WWW BIT Syllabus
WWW BIT Syllabus
WWW BIT Syllabus
IT1404
IT1404
IT1404
REQUIRED MATERIALS
Main Reading: Ref 1: Ref 2: Internet & WWW student manual, 2006 Margaret Levine Young, The complete Reference Internet, 2nd Edition, 2002
Recommended Links
Ref 3: http://en.wikipedia.org/wiki/Wi-Fi Ref 4: http://www.livinginternet.com/w/wi.htm Ref 5: http://www.livinginternet.com/w/wu_sites.htm Ref 6: http://www.livinginternet.com/e/e.htm Ref 7: http://derekstockley.com.au/eindex2b.html Ref 8: http://stylusinc.com/enhance/Ecommerce/InternetBusinessModels.php Ref 9: http://www.dcfcu.coop/DCFCU_site_map.html#- ebanking tutorial Ref 10: http://www.gov.lk/home.asp Ref 11: http://en.wikipedia.org/wiki/Virtual_Network_Computing Ref 12: http://www.shambles.net/pages/staff/Int_Policy/ line References:
IT1404
IT1404
Material /Sub Topics 1.1. What is the Internet? [Ref1: pg.1] 1.1.1. Global Infrastructure [Ref1: pg.2] 1.1.2. Communication system [Ref1: pg.3] 1.1.3. Information Retrieval system [Ref1: pg.3] 1.1.4. Who pays for it? [Ref1: pg.3] 1.1.5. Impact of the Internet [Ref1: pg.4-6] 1.2. History of the Internet [Ref1: pg.6] 1.2.1. Early years of the Internet [Ref1: pg.6] 1.2.1.1. Emergence of WANs [Ref1:pg.7] 1.2.1.2. Desirability of a single network [Ref1: pg.8] 1.2.1.3. The ARPANET backbone [Ref1: pg.9] 1.2.2. Introduction of the Internet standards -TCP/IP [Ref1: pg.10] 1.2.3. Internet Growth [Ref1: pg.11] 1.2.4. The internet improves science -NSFs approach (1980s) [Ref1: pg.12] 1.2.5. Commercialization of the Internet [Ref1: pg.14] 1.2.5.1. Future of the internet 1.2.5.2. Internet2 1.3. Why do people use the Internet? [Ref1: pg.14] 1.3.1. Who is using the internet? [Ref1: pg.14] 1.3.2. Some services on the Internet [Ref1: pg.15-18] 1.3.2.1. WWW 1.3.2.2. E-mail 1.3.2.3. Chat 1.3.2.4. Video conferencing 1.3.2.5. File Transferring 1.3.2.6. Usenet Newsgroup 1.3.2.7. Telnet
IT1404
IT1404
Describe the purpose and function of an Internet service provider (ISP) Compare the advantages and disadvantages of the different Internet access methods Describe the best way to connect to the Internet, given particular circumstances
Material /Sub Topics 2.1. Information Infrastructure[Ref1: pg.19] 2.1.1. Communication infrastructure [Ref1: pg.19 ] 2.1.2. Internet infrastructure [Ref1: pg.20] 2.2. Internet Service Providers(ISP) and network connections [Ref1: pg.21] [Ref2: pg.9-10] 2.2.1. Choosing an ISP [Ref1: pg.21] 2.2.2. Leased circuits [Ref1: pg.21] [Ref2: pg.13] 2.2.3. Dial-up access [Ref1: pg.22] [Ref2: pg.10] 2.2.4. Broadband Internet access[Ref1: pg.23] 2.2.4.1. Cable modem technologies [Ref1: pg.23] [Ref2: pg.13-14] 2.2.4.2. DSL technologies [Ref1: pg.23] [Ref2: pg.10-12] 2.2.5. Wireless access technologies [Ref1: pg.25] [Ref2: pg.15-16] [Ref3] 2.3. Connecting LANs to the Internet [Ref2: pg.90-92] 2.4. Internet Protocols (IP) [Ref1: pg.25] [Ref2: pg.4] 2.4.1. Protocol [Ref1: pg.25] 2.4.2. Internet protocol [Ref1: pg.25] 2.4.3. Packet Switching [Ref1: pg.25 ] 2.4.4. Transmission Control Protocol(TCP) [Ref1: pg.26] 2.4.5. Client server computing [Ref1: pg.27] [Ref2: pg.7-8] 2.5. Names for computers [Ref1: pg.28] 2.5.1. IP addresses [Ref1: pg.28] [Ref2: pg.4-5] 2.5.2. Naming a computer [Ref1: pg.29] 2.5.3. Domain names [Ref1: pg.30-31] [Ref2: pg.6-7] 2.5.4. Domain Name System (DNS) [Ref1: pg.32] [Ref2: pg.8-9]
IT1404
IT1404
3.1. Introduction to the World Wide Web (WWW) [Ref1: pg.33] 3.1.1. History of WWW [Ref1: pg.33-35] [Ref.4] 3.1.2. Some WWW concepts [Ref 1: pg.35-36] 3.2. Browsing the web[Ref1: pg.36] 3.2.1. What is browsing? [Ref 1: pg.36] 3.2.2. Browser software [Ref1: pg.37] 3.2.2.1. Web browsers [Ref1: pg.37-43] 3.2.2.2. How it works [Ref 1: pg.43-44] 3.2.3. Accessing web pages- URL [Ref 1: pg.44] 3.2.4. Hyperlinks, Bookmarks [Ref 1: pg.46-48] 3.3. Using a web browser [Ref 1: pg.49-50] 3.4. World Wide Web documents[Ref 1: pg.51] 3.4.1. Displaying a web document [Ref1: pg.51] 3.4.2. HTML- Creating web pages [Ref 1: pg.52] 3.4.2.1. Two main parts head and body[Ref1: pg.52] 3.4.2.2. making headings, adding textual paragraphs[Ref1: pg.53-55] 3.4.2.3. Linking a web page to another page[Ref1: pg.56] 3.4.2.4. HTML editors[Ref1: pg.56] 3.4.3. Introduction to some web technologies [Ref1: pg.57-60] 3.4.4. Helper applications [Ref1: pg.60] 3.4.5. Web portals [Ref2: pg.393] 3.5. Automated web search [Ref1: pg.60] 3.5.1. Browsing vs. Searching [Ref 1: pg.61] 3.5.2. Search Engines [Ref1: pg.61] [Ref 5] 3.5.2.1. Search Engine Technology [Ref 1: pg.62] [Ref 2: pg. 468-469] 3.5.2.2. Web Directories [Ref 1: pg.63] 3.5.2.3. Methods of searching [Ref1: pg.63] 3.5.2.4. Search Engine Types [Ref1: pg.64] 3.5.2.5. Advertising to pay for search [Ref 1: pg.65] 3.6. Blocking offensive /inappropriate web sites [Ref2: pg.444-449] 3.7. Security and privacy issues cookies, firewalls, privacy implications of Browser caches and History [Ref2: pg.442-444]
IT1404
IT1404
Material /Sub Topics 4.1. How e-mail works [Ref 1: pg.66] [Ref 6] 4.1.1. Introduction[Ref1: pg.66] 4.1.2. E-mail vs. Postal service[Ref1: pg.66] 4.1.3. Facilities of e-mail system[Ref1: pg.67] 4.2. How do you get your e-mail [Ref2: pg.122-124] 4.3. e-mail accounts [Ref 1: pg.68] 4.3.1. e-mail client types[Ref1: pg.68] 4.3.2. Mailbox address format [Ref 1:pg.69-70] 4.4. configuring an e-mail program [Ref2: pg.142-143] 4.4.1. Virus prevention, folders, signatures and stationary [Ref2: pg.146-147] 4.5. Using E-mail [Ref 1:pg.71] 4.5.1. Composing and Sending an e-mail [Ref 1 : pg.72] 4.5.1.1. Using smileys, emotions and abbreviations [Ref2: pg.132-133] 4.5.1.2. Formatted email [Ref 2:pg. 133-134] 4.5.2. Receiving an e-mail [Ref 1 : pg.73] 4.5.2.1. Downloading an e-mail [Ref 1: pg.73] 4.5.2.2. Deleting an e-mail [Ref 1 : pg.74] 4.5.2.3. e-mail attachments [Ref 1: pg.74-77] 4.5.3. Replying an e-mail [Ref 1: pg.77] 4.5.4. Forwarding an e-mail [Ref 1: pg.78] 4.5.5. Address books [Ref 1: pg.78-79] 4.6. E-mail protocols [Ref1: pg.80] 4.6.1. SMTP [Ref 1: pg.80] 4.6.2. POP [Ref 1:pg.80] 4.6.3. IMAP [Ref 1:pg.81] 4.7. Mailing lists [Ref 1: pg.82-84] 4.8. Controlling your e-mail [Ref1: pg.84] 4.8.1. Filtering e-mail, Replying to messages automatically, mailAlert, email error messages, Blocking junk mail[Ref1: pg.84-85] [Ref 2: pg.198-200] 4.9. Impact and significance of electronic mail [Ref 1: pg.85-86] 4.10. Spam or unsolicited mail [Ref 2: pg.194-198] [Ref 1: pg.87] 4.11. e-mail netiquette [Ref 2: pg.129-132]
IT1404
IT1404
Material /Sub Topics 5.1. Audio and Video on the web [Ref 2: pg.480-497] 5.2. Web casting & podcasting [Ref 1: pg.90-91] 5.3. Phone and Faxes [Ref 1: pg.91-92] 5.4. Whiteboard service [Ref 1: pg.93] 5.5. Audio and video teleconferencing [Ref 1: pg.93-95] [Ref 2: pg.358-363] 5.6. FTP based file transfer service[Ref1: pg.98] 5.6.1. How FTP works [Ref 1: pg.98-102] 5.6.2. FTP commands [Ref 1: pg.102-103] 5.7. Discussion forums [Ref1: pg.103-105] 5.7.1. Usenet [Ref 1: pg.103] [Ref 2: pg.268-280] 5.8. Remote access to different computers [Ref1: pg.106] 5.8.1. TELNET& SSH [Ref 1: pg.106] 5.8.2. VNC [Ref1: pg.107] [Ref 11] 5.9. Online Chatting & Messaging [Ref 1:pg.108-109] [Ref 2: pg.224-234]
Material /Sub Topics 6.1. e-Learning [Ref1: pg.109] [Ref 7] 6.1.1. Pedagogical Assumptions[Ref1: pg.110] 6.1.2. Content Model Used[Ref1: pg.110] 6.1.3. Other Classifications[Ref1: pg.111] 6.1.4. Current Status and Trends[Ref1: pg.111-114] 6.2. e-Commerce [Ref 1: pg.114-116] [Ref 8] [Ref 9] 6.2.1. Revenue Models for e-Commerce[Ref1: pg.116-118] 6.2.2. Optimizing Operational Costs and Efficiency[Ref1: pg.118-120] 6.2.3. Issues confronting e-Commerce [Ref1: pg.120-121] 6.3. e-Government [Ref1: pg.122-124] [Ref 10] 6.4. e-Entertainment [Ref 1: pg.124-127] 6.5. The web as a Library [Ref 1: pg.127-129] 6.6. Platforms for Journaling and Collaboration [Ref 1: pg.129-132]
IT1404
IT1404
Material /Sub Topics 7.1. Viruses and worms [Ref 1: pg.133] 7.1.1. Virus symptoms[Ref1: pg.133-137] 7.1.2. Virus transmission methods[Ref1: pg.137] 7.1.3. General precautions[Ref1: pg.137-138] 7.2. Password security [Ref1: pg.139-142] 7.3. Firewall[Ref1: pg.142] 7.3.1. Firewall Types [Ref1: pg.143-144] 7.3.2. How a firewall works [Ref1: pg.143] 7.4. secure communication [Ref 1:145 ] [Ref 2: pg.730] 7.4.1. Authentication- digital certificates [Ref 1: pg.146-147] 7.4.2. Encryption [Ref 1: pg.147-148] 7.4.3. Secure protocols [Ref 1: pg.148-152]
Material /Sub Topics 8.1. Ethics in cyberspace [Ref 1: pg.153-156] 8.2. Crimes on Internet [Ref1: pg.156-158] 8.3. Legal acts for Internet usage [Ref1: pg.159-160] [Ref 12]
IT1404