1.
World Wide Web (WWW)
The WWW is a system of interlinked web pages and resources.
It runs over the internet using HTTP or HTTPS protocols.
Created by Tim Berners-Lee in 1989.
Browsers are used to access and display web content.
The Web includes text, images, videos, and hyperlinks.
It is a major platform for information sharing and communication.
2. Web Server
A web server stores and delivers web pages to clients.
It processes client requests using HTTP/HTTPS.
Examples: Apache, Nginx, Microsoft IIS.
It supports static and dynamic content.
It may also run backend scripts like PHP or Node.js.
Essential for hosting websites on the internet.
3. Web Client
A web client is software or a device that requests data from servers.
Usually refers to web browsers like Chrome or Firefox.
Sends HTTP requests and displays content received.
Users interact with websites through web clients.
It acts as an interface between the user and web resources.
Mobile apps can also act as web clients.
4. Website
A website is a group of related web pages under a common domain.
It may be static (simple HTML) or dynamic (interactive, database-driven).
Hosted on a web server and accessed using a browser.
Used for business, education, entertainment, and more.
Each website has a unique URL or domain name.
Can include multimedia, forms, and interactive elements.
5. Web Page
A web page is a single document on the World Wide Web.
Written using HTML and often styled with CSS.
May include text, images, videos, links, and scripts.
Every web page has its own URL.
Web pages are the building blocks of websites.
Browsers render them for users to view and interact with.
6. Web Browser
A web browser is a software application used to access the web.
It retrieves content from servers and displays it to users.
Supports web standards like HTML, CSS, and JavaScript.
Examples: Chrome, Firefox, Safari, Edge.
Browsers offer features like bookmarks, history, and extensions.
They are essential for web navigation and user interaction.
7. Blog
A blog is a website or section for regularly updated posts.
Used for personal, educational, or professional content.
Posts appear in reverse chronological order.
Readers can often comment and interact with posts.
Popular platforms: WordPress, Blogger, Medium.
Useful for sharing knowledge, news, or opinions.
8. Newsgroup
A newsgroup is an online discussion area for topic-based conversations.
Part of the Usenet system, popular before modern forums.
Users post messages (called articles) for public viewing.
Accessed via newsreader software or special servers.
Used for discussions, file sharing, and announcements.
Now largely replaced by social media and forums.
9. Web Address (URL)
A URL (Uniform Resource Locator) identifies web resources.
Format includes protocol, domain name, and optional path.
Example: https://www.example.com/page.html.
Used by browsers to locate and access websites.
Each page on a website has its own unique URL.
Essential for linking and navigation on the web.
10. Email Address
An email address is used to send and receive electronic mail.
Format:
[email protected] (e.g.,
[email protected]).
Each user has a unique email address.
Emails can include attachments, links, and text.
Used widely for communication in personal and professional settings.
Accessible through webmail or email client software.
11. Downloading Files
Downloading is the process of copying data from a server to your device.
Used for getting documents, music, software, etc.
Common protocols: HTTP, HTTPS, FTP.
Can be manual (via browser) or automatic (via software).
Allows offline access to web content.
Security software may scan downloaded files for safety.
12. Uploading Files
Uploading is sending files from your device to a remote server.
Used when submitting forms, posting media, or sharing data.
Common in cloud storage, blogs, and portals.
Protocols used: HTTP, FTP, SFTP.
Essential for content creators and online collaboration.
Ensures content is accessible to others on the internet.
1. Internet Protocol (IP)
IP is a core protocol that defines how data is sent from one computer to another
on the internet.
It uses IP addresses to identify devices on a network.
Works at the network layer of the OSI model.
There are two versions: IPv4 and IPv6.
It handles routing and addressing but not delivery guarantees.
2. TCP/IP (Transmission Control Protocol/Internet Protocol)
TCP/IP is a suite of communication protocols used for the Internet.
TCP ensures reliable, ordered, and error-checked delivery of data.
IP handles addressing and routing the data packets.
It's the foundation of all internet communication.
Divided into layers: Application, Transport, Internet, and Network Access.
3. SMTP (Simple Mail Transfer Protocol)
SMTP is used to send emails from a client to a server or between servers.
Works over port 25 (or 587 for secure connections).
It only handles sending, not receiving emails.
Used by mail servers like Gmail, Outlook, etc.
Works closely with POP3 or IMAP for receiving emails.
4. POP3 (Post Office Protocol v3)
POP3 is used by email clients to retrieve emails from a mail server.
It downloads emails to the local device and usually deletes them from the
server.
Uses port 110 (or 995 for secure POP3).
Simple, but doesn’t support syncing across multiple devices.
Mostly replaced by IMAP in modern clients.
5. HTTP (HyperText Transfer Protocol)
HTTP is the protocol used for transferring web pages over the internet.
Works on port 80 and is stateless and plain text.
Used by browsers to request and receive HTML, CSS, JS, etc.
Does not encrypt data, so it's less secure.
Basis for communication between web clients and servers.
6. HTTPS (HTTP Secure)
HTTPS is the secure version of HTTP, using SSL/TLS encryption.
Works over port 443 and ensures data is encrypted and secure.
Widely used for online banking, shopping, and secure logins.
Prevents data interception and tampering.
Indicated by a padlock symbol in browser address bars.
7. SSH (Secure Shell)
SSH is a secure protocol for remotely accessing and managing servers.
It uses encryption to protect login credentials and data.
Commonly used by system administrators and developers.
Works over port 22.
Replaces older insecure protocols like Telnet.
8. SFTP (SSH File Transfer Protocol)
SFTP is a secure method of transferring files over SSH.
Combines file transfer and secure connection in one protocol.
Protects data in transit from eavesdropping and tampering.
Works over the same port as SSH (port 22).
Used for uploading/downloading files on secure servers.
9. FTP (File Transfer Protocol)
FTP is used to transfer files between client and server.
Uses port 21 for commands and port 20 for data transfer.
Does not encrypt data, so it's not considered secure.
FTP clients like FileZilla are used for access.
FTPS and SFTP are secure alternatives.
10. Telnet
Telnet allows remote login to another computer over a network.
Uses port 23 and transmits data in plain text.
Was widely used for remote system access before SSH.
Insecure by today’s standards due to lack of encryption.
Still useful in private or test environments.
1. Information Retrieval on the Internet
Information retrieval is the process of finding relevant data or content online.
It involves accessing web pages, articles, images, videos, and databases.
Search engines, digital libraries, and repositories help in this process.
Users input queries, and systems return matching documents or links.
Used in research, education, and decision-making.
2. Locating Sites Using Search Engines
Search engines help users find websites related to specific keywords or topics.
Popular search engines: Google, Bing, Yahoo, DuckDuckGo.
They use algorithms to rank and display relevant web pages.
Search results often include websites, maps, videos, and images.
Useful for academic, commercial, and general information needs.
3. Finding People on the Net
The internet can be used to find information about individuals.
Social media platforms like Facebook, LinkedIn, and Instagram are common
tools.
People search engines like Pipl or Whitepages also exist.
Email directories and professional networks help locate contacts.
Used for networking, reconnecting, or background verification.