SlideShare a Scribd company logo
1 of 32
Web Browsing and
Communication
BY HASSAN AYAD
TA, Cairo University
Web Browsing and Communication
Web Browsing Communication
2
Web Browsing
 The Internet
 Using the Browser
 Using the Web
 Web Outputs
3
Communication
 Electronic Communication
 Using e-mail
 E-mail Management
4
The Internet
5
Concepts/Terms
set of millions of
computers
worldwide,
connected to the
network with a
purpose of
exchanging data
among users
World Wide Web – one
of the services on the
Internet which we use
to browse web pages
(set of HTML
documents connected
with hyperlinks)
Hypertext Transfer
Protocol – protocol
(rules) that allows
transmission of
information
contained on the Web
Internet WWW HTTP
6
Concepts/Terms
Uniform Resource
Locator An
address that
directs your
request to the
appropriate
server
and directory
A special type of
text string that
accesses a file or
page by simply
clicking the link
A company that
provides access
to the Internet,
usually for a fee
The protocol used
to exchange (a
form of
downloading)
files via the
Internet
URL Hyperlink ISP FTP
7
Web Address Structure
 Web address elements of the URL http://www.ITdesk.info are:
 http - protocol (rules of transmission)
 www – type of service available on the Internet
 ITdesk –domain name
 info –top-level domain
 Site types (.com, .gov, .edu, .org)
 International domains (.hr, .si, .it, .de…) are ccTLD - country code top-level
domain
8
What is a web browser?
 Web browser is a software (program) which allows us to browse web pages.
 Some web browsers are: Mozilla Firefox, Opera, Safari, Internet Explorer,
Google Chrome etc.
9
What's a Search Engine?
 A search engine is software that runs a keyword or phrase search on Internet
documents.
 Some web browsers are: google, yahoo, bing, etc.
10
RSS & Podcast
 RSS (Really Simple Syndication) is a method used to publish information that
needs to be frequently updated.
 You can view a demo on RSS in the uploaded slides RSS.pptx
 Podcast is a recording of a radio broadcast or a video that can be taken from
the internet
 You can view a demo on Podcast in the uploaded slides Podcast.pptx
11
Security Consideration
 Protected Web site requires use of username and password.
 Https and lock symbol identify a secure website.
12
 Digital certificate proves the identity of a website.
 Encryption is a means of 'scrambling' a message or web page
13
Security Consideration
Security Consideration
 Malware is a software such as a virus on a computer or
computer network that the user does not know about or want.
 Install antivirus and update regularly.
 Firewall is program that controls and protects ports, allowing
only authorized communication.
14
Security Consideration
 Risk associated with online activities:
 Unintentional disclosure of personal information.
 Bullying or harassment.
 Targeting of users by predators .
15
Security Consideration
 Parental control options
 Supervision
 Web browsing
 Computer games restrictions
 Computer usage time limits.
 You can view a demo on Parental Control in
the uploaded slides PC.pptx
16
Using the Browser/The Web &
Web Output
17
Using Internet Explorer
 You can view a demo on using IE
browser in the uploaded slides
IE.pptx
18
Electronic Communication
19
What is an E-mail?
20
E-mail Structure
 Structure of an e-mail address is:
 user name,
 @ symbol,
 domain name (name of the computer on the Internet where mail will be delivered
to the recipient)
 top-level domain
21
SMS & VoIP
 SMS (Short Message Service) allows you to send and receive text messages
between mobile (cell) phones.
 VoIP(Voice over Internet Protocol ) is a technology that allows you to talk with
other people via the Internet.
22
IM
 Instant messaging (IM) provides a mechanism for real-time communication
between two or more people sending text messages via their computers.
 Benefits of IM:
 Real-time communication
 Knowing whether contacts are online
 Low cost
 Ability to transfer files
23
Online Virtual Community
Social
Networking
Internet
Forums
Chat
Rooms
Online
Computer
Games
24
Security Considerations
 Be aware of the possibility receiving a fraudulent and unsolicited e-mail.
 Phishing refers to efforts to trick you into revealing your personal or financial
information.
 Be aware of the danger of infecting the computer with a virus by opening an
unrecognized e-mail message, by opening an attachment.
25
Security Considerations
A digital signature
 Information on an electronic
message that proves who the
person sending the message is
Sign with your Digital Signature
26
Advantages of E-mail
 E-mail system has many advantages like:
 Speed of delivery
 Low cost
 Flexibility of using web-based e-mail account in different locations.
27
Network Etiquette (Netiquette)
 Netiquette includes:
 Using accurate and brief descriptions in e-mail message subject fields
 Brevity in e-mail responses
 Spell checking outgoing e-mail, etc.
28
E-mail with attachment
 When sending file attachments, you may encounter problem like:
 File size limits
 File type restrictions (for example, executable)
29
Differences between TO, CC, BCC
 When you send an e-mail, specify contacts with the headers TO, CC, BCC as
the following:
 TO: People for which the message is aimed specifically.
 CC (Carbon file): People to whom a copy of the email will be delivered, but they
are notified with all addresses the message is sent to.
 BCC (Blind Carbon file): People to whom a copy of the email will be delivered, but
they don’t know which addresses the message is sent to.
30
Using E-mail & E-mail Management
31
Using E-mail & E-mail Management
 You can view a demo on using the
Outlook email in the uploaded
slides outlook.pptx
32

More Related Content

What's hot

E learning
E learningE learning
E learningsspink
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Internet ppt
Internet pptInternet ppt
Internet ppttej_vish
 
Benefits of Internet
Benefits of Internet Benefits of Internet
Benefits of Internet yogini sharma
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetASIT Education
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetPravinGhosekar
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNETSaleh Ibne Omar
 
Advantages and Disadvantages of Internet
Advantages and Disadvantages of InternetAdvantages and Disadvantages of Internet
Advantages and Disadvantages of InternetBAS ADITYA SRINIVAS
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital TechnologySukanya Ben
 

What's hot (20)

E learning
E learningE learning
E learning
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
Benefits of Internet
Benefits of Internet Benefits of Internet
Benefits of Internet
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Elearning.ppt
Elearning.pptElearning.ppt
Elearning.ppt
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNET
 
Internet
InternetInternet
Internet
 
Advantages and Disadvantages of Internet
Advantages and Disadvantages of InternetAdvantages and Disadvantages of Internet
Advantages and Disadvantages of Internet
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Ecdl v5 module 7 print
Ecdl v5 module 7 printEcdl v5 module 7 print
Ecdl v5 module 7 printMichael Lew
 
ECDL Level 2 - Introduction for students
ECDL Level 2 - Introduction for studentsECDL Level 2 - Introduction for students
ECDL Level 2 - Introduction for studentsDavid Drake
 
Ecdl v5 module 2 print
Ecdl v5 module 2 printEcdl v5 module 2 print
Ecdl v5 module 2 printMichael Lew
 
ECDL module 5: using databases [To be continued]
ECDL module 5: using databases [To be continued] ECDL module 5: using databases [To be continued]
ECDL module 5: using databases [To be continued] Hassan Ayad
 
Ecdl v5 module 6 print
Ecdl v5 module 6 printEcdl v5 module 6 print
Ecdl v5 module 6 printMichael Lew
 
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...Michael Lew
 
Ecdl v5 module 4 print
Ecdl v5 module 4 printEcdl v5 module 4 print
Ecdl v5 module 4 printMichael Lew
 
Ecdl v5 module 3 print
Ecdl v5 module 3 printEcdl v5 module 3 print
Ecdl v5 module 3 printMichael Lew
 
Ecdl v5 module 1 print
Ecdl v5 module 1 printEcdl v5 module 1 print
Ecdl v5 module 1 printMichael Lew
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...Michael Lew
 
Parental Control Demo
Parental Control DemoParental Control Demo
Parental Control DemoHassan Ayad
 
Creating a basic database access 2007 ecdl
Creating a basic database access 2007 ecdlCreating a basic database access 2007 ecdl
Creating a basic database access 2007 ecdlRichard Butler
 

Viewers also liked (20)

Ecdl v5 module 7 print
Ecdl v5 module 7 printEcdl v5 module 7 print
Ecdl v5 module 7 print
 
ECDL Level 2 - Introduction for students
ECDL Level 2 - Introduction for studentsECDL Level 2 - Introduction for students
ECDL Level 2 - Introduction for students
 
Ecdl v5 module 2 print
Ecdl v5 module 2 printEcdl v5 module 2 print
Ecdl v5 module 2 print
 
ECDL module 5: using databases [To be continued]
ECDL module 5: using databases [To be continued] ECDL module 5: using databases [To be continued]
ECDL module 5: using databases [To be continued]
 
Ecdl v5 module 6 print
Ecdl v5 module 6 printEcdl v5 module 6 print
Ecdl v5 module 6 print
 
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
 
994187 mod 1
994187 mod 1994187 mod 1
994187 mod 1
 
Ecdl v5 module 4 print
Ecdl v5 module 4 printEcdl v5 module 4 print
Ecdl v5 module 4 print
 
Ecdl v5 module 3 print
Ecdl v5 module 3 printEcdl v5 module 3 print
Ecdl v5 module 3 print
 
Ecdl v5 module 1 print
Ecdl v5 module 1 printEcdl v5 module 1 print
Ecdl v5 module 1 print
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
Rss Demo
Rss DemoRss Demo
Rss Demo
 
Parental Control Demo
Parental Control DemoParental Control Demo
Parental Control Demo
 
The Art Of TeleWorking
The Art Of TeleWorkingThe Art Of TeleWorking
The Art Of TeleWorking
 
Creating a basic database access 2007 ecdl
Creating a basic database access 2007 ecdlCreating a basic database access 2007 ecdl
Creating a basic database access 2007 ecdl
 
Another one on Email...
Another one on Email...Another one on Email...
Another one on Email...
 
ICDL MODULE 1 Lesson 6
ICDL MODULE 1 Lesson 6ICDL MODULE 1 Lesson 6
ICDL MODULE 1 Lesson 6
 
ICDL MODULE 1 Lesson 5
ICDL MODULE 1 Lesson 5ICDL MODULE 1 Lesson 5
ICDL MODULE 1 Lesson 5
 
ICDL MODULE 1 Lesson 4
ICDL MODULE 1 Lesson 4ICDL MODULE 1 Lesson 4
ICDL MODULE 1 Lesson 4
 
ICDL MODULE 1 Lesson 8
ICDL MODULE 1 Lesson 8ICDL MODULE 1 Lesson 8
ICDL MODULE 1 Lesson 8
 

Similar to ECDL Module 7: Web Browsing and Communication

Online security & encryption
Online security & encryptionOnline security & encryption
Online security & encryptionQamar Farooq
 
What Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika BhatiaWhat Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika Bhatiakulachihansraj
 
Access and use of internet of level 1 course
Access and use of internet of level 1 courseAccess and use of internet of level 1 course
Access and use of internet of level 1 courseAbdirisakIman
 
Ch12(revised 20071226)
Ch12(revised 20071226)Ch12(revised 20071226)
Ch12(revised 20071226)華穗 徐
 
Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using OutlookMichael Lew
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-securityMarya Sholevar
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetFarhanMalik93
 
Introduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTIntroduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTOsama Yousaf
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolAfnic
 
Fundamental concept of Internet with terminology.pptx
Fundamental concept of Internet with terminology.pptxFundamental concept of Internet with terminology.pptx
Fundamental concept of Internet with terminology.pptxNikkiGupta28
 
Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,Megha V
 
Fundamental concept of Internet with terminology.pptx
Fundamental concept of Internet with terminology.pptxFundamental concept of Internet with terminology.pptx
Fundamental concept of Internet with terminology.pptxNikkiGupta28
 

Similar to ECDL Module 7: Web Browsing and Communication (20)

Online security & encryption
Online security & encryptionOnline security & encryption
Online security & encryption
 
What Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika BhatiaWhat Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika Bhatia
 
Access and use of internet of level 1 course
Access and use of internet of level 1 courseAccess and use of internet of level 1 course
Access and use of internet of level 1 course
 
Cit121lec03
Cit121lec03Cit121lec03
Cit121lec03
 
Internet
InternetInternet
Internet
 
Ch12(revised 20071226)
Ch12(revised 20071226)Ch12(revised 20071226)
Ch12(revised 20071226)
 
Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using Outlook
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Web Terminology
Web TerminologyWeb Terminology
Web Terminology
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
Introduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTIntroduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPT
 
The Internet
The InternetThe Internet
The Internet
 
Computer Introduction-Lecture07
Computer Introduction-Lecture07Computer Introduction-Lecture07
Computer Introduction-Lecture07
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
 
Fundamental concept of Internet with terminology.pptx
Fundamental concept of Internet with terminology.pptxFundamental concept of Internet with terminology.pptx
Fundamental concept of Internet with terminology.pptx
 
Beekman5 std ppt_10
Beekman5 std ppt_10Beekman5 std ppt_10
Beekman5 std ppt_10
 
Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,
 
Fundamental concept of Internet with terminology.pptx
Fundamental concept of Internet with terminology.pptxFundamental concept of Internet with terminology.pptx
Fundamental concept of Internet with terminology.pptx
 
Int d 1
Int d 1Int d 1
Int d 1
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

ECDL Module 7: Web Browsing and Communication

  • 1. Web Browsing and Communication BY HASSAN AYAD TA, Cairo University
  • 2. Web Browsing and Communication Web Browsing Communication 2
  • 3. Web Browsing  The Internet  Using the Browser  Using the Web  Web Outputs 3
  • 4. Communication  Electronic Communication  Using e-mail  E-mail Management 4
  • 6. Concepts/Terms set of millions of computers worldwide, connected to the network with a purpose of exchanging data among users World Wide Web – one of the services on the Internet which we use to browse web pages (set of HTML documents connected with hyperlinks) Hypertext Transfer Protocol – protocol (rules) that allows transmission of information contained on the Web Internet WWW HTTP 6
  • 7. Concepts/Terms Uniform Resource Locator An address that directs your request to the appropriate server and directory A special type of text string that accesses a file or page by simply clicking the link A company that provides access to the Internet, usually for a fee The protocol used to exchange (a form of downloading) files via the Internet URL Hyperlink ISP FTP 7
  • 8. Web Address Structure  Web address elements of the URL http://www.ITdesk.info are:  http - protocol (rules of transmission)  www – type of service available on the Internet  ITdesk –domain name  info –top-level domain  Site types (.com, .gov, .edu, .org)  International domains (.hr, .si, .it, .de…) are ccTLD - country code top-level domain 8
  • 9. What is a web browser?  Web browser is a software (program) which allows us to browse web pages.  Some web browsers are: Mozilla Firefox, Opera, Safari, Internet Explorer, Google Chrome etc. 9
  • 10. What's a Search Engine?  A search engine is software that runs a keyword or phrase search on Internet documents.  Some web browsers are: google, yahoo, bing, etc. 10
  • 11. RSS & Podcast  RSS (Really Simple Syndication) is a method used to publish information that needs to be frequently updated.  You can view a demo on RSS in the uploaded slides RSS.pptx  Podcast is a recording of a radio broadcast or a video that can be taken from the internet  You can view a demo on Podcast in the uploaded slides Podcast.pptx 11
  • 12. Security Consideration  Protected Web site requires use of username and password.  Https and lock symbol identify a secure website. 12
  • 13.  Digital certificate proves the identity of a website.  Encryption is a means of 'scrambling' a message or web page 13 Security Consideration
  • 14. Security Consideration  Malware is a software such as a virus on a computer or computer network that the user does not know about or want.  Install antivirus and update regularly.  Firewall is program that controls and protects ports, allowing only authorized communication. 14
  • 15. Security Consideration  Risk associated with online activities:  Unintentional disclosure of personal information.  Bullying or harassment.  Targeting of users by predators . 15
  • 16. Security Consideration  Parental control options  Supervision  Web browsing  Computer games restrictions  Computer usage time limits.  You can view a demo on Parental Control in the uploaded slides PC.pptx 16
  • 17. Using the Browser/The Web & Web Output 17
  • 18. Using Internet Explorer  You can view a demo on using IE browser in the uploaded slides IE.pptx 18
  • 20. What is an E-mail? 20
  • 21. E-mail Structure  Structure of an e-mail address is:  user name,  @ symbol,  domain name (name of the computer on the Internet where mail will be delivered to the recipient)  top-level domain 21
  • 22. SMS & VoIP  SMS (Short Message Service) allows you to send and receive text messages between mobile (cell) phones.  VoIP(Voice over Internet Protocol ) is a technology that allows you to talk with other people via the Internet. 22
  • 23. IM  Instant messaging (IM) provides a mechanism for real-time communication between two or more people sending text messages via their computers.  Benefits of IM:  Real-time communication  Knowing whether contacts are online  Low cost  Ability to transfer files 23
  • 25. Security Considerations  Be aware of the possibility receiving a fraudulent and unsolicited e-mail.  Phishing refers to efforts to trick you into revealing your personal or financial information.  Be aware of the danger of infecting the computer with a virus by opening an unrecognized e-mail message, by opening an attachment. 25
  • 26. Security Considerations A digital signature  Information on an electronic message that proves who the person sending the message is Sign with your Digital Signature 26
  • 27. Advantages of E-mail  E-mail system has many advantages like:  Speed of delivery  Low cost  Flexibility of using web-based e-mail account in different locations. 27
  • 28. Network Etiquette (Netiquette)  Netiquette includes:  Using accurate and brief descriptions in e-mail message subject fields  Brevity in e-mail responses  Spell checking outgoing e-mail, etc. 28
  • 29. E-mail with attachment  When sending file attachments, you may encounter problem like:  File size limits  File type restrictions (for example, executable) 29
  • 30. Differences between TO, CC, BCC  When you send an e-mail, specify contacts with the headers TO, CC, BCC as the following:  TO: People for which the message is aimed specifically.  CC (Carbon file): People to whom a copy of the email will be delivered, but they are notified with all addresses the message is sent to.  BCC (Blind Carbon file): People to whom a copy of the email will be delivered, but they don’t know which addresses the message is sent to. 30
  • 31. Using E-mail & E-mail Management 31
  • 32. Using E-mail & E-mail Management  You can view a demo on using the Outlook email in the uploaded slides outlook.pptx 32