accessanduseinternet3444444444444412.pdf

DesalegnTamiru4 4 views 79 slides Oct 14, 2024
Slide 1
Slide 1 of 79
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79

About This Presentation

training for hardware and computer maintenance


Slide Content

MISRAK POLY-TECHNIC COLLEGE
Department of Information Technology

Outlines

>Access the Internet (01)
> Search the Internet (02)

What is the Internet?

«Internet is a network of networks in which users at
any one computer can, if they have permission, get
information from any other computer.

-A network is a group of two or more computer

systems linked together.

« The Internet is the largest computer network in the
world, connecting billions of computers.

What is the Internet?...

«The internet is computer based global
information system. It is composed of many
interconnected computer networks. Each
network may link thousands of computers
enabling them to share information.

«The internet has bring a transformation in many
aspects of life. It is one of the biggest
contributors in making the world into a global
village.

History of Internet

«In 1969, the US Department of Defense
started a project to allow researchers and
military personnel to communicate with

each other in an emergency.

«The project was called ARPAnet and it is
the foundation of the Internet.

History of Internet...

¢Throughout the 1970's, what would later become
the Internet was developed. While mostly military
personnel and scientists used it in its early days, the
advent (coming) of the World Wide Web in the
early 1990's changed all that.

«Today, the Internet is not owned or operated by any
one entity.

«This worldwide computer network allows people to
communicate and exchange information in new
ways.

Internet Evolution

eARPANET: The acronym stands for
Advanced Research Projects Agency
Network.

eARPA of the United States Department of
Defense developed ARPANET, which
became the world’s first packet switching
network.

«Internet is the successor (replacement) of
ARPANET.

Internet Evolution...

«In 1972, the ARPANET spread over the
globe with 23 nodes located at different
countries and thus became known as

Internet.

Internet Evolution...

«Nodes located at different countries

Internet Evolution...

«By the time, with invention of new
technologies such as TCP/IP protocols,
DNS, WWW, browsers, scripting languages

etc., Internet provided a medium to publish
and access information over the web.

Connecting to the Internet

To access the Internet you need:
1. Computer
2. Modem
3. Web Browser
4. Internet Service Provider

Connecting to the Internet...

What is a modem?

«A modem (modulator-demodulator)
is a device that modulates an analog
carrier signal to encode digital

information, and also demodulates
such a carrier signal to decode the
transmitted information.

Connecting to the Internet...

What is a modem?

Phone Line Wall Jack

Phone Line
Splitter

RJ-11 Cable

RJ-45 Cable

Connecting to the Internet...

What is a modem?

«A modem is a device that converts a computer's
outgoing data(digital signal) to a format that can be
transferred via telephone lines.

«Modems can also convert incoming data(Analog signal)
so the computer can read it.

«A modem can be located inside or outside your computer.

«Some of the different types of modems are internal,
external, voice/data, and fax modems.

Connecting to the Internet...

What is a web browser?

«A software application for
retrieving, presenting, and
traversing information resources
on the World Wide Web.

«Google Chrome, Internet explorer,
Safari, Mozilla Firefox, Opera, and
Netscape Navigator are examples of
web browsers.

Connecting to the Internet...

Internet Service Providers (ISP)

«Internet Service Provider: A company, which
provides users with an access to the Internet, is

known as an Internet service provider or
Internet access provider.

«ISP, as it is called, offers email accounts and
other services like remote storage of files for its
customers.

Connecting to the Internet...

The ISP software package (what we purchase from
ISP to access Internet) usually includes:
«Username. A unique name used to gain access to a
computer system.

«Password. A combination of keyboard characters.
Used in combination with a username, passwords
allow access to restricted computer information. It is
important to keep passwords secret.

« Access phone number. For example, (251) 11124-
0525

Looking at the Net
The Net

e

a 28.8kb e ISP ethernet (10mb)

+ 2300 ISPs ‘Backbone
+ Local Networks + Huge networks '
w/Points of Presence + Fiber optic cables
+ Examples: + T3 (45 mb) +
TIAC, World, Slip.Net, . Big players:
wtp.net.... MCI (40% of US)
The On-Ramps Sprint
UUnet

The Pipes

204.166.126.70

Basic Internet Terms and Terminology

WWW (world Wide Web): It is a
collection of interlinked documents
that are accessible over the
Internet.

«It consists of millions of web
pages that contain text, images,
voice and videos.

«Sir Tim Berners-Lee, a British
scientist working at CERN, created
the World Wide Web.

Basic Internet Terms and Terminology...

Website: A website is a set of web pages consisting of text,
audio and video. Web servers host websites.

URL (Uniform Resource Locator)

«It specifies the location of a resource on the Internet. It
consists of the basic address and path.

» Each web page has its own address on the Internet, which is
called a URL. To recognize one another over the Internet,
computers convert human-friendly addresses like
wwwiearnfree.org to numerical IP addresses. You may

type in either 216.119.102.26 to get www.learnfree.org
homepage.

Basic Internet Terms and Terminology...

Domain Name: is a symbolic string associated with an IP
address. There are several domain names available; some of
them are generic such as com, edu, gov, net etc, while some
country level domain names such as au, in, za, us etc.

| Domain |NameMeaning |
Com Commercial business

Edu Education

Gov Government agency

Int International entity

Mil US. military

Net Networking organization

Org Non profit organization

Basic Internet Terms and Terminology...

Country top-level domain names:

au Australia

in India

fr France

us United States

et Ethiopia

uk United Kingdom

Basic Internet Terms and Terminology...

Web Page: Web pages are resources of
information. They are generally created in the
HTML format and provide the web users with
navigational abilities through hyperlinks to other
web pages on the web.

Home Page: The term home page is used to refer
to the page that is the default page of any
website. It is the main page of a complex website.

Basic Internet Terms and Terminology...

Cache: Web browsers maintain a cache (temporary
storage) of recently visited web pages.

«This enables the browsers to cache frequently
visited pages.

«Even search engines make available already indexed
web pages through their caches.

Basic Internet Terms and Terminology...
HTTP (Hypertext Transfer Protocol)

«You may have noticed the http:// preceding URLs. For
example: http://www.entototvetc.edu. The first part
of the URL, usually HTTP, indicates the file type.

«HTTP is a communications protocol used for the
transfer of information over the Internet. A client

makes an HTTP request using a web browser to which
an HTTP response is sent from the server.

Basic Internet Terms and Terminology...

Web Cookie: Also known as an HTTP cookie, it is piece

of text that is exchanged between the web client and
the web server.

It is sent by the web server to the web client and
returned unchanged by the client each time it
accesses the server.

Basic Internet Terms and Terminology...

Hyperlink: A reference in a document to another section of
the document or to another document is termed as a
hyperlink.

«Hyperlinks are used to redirect the user from one section
of a page content to another.

Internet Security: It is one of the major concerns today. As
the Internet acts as a communication platform that can be
accessed by millions of users around the world, it becomes
necessary that proper measures be implemented.

Basic Internet Terms and Terminology...

Internet - A communication Platform : Internet
serves as one of the most efficient means of
communication.

«Computers from different parts of the world can be

connected to each other to exchange information,
thanks to the Internet.

«Emails and chats are excellent means of
communication over the Internet.

Basic Internet Terms and Terminology...

Email: It is a store-and-forward method of
writing, sending and receiving written messages.

«Electronic mail is an Internet e-mail system that
uses network-based protocols to exchange
messages between network subsystems.

Email Address: It identifies the network location
to which an email can be delivered. It is of the
form, ‘username@domain-name’.

Basic Internet Terms and Terminology...

Spamming: The act of sending unsolicited
(unasked) bulk messages over an email
system is known as spamming.

Phishing: It is a fraudulent activity of
acquiring the sensitive information by the
use of a fake identity during electronic
communication.

Basic Internet Terms and Terminology...

Hacking: Hacking is the activity of programmatically
gaining access to a computer application that is
otherwise inaccessible.

«The act of gaining an unauthorized access to a
computer is known as hacking.

«Hacking of passwords that leads to breach of email
privacy is a threat to communication over the
Internet.

« Internet crimes refer to all the criminal activities that
are carried over the Internet.

Basic Internet Terms and Terminology...

Email Virus: It is a computer code that is transmitted
through an email in the form of an attachment.

« The email attachment causes the destruction of some
of the files on the receiver computer’s hard disk and is
programmatically emailed to the contacts in the
address book of the receiver.

Basic Internet Terms and Terminology...

Internet Bookmark: The Internet browsers of the modern

times aim at enabling the users to organize the web pages they
access.

- Links once visited can be saved in the favorites or preferences
categories. Bookmarks are usually integrated into browsers.

Web Directories: It is a directory, which links to other websites
and organizes those links.

Makeup And Structure Of Web Addresses...
What is a hyperlink?

«A hyperlink is simply part of the text (or graphic) ona
Web page, that when clicked on will automatically:

«Take you to a different part of the same page
«Take you to a different page within the Web site
«Take you to a page in a different Web site
»Enable you to download a file

«Launch an application, video or sound

Ethical Issues

» In January 1989 the Internet Architecture Board (IAB) issued a
statement of policy concerning Internet ethics. This document is
referred to as RFC 1087 ‘Ethics and the Internet’.

+» The IAB strongly characterized as unethical and unacceptable any
activity which purposely:
«Seeks to gain unauthorized access to the resources of
the Internet.

+ Disrupts the intended use of the Internet.

« Wastes resources (people, capacity, computer) through such
actions.

+ Destroys the integrity of computer-based information.
+ Compromises the privacy of users.

Connecting to the Internet...

1.

Explain Advantage and disadvantage of
internet.

Explain the type of modem and Purpose.

Give and explain at least 5 common internet
terminologies.

Review the following common web browsers.
- Netscape Navigator, Windows Internet Explorer, Mozilla
Firefox, Galeon, Opera, Phoenix, Konqueror, and Lynx

Basic Internet Settings and Configuration
Home page

« The term home page is used to refer to the page that is
the default page of any website. It is the main page ofa
complex website.

¢Setting-up your home page means that when you open
your web browser, the web page that you have set will
be immediately launched by your browser.

Basic Internet Settings and Configuration
Location of Temporary Files
«Webpages are stored in a temporary Internet files

folder the first time you view them in your web
browser.

«This speeds up the display of pages you frequently
visit or have already seen, because Internet Explorer

can open them from your hard disk instead of from the
Internet.

Security Level

Why are security settings for web browsers important?

« Your web browser is your primary connection to the rest of the
internet, and multiple applications may rely on your browser, or
elements within your browser, to function.

+ This makes the security settings within your browser even more
important.

« Many web applications try to enhance your browsing experience
by enabling different types of functionality, but this functionality

might be unnecessary and may leave you susceptible to being
attacked.

+ The safest policy is to disable the majority of those features unless
you decide they are necessary.

Security Level...

Different browsers use different terms, but here are some
terms and options you may find:

« For example, Internet Explorer identifies the following zones:

«Internet - This is the general zone for all public web sites.
When you browse the internet, the settings for this zone are
automatically applied to the sites you visit.

«Local intranet - If you are in an office setting that has its own
intranet, this zone contains those internal pages. Because the
web content is maintained on an internal web server, it is
usually safe to have less restrictive settings for these pages.

Security Level...

+ Trusted sites - If you believe that certain sites are designed with
security in mind, and you feel that content from the site can be trusted
not to contain malicious materials, you can add them to your trusted
sites and apply settings accordingly.

+ Restricted sites - If there are particular sites you think might not be
safe, you can identify them and define heightened security settings.

» JavaScript - Some web sites rely on web scripts such as JavaScript to
achieve a certain appearance or functionality, but these scripts may be
used in attacks.

+ Java and ActiveX controls - These programs are used to develop or
execute active content that provides some functionality, but they may
put you at risk.

Security Level...

You may also find options that allow you to take the following
security measures:

» Manage cookies - You can disable, restrict, or allow cookies
as appropriate. Generally, it is best to disable cookies and then
enable them if you visit a site you trust that requires them.

» Block pop-up windows - Although turning this feature on
could restrict the functionality of certain web sites, it will also
minimize the number of pop-up ads you receive, some of
which may be malicious.

Setting Browsing History

«As you browse the Internet, each of the items you view
was saved locally on your hard disk drive.

«This helps web pages you visit frequently load faster
by loading the files from you hard disk drive instead of
having to downloading the web page again.

«To conserve hard disk drive space or to help keep their
Internet browsing private, users may find it necessary
to delete their Internet History.

Customize the Internet Explorer Toolbars

«Internet Explorer has several toolbars, including the
Menu bar, the Favorites or Links bar, and the
Command bar.

«There is also the Address bar, where you can type a
web address, and the status bar, which displays
messages such as a webpage's download progress.

+ All of these toolbars can be customized in one way or
another.

Assessing and Retrieving Site Data

«Cookies are small files which are stored on a user's
computer.

«They are designed to hold a modest amount of data
specific to a particular client and website, and can be
accessed either by the web server or the client
computer.

Assessing and Retrieving Site Data...
Loading Images
«Images on a web page often make the page load more

slowly, especially if you have a relatively slow
connection (e.g., a dial-up connection).

«To decrease the time it takes to load a page by

preventing images from loading you would need to
disable loading of images.

Assessing and Retrieving Site Data...

«Deleting Cookies and Browsing History

«A cookie, also known as an HTTP cookie, web
cookie, or browser cookie, is used for an origin
website to send state information to a user's browser
and for the browser to return the state information to
the origin site.

Basic Internet Settings And Configuration

Setting-up your Home page

+ To do it, follow the steps below:
1. On your browser, go to tools, then
options
2. On the Internet Options, click on
the General tab
3. Type the address that you what
for your home page then click Apply
then OK

© Internet Properties 7

x

Gener Searty Povacy Content Comecione Programs Advanced

Home pace

>

Te rate home page abr type each address ont oun ne.
‘it:79e.nlcrosof commwinkiprtinkd=255181

EEE | iaa | [em

Basic Internet Settings And Configuration...

Setting the Privacy Level

+ Under Settings, move the slider to the privacy

level you want:

+ Block All Cookies.
+ High.

+ Medium High

« Medium (default)
+ Low.

+» Accept All Cookies.

@ Internet Properties 7 x

General Searty pracy Content Comactone programe Advanced

‘Sect zone to view or change seat stings.
Intervet Loclinvanet Trstedsies Resbicted
ae
Internet
This one fu Internet mebstes, =:
nnd nina

except
reseed sees

St leve forthe zone

| fe mortes

| mun | Pies before dodo ene cate
Pa

|

| “Unsigned acier cons nt be dosricades

[erate roc Mode tecate restarting Internet spre)

PT | Er]

‘Reset al zones to def evel

x reed || an

51

Basic Internet Settings And Configuration...

Setting the types of connection a So =
1. Open your Internet Explorer. zone ss RST
2. Click the Tools button, and then salem ant e ete
click Internet Options. IT ER
3. Click the Connections tab. pain
4. Click Apply then Ok when done. moe et tre caos una =

+ These settings are summarized below.
+» Automatically detect settings
+ Use automatic configuration script: Loca caer 0 tg
Lists dort sy ap mer. [LUE |
+ Use a proxy server for your LAN —— ns
+ Bypass proxy server for local addresses

Install Google Chrome or Mozilla Firefox browser on your computer.
Setting-up your Home page with www.ethiopianwisdom.org.
On your browser in to bookmark et in DELL web site page

Block pop-up windows and report each steps seaport with screenshot.

Block the following two (1,2) website address and allow (3,4) and
report each steps seaport with screenshot.
1 www.xhasab.com

2. www.ofsite.com
3. www.mit.edu
4 www.linkedin.com

Viewing History and Delete history using Google Chrome or Mozilla
Firefox browser on your computer.

ACCESS AND USE INTERNET

Search the Internet (02)

NNEC

Hh

a

Anatomy of a Web Address

«The web address itself is composed
of four distinct parts: Protocol: The www Extensión
first part of a web address, http://,
which identifies the protocol that |

allows a computer to browse A
the web by getting information from
a remote server.

Protocol Domain

rotocol: //host/path /filename

Anatomy of a Web Address...

rotocol://host/path/filename

http!//www.tutorials.com|

technologies/internet-guide.htm

Protocol Sub-Domain Top-level Domain

in == 1
vu BRE com AOSTA
UH! LH __—_____

Domain name

File path

Resource name

Search Engines

«Designed to assist you in searching through the
enormous amount of information on the Web.

«No single search tool has everything.

«Example of search engines:
«Google
«Yahoo
AltaVista
«Excite

Browsing Site Data

+ KEYWORD SEARCHING refers to a search type in which
you enter words in a search box representing the
concepts you wish to retrieve.

«The Internet is a vast computer database. As such, its
contents must be searched according to the rules of
computer database searching.

«Much database searching is based on the principles of
Boolean logic.

keyword Searching

« Boolean logic refers to the logical relationship
among search terms, and is named for the
British-born Irish mathematician George Boole.

Boolean logic consists of three logical
operators:

OR

AND

NOT

keyword Searching...

« Each operator can be visually described by using Venn
diagrams, as shown below.

« OR logic
Example of how OR logic works:

college 396,482
university 590,791

college university 819,214
college OR university

keyword Searching...

« The more terms or concepts we combine in a search
with OR logic, the more results we will retrieve.

«OR logic
Example of how OR logic works:

Search terms Results

college OR university OR campus — |“ollege university campus |929,677

keyword Searching...

« AND logic

Example of how AND logic works:

Search terms Results

poverty AND crime

keyword Searching...

« The more terms or concepts we combine in a search
with AND logic, the fewer results we will retrieve.

Example of how AND logic works:

AN IN poverty 76,342

crime 348,252

poverty AND crime 12,998
poverty AND crime AND ge

poverty AND crime AND gender |nder 1,220

keyword Searching...

« NOT logic

Example of how NOT logic works:

cats 86,747

dogs 130,424
cats NOT dogs cats NOT dogs 65,223

Question: | want information about cats, but | don't want to see
anything about dogs.

keyword Searching...

+ Combined AND and OR logic
Question: I want information about the behavior of
cats.
Search: behavior AND (cats OR mammals)

You can combine both AND and OR logic in a single search,
as shown above.

Create Email Address

Create Email Address

D Coge
€ > X A https//www.google.com/webhp?hi=endisa =Xéived = OshUXEwiglay-zMzgAhWILaYKHTHOCFUQPAGH # © O

Google

Google Search lm Feeling Lucky

Google offeredin: Inc? MER Soomaali: Alan romeo

Ethiopia

Aderising Business About

XG CresteyourGoogle Account X

ww 4
The ease &
> simplicity of

Gmail, *

| Gomme IN © cree ou coi count

E > Ch mps//coumegoagiecom/ignun/ineberentenceount annee -malllcontinue hp IAE?

Google
Create your Google Account
10 continue to Gmail

Peete
Dane!

daneladamut? @gmallcom

Yeucan ee tenes names & erect 2

Pause cam
E &
ne account All of Google
working for you.

Sion in inste

Engioh (Unite sates) = Help Privacy Tem

© Ge RM CH PRES) © Crete your Cese attourt

€ > © à hips/acounts.googlacom/signup/väfwebpersonaldelalstsenikesmailficontnuerhtipk3ä. &» & @ | ©

Danel, welcome to Google
o

daneladamur 1 @gmal. com

BE - Phone number (optional)
We we your number or account scary ot be visto
mers

Recovery emal address (optional)

Wet use 11 ep your account secure

samary = | 4

our cy

[ nae Your personal info is private & safe

Why we ask or tie information

S Googe

RST) © cote ro Gong account

€ > © à nitps//accounts google.com signup/v2/webtermsotserice?serice=malicantinue=hiteaAk.. © % @ | @

Google

Privacy and Terms

To create a Google Account yout need to agree tothe
Terms of Service below.

In addition, when you create an account, we process.
your information as described in our Privacy Policy,
including these key points:

Data we process when you use Google

Wien you set up a Google Account, we store
Information you give us lke your name, email
adoress, and telephone number

When you use Google services to do things Ike write
a message in Gmal or comment on a YouTube video,
we store the information you crete,

‘When you search for a restaurant on Google Maps or
watch a video on YouTube, for example, we process
information about that activi — including
Information like the video you watched, device IDS,1P
addresses, coke data, and location,

We also process the kinds of information described
above when you use apps or sites that use Google

Fle

Youre in control ofthe data we
collect & how its used

© Googe KM Gmail EEE

€ > © à https//accounts google.com/signin/v2/s\/pwd?service=maildipassive=true8irm=false8ico,

Google
Welcome

© canciademutt@gmaiLcom y

Enter your password

Forgot password?

© Ge KM GR Fe Serge Enix & Account Recovery Options
€ > © à httpsi/myaccountgoogle.com/signinoptions/ecovery options collection?utm.soue
Google

Protect your account
© daeadamınagmalicon

a
B

Tell Google howto reach you in case you forget your
password, lose access, or there's unusual activity on your
account

Recovery phone number
No phone number

Recovery email
No recovery email

UPDATE

© Ge x | M Gmoi-Frestongeandems x

€ > X à hine/malgoogiecom/mai//pe-carousel-about-entinbe

M Gmail Q Search mail

Ts Ars

O Primary Promotions

inbox

À Sere ‘Google Community Te. Danel, welcome to you.
© snoozed
> sent
B

Drafts

Learn how to
More

~

10%
© % eri

0G9(0%) of 1568 used Terms Privacy Progrem Last account actly: 1 day
Manage Peles a0

Detais

Write email

À G Googe X | M Gr ree Stage méme X

Ineo (= dnenéamtt@e x

€ > X à mips//mallgooglecom/mail/Ipe=carcusel-about-entinbox

M Gmail

Q Search mail

D 4

O Primary Q Promotions

‘Google Community Te.

Danel, welcome to you..

Learn how tox
Gmail

Get Gmal for mobile

OP
net dass Import contacts and
@) see OR

GB (0%) of15 G8 uses Teims Privacy Program Last account act. day
Manage Policies a00
betas

G Gocgle | M Grol FreeStorsge En M Inser 2) cenelssamutl@s

€ > CB hups/mailgooglecom/mai/Tpe=carousel-about-entinbex?compose=GTWIeSKik.

M Gmail Q Search mail

Compose

Y Promotions

‘Sample E-mail

visuallanguage@gr

‘sample E-mail

No recent chats
Start anew one

1. Download a file based on the following contents.
History of Internet .pdf
Academy .pdf

Human psychology .ppt
Imagination Improvement .doc

Configure your computer to use the following network resources.
+» IP Address - 192.168.3.1

+» Subnet Mask - 255.255.255.0
« Default Gateway (Router) - 192.168.3.1
» Preferred DNS - 192.168.3.1

Download the DELL desktop OPtiplex 780 LAN driver
software for windows 7 operating system

Select subject-specific Engines for the following specific subjects.
For: Companies, E-mail, Image, Jobs, Games, Software,
Health/Medicine, and Education,

Example; Hotjobs.com (http: //www.hotjobs.com/)

Create email address by your full name
(@gmail.com) provider and report each steps
of creation email and save as (Your

name.)email pdf:

Write email to [email protected]
and attach the file that you have crate email
creation steps (pdf) file.

Send the email and sign out your email page.

Reference

>Tutorials Point, “INTERNET TECHNOLOGIES - QUICK
REFERENCE GUIDE ”tutorialspoint.com,
http://www.tutorialspoint.com/internet technologies
/internet quick guide.htm.

>Davin Pruitt-Mentle, “Introduction to Web Browsers and
Basic Search Strategies Using Search Engines”
,University of Maryland.

>

” Gerabirhan Paulos
2018