SlideShare a Scribd company logo
1 of 21
Navigating the Internet
What is protocol?
 Communication between networks or data
    transfer between networks and computers
    along internet




9/17/2012 8:33 AM                             2
TCP/IP               (Transmission Control Protocol/Internet Protocol)


TCP/IP is set of communication protocols used by Internet to coordinate
transfer of data that both the sending and receiving devices understand
 Types of TCP/IP
      HTTP (Hypertext Transfer Protocol)
        When page has http:// then has HTTP protocol

      HTTPS (Hypertext Transfer Protocol over Secure Sockets Layer)
        Data will transfer securely (see green light)

        Secure Sockets Layer (SSL) encodes data with encryption key so if data tampered will
         know (data summation before and after same minus encryption key)
      FTP (File Transfer Protocol)




9/17/2012 8:33 AM                                                                               3
What is SSL?
  Secure Sockets Layer (SSL)
     Has Public and Private Key
             Public key used to encrypt data
             Private Key used to decipher key
       Handshake
             Use Public key (encrypting data)
             Data goes between client (personal computer) and web server
             Use private key
             Data goes back from web server to client
       Encryption uses algorithm (complex math formula)

9/17/2012 8:33 AM                                                           4
How does Web work?
                                                  Database

          Web server (holds website)                            (Different Types
                                                                Of Databases:
                                                                Customer
                                                                Order, Sales,
                                                                Payment)

                             Security Problem Here if not SSL


                                Personal Computer (client)




9/17/2012 8:33 AM                                                                  5
Why is SSL important to us?
  Secure information is important in the following areas:
     Credit card transactions
     Customer information
     Medical records




9/17/2012 8:33 AM                                            6
Is it ok to do a commercial transaction on a
unsecure network?
  NO
  Possible Problems
     Identity theft
     Credit card problems




9/17/2012 8:33 AM                              7
Browsers
  Browsers use hyperlinks (colored links that lead
   through page)
  Types of Browsers
       Internet Explorer
       Mozilla Firefox
       Google Chrome
       Opera
       Safari




9/17/2012 8:33 AM                                     8
Internet terms
  Uniform Resource Locator—www.crowder.edu
  Domain name—crowder.edu
       Need to register Domain name so unique for business
       Domain name can be important for marketing purposes
  Internet Protocol (IP)—digits of domain name (198.209.44.251=crowder.edu)
  Top-level domain—end part of domain name
         .com
         .net
         .org
         .edu
         .gov
         .mil
         .info (unrestricted (for any purpose))
         .tv (video or animation)



9/17/2012 8:33 AM                                                              9
How to look up IP address
  Can look up IP address by:
     Whois database (http://www.whois.net/)
     nslookup crowder.edu at command prompt
  Whois database will tell:
             Tell at whois if name is being used
             Ping through whois website tells IP address
             Can ping and tell IP address through going to Start Run at
              bottom of screen/type CMD to bring DOS window then type
              ping wikihow.com as example



9/17/2012 8:33 AM                                                          10
Internet terms
  Spyware type of software that is downloaded with game or legitimate
   program that tracks browser habits or records keystrokes for userid and
   password
  Cookies—small text files that remember your shopping preferences or
   login information (e.g. Hello, Mary Jones)




9/17/2012 8:33 AM                                                            11
Generations of the Web?
  Web 1.0 (“read-only” format)
  Web 2.0 (Websites are interactive like
   Facebook, YouTube)
  Web 3.0 (2015 happened maybe) (Browsers will be
   able to preview sites and give more accurate searching
   based on a learning curve of your preferences so
   searches direct you to more accurately to what you
   like)



9/17/2012 8:33 AM                                           12
Internet Communication Words
  Kbps (kilobytes per second)
  Mbps (megabits/megabytes per second)—how fast
   information travels; usually determine by ping test
  Broadband—refers to speed and used in cable,
   satellite, and wireless; can handle both voice and data
   over channel
  Bandwidth is rate of speed a signal travels over
   through medium like cable or DSL



9/17/2012 8:33 AM                                            13
Types of Internet Connection
    Dial-up (56 kbs)
    Satellite (500Kbps)
         Suffers from “rain fade” and latency (time it takes to bounce data off satellite and returned)
    Wireless (cell phone) or Wi-Fi
  Wireless Broadband
  Tier Carrier (T-1, T-2, T-3, T-4, T-5) (each channel can carry both voice and data)
       T-1 has 26 individual channels each carrying 64Kbps
       T-3 has 672 individual channels at 64 Kbps therefore 43Mbps
       T-5 is capable of 400 Mbps
  DSL (128 Kbps to 8Mbps) two copper wires (1 talk 1 internet)
  Cable
  Optical Cable (Fiber Optic) (1Gbps)
  Internet2 (100Gbps) for research and education
 *** http://www.computertooslow.com/internet-connections.asp




9/17/2012 8:33 AM                                                                                          14
Terms of Web
  Upload (e.g. taking file up to SkyDrive)
  Download (take file from website to downloads
     directory on your own computer)




9/17/2012 8:33 AM                                  15
Download Safety
  Downloads can be source of many viruses or spyware
    Make sure have Windows Firewall on O/S on
    Keep up on updates
    Use anti-virus software that has spyware in it or separate
     spyware
    Spam filter on unwanted email




9/17/2012 8:33 AM                                                 16
Selecting ISP (Internet Service Provider)
  Good service and support (reliable service)
  Contract Terms
       Promotional rate and what after promotion
       Price after contract
       Service calls and cost if equipment fails
  Security
       Spam filter and antivirus protection
  Email (need multiple emails for different family members)
  Download and Upload Speeds
       Any restrictions due to time of day of data uploads/downloads or
          receive slowing down after downloading so much (e.g. AT&T)


9/17/2012 8:33 AM                                                          17
Internet Search (Subject Directory or Search
Engine)
  Subject Directory has links that are organized by subject and is
     used in academic research
       Infomine—manage subjects chosen by academic librarians from
        University of California
       Yahoo—commercial subject directory portal
  Search Engine used for more narrow or obscure topics
       Each search has a different top 10 usually because each company indexes
          information of web pages differently
       Partially secretive of how pages are index and how to get to coveted
          Top 10 (important for marketing purposes)
       You will get different search results on different search engines




9/17/2012 8:33 AM                                                                 18
Internet Search Engines
  Types of Search Engine
     Google
     AltaVista
     Ask
     Bing
     Dogpile




9/17/2012 8:33 AM           19
Key Search Words
  Most companies use web crawlers, robots, spiders to
   crawl through web pages looking for key search words
  Key search words are indexed in table (complex
   programs/systems doing this)




9/17/2012 8:33 AM                                         20
Tips for Internet Searching
  Check spelling
  Use more than one word but not more than eight words
  Use quotation marks to force search to look for both words as opposed
     to one or the other
       e.g. “Monarch Butterfly” has to have both words together as opposed to
          separately if monarch (Kings/Queens) butterfly (all types of butterflies)
  Boolean Search or Advanced Search in Google
       Use operators like AND, OR, and NOT to give specific searches like “Paris”
          AND “Eiffel Tower” AND NOT “Louvre Museum” so searches only with
          Paris and Eiffel Tower and no Louvre Museum
  If need video or image then select from Google sidebar for video/image
     or can type video: cpr or image: eiffel tower


9/17/2012 8:33 AM                                                                     21

More Related Content

Similar to Bsad 104 navigating the internet

Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internetcoastalgraphics
 
Building Social Enterprise with Ruby and Salesforce
Building Social Enterprise with Ruby and SalesforceBuilding Social Enterprise with Ruby and Salesforce
Building Social Enterprise with Ruby and SalesforceRaymond Gao
 
Improve your Tech Quotient
Improve your Tech QuotientImprove your Tech Quotient
Improve your Tech QuotientTarence DSouza
 
configuring and using internet.pptx
configuring and using internet.pptxconfiguring and using internet.pptx
configuring and using internet.pptxmtsedey2013
 
Lecture 1- Introduction to Computers and the Internet.pptx
Lecture 1- Introduction to Computers and the Internet.pptxLecture 1- Introduction to Computers and the Internet.pptx
Lecture 1- Introduction to Computers and the Internet.pptxRemyaTom2
 
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk
 
Component Technologies of E-Commerce
Component Technologies of E-CommerceComponent Technologies of E-Commerce
Component Technologies of E-CommerceSamuel Saunders
 
Introduction to Web Design By SiD
Introduction to Web Design By SiDIntroduction to Web Design By SiD
Introduction to Web Design By SiDjoin2fly
 
Introduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTIntroduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTOsama Yousaf
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
A%UIS.pptx
A%UIS.pptxA%UIS.pptx
A%UIS.pptxdereje33
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentialschris30931
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01lonetree
 
Internet website designing_company_in_delhi
Internet website designing_company_in_delhiInternet website designing_company_in_delhi
Internet website designing_company_in_delhiCss Founder
 

Similar to Bsad 104 navigating the internet (20)

Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
 
Building Social Enterprise with Ruby and Salesforce
Building Social Enterprise with Ruby and SalesforceBuilding Social Enterprise with Ruby and Salesforce
Building Social Enterprise with Ruby and Salesforce
 
Improve your Tech Quotient
Improve your Tech QuotientImprove your Tech Quotient
Improve your Tech Quotient
 
configuring and using internet.pptx
configuring and using internet.pptxconfiguring and using internet.pptx
configuring and using internet.pptx
 
Lecture 1- Introduction to Computers and the Internet.pptx
Lecture 1- Introduction to Computers and the Internet.pptxLecture 1- Introduction to Computers and the Internet.pptx
Lecture 1- Introduction to Computers and the Internet.pptx
 
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk Traffic
 
Component Technologies of E-Commerce
Component Technologies of E-CommerceComponent Technologies of E-Commerce
Component Technologies of E-Commerce
 
Internet
InternetInternet
Internet
 
Introduction to Web Design By SiD
Introduction to Web Design By SiDIntroduction to Web Design By SiD
Introduction to Web Design By SiD
 
Introduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTIntroduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPT
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Webtechnologies
Webtechnologies Webtechnologies
Webtechnologies
 
A%UIS.pptx
A%UIS.pptxA%UIS.pptx
A%UIS.pptx
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentials
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01
 
soap toolkit
soap toolkitsoap toolkit
soap toolkit
 
Ch07 the internet intranets and extranets
Ch07 the internet  intranets and extranetsCh07 the internet  intranets and extranets
Ch07 the internet intranets and extranets
 
InterneT
InterneTInterneT
InterneT
 
Internet website designing_company_in_delhi
Internet website designing_company_in_delhiInternet website designing_company_in_delhi
Internet website designing_company_in_delhi
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Bsad 104 navigating the internet

  • 2. What is protocol?  Communication between networks or data transfer between networks and computers along internet 9/17/2012 8:33 AM 2
  • 3. TCP/IP (Transmission Control Protocol/Internet Protocol) TCP/IP is set of communication protocols used by Internet to coordinate transfer of data that both the sending and receiving devices understand  Types of TCP/IP  HTTP (Hypertext Transfer Protocol)  When page has http:// then has HTTP protocol  HTTPS (Hypertext Transfer Protocol over Secure Sockets Layer)  Data will transfer securely (see green light)  Secure Sockets Layer (SSL) encodes data with encryption key so if data tampered will know (data summation before and after same minus encryption key)  FTP (File Transfer Protocol) 9/17/2012 8:33 AM 3
  • 4. What is SSL?  Secure Sockets Layer (SSL)  Has Public and Private Key  Public key used to encrypt data  Private Key used to decipher key  Handshake  Use Public key (encrypting data)  Data goes between client (personal computer) and web server  Use private key  Data goes back from web server to client  Encryption uses algorithm (complex math formula) 9/17/2012 8:33 AM 4
  • 5. How does Web work? Database Web server (holds website) (Different Types Of Databases: Customer Order, Sales, Payment) Security Problem Here if not SSL Personal Computer (client) 9/17/2012 8:33 AM 5
  • 6. Why is SSL important to us?  Secure information is important in the following areas:  Credit card transactions  Customer information  Medical records 9/17/2012 8:33 AM 6
  • 7. Is it ok to do a commercial transaction on a unsecure network?  NO  Possible Problems  Identity theft  Credit card problems 9/17/2012 8:33 AM 7
  • 8. Browsers  Browsers use hyperlinks (colored links that lead through page)  Types of Browsers  Internet Explorer  Mozilla Firefox  Google Chrome  Opera  Safari 9/17/2012 8:33 AM 8
  • 9. Internet terms  Uniform Resource Locator—www.crowder.edu  Domain name—crowder.edu  Need to register Domain name so unique for business  Domain name can be important for marketing purposes  Internet Protocol (IP)—digits of domain name (198.209.44.251=crowder.edu)  Top-level domain—end part of domain name  .com  .net  .org  .edu  .gov  .mil  .info (unrestricted (for any purpose))  .tv (video or animation) 9/17/2012 8:33 AM 9
  • 10. How to look up IP address  Can look up IP address by:  Whois database (http://www.whois.net/)  nslookup crowder.edu at command prompt  Whois database will tell:  Tell at whois if name is being used  Ping through whois website tells IP address  Can ping and tell IP address through going to Start Run at bottom of screen/type CMD to bring DOS window then type ping wikihow.com as example 9/17/2012 8:33 AM 10
  • 11. Internet terms  Spyware type of software that is downloaded with game or legitimate program that tracks browser habits or records keystrokes for userid and password  Cookies—small text files that remember your shopping preferences or login information (e.g. Hello, Mary Jones) 9/17/2012 8:33 AM 11
  • 12. Generations of the Web?  Web 1.0 (“read-only” format)  Web 2.0 (Websites are interactive like Facebook, YouTube)  Web 3.0 (2015 happened maybe) (Browsers will be able to preview sites and give more accurate searching based on a learning curve of your preferences so searches direct you to more accurately to what you like) 9/17/2012 8:33 AM 12
  • 13. Internet Communication Words  Kbps (kilobytes per second)  Mbps (megabits/megabytes per second)—how fast information travels; usually determine by ping test  Broadband—refers to speed and used in cable, satellite, and wireless; can handle both voice and data over channel  Bandwidth is rate of speed a signal travels over through medium like cable or DSL 9/17/2012 8:33 AM 13
  • 14. Types of Internet Connection  Dial-up (56 kbs)  Satellite (500Kbps)  Suffers from “rain fade” and latency (time it takes to bounce data off satellite and returned)  Wireless (cell phone) or Wi-Fi  Wireless Broadband  Tier Carrier (T-1, T-2, T-3, T-4, T-5) (each channel can carry both voice and data)  T-1 has 26 individual channels each carrying 64Kbps  T-3 has 672 individual channels at 64 Kbps therefore 43Mbps  T-5 is capable of 400 Mbps  DSL (128 Kbps to 8Mbps) two copper wires (1 talk 1 internet)  Cable  Optical Cable (Fiber Optic) (1Gbps)  Internet2 (100Gbps) for research and education *** http://www.computertooslow.com/internet-connections.asp 9/17/2012 8:33 AM 14
  • 15. Terms of Web  Upload (e.g. taking file up to SkyDrive)  Download (take file from website to downloads directory on your own computer) 9/17/2012 8:33 AM 15
  • 16. Download Safety  Downloads can be source of many viruses or spyware  Make sure have Windows Firewall on O/S on  Keep up on updates  Use anti-virus software that has spyware in it or separate spyware  Spam filter on unwanted email 9/17/2012 8:33 AM 16
  • 17. Selecting ISP (Internet Service Provider)  Good service and support (reliable service)  Contract Terms  Promotional rate and what after promotion  Price after contract  Service calls and cost if equipment fails  Security  Spam filter and antivirus protection  Email (need multiple emails for different family members)  Download and Upload Speeds  Any restrictions due to time of day of data uploads/downloads or receive slowing down after downloading so much (e.g. AT&T) 9/17/2012 8:33 AM 17
  • 18. Internet Search (Subject Directory or Search Engine)  Subject Directory has links that are organized by subject and is used in academic research  Infomine—manage subjects chosen by academic librarians from University of California  Yahoo—commercial subject directory portal  Search Engine used for more narrow or obscure topics  Each search has a different top 10 usually because each company indexes information of web pages differently  Partially secretive of how pages are index and how to get to coveted Top 10 (important for marketing purposes)  You will get different search results on different search engines 9/17/2012 8:33 AM 18
  • 19. Internet Search Engines  Types of Search Engine  Google  AltaVista  Ask  Bing  Dogpile 9/17/2012 8:33 AM 19
  • 20. Key Search Words  Most companies use web crawlers, robots, spiders to crawl through web pages looking for key search words  Key search words are indexed in table (complex programs/systems doing this) 9/17/2012 8:33 AM 20
  • 21. Tips for Internet Searching  Check spelling  Use more than one word but not more than eight words  Use quotation marks to force search to look for both words as opposed to one or the other  e.g. “Monarch Butterfly” has to have both words together as opposed to separately if monarch (Kings/Queens) butterfly (all types of butterflies)  Boolean Search or Advanced Search in Google  Use operators like AND, OR, and NOT to give specific searches like “Paris” AND “Eiffel Tower” AND NOT “Louvre Museum” so searches only with Paris and Eiffel Tower and no Louvre Museum  If need video or image then select from Google sidebar for video/image or can type video: cpr or image: eiffel tower 9/17/2012 8:33 AM 21