+ All Categories
Home > Documents > WWW and Internet Communication

WWW and Internet Communication

Date post: 25-Feb-2016
Category:
Upload: race
View: 54 times
Download: 1 times
Share this document with a friend
Description:
WWW and Internet Communication. Compiled by G.F Kalumuna January 2014. Introduction. - PowerPoint PPT Presentation
Popular Tags:
82
WWW and Internet Communication Compiled by G.F Kalumuna January 2014
Transcript
Page 1: WWW and Internet Communication

WWW and Internet Communication

Compiled by G.F KalumunaJanuary 2014

Page 2: WWW and Internet Communication

Introduction• The Internet (Net) is a loose association of thousands

of networks and millions of computers across the world that all work together to share information. It is a global system of computers that carries data and makes the exchange of information possible.

• The World Wide Web is a subset of the Net. The World Wide Web enables simple and intuitive navigation of Internet sites through a graphical user interface (GUI). Computers having the proper hardware can connect to the Internet via an Internet Service Provider (ISP).

Page 3: WWW and Internet Communication

What is the internet?

• The Internet is a worldwide system of computers joined by a common set of networking and software protocols.

• Each computer in this global system of computers has its own unique address - the Internet Protocol (IP) address.

Page 4: WWW and Internet Communication

History

The Internet (Net) launched in 1969 by Advanced Research Project Agency Network (ARPANET)

• ARPANET, US computer network• Google why ARPANET was created?

Page 5: WWW and Internet Communication

What is the internet?...

• Since 1983, the Internet has grown beyond its expectation into an increasingly commercial and popular medium.

• By the mid-1990s the Internet connected millions of computers throughout the world.

Page 6: WWW and Internet Communication

What is the internet?...• We often hear the Internet referred to as the "information

superhighway" and this analogy describes the Internet accurately.

• “Think of the Internet as a huge mass transit system with a few main subway lines that intersect at certain points. Connecting to the main subway lines are commuter rails, bus lines, and ferry boats that spread out and crisscross the area”

• The main lines carry the bulk of the traffic and are collectively known as the Internet backbone.

• The biggest networks in the system form this backbone, which is owned by the major Internet Service Providers (ISPs).

Page 7: WWW and Internet Communication

Simple definition of internet

• A vast network of networked computers covering the whole world

• Collection of various networks around the world

Page 8: WWW and Internet Communication

What is the internet?...

Page 9: WWW and Internet Communication

WWW

• Also called the web, or www• Introduced in 1992 in Switzerland by

the Centre for European Nuclear Research (CERN)

Page 10: WWW and Internet Communication

What is the WWW?

• The World Wide Web (WWW) is a subset of the Net--a collection of interlinked documents that work together using a specific Internet protocol called Hypertext Transfer Protocol (HTTP).

• In other words, the Internet exists independent of the Web, but the Web can't exist without the Internet.

• Web pages are written in Hypertext Markup Language (HTML), which tells the Web browser what to display.

Page 11: WWW and Internet Communication

What is the WWW?

• The significant feature of the Web is its ability to link pages to one another. Just click a link, and you're at a Web site on the other side of the world.

Page 12: WWW and Internet Communication

Simple definition of WWW

• A multimedia based collection of information, services, and web sites supported by the InternetNote:

• Prior to the discovery of the Web, the Internet was all text

Page 13: WWW and Internet Communication

How do we get connected?

• Nearly anyone can connect their computer to the Internet and immediately communicate with other computers on the Net. With the advent of high-speed modems for digital communication over common phone lines and now cable lines, many people and organizations take advantage of the network's advanced and global communications.

Page 14: WWW and Internet Communication

How do we get connected?...

• To get connected you need the following Two Resources:1. Connection to the Internet via a modem or

network connectionThe most common way to get connected now a days is through your cable line, telephone line, modem etc ALL through Internet Service Providers (ISPs)

2. A web browser such as Internet Explorer

Page 15: WWW and Internet Communication

Web browsers• Web browsers are software applications that provide access to

and allow viewing of Internet resources. • By using a web browser you can view information in either a

text-only format, using a browser such as Lynx, or in a graphical text format using a browser such as Internet Explorer.

• Graphics can refer to images, animations, or movies.• Other well-known web browsers include Firefox, Google

Chrome, and Safari. • Web browsers are primarily used to view web pages, although

most can also be used to access newsgroups and email as well.

Page 16: WWW and Internet Communication

Movement of Information on the Internet

• Information moves from one computer to another following a communications protocol

• A communications protocol is a set of rules computers follow to transfer information

Page 17: WWW and Internet Communication

How does the Internet work?• When you request or send information such as a webpage

or email, the computer breaks the request into smaller, more manageable pieces called packets. Each of these packets contains both the sender's Internet address and the receiver's address. Every packet is sent first to a gateway computer that understands a small portion of the Internet.

• This gateway computer reads the destination address and forwards the packet to an adjacent gateway, closer to the packets destination, it will in turn read the destination address and so forth across the Internet until a gateway recognizes the packet as belonging to a computer within its immediate neighborhood or domain.

Page 18: WWW and Internet Communication

How does the Internet work?...• Regardless of what operating system you use (Mac, PC,

or Unix) to connect to the Internet, the computers all basically speak the same language, which allows you to exchange information with someone next door or across the planet.

• Because a message can be divided in numerous packets, each packet may be sent by a different route across the Internet. Because the IP just delivers the packets, they can arrive in a different order than the order they were sent in. The Transmission Control Protocol (TCP) has the job of putting them back in the right order.

Page 19: WWW and Internet Communication

How does the Internet work?...

Page 20: WWW and Internet Communication

Communications Protocol• Transfer Control Protocol/Internet

Protocol (TCP/IP)Basic communications protocol for the Internet to work

• Hypertext Transfer Protocol (http)Supports the movement of info over the web

Hence, web site addresses start with http

• File Transfer Protocol (FTP)Allows the transfer of files from one

computer to another

Page 21: WWW and Internet Communication

Online Safety

• When you are connected to the internet you enter a very public place. You need to be cautious and minimize your personal risk while online.

• Your computer can be exposed to various types of computer viruses, worms, phishing scams, hoaxes, adware, and spyware.

Page 22: WWW and Internet Communication

Why is my computer not secure? Over the Internet

• Every time you connect to the Internet you enter a very public space. This means what you do online may be visible or monitored by people, such as network administrators, that may be invisible to you.

• Also, unwanted program such as virus, worm, spyware etc may affect your computer or system.

• Hackers (attackers), may also affect your computer or system

• Therefore, it is very important to be responsible when connected to the internet and minimize your personal risk.

Page 23: WWW and Internet Communication

What is a virus?

A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. A virus must meet two criteria:

• It must execute itself. It will often place its own code in the path of execution of another program.

• It must replicate itself. For example, it may replace other executable files with a copy of the virus infected file. Viruses can infect desktop computers and network servers alike.

Page 24: WWW and Internet Communication

What is a virus?...• Some viruses are benign; however, most are malignant.• A benign virus will do no real damage to your computer. They

simply conceal themselves and display a message of some sort at some time. Some simply replicate and take up resources such as disk space or CPU time.

• A malignant virus tries to inflict damage to your computer. Malignant viruses may alter one or more of your files or programs so that they do not work properly. The virus may also cause programs to terminate abnormally, cause incorrect information to be written to your documents, alter directory information, delete files, or even erase your entire hard disk.

Page 25: WWW and Internet Communication

What is a virus?...

• Specifically, a computer virus is a threat to the security and integrity of your computer system which could cause the loss or alteration of programs and data and can spread from program to program, computer to computer, or system to system without direct human intervention or even intention.

Page 26: WWW and Internet Communication

What is a worm?

• Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. A worm only depends on active network connections.

Page 27: WWW and Internet Communication

What is a Trojan Horse?• Trojan Horses are impostors--files that claim to be

something desirable but, in fact, are malicious. A very important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. Trojans contain malicious code that when triggered cause loss, or even theft, of data. For a Trojan horse to spread, you must, invite these programs onto your computers--for example, by opening an email attachment or downloading and running a file from the Internet. The PWSteal.Trojan is a Trojan.

Page 28: WWW and Internet Communication

How do I protect my computer from viruses?

There is no absolute protection to prevent computer viruses entirely, but protection is necessary to limit the chance of an infection. Some ways to protect your computer are:– Implement safe computing practices.– Use up-to-date antivirus software.– Have clean, up-to-date backups of all your important data.– Have a clean, and fairly new boot diskette.– Scan all removable media, downloads, and email attachments; always scan any new

files before executing them.– Take removable media out of the computer when finished with them and especially

before starting or restarting the computer.– Don't let your email system automatically open documents or execute file attachments.– Don't use illegal software, since they have a higher chance of being infected than

legitimate commercial or shareware software.– Make sure anyone who uses your computer also follows your safe computing practices.

Page 29: WWW and Internet Communication

How do I protect my computer from viruses?...

• The most effective way to protect your computer is to install antivirus software on to your computer. Symantec Norton Antivirus, Dr. Solomon's Anti-Virus, or McAfee Virus Scan, are just a few antivirus software applications which find virus infections and can automatically contain or delete them. You need to update your computer’s virus definitions to help protect your computer from viruses. Virus definitions are files that provide information to antivirus software to find and repair viruses. Since new viruses are created all the time it is crucial that you keep your virus definitions up-to-date. Simply installing virus protection and never updating the virus definitions will not protect your computer.

Page 30: WWW and Internet Communication

How do I protect my computer from viruses?...

• Virus definitions must be kept up to date since viruses are constantly changing. Please update as often as possible. You must be online to complete the following steps.1. Open your anti-virus software client from your programs menu, or by double clicking on the icon at the bottom right hand corner of your screen.– For Symantec Anti-Virus, double click on the gold

shield.

Page 31: WWW and Internet Communication

How do I protect my computer from viruses?...

2. Check the date for the virus definitions. The date should be recent. Click on the Update button and follow the on screen instructions to complete the install.– For Symantec anti-virus, click on the Live Update

button and click on Next until the update finishes. *You may have to close the window and reopen for the Version date to refresh.

Page 32: WWW and Internet Communication

How do I protect my computer from viruses?...

Page 33: WWW and Internet Communication

What is Phishing?• Phishing is an attempt to get you to reveal logins, passwords,

account numbers and other personal information. Phishers send an email or pop-up message that claims to be from a business or organization that you deal with - for example, your Internet service provider (ISP), bank, credit card company, online payment service (such as PayPal), or even a government agency. The message usually says that you need to "update" or "validate" your account information. It might threaten some dire consequence if you do not respond. The message directs you to a Web site that looks just like a legitimate organization's site, but it is not. The purpose of the bogus site is to trick you into divulging your personal information so the phishers can steal your personal information.

Page 34: WWW and Internet Communication

How do I respond to a phishing attempt?

• If you get an email or pop-up message that asks for personal or financial information, do not reply or click on the link in the message. Legitimate companies do not ask for this information via email. If you are concerned about your account, contact the organization in the email using a telephone number you know to be genuine, or open a new Internet browser session and type in the company's correct Web address. In any case, do not cut and paste the link in the message.

Page 35: WWW and Internet Communication

What is a Hoax?• Hoaxes usually arrive in the form of an email. Please

disregard the hoax emails - they contain bogus warnings usually intent only on frightening or misleading users. The best course of action is to merely delete these hoax emails. Although it is possible to be emailed an infected executable file or document containing a macro virus, by simply reading your email, you will not get a computer virus. You would have to open the file attachment to actually get a virus. Therefore, precautions should be taken when dealing with such attachments.

Page 36: WWW and Internet Communication

What are Adware and Spyware?

• Adware is unwanted advertising banners, pop-ups, pop-unders, etc. in your web browser. Spyware is a catchall term for several types of malicious software. The consequences of a moderate to severe spyware infection (privacy issues aside) generally include a substantial loss of system performance and major stability issues (crashes and hangs). Spyware consists of computer software that gathers information about a computer user without the user’s knowledge or informed consent, and then transmits this information to an external entity.

Page 37: WWW and Internet Communication

What are Adware and Spyware?...

How does it get onto your computer? • It often arrives attached to other software that you

intentionally install. Many ‘freeware’ and ‘Shareware’ programs that you download over the net include from one to several parasite programs that will silently install themselves as you install the software that you actually wanted. Some may also arrive through email. Unlike viruses, these usually announce themselves. Many install themselves on your system when you simply visit a web site that hosts them. These are know as ‘Drive-by Installations’.

Page 38: WWW and Internet Communication

Surfing the WWW

Introduction• With the knowledge you now have about the

Internet and the WWW, you can utilize this knowledge to find valuable and not so valuable information on the web. The fastest way to find information is to use a search engine. In this lesson, we will discuss navigating the WWW, using search engines, downloading plug-ins, and most importantly protecting your computer from viruses.

Page 39: WWW and Internet Communication

How do I navigate the WWW?• Every computer connected to the Internet has its own

unique address: a number whose format is defined by the Internet Protocol (IP), which is the standard that defines how messages are passed from one machine to another and how each connected computer is addressed on the Internet. Each item on a computer such as a web page has its own unique address as well, called the Uniform Resource Locator (URL). Think of it as a web address. Every web page on the Internet has a unique URL address that identifies the location of that page on a server. For example, a web page address may look like the following:

Page 40: WWW and Internet Communication

How do I navigate the WWW?...

Page 41: WWW and Internet Communication

How do I navigate the WWW?...

• HTTP: The first part of the address (http) is the protocol. The protocol identifies a manner for interpreting transmitted computer information. Internet web pages use http (Hypertext Transfer Protocol). Web pages can be exchanged over the Internet because web browsers (which read the pages) and Web servers (which store and serve the pages) both understand HTTP.

Page 42: WWW and Internet Communication

How do I navigate the WWW?...

There are also other various types of protocols you need to be familiar with. These are:

• ftp (File Transfer Protocol) - used to transfer files to another computer via the Internet.

• news - used by Usenet newsgroups.• telnet - used to login to other computers.• mailto - used to send email.

Page 43: WWW and Internet Communication

How do I navigate the WWW?...• WWW is the hostname. The hostname combined with the

domain name specifies the computer your are connected to. Another example of a host name would be "library" in the following URL address: http://library.stedwards.edu/

• stedwards.edu is the domain name. Understanding the parts of the domain name is helpful in deciphering what type of web page you will be viewing. The domain in this example is stedwards.edu.This can be broken down into smaller parts:– stedwards - is the second-level domain.– edu - is the top level domain.

Page 44: WWW and Internet Communication

How do I navigate the WWW?...

• stedwards - is the second-level domain.• edu - is the top level domain.

The last part of the URL is the pathname. The pathname identifies the location of the web page on the server. This usually consists of one or more folder names followed by a file name with a file extension, such as html. In the existing example, the following is the pathname where the web page is located:it_dept/competency/index.html

Page 45: WWW and Internet Communication

How do I navigate the WWW?...

• An URL is case sensitive, except for the host and domain name. This means that the pathname and filename of the URL address have to be typed in exactly the way it is shown. When a URL is spoken, unless the person specifies, then it is usually all in lower case.

Page 46: WWW and Internet Communication

Using Hyperlinks• The simplest way to navigate the web is to click on links,

technically known as hyperlinks. Links are the connectors which one document automatically references other documents, located anywhere around the world. They are usually text or images that have a specific URL address associated with them, which makes them a connector to another web page. For example, on the St. Edward's home page, it has links to the Library, Site Index, and the Welcome statement. We can tell they are links because when you move your mouse pointer over the words, it is transformed from an arrow to a "pointing hand.“

• Once you click on one of these links, say the Library link, the SEU library web page will appear on your screen.

Page 47: WWW and Internet Communication

Search Engines

• Search engines can be very powerful tools when gathering information for research projects, listings for local movies, or businesses.

• Many of you have probably already used a search engine, whether you realize it or not.

• You may use search engine to find information for research projects, reports, dissertation, thesis etc.

Page 48: WWW and Internet Communication

Search Engines...

• Below is a table that consists of many helpful sites that contain search engines. You can use many of these search engines to help you in your everyday life.

Page 49: WWW and Internet Communication

Search Engines...No Site URL Description

1 Alta Vista http://altavista.com Search engine

2 Ask Jeeves http://www.ask.com/ Allows you to enter search in spoken language

3 Dog Pile http://www.dogpile.com/ Search engine

4 Google http://www.google.com Search engine

5 Yahoo http://www.yahoo.com Search engine: listing in categories

Page 50: WWW and Internet Communication

Search Tips and techniques• Use only lower case letters to enter your search criteria.• Use quotation marks to search for an exact phrase. For example, to search for

articles on Edgar Allen Poe, enter "Edgar Allen Poe" into the text box. If you entered just his full name without the quotation marks, you will find every page with Edgar or Allen or Poe in the title. That will be a much larger group of entries to sift through to the find information you need.

• Be as descriptive as possible. For example, try using “19th century tables” instead of old furniture.

• Including and excluding words. Use a plus (+) sign in front of a word to require that the word appear in the results. Use a minus (-) sign in front of a word to exclude it from the results. For example, you want to search on all trucks except Ford, try: trucks –Ford

• Use of the words Either/Or should be in all caps. For example, search for: Colorado skiing OR snowboarding

• Use of AND, OR & ANDNOT (all in capital letters)

Page 51: WWW and Internet Communication

Boolen Operators

• Use of AND, OR & ANDNOT (all in capital letters)

• +, -• Discuss why Boolean operator important in

searching information via search engine?

Page 52: WWW and Internet Communication

Keywords

• Discuss what is Keyword used in search engines? Why the use of keyword important in searching information?

Page 53: WWW and Internet Communication

Boolean Operators and KEYWORDS

• Discuss how will you use Boolen operators and Keywords to find what you want from the search engine?

Page 54: WWW and Internet Communication

Credibility of Internet Information

AuthorityLook for authors’

qualifications and affiliation

Cf The domain name

• com - commercial• edu – Educational

institution• org – organisation• Gov/go-

government

Accuracy• Error free content• Motive for the siteObjectivity• Any element of biasCurrency• Date of publication• Date of revision• Up to date linksUsability• User friendly, layout

Page 55: WWW and Internet Communication

Importance of the InternetCommunication • Via telephones, emails, mobile phones• Discussion forums• Chat rooms• Chat, emailing etcBuying and Selling Goods• Known as electronic commerce (e-commerce)• Via cheques, credit cards or electronic cashSearching for information• Access libraries, latest news

Page 56: WWW and Internet Communication

Entertainment• Access movies, music, magazines & computer

gamesEducation • Also known as e-learning, online learning,

virtual learning etc• Take classes in any subject

Page 57: WWW and Internet Communication

Uses of Internet in education

• Discuss the uses of internet in education• Discuss the uses of internet in classroom

situation• Discuss the uses of internet in school

Page 58: WWW and Internet Communication

Social media

• Define what is social media?

Page 59: WWW and Internet Communication

Type of social media

• Mention type of social media?

Page 60: WWW and Internet Communication

Characteristics of social media

• Mention characteristics of social media?

Page 61: WWW and Internet Communication

Question on social media

• Why social media important in education setting?

Page 62: WWW and Internet Communication

EmailIntroduction

• The information covered in this first lesson will familiarize you with some common vocabulary and will give you a general idea about email. In order to send and receive email, you must have a computer with a connection to the Internet and an email application.

• Also, this lesson will give you an understanding of how client-based and web-based email function along with the differences between them. The advantages and disadvantages of each will also be discussed. After this lesson you will have an understanding of when client based and/or Web-based email is your best selection for using email.

Page 63: WWW and Internet Communication

Email Overview

• When you type a message in an email program (such as Eudora or WebMail) and hit Send, the electronic signal travels over the network or modem connection to the mail server. The mail server then relays the electronic signal out onto the Internet.

Page 64: WWW and Internet Communication

Email Overview...• The Internet, sometimes called simply "the Net," is a

worldwide system of computer networks. Information (such as your email message) is broken into pieces-or packets-which make it easier and faster to transmit. The number of packets that a single message may break into depends on the amount of electronic traffic on the Internet at that time. The email message you sent is reassembled once it reaches the destination mail server. Mail servers are set up for each domain name on a computer network. The servers are the computers that store your mail messages until they are retrieved, read and deleted by an e-mail application.

Page 65: WWW and Internet Communication

Email Overview...

• The image below gives you a general idea of how this happens.

Page 66: WWW and Internet Communication

Email Overview...

• A user at Computer A generates an email.• The email is broken into four packets.• Two of the packets are routed to Computer B.• The other two packets are routed to Computer C.• Computers B and C route the packets to Computer

D.• Computer D is the final destination computer.• The email message is reassembled and read by the

recipient.

Page 67: WWW and Internet Communication

Parts of an Email Address

• Every email user on the Internet has a unique e-mail address that identifies an electronic post office box on a network where e-mail can be sent. Different types of networks have different formats for e-mail addresses. On the Internet, all e-mail addresses have a similar form. All addresses must have a user name and a domain.

Page 68: WWW and Internet Communication

Parts of an Email Address...• For example, an email address at IAE might look like this:• [email protected] (username@domain)• The first part of the address <info> is also known as the user

name. This is the unique name recognized by the mail server.• The @ symbol separates the unique user name from the domain.

The domain in this case is iae.org. The domain name may also be broken down into parts. Understanding the parts of the domain name is helpful in deciphering the origin of an email address.

• The mail server at IAE for all departments, staff, and students may be <iae>. (please go and check the actual email of IAE in the official site!) what is that email??____

Page 69: WWW and Internet Communication

Parts of an Email Address...• The last part of the address, <org>, is the top-level

domain (TLD) in the hierarchical Domain Name System. Examples of top-level domains include:– gov - Government agencies– edu - Educational institutions– org - Organizations (nonprofit)– mil - Military– com - Commercial business– net - Network organizations– ca - Canada or th - Thailand - both of these are examples of

country domains.

Page 70: WWW and Internet Communication

Parts of an Email Message• Email messages, like other forms of

correspondence, have the same general format regardless of the email program you choose. – The To: field is required in all email messages to alert the mail server to

the message's destination.– The From: field will give the recipient of the email an idea whom the

message is from.– The Cc: field allows you to send the same message to multiple

recipients. When you send a Cc: message, all recipients are aware of who received copies of the message. Cc: stands for carbon copy and is a holdover from the days when letters were typed with carbon paper between the pages to create identical letters for multiple recipients.

– The Bcc: field allows you to send an identical message to multiple recipients, however, those recipients whose addresses appear in the BCC: field cannot be seen by the other recipients.

Page 71: WWW and Internet Communication

Parts of an Email Message...

• Almost all email messages have a subject line. In most email applications, the only information a recipient will see about a message is whom it is from, when, and what the subject is. Subject lines are a good idea as a courtesy to those reading your messages and also to help the recipient focus on the topic of your message.

Page 72: WWW and Internet Communication

Parts of an Email Message...• At the end of a message, you may see a block of information such

as name, title, business address, phone numbers, web addresses, and sometimes even quotes from famous (or infamous) people. This block of information can be inserted in a standardized format (so you do not have to type it every time you mail a message) by using a signature file (also known as a .sig file). The block of information is known as the sig line or signature line. Keep in mind that some email applications do not receive these blocks of text exactly how you formatted them.

• It is also a good idea to use a signature file sparingly. If you are sending jokes to your family members, it is not necessary to send them the contents of your business card at the end of the message.

Page 73: WWW and Internet Communication

Sending and Receiving Mail

• To send an email message using an email application, such as WebMail or Eudora, you need to complete the following steps:– Specify the recipient's address.– Enter a subject line for your message.– Type your message. Most e-mail systems include a

rudimentary text editor for composing messages, but many allow you to edit your messages using any editor you want.

– You then send the message to the recipient

Page 74: WWW and Internet Communication

Sending and Receiving Mail..• Sent messages are stored in electronic mailboxes, on a

computer designated as a mail server, until the recipient connects to the Internet and instructs their email program to retrieve the incoming messages from the mail server. To see if you have any mail, you may have to check your electronic mailbox periodically, although many systems alert you when mail is received.

• To retrieve your mail from any email system, you must be able to access the mail server. As you have learned, you may have one primary domain name at IAE. The domain name may be, iae.org, (please check the actual one in the official site), what??

Page 75: WWW and Internet Communication

Mailing an Attachment

• Most of the time, email is just simple text typed into a mail message. Occasionally, you may need to "attach" a file to a mail message such as a picture or a homework assignment. Many email programs allow you to send attached files with an email message.

• Discuss importance of attachment when you send an email to your students?

Page 76: WWW and Internet Communication

Client-based vs. Web-based Email

What is Client-based Email? • Mail sent to your IAE's account is stored on a IAE mail server until you download it or delete it. • Client Based Email use email protocols such as POP3 mail (Post Office Protocol 3) which is one

among the most popular email protocols. POP3 uses the SMTP (Simple Mail Transport Protocol) messaging protocol.

• Messages are downloaded onto your computer's hard drive using an email client. • Some common clients are Eudora, Netscape, Thunderbird, and Outlook. • Depending on how your preferences are set, once you have downloaded your email, it is

deleted from the mail server. • Your downloaded messages are available whether or not you are online. • If you reply or write new mail while offline, the mail is stored on your computer and sent the

next time you log in. • You can only use an email client on your own computer; • if you want to check your mail from other location (for example outside IAE building) , you

would need to use web-based email such as WebMail.

Page 77: WWW and Internet Communication

Web-based Email

What is Client-based Email? • Web-based email allows you to manage your email

via a web browser. The interface is implemented as a Web site that provides access to the various functions like reading, sending or organizing messages. Email isn't downloaded to your computer but instead is left on the mail server until you delete it. Common web mail systems are Yahoo!, Hotmail, MSN, and GMail. You can only read and write mail when you are online and logged into your web mail account.

Page 78: WWW and Internet Communication

Advantages and Disadvantages• An advantage to client-based mail is you can store as much email on your

computer as you want and save it for as long as you would like. The only limit is the size of your hard drive, and today's multi-gigabyte systems can hold almost limitless amounts. Another advantage is being able to read, write and reply to email while you are off-line. A disadvantage to Client-based is accessibility; you can only check your email from a computer that has an email-client configured for your account.

• A big advantage to Web-based email is you can access it from any computer in the world that has an Internet connection. Some of the disadvantages are Web-based email usually limits the amount of email messages you can store on the server, and it may seem a little slower because the commands you give must travel to the connecting website.

Page 79: WWW and Internet Communication

Definitions

• Adware - is unwanted advertising banners, pop-ups, pop-unders, etc. in your web browser.

• Antivirus Software - is a program which scans and/or removes computer viruses. It can be used on your hard drive or on diskettes. Antivirus software should be kept up-to-date and be able to detect all viruses currently being distributed and the known existing computer viruses.

• Attachment – Documents, spreadsheets, graphics, web link, and any other files associated with an electronic message.

• Client-based server - A mail server used to store messages until users log on and download their mail.

• Edshare - a file and print server which allows the user to store any files and print from computer labs.

• Email - is an electronic message sent from one computer to another.

Page 80: WWW and Internet Communication

Definitions...• FTP (File Transfer Protocol) - used to transfer files to another computer via the

Internet.• Hoax - usually arrive in the form of an email containing bogus warnings usually

intent only on frightening or misleading users.• Home page - For a Web user, the home page is the first Web page that is displayed

after starting a Web browser.• Hyperlink - a cross-reference in an electronic document that, when activated,

causes the application reading the document to load a different section of the document, a new document, or a resource that the application can display or use.

• Hypertext Markup Language (HTML) - The language for publishing hypertext on the World Wide Web.

• Hypertext Transfer Protocol (HTTP) - The protocol for transporting HTML documents across the Internet.

• Internet – is a world-wide system of computer networks

Page 81: WWW and Internet Communication

Definitions...• Internet Protocol (IP) – The protocol for sending data from one computer to another on

the Internet. Every computer on the Internet has at least one IP address uniquely identifying it from all other computers on the Internet.

• Internet Service Provider (ISP) - A company that provides individuals and other companies access to the Internet and other related services.

• Mail Server – is a computer or device on a network that manages mail.• PDF (Portable Document Format) - a file format that can be created and read on any

computer, regardless of operating system. Because PDF files are highly compressed they take a short time to download.

• Phishing - is an attempt to get you to reveal logins, passwords, account numbers and other personal information.

• Plug-ins - Programs that are installed as part of the browser to extend the basic functionality built into the browser. Plug-ins allow different file formats to be viewed as part of a standard HTML document.

• Protocols - Controls the way data is transferred between server and client computers on the Internet.

• Server - Is the part of the network that responds to requests from other computers in the network with documents or other information which they requested.

Page 82: WWW and Internet Communication

Definitions...• Spam – unsolicited e-mail, also known as junk email. It's a form of bulk email obtained

by companies that specialize in creating e-mail distribution lists.• Spyware - is a catchall term for several types of malicious software.• Transmission Control Protocol (TCP) - is a set of rules used to keep track of the

individual packets that a message is divided into for efficient routing through the Internet.

• Trojan Horse - a file that claims to be something desirable but, in fact are malicious and can cause data loss or theft.

• Uniform Resource Locator (URL) - The technical name for a text string that supplies an Internet or Intranet address and the method by which it can be accessed.

• Virus program written to alter the way a computer operates, without the permission or knowledge of the user.

• VirusDefinitions - are files that provide information to antivirus software to find and repair viruses.

• Worm - a program that replicates itself from system to system without the use of a host file.


Recommended