Internet, Intranet and Extranet presentation

330 views 236 slides Feb 23, 2023
Slide 1
Slide 1 of 236
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126
Slide 127
127
Slide 128
128
Slide 129
129
Slide 130
130
Slide 131
131
Slide 132
132
Slide 133
133
Slide 134
134
Slide 135
135
Slide 136
136
Slide 137
137
Slide 138
138
Slide 139
139
Slide 140
140
Slide 141
141
Slide 142
142
Slide 143
143
Slide 144
144
Slide 145
145
Slide 146
146
Slide 147
147
Slide 148
148
Slide 149
149
Slide 150
150
Slide 151
151
Slide 152
152
Slide 153
153
Slide 154
154
Slide 155
155
Slide 156
156
Slide 157
157
Slide 158
158
Slide 159
159
Slide 160
160
Slide 161
161
Slide 162
162
Slide 163
163
Slide 164
164
Slide 165
165
Slide 166
166
Slide 167
167
Slide 168
168
Slide 169
169
Slide 170
170
Slide 171
171
Slide 172
172
Slide 173
173
Slide 174
174
Slide 175
175
Slide 176
176
Slide 177
177
Slide 178
178
Slide 179
179
Slide 180
180
Slide 181
181
Slide 182
182
Slide 183
183
Slide 184
184
Slide 185
185
Slide 186
186
Slide 187
187
Slide 188
188
Slide 189
189
Slide 190
190
Slide 191
191
Slide 192
192
Slide 193
193
Slide 194
194
Slide 195
195
Slide 196
196
Slide 197
197
Slide 198
198
Slide 199
199
Slide 200
200
Slide 201
201
Slide 202
202
Slide 203
203
Slide 204
204
Slide 205
205
Slide 206
206
Slide 207
207
Slide 208
208
Slide 209
209
Slide 210
210
Slide 211
211
Slide 212
212
Slide 213
213
Slide 214
214
Slide 215
215
Slide 216
216
Slide 217
217
Slide 218
218
Slide 219
219
Slide 220
220
Slide 221
221
Slide 222
222
Slide 223
223
Slide 224
224
Slide 225
225
Slide 226
226
Slide 227
227
Slide 228
228
Slide 229
229
Slide 230
230
Slide 231
231
Slide 232
232
Slide 233
233
Slide 234
234
Slide 235
235
Slide 236
236

About This Presentation

Educational Technology


Slide Content

[email protected]
1
aaaaaa
INTRANET AND INTERNET (EDT 323)
Prof. GAMBARI, Amosa Isiaka
Dean, School of Science & Technology Education
Federal University of Technology, Minna
E-mail: [email protected]

COURSE OUTLINE
[email protected]
2
WeekTopic Remark
1. ComputerNetwork LecturePresentation
2. Internet LecturePresentation
3. Intranet LecturePresentation
4. Extranet LecturePresentation
5. EducationalResourcesontheInternetLecturePresentation
6. InternetInformationResources LecturePresentation
7. ConnectingtotheInternet Practical
Demonstration
8. ElectronicMails Practical
Demonstration
9. Teleconferences Practical
Demonstration
10.Web3.0Technologies Practical
Demonstration
11 Test&Revision
12-13Examination

[email protected]
3
RULES AND REGULATION

RULES AND REGULATION
[email protected]
4
I.Attendance is mandatory.
II.Lateness will not be tolerated.
III.Participation in the Class activities and discussion
compulsory.
IV.CA = Class Quiz + Presentation = 40%.
V.Examination by E-exam = 60%

INTRODUCTION
[email protected]
5
Theinterconnectivityamongvariouscomputersisdescribedas
networking.Thisarrangementprovidesscoresofeducational
resourcesforyourteachingandlearningactivities.Thenetworksare
ofthreefolds-LocalAreaNetwork,MetropolitanAreaNetwork,Wide
AreaNetworkandInternationalNetwork(Internet).InthisUnit,youwill
learnabouttheuseofnetworkandInternetintheteachingand
learning.Youwillequallybeexposedtosometerminologiesrelatedto
NetworksandInternet.

[email protected]
6
COMPUTER NETWORK

COMPUTER NETWORK
[email protected]
7
Computernetworkconsistsoftwoormorecomputersthatare
linkedinordertoshareresourcessuchasprintersandCD-ROMs,
exchangefiles,orallowelectroniccommunications.Itmayalsobe
definedasacollectionofresourcesamongthemselves.The
computersonanetworkmaybelinkedthroughcables,telephone
lines,radiowaves,satellites,orinfraredlightbeams.The
computerscanbegeographicallylocatedanywhere.Connection
canthroughacopperwire,fiberoptics,microwaves,infraredor
satellite.

COMPUTER NETWORK
[email protected]
8

ADVANTAGES OF NETWORK
[email protected]
9
I.Speed:Networksprovideaveryrapidmethodforsharingand
transferringfiles.Withoutanetwork,filesaresharedbycopying
themtofloppydisksoranyotherstoragemedium,thencopying
thefilestooneormorecomputers.Thismethodoftransferring
filesisverytime-consuming.
II.Cost:Integratedsoftwarethatmaybeusedonanetworkarenow
availableatconsiderablesavingsascomparedtobuying
individuallylicensedcopies.Besidesmonetarysavings,sharinga
programonanetworkallowsforeasieruseofprogramby
multipleuserssimultaneously.
III.Security:Filesandprogramsonanetworkcanbewellsecured..
Also,passwordscanbeestablishedforspecificdirectoriesto
restrictaccesstoauthorizedusers.

Cont..
[email protected]
10
IV.CentralizedSoftwareManagement:Oneofthegreatestbenefits
ofinstallinganetworkisthefactthatallofthesoftwarecanbe
loadedononecomputer(thefileserver).Thiseliminatestheneed
tospendtimeandenergyinstallingupdatesandtrackingfileson
stand-alonecomputersthroughouttheorganization.
V.ResourceSharing:Sharingofresourcesisanotherareainwhicha
networkexceedsstand–alonecomputer.Mostorganization
cannotaffordenoughlaserprinters,faxmachines,modems,
scannersandCD-ROMplayersforeachcomputer.However,if
theseorsimilarperipheralsareaddedtoannetwork,theycanbe
sharedbymanyusers.
VI.ElectronicMail:thepresenceofanetworkprovidesthehardware
necessarytoinstallande-mailsystem.E-mailaidspersonaland
professionalcommunicationanditfacilitatesthedisseminationof
informationwithinanorganization.

Cont..
[email protected]
11
VII.FlexibleAccess:Schoolnetworkforexamplecouldallowstudents
toaccesstheirfilesfromcomputerthroughouttheschool.
Studentscanbeginanassignmentintheirclassrooms,saveapart
ofittoapublicaccessareaofthenetwork,andthengotothe
mediacenterafterschooltofinishtheirwork.Studentscanalso
workcooperativelythroughthenetwork.
VIII.WorkgroupComputing:Itallowsmanyuserstoworkona
documentorprojectconcurrently.Forexample,educatorslocated
atvariousschoolswithinacountrycouldsimultaneously
contributetheirideasaboutnewcurriculumstandardstothe
samedocumentandspreadsheets.

DISADVANTAGES OF NETWORK
[email protected]
12
i.Expensivetoinstall:althoughanetworkwillgenerallysavemoneyover
time,theinitialcostsofinstallationcanbeprohibitive.Cables,network
cards,andsoftwareareexpensive,andtheinstallationmayrequirethe
servicesofatechnician.
ii.RequireAdministrativeTime:Propermaintenanceofanetworkrequires
considerabletimeandexpertise.Manyorganizationshaveinstalleda
network,onlytofindthattheydidnotbudgetforthenecessary
administrativesupport.
iii.ServerBreakdown:Although,aserverisnomoresusceptibletofailure
thananyothercomputer,whentheservergoesdown,theentirenetwork
maygrindtoahalt.Whenthishappens,theentireorganizationmaylose
accesstonecessaryprogramsanddata.
iv.CablesMayBreak:Thereisthepossibilityofnetworkcablebeing
tamperedwith.Somenetworkconfigurationsaredesignedtominimize
theinconvenienceofabrokencable;withotherconfigurations,one
brokencablecanaffecttheentirenetwork.

APPLICATIONS OF COMPUTER
NETWORKS
[email protected]
13
The following are the applications of Computer networks:
a.Resource sharing:
i.Hardware (computing resources, disks, printers)
ii.Software (application software)
b.Information Sharing:
i.Easy accessibility from anywhere (files, databases).
ii.Search Capability (WWW)
c.Communication:
i.Email.
ii.Message broadcast
d.Remote computing

[email protected]
14
COMPUTER NETWORK HARDWARE
COMPONENTS

COMPUTER NETWORK
HARDWARE COMPONENTS
[email protected]
15
Networkinghardwareincludesallcomputers–serversand
workstations,peripherals,interfacecardsandotherequipment
neededtoperformdata–processingandcommunicationssuchas
switches,repeaters,bridgesandrouters.
Theworkstationscanbeoflesscapacitythanthefileserver,andthey
mayhaveadditionalsoftwareontheirharddisks.Onmostnetworks,
cablesareusedtoconnectthecomputers.

CONT…
[email protected]
16
AFileServer:Inatypical
networkenvironment,one
computerisdesignatedasthe
fileserver.Afileserverstands
attheheartofmostnetworks.It
storesallthesoftwarethat
controlthenetwork,aswellas
thesoftwarethatcanbeshared
bythecomputersonthe
network.Computersconnected
tothefileserverarecalled
workstations.Itcontrolsthe
communicationofinformation
betweentheworkstationsona
network.

CONT…
[email protected]
17
Workstations:Alloftheusercomputersconnectedtoanetwork
arecalledworkstationsorclients.Atypicalworkstationisa
computerthatisconfiguredwithanetworkinterfacecard,
networkingsoftwareandtheappropriatecables.Workstationsdo
notnecessarilyneedfloppydiskdrivesbecausefilescanbesaved
onthefileserver.Almostanycomputercanserveasanetwork
workstation.

CONT…
[email protected]
18
Network Interface Card:It provides the physical connection
between the network and the computer workstation. Network
interface cards are a major factor in determining the speed and
performance of a network. The three most common network
interface connections are Ethernet cards, Local talk connectors,
Token ring cards.
Hubs: When connecting the computers together on a network, they
are not plugged into each, instead each computer plugs into a
separate device called a hub.
Switches: A switch is simply a more sophisticated type of hub.
Switches are more efficient and faster than hub.
Repeaters: A signal loses strength as it passes along a cable over
long distances. Repeaters help to overcome this problem. A good
example of repeaters is step -up transformer used to solve voltage
drop problem.

CONT…
[email protected]
19
Bridges: A bridge is a device that allows you to segment a large
network into two smaller, more efficient networks. The bridge
manages the traffic on both sides of the network in order to
maintain optimum performance.
A Router: A router translates information from one network to
another; it is similar to a super intelligent bridge. It selects the best
path to route a message to prevent head-on collisions.

TYPES OF COMPUTER NETWORK
[email protected]
20
The three basic types of networks include: Local Area Network
(LAN), Metropolitan Area Network (MAN) and Wide Area
Network (WAN).

A.LOCAL AREA NETWORK
[email protected]
21
LocalAreaNetworkisthatisconfinedtoarelativelysmallarea.Itis
generallylimitedtogeographicareasuchasanofficeorofficeswithin
abuilding.RarelyareLANcomputermorethanamileapart(100
metersto3kilometers).Sinceitisrestrictedinsize,thatmeanstheir
datatransmissiontimecanbeknowninadvance,andthenetwork
managementwouldbeeasier.LANprovide:Costreductionsthrough
sharingofinformationanddatabases,resourcesandnetworkservices;
Increasedinformationexchangebetweendifferentdepartmentsinan
organization,orbetweenindividuals;Improvethecommunity
security;Increasingnumberandvarietyofintelligentdataterminals,
PCsandworkstations.

CHARACTERISTICS OF LAN
[email protected]
22
I.A Local Area Network (LAN) is a collection of networking
equipment located geographically close together. E.g. Single room,
Campus etc.
II.Data transferred in high speed which ranges from 100 Mbps to
gigabit for system development and have a low implementation
cost.
III.Upper limit: 10 km; Lower limit: 1 km.
IV.Twisted pair cable or Co-axial cable connects the plug in cards to
form a network.
V.Designed to share resources between PCs and workstation such as
hardware or data.

CONT…
[email protected]
23
Wireless LANs
Not all networks are connected with cabling; some networks are
wireless. Wireless LANs use high frequency radio signals, infrared
light beams, or lasers to communicate between the workstations and
the file servers or bubs.

CONT…
[email protected]
24
Usage of LAN
Aworktointernetconnectionswouldmostlikelyrequirebroadcast
network(LAN)withaconnectiontotheinternet(Packetswitched
network).

CONT…
[email protected]
25

MERITS OF LAN
[email protected]
26
ThefollowingarethemeritsofLocalAreanetwork:
I.ResourceSharing:Computerresourceslikeprinters,modems,
DVD-Romdrivesandharddiskscanbesharedwiththehelpof
localareanetworks.Thiswillreducecostofhardwarepurchases.
II.SoftwareApplicationsSharing:Itischeapertousesamesoftware
overnetworkinsteadofpurchasingseparatelicensedsoftwarefor
eachclientinanetwork.
III.EasyandCheapCommunication:Dataandmessagescaneasily
betransferredovernetworkedcomputers.
IV.CentralizedData:Thedataofallnetworkuserscanbesavedon
harddiskoftheservercomputer.Thiswillhelpuserstouseany
workstationinanetworktoaccesstheirdata.Becausedataisnot
storedonworkstationslocally.

CONT..
[email protected]
27
V.Data Security: Since, data is stored on server computer centrally, it
will be easy to manage data at only one place and the data will be
more secure too.
VI.Internet Sharing: Local Area Network provides the facility to share
a single internet connection among all the LAN users. In Net
Cafes, single internet connection sharing system keeps the internet
expenses cheaper.

DEMERITS OF LAN..
[email protected]
28
I.HighSetupCost:AlthoughtheLANwillsavecostovertimedue
tosharedcomputerresourcesbuttheinitialsetupcostsof
installingLocalAreaNetworksishigh.
II.PrivacyViolations:TheLANadministratorhastherightstocheck
personaldatafilesofeachandeveryLANuser.Moreoverhecan
checktheinternethistoryandcomputerusehistoryoftheLAN
users.
III.DataSecurityThreat:Unauthorizeduserscanaccessimportant
dataofanorganizationifcentralizeddatarepositoryisnot
securedproperlybytheLANadministrator.

DEMERITS OF LAN..
[email protected]
29
IV.LANMaintenanceJob:LocalAreaNetworkrequiresaLAN
Administrator.Because,thereareproblemsofsoftware
installationsorhardwarefailuresorcabledisturbancesinLocal
AreaNetwork.ALANAdministratorisneededatthisfulltime
job.
V.CoversLimitedArea:LocalAreaNetworkcoversasmallarealike
oneoffice,onebuildingoragroupofnearbybuildings.
VI.Ifthefileserverdevelopsaseriousfault,alltheusersareaffected,
ratherthanjustoneuserinthecaseofastandalonemachine

LAN TOPOLOGIES
[email protected]
30
Topologyreferstothephysicalarrangementofnetwork
components(cables,computers&otherperipherals)andmediawithin
anetworkstructure.TherearefourprimarykindsofLANtopologies:
linearbus,tree,star,andring.

(I) Linear Bus Topology
[email protected]
31
Alinearbustopologyconsistsofamainrunofcablewitha
terminatorateachend.Allnodes(fileserver,workstations,and
peripherals)andconnectedtothelinearcable.Allnodesareconnected
toasinglecommunicationlinethatcarriesmessagesinbothdirections.
EthernetandlocalTalknetworksusealinearbustopology.Abus
technologycalledEthernethasbecometheindustrystandardforlocal-
areanetworks.

CONT..
[email protected]
32
ADVANTAGES
The following are the advantages of Linear Bus Topology:
a.Easy to connected a computer or peripheral to a linear bus.
b.Requires less cable length than a star topology.
DISADVANTAGES
The following are the disadvantages of Linear Bus Topology:
a.Entire network shuts down if there is a break in the main cable.
b.Terminators are required at both ends of the backbone cable.
c.Difficult to identify the problem if the entire network shuts down.
d.Not meant to be used as a stand-alone solution in a large building.

(II)STAR TOPOLOGY
[email protected]
33
Astartopologyisdesignedwitheachnode(fileserver,workstations,and
peripherals)connecteddirectlytoacentralnetworkhuborconcentration.
Thisisaconfigurationthatcentresaroundonenodetowhichallothers
areconnectedandthroughwhichallmessagesaresent.
Thestartopologyreducesthechanceof
networkfailurebyconnectingallofthe
systemstoacentralhub.Thiscentral
hubrebroadcastsalltransmissions
receivedfromanyperipheralnodeto
allperipheralnodesonthenetwork,
sometimesincludetheoriginatingnode
Allperipheralnodemaythus
communicatewithallothersbytransmittingto,andreceivingfrom,the
centralnodeonly.Thefailureofatransmissionlinelinkingany
peripheralnodefromallothers,buttherestofthesystemswillbe
unaffected.

CONT..
[email protected]
34
Dataonastarnetworkpassesthroughthehuborconcentrator
beforecontinuingtoitsdestination.Thehuborconcentrator
managesandcontrolsallfunctionsofthenetwork.This
configurationiscommonwithtwistedpaircable;however,itcan
alsobeusedwithcoaxialcableorfiberopticcable.

CONT..
[email protected]
35
ADVANTAGES
The following are the advantages of Star Topology:
a.Easy to install and wire.
b.No disruptions to the network when connecting or removing
devices.
DISADVANTAGES
The following are the disadvantages of Star Topology:
a.Requires more cable lengths than a linear topology.
b.If the Hub or concentrator fails, nodes attached are disabled.
c.More expensive than linear bus topologies because of the cost of
the concentrators.

(III)TREE TOPOLOGY
[email protected]
36
ATreetopologycombinescharacteristicsoflinearbusandstar
topologies.Itisaconfigurationthatconnectsallnodesinaclosed
looponwhichmessagestravelinonedirection.Itconsistsofgroups
ofstar-configuredworkstationsconnectedtoalinearbusbackbone
cable.Treetopologyallowsfortheexpansionofanexistingnetwork,
andenablesorganizationstoconfigureanetworktomeettheir
needs.

(IV)RING TOPOLOGY
[email protected]
37
Ringtopologyconsistsofaseriesofrepeatersconnectedtoone
anotherbyunidirectionaltransmissionlinkstoformasingleclosed
loop.Eachstationonthenetworkconnectstothenetworkata
repeater.

B.METROPOLITAN AREA
NETWORK (MAN)
[email protected]
38
MetropolitanAreaNetwork(MAN)isalargecomputernetwork
usuallyspanningacampusoracity.Theytypicallyusewireless
infrastructureoropticalfiberconnectionstolinktheirsites.A
MetropolitanAreaNetwork(MAN)isanetworkthatisutilizedacross
multiplebuildingsandcommonlyusedinschoolcampusesorlarge
companieswithmultiplebuildings.ItislargerthanaLAN,butsmaller
thanaWAN.ItalsousedtomeantheinterconnectionofseveralLANs
bybridgingthemtogether.Thissortofnetworkisalsoreferredtoasa
campusnetwork.Forinstance,FUTMinnamayhaveaMANthatjoins
togethermanyofitsLANssituatedwithineachdepartment.

CONT..
[email protected]
39

CHARACTERISTICS OF MAN
[email protected]
40
ThefollowingarethecharacteristicsMAN:
I.Ametropolitanareanetwork(MAN)issimilartoalocalarea
network(LAN)butspansanentirecityorcampus.MANsare
formedbyconnectingmultipleLANs.Thus,MANsarelargerthan
LANsbutsmallerthanwideareanetworks(WAN).
II.Itmaybeasinglenetworksuchascabletelevisionnetwork
availableinmanycities.
III.MANsareextremelyefficientandprovidefastcommunicationvia
highspeedcarriers,suchasfiberopticcables.

CONT..
[email protected]
41

CONT..
[email protected]
42
Merits of MAN
The following are the merits MAN:
i.It provides a good back bone for a large network and provides
greater access to WANs.
ii.The dual bus used in MAN helps the transmission of data in both
direction simultaneously.
iii.A MAN usually encompasses several blocks of a city or an entire
city.
Demerits of MAN
The following are the demerits MAN:
i.More cable required for a MAN connection from one place to
another.
ii.It is difficult to make the system secure from hackers and
industrial espionage (spying) graphical regions.

C.WIDE AREA NETWORK (WAN)
[email protected]
43
WideAreaNetwork(WAN)isacomputernetworkcoveringawide
geographicalarea.ThisisdifferentfromMANorLANs.Thisisthe
Networkthatspreadgeographically(CountryoracrossGlobe)is
calledWAN(WideAreaNetwork).ThebestexampleofaWANisthe
Internet.AWideAreaNetworkisanetworkspanningalarge
geographicalareaofaroundseveralhundredmilestoacrosstheglobe.
Itmaybeprivatelyownedorleased.Itisalsocalled“enterprise
networks”iftheyareprivatelyownedbyalargecompany.Itcanbe
connectedthroughcable,fiberorsatellite>However,itistypically
slowerandlessreliablethanaLAN.Theservicesincludeinternet,
Intranet,etc.

CHARACTERISTICS OF WAN
[email protected]
44
ThefollowingarethecharacteristicsofWAN:
I.Networkthatprovideslongdistancetransmissionofdata,voice,
image,andvideoinformationoverlargegeographicalareasthat
maycompriseacountry,acontinent.
II.Range:Beyond100km.

TECHNOLOGY USED IN WAN
[email protected]
45
Thefollowingarethetechnology
usedinWAN:
i.ISDN(Integratedservicedigital
network)2types
BasicRateInterface
PrimaryRateInterface
ii.FrameRelay.
iii.Switchedmultimegabitdata
service(SMDS).
iv.Synchronousopticalnetwork
(SONET).
v.Highdatalinkcontrolled
(HDLC).
vi.Synchronousdatalinkcontrol
(SDLC)

WANS IN ACTION: MAKING
INTERNET CONNECTION
[email protected]
46

CONT..
[email protected]
47
MeritsofWAN
ThefollowingarethemeritsofWAN:
i.Coversalargegeographicalareasolongdistancebusinesscan
connectontheonenetwork.
ii.Sharessoftwareandresourceswithconnectingworkstations.
iii.Messagescanbesentveryquicklytoanyoneelseonthenetwork.
Thesemessagescanhavepictures,soundsordataincludedwith
them(calledattachments).
iv.Expensivethings(suchasprintersorphonelinestotheinternet)
canbesharedbyallthecomputersonthenetworkwithout
havingtobuyadifferentperipheralforeachcomputer.
v.Everyoneonthenetworkcanusethesamedata.Thisavoids
problemswheresomeusersmayhaveolderinformationthan
others.

CONT..
[email protected]
48
DemeritsofWAN
ThefollowingarethedemeritsofWAN:
i.Needagoodfirewalltorestrictoutsidersfromenteringand
disruptingthenetwork.
ii.Settingupanetworkcanbeanexpensive,slowandcomplicated.
Thebiggerthenetworkthemoreexpensiveitis.
iii.Oncesetup,maintaininganetworkisafull-timejobwhich
requiresnetworksupervisorsandtechnicianstobeemployed.
iv.Securityisarealissuewhenmanydifferentpeoplehavethe
abilitytouseinformationfromothercomputers.Protection
againsthackersandvirusesaddsmorecomplexityandexpense.

CONT..
[email protected]
49
The main difference between a MAN and a WAN is that the WAN
uses Long Distance Carriers. Otherwise the same protocols and
equipment are used as a MAN.

CONT..
[email protected]
50

CONT..
[email protected]
51

[email protected]
52
WEEK TWO:INTERNET

INTRODUCTION
[email protected]
53
Theinternet(alsocalledInternationalnetwork)isa
globalcollectionofmanydifferenttypeof
computersandcomputernetworksthatarelinked
together.Itcanalsobecalledanetworkconnection
ofmanycomputernetworkbasedonacommon
addressingsystemandcommunicationsprotocol
called TCP/IP (Transmission Control
Protocol/InternetProtocol).Justasatelephone
enablesyoutalktosomeoneontheothersideof
earthwhoalsohasaphone,theinternetenablea
persontoexchangeinformationwithanother
computersandcomputeruseranywhereinthe
world.Somecalltheinternetsuperhighway.Asa
roadallowstravelthroughdifferentpartsofa
country,sotheinternetallowsinformationtotravel
throughdifferentinterconnectedcomputer
network.

ORIGIN AND DESIGN OF
INTERNET
[email protected]
54
Theideaoftheinternetbeganasan
experimentbytheUnitedStateof
America(USA)DepartmentofDefense
onthe1960’swiththeprimarygoalof
helpingscientistandresearchersfrom
widelydispersed(remote)areastowork
togetherbysharingscarceand
expensivecomputersandtheirfiles.
ThisneedforInternetarosewhenitbecameapparentthatthere
wasaneedforabombproofcommunicationssystemduringthe
coldwarofthemid60’s.Aconceptwasdesignedtolinkcomputers
togetherthroughouttheUSwithsuchasysteminplace,large
sectionsofthecountryarereachedandmassagescouldstillgot
through.

CONT..
[email protected]
55
Theinternetwasactuallyanemergencycommunicationssystem
operationbythemilitarydepartmentofdefense’sAdvancedResearch
ProjectAgency(ARPA).
ThewholeoperationwasreferredtoasARPANET.Intime
ARPANETcomputerswereinstalledateveryuniversityintheU.S.
thathaddefenserelatedfunding.
TheoriginalmotivebehindARPANET,wastobuildanetworkcapable
ofcarryingmilitaryandgovernmentinformationfromonepointto
anotherduringanynuclearwartheproject,whichwasinitiatedin
1968,soonwentwiderthanitsoriginalscopetobecomeaprojectfor
buildingalarge-scalenetworkcalled,theinternetthatwehavetoday.

CONT..
[email protected]
56
Gradually,theInternethadgonefromamilitarypipe-linetoa
communicationtoolforscientists.Asmorescholarscameonline,
theadministrationofthesystemwastransferredfromARPAto
theNationalScienceFoundation.
Yearslater,businessbeganusingtheInternetandthe
administrativeresponsibilitieswereonceagaintransferred.Today
theinternethasturnedthewholeworldintoaglobalvillageasfar
asinformationinallaspectofhumanendeavourisconcerned.

RESOURCES ON THE INTERNET
[email protected]
57
Internetoffersacollectionofinformationofinformationwithtopic
rangingfrombusinesstoscienceandtechnology.Italsopossesses
materialsonartsandresearchmaterialforstudents,entertainment,
sports,shopping,dictionaries,encyclopaedias,andmaps.Inaddition,
itoffersotherservicesandresourcessuchas:
i.E-mail
ii.WorldWideWeb
iii.WebSearchEngine
iv.Usenet
v.AnonymousFTP
vi.FileTransferProtocol(FTP)
vii.InternetRelayChat

COMPOSITION OF INTERNET
[email protected]
58
ThefollowingarethecompositionofInternet:
i.Acommunityofpeople:whouseanddevelopthenetwork.
ii.Acollectionofresources:thatcanbereachedfromthose
networks.
iii.Asetuptofacilitatecollaboration:Amongthemembersofthe
researchandeducationalcommunitiesworldwide.The
connectednetworksusetheTCP/IPprotocols:

INFORMATION SERVICES
[email protected]
59
Internetoffersacollectionofinformationwithtopicrangingfrombusinessto
scienceandtechnology.Italsopossessesmaterialonartsandresearch
materialforstudents,entertainment,sports,shopping,dictionaries,
encyclopaedias,andmaps.Inaddition,itoffersotherservicesandresources.
i.E-mail(ElectronicMail):E-mailisacommonresourcesprovidedby
internet.Itisaworldwidesystemforsendingandreceivingmessages
throughelectronicsystem.E-mailislikethewayyousendawritten
lattertosomebodyyouknowthroughthepost-officesystem.E-mails
arelettersthatcanbesentthroughtheinternetandcanarrivealmost
instantlyandwithoutcost.E-mailsareanessentialpartofevery
companyandeverypersonwhoneedstocommunicatewithpeoplethat
livefarawayfromthem.

CONT..
[email protected]
60
ii.FileTransferServices:Youcantransferfilesfromonecomputer
toanotherusingtheInternet.Filetransfermeansuploadingafile
toaserverordownloadingafilefromaserver.Filetransfer
servicesusetheFileTransferProtocol(FTP),whichisanInternet
protocolthathelpstouploadanddownloadfiles.FTPis
commonlyusedtodownloadfilestoapersonalcomputerfrom
otherserversontheInternet.
iii.SearchEngines:Asearchengineisaprogramthatallowsyouto
searchforaparticularsetofwordsspecifiedbyyou,onthe
Internet.Auserinterfaceisprovidedwhereausercanenterthe
wordorthephrasethathastobesearched.Thesearchengine
triestolocatethekeywordinalargedatasourceandreturnsthe
resultofthesearch.Google,Yahoo,MSN,LycosandAltavistaare
commonlyusedsearchengines.

CONT..
[email protected]
61
iv.Communication–MSN,Skype,Yahoo:Messengerservicesprovide
arealbreakthroughincommunicationtoday.Theirusehas
managedtominimizedistancesandofferthechancetopeoplewho
havefriendsandfamilieslivingfarawayfromthemcommunicate
easilyandcheap.Thesemessengerservicescanbedownloaded
throughtheirrespectivewebsitesandassoonastheprogramison
theharddriveyoucanaddpeople’semailaddressesorusernames
andseethem.Messengerservicesofferinstantmessagingalong
withaudioandvideoconferencing.Microphonesandcamerascan
beattachedonthecomputerandpeoplecaninstantlyandlive
conferencewithothersfornoextracost.

CONT..
[email protected]
62
v.ChatRooms–TheMirc:Chatroomsarebeingusedfrompeople
forcommunicatingwithindividualsfromallovertheworld.Chat
roomsofferthemostwidelyusedtechnologyformeetingpeople
thatbelongtoyourownnetworkofinterests.ThemIRCisthe
mostpopularprogramthatincludeschatroomsandteenagersare
themostfrequentageclasstouseit.TheuseofmIRCiseasyand
anonymityiswellpreservedsinceyouareonlyaskedtousea
usernametojoin.
vi.SocialNetworkingSites:SocialNetworkingSitesarewebsites
throughwhichpeoplecancreateapersonalprofileofthemselves
sothatothermembersofthiswebsitecancontactthemshould
theyliketheirprofile.SocialNetworkingsitesareofferedfor
creatingfriendships,relationshipsandacquaintanceships.Those
websitesareverypopularandallowyoutoincludepicturesof
yourselfandotherpersonalinformation.

CONT..
[email protected]
63
=Inaddition,peoplecanusethesewebsitestoexpresstheview
theyhaveforthemselvesandrequestforpeoplethatsharethe
sameinterestsasthem.
vii.DownloadingServices:Downloadingservicesareofferedeither
throughwebsitesorthroughpeertopeerprogramsandallow
peopletodownloadmusic,moviesorprogramsontotheir
computer.PeertopeerprogramshavetheformofamIRC
programthroughwhichpeoplethatareconnectedatthesame
timecansharemusic,videoorprogramfilesthatalreadyhaveon
theircomputer.

INTERNET APPLICATIONS
[email protected]
64
ThefollowingaretheApplicationsofInternet:
i.Research:Theinternetisprovidedwithspecialtoolsthatassistin
searchingforinformation.Userscanmakeresearchonthe
following:companiesproducingaproduct,informationfor
projects,excerptsfromjournalsetc.
ii.BusinessConnection:Businessconnectionscannowbedone
withanyoneoranycompanyinanypartoftheworldthroughthe
useofinternet,contactsuchandthenproceedtomake
arrangementfororderandpayment.
iii.Registrationandcheckingofresults:Mostexaminationbodies
nowmaketheircandidatestoregisterthroughthecompletionof
formsontheinternet,Resultsafterexaminationcanalsobe
checkedontheInternet.ExampleisWestAfricanExamination
Council(WAEC),NationalExaminationCouncil(NECO)and
JointAdmissionandMatriculationsCouncil(JAMB).

CONT..
[email protected]
65
iv.Education:Severallearningmaterialareavailableontheinternet.
Somesoftwarecompaniesoffertrainingontheirproductsviathe
internet.Likewise,someeducationalinstitutionsaredoingthe
same.
v.Advertising:Organisationadvertisestheirproductsonthe
internet.Thiscanbedonebyhavingaweb-site.Prospective
customerscanvisitthesitetoviewtheproduct.Online
transmissionofprogrammes-theinventionofinternethasmade
itpossibletowatchentertainmentandreligiousprogrammeslive.
vi.Library:Theelectroniclibrariesareofutmostimportancefor
Universitystudentslookingforscientificinformationfortheir
courses.
vii.InternetBank:Theadvancedtechnologiesoftheinternet
managedtofreepeoplefromthehasslesoflosinganenormous
amountoftimewaitinginthelinetobeservedatthebank
branches.

CONT..
[email protected]
66
=Internetbankingistheeasywayofdealingwithbank
transactionssafelyandquickly.Internetbankingoffersawide
rangeoftransactionsthatcanbedoneincludingbillpayments
andtransfers.Internetbankingisconvenientalsointhatitis
availabletwenty-fourhoursaday.
vii.InternationalMarket:TheInternetenablesyoutobuy
anythingyouneedfromthecomfortofyourownhouse.
Manysupermarketstakeonlineordersanddeliverthestock
withinthedayatyourdoorstep.Manyconsumerstoresoffer
onlinepurchasesaboutalmostanythingyoucanimagine
(shoes,clothes,apparel,accessories).Onlineshoppingcan
saveyoutimeandmoneysinceitoffersawiderangeof
specialsinmuchcheaperpricesthanwhatyouwillfindinthe
actualstores.

BENEFITS OF INTERNET
[email protected]
67
ThefollowingarethebenefitsofInternet:
i.TheInternet(R)Evolution:Theavailablematerial,programs,
websitesandotherservicesoftheinternetaremultipliedevery
day,revolutionizingthetechnologybeingused.Themost
importantaspectoftheInternetevolutionhowever,isthatits
exponentialgrowthallowsittoeaseandtransformpeople’slife
andincreasetheirknowledge.
ii.ThePreciousnessofTime:TheappearanceoftheInternetsaving
mattercameasalifesaverformanytasksthatwouldtakedaysto
completebefore.Theabilityoftheinternettostorematerials,its
abilitytocalculateinstantlyalmostanything,anditsworldwide
applicationdatabaseshadmadetasksmucheasierandlesstime
consuminginalmosteveryindustryontheplanet.

CONT..
[email protected]
68
iii.TheUnemploymentAgent:Anotherbenefitthattheinternethas
broughtintoourlivesisthateversincetheinternethasbeen
introduced,newareasofjobsandcareershaveopeneduptothe
public.Webdesigning,computertechnicianandprogrammer,are
amongthemanythatarefoundattheirpeakdemandfor
employers.Almosteverycompanynowadays,needstohavea
websitethatpromotesitsproductsandpatentsthatweb
designersareamongthemosthighlyrequestedprofessionals
needed.Furthermore,consultants,sellers,dealersandallsortsof
professionalsareneededtopromoteandhelppeopleoverthe
internet.Housewives,mothersanddisabledpeople,cannow
haveachancetoworkfromtheirhouseandearnmoneythat
wouldotherwisebedifficulttoobtain.

CONT..
[email protected]
69
iv.TheTreasureBank:Thebiggestbenefitoftheinternetcanbe
foundintheeducationalsector.Educatorscanobtainlearning
materialfromit,preparecoursesonlineanddeliveraudio/visual
informationtostudents.Forinstructorsitisavaluablesourcefor
referencingmaterialandenhancingtheknowledgeoftheir
students.TheInternetprovidesagreatplaceforconferencingand
collaboratingwithstudentsfromallovertheworld.Studentscan
searchforinformationregardingtheirschoolcoursesvia
electroniclibrarieswhoofferagreatvarietyofjournalsand
scientificarticles.Theresourcesavailableoverthenetcover
almosteveryaspectoftheschoolcurriculumandstudentshavea
valuablemachineforenhancingtheirknowledgeandexpanding
theirassignedwork.

CONT..
[email protected]
70
OtherBenefits
ThefollowingareotherbenefitsofInternet:
i.Youcancreateawebsiteontheinternetforyourselforyour
business.
ii.Youcansearchforinformationonanytopicdealingwith
humanityandnature.
iii.Youcancarryoutresearchproject.
iv.Youcanapplyforadmission,scholarshiporemploymentwith
anyinstitutionthatishookedtotheinternetinanypartofthe
world.
v.Youcancarryoutbusinesstransactionswithanycompanythatis
hookedtotheinternet.Youcanalsoadvertiseyourbusiness.
vi.Youcanchooseormakefriendsfromanypartoftheworld.
vii.Youcanplaygames,watchlatestfilmsandmusicalvideos.

ADVANTAGES OF INTERNET
RESOURCES
[email protected]
71
TheInternetresourceshaveenormousadvantagesandbeloware
someoftheadvantagesoftheresources.
i.WiththeINTERNET,communicationhasbecomecheaperand
quicker.ForexampletosendalettertotheUSfromNigeria,takes
twoweeksandtoreceivealetterfromthatend,alsotakesanother
twoweeksandatdifferentpricesdependingonthemethodused
insendingthemail.Today,withtheINTERNET,ittakesjust
minutesifnotseconds,tosendandreceiveamailandatan
affordableprice.
ii.Productsandservicesadvertisementisnowcheaperand
affordablewiththeadventoftheINTERNET.Whatyoupayfor
advertisementandpublicityontheINTENETisnotonlycheaper
butalsotheadvertandpublicitycarriedontheINTERNET,
reachesalargeaudiencethanadvertsandpublicitycarriedby
newspaper,radioandtelevisionstations.

CONT..
[email protected]
72
iii.NowwiththeINTERNET,peopledon’tconsiderhowfaraway
otherpeoplearefromthemanylonger.Thisisbecausethe
INTERNEThasclosedthedistancebetweenpeopleofdifferent
continentsoftheworldandthusmakingtheentireworldaglobal
village.
iv.WiththeINTERNET,tradeandcommerceallovertheworldhas
enteredaboomingera.WiththeINTERNET,importandexport
proceduresaremadeeasyasthingslikeProformaInvoice,Billof
lading,PricelistandFundstransfercannowbeprovided
electronicallyontheINTERNET.
v.WiththeINTERNET,youcanhaveaccesstoinformationwhose
sourceyoudon’tknow.Withthehelpofaspecialtool(search
engine),theINTERNETwillcheckitselectronicdirectoryand
displaythesources,locationsoraddressesfromwhereyoucan
getwhatyouwant.

CONT..
[email protected]
73
vi.WiththeINTERNET,bettereducationandtrainingforeverybody
acrosstheglobeisguaranteed.Forexample,anexpertcantraina
numberofparticipantsonhowtousethecomputerattheir
differentlocationsoncetheyarelinkedtotheINTERNET.
Lecturesandteacherscannowhaveaccesstoeducational
materialseasilyontheINTERNET.

DISADVANTAGES OF USING THE
INTERNET
[email protected]
74
TheadvantagesinusingtheInternetdefinitelyoutweighthe
disadvantages.Herearesomedisadvantagesinherentintheuseofthe
INTERNET:
i.OntheINTERNET,youcanaccessanddownloaddataand
programfilesfromaremotecomputer.Thefilessocopied,if
infestedwithcomputervirusesmaydestroywhatyouhaveon
yourcomputer.Ensurethatyouhaveanti-virussoftwareinstalled
onyourcomputerbeforeyouattempttodownloadprogramand
datafilesfromtheInternetontoyoursystem.
ii.AlotofunwholesomethingsexistontheINTERNET.The
availabilityofcomputerphonographicmaterialsonthe
INTERNETisoneoftheunwholesomethings.

CONT..
[email protected]
75
iii.OnceauserunderstandshowtosurftheINTERNETefficiently,it
becomesanaddictiveactivityandonceitbecomesaddictive,
otheractivitiesoftheuserwillstarttosuffer.
iv.YourprivacycouldbeinfringedonasanINTERNETuser.An
unauthorizedpersonforexample,couldreadyourmail.

[email protected]
76
INTERNET
ETHICS AND RULES

INTERNET ETHICS AND RULES
[email protected]
77
Ethicsareasetofmoralprinciplesthatgovernanindividualoragroup
onwhatisacceptablebehaviourwhileusingacomputer.Computer
ethicsisasetofmoralprinciplesthatgoverntheusageofcomputers.One
ofthecommonissuesofcomputerethicsisviolationofcopyrightissues.
Duplicatingcopyrightedcontentwithouttheauthor’sapproval,accessing
personalinformationofothersaresomeoftheexamplesthatviolate
ethicalprinciples.
INTERNETETHICS
Internetethicsmeansacceptablebehaviourforusinginternet.Weshould
behonest,respecttherightsandpropertyofothersontheinternet.The
followingaretheInternetethics:
i.Acceptance:OnehastoacceptthatInternetisnotavaluefree-zone
.ItmeansWorldWideWebisaplacewherevaluesareconsideredin
thebroadestsensesowemusttakecarewhileshapingcontentand
servicesandweshouldrecognizethatinternetisnotapartfrom
universalsocietybutitisaprimarycomponentofit.

CONT..
[email protected]
78
ii.SensitivitytoNationalandLocalcultures:Itbelongstoalland
thereisnobarrierofnationalandlocalcultures.Itcannotbe
subjecttoonesetofvalueslikethelocalTVchannelorthelocal
newspaperWehavetoaccommodatemultiplicityofusage.
iii.Whileusinge-Mailandchatting:Internetmustbeusedfor
communicationwithfamilyandfriends.Avoidchattingwith
strangersandforwardinge-mailsfromunknownpeople
/strangers.Andwemustteachchildrenaboutrisksinvolvedin
chattingandforwardinge-mailstostrangers.
iv.Pretendingtobesomeoneelse:Wemustnotuseinternettofool
othersbypretendingtobesomeoneelse.Hidingourownidentity
tofoolothersintheInternetworldisacrimeandmayalsobea
risktoothers.It’sourresponsibilitytoteachchildrenthesame.

CONT..
[email protected]
79
v.AvoidBadlanguage:Wemustnotuserudeorbadlanguage
whileusinge-Mail,chatting,bloggingandsocialnetworking,We
needtorespecttheirviewsandshouldnotcriticizeanyoneonthe
internetandthesameshouldbetaughttochildren.
vi.Hidepersonalinformation:Weshouldteachchildrennottogive
personaldetailslikehomeaddress,phonenumbers,interests,
passwords.Nophotographsshouldbesenttostrangersandthey
shouldbeaskedtohidetheirpersonaldetailsfromstrangers
becauseitmightbemisusedandsharedwithotherswithouttheir
knowledge.
vii.WhileDownloading:Internetisusedtolistenandlearnabout
music.ItisalsousedtowatchvideosandplaygamesWemust
notuseittodownloadthemorsharecopyrightedmaterial.The
sameshouldbetaughttochildren,andtheymustbeawareofthe
importanceofcopyrightsandissuesofcopyright.

CONT..
[email protected]
80
viii.Supervision:Youshouldknowwhatchildrenaredoingonthe
internetandthesitestheyvisitontheinternetandshouldcheck
withwhomtheyarecommunicating.Restrictthembrowsing
inappropriatesites.Parentalinvolvementisessentialwhenachild
isusingtheinternetinordertomakehimfollowtherules.
ix.EncouragechildrentouseInternet:Wemustencouragechildren,
studentsandotherstogaintheknowledgefromtheinternetand
useitwisely.Internetisagreattoolwherewecangather
informationwhichcanbeusedforlearning.
x.AccesstoInternet:Theinternetisatime-efficienttoolfor
everyonethatenlargesthepossibilitiesforcurriculumgrowth.
Internetisausefultoolfordevelopingtheskillsofdistinguishing
factfromopinionandexploringsubjectivityandobjectivity.

CONT..
[email protected]
81
OTHERETHICALRULESFORCOMPUTER USERS
Someoftherulesthatindividualsshouldfollowwhileusinga
computerarelistedbelow:
i.Donotusecomputerstoharmotherusers.
ii.Donotusecomputerstostealothersinformation.
iii.Donotaccessfileswithoutthepermissionoftheowner.
iv.Donotcopycopyrightedsoftwarewithouttheauthor’s
permission.
v.Alwaysrespectcopyrightlawsandpolicies.
vi.Respecttheprivacyofothers,justasyouexpectthesamefrom
others.
vii.Donotuseotheruser'scomputerresourceswithouttheir
permission.
viii.UseInternetethically.

CONT..
[email protected]
82
ix.Complainaboutillegalcommunicationandactivities,iffound,to
Internetservice.
x.Providersandlocallawenforcementauthorities.
xi.UsersareresponsibleforsafeguardingtheirUserIdand
Passwords.Theyshouldnotwritethemonpaperoranywhere
elseforremembrance.
xii.Usersshouldnotintentionallyusethecomputerstoretrieveor
modifytheinformationofothers,whichmayincludepassword
information,files,etc..

[email protected]
83
NAVIGATING THE WEBSITE

NAVIGATING THE WEBSITE
[email protected]
84
ToopenaWebsite,yourequiretheWebsiteaddress.AWebsite
addressuniquelyidentifiesaWebsite.E.g.,theaddressofthe
Microsoftsiteiswww.microsoft.comorwww.futminna.edu.ng
AWebaddressconsistsofthreeorfourparts:
The1
st
partdepictsthetypeofserviceorprotocolthatyouareusing
ontheInternetsuchashttporftp.

The2
nd
partisthenameofthenetwork,thecompany,orthe
individual,suchasMicrosoftorfutminna

The3
rd
partdepictsthetypeoforganization,suchascommercial
(com),educational(edu),government(gov),andnet(network)

CONT..
[email protected]
85
ToviewinformationontheInternet,
youneedtofirstopenaWebsite
WhenyouloadaWebsite,thehomepageisloadedfirst.E.g.,the
homepageaddressforMicrosoftishttp://www.microsoft.comor
http://www.futminna.edu.ng
SomeWebaddressesmaycontainthefourthpart,whichdepicts
thecountryname,suchasuk(UnitedKingdom)orng(Nigeria)
TheaddressofaWebsiteiscalleditsURL(UniformResource
Locator)
Ahyperlinkenablesyoutonavigateto:
i.Differentlocationinthesamepage.
ii.DifferentpagewithinthesameWebsite
iii.PageofadifferentWebsite

CONT..
[email protected]
86
Youcannavigatetotheotherpagesonthesitethroughlinksonthe
homepage,whicharealsoknownashyperlinks:
i.Ahyperlinkisasynonymforbothlinkandhypertextlink.
ii.Thesearegraphics,words,orphrasesonWebpagesthatyouclick
tonavigatefromone.
YoucannavigatefromaWebpagetoanotheroronesitetoanother
NotethatTexthyperlinksareunderlinedandusuallyappearinblue
color.
Whenyouclickahyperlink,youcannavigateto:
i.Differentlocationinthesamepage.
ii.DifferentpagewithinthesameWebsite.
iii.PageofadifferentWebsite
Inaddition,ahyperlinkenablesyoutodownloadafile,launchan
application,viewavideofile,orlistentoanaudiofile

[email protected]
87
RISKS OF THE INTERNET USE

RISKS OF THE INTERNET USE
[email protected]
88
ThefollowingarethepotentialhazardsofInternetifnotmaintained:
I.Viruses,AdWaresandSpywares
a.Viruses:Virusesareprogramsthathavethecapacitytocopy
themselvesandinfectcomputerswithouttheknowledgeofthe
user.Virusestransfertoanuninfectedcomputerthroughemails,
instantmessagingprograms,andwebsitesorfilesharing.Another
riskofonlineusecanbefoundinemails.Scamemailsareemails
thatsomeonesendsintentionally,withthepurposeofdeceiving
peopleandextractfromthemimportantinformationregarding
theirbankaccountsandpasswords.Virusescansometimes
damagethecomputer.Theycaninsertthemselvesontothe
computerprogramsanddeletethem,crashthecomputeror
formatit.

CONT..
[email protected]
89
Otherformsofvirusescanbelessthreateningbutcanstillcreate
problemstotheusersincetheycanappeartoshowmessages
everynowandthencanusecomputermemoryandfreezethe
computerandgenerallycreateproblemsthatwouldmakethe
userunabletoworkproperlyonthecomputer.
b.Ad Wares:Ad wares are small programs that can be downloaded
through several other programs and websites that collect data
from a person’s computer with purposes of advertising and
researching.
c.Spywares:Spywares are some other form of programs that insert
themselves on the computer and monitor the usage and take up
computer memory resulting in lowering the normal performance
of the computer.

CONT..
[email protected]
90
II.ScamE-Mails:Theseemailscanbeverydangerous.Mostofthe
sendersmakethemappearascomingfromonesbankorfroma
legitimatesourceandaskforpersonalinformation,pinnumbers,
passwordswiththepurposeoftakingmoneyoffpeople’s
accounts.Otheremailspresentthemselvesintheformofwinning
somekindoflotteryandtakeyouthroughaprocesstoreceive
yourprice.Eventually,thesepeopleenduptakingalotofmoney
fromyouforarrangingtogiveyouthebigprizeandyouendup
withnothingbutloss.Scamemailsarearealthreatforinternet
usersandoneshouldbereallycarefulwiththeemailshe/she
accepts.
III.TheInvisibleEnemy:Despiteemaildeception,humandeception
isalsopossibleoverthenetandespeciallyamongyoungsters
throughthesocialnetworkingsitesandthemIRC.Social
networkingsitesandthemIRCarethenumberonecauseof
losinganonymityandhumandeception.

CONT..
[email protected]
91
=Onsocialnetworkingsitesontheonehand,peopleusetheir
picturesandcreateaprofileofthem.Somepeoplearebeing
honest,andmayreallybelookingforsomeoneinterestingto
meet,butotherscanprovidefakeinformationdeceivingpeople
andsometimesevenseducingthem.Peopleonthesesitesand
onmIRCmaynotbetheonestheyarepresentingthemselvesto
be,andmaybecriminalsthatareouttherelookingforvictims.
Mostofthetimeshowever,deceivers,arepeoplewhodonot
feelcomfortableaboutthemselvesandpresenttheirprofileas
theywishedtheywere.Eventually,whenonegetstomeetthese
people,especiallywhenfacelessloveisinvolved,peoplemight
getseriouslyhurtandaffectedbythewholestory.
Socialnetworkingsitesallowforphotosoftheirmemberstobe
uploaded,andforthosewhoputrealphotos,anonymityis
gone.Fromtheminutethesephotosareuploadedontheweb,
anyonecantakethemandusethemineverywaytheymaylike.

CONT..
[email protected]
92
iv.TheCrime:Theinternetcrimehasbecomeamajorissuefromthe
mediasincemanypeopleareseentousechildpornographyover
theinternet.Youngstersareusuallyuncontrolledinviewingthese
sexuallyexplicitandillegalmaterials.
Themostseriousformofriskonecanfaceontheinternetiscrime.
Internetcrimehasbeenportrayedthroughtheinternetmany
times.Childpornographyandpedophiliaaretheharshest
formsofinternetcrime.Mentallydisturbedindividualsareseen
toabusechildrenandtakepicturesandvideoswiththemand
publishingthemontheinternet.
Theanonymitythatmostofthetimestheinternetbrings,makeit
reallyhardtounderstandwhennewpersontomeethas
somethinglikethisinmind.Childpornographyandpedophilia
areconsideredseriouscrimesandarebeingdealtfromthe
policewithseverepunishment.

CONT..
[email protected]
93
=Themediahasplayedanimportantroleinalertingparentsabout
thisdangerousrisk,andhelpedparentsintakingseriouslythe
needforcontrolofchildren’sonlineactivities.
v.InternetHealthHazard
Excessiveuseoftheinternetcanbecomeaddictiveandcausemental
healthproblemsaswellasphysicalones.Unfortunately,ithasbeen
shownthattheinternetcanbecomeaformofaddiction.Excessive
usageoftheinternetcanresultinproblemssuchasheadachesand
boneaches.Anexcessiveuseoftheinternetcanseriouslyaffecta
person’smentalhealthbydeprivinghim/herfromhavinganormal
socialcycleoffriendsandbymakingthemnotwantingtogooutand
havesomeexerciseandfun.Apersoncanbecomeanti-socialand
depressedandcanbeseriouslydeprivedofitscapacitytolivelife
properly.Justlikeeverythinginlife,theinternetneedstobeusedonly
foracertainamountoftimeeveryday,toallowpeoplenotto
overload.

[email protected]
94
SUMMARY

SUMMARY
[email protected]
95
InternetisaGlobalnetworkofcomputerswhichmaybeserveror
clientthatexchangesinformation.
Itcanbedefinedasa"networkofnetworks"whichcanbelinked
throughcopperwires,wirelessconnections,andothertechnologies.
Thisistheworld-widenetworkofcomputersaccessibletoanyone
whoknowstheirInternetProtocol(IP)address.
TheInternetisaworldwidesystemofcomputernetworks.
Userscanobtaininformationaboutanysubjectortopicby
connectingtotheInternet.
Thenetworkformedbytheco-operativeinterconnectionofalarge
numberofcomputernetworks.
InternetisaNetworkofNetworks
NooneownstheInternet
EverypersonwhomakesaconnectionownsasliceoftheInternet.
ThereisnocentraladministrationoftheInternet.

SUMMARY
[email protected]
96
TheInternetwasfirstknownasARPANETandwasstartedbythe
U.S.governmentin1969-AdvancedResearchProjectsAgency
(ARPA)
TheWorldWideWeb(WWW)alsocalledtheWebisasubsetofthe
Internet.
TheWebisaseriesofinterconnectedserversthatsupportspecially
formatteddocuments.
TheInternetisusedtodayindiversefield-business,entertainment,
education,communication,medicine,defence,engineering,and
sports.
TheWWWalsocalledtheWebisasubsetoftheInternet.
TheInternetandtheWorldWideWebareoftenused
synonymouslybuttheyaredifferent.
Electronicmail(e-mail)exchangesofmessagesbetweentwo
computersbytelecommunicationisknownase-mail

SUMMARY
[email protected]
97
E-mailwasoneofthefirstservicesthatwereusedfor
communicatingovertheInternet.
E-mailmessagescancontaintext,graphics,oracombinationof
both.
ThereareanumberofWebsitesontheInternetthatprovidefreee-
mailservices-Gmail,HotmailandYahoo.
Theuserisaskedtoregisteratthesiteandane-mailaccountis
createdfortheuser.
Ane-mailaddressisalsoallocatedtotheuser.
Usingthee-mailaccountyoucanaccessyoure-mailfromanywhere
intheworld

COMMON INTERNET SERVICES
AND WHEN TO USE THEM
[email protected]
98
WebTerminologyTo Use
GetafilefromanothercomputerontheInternet FTP
SendafiletoanothercomputerontheInternet FTP
Viewfilesinadirectoryinacomputeronanother
network
Telnet
CorrespondwithaparticularpersonontheInternet E-mail
Correspondwithagroupofpeopleinterestedinasimilar
topic
Newsgroups
ViewdocumentsontheInternet WorldWideWeb
SearchforinformationontheInternet SearchEngine

[email protected]
99
WEEK FOUR: EXTRANET

INTRANET
[email protected]
100
WhatisIntranet?
ThetermIntranetisderivedfromtwowords:‘Intra’whichmeans
withinand‘net’whichmeansgroupofinterconnectedcomputers.Itis
aprivatecomputernetworkthatusesInternetprotocolsandnetwork
connectivitytosecurelyshareanypartofanorganization's
informationoroperationalsystemswithitsemployees.Inshort,an
intranetisprivatenetwork,similartotheInternetandusingthe
Internet.
AprivateTCP/IPinternetworkwithinanorganizationthatuses
InternettechnologiessuchasWebserversandWebbrowsersfor
sharinginformationandcollaborating.Intranetscanbeusedto
publishcompanypoliciesandnewsletters,providesalesand
marketingstaffwithproductinformation,providetechnicalsupport
andtutorials,andjustaboutanythingelseyoucanthinkofthatfits
withinthestandardWebserver/Webbrowserenvironment.

CONT..
[email protected]
101
IntranetWebserversdifferfrompublicWebserversinthatthepublic
musthavetheproperpermissionsandpasswordstoaccessthe
intranetofanorganization.Intranetsaredesignedtopermitusers
whohaveaccessprivilegestotheinternalLANoftheorganization.
Withinanintranet,Webserversareinstalledinthenetwork.
Browsertechnologyisusedasthecommonfrontendtoaccess
informationonserverssuchasfinancial,graphical,ortext-baseddata.

CHARACTERISTICS OF
INTRANET
[email protected]
102
i.Itdeliverscollaborationandcoordinationtoemployeesaround
theclock.Communicationsystemdesignedbytechnicalstaff.
ii.Focusisthemessage,notthemedia.
iii.Normallyrunsinaclient/serverenvironmentandalocalarea
networkconfiguration.
iv.Separatedfromothernetworksbyfirewalls,ameansof
preventingunauthorizedaccesstothecompany’sinternaldataor
leaksofsensitivecompanyinformation.
v.InternalcompanynetworkthatusesInternetstandards(HTML,
HTTP&TCP/IPprotocols)&software.
vi.Accessedonlybyauthorizedpersons,especiallymembersor
employeesoftheorganization
vii.Intranet=Network+InformationResource+InformationServices

INTRANET SECURITY
[email protected]
103
TwolevelsofSecurityrequired:
i.InternalSecurity:ItcanbeimposedbyPublicKeySecurity&
EncryptionKey.
ii.ExternalSecurity:ThroughFirewall.

WHAT IS FIREWALL?
[email protected]
104
i.Securitydevicelocated
betweenfirm’sinternal
network(intranet)&external
network(internet).
ii.Regulatesaccessinto&outof
acompany’snetworkbased
onasetofrules.
Note:Needstobeupgraded
fromtimetotimetochecklatest
potentialsecurityproblems.

ACCESS TO INTRANET
[email protected]
105
ThefollowingarethewayofaccessingIntranet:
(i)Employeetelephonedirectory
(ii)Humanresourcepolicies
(iii)Supportinformationand
(iv)Knowledgebase

REASONS FOR USING INTRANET
[email protected]
106
The following are the major reasons for using Intranet:
Employee productivity
Cost saving
Knowledge management
E-commerce
Customer management
improvements

STRATEGIC SIGNIFICANCE OF
INTRANET
[email protected]
107
The following are strategic significance of Intranet:
i.A cost-effective way of distributing information throughout an
organization.
ii.Links employees and managers around the clock and automates a
lot of intraorganizationaltraffic.
iii.Makes it possible for a company to gain better access to its primary
resource -the knowledge and experience of decision makers.
iv.Enables easier integration of processes

VIRTUAL PRIVATE NETWORK
[email protected]
108

APPLICATIONS OF INTRANET
[email protected]
109
The following are the applications of Intranet:
Sharing of company policies/rules & regulations
Sharing of information of common interest
Access product & customer data
Launching of personal/departmental home pages
Submission of reports
Corporate telephone directories

BENEFITS OF INTRANETS
[email protected]
110
i.Workforceproductivity:Intranetscanhelpuserstolocateandview
informationfasteranduseapp.relevanttotheirrolesand
responsibilities.Withthehelpofawebbrowserinterface,userscan
accessdataheldinanydatabasetheorganizationwantstomake
available,anytimeand-subjecttosecurityprovisions–from
anywherewithinthecompanyworkstations,increasingemployees'
abilitytoperformtheirjobsfaster,moreaccurately,andwith
confidencethattheyhavetherightinformation.Italsohelpsto
improvetheservicesprovidedtotheusers.
ii.Communication:Intranetscanserveaspowerfultoolsfor
communicationwithinanorganization,verticallyandhorizontally.
Fromacommunicationsstandpoint,intranetsareusefulto
communicatestrategicinitiativesthathaveaglobalreach
throughouttheorganization.

CONT..
[email protected]
111
=Thetypeofinformationthatcaneasilybeconveyedisthe
purposeoftheinitiativeandwhattheinitiativeisaimingto
achieve,whoisdrivingtheinitiative,resultsachievedtodate,and
whotospeaktoformoreinformation.Byprovidingthis
informationontheintranet,staffhastheopportunitytokeepup-
to-datewiththestrategicfocusoftheorganization.
iii.Cost-effective:MostorganizationshavealreadyestablishedTCP/IP
networks,andtheincrementalinfrastructurecostofaddingWeb
serverstothenetworkiswellwithineven.
iv.Lowmaintenance:Withinformationresidinginonlyoneplace-the
Webserver-itisrelativelyeasyandaffordabletoaddnew
informationortoupdateexistinginformationandmakeitinstantly
available.

ADVANTAGES OF INTRANET
[email protected]
112
The following are the advantages Intranet:
i.Fast, easy, low-cost to implement
ii.Based on open standards.
iii.Connectivity with other systems.
iv.Easy to learn and use.
v.Hypertext links.
vi.Access to internal and external information.
vii.Improves communication

DISADVANTAGES OF INTRANET
[email protected]
113
The following are the advantages Intranet:
Management
problem
Fearofsharinginformationandthelossof
control
Limitedbandwidthforthebusiness
Security
problem
Unauthorizedaccess
Abuseofaccess
Denialofservice
Productivity
problem
Informationoverloadlowersproductivity
Hiddenorunknowncomplexityandcosts

SIMILARITIES BETWEEN INTERNET
AND INTRANET
[email protected]
114
ThefollowingarethesimilaritiesbetweenInternetandIntranet:
i.IntranetusestheinternetprotocolssuchasTCP/IPandFTP.
ii.Intranetsitesareaccessibleviathewebbrowserinasimilarwayas
websitesintheinternet.However,onlymembersofIntranet
networkcanaccessintranethostedsites.
iii.InIntranet,owninstantmessengerscanbeusedassimilartoyahoo
messenger/gtalkovertheinternet.

DIFFERENCES BETWEEN INTERNET
AND INTRANET
[email protected]
115
ThefollowingarethedifferencebetweenInternetandIntranet:
i.InternetisgeneraltoPCsallovertheworldwhereasIntranetis
specifictofewPCs.
ii.Internetprovidesawiderandbetteraccesstowebsitestoalarge
population,whereasIntranetisrestricted.
iii.InternetisnotassafeasIntranet.Intranetcanbesafelyprivatized
aspertheneed.

DIFFERENCE BETWEEN INTERNET
AND INTRANET
[email protected]
116
S/No Internet Intranet
1Internetiswidenetworkof
computersandisopenforall.
Intranetisalsoanetworkof
computersdesignedfora
specificgroupofusers.
2Internet itself contains a large
number of intranets.
Intranet can be accessed from
Internet but with restrictions.
3The number of users who use
internet is Unlimited.
The number of users is
limited.
4The Visitors traffic is unlimited.Thetrafficallowedisalso
limited.
5Internetcontainsdifferent
sourceofinformationandis
availableforall.
Intranet contains only
specific group information.

CONT..
[email protected]
117
Therefore the Internet is an open, public space, while an intranet is
designed to be a private space. An intranet may be accessible from the
Internet, but it is protected by a password and accessible only to
authorized users.

[email protected]
118
WEEK THREE: INTRANET

EXTRANET
[email protected]
119
Extranetisanintranetforoutsideauthorizedusersusingsame
internettechnologies.Theoutsideusersaretrustedpartnersofthe
organizationwhohaveaccesstoinformationoftheirinterest&
concern.Itistheextendtheintranetconcepttoprovideanetwork
thatconnectsacompany’snetworktothenetworksofitsbusiness
partners,selectedcustomers,orsuppliers.
ExtranetsrefertoapplicationsandservicesthatareIntranetbased,
anduseextended,secureaccesstoexternalusersorenterprises.This
accessisusuallyaccomplishedthroughpasswords,userIDs,and
otherapplicationlevelsecurity.
What is Extranet?

CONT..
[email protected]
120
Anextranetistheextensionoftwoormoreintranetstrategieswith
asecureinteractionbetweenparticipantenterprisesandtheir
respectiveintranets.PartofaCompany'sIntranetthatisextended
tousersoutsidethecompany(eg.NormallyovertheInternet).Inits
simplestform,aprivateTCP/IPnetworkthatsecurelyshares
informationusingHypertextTransferProtocol(HTTP)andother
Internetprotocolswithbusinesspartnerssuchasvendors,
suppliers,andwholesalecustomers.
Anextranetisthusacorporateintranetthatisexposedoverthe
Internettocertainspecificgroupsthatneedaccesstoit.Extranets
builtinthisfashionfollowtheclient/serverparadigm,withWeb
serverssuchasApache.

CONT..
[email protected]
121
Extranetsareapowerfultoolbecausetheyletbusinessesshare
resourcesontheirownprivatenetworksovertheInternetwith
suppliers,vendors,businesspartners,orcustomers.Extranetsare
typicallyusedforsupportingreal-timesupplychains,forenabling
businesspartnerstoworktogether,ortoshareinformationsuchas
catalogswithcustomers.Thepoweroftheextranetisthatitleverages
theexistingtechnologyoftheInternettoincreasethepower,flexibility,
andcompetitivenessofbusinessesutilizingwell-knownandeasilyused
toolssuchasWebserversandWebbrowsers.Extranetsalsosave
companiesmoneybyallowingthemtoestablishbusiness-tobusiness
connectivityovertheInternetinsteadofusingexpensive,dedicated
leasedlines.Extranetscanalsosavemoneybyreducingphoneandfax
costs.

FEATURES OF EXTRANET
[email protected]
122
ThefollowingarethefeaturesofExtranet:
i.ExtranetisanIntranetforoutsideauthorizedusersusingsame
internettechnology.
ii.Inter-organizationalinformationsystem.
iii.Enableoutsiderstoworktogetherwithcompany’semployees.
iv.Opentoselectedsuppliers,customers&otherbusinesspartners.
v.Examples:Dealers/distributorshaveaccesstoproductfilessuchas:
a)productspecification,
b)pictures,
c)images,etc.toanswerthequeriesofthecustomer.

COMPONENTS OF EXTRANETS
[email protected]
123
Some basic
infrastructure
componentssuchas
the internet
Including:-
i.TCP/IPprotocols,
ii.E-mail,
iii.Web-browsers,
iv.Externalbusiness
partners&
v.Tele-commuting
employeesplace
order,checkstatus
&sendE-mail.

ACCESS TO EXTRANET
124
The following are methods of accessing Extranet:
Need to rapidly adapt to change
Distribute information
Improve existing information delivery techniques
Supporting major strategic initiative

BENEFITS OF EXTRANET
[email protected]
125
Thefollowingarethebenefitsofextranet:
i.Improvedquality.
ii.Lowertravelcosts.
iii.Loweradministrative&otheroverheadcosts.
iv.Reductioninpaperwork.
v.Deliveryofaccurateinformationontime.
vi.Improvedcustomerservice.
vii.Bettercommunication.
viii.Overallimprovementinbusinesseffectiveness.

DISADVANTAGES
[email protected]
126
The following are the disadvantages of Extranet:
i.The suppliers & customer who don’t have technical knowledge feel
problem.
ii.Faceless contact.
iii.Information can be misused by other competitors.
iv.Fraud may be possible.
v.Technical Employees are required.

HOW IT IS DIFFERENT FROM
INTRANETS
[email protected]
127
Intranetsdifferfromextranetinthattheformeraregenerallyrestricted
toemployeesoftheorganizationwhileextranetsmayalsobeaccessed
bycustomers,suppliers,orotherapprovedparties.Extranetsextenda
privatenetworkontotheInternetwithspecialprovisionsforaccess,
authorizationandauthentication.

TYPES OF EXTRANET
[email protected]
128
ThefollowingarethetypesofExtranet:
i.PublicNetworkExtranet
Thisexistswhenanorganizationallowsthepublictoaccessitsintranet
fromanypublicnetwork.Securityisanissueinthisconfiguration,
becauseapublicnetworkdoesnotprovideanysecurityprotection.
ii.PrivateNetworkExtranet
isaprivate,leased-lineconnectionbet.Twocompaniesthatphysically
connectstheirintranetstooneanother.Thesingleadvantageofthisis
Security.ThesinglelargestdrawbackisCost.
iii.VirtualPrivateNetwork(VPN)
Itisanetworkthatusespublicnetworksandtheirprotocolstosend
sensitivedatatopartners,customers,suppliers,andemployeesby
usingsystemcalled.

APPLICATIONS OF EXTRANET
[email protected]
129
ThefollowingaretheapplicationsofExtranet:
Technology Applications
SecureElectronicMail B2BCommunication
BulletinBoard Subjectreview&responsevehicle,FAQ
InstantMessaging Sales&CustomerSupport
DocumentRepository Knowledgemanagement&Customer
support
FTP Customersupport,salessupportsoftware
development
MaillistServer Broadcashofchanges&notification
Calendar Scheduling
Dataconferencing&chatElectronicMeetings

[email protected]
130
WEEK FIVE:
INTERNET TERMINOLOGIES

INTERNET TERMINOLOGIES
[email protected]
131
Theonlinerevolutionhasseentheintroductionofmanynewterms
andphrasestooursharedvocabularies.Whilesomeoftheseare
self-explanatory,manycanbesomewhatobscureifyouare
unfamiliarwiththemorthecontextinwhichthey'reused.The
followingglossaryincludesmanycommoninternettermsalong
withabriefdefinitionandlinkstofurtherreading.Thefollowing
aresomeInternetTerminologies:
Modem:Amodemisasmalldeviceconnectedtoacomputerof
installedinsideit,whichconvertsthedigitalsignalsfromyour
computerintoaformthatcanbesentdownatelephoneline.
Internetserviceprovider:AnISPisacompanythatsellsyoua
connectiontotheinternet.
INTRODUCTION

CONT..
[email protected]
132
WWW(World WideWeb):Theworldwideweborthewebmakes
lookingroundtheinterneteasy.Thewebconsistsofscreens,each
screeniscalledapage,eachpagecontainswords,picturesand
sometimesanimationandallkindsofsoundandmusic.Inother
word,TheWorldWideWebconsistsofallthepublicWebsites
connectedtotheInternetworldwide,includingtheclientdevices
(suchascomputersandcellphones)thataccessWebcontent.The
WWWisjustoneofmanyapplicationsoftheInternetandcomputer
networks.
Web:TheWebisaseriesofinterconnectedserversthatsupport
speciallyformatteddocument.Thismeansyoucanswitchfromone
documenttoanotherjustbyclickingonmarkedtext.
Server:Aserverisaprogramoracomputerthatrespondsto
requestsfromotherprogramsanddeliverstherequesteddocuments.
Itisasoftwareprogramsetupforservingwebpagestoauseronthe
samecomputeroranothercomputer.

CONT..
[email protected]
133
WebServer:ThisisaprogramthatrespondstorequestsfromWeb
browserstoretrieveresources.Itisalsousedtorefertothecomputer
thatrunstheserverprogram.
WebSite:Thisisacollectionofrelatedfiles.EachWebsitecontainsa
homepage,whichisthefirstdocumentthatisdisplayedonthe
browser.Asitemightalsocontainadditionaldocumentsandfiles.Asite
isownedandmanagedbyanindividual,companyororganization.
WebBrowser:thisisthesoftwareprogrammethatallowsyouhave
accesstotheworldwideweb.Itdisplayswebpagesonthecomputer
screenandallowsyoutofollowhotlinks,downloadinformationetc.
Examplesofwebbrowsersare:Microsoftinternetexplorer(partof
Microsoftwindows).Netscapenavigator(partofnetscape
communicatorsuiteofprogrammes),opera,neoplanet,andFirefox-
Mozilla.

CONT..
[email protected]
134
Add-ons-Anadd-on(akaplug-inorextension)isasoftware
applicationthatrunswithinanotherprogramforthepurposeof
changingorenhancingtheprogramsperformance.Mostwebbrowsers
supportavarietyofadd-ons,withsomeofthemorecommonbeing
AdblockPlus,GoogleTranslator,andImagus.
Apps-Shortforapplication,an"app"isaprogramdesignedto
operatewithinamobilesystem.Theycanbeconsidered"add-ons"for
mobiledeviceslikesmartphonesandtablets.Twoofthemostpopular
operatingsystems,Apple'siOSandGoogle'sAndroid,havean
increasinglysizablerosteroffreeandpaidappsavailabletousers.
Archives/Archiving-Archivinginternetdatareferstothecollection
ofinformation,includingfiles,visitnumbersorwebsite"hits,"and
mediafiles.

CONT..
[email protected]
135
Blog-Ablogisawebsiteconsistingofarticles,or"posts,"typically
associatedwithasinglepersonororganization.Blogscanaddressa
widerangeoftopicsfrompoliticstofoodculturetothearts.Theycan
betheworkofasingleauthororagroupofcontributors.
Broadband-Ahighspeedinternetconnectionisknownas
broadband.Therearemanydifferenttypesofbroadband,buttheterm
ismostlyusedtodistinguishfastconnectionstothemuchslowerdial-
upconnections.
HomePage:Thisisthefirsthypertextdocument(inHTML)thatis
displayedwhentheuseropensaWebsite.Itcontainslinkstoother
pagesorothersites.
Host:AcomputerthatisusedtotransferdataontheInternet.
SPAM:itisanunsolicitedcommerciale-mailfoundinyourmailbox.
WebHosting:Tostoreandmakewebpagesavailableandreadyfor
inquiries,oracomputerthathasaconsistentconnectiontotheInternet.

CONT..
[email protected]
136
UniversalResourceLocator(URL):ThisisaWebaddressingscheme
thatspellsouttheexactlocationofanetresourceontheInternet.Most
URLstaketheform:protocol://host.domain/directory/filenamethe
addressofawebsiteiswhatisreferredtoasURL.(UniformResource
Locator).ExampleofaULR.\ishttp://www.clipart.com
DNS(DomainNameSystem):isalargedatabaseofdomainnames
andtheircorrespondentInternet(IPAddresses)forexample:
www.widget.comcorrispondstoit'suniquenumber.
LINK:itisawordorphraseemphasizedinahypertextdocument
thatactsasapointertorelatedinformation.Linksinawebbrowserare
usuallyunderlinedandareindifferentcoloursfromtherestofthetext.
SearchTools:twomainsearchtoolsareusedininternet.Theyare
SearchEnginesandDirectories.Thoughtheyperformthesame
operation,theyarecreateddifferently.

CONT..
[email protected]
137
SearchEngines:thesearchenginesisalotofindexofmillionsof
webpagesandtheiraddresses.Aprogrammecalledrobot,spideror
crawlervisitseverylinkonawebsite,copiesthetextofthepageto
itsindextogetherwithaddressdetails.Thisprocessisdone
frequentlytoupdatetheindex.Whenauserkeysinarequest,the
enginelistpagesthatmatchtherequest.Populationsearchengines
are:Google(developedbyStanfordUniversity),Excite,AltaVista,
KotBotandLycos.
Directories:Adirectorysearchforinformationlikesearchengine.
Thedifferencebetweenitandsearchengineisthatadirectoryis
manuallycompiled,whereasthesearchengineindexiscreatedby
computer.Ifawebdesignersubmitsthedetailsofwebpagetobe
includeinadirectory,ashortdescriptionwillbeadded.Thisis
reviewedbyhumaneditorandexaminesthewebsites.Ifseen
suitable,thedetailsofthewebsitewillbeincludedinthedirectory.
Knowndirectoriesareyahoo!andLookSmart.

CONT..
[email protected]
138
HypertextMarkupLanguage(HTML):isthelanguageinwhichthe
computerizedinstructionsbehindthethingsyouseeonthewebare
written.Inotherwords,Thisistheformattinglanguageusedtopresent
aWebdocument.
http(HypertextTransferProtocol):Thisistheprotocolorsetofrules
usedbywebservers.ItistheprotocolusedontheWebtotransfer
hypertextdocuments.
ICON:itisasmallabstractgraphrepresentationofanobjectiveor
idea.
Upload:Thisreferstosendingafilefromapersonalcomputerto
anothercomputeronthenetwork.
Download:Thisreferstoreceivingafilefromanothercomputeron
thenetworktoapersonalcomputer.
Protocol:Protocolisasetofrulesusedforcommunicationbetween
computers.

CONT..
[email protected]
139
Telnet-Telnet is a user command and TCP/IP protocol that allows
one to remotely access.
Host:A computer that is used to transfer data on the Internet.
Webpage: A webpage is what you see in your browser when you are
on the internet. Think of the webpage as a page in a magazine. You may
see text, photos, images, diagrams, links, advertisements and more on
any page you view.
Web Hosting:To store and make web pages available and ready for
inquiries, or a computer that has a consistent connection to the Internet.
Domain Name:A domain name is a description or representation of a
computer's location on the Internet. It is usually separated by a dot. For
example:
www.comentum.com, sales.comentum.com, joespizza.comentum.com.

CONT..
[email protected]
140
DNS (Domain Name System):is a large database of domain names
and their correspondent Internet (IP Addresses) for example:
www.widget.com corrisponds to it's unique number 207.168.6.12
IP address:An IP (Internet Protocol) address is an unique number
used to identify a computer on the Internet.
Hypertext:Hypertext is text on a webpage that links to another
document or webpage. The hypertext link can be as small as a letter or
word, or as big as all the text on the page.
FTP (File Transfer Protocol):is a method of transferring files between
two computers on the Internet. To access, upload or download
information on a server computer (or a computer that accesses a server
computer), FTP software makes the information access or transfer
possible.

CONT..
[email protected]
141
Router:Arouterorrouter-modemcombinationisthehardware
devicethatactsasthetrafficcopfornetworksignalsarrivingatyour
homeorbusinessfromyourISP.Aroutercanbewiredorwirelessor
both.
HomePage:AhomePageisthemainorindexpageofawebsite.For
example,ifauseropensNetscapeorInternetExplorerandtypesthe
URL,http://www.commentum.com,thatwouldopenthehomePageof
theCommentumCommunicationscompany.
Port:InrelationshiptotheInternet,aPortisachannelthataserver
softwarewouldlistento,foranyinquiries,therearecertainstandard
defaultchannelssetforcertainserversoftware.Forexample,aweb
serversoftwarebydefaultwilllistentoport80foranyinquiry.Web
serversoftwarecanalsolistentoanyotherport,forexample:
http://www.commentum.com:5000

CONT..
[email protected]
142
Baud:Baudisthenumberofthimepersecondthatamedemconverts
digitalsignalstoanalogsounds,sothatitcantransferinformationover
ananalogtelephoneline.
ABit:Bitisasingledigitinthebinarynumberingsystem(base2).For
example:1isabitor0isabit.
AByte:ABytegenerallyconsistsofeightbits.
Firewall:Firewallisagenerictermtodescribeabarrieragainst
destruction.Inthecaseofcomputing,afirewallconsistsofsoftwareor
hardwarethatprotectsyourcomputerfromhackersandviruses.
CSS-CSSisanacronymforCascadingStyleSheets.Itisacomputer
languagethattellsHTMLhowawebpageshouldlook(asopposedto
whatinformationisinit).
Ecommerce-Ecommercereferstothebuyingandsellingofitemson
theinternet.PopularonlineretailersincludeAmazon,Etsy,andEbay.

CONT..
[email protected]
143
Blogs:Thisisamodernonlinewriter'scolumn.Amateurand
professionalwriterspublishblogsonmosteverykindoftopic:their
hobbyinterestsinpaintballandtennis,theiropinionsonhealthcare,
theircommentariesoncelebritygossip,photoblogsoffavorite
picturesortechtipsonusingMicrosoftOffice.Absolutelyanyone
canstartablog.
CloudComputing-Cloudcomputingreferstotheuseofanetwork
ofremoteservershostedontheinternettostore,manage,and
processdata.Cloudcomputingisanalternativetotheestablished
practiceofstoringandprocessingdataonadedicatedserveror
computingmachine.
Download-Downloadingreferstocopyingdatafromonecomputer
systemtoanotherviaacomputernetwork.Ingeneral,itrefersto
copyingafilefromaremoteserverontoauser'slocalmachine.A
downloadcanbeanythingfromatextfiletoafeaturefilm.

CONT..
[email protected]
144
EncryptionandAuthentication-Encryptionandauthentication
helpsensurethatdatatransmittedovertheinternetremainssecure
andprotectedfrompossibleinterception.Authenticationensures
thatbothpartiesarelegitimate,whileencryptionencodesthedatain
suchawaythatitcannotbedecodedbyanunauthorizedthird
party.
Firewall-Afirewallisapieceofsoftwarethatblocksunwanted
trafficacomputerandintranet.Mostmoderncomputerscomewitha
firewallalreadyinstalled,andtherearenumerousthirdparty
firewallapplicationsavailableonline.
Graymail-Graymailreferstounwantedemailmessagesthatdonot
otherwisemeetthecriteriaofspam.Typically,graymailconsistsof
emailsfromentitieswithwhomtheuserhasregisteredorsignedup
forregularemailnotifications.Graymailoftenincludesnewsletters,
mailinglistsandmembershipannouncements,andforumupdates.

CONT..
[email protected]
145
Hashtag-Ahashtag(#)isusedtolabelkeywordsorphrasesina
tweetorothersocialmediamessage.Theuseofthetagconverts
thesekeywordsandphrasesintoactivelinkstoadynamicfeed
whichisupdatedinrealtimetolistallrecentpostcontainingthe
chosenhashtag.Hashtagsaresearchable,makingiteasyforonline
userstofindandmonitortrendingtopics.
Email-Email,sometimeswrittenas"e-mail,"referstoelectronic
messagessentbetweentwoormoreparties.Emailnormallyrequires
theuseofanemailserviceprovidersuchasGmail,Outlook,or
Yahoo.Butsomepeoplesetuptheirownemailservers.
ISP-ISPisthecommonlyusedacronymforInternetService
Provider,acompanythatdeliversinternetaccesstosubscribing
customers.

CONT..
[email protected]
146
Malware-Malwareissoftwarespecificallydesignedtodamageor
disruptacomputersystem.Therearemanydifferenttypesof
malware,butthemostcommonaredesignedtoaccessandcollect
sensitivedataortoforceaccessintoaprotectedcomputersystem.
MetaTag-AmetatagisanHTMLtagthatcontainsspecific
informationaboutawebpage.Metatagstypicallycontainan
abbreviateddescriptionofthepage'ssubjectmatterandother
information.Metatagsareusedbysearchenginestoindexweb
pagesandfilteronlinecontent,anddonotappearintheuser's
browserdisplay.
NetworkPorts-Anetworkportisawayoftellingacomputerwhat
kindofprocessisbeingused.Forexample,port80iscommonlyused
forHTML.Similarly,port21isusedforFTP.

CONT..
[email protected]
147
NetworkRouter-Anetworkrouterconnectstwoormorecomputers
toaninternetconnection,allowingmultipleuserstoaccessthe
internetandmovedatabetweenconnectedcomputingdevices.
P2P-P2Pstandsfor"peer-to-peer."AP2Pnetworkallowstwoor
morecomputerstocommunicatedirectlywithouthavingtousea
routerorothercentralizedserver.
Phishing-Phishingreferstoatypeofonlinescamwherecriminals
poseasrepresentativesoflegitimatebusinessesororganizationsin
ordertoobtainsensitiveuserinformation.Someofthemore
commonphishingscamsinvolvetheimitationofpopularwebsites
(Facebook,Amazon,PayPal,etc)byslightlyalteringthespellingor
structureoftheoriginalsite'swebaddress.Whenauserlandsonthe
falsesite,eitherbyaccidentorviaanembeddedlink,theywillfinda
pagecarefullyconstructedtoresembletheauthenticwebsite
destination.Usersarethenpromptedtoentertheirpersonaldata,
whichisultimatelycollectedbyacriminalorganization.

CONT..
[email protected]
148
ReciprocalLinks-Reciprocallinksaremutuallyagreeduponlinks
betweentowebsites.Forexample,siteAembedsanactivelinktosite
B,whichinreturnembedsanactivelinkbacktositeA.Reciprocal
linksaretypicallyusedtoestablisharelationshipbetweenwebsites
andtoboostsearchengineranking.Asaresultofwebmastersusing
reciprocallinkstoattempttomanipulatesearchengineratings,
Googleandothersearchenginesareactivelydiscouragingtheuseof
reciprocallinkbuilding,penalizingwebsitesthatabusethem.
SEO-SEOisanacronymforSearchEngineOptimization.Itisan
expansiveendeavortomakewebpagesrankashighlyaspossiblein
searchengines.
SocialMedia-SocialMediareferstovariouswebsitesand
applicationswhosemainpurposeistosupportandfacilitateonline
socialnetworking.Themostpopularexamplesofsocialmedia
includeTwitter,Facebook,Instagram,andReddit.

CONT..
[email protected]
149
Spam/Spamming-Spamtypicallyreferstounsolicitedjunkmailand
blogcomments.Spamcanconsistoflegitimateadvertisementsforproducts
andservices,ormaybepartofanonlinescammingoperation.Spamming
referstothebulkdisseminationofspamposts,ortherepetitivepostingof
spamonpublicforums.
Tag-TagsareaformattingtoolusedinHTMLandXMLmarkup
languagestoindicatehowcontentwillbedisplayedonagivenwebpage.
Tagsarecommonlyusedtoindicateheaders,fonts,linebreaks,tables,etc.
Forexample,ifyouwantaportionofasentencetoappearemphasizedona
webpageyouwouldmarkupthecontentasfollows:"ifyouwantaportion
ofasentencetoappear<em>emphasized</em>onawebpageyouwould
markupthecontentasfollows.“

CONT..
[email protected]
150
Wiki-DerivedfromtheHawaiianphrase"WikiWiki,"meaningfast
orquick,awikiisanywebsitethatallowsorencouragesuserstoaddor
modifyonlinecontent.Themostrecognizableexampleofawikiis
Wikipedia,theonlineencyclopediaeditedandmaintainedthroughthe
collaborativeeffortsofthesite'svisitors.
ZoneFiles-Zonefilesaresimpletextfilesstoredonnameservers
containingtheidentifyingdatapertainingtospecificdomainnames.
EachzonefilecontainsacompleteDNSrecordofthedomainnamein
question,includingafullmappingofthedomainnametoitsrelatedIP
address.Zonefilesareeasilyalteredormodified,whichcanresultina
websitebeingrenderedunresponsiveorredirectedtoaspamor
malwareinfectedspoofingsite.Consequently,zonefilesneedtostored
onhighlysecureservers.

[email protected]
151
WEEK FIVE:
PRACTICAL SESSION

CONNECTING A COMPUTER TO
THE INTERNET
[email protected]
152
BeforeloadingaWebsite,youfirstneedtoconnecttotheInternet.
ToconnecttotheInternet,youneedthefollowing:
Accesstoaphoneline
Amodem
Amodemisadevicethathelpsthecomputerstocommunicateusing
phonelines
Computerscaninterpretdigitalsignals,andphonelinescan
interpretanalogsignals
Modemsconverttheoutgoingdigitalsignalsfromacomputerto
analogsignalsthatcanbetransmittedviatelephonecables
Modemsalsoconverttheanalogsignalsfromaphonelinetodigital
signalsforacomputer
Thespeedofamodematwhichthedatatransferisdoneismeasured
inKilobitspersecond(Kbps)

INTERNET SERVICE PROVIDER
(ISP)
[email protected]
153
AnInternetaccountprovidedby
anInternetServiceProvider
(ISP)
AnISPisanorganizationthat
providesusersaccesstothe
Internetandotherrelated
services,suchashostingaWeb
siteandprovidingspaceonthe
WebservertolaunchaWebsite
ontheInternet.
ISPprovidesuserswith
usernamesandpasswords,
whicharerequiredtoconnectto
theInternet

INTERNET BROWSERS
[email protected]
154
Abrowserisanapplicationthathelpsyoudisplayand
interactwiththeinformationontheInternet
AbrowserusesHTTPtodisplayinformationfromthe
Webserver
MosaicwasthefirstcommerciallyusedWeb
browser
Today,InternetExplorer,GoogleChrome,Mozilla
FirefoxandNetscapeNavigatorarethemostpopular
Webbrowsers
ConnectingaComputertotheInternet(2)
ConnectingtotheInternetenablesyouto
performoperations,suchasaccessinga
Website,readingyouremail,navigating
betweenWebsites,andprintingWebpages

WORKING WITH THE INTERNET
EXPLORER
[email protected]
155
ToopentheInternetExplorer,performthefollowingsteps:
1.SelecttheProgramsInternetExplorercommand.TheInternet
Explorerwindowisdisplayed
2.IntheAddressbar,specifytheaddressorURLoftheWebsitethat
youwanttovisit
WhenspecifyingtheWebaddress,youdon’tneedtospecifythe
protocol,suchashttporftp.Theprotocolappearsautomatically.
3.ClicktheGobuttonorpresstheEnterkey.Thehomepageofthe
Websiteappears.
Thefigureinthenextslideisdisplays(thehomepageoftheMSN
site).

CONT..
[email protected]
156
Working with the Internet Explorer (2)

CONT…
[email protected]
157
Noticethatthemousepointerchangestoahandwhenitismoved
onahyperlink.Youcanclickonatexthyperlinkorimage
hyperlinktodisplaythelinkedURLs
DisplayingandHidingToolbars
Todisplayatoolbar,clickViewonthemenubar.SelecttheToolbars
commandandthen,thetoolbarname,suchasStandardsButtons
andAddressBar,todisplaythetoolbar
TodisplaytheWebpageinanewwindow,selecttheFileNew
Windowcommandtoopenanewwindow
TostopaWebpagefromloading,clickViewonthemenubar.
SelecttheStopcommand
TorefreshthecontentsofaWebpage,clickViewonthemenubar.
SelecttheRefreshcommandtorefreshthecontentsoftheWebpage
ToviewthevisitedURLs,clickthedrop-downbuttonofthe
Addressbar

CONT…
[email protected]
158
YoucanclickontheForwardbuttontogobacktothesiteyouwere
viewingbeforeusingtheBackbutton
DISPLAYINGWEBPAGESINANEWWINDOW
TodisplaytheWebpageinanewwindow,selectFileNew
Windowcommandtoopenanewwindow
Youcanalsoopenanewwindowbyright-clickingalinkand
selectingtheOpeninNewWindowoptionfromtheshortcutmenu
STOPPINGWEBPAGESFROMLOADING
TostopaWebpagefromloading,clickViewonthemenubar.
SelecttheStopcommand.TheWebpagestopsfromloadingfurther
YoucanalsopresstheEsckeytostopWebpagefromloading

CONT…
[email protected]
159
REFRESHING WEB PAGES
ThereareWebpagesontheInternetthataredynamicandthedata
displayedonthesitemightbechangingafteraspecifictimeperiod
ToviewlatestdatayouwillneedtofetchthelatestcopyoftheWeb
page
RefreshingaWebpagemeansthatyoucangetanewcopyofthe
currentpagefromtheserver.
TorefreshthecontentsofaWebpage,clickViewonthemenubar.
SelecttheRefreshcommandtorefreshthecontentsoftheWeb
page.
YoucanalsopresstheF5keytorefreshthecontentsofaWebpage

CONT…
[email protected]
160
DISPLAYING VISITED URLS USING THE BROWSER ADDRESS
BAR
You can view the URLs you visited earlier using the browser
address bar
Click the drop-down button of the Address bar, as shown
WORKING WITH THE INTERNET EXPLORER (5)
Navigating Previously Visited Web Pages
You can view the recently visited Web pages using the Back button
on the toolbar
The Forward button is enabled only if you have used the Back
button
You can click on the Forward button to go back to the site you were
viewing before using the Back button

CONT..
[email protected]
161

CONT…
[email protected]
162
YoucanalsoviewthelistoftheWebpagesthatyouhavevisitedby
clickingthedrop-downarrowagainsttheBackorForwardbutton
asdisplayedinthefollowingfigure:
WORKING WITHTHEINTERNETEXPLORER(6)
NavigatingPreviouslyVisitedWebPages
YoucanviewtherecentlyvisitedWebpagesusingtheBackbutton
onthetoolbar
TheForwardbuttonisenabledonlyifyouhaveusedtheBack
button
YoucanclickontheForwardbuttontogobacktothesiteyouwere
viewingbeforeusingtheBackbutton

CONT..
[email protected]
163

CONT…
[email protected]
164
YoucancustomizethebrowserforviewingtheWebsitesusingthe
InternetOptionsdialogbox
DeletingBrowserHistory
YoucandeletethehistoryoftheWebsitesthatyouvisitedearlier
DELETINGBROWSERHISTORY
1.SelecttheToolsInternetOptionscommandtodisplaythe
InternetOptionsdialogbox
2.IntheGeneraltab,undertheHistorysection,clicktheClear
Historybutton.ThisdisplaystheInternetOptionsmessagebox
3.ClickYesbuttontodeletetheURLhistory
4.ClickOKbuttontoclosetheInternetOptionsdialogbox.

CONT..
[email protected]
165

CONT…
[email protected]
166
SETTINGTHEHOMEPAGE FORAWEBBROWSER
TosetahomepageforaWebbrowser,performthefollowingsteps:
1.SelecttheToolsInternetOptionscommand.TheGeneraltabof
theInternetOptionsdialogboxisdisplayed.
2.TheHomepagesectionoftheGeneraltaballowsyouto:
Currentbutton:Setthecurrentlydisplayedpageasthehopepage
Defaultbutton:Microsoftstartingpageasthedefaultpage
Blankbutton:SetablankpageasHomepage
OryouspecifyaURLofyourchoiceintheAddresstextbox,E.g.,
http://www.google.com

CONT…
[email protected]
167
3.ClicktheOKbuttontoclosetheInternetOptionsdialogbox
SomeWebsitestaketimetoloadontheWebbrowser.Thisdelayis
duetothefactthatimagesinaWebpagetakemoretimetodisplay
thantext.TopreventthisdelayinloadingaWebpage,youcanstop
imagesfromloading.Bydefault,InternetExplorerdisplaysimages
withinaWebpage.
TOSTOP LOADING THEIMAGES, PERFORM THE
FOLLOWING STEPS:
CONTROLLING THEDISPLAYOFIMAGESINWEBPAGES
1.SelectToolsInternetOptionscommandtodisplaytheInternet
Options.
2.TheAdvancedtab,asshown
3.UnderSettingssection,scrolltoShowpicturescheckboxunder
Multimediacategory

CONT…
[email protected]
168
4.DeselecttheShowpicturescheckboxtoensurethatthebrowser
loadsWebpageswithoutimagesorpictureswithintheWebpages.
IftheShowpicturescheckboxisselected,thebrowserdisplaysthe
imagesalongwiththecontentoftheWebpages.
5.ClickOKbuttontoclosetheInternetOptionsdialogbox.Youcan
RefreshthepageorloadadifferentWebpagetoseethechanges
SAVINGWEBPAGESASFILES
YoucansaveaWebpageforviewingitlaterwithoutconnectingtothe
Internet.TosavethecurrentWebpage,performthefollowingsteps:
1.SelectFileSaveAscommandtodisplaytheSaveWebPagedialog
box
2.InFilenamebox,usethedefaultfilenameprovidedorspecifya
name

CONT…
[email protected]
169
3.SelectSaveastypedrop-downlistandtherequiredfiletype.You
cansavethefileasahypertextfileusingthedefaultfilename
extension.htmor.html,oryoucansaveitasatextfilewiththe.txt
extension
WhenyousaveaWebpageasanHTMLfile,thegraphics,sound,
andvideoarealsosaved
However,whenaWebpageissavedasaTXTfile,onlythetextin
theWebpageissaved
WhenyousaveaWebpageasanHTMLfile,thegraphics,sound,
andvideoarealsosaved
However,whenaWebpageissavedasaTXTfile,onlythetextin
theWebpageissaved.

CONT…
[email protected]
170
SAVINGWEBPAGESASFAVORITES
YoucansaveWebpagesorWebsitesasyourfavoritesitesinthe
Favoritesfolder
ThisfolderstorestheURLoftheWebpageandenablesyouto
accesstheWebpagequickly
InNetscapeNavigator,thefeatureofsavingWebpagesasfavorites
isknownassavingWebpagesasBookmarks
1.TosaveaWebpageasafavorite,clickFavoritesonthemenubar.
SelecttheAddtoFavoritescommandtodisplaytheAddFavorite
dialogbox
2.TosavethecurrentWebpageintheFavoritesfolder,clicktheOK
button
3.YoucanorganizetheWebpagesinyourFavoritesfolderunder
differentcategoriesforeasyaccessibility.

CONT…
[email protected]
171
4.Select the FavoritesOrganize Favoritescommand to display the
Organize Favoritesdialog box
DOWNLOADING AFILEFROMAWEBPAGE(1)
YoucandownloadafilefromaWebpage
Downloadingenablesyoutosaveaprogram,anaudioorvideofile,
oradocumentfromtheWebtoyourcomputer
Thefollowingfiguredisplaysadownloadlink:

CONT..
[email protected]
172

CONT…
[email protected]
173
DOWNLOADING AFILEFROMAWEBPAGE(1)
TodownloadandsaveafilefromtheWebpage,doasfollows:
1.Right-clickonthelinkofthefile
2.SelecttheSaveTargetAscommandtodisplaytheSaveAsdialog
box
3.SelectthelocationfromtheSaveindropdownlist
4.IntheFilenamebox,youcanusethedefaultfilenameprovidedor
specifyanameofyourchoiceandclicktheSavebutton.
5.ClicktheClosebuttonoryoucanchoosetoOpenFoldertoview
thefileorexecuteaprogram

CONT..
[email protected]
174

CONT…
[email protected]
175
URLs
COPYINGCONTENTFROMAWEBPAGETOADOCUMENT
TocopythecontentofaWebpagetoaWorddocument,performthe
followingsteps:
1.OpentheWebpageandselecttheEditSelectAllcommandto
selectthecontentsofthepage
2.SelecttheEditCopycommandmenutocopythecontentsonthe
clipboard
3.OpenanewMicrosoftWorddocument
4.SelecttheEditPastecommandtopastetheselectedcontentofthe
Webpageincludingtext,image,andURLs

CONT…
[email protected]
176
PREVIEWING WEB PAGES
Previewing in Internet Explorer uses the WYSIWYG (What You See
Is What You Get) mechanism
You can preview a Web page by selecting File Print Preview
option
If the information does not appear correctly on the printed page,
you can modify the settings of the page setup.

CONT..
[email protected]
177

CONT…
[email protected]
178
MODIFYING PAGE SETUP OPTIONS
In Internet Explorer, you can modify the page orientation, set new
margins, add information on the header and footer, and change the
size of the paper
To modify the settings of a Web page, perform the following steps:
1.Click File Page Setup command to display Page Setup dialog
box
2.In the Page Setup dialog box, you can:
Use the Size drop-down list to change the size of the paper, such as
Letter, A4, or Executive.
Use the Source drop-down list to change the source of the paper.
Use the Header text box to specify the header information and the
Footer text box to specify the footer information.

CONT…
[email protected]
179
UsethePortraitorLandscaperadiobuttonundertheOrientation
sectiontosettheorientationofthepage.
UsetheLeft,Top,Right,andBottomtextboxesundertheMargins
(inches)sectiontosetdifferentmarginsforthepage.
PRINTING
ToprintaWebpage:
1.ClickFilePrintcommandtodisplaythePrintdialogbox
ThetabsinthePrinterwindowwilldisplaydependingontheprinter
driverbeingused
2.InthePrintdialogbox,youcan:
Specifytheprinter,pagerange,andnumberofcopies
SpecifythepagesetupinformationusingthePageSetuptab
ClicktheOptionstabtodisplaythefollowingdialogbox:
Selecttherequiredoptionstoprintframesandlinkeddocuments.
3.ClickthePrintbuttontoprinttheWebpage.

CONT…
[email protected]
180
SEARCH ENGINES
You can use the Internet to search for information on any topic,
such as education, computer, medicine, and sports
A search engine comprises a set of programs that include:
A program that searches all the pages on the Web sites and uses the
hypertext links on each page to discover and read other pages on
the site. This program is called a spider
A program that creates an index of the pages, which have already
been read by the users
A program that receives the search request, compares the search
entries with the entries in the index, and returns the results to the
Web browser for display
Popular search engines in the Internet include Google, AltaVista,
and Lycos

CONT…
[email protected]
181
Differentsearchenginesusedifferentmechanismstosearchfor
information
Forexample,usingAltaVistasearchengine,wegetthefollowing:

CONT…
[email protected]
182

CONT…
[email protected]
183
SEARCHING FORINFORMATION (1)
Tosearchforinformation,usekeywordsthatindicatethetopicfor
whichyouwantfurtherinformationE.g.,forinfoaboutrouting
protocols,youcanusethekeywordRoutingProtocol
1.OpenInternetExplorer
2.Typewww.altavista.comorothersearchengineintheAddressbar
3.ClickGobuttontodisplaythehomepageoftheAltaVistasearch
site
4.SpecifyRoutingProtocolinthetextboxandclicktheFindbutton
todisplaythesearchresultsonaWebpage,asshown
5.Tolocatepagesthatcontainthespecifickeywordsonly,specify
Routing+Protocolinthetextbox
6.Thesearchresultsappear,asshown

CONT…
[email protected]
184

CONT…
[email protected]
185
Note that the search results show links on all protocols and not just
routing protocols
The search engine searches for Web pages that contain either the
word “Protocol” or “Routing” or “Routing Protocol” in the content
7.You can also search for Web pages that contain the exact phrase
To do this, specify “Routing Protocol” in the text box with opening
and closing quotes.
After the search results appear, you can click the hyperlink to
access the corresponding Web site or page. For example, you click
the Interior Gateway Routing Protocol (IGRP) link to display the
Web page containing the required information
CA

CONT…
[email protected]
186
IMPLEMENTING SECURITY(1)
Securitymeasuresinvolve
Dataencryption:Involvesthetranslationofdataintoaformthatis
illegiblewithoutadecipheringmechanism.
Passwords:Isasecretwordorphrasethatgivesauthorizedusers
accesstoaparticularprogramorsystem.
Adigitalcertificatesusedtoidentifythepersonsendingthe
messageoverthenetwork.
ACertificateAuthority(CA)issuesthedigitalcertificate.
Thedigitalcertificatecontainstheapplicant'spublickeyanda
varietyofotheridentificationinformation.
Theapplicantusesthepublickeytoencryptthemessage.
TherecipientofanencryptedmessageusestheCA'spublickeyto
decodethedigitalcertificateattachedtothemessage,andverifiesit
asissuedbytheCA

CONT…
[email protected]
187
OnceyoustartusingtheInternetforaccessinginformation,you
connecttodifferentcomputersonthenetwork
SecurityontheWebreferstotechniquesforensuringthatdatain
transitissafefromunauthorizedaccess
SETTINGSECURITYINABROWSER(1)
Youcanimplementdifferentlevelsofsecurityfordownloading
contentfromaWebsiteonyourcomputerbyconfiguring
protectionsettingsforWebsitesinyourbrowser
WhenyouopenasiteinyourWebbrowser,thecontentonthesite
maybeunsafefordownloadingandmightcontainavirusprogram
ToimplementsecurityinInternetExplorer,performthefollowing
steps:
1.ClicktheToolsInternetOptionscommandtodisplaytheInternet
Optionsdialogbox

CONT…
[email protected]
188
2.ClicktheSecuritytab,asshowninthefollowingfigure:
Thesefourzonesare:
Internet:Thiszonecontainssitesthatarenotassignedtoanyother
zone
Localintranet:containssitesonthelocalnetworkofan
organization.E.g.,theWebsitesspecifiedintheConnectionstab
andthelocalintranetsites.
Trustedsites:Thiszoneenablesyoutoaddsitesthataresafeand
donotcarryanyvirusprogramsthatmightinfectyourcomputer
Restrictedsites:Thiszoneenablesyoutoaddsitesthatareunsafe
andcancarryvirus.

[email protected]
189
ELECTRONICS MAIL (E -MAIL)

ELECTRONICS MAIL (E-Mail)
[email protected]
190
E-mailisacommonresourcesprovidedby
internet.Itisaworldwidesystemfor
sendingandreceivingmessagesthrough
electronicsystem.E-mailislikethewayyou
sendawrittenlattertosomebodyyouknow
throughthepost-officesystem.Itisasystem
whereamailissentthroughthecomputer
network.

ELECTRONICS MAIL (E-Mail)
[email protected]
191
Assoonasyousendthiselectronicletter,ittravelsfromyour
computer,usuallythroughadevicecalledamodem,whichconnects
yourcomputertointernetviathetelephonenetwork.Unlikethe
regularmailsystem,e-mailmayreachitsdestination,evenonother
countriesandcontinentsinminuteorlessexceptsomepartofthe
networkiscongestedoroutoforder.
Thespeedofe-mailandtheworldmakesitapopularformof
communication.Itisinexpensivebutconvenienttosendmailthrough
e-mail.Allthatwillrequireisthenormalchargeforusingthesystem
ifoneusesthecybercaféorthenormalchargeforsomeonewhois
connectedtotheinternet.

ELECTRONICS MAIL (E-Mail)
[email protected]
192
Italsogivestheopportunitytosendmultiplecopiestoseveralpeople.
E-mailhasthefollowingadvantage.
Itisnotnecessarytopayforpackingandpostingasthecasewith
thepostalsystem.Alloneneededtodoistopaythetelephone
chargesifusingpersonalsystemorpayfortimeinacybercafé.There
aredifferentratefordifferentdistancesinthepostalsystembut
whateverthedistanceinaninternetsystem,thechargeremainthe
same.
Anotherbenefitofe-mailisthat,itispossibletosendseveralcopies
ofaparticulardocumenttoseveralrecipientswithoutusingenvelops
andaddresses.
Itisalsopossibletohaveonlyadisplayofamessageonscreen
withoutprintingahardcopyofit.Thissavestimeandmoney.
However,aprintedcopymayberequiredsometimes.

ELECTRONICS MAIL (E-Mail)
[email protected]
193
Lastly,ausercandesignatexttohistastebyusingdesiredfonts
whenusingOutlook
Express.Italsopossibletoaddgraphicsinsuchasituation.

MAILING LIST AND GROUPS
[email protected]
194
INTRODUCTION
Groupsarefreeonlinecommunitiesconsistingofaforumfor
sharingideasandinformationonlineorviaamailinglist.
EachGrouphasitsownwebsiteandURL,andoptionalservices
determinedbytheGroupownersuchasfileandphotosharing,
listsoflinkstoinformationrelevanttotheGroup,etc.
Groupsalsoprovideanonlinemessagearchivethatmemberscan
searchforinformationorconversationspostedinthepast.
Groupsareusuallyusedforonlinediscussionsbutcanalsobeset
uponlytosendoutannouncementsorfilesviaemail.
Groupscanbesetupforprofessionaluse,forfamilymembersto
communicate,aninformativecommunityorjustforfuninteraction
withotherswhosharesimilarinterest.
Inthissubmodule,youwilllearnhowtouseYahooand(or)
GoogleGroupstointeractwithyourclass,studentsorco-workers.

OBJECTIVES
[email protected]
195
At the end of the training, participants will learn:
How to create a Group for his or her class or co-worker
How to build membership for the Group
How to use the Group to send:
Lecture notes
Handouts/files
Assignments
Announcements etc.
[email protected] how to post topics for discussion

HOW TO CREATE AND USE YAHOO GROUPS
[email protected]
196
Yahoo Group
Go to http://groups.yahoo.com

CREATING A YAHOO GROUP
[email protected]
197
TocreateaYahooGroup,clickonthelink“createyourGroup”
IfyoudonothaveaYahooIDclickthelinksignuptocreatea
Yahooaccountbeforeyouproceed.
YouwillberequiredtologintoyourYahooaccountbeforeyoucan
continue.
Thiswouldtakeyoutoapagewhereyoucanbrowseforacategory
toplaceyourGroup.

CONT…
[email protected]
198

CONT…
[email protected]
199
BrowseorsearchforthecategorythatbestdescribeyourGroup.
Forexample,youcanselectSchools&Education.Youshould
continuesearchorbrowseforthesub-classification.

HOW TO CREATE AND USE YAHOO GROUPS
[email protected]
200
Enter the Group name and Group Email address.
Type the text that describes your Group.
Then click theContinue button.

HOW TO CREATE AND USE YAHOO GROUPS
[email protected]
201
SelectyourEmailaddressandidentifyyourprofile.
YoucanclickthelinkCreatenewprofiletoeditanewprofile.
Theninputthecode.
NextclicktheContinuebutton.

HOW TO CREATE AND USE YAHOO GROUPS
[email protected]
202

HOW TO CREATE AND USE YAHOO GROUPS
[email protected]
203
Yahoo! will give you a clue that your Group has been created

HOW TO CREATE AND USE YAHOO GROUPS
[email protected]
204
You can proceed to customize your Group or invite people to join.
Lets go to the Group home
Group home page!

USING YAHOO GROUPS
[email protected]
205
TostartusingyournewYahooGroup,thefirstthingyouhaveto
doistobuildmembership.
Youcandothisinthreeways:
Byinvitation
Bysubscriptionandregistration
Toinvitepeople,simplyclickontheinvitelinkandentertheemail
addressesofthepeopleyouwanttoinvite
Thenclicksubmitinvite

CONT…
[email protected]
206

CONT…
[email protected]
207
Anotherwaytobuildyourmembershipisbygivingthe
subscriptionemailaddresstopeopleyouwanttoinvite

CONT…
[email protected]
208
That way they can subscribe by sending a mail to the subscription
email address!
Users can also go to the Group site and register!
Members can unsubscribe by sending email to the unsubscribe
email address.
You can also delete members
Sending notes and files;
To send notes or file to the members of your Group, simply send
email, with the necessary attachments, to the Group email address
(i.e. [email protected])
You can also login to the Group site to send a post, upload a file (i.e.
Lecture notes), etc.

CONT…
[email protected]
209

CONT…
[email protected]
210
TouploadafiledirectlytoGroupsite,simply:
Clickthefileslinkontheleft.Thefilespagewouldopen.
Theclickaddfiles

CONT…
[email protected]
211
Click choose file Select the file you want to upload and click upload
file
After clicking the upload file button, you will see that your file
have been added to the files list.
Follow the same process to upload more files.

CONT…
[email protected]
212

CONT…
[email protected]
213
YoucanalsouseYahooGrouptopostamessageorstarta
discussion.Todoso,clickthepostlinkontheleftsideofyour
page.
Enterthesubject,themessageandthenclicksend.Yourpostwould
besenttoallmembersandwillalsoappearontheGrouppage
YoucanalsouseyourYahooGroupto:
Postlinkstorelevantresources
Createadatabaseofpeople
Collectinformationusingthepollsfeature
Publishacalendarofactivities(i.e.Classtimetable)
Uploadphotosofinterest
Andmore...
ClickonthehelplinkonanypageinYahooGrouptolearnmore.

HOW TO CREATE AND USE
GOOGLE GROUPS
[email protected]
214
CREATING A GOOGLE GROUP
Go to http://groups.google.com
Click the create a group button

CONT…
[email protected]
215
Youwillberequiredtosign
inwithyouraccount
Ifyoudonothavea
Googleaccountclickthe
createanaccountbuttonto
createaGoogleaccount

CONT…
[email protected]
216
Name your Group
Create a Group email address
Enter a brief description of the Group
Specify the access level of you Group
Click the create my Group button

CONT…
[email protected]
217

CONT…
[email protected]
218
Then enter the verification code and click the create my Group button
again.

CONT…
[email protected]
219
If all goes well your Group will be created and you will be
redirected to the home page.
Your Group home page would look like this!

USING GOOGLE GROUP
[email protected]
220
You can now invite members
Or add members directly
To do so, click the invite or add members link on the Group home. If
you invite members, they will have to accept it; if you add them directly,
they will automatically become members.

CONT…
[email protected]
221

CONT…
[email protected]
222

CONT..
[email protected]
223
Sendingnotesandfiles;
TosendnotesorfiletothemembersofyourGroup,simplysend
email,withthenecessaryattachments,totheGroupemailaddress
([email protected])
YoucanalsologintotheGroupsitetosendapost,uploadafile(i.e.
Lecturenotes),etc.

CONT…
[email protected]
224

CONT..
[email protected]
225
YoucanalsouploadfiledirectlyontheGrouppage.Todoso:
Clickthefileslinkontheright,thefilespagewillopen
Onthefilespage,clicktheuploadfilebutton

CONT..
[email protected]
226
Thebuttonchangestochoosefile.Clickonittobrowseforthefile
youwanttoupload!
whenyouselectthefile,Googlewillautomaticallyattach/upload
thefile.

CONT..
[email protected]
227
AnotherwayyoucanuseGoogleGroupistopostdiscussionsand
announcements.
Tomakeapost,simplyclickonthenewpostbutton

CONT..
[email protected]
228
Thenewpostpagewouldopen!
Enteryoursubjectandmessageandthenclickthepostmessage
button.Youmaywanttocopynon-members;ifsoenterthereemail
addressesintheCCfield
Digital Bridge Institute, Abuja
Page 340
YoucanalsouseyourGoogleGroupto:
Postlinkstorelevantresources
Publishacalendarofactivities(i.e.Classtimetable)
Schedulemeetingsandannounceittomembers
Createandsavepresentations,spreadsheetsandworddocuments
onlineetc..
ClickonthehelplinkonanypageinyourGoogleGrouptolearn
more.

TIPS
[email protected]
229
Youcanuseanyemailaddresstosubscribe/unsubscribetoany
Group.
Subscriberscansendanemailto:Groupname-
[email protected] Groupname-
[email protected].
Orsendemailto:[email protected]
[email protected]!
Note:forrestricted-membershipGroups,theGroupownerwill
needtoapproveyoursubscriptionrequestbeforeyoucanjoin.
Any mailsentto:[email protected]
[email protected]
members:

CONCLUSION
[email protected]
230
This is by no means a comprehensive tutorial.
Participants are encouraged to explore the various Groups on there
own; in other to learn more.
You will actually get better by using them.
Thanks!

GUIDELINES FOR A SUCCESSFUL
INTERNET USAGE IN THE SCHOOL
[email protected]
231
ThefollowingaretheguidelinesforInternetintegrationinschools:
i.LearntheInternetbasics:Veryoftenyourstudentsknowmuch
moreaboutallthepossibilitiesontheInternet,rangingfrom
Blogs,chatstogamesandsoftware.Tobeabletounderstandyour
students’behaviourontheInternet,learnasmuchaspossible
abouttheInternet.OnlywhenyouknowatleasttheInternet
basicsyoucanestimatepotentialrisks.Therearevariouswaysto
learnthebasics:becomefamiliarwiththeInternetviausingthe
Internetyourself,doan‘Internet-Drivers-Licence’,readPCor
Internetjournals,askyourstudents.
ii.Keepyourstudents’ageinmind:WhenusingtheInternetin
classkeepyourstudents’ageinmindandadapttheuseofthe
Internetaccordingly.

CONT…
[email protected]
232
iii.Setreasonablerulestogetherwithotherteachers,parentsand
yourstudentsaboutusingtheInternet:Importanttopicsto
includeinrulesare,forexample,disclosureofpersonal
information,behaviourontheInternet,andwhichonline
activitiesareOKinyourschoolandwhichonesaren’t.Please
keepinmindthatrulesareonlyeffectivewhenallstakeholders
understandtherulesandacceptthem.
iv.Encourageyourstudentstobecarefulwhendisclosingpersonal
information:Callyourstudents’attentiontodisclosepersonal
informationwithcaution.Explainthedangersofairydata
forwardingtoyourstudents.Manywebsitesrequiregivingout
personalinformationtoaccesscontent.Asimplerulecouldbe
thatyourteendoesnotgiveoutnames,address,phonenumbers
andpicturesofyourfamilyunlessyouhaveagreed.

CONT…
[email protected]
233
v.Encourageyourstudentstonetiquette:Netiquettemeansthe
informalrulesofonlinebehaviour.Simplysaid:Thingsthatare
allowedinreallifearealsoallowedintheInternet.Thingsthatare
forbiddeninreallifearealsoforbiddenintheInternet.Showyour
studentshowtorespectothersandtheirpropertyonline.Explain
toyourstudentsthatrulesforacceptedbehaviourdon'tchange
justbecausetheyareontheInternet.
vi.DiscusswithyourstudentsthetruthfulnessofInternetcontent
Teachyourstudentsthatnoteverythinghe/shefindsonlineis
true.Encouragethemtoaskiftheyarenotsure.Alsoshowyour
studentshowtocheckthetruthfulnessofcontentbycomparing
withothersources.

CONT…
[email protected]
234
vii.Teachyourstudentshowtoblocksomeoneonlineandtoreport
them:AccordingtoEuropeanstudies,onethirdof12-to19-years-
oldhaveencounteredpornographic,xenophobic,homophobic,
violentcontentonlineorharassmentinchatrooms.Therefore,
teachyourstudentshowtoblocksomeoneonline.Alsoremind
yourstudentseverynowandthenwheretheycanreportthis
disturbingcontent:www.cyberethics.infoor+35722674747.
viii.Arrangesecurityprotectionatthecomputerandtheschool
network:Considerallmeansofprotectingyourcomputerandthe
schoolnetwork.Arrangesecurityprotectionatthecomputer(s)
thatyouusewithyourstudentsaswellasattheschoolnetwork.
Teachyourstudentshowtoprotecttheirowncomputers.

CONT…
[email protected]
235
ix.UseFilteringorBlockingSoftware:Therearevariousfiltering
andblockingsoftwareprogramsavailableinthemarketwhich
canbedownloadedontoyourcomputerandempoweryouto
blocktypesofsitesyouconsidertobeinappropriateforyour
students.Theseprogramsworkindifferentways.Someprevent
usersfromenteringcertaintypesofinformationsuchastheir
nameandaddress.Otherprogramskeepyourstudentsaway
fromchatroomsorrestricttheirabilitytosendandreadE-mails.
Generally,theseprogramscanbeconfiguredbyyoutoonlyblock
thetypesofsitesthatyouconsidertobeobjectionable.Itis
importanttorealizethatfilteringandblockingprogramscannot
protectyourstudentsfromalldangersonline;theyarenot100%
effectiveinkeepinginappropriatecontentfromanybody’s
computer.Filteringandblockingprogramsarenotasubstitutefor
criticalthinking.Ifyouusefilteringorblockingsoftwareinschool
informallstakeholders.

CONT…
[email protected]
236
x.DiscusswithyourstudentsthetruthfulnessofInternetcontent
Teachyourstudentsthatnoteverythinghe/shefindsonlineis
true.Encourageyourstudentstoaskifhe/sheisnotsure.Also
showyourstudentshowtocheckthetruthfulnessofcontentby
comparingwithothersources.
xi.Don’tforget:AdvantagesandchancesoftheInternetoutweigh
therisks.TheInternetisanexcellenteducationalandrecreational
sourceforstudents.Itisaworldwherekidsandteenagerscanuse
theInternetforschoolworkandasaninformationsource.
EncourageyourstudentstobeconsciousandexploretheInternet
toitsfullpotential.