SlideShare a Scribd company logo
Exploring Microsoft Office Committed to Shaping the Next Generation of IT Experts. Internet Explorer and the World Wide Web: Welcome to Cyberspace
[object Object],[object Object],[object Object],[object Object],[object Object],Objectives (1 of 2)
Objectives (2 of 2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Internet  ,[object Object],[object Object],[object Object]
The Internet  ,[object Object]
The Internet  ,[object Object],[object Object],[object Object]
The Internet and the Worldwide Web
Accessing the Internet  ,[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object],[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Origins of the Internet  ,[object Object],[object Object],[object Object]
Electronic Mail - Birth  ,[object Object],[object Object],[object Object],[object Object]
Accessing the Internet  ,[object Object],[object Object],[object Object]
The Internet ,[object Object],[object Object],[object Object],[object Object]
World Wide Web ,[object Object],[object Object]
Origin of Hypertext or Web Page ,[object Object],[object Object],[object Object],[object Object],[object Object]
Anchor Tags ,[object Object],[object Object],[object Object]
Links ,[object Object],[object Object],[object Object],[object Object]
Hypermedia Click on the picture!
Examples of Hypertext ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of Hypertext - 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hyperlinks ,[object Object],[object Object],[object Object],[object Object],www.microsoft.com www.microsoft.com
The World Wide Web ,[object Object],[object Object],[object Object]
Web Sites ,[object Object],[object Object],[object Object]
Connecting to a Web Site ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Domain Name ,[object Object],[object Object]
Top Domain Name  ,[object Object],[object Object]
Top Level Domain - Examples ,[object Object],[object Object],[object Object],[object Object]
TOP LEVEL Domain Names ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transfer Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pathname ,[object Object],[object Object],[object Object]
URL ,[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of URLs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Browsers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Acronyms Abound ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Exploring Office Web Site Web address (or URL) Internet Explorer is the browser HTTP protocol
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Microsoft Internet Explorer
The Web is always changing Address bar (address is constant, but the content changes) Hyperlinks Print button
Search Engines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Suggestions for Searching ,[object Object],[object Object],[object Object],[object Object],[object Object]
Popular Web Search Engines http://www.search.com/ http://www.yahoo.com http://www.google.com/ http://www.webcrawler.com/ http://www.askjeeves.com/ http://www.lycos.com http://www.excite.com/ http://www.go.com/ http://www.msn.com/ http://www.altavista.com/
Search Rules and Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Site and Saving an Image Choose Save Picture As command Right click picture for context-sensitive menu
E-commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Advantages of E-commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security and Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Returning to a Previous Site History folder Favorites folder
Organize Favorites Move a favorite Create a new folder Delete a favorite Rename a favorite
A Simple Web Page Hyperlinks
The Source Code Anchor tags Paragraph tags
Microsoft Word Formatted text Hyperlinks Insert hyperlink button Graphic image
Simple Text Bullets button Type your text
Save As a Web Page File name File type
Create your own Webpage ,[object Object]

More Related Content

What's hot

Computer network
Computer networkComputer network
Computer network
mazaylum
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Anish Thomas
 
Web technology
Web technologyWeb technology
Web technology
Selvin Josy Bai Somu
 
Beekman5 std ppt_10
Beekman5 std ppt_10Beekman5 std ppt_10
Application layer : DNS
Application layer : DNSApplication layer : DNS
How the internet_works
How the internet_worksHow the internet_works
How the internet_works
arun nalam
 
Session 2
Session 2Session 2
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
Amit Maisheri - Senior Analyst at eClerx
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
webhostingguy
 
Application layer
Application layerApplication layer
Application layer
Farah Hunny
 
Computer networks
Computer networksComputer networks
Computer networks
John Cook
 
Lecture 02 fundamental concepts of internet and www khalid khan
Lecture 02 fundamental concepts of internet and www khalid khanLecture 02 fundamental concepts of internet and www khalid khan
Lecture 02 fundamental concepts of internet and www khalid khan
Khalid Khan
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Kajal Singh
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1
nhepner
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
Janani Ramasamy
 
Tcp/ip
Tcp/ipTcp/ip
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
Rashmi Kaul
 
How Does the Internet Work? : Notes
How Does the Internet Work? : NotesHow Does the Internet Work? : Notes
How Does the Internet Work? : Notes
Subhajit Sahu
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
sumit kumar
 
ecom notes mca 5th sem
ecom notes mca 5th semecom notes mca 5th sem
ecom notes mca 5th sem
Renu Thakur
 

What's hot (20)

Computer network
Computer networkComputer network
Computer network
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Web technology
Web technologyWeb technology
Web technology
 
Beekman5 std ppt_10
Beekman5 std ppt_10Beekman5 std ppt_10
Beekman5 std ppt_10
 
Application layer : DNS
Application layer : DNSApplication layer : DNS
Application layer : DNS
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_works
 
Session 2
Session 2Session 2
Session 2
 
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Application layer
Application layerApplication layer
Application layer
 
Computer networks
Computer networksComputer networks
Computer networks
 
Lecture 02 fundamental concepts of internet and www khalid khan
Lecture 02 fundamental concepts of internet and www khalid khanLecture 02 fundamental concepts of internet and www khalid khan
Lecture 02 fundamental concepts of internet and www khalid khan
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Tcp/ip
Tcp/ipTcp/ip
Tcp/ip
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
 
How Does the Internet Work? : Notes
How Does the Internet Work? : NotesHow Does the Internet Work? : Notes
How Does the Internet Work? : Notes
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
ecom notes mca 5th sem
ecom notes mca 5th semecom notes mca 5th sem
ecom notes mca 5th sem
 

Viewers also liked

Concept Map Wert M
Concept Map Wert MConcept Map Wert M
Concept Map Wert M
lonetree
 
Exp2003 exl ppt_02
Exp2003 exl ppt_02Exp2003 exl ppt_02
Exp2003 exl ppt_02
lonetree
 
Exp2003 exl ppt_04
Exp2003 exl ppt_04Exp2003 exl ppt_04
Exp2003 exl ppt_04
lonetree
 
Exp2003 exl ppt_01
Exp2003 exl ppt_01Exp2003 exl ppt_01
Exp2003 exl ppt_01
lonetree
 
Exp2003 exl ppt_02-continued
Exp2003 exl ppt_02-continuedExp2003 exl ppt_02-continued
Exp2003 exl ppt_02-continued
lonetree
 
Africa 2013: Cyber-Crime, Hacking & Malware
Africa 2013: Cyber-Crime, Hacking & MalwareAfrica 2013: Cyber-Crime, Hacking & Malware
Africa 2013: Cyber-Crime, Hacking & Malware
IDG Connect
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Esteban
 
Exp2003 exl ppt_03
Exp2003 exl ppt_03Exp2003 exl ppt_03
Exp2003 exl ppt_03
lonetree
 

Viewers also liked (8)

Concept Map Wert M
Concept Map Wert MConcept Map Wert M
Concept Map Wert M
 
Exp2003 exl ppt_02
Exp2003 exl ppt_02Exp2003 exl ppt_02
Exp2003 exl ppt_02
 
Exp2003 exl ppt_04
Exp2003 exl ppt_04Exp2003 exl ppt_04
Exp2003 exl ppt_04
 
Exp2003 exl ppt_01
Exp2003 exl ppt_01Exp2003 exl ppt_01
Exp2003 exl ppt_01
 
Exp2003 exl ppt_02-continued
Exp2003 exl ppt_02-continuedExp2003 exl ppt_02-continued
Exp2003 exl ppt_02-continued
 
Africa 2013: Cyber-Crime, Hacking & Malware
Africa 2013: Cyber-Crime, Hacking & MalwareAfrica 2013: Cyber-Crime, Hacking & Malware
Africa 2013: Cyber-Crime, Hacking & Malware
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Exp2003 exl ppt_03
Exp2003 exl ppt_03Exp2003 exl ppt_03
Exp2003 exl ppt_03
 

Similar to Exp2003 Int Ppt 01

NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
SeethaDinesh
 
Introduction to the web
Introduction to the webIntroduction to the web
Introduction to the web
SAMIR BHOGAYTA
 
abdelwahab alsammak_Chapter 1-Internet concepts.ppt
abdelwahab alsammak_Chapter 1-Internet concepts.pptabdelwahab alsammak_Chapter 1-Internet concepts.ppt
abdelwahab alsammak_Chapter 1-Internet concepts.ppt
David319172
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
Amit Chandra
 
You Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docxYou Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docx
jeffevans62972
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
uccwebcourses
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
mraheel205
 
Introduction about Internet
Introduction about InternetIntroduction about Internet
Introduction about Internet
Aadil Khan
 
INTERNET
INTERNETINTERNET
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
coastalgraphics
 
Bioinformatics - Internet
Bioinformatics - InternetBioinformatics - Internet
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
ftz 420
 
Internet and cyberspace
Internet and cyberspaceInternet and cyberspace
Internet and cyberspace
CBAKhan
 
Internet
InternetInternet
Internet
InternetInternet
Internet
manochitra10
 
Introduction To Web Technology
Introduction To Web TechnologyIntroduction To Web Technology
Introduction To Web Technology
Arun Kumar
 
basic concepts of networking.ppt
basic concepts of networking.pptbasic concepts of networking.ppt
basic concepts of networking.ppt
ImXaib
 
CS1308 - 02/08/10
CS1308 - 02/08/10CS1308 - 02/08/10
CS1308 - 02/08/10
Megan Goldner Martinez
 
basic it presentation........
basic it presentation........basic it presentation........
basic it presentation........
vlsaroj
 
Sem
SemSem

Similar to Exp2003 Int Ppt 01 (20)

NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
 
Introduction to the web
Introduction to the webIntroduction to the web
Introduction to the web
 
abdelwahab alsammak_Chapter 1-Internet concepts.ppt
abdelwahab alsammak_Chapter 1-Internet concepts.pptabdelwahab alsammak_Chapter 1-Internet concepts.ppt
abdelwahab alsammak_Chapter 1-Internet concepts.ppt
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 
You Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docxYou Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docx
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
 
Introduction about Internet
Introduction about InternetIntroduction about Internet
Introduction about Internet
 
INTERNET
INTERNETINTERNET
INTERNET
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Bioinformatics - Internet
Bioinformatics - InternetBioinformatics - Internet
Bioinformatics - Internet
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 
Internet and cyberspace
Internet and cyberspaceInternet and cyberspace
Internet and cyberspace
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
Introduction To Web Technology
Introduction To Web TechnologyIntroduction To Web Technology
Introduction To Web Technology
 
basic concepts of networking.ppt
basic concepts of networking.pptbasic concepts of networking.ppt
basic concepts of networking.ppt
 
CS1308 - 02/08/10
CS1308 - 02/08/10CS1308 - 02/08/10
CS1308 - 02/08/10
 
basic it presentation........
basic it presentation........basic it presentation........
basic it presentation........
 
Sem
SemSem
Sem
 

More from lonetree

Power Point Project 4
Power Point Project 4Power Point Project 4
Power Point Project 4
lonetree
 
Power Point Project 3
Power Point Project 3Power Point Project 3
Power Point Project 3
lonetree
 
Power Point Project 2
Power Point Project 2Power Point Project 2
Power Point Project 2
lonetree
 
Power Point Project 1
Power Point Project 1Power Point Project 1
Power Point Project 1
lonetree
 
Power Point Project 4 Part2
Power Point Project 4 Part2Power Point Project 4 Part2
Power Point Project 4 Part2
lonetree
 
Power Point Project 2 Continued
Power Point Project 2 ContinuedPower Point Project 2 Continued
Power Point Project 2 Continued
lonetree
 
Power Point Project 1 Continued
Power Point Project 1 ContinuedPower Point Project 1 Continued
Power Point Project 1 Continued
lonetree
 
Power Point Project 5
Power Point Project 5Power Point Project 5
Power Point Project 5
lonetree
 
O Leary2008 Ce Complete Chapter8
O Leary2008 Ce Complete Chapter8O Leary2008 Ce Complete Chapter8
O Leary2008 Ce Complete Chapter8
lonetree
 
O Leary2008 Ce Complete Chapter7
O Leary2008 Ce Complete Chapter7O Leary2008 Ce Complete Chapter7
O Leary2008 Ce Complete Chapter7
lonetree
 
O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2
lonetree
 
Mutli Media Project
Mutli Media ProjectMutli Media Project
Mutli Media Project
lonetree
 
Innovation
InnovationInnovation
Innovation
lonetree
 

More from lonetree (13)

Power Point Project 4
Power Point Project 4Power Point Project 4
Power Point Project 4
 
Power Point Project 3
Power Point Project 3Power Point Project 3
Power Point Project 3
 
Power Point Project 2
Power Point Project 2Power Point Project 2
Power Point Project 2
 
Power Point Project 1
Power Point Project 1Power Point Project 1
Power Point Project 1
 
Power Point Project 4 Part2
Power Point Project 4 Part2Power Point Project 4 Part2
Power Point Project 4 Part2
 
Power Point Project 2 Continued
Power Point Project 2 ContinuedPower Point Project 2 Continued
Power Point Project 2 Continued
 
Power Point Project 1 Continued
Power Point Project 1 ContinuedPower Point Project 1 Continued
Power Point Project 1 Continued
 
Power Point Project 5
Power Point Project 5Power Point Project 5
Power Point Project 5
 
O Leary2008 Ce Complete Chapter8
O Leary2008 Ce Complete Chapter8O Leary2008 Ce Complete Chapter8
O Leary2008 Ce Complete Chapter8
 
O Leary2008 Ce Complete Chapter7
O Leary2008 Ce Complete Chapter7O Leary2008 Ce Complete Chapter7
O Leary2008 Ce Complete Chapter7
 
O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2
 
Mutli Media Project
Mutli Media ProjectMutli Media Project
Mutli Media Project
 
Innovation
InnovationInnovation
Innovation
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Exp2003 Int Ppt 01

  • 1. Exploring Microsoft Office Committed to Shaping the Next Generation of IT Experts. Internet Explorer and the World Wide Web: Welcome to Cyberspace
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. The Internet and the Worldwide Web
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Hypermedia Click on the picture!
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46. The Exploring Office Web Site Web address (or URL) Internet Explorer is the browser HTTP protocol
  • 47.
  • 48. The Web is always changing Address bar (address is constant, but the content changes) Hyperlinks Print button
  • 49.
  • 50.
  • 51. Popular Web Search Engines http://www.search.com/ http://www.yahoo.com http://www.google.com/ http://www.webcrawler.com/ http://www.askjeeves.com/ http://www.lycos.com http://www.excite.com/ http://www.go.com/ http://www.msn.com/ http://www.altavista.com/
  • 52.
  • 53.
  • 54. Web Site and Saving an Image Choose Save Picture As command Right click picture for context-sensitive menu
  • 55.
  • 56.
  • 57.
  • 58. Returning to a Previous Site History folder Favorites folder
  • 59. Organize Favorites Move a favorite Create a new folder Delete a favorite Rename a favorite
  • 60. A Simple Web Page Hyperlinks
  • 61. The Source Code Anchor tags Paragraph tags
  • 62. Microsoft Word Formatted text Hyperlinks Insert hyperlink button Graphic image
  • 63. Simple Text Bullets button Type your text
  • 64. Save As a Web Page File name File type
  • 65.

Editor's Notes

  1. Students should understand each objective. As you cover material in the chapter. you may want to refer back to the slides.
  2. The Internet has been around --30 years. You should speak with your students about exciting places they will visit, the foundations of the WWW, and how the WWW works on a server/client model. A URL is required, and for a document to contain hypertext and/or hypermedia it must have the HyperText Transfer Protocol. A browser is required to read HTML documents. HTML is the language of the Web.
  3. HTTP: Hypertext Transfer Protocol - used to transmit Web documents. HTTPS: Hypertext Transfer Protocol Secured - used to transmit secured Web documents. HTML: Hypertext Markup Language – used to create documents that can be read by Web browsers. ISP: Internet Service Provider - needed to connect to the Internet. URL: Uniform Resource Locator: WWW address for finding information on the Web. URL format: .edu, .gov, .com, .org Discuss the differences between HTTP and HTTPS, and explain that cookies are written to the users disk each time a user visits a site.
  4. The Grauer Web site provides additional resources such as online study guides.
  5. Most students should find searching the net a pleasant exercise. Use these objectives to reinforce this search process. Explain that all search engines, while similar in query building, have different databases and specialties. Searching is more of an art; however, the more you do the better you will become. You should emphasize that most students will not become Web designers, but learning how to search the Web effectively will benefit them. Students should understand what a URL means and how to use the Save As and Find Commands. A search engine is an amazing tool. It uses the student’s choice of keywords and Boolean operators to establish a search. It is important to understand that since all search engines have different databases and use different logical operators, the answers will differ—so use multiple search engines. The documents returned are referred to as hits. A Query is a word(s) or phrase, looking for documents on a specific topic. A Search Form is where you enter key words or phrases. A Site Search searches a specific site. Hits are returned from a search. Students can use an AutoSearch by entering a key word in the Address box then typing “go”. The Net Search button gives you easy access to multiple search engines—five prominent ones, but also some others if you scroll down in Net Search.
  6. Use this opportunity to explain the differences between keyword searches and category searches. Categories are helpful if your topic is ambiguous. The status bar will keep you informed of your progress. Again, let students understand that searching is more of an art than a science, but understanding the use of Boolean operators used in library science is crucial to getting good and quick results. The Boolean operators are And, Not, and Or, and each search engine sets up their own Boolean structure. Emphasize to always use multiple search engines and to read about the search process provided by each search engine. Explain how the Find command is to help move around in lengthy Web pages. Understanding what a URL is and how it is structured will help students when they get stuck. For example, knowing that a server is often the name of the company or organization allows you to go directly to the URL without searching. Understanding that a URL can be peeled back until you reach the home page is also useful. Learning about searching for a concept is important because it may relate information you were not thinking about. Often students want to be able to save the information they find because they cannot use Favorites in a lab situation. Discuss using the right mouse button for Saving both graphics and files. The selection of Favorites is useful to students in home situations; suggest that as an alternative to saving.
  7. Copyright provides legal protection to a written or artistic work, giving the author exclusive rights to its use and reproduction. Public domain means that everyone can freely reproduce and distribute the work. The Fair Use exclusion is used for educational, non-profit purposes, or for the purpose of critical review or commentary that does not violate copyright laws. A footnote can be inserted into a document and may include information about the original source of a quoted or copied work. A footnote appears at the bottom of the page where the reference occurs. An endnote could also contain information about the original source of a quoted or copied work. An endnote appears at the end of a document.
  8. Perhaps one of the most important concepts for students is the copyright infringement issue.
  9. Web pages can easily be created in Word. You may want to show students how quickly a Web page can be created in Word, by typing some text and using the Save As Web Page command.