SlideShare a Scribd company logo
4.1




1.               (Internet)

                                               Cyberspace )
                           Internetworking )


2.                                               URL


3.
           IP address


                                                         Computer
Network          TCP/IP
4.


                                                              |   Transmission
Control Protocol|Internet Protocol : TCP | IP)
5.
                 IP address


                      start menu >> run        cmd     DOS
ipconfig      Enter




6.
http://www.thaigoodview.com/node/5660

7.




          http://www.travel.sanook.com




-




-


-


-    Search Engine
-         “Work@home”


-


-




-


-



-


-


-   MP3


-




-


-


-


-


-
-   (Chat Room

More Related Content

Viewers also liked

Предметная фотосъемка ФОТО 360
Предметная фотосъемка ФОТО 360Предметная фотосъемка ФОТО 360
Предметная фотосъемка ФОТО 360
Алена Кваша
 
Cнижение рисков при интеграции с 1с
Cнижение рисков при интеграции с 1сCнижение рисков при интеграции с 1с
Cнижение рисков при интеграции с 1с
Алена Кваша
 
Микроданные и посещаемость сайта
Микроданные и посещаемость сайтаМикроданные и посещаемость сайта
Микроданные и посещаемость сайта
Алена Кваша
 
The First Day of Russian Occupation - Liberec, Czechoslovakia 8/21/1968
The First Day of Russian Occupation - Liberec, Czechoslovakia 8/21/1968The First Day of Russian Occupation - Liberec, Czechoslovakia 8/21/1968
The First Day of Russian Occupation - Liberec, Czechoslovakia 8/21/1968kbrettman
 
เนื้อหาตัวอย่าง
เนื้อหาตัวอย่างเนื้อหาตัวอย่าง
เนื้อหาตัวอย่างsrilakorn
 
Зачем вам сайт? Умные цели при разработке сайта
Зачем вам сайт? Умные цели при разработке сайтаЗачем вам сайт? Умные цели при разработке сайта
Зачем вам сайт? Умные цели при разработке сайта
Алена Кваша
 
Svp.powerpoint
Svp.powerpointSvp.powerpoint
Svp.powerpointLinus6
 
1. introducción a la edad media
1.  introducción a la edad media1.  introducción a la edad media
1. introducción a la edad media
katina2076
 
Basics of Soft Computing
Basics of Soft  Computing Basics of Soft  Computing
Basics of Soft Computing
Sangeetha Rajesh
 

Viewers also liked (15)

Предметная фотосъемка ФОТО 360
Предметная фотосъемка ФОТО 360Предметная фотосъемка ФОТО 360
Предметная фотосъемка ФОТО 360
 
Cнижение рисков при интеграции с 1с
Cнижение рисков при интеграции с 1сCнижение рисков при интеграции с 1с
Cнижение рисков при интеграции с 1с
 
Микроданные и посещаемость сайта
Микроданные и посещаемость сайтаМикроданные и посещаемость сайта
Микроданные и посещаемость сайта
 
The First Day of Russian Occupation - Liberec, Czechoslovakia 8/21/1968
The First Day of Russian Occupation - Liberec, Czechoslovakia 8/21/1968The First Day of Russian Occupation - Liberec, Czechoslovakia 8/21/1968
The First Day of Russian Occupation - Liberec, Czechoslovakia 8/21/1968
 
Um readr circl
Um readr circlUm readr circl
Um readr circl
 
เนื้อหาตัวอย่าง
เนื้อหาตัวอย่างเนื้อหาตัวอย่าง
เนื้อหาตัวอย่าง
 
11
1111
11
 
Action research
Action researchAction research
Action research
 
26
2626
26
 
Зачем вам сайт? Умные цели при разработке сайта
Зачем вам сайт? Умные цели при разработке сайтаЗачем вам сайт? Умные цели при разработке сайта
Зачем вам сайт? Умные цели при разработке сайта
 
Svp.powerpoint
Svp.powerpointSvp.powerpoint
Svp.powerpoint
 
SIP_Report_Interim
SIP_Report_Interim SIP_Report_Interim
SIP_Report_Interim
 
1. introducción a la edad media
1.  introducción a la edad media1.  introducción a la edad media
1. introducción a la edad media
 
0756 l3 2
0756 l3 20756 l3 2
0756 l3 2
 
Basics of Soft Computing
Basics of Soft  Computing Basics of Soft  Computing
Basics of Soft Computing
 

Similar to 11

ใบงานที่4
ใบงานที่4ใบงานที่4
ใบงานที่4Tonkla Tanaton
 
วิธีการ
วิธีการวิธีการ
วิธีการ0897169760
 
20
2020
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
AvikGhara
 
อินเทอร์เน็ต
อินเทอร์เน็ตอินเทอร์เน็ต
อินเทอร์เน็ตPp'dan Phuengkun
 
Hacking Robotics(English Version)
Hacking Robotics(English Version)Hacking Robotics(English Version)
Hacking Robotics(English Version)Kensei Demura
 
ใบงานที่4.7
ใบงานที่4.7ใบงานที่4.7
ใบงานที่4.7Aomsin Pccpl
 
หน่วยการเรียนรู้ที่ 4
หน่วยการเรียนรู้ที่ 4หน่วยการเรียนรู้ที่ 4
หน่วยการเรียนรู้ที่ 4Papichaya Chengtong
 
Pears
PearsPears
Pearsthips
 
Understanding computer networks
Understanding computer networksUnderstanding computer networks
Understanding computer networks
UC San Diego
 
สาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศสาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศAe Naiong
 
Cisco Certified Network Associate
Cisco Certified Network AssociateCisco Certified Network Associate
Cisco Certified Network Associate
Sumit K Das
 

Similar to 11 (20)

10
1010
10
 
ใบงานที่4
ใบงานที่4ใบงานที่4
ใบงานที่4
 
4
44
4
 
4
44
4
 
30
3030
30
 
วิธีการ
วิธีการวิธีการ
วิธีการ
 
7
77
7
 
9
99
9
 
20
2020
20
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
อินเทอร์เน็ต
อินเทอร์เน็ตอินเทอร์เน็ต
อินเทอร์เน็ต
 
Hacking Robotics(English Version)
Hacking Robotics(English Version)Hacking Robotics(English Version)
Hacking Robotics(English Version)
 
ใบงานที่4.7
ใบงานที่4.7ใบงานที่4.7
ใบงานที่4.7
 
31
3131
31
 
หน่วยการเรียนรู้ที่ 4
หน่วยการเรียนรู้ที่ 4หน่วยการเรียนรู้ที่ 4
หน่วยการเรียนรู้ที่ 4
 
Pears
PearsPears
Pears
 
Understanding computer networks
Understanding computer networksUnderstanding computer networks
Understanding computer networks
 
สาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศสาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศ
 
Cisco Certified Network Associate
Cisco Certified Network AssociateCisco Certified Network Associate
Cisco Certified Network Associate
 
27
2727
27
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

11

  • 1. 4.1 1. (Internet) Cyberspace ) Internetworking ) 2. URL 3. IP address Computer Network TCP/IP 4. | Transmission Control Protocol|Internet Protocol : TCP | IP) 5. IP address start menu >> run cmd DOS ipconfig Enter 6.
  • 2. http://www.thaigoodview.com/node/5660 7. http://www.travel.sanook.com - - - - Search Engine
  • 3. - “Work@home” - - - - - - - MP3 - - - - - -
  • 4. - (Chat Room