Comp 1 Chapter 2
Comp 1 Chapter 2
The Internet & the World Wide Web: Exploring Data Transmission Speeds
Cyberspace
Originally measured in bits per second (bps)
UNIT 2A: The Internet & the Web
8 bits are needed to send one character, such
The Internet began in 1969 as ARPANET. as A or a
The Internet was text-only. In the early Kbps connections send 1 thousand bits per
1990s, multimedia became available on the second
Internet, and the World Wide Web (web) was
Mbps connections send 1 million bits per
born.
second
To connect to the Internet, you need
Gbps connections send 1 billion bits per
1.An access device (computer with modem) second
Bandwidth: Expresses how much data can be Telephone line = narrowband, or low
sent through a communications channel in a bandwidth, low speed
given amount of time.
Dial-up connection—use of telephone modem
Baseband: Slow type of connection that to connect to Internet (used mostly in rural
allows only one signal to be areas on POTS, or plain old telephone system)
transmitted at a time.
Telephone Modems
Broadband: High-speed connections.
Can be either internal or external
Physical connection to Internet—wired or
Maximum speed of 56 Kbps
wireless?
Most ISPs offer local access numbers
Telephone [dial-up] modem - (wired)
High-Speed Phone Lines
High-speed phone line—DSL, T1/T3 - (wired)
More expensive but available in cities & most
Cable modem - (wired)
towns
Wireless—satellite and other through-the-air
links - (wireless)
DSL line (digital subscriber line) Other Wireless: Wi-Fi, 3G, & 4G
Transmits data between satellite dish and The Internet is basically a huge network that
satellite orbiting earth connects hundreds of thousands of smaller
networks.
Connection is always on
Central to this arrangement are
Requires Internet access provider with 2-way
client/server networks
satellite transmission
Client: computer requesting data or
User needs to buy or lease satellite dish and
services
modem and have them connected
Server or host computer: central Data transmissions are broken up into
computer supplying data or services requested packets and re-assembled at destination (the IP
of it —Internet Protocol— address)
The domain name of the web server The page you see when you open your web
browser
The directory name or folder on that server
You can change the Home Page on your browser Search Services & Search Engines
A list of websites you visited since you Databases of search engines are compiled using
opened up your browser for this session software programs called spiders (crawler, bots,
agents)
Allows you to easily return to a particular site
Spiders crawl through the World Wide Web.
Bookmark
Follow links from one page to another
Allows you to store the URL from a site on
Index the words on that site
your computer so you can find it again in
another browser session A search never covers the entire web. Search
engines differ only in what they cover
Interactivity with a web page
1. Individual Search Engines
Click on hyperlinks to transfer to another page
Compile their own searchable databases on
Type text in a text box and then hit Enter
the web
Click on scroll arrows to move up and down,
You search by typing keywords and receiving
or side to side, on a page “hits”. Examples are: Ask, Bing, Google, and
Yahoo!
Web portals: Starting points for finding
information 2. Subject Directories
A portal is gateway website that offers a broad Created and maintained by human editors, not
array of resources and services, online shopping electronic spiders. Allow you to search for
malls, email support, community forums, stock information by selecting lists of categories or
quotes, travel info, and links to other categories topics. Example sites: are Beaucoup! LookSmart,
Open Directory Project, and Yahoo! Directory
Examples: Yahoo!, Google, Bing, Lycos, and AOL
3. Metasearch Engines
Most require you to log in, so you can check the
home page for general information. Use the Allows you to search several search engines
subject guide to find a topic you want simultaneously. Examples are Yippy!, Dogpile,
Mamma, MetaCrawler, and Webcrawler
4. Specialized Search Engines Tags are commonly used on blogs and YouTube
– word listed at the bottom. Essentially tags are
Help locate specialized subject matter, such as
keywords used to classify content. (The # is a
info on movies, health, jobs. Examples are :
hash symbol; thus the Twitter term hashtag. )
Career.com. WebMD, Expedia, U.S. Census
Bureau Tag managing is available through delicious.com
and BlinkList, among other companies.
Smart Searching: Three General
Strategies UNIT 2B: The Riches & Risks of Internet Use
Or go to a general search engine, then a Incoming mail: Email sent to your computer:
specialized one uses Post Office Protocol version 3 (POP3)
If you’re looking for everything on a Two ways to send & receive email:
subject
1. Email Program
Try the same search on several search engines
Enables you to send email by running email
Wikis & Wikipedia software on your computer that interacts with
an email server at your Internet access
A wiki is a simple piece of software that can be
provider
downloaded for free and used to make a
website (also called a wiki) that can be Incoming mail is stored on the server in an
corrected or added to by anyone. electronic mailbox
Wikipedia is a free online encyclopedia that Upon access (your ID and password), mail is
anyone around the world can contribute to or sent to your software’s inbox. Examples:
edit. However, Wikipedia is not considered Microsoft Outlook, Apple Mail
reliable or authoritative by many academics and
2. Web-Based Email
librarians.
You send and receive messages by interacting
Tagging
via a browser with a website
Tags: Do-it-yourself labels that people can
Advantage: You can easily send and receive
put on anything found on the Internet, from
messages while traveling, using any computer
articles to photos to videos, that help them to
or equipped mobile device
find their favorite sites again and to link them.
Disadvantages: ads and email hacking
Can be shared easily with other people
Examples: Yahoo! Mail and Gmail (Google) Instant Messaging
Use with a PC that has a sound card, Push technology: Software that automatically
microphone, Internet connection with modem downloads information to personal computers.
& ISP, and internet telephone software such as
Webcasting: Sending users customized text,
Skype and Vonage
video, audio on regular basis.
Also allows videoconferencing
RSS newsreaders (RSS aggregators): Programs
that scour the web, sometimes hourly,
Multimedia on the Web sometimes more frequently, and pull together
in one place “feeds” from several websites.
Allows you to get images, sound, video, and
animation XML and RSS have led to blogs and
blogosphere.
May require a plug-in, player, or viewer
Blogs (weblogs) are frequently updated sites on
A downloadable program that adds a specific
the web intended for public consumption that
feature to a browser so it can view certain files
contain a writer’s observations, opinions,
Examples: Flash, RealPlayer, QuickTime images, and links to other websites.
Web 2.0 refers to the web viewed as a medium 2.6 The Intrusive Internet
in which interactive experience, in the form of Snooping, Spamming, Spoofing,
blogs, wikis, forums, social networking, and so Phishing, Pharming, Cookies, Spyware,
on, plays a more important role than simply & Malware
accessing information.
Snooping
The move toward a more social, collaborative,
Email is not private
interactive, and responsive web; has led to the
“social web,” giving rise to: Corporate management has the right to view
employees’ email. Friends can send email
Social networking sites: Online
anywhere. Not all ISPs protect their customers’
communities that allow members to keep track
privacy.
of friends and share photos, videos, music,
stories, and ideas (e.g., Facebook, LinkedIn). Deleted emails can be retrieved from a hard
disk.
Media-sharing sites: Online social
networks in which members share media such
as photos, videos, music, ideas (e.g., YouTube,
Flicker, Shutterfly).
Spam: Electronic Junk Mail Cookies
Unsolicited email that takes up your time. Little text files (data) left on your storage by
some websites you visit.
Delete it without opening the message. Never
reply to a spam message. Can include your log-in name, password,
browser preferences, and credit card
Do not click on “unsubscribe” at the bottom of
information.
an email. When you sign up for something,
don’t give your email address. Every time you load a particular website, the
browser sends the cookie back to the server to
Use spam filters. Fight back by reporting new
notify the website of your previous activity.
spammers to www.abuse.net or
www.spamhaus.org. Can make visiting these websites next time
more convenient and faster.
Spoofing
But cookies can be used to gather information
Using fake email sender names so the message
about you and your browsing habits and history;
appears to be from a different source, so you
this information can be used without your
will trust it.
consent.
If you don’t know the sender, don’t open it.
A first-party cookie is a cookie from a website
Phishing that you have visited. Third-party cookies are
placed by trusted partners of the websites you
Sending forged email directing recipient to fake
visit. (Third-party cookies are frequently placed
website.
by ad networks.)
Purpose: to entice people to share personal or
Spyware: Adware, Browser & Search
financial data.
Hijackers, & Key Loggers
Fake website looks like real website, such as a
Spyware is software surreptitiously
bank’s, or social websites
installed on your computer via the web.
Pharming
Spyware: hides on your PC/device and
Implanting malicious software on a victim’s captures information about what is on the it,
computer that redirects the user to an such as keystrokes and passwords
impostor web page even when the individual
Adware:, or pop-up generator, is a
types the correct address into his or her
kind of spyware that tracks web
browser.
surfing or online buying so that
Use websites with URLs that begin with marketers can send you targeted
“https:// and unsolicited pop-up and other
ads.
Some spyware removal programs can correct
the corruption. Browser hijackers: change settings in your
browser without your knowledge, often
changing your browser’s home page and
replacing it with another web page.
Malware