29
Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills- 1 4800150-2 1435/1436 Place photo here

Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Embed Size (px)

Citation preview

Page 1: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Chapter 6:Introduction to Internet

Department of Computer ScienceFoundation Year ProgramUmm Alqura University, Makkah

Computer Skills-1

4800150-21435/1436

Place photo here

Page 2: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

The Objectives and the outcomes

The Objectives:

• To understand the basic of the internet and how to connect to it.

• To let student setup his email and compose emails .

• To understand the internet Ethics.

The Outcomes:

• student should be able to know the basic of the internet and how to connect to it.

• student should be able to setup his email and how to use it.

• student should be able to use the internet safely.

Page 3: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Identify each of the ARPANET and the INTERNET

• ARPANET (The Advanced Research Projects Agency Network ) was the network that became the basis for the Internet.

• in 1967, ARPANET was developed under the direction of the U.S. Advanced Research Projects Agency (ARPA)

• In 1969, the idea became a modest reality with the interconnection of four university computers.

• The initial purpose was to communicate with and share computer resources among mainly scientific users at the connected institutions.

Page 4: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Basic Internet Definition

• ARPANET - The Advanced Research Projects Agency Network which is the precursor to the Internet.

• ASCII - American Standard Code for Information Interchange. The de facto world wide standard code for alphanumeric characters.

• URL - Uniform Resource Locator. A unique name that identifies an Internet site.

• WWW - World Wide Web. The universe of hypertext servers.

• Browser - A program that is specifically used to look at various WWW resources.

• Domain Name - A unique name that identifies an Internet site.

Page 5: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Basic Internet Definition

• E-mail - Messages, usually text, sent from one person to another via a computer.

• Client - Any computer that makes use of services available from other computers.

• Host - A computer or software package which provides a specific kind of service to other computers. One that is seen by other computers on the Internet.

• Server - Any computer that makes services available to other computers.

• Modem - A device that allows a computer to use a phone line to communicate with another computer.

Page 6: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Basic Internet Definition

• Protocol - The rules of conduct which enables a computer to communicate with another computer.

• PPP - A protocol that allows a computer to use a telephone line and a modem to make TCP/IP connections.

• TCP/IP - Transmission Control Protocol/Internet Protocol. This is the protocol which defines the Internet.

• Fire Wall - A combination of hardware and software that separates a LAN into two or more parts for security purposes.

Page 7: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Introduction to Internet

• The internet in simple terms is a network of the interlinked computer networking worldwide, which is accessible to the general public.

• These interconnected computers work by transmitting data through a special type of packet switching which is known as the IP or the internet protocol.

• The World Wide Web (www) is only a portion of what makes up the internet, but it is the fastest growing part of the internet.

• The Web lets people, organizations and companies publish information for other people to see.

Page 8: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Introduction to Internet

• The Web is a large number of computer documents or "Web pages" .

• They are stored on computers around the world and are connected to one another using hyperlinks.

• These Web pages can be seen by anyone through their computer's "Web Browser”.

• A group of Web pages that follow the same theme and are connected together with hyperlinks is called a "Web site" .

• Web sites and Web pages are written in a coding language that makes it possible to add pictures, sound and interactivity to plain old text .

Page 9: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Services through the net

Major services:

• Email – Electronic Mail

• FTP – File Transfer Protocol

• Gopher

• Newsgroups

• Telnet – Remote session

• WAIS – Wide Area Information System

• WWW – World Wide Web

Page 10: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

How to Connect to the Internet

you need an Internet service provider (ISP). An ISP can be one of the following types:

• dial-up,

• broadband,

• wireless,

• wireless mobile, or

• satellite.

Page 11: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Internet Connection: Wired

Dial-upBroadband Options

Cable DSL FiOS

• Least expensive

• Use regular phone line to connect to network

• $10-$30 per month

• Very slow, maxing out at 56 Kbps

• Offered by your cable TV provider

• Cable speeds range from 1 Mbps – 50 Mbps

• Uses telephone line to carry digital signal

• Average speeds of 384 Kbps – 7 Mbps

• Fastest of the three broadband alternatives

• Speeds top out at 50 Mbps

• Can carry Internet , phone, and TV over fiber optic cables

Page 12: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Internet Connection: Wireless

Wireless Options

WiMax Mobile Satellite Municipal WiFi• Includes 3G and 4G

services that connect to the Internet via cellular networks

• More global and more expensive option

• Considered when other options are not available

• Offered in some cities and towns

Page 13: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

How to access the Internet?

• Many schools and businesses have direct access to the Internet using special high-speed communication lines and equipment.

• Students and employees can access through the organization’s local area networks (LAN) or through their own personal computers.

• Another way to access the Internet is through Internet Service Provider (ISP).

• ISP is a commercial organization with permanent connection to the Internet

• Examples: STC Online, Microsoft network, AT&T Networks.

Page 14: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

What are the Browsers & Search Engines

• Web browsers are programs used to explore the Internet.

Internet Explorer

Mozilla Firefox

Google Chrome Apple Safari

• Released in 1995

• Leading Web browser

• Included with Windows

• Released in 2004

• Similar in look to IE

• Free and easy to install

• Released in 2008• Streamlined

interface, similar to IE and Firefox

• Main focus is on speed; Web pages do load faster

• Not as many features as IE and Firefox

• Most popular browser for Macs

• Bundled with Mac OS X and also available for Windows

• Neat feature is Top Sites preview

Page 15: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

What are the Browsers & Search Engines

• A Web Search Engine is designed to search for information on the World Wide Web.

• The search results are generally presented in a line of results often referred to as search engine results pages (SERPs).

• Google is the most popular search engine in the world, and a multinational, publicly-traded organization built around the company's hugely popular search engine.

User can search for any information by writing what he is looking for in the search text box.

Google can view the searched information as a web pages, pictures and there is a part for Maps, YouTube, and news.

Google have its own E-Mail Application called “Gmail”.

Page 16: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Uniform Resource Locators (URL)

• The IP address and the domain name each identify a particular computer on the Internet.

• However, they do not indicate where a Web page’s HTML document resides on that computer.

• To identify a Web pages exact location, Web browsers rely on Uniform Resource Locator (URL).

• URL is a four-part addressing scheme that tells the Web browser: What transfer protocol to use for transporting the file The domain name of the computer on which the file resides The pathname of the folder or directory on the computer on which the

file resides The name of the file

Page 17: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Uniform Resource Locators (URL)

Page 18: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Hypertext Transfer Protocol (HTTP)

• Tells your computer what type of page you are looking at.

• If you see HTTPs, it is a secure Webpage.

• FTP is for File Transfer Protocol.

• WWW represents the computer or server on the site you are viewing.

Page 19: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Domain Name

The name always has two or more parts separated by a dot. The last part of the name identifies the site

• Top-Level Domains:

• .edu – Educational Institutions

• .com – Company / Commercial Organizations

• .org – Non-profit Organizations

• .net – Network, network of sites

• .mil – Military Installations

• .gov – Government sites

• Sub Domains:

• .sa – Saudi Arabia

• .in - India

• .jp - Japan

• .uk – United Kingdom

Page 20: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

What is E-Mail and How to Use it?

• Email, sometimes written as e-mail, is simply the shortened form of “electronic mail,” a system for receiving, sending, and storing electronic messages.

Page 21: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

How To setup Student E-Mail in Umm Alquara University (UQU)

• Each student already has Student ID after enrolling in Umm Alquara University. So, the email will be started with S and then the student ID; For example, [email protected]

• To log-in:

• click on student email link in the top of UQU home page.

• Fill the username which is student email ([email protected]) and the password that started with St and then the Saudi ID (St1098765432).

• Note: For first time login student needs to choose the language (i.e. Arabic) and the time zone (i.e. Riyadh)

Page 22: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436
Page 23: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

How To setup Student E-Mail in Umm Alquara University (UQU)

[email protected]

St1098765432

Page 24: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Sending a Message

• When the user wants to send a message he must know the e-mail address for the recipient in the other side.

• There is a text box named be “To” to write the e-mail address in it.

• Then the user can write the title of his message in a text box named by “Subject”.

• Then he can write the message in the bigger text box and then press on “Send”.\

Attaching Files

• Also the user can attach a file which can contain a text, pictures or videos by pressing on “Attachment” button for attaching any file saved in the computer.

Page 25: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Sending a Message

Page 26: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Internet Behavior and ETHICS

• You shall not use internet to harm other people.

• You shall not snoop around in other people's internet files.

• You shall not use a internet to steal or hack.

• You shall not use other people's internet resources without authorization or proper compensation.

• You shall always use internet in ways that show consideration and respect for your fellow humans.

• You should not upload articles that may scratch others psychological manners.

Page 27: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Internet Security

• Internet security is a tree branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole.

Types of security

• Network layer security

• Internet Protocol Security (IPsec)

• Security token

• Electronic mail security (E-mail)

Firewalls

• A computer firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another

Page 28: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Internet Security

Create Strong, Secure Passwords

• Pick a phrase you can remember with a number in it, like "A bird in the hand is worth two in the bush."

• Change that number (in this case, "two") to its numerical equivalent: A bird in the hand is worth 2 in the bush

• Condense the phrase by only using the first letter of each word: Abithiw2itb

• Add some special characters you can remember: #Abithiw2itb!

Page 29: Chapter 6: Introduction to Internet Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Internet Security

Keep Your Other Information Protected

• The protection of Credit Cards

Use temporary credit card numbers.

Use trustful website having https protocol

• How to keep Mobile Technology Secure

Use tools to keep the laptops and mobile phones secure from tampering,

Initiate a remote data to wipe in the event of a breach, to Send messages or to locate the device.