Internet Terms Concepts
Internet Terms Concepts
Internet Terms Concepts
Table of Contents
Table of Contents ............................................................................................................................... 2
Introduction to Internet Basics ............................................................................................................. 3
Lesson 1 - What is the Internet? ........................................................................................................... 3
Lesson 2 – Internet terms & concepts ............................................................................................. 6
Lesson 3 – web browsers .................................................................................................................... 12
Lesson 4 – Search engines .................................................................................................................. 17
Lesson 5 – legal and ethical issues in relation to internet use ................................................... 20
Lesson 6 – Connecting to the internet........................................................................................... 28
Lesson 7 – customising the view and preferences of a browser ............................................... 37
Lesson 8 – Navigate on the internet ................................................................................................... 49
Lesson 9 – Using the search engine .................................................................................................... 57
Lesson 10 – Obtaining information from a website ............................................................................ 62
Throughout the 1970's, what would later become the Internet was developed. While mostly
military personnel and scientists used it in its early days, the advent of the World Wide Web in
the early 1990's changed all that.
Today, the Internet is not owned or operated by any one entity. This worldwide computer network
allows people to communicate and exchange information in new ways.
According to www.commerce.net, in April of 1999, there were 92.2 million Internet users over the
age of 16 in the United States and Canada. By 2005, it is predicted 75% of the total US
population will be online.
The Internet in South Africa commenced when the first sustainable e-mail link was established in
1988 between Rhodes University in Grahamstown and a private home in Portland, Oregon.48 This link
was later connected to the Internet. At about the same time the Foundation for Research and
Development started the Universities Network (Uninet). Before that, around 1986, there were two
networks between South African universities: one between Rhodes University, the University of Cape
Town and the University of Natal in the south, and another between Potchefstroom University, Wits,
the University of Pretoria and the CSIR in the north.
Other universities soon joined as a result of Uninet and later the two networks were connected to
each other. But in 1989 access to the world-wide Internet was restricted because of the political
situation in South Africa.
The Internet is the largest computer network in the world, connecting millions of computers. A
network is a group of two or more computer systems linked together.
• Global Audience
Content published on the World Wide Web is immediately available to a global audience of
users. This makes the World Wide Web a very cost-effective medium to publish information.
Reaching more than 300 countries.
• Relatively Inexpensive
It is relatively inexpensive to publish and retrieve information on the Internet. At a fraction of
the cost to publish information by traditional methods, various organisations and individuals
can now distribute information to millions of users. It costs only a few thousand rands to
establish an Internet presence and publish content on the Internet.
• Product Advertising
The World Wide Web can be used to advertise various products. Before purchasing a
product, customers will be able to look up various product specification sheets and find out
additional information. That is, the beauty of the Web is that it allows customers to explore
products in as much detail as they desire. If the client just wants a general overview, he or
she can look at the advertising information. For those wanting more in depth information, you
can provide white papers and product descriptions for download. The Web allows a business
to provide timely information, you can simply place the information on the Web page and it is
available immediately for your customers.
• Online Surveys
Traditional methods of performing surveys are often relatively slow and expensive compared
to online surveys conducted on the Internet. For example, in order to fill out various needs of
customers or what they would like to see in a future product, it's often necessary to compile a
list of address and mail a questionnaire to many customers. The success of such an attempt
is not always guaranteed and can be very costly in terms of mailing the questionnaires and
entering responses to a databases and analyzing it. On the other hand, you can use the
World Wide Web to automate the whole process.
• Announcements
With the World Wide Web, you can distribute various announcements to millions of users in a
timely manner. Because there is virtually no time lag from the time it takes to publish
information to making the information available to users, the Web is an ideal medium to
publicize announcements. As more people discover the virtues of the Web and get connected
to the Internet, the Web will become the medium of choice for many organizations and
individuals to publicize various announcements.
• Multimedia
The capability to incorporate multimedia into Web pages is a major advantage of using World
Wide Web. For example, many Web sites use sounds and video clips to make the content
easier and more interesting to browse.
• Formatting Capabilities
Content published on the World Wide Web can be richly formatted by using various HTML
tags and graphic formats. The capability to do this is a major reason for the success of the
World Wide Web. In addition to using HTML tags and various multimedia formats in Web
pages, various interactive controls can also be added to a web page. This capability allows
Web site content developers to create "active" Web sites. For example, before a user sends
some information to a Web server for processing, a VBScript or JavaScript subroutine can be
used to verify information typed in by the user. Various formatting capabilities, along with
technologies such as Java and VBScript, make the World Wide Web a richly interactive
medium that you can use to distribute information to millions of users.
• Personal Information: If you use the Internet, your personal information such as your name,
address, etc. can be accessed by other people. If you use a credit card to shop online, then
your credit card information can also be ‘stolen’ which could be similar to giving someone a
blank check.
• Pornography: This is a very serious issue concerning the Internet, especially when it comes to
young children. There are thousands of pornographic sites on the Internet that can be easily
found and can be a detriment to letting children use the Internet.
• Spamming: This refers to sending unsolicited e-mails in bulk, which serve no purpose and
unnecessarily clog up the entire system.
• Virus Threat: Most of the viruses came from the internet so be very careful when visiting or
downloading from a site.
We shall now look at some of the popular terms relating to the internet.
The WWW was built on the technology called Hypertext. This technology increases accessibility to
linked documents on the Internet and helps user to navigate between documents very easily.
Hypertext is identified by underlined text and a different colour usually. Some places will refer to this
types of technique as Jump-Off Points. Hypertext can make links within the same document or to
other documents.
Each time one access a new document by choosing a link, there is a connection made with the web
server that the document is on. Once the appropriate document is retrieved the connection is broken.
There is no point in maintaining the link while you are viewing it. This is one reason why the WWW is
so efficient.
WWW lets you search, traverse, and use many types of information at numerous sites and in multiple
forms. This interface is called a browser. Some people refer to a browser as a 'web browser' often
these terms are used interchangeably.
The WWW is intended to help people share information resources, and services with the widest
possible community of users. Thus a user can access the WWW on Apple, UNIX, Macintosh, DOS,
Windows, and other operating systems.
Just like the Internet, the WWW has a protocol, which is known as HyperText Transfer Protocol
(HTTP). HTTP acts as an interface between a Web Client Software, such Netscape Navigator.
A major advantage of the WWW is that it also supports TCP/IP services, such as Gopher, FTP, and
Archie in addition to HTTP.
Uniform Resource Locator (URL) it is the global address of documents and other resources on
the World Wide Web. The first part of the URL is called a protocol identifier and it indicates what
protocol to use and the second part is called a resource name and it specifies the IP address or
the domain name where the resource is located. The protocol identifier and the resource name are
separated by a colon and two forward slashes. The Uniform Resource Locator (URL) was developed
by Tim Berners-Lee in 1994 and the Internet Engineering Task Force (IETF) URI working group.
For example, the two URLs below point to two different files at the domainpcwebopedia.com. The first
specifies an executable file that should be fetched using the FTP protocol; the second specifies a Web
page that should be fetched using the HTTP protocol:
ftp://www.pcwebopedia.com/stuff.exe
http://www.pcwebopedia.com/index.html
A URL is one type of Uniform Resource Identifier (URI); the generic term for all types of names and
addresses that refer to objects on the World Wide Web.
The term "Web address" is a synonym for a URL that uses the HTTP / HTTPS protocol.
URL
Every web page on the Internet has its own unique web address. A web address is split into 3 parts:
http://www.sanscrip.com/training/compform.htm
http:// www.sanscrip.com /training/compform.htm
I. Protocol: this tells Internet Explorer the type of transmission it is dealing with -
http stands for hypertext transfer protocol. If you open a file from your hard disk, the
protocol part with show file:// instead.
II. Domain name: this is the name of the web site where the web page resides - most
companies have their own domain name these days.
III. Page address: this identifies the actual file that is displayed.
Useful Tip
Every web site has a page that is called the index page. If you omit the page address, the
Home page for that particular web site is displayed. If no page address is shown in the
Address bar, you are viewing the index page of a web site.
When the HTTP goes out, it is a response or request protocol between a client and a server to access
a certain resource, which may be a web page or other graphic stored in the server as files. The client
can be a number of things, such as a web browser, a search engine spider, or any other end-user
tool, while the server is a storage area for a particular set of HTML files and images. The user agent,
as the client is called, uses the hypertext transfer protocol to communicate with the server, which is
also called the origin server. Between the user agent and the origin server there may also be many
intermediary processes such as proxies, gateways, and tunnels, all of which work together to finish
the transfer of information to the end user. The HTTP request sends a URL to the server for a file (a
web page, an image, or another type of file) stored there. The URL is then sent back to the end user.
receive e-mail. For broadband access you typically receive the broadband modem hardware or pay a
monthly fee for this equipment that is added to your ISP account billing.
In addition to serving individuals, ISPs also serve large companies, providing a direct connection from
the company's networks to the Internet. ISPs themselves are connected to one another
through Network Access Points (NAPs). ISPs may also be called IAPs (Internet Access Providers).
6. HYPERLINK
A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a new
section within the current document. Hyperlinks are found in nearly all Web pages, allowing users to
click their way from page to page. Text hyperlinks are often blue and underlined, but don't have to be.
When you move the cursor over a hyperlink, whether it is text or an image, the arrow should change
to a small hand pointing at the link. When you click it, a new page or place in the current page will
open.
Hyperlinks, often referred to as just "links," are common in Web pages, but can be found in other
hypertext documents. These include certain encyclopedias, glossaries, dictionaries, and other
references that use hyperlinks. The links act the same way as they do on the Web, allowing the user
to jump from page to page. Basically, hyperlinks allow people to browse information at hyperspeed.
Hyperlink
File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to
another host over a TCP-based network, such as the Internet. It is often used to upload web pages
and other documents from a private development machine to a public web-hosting server. FTP is built
on a client-server architecture and uses separate control and data connections between the client and
the server.[1] FTP users may authenticate themselves using a clear-text sign-in protocol, normally in
the form of a username and password, but can connect anonymously if the server is configured to
allow it. For secure transmission that hides (encrypts) your username and password, as well as
encrypts the content, you can try using a client that uses SSH File Transfer Protocol.
The first FTP client applications were interactive command-line tools, implementing standard
commands and syntax. Graphical user interfaces have since been developed for many of the popular
desktop operating systems in use today,[2][3] including general web design programmes like Microsoft
Expression Web, and specialist FTP clients such as CuteFTP.
7. INTERNET CACHE
The Internet Cache Protocol (ICP) is a protocol used for coordinating web caches. Its purpose is to
find out the most appropriate location to retrieve a requested object from in the situation where
multiple caches are in use at a single site. The goal is to use the caches as efficiently as possible, and
to minimize the number of remote requests to the originating server.
10
8. COOKIES
A cookie is information that a Web site puts on
your hard disk so that it can remember something
about you at a later time. (More technically, it is
information for future use that is stored by
the server on the client side of
a client/server communication.) Typically, a cookie
records your preferences when using a particular site.
Using the Web's Hypertext Transfer Protocol (HTTP),
each request for a Web page is independent of all
other requests. For this reason, the Web page server has no memory of what pages it has sent to a
user previously or anything about your previous visits. A cookie is a mechanism that allows the
server to store its own information about a user on the user's own computer. You can view the
cookies that have been stored on your hard disk (although the content stored in each cookie may not
make much sense to you). The location of the cookies depends on the browser. Internet Explorer
stores each cookie as a separate file under a Windows subdirectory.
Cookies are commonly used to rotate the banner adverts that a site sends so that it doesn't keep
sending the same adverts as it sends you a succession of requested pages. They can also be used to
customise pages for you based on your browser type or other information you may have provided the
Web site. Web users must agree to let cookies be saved for them, but, in general, it helps Web sites
to serve users better.
Activity 2
11
A web browser is a software application for retrieving, presenting, and traversing information
resources on the World Wide Web. An information resource is identified by a Uniform Resource
Identifier (URI) and may be a web page, image, video, or other piece of content. Hyperlinks present in
resources enable users easily to navigate their browsers to related resources. A web browser can
also be defined as an application software or programme designed to enable users to access, retrieve
and view documents and other resources on the Internet.
Although browsers are primarily intended to access the World Wide Web, they can also be used to
access information provided by web servers in private or files in file systems. The major web browsers
are;
• Firefox,
• Google Chrome,
• Internet Explorer,
• Opera, and
• Safari
12
The above screenshot shows the Microsoft Internet Explorer browser window - the main part of the
window is taken up by the web page. If you wish to learn how to navigate around a web page please
visit the Navigation section of this tutorial.
The web browser has various tools located above the displayed web page, these are known as
Toolbars, there are additional tools available on the left hand side of the browser called the Explorer
bar, and at the bottom of the web page is the status bar.
We will start by looking at the tool-bars, as you will see when looking at the toolbars there operation is
inter-linked with the Explorer bar.
1. Menu Bar
The Menu bar is normally located at the very top of the web browser, as you can see it has
various sections - File, Edit, View, Favorites, Tools and Help, when you left click on each of
these sections a drop down menu appears enabling you to do various actions as follows.
(Note that not all functions are mentioned - some functions are not normally required when
navigating the world wide web - however the major functions are all discussed.)
2. File - The file menu deals with the current open document, from here you can open a new
document such as another web page, save the web page, alter the page set-up, print the
web page, send the web page by email and find out the properties of the web page.
13
3. Edit - The edit page enables you to copy details from a web page to your clipboard (The clipboard
saves the details so you can paste the copied material into another document). The edit section also
allows you to find (on this page) - this allows you to look for a certain word on a web page.
4. View - The view section enables you to change some browser settings; you can select what
toolbars you wish to display. For example you can decide not to show the radio toolbar if you don’t
use it. From this section you can also amend the text size of the web page.
5. Favorites - From here you can create a list of favourite web sites, the chances are that your
Internet Service Provider has already given you a starting list of web sites; If you wish to add more to
your favorites you can do it simply in this section.
6. Tools - The tools section provides some other useful tools, one of the most important sections here
is the Internet Options - from this area you can control your security settings.
7. Help - The help sections gives you various help functions and version details.
8. Standard Buttons
The next toolbar is the Standard Buttons toolbar and it should look like the above. Going from Left to
Right the functions are:-
9. Left pointing arrow - This will move you to the web page previously visited, if you select the down
arrow next to this a list will appear of the previously visited pages - you are able to select any of these
pages.
10. Right Pointing arrow - This will move you forward a web page if you have moved back.
11. The X button - This will stop the current web page from being downloaded.
12. The Revolving Arrows - This will download the current web page again, in case it has not
download properly or it may have been updated (EG A page displaying latest sports scores)
13. The Picture of a House - This will take you to your home page.
14. The Favorites button - This will open the Explorer bar to the left of the web browser - the
explorer bar will contain your favourites.
14
15. History - This will open the History of the browser in the Explorer bar. It will include previously
visited web sites to enable you to go back to them.
The address bar details what page on the Web or even your local computer is being displayed. The
address bar is the quickest way to navigate to a website if you know the website address. Simply type
in the address and click the go button.
The Links Bar operates similar to your favorites option and provides a direct link to some websites -
management of the links bar can be controlled through the favorites drop down menu.
15
The Radio Bar allows you to access online radio stations and play music through the internet.
So that is what basically makes up a web browser, as mentioned early there is also a status bar, this
is located at the bottom of the web page and currently you should be able to read text that says
"Happy Online". The status bar can display various messages; it is most useful when you are
following links on a web page. As you know when you point at a link your mouse pointer changes to a
hand, if you look at the status bar the web address where the link goes should appear. (However be
careful web programmemers can code the status bar to do other things!)
1. Speed
A browser should be able to quickly load WebPages, no matter how dynamic the content. “Over 65%
of today’s Web content is made up of images and videos. Over 35 hours of video is uploaded to
YouTube every minute. This is a far cry from text-based Web pages of the past. As the web becomes
more interactive, so should the browser evolve to handle the increased amount of data going through
it.”
Speed and stability is particularly important for people given their Internet activities. According to a
research, People engage in heavy web applications, as 99% watch videos online, 61% upload videos,
and 85% upload photos. The study, which conducted the survey in 30 countries, cited that Filipinos
are on the top of online photo, video sharing, and social networking activities.
2. Simplicity
A browser should also be simple and easy to use. It shouldn’t take up a lot of screen space, which
would be better saved for the Web page a user is actually trying to view. Google Chrome, for
instance, has stripped away everything but the bare minimum in order to let users focus on web
content and not on the browser itself.
3. Security
Browsers should also be very secure, as malware is a constant threat on the Internet. There are two
ways browsers can mitigate this. A browser can keep itself up to date with the latest security patches
without having to rely on a user to download these patches every time vulnerability needs to be
addressed. With Google Chrome, for instance, a user always gets the latest version on his machine,
automatically.
16
Search engines are programmes that search documents for specified keywords and returns a list of
the documents where the keywords were found. A search engine is really a general class of
programmes; however, the term is often used to specifically describe systems
Typically, Web search engines work by sending out a spider to fetch as many documents as possible.
Another programme, called an indexer, then reads these documents and creates an index based on
the words contained in each document. Each search engine uses a proprietary algorithm to create its
indices such that, ideally, only meaningful results are returned for each query.
17
18
1. The indexes of search engines are usually vast, representing significant portions of the
Internet, offering a wide variety and quantity of information resources.
2. The growing sophistication of search engine software enables us to precisely describe the
information that we seek.
3. The large number and variety of search engines enriches the Internet, making it at least
appear to be organized.
1. Regardless of the growing sophistication, many well thought-out search phrases produce list
after list of irrelevant web pages. The typical search still requires sifting through dirt to find the
gems.
2. Using search engines does involve a learning curve. Many beginning Internet users, because
of these disadvantages, become discouraged and frustrated.
19
The government of South Africa has passed a number of legislations to govern the internet. For the
purposes of this module we shall discuss the following;
• Electronic communications and transactions act. 2002
• Regulation of interception of communications and provision of communication-related
information act, 2002
• Constitution of South Africa
Part 2 deals with the rights and obligations that follow from the communication of data messages. The
Act also provides for the validity of sending notices and other expressions of intent through data
messages.
2. Cyber inspectors
Chapter XII of the Act seeks to provide for the Department of Communications to appoint cyber
inspectors. The cyber inspectors may monitor Internet web sites in the public domain and are granted
powers of search and seizure of “information systems”, subject to obtaining a warrant
The Act’s definition of ‘‘information system’’ means a system for generating, sending, receiving,
storing, displaying or otherwise processing data messages and includes the Internet;
20
Under Section 82. (1) A cyber inspector may, in the performance of his or her functions, at any
reasonable time, without prior notice and on the authority of a warrant issued in terms of section
83(1), enter any premises or access an information system that has a bearing on an investigation
3. Cyber crime
Chapter XIII of the Act seeks to make the first statutory provisions on cyber crime in South African
jurisprudence. The Act seeks to introduce statutory criminal offences relating to information systems
and includes—
Under Section 86. (1) Companies and individual should note that subject to the Interception and
Monitoring Prohibition Act, 1992 (Act No. 127 of 1992), a person who intentionally accesses or
intercepts any data without authority or permission to do so, is guilty of an offence. [You don’t have to
do anything with it, just look!]
A person who unlawfully produces, sells, offers to sell, procures for use, designs, adapts for use,
distributes or possesses any device, including a computer programme or a component, which is
designed primarily to overcome security measures for the protection of data, or performs any of those
acts with regard to a password, access code or any other similar kind of data with the intent to
21
unlawfully utilise such item to contravene this section, is guilty of an offence. [Therefore, if you are
given the password to a restricted “pay” website, and you use it, you are breaking the law! ]
RICA regulates the interception of communications, the monitoring of radio signals and radio
frequency spectrums and the provision of communication-related information relating to indirect
communication in the records of telecommunication service providers. It also regulates applications
for interception of communications and provision of communication-related information under certain
circumstances. It regulates law enforcement where interception of communications is involved and
prohibits the provision of telecommunication services which do not have the capability to be
intercepted and requires telecommunication service providers to store communication-related
information (CRI).
The law specifies costs to be borne by telecommunication service providers related to these
requirements and compensation to services providers. It provides for the establishment of interception
centres an Office for Interception Centres and an Internet Service Providers Assistance Fund. Lastly it
prohibits the manufacturing, assembling, possessing, selling, purchasing or advertising of interception
equipment without a certificate of exemption issued by the relevant Minister.
Chapter 11 of the Constitution governs this duty and authorise the Police, Defence Force and
Intelligence Agencies to assist the State in its security obligations.
Employers are grappling with how much, if any, personal use of the Internet and e-mail to permit in
the workplace. Employers are also grappling with the question of whether to monitor Internet use and
whether to block access to certain Internet sites.
22
One of the main disadvantages of providing internet access is viruses and worms. According to
Webopedia, a virus (opens in a new browser window) is a "programme or piece of code that is
loaded onto your computer without your knowledge and runs against your wishes."
Many popular programmes like Microsoft Office appear on different computers in different
households. The likelihood is great that many family members, co-workers, friends, and
neighbours use the same software. And when many people use this software, they begin to share
information through downloading files, trading floppy disks or zip disks, opening e-mail
attachments, displaying Web pages, and file-sharing. They unknowingly open the door to viruses.
• Some viruses are disguised as legitimate computer programmes. Others may use macros
written into popular software products -- like Microsoft Word -- where users can
programmeme certain keystrokes to execute certain commands, or to specify certain
processes to run when documents are opened or closed -- may be written to infect data
files.
• Some viruses do little but duplicate themselves, while others can cause serious damage
or affect programme and system performance.
What is a Worm?
Worms are computer programmes that replicate themselves and often interferes with the normal
operation of a computer, programme, or network. Unlike viruses, worms do not attach to other files or
programmes. Worms tend to spread more rapidly than computer viruses because they often take
advantage of automatic file sending and receiving to spread them over the network from one
computer to the next.
While worms have been known to delete files or send email documents they typically reside in
memory, eat up system resources, and slow down your computer.
No, it's not a horse that you saw in the movie Troy. A Trojan horse is a programme that initially
appears useful and fools a user into running it. It frequently hides in games and other small software
programmes so that when you download it, you unknowingly execute it on your computer. Unlike
viruses, Trojans do not replicate themselves. Rather, they leave behind a programme that can be
contacted by another computer. Trojans have also been known to destroy files on your hard disk. One
example of a Trojan Horse is a programme that claims to find and delete viruses, but instead,
introduce a virus to your computer.
23
Hoaxes
Many of us have received email chain letters that warn impending viruses. Or they might be disguised
as a promotion that sounds too good to resist.
Hoaxes are scare alerts started by malicious people that are passed on by innocent users who think
they are helping the community by spreading the warning. Do not forward these hoax messages.
There have been many reported cases where e-mail systems collapsed after dozens of users
forwarded false alerts to other users. The best course of action is to merely delete these hoax emails.
Symantec, a global leader in information security, maintains a page on its Web site(opens in a new
browser window) that contains a list of known hoaxes. If you are concerned about a bogus email you
received about a new virus or sales promotion, visit this site to see if it is listed and what it says.
24
2. INFORMATION SECURITY
Generally speaking, privacy rights are granted (if at all) by specific laws, rules, or regulations. Some of
those rights apply in the workplace and some don't. And even if there is no specific law, a right to
privacy can be based on the legal common law concept of having a "reasonable expectation of
privacy." For employers and employees, privacy issues have become increasingly prevalent in the
workplace, and with the increased use of electronic resources, privacy at work is even more complex
especially with respect to confidential information.
Confidential information that exist in the workplace are things like client records, business planning
and forecasting, employee records, and information collected in the course of research and
development. With the use of the internet, confidentiality of this information can be compromised.
Workplace confidentiality requires that this information be identified and secured to prevent
unauthorized access or release of the information and includes everything from policies
on workplace Internet usage to nondisclosure agreements in employee contracts.
The following can be done to secure the internet; protected website, digital certificate, encryption,
firewall.
1. Firewalls
The best protection against security threats may be anti-virus software and a firewall. In the computer
world, a firewall is a system that keeps dangerous Internet "flames" away from a private computer
network, or LAN. In other words, it prevents unauthorized access to or from a private LAN. One
mechanism blocks traffic, another permits traffic.
2. Digital Certificate
Digital Certificates are the electronic counterparts to driver licenses, passports and membership
cards. You can present a Digital Certificate electronically to prove your identity or your right to access
information or services online.
25
Digital Certificates, also known as digital certificates, bind an identity to a pair of electronic keys that
can be used to encrypt and sign digital information. A Digital Certificate makes it possible to verify
someone's claim that they have the right to use a given key, helping to prevent people from using
phony keys to impersonate other users. Used in conjunction with encryption, Digital Certificates
provide a more complete security solution, assuring the identity of all parties involved in a transaction.
A Digital Certificate is issued by a Certification Authority (CA) and signed with the CA's private key.
A Digital Certificate typically contains the:
• Owner's public key
• Owner's name
• Expiration date of the public key
• Name of the issuer (the CA that issued the Digital Certificate
• Serial number of the Digital Certificate
• Digital signature of the issuer
The most widely accepted format for Digital Certificates is defined by the CCITT X.509 international
standard; thus certificates can be read or written by any application complying with X.509. Further
refinements are found in the PKCS standards and the PEM standard
3. Encryption
Encryption is the process of scrambling a message so that only the intended recipient can read it.
The actual cryptographic process is generally a complicated mathematical formulation, the more
complex -- the more difficult to break. A key is supplied to the recipient so that they can then
decipher the message. Keys for encryption algorithms are described in terms of the number of
bits. The higher the number of bits - the more difficult that cryptosystem would be to break.
Encryption can provide a means of securing information. As more and more information is stored on
computers or communicated via computers, the need to insure that this information is invulnerable to
snooping and/or tampering becomes more relevant. Any thoughts with respect to your own personal
information (ie. medical records, tax records, credit history, employment history, etc.) may bring to
mind an area in which you DO want, need or expect privacy. As teachers, we are often called upon to
handle sensitive student information. We need to have access to student records, but maintain the
confidentiality of their information..
Encryption is seen by many people as a necessary step for commerce on the internet to succeed.
Without confidence that net transactions are secure, people are unwilling to trust a site enough to
transact any sort of business using it. Encryption may give consumers the confidence they need to do
internet business.
26
Encryption can also provide a means of "message authentication". The PGP User's Guide explains,
"The sender's own secret key can be used to encrypt a message thereby signing it. This creates a
digital signature of a message...This proves that the sender was the true originator of the message,
and that the message has not been subsequently altered by anyone else, because the sender alone
possesses the secret key that made that signature." [2] This prevents forgery of that signed message,
and prevents the sender from denying the signature.
E-mail is certainly not secure. While you may believe that the use of a password makes your business
private, you should be aware that sending information without encryption has been likened to sending
postcards through the mail. Your message is totally open to interception by anyone along the way.
You may believe that your personal e-mail is not incriminating and does not contain content that you
must keep secret, and you may be right. But there are many common situations, where users have a
legitimate need for security both to protect that information and to insure that information is not
tampered with: Consumers placing orders with credit cards via the Internet, journalists protecting their
sources, therapists protecting client files, businesses communicating trade secrets to foreign
branches, ATM transactions, political dissenters, or whistle-blowers -- all are examples of why
encryption may be needed for e-mail or data files, and why it might be necessary to create a secure
environment through its use.
27
Every computer that is connected to the Internet is part of a network, even the one in your home.
For example, you may use a modem and dial a local number to connect to an Internet Service
Provider (ISP). At work, you may be part of a local area network (LAN), but you most likely still
connect to the Internet using an ISP that your company has contracted with. When you connect to
your ISP, you become part of their network. The ISP may then connect to a larger network and
become part of their network. The Internet is simply a network of networks.
ISPs provide individuals and organizations with Internet access for a fee. The ISP software package
usually includes:
1. Dial-Up
This is the most common (and cheapest way) people connect to the Internet. All you need is your
telephone line, a modem, and special ISP-provided software. Using a data communications method
called Point-to-Point Protocol (PPP), your modem establishes a connection to the Internet by
contacting the ISP's computer. Dial-up connections are fairly simple to set up, usually taking less than
an hour.
3. Cable
28
The same coaxial cables that provide you with television programming can also be used to connect
you to the Internet. This is done through exclusive cable modems that can send and receive
information at blazing speeds. Unlike DSL, cable signals hold up well over long distances. One
disadvantage of cable Internet access is the problem of shared bandwidth, which means the more
people who subscribe to cable in your area, the slower your connection speed will be.
• Wide Area Network (WAN): A WAN typically consists of 2 or more LANs. The computers are
farther apart and are linked by telephone lines, dedicated telephone lines, or radio waves.
The Internet is the largest Wide Area Network (WAN) in existence.
SERVERS
All computers on the Internet (a wide area network, or WAN) can be lumped into two groups: servers
and clients. In a network, clients and servers communicate with one another.
29
AND
• Manages resources (for example, one printer many people use) in a network.
The term server is often used to describe the hardware (computer), but the term also refers to the
software (application) running on the computer. Many servers are dedicated, meaning they only
perform specific tasks.
For example,
• An email server is a computer that has software running on it allowing it to "serve" email-
related services.
• A web server has software running on it that allows it to "serve" web-related services.
CLIENTS
Remember, all computers on the Internet (a wide area network, or WAN) can be lumped into two
groups: servers and clients, which communicate with one another.
Independent computers connected to a server are called clients. Most likely, your home or office
computer does not provide services to other computers. Therefore, it is a client.
Clients run multiple client software applications that perform specific functions.
For example,
• When you want to surf the web, your browser connects to a remote server and
requests a web page.
• The remote server (server hardware) runs web server software (server software).
• The web server sends the web page to your computer's web browser.
30
Activity
A. Consists of 2 or more LANs. The computers are farther apart and are
___1. LAN (Local
linked by telephone lines, dedicated telephone lines, or radio waves.
Area Network)
___2. WAN B. Common source that provides shared services to other machines and
(Wide Area manages resources in a network.
Network)
C. A project that allowed researchers and military personnel to communicate
___3. Server with each other in an emergency. The foundation of the Internet.
Activity
Whether you are at home, work, or are using a public computer, find out:
31
Your first time that you browse the web, you may have some difficulty. Efficiently browsing the Web is
just like any other complex task in life, it takes practice to be good at it. Internet Explorer has some
built-in features which will help to make it easier for you to browse the web. The fastest way to get to
a place that you don’t know its address and you want to search for, is to click on the "Search" button
on the Internet Explorer main toolbar. This button will take you to a document within Microsoft's home
site. On this document you will find a choice of categories to look through and a list Search Engines to
use. A Search Engine is an application that will attempt to find any documents that contain the subject
or phrase that you enter into the search parameters. You can also browse through the categories of
Web sites that the search engines have already organized for you.
32
The main toolbar is composed of eleven different buttons. Each of these buttons has a different
function and purpose in Internet Explorer. The individual buttons will each be discussed in the
following sections.
1. The Back Button: This button will take you back to whatever document you were previously
viewing. Pressing it immediately takes you back one document. If you have browsed many
pages, or are well into a multi-page document, pressing it repeatedly will continue to back you
up one page at a time. Once you reach your starting location, it will be greyed-out and
unavailable.
2. The Forward Button: This button will take you forward to the next document if you have
previously browsed multiple documents and had then backed-up to the page you are currently
viewing. (If you have not backed up at all, the forward button will be greyed-out) Pressing it
repeatedly will continue to move you forward one page at a time. You can move forward until
you reach the last page that you had browsed, at which time the forward button will be
greyed-out.
3. The Stop Button: The stop button stops ANY current operations by Internet Explorer. It will
stop any type of file from loading. It can also be used to stop animations from continuing once
a page is loaded. If you press it before a page has finished loading, the page will display
everything it had finished loading before the stop button was pressed. If a document is
completely loaded and there are no animations, movies, or other files still running, the stop
button will have no immediate function.
4. The Refresh Button: This button will reload the current document that you are viewing. It is
useful if the page updates very frequently so that you can view these changes as soon as
they are available. If you are loading a document and the transfer was interrupted, you can
reload the full document again by clicking here.
5. The Home Button: This button will return you to the page you have selected as the default
start-up page for Internet Explorer. It will not take you back to the beginning of your web
browsing; it will just return you to your home location from where you are. If you press back
after reaching your home page, you will go back to the page you left after you hit the Home
button.
6. The Search Button : This button will take you to the page you have selected as the default
Web search page for Internet Explorer. If you have not selected a page it will take you to
Microsoft's default search page.
7. The Favorites Button : This button will open up the Favorites menu. You can choose a
favourite that you wish to go to from the list, add a favourite to the list, or organize your
favourites from this menu.
8. The Print Button: The print button will bring up a Print dialog box. In the box you can decide
if you would like to print the contents of the page you are viewing, how many pages you will
print, and also how many copies you will print. Keep in mind that if you try to print a page that
33
is graphics intensive, you will need a printer that is capable of printing graphics. Also, the
more graphics and pages a Web site has, the longer it will take to print.
9. The Font Button: Pressing this button causes Internet Explorer to cycle through the
available font sizes. This button is useful if the text is too small to read, or too large to fit
comfortably in the window.
10. The Mail Button: This button will open into a drop down menu from which you can select to
read or send E-Mail. You can also open up your newsgroups from this menu.
11. The Edit Button: This button will ONLY be on your toolbar if you have a Windows system
Web editor (such as Microsoft Frontpage or Microsoft Word) installed on your computer. If
you press this button, it will launch that editor and open the document you are currently
viewing in it.
4. Navigate to the folder where you want to save the webpage. By default, webpages are saved
in the Documents folder.
5. Type a new name in the File name box if you want to change the name.
• To save all the files associated with the page, including graphics, frames, and style
sheets in their original format, select Webpage, complete.
• To save all information as a single file, select Web Archive, single file (*.mht).
• To save just the current HTML page, without graphics, sounds, or other files,
select Webpage, HTML only.
• To save just the text from the current webpage, select Text File.
7. Click Save.
34
Your home page is the first page you see when you start Internet Explorer (IE). Change your home
page to make surfing the Web easier and more convenient.
For example, if you want to start each Internet session with Bluebridge.co.za,
http://www.bluebridge.co.za should be your home page. If you like to check the weather every time
you log on, you might prefer http://www.weather.com as your home page.
• Choose Tools Internet Options from the IE menu bar. The Internet Options dialog box
opens.
• Type a new URL in the home page section of the General tab.
• Click OK.
OR
• If you like the current page and want to set it as your new home page, click the Use Current
button.
35
• The Use Blank button sets a blank page as your home page. This option is beneficial to
those who don't want to begin each Internet session waiting for a home page to load.
• Click OK.
36
TOOLBARS
Internet Explorer features customizable toolbars to help you navigate the Web. Below are the
toolbars featured in IE 5.
The Standard buttons bar displays commonly used buttons such as the Back, Forward, Stop,
Refresh, Home, Search, Favourites, History, and Print buttons.
The Address bar displays the address, or URL, of the web page you are currently visiting.
Type new URLs or search terms into the Address bar.
The Radio bar, available when Windows Media Player is installed, includes a radio station
guide and control button such as "play" and "volume."
Internet Explorer's Status bar and Explorer bar offer additional web navigation methods.
37
The Status bar, located at the bottom of the IE window, indicates when a web site is found,
loading, waiting for reply, or if you have a secure connection. It is always a good idea to display
the Status bar, particulary for security reasons discussed in Unit 4.
The Explorer bar is a sidebar located in the left side of the IE window. It's a convenient way of
accessing the Favourites list, History list, and Search function.
In newer versions of Internet Explorer, you can show and hide the toolbars, Status bar and Explorer
bar.
38
OR
• Right-click the toolbar and click to clear or show the checkmark for each item.
OR
• Click button again to hide the Explorer bar or click the X in the upper right corner or the
Explorer bar.
CUSTOMIZING TOOLBARS
In newer versions of Internet Explorer, you can move and resize the toolbars.
To move a toolbar:
39
To resize a toolbar:
You can further customize the Standard button toolbar by adding or removing Standard buttons.
You can even change the appearance of your buttons.
• In either scroll box, click to select a button you would like to add or remove.
40
• With the Customize Toolbar dialog box open, click the Text Options drop down box to
select No text labels, Show text labels, and Selective text on right.
• With the Customize Toolbar dialog box open, click the Icon Options drop down box to
select Small icons or Large icons.
41
42
43
6. Click on "Apply".
7. Click on "Ok".
44
45
OR
• Choose View Explorer bar History or click the History button on the toolbar.
(Ctrl + H)
• The Explorer bar opens and the History list appears in the left side of the window.
• Click the History button again to hide the Explorer bar's History list.
OR
46
• In the History area, change the number of days that the History list keeps track of your
pages.
• Click the Clear History button to clear your history and temporarily free up disk space on
your computer.
47
Activity
• Practice moving a toolbar using one of the methods described in this lesson.
• Add two new buttons to the toolbar.
• Remove any button you don't use regularly.
• Change button icons from large to small.
• Set a new home page
• Make sure the toolbar is customized to suit your needs.
48
The browser allows the user to navigate the webpage. For example we want to visit UN home page.
UN web address is http://www.un.org. Locate address bar (indicated with red arrow) now type in the
full web page address into the browser and click GO button at the end of the address bar. Now the
page will start loading, depending on how fast your computer and connection to the internet the page
may appear very quickly or by piece by piece. Once on the UN home page let click on the
word "WELCOME", now the browser is loading another page.
49
BOOKMARKING A SITE
Bookmarking a web page for future reference can be a time saver. Once a web page has been added
to your Favorites simply click Favorites in the browser top menu bar or the Favorites icon at the top of
the browser window, navigate to the bookmarked page you wish to visit and click the shortcut in the
Favorites list.
• A Favourites list appears. You may need to click the double arrow at the bottom of the list to
expand your choices.
• Choose View Explorer bar Favourites or click the Favourites button on the toolbar.
• Click the Favourites button again to hide the Explorer bar. (Ctrl + I)
OR
50
ADD TO FAVOURITES
To add to Favourites using the IE menu bar:
• Go to the page you want to add to your Favourites. For example: http://www.google.com
• The page title appears in the Name text box. For example: "Blue Bridge Computer Training."
Change the page title if you wish. For example, "Blue Bridge" may be adequate.
51
• The page title appears in the Name textbox. Rename the page if you wish.
SAVING PICTURES
It's easy to return to previously visited web pages using tools such as Favourites and History. You can
also save specific pictures, text, or links from web pages for later reference.
To save pictures:
• Right-click the item you want to save. The shortcut menu opens.
• The default save location is My Pictures. Click the Save in drop down box arrow to navigate
to a new save location.
• Click Save.
52
To edit wallpaper:
• Choose Start Settings Control Panel.
• Double-click the Display icon to open the Display Properties window.
• Click the Background tab and adjust image settings.
• Choose Edit Copy from your web browser's menu bar or right-click the text and choose
Copy from the shortcut menu.
53
• Choose Edit Paste from the menu bar or right-click and choose Paste from the shortcut
menu to paste the text into the document of choice (for example, a Word document).
EMAILING LINKS
While surfing the Internet, you may come across an interesting site you want to share with friends or
family. There are several different methods of sending a web page via email.
• Right-click the body of the email message, and choose Paste from the shortcut menu.
Some web pages include a "Tell A Friend" or "Email this Article" feature. This may be convenient,
but you may want to be wary of who you give your email address to.
OR
54
You need to specially configure your e-mail programme for the send a link in email method to
work.
55
WORK OFFLINE
You can revisit useful web sites whether or not you have an Internet connection available. Using the
Work Offline feature, you can view web pages without connecting to the Internet.
56
In this section we shall look at how to use Google and Yahoo search engines.
Step 1: Go To Google
Obviously, to search Google, you have to go to Google. There are a number of ways of getting to
Google. The common one is to go directly to Google.com by typing in http://google.com into your web
browser. That will take you to the main Google web site.
A faster way to use Google is to enter a search into the search box that’s built into most popular
browsers. Microsoft’s Internet Explorer, Apple’s Safari and Mozilla’s Firefox have little boxes in the top
right corners where you can type what you’re searching for, hit return, and the search results will load
into your browser:
Note that Internet Explorer may be already set to use Microsoft’s Bing search engine rather than
Google, if you type into the search toolbar. This is easily changed.
Actually searching Google is pretty easy. Just type what you’re interested in finding into the search
box on the Google web site or into your toolbar! If you’re using a toolbar, as you type, you may see
words begin to appear below the toolbar’s search box. These are suggestions that Google thinks may
match what you’re interested in. Google calls this “Google Suggest” or “Auto complete.” You can
ignore the suggestions, but if one seems useful, select it to save some typing. On Google itself, you’ll
not only get suggestions but as you type, actual search results will begin to load:
57
The search can be done either using a simple or a complex search. Complex search means the use
of common logical operators such as AND, OR, AND NOT, as well as the use of a wild card like ‘*’. At
least one operator should be included in a complex search.
After you’ve searched, you’ll get a page full of results. Some of these will be matching pages from
across the web. Some of these will be matching content from those subject-specific versions of
Google that were mentioned above. You might get news or image results mixed in. You may also see
adverts that appear above or to the right of the main search results. The main search results are not
sold, and Google says they are not influenced by advertising. Google keeps the ads separated from
those results and labeled with the word “Ad” or “Ads,” as the arrows point to in the example above.
58
As you review results, you’ll wonder if some of the listed sites are the best answer to what you’re
looking for. Google provides a way to quickly check on this. It’s called Google Instant Previews.
Next to the web page listings, you’ll see a magnifying glass symbol appear:
Click on this, and you’ll make a preview of the page for that listing appears:
59
You can get back just video answers, restrict results by date, explore answers by browsing through a
“Wonder Wheel” of suggestions or simple review some of the related searches it may list among your
results, like these examples from a search for DVD players:
60
1. Visit the "Yahoo" website provided to you in the Sources section of this article.
2. Enter search terms into the "Search" box for that related to the content and data you want to
find.
Be specific as possible when entering keywords. This can help narrow down your search
results and provide you with the exact information you are looking for. For example, if you
want to learn about dog grooming methods for a poodle, enter "best methods for grooming a
poodle" instead of a basic phrase such as "dog grooming."
3. Click on the "Search" button to begin your search.
4. Review your search results. Yahoo will provide you with a list of relevant websites and articles
that match the keywords you entered into the search box.
Click on the "Next" button at the bottom of any Yahoo search results page to see more
websites and links that match your search criteria.
1. Filter your search results by time. You can refine your search results to see content based on
when it was published to the web.
2. Navigate to the left side of your search results, and then indicate whether you want to see
results from the past day, past week, or past month by clicking on the correct option.
Filter search results by category. This can be helpful if you are searching for content within a
specific category. For example, if you want to watch videos about "blogging tips," you can
choose just to have results displayed for videos that feature blogging tips.
• Click on any of the category tabs displayed above your search results to refine your
search. Your options will include images, video, shopping, blogs, news, recipes,
sports, and more.
3. Use Yahoo's suggestions for different keywords. At the top and bottom of your Yahoo search
results pages, you will see suggested keyword combinations next to "Also try," which can help
display results that are more relevant to the content you seek.
• Click on any of the keyword combinations provided next to "Also try" to display new
search results based on those specific keywords.
61
Most websites allows the user to download certain documents, music and graphics. Downloading is
the process of copying a file (such as a game or utility) from a website to a computer or external
storage device.
DOWNLOADING A FILE
The following are the generic steps of downloading a file.
1. Click on the download link for the programme you want to download. Many sites offer multiple
download links to the same programme, and you only need to choose one of these links.
2. You may be asked if you want to save the file or run it from its current location. If you are
asked this question, select "Save." If not, don't worry -- some browsers will automatically
choose "Save" for you.
3. You will then be asked to select the folder where you want to save the programme or file,
using a standard "Save As" dialog box. Pay attention to which folder you select before clicking
the "Save" button. It may help you to create a folder like "C:\Download" for all of your
downloads, but you can use any folder you'd like.
4. The download will now begin. Your web browser will keep you updated on the progress of the
download by showing a progress bar that fills up as you download. You will also be reminded
where you're saving the file. The file will be saved as "C:\Download\dweepsetup.exe" in the
picture below.
Note: You may also see a check box labeled "Close this dialog box when download
completes." If you see this check box, it helps to uncheck this box. You don't have to, but if
you do, it will be easier to find the file after you download it.
62
5. Depending on which file you're downloading and how fast your connection is, it may take
anywhere from a few seconds to a few minutes to download. When your download is finished,
if you left the "Close this dialog box when download completes" option unchecked, you'll see
a dialog box like this one:
6. Now click the "Open" button to run the file you just downloaded. If you don't see the
"Download complete" dialog box, open the folder where you saved the file and double-click on
the icon for the file there.
63
What happens next will depend on the type of file you downloaded. The files you'll download
most often will end in one of two extensions. (An extension is the last few letters of the
filename, after the period.) They are:
o .EXE files: The file you downloaded is a programme. Follow the on-screen
instructions from there to install the programme to your computer and to learn how to
run the programme after it's installed.
o .ZIP files: ZIP is a common file format used to compress and combine files to make
them download more quickly. Some versions of Windows (XP and sometimes ME)
can read ZIP files without extra software. Otherwise, you will need an unzipping
programme to read these ZIP files. Common unzipping programmes
are WinZIP, PKZIP, and BitZipper, but there are also many others. Many unzipping
programmes are shareware, which means you will need to purchase them if you use
them beyond their specified trial period.
2. Open "Find" in the Edit Menu (CTRL +F.) The Find dialogue will open above the Notepad
window.
3. Type "mp3" into the "Find What" box. Click on the "Find Next" button. Notepad will highlight
the phrase (you may have to move the dialogue box.) It should part of a URL address. If you
don't find it, try different music formats (".wav," ".aif".)
4. Copy the entire URL linking to the sound file and paste it into the address window. The song
will load into Windows Media Player. Wait for it to play completely.
5. Save the file to your hard drive. Choose "Save Media As..." from the File Menu. Use the file
browser to navigate to your music folder to save the file.
64