Chapter 2 - IT ERA

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Chapter 2–The Web and the Internet  Gigabyte (GB) is equal to approximately

one billion characters.


Simply called "the Net," is a world wide system
of computer networks –a network of networks. MOBILESERVICE PROVIDER
The popular term for the Internet is the A mobile service provider, sometimes called a
“information highway”. wireless data provider, Is an ISP that offers
wireless Internet access to computers and
The Internet has its roots in a networking mobile devices with the necessary built-in
project started by ARPA arm of USA D.O.D wireless capability, wireless modems, or other
called Advanced Research Projects Agency communications devices that enable wireless
Network (ARPANET) during 1950’s where there connectivity.
was a Cold War between USA and Soviet Union.
 Wired transmission-media includes
•This research project aims to do the following: phone line, coaxial cable, and fiber-
•Scientists to share information and work optic cable. Wireless transmission
together on military and scientific projects. media includes radio waves and
•To create a network that would not be satellite signals.
vulnerable to a nuclear attack  IP Addresses and Domain Names IP
•To use a distributed network and break Address, short for Internet Protocol
messages into blocks to route over this address is a sequence of numbers
network. that uniquely identifies the location of
each computer or device connected to
ARPANET initially connected four independent the Internet or any other network.
network nodes:  Domain Name is a text-based name
that corresponds to the IP address of a
•University of California, Los Angeles (UCLA); server, such as a web server that hosts
•Stanford Research Institute (SRI); a website. It is part of the web address
•the University of California-Santa Barbara that you type in a browser’s address bar
(UCSB) and to access a website.
•the University of Utah.  The suffix of the domain name, called
the top-level domain (TLD), identifies
There are two main concepts that are the type of organization associated
fundamental to the way the Internet functions: with the domain.
Packet Switching and TCP/ IP protocol.  The organization that approves and
controls TLDs is the Public Technical
•Packet switching process of breaking down Identifiers (PTI). This nonprofit
message into smaller packets which are sent a organization is an affiliate of ICANN
cross the internet. which stands for Internet Corporation
•TCP/ IP protocol protocol to ensure the for Assigned Names and Numbers.
message reaches its destination successfully
and as quickly as possible. •The domain name system (DNS) is the method
Hot Spot -is a wireless network that provides that the Internet uses to store domain names
Internet connections to mobile computers and their corresponding IP addresses.
and devices. Some of the services provided by the internet
are as follows.
INTERNET SERVICE PROVIDERS (ISP)
An Internet Service Provider (ISP), sometimes 1.Electronic Mail. (E-mail) Electronic Mail is an
called an Internet access provider, is a business electronic message that is transferred from
that provides individuals and organizations one computer to another computer through
access to the Internet free or for a fee. ISPs the Internet.
often charge a fixed amount for an Internet
connection, offering customers a variety of Advantages of Email:
plans based on desired speeds, bandwidth, and a. It is the cheapest and fastest mail service.
services. b. you can send any form of data like text,
image, video, etc.
Bandwidth is a measure of the capability of a c. physical presence or recipient is not required.
network to send and receive data. A high d. It can be read anywhere in the world
bandwidth connection transmits more data
than a low bandwidth connection during the 2. Telenet
same time. Data sizes typically are stated in It is the facility on the Internet through which a
terms of megabytes and gigabytes. computer at a far distance can be used from
another location. Using Telenet, a remote
 Megabyte (MB) is equal to computer can be accessed from another
approximately one million characters. location.
control to users and provides interaction.
3. File Transferring Dale Dougherty working as the vice president
The Internet provides the facility of of O’Reilly Media delivered a speech about Web
downloading and uploading large volume of 2.0 in a conference, 2004.
files. We need FTP Client program to upload or
download file from remote computer. Web 3.0 was suggested by John Markoff as the
new kind of web in 2006. It is defined as
4. Video Conference semantic web and includes integration,
The advanced service of the Internet through automation, discovery, and data. It encourages
which the people of different locations mobility and globalization. Web 3.0 is also
communicate by watching each other is known described as the intelligent semantic web.
as video conference. Tim Berners-Lee explains semantic web as
follows: “If HTML and the Web made all the
5.World Wide Web (WWW) online documents look like one huge book, RDF,
This provides millions of information on various schema, and inference languages will make all
topics. There are millions of web sites on the the data in the world look like on huge
web which provide information. Each web site is database”.
identified by the Internet Address or Uniform
Resource Locator (URL). Web 4.0 is “based on wireless communication
(mobile devices or computer) connecting
6.E-commerce people and objects whenever and wherever in
It is the service on the Internet through which the physical or virtual world in real time”. The
we can sell or buy goods. We can use it through GPS which helps people to find their way is a
some special websites. The web sites which good example for this type.
provide buying and selling facilities to the users
are known as electronic commerce sites. Web 5.0 is still progressing and does not
complete its formation however, it is defined as
7.Electronic Fax (E-Fax) linked, emotive, and symbolic web that
It is the service through which user send and communicates with humans. In addition, it is
receive faxes directly from one computer to based on emotional association with humans. It
another. To use Electronic Fax service, a functions like a personal assistant.
computer should have a modem, e-fax program, Technology and human interaction become
and internet. inseparable.

8.Newsgroup Ethical Issues


Newsgroup is one of the facilities provided by The foundations of all secure systems are the
the Internet through which post notes or moral principles and practices and the
messages on various subjects. professional standards of all employees of the
organization, i.e., while people are part of the
9.Internet Relay Chat solution, they are also most of the problem. The
It is also one of the most popular services of the following issues are examples of security
Internet which allows people at different problems that an organization may have to deal
locations to send and receive instant message. with
We can send voice or text message through
Internet Relay Chat. A. Ethics and Responsible Decision-Making
The student should be made aware of his
While the Internet was developed in the late individual responsibility in making ethical
1960s, the World Wide Web emerged in the decisions associated with information security.
early 1990s as an easier way to access online
information using a browser. B. Confidentiality & Privacy Computers
can be used symbolically to intimidate, deceive,
•World Wide Web (WWW) is defined as a or defraud victims. Attorneys, government
system of interlinked hypertext documents agencies, and businesses increasingly use
accessed via the internet. mounds of computer-generated data quite
legally to confound their audiences.
Web 1.0- was coined by Tim Berners-Lee as
“read only” web. It is the first generation of C. Piracy
WWW and lasted between 1989 and 2005. This is the act of illegally reproducing or
Internet users were only reading information disseminating copyrighted material, such as
presented to them. It was not as dynamic, computer programs, books, music, and films.
vivid, and interactive as the web we use now.
Web 2.0- is described as the wisdom, people- D. Fraud & Misuse
centric, participative, and read-write web. The computer can create a unique environment
Unlike 1.0 version, Web 2.0 allows more in which unauthorized activities can occur.
Crimes in this category have many traditional
names including theft, fraud, embezzlement, Social.
extortion, etc. Beware of meeting people in-person whom you
meet on the internet or through emails. Not
E. Liability everyone is honest with their identity, age,
Promises and affirmations made by the gender, and intentions.
software developer to the user about the
nature and quality of the program can also be Educating Children/ Teens.
classified as an express warranty. Programmers Talk to and educate your children about
or retailers possess the right to define express internet risks and dangers of internet predators.
warranties. Tell them never to meet people they met online
in-person and never talk to people they really
F. Patent and Copyright Law don’t know.
A patent can protect the unique and secret
aspects of an idea. It is very difficult to Parental Controls.
obtain a patent compared to copyright (please Parents should consider applying parental
see discussion below). controls by their internet service provider and/
or blocking software on family computers and
G. Trade Secrets smartphones to limit the internet to safe
A trade secret protects something of value and websites.
usefulness. This law protects the unique and
secret aspects of ideas, known only to the Webcams.
discoverer of his/her confidants. Be careful when using webcams. They can be
high-jacked and turned on remotely. This allows
H. Sabotage others to illegally view and listen to
The computer can be the object of attack in individuals without their knowledge.
computer crimes such as the unauthorized use
of computer facilities, alternation or Wireless.
destruction of information, data file Beware when connecting your laptop or mobile
sabotage, and vandalism against a computer device to unsecured networks. Computer
system. Computers have been shot, stabbed, hackers on the same network can
short-circuited, and bombed. intercept your internet use and in some
cases access files on your computer.
Protecting Yourself While Using the Internet
Shopping.
Personal Information Avoid purchasing goods and services from
Think before you post anything online or share websites that do not have secure check-out
information in emails. What you post online, using “HTTPS.” Pay attention to the address
can be seen by anyone. Sharing personal line on the checkout page which asks you to
information with others you do not know enter your credit card information.
personally is one of your biggest risks online.
Selling.
Photos Beware of selling and listing items in local ads or
taken from smartphones embed the GPS elsewhere online. Never meet someone alone.
Coordinates in the photo, which will allow If necessary, consider meeting in a public place,
others to know the location of where the like a post office or bank rather than a parking
picture was taken and may be used to find you. lot.

Emails, Phishing, and Malware. Public Computers.


Beware when opening emails from unknown Avoid typing sensitive information on public
people or sources, especially when they are computers, such as those in a public library or
unsolicited. Clicking on links or downloading an internet café. Spyware may be installed on
attachments can infect your computer with a these computers that record your every
virus or subject you to fraud, malware, or a keystroke.
scam.

Updates.
Keep your computer’s operating system,
browsers, antivirus, and other software up to
date with the latest or daily security patches.
Passwords.
Choose strong passwords using 10 characters
and combinations of upper-case letters, lower
case letters, symbols, and numbers.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy