Internet,History of Internet,Terminologies,Advantages and Disadvantages of Internet.E-mail
File Transfer Protocol
Telnet
Other Services
Newsgroups
Chat services
Social networking
E-shopping
Moreover blogs and video conferencing.
4G,5G connection.
The Internet Society is an international, non-profit organization founded in 1992 to provide leadership in Internet related standards, education, and policy.
The Internet Society is an international, non-profit organization founded in 1992 to provide leadership in Internet related standards, education, and policy.
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
Learn how the history of the Web relates to your online marketing success. The presentation covers the history of the Internet from the launch of Sputnik up to 2013.
For speaking engagements please contact me via: http://vimi.co/contact/
In this presentation, we will identify and pay tribute to several of the people who .... been having grand ideas but has never seen them through to completed projects. ... But possess the technical ... the first node on the ARPANET, and the first computer ever on the Internet.
The computer
first, Accepts data such as raw facts, figures, and symbol
then, Processes data into information (Data that is organized, meaningful, and useful )
finally, Produces and stores results
사물인터넷의 역사 (The history of the Internet of Things)Hakyong Kim
이 자료는 사물인터넷과 웨어러블 디바이스 (웨어러블 컴퓨터)에 대한 간단한 역사를 정리하고 있습니다. 앞으로도 사물인터넷과 관련된 다양한 주제들을 정리해서 공유할테니 많은 관심 부탁드립니다.
The slide presents the brief history of the Internet of thins (IoT) and the wearable devices. Followed other slides on diverse topics of the Internet of Things sooner or later.
This presentation is about:
Uses of Networking.
Various types of networking.
Applications used for networking.
Methods of network security.
Methods of communication -2G,3G,4G,Fiber Optics
Transmission Media.
Various types of protocols.
Cloud Computing
Protection against Viruses.
The World Wide Web is the most popular part of the Internet by far. The Web allows rich and diverse communication by displaying text, graphics, animation, photos, sound and video. The Web physically consists of your personal computer, web browser software, a connection to an Internet Service Provider, computers called servers that host digital data, and routers and switches to direct the flow of information.
Unit-1 Introduction to WWW and Network.pptxsahilraturi
A computer network is a group of interconnected nodes or computing devices that exchange data and resources with each other. It can be established using cable or wireless media, and communication protocols such as TCP/IP, Simple Mail Transfer Protocol, and Hypertext Transfer Protocol are used to exchange data between the networked devices
based on stored program design
processor system
CPU
memory
input/output system
input/output devices
secondary storage
manages the instruction-execution cycle
FETCH – DECODE – EXECUTE
coordinates the activities of other devices
Computers – A Gateway to Information(Memory)Tallat Satti
Memory consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data
Stores three basic categories of items:
A world-wide network of computers allows people to share information electronically
Like a BIG book with many web-pages on different topics
Can be accessed anywhere with an Internet connection
Bailment Contracts
A Contract where one party delivers goods to the other upon return basis to fulfil a specific purpose is called bailment contract. It includes two parties namely; bailer and bailee. The person who is delivering the goods is called bailer and the person to whom goods are delivered, is called bailee.
Types of Bailment Contracts
The bailement contracts are classified into Gratuitous bailments and Non – Gratuitous bailments.
Difference between Bailment and Sale
"Cheque is an instrument in writing containing an unconditional order, addressed to a banker, sign by the person who has deposited money with the banker, requiring him to pay on demand a certain sum of money only to or to the order of certain person or to the bearer of instrument."
Definition:-
A bailment is the delivery of goods by one person to another for some purpose upon the understanding that good shall be returned when the purpose is completed.
The word tax is derived from the Latin word “taxo” which means “rate”.
It is a financial charge Upon Taxpayer. Taxpayer may be individual or legal entity.
Types of tax:
If tax is charged on personal or corporate income, then it is a direct tax.
If tax is charged on the price of a good or service, then it is called an indirect tax.
Dissolution is the last stage of liquidation, the process by which a company (or part of a company) is brought to an end, and the assets and property of the company redistributed.
Dissolution may also refer to the termination of a contract or other legal relationship; for example, the dissolution of a marriage, or divorce.
Application software: helps users solve particular problems
In most cases, application software resides on the computer’s hard disk
Application software can also be stored on CDs, DVDs, and flash or key chain storage devices
Used to digitize images or video from the outside world into the computer.
Digital camera
Webcam
Media players
Hardware peripheral that allows computer users to input audio into their computers
MIDI information is sent to a computer that is capable of reproducing an array of digital sounds that resemble traditional analog musical instruments.
It is a collection of programs that enables a person to manipulate visual images.
Super Paint (1973) was one of the earliest graphics software applications.
Currently Adobe Photoshop is one of the most used and best-known graphics programs.
system software and application softwareTallat Satti
Software is a general term for the various kinds of programs used to operate computers and related devices. (The term hardware describes the physical aspects of computers and related devices.)
Perform more specialized tasks (word processing, spreadsheets, email, photo editing, bookkeeping)
Installed onto your computer with disk or downloaded
Can be web based, with no need to download program onto computer
WHY bases abroad?
Safe-guarding US National interests
Early warning of hostile aggressive actions.
Fulfillment of Defence alliances and Treaty responsibilities
Facilitate post-conflict occupation and peace keeping operations
Symbol of Power
Maintain its sole super-power status by containing potential competitors such as PRC.
PAX Americana
The Spotted lake is found in British Columbia in Canada.
The most notable feature of the lake is the multi-colored spots that are very visible and prominent even when viewed from the highway
PARLIAMENT AND STRUCTURE OF FEDERAL GOVERNMENTTallat Satti
A parliamentary system is a system of democratic governance of a state in which the executive branch derives its democratic legitimacy from, and is held accountable to, the legislature (parliament); the executive and legislative branches are thus interconnected
Introduction
The presentation contains information about the armed conflicts in Pakistan, The losses suffered by Pakistan due to its internal conflicts. Pakistan has lost millions of people due to internal conflicts. All these conflicts are discussed in this presentation.
Threat of nuclear war
LAL MASJID CONFLICT
Operation Black Thunderstorm
Operation Rah-e-Nijat
zarb e azb
ECONOMICAL REFORMS
Savings and Investments
Human capital development
Agriculture
Dams
Women Empowerment
1.Gross domestic product
Increased from $60billion to $170 billion
2.Domestic and foreign investements
Increased from $60 billion to $170billion
3.Exports
Tripled form $7billion to $22 billion
4.International trade
Increased from $20 billion to $60 billion
An armed conflict concerns government and/or territory where the use of armed force between two parties, of which at least one is the government of a state, results in battle-related death
1948 war over Kashmir
1965 India-Pakistan war
1971 India-Pakistan and Fall of Dhaka
Siachen Dispute and Sir creek
Kargil conflict 99
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
3. Internet
A global computer network providing a variety of
information and communication facilities, consisting of
interconnected networks using standardized
communication protocols.
4. Significant Events In The History of
Internet
• 1962- J.C.R Lickliter conceives the idea of a “galactic network”.
• 1969- ARPANET goes online, connecting four computers.
• 1972- Ray Tomlinson invents e-mail.
• 1983- Internet protocols begin.
• 1989- The World Wide Web is developed.
• 1994- The first graphical Web browser developed
• 1995- Barriers to commercial activity are lifted.
5. Basic Terminologies
• Host: A computer that is used to transfer data on the
Internet.
• Web Hosting: To store and make web pages
available and ready for inquiries, or a computer that
has a consistent connection to the Internet.
• DNS: DNS (Domain Name System) is a large database
of domain names and their correspondent Internet
(IP Addresses).
• IP address: An IP (Internet Protocol) address is an
unique number used to identify a computer on the
Internet.
6. • Home Page: Main or index page of a web site.
• Port: Channel that a server software would listen to,
for any inquiries, there are certain standard default
channels set for certain server software.
• Baud: It is the number of theme per second that a
modem converts digital signals to analog sounds, to
transfer information over an analog telephone line.
• BandwidthBandwidth -- The capacity of an electronic line, suchThe capacity of an electronic line, such
as a communications network or computer channel,as a communications network or computer channel,
to transmit bits per second (bps).to transmit bits per second (bps).
7. • Blog - A blog is information that is instantly published to a
Web site. Blog scripting allows someone to automatically
post information to a Web site.
• Bookmark - It is a way of storing your favorite sites on the
Internet.
• CGI (Common Gateway Interface script) - a specification for
transferring information between a Web server and a CGI
program, designed to receive and return data.
• Listserv - An e-mail list of e-mail addresses of people with
common interests. Software enables people who belong to a
list to send messages to the group without typing a series of
addresses into the message header.
8. • Shockwave - A three dimensional (3D) animation
technology/format created by the Macromedia company.
Shockwave can be used to create more sophisticated
animations than the Macromedia Flash format.
• WORM - A destructive computer program that replicates
itself throughout your computer's hard drive and
memory. Worms use up the computers resources and pull the
system down.
• AVIAVI -- (Audio Video Interleaved) A Microsoft Corporation(Audio Video Interleaved) A Microsoft Corporation
multimedia video format. It uses waveform audio and digitalmultimedia video format. It uses waveform audio and digital
video frames to compress animation.video frames to compress animation.
• Virus - a computer program usually hidden in an existing
program. Once the existing program is executed, the virus
program is activated and can attach itself to other programs
or files.
9. • Web Bot - A term that applies to programs/applets (macros
and intelligent agents) used on the Internet. Such bots
perform a repetitive function, such as posting messages to
multiple newsgroups or doing searches for information.
• eduedu -- Educational institutionsEducational institutions
• comcom - Commercial businesses- Commercial businesses
• govgov - U.S. government- U.S. government
• milmil - The U.S. military- The U.S. military
• orgorg - Other organizations- Other organizations
• netnet - Network/Internet Service Providers- Network/Internet Service Providers
• InternicInternic:: Internic is the agency that governs and maintains theInternic is the agency that governs and maintains the
name and host registration on the Internet.name and host registration on the Internet.
• Antivirus ..etcAntivirus ..etc
10. Advantages and Disadvantages of
Internet
1) E-mail
2) Access Information
3) Social connectivity
4) Downloading Software: We can download innumerable,
games, music, videos, movies, and a host of other
entertainment software from the Internet.
Disadvantages:
1) Threat to our privacy
2) Spamming: sending unsolicited e-mails in bulk, which serve
no purpose and unnecessarily clog up the entire system.
3) Addiction: Social media, online games, and other time
consuming things is now became an addiction and is taking
over on our youth.
12. Services of Internet
• E-mail
• File Transfer Protocol
• Telnet
Other Services
• Newsgroups
• Chat services
• Social networking
• E-shopping
Moreover blogs and video conferencing.
13. Electronic Mail
E-mail is a rapid and productive
communication tool because:
It is faster than paper mail.
Unlike telephone, the persons
communicating to each other need
not to be available at the same time.
Unlike Fax documents, Email
documents can be stored in a
computer and be easily edited using
computer programmes.
14. File Transfer Protocol(FTP)
FTP is the transfer of computer files from one
host to another. It is client server architecture.
Moving a file from a remote computer to ones
own computer is known as downloading.
Moving a file from ones own computer to a
remote computer is known as uploading.
Anonymous FTP site in the computer allows
user to log in with the username of anonymous
and password that is users email address.
Anonymous FTP sites are called publically
accessible sites because they can be accessed by
any user on internet.
15. Telnet
Telnet is an underlying tcp/IP protocol for accessing
remote computers.
Some common uses of Telnet services are:
Using the computer power of the remote computer.
Using a software on the remote computer.
Logging into ones own computer from another
computer.
16. Internet Protocols
Standard methods of transmitting and processing
various kinds of information are used over internet and
these methods are called "protocols".
Protocols are established by international agreement
and ensure that computers everywhere can talk to one
another.
17. Types of Internet Protocols
TCP/IP
TCP (Transmission Control Protocol) and IP (Internet Protocol)
are two different procedures that are often linked together.
TCP is the means for creating the packets, putting them back
together in the correct order at the end, and checking to make
sure that no packets got lost in transmission. If necessary, TCP
will request that a packet be resent.
Internet Protocol (IP) is the method used to route
information to the proper address. Every computer on the
Internet has to have its own unique address known as the
IP address. Every packet sent will contain an IP address
showing where it is supposed to go.
18. UDP AND ICMP
UDP
Another protocol is User Datagram Protocol
(UDP).This protocol is used together with IP
when small amounts of information are
involved. It is simpler than TCP and lacks the
flow-control and error-recovery functions of
TCP. Thus, it uses fewer system resources.
ICMP
A different type of protocol is Internet Control
Message Protocol (ICMP) . It defines a small
number of messages used for diagnostic and
management purposes.
19. Mail Protocols POP3 and SMTP
SMTP
The most common protocol for sending mail is
Simple Mail Transfer Protocol (SMTP). When
configuring email clients, an Internet address for
an SMTP server must be entered.
POP3
The most common protocol used by PCs for
receiving mail is Post Office Protocol(POP).Email
clients require an address for a POP3 server
before they can read mail.
20. Hypertext Transfer
Protocol
HTTP
Web pages are constructed according to a standard
method called Hypertext Markup Language (HTML). An
HTML page is transmitted over the Web in a standard
way and format known as Hypertext Transfer Protocol
(HTTP). This protocol uses TCP/IP to manage the Web
transmission.
HTTPS
A related protocol is "Hypertext Transfer Protocol over
Secure Socket Layer" (HTTPS), first introduced by
Netscape. It provides for the transmission in encrypted
form to provide security for sensitive data.
21. OSI Layers
Introduction
Instead of serving as a model with agreed-upon
protocols that would be used worldwide, the OSI
model has become a teaching tool that shows how
different tasks within a network should be handled in
order to promote error-free data transmission.
These jobs are split into seven layers, each of which
depends on the function’s “handed-off” from other
layers
22.
23.
24. DEFINITION OF E-
COMMERCE
E-Commerce or electronic
commerece is a proccess of
buying , selling, transferring
or exchanging products,
services and information via
electronic and computers.
25. TYPES OF E-COMMERECE
•Business to Business (B2B)
•Business to consumer(B2C)
•Consumer to business(C2B)
•Consumer to consumer(C2C)
26. B2B•Its means buisness to buisness. It is the
type of e-commerece in which buyer and
seller, both are buisnesses.
•In this one buisness is sells its products or
services while other buisness buys these
products or services.
For example of B2B site
Global source .com
27. B2C
•Its means buisness to
consumers.
• It is the type of e-commerece
in which buisness sells its services
or products to consumer ,
through internet or computer
network.
For Example icson.com
28. C2B
• customers sells their
products or services to
buisness.
• Its common example is the
advertisment that people put
on different sites.
• For example: priceline.com
29. C2C
one consumer sells its
products to other consumer,
through internet or computer
network.
For example OLX.com
30. ROLE OF E-COMMERECE
•E-Mail
•Video conferencing
•Electronic shopping(E shopping)
•Electronic Banking/Online Banking
• A service that allows an account holder to
obtain account information and manage
certain banking transactions through computer
network is called electronic banking.
31. ADVANTAGES OF E-COMMERECE
•Faster buyingselling procedure, as well as easy
to find products.
•More reach to customers, there is no theoretical
graphical limitations
•Low operational costs and better quality of
services.
•No need of physical company set-ups.
•Easy to start and manage a business.
33. Mobile Communication
Introduction:
Mobile Communication is a communication
network (either public or private) which doesn't
depend on any physical connection between two
communication entities and have flexibility to be
mobile during communication.
The mobile phone has become a fixture of daily
life in almost every society on earth. In 2007, the
world had over 3 billion mobile subscriptions.
34.
35. Evolution of Mobile Radio
Communications:
•The first wire line telephone system was introduced in
the year 1877. Mobile communication in 1934 were based
on Amplitude Modulation (AM)schemes maintained by
public organizations systems.
• World War II brought demand of the development of
Frequency Modulation (FM) technique by Edwin
Armstrong,
•. Mobile telephone was introduced in the year 1946.
•initially it found very less market penetration owing to
high costs and technological drawbacks. Now the term
`mobile' has completely revolutionized the communication
by opening up innovative applications that are limited to
one's imagination. Today, mobile communication has
36. the development of newer and better
technologies starting from the 1970s and
with the mobile users now connected
to the Public Switched Telephone Network
(PSTN), there has been an astronomical
growth in the cellular radio and the
personal communication systems
Present Day Mobile Communication:
Since the time of wireless telegraphy, radio
communication has been used extensively.
•The range of mobility was denied by the transmitter
power
• Type of antenna used and the frequency of operation.
•More users, limited available frequency spectrum
• To resolve this problem, the concept of cellular
communication was evolved. The present day cellular
communication uses a basic unit called cell
37.
38. Functions of E commerce:
1) Registration:
In order to make a purchase, users must register with
the site, providing all the information needed for
shipping and billing.
The data will be stored on a database and will be
available from the back office. basket is a tool that, like
a shopping basket, allows users to sale
2)Basket
The ct the products they want and then go to the
checkout for payment.
Managing the basket means:
summarising user requests within the possibilities
offered by the catalogue checking the basket and
possibly cancel/modify the items placed in it starting
the payment process for the selected products.
39. 3) Product management
This is the main part of the e-commerce system and provides all the
features required for product placement, order fulfilment, etc.., key to
the management of online sales.
4) Listing orders and customer details
From the back office of the site you can search and sort orders by:
•customer
•order status
•date
•Payment
5) Search for articles in the catalog
A search engine of the products is accessible directly by the customers at the
commercial site using the key words associated with each product. These key
words are generated and/or are managed manually.
6) View of the product by list
The view of the products of a category is a standard functionality of the Neogia
solution.
41. What is a Dialup connection?
• Dial-up pertains to a telephone connection in a
system of many lines shared by many users.
• It is maintained for a limited time duration.
The alternative is a dedicated connection,
which is continuously in place.
• Dial-up lines are sometimes called switched
lines and dedicated lines are called non
switched lines.
• A dedicated line is often a leased line that is
rented from a telephone company.
42. • A dial-up connection can be initiated manually or
automatically by your computer's modem or
other device.
43. What is a Leased Line connection?
• A permanent telephone connection between two
points set up by a telecommunications common
carrier.
• leased lines are used by businesses to connect
geographically distant offices. Unlike normal dial-
up connections, a leased line is always active. The
fee for the connection is a fixed monthly rate.
• Connection doesn't carry anybody else's
communications, so the carrier can assure a given
level of quality.
44.
45. Difference between Dialup and Leased
line Addresses
Leased Line Dial-up
Always connected, unless a
system administrator or
power failure takes the
leased-line down.
Initiated on demand, when a
user tries to call a remote
peer.
Rented from a provider. Uses existing telephone
lines.
Requires synchronous units. Uses less costly modems.
46. Pocket PC’s
• Pocket PC (pocket personal computer) is a generic
label that is used to describe a mobile device that
provides many of the same functions as a desktop
computer.
• Informally, the term is used as a synonym for smart
phone or personal digital assistant (PDA). Pocket PC
is a hardware specification from Microsoft for a
small, handheld computing device that uses the
Microsoft's Windows Mobile operating system
50. • It is a collection of text
documents and other
resources, linked by
hyperlinks and URLs,
usually accessed by web
browsers, from web
servers.
• It is one of the services
transferred over these
networks.
• World wide web
51. Linking
• Web pages contain hyperlinks
to other related pages and
perhaps to downloadable files,
source documents, definitions
and other web resources. In
the underlying HTML, a
hyperlink looks like <a
href="http://example.org/wiki/
Main_Page">Example.org, a
free encyclopedia</a
52. Dynamics Update Of Web Pages
• Java Script is a scripting language that was
initially developed in 1995 by Brendan Eich,
• Netscape, for use within web pages.
• The standardised version is ECMA Script.
• Multiple Ajax requests can be handled at the
same time, and users can interact with the
page while data is retrieved.
• Web pages may also regularly poll the server
to check whether new information is
available.
53. • Important aspect in communication technology is
mobile phone has become the most common tool of
communication from the last few years.
• Pre-cell phone mobile phone technology,
communication was possible only through voice. But
now we have certain advance technologies
1. Analogue cell phones
2. Digital cell phones
3. 2G networks for voice only
4. 3G introduced
Advancements
54.
55. 4G Connections
• 4G development focuses around achieving
ultra-broadband speeds, competing with and
in some cases outstripping the speeds
providing by your home internet connections.
56. 5G Connections
• 5G is a technology used in research papers
and projects to denote the next major phase
of mobile telecommunication standards.
• It is a real wireless world that is WWWW
(World Wide Wireless Web).
57. Telephony & Modem
• Telephony is transmission of speech/sound at
a distance via electromagnetic spectrum.
• Modem is a device that encodes digital
computer signals in to analogue signals and
vice versa. It allows computers to
communicate over a phone line.