SlideShare a Scribd company logo
THE INTERNET Every machine transparently connected to every other
WHAT IS THE INTERNET? ,[object Object]
HOW DID THE INTERNET START? ,[object Object],[object Object],[object Object]
HOW DOES THE INTERNET WORK? ,[object Object]
WHO IS WHO ON THE INTERNET ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
E-MAIL:   Send and receive instant electronic messages
ACCESS INFORMATION:   ,[object Object]
SHOPPING: ,[object Object]
ONLINE CHAT: ,[object Object]
DOWNLOADING SOFTWARE:   ,[object Object]
[object Object]
INTERNET ,[object Object]
FORMS OF ATTACK CYBER TERRORISM COOKIES VIRUSES HACKING
HACKING ,[object Object]
VIRUSES ,[object Object],[object Object],[object Object],[object Object],[object Object]
COOKIES ,[object Object],[object Object]
CYBER-TERRORISM ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Internet is a cooperative environment and has social as well as technical aspects. It is the responsibility of all the users to ensure trust of the community  :-)
The growth of Internet is not a fluke or a fad, but the consequence of unleashing the power of individual creativity.
CONCLUSION ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Deepak malviya mp 03 subject 703
Deepak malviya mp 03 subject 703Deepak malviya mp 03 subject 703
Deepak malviya mp 03 subject 703
Nayna Azad
 
COmPuter
COmPuterCOmPuter
Computer ethics
Computer ethicsComputer ethics
Computer ethics
RitikaSharma238
 
Computer
ComputerComputer
Computer
faisalbhatti
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
Fizaril Amzari Omar
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
RoshanMaharjan13
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Tanvi Jindal
 
Ahmed computer
Ahmed computerAhmed computer
Ahmed computer
A7medsharaf
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
JuliaHoesingVanderMolen
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
Middle East International School
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
Fizaril Amzari Omar
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Benjamin Sangalang
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Kodok Ngorex
 
Chap 1
Chap 1Chap 1
Chap 1
fauzihayob
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
John Bosco Javellana, MAEd.
 
cyber crime
cyber crimecyber crime
cyber crime
Mukund10
 

What's hot (20)

Deepak malviya mp 03 subject 703
Deepak malviya mp 03 subject 703Deepak malviya mp 03 subject 703
Deepak malviya mp 03 subject 703
 
COmPuter
COmPuterCOmPuter
COmPuter
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer
ComputerComputer
Computer
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
 
Ahmed computer
Ahmed computerAhmed computer
Ahmed computer
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Chap 1
Chap 1Chap 1
Chap 1
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
cyber crime
cyber crimecyber crime
cyber crime
 

Similar to Internet(2)

Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
Malik Afzaal
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
Janecatalla
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
Pallavi Gupte
 
Hamza
HamzaHamza
Hamza
HamzaBaqee
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
Chirag Sharma
 
Future of the Internet
Future of the InternetFuture of the Internet
Future of the Internet
Yogi Schulz
 
Essays On The Internet
Essays On The InternetEssays On The Internet
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
Bellaj Badr
 
Internet Essay
Internet EssayInternet Essay
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
JohnsmithAlberto2
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
Tushar Rajput
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
AliiyLomugdang
 
Going Online
Going OnlineGoing Online
Going Online
allsaintstech
 
Going Online
Going OnlineGoing Online
Going Online
cocon5
 
Chapter-7-Networks-and-The-Internet.pptx
Chapter-7-Networks-and-The-Internet.pptxChapter-7-Networks-and-The-Internet.pptx
Chapter-7-Networks-and-The-Internet.pptx
CarenPelayoJonelas
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Ajinkya Dubey
 
E content internet
E   content internetE   content internet
E content internet
Kaliyamurthi Punitha Devi
 
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
huong Tran thu
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
Amir Khan
 
Internet
InternetInternet
Internet
Chitrabengani
 

Similar to Internet(2) (20)

Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
Hamza
HamzaHamza
Hamza
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
 
Future of the Internet
Future of the InternetFuture of the Internet
Future of the Internet
 
Essays On The Internet
Essays On The InternetEssays On The Internet
Essays On The Internet
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
Internet Essay
Internet EssayInternet Essay
Internet Essay
 
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Going Online
Going OnlineGoing Online
Going Online
 
Going Online
Going OnlineGoing Online
Going Online
 
Chapter-7-Networks-and-The-Internet.pptx
Chapter-7-Networks-and-The-Internet.pptxChapter-7-Networks-and-The-Internet.pptx
Chapter-7-Networks-and-The-Internet.pptx
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
E content internet
E   content internetE   content internet
E content internet
 
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
Internet
InternetInternet
Internet
 

Recently uploaded

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 

Recently uploaded (20)

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 

Internet(2)

  • 1. THE INTERNET Every machine transparently connected to every other
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. E-MAIL: Send and receive instant electronic messages
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. FORMS OF ATTACK CYBER TERRORISM COOKIES VIRUSES HACKING
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Internet is a cooperative environment and has social as well as technical aspects. It is the responsibility of all the users to ensure trust of the community :-)
  • 21. The growth of Internet is not a fluke or a fad, but the consequence of unleashing the power of individual creativity.
  • 22.