo (b) checkbox, reset, submit, text (d) combo, reset, submit, text 8

9 33. Match column X with Y. Column X Column Y A IPTV i Wireless transmission of data using a variety of transmission modes B WiMAX ii Software system that allows one to control a remote computer C ipod iii A family of popular digital music players from Apple D VNC iv Digital television service delivered using Internet Protocol (a) A- i, B- iv, C- iii, D- ii (c) A- i, B- iii, C- ii-, D- iv (e) A- iv, B- i, C- iii, D- ii (b) A- iv, B- ii, C- iii, D- i (d) A- i, B- ii, C- iii, D- iv 34. Consider the following questions asked by a novice FTP user and the answers he got. (i) Ques: Is FTP independent of the operating system? Ans: Yes (ii) Ques: Is it important to scan the files downloaded from the FTP sites? Ans: No (iii) Ques: Can one use a web browser to upload and download files from FTP sites? Ans: Yes (iv) Ques: Is there a customary password to log on to a publicly accessible FTP site? Ans: Yes Identify Question numbers for which he has got correct answers (a) (i) and (ii) only (b) (i) and (iii) only (c) (ii) and (iii) only (d) (i), (iii) and (iv) only. (e) (ii), (iii) and (iv) only. 35. Consider the following scenario. An ecommerce web sites use the SSL protocol in handling sensitive information as it travels over the Internet. Also, they store their customer information so that customers do not have to type the card numbers every time they buy something from the web site. Which of the following statements is(are) correct in relation to the above scenario? (a) Using SSL protocol protects sensitive information. (b) Instead of SSL protocol, HTTP protocol should have been used. (c) Buyers privacy will not be violated. (d) Storing customer information is always beneficial. (e) This web site can always be trusted as it uses the SSL protocol. 9

10 36. Consider the following statements. (i) (ii) (iii) RSS is a file containing summaries of stories and news from the web. RSS differs from newsgroups in the way the content is delivered to the subscriber. Newsgroups are technically distinct from, but functionally similar to, discussion forums on the World Wide Web. Which of the above statements is (are) correct? (a) (ii) only. (b) (i) and (ii) only (c) (ii) and (iii) only (d) (i) and (iii) only. (e) ALL. 37. In using passwords on the Internet, (a) common words spelt backwards are good passwords. (b) gluing few words together makes good passwords. (c) write down the passwords to avoid difficulties. (d) better to have different passwords for each kind of account. (e) avoid using English words or common names. 38. Identify the correct statements related to sound and music on the web. 39. Match column x with y. (a) Music stored in WAV file format would be in lower quality than in MP3 file format. (b) MIDI files are smaller in size than WAV files. (c) MIDI files are often used in the web. (d) A CD that might hold 15 songs in WAV format could instead hold 150 songs in MP3 format. (e) MP3 file sharing activity is unethical because it deprives the creators of the audio works. Column X Column Y A PBWorks i Location to download and develop free open source software B SourceForge ii Shared workspaces for working with colleges, clients and partners C Drupal iii Open source content management platform D Blogger iv Share your thoughts, photos and more with your friends and the world (a) A- i, B- iv, C- iii, D- ii (c) A- ii, B- iii, C- i-, D- iv (e) A- iv, B- i, C- iii, D- ii (b) A- ii, B- i, C- iii, D- iv (d) A- i, B- ii, C- iii, D- iv 40. Select the correct statements related to online social networks. (a) Social networks rely on advertising to generate the revenue they need to operate the site. (b) Social networks allow creating blogs and posting pictures.. (c) One can post and download digital music files from social networks. (d) Flickr is an online photo management and sharing application in the world. (e) LinkedIn is an online social network. 10

11 41. elearning is moving towards (a) richer content able to provide more authentic learning environments. (b) SCORM to standardize the effort. (c) formalizing the process of content creation and maintenance. (d) minimizing simulation in the content. (e) sufficiently sophisticated feedback mechanisms. 42. Identify the free online library resources among the following. (a) The WWW virtual library (c) Public Library Of Science (e) Encyclopaedia Britannica (b) Wikipedia (d) Internet Public Library 43. Consider the following diagram. X In the above diagram, X is used for filter the information. What can X be? (a) Modem (b) Firewall (c) Router (d) Repeater (e) Gateway 44. Consider the following incomplete paragraph. In the (A). the same key is used to encrypt and decrypt the data. This is similar to using the same key to lock and unlock a door lock. In contrast,..(b).. uses two keys, one key as the..(c).. or the public key and the other key as the..(d) or the private key. This method is more practical compared to the first method. Fill in the blanks from (A) to (D). (a) (A) public key cryptography, (B) secret key cryptography, (C) decryption key, (D) encryption key (b) (A) secret key cryptography, (B) public key cryptography, (C) decryption key, (D) encryption key (c) (A) secret key cryptography, (B) encryption key (C) public key cryptography (D) decryption key (d) (A) public key cryptography, (B) secret key cryptography, (C) encryption key (D) decryption key (e) (A) public key cryptography, (B) encryption key, (C) secret key cryptography (D) decryption key 11

12 45. Identify the secure protocols from among the following. (a) HTTP (b) SSL (c) SET (d) FTP (e) S-HTTP 46. Read the following descriptions about X, Y and Z. X: It does something harmful to the computer system, but is disguised as something useful. Usually does not make copies of themselves Y: It is a computer program that propagates itself across computers, creating copies of itself in each computer and infecting the entire network. Z : It is a computer program designed to replicate itself by infecting other files or system areas which need a host program to spread to another computer. X, Y Z can be respectively, 47. Consider the following. (a) X: Virus, Y: Worm, Z: Trojan horse. (b) X: Trojan horse, Y : Virus, Z: Worm. (c) X: Worm, Y: Virus, Z: Trojan horse. (d) X: Trojan horse, Y: Worm, Z: Virus. (e) X: Worm, Y: Trojan horse, Z: Virus. i ii iii iv Messages on Social Networking websites Messages posted on message boards addresses in address books Images stored in a computer memory Which of the above can be considered as electronic evidence in a court of law? (a) i, ii, and iii only. (c) ii, iii and iv only. (e) All. (b) i and iv only. (d) i, iii and iv only. 48. Consider the following scenario. In the year 2003, a user of e-bay (an internet auction website) received s supposedly from ebay claiming that the user s account was about to be suspended unless he/she clicked on the provided link and updates/verifies his credit card information that the ebay already had. This led to some people being tricked into thinking they were actually being contacted by ebay and were subsequently going to ebay s site to update their account information. This type of internet scam is known as (a) Money Laundering. (b) Flaming. (c) Spam. (d) Phishing. (e) Stealing. 49. Consider the following statements on the use of web based services. i User leaves an electronic trail from which his/her behaviour could be analysed. ii User leaves no trail or clue since the browser is closed after his web sessions. iii By clearing private data, user can erase his trail completely. Which of the above statements is(are) true? (a) i only. (b) i and ii only. (c) iii only. (d) ii and iii only. (e) None. 12

13 50. Consider the following statements. i ii iii iv Internet Communication is completely secure and any information that is transmitted over the internet is also secure. messages composed in upper case will not be interpreted as shouting if the volume function is muted. Forwarding chain messages is allowed, as is meant for communication and has insignificant cost. Providing addresses of friends, relatives and colleagues to advertise firms is ethical since it will give them an opportunity to know about new products and services. Which of the above statements is/are correct with regard to the ethical and legal behaviour on the Internet? (a) i,ii and iv only (b) i and iv only (c) ii and iv only (d) i and iii only (e) None. ************ 13

IT1403: Internet and World Wide Web Multiple Choice Question Paper

IT1403: Internet and World Wide Web Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2007/2008 1 st Year Examination Semester 1 IT1403: Internet

More information

IT1404: Internet and World Wide Web Multiple Choice Question Paper

IT1404: Internet and World Wide Web Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2011/2012 1 st Year Examination Semester 1 IT1404: Internet

More information

IT1403 Internet and World Wide Web Multiple Choice Question Paper

IT1403 Internet and World Wide Web Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2008/2009 1 st Year Examination Semester 1 IT1403 Internet

More information

IT1404: Internet and World Wide Web Multiple Choice Question Paper

IT1404: Internet and World Wide Web Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2010/2011 1 st Year Examination Semester 1 IT1404: Internet

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

Internet. Class-In charge: S.Sasirekha

Internet. Class-In charge: S.Sasirekha Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems

More information

Network Applications and Protocols

Network Applications and Protocols Network Applications and Protocols VoIP (Voice over Internet Protocol) Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over

More information

The Internet The Internet

The Internet The Internet The Internet The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number

More information

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP) The Internet, Intranets, and Extranets 1 The Internet The Internet is a collection of interconnected network of computers, all freely exchanging information. These computers use specialized software to

More information

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

is still the most used Internet app. According to some studies around 85% of Internet users still use  for communication. 1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a

More information

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the

More information

Computer networks 2013

Computer networks 2013 Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages

More information

Electronic Mail Paradigm

Electronic Mail Paradigm Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

Header- A Forensic Key to Examine an

Header- A Forensic Key to Examine an E-Mail Header- A Forensic Key to Examine an E-Mail Swapnil Gupta 1, Kopal Gupta 2, Dr. Anu Singla 3 1,2,3 Institute of Forensic Science & Criminology, Bundelkhand University, Jhansi (U.P.), India ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

The Internet and World Wide Web. Chapter4

The Internet and World Wide Web. Chapter4 The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History

More information

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application

More information

Unit 4 The Web. Computer Concepts Unit Contents. 4 Web Overview. 4 Section A: Web Basics. 4 Evolution

Unit 4 The Web. Computer Concepts Unit Contents. 4 Web Overview. 4 Section A: Web Basics. 4 Evolution Unit 4 The Web Computer Concepts 2016 ENHANCED EDITION 4 Unit Contents Section A: Web Basics Section B: Browsers Section C: HTML Section D: HTTP Section E: Search Engines 2 4 Section A: Web Basics 4 Web

More information

Using the Internet and the World Wide Web

Using the Internet and the World Wide Web Using the Internet and the World Wide Web Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Understand the difference between the Internet and the World Wide Web. Identify

More information

Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number:

Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number: Unit 1: Your School Standards: 01.04, 02.01, 02.06 (School Website, Yearbook, Newspaper, Personnel Interviews) 1. List major clubs at your school: 2. What is the purpose of FBLA? 3. What services are available

More information

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3 Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit

More information

USING THE INTERNET AND THE WORLD WIDE WEB RAYMOND ROSE

USING THE INTERNET AND THE WORLD WIDE WEB RAYMOND ROSE USING THE INTERNET AND THE WORLD WIDE WEB RAYMOND ROSE LEARNING OUTCOMES the World Recognize the key elements of Web sites Surf the Internet Use search engines 2 IDENTIFYING THE INTERNET the World Understand

More information

Discovering Computers Chapter 2 The Internet and World Wide Web

Discovering Computers Chapter 2 The Internet and World Wide Web Discovering Computers 2009 Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet

More information

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12 ELECTRONIC MAIL RAYMOND ROSE Computer Technology Department 2011/12 ELECTRONIC COMMUNICATION Systems for exchanging information and news were the first applications developed for network communication.

More information

SECURING INFORMATION SYSTEMS

SECURING INFORMATION SYSTEMS SECURING INFORMATION SYSTEMS (November 7, 2016) BUS3500 - Abdou Illia - Fall 2016 1 LEARNING GOALS Understand security attacks preps Discuss the major threats to information systems. Discuss protection

More information

The internet and the web

The internet and the web 1 The internet and the web Internet lunched in 1969 National computer network called: Advanced Research Project Agency Network (ARPANET). The internet is : -Large network that connects together smaller

More information

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. Name: Class: Date: The Internet and WWW True/False Indicate whether the sentence or statement is true or false. 1. A search engine is a program that performs keyword searches for information on the Internet.

More information

Chapter 4 The Internet

Chapter 4 The Internet Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

1. Web Technology... 6

1. Web Technology... 6 TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components

More information

Outside the Box: Networks and The Internet

Outside the Box: Networks and The Internet Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

The process by which a user can associate specific permissions to each username.

The process by which a user can associate specific permissions to each username. Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost

More information

ATTACHMENTS, INSERTS, AND LINKS...

ATTACHMENTS, INSERTS, AND LINKS... Conventions used in this document: Keyboard keys that must be pressed will be shown as Enter or Ctrl. Objects to be clicked on with the mouse will be shown as Icon or. Cross Reference Links will be shown

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

Module 1: Internet Basics for Web Development (II)

Module 1: Internet Basics for Web Development (II) INTERNET & WEB APPLICATION DEVELOPMENT SWE 444 Fall Semester 2008-2009 (081) Module 1: Internet Basics for Web Development (II) Dr. El-Sayed El-Alfy Computer Science Department King Fahd University of

More information

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011 Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Introduction to the Internet. Part 1. What is the Internet?

Introduction to the Internet. Part 1. What is the Internet? Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected

More information

An Overview of Webmail

An Overview of Webmail An Overview of Webmail Table of Contents What browsers can I use to view my mail? ------------------------------------------------------- 3 Email size and storage limits -----------------------------------------------------------------------

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

VISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce

VISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce VISUAL SUMMARY The Internet, the Web, and Electronic Commerce INTERNET AND WEB Internet Launched in 1969 with ARPANET, the Internet consists of the actual physical network. Web Introduced in 1991 at CERN,

More information

The Ultimate Digital Marketing Glossary (A-Z) what does it all mean? A-Z of Digital Marketing Translation

The Ultimate Digital Marketing Glossary (A-Z) what does it all mean? A-Z of Digital Marketing Translation The Ultimate Digital Marketing Glossary (A-Z) what does it all mean? In our experience, we find we can get over-excited when talking to clients or family or friends and sometimes we forget that not everyone

More information

APPENDIX A. Answer: D Reference: Hardware Basics Difficulty: Easy. Answer: A Reference: Hardware Basics Difficulty: Easy

APPENDIX A. Answer: D Reference: Hardware Basics Difficulty: Easy. Answer: A Reference: Hardware Basics Difficulty: Easy APPENDIX A Multiple Choice: 1. A desktop computer is also known as a: A. Palm Pilot. B. laptop. C. mainframe. D. PC. Answer: D Reference: Hardware Basics Difficulty: Easy 2. The physical parts of a computer

More information

ing With PHP History of Applications or Use

ing With PHP History of  Applications or Use Emailing With PHP What is Email? E mail, short for electronic mail and often abbreviated to e mail, email or simply mail, is a store and forward method of composing, sending, receiving and storing messages

More information

Chapter 5: Networking and the Internet

Chapter 5: Networking and the Internet Chapter 5: Networking and the Internet (Completion Time: 3 weeks) Topics: Internet Basics An overview of how the internet works and how we as users interact with it. This topic can also be used as sort

More information

Introduction. Logging in. WebQuarantine User Guide

Introduction. Logging in. WebQuarantine User Guide Introduction modusgate s WebQuarantine is a web application that allows you to access and manage your email quarantine. This user guide walks you through the tasks of managing your emails using the WebQuarantine

More information

Electronic Mail (SMTP)

Electronic Mail (SMTP) Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,

More information

(5) Affiliation (10) XML (15) Web Augmentation (20) Gateways. (4) Kernel (9) ES test (14) SSL. (1) Portal (6) EDI (11) Web Directories (16) W3C

(5) Affiliation (10) XML (15) Web Augmentation (20) Gateways. (4) Kernel (9) ES test (14) SSL. (1) Portal (6) EDI (11) Web Directories (16) W3C PART 1: MULTIPLE CHOICE QUESTIONS (15 MARKS) This part consists of 15 multiple choice questions. On the answer sheet, fill you answer for each question. 1. At its early days was called Gateway, nowadays

More information

Elementary Computing CSC 100. M. Cheng, Computer Science

Elementary Computing CSC 100. M. Cheng, Computer Science Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Google Apps. What are Google Apps?

Google Apps. What are Google Apps? What are Google Apps? Google Apps Google provides free, online (i.e. Cloud computing) programs called Apps for creating various kinds of documents, as well as providing a way to share these documents with

More information

Using Your New Webmail

Using Your New Webmail Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University http://alainmaterials.webs.com/

More information

Contents. Management. Client. Choosing One 1/20/17

Contents.  Management.  Client. Choosing One 1/20/17 Contents Email Management CSCU9B2 Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP, HTTP,

More information

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer

More information

Discovering Computers Chapter 2 The Internet and World Wide Web

Discovering Computers Chapter 2 The Internet and World Wide Web Discovering Computers 2008 Chapter 2 The Internet and World Wide Web Just remember It took 38 years for radio to reach 50 million users 13 years for television to reach 50 million users Less than 4 years

More information

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations 98-367 MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations Which are common symptoms of a virus infection? (Lesson 5 p 135-136) Poor system performance. Unusually low

More information

Practice Examination 3

Practice Examination 3 Name Date Click here to enter text. Click here to enter text. Pearson BTEC Level 1 / Level 2 First Information and Creative Technology Unit 1: The Online World Practice Examination 3 This practice examination

More information

Management Information Systems

Management Information Systems Telecommunications, the Internet, and Wireless Technology Lecturer: Richard Boateng, PhD. Lecturer in Information Systems, University of Ghana Business School Executive Director, PearlRichards Foundation,

More information

Administrative Training Mura CMS Version 5.6

Administrative Training Mura CMS Version 5.6 Administrative Training Mura CMS Version 5.6 Published: March 9, 2012 Table of Contents Mura CMS Overview! 6 Dashboard!... 6 Site Manager!... 6 Drafts!... 6 Components!... 6 Categories!... 6 Content Collections:

More information

Principles of Information Systems textbook: Principles of Information Systems, Sixth Edition. Dr.Amer Alzaidi Department of Information Systems

Principles of Information Systems textbook: Principles of Information Systems, Sixth Edition. Dr.Amer Alzaidi Department of Information Systems + Principles of Information Systems textbook: Principles of Information Systems, Sixth Edition Dr.Amer Alzaidi Department of Information Systems Chapter 4 Telecommunications, the Internet, Intranets, and

More information

Using the Control Panel

Using the Control Panel Using the Control Panel Technical Manual: User Guide Creating a New Email Account 3. If prompted, select a domain from the list. Or, to change domains, click the change domain link. 4. Click the Add Mailbox

More information

IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad

IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad OCT 21,2016 BS110401050 BS110401050@vu.edu.pk Arslan.arshad01@gmail.com AKMP01 IT430 - E-COMMERCE Midterm Papers

More information

Chapter 10: Security and Ethical Challenges of E-Business

Chapter 10: Security and Ethical Challenges of E-Business Chapter 10: Security and Ethical Challenges of E-Business Learning Objectives Identify several ethical issues in IT that affect employment, individuality, working condition, privacy, crime health etc.

More information

M3-R3: INTERNET AND WEB DESIGN

M3-R3: INTERNET AND WEB DESIGN M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER

More information

National Training and Education Resource. Authoring Course. Participant Guide

National Training and Education Resource. Authoring Course. Participant Guide National Training and Education Resource Authoring Course Participant Guide Table of Contents: OBJECTIVES... 4 OVERVIEW OF NTER... 5 System Requirements... 5 NTER Capabilities... 6 What is the SCORM PlayerWhat

More information

Chapter 2 The Internet and World Wide Web

Chapter 2 The Internet and World Wide Web Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet Recognize how Web pages

More information

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued) Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

Webmail 7.0 is an online client which runs in your web browser. Webmail 7.0 allows you to access your , contact list, and calendar from

Webmail 7.0 is an online  client which runs in your web browser. Webmail 7.0 allows you to access your  , contact list, and calendar from Webmail 7.0 is an online email client which runs in your web browser. Webmail 7.0 allows you to access your email, contact list, and calendar from any computer with an internet connection and a web browser.

More information

Using web-based

Using web-based Using web-based Email 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes it to a sorting office

More information

Binarytech Digital Education Karta Allahabad ( Notes)

Binarytech Digital Education Karta Allahabad ( Notes) Email Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people. E-Mail

More information

Extending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E

Extending the Domino System. Powered by Notes. The First Groupware and  Server for the Net R E L E A S E Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,

More information

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved. Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,

More information

Ethical Hacking and. Version 6. Spamming

Ethical Hacking and. Version 6. Spamming Ethical Hacking and Countermeasures Version 6 Module XL Spamming News Source: http://www.nzherald.co.nz/ Module Objective This module will familiarize you with: Spamming Techniques used by Spammers How

More information

RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations

RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations Throughout high school, as students take courses to prepare themselves for college and the working world, they should

More information

Glossary

Glossary Glossary www.cybersmart.gov.au/cyberquoll CyberQuoll Internet Safety Education for Primary School Students, Parents Guide Website: www.cybersmart.gov.au/cyberquoll Source: Commonwealth of Australia 2009

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

SEVENTH-DAY ADVENTIST HIGHER SECONDARY SCHOOL 132FT. RING ROAD, HARIPURA, MANINAGAR 08

SEVENTH-DAY ADVENTIST HIGHER SECONDARY SCHOOL 132FT. RING ROAD, HARIPURA, MANINAGAR 08 Class: VII SEVENTH-DAY ADVENTIST HIGHER SECONDARY SCHOOL 132FT. RING ROAD, HARIPURA, MANINAGAR 08 Subject: Computer Science Lessons Annual portion for 2018-19 4. Ethics and Safety Measures in a Computing

More information

STUDIO 7.0 USER MANUAL

STUDIO 7.0 USER MANUAL STUDIO 7.0 USER MANUAL 1 Table of Contents Safety Information... 3 Appearance and Key Functions... 4 Introduction... 5 Call Functions... 6 Notifications Bar... 7 Contacts... 8 Messaging... 9 Internet Browser...

More information

Local area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider.

Local area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider. Local area network (LAN) Network of computers located close together Wide area networks (WANs) Networks of computers connected over greater distances Based on Chapter 2 of Gary Schneider. (2009). E-Business.

More information

Electronic Communication. Telecommunications 1. Not So Obvious. Examples. Chances Are You Used. What does that tell...

Electronic Communication. Telecommunications 1. Not So Obvious. Examples. Chances Are You Used. What does that tell... Electronic Communication Telecommunications 1 Introduction to ECEN 1200 Peter Mathys Which examples of electronic communication systems come to your mind? From the time you got up this morning, how many

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Chapter 002 The Internet, the Web, and Electronic Commerce

Chapter 002 The Internet, the Web, and Electronic Commerce Chapter 002 The Internet, the Web, and Electronic Commerce Multiple Choice Questions 1. Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially

More information

KENDRIYA VIDYALAYA MAHASAMUND

KENDRIYA VIDYALAYA MAHASAMUND क न द र य व द य लय मह सम द KENDRIYA VIDYALAYA MAHASAMUND MAHASAMUND (C.G.)493445 Session-2017. Unit-I Basic Of Information Technology What is Basic of IT- Information technology (IT) is the application

More information

INFORMATION TECHNOLOGY 402

INFORMATION TECHNOLOGY 402 NAME : CLASS/ SEC : ROLL: SESSION : QUOTE : PART 1: Working With Accessibility Options 1. Accessibility options: These are the options in Windows Operating System which makes handling of computer easy

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Telecommunications 1

Telecommunications 1 Telecommunications 1 Introduction to ECEN 1200 Peter Mathys Electronic Communication Which examples of electronic communication systems come to your mind? From the time you got up this morning, how many

More information

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web Chapter Topics Chapter 7: Computer Networks, the Internet, and the World Wide Web CS10051: Intro. to Computer Science Kent State University History of the Internet History of the World Wide Web Internet

More information

Computers: Information Technology in Perspective, 11e

Computers: Information Technology in Perspective, 11e Computers: Information Technology in Perspective, 11e Larry Long and Nancy Long Chapter 3 Going Online Copyright Prentice Hall, Inc. 1 Objectives Once you have read and studied this chapter, you will have

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved. Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,

More information

Introduction. Logging in. WebMail User Guide

Introduction. Logging in. WebMail User Guide Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks

More information

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

National Unit Specification: general information. The Internet (Higher) NUMBER DM4F 12. Information Systems (Higher)

National Unit Specification: general information. The Internet (Higher) NUMBER DM4F 12. Information Systems (Higher) National Unit Specification: general information NUMBER DM4F 12 COURSE Information Systems (Higher) SUMMARY This Unit is designed to develop knowledge and understanding of the operating principles of the

More information

Fundamentals of Information Systems, Seventh Edition

Fundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets Fundamentals of Information Systems, Seventh Edition 1 An Overview of Telecommunications

More information

Joomla User Guide Ver 3

Joomla User Guide Ver 3 LiveHelp Server Joomla User Guide Ver 3 Introduction The process of configuration and implementation of the LiveHelp server is divided into four stages, which are detailed below. The approximate time of

More information