6. It is reported that the first thing that
90 % of Internet users do when they
connected to the net is to check if they
have received any emails. Internet has
drastically changed the mail pattern
and has made it incredibly fast.
7. It is hard to find an Internet user, who has not
used it to download music and movies. Apart from
it, there are lots of other things that can be
downloaded using internet as well.
8. If you are not sure about something, then one
of the easiest way to know more about it is by
searching it on internet. Internet has got a
huge database of information on almost every
subject and one can easily find out lots of
information on any topic using internet.
9.
10. The use of internet is not limited merely to
booking tickets. With help of net, you can do
a full-fledged online shopping. On popular e-
stores like Ebay, Amazon etc., one can find
almost anything that he needs to buy. These
e-stores are reliable and you can find quality
products at most competitive rates on them;
and all this can be done without even
stepping out of your home!
11.
12. Banking was never so easy and convenient
before! Right from opening an account to
operating it, E-Banking has really been a big
boon for everyone. Not only can one view his
account activities but he can also execute online
transactions from the comfort of the home.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25. TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic
communication language or protocol of the Internet. It can also be used as a
communications protocol in a private network (either an intranet or an extranet).
When you are set up with direct access to the Internet, your computer is provided
with a copy of the TCP/IP program just as every other computer that you may send
messages to or get information from also has a copy of TCP/IP. TCP/IP is a two-layer
program. The higher layer, Transmission Control Protocol, manages the assembling
of a message or file into smaller packets that are transmitted over the Internet and
received by a TCP layer that reassembles the packets into the original message. The
lower layer, Internet Protocol, handles theaddress part of each packet so that it gets
to the right destination.
26. A network address is a key networking a device over a network. It has several
forms, including the Internet Protocol (IP) address, media access control (MAC)
address and host address.
Computers on a network use a network address to identify, locate and address
other computers. Besides individual devices, a network address is typically unique
for each interface; for example, a computer's Wi-Fi and local area network (LAN)
card has separate network addresses.
A network address is also known as the numerical network part of an IP address.
This is used to distinguish a network that has its own hosts and addresses. For
example, in the IP address 192.168.1.0, the network address is 192.168.1. technology
component that facilitates identifying a network node/device and reaching to it
27. network address function
205.254.211.0/24 public ISP-allocated network
192.168.100.0/24 internal server network
192.168.99.0/24 main office desktop network
192.168.98.0/24 branch office desktop network
Example Network Addressing
28. Step 1: Click on windows key+ R key on the keyboard at the same time.
Step 2: Type ncpa.cpl in the box, then press OK.
Step 3: Select the local area connection, right click it and select Properties.
Step 4: Select Internet Protocol Version 4(TCP/IPv4), double click it or
click Properties.
.
29. Step 5:
There are two ways to configure the TCP/IP Properties, Assigned by DHCP server
automatically or manually.
1. Assigned by DHCP server
Select Obtain an IP address automatically and Obtain DNS server address automatically.
If necessary, then click OK to save the settings.
2. Assigned manually
1) Select Use the following IP address, type IP address, subnet mask and default gateway
IP address into it.
If the router’s LAN IP address is 192.168.1.1, please type in IP address 192.168.1.x (x is from
2 to 253), subnet mask 255.255.255.0, and default gateway 192.168.1.1.
2) Select Use the following DNS server addresses, as shown in the following figure. And
then type the DNS server IP address, which should be provided by your ISP. If necessary,
then click OK to save the settings.
Step 6:
Click OK to save and apply your settings.
30. The domain name system (DNS) maps internet domain
names to the internet protocol (IP) network addresses they
represent and enables websites to use names, rather than
difficult-to-remember IP addressesDomain names give
people a more intuitive way to access content or services than IP
addresses: www.techtarget.com instead of 206.19.49.149,.
31.
32. Short for electronic mail, e-mail oremail is information
stored on a computer that is exchanged between two users
over telecommunications. More plainly, e-mail is a message
that may contain text, files, images, or
other attachments sent through a network to a specified
individual or group of individuals.
33. HTTP is short
for HyperTextTransfer Protocol. HTTP is the
underlying protocol used by theWorld Wide
Web and this protocol defines how messages
are formatted and transmitted, and what
actions Web servers andbrowsers should
take in response to various commands.
34. URL is the abbreviation of Uniform Resource Locator.
It is the global address of documents and
other resources on the World Wide Web. For example,
www.webopedia.com is a URL. A URL is one type
of Uniform Resource Identifier (URI); the generic term
for all types of names and addresses that refer to objects
on the World Wide Web.
35. File Transfer Protocol (FT
P) is the commonly
used protocol for
exchanging files over
the Internet. FTP uses the
Internet's TCP/IP
protocols to enable data
transfer. FTP uses a client-
server architecture, often
secured with SSL/TLS.
FTP promotes sharing of
files via remote computers
with reliable and efficient
data transfer.
38. Cyber crime encompasses any criminal act dealing
with computersand networks (called hacking). Additionally, cyber
crime also includes traditional crimes conducted through
the Internet. For example; hate crimes, telemarketing and Internet
fraud, identity theft, and credit card account thefts are considered to
be cyber crimes when the illegal activities are committed through the
use of a computer and the Internet.