SlideShare a Scribd company logo
1 of 20
Liberty college
Access and Use Internet
Objective
Provide competency required to access internet
and complete basic web search tasks which
includes finding required information.
INTERNET
Definition, use, and basic terminologies of Internet The
Internet, sometimes called simply "the Net," is a worldwide
system of computer networks - a network of networks in
which users at any one computer can, if they have permission,
get information from any other computer (and sometimes talk
directly to users at other computers).
The internet is computer based global information system. It is
composed of many interconnected computer networks.
Each network may link thousands of computers enabling them
to share information
Basic Internet Terms and Terminology
Here is a look at the buzzwords of the world of Internet.
ARPANET: The acronym stands for Advanced Research
Projects Agency Network. ARPA of the United States
Department of Defense developed ARPANET, which became
the world‘s first packet switching network. Internet is the
successor of ARPANET.
Internet Service Provider: A company, which provides
users with an access to the Internet, is known as an Internet
service provider or Internet access provider. ISP, as it is called,
offers email accounts and other services like remote storage of
files for its customers. Here is a word about choosing a cheap
ISP
IPAddress: It is a way of numerically identifying an entity on
a computer network. The original addressing system known as
IPv4, used 32 bit addresses. With the growth of the Internet,
IPv6 came to be used wherein the addresses are composed of
128 bits.
Cyberspace: This term coined by William Gibson, is used to
refer to the computer networks connected to each other and the
content they host. It is often used to refer to the Internet.
WWW: It is a collection of interlinked documents that are
accessible over the Internet. It consists of millions of web
pages that contain text, images, voice and videos. Sir Tim
Berners-Lee, a British scientist working at CERN, created the
World Wide Web.
Website: A website is a set of web pages consisting of text,
audio and video. Web servers host websites.
URL: It specifies the location of a resource on the Internet.
It consists of the basic address and path.
Web Page: Web pages are resources of information. They are
generally created in the HTML format and provide the web
users with navigational abilities through hyperlinks to other
web pages on the web.
Home Page: The term home page is used to refer to the page
that is the default page of any website. It is the main page of
a complex website.
Cache: Web browsers maintain a cache of recently visited
web pages. Some of them use an external proxy web cache,
which is a server program through which web requests pass.
This enables the browsers to cache frequently visited pages.
Even search engines make available already indexed web
pages through their caches.
HTTP: Hypertext Transfer Protocol, abbreviated as HTTP, is
a communications protocol used for the transfer of information
over the Internet. A client makes an HTTP request using a web
browser to which an HTTP response is sent from the server
Web Cookie:
Also known as an HTTP cookie, it is piece of text that is
exchanged between the web client and the web server. It is
sent by the web server to the web client and returned
unchanged by the client each time it accesses the server.
Session:
It is an exchange of information between a computer and its
user. It is established for a certain period of time after which it
ends.
Hyperlink:
A reference in a document to another section of the document
or to another document is termed as a hyperlink. Hyperlinks
are used to redirect the user from one section of a page content
to another
Internet Security
It is one of the major concerns today. As the Internet acts as a
communication platform that can be accessed by millions of
users around the world, it becomes necessary that proper
measures be implemented.
Internet - A communication Platform
Internet serves as one of the most efficient means of
communication. Computers from different parts of the world
can be connected to each other to exchange information,
thanks to the Internet. Emails and chats are excellent means of
communication over the Internet.
Email
It is a store-and-forward method of writing, sending and
receiving written messages. Electronic mail is an Internet e-
mail system that uses network-based protocols to exchange
messages between network subsystems.
Email Address
It identifies the network location to which an email can be
delivered. An email address is a combination of the username
of the mail user and the host name of the mailing system. It is
of the form, ‗username@domain-name‘. An email alias is a
forwarding email address.
Spamming
The act of sending unsolicited bulk messages over an email
system is known as spamming. It is an undesirable use of the
electronic messaging systems.
Phishing
It is a fraudulent activity of acquiring the sensitive information
by the use of a fake identity during electronic communication.
It is implemented by means of emails and instant messages
wherein a user is lured to enter his/her details, which are
actually captured by a fraudulent website.
Hacking:
Hacking is the activity of programmatically gaining access to
a computer application that is otherwise inaccessible. The act
of gaining an unauthorized access to a computer is known as
hacking. Hacking of passwords that leads to breach of email
privacy is a threat to communication over the Internet. Internet
crimes refer to all the criminal activities that are carried over
the Internet.
Email Scams:
With the increase in the use of email systems, its security
needs also rose. Fraudulent users started tampering with the
email systems to breach security.
Email Virus:
It is a computer code that is transmitted through an
email in the form of an attachment. The email
attachment causes the destruction of some of the files on
the receiver computer‘s hard disk and is
programmatically emailed to the contacts in the address
book of the receiver. College
Internet Bookmark:
The Internet browsers of the modern times aim at enabling the
users to organize the web pages they access. Links once
visited can be saved in the favorites or preferences categories.
Bookmarks are usually integrated into browsers. Social
bookmarking is a method used by the Internet users to store
and manage web pages
. Web Directories: It is a directory, which links to other
websites and organizes those links. They should not be
mistaken as being search engines
Privacy and Civil Liberties
The Electronic Frontier Foundation (EFF) was
formed in 1990 to, among other things, bring
issues dealing with civil liberties related to
computing and telecommunications technology
to the attention of the public at large, legislators,
and court and law enforcement officials
E-Mail Privacy
When you send a message by e-mail, the message is
broken into packets and the packets are sent out over
the Internet.
The number of packets depends on the size of the
message. Each message has the Internet address of the
sender (your address) and the address of the recipient
Encryption
With public key encryption there are two keys, one public and
the other private. The public key needs to be known. To send a
message to a friend, you use her or his public key to encrypt
the message. Your friend then uses her or his private key to
decode the message after receiving it. You can obtain a version
of public key encryption software called PGP, Pretty Good
Privacy.
Intellectual Property and Copyright
The notion of ownership of something, whether it has a
physical form, does still make sense as intellectual property.
There are a number of laws and agreements throughout the
world to protect intellectual property rights. The right to copy
or duplicate materials can be granted only by the owners of the
information
•Internet browsers – GUI
Search engines

More Related Content

Similar to Access and use of internet of level 1 course

Similar to Access and use of internet of level 1 course (20)

Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Ict internet and html
Ict   internet and htmlIct   internet and html
Ict internet and html
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
Internet
InternetInternet
Internet
 
What Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika BhatiaWhat Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika Bhatia
 
Internet
InternetInternet
Internet
 
Basics about Internet ...
Basics about Internet                                                        ...Basics about Internet                                                        ...
Basics about Internet ...
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentials
 
PPt on internet
PPt on internetPPt on internet
PPt on internet
 
internet
internetinternet
internet
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama Reddy
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama Reddy
 
INTERNET.pptx
INTERNET.pptxINTERNET.pptx
INTERNET.pptx
 
Networking
NetworkingNetworking
Networking
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
unit oe 1.pdf
unit oe 1.pdfunit oe 1.pdf
unit oe 1.pdf
 
Sai internet ppt
Sai   internet ppt Sai   internet ppt
Sai internet ppt
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Internet ppt
Internet  ppt Internet  ppt
Internet ppt
 

Recently uploaded

Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptxBREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptxPABOLU TEJASREE
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxEran Akiva Sinbar
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantadityabhardwaj282
 
Pests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPirithiRaju
 
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024innovationoecd
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxNandakishor Bhaurao Deshmukh
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2John Carlo Rollon
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555kikilily0909
 

Recently uploaded (20)

Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptxBREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptx
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are important
 
Pests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdf
 
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555
 

Access and use of internet of level 1 course

  • 2. Objective Provide competency required to access internet and complete basic web search tasks which includes finding required information.
  • 3. INTERNET Definition, use, and basic terminologies of Internet The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). The internet is computer based global information system. It is composed of many interconnected computer networks. Each network may link thousands of computers enabling them to share information
  • 4. Basic Internet Terms and Terminology Here is a look at the buzzwords of the world of Internet. ARPANET: The acronym stands for Advanced Research Projects Agency Network. ARPA of the United States Department of Defense developed ARPANET, which became the world‘s first packet switching network. Internet is the successor of ARPANET. Internet Service Provider: A company, which provides users with an access to the Internet, is known as an Internet service provider or Internet access provider. ISP, as it is called, offers email accounts and other services like remote storage of files for its customers. Here is a word about choosing a cheap ISP
  • 5. IPAddress: It is a way of numerically identifying an entity on a computer network. The original addressing system known as IPv4, used 32 bit addresses. With the growth of the Internet, IPv6 came to be used wherein the addresses are composed of 128 bits. Cyberspace: This term coined by William Gibson, is used to refer to the computer networks connected to each other and the content they host. It is often used to refer to the Internet. WWW: It is a collection of interlinked documents that are accessible over the Internet. It consists of millions of web pages that contain text, images, voice and videos. Sir Tim Berners-Lee, a British scientist working at CERN, created the World Wide Web.
  • 6. Website: A website is a set of web pages consisting of text, audio and video. Web servers host websites. URL: It specifies the location of a resource on the Internet. It consists of the basic address and path. Web Page: Web pages are resources of information. They are generally created in the HTML format and provide the web users with navigational abilities through hyperlinks to other web pages on the web. Home Page: The term home page is used to refer to the page that is the default page of any website. It is the main page of a complex website.
  • 7. Cache: Web browsers maintain a cache of recently visited web pages. Some of them use an external proxy web cache, which is a server program through which web requests pass. This enables the browsers to cache frequently visited pages. Even search engines make available already indexed web pages through their caches. HTTP: Hypertext Transfer Protocol, abbreviated as HTTP, is a communications protocol used for the transfer of information over the Internet. A client makes an HTTP request using a web browser to which an HTTP response is sent from the server
  • 8. Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged between the web client and the web server. It is sent by the web server to the web client and returned unchanged by the client each time it accesses the server. Session: It is an exchange of information between a computer and its user. It is established for a certain period of time after which it ends. Hyperlink: A reference in a document to another section of the document or to another document is termed as a hyperlink. Hyperlinks are used to redirect the user from one section of a page content to another
  • 9. Internet Security It is one of the major concerns today. As the Internet acts as a communication platform that can be accessed by millions of users around the world, it becomes necessary that proper measures be implemented. Internet - A communication Platform Internet serves as one of the most efficient means of communication. Computers from different parts of the world can be connected to each other to exchange information, thanks to the Internet. Emails and chats are excellent means of communication over the Internet. Email It is a store-and-forward method of writing, sending and receiving written messages. Electronic mail is an Internet e- mail system that uses network-based protocols to exchange messages between network subsystems.
  • 10. Email Address It identifies the network location to which an email can be delivered. An email address is a combination of the username of the mail user and the host name of the mailing system. It is of the form, ‗username@domain-name‘. An email alias is a forwarding email address. Spamming The act of sending unsolicited bulk messages over an email system is known as spamming. It is an undesirable use of the electronic messaging systems.
  • 11. Phishing It is a fraudulent activity of acquiring the sensitive information by the use of a fake identity during electronic communication. It is implemented by means of emails and instant messages wherein a user is lured to enter his/her details, which are actually captured by a fraudulent website.
  • 12. Hacking: Hacking is the activity of programmatically gaining access to a computer application that is otherwise inaccessible. The act of gaining an unauthorized access to a computer is known as hacking. Hacking of passwords that leads to breach of email privacy is a threat to communication over the Internet. Internet crimes refer to all the criminal activities that are carried over the Internet. Email Scams: With the increase in the use of email systems, its security needs also rose. Fraudulent users started tampering with the email systems to breach security.
  • 13. Email Virus: It is a computer code that is transmitted through an email in the form of an attachment. The email attachment causes the destruction of some of the files on the receiver computer‘s hard disk and is programmatically emailed to the contacts in the address book of the receiver. College
  • 14. Internet Bookmark: The Internet browsers of the modern times aim at enabling the users to organize the web pages they access. Links once visited can be saved in the favorites or preferences categories. Bookmarks are usually integrated into browsers. Social bookmarking is a method used by the Internet users to store and manage web pages . Web Directories: It is a directory, which links to other websites and organizes those links. They should not be mistaken as being search engines
  • 15. Privacy and Civil Liberties The Electronic Frontier Foundation (EFF) was formed in 1990 to, among other things, bring issues dealing with civil liberties related to computing and telecommunications technology to the attention of the public at large, legislators, and court and law enforcement officials
  • 16. E-Mail Privacy When you send a message by e-mail, the message is broken into packets and the packets are sent out over the Internet. The number of packets depends on the size of the message. Each message has the Internet address of the sender (your address) and the address of the recipient
  • 17. Encryption With public key encryption there are two keys, one public and the other private. The public key needs to be known. To send a message to a friend, you use her or his public key to encrypt the message. Your friend then uses her or his private key to decode the message after receiving it. You can obtain a version of public key encryption software called PGP, Pretty Good Privacy.
  • 18. Intellectual Property and Copyright The notion of ownership of something, whether it has a physical form, does still make sense as intellectual property. There are a number of laws and agreements throughout the world to protect intellectual property rights. The right to copy or duplicate materials can be granted only by the owners of the information