• Save
Internet... wendy
Upcoming SlideShare
Loading in...5
×
 

Internet... wendy

on

  • 1,296 views

 

Statistics

Views

Total Views
1,296
Views on SlideShare
1,296
Embed Views
0

Actions

Likes
1
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Internet... wendy Internet... wendy Presentation Transcript

    • INTERNETINTERNET BY:BY: MARIA WENDY MENDOZA-SOLOMOMARIA WENDY MENDOZA-SOLOMO MA, CHEMISTRYMA, CHEMISTRY
    • TOPICSTOPICS  History of the InternetHistory of the Internet  Key Internet FeaturesKey Internet Features  Internet BrowserInternet Browser  EmailEmail  Messaging and ChatMessaging and Chat  Navigating the InternetNavigating the Internet  Search EnginesSearch Engines  News, Discussion & Social NetworkingNews, Discussion & Social Networking  E-CommerceE-Commerce  Internet Service Provider (ISP)Internet Service Provider (ISP)  File TransferringFile Transferring
    • UNLOCKING OF DIFFICULTIESUNLOCKING OF DIFFICULTIES  INTERNET/NETINTERNET/NET -- a collection ofa collection of computers, all linked together, to sharecomputers, all linked together, to share information globally.information globally.  WORLD WIDE WEB/WEB – also known asWORLD WIDE WEB/WEB – also known as www. It is a collection of interlinkedwww. It is a collection of interlinked documents called hypertext in thedocuments called hypertext in the Internet.Internet.  NETWORK – is composed of computersNETWORK – is composed of computers that are connected to each other,that are connected to each other, enabling the communication and sharingenabling the communication and sharing of information.of information.
    • HISTORY OF THE INTERNETHISTORY OF THE INTERNET  It was first developed in the U.S. by twoIt was first developed in the U.S. by two universities who were both working on theuniversities who were both working on the same contract and wanted to share theirsame contract and wanted to share their data. They were faxing information back anddata. They were faxing information back and forth and then retyping it until they came upforth and then retyping it until they came up with a piece of software calledwith a piece of software called Unix to UnixUnix to Unix Copy ProgramCopy Program oror UUCPUUCP..  The Internet was born and hasThe Internet was born and has mushroomed outward from thatmushroomed outward from that point.point.
    • 4 Things that are necessary to "get on the net"4 Things that are necessary to "get on the net" with a fullwith a full graphic interfacegraphic interface (picture, sounds,(picture, sounds, animation, etc...).animation, etc...).  AA computercomputer - preferably with a fast processor- preferably with a fast processor and lots of memoryand lots of memory  AA modemmodem - preferably high speed digital (56,000- preferably high speed digital (56,000 baud if high speed is not available)baud if high speed is not available)  Browser SoftwareBrowser Software - often installed with your- often installed with your operating system or can beoperating system or can be downloadeddownloaded off theoff the InternetInternet  AnAn Internet Service ProviderInternet Service Provider (ISP) which is a(ISP) which is a service that connects your home or officeservice that connects your home or office computer to the Internetcomputer to the Internet
    • Key InternetKey Internet FeaturesFeatures ““I've been wondering of late if that willI've been wondering of late if that will ultimately be the greatest contributionultimately be the greatest contribution of the net to history -- that it providesof the net to history -- that it provides a cheap, reasonably accessible,a cheap, reasonably accessible, mechanism for multi-way internationalmechanism for multi-way international communication.”communication.” SteveSteve BellovinBellovin;; Usenet/history/1985-1990Usenet/history/1985-1990;; 10 Oct 1990.10 Oct 1990.
    • Key Internet FeaturesKey Internet Features  The Internet is a unique medium with globalThe Internet is a unique medium with global impact, and within a relatively few number ofimpact, and within a relatively few number of years has become inextricably intertwined withyears has become inextricably intertwined with the conduct of almost all human activity.the conduct of almost all human activity.  The following sections describe the keyThe following sections describe the key features of the Internet which have contributedfeatures of the Internet which have contributed to this world-wide success:to this world-wide success:
    • Key Internet FeaturesKey Internet Features  Key Internet FeaturesKey Internet Features Geographic DistributionGeographic Distribution Robust ArchitectureRobust Architecture Near Light SpeedNear Light Speed Universal AccessUniversal Access Internet Growth RatesInternet Growth Rates The Digital AdvantageThe Digital Advantage Freedom Of SpeechFreedom Of Speech
    • INTERNET BROWSERINTERNET BROWSER  An Internet browser is a program thatAn Internet browser is a program that locates websites for you and allows userslocates websites for you and allows users to maneuver around (surf) the World Wideto maneuver around (surf) the World Wide Web and view web pages.Web and view web pages.  Some of the more popular browsers areSome of the more popular browsers are MozillaMozilla Firefox and Microsoft's Internet ExplorerFirefox and Microsoft's Internet Explorer..  MosaicMosaic was the first browser and most modernwas the first browser and most modern browsers still use the basic model that the firstbrowsers still use the basic model that the first browser used.browser used.  Some other browser areSome other browser are OperaOpera,, Chrome,Chrome, SafariSafari,, NetscapeNetscape as well as dozens of others. Before graphicas well as dozens of others. Before graphic browsersbrowsers LynxLynx was the most popular browser and iswas the most popular browser and is still available for text browsing.still available for text browsing.
    • Update: INTERNET EXPLORER 10Update: INTERNET EXPLORER 10  Published on Feb 27, 2013Published on Feb 27, 2013  Microsoft introduced a new IE commercialMicrosoft introduced a new IE commercial which features singer, song-writer, andwhich features singer, song-writer, and composer Blake Lewis. The popularcomposer Blake Lewis. The popular beatboxer showcases in the video what isbeatboxer showcases in the video what is possible on a new Windows 8possible on a new Windows 8
    • EMAILEMAIL  EmailEmail is the electronic equivalent of sending ais the electronic equivalent of sending a letter through the mail. There are manyletter through the mail. There are many different mail reading programs or clients thatdifferent mail reading programs or clients that control email but the basic functions are all thecontrol email but the basic functions are all the same. An email address directs a message tosame. An email address directs a message to thethe recipientrecipient..  AnAn email programemail program controls sending,controls sending, composing and receiving email. Most emailcomposing and receiving email. Most email programs can also be used to read postings onprograms can also be used to read postings on newsgroupsnewsgroups..
    • Key Email FeaturesKey Email Features Email Is A Push TechnologyEmail Is A Push Technology Email Waits For YouEmail Waits For You Email Is One-To-ManyEmail Is One-To-Many Email Is Almost FreeEmail Is Almost Free
    • Email addresses are made up of...Email addresses are made up of...  thethe account nameaccount name (often the users first initial and(often the users first initial and then the last name (sometimes only 8 characters)then the last name (sometimes only 8 characters)  then thethen the @@ symbolsymbol  then the name of the user'sthen the name of the user's ISPISP  the last 3 characters describe thethe last 3 characters describe the type of servicetype of service for thefor the top level domain (TLD)top level domain (TLD) name. For examplename. For example .com.com stand for commercial site,stand for commercial site, .mil.mil - U.S.- U.S. military,military, .gov.gov - U.S. government,- U.S. government, .net.net - network,- network, etc...etc...  when an address has 2 characters it is awhen an address has 2 characters it is a geographical top level domain (gTLD). For examplegeographical top level domain (gTLD). For example .ca.ca - is a site registered in Canada,- is a site registered in Canada, .au.au - is a site- is a site registered in Australia,registered in Australia, .tv.tv - is a site registered in- is a site registered in TuvlaTuvla  new TLDs are occasionally added including; .biz,new TLDs are occasionally added including; .biz, .info, .name, .asia, .mobi.info, .name, .asia, .mobi
    • As well as sending and receivingAs well as sending and receiving mail the recipient can;mail the recipient can;  save the addresssave the address for future reference infor future reference in anan address bookaddress book  replyreply to the original messageto the original message  forwardforward the message to a third partythe message to a third party  editedit a messagea message  check the spelling and a wide range ofcheck the spelling and a wide range of other options.other options.
    • EMAIL FEATURESEMAIL FEATURES  ISP provides a storage area or mailbox to collectISP provides a storage area or mailbox to collect email in.email in.  An email message is made up of two parts; theAn email message is made up of two parts; the headerheader information and theinformation and the bodybody..  Email can be composed and sent asEmail can be composed and sent as plain textplain text oror HTMLHTML..  New messages can be written or composedNew messages can be written or composed off-off- lineline (not connected to the Internet). If the ISP(not connected to the Internet). If the ISP charges by the hour, connect to the Internet onlycharges by the hour, connect to the Internet only to send and receive your email and thento send and receive your email and then disconnect to read and compose your mail.disconnect to read and compose your mail.
    • EMAIL FEATURESEMAIL FEATURES  Some companies offerSome companies offer free emailfree email serviceservice that you can sign up for.that you can sign up for.  You can alsoYou can also attachattach files to emailfiles to email messages to send picture, sound,messages to send picture, sound, documents, videos and other types of filedocuments, videos and other types of file with your email.with your email.
    • UnrequestedUnrequested oror SpamSpam EmailEmail  A problem on the InternetA problem on the Internet  A large percentage of the email sent is thisA large percentage of the email sent is this unrequested email which takes upunrequested email which takes up bandwidth and causes prices to rise.bandwidth and causes prices to rise.  Businesses must take time to sort throughBusinesses must take time to sort through spam to find the legitimate email whichspam to find the legitimate email which also takes time and money.also takes time and money.  Most ISPs provide software that will filterMost ISPs provide software that will filter out the worst of this email.out the worst of this email.  If you find that you are receiving a lot ofIf you find that you are receiving a lot of unrequested email contact your ISP to seeunrequested email contact your ISP to see if they can provide you withif they can provide you with spam filtersspam filters..
    • Email AttachmentsEmail Attachments  AnAn attachmentattachment is a computer file or filesis a computer file or files place inside an email message.place inside an email message.  Email was originally designed to handleEmail was originally designed to handle onlyonly plain textplain text (no formatting, ie. bold,(no formatting, ie. bold, centering, etc.) which was transferred fromcentering, etc.) which was transferred from one computer to another in a format calledone computer to another in a format called ASCIIASCII.. (The(The American Standard Code for Information InterchangeAmerican Standard Code for Information Interchange ((ASCIIASCII // ˈˈæskiæski// ASSASS-kee-kee))[1][1] is ais a character-encoding schemecharacter-encoding scheme originally basedoriginally based on theon the English alphabetEnglish alphabet. ASCII codes represent. ASCII codes represent texttext inin computerscomputers,, communicationscommunications equipment, and other devices that use text.)equipment, and other devices that use text.)
    • Email AttachmentsEmail Attachments  Today many modern email programs allowToday many modern email programs allow HTMLHTML (hypertext markup language) to be(hypertext markup language) to be included in email messages which allow you toincluded in email messages which allow you to format your email messages with font sizes,format your email messages with font sizes, bold, centre and such.bold, centre and such.  The recipient must have an HTML capableThe recipient must have an HTML capable email reader to see the formatting otherwiseemail reader to see the formatting otherwise they will get a document marked up with HTMLthey will get a document marked up with HTML tags.tags.
    • Email AttachmentsEmail Attachments  Most modern email programs work hand-Most modern email programs work hand- in-hand with your operating system to tryin-hand with your operating system to try and open the correct program required toand open the correct program required to view the document sent as an attachment.view the document sent as an attachment. This is done by matching the file extensionThis is done by matching the file extension such as .jpg, .gif, .doc, etc... with asuch as .jpg, .gif, .doc, etc... with a registeredregistered file typefile type..
    • Email AttachmentsEmail Attachments  VirusesViruses can also be transferredcan also be transferred via email attachments. Becausevia email attachments. Because your email software handles theyour email software handles the decoding of programs sent asdecoding of programs sent as attachments it is easy to infect yourattachments it is easy to infect your computer simply by opening ancomputer simply by opening an infected attachment. Always checkinfected attachment. Always check email attachment with an anti-virusemail attachment with an anti-virus program before opening them.program before opening them.
    • There are several reasons why anThere are several reasons why an attachment will not display properly or at all:attachment will not display properly or at all:  the encoded file is corrupted and cannot bethe encoded file is corrupted and cannot be decoded. This is usually due to damage indecoded. This is usually due to damage in transit and happens very seldom thesetransit and happens very seldom these days.days.  the encoding type is not supported by yourthe encoding type is not supported by your e-mail program and so the file cannot bee-mail program and so the file cannot be decoded back to it's original type.decoded back to it's original type.  the attached document was created in athe attached document was created in a program that you don't have on yourprogram that you don't have on your computer or is not a registered file type.computer or is not a registered file type.  the email program has an option set whichthe email program has an option set which automatically locks attached filesautomatically locks attached files
    • TAKE NOTE:TAKE NOTE:  When sending an attachment you shouldWhen sending an attachment you should think about whether the intended recipientthink about whether the intended recipient has the same program on their computer.has the same program on their computer.  When you are sending an attachment toWhen you are sending an attachment to someone you should always use a standardsomeone you should always use a standard encoding process (the one that comes withencoding process (the one that comes with your email program is usally best) and sendyour email program is usally best) and send the document in a format that the recipientthe document in a format that the recipient can view. If in doubt, ask them first by email.can view. If in doubt, ask them first by email.
    • Messaging & ChatMessaging & Chat  Instant MessagingInstant Messaging software, such as ICQsoftware, such as ICQ and MSN allows users to find friends andand MSN allows users to find friends and contacts through the Internet andcontacts through the Internet and communicate with them in real time.communicate with them in real time.  Users maintain a list of contacts which theUsers maintain a list of contacts which the software will notify when they are online andsoftware will notify when they are online and contact is available.contact is available.  To use an instant messaging service it isTo use an instant messaging service it is necessary to have and register softwarenecessary to have and register software available on the Internet. Instant messagingavailable on the Internet. Instant messaging allows you to chat, send messages and filesallows you to chat, send messages and files and various other features but only with peopleand various other features but only with people you choose. Often the software andyou choose. Often the software and registration is free.registration is free.
    • Messaging & ChatMessaging & Chat Cell phones and otherCell phones and other handheld devices that canhandheld devices that can send text messages can usesend text messages can use some messaging services tosome messaging services to post or send a text topost or send a text to websites which can then bewebsites which can then be seen by people using theseen by people using the messaging service. Webmessaging service. Web messaging services likemessaging services like Twitter can also be used toTwitter can also be used to send text messages to cellsend text messages to cell and handheld devices.and handheld devices.
    • Messaging & ChatMessaging & Chat Some services alsoSome services also provide the ability toprovide the ability to connect a microphoneconnect a microphone and video camera to yourand video camera to your computer and talk andcomputer and talk and see your contact. Yoursee your contact. Your contact can talk back andcontact can talk back and see you. Your computersee you. Your computer must be equipped withmust be equipped with speakers or head phonesspeakers or head phones to hear your contact.to hear your contact.
    • Messaging & ChatMessaging & Chat  Internet Relay ChatInternet Relay Chat ((ircirc) allows users to) allows users to participate inparticipate in real-time discussionsreal-time discussions with otherwith other users through the Internet.users through the Internet.  A user logs on to an irc site and then typesA user logs on to an irc site and then types messages and replies to others messages asmessages and replies to others messages as they are written.they are written.  Often an irc discussions has a topic and usersOften an irc discussions has a topic and users will join to discuss this topic. Other ircwill join to discuss this topic. Other irc discussions are free flowing and regardless ofdiscussions are free flowing and regardless of how centred the discussion is it can take somehow centred the discussion is it can take some time to sort out the differenttime to sort out the different threadsthreads ofof discussion in a busy irc.discussion in a busy irc.
    • Messaging & ChatMessaging & Chat  Other software is used for onlineOther software is used for online conferences with a famous orconferences with a famous or knowledgeable person contributing theirknowledgeable person contributing their time to answer questions and presenttime to answer questions and present information in real-time.information in real-time.  Along the same theme are onlineAlong the same theme are online gamegame sitessites where Internet users can competewhere Internet users can compete against other users on the Net.against other users on the Net.
    • Navigating the InternetNavigating the Internet  World Wide WebWorld Wide Web ((WWWWWW) is a collection) is a collection of web pages connected together withof web pages connected together with hyperlinkshyperlinks. Each document or page has. Each document or page has a unique address that allows you to find ita unique address that allows you to find it among the millions of other documentsamong the millions of other documents on theon the WebWeb..  The address is called aThe address is called a UniformUniform Resource LocatorResource Locator ((URLURL) or sometimes) or sometimes aa Uniform Resource IndicatorUniform Resource Indicator ((URIURI).).
    • Navigating the InternetNavigating the Internet  When you chose a newWhen you chose a new linklink by clicking on it orby clicking on it or by typing it into theby typing it into the address fieldaddress field your browseryour browser sends a request for that document and displayssends a request for that document and displays it on the screen.it on the screen.  That link can be to a different section of theThat link can be to a different section of the current document, another document on thecurrent document, another document on the same website as the original or on anothersame website as the original or on another website anywhere in the world.website anywhere in the world.  Web pages are designed usingWeb pages are designed using hypertexthypertext
    • Navigating the InternetNavigating the Internet An example of a link would beAn example of a link would be http://www.grassrootsdesign.com/intro/navigationhttp://www.grassrootsdesign.com/intro/navigation  A link begins with HTTP which stands for HyperText TransferA link begins with HTTP which stands for HyperText Transfer Protocol and describes the type of connection. WWW (WorldProtocol and describes the type of connection. WWW (World Wide Web) is the sub-domain and not always required.Wide Web) is the sub-domain and not always required.  GRASSROOTSDESIGN is the domain name and COM is theGRASSROOTSDESIGN is the domain name and COM is the generic top level domain (gTLD).generic top level domain (gTLD).  Some of the other gTLD are ORG, NET, BIZ, INFO, and NAME.Some of the other gTLD are ORG, NET, BIZ, INFO, and NAME. Everything after the domain name is the path to the specific fileEverything after the domain name is the path to the specific file and/or folder that is being accessed. In the example above 'intro'and/or folder that is being accessed. In the example above 'intro' is the folder and 'navigation' is the file that is being viewed.is the folder and 'navigation' is the file that is being viewed. Hint:Hint: If you are looking for a specific company or organization tryIf you are looking for a specific company or organization try typingtyping www.company name.comwww.company name.com into the address bar to gointo the address bar to go directly to that companies website.directly to that companies website.
    • Navigating the InternetNavigating the Internet  Receiving information, such as a webReceiving information, such as a web page or file, from another computerpage or file, from another computer isis calledcalled downloadingdownloading..  Sending information to another computerSending information to another computer is calledis called uploadinguploading.. To place a web page on a website a webTo place a web page on a website a web developer must upload the file from theirdeveloper must upload the file from their computer to the ISP'scomputer to the ISP's serverserver..
    • Navigating the InternetNavigating the Internet  BeingBeing OnlineOnline means being connectedmeans being connected to another computer, whether thatto another computer, whether that computer is your ISP, your friendscomputer is your ISP, your friends computer across town or a remotecomputer across town or a remote office computer, through a modem, oroffice computer, through a modem, or digital connection.digital connection.  GoingGoing OfflineOffline means disconnectingmeans disconnecting your computer from the remoteyour computer from the remote connection.connection.
    • Search EnginesSearch Engines  make finding things on the Internetmake finding things on the Internet relatively easier.relatively easier.
    • Search EnginesSearch Engines are run by companies thatare run by companies that collect information from thecollect information from the Internet, sort and categorizeInternet, sort and categorize it and present theit and present the information to the userinformation to the user based onbased on keywordkeyword searchessearches or throughor through directory listingsdirectory listings..
    • Search EnginesSearch Engines  It is worth taking some time to learn how toIt is worth taking some time to learn how to make an effective keyword search as themake an effective keyword search as the amount of information that these search enginesamount of information that these search engines provide can be overwhelming.provide can be overwhelming.  It is common to be provided with 10s ofIt is common to be provided with 10s of thousands of references to any given searchthousands of references to any given search term.term.  By narrowing your search to a specific phraseBy narrowing your search to a specific phrase you can target your searches more effectively.you can target your searches more effectively.  Many search engines require that you enclose aMany search engines require that you enclose a search phrase in quotes (e.g. "the cat in thesearch phrase in quotes (e.g. "the cat in the hat").hat").
    • Search EnginesSearch Engines  Some search sites offer directory listings asSome search sites offer directory listings as well.well.  The information is categorized in a hierarchyThe information is categorized in a hierarchy from general categories to specific categories.from general categories to specific categories.  To find a specific web site follow the links downTo find a specific web site follow the links down to the category that matches your interest.to the category that matches your interest.  Though there are hundreds of search enginesThough there are hundreds of search engines on the Internet there are only a couple dozenon the Internet there are only a couple dozen that the majority of people use.that the majority of people use.
    • Website SearchWebsite Search  As well as Internet searches many websitesAs well as Internet searches many websites offer a website search feature to help visitorsoffer a website search feature to help visitors find information on that specific website.find information on that specific website.  Generally there will be a button markedGenerally there will be a button marked 'Search' beside a text field. Enter your query'Search' beside a text field. Enter your query to display links to the pages that match.to display links to the pages that match.
    • News, Discussion & Social NetworkingNews, Discussion & Social Networking Social NetworkingSocial Networking has become a large part ofhas become a large part of the internet.the internet.  Facebook, Twitter, MySpace and otherFacebook, Twitter, MySpace and other services provide areas for like minded peopleservices provide areas for like minded people to communicate.to communicate.  YouTube, Vimeo, Flickr and other mediaYouTube, Vimeo, Flickr and other media services provide space for people to share theirservices provide space for people to share their videos and photos.videos and photos.
    • NewsgroupsNewsgroups  are discussion groups that are going on allare discussion groups that are going on all the time.the time. You can write a message andYou can write a message and postpost it to ait to a newsgroup in the morning and come backnewsgroup in the morning and come back to read ato read a replyreply to the message in theto the message in the afternoon. You can also reply to other'safternoon. You can also reply to other's messages.messages.
    • NewsgroupsNewsgroups There are thousands of newsThere are thousands of news groups covering as manygroups covering as many topics. Some aretopics. Some are moderatedmoderated,, meaning that a person whomeaning that a person who has knowledge or an interest inhas knowledge or an interest in a certain topic will receive thea certain topic will receive the message and read it beforemessage and read it before posting it.posting it.
    • As well as the public newsgroups manyAs well as the public newsgroups many organizations and companies will provideorganizations and companies will provide discussion groups or bulletin boards whichdiscussion groups or bulletin boards which focus on areas related to their own topics.focus on areas related to their own topics.
    • NewsgroupsNewsgroups One problem with posting a message toOne problem with posting a message to a discussion or newsgroup is thata discussion or newsgroup is that unscrupulous companies mine theunscrupulous companies mine the newsgroups for email addresses andnewsgroups for email addresses and then send unsolicited email (spam) tothen send unsolicited email (spam) to the poster.the poster. It is recommended that you disguise yourIt is recommended that you disguise your email address using your email softwareemail address using your email software preferences or the bulletin board settings.preferences or the bulletin board settings.
    • NewsgroupsNewsgroups Many newsgroups have a publicly accessibleMany newsgroups have a publicly accessible faqfaq.. A faq is a collection of frequently askedA faq is a collection of frequently asked questions that have been posted manyquestions that have been posted many times to a newsgroup.times to a newsgroup. You may get a gentle reminder or aYou may get a gentle reminder or a completely rude and insulting commentcompletely rude and insulting comment if you post a question that is on the faq.if you post a question that is on the faq. It is acceptable to post a question asIt is acceptable to post a question as where the faq is located and you maywhere the faq is located and you may find that frequent posters will mentionfind that frequent posters will mention the faq in their message.the faq in their message.
    • ECommerceECommerce Electronic Transactions on the InternetElectronic Transactions on the Internet are becoming common place. Books,are becoming common place. Books, software and even groceries can be boughtsoftware and even groceries can be bought and sold with the click of a buttonand sold with the click of a button ((and a credit cardand a credit card).). The biggest problem with doing business over theThe biggest problem with doing business over the Internet is the lack ofInternet is the lack of common standardscommon standards aroundaround securitysecurity. There are dozens of different standards. There are dozens of different standards involving hundreds of different methods.involving hundreds of different methods.
    • ECommerceECommerce The Internet, by it's nature, is anThe Internet, by it's nature, is an openopen systemsystem which means that information canwhich means that information can flow freely from one computer to the next.flow freely from one computer to the next. Information transmitted through the InternetInformation transmitted through the Internet can be intercepted and copied as any pointcan be intercepted and copied as any point along the path.along the path. For this reason it is not a good idea to send confidential information like credit card numbers through the Internet the same way you might send an email to a friend. In order to send confidential information you must be sure that your private information can not be
    • ECommerceECommerce  The most common method isThe most common method is SecureSecure Sockets LayerSockets Layer (SSL). A transaction(SSL). A transaction computer with an order form for thecomputer with an order form for the product that you wish to purchaseproduct that you wish to purchase creates a secure connection whichcreates a secure connection which ensures that all the information that youensures that all the information that you send to it is not accessible to anyonesend to it is not accessible to anyone else.else.  If information from a secure connectionIf information from a secure connection is intercepted it will beis intercepted it will be encryptedencrypted making it useless to persons withmaking it useless to persons with malicious intent.malicious intent.
    • ECommerceECommerce  Another model is theAnother model is the Secure ElectronicSecure Electronic TransactionTransaction (SET). This model requires that the(SET). This model requires that the customer download and install acustomer download and install a walletwallet intointo which they enter their password protected creditwhich they enter their password protected credit card information.card information.  The SET system development was promoted byThe SET system development was promoted by the major credit card companies to provide athe major credit card companies to provide a safe and secure environment for onlinesafe and secure environment for online transactions.transactions.
    • ECommerceECommerce  The SET "wallet" model requires that theThe SET "wallet" model requires that the customer obtain acustomer obtain a Digital CertificateDigital Certificate from afrom a Certified AuthorityCertified Authority (CA) which they then use to(CA) which they then use to perform the transaction. The Certified Authority,perform the transaction. The Certified Authority, usually the bank or financial institution that theusually the bank or financial institution that the customer deals with, verifies the validity of thecustomer deals with, verifies the validity of the Certificate to the merchant.Certificate to the merchant.  The customer enters their personalizedThe customer enters their personalized password to verify that they have the authority topassword to verify that they have the authority to use the Certificate and the transaction is made.use the Certificate and the transaction is made.  This model allows customers to use their creditThis model allows customers to use their credit cards to purchase items from merchants withoutcards to purchase items from merchants without transmitting their actual credit card details to thetransmitting their actual credit card details to the merchant.merchant.
    • ECommerceECommerce  The merchant uses their merchant agreementThe merchant uses their merchant agreement with the credit card company to completewith the credit card company to complete transactions, process refunds and verify thetransactions, process refunds and verify the validity of the customers credit card information.validity of the customers credit card information.  Though still in its infancy, many billingThough still in its infancy, many billing companies have begun Internet transactioncompanies have begun Internet transaction projects using the SET model to allow theirprojects using the SET model to allow their customers to pay their bills, check their accountcustomers to pay their bills, check their account status and much more.status and much more.
    • Internet Service Provider (ISP)Internet Service Provider (ISP) AnAn ISPISP is a company thatis a company that supplies Internet connectivity tosupplies Internet connectivity to home and business customers.home and business customers. ISPs support one or moreISPs support one or more forms of Internet access,forms of Internet access, ranging from traditional modemranging from traditional modem dial-up to DSL and cabledial-up to DSL and cable modem broadband service tomodem broadband service to dedicated T1/T3 lines.dedicated T1/T3 lines.
    • Internet Service Provider (ISP)Internet Service Provider (ISP)  There are often a choice of ISP's to choose from.There are often a choice of ISP's to choose from. Service can be provided through telephone lines,Service can be provided through telephone lines, cable, wireless or satellite.cable, wireless or satellite. Wireless Internet service providersWireless Internet service providers or WISPsor WISPs have emerged that offer Internet access throughhave emerged that offer Internet access through wireless LAN or wireless broadband networks.wireless LAN or wireless broadband networks.  Once you have purchased an account with an ISPOnce you have purchased an account with an ISP you will be given anyou will be given an account nameaccount name. This is often. This is often youryour email addressemail address as well. You will also be givenas well. You will also be given aa passwordpassword and should also be provided withand should also be provided with instructions on how to change the password to ainstructions on how to change the password to a unique and personalized.unique and personalized.
    • Internet Service Provider (ISP)Internet Service Provider (ISP)  The ISP will also provide information onThe ISP will also provide information on how tohow to configureconfigure youryour softwaresoftware..  This can be as simple as inserting a diskThis can be as simple as inserting a disk and following the steps or using a moreand following the steps or using a more difficult process of entering the settingsdifficult process of entering the settings manually.manually.  Once you have configured your internetOnce you have configured your internet connection simply run the software toconnection simply run the software to connect your computer to your ISPconnect your computer to your ISP giving you access to the Internet.giving you access to the Internet.
    • Pieces of software that work together toPieces of software that work together to connect you to the Internetconnect you to the Internet 1.1. The first and most complicated is theThe first and most complicated is the dialerdialer oror socketsocket softwaresoftware. This is the software that makes the. This is the software that makes the physical connection with the ISP's computer and thephysical connection with the ISP's computer and the internet.internet. 2.2. The second piece is a modem. The modem can beThe second piece is a modem. The modem can be analog and use the old style phone lines or digitalanalog and use the old style phone lines or digital and use digital lines, cables or wireless signals toand use digital lines, cables or wireless signals to connect.connect. 3.3. The third piece is software. The most commonThe third piece is software. The most common software programs are websoftware programs are web browserbrowser andand emailemail programs but there are many software programs thatprograms but there are many software programs that need internet access.need internet access.
    • Different ISPsDifferent ISPs 1.1. If you attend a university or college orIf you attend a university or college or belong to a military or governmentbelong to a military or government organization you can most likely getorganization you can most likely get Internet accessInternet access through your school orthrough your school or work.work. 2.2. If not you will most likely buy access fromIf not you will most likely buy access from aa commercial providercommercial provider.. 3.3. Another option, if you are in a majorAnother option, if you are in a major center, is thecenter, is the FreenetFreenet..
    • File TransferringFile Transferring  File Transfer ProtocolFile Transfer Protocol ((FTPFTP) allows) allows users to transfer files and documentsusers to transfer files and documents from one computer to another.from one computer to another.  There are a few different softwareThere are a few different software programs that will make this processprograms that will make this process quite simple.quite simple.  If you are designing a website you canIf you are designing a website you can use ftp to update your website.use ftp to update your website.
    • Computer users can also use an ftp programComputer users can also use an ftp program to download files and software off theto download files and software off the internet.internet. Many companies and universities offer ftp sitesMany companies and universities offer ftp sites that contain software which can be downloadedthat contain software which can be downloaded and used on your computer.and used on your computer. A search for 'ftp' will display dozens of ftp programs thatA search for 'ftp' will display dozens of ftp programs that can be used to download software.can be used to download software.
    • Most website hosting companies provide aMost website hosting companies provide a file manager which is a program that allowsfile manager which is a program that allows website owners to manage the files on theirwebsite owners to manage the files on their website including copying files from awebsite including copying files from a computer to a website.computer to a website.
    • REFERENCESREFERENCES Important Internet FeaturesImportant Internet Features LivingInternet.comLivingInternet.com.. http://http://www.livinginternet.com/tindex_p.htmwww.livinginternet.com/tindex_p.htm A Learner's Guide to the Computer – GrassRootsDesignwww.grassrootsdesign.com/ intro/ ISP - Internet Service Providers. Bradley Mitchell, About.com Guide http://compnetworking.about.com/od/http://compnetworking.about.com/od/ internetaccessbestuses/g/bldef_isp.htminternetaccessbestuses/g/bldef_isp.htm