Aaaa Internet Services CH 2 Final 10d
Aaaa Internet Services CH 2 Final 10d
INTERNET
SERVICES
1
A Slide show for students of class 10
Presentation by
Mrs. Rajiv Kathuria
& Debasmita Ghose
Class: 10 A (2010-2011)
Notre Dame Academy
Patna.
2
Do you know what people really do
on the internet?
They
E-mail
Video conference
Chat
Join News groups
Retrieve data files
&
Access all sorts of information.
3
INFORMATION RETRIEVAL
• The browser fetches the ‘home page’ of the website visited by it.
Examples:
www.yahoo.com
www.google.com
6
FINDING INFORMATION USING A SEARCH
ENGINES
To search information on search engine
8
WORKING OF A SEARCH ENGINE
The search engine works with the help of three elements on
web after keywords to search are typed in…….
10
WORKING OF SEARCH ENGINES
11
SOME SEARCHING TIPS
1. Questi ons should not be asked.
13
FTPing
• FTP refers to File Transfer Protocol which defi nes the method for
transferring fi les from one computer to another over a network that
supports TCP/IP protocol(such as internet and intranet).
• FTP server and FTP client computers are involved in FTP transfer.
• A computer that stores fi les for transfer using FTP is called FTP
server or FTP site.It runs FTP server soft ware. It listens on the
network for connecti on requests from other computers.
• The FTP client computer runs FTP client soft ware and initi ates a
connecti on to the server. Once connected, the customer can do a
number of fi le manipulati ons like uploading, downloading, deleti ng,
renaming and editi ng of fi les.
• Virtually all computer platf orms support TCP/IP.
• Examples of FTP client and server soft wares are stated on page 36.
• Examples of some FTP addresses are given on page 37.
14
FTP server : Requirements for
DOWNLOADING and UPLOADING
• We can now carry out the job of uploading and downloading a file
or files.
• WHAT DOES UPLOADING A FILE REQUIRE…….
A copy of the fi le to be uploaded in your
Computer.
AND DOWNLOADING will allow you to make a copy
of the web fi le in your computer.
REMOTE LOGIN AND FILE TRANSFER PROTOCOL
includes SFTP, SSH, SCP and TELNET
17
TCP- Transmission Control Protocol
20
SFTP (Secure File Transfer Protocol) is the advanced version
of FTP(file transfer protocol) which ensures security while
transferring files between the organizations/computer. It is
also known as SSH(Secure Shell). It works on port no. 22 and
uses the client-server model.
Features of SFTP :
It encrypts the data.
It executes the command.
It secures and compresses the data for transmission.
It provides authentication to username and password.
It improves uploading and downloading files functionality.
It also provides authentication to the public key.
21
Web Services of Internet
22
• …….is a web service.
23
COMMONLY USED TYPES OF CHAT
• IM- full form INSTANT MESSAGING Creates a private chat
connection with another individual in order to communicate
in real time over the internet.
• ICQ- I seek you…..offers chatting via ICQ software, is a
conferencing tool over internet…….to allow along with
chatting the job of e-mailing, perform file transfer, play
computer games etc.
• IRC- Internet Relay Chat is not owned by any company. IRC
has many networks that are completely separate from one
another. To use IRC, we need IRC client program installed
on our computer and connected to IRC server via this
program.
• Web based chat is like IRC but with a difference, where we
do not need to install any client program. Here Chatting can
be done on a specific website. Eg Yahoo Chat. 24
ELECTRONIC MAIL
• E-mail stands for Electronic Mail. It is the most widely
used tool to send messages electronically on a network.
• E-mails are sent and received by mail servers – i.e.
computers dedicated to processing and directi ng e-mails.
27
E- MAIL ADDRESS
username@domainname
• The username is the user’s net name that cannot have blank
spaces.
• The domain / net server /e-mail server name that hosts the e-mail.
Eg: [email protected]
28
E-MAIL ACCOUNT
Can be provided by Internet service provider that is a paid
account.
PICTORIAL FORM
32
STRUCTURE OF AN E-MAIL
MESSAGE
FROM
TO
CC
BCC
SUBJECT
BODY
ATTACHMENTS
DATE
MESSAGE ID is a unique id which is not shown….. used to
track replies to the e-mails
33
Viewing received e-mails
35
Sending e-mails
38
EMOTICONS (SMILEYS)
Emoti cons or smileys are the symbols used to convey
emoti ons or to convey facial expressions.
:) A smile
;) A wink
:-< Really sad
>:-( Annoyed
:-0 Shouting
:-D Laughing
X-( Dead
0:-) An angel
<g> Grin
:-) Smiley with a nose
:( Frown
@>--,--’ a rose
1-1 asleep
:-> Devious smile
:-| Grim
:-p Stick out tongue
:-( Crying 39
Some protocols used in emails…..
Protocol means….
41
POST OFFICE PROTOCOL 3
POP3 provides simple, standardized way for
users to access mailboxes and
download messages in their computers.
Here all the messages get downloaded from the mail server to
the user’s local computer.
The user can choose to leave copies of his/her mails on the
server as well.
The advantage is that once the mails are
downloaded, the user can cut the internet
connection and read the mails and leisure
without incurring further communication
costs.
Disadvantage: bulk transfer of mails can
include spam and virus as attachments. 42
SMTP is used for only sending mails and not
receiving mails.
This protocol is used by Mail Transfer
Agent(MTA) to deliver the sent mail to the
recipient's mail server.
Depending upon the network/isp settings, user
may only be able to use the SMTP
under certain conditions.
43
Although this protocol is not dedicated to e-mail
communication, it can still be used for accessing
mailbox.
Also called web based protocol, can be used to
compose and retrieve mails from a web based e-
mail account.
Eg: gmail, yahoomail, hotmail.
44
Email etiquettes…..
Whether for business or personal mails, we
must follow the basics of email etiquettes.
1. Be concise and to the point.
2. Use proper spelling , grammar and
punctuations.
3. Use proper structure and layout.
4. Do not write in CAPITAL letters.
5. Add an email disclaimer.
6. Handle emoticons and abbreviations with
care……restrict to personal mails.
7. Write gender neutral mails.
45
Difference between Spam and
Junk mail.
Spam is irrelevant or inappropriate messages sent
on internet to a large number of people.
Send People Alotta Mail, was sent by spammers to
hundreds, thousands or even millions of people
with a hope that at least a few people will respond.
Spam filters save us from SPAM.
47
VIDEO CONFERENCING
Two way videophone conversati on among multi ple
parti cipants is called video conferencing.
SYSTEM REQUIREMENTS
multi media PC
video compression hardware
camera
access to internet over ordinary telephone line
videophone
48
Areas of VIDEO CONFERENCING applications
• Business and Business Learning.
• Distance Learning.
• Telecommunication with clients and Media.
• Legal environment.
• Telemedicine.
Benefi ts of E-learning
• Reduced overall cost/less expensive
• self-paced & self directed
• fast
• consistent
• Flexible i.e. any locati on and
any ti me
• updated easily and quickly
• increased retenti on
• easily managed
50
Application areas of e-learning
In Formal Set-up
1. e-learning courseware
2. e-classroom
3. Assessments
4. e-simulation
Application in
Non- formal Setup…
1. Games based behavioral development..
2. Learning support.
3. Social/ Collaborate learning.
4. MOOC( Massive Open Online Course.)
Some e-learning software…..moodle, olat, eFront. 51
E-BANKING
• Availing the banking services through electronic measures via internet
is called e-banking .This umbrellas PC banking, online banking, virtual
banking, phone banking etc.
• PC banking is a form of online banking that enables customers to
execute bank transactions from a PC via a modem. eg. BOI
• Internet banking (online banking) uses internet as a delivery channel
to conduct banking activity. eg ICICI, HSBC
ADVANTAGES
round the clock services
worldwide connectivity
easy access to transactions
direct customer control of funds
52
E-SHOPPING
• The process of shopping done over the internet is
e-shopping or online shopping.
• Both products and services can be purchased
through online shopping.
• Sites available for e-shopping:
amazon.in, fl ipcart, snapdeal,
myntra.,jabong etc.
53
PROS AND CONS OF E-
SHOPPING
ADVANTAGES DISADVANTAGES
• Convenient • Physical contact with the
• Accessible in every part of products not possible
the world • Delivery on the same date
not possible
• Security in terms of credit
card information( can be
compromised )
• No quality checks
• Imperfect measurements
54
Threats and Security concerns….. e-shopping
THREATS SECURITY CONCERNS:
The cyber criminal……..
• Gaining access to sensitive • Tricks the shopper to give sensitive
data like user-id, passwords, information & then misuse the
card numbers. information to his benefits.
• Use virus to corrupt system. • Snoops the shopper’s computer,
• Spamming. who is unaware of security
• Misuse the information about features of one’s system for online
shopping.
your shopping habits thru
shopping history. • Sniffs the data exchange and hence
collects sensitive information for
• Get access to your location
his benefit.
details.
• Guesses passwords manually or in
automated form.
• Phishing….. 55
E-RESERVATION
Making reservati ons of ti ckets or hotel rooms or tourist
packages etc through internet is called e-Reservati on.
56
Benefits & Application areas of
e-reservation
Benefits Application areas
• Safety. • Travel tickets.
• Ease. • Hotel Rooms.
• Available anywhere. • Sports matches.
• Fast. • Movies and
Theater.
• Events.
57
E-reservation process
Requirements: Steps:
• Log on to the site that provides e-
• Access to internet. booking.
• Online payment facility in • Provide details…. Date/time/seating
form of debit card, credit type etc.
card or net banking. • Make choice from the ones given by
the website.
• Confirm by submitting
details….these details get recorded
in several computer databases and
reservation is confirmed.
• Make payment and get the e-ticket
on screen or a print out.
58
Live and Non-Live Reservations
LIVE e-RESERVATION NON-LIVE e-reservation
• Reservations are confirmed • Cannot be confirmed
on the spot….. instantly.
As all the reservations are • The website is the liaise(link)
streamlined to that of the between the user and the
actual place. reservation place. Hence the
• At the same time more confirmation is nor=t done
information is provided by instantly, but it takes time
the website, concerning and the user is informed
location, operating hours later.
etc.
59
• An e-group refers to an online community where
people discuss on topics of common interests.
ADVANTAGES
New friends can be made
Diversity in a group
DANGERS
Data theft
Viruses
Online predators
62
Social Networking
Merits:
1. Easier to connect with people from all across the world.
2. Easy to hold discussions and collect opinions.
3. Interactive involvement with other people, from any corner
of the earth.
4. Brings more awareness amongst members.
Demerits:
5. Misuse of information posted by innocent users.
6. No credibility of information.
7. Fake profiles.
8. Bulling and trolling(create discord over
internet).
9. Peer pressure and irresponsible
behavior.
10. Attention seeking disorders and
63
addiction.
64
E-Governance is Technology driven Governance for delivering Government
Services, Exchange of Information Communication Transactions and Integration of
various Systems & Services between Government & Citizens 24X 7.
OBJECTIVE
Better service delivery to citizens.
Ushering in transparency and accountability.
Empowering people through information.
Improve efficiency within Government i.e between centre-state or inter-states.
Improve interface with business and industry. 65
MAJOR E-GOVERNANCE PROJECTS IN
INDIA
66
Advantages of e-governance
Saving Costs: A lot of Government expenditure goes towards the cost of buying
stationery for official purposes. Letters and written records consume a lot of
stationery. However, replacing them with smartphones and the internet can
saves crores of money in expenses every year.
High Setup Cost and Technical Difficulties: Technology has its disadvantages as
well. Specifically, the setup cost is very high and the machines have to be regularly
maintained. Often, computers and internet can also break down and put a dent in
governmental work and services. Incompatable
Illiteracy: A large number of people in India are tech-illiterate and do not know how to
operate computers and smart phones. E-governance is very difficult for them to
access and understand.
1. User profiles.
2. Blog engine.
3. Photo albums.
4. Groups.
5. Discussion boards.
6. Media galleries.
7. Activity streams.
8. Messaging.
9. Walls.
10. Comments.
11. Tags
69
Mobile technology is technology that goes where the user
goes. It consists of portable two-way communications
devices, computing devices and the networking technology
that connects them. Currently, mobile technology is typified
by internet-enabled devices like smartphones, tablets and
watches.
Followings are the few famous mobile technologies:
SMS.
MMS
3G.
4G.
70
Ethics in Social Networking
1. Right perspective – Carefully upload the contents, pictures and videos
etc. as it involves others privacy.
2. Utilitarian Perspective – Keep away from unethical and illegal
activities like hacking and posting of threatening messages.
3. Fairness Perspective - treat all users equal. No discrimination….
4. Common Good Perspective – work to promote common good of
users and for betterment of the society.
Service Providers
Friendship SN- www.hi5.com
Business SN - www.linkedin.com
Hobbies SN - www.flicker.com
Informational SN - www.investopedia.com
Educational SN - www.goiit.com
News SN - www.nowpublic.com 71
THANK YOU
72
Web2.0 describes
World Wide Web sites
that use technology
beyond the static pages
of earlier Web sites.
Although Web 2.0 suggests a new version of the World Wide Web, it
does not refer to an update to any technical specification, but rather
to cumulative changes in the way Web pages are made and used.
A Web 2.0 site may allow users to interact and collaborate with each
other in a social media dialogue as creators of
user-generated content in a virtual community, in contrast to Web
sites where people are limited to the passive viewing of content.
74
BLOGS
• Blog is a contracti on of ‘web log’.
76
Using a Newsgroup
1. Search for news group site. Put up your Query of
interest.
79