In this you will know about what are the Misuse of Internet
Size: 8.72 MB
Language: en
Added: Aug 26, 2021
Slides: 16 pages
Slide Content
MISUSE OF INTERNET NAME:- VAISHNAVI SHARAD PALKAR STD:- S.Y.Bcom DIV:- A COLLEGE:- Bharat College of Arts and Commerce
WHAT IS INTERNET The Internet is the biggest world-wide communication network of computers. The Internet has millions of smaller domestic, academic, business, and government networks, which together carry many different kinds of information. The short form of internet is the 'net'. ... It is used by billions of people all over the world.
INCREASING CONTROL OF TECHNOLOGY OVER OUR LIFE Our overdependence on technology has led to several problems. Mobile phones and the Internet are two good example. People spend too much time on the net, doing nothing. Also, the Internet and the Mobile phones make people spend less time talking face to face. This can be a serious problem because people get used to talking via Mobile phones or Internet every time and later they can have problems to express themselves in person.
INTERNET SERVICES WWW Webpage / Homepage Web Publishing Web Browser Search Engine Protocol Internet Protocol DNS HTTP URL HTML ISP E-mail Newsgroup Video Conferencing FTP T elnet Forum
USES OF INTERNET Some Important current strategic of the internet are : On-line communication. Software sharing. Exchange of views on topics of common interest. Posting of information of general interest. Organization promotion. Product promotion and feedback about products. Customer support service. Online Journals, Magazines, encyclopedia, and Dictionary. Online Shopping. World-wide Conferencing.
MISUSES OF INTERNET Piracy Identity Theft Cyber Bullying Fake Advertisements Hacker Time Wastage Cybercrime
Online piracy is the practice of downloading and distributing copyrighted content digitally without permission, such as music or software. The principle behind piracy has predated the creation of the Internet, but its online popularity arose alongside the internet. PIRACY
Identity theft occurs when an unauthorized party uses your personally identifying information, such as your name, address, Social Security Number (SSN), or credit card or bank account information to assume your identity in order to commit fraud or other criminal acts . IDENTITY THEFT
Cyber bullying is bullying that takes place over digital devices like cell phones, computers, and tablets. ... Cyber bullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. CYBER BULLYING
FAKE ADVERTISEMENTS Hackers use fake advertisements to get your bank details . etc
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term hacker may refer to anyone with technical skills, but it often refers to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes. HACKER
Technology may have made many tasks simpler, but it has also increased distractions You've probably noticed that while you can get many things done faster than ever, you spend a great deal of time doing nothing of worth. It's called “cyber loafing”— the act of wasting time on the Internet TIME WASTAGE
CYBERCRIME Any Criminal activity that uses a computer either as an instrumentality, target means for perpetuating further crimes come within the ambit of cyber crime. It includes hacking, cyber Frauds, phishing, spamming, computer virus.
CONCLUSION On one hand make best use of internet with careful planning and proper management, putting a business on the internet can make it more effective and productive. However understanding and knowing how the rapid changes and various complex issues that can be encounter in getting the business on to the net is imperative to its success.
QUOTE “The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect , it makes it easier to connect.” - Esther D yson