SlideShare a Scribd company logo
1 of 6
Joanna Smith
             4th Block
What is a web browser application
software that helps you browse the
                web.
       Ex: Internet Explorer
               Firefox
             Netscape
How can you tell if a web site is secure
• Most of the time a website is secure if it has a
  lock icon in the right hand corner or an s in
  the hyperlink.
How do you find out the domain of a
             website?
• Look at the internet address on the top of
  your internet page.
• Ex: .com
• .org
• .gov
• .uk
How can you verify where
information came from on a web site?
• To verify information on a website go to a
  website called www.easywhois.com to look up
  the background information of the creator
  and the organization.
• EX: -Errors in the website
• Date of creation.
• Creator of website.
What is the difference between FTP
              and HTTP?
• FTP- file transfer protocol. Entire files are transferred
  from one device to another and into memory. 2-way
  systems as files are transferred between server and
  workstation.
• HTTP://- HTTP- Hypertext transfer protocol. Used to
  transfer files form a Web server onto a browser in
  order to view a page. HTTP only transfers the contents
  of a web page into a browser for viewing. When http
  appears in a URL it means that the user is connecting
  to a Web server and not a file server. The files are
  transferred but not downloaded, therefore not copied
  into the memory.
What are rules to follow when
     contacting people online?
• The rules to follow when contacting people
  online are:
1. Do not give out you personal information
2. Do not give out you financial information
3. Do not meet this person if you have only met
   online
4. Behave properly when online.

More Related Content

What's hot

WordPress for Fed Government Blogs & Microsites
WordPress for Fed Government Blogs & MicrositesWordPress for Fed Government Blogs & Microsites
WordPress for Fed Government Blogs & MicrositesKristy Fifelski
 
Internet Slide Quiz
Internet Slide QuizInternet Slide Quiz
Internet Slide Quizsarah s
 
Oscon 2008 Open Micro Blogging Presentation
Oscon 2008 Open Micro Blogging PresentationOscon 2008 Open Micro Blogging Presentation
Oscon 2008 Open Micro Blogging PresentationEvan Prodromou
 
Malware SPAM - March 2013
Malware SPAM - March 2013Malware SPAM - March 2013
Malware SPAM - March 2013Brent Muir
 
Through The Looking Glass Of Web 2.0
Through The Looking Glass Of Web 2.0Through The Looking Glass Of Web 2.0
Through The Looking Glass Of Web 2.0misty112858
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden WebJon Kane
 
Publishing and Using Linked Data
Publishing and Using Linked DataPublishing and Using Linked Data
Publishing and Using Linked Dataostephens
 
Tecnología y gestión de la información
Tecnología y gestión de la informaciónTecnología y gestión de la información
Tecnología y gestión de la informaciónCARLOS MAYO
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR BrowserArjith K Raj
 
Web 3.0 explained with a stamp (pt I: the basics)
Web 3.0 explained with a stamp (pt I: the basics)Web 3.0 explained with a stamp (pt I: the basics)
Web 3.0 explained with a stamp (pt I: the basics)Freek Bijl
 

What's hot (19)

WordPress for Fed Government Blogs & Microsites
WordPress for Fed Government Blogs & MicrositesWordPress for Fed Government Blogs & Microsites
WordPress for Fed Government Blogs & Microsites
 
Internet Slide Quiz
Internet Slide QuizInternet Slide Quiz
Internet Slide Quiz
 
Oscon 2008 Open Micro Blogging Presentation
Oscon 2008 Open Micro Blogging PresentationOscon 2008 Open Micro Blogging Presentation
Oscon 2008 Open Micro Blogging Presentation
 
Monday May 10
Monday May 10Monday May 10
Monday May 10
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Malware SPAM - March 2013
Malware SPAM - March 2013Malware SPAM - March 2013
Malware SPAM - March 2013
 
Through The Looking Glass Of Web 2.0
Through The Looking Glass Of Web 2.0Through The Looking Glass Of Web 2.0
Through The Looking Glass Of Web 2.0
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
 
Hyperlinks
HyperlinksHyperlinks
Hyperlinks
 
Publishing and Using Linked Data
Publishing and Using Linked DataPublishing and Using Linked Data
Publishing and Using Linked Data
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Semantic WEB
Semantic WEBSemantic WEB
Semantic WEB
 
A history of html
A history of htmlA history of html
A history of html
 
Tecnología y gestión de la información
Tecnología y gestión de la informaciónTecnología y gestión de la información
Tecnología y gestión de la información
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Info2011
Info2011Info2011
Info2011
 
Phishing and being phished!
Phishing and being phished!Phishing and being phished!
Phishing and being phished!
 
Web 3.0 explained with a stamp (pt I: the basics)
Web 3.0 explained with a stamp (pt I: the basics)Web 3.0 explained with a stamp (pt I: the basics)
Web 3.0 explained with a stamp (pt I: the basics)
 
T Wka Dh I0 B9o
T Wka Dh I0 B9oT Wka Dh I0 B9o
T Wka Dh I0 B9o
 

Similar to Internet Slide Quiz

Internet Slide Quiz 1
Internet Slide Quiz 1Internet Slide Quiz 1
Internet Slide Quiz 1zothnerk
 
Internet Slideshow Quiz, Sections 1 & 2
Internet Slideshow Quiz, Sections 1 & 2Internet Slideshow Quiz, Sections 1 & 2
Internet Slideshow Quiz, Sections 1 & 2Brain Young
 
Internet Quiz
Internet QuizInternet Quiz
Internet Quizlockyerj
 
Internet Terms
Internet TermsInternet Terms
Internet Termserowell
 
Internet Terms
Internet TermsInternet Terms
Internet Termsjpatetta
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Fundamentals of internet
Fundamentals of internetFundamentals of internet
Fundamentals of internetfarooq2016
 
The 5 Ws Of Cyberspace
The 5 Ws Of CyberspaceThe 5 Ws Of Cyberspace
The 5 Ws Of Cyberspacetbladow
 
Searching For Reliable Resources
Searching For Reliable ResourcesSearching For Reliable Resources
Searching For Reliable Resourcesguest24e3a2e
 
Searching For Reliable Resources
Searching For Reliable ResourcesSearching For Reliable Resources
Searching For Reliable Resourcesguest2c109f1
 
Searching For Reliable Resources
Searching For Reliable ResourcesSearching For Reliable Resources
Searching For Reliable Resourcesguestfaafa
 
Internet awareness by bhalani mansi
Internet awareness by bhalani mansiInternet awareness by bhalani mansi
Internet awareness by bhalani mansibhalanimahi
 
Internet awareness by komalvekariya
Internet awareness by komalvekariyaInternet awareness by komalvekariya
Internet awareness by komalvekariyakomalatel
 
امتحان النت
امتحان النتامتحان النت
امتحان النتDina El Stohy
 

Similar to Internet Slide Quiz (20)

Internet Slide Quiz 1
Internet Slide Quiz 1Internet Slide Quiz 1
Internet Slide Quiz 1
 
Internet Slideshow Quiz, Sections 1 & 2
Internet Slideshow Quiz, Sections 1 & 2Internet Slideshow Quiz, Sections 1 & 2
Internet Slideshow Quiz, Sections 1 & 2
 
Internet Quiz
Internet QuizInternet Quiz
Internet Quiz
 
Internet Terms
Internet TermsInternet Terms
Internet Terms
 
Internet Terms
Internet TermsInternet Terms
Internet Terms
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Fundamentals of internet
Fundamentals of internetFundamentals of internet
Fundamentals of internet
 
The Internet and Law Enforcement
The Internet and Law EnforcementThe Internet and Law Enforcement
The Internet and Law Enforcement
 
Internet Basics
Internet BasicsInternet Basics
Internet Basics
 
The 5 Ws Of Cyberspace
The 5 Ws Of CyberspaceThe 5 Ws Of Cyberspace
The 5 Ws Of Cyberspace
 
Searching For Reliable Resources
Searching For Reliable ResourcesSearching For Reliable Resources
Searching For Reliable Resources
 
Searching For Reliable Resources
Searching For Reliable ResourcesSearching For Reliable Resources
Searching For Reliable Resources
 
Searching For Reliable Resources
Searching For Reliable ResourcesSearching For Reliable Resources
Searching For Reliable Resources
 
Phishing
PhishingPhishing
Phishing
 
Internet awareness by bhalani mansi
Internet awareness by bhalani mansiInternet awareness by bhalani mansi
Internet awareness by bhalani mansi
 
Internet awareness
Internet awarenessInternet awareness
Internet awareness
 
Internet awareness by komalvekariya
Internet awareness by komalvekariyaInternet awareness by komalvekariya
Internet awareness by komalvekariya
 
امتحان النت
امتحان النتامتحان النت
امتحان النت
 
Internet basics for seniors
Internet basics for seniorsInternet basics for seniors
Internet basics for seniors
 
Internet basics for seniors
Internet basics for seniorsInternet basics for seniors
Internet basics for seniors
 

More from smithj12

How Does A Tornado Work
How Does A Tornado WorkHow Does A Tornado Work
How Does A Tornado Worksmithj12
 
Google Maps
Google MapsGoogle Maps
Google Mapssmithj12
 
5th Slide Show
5th Slide Show5th Slide Show
5th Slide Showsmithj12
 
Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryptionsmithj12
 
Comm Slideshow
Comm SlideshowComm Slideshow
Comm Slideshowsmithj12
 
Types Of Computers
Types Of ComputersTypes Of Computers
Types Of Computerssmithj12
 
Identify The Different Parts Of A Computer
Identify The Different Parts Of A ComputerIdentify The Different Parts Of A Computer
Identify The Different Parts Of A Computersmithj12
 

More from smithj12 (9)

How Does A Tornado Work
How Does A Tornado WorkHow Does A Tornado Work
How Does A Tornado Work
 
Google Maps
Google MapsGoogle Maps
Google Maps
 
Goog 411
Goog 411Goog 411
Goog 411
 
5th Slide Show
5th Slide Show5th Slide Show
5th Slide Show
 
Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryption
 
Comm Slideshow
Comm SlideshowComm Slideshow
Comm Slideshow
 
E Mail
E MailE Mail
E Mail
 
Types Of Computers
Types Of ComputersTypes Of Computers
Types Of Computers
 
Identify The Different Parts Of A Computer
Identify The Different Parts Of A ComputerIdentify The Different Parts Of A Computer
Identify The Different Parts Of A Computer
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Internet Slide Quiz

  • 1. Joanna Smith 4th Block What is a web browser application software that helps you browse the web. Ex: Internet Explorer Firefox Netscape
  • 2. How can you tell if a web site is secure • Most of the time a website is secure if it has a lock icon in the right hand corner or an s in the hyperlink.
  • 3. How do you find out the domain of a website? • Look at the internet address on the top of your internet page. • Ex: .com • .org • .gov • .uk
  • 4. How can you verify where information came from on a web site? • To verify information on a website go to a website called www.easywhois.com to look up the background information of the creator and the organization. • EX: -Errors in the website • Date of creation. • Creator of website.
  • 5. What is the difference between FTP and HTTP? • FTP- file transfer protocol. Entire files are transferred from one device to another and into memory. 2-way systems as files are transferred between server and workstation. • HTTP://- HTTP- Hypertext transfer protocol. Used to transfer files form a Web server onto a browser in order to view a page. HTTP only transfers the contents of a web page into a browser for viewing. When http appears in a URL it means that the user is connecting to a Web server and not a file server. The files are transferred but not downloaded, therefore not copied into the memory.
  • 6. What are rules to follow when contacting people online? • The rules to follow when contacting people online are: 1. Do not give out you personal information 2. Do not give out you financial information 3. Do not meet this person if you have only met online 4. Behave properly when online.