Access and Use Internet
Access and Use Internet
MODULE DESCRIPTION: this module defines the competence required to access internet and
LEARNING OUTCOMES
LO2.Search Internet
WWW: It is a collection of interlinked documents that are accessible over the Internet. It consists of millions of
web pages that contain text, images, voice and videos. Sir Tim Berners-Lee, a British scientist working at CERN,
created the World Wide Web.
Website: A website is a set of web pages consisting of text, audio and video. Web servers host websites.
URL: It specifies the location of a resource on the Internet. It consists of the basic address and path.
Web Page: Web pages are resources of information. They are generally created in the HTML format and provide
the web users with navigational abilities through hyperlinks to other web pages on the web.
Home Page: The term home page is used to refer to the page that is the default page of any website. It is the main
page of a complex website.
Web Browser: A web browser is a software application that facilitates user interaction with the text, audio, video
and other information that is located on the web.
Cache: Web browsers maintain a cache of recently visited web pages. Some of them use an external proxy web
cache, which is a server program through which web requests pass. This enables the browsers to cache frequently
visited pages. Even search engines make available already indexed web pages through their caches.
HTTP: Hypertext Transfer Protocol, abbreviated as HTTP, is a communications protocol used for the transfer of
information over the Internet. A client makes an HTTP request using a web browser to which an HTTP response is
sent from the server.
Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged between the web client and the
web server. It is sent by the web server to the web client and returned unchanged by the client each time it accesses
the server.
Session: It is an exchange of information between a computer and its user. It is established for a certain period of
time after which it ends.
Hyperlink: A reference in a document to another section of the document or to another document is termed as a
hyperlink. Hyperlinks are used to redirect the user from one section of a page content to another.
Internet Security: It is one of the major concerns today. As the Internet acts as a communication platform that can
be accessed by millions of users around the world, it becomes necessary that proper measures be implemented.
Issues like Internet Safety that deal with the content that is made accessible over the Internet are equally
important. Internet Privacy relates to safeguarding the privacy of the web users and the sensitive information on the
web from hackers and stalkers.
1.3. Opening internet browser and setting up home page by using internet options
Browser Software
Is a software program that allows a user to locate, access, and display web pages over the internet.The best internet
browser isn‘t necessarily the default one that comes with your device. However, there are a number of very good
browsers to choose between, and the right one for you will depend on your requirements.
Types of browsers
Mozilla Firefox: Best overall
Mozilla's Firefox is one of the fastest internet browsers we tested for navigating between sites and for fully loading
pages. It also proved to be the most secure during our in-house tests using live malware.
This browser is compatible with Mac and Windows operating systems, and with Android and iOS cell phones and
tablets. It syncs your passwords, bookmarked pages and browser settings so you have access to these – as well as
your search history – on other computers and mobile devices.
Mozilla includes a privacy browser so you can search online without cookies or other trackers. And you can set this
browser to delete all the cookies, cache and browser history each time the browser closes. Mozilla is nicely laid out
and has a clean interface, so it‘s easy to find most tools and features. You can have multiple browser tabs open at
once in a single window and rearrange their order by dragging and dropping the tabs. If you accidentally close a tab,
or even the entire browser, Firefox will recover it for you.
Chrome: Best for Google Drive
Google Chrome comes standard on most Android mobile devices, so it is a good choice for cell phones and tablets. Plus
we‘ve found that it works a bit better than Firefox on Android devices. Chrome is also a good choice for Windows and
Mac computers.
If you use Chrome on multiple devices, logging in to your account will give you quick access to documents you saved
in Google Docs, your Gmail messages and your bookmarks, regardless of the device you‘re on. Search history is also
saved with your account, so if you‘re logged in, terms you‘ve looked for will auto-populate when you start typing in the
Google search field on any device.
Chrome lets you set icons on your toolbar so you can quickly get to the pages you visit most often. You can also pin
bookmarks to the Google Chrome homepage. It has tabbed browsing so you can have multiple viewing windows open
at once and easily toggle between them. During out in-house tests, we noticed Chrome didn‘t identify as many phishing
schemes as Firefox, but it did stop malicious files, including ransom ware and Trojans, from opening and infecting our
computer. Chrome‘s privacy browser is available on all devices, including cell phones, to keep your online activity
private.
Microsoft Edge: Best for battery life
Compatibility issues for older Windows machines Microsoft Edge comes standard with computers running the
Windows 10 operating system, but it also works on both Android and iOS cell phones. It isn‘t, however, compatible
with older Windows versions. It's much leaner and faster than Internet Explorer, which it replaces. In some respects it's
also a better proposition than Chrome or Firefox. That's because Edge tends to use less memory (RAM) so it will feel
faster on older computers and tends to use less power, which is important on a laptop. The trade-off is that it doesn't
have the wealth of extensions or apps you'll find with the those other browsers.
When we tested Edge‘s security, it not only warned of phishing schemes and other dangerous websites, but it also
blocked malware files from infecting out test devices. Microsoft Edge includes Notes, a tool that lets you highlight
works or passages on any webpage and save them to read later.
You can add icons to the toolbar that link you to frequently visited websites and use the URL field to search the web.
Edge has sync capabilities so you can access your bookmarks and search history across all your devices. Microsoft is
one of the few internet browser developers that offers telephone support if you are having difficulties with its program.
Safari: Best for Macs
Safari is one of the best choices for Mac devices because it is designed specifically for Apple‘s machines. It connects
quickly and loads full sites faster than any macOS-compatible browser we tested.
Safari takes a moment to learn if you‘re not already familiar with Mac computers, and you can‘t customize this
browser with toolbars, but you still get tabbed browsing like Firefox and Chrome offer. Safari lets you tag favorite sites
and has a reading list where you can save articles or parts of websites to read later. While you‘re reading an article,
Safari has a tool that pushes ads and other distractions aside so you can read without unrelated text or images breaking
in.
This browser is the default for iPhones and iPads, and it syncs through your iCloud account, so any changes you make
on one device will be available on any device connected to your account. When we tested its default security settings,
Safari warned us of malicious websites that had phishing schemes or dangerous links on them. But it didn‘t stop
malicious downloads, so we had to depend on a Mac antivirus program to gather these threats during the download
process.
This is one of the few browsers that has live support. It also has great online resources, like tutorials and searchable
FAQs, so you can find answers on your own.
Opera: Good all-rounder
Opera is decently fast, about on par with Firefox and Chrome when it comes to initial startup, site navigation and page
loading. It‘s compatible with both Windows and Mac computers, and works on iOS and Android mobile devices. The
URL bar doubles as a search bar, and it has stacking, which means you can drag and drop open tabs in the order you
want them.
1.4. Setting up Internet Option
Optimizing your browser‘s settings is a critical step in using the Internet securely and privately. Today‘s popular
browsers include built-in security features, but users often fail to optimize their browser‘s security settings on
installation. Failing to correctly set up your browser‘s security features can put you at a higher risk for malware
infections and malicious attacks. This installation of our ―Cybersecurity 101‖ series provides our tips for securing
several of today‘s most popular browsers, including Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer.
While it is impossible to guarantee complete protection from cyber threats, following these tips will greatly increase the
security of your web browser.
2.1. Introduction
In recent versions, Windows Internet Explorer has dramatically improved support for established and emerging industry
standards, such as HTML5, Cascading Style Sheets (CSS), Level 3 (CSS3), and Scalable Vector Graphics (SVG). By
default, Internet Explorer properly displays WebPages designed to support these standards. Because some of these
standards are still evolving, older websites may not fully support them. In addition, later versions of certain standards
specify different behaviors than earlier versions of the same standard.
As a result, websites designed to support the earlier versions of these standards may display differently when viewed
with web browsers designed to support current versions of the standards, such as Internet Explorer. In order to help such
websites display correctly, Internet Explorer supports a display mode called Compatibility View, which displays
webpages as if they were viewed by an earlier version of the browser.
Information Sheet-3
Modifying Toolbars
3.1. Introduction to toolbars
A browser toolbar is a toolbar that resides within a browser's window. All major web browsers provide support to
browser toolbar development as a way to extend the browser's GUI and functionality. Browser toolbars are considered
to be a particular kind of browser extensions that present a toolbar. Browser toolbars are specific to each browser, which
means that a toolbar working on a browser does not work on another one. All browser toolbars must be installed in the
corresponding browser before they can be used, and require updates when new versions are released.
Many high-profile browser toolbars released over the years have been fraught with problems, either intentionally as
malware or injected with computer viruses or due to poor or conflicting programming when considering multiple
toolbars being included on the single browser.
Many unscrupulous companies use software bundling to force users downloading one program to also install a browser
toolbar, some of which invade the user's privacy by tracking their web history and search history online. Many antivirus
companies refer to these programs as grayware or Potentially Unwanted Programs (PUPs).
Developing a toolbar
The programming language and development tools behind a browser toolbar vary from one browser to another.
In Internet Explorer5 or later toolbars may be created as browser extensions written in C# or C++. More specifically, it
is possible to create up to three different kinds of toolbars (custom explorer bars, tool bands and desk bands) and to
combine them with browser helper objects in order to provide added functionality.
In Firefox toolbars can be created as add-ons that contribute to the GUI by extending the browser with XUL (support for
XUL was removed in Firefox version 57). The logic behind the toolbar is written in JavaScript running under expanded
privileges. Mozilla Jetpack can be used to simplify the development of add-ons for Firefox.
In Safari 5 or later toolbars can be created as extensions that add bars and buttons. The logic behind the toolbar is
written in JavaScript with access to a special JavaScript API to interact with the Safari application and web content.
In Google Chrome 4 or later toolbars can be created as extensions that add browser actions to the browser window. The
logic behind the toolbar is written in JavaScript with access to a special JavaScript APIto interact with the Chrome
application and web content. The privileges under which a Chrome extension runs are governed by a set of permissions.
In Opera 11 or latertoolbars can be created as extensions that add buttons to the browser window. The logic behind the
toolbar is written in JavaScript with access to a special JavaScript API to interact with the Opera application and web
content.
In Firefox, Chrome, Safari and Opera toolbar styling is done though CSS.
Native vs. injected toolbars
Some major browsers (Internet Explorer and Firefox) enable the creation of native toolbars i.e., toolbars which are
directly inserted in the browser window. Examples of native toolbars are Google Toolbar and Stumbleupon Toolbar.
Native toolbars use browser-specific code to create the same toolbar for each different browser version.
Some toolbar developers use a different approach and make the browser extension inject a JavaScript file in every web
page visited by the user. All major browsers support injected toolbars. The code in this file inserts the toolbar as a part
of the DOM in every web page. Injected toolbars use essentially the same JavaScript code to draw the toolbar for each
different browser version.
Each approach has advantages and disadvantages for the different stakeholders.
Native toolbars present faster load times, since injected toolbars must wait for the DOM to be created in order to insert
the toolbar in it.
Injected toolbars require less frequent updates because part of their code is dynamically downloaded in the JavaScript
file that draws the toolbar.
Injected toolbars allow for shorter development times since the JavaScript code that creates the toolbar may be written
once for all browsers.
Injected toolbars allow for an easier toolbar update policy, since changes that are made in the injected JavaScript code
do not require releasing a new toolbar version.
Injected toolbars consume requests to download the JavaScript code that inserts the toolbar in every page, while native
toolbars consume no such requests.
This Section contains content that is written like an advertisement. Please help improve it by removing promotional
content and inappropriate external links, and by adding encyclopedic content written from a neutral point of view.
(October 2018) (Learn how and when to remove this template message)
Another way to simplify the task of developing a toolbar for different browsers is to rely on a cross-browser extension
development framework. Some of the most important frameworks are listed below:
Toolbar Studio supports IE, Firefox. This is an IDE that allows to develop toolbars via a visual editor.
Neobars supports Chrome, Firefox, IE, Safari and Opera. This is an online web constructor for cross-browser
extensions. Multiple widgets like Weather, RSS, YouTube, Twitter and Facebook components are available. The
platform is free to use.
Information Sheet-4
Accessing and retrieving data from particular site
3.1. Accessing and Retrieving Site Data
For most people nowadays, using the internet involves accessing information or entertainment, viewing products and
services, or using social media platforms to keep in touch with friends and acquaintances. It may seem that visiting a
webpage merely involves entering the URL in the address bar, but that‘s just the start of a more complicated process. In
a split second the browser makes contact with globally distributed web servers, requests stored data packages, and then
assemble the webpage from the information contained in the packages. Read on to find out how this process works and
which steps are taken.
From URL to IP address
The easiest way to access a website is to write the desired address into the address bar located in the browser. This
address is known as a Uniform Resource Locator (URL), and every webpage can be reached with its own individual
URL (web address). A URL is made up of several sections; all of which have their own functions. Here is a generic
example of a webpage URL:
Protocol Third-level domain Second-level domain Top-level domain (Path) (File)
http:// www. Exampledomain .com /directory /index.html
The World Wide Web (WWW) is a system of electronically stored hypertext documents. The hypertext transfer
protocol (HTTP) is used in the World Wide Web in order to transfer webpage data from the web server to the browser.
In addition to HTTP, there‘s also an encrypted version of the protocol: Hypertext Transfer Protocol Secure (HTTPS).
The HTTP protocol header is followed by the hostname, which consists of a second-level and top-level domain (in this
order). In the web, we usually see ―www‖ as third-level domain, but there are other subdomains. If a URL points to a
specific directory or file, the relevant information will be placed after the hostname.
URLs are generally comprised of letters, meaning that people can easily remember them. Computers, on the other hand,
work with combinations of numbers (known as IP addresses) to find a server on the internet. An additional step is
required in order to access content from the web browser. This step requires translating a webpage‘s URL into the
corresponding IP address. The task is carried out by DNS servers, which are responsible for managing the Domain
Name System.
DNS server: a directory for IP addresses
When a web address is entered into the search bar of the browser, the browser looks for the requested domain in its
cache. If it‘s not there, it requests the operating system‘s DNS server to find the required IP address. A DNS server is
liable for the name resolution. The DNS server that is to be requested can be configured in the operating system as well
as in the router. Per default, the internet access provider sets the address of its own DNS server there. Since requesting
the domain name system takes some time, the IP addresses of sites that have already been visited are usually stored in
the operating system‘s or the browser‘s DNS cache. This cache keeps IP addresses at hand for future visits to the
website. This lightens the load of the DNS server and speeds up the webpage‘s loading time.
Access and Use Internet Page 10
Blue Nile College, COVID-19 Emergency Response Reading Material
The latest modems on the market would normally be installed to run at the fastest speed possible, for example 115200
bits per second. Having a fast modem connected to your computer will download images quickly. If a slower speed
modem is connected to your computer, then images will be downloaded at a much slower rate. Being aware of your
modem‘s capabilities will help you decide on whether images should be loaded or not loaded. Time should also be
considered when accessing the Internet. Even a fast modem cannot take into consideration a country‘s business hours,
or a 'high activity period, for example, after school hours or early evening. Do not forget to consider these points if you
are having difficulty in browsing the web site you require.
The bandwidth of your Internet connection is dependent on the speed of your modem. If the bandwidth is small it will
not be able to download images very quickly. The file format of any image saved on the computer will take up much
more memory area than text. Hence, you must make sure that you have adequate storage area for image file and the
bandwidth is large enough to transfer the image file.
Computer speed and capacity
The speed and capacity of your computer also affects the speed at which images are loaded. If the computer's speed is
slow and the capacity minimal, it may be better to turn off multimedia features such as pictures, sounds and videos in
order to speed up the delivery and display of web page information.
To display a web page without graphics, select Tools from the menu bar and choose Internet Options. From the Internet
Options dialogue box there are six tabbed sections. Select the Advanced tabbed section.
Browser Capabilities
To display web page details as quickly as possible, consideration should be given to the types of browsers available.
Browsers such as Microsoft Internet Explorer and Netscape Navigator are referred to as graphical browsers as they are
able to display graphics, colors and multimedia features.
When a web site is visited, the details of that web page are stored in the browser's cache. Web pages stored to be read
offline are also stored in the cache. Microsoft Internet Explorer's cache is labeled 'Temporary Internet Files' whereas
Netscape Navigator stores its cache in the program folder. This speeds up the display of pages that are visited frequently
because the Web page details are accessed from the cache instead of from the web. It is possible to increase the size of
the cache, but doing this will reduce the space available for other files on your computer. It is also possible to delete
files from the 'Temporary Internet files' folder to free up space within the cache. However, deleting files could result in
delay if those web pages are required at a later date, as they can no longer be accessed from the cache and they will have
to be downloaded again.
Information Sheet-6 Opening URL to obtain data and browser link 5.1.
Uniform Resource Locator (URL)
Each website is located at a unique global address called a Uniform Resource Locator (URL). When you know the
address of a web site it is much easier to locate. Referencing the Uniform Resource Locator URL allows you to jump
directly to that page at that URL regardless of where you currently are on the web. All web browsers let you jump
directly to a Uniform Resource Locator (URL) a unique address for Internet resources that are available through a web
browser, including files or directories.
URL‘s specify three pieces of information needed to retrieve a document:
- the protocol to be used
- the server address and port to which to connect
- the path to the information
The format for a URL is: Protocol://server-name: port/path. For example ,http://home.netscape.com/welcome/html
When a web site is displayed on the screen, it is possible to access the links that are contained within that site. Clicking
on a link (or tabbing to the link and pressing Enter) will take you to another section of the web site, a Web page related
to the site or even to a different web site.
A link- is a connection from one web resource to another. Although a simple concept, the link has been one of the
primary forces driving the success of the web.
A link has two ends – called anchors-- and a direction. The link starts at the "source" anchor and points to the
"destination" anchor, which may be any Web resource (e.g., an image, a video clip, a sound bite, a program, an HTML
document, an element within an HTML document, etc.).
After you have successfully identified the URL you will be able to accessthe links provided by the URL.
A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state
information to a user's browser and for the browser to return the state information to the origin site. The state
information can be used for authentication, identification of a user session, user's preferences, shopping cart contents, or
anything else that can be accomplished through storing text data.
Cookies are not software. They cannot be programmed, cannot carry viruses, and cannot install malware on the host
computer. However, they can be used by spyware to track user's browsing activities – a major privacy concern that
prompted European and US law makers to take action. Cookies could also be stolen by hackers to gain access to a
victim's web account, thus, the need to delete cookies.
1.1. To change your browser Home Page Follow the following steps
1. On your browser, go to tools, then options
2. On the Internet Options, click on the General tab
3. Type the address that you want to make your home page
1. then click Apply
2. then click OK
2. When you
are Finish, click
the Done button.
To turn on the Menu bar or Bookmarks toolbar: Click the Toolbars dropdown menu at the bottom of the screen and
choose the toolbars you want to display.
2. Click the Done button.
5. Next to "Cookies and other site data" and "Cached images and files," check the boxes.
6. Click Clear data.
MSN Netscape
Lycos Ask.
AltaVista
Differences between search engines
There are a huge variety of search engines. Most search engines explore most of the computers connected to the
Internet. However, some ‗search engines‘ are really a search of a particular site, or perhaps a group of sites.
Some specialist search engines are based on specific topic areas. For example, Web Wombat was the original
Australian search engine. When you use this search engine you will find your results listed in order of relevance to
Australia.
Other examples include:
Lexplore — specialises in information related to international law
Travelocity — specialises in information related to travel
Hotwire — specialises in information related to computer and communications technology.
Searching information on the internet the Internet
Creating a search expression
In order to use a search engine, you must first locate the search engine on the Internet. Usually you would do this either
by typing in the URL of the search engine you wish to use. A search bar will appear and you type your expression into
this bar. How you express your search will be explained later.
Figure 2: The Ninemsn search engine in the left of the browser window — accessed by first clicking on the
Search button.
Using Yahoo and searching ‗the Web‘ we come up with 26,700,000 results, or hits. This is way too many! Let‘s see
what happens if we put this phrase in double quotations and set the search for Australia only.
This time we have come up with 724,000. Still way too many to try to get to what we want.
Let‘s assume it is the Certificate 2 through TAFENSW that you are looking for. Let‘s add TAFENSW and see how we
go.
Now we have narrowed our results to 25,000. Let‘s think more about what we are looking for. Assume you want to
know where this course is being conducted. Let‘s narrow the search by adding the word location.
Figure 11: Results of the search expression ―Certificate 2 in Information Technology OTEN‖ all in double quotations
The results above show that this is unlikely to be recorded as one sequence of text, so the search engine can‘t find
anything matching this particular entry when we put double quotations around the whole phrase.
So now you have identified some of the ways to narrow and broaden a search using search engines. Notice that different
search engines will give you different results. Different search operators, such as double quotations, + and – symbols,
AND, OR, NOT will also give you different results.
A special note here is that the Internet is a very dynamic world. Information located using search engines varies on a
daily, and sometimes hourly, basis. If you were to carry out the searches above it is unlikely that you would come up
with the same results. However, the principles of using operators to narrow or broaden a search, and using a variety of
search engines, always remain true.
Ref. web1.keira-h.schools.nsw.edu.au/Faculties/IT/
To create a bookmark, simply visit the page you want to bookmark and select Add Bookmark or Bookmark this Page
from the Bookmarks menu. In Internet Explorer, you can click the star icon to open the Favorites sidebar and click Add
to Favorites to add the current page to your bookmarks. The website title will show up in your bookmarks list along
with the website's icon if available. As your collection of bookmarks grows, you can create folders to organize your
bookmarks into different categories.
It is helpful to bookmark frequently visited websites and useful references since you don't have to remember the URLs.
Additionally, you can just click the bookmarks instead of typing in the full web addresses. Some browsers even display
your bookmarked pages in the auto complete drop down menu as you type in the address bar. This allows you to visit
bookmarked pages without even opening the bookmarks window or sidebar in your browser.
NOTE: A bookmark only stores the location of a webpage, not store the contents of the webpage itself. Therefore, when
you open a previously saved bookmark, the contents of page may have changed since the last time you viewed it.
importantly, it helps you become better understood, exude professionalism, and create a positive online reputation that
will lead you to more lasting and meaningful connections.
Here are some guide posts on online behaviour:
It’s all about respect
Just like in face to face communication, courtesy goes a long way in making everyone‘s internet experience pleasant
and enjoyable. Always think of how you would want to be treated. That‘s probably how others want to be treated too.
If you want to know more about these rules, go to 10 Core Rules where each one is explained at length.
*Flaming is writing content online that intentionally invokes responses such as rage, sadness, humiliation, self-doubt,
and others. From: No bullying.com.
Netiquette basics
These basic rules are adapted and updated from living internet.com :
Help the newbie’s – good netiquette dictates that you share your knowledge to new users by answering some of
their questions. Remember, you too were a newbie once.
Research before asking – most sites have a Frequently Asked Questions (FAQs) page to guide new users.
Read this before emailing or messaging so as not to waste other people‘s time.
Remember emotion – subtle emotions and meanings do not transmit very well in an email. However, do not
use all caps as it designates shouting, or overuse smileys and emoticons as these may make you look
unprofessional. Constructing your sentences carefully and checking (and re-checking, several times) what you
write before hitting send is always a good policy.
Living internet.com also has helpful tips on the Netiquette of sending, Netiquette of replying, and Netiquette of
confidentiality. You can read them here: Internet Etiquette.
The Ten Commandments of Computer Ethics
(from the Computer Ethics Institute)
Do not use a computer to harm other people.
Do not interfere with other people‘s computer work.
Do not snoop around in other people‘s computer files.
Do not use a computer to steal.
Do not use a computer to bear false witness.
Do not copy or use proprietary software for which you have not paid.
Do not use other people‘s computer resources without authorization or proper compensation.
Do not appropriate other people‘s intellectual output.
Do think about the social consequences of the program you are writing or the system you are designing.
Always use a computer in ways that insure consideration and respect for your fellow humans.
Remember that your digital footprint can be tracked
Even if you write under an alias or a made-up handle, the account can easily be traced back to you. So don‘t think
that you won‘t be found out if you write nasty remarks on your boss‘s blog, or that your posts flaming somebody in
a forum can be easily remedied by deleting them. Your activities online leave data that may be stored and can be
retrieved. Always be a decent and responsible citizen.
In Internet Explorer:
1 Go to the website you wish to save as a favourite.
2 Choose Favourites menu or click on the Favourites button on the toolbar.
3 Choose Add To Favourites.
4 At the next screen, click on Create In if you cannot see the New Folder option.
5 Now click on New Folder if you wish to create a new folder.
6 Name your folder and click on OK.
7 Ensure the folder you want to save into is open.
8 Change the name of the page against Name if you feel it is not a very helpful name.
9 Click on OK.
Operation sheet –4 Steps to Modifying page set up options and printing information
The results of a search can be printed in two ways.
The first way:
1 Choose File menu, then Print Preview.
2 If you are happy with what will be printed, click on the Print button.
To close and exist Browser soft application follows one of the following procedures:
Step 1.
Click on the "X" button in the upper-right corner of the browser window to close it.
Step 2.
You can also click "File" in the upper-left corner and then choose "Exit" to close the browser.
Step 3.
For an alternate method, push "Alt" and "F4" simultaneously to close the browser using a Windows shortcut.
Step 4
Click on the browser icon beneath "Applications" and select "End Task." This will force the browser to close if it is
frozen, although it may take a few seconds. Click "End Now" if you see a browser warning window.