Professional Documents
Culture Documents
______________________________________________________________________________________
Chapter 1: Internet
1.1 Introduction
The Internet has revolutionized the computer and communications world like nothing
before. The invention of the telegraph, telephone, radio, and computer set the stage for
this unprecedented integration of capabilities. The Internet is at once a world-wide
broadcasting capability, a mechanism for information dissemination, and a medium for
collaboration and interaction between individuals and their computers without regard for
geographic location.
The Internet represents one of the most successful examples of the benefits of sustained
investment and commitment to research and development of information infrastructure.
Beginning with the early research in packet switching, the government, industry and
academia have been partners in evolving and deploying this exciting new technology.
This is intended to be a brief, necessarily cursory and incomplete history. Much material
currently exists about the Internet, covering history, technology, and usage.
The Internet today is a widespread information infrastructure, the initial prototype of
what is often called the National (or Global ) Information Infrastructure. Its history
involves many aspects - technological, organizational, and community. And its
influence reaches not only to the technical fields of computer communications but
throughout society as we move toward increasing use of online tools to accomplish
electronic commerce, information acquisition, and community operations.
1.2 Origins of the Internet
The beginning of internet technology can be traced back to 1969,when the Advanced
Research Projects Agency, funded by the U.S Department of Defense,conducted research
on Networking. Their goal was to design a network that allowed computers on different
types of networks to communicate with each other.
During the 1960s and 1970s, many computer networking technologies were created, each
based on a particular hardware design. Some of these networks, called Local Area
networks (LANs), connect computers over short distances, using cables and hardware
installed on each computer. Other larger networks called, Wide Area Networks (WANs),
connect many computers over large distances, using transmission lines similar to those
used in telephone systems.
Although LANs and WANs made it much easier to share information within
organizations, the information stopped at the boundaries of each network. Each
networking technology moved information around in a different way, often based on the
design of its hardware. A particular LAN technology could only work with specific
computers, and most LAN and WAN technologies were incompatible with each other.
The internet was designed to interconnect the different types of networks and allow
information to move freely among users, regardless of the machines or networks they
used. It did this by adding special devices called routers, to connect LANs and WANs of
different types. The connected computers needed common protocol, a shared set of rules
describing how to transmit data. The new networking protocol was called TCP/IP.
Together, TCP/IP and System of connected computers formed the Internet.
Application of Internet
______________________________________________________________________________________
Note: There are three basic types of dial-up modems from which to choose:
Internal Modem
The modem is built in to the computer, only the plugs for connecting to a phone line (and
perhaps a telephone) are visible outside the computer.
External Modem:
The modem is outside the computer. You’ll need to connect one cable from the modem to the
computer, another from the modem to the phone line, and perhaps another to the telephone if you
use the same phone line for both voice calls and your Internet connection.
PC card (PCMCIA): Personal Computer Memory Card Industry Association
A small credit-card-sized modem that fits into the PCMCIA slot found on most Laptop
computers.
Note: i. If your computer came with a modem built in, the modem is probably ready to go.
You just need to connect the “Line” jack to your telephone line. Optionally, if you’ll be using
one phone line for both voice calls and your Internet connection, you’ll also need to connect the
“Phone” jack on the computer to your telephone.
ii.If your computer doesn’t have a modem built in, you need to purchase a modem
that’s compatible with Windows XP as well as with your Internet service provider. Virtually all
ISPs support 56K modems that support the V.90 standard, and there are literally hundreds of
those to choose from on the market.
Note : If you can get Internet access through some other computer, you might want to change
the Windows XP hardware compatibility list for modems that have been tested and certified to
run on Window XP.After you’ve purchased a modem, you need to install it as per the
manufacturer’s instructions.
1.6.1.2 Setting Up an Internet Account
Once your modem is hooked up and installed, you’re ready to set your account with an
ISP. There are thousands of ISPs to choose from. If you plan on setting up a dial-up account
with a traditional modem and phone line, it’s important to find an ISP that can provide a local
access numberthat you can dial for free. The local access number is the phone number your
modem will dial to connect to the Internet. You want to make sure that number is within the
area code and range of dialing prefixes for which there are no tolls whatsoever. Check your local
telephone directory for a list of dialing prefixes you can dial free. Then check out your
potential ISP’s list of local access numbers to ensure they have one that will be toll free for you.
1.6.1.3 Using the New Connection Wizard
The New Connection Wizard, which comes with Windows XP, is a handy program for setting up
your
Internetaccount. The wizard poses questions for you to answer and gives you blanks to fill in.
To start the New Connection Wizard, follow these steps:
Click Start buttonAllProgramsAccessoriesCommunicationsNew
ConnectionWizard.
From the first wizard screen, click the Next button.
Choose Connect To the Internet from the second wizard screen and then click the Next button.
The third wizard screen asks how you want to set up your account.
Choose whichever option best describes what you want to do.
For clarification, here’s what they mean:
Choose from a list of Internet service providers (ISPs):
Select this option only if you’ve never contacted an ISP or set up an account and you want to
purchase an account right now.
Set up my connection manually:
If you’ve set up an account with an ISP and have a user name and password (and perhaps some
other information from choose this option.See Fig.
Use the CD I got from an ISP:
Application of Internet
______________________________________________________________________________________
If you purchased an account already and your ISP has provided you with a CD, choose this
option.
The next wizard screen, shown in Figure 5, asks for your user name and password. Type
exactlyas provided by your ISP (ETC).
If you want to add a shortcut icon to your desktop, you can just click (or double-click) that icon to
getstarted. If you didn’t set up a desktop shortcut, you’ll need to get to the connection’s icon
(sometimescalled a connectoid) in the Network Connections window.
To open that window, follow these steps:
Click the Start button.
Choose All ProgramsAccessoriesCommunicationsNetworkConnections.
Click (or double-click) the icon for your Internet account. For example, the MyISP icon in
Figure7is a dial-up connection for my Internet account.
11.6.2 ISDN
ISDN…..Stands for Integrated Services Digital Network.ISDN lines are connections that use
ordinary phone lines to transmit digital instead of analog signal. Withdigital signals, data can be
transmitted at a much faster rate than with a traditional modem.
ISDN converts analog signal into digital bits. Because bits can be transmitted very quickly, we
can get much faster speed out of the same telephone line 4 times faster than a modem. In addition
ISDN connections are made up of two different channels, allowing two simultaneous
“conversations”, you therefore can speak on one channel & send a fax or connect to the internet
over the other channel.
ISDN is apowerful tool for internet communications, but it is not available
everywhere.Traditionally, it has been used in urban business zones and large corporate settings
with special digital switching equipment,but residential ISDN service is expanding rapidly.An
ISDN line can offer inexpensive, high band width connections, but you may have to buy special
hardware that will allow ISDN to communicate with home or office PC.
1.6.3 T1 Line
T1 Line is a high-speed digital connection capable of transmitting data at a rate of approximately
1.5 million bits per second. AT1 line is typically used by small and medium sized companies with
a heavy network traffic.
This line large enough to send and receive large text files,graphics,sounds and databases
instantaneously,and it works at the fastest speed commonly used to connect networks to the
internet.Sometimes referred to as leased line, a T1 line is basically too large and too expensive
for individual home use.
1.6.4 T3 Line
A T3 Line is a super high-speed digital connection capable of transmitting data at a rate of 45
million bits per second. This connection represents a band width equal to about 672 regular voice-
grade telephone lines.A T3 Line is wide enough to transmit full-motion,real-time video and very
large databases over a busy network.
A T3 Line is typically installed as a major networking artery for large corporations and
universities with high volume network traffic.The backbones of the major Internet Service
Providers, for example, are made up of T3 Lines.
1.7 Review Questions
Define internet.
Application of Internet
______________________________________________________________________________________
HTML
Is Hyper Text Markup Language .HTML is a coding language for the world wide web
that informs browsers how to display a document’s text, links, graphics, and other media.
This language forms the foundation for all web pages.
Pages
A file that can be read over the world wide web is web page or page. The basic document
of WWW is a page.Pages are written in an evolving language called html.
Web Pages
The global collections of documents associated with and accessible via the WWW are
known as WebPages.
Hypermedia
A web document that contains ant combination of audio, graphics, movies, or video as
well as links, and navigation tools.
URLs
Is a Uniform Resource Locator.It gives the location of a file on WWW and also
identifies the internet service,such as FTP or WWW that handle the file.
Example of URL;
http://www.microsoft.com/products/yourproduct.htm/#information
BackForewardStopRefreshHomeSearchFavoritesHistoryMail
Note:The following are navigation buttons, shortcuts, and menu options:
Back:
Returns to the previous page you visited during this browsing session, if any
(sameas pressing Alt+left arrow, backspace, or choosing ViewGoToBackfrom the menubar).
Forward:
Goes to the page from which you just backed up during this browsing session, ifany (same as pressing
Alt+right arrow or choosing ViewGoToForward from themenu bar).
Stop: Ends the download (useful if you find that a download is taking too long). This freesthe
browser, enabling you to visit elsewhere (same as pressing Esc or choosingView→Stop from the
menu bar).
Refresh: Ensures you are viewing the absolute latest version of the current page (same aspressing
F5 or choosing ViewRefresh from the menu bar).
Home: Returns to your default home page (same as choosing ViewGo ToHomePage from
the menu bar).
Media Bar: Displays the Media bar in the left pane of the screen (same as choosing
ViewExplorerBarMedia).
This frame includes a pane you can use to search the Web formultimedia (that is, music and
videos) and includes controls for playing media files.
Search: Displays a Search Explorer bar in the left frame of the screen (same as
choosingViewExplorerBarSearch or pressingCtrl+E).
Favorites: Displays the Favorites Explorer bar in the left frame of the screen (same aschoosing
ViewExplorerBarFavorites from the menu bar or pressing Ctrl+H).
History: Displays the History Explorer bar in the left frame of the screen.
(same aschoosing ViewExplorerBarHistory from the menu bar or pressing Ctrl+H).
Note:
Choosing ViewGo To from the menu bar also displays a brief list of recently
visited Web pages. Click any pagelisted on the menu to revisit. The small arrows
attached to the Back and Forward buttons in the Standard toolbar also provide lists
of recently visited pages.
Mail: Takes you to Internet e-mail, as discussed in Chapter 3.
Print: As mentioned, prints the Web page you’re viewing (same as choosing FilePrintfrom the
menu bar or pressing Ctrl+P).
Tip of the Day: Choosing ViewExplorerBarTip of the Day
displays a daily “tip” in abar along the bottom of the window.
2.6Searching from a Web page
You can search the Internet from the Web site for a specific search engine if you want.
For example,you can go straight to the Yahoo! Web site by entering www.yahoo.com
into the Address box. Or, visitthe Lycos search engine at www.lycos.com. Other popular
search engines can be found atwww.excite.com (Excite) and www.infoseek.com
(Infoseek).
2.6.1 What’s a Search Engine?
A search engineis a special type of Web site that helps you find resources on the
Internet, includingWebpages, newsgroups, and more. When you start a search, the
engine looks through an existingdatabase of Web pages, not the Internet itself. This is
good, because it would take an extremely longtime to actually visit all the millions of
pages on the World Wide Web.
Note:Web sites come and go, so some ofthe links that appear might lead to Web sites that no longer exist
leaving you with “Page notfound error”. If that happens, just click the Back button to try another page on
the list.
Application of Internet
______________________________________________________________________________________
Some of the common search engines available on the internet are listed in the following table.
Site Address
Yahoo http://WWW.Yahoo.com/
Google http://WWW.Google.com/
Infoseek http://WWW.infoseek.com/
Alta Vista http://WWW.alatavista.digital.com/
Magellan http://WWW.mckinley.com/
Lycos http://WWW.lycos.com/
Open Text http://WWW.Opentext.com/
WebCrawler http://WWW.Webcrawler.com/
Table 1
2.7 Searching Options & Framing a Search.
Every search engine we use follows the same basic steps.These steps are :-
i. Point to the browser to the search sitefind the field to enterthen, click the search
button.OR,
ii. Browsethrough a directory by Category.We can browse directories on topicssuch as
Art,Science,Business,Sports,BBC News etc.
The search terms we use usually determine our success.The words & operators we use to help us
in our search can greatly improve or reduce the effectiveness of our search. Most search engines
can make use of of Boolean Operators, which are designed to put conditions on a search.
Some of the common operators and techniques are listed below:-
“And”or “+”
These operators are used to produce a hit based on both terms entered as search criteria.
Example:-To search for “Computer Science And Engineering”, we can enter Computer +
Science + Engineering and click Search button.
“OR”
This operator accepts a hit from either term entered as search criteria.
Example:-To search for “Science” and “Technology”, we can enter Science or
Technology and click Search button.
“And Not”…………opposite of “And”
This operator enables us to exclude a term specifically.
Example:-If we enter “Science And Not Technology”, as search criteria,
onlydocuments containing the word “Science” not followed by “Technology” would be
produced as hits.
Case
Many search engines are case sensitive.
Example:To search for Qeen Victoria, it is better if we capitalize for the initialletters.
Real Language
Many search engines now can interpret real language searches. When we misspelled a
search criteria, the search engines automatically correct it and prompts to confirm us .
Note: Search results produced by search engines are called Hits.
2.8 Using hyperlinks
One of the best features of the Web is its use of hyperlinks — hot spots on the screen —
which, when clicked, take you to images, videos, audioclips, or other Webpages. Most
hyperlinks appear as underlined text; but any text, or even part of a picture, can be a
hyperlink. When the mouse pointer is touching a hyperlink, it changes to the little
pointing hand. A ToolTip showing a description of the hyperlink or the address to which
the hyperlink will take you also may appear near the mouse pointer.
Application of Internet
______________________________________________________________________________________
The status bar typically will show the hyperlink’s address. To follow the link to its
destination, click the left mouse button and wait for the new page to appear on your
screen.
While you tour the Web, Internet Explorer may occasionally display Security Alert dialog boxes.
These alert you to the possible security risks of carrying out an action. The message is really more
a provision than a warning of an actual threat.
2.9 Printing a Web page
You can easily print a copy of whatever Web page you’re viewing at the moment by
clicking the Print button on the Internet Explorer toolbar. To print,
Choose FilePrint from the Internet Explorer menu bar, or
Click the Printbutton on the toolbar.
If the page you’re viewing is divided into separate frames,
Right-click within the frame you want to print and
Choose Print from the menu that appears.
2.10 Creating a Favorites list
As you follow links and explore the Web, you’re sure to find sites you’ll want to revisit.
You can make the return trip easier by adding the site to your Favorites while you’re
there. To add a site to your Favorites list, follow these steps:
While viewing the page you want to add, choose Favorites
AddtoFavorites from the Internet Explorer menu bar.
The AddFavorite dialog box displays, as shown in Figure 12.
Next, fill in the Address text box in the Home Page area with the address of your favorite
starting Web page or
Click the Use Currentbutton to select the current page you’re browsing as your home
page.
Click the UseDefaultbutton to revert to Microsoft’s site as the home page.
Alternatively, click the UseBlank button to save a few seconds when you fire up Internet
Explorer.
If you do this, Explorer won’t go looking for your home page.
Finally, click OK to save your changes.
Then drag the little icon shown next to the URLin the Address box to your desktop and
release the mouse button (see Figure 14).
In the SaveAs dialog box, choose the diskdrive and folder in which you want to store
thefile you’re downloading.
Give the file name.
Click the Save button.
The download will begin and you’ll see a progress meter. You can do other work while
waiting for thedownload to complete; but if you interact with the Internet a lot, you’ll
slow down the download. If youcan find something to do locally (on your own PC rather
than on the Internet), you won’t compete withthe download. Of course, if the file you’re
downloading is a large one, going out to lunch isn’t a bad idea!
2.16Downloading when no link exists
In some cases, you might see a picture in a Web page, or some other item that offers no
real downloadoption. Chances are, you can download a copy of that item right to your
own PC by following thesesteps:
Right-click the link or the item you want to download to your own PC.
From the pop-up menu that appears, choose SaveTargetAs or SavePictureAs
Choose the diskdrive and folder in which you want to Save & give the file name.
Click the Save button to begin the download.
2.17Saving a Web page
You can save an entire Web page, which is handy if you want to design a page similar to
an existingpage on the Web.
To save the page,
Choose FileSaveAs from the Internet Explorer menus.
Fromthe SaveasType drop-down list, choose one of the following options:
i. Web Page, complete (*.htm,*.html):
Saves the Web page and any graphics that go alongwith it. But graphics and text are stored in
separate files.
ii. Web Archive, single file (*.mht):
Saves the Web page and its graphic images in a singlefile with the .mht extension.
iii. Web Page, HTML only (*.htm,*.html):
Saves only the text and HTML (formatting) codes,but no graphics.
iv.Text File (*.txt):
Saves only the text with no graphics or HTML formatting.
Then enter a name for the page, and click the Save button.
2.18Copying off the Web
It isn’t really necessary to download an entire page of the Web if you’re just looking to
copy some textinto a word processing program, or a picture into a graphics program. A
simple cut-and-paste procedurewill do the trick there.
To copy text, for example,
Open any text editor such as (WordPad,MSWord) program,
Click Back in Internet Explorer,
Select the text you want to copy by dragging the mouse pointer through it.
Press Ctrl+C or choose EditCopy from the Internet Explorer menu .
Position the cursor in MS Word or WordPad document, and
Press Ctrl+V or choose EditPaste from that program’s menu bar.
Note:To copypictures;
Open a graphics program, such as Paint or some other, more completeprogram such as
PaintShopPro or PhotoShop and do the same as the above steps.
Application of Internet
______________________________________________________________________________________
The Header
We write any typical letter on paper, put it in an envelope and mail it to someone. The e-
mail message header is like digital envelope andthe body isthesameas electronic letter.
The following are the different messageheaders we need to be concerned about when
sending an e-mail .
i. To:
is a field that contains the e-mail address of the person to whom you are sending e-mail.
Example: oroict@yahoo.com
ii. From:
Application of Internet
______________________________________________________________________________________
is a field that includesyour e-mail address.You don’t have to worry about this field
because most e-mail clients automatically fills it for you.
iii. Subject:
This field should contain a very short (20-30) characters description of what your
message is about. Example: Sending Annual Report
iv. CC:
CC….Stands for Carbon Copy.
is a field that contains the e-mail addressesof additional recipients.It is Used to send a
copy of the message to different recipients.
v. BCC:
BCC….stands for Blind Carbon Copy.
is a field that gives you a way of copying an e-mail message to another person without
the first person you send the message knowing about it.
vi. Attachments:
Enables us to attach entire documents or a file to e-mail messages.
The Body
The body of an e-mail message is simply the text that we want the person on other end to
see when he or she receives our message.
Yahoo! U.S.
Please select the local Yahoo! site from this
list that best meets your content needs. Note: If you change this setting, you
* Preferred content:
may receive a country-specific Yahoo! email address instead of one that ends
in @yahoo.com.
* Gender: Female
* Password:
Six characters or more; capitalization matters!
* Re-type password:
Four characters or more. Make sure your answer is memorable for you but hard for
others to guess!
Application of Internet
______________________________________________________________________________________
January 1 1980
, Please provide an accurate birthdate for
your own protection. We ask your birthdate to verify your account if you
* Birthday:
ever forget your Yahoo! ID or password. (Yahoo! will never request your
tklu_itana@yahoo.co.uk
We use your alternate email address to
Alternate Email: send information about your account (including new password requests)
Customizing Yahoo!
Industry: Computers/Electronics
CU37ieVZFel8i2f
Terms of Service
Please review the following terms and indicate your agreement below. Printable
Version
1. ACCEPTANCE OF TERMS
Yahoo! Inc. ("Yahoo!") w elcomes you. Yahoo!
provides its service to you subject to the follow ing
Terms of Service ("TOS"), w hich may be updated
by us from time to time w ithout notice to you. You
can review the most current version of the TOS at
By clicking "I Agree" you agree and consent to (a) the
Yahoo! Terms of Service and Privacy Policy, and (b)
receive required notices from Yahoo! electronically.
Bottom
I Agree
of
Form
Yahoo! - Help
A confirmation message has been sent to the Email Your Yahoo! ID:
Address you provided. Please read the email and chaltu_regassa
follow the instructions to fully activate your
account. Your Yahoo! Mail Address:
chaltu_regassa@yahoo.com
We also recommend that you print out this page
for future reference.
If you forget your password you will be Security Question: Date of Birth:
asked for the following information. What was the name of your January 01,
first school? 1980
ZIP/Postal
Your Answer:
Code:
Biftu 4050
9. Close “InternetExplorer”
10. Open “InternetExplorer” again.
11. Open WWW.Yahoo.Com web site or “mail.yahoo.com” web site
12. Clik on “mail” or “mymail”.
13. Give your “AccountID” & “password”.
14. Click on “Sign In”,then you will get a message from Yahoo domain.
3.4 . Sending an E-mail Message
To send an e-mail message to some one who as an e-mail address,follow the following
steps:
After you “Sign in”,Click on “Compose” tab.
Application of Internet
______________________________________________________________________________________
• Type in your secret answer – it must be a minimum of five character s and is not case sensitive.
• Hotmail can send a password prompt email to an alternate email address if you have one. If so, type it into
the relevant field.
• To select your dateofbirth click on the drop down arrows and click on the date, month and year of your
birth to select them.
• For constituentcountry click on the drop-down arrown and select the relevant area.
• Type in your postcode.
• Click on the drop-down arrow and click on the relevant timezone to select it.
• If you own or work with a small business click in the ‘checkbox’. If not, then leave it blank.
• From this screen, click on the bluelink to use your own email address
• A new screen will appear asking you whether you want to subscribe to any email
newsletters used for marketing purposes.
• If you want to subscribe to any of them click in the boxes next to them to select them.
• Once you have finished, scroll down to the bottom of the page and click on the blue
‘Continue’ button.
• Click on the name of the person who sent the email (in this case ‘Hotmail Staff’) to open
the email.
• This email contains valuable information about using your Hotmail account. It’s a good
idea to save it in you inbox and not to delete it.
• To sign-out of your account click the button at the top of the screen. For security
reasons it is always recommended to sign-out of your account once you have finished checking
your emails.
To log-on back onto your account:
Go to www.hotmail.com
Application of Internet
______________________________________________________________________________________
• Enter your new email address and password into the relevant fields.
• Decide whether you want your computer to save you email address and password. If
you are using your own computer at home then it can be convenient for your computer to
automatically know your address and password.
• If you are using a computer that other people use it is generally not advised to select the
options for the computer to save your details as other people may be able to access your
account.
• Click the grey ‘Sign In’ button to enter into your Hotmail account.
What is an e-mail ?
What is the benefit of e-mail when compared to phone calls?
Discuss the three elements of of e-mail address.
What are the different message headers we need to be concerned about when sending an e-
mail?
Write the steps to register for an e-mail account.
Write the steps how to send an e-mail to some one.
Write the steps how to check/read an e-mail message.
Write the steps how to reply toan e-mail message.
Write the steps how to attach a file toe-mail message.
Write the steps how to receive an attached file toe-mail message.
Write the steps how to foreward ane-mail message to a friend.
Write the steps to register for an Hot-mail account.
38
Application of Internet
______________________________________________________________________________________
Proxy servers provide a single point of access to the internet.This is more secure than
allowing each user to connect directly and allows network “behind” the proxy server to be
hidden.
Virtual Private Networks (VPN).
It connects the components and resources of one network over another network.It uses
encryption technology to ensure that the security of a private network is available and the
secure connection across the internet appears to the user as a private network communication.
Web Browser Security
Internet Security has a system of zones,for which we can set different security levels.We can
then able the use of active web connects and files downloading on trusted sites.
Note: The detail explanation of the above internet security methods is beyond the
scope of this manual, therefore ,it is recommended to refer to the “Internet”
or other referencebooks on internetsecurity.
4.2 Viruses
Computer viruses are program designed to replicate and duplicate amongst computers.They
produce a wide variety of symptoms on a PC and ,in extreme cases,can cause permanent
damage or loss of files.
Types of Viruses
Computer viruses are generally classified by the different ways they can affect the computer.The
following are some types of viruses:
Boot Sector Viruses
They attack the boot sector information, the partition table & sometimes the file system.
Program Viruses
They are sequences of codes that insert themselves into another executable program. When the application is
executed, the virus code becomes active.
Macro Viruses
Are viruses that affect office documents,and have become very common because of the wide distribution of
these documents, especially over the internet.
Worms
Are memory- resident viruses that replicate over network resources.
Symptoms of Virus Infections.
The following are examples of the symptoms that may indicate a virus infection.
The computerfails to boot.
Hard or FloppyDisks are reformatted .
The Filesystem becomes corrupt
The master boot record is corrupted .
Individual files on HardDisks or FloppyDisks are Corrupt.
Strange Messages or Graphics appear on the screen.
39
Application of Internet
______________________________________________________________________________________
40
Application of Internet
______________________________________________________________________________________
List of References
41