This document discusses web browsing and communication. It covers topics like how the internet works, using browsers, web addresses, search engines, RSS, podcasts, email structure, instant messaging, social networking, and security considerations online. Specifically, it defines key terms, explains how to browse the web and send/receive emails, and discusses best practices for safe and polite online communication.
6. Concepts/Terms
set of millions of
computers
worldwide,
connected to the
network with a
purpose of
exchanging data
among users
World Wide Web – one
of the services on the
Internet which we use
to browse web pages
(set of HTML
documents connected
with hyperlinks)
Hypertext Transfer
Protocol – protocol
(rules) that allows
transmission of
information
contained on the Web
Internet WWW HTTP
6
7. Concepts/Terms
Uniform Resource
Locator An
address that
directs your
request to the
appropriate
server
and directory
A special type of
text string that
accesses a file or
page by simply
clicking the link
A company that
provides access
to the Internet,
usually for a fee
The protocol used
to exchange (a
form of
downloading)
files via the
Internet
URL Hyperlink ISP FTP
7
8. Web Address Structure
Web address elements of the URL http://www.ITdesk.info are:
http - protocol (rules of transmission)
www – type of service available on the Internet
ITdesk –domain name
info –top-level domain
Site types (.com, .gov, .edu, .org)
International domains (.hr, .si, .it, .de…) are ccTLD - country code top-level
domain
8
9. What is a web browser?
Web browser is a software (program) which allows us to browse web pages.
Some web browsers are: Mozilla Firefox, Opera, Safari, Internet Explorer,
Google Chrome etc.
9
10. What's a Search Engine?
A search engine is software that runs a keyword or phrase search on Internet
documents.
Some web browsers are: google, yahoo, bing, etc.
10
11. RSS & Podcast
RSS (Really Simple Syndication) is a method used to publish information that
needs to be frequently updated.
You can view a demo on RSS in the uploaded slides RSS.pptx
Podcast is a recording of a radio broadcast or a video that can be taken from
the internet
You can view a demo on Podcast in the uploaded slides Podcast.pptx
11
12. Security Consideration
Protected Web site requires use of username and password.
Https and lock symbol identify a secure website.
12
13. Digital certificate proves the identity of a website.
Encryption is a means of 'scrambling' a message or web page
13
Security Consideration
14. Security Consideration
Malware is a software such as a virus on a computer or
computer network that the user does not know about or want.
Install antivirus and update regularly.
Firewall is program that controls and protects ports, allowing
only authorized communication.
14
15. Security Consideration
Risk associated with online activities:
Unintentional disclosure of personal information.
Bullying or harassment.
Targeting of users by predators .
15
16. Security Consideration
Parental control options
Supervision
Web browsing
Computer games restrictions
Computer usage time limits.
You can view a demo on Parental Control in
the uploaded slides PC.pptx
16
21. E-mail Structure
Structure of an e-mail address is:
user name,
@ symbol,
domain name (name of the computer on the Internet where mail will be delivered
to the recipient)
top-level domain
21
22. SMS & VoIP
SMS (Short Message Service) allows you to send and receive text messages
between mobile (cell) phones.
VoIP(Voice over Internet Protocol ) is a technology that allows you to talk with
other people via the Internet.
22
23. IM
Instant messaging (IM) provides a mechanism for real-time communication
between two or more people sending text messages via their computers.
Benefits of IM:
Real-time communication
Knowing whether contacts are online
Low cost
Ability to transfer files
23
25. Security Considerations
Be aware of the possibility receiving a fraudulent and unsolicited e-mail.
Phishing refers to efforts to trick you into revealing your personal or financial
information.
Be aware of the danger of infecting the computer with a virus by opening an
unrecognized e-mail message, by opening an attachment.
25
26. Security Considerations
A digital signature
Information on an electronic
message that proves who the
person sending the message is
Sign with your Digital Signature
26
27. Advantages of E-mail
E-mail system has many advantages like:
Speed of delivery
Low cost
Flexibility of using web-based e-mail account in different locations.
27
28. Network Etiquette (Netiquette)
Netiquette includes:
Using accurate and brief descriptions in e-mail message subject fields
Brevity in e-mail responses
Spell checking outgoing e-mail, etc.
28
29. E-mail with attachment
When sending file attachments, you may encounter problem like:
File size limits
File type restrictions (for example, executable)
29
30. Differences between TO, CC, BCC
When you send an e-mail, specify contacts with the headers TO, CC, BCC as
the following:
TO: People for which the message is aimed specifically.
CC (Carbon file): People to whom a copy of the email will be delivered, but they
are notified with all addresses the message is sent to.
BCC (Blind Carbon file): People to whom a copy of the email will be delivered, but
they don’t know which addresses the message is sent to.
30