SlideShare a Scribd company logo
1 of 20
INTERNET
OBJECTIVES
 Introduction/Definition
 History
 Internet services
 www
 www browser
 Internet search engine
 Uses of internet
 Advantages of internet
 Disadvantages of internet
 Conclusion
Introduction/Definition
 The Internet or “Net” (network of networks) is the largest
computer network in the world that connects billions of
computer users.
 The word internet comes from combination between
“interconnection” and “Network”
 Network is a collection of computers and devices
connected via communication channels and
transmission media allow to share resources (hardware,
software, data, information).
 The vast collection of computer networks which form
and act as a single huge networks for transport of data
and messages across distances which can be anywhere
from the same office to anywhere in the world.
BRIEF HISTORY
 ARPA – Advanced Research Project Agency.
 1969 January 2 – started an experimental Computer Network.
 Concept – No Server, but equal importance/participation to every computer
in the Network.
 Even if, one or two node destroyed that will not affect the Network.
 In 1982 the word internet started.
 1991: US government allowed business agencies to connect to internet.
 Now all people can connect to internet and improve their life and work
quality.
 The internet support various aspects in our life.
Father of Internet
 Vinton Cerf
 Co-designer of the TCP/IP networking
protocol.
How to connect to Internet
Internet Services
 WWW
 Webpage / Homepage
 Web Publishing
 Web browser
 Search Engine
 Protocol
 Internet protocol
 DNS
 HTTP
 URL
 HTML
 ISP
 E-mail
 Newsgroup
 Video conferencing
 FTP
 Telnet
 Forum
WWW WORLD WIDE WEB
 World Wide Web or W3 is the most popular and promising
method of organizing and accessing information on the
INTERNET.
 Hypertext is a new way of information storage and retrieval
that enables authors to structure information in novel ways.
 A properly designed hypertext document can help users to
locate desired type of information rapidly.
 Hypertext documents enable this by using a series of link. A
link is a special type of item in a hypertext document
connecting the document to another document.
 Hypertext documents on internet are known as Web Pages.
Father of WWW
 Tim Berners-Lee, 1989
 Invented WWW while working at CERN, the
European Particle Physics Laboratory
Web Page
 A web page is a document or resource of information
that is suitable for the World Wide Web and can be
accessed through a web browser and displayed on a
monitor or mobile device.
 This information is usually in HTML or XHTML format,
and may provide navigation to other webpages via
hypertext links.
 It can contain text, graphics, audio, video and has built-
in connection or links to other web documents.
 A web page has a unique address called a Uniform
Resource Locator (URL).
Web Browser
 A software application for retrieving, presenting, and
traversing information resources on the World Wide
Web.
 It allows to locate, view, and navigate the web.
 It can have a Graphical User Interface, meaning they
can display pictures (graphics) in addition to text and
other forms of multimedia such as sound and video like
Internet Explorer, Mozilla Firefox, Chrome and Opera.
 First web browser was develop in 1991: Mosaic develop
by Marc Andreessen.
Search Engine
A search engine is a web-based tool that enables
users to locate information on the World Wide
Web. Popular examples of search engines are
Google, Yahoo!, and MSN Search.
PROTOCOL
 A network protocol is an established set of rules that determine how data is
transmitted between different devices in the same network. Essentially, it
allows connected devices to communicate with each other, regardless of
any differences in their internal processes, structure or design.
 Format that agreed to transfer data between two devices.
 Hypertext Transfer Protocol (HTTP)
 Internet Protocol (IP)
 File transfer protocol (FTP)
 Simple Mail Transfer Protocol (SMTP)
 Networks News File Transfer Protocol (NNTP)
 Transmission Control Protocol (TCP)
E-MAIL (ELECTRONIC MAIL)
 A written message that is sent and received over the Internet.
 The message can be formatted and enhanced with graphics and
may also include other files as attachments.
 Like ordinary mail, email have address, E.g. s12345@e-
web.uum.edu.my
 An e-mail address identifies an e-mail box to which e-mail
messages may be delivered.
 Most e-mail on the Internet uses the Simple Mail Transfer Protocol
(SMTP).
USES OF INTERNET
 On-line communication
 Software sharing
 Exchange of views on topics of common interest
 Posting of information of general interest
 Organization promotion
 Product promotion and feedback about products
 Customer support service
 On-line journals, magazines, Encyclopedia, and dictionary
 On-line shopping
 World-wide conferencing
Advantages of Internet
 Communication:
Communication is a process transmitting and receiving symbol, data, image, text,
document, graphic etc. by using various computer devices.
 Research:
In order to do research you need to go through hundreds of books as well as the
references and that was one of the most difficult jobs to do earlier.
Research is one such thing which has got lots of benefit from this evolution of
internet.
 Education:
Education is one of the best things that the internet can provide
There are a number of books, reference books, online help centers, expert’s views and
other study oriented material on the internet that can make the learning process very
easier as well as a fun learning experience.
 Financial Transactions:
Financial transaction is the term which is used when there is exchange of money.
With the use of internet in the financial transaction, your work has become a lot
easier.
Disadvantages of Internet
 Theft of Personal Information:
The use of Internet for banking, social networking, or other
services, often makes our personal information vulnerable to
theft
 Spamming refers to sending unwanted e-mails, which serve
no purpose and needlessly obstruct the computer system
 One of the most annoying problems with the Internet is the
ease with which any malware can infect our computers. Virus
programs are inconspicuous and may get activated simply by
clicking a seemingly harmless link
 Social Isolation, Obesity and Depression:
INTERNET IN NURSING
 COMMUNICATION:
Nurse can utilize this source of communication. The patient or their
relatives come to discuss different health related concerns with one
another and with their health care providers on Social media.
 Information:
Nurses can utilize the internet to get a lot of information related to the
patient’s disease, treatment, nursing care plans, and procedures. Nurses
can read researches, blogs, and articles to strengthen their knowledge.
Information a nurse can get by using of internet:
 Diagnostic care
 Research articles
 Blogs
 Education
 Jobs and admissions
Conclusion
 On one hand make best use of internet with careful planning and
proper management, putting a business on the internet can make it
more effective and productive.
 However understanding and knowing how the rapid changes and
various complex issues that can be encountered in getting the
business onto the net is imperative to its success.

More Related Content

What's hot

1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of itKMJ Science Computer
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technologyactanimation
 
Various Uses of internet
Various Uses of internetVarious Uses of internet
Various Uses of internetsunnik
 
2.3 the internet services
2.3 the internet services2.3 the internet services
2.3 the internet serviceshazirma
 
History of the internet
History of the internetHistory of the internet
History of the internetAmal Jith
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Module 4 Enterprise Resource Planning
Module 4 Enterprise Resource PlanningModule 4 Enterprise Resource Planning
Module 4 Enterprise Resource PlanningJitendra Tomar
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and InternetJanecatalla
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Legal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerceLegal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commercePrince Sharma
 
Living in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxLiving in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxFroilan Cantillo
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetTanvir Raihan
 

What's hot (20)

1.1 introduction to it and development of it
1.1 introduction to it and development of it1.1 introduction to it and development of it
1.1 introduction to it and development of it
 
Internet
InternetInternet
Internet
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
Various Uses of internet
Various Uses of internetVarious Uses of internet
Various Uses of internet
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
2.3 the internet services
2.3 the internet services2.3 the internet services
2.3 the internet services
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Everything about Internet
Everything about InternetEverything about Internet
Everything about Internet
 
History of the internet
History of the internetHistory of the internet
History of the internet
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Module 4 Enterprise Resource Planning
Module 4 Enterprise Resource PlanningModule 4 Enterprise Resource Planning
Module 4 Enterprise Resource Planning
 
Internet ppt
Internet  ppt Internet  ppt
Internet ppt
 
The internet
The internetThe internet
The internet
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Legal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerceLegal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerce
 
Living in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxLiving in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptx
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 

Similar to INTERNET.pptx

Similar to INTERNET.pptx (20)

internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
Internet
InternetInternet
Internet
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
INTERNET.pptx
INTERNET.pptxINTERNET.pptx
INTERNET.pptx
 
Internet unit - 4 Of Computer
Internet unit - 4 Of ComputerInternet unit - 4 Of Computer
Internet unit - 4 Of Computer
 
internet
internetinternet
internet
 
The internet and www 2
The internet and www 2The internet and www 2
The internet and www 2
 
Learning activity 2
Learning activity 2Learning activity 2
Learning activity 2
 
Essays On The Internet
Essays On The InternetEssays On The Internet
Essays On The Internet
 
The internet (20112628 jang hee ran)
The internet (20112628 jang hee ran)The internet (20112628 jang hee ran)
The internet (20112628 jang hee ran)
 
Internet
InternetInternet
Internet
 
unit-5 (2).pdf
unit-5 (2).pdfunit-5 (2).pdf
unit-5 (2).pdf
 
Internet advantages and disadvantages
Internet advantages and disadvantagesInternet advantages and disadvantages
Internet advantages and disadvantages
 
Ict internet and html
Ict   internet and htmlIct   internet and html
Ict internet and html
 
Fa13 7718-ch3-kim
Fa13 7718-ch3-kimFa13 7718-ch3-kim
Fa13 7718-ch3-kim
 
The internet and online services
The internet and online servicesThe internet and online services
The internet and online services
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
 

Recently uploaded

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 

Recently uploaded (20)

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 

INTERNET.pptx

  • 2. OBJECTIVES  Introduction/Definition  History  Internet services  www  www browser  Internet search engine  Uses of internet  Advantages of internet  Disadvantages of internet  Conclusion
  • 3. Introduction/Definition  The Internet or “Net” (network of networks) is the largest computer network in the world that connects billions of computer users.  The word internet comes from combination between “interconnection” and “Network”  Network is a collection of computers and devices connected via communication channels and transmission media allow to share resources (hardware, software, data, information).  The vast collection of computer networks which form and act as a single huge networks for transport of data and messages across distances which can be anywhere from the same office to anywhere in the world.
  • 4. BRIEF HISTORY  ARPA – Advanced Research Project Agency.  1969 January 2 – started an experimental Computer Network.  Concept – No Server, but equal importance/participation to every computer in the Network.  Even if, one or two node destroyed that will not affect the Network.  In 1982 the word internet started.  1991: US government allowed business agencies to connect to internet.  Now all people can connect to internet and improve their life and work quality.  The internet support various aspects in our life.
  • 5. Father of Internet  Vinton Cerf  Co-designer of the TCP/IP networking protocol.
  • 6. How to connect to Internet
  • 7. Internet Services  WWW  Webpage / Homepage  Web Publishing  Web browser  Search Engine  Protocol  Internet protocol  DNS  HTTP  URL  HTML  ISP  E-mail  Newsgroup  Video conferencing  FTP  Telnet  Forum
  • 8. WWW WORLD WIDE WEB  World Wide Web or W3 is the most popular and promising method of organizing and accessing information on the INTERNET.  Hypertext is a new way of information storage and retrieval that enables authors to structure information in novel ways.  A properly designed hypertext document can help users to locate desired type of information rapidly.  Hypertext documents enable this by using a series of link. A link is a special type of item in a hypertext document connecting the document to another document.  Hypertext documents on internet are known as Web Pages.
  • 9. Father of WWW  Tim Berners-Lee, 1989  Invented WWW while working at CERN, the European Particle Physics Laboratory
  • 10. Web Page  A web page is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device.  This information is usually in HTML or XHTML format, and may provide navigation to other webpages via hypertext links.  It can contain text, graphics, audio, video and has built- in connection or links to other web documents.  A web page has a unique address called a Uniform Resource Locator (URL).
  • 11. Web Browser  A software application for retrieving, presenting, and traversing information resources on the World Wide Web.  It allows to locate, view, and navigate the web.  It can have a Graphical User Interface, meaning they can display pictures (graphics) in addition to text and other forms of multimedia such as sound and video like Internet Explorer, Mozilla Firefox, Chrome and Opera.  First web browser was develop in 1991: Mosaic develop by Marc Andreessen.
  • 12. Search Engine A search engine is a web-based tool that enables users to locate information on the World Wide Web. Popular examples of search engines are Google, Yahoo!, and MSN Search.
  • 13. PROTOCOL  A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design.  Format that agreed to transfer data between two devices.  Hypertext Transfer Protocol (HTTP)  Internet Protocol (IP)  File transfer protocol (FTP)  Simple Mail Transfer Protocol (SMTP)  Networks News File Transfer Protocol (NNTP)  Transmission Control Protocol (TCP)
  • 14. E-MAIL (ELECTRONIC MAIL)  A written message that is sent and received over the Internet.  The message can be formatted and enhanced with graphics and may also include other files as attachments.  Like ordinary mail, email have address, E.g. s12345@e- web.uum.edu.my  An e-mail address identifies an e-mail box to which e-mail messages may be delivered.  Most e-mail on the Internet uses the Simple Mail Transfer Protocol (SMTP).
  • 15. USES OF INTERNET  On-line communication  Software sharing  Exchange of views on topics of common interest  Posting of information of general interest  Organization promotion  Product promotion and feedback about products  Customer support service  On-line journals, magazines, Encyclopedia, and dictionary  On-line shopping  World-wide conferencing
  • 16.
  • 17. Advantages of Internet  Communication: Communication is a process transmitting and receiving symbol, data, image, text, document, graphic etc. by using various computer devices.  Research: In order to do research you need to go through hundreds of books as well as the references and that was one of the most difficult jobs to do earlier. Research is one such thing which has got lots of benefit from this evolution of internet.  Education: Education is one of the best things that the internet can provide There are a number of books, reference books, online help centers, expert’s views and other study oriented material on the internet that can make the learning process very easier as well as a fun learning experience.  Financial Transactions: Financial transaction is the term which is used when there is exchange of money. With the use of internet in the financial transaction, your work has become a lot easier.
  • 18. Disadvantages of Internet  Theft of Personal Information: The use of Internet for banking, social networking, or other services, often makes our personal information vulnerable to theft  Spamming refers to sending unwanted e-mails, which serve no purpose and needlessly obstruct the computer system  One of the most annoying problems with the Internet is the ease with which any malware can infect our computers. Virus programs are inconspicuous and may get activated simply by clicking a seemingly harmless link  Social Isolation, Obesity and Depression:
  • 19. INTERNET IN NURSING  COMMUNICATION: Nurse can utilize this source of communication. The patient or their relatives come to discuss different health related concerns with one another and with their health care providers on Social media.  Information: Nurses can utilize the internet to get a lot of information related to the patient’s disease, treatment, nursing care plans, and procedures. Nurses can read researches, blogs, and articles to strengthen their knowledge. Information a nurse can get by using of internet:  Diagnostic care  Research articles  Blogs  Education  Jobs and admissions
  • 20. Conclusion  On one hand make best use of internet with careful planning and proper management, putting a business on the internet can make it more effective and productive.  However understanding and knowing how the rapid changes and various complex issues that can be encountered in getting the business onto the net is imperative to its success.