SlideShare a Scribd company logo
1 of 4
By: Carolyn Lipscomb
Web Pages
• Is a page that is created to attract and hold
visitor’s attention, so that he or she will
spend time viewing the page.
• Consisting of:
 A logo and/ or business name
 Various images, photographs, animations and etc.
 A search tool to locate information
 Copyright statement
 Privacy and security policy statement
Wi-Fi
 11 Mbps-60 Mbps (transmission speed)
 $10-$25 ( Approximate cost per month)
Advantages:
 High Speed
 Wireless
 Mobility
Disadvantages:
 Limited availability
 Requires Wi-Fi Card
 Remain within 300ft of receiver
IP Addresses
o Stands for Internet Protocol Address.
o Is a number that uniquely identifies each computer
or device connected to the internet.
o Internet relies on a computer’s unique IP address to
ensure that the data is sent to the right computer
or device.
o Consists of four groups of number, each group is
separated by periods, or dots.
EVAMPLE: 69.32.133.79 (IP address for a Cengage
Learning Web server.)

More Related Content

Similar to Slideshare

Network addresses.pptx
Network addresses.pptxNetwork addresses.pptx
Network addresses.pptxCherryLim21
 
Web fundamental introduction
Web fundamental introduction Web fundamental introduction
Web fundamental introduction shameen khan
 
Common services of Internet .docx
Common services of Internet        .docxCommon services of Internet        .docx
Common services of Internet .docxKamran Abdullah
 
Computer network lab note 2
Computer network lab note 2Computer network lab note 2
Computer network lab note 2MDHASNAIN23
 
Nota chap 2 & 3 for MKA
Nota chap 2 & 3 for MKANota chap 2 & 3 for MKA
Nota chap 2 & 3 for MKAMiko Mochi
 
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxChapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxbartholomeocoombs
 
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMINTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMSaraswathiRamalingam
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Carl Blume
 
Baabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojosephBaabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojosephJijo Joseph
 
Basic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateBasic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateJijo Joseph
 
Www Officesoon Com Power Point Presentation
Www Officesoon Com Power Point PresentationWww Officesoon Com Power Point Presentation
Www Officesoon Com Power Point PresentationAdarsh Singh
 

Similar to Slideshare (20)

Network addresses.pptx
Network addresses.pptxNetwork addresses.pptx
Network addresses.pptx
 
elc200day9.ppt
elc200day9.pptelc200day9.ppt
elc200day9.ppt
 
rdp.ppt
rdp.pptrdp.ppt
rdp.ppt
 
Web fundamental introduction
Web fundamental introduction Web fundamental introduction
Web fundamental introduction
 
Common services of Internet .docx
Common services of Internet        .docxCommon services of Internet        .docx
Common services of Internet .docx
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
Computer network lab note 2
Computer network lab note 2Computer network lab note 2
Computer network lab note 2
 
Nota chap 2 & 3 for MKA
Nota chap 2 & 3 for MKANota chap 2 & 3 for MKA
Nota chap 2 & 3 for MKA
 
Internet
InternetInternet
Internet
 
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxChapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docx
 
Elc200day9
Elc200day9Elc200day9
Elc200day9
 
CH6
CH6CH6
CH6
 
The Internet
The InternetThe Internet
The Internet
 
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMINTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
 
rdp.ppt
rdp.pptrdp.ppt
rdp.ppt
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 
Baabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojosephBaabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojoseph
 
Basic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateBasic Internet_Baabtra.com template
Basic Internet_Baabtra.com template
 
Www Officesoon Com Power Point Presentation
Www Officesoon Com Power Point PresentationWww Officesoon Com Power Point Presentation
Www Officesoon Com Power Point Presentation
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Slideshare

  • 2. Web Pages • Is a page that is created to attract and hold visitor’s attention, so that he or she will spend time viewing the page. • Consisting of:  A logo and/ or business name  Various images, photographs, animations and etc.  A search tool to locate information  Copyright statement  Privacy and security policy statement
  • 3. Wi-Fi  11 Mbps-60 Mbps (transmission speed)  $10-$25 ( Approximate cost per month) Advantages:  High Speed  Wireless  Mobility Disadvantages:  Limited availability  Requires Wi-Fi Card  Remain within 300ft of receiver
  • 4. IP Addresses o Stands for Internet Protocol Address. o Is a number that uniquely identifies each computer or device connected to the internet. o Internet relies on a computer’s unique IP address to ensure that the data is sent to the right computer or device. o Consists of four groups of number, each group is separated by periods, or dots. EVAMPLE: 69.32.133.79 (IP address for a Cengage Learning Web server.)