Applications of Information and Communication Technologies (ICT) Instructor Sanaa
Web Browser A browser is software that gets you to websites and their individual web pages and displays the content in such a way that the content appears mostly the same regardless of the computer, operating system, and display monitor.
1. Web Browser (Software for Surfing the Web) A browser is software that allows users to access and navigate the web. Popular browsers (as of early 2013): Google Chrome (36.5%) Internet Explorer (30.1%) Mozilla Firefox (21.4%) Apple Safari (8.29%) Opera (1.19%) Browsers help users surf the web by following links to different websites.
2. Website (Location on the Web) A website is a location on the web with a unique address called a URL (Uniform Resource Locator). Example: www.barnesandnoble.com is a website for the bookseller Barnes & Noble. Websites are hosted on computers, which may be located anywhere. 3. Web Pages (Documents on a Website) A web page is a document on the web that contains text, images, audio, or video.
How the Browser Finds Things: URLs (URLs are Uniform Resource Locators, or web addresses) URLs, HTML, and Hyperlinks – Simplified Summary 1. URL (Uniform Resource Locator) – Web Page Address A URL is the unique address of a webpage. It consists of: Protocol (e.g., http://, https:// ) – Rules for communication. Domain Name (e.g., www.nps.gov ) – Identifies the website. Directory Name (e.g., yose / ) – Folder storing the webpage. File Name (e.g., index.htm ) – The specific webpage.
2. HTML (Hypertext Markup Language) The language used to format and display web pages. Uses tags to structure content (text, images, links). XHTML is a stricter version of HTML for modern devices.
3. Hyperlinks (Links for Navigation) Hyperlinks (or links) connect web pages to other pages or websites. Usually appear as underlined or colored text . Allow users to navigate easily across the web.
4. Web Browsers – Accessing the Web Browsers interpret HTML and display web pages. Help users search, retrieve, and explore billions of web pages.
Basic Elements of a Browser Most computers come with a pre-installed browser . Common elements in a browser: Menu Bar – Contains options for file, edit, view, etc. Toolbar – Quick access buttons (back, forward, refresh). Address Bar – Enter website URLs. Workspace – Displays web content. Status Bar – Shows loading progress.
E-Commerce: B2B, B2C, & C2C E-commerce is buying and selling goods or services online. It includes: B2B (Business-to-Business) – Companies sell directly to other businesses, cutting out middlemen (e.g., wholesale suppliers). B2C (Business-to-Consumer) – Companies sell directly to consumers (e.g., Amazon, online banking, stock trading). C2C (Consumer-to-Consumer) – Individuals sell to each other via platforms like eBay, Etsy, and Craigslist. Showrooming: Customers check products in stores but buy them online at lower prices. Retailers like Target and Best Buy counter this with price matching.
Web 2.0 & Social Media Web 1.0: Read-only web with limited interaction. Web 2.0: Interactive, social, and user-driven (e.g., blogs, wikis, social media). Social Networking – Platforms like Facebook, LinkedIn, and MySpace . Media Sharing – Sites like YouTube, Flickr, and Vimeo for sharing videos, photos, and music. Social Aggregators – Tools like FriendFeed track multiple social networks in one place.
Web 3.0: The Future Web AI-driven searches – Browsers understand complex queries and provide relevant results. Semantic Web – Machines process and understand web data. Personalized Browsing – Web adapts to user preferences for a tailored experience. Web 3.0 will make searching smarter, reducing human effort in finding and organizing information.
The Intrusive Internet: Protect Yourself The Internet is open to everyone—including hackers and scammers. Protect your identity, financial information, and privacy from threats like snooping, spamming, spoofing, phishing, pharming, cookies, spyware, and malware. Email & Text Snooping: Nothing is Private Even deleted messages can be recovered. Employers can monitor emails on company networks. Internet providers may sell your data. Tip: Avoid sending sensitive information via email or text. Use encryption tools for extra security.
Spam: Junk Emails & Messages Unsolicited emails flood inboxes with ads and scams. Spam now affects social media and even text messages. Tip: Never click "unsubscribe" in spam—it confirms your email is valid!
Spoofing, Phishing & Pharming: Fake Emails & Websites Spoofing: Emails appear to be from someone you know but are fake. Phishing: Scammers pose as trusted companies to steal personal info. Pharming: Malicious software redirects you to fake websites. Tip: Always check for "https://" and a padlock symbol before entering personal details.
Cookies: Convenience vs. Tracking Cookies store login info and preferences but can also track your browsing. Tip: Manage cookies in browser settings to limit tracking. Spyware & Malware: Hidden Dangers Spyware collects personal data without your consent. Adware generates annoying pop-ups. Keyloggers record everything you type. Tip: Install reliable antivirus and anti-spyware tools.
Malware: The Danger of Viruses Malware, short for malicious software , includes viruses, worms, Trojan horses, ransomware, and spyware that can harm your computer or mobile devices. One of the most common threats is viruses , which spread by attaching to programs and infecting systems.
How to Reduce Malware Risks Install Antivirus Software – Use trusted programs like McAfee or Norton to scan and remove threats. Be Cautious with Emails & Downloads – Avoid opening unknown attachments and delete spam. Beware of Free & Illegal Downloads – Many contain spyware. Read Before Clicking "I Agree" – Some software installs spyware hidden in agreements. Avoid Unsolicited Downloads – Reject automatic downloads from unknown sources.
Protecting Yourself from Spyware Use Webmail Sparingly – Viruses can hide in email code. Don’t Start Your Computer with External Devices Plugged In – They can carry malware. Back Up Your Data – Keep a copy in a secure location or cloud storage. Use Online Virus Scanners – If infected, seek help from McAfee or Norton.
Creating Strong Passwords Passwords don’t stop malware but help protect your system from intruders. Follow these tips: Avoid using common words, personal details, or easy sequences like “12345.” Mix letters, numbers, and symbols (e.g., 2b/orNOT2b% ) Use different passwords for different sites. Store passwords securely; avoid writing them down or saving them in unsafe places.