Module 4 - Comp 312 - Computer Fundamentals and Programming - 2
Module 4 - Comp 312 - Computer Fundamentals and Programming - 2
Module 4 - Comp 312 - Computer Fundamentals and Programming - 2
OVERVIEW:
The entire Internet is based on agreements between these backbone providers who
set in place all the fiber optics lines and other technical aspects of the Internet. The first high
speed backbone was created by the ‘National Science Foundation’ in 1987. The Internet was
first created by the Advanced Research Projects Agency (ARPA) of the U.S. government in
1960’s, and was first known as the ARPANet. At this stage the Internet’s first computers
were at academic and government institutions.
They were mainly used for accessing files and to send e-mail. From 1983 onwards
the Internet as we know it today started to form with the introduction of the
communication protocol TCP/IP to ARPANet. Since 1983 the Internet has accommodate
such things as network LANs and ATM and frame switched services. The Internet continues
to evolve with it becoming available on mobile phones and pagers and possibly on
televisions in the future. The actual term “Internet” was finally defined in 1995 by FNC (The
Federal Networking Council (FNC) agrees that the following language reflects our definition
of the term “Internet”. “Internet” refers to the global information system.
define internet
discuss the world wide web
learn how to connect to the internet
identify the services provided by the internet
identify search engines that allow users to search the web
identify the parts of the Internet Explorer
learn how to search for information on the web
learn how to get and save information from the web
1. What is internet?
2. It is a device for transmitting data over phone wires, converting the digital form
into an analog form and back again to digital form.
3. A program which allows the user to view an HTML document.
4. What is the collection of linked web pages with a common topic?
5. It provides the server computer and the software to connect to the internet.
6. It is one of the most popular and most frequently used internet services.
7. It is the name used to log on to your internet account.
8. It is a system that lets you communicate with others in a public arena.
9. This is like a giant electronic bulletin where messages are posted for everybody
to read and respond to.
10. It is software that allows users to locate information stored on a Gopher server
through series of menu that are organized in a hierarchical structure.
Below is a list of knowledge that maybe you have encountered in your previous
computer subjects. Check the appropriate box corresponding to your agreement to
the statement using the scale given below.
Statements 5 4 3 2 1
I am a competent Internet browser.
In 1990, Dr. Tim Berners-Lee designed a set of links to connect all information found
in the giant superhighway. He wrote a program which allowed pages of information to be
linked together using keywords. The document formatting language used to link these
documents is called HTML (Hypertext Markup Language). This allows text to be formatted
based on a generally accepted standard. The link which established the physical connection
of documents from one computer to another formed like a spider web, hence was called the
world wide web (www), the web or sometimes known as W3 (W cubed). The collection of
information or files publicly available, which is the web, resides on computers called web
servers. These web servers located all over the world are linked together through the
internet. Whenever you connect to the internet and become part of the web, your
computer becomes a web client. The web, which was originally text based, can now accept
graphics, audio and video files as well.
To connect to the internet, we need the hardware, a connection via telephone lines,
an Internet Service Provider (ISP), and a web browser.
1.2.1 Hardware
The hardware needed to be connected consist of the personal computer (preferably
Modem
The most popular type of account or connection is with the use of modems
(Modulator-Demodulator). A modem is a device for transmitting data over phone wires,
converting the digital form into an analog form and back again to digital form. This may be
an internal modem which is connected within the CPU circuitry or an external modem which
is placed outside the CPU and connected to a telephone. As always, the quality of the phone
lines affects the speed of the connection. For the internet connection to work, the user
must subscribe to an Internet Service Provider (ISP) through a dial-up connection. When the
connection is activated, the signal is passed to the modem, then through the phone lines
and to the subscribed ISP. Homes usually subscribe to this kind of connection because of its
affordability and easy connectivity.
DSL
The DSL (Digital Subscriber Line) is a broadband access service connection available
from major companies like PLDT, Bayantel and Digitel. It provides high-speed access and
connectivity to the internet, minimum speed of which may be about five times faster than
the ordinary phone lines. The price of this connection is much higher than the use of dial-up
connections so that it caters best to corporate customers and high-end residential
customers.
ISDN
The ISDN (Integrated Services Digital Network) is a digital technology that enables a
single pair of copper wire to transmit voice, data, image at a high speed, singly or all
together, with virtually no communication error. It allows high-speed internet access, real
time video conferencing, and simultaneous usage of voice and data via phone lines. It is best
for large corporations, small-medium enterprises (SMEs) and high-value residential users. To
avail yourself of this kind of connection, look for the services of your major phone
companies. Take not that small ISPs do not usually provide this kind of service.
T1 Line
The T1 Line is a high-speed international digital leased service that allows point-to-
point connections between the Philippines and places abroad. It is very fast, about 10 times
faster than ISDN but the price is very high. Again, this kind of connection is only available
from major phone companies.
When the browser is invoked, it is automatically dials the ISP provider to establish
connection. Once a connection is made, the initial web page called homepage is displayed.
This start web page contains an address called a Uniform Resource Locator (URL
pronounced as either “earl” or “u-r-l”). The distinct parts of the URL are 1) the transfer
protocol specification, 2) the domain, and 3) the document name.
Example:
http://www.internet101.org/start.html
These transfer protocols define the set of rules that the computer need to follow or
use to be able to transfer files from one computer to another on the internet. This transfer
protocol specification, which is found in the beginning of the URL, can either be an http://
(hypertext transfer protocol); ftp:// (file transfer protocol), gopher:// (gopher site); news:
(address of a newsgroup, take note that there is no // after the name); mailto: (links to an e-
mail address, no // after the name); telnet:// (telnet site) or wais: // (wais site).
The domain contains the website name and the type of site. The website name is a
unique name which is associated to a unique identification number on an Internet host
computer. The type of site defines the category of the website which can either be a .com
(commercial site), .org (organizations other than government agencies), or .net (network
services provider or resource), to name a few.
There are different e-mail programs which can be used such as:
Of course, to make sure that the receiver will receive the e-mail sent, and e-mail
address should be provided. The e-mail address has three parts: the account name, the @
sign and the domain name. An example is provided below”
E-mail address
mayo@yahoo.com
The account name is the name used to log on to your internet account. It is
sometimes called USER ID, Member Name, Screen Name, Username, or Log on ID. The @
The two common systems used for handling e-mail are POP and IMAP. POP (Post
Office Protocol) serves to receive all e-mails sent to you and hold it until you use your e-mail
program to retrieve it. IMAP (Internet Message Access Protocol) generally works the same
way but it is used by corporate networks.
1. Observe and listen first before joining the chat sessions (termed as “lurking”).
2. Go over the FAQ (Frequently Asked Questions) to avoid asking the same questions
answered previously.
4. Be sure to know the rules and regulations of the particular chat group before joining
to avoid embarrassment.
The ISPs usually provide good chat services like the MSN chat site,
http://chat.msn.com/. Other Internet chat software are the Internet Relay Chat (IRC) and
the Yahoo Messenger (YM).
Talk sometimes known as “instant messaging,” allows two people to chat privately
online. All you need to do is enter the address of the person you want to talk with and start
typing messages. All “Instant Messaging” programs can be downloaded and used for free.
Examples of instant messaging programs are:
Of course, it needs special devices such as the sound card, a microphone, a headset
and speaker and internet phone software, which should be compatible with the devices of
the one you, will be talking with. It does have problems like the quality of sound produced
which is inferior to that of ordinary phone calls, and it is inconvenient to use because the
internet connection should be open 24 hours and 7 days to be able to receive calls anytime.
The more popular systems available for this kind of service are the:
2.4 Newsgroup
It is just like a giant electronic bulletin where messages are posted for everybody to
read and respond to. There are different news groups on different topics of interest where
questions and opinions can be raised and responded to via e-mail. Common terms used for
news groups are discussion groups, bulletin boards and message boards on forum. It is
distributed by a service group called Usenet where service providers can subscribe. If your
service provider subscribes to the specific newsgroups, you as a user may be able to read
and post messages to the group.
The program, which is used to retrieve the newsgroup messages from the service
provider, is called “news reader.”
Gopher Software is a tool that allows users to locate information stored on a Gopher
server through a series of menu that are organized in a hierarchical structure. Gopher sites
usually start with gopher://.
A Wide Are Information (WAIS) also enables users to search for files in specific
databases. It requires the names of the databases effect search. A WAIS usually starts with
wais://.
1. Shockwave
Software which allows you to download and play arcade games, see new learning
applications and product demos on the web using exciting 3D technology.
2. IncrediMail
Software which provides different e-mail backgrounds to enhance the look of
you e-mail.
3. CNET Catch Up
Software that helps you find quickly and easily software upgrades, which will
make your computer fit and up-to-date.
4. Rhapsody
An interactive digital music service that integrates high fidelity, professionally
programmed internet radio, rich contextual music information, and music-on-
demand subscription services in a single unified application.
5. Spinner
A free net music player that gives you access to different kinds of music and
more than 300,000 songs.
1. Local Area Network (LAN). A group of computers located in a small area connected
by a communications link to be able to interact within the group. The first LAN called
ETHERNET connected mainframes and computers in the entire building. In this setup
people in different parts of the organization.
2. Wide Area Network (WAN). The network is now extended outside of the building to
different locations but within the country.
2. Routers. Are used to connect computers to the same network or another network.
3. Modem. This equipment that convert digital signal transmitted by the sender
produced by a computer to analog signal and will be converted back to digital signal
by the modem on the receiver’s end.
1. Electronic Mail (E-Mail). This can send and receive mail type communication. Files
can also be attached as part of the mail. Common e-mail service providers include
yahoo, gmail and Hotmail.
Offices that use their trade name in their email address use Microsoft Outlook.
4. File Download and Upload. When a file is being uploaded or downloaded the file
transfer protocol (FTP) is used.
Internet connections are provided by internet service providers (ISP). The ISPs
assign internet address to users. Internet address are usually typed in text form then
converted to numeric form. For example, the internet address typed by the user is
http://www.school.edu.ph. The internet address in text form is converted to numeric form
like 192.175.34.213. Internet addresses are known as universal resource locators (URL).
http://www.school.edu.ph
The following are the different parts that comprise the internet address:
1. Hypertext Transfer Protocol (http). This controls the access to different web sites.
3. Domain Name. In the example above school is the domain name. It is the name
assigned to the web site owner (individual or organization).
4. Domain Top. This determines the type of organization that owns the website. There
are different types of domain top mainly:
5. Country Code. Country code is sometimes specified as to distinguish the web site
from others.
1. Hackers. Hackers are people that are able penetrate computer security systems.
They may come from within or outside the company. The attack on the network may
be intentional or unintentional. Intentional may be theft of information, spying,
changing the contents of the data and destroying the data. Unintentional can be
trying a program that turns out to be a virus. Some hackers brag about the networks
that they have hacked to establish a reputation of how good the hacker is.
2. Viruses. Viruses attaches itself to a file or program, once the file is activated it will be
loaded into the main memory. When another file or program is called the virus will
attach itself again. This cycle happens over and over until the hard disk drive is
flooded and the files or programs may become damaged or corrupted.
3. Trojans. Trojans are programs that appear to be performing a useful function but in
reality it is actually doing damage to the computer system.
4. Worms. Worms often reside in the memory when activated it sometimes sends
information to the hacker like passwords or registry.
Security
Threat to security will always be present and it can be difficult to predict where the
threat will be coming from. Detection can be difficult as new viruses and hackers coming up
with new ways to penetrate network security. One of the solutions is to employ policies in
addressing the problems like the action an organization can undertake in case of security
breach. Security threats can be minimized by using the following:
1. Firewall. Firewalls blocks unauthorized access and changes to the computer system.
A limitation of firewalls is it cannot prevent internal attacks or threats nor can it
protect against the transfer of files or programs infected with viruses.
2. Anti-virus Software. Anti-virus software cleans viruses, trojans and worms residing in
the computer system. New viruses appear frequently it would be best to keep the
anti-virus software updated to be able to clean the new viruses.
3. Access Rights. Grant access only to information that will be needed by the user to
prevent theft of information or espionage.
4. Backup. Backup replicating the data stored in the computer. It is particularly useful
in case of destruction or vandalism of data. In this case the data can be restored and
the organization can continue its operation.
Each of the search engines given below locates a specific web page differently hence,
different search engines may provide a different list of WebPages. It does not matter what
search engine you use. It is a matter of preference.
Yahoo http://www.yahoo.com
Google http://www.google.com
MSN http://www.msn.com
AltaVista http://www.altavista.com
Pinoy Central http://www.pinoycentral.com
Yehey http://www.yehey.com
Ask Jeeves http://www.ask.com
Infoseek http://www.infoseek.com
Excite http://www.excite.com
Northern Light http://www.northernlight.com
Hotbot http://www.hotbot.com
2. A plus sign before the word to be search means that the specific word should be
found in the web pages.
The list of web pages searched should contain all the four words specified.
3. A minus sign before the word means that the specific word should not be in the web
pages.
4. The asterisk (*) may be used as a wild card to replace unknown portion of words that
you are not sure.
Ex. Encryp*
List all web pages with words starting with Encryp. This may include web pages,
which contain the word encryption, encrypt, encryptor, and the like.
You connect . . .
. . . with the class
Albano, Gisela May A., Atole, Ronnel R., Ariola, Rose Joy Y. (2003).
Introduction to Information Technology. Philippines: Trinitas Publishing, Inc.
www.google.com
Main Task