This document provides an introduction to using the internet with Windows 7. It discusses what the internet is, popular uses like email and chat, the world wide web and hyperlinks. It explains how to access the internet, browsers, antivirus software, firewalls and cookies. It covers the basics of websites including domains, addresses, and popular sites. It also discusses searching the internet using search engines and how to save or download documents from websites.
This document provides an overview of various free online tools that are useful for students' academic work. It describes tools for searching scholarly resources and blogs, keeping up-to-date using RSS feeds, organizing and citing sources, sharing media, archiving web pages, conducting research faster and brainstorming concepts collaboratively using mind mapping tools. Specific tools mentioned include Google Scholar, Google Books, WorldCat, Blogspot, Google Blog Search, iGoogle, del.icio.us, YouTube, Flickr, Internet Archive, Google Toolbar, Dipity, Spreeder, Comapping, Skype and SlideShare.
Search Engines & Web Browser & Internet & World wide Web (WWW)ShaharyarShoukatShou
The document provides information about search engines, web browsers, and the World Wide Web (WWW). It defines search engines as software systems that search the WWW and presents results in search engine results pages. Web browsers allow users to access and view information on the WWW through computers, smartphones, tablets and other devices. The document lists some popular web browsers and their components. It describes the WWW as a system of electronic documents connected through hyperlinks that enables users to navigate between documents. Key terms like URLs, deep web, internet, and how the internet works are also summarized.
The document discusses the history and basics of the World Wide Web and web browsing. It explains that Tim Berners-Lee invented the World Wide Web in 1990 to create an easy-to-use global information system by merging various Internet technologies. It defines key web terms like website, web page, homepage, hyperlinks, and URLs. It also describes how to navigate websites using a web browser by entering URLs and clicking navigation buttons. Domain name extensions like .com, .edu and country codes are also explained.
ICT refers to all communication technologies including radio, television and computers. It is the main method of communicating and sharing information across different fields like business, engineering, education, health and sports. The evolution of the internet from Web 1.0 to Web 2.0 allowed users to interact and create content, moving from a "read-only" to a "read-write" experience. Popular social media platforms today include Facebook, Twitter and Instagram, which enable sharing content with connections. Basic image editing can be done using both online and offline open source software like GIMP, which allow manipulating photos through tools and options.
The document provides an overview of the history and importance of the Internet. It discusses how the Internet began with the development of computers in the 1950s and the first message being sent over ARPANET in 1969. It describes some key early packet switched networks and protocols that enabled internetworking. The document outlines basic steps for using an Internet browser and highlights the global and ubiquitous nature of the Internet for communication.
The document provides information about email etiquette. It recommends (1) clearly summarizing the email subject, (2) avoiding unnecessary CCing, (3) using BCC to protect recipient privacy, (4) keeping emails short and focused, (5) not writing in all caps as it appears as shouting, (6) not including anything confidential or inappropriate that could be forwarded, and (7) using emoticons to ensure tone and intent are understood. Following basic etiquette makes email communication more effective and avoids potential issues.
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
This document discusses information and communication technology (ICT) and its current state. It describes social media platforms like Facebook, Twitter, and Instagram. It also discusses possible internet dangers like email spam, phishing, and computer viruses. The document outlines methods of online research and contextual search. It provides steps for conducting contextualized online searches and identifying reliable sources. Lastly, it discusses mail merge and label generation in Microsoft Word.
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
This document discusses various aspects of mail merge and label generation in Microsoft Word. It provides step-by-step instructions on how to create a recipient list, prepare a publication for mail merge, merge the publication with the recipient list to create individualized documents, and generate labels. The key components of mail merge include the recipient list, publication with merge fields, and merging the publication. Label generation involves setting label options and printing.
This document provides an overview of various free online tools that are useful for students' academic work. It describes tools for searching scholarly resources and blogs, keeping up-to-date using RSS feeds, organizing and citing sources, sharing media, archiving web pages, conducting research faster and brainstorming concepts collaboratively using mind mapping tools. Specific tools mentioned include Google Scholar, Google Books, WorldCat, Blogspot, Google Blog Search, iGoogle, del.icio.us, YouTube, Flickr, Internet Archive, Google Toolbar, Dipity, Spreeder, Comapping, Skype and SlideShare.
Search Engines & Web Browser & Internet & World wide Web (WWW)ShaharyarShoukatShou
The document provides information about search engines, web browsers, and the World Wide Web (WWW). It defines search engines as software systems that search the WWW and presents results in search engine results pages. Web browsers allow users to access and view information on the WWW through computers, smartphones, tablets and other devices. The document lists some popular web browsers and their components. It describes the WWW as a system of electronic documents connected through hyperlinks that enables users to navigate between documents. Key terms like URLs, deep web, internet, and how the internet works are also summarized.
The document discusses the history and basics of the World Wide Web and web browsing. It explains that Tim Berners-Lee invented the World Wide Web in 1990 to create an easy-to-use global information system by merging various Internet technologies. It defines key web terms like website, web page, homepage, hyperlinks, and URLs. It also describes how to navigate websites using a web browser by entering URLs and clicking navigation buttons. Domain name extensions like .com, .edu and country codes are also explained.
ICT refers to all communication technologies including radio, television and computers. It is the main method of communicating and sharing information across different fields like business, engineering, education, health and sports. The evolution of the internet from Web 1.0 to Web 2.0 allowed users to interact and create content, moving from a "read-only" to a "read-write" experience. Popular social media platforms today include Facebook, Twitter and Instagram, which enable sharing content with connections. Basic image editing can be done using both online and offline open source software like GIMP, which allow manipulating photos through tools and options.
The document provides an overview of the history and importance of the Internet. It discusses how the Internet began with the development of computers in the 1950s and the first message being sent over ARPANET in 1969. It describes some key early packet switched networks and protocols that enabled internetworking. The document outlines basic steps for using an Internet browser and highlights the global and ubiquitous nature of the Internet for communication.
The document provides information about email etiquette. It recommends (1) clearly summarizing the email subject, (2) avoiding unnecessary CCing, (3) using BCC to protect recipient privacy, (4) keeping emails short and focused, (5) not writing in all caps as it appears as shouting, (6) not including anything confidential or inappropriate that could be forwarded, and (7) using emoticons to ensure tone and intent are understood. Following basic etiquette makes email communication more effective and avoids potential issues.
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
This document discusses information and communication technology (ICT) and its current state. It describes social media platforms like Facebook, Twitter, and Instagram. It also discusses possible internet dangers like email spam, phishing, and computer viruses. The document outlines methods of online research and contextual search. It provides steps for conducting contextualized online searches and identifying reliable sources. Lastly, it discusses mail merge and label generation in Microsoft Word.
EMPOWERMENT TECHNOLOGY BY: LANIE GAIL GATO LEIBE MAE GERONA APRIL ROSE GARON...LanieGailGato
This document discusses various aspects of mail merge and label generation in Microsoft Word. It provides step-by-step instructions on how to create a recipient list, prepare a publication for mail merge, merge the publication with the recipient list to create individualized documents, and generate labels. The key components of mail merge include the recipient list, publication with merge fields, and merging the publication. Label generation involves setting label options and printing.
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
This document discusses the use of information and communication technology (ICT) and how it has evolved over time. It provides details on:
- ICT being the umbrella term for any communication device or application, including radio, television, computers, etc.
- The evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 to the semantic Web 3.0.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Potential dangers of using technology like email spam, spoofing, phishing, malware, and how to better protect computers and networks.
The document provides an overview of the history and development of the Internet from its origins as a US Defense Department project to connect scientists, its commercial opening in 1992, and its subsequent rapid expansion globally; it describes common uses of the Internet like email, research sharing, marketing, and gathering information; and it outlines basics of using the Internet through web browsers, searching, and communicating via email with features like sending, receiving, replying and forwarding messages.
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
This document discusses empowerment through technology. It begins by defining ICT and outlining the evolution from Web 1.0 to 3.0. It then discusses technologies like social media, smartphones, and specific platforms. Dangers of the internet like viruses and hackers are also covered. The document provides guidance on contextualized research including defining terms and outlining steps. It also discusses skills needed for research and summarizes parts of tools like Gmail merge and GIMP image software.
The document provides an introduction to digital information services and web 2.0 technologies. It defines web 2.0 as network platforms that span connected devices and allow users to deliver and remix data from multiple sources to create network effects. The document then lists and briefly describes several popular web 2.0 services, including Google services, sites for photos/videos, social networking, file sharing, academic resources, and search tools.
Empowerment technology Josua De Guzman and CharizaPadsromel
The document discusses various topics related to information and communication technology (ICT), including the evolution of the World Wide Web from static Web 1.0 to interactive Web 2.0 to semantic Web 3.0. It also covers popular social media platforms, online dangers like viruses and spam, and basic computer security measures. Additionally, the document explains how to perform mail merges in Microsoft Word and generate labels, as well as identify reliable sources of photos and graphics both online and offline.
The document discusses various topics related to information and communication technology (ICT). It provides an overview of the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and emerging semantic Web 3.0. It also discusses technology convergence and popular social media platforms. Additionally, it outlines some common online dangers like email spam, phishing and computer viruses as well as protections like firewalls and antivirus software.
The document provides an overview of fundamentals of the internet including its history, services, components and social networking sites. It discusses how ARPANET evolved into the modern internet through the development of TCP/IP. The key services of the internet mentioned are online communication, education, shopping, news/updates, entertainment, booking and banking. Components like the world wide web, websites, browsers, URLs, web servers, ISPs, HTML, HTTP, DNS and search engines are described. Popular social networking sites like Facebook, Twitter, WhatsApp and Instagram are outlined highlighting their key features.
Beacon, GRDDL, and Twine... oh my!! Sometimes it is hard to keep track of all the new technology on the web. Which are the ones worth paying attention to? Let's take a look into how the web evolves and where we've came from. (Finally, a field where "evolution" and "intelligent design" can play nice.) We'll dive deep into some of the upcoming trends poised to change the web as we know it.
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
The document discusses various topics related to information and communication technology (ICT). It provides information on the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. Additionally, it outlines some potential dangers of internet use like email spam, phishing, and computer viruses. It provides tips for protecting networks and computers from online threats. The document also discusses contextual search strategies and how to identify satirical news sources.
The document provides an introduction to the Internet and the World Wide Web. It defines the Internet as a network of networks made up of millions of computers worldwide. The World Wide Web, which runs on the Internet, consists of documents and web pages connected through hyperlinks and accessed using a web browser. The document outlines how to navigate and search the Web using URLs, search engines, and browsing tools.
Empowerment technology by ybonne amor and jeshaYbonnica22
This document discusses empowerment through information and communication technology. It provides an overview of ICT, including the evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. The document then covers possible internet dangers and protections, as well as research skills and methods for contextualized online searching. It concludes with sections on mail merge and label generation in Microsoft Word and creating slide presentations in PowerPoint.
The document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It provides information on social media platforms like Facebook, Twitter, Instagram, and Snapchat. It also discusses topics like assistive media, possible internet dangers and protections, online searching methods, and mail merge and label generation in Microsoft Word.
The document discusses today's generation and their use of technology. It notes that while people today are very active with technologies like phones, tablets, and laptops, some are ignorant of the potential harms of overuse. It also comments that the Japanese are very skilled with technology and unique in their gadget-making abilities.
How to get genuine windows 7 with low cost coldfire007
The document discusses options for obtaining Microsoft software at low cost, including using Microsoft Technet and MSDN. It warns of the dangers of pirated software, such as malware and invalid product keys. It provides an overview of what Technet and MSDN are and how they provide access to Microsoft software and documentation.
Windows 8 introduces significant changes focused on improving the user experience on mobile devices like tablets. It includes a new Start screen interface designed for both touchscreens and mouse/keyboard. The Start screen displays tiles connected to apps, files, and websites that update in real-time. Windows 8 also allows users to access files, apps, and settings from any device by signing in with a Microsoft account and connecting to the cloud.
The document discusses various aspects of the internet including:
- The internet connects millions of websites and servers through an interconnected network.
- It allows people to communicate and share information globally through email, files, videos and more.
- The world wide web was created in 1990 by Tim Berners-Lee and allows webpages to be accessed through browsers and hyperlinks.
- Key components of the internet include URLs, domains, folders, files, protocols, browsers, and web servers.
- There are different categories of websites including news, education, business, entertainment and personal websites.
The document provides a history of the development of the Internet and World Wide Web. It discusses how ARPANET, developed by the US Department of Defense, evolved into the Internet and enabled communication between linked computer networks internationally. The World Wide Web was created by Tim Berners-Lee in 1989-1991 and allowed for sharing of information over the Internet through hyperlinks. Early web browsers like Mosaic helped popularize the graphical web interface.
This document provides an overview of various topics related to empowerment technology. It includes definitions of information and communication technology, descriptions of the evolution of internet technology from Web 1.0 to 3.0, and explanations of technology convergence and social media. It also discusses dangers of computers like viruses and spam, and how to protect computers. Additional sections cover skills for online research, mail merge functions, satirical news sites, Microsoft Excel, and digital file formats for images and text.
This document provides instructions for organizing files and folders on the desktop. It outlines 17 steps to create a folder, move a file into the folder, rename the file, view folder properties, and delete the folder. The instructions teach how to use basic desktop functions like creating shortcuts, folders, copying and pasting files, dragging and dropping, renaming, and viewing properties. Keeping the desktop uncluttered is recommended so that important shortcuts are easy to find.
This document provides an overview of the internet and email. It defines the internet as the largest computer network connecting millions of computers worldwide. It describes two types of computer networks - local area networks (LANs) and wide area networks (WANs). The internet is the largest WAN. It explains how servers store and share information with client computers. It also describes how the world wide web works as a system of web pages connected through hyperlinks, stored on servers. The document outlines common ways the internet is used, such as searching for information, communication tools like social media and chat, and downloading files. It provides guidance on choosing an internet service provider and explains the basic functions of web browsers.
This document provides an overview of the internet and email. It defines the internet as the largest computer network connecting millions of computers worldwide. It describes two types of computer networks - local area networks (LANs) and wide area networks (WANs). The internet is the largest WAN. It explains how servers store and share information with client computers. It also describes how the world wide web works as a system of web pages connected through hyperlinks, stored on servers. The document outlines common ways the internet is used, such as searching for information, communication tools like social media and chat, and downloading files. It provides guidance on choosing an internet service provider and explains the basic functions of web browsers.
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
This document discusses the use of information and communication technology (ICT) and how it has evolved over time. It provides details on:
- ICT being the umbrella term for any communication device or application, including radio, television, computers, etc.
- The evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 to the semantic Web 3.0.
- Popular social media platforms like Facebook, Twitter, Instagram, and Snapchat.
- Potential dangers of using technology like email spam, spoofing, phishing, malware, and how to better protect computers and networks.
The document provides an overview of the history and development of the Internet from its origins as a US Defense Department project to connect scientists, its commercial opening in 1992, and its subsequent rapid expansion globally; it describes common uses of the Internet like email, research sharing, marketing, and gathering information; and it outlines basics of using the Internet through web browsers, searching, and communicating via email with features like sending, receiving, replying and forwarding messages.
Empowerment Technology By: JOAN GOZO AND KENNETH MACUTOPadsromel
This document discusses empowerment through technology. It begins by defining ICT and outlining the evolution from Web 1.0 to 3.0. It then discusses technologies like social media, smartphones, and specific platforms. Dangers of the internet like viruses and hackers are also covered. The document provides guidance on contextualized research including defining terms and outlining steps. It also discusses skills needed for research and summarizes parts of tools like Gmail merge and GIMP image software.
The document provides an introduction to digital information services and web 2.0 technologies. It defines web 2.0 as network platforms that span connected devices and allow users to deliver and remix data from multiple sources to create network effects. The document then lists and briefly describes several popular web 2.0 services, including Google services, sites for photos/videos, social networking, file sharing, academic resources, and search tools.
Empowerment technology Josua De Guzman and CharizaPadsromel
The document discusses various topics related to information and communication technology (ICT), including the evolution of the World Wide Web from static Web 1.0 to interactive Web 2.0 to semantic Web 3.0. It also covers popular social media platforms, online dangers like viruses and spam, and basic computer security measures. Additionally, the document explains how to perform mail merges in Microsoft Word and generate labels, as well as identify reliable sources of photos and graphics both online and offline.
The document discusses various topics related to information and communication technology (ICT). It provides an overview of the evolution of the World Wide Web from static Web 1.0 to more interactive Web 2.0 and emerging semantic Web 3.0. It also discusses technology convergence and popular social media platforms. Additionally, it outlines some common online dangers like email spam, phishing and computer viruses as well as protections like firewalls and antivirus software.
The document provides an overview of fundamentals of the internet including its history, services, components and social networking sites. It discusses how ARPANET evolved into the modern internet through the development of TCP/IP. The key services of the internet mentioned are online communication, education, shopping, news/updates, entertainment, booking and banking. Components like the world wide web, websites, browsers, URLs, web servers, ISPs, HTML, HTTP, DNS and search engines are described. Popular social networking sites like Facebook, Twitter, WhatsApp and Instagram are outlined highlighting their key features.
Beacon, GRDDL, and Twine... oh my!! Sometimes it is hard to keep track of all the new technology on the web. Which are the ones worth paying attention to? Let's take a look into how the web evolves and where we've came from. (Finally, a field where "evolution" and "intelligent design" can play nice.) We'll dive deep into some of the upcoming trends poised to change the web as we know it.
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
The document discusses various topics related to information and communication technology (ICT). It provides information on the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. Additionally, it outlines some potential dangers of internet use like email spam, phishing, and computer viruses. It provides tips for protecting networks and computers from online threats. The document also discusses contextual search strategies and how to identify satirical news sources.
The document provides an introduction to the Internet and the World Wide Web. It defines the Internet as a network of networks made up of millions of computers worldwide. The World Wide Web, which runs on the Internet, consists of documents and web pages connected through hyperlinks and accessed using a web browser. The document outlines how to navigate and search the Web using URLs, search engines, and browsing tools.
Empowerment technology by ybonne amor and jeshaYbonnica22
This document discusses empowerment through information and communication technology. It provides an overview of ICT, including the evolution from Web 1.0 to Web 2.0 to Web 3.0. It also discusses popular social media platforms like Facebook, Twitter, and Instagram. The document then covers possible internet dangers and protections, as well as research skills and methods for contextualized online searching. It concludes with sections on mail merge and label generation in Microsoft Word and creating slide presentations in PowerPoint.
The document discusses various topics related to information and communication technology (ICT), including the current state of the internet and web technologies. It provides information on social media platforms like Facebook, Twitter, Instagram, and Snapchat. It also discusses topics like assistive media, possible internet dangers and protections, online searching methods, and mail merge and label generation in Microsoft Word.
The document discusses today's generation and their use of technology. It notes that while people today are very active with technologies like phones, tablets, and laptops, some are ignorant of the potential harms of overuse. It also comments that the Japanese are very skilled with technology and unique in their gadget-making abilities.
How to get genuine windows 7 with low cost coldfire007
The document discusses options for obtaining Microsoft software at low cost, including using Microsoft Technet and MSDN. It warns of the dangers of pirated software, such as malware and invalid product keys. It provides an overview of what Technet and MSDN are and how they provide access to Microsoft software and documentation.
Windows 8 introduces significant changes focused on improving the user experience on mobile devices like tablets. It includes a new Start screen interface designed for both touchscreens and mouse/keyboard. The Start screen displays tiles connected to apps, files, and websites that update in real-time. Windows 8 also allows users to access files, apps, and settings from any device by signing in with a Microsoft account and connecting to the cloud.
The document discusses various aspects of the internet including:
- The internet connects millions of websites and servers through an interconnected network.
- It allows people to communicate and share information globally through email, files, videos and more.
- The world wide web was created in 1990 by Tim Berners-Lee and allows webpages to be accessed through browsers and hyperlinks.
- Key components of the internet include URLs, domains, folders, files, protocols, browsers, and web servers.
- There are different categories of websites including news, education, business, entertainment and personal websites.
The document provides a history of the development of the Internet and World Wide Web. It discusses how ARPANET, developed by the US Department of Defense, evolved into the Internet and enabled communication between linked computer networks internationally. The World Wide Web was created by Tim Berners-Lee in 1989-1991 and allowed for sharing of information over the Internet through hyperlinks. Early web browsers like Mosaic helped popularize the graphical web interface.
This document provides an overview of various topics related to empowerment technology. It includes definitions of information and communication technology, descriptions of the evolution of internet technology from Web 1.0 to 3.0, and explanations of technology convergence and social media. It also discusses dangers of computers like viruses and spam, and how to protect computers. Additional sections cover skills for online research, mail merge functions, satirical news sites, Microsoft Excel, and digital file formats for images and text.
This document provides instructions for organizing files and folders on the desktop. It outlines 17 steps to create a folder, move a file into the folder, rename the file, view folder properties, and delete the folder. The instructions teach how to use basic desktop functions like creating shortcuts, folders, copying and pasting files, dragging and dropping, renaming, and viewing properties. Keeping the desktop uncluttered is recommended so that important shortcuts are easy to find.
This document provides an overview of the internet and email. It defines the internet as the largest computer network connecting millions of computers worldwide. It describes two types of computer networks - local area networks (LANs) and wide area networks (WANs). The internet is the largest WAN. It explains how servers store and share information with client computers. It also describes how the world wide web works as a system of web pages connected through hyperlinks, stored on servers. The document outlines common ways the internet is used, such as searching for information, communication tools like social media and chat, and downloading files. It provides guidance on choosing an internet service provider and explains the basic functions of web browsers.
This document provides an overview of the internet and email. It defines the internet as the largest computer network connecting millions of computers worldwide. It describes two types of computer networks - local area networks (LANs) and wide area networks (WANs). The internet is the largest WAN. It explains how servers store and share information with client computers. It also describes how the world wide web works as a system of web pages connected through hyperlinks, stored on servers. The document outlines common ways the internet is used, such as searching for information, communication tools like social media and chat, and downloading files. It provides guidance on choosing an internet service provider and explains the basic functions of web browsers.
The document provides information about the internet and email. It defines the internet as the largest computer network in the world connecting millions of computers. It describes two types of computer networks - local area networks (LANs) and wide area networks (WANs). The internet is the largest WAN. The document also defines servers, clients, the world wide web, domains, browsers, and email. It provides details on how to connect to the internet, choose an internet service provider, use browsers, and set up an email account.
The document provides an overview of the internet including:
1. The internet began in 1969 as a US military network called ARPANET and has since grown to connect billions of users worldwide.
2. The internet allows people to communicate via email, social media, chat, blogs, streaming media and more. It also provides access to information through search engines and websites on a huge variety of topics.
3. Ensuring strong, unique passwords is important for security as hackers can crack weak passwords to access personal or financial information. Proper password practices help reduce this risk.
The document provides an introduction to basic internet concepts for seniors. It covers what the internet is, how to use a web browser and mouse, how to visit known and unknown websites, and basic terminology like URLs, hyperlinks, home pages, and web pages. It aims to explain the essential tools and navigation needed to begin exploring the internet.
The document provides an overview of basic internet concepts. It explains that the internet is a worldwide network that connects millions of computers and allows them to share information. It describes how local area networks connect computers in a small area like a home or office, while wide area networks connect computers over longer distances like the internet. It then explains that servers store and share information to client computers upon request, and that the world wide web is a system of internet documents connected by hyperlinks that people access through web browsers using URLs.
Mobile computing devices like smartphones and tablets have become popular because they allow users to access the internet and compute on the go without being tethered to a desktop. Web-based email has advantages like access from anywhere but can be slower than desktop email clients, which allow for more local storage and easier file manipulation but raise more privacy and security concerns. The internet connects hundreds of millions of computers worldwide through networks like LANs, WANs, and the World Wide Web. Web browsers allow users to view webpages by following links and entering URLs, with common features including back/forward buttons, bookmarks, and the address bar.
What exactly is the Internet and how does it workAmeer Net
The Internet is the largest global network of interconnected computers. It connects millions of computers through local and wide area networks. The World Wide Web is a system of interlinked webpages accessed via the Internet. Webpages are stored on servers and displayed to clients using web browsers. HTML code provides the basic structure and formatting for webpages, while URLs specify the locations of individual webpages. The Internet has evolved from a US military network to a global information system with over 2 billion users.
This document provides an overview of how the web works. It begins with the basic concepts and history of the Internet, distinguishing between the Internet and the World Wide Web. It describes key components like web browsers that users employ to access web pages, and web servers that host websites and content. Specific examples of popular browsers like Chrome and Safari are outlined, as well as common web server software like Apache, IIS, and Nginx. The document aims to explain the fundamental workings and interconnected pieces that make up the modern web.
The Internet is a global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide. It consists of private, public, academic, business and government networks linked together via electronic, wireless, and optical technologies. The Internet carries a wide range of information and services, including the World Wide Web. Most traditional media are also being reshaped by the Internet through new services like email, Internet telephony, online music/video and more.
The document provides an overview of the history and uses of the Internet. It discusses how the Internet was created in the 1960s as a network to share information between computers called ARPANET. It then describes common uses of the Internet like accessing information, entertainment, social networking, and commerce. It also outlines some important websites and programs used to browse the Internet.
The document discusses how to connect to and use the Internet and World Wide Web. It explains that the Internet is a network connecting computers worldwide, while the World Wide Web is a system for accessing information on the Internet through websites. It describes the components needed to connect, including a computer, Internet service provider, modem, and web browser. It also defines key terms like website, URL, search engine, and how the earliest networks like ARPANET evolved into today's Internet.
The document discusses how to connect to and use the Internet and World Wide Web. It explains that the Internet is a network connecting computers worldwide, while the World Wide Web is a system for accessing information on the Internet through websites. Websites have unique URLs and domain name extensions like .com, .org, or .edu. To connect, you need a computer, Internet service provider, modem, and web browser software. Search engines help users find information on websites.
This document provides an overview of the Internet and World Wide Web. It discusses the history and significance of the Internet, how it works, common Internet protocols, accessing the Internet, popular Internet services like email and the World Wide Web. It also covers how to effectively search the Web using techniques like Boolean operators and keywords, and how to evaluate the reliability of information found on web pages.
this pdf file description
what is the Internet Basics topics likes ;
what is the internet
What is the World Wide Web?
Exploring the Internet using Microsoft Internet Explorer
What is a URL?
What are Domains? and so on.
The document provides an overview of the internet, including its definition, importance, and basic terminology. It defines the internet as a distributed network with no central control and the largest international association of people and machines. Key points covered include how the internet provides a rich storehouse of information and supplements traditional research tools, as well as definitions of common terms like browsing, chatting, web pages, search engines and how to use a browser.
This document provides an overview of basic computer and internet concepts. It discusses what computers are and how they work, including hardware components like processors, memory, storage devices and input/output devices. It also covers software, windows basics, internet terminology like browsers and URLs, and how to perform common tasks like searching online and printing web pages. Navigation buttons on browsers like back, forward and home are explained. Tips for mouse and keyboard use are provided along with instructions for starting up and shutting down computers properly.
The document discusses browser toolbars and how to develop them for different browsers. It defines what browser toolbars are and explains that they are extensions that present toolbars within a browser's window. It then covers how to develop toolbars for different browsers like Internet Explorer, Firefox, Chrome, Safari, and Opera. It discusses the programming languages and APIs used to create the logic and interface. The document also compares native toolbars that are directly inserted into the browser versus injected toolbars that are added to web pages through JavaScript. Finally, it presents some cross-browser extension frameworks that can simplify toolbar development for multiple browsers.
This course introduces students to web application development. Students will learn about basic internet protocols, HTML, JavaScript, dynamic web content, server-side programming, and current development trends. The course involves lectures, practical sessions, assignments, and a final exam. Students will be evaluated based on CATs, assignments, presentations, and a final exam.
This document discusses various key concepts related to the internet. It defines important terminology like webpage, website, URL, email and email address. It explains different types of servers and their features. It also discusses web browsers, blogs, domains, protocols, newsgroups and HTML. The document provides definitions and examples to explain these fundamental internet-related terms and concepts.
Similar to Introduction to internet with windows 7 changes (20)
Indiana law requires libraries to charge non-resident fees for patrons outside the tax district that funds the library. In Huntington County, there are 4 independent library systems, each with their own tax district and service boundaries. As a result, the non-resident fees charged by each library can vary based on that library's per capita spending. The document provides information on the 4 library systems in Huntington County, their locations and contact information.
The document outlines the steps taken by a small town library director to set up a promotional booth for the library at the local Roanoke Fall Festival held from September 4th-7th. This included creating bookmarks and brochures to distribute about library services, transporting boxes of used books for sale to the designated spot, setting up a canopy tent and tables to display the books and materials, and adding flags to attract attention to the booth. The goal was to promote upcoming library events and increase patronage by taking advantage of the large crowd at the popular festival.
This document provides an introduction to searching online. It discusses why internet literacy skills are important, how to use Google to conduct searches, tips for refining searches, different types of websites and the reliability of the information found on them, how to organize search results using bookmarks, and basic safety tips for online searching. The goal is to help readers improve their ability to efficiently find reliable information online.
This document provides tips for teens on how to safely use social media and the internet. It recommends setting privacy settings to "Friends Only" and not posting personal information publicly. It warns against accepting friend requests without validating the person, installing unknown apps, or clicking suspicious links. It also provides advice on using antivirus software and caution with downloading files and programs. The overall message is to be careful about sharing private information online and to verify requests before accepting.
The document provides information on using social media, particularly LinkedIn, for business and job searching purposes. It discusses how to build connections through LinkedIn, effectively complete a LinkedIn profile with keywords and recommendations, find groups to join, and use LinkedIn to research companies and contacts. The intended audience is professionals and job seekers.
This document provides instructions for transferring photos from a digital camera to a computer using either a memory card or USB cable. It also provides tips for resizing photos for sharing online or via email to reduce file sizes. Additionally, it outlines how to use Windows Live Photo Gallery to edit, crop, and adjust photos on a computer. This includes tools for auto-adjust, brightness, contrast, color adjustments, red-eye removal, and applying black and white filters. Instructions are also given for scanning old photos and documents using the computer scanner.
This document provides an overview of the Microsoft Word user interface. It describes the main sections of the Word window including the ribbon, quick access toolbar, and other areas. Key points covered include:
- The ribbon contains tabs that group commands by activity type and reduces clutter by only showing relevant tabs.
- The ribbon appearance depends on monitor resolution, with higher resolution showing larger icons.
- The quick access toolbar provides quick access to commonly used commands and can be minimized.
- The Office button provides access to backstage views for opening, saving, and printing documents.
- The ribbon includes tabs for formatting text, pages, illustrations and other document elements.
Pinterest is a social media platform where users can create and share collections of visual bookmarks called pins. The document provides instructions on how to get started on Pinterest by creating an account, adding profile information, following boards, and pinning images to create your own boards. It explains the basic elements of Pinterest including boards, pins, and following other users. Examples are given of how Pinterest can be used for planning weddings, finding gift ideas, recipes, crafts, and home decorating inspiration.
This document provides instructions for using various features and functions within the iTunes interface. It explains how to open iTunes, describes the main sections of the library including Music, Movies, TV shows, Books, Radio and Store. It also outlines how to import CDs and edit track names, use playlists, view options and control playback.
Using publisher to design and print business cardsCelia Bandelier
This document provides instructions for designing and printing business cards using Publisher. It outlines the steps to choose a business card template, insert contact information and images, preview and save the design, and print multiple copies of the business cards with customized margins. The instructions guide the user through selecting a template, adding their information, and editing and printing the final business card design.
The document provides guidance on job searching in a difficult economy. It emphasizes the importance of networking, being flexible in expectations, and using all available tools and resources. Key points include developing your personal brand on websites and taking a new approach to searching beyond just job boards. The last section focuses on networking strategies and outlines an elevator pitch example.
This document discusses the importance of estate planning and provides information about wills, advance medical directives, social media wills, and related topics. It notes that estate planning benefits people of all economic levels by legally protecting and distributing property according to one's wishes. Advance medical directives allow people to specify the medical treatment they want if unable to make decisions. The document outlines how to write a will, choose an executor, and create a social media will to handle online accounts after death. It stresses reviewing one's estate plan when life changes occur.
This document provides guidance on performing preventative maintenance on a computer to improve performance and extend its lifespan. It recommends cleaning the external components like the monitor, keyboard, and mouse regularly, as dust can accumulate quickly. Internally, it suggests using the Disk Cleanup and Disk Defragmenter tools periodically to free up hard drive space and optimize file placement. It also stresses the importance of installing operating system and software updates, scanning for viruses regularly, and backing up files in case of hardware failure or malware infection. Regular maintenance through cleaning, optimization, and backup is presented as an effective way to care for a computer over time.
This document provides instructions for using basic features in Microsoft Excel, including:
- Opening and navigating the Excel interface
- Entering data into cells
- Formatting cells and adjusting column widths/row heights
- Using AutoSum to calculate totals
- Saving workbooks
- Inserting and deleting rows/columns of data
- Using basic formulas
- Printing and previewing worksheets
- Autofilling data to expand budgets over multiple periods
Facebook was started in 2004 by Mark Zuckerberg and was originally called Thefacebook. It is now the largest social network worldwide with over 750 million users. Users can connect with friends, share photos and updates, and join groups. The document provides details on Facebook's history and growth, how to create an account, customize privacy settings, and control what information is shared through apps.
Google is a search engine founded by Larry Page and Sergey Brin. Its mission is to organize the immense amount of information on the web. Google uses web crawlers to search its vast databases and returns relevant search results in a fraction of a second. Users can search by keyword, get spelling corrections, use quotation marks or a minus sign to narrow results, and explore related search options and tools on the results page. Google also provides maps, images, videos, news and other specialized search functions.
The document provides an overview of basic computer hardware and software components. It defines hardware as the physical parts of a computer like the keyboard, monitor, mouse, and CPU. It describes common internal components like the CPU, hard drive, disk drives, and modem. It also outlines external peripherals like the monitor, keyboard, mouse, printer, and scanner. The document then explains functions of the operating system, desktop interface, files, folders, and basic navigation techniques in Windows like using icons, menus, and windows.
This document provides an overview of how to use email. It explains that email allows quick electronic communication by sending messages to other users' inboxes. To send and receive email, a user needs an email address consisting of a username and domain name separated by an "@" symbol. The document outlines how to compose, send, reply to, forward, and delete emails. It also discusses creating folders to organize emails and attaching files to emails. The goal is to teach basic email functions and literacy.
This document provides an overview of digital photography and using a digital camera. It discusses how digital cameras have become more affordable and accessible. It then covers various uses of digital photos including capturing memories, sharing photos online, and using the camera as a scanner. The document also discusses different types of cameras, camera features, settings, and basic functions. It provides guidance on transferring photos from the camera to a computer and using Picasa software to organize, edit, print and share digital photos online.
The document provides guidance on using Craigslist, including how to create a user account, post ads, edit or delete existing posts, and tips for avoiding scams. It explains that Craigslist is a site for classified ads that has categories like jobs, housing, and items for sale. It also notes that a user account makes managing posts easier and is required for some categories or cities. The document outlines the step-by-step processes for key tasks and highlights safety advice like only dealing locally with people you can meet in person.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
2. WHAT IS THE INTERNET?
The Internet, sometimes called simply “the Net,”
is a worldwide system of computer networks—a
network of networks in which users at any one
computer can, if they have permission, get
information from any other computer (and
sometime talk directly to users at other computers).
2
3. E-MAIL
Electronic Mail (e-mail) is the most widely used
application on the Net. Electronic mail,
commonly called email or e-mail, is a method of
exchanging digital messages from an author to
one or more recipients.
3
4. CHAT
Another popular feature of the Internet is you can
carry on live “conversations” with other computer
users, using Chat.
Chat is real-time communication between two
users via computer. Once a chat has been initiated,
either user can enter text by typing on the keyboard
and the entered text will appear on the other user's
monitor. Most networks and online services offer a
chat feature.
4
5. CHAT –ABBREVIATIONS AND
MEANINGS
<3 heart 404 I haven't a clue
A3 Anyplace, anywhere, anytime ADN Any day now
AFAIK As far as I know AFK Away from keyboard
ARE Acronym-rich environment ASAP As soon as possible
A/S/L? Age/sex/location? B4N Bye for now
BAK Back at the keyboard BAS Big a** smile
BBIAB Be back in a bit BBL Be back later
BBN Bye bye now BBS Be back soon
BEG Big evil grin BF Boy friend
BFD Big f***ing deal BFN Bye for now
BG Big grin BIBO Beer in, beer out
BIOYIOP Blow it out your I/O port BL Belly laughing
NOTE: These are just a few of the abbreviations and meanings that
are used for a more complete list, go to
http://searchcrm.techtarget.com/definition/Twitter-chat-and-text-
messaging-abbreviations
5
6. WORLD WIDE WEB
The most widely used part of the Internet is the
World Wide Web (often abbreviated “WWW” or
called “the Web”. The World Wide Web is a
system of interlinked hypertext documents
accessed via the Internet.
6
7. HYPERTEXT
Hypertext is a method of instant cross-
referencing. In most Web sites, certain words or
phrases appear in text of a different color than
the rest; often this text is also underlined. When
you select one of these words or phrases, you will
be transferred to a page that is relevant to this
word or phrase. Sometimes there are buttons,
images or portions of images that are “clickable”.
7
8. ACCESSING THE INTERNET
You can access the Internet at home with a
personal computer or at various community
locations, like the library, schools, etc. Be aware
that if you use a public computer to access the
Internet, there is probably an Internet Use
Policy and you will be responsible for following
those rules and policies.
NOTE: To see the Roanoke Public Library’s
Internet Use Policy go to www.roanoke.lib.in.us
then click Policies tab then Acceptable Use.
8
9. REQUIRED TO GO ON INTERNET
If you are using your own computer, you will
need to have at least 3 pieces of hardware /
software to access the internet.
9
10. #1 A MODEM
A modem is the piece of hardware that “calls”
your Internet Service Provider (ISP) and
connects your computer to theirs. A modem can
connect through a phone line or through a cable
connection.
10
11. #2 INTERNET SERVICE PROVIDER
Your computer cannot connect directly to the
Internet. You need a third party, the ISP, to connect
to the Internet. The ISP you chose will provide you
with the necessary software to connect your
computer to theirs, and then to the Internet. Some
Internet providers are free while others charge a
monthly fee. Differences in ISPs include:
Connection speed
Appearance of online ads
Number of hours included in their plan each month
Number of email accounts provided
Web page space available 11
12. #3 WEB BROWSER
This is the software that allows you to view
graphics and other components on the Internet.
The most popular are Microsoft Internet Explorer
or Netscape Navigator. The appearance of a
particular Web site may vary slightly depending
on the browser you use.
12
13. ANTI-VIRUS SOFTWARE
Anti-virus software is a program that runs in
the background of your computer and continually
scans your hard drive for viruses. If a virus is
detected, the program notifies you and
quarantines the infected file so you can safely
delete it from your computer.
You want to make sure you have an antivirus
program installed AND up to date on your
computer! Some viruses can be spread just by
opening a website and there is no way to know
until it has infected your computer!
13
14. FIREWALLS
Firewalls are programs that add another level
of security and are especially important to have if
you connect through a cable modem or another
connection that is “on” all the time. A firewall
protects your computer from someone on the
outside gaining access. Without a firewall,
someone could potentially access the files on your
computer, or send emails through your email
account.
14
15. COOKIES
A cookie is information that a website puts on your
hard disk so that it can remember something about
you at a later time. Cookies are required for many
websites to display correctly or accumulate
information you are entering.
If it is a reputable website, it is usually safe to accept
cookies.
15
16. URL
Every website on the Internet has a unique
address and to access that website, you must
know the address. A website address is called a
URL, or Uniform Resource Locator.
16
17. ADDRESS OF A WEBSITE
The format of website addresses are almost all
the same. Most start with www, for world wide
web. Then comes the actual address of the site,
followed by a “dot” extension, which identifies
the domain. The address is like a house
number-it identifies a specific person or account.
17
18. DOMAIN
A domain is a group of hosts (or computers that
have web sites on them) that are of a same or
similar organization. The domain is like a street
address—a lot of people live or have accounts
there. There are 6 common domains set up for
US Internet sites:
1. .com Commercial
2. .net Network
3. .gov Government
4. .edu Educational
5. .org Organization (usually not for profit)
6. .mil Military 18
19. EXAMPLE
An example of a website address is:
www.uncanmanuals.com
“uncanmanuals” is the address.
.com is the domain extension
NOTE: Since every website address must be
unique, the same name may be used for different
websites but they will each use a different dot
extension.
19
20. TEN POPULAR WEBSITES
You have probably heard of or will hear of these
websites, even if you never use them.
1. Google (google.com)—a site where you can set
up an e-mail account, read the news, get
directions, and go shopping, but at its core
Google is a search engine.
2. Wikipedia (wikipedia.org)—an online
encyclopedia that is free but it is user-written
and edited.
3. Amazon (amazon.com)—it began as a way to
sell books without costs associated with a
physical bookstore and has become a store for
almost everything
20
21. MORE OF WEBSITES
4. Facebook (facebook.com)—a social networking
website for keeping in touch with old friends and
making new ones.
5. eBay (ebay.com)—an online auction where
people sell everything, from real (DVDs, cars,
furniture) to more conceptual (one man auctioned
his life).
6. Yahoo (yahoo.com)—a search engine, an e-mail
outlet, and a news source.
7. The Drudge Report (drudgereport.com)—Matt
Drudge combines links to other new sources and
stories he writes himself to bring his readers the
latest news and rumors. It broke the Monica
Lewinsky story in 1998. 21
22. MORE WEBSITES
8. Blogger (blogger.com)—creates a website for
people to blog. Blog is an abbreviation of “web
log”, a term for an online journal, column, etc.
9. Craigslist (craigslist.org)—low-tech, local
version of eBay. It is like a huge community
bulletin board, allowing a person to find just
about anything.
10. YouTube (youtube.com)—allows users to post
short videos.
22
23. FINDING A WEBSITE
There is no “directory” available for internet
addresses (websites) because there are so many
and they change all the time. However, as we
will explore later, there are lots of Search
Engines you can use to find sites about the
information you are seeking.
23
24. CONNECTING TO THE INTERNET
Double click the Internet Explore icon on your
desktop.
24
25. HOME PAGE
Internet explorer will open to whatever you have set
as your home page.
At the Library, our home page is the Roanoke Public
Library’s website.
NOTE: When on your own computer, your home page is
the page that opens every time you connect to the
internet.
25
26. CHANGING YOUR HOME PAGE
You can change your home page by clicking Tools on the
menu bar, the Internet Options. In Windows 7, you will
click the and then click Internet Options.
26
Windows 7Windows XP
27. INTERNET OPTIONS
The address of your home page is in the Home page box.
You can click on…
Use Current to set the open page as your home page
Use Default to set the ISPs page as your home page
Use Blank for a blank window to be your home page
type in the address of the website of your choice.
Windows XP Windows 7
27
28. STANDARD TOOLBAR
The standard toolbar has buttons for the most
commonly used commands in Internet Explorer.
You can use these buttons to help explore the
internet. To see a description of a button, move
the mouse pointer over the button and hold it
still. A short description of the button will
appear.
28
29. TOOLBAR ITEMS
Back: Moves you back to your previous screen(s)
Forward: Moves you ahead one screen if you’ve
already moved back.
Stop: Stops downloading the page Internet Explorer is
attempting to display.
Refresh: Reload the current page (download it from
the server again)
Home: opens your home page
Search: Type in a key word e.g. 'Football' and you will
be presented with a list of all the relevant web sites..
29
30. MORE TOOLBAR ITEMS
Favorites: Opens a list of bookmarks to your favorite
sites
Add a Favorite: Adds current site to your Favorites
list.
History: Opens a list of sites you have visited
recently
Mail: Brings up Outlook Express to allow you to send
and read email
Print: Allows you to print the current page
Edit: lets you edit the current page in Word.
30
31. USING THE ADDRESS BAR
The address bar allows you to type in the web address
or click on the down arrow for a list of addresses you
have entered in the past. Once you type in the address,
click on the Go button or press the Enter key on the
keyboard.
31
32. HYPERLINKS
Most websites have multiple pages. The page that
opens when you type in a website address is
usually the site’s home page. There may be other
pages included in the website that can be accessed
by a hyperlink. Hyperlinks are connections to
other pages in the site you are looking at or to
another unrelated site.
32
33. HOW TO RECOGNIZE A HYPERLINK
You can usually tell a hyperlink when you see it. It may…
Be a different color.
Be underlined.
Change the mouse pointer to a hand when pointing at it.
NOTE: Many pictures can also be hyperlinks—watch how
the mouse pointer changes when you point to it.
33
34. FAVORITES
When you open a page you like and want to save for
future reference, click on Favorites on the menu bar and
choose Add to Favorites.
34
35. ADD A FAVORITE
The Add a Favorite window will open.
The window will show what the site will be listed
under (this can be changed).
Click on Add button to add it.
35
36. OPEN A FAVORITE
To open a saved favorite, click on Favorites on the
main menu, choose the name of the favorite from the
list.
36
37. EXERCISES
1. Open Internet Explorer
2. Go to Google by typing it in the address bar.
Save this site to your favorites.
3. Practice using the back and forward buttons.
4. Click on the Home Page button on the toolbar
to go back to www.roanoke.lib.in.us
5. Click on some of the text links and some of the
picture links.
37
38. SEARCH ENGINES
On the Internet, a search engine is a coordinated
set of programs that includes:
1. A spider (also called a “crawler” or a “bot”) that goes
to every page or representative pages on every Web
site that wants to be searchable and reads it.
2. A program that creates a huge index (sometimes
called a “catalog”) from the pages that have been
read.
3. A program that receives your search request,
compares it to the entries in the index, and returns
results to you.
38
39. SEARCH ENGINE APPROACHES
Major search engines such as Google and Yahoo
(which uses Google) index the content of a large
portion of the Web and provide results.
Ask Jeeves provides a general search of the Web
but allows you to enter a search request in natural
language such as “What’s the weather in Seattle
today?”
Special tools and some major Web sites such as
Yahoo let you use a number of search engines at the
same time and compile results for you in a single
list.
39
40. INDIVIDUAL WEBSITES
Individual Web sites, especially larger corporate
sites, may use a search engine to index and retrieve
the content of just their own site. Some of the major
search engine companies license or sell their search
engines for use on individual sites.
40
41. HOW TO SEARCH
If you know of a specialized search engine such as
SearchNetworking that matches your subject (for
example, Networking), you’ll save time by using
that search engine.
If there isn’t a specialized search engine, try Google
or perhaps other search engines for their results.
41
43. SAVING A DOCUMENT
You can save a web page to a flash drive or to a
hard drive. You may do this in order to print it
in a word processor (this gives you more control
of the pages you print) or to view it later.
43
44. STEP #1
When the page you want to save is open, click on
the File then Save As…on the main menu.
44
46. STEP #3
Select the folder you want the page saved in and give
it a file name. Then click on the Save button.
46
1. Choose the
Folder you want
to save it in
2. Name
the file
3. Click Save
47. DOWNLOADING A DOCUMENT OR
FILE
Sometimes you may have the option to download
a program or file to your computer. This means
you are copying a file or program from
somewhere on the internet to your computer.
When you download you have 2 options—to open
the program or file or to save it to disk.
47
48. OPEN
If you open the program, the download and
installation will happen immediately.
48
49. SAVE
If you save the program, you can choose when to
install the program.
49
50. WARNING
Before you download a file or program or install a
downloaded file or program, make sure you have
up to date virus software. This is one way your
computer can be infected by a virus!
50
54. NOTE: MANY OF THE GAMES ARE
TRIAL VERSIONS ONLY.
54
This means that some of the features may be
disabled or that after a certain number of days
the program will no longer be accessible.
55. CLICK DOWNLOAD
The File Download window will open. Here is
where you can choose to Save or Open the
program you are downloading.
55
56. CHOOSE
If you choose Open, the download will begin. If
you choose Save, you will be asked where to save
the file. Make sure you make note of where you
save it so you can find it later on!
56
57. EXERCISES
Using a search engine, try to find the following
information:
Local weather forecast for Roanoke, IN
A place to eat in Kalamazoo, MI
A place to stay overnight in Lexington, KY
What specials Toys R Us has online this week
Look up your phone number (try
www.whitepages.com)
Save a website to the hard drive in the My
Documents folder.
Spend time exploring different websites 57
58. THE END
Any Questions?
Please fill out the questionnaire
For more information, contact the Library at 260-
672-2989 or director@roanoke.lib.in.us or come in
and talk to a librarian.
58