Chapter 8: Working with Internet
The advent of technological devices began with inventions like telegram, radio, television and computers. The invention of the internet brought about a revolution.
Internet can be defined as, “a network of computers that are interconnected globally.”
Internet is a networking infrastructure, which connects many countries worldwide. The medium of connection can be wired or wireless. The internet is intangible, which means it cannot be seen, touched and felt.
We will learn to:
• Understand the meaning of internet terms
• Know more about Internet Service Provider
• Connect to the internet
• Study the different browsers
• Search information using the internet
To understand the internet better, let us learn a few
…show more content…
Malware:
Malware comes from the words malicious software meaning a bad software used to hack into other people’s computers and gain access to their private information, personal data and damage or alter it. Installing an anti-virus helps to protect your computer from malware attack.
Internet Service Provider (ISP)
An internet service provider is any company that helps you to access the internet by providing a connection. It is also known as Internet Access Provider (IAP).
Such connections can be wired or wireless. These connections are possible because of a satellite infrastructure. An ISP has the required infrastructure and the necessary permissions from the government so that they can provide access in various places like schools, homes, offices, public libraries, etc.
There are three types of Internet Service providers –
- Dial-up connection is the oldest form and is almost out of use.
- Broadband connections are provided generally by cable companies and are still used by many people.
- Digital Line Subscriber also known as DSL were the connections provided generally by phone
…show more content…
__________ helps us to define how a webpage will appear.
4. Mozilla is a type of _________.
5. __________ helps to locate addresses on the World Wide Web.
B. Define.
1. HTML
2. Internet cookies
3. Web page
4. Firewall
5. E-mail
C. State true or false.
1. You can search information using the internet.
2. Google Chrome was released in 2010.
3. DSL was the connection generally provided by a phone company.
4. A Japanese company released the Opera browser.
5. You can access free Wi-Fi at free ISPs.
D. Answer in short.
1. How can you define the internet?
2. What is the difference between upload and download?
3. Name the accessories required to connect to the internet.
4. Name the different types of Internet browsers.
E. Answer in detail.
1. Write a short note on Internet Service Provider (ISP).
2. Write in detail about the different web browsers.
3. Explain the steps to search information on the internet.
Lab Time
Check the type of internet connection used in your computer lab and identify it. Use the internet connection to launch a web browser. Search information about the history of the internet.
Project Time
Search information using the internet about different types of cultures in India, make a comparison chart, and show it to your
How do you parse out web pages of visited sites in Network Miner? -You go to the files tab and then open the available information there. 4. What needs to be configured within Network Miner prior to capturing data? -The network adapter need to be configured to the right network
History timeline assignment: 1.) Establishment of the Station 1828-1838- Between 1828 and 1984 North Head was used as a site for the Quarantine of people infected or having any suspension of carrying infection or any disease. The first ship to be quarantined in Spring Cove was the convict ship the Bussorah Merchant for an outbreak of smallpox. The convicts and their guards were housed in tents on shore.
In this section of the presentation I will be talking about anti-virus, the first one I will be talking about is firewall this is a software or a hardware based system that is made to block access from a network. This is used in most network as a line of defence to try and stop bad packets entering the network and cause harm to the network. How it does is this by filter all the suspicious packets that can harm the network . There are three different types of firewalls proxy firewall, packet filtering firewall, stateful Firewall, I will start of with the stateful inspection packet filtering firewall, this is basically the eye of the network as it tracks on everything out and in the network, so if somehow the hacker enter the network and damage it because
TU170 STUDENT NAME : SALIM SAUD ALAZWANI STUDENT NUMBER : 140716 Q1: Q2: 1) plug-in(computing) we may say it 's program that 's help you to bring data or information from global internet. and we may call it program piece of software code that 's help application or program it could not by itself. plug-ins do things very fast because it 's actually sorts things such as help you to watch video online, listen to online music or radio and play many online games. sometimes we don 't need it but your computer will offers you plug-in and it 's easy app to download if you follow the instructions on the screen.
They hold information about the addresses of computers attached to the network and can forward data efficiently to the correct location via an appropriate route. They are generally used as gateways where a local area network is connected to a larger network such as the internet. Web browsers are software programs that allow a person to explore the Internet in an easy to use way. Navigating the Internet through a series of hyperlinks you can browse the Internet. Examples of popular browsers are Chrome, Internet Explorer, Firefox, Safari, and Opera.
There is several different types of components that enable the internet and help the web function correctly upon your computer. A few of these things are; Uploading and FTP, Web Servers, network routers, proxy servers, ISPs, Web Hosting Services, and Domains. I will be explaining all of these components in as much detail as possible. Uploading
You leave your garbage in bags on the curbside, and a truck comes and transports it to some invisible place. When you're in danger, you call for the police. Hot water pours from faucets. Lift a receiver or press a button on a telephone, and you can speak to anyone. All the information in the world is on the Internet, and the Internet is all around you, drifting through the air like pollen on a summer breeze.
The line graph compares the ratio of people who utilize Internet in three different countries in the period from 1999 to 2009. A general picture is that the number of citizens using Internet in Canada and USA are much higher than another one in Mexico. To specify, in 1999, the proportions of population spending time on Internet in USA and Canada were about 20% and 10% respectively. Meanwhile, the figure in Mexico was lower, at about 5 %. In 2005, Internet usage in USA and Canada witnessed a dramatic rise to around 70% while the rate of Mexico was only approximately 25%.
Abstract: Within this report one would hope to give a better understanding of TCP/IP in both versions 4 and 6 and to understand the differences between them and the application in which they are used. As stated by http://searchnetworking.techtarget.com/definition/TCP-IP is the basic communication language of the internet. The same link stated also explains how TCP/IP works. Introduction:
Next, the company uses High Speed Downlink Packet Access (HSDPA) to enhance the high speed 3G network in which promoting wireless broadband services. Other than that,
The DSL of Nebraska Using DSL, you have a system that will always be online, and you can share a connection with multiple devices. The level of service that you should purchase will depend on your needs. For example, if you are a light user, than you might be able to survive on a very basic package. In Nebraska, DSL covers an estimated 1.4 million
On the first, all global networks must go through the state. On the second, all local networks must go through a state controlled gateway and are subject to approval by the government. On the third, all IPs must have state-issued licenses, while being willing to give user information to the state if requested. On the fourth, individual users are required to be registered with the government in order to get onto the Internet. In addition, the government encourages families, Internet cafes and campuses to get Internet filtering software to block surfers from viewing outlawed content.
Technology began to rise when the World Wide Internet was introduced on August 6, 1991. Throughout the years people have been on the bend to make technology bigger and better. With the advancement of cell phones, fax machines, computers and televisions the way things were 20 years ago are so much different. Technology has made us see the world at a different angle.
In this essay I will analyze how and why the Internet distinctively differs from other ordinary kinds of networks, specifically the London Underground system (reference to the network analysis of the 2005 London underground attacks). I will use technical terminology specific of the “network society”, and these will be explained in the next paragraph. Therefore, in this essay I will analyze and discuss my opinion of understanding the Internet as largely different from other kinds of networks, and I will support my point using some key scholar’s theories and experimental results. Before analyzing this issue, it is important to define a few words which I will continuously refer to in this essay: network; internet, “networked society”, nodes
These days more and more families are buying unlimited wifi in their homes. It is more than likely that it now comes in a package in conjunction with your house phone. Due to modern demand the majority of services available to the public offer free wifi. For example, Starbucks, Ianraid Eireann, Bus Eireann, and many more. This means it is so very easy to click onto one of your favourite online shops and browse whenever you want.