Download presentation
Presentation is loading. Please wait.
1
Chapter 6: Introduction to Internet
Computer Skills-1 1435/1436 Chapter 6: Introduction to Internet Place photo here Department of Computer Science Foundation Year Program Umm Alqura University, Makkah
2
The Objectives and the outcomes
To understand the basic of the internet and how to connect to it. To let student setup his and compose s . To understand the internet Ethics. The Outcomes: student should be able to know the basic of the internet and how to connect to it. student should be able to setup his and how to use it. student should be able to use the internet safely.
3
Identify each of the ARPANET and the INTERNET
ARPANET (The Advanced Research Projects Agency Network ) was the network that became the basis for the Internet. in 1967, ARPANET was developed under the direction of the U.S. Advanced Research Projects Agency (ARPA) In 1969, the idea became a modest reality with the interconnection of four university computers. The initial purpose was to communicate with and share computer resources among mainly scientific users at the connected institutions.
4
Basic Internet Definition
ARPANET - The Advanced Research Projects Agency Network which is the precursor to the Internet. ASCII - American Standard Code for Information Interchange. The de facto world wide standard code for alphanumeric characters. URL - Uniform Resource Locator. A unique name that identifies an Internet site. WWW - World Wide Web. The universe of hypertext servers. Browser - A program that is specifically used to look at various WWW resources. Domain Name - A unique name that identifies an Internet site.
5
Basic Internet Definition
- Messages, usually text, sent from one person to another via a computer. Client - Any computer that makes use of services available from other computers. Host - A computer or software package which provides a specific kind of service to other computers. One that is seen by other computers on the Internet. Server - Any computer that makes services available to other computers. Modem - A device that allows a computer to use a phone line to communicate with another computer.
6
Basic Internet Definition
Protocol - The rules of conduct which enables a computer to communicate with another computer. PPP - A protocol that allows a computer to use a telephone line and a modem to make TCP/IP connections. TCP/IP - Transmission Control Protocol/Internet Protocol. This is the protocol which defines the Internet. Fire Wall - A combination of hardware and software that separates a LAN into two or more parts for security purposes.
7
Introduction to Internet
The internet in simple terms is a network of the interlinked computer networking worldwide, which is accessible to the general public. These interconnected computers work by transmitting data through a special type of packet switching which is known as the IP or the internet protocol. The World Wide Web (www) is only a portion of what makes up the internet, but it is the fastest growing part of the internet. The Web lets people, organizations and companies publish information for other people to see.
8
Introduction to Internet
The Web is a large number of computer documents or "Web pages" . They are stored on computers around the world and are connected to one another using hyperlinks. These Web pages can be seen by anyone through their computer's "Web Browser”. A group of Web pages that follow the same theme and are connected together with hyperlinks is called a "Web site" . Web sites and Web pages are written in a coding language that makes it possible to add pictures, sound and interactivity to plain old text .
9
Services through the net
Major services: – Electronic Mail FTP – File Transfer Protocol Gopher Newsgroups Telnet – Remote session WAIS – Wide Area Information System WWW – World Wide Web
10
How to Connect to the Internet
you need an Internet service provider (ISP). An ISP can be one of the following types: dial-up, broadband, wireless, wireless mobile, or satellite.
11
Internet Connection: Wired
Dial-up Broadband Options Cable DSL FiOS Least expensive Use regular phone line to connect to network $10-$30 per month Very slow, maxing out at 56 Kbps Offered by your cable TV provider Cable speeds range from 1 Mbps – 50 Mbps Uses telephone line to carry digital signal Average speeds of 384 Kbps – 7 Mbps Fastest of the three broadband alternatives Speeds top out at 50 Mbps Can carry Internet , phone, and TV over fiber optic cables
12
Internet Connection: Wireless
Wireless Options WiMax Mobile Satellite Municipal WiFi Includes 3G and 4G services that connect to the Internet via cellular networks More global and more expensive option Considered when other options are not available Offered in some cities and towns
13
How to access the Internet?
Many schools and businesses have direct access to the Internet using special high-speed communication lines and equipment. Students and employees can access through the organization’s local area networks (LAN) or through their own personal computers. Another way to access the Internet is through Internet Service Provider (ISP). ISP is a commercial organization with permanent connection to the Internet Examples: STC Online, Microsoft network, AT&T Networks.
14
What are the Browsers & Search Engines
Web browsers are programs used to explore the Internet. Internet Explorer Mozilla Firefox Google Chrome Apple Safari Released in 1995 Leading Web browser Included with Windows Released in 2004 Similar in look to IE Free and easy to install Released in 2008 Streamlined interface, similar to IE and Firefox Main focus is on speed; Web pages do load faster Not as many features as IE and Firefox Most popular browser for Macs Bundled with Mac OS X and also available for Windows Neat feature is Top Sites preview
15
What are the Browsers & Search Engines
A Web Search Engine is designed to search for information on the World Wide Web. The search results are generally presented in a line of results often referred to as search engine results pages (SERPs). Google is the most popular search engine in the world, and a multinational, publicly-traded organization built around the company's hugely popular search engine. User can search for any information by writing what he is looking for in the search text box. Google can view the searched information as a web pages, pictures and there is a part for Maps, YouTube, and news. Google have its own Application called “Gmail”.
16
Uniform Resource Locators (URL)
The IP address and the domain name each identify a particular computer on the Internet. However, they do not indicate where a Web page’s HTML document resides on that computer. To identify a Web pages exact location, Web browsers rely on Uniform Resource Locator (URL). URL is a four-part addressing scheme that tells the Web browser: What transfer protocol to use for transporting the file The domain name of the computer on which the file resides The pathname of the folder or directory on the computer on which the file resides The name of the file
17
Uniform Resource Locators (URL)
18
Hypertext Transfer Protocol (HTTP)
Tells your computer what type of page you are looking at. If you see HTTPs, it is a secure Webpage. FTP is for File Transfer Protocol. WWW represents the computer or server on the site you are viewing.
19
Domain Name .uk – United Kingdom
The name always has two or more parts separated by a dot. The last part of the name identifies the site Top-Level Domains: .edu – Educational Institutions .com – Company / Commercial Organizations .org – Non-profit Organizations .net – Network, network of sites .mil – Military Installations .gov – Government sites Sub Domains: .sa – Saudi Arabia .in - India .jp - Japan .uk – United Kingdom
20
What is E-Mail and How to Use it?
, sometimes written as , is simply the shortened form of “electronic mail,” a system for receiving, sending, and storing electronic messages.
21
How To setup Student E-Mail in Umm Alquara University (UQU)
Each student already has Student ID after enrolling in Umm Alquara University. So, the will be started with S and then the student ID; For example, To log-in: click on student link in the top of UQU home page. Fill the username which is student and the password that started with St and then the Saudi ID (St ). Note: For first time login student needs to choose the language (i.e. Arabic) and the time zone (i.e. Riyadh)
23
How To setup Student E-Mail in Umm Alquara University (UQU)
St
24
Sending a Message When the user wants to send a message he must know the address for the recipient in the other side. There is a text box named be “To” to write the address in it. Then the user can write the title of his message in a text box named by “Subject”. Then he can write the message in the bigger text box and then press on “Send”.\ Attaching Files Also the user can attach a file which can contain a text, pictures or videos by pressing on “Attachment” button for attaching any file saved in the computer.
25
Sending a Message
26
Internet Behavior and ETHICS
You shall not use internet to harm other people. You shall not snoop around in other people's internet files. You shall not use a internet to steal or hack. You shall not use other people's internet resources without authorization or proper compensation. You shall always use internet in ways that show consideration and respect for your fellow humans. You should not upload articles that may scratch others psychological manners.
27
Internet Security Internet security is a tree branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. Types of security Network layer security Internet Protocol Security (IPsec) Security token Electronic mail security ( ) Firewalls A computer firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another
28
Internet Security Create Strong, Secure Passwords
Pick a phrase you can remember with a number in it, like "A bird in the hand is worth two in the bush." Change that number (in this case, "two") to its numerical equivalent: A bird in the hand is worth 2 in the bush Condense the phrase by only using the first letter of each word: Abithiw2itb Add some special characters you can remember: #Abithiw2itb!
29
Internet Security Keep Your Other Information Protected
The protection of Credit Cards Use temporary credit card numbers. Use trustful website having https protocol How to keep Mobile Technology Secure Use tools to keep the laptops and mobile phones secure from tampering, Initiate a remote data to wipe in the event of a breach, to Send messages or to locate the device.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.