0% found this document useful (0 votes)
40 views

Configure and Use Internet 1

Uploaded by

asterbelete021
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

Configure and Use Internet 1

Uploaded by

asterbelete021
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

CONFIGURE AND USE INTERNET

LO1. Manage internet


internet
• The Internet is a global network of networks.
• People and organizations connect into the Internet so they
can access its massive store of shared information.
• The Internet is an inherently participative medium.
Anybody can publish information or create new services.
• The Internet is a cooperative endeavor -- no organization is
in charge of the net.
• The internet is a global network which can be accessed
from any part of the world through an internet service
provider (ISP). One of the major components of the
Internet is the World Wide Web.
USE OF INTERNET
INTERNET TERMINLOGY
• Internet Service Provider: A company, which provides users with
an access to the Internet, is known as an Internet service provider
or Internet access provider.
• OSI Model: The Open System Interconnection Model is used to
describe a layered communication and network protocol design of
a network. It is composed of seven layers, each of which performs
certain functions and provides the layers above it with some
services.
• Internet Protocol Suite: It is a set of communication protocols,
which are used for the Internet. Transmission Control Protocol
(TCP) and Internet Protocol (IP) were the two pioneering protocols
to be introduced in the Internet protocol standard. The Internet
protocol suite is composed of a set of layers wherein; each layer
provides a service to the upper layers in the set.
• IP Address: It is a way of numerically identifying an entity on a
computer network. The original addressing system known as IPv4,
used 32 bit addresses. With the growth of the Internet, IPv6 came
to be used wherein the addresses are composed of 128 bits. You
might want to know how to find your IP address.
• Domain Name System: DNS, as it is called, refers to the hierarchical
naming system used for computers, resources and services on the
Internet. It translates the computer hostnames to IP addresses. By
way of the implementation of DNS, the domain name
'www.buzzle.com' translates to its IP address, say, 208.70.178.150.
With the help of DNS, domain names can be assigned to Internet
users.
• WWW: It is a collection of interlinked documents that are
accessible over the Internet. It consists of millions of web pages
that contain text, images, voice and videos. Sir Tim Berners-Lee, a
British scientist working at CERN, created the World Wide Web.
• Website: A website is a set of web pages consisting of text, audio
and video. Web servers host websites.
URL: It specifies the location of a resource on the Internet. It
consists of the basic address and path.

Web Page: Web pages are resources of information. They are


generally created in the HTML format and provide the web users
with navigational abilities through hyperlinks to other web pages on
the web.

Home Page: The term home page is used to refer to the page that is
the default page of any website. It is the main page of a complex
website.
Web Server: A web server is a computer program that accepts HTTP
requests from web clients and provides them with HTTP responses.
Web Browser: A web browser is a software application that
facilitates user interaction with the text, audio, video and other
information that is located on the web.
• HTTP: Hypertext Transfer Protocol, abbreviated as HTTP, is a
communications protocol used for the transfer of information
over the Internet. A client makes an HTTP request using a web
browser to which an HTTP response is sent from the server.
Hyperlink: A reference in a document to another section of the
document or to another document is termed as a hyperlink.
Hyperlinks are used to redirect the user from one section of
page content to another.
HOW DO I CONNECT TO THE INTERNET
• Computer
• Connection - Phone Line, Cable, DSL, Wireless, ...
• Modem
• Network Software - TCP/IP
• Application Software - Web Browser, Email, ...
• Internet Service Provider (ISP)
exercise
• Instruction: Answer all the questions listed below, if you
have some clarifications- feel free to ask your teacher.
• Define internet (1point)
• What is the difference b/n internet and network (2point)
• What is ISP stands for (2point)
• What is WWW stands for (2point)
• What can we do on the Internet? (4point)
• What is the World Wide Web? (3point)
• How do we connect to the Internet? (4point)
• List at least 6 internet terminologies(4 point )
• Title: Makeup and structure of web addresses
• How an Email Address is constructed
note
No two people will have the same username with
the same email provider.
Title: Types of search engines
Different types of search engines

When people mention the term "search engine", it is often used


generically to describe both crawler-based search engines and
human-powered directories.
• Crawler-based search engines, such as Google, AllTheWeb and
AltaVista, create their listings automatically by using a piece of
software to “crawl” or “spider” the web and then index what it s
finds to build the search base. Web page changes can be
dynamically caught by crawler-based search engines and will
affect how these web pages get listed in the search results.
• Human-powered directories, such as the Yahoo directory,
Open Directory and Look Smart, depend on human editors to
create their listings. Typically, webmasters submit a short
description to the directory for their websites, or editors write
one for the sites they review, and these manually edited
descriptions will form the search base.
Home page
The term home page is used to refer to the page that is the default page
of any website. It is the main page of a complex website.

History
As you browse the web, Internet Explorer stores information about the
websites you visit and information that you're frequently asked to
provide (for example, your name and address). The following is a list of
the type of information that Internet Explorer stores:
• Temporary Internet files
• Cookies
• A history of the websites you've visited
• Information that you've entered into websites or the Address bar (this
is referred to as saved form data and it includes things such as your
name, address, and the website addresses that you've visited before)
• Passwords
• Temporary information stored by browser add-ons
Temporary Internet Files
is the name of a folder (directory) on your hard disk that is used
by Internet Explorer to store Web pages, images, audio and video
files, and other content from the Web sites that you are visiting.
This folder is also known as the cache of Internet Explorer.
Cookies
Cookies are small pieces of text sent to your browser by a
website you visit. They help that website remember information
about your visit, which can both make it easier to visit the site
again and make the site more useful to you.
To change your home page
• Internet Explorer 5 and 6
• Start Internet Explorer.
• On the Tools menu, click Internet Options.
• Click the General tab.
• In the Address box, type the Web page address that you
want for your home page.

NOTE: If you want the page that you are currently viewing
in Internet Explorer to be your home page, click Use
Current.
• Click OK.
Managing browser add-ons

• Most web browsers allow you to install


extensions, also called "add-ons." Extensions
are small applications that add features and
functionality to your browser and enhance or
modify how web pages are displayed.
How to Locate Temporary Internet Files

• Type Internet Explorer in the search bar and


enter.
• Click the Tools button, and then click Internet
Options.
• Click the General tab, and then,
under Browsing history, click Settings.
• In the Temporary Internet Files and History
Settings dialog box, click View files.
To use the Delete Browsing History feature:
• In Internet Explorer,
• click the Safety button
• Click Delete Browsing History.
• In the Delete Browsing History dialog box,
• select the items to delete
• Click Delete.
To block all cookies:
• In Internet Explorer,
• click the Tools button,
• click Internet Options, and then
• Click the Privacy tab.
• Move the slider up to Block All Cookies.
• On this setting, websites will not be able to store cookies
on your computer.
Note: Blocking all cookies might prevent you from accessing
many websites. The next two Internet Explorer privacy
levels, High and Medium High, may be more suitable. In
addition, it is possible to block a cookie for a specific site by
clicking the Sites button on the Privacy tab. Please see
Internet Explorer Help for more information.
Removing Old Cookies
• Cookies previously saved to your hard disk can still be read
unless you remove them. To remove all of your existing
cookies:
• In Internet Explorer,
• click the Tools button
• Click Internet Options.
• On the General tab, Under Browsing History,
• Click Delete. In the Delete Browsing History dialog box,
• select the Cookies check box
• Click Delete.
• Select Preserve Favorites website data to keep cookies
associated with your saved favorites from being removed.
• Click OK to confirm deletion of all cookies in the Temporary
Internet Files folder. History
To no longer retain history*:
• In Internet Explorer,
• click the Tools button, and then
• Click Internet Options.
• Under Browsing History,
• Click Settings. In the Temporary Internet Files
and History Settings dialog box, adjust the Days
to keep pages in history field to 0.
*Note: To turn off History temporarily, you can
use In Private Browsing by clicking the Safety
button and then clicking In Private Browsing.
Configuring a socks proxy
What is a SOCKS5 proxy?
• A SOCKS proxy is an additional feature that some VPN
providers offer, allowing users to fake their virtual location
(also known as location spoofing). A SOCKS5 proxy allows you
to hide your IP address and loaction from online services.
security settings
To view Internet Explorer security settings
• Open Internet Explorer by clicking the Start
button , and then clicking Internet Explorer.
• Click the Tools button, and then click Internet
Options.
• Click the Security tab.
• Click the Internet icon, and then click Custom
level.
• Settings that are not at recommended levels are
highlighted in red.
Customize the Internet Explorer toolbars
Internet Explorer has several toolbars, including the
• Menu bar,
• the Favorites
• Links bar
• Address bar, where you can type a web address
• Status bar, which displays messages such as a webpage's download
progress.
• All of these toolbars can be customized in one way or another.
Show or hide the Internet Explorer toolbars
• You can show
• Favorites or Links bar,
• Command bar
• Status bar.
• Open Internet Explorer by clicking the Start button ,
• Clicking Internet Explorer.
• Click the Tools button, point to Toolbars
• Click the toolbar you want to show or hide.
Customize the Command bar
• The Command bar is located at the upper-right side of the Internet Explorer
window and offers easy access to almost any setting or feature in Internet
Explorer. You can customize the Command bar buttons to suit your preferences.
• Open Internet Explorer by clicking the Start button , and then clicking Internet
Explorer.
• In Internet Explorer 8, right-click the Command bar, point to Customize, and
then click Add or Remove Commands. In Internet Explorer 7, right-click the
Command bar, point to Customize Command Bar, and then click Add or Remove
Commands.
• Make one or more of the following changes:
– To add a button, click the button you want to add in the Available toolbar buttons list,
and then click Add.
– To remove a button, click the button you want to remove in the Current toolbar
buttons list, and then click Remove.
– To change the order in which buttons are displayed, click a button in the Current
toolbar buttons list, and then click either Move Up or Move Down.
– To restore the Command bar buttons to their default settings, click Reset.
• When you're done, click Close.
Using your any internet browsers (Internet explorer, Mozilla
or opera) as our Operating System, demonstrate on how to
perform the Following.
• How to change default home page
• How to locate(view) temporary internet file
• How to delete temporary internet file
• How to delete cookies
• How to change search engine
• Hoe to add extension to browser
• using Internet connection available in your computer
open Internet browser and Browse the Admas (
www.admas.com ) and make it a default home page
• Browse and bookmark the web site of the Admas site and
Admas information.
LO2. Search internet
Privacy and security threats on the internet

What Is Internet Security?


• Internet security consists of a range of security tactics
for protecting activities and transactions conducted
online over the internet.
• These tactics are meant to safeguard users from
threats such as hacking into computer systems, email
addresses, or websites; malicious software that can
infect and inherently damage systems; and identity
theft by hackers who steal personal data such as bank
account information and credit card numbers.
• internet security is a top priority for individuals and
businesses alike
Types of internet security threats
• Internet security solutions
There are several internet security products and
solutions available to help keep your internet
usage secure. These include:
• Antivirus software products, which protect
devices from attacks by detecting and
eliminating viruses.
• Password managers, which help store and
organize passwords through encryption.
• Endpoint security suites, which include a more
comprehensive internet security approach with
firewalls, antivirus, anti-spyware, and more.
Observing OHS and netiquette principles
What Does Occupational Health and Safety (OHS) Mean?
• Occupational health and safety (OHS) is a branch of public
health aimed at improving workplace health and safety
standards.
• It studies injury and illness trends in the worker population and
offers suggestions for mitigating the risks and hazards they
encounter on the job.
• Every occupation has health or safety risks associated with it,
and it is every employer’s responsibility to ensure that their
employees can carry out their work as safely as possible
• Occupational health and safety is a very broad umbrella. It
covers not only first aid provisions and the safe operation of
heavy machinery, but also infection prevention, ergonomic
best practices, and methods for responding to workplace
violence.
What is netiquette?
• Netiquette is a made-up word from the
words net and etiquette. Netiquette thus describes
the rules of conduct for respectful and appropriate
communication on the internet.
• Netiquette is often referred to as etiquette for the internet.
• Netiquette is mostly used for dealing with unknown people
on the internet.
• The rules of netiquette very depending on
the platform and its participants .
• Generally, it is up to the operator of a website or
communication app to specify the type and scope of
netiquette.
• It is also their responsibility to monitor compliance with
these basic rules and to penalize violations of them.

You might also like