Internet Terms Concepts

Download as pdf or txt
Download as pdf or txt
You are on page 1of 65

lOMoARcPSD|27347607

Internet terms & concepts

End-User Computing (Management College of Southern Africa)

Studocu is not sponsored or endorsed by any college or university


Downloaded by alex mbatha (udeconsultants@gmail.com)
lOMoARcPSD|27347607

Internet terms & concepts

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Table of Contents
Table of Contents ............................................................................................................................... 2
Introduction to Internet Basics ............................................................................................................. 3
Lesson 1 - What is the Internet? ........................................................................................................... 3
Lesson 2 – Internet terms & concepts ............................................................................................. 6
Lesson 3 – web browsers .................................................................................................................... 12
Lesson 4 – Search engines .................................................................................................................. 17
Lesson 5 – legal and ethical issues in relation to internet use ................................................... 20
Lesson 6 – Connecting to the internet........................................................................................... 28
Lesson 7 – customising the view and preferences of a browser ............................................... 37
Lesson 8 – Navigate on the internet ................................................................................................... 49
Lesson 9 – Using the search engine .................................................................................................... 57
Lesson 10 – Obtaining information from a website ............................................................................ 62

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Introduction to Internet Basics


Do you want to learn about the Internet and World Wide Web? Are you interested in learning about
modems, web browsers, Internet Service Providers, and more? This module introduces all the
important concepts you’ll need to be surfing the web in no time.

Lesson 1 - What is the Internet?

A Brief History of the Internet


In 1969, the US Department of Defense started a project to allow researchers and military
personnel to communicate with each other in an emergency. The project was called ARPAnet
and it is the foundation of the Internet.

Throughout the 1970's, what would later become the Internet was developed. While mostly
military personnel and scientists used it in its early days, the advent of the World Wide Web in
the early 1990's changed all that.

Today, the Internet is not owned or operated by any one entity. This worldwide computer network
allows people to communicate and exchange information in new ways.

According to www.commerce.net, in April of 1999, there were 92.2 million Internet users over the
age of 16 in the United States and Canada. By 2005, it is predicted 75% of the total US
population will be online.

INTERNET IN SOUTH AFRICA

The Internet in South Africa commenced when the first sustainable e-mail link was established in
1988 between Rhodes University in Grahamstown and a private home in Portland, Oregon.48 This link
was later connected to the Internet. At about the same time the Foundation for Research and
Development started the Universities Network (Uninet). Before that, around 1986, there were two
networks between South African universities: one between Rhodes University, the University of Cape
Town and the University of Natal in the south, and another between Potchefstroom University, Wits,
the University of Pretoria and the CSIR in the north.

Other universities soon joined as a result of Uninet and later the two networks were connected to
each other. But in 1989 access to the world-wide Internet was restricted because of the political
situation in South Africa.

WHAT IS THE INTERNET?

The Internet is the largest computer network in the world, connecting millions of computers. A
network is a group of two or more computer systems linked together.

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

BENEFITS OF THE INTERNET


There are many advantages of using the Internet, such as :

• Global Audience

Content published on the World Wide Web is immediately available to a global audience of
users. This makes the World Wide Web a very cost-effective medium to publish information.
Reaching more than 300 countries.

• Operates 24 hours, 7 days a week


The internet is accessible 24 hours a day. Meaning a user does not have to wait until it’s
available. The fact that the Internet is operational at all times makes it the most efficient
business machine to date.

• Relatively Inexpensive
It is relatively inexpensive to publish and retrieve information on the Internet. At a fraction of
the cost to publish information by traditional methods, various organisations and individuals
can now distribute information to millions of users. It costs only a few thousand rands to
establish an Internet presence and publish content on the Internet.

• Product Advertising
The World Wide Web can be used to advertise various products. Before purchasing a
product, customers will be able to look up various product specification sheets and find out
additional information. That is, the beauty of the Web is that it allows customers to explore
products in as much detail as they desire. If the client just wants a general overview, he or
she can look at the advertising information. For those wanting more in depth information, you
can provide white papers and product descriptions for download. The Web allows a business
to provide timely information, you can simply place the information on the Web page and it is
available immediately for your customers.

• Online Surveys
Traditional methods of performing surveys are often relatively slow and expensive compared
to online surveys conducted on the Internet. For example, in order to fill out various needs of
customers or what they would like to see in a future product, it's often necessary to compile a
list of address and mail a questionnaire to many customers. The success of such an attempt
is not always guaranteed and can be very costly in terms of mailing the questionnaires and
entering responses to a databases and analyzing it. On the other hand, you can use the
World Wide Web to automate the whole process.

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

• Announcements
With the World Wide Web, you can distribute various announcements to millions of users in a
timely manner. Because there is virtually no time lag from the time it takes to publish
information to making the information available to users, the Web is an ideal medium to
publicize announcements. As more people discover the virtues of the Web and get connected
to the Internet, the Web will become the medium of choice for many organizations and
individuals to publicize various announcements.

• Multimedia
The capability to incorporate multimedia into Web pages is a major advantage of using World
Wide Web. For example, many Web sites use sounds and video clips to make the content
easier and more interesting to browse.

• Formatting Capabilities
Content published on the World Wide Web can be richly formatted by using various HTML
tags and graphic formats. The capability to do this is a major reason for the success of the
World Wide Web. In addition to using HTML tags and various multimedia formats in Web
pages, various interactive controls can also be added to a web page. This capability allows
Web site content developers to create "active" Web sites. For example, before a user sends
some information to a Web server for processing, a VBScript or JavaScript subroutine can be
used to verify information typed in by the user. Various formatting capabilities, along with
technologies such as Java and VBScript, make the World Wide Web a richly interactive
medium that you can use to distribute information to millions of users.

DISADVANTAGES OF THE INTERNET


There are certain cons and dangers relating to the use of Internet that can be summarized as:

• Personal Information: If you use the Internet, your personal information such as your name,
address, etc. can be accessed by other people. If you use a credit card to shop online, then
your credit card information can also be ‘stolen’ which could be similar to giving someone a
blank check.
• Pornography: This is a very serious issue concerning the Internet, especially when it comes to
young children. There are thousands of pornographic sites on the Internet that can be easily
found and can be a detriment to letting children use the Internet.
• Spamming: This refers to sending unsolicited e-mails in bulk, which serve no purpose and
unnecessarily clog up the entire system.
• Virus Threat: Most of the viruses came from the internet so be very careful when visiting or
downloading from a site.

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Lesson 2 – Internet terms & concepts

We shall now look at some of the popular terms relating to the internet.

1. THE WORLD WIDE WEB (WWW)


The World Wide Web ("WWW" or simply the "Web") is a
global information medium which users can read and write
via computers connected to the Internet. The term is often
mistakenly used as a synonym for the Internet itself, but the
Web is a service that operates over the Internet, just as e-
mail also does.

The WWW was built on the technology called Hypertext. This technology increases accessibility to
linked documents on the Internet and helps user to navigate between documents very easily.
Hypertext is identified by underlined text and a different colour usually. Some places will refer to this
types of technique as Jump-Off Points. Hypertext can make links within the same document or to
other documents.

Each time one access a new document by choosing a link, there is a connection made with the web
server that the document is on. Once the appropriate document is retrieved the connection is broken.
There is no point in maintaining the link while you are viewing it. This is one reason why the WWW is
so efficient.
WWW lets you search, traverse, and use many types of information at numerous sites and in multiple
forms. This interface is called a browser. Some people refer to a browser as a 'web browser' often
these terms are used interchangeably.

The WWW is intended to help people share information resources, and services with the widest
possible community of users. Thus a user can access the WWW on Apple, UNIX, Macintosh, DOS,
Windows, and other operating systems.

Just like the Internet, the WWW has a protocol, which is known as HyperText Transfer Protocol
(HTTP). HTTP acts as an interface between a Web Client Software, such Netscape Navigator.

A major advantage of the WWW is that it also supports TCP/IP services, such as Gopher, FTP, and
Archie in addition to HTTP.

2. UNIFORM RESOURCE LOCATOR (URL)

Uniform Resource Locator (URL) it is the global address of documents and other resources on
the World Wide Web. The first part of the URL is called a protocol identifier and it indicates what
protocol to use and the second part is called a resource name and it specifies the IP address or

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

the domain name where the resource is located. The protocol identifier and the resource name are
separated by a colon and two forward slashes. The Uniform Resource Locator (URL) was developed
by Tim Berners-Lee in 1994 and the Internet Engineering Task Force (IETF) URI working group.
For example, the two URLs below point to two different files at the domainpcwebopedia.com. The first
specifies an executable file that should be fetched using the FTP protocol; the second specifies a Web
page that should be fetched using the HTTP protocol:

ftp://www.pcwebopedia.com/stuff.exe
http://www.pcwebopedia.com/index.html

A URL is one type of Uniform Resource Identifier (URI); the generic term for all types of names and
addresses that refer to objects on the World Wide Web.
The term "Web address" is a synonym for a URL that uses the HTTP / HTTPS protocol.

URL

Every web page on the Internet has its own unique web address. A web address is split into 3 parts:

http://www.sanscrip.com/training/compform.htm
http:// www.sanscrip.com /training/compform.htm

I. Protocol: this tells Internet Explorer the type of transmission it is dealing with -
http stands for hypertext transfer protocol. If you open a file from your hard disk, the
protocol part with show file:// instead.

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

II. Domain name: this is the name of the web site where the web page resides - most
companies have their own domain name these days.
III. Page address: this identifies the actual file that is displayed.

Useful Tip

Every web site has a page that is called the index page. If you omit the page address, the
Home page for that particular web site is displayed. If no page address is shown in the
Address bar, you are viewing the index page of a web site.

3. HYPERTEXT TRANSFER PROTOCOL (HTTP)

Hypertext transfer protocol (HTTP) is a communications protocol that


transfers information on intranets and the World Wide Web to retrieve
and publish hypertext pages. The hypertext transfer protocol is in place to
send out the message that a particular web browser is looking for the
particular web page at the address that follows the HTTP in the address
bar of the web browser window. Yet the actual process of HTTP and the
request it makes is much more complicated than what any visitor to a website actually sees.

When the HTTP goes out, it is a response or request protocol between a client and a server to access
a certain resource, which may be a web page or other graphic stored in the server as files. The client
can be a number of things, such as a web browser, a search engine spider, or any other end-user
tool, while the server is a storage area for a particular set of HTML files and images. The user agent,
as the client is called, uses the hypertext transfer protocol to communicate with the server, which is
also called the origin server. Between the user agent and the origin server there may also be many
intermediary processes such as proxies, gateways, and tunnels, all of which work together to finish
the transfer of information to the end user. The HTTP request sends a URL to the server for a file (a
web page, an image, or another type of file) stored there. The URL is then sent back to the end user.

4. INTERNET SERVICE PROVIDER (ISP)

ISP refers to a company that provides Internet services, including


personal and business access to the Internet. For a monthly fee,
the service provider usually provides a software package,
username, password and access phone number. Equipped with
a modem, a user can then log on to the Internet
and browse the World Wide Web and USENET, and send and

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

receive e-mail. For broadband access you typically receive the broadband modem hardware or pay a
monthly fee for this equipment that is added to your ISP account billing.

In addition to serving individuals, ISPs also serve large companies, providing a direct connection from
the company's networks to the Internet. ISPs themselves are connected to one another
through Network Access Points (NAPs). ISPs may also be called IAPs (Internet Access Providers).

5. FILE TRANSFER PROTOCOL (FTP)

File Transfer Protocol, or FTP, is a protocol


used for transferring files from one computer to
another - typically from your computer to a web
server. FTP is the preferred method of
exchanging files because it's faster than other
protocols like HTTP or POP. If you need to
exchange large files, you should consider FTP.

FTP data is sent and received through


computer port 21 and under the TCP protocol.
The transfer is asynchronous, meaning not at the same time and therefore faster than other protocols.

Objectives of FTP are:

• to promote sharing of files (computer programmes and/or data),


• to encourage indirect or implicit (via programmes) use of remote computers,
• to shield a user from variations in file storage systems among hosts, and
• To transfer data reliably and efficiently.

6. HYPERLINK

A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a new
section within the current document. Hyperlinks are found in nearly all Web pages, allowing users to
click their way from page to page. Text hyperlinks are often blue and underlined, but don't have to be.
When you move the cursor over a hyperlink, whether it is text or an image, the arrow should change
to a small hand pointing at the link. When you click it, a new page or place in the current page will
open.

Hyperlinks, often referred to as just "links," are common in Web pages, but can be found in other
hypertext documents. These include certain encyclopedias, glossaries, dictionaries, and other
references that use hyperlinks. The links act the same way as they do on the Web, allowing the user
to jump from page to page. Basically, hyperlinks allow people to browse information at hyperspeed.

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Hyperlink

File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to
another host over a TCP-based network, such as the Internet. It is often used to upload web pages
and other documents from a private development machine to a public web-hosting server. FTP is built
on a client-server architecture and uses separate control and data connections between the client and
the server.[1] FTP users may authenticate themselves using a clear-text sign-in protocol, normally in
the form of a username and password, but can connect anonymously if the server is configured to
allow it. For secure transmission that hides (encrypts) your username and password, as well as
encrypts the content, you can try using a client that uses SSH File Transfer Protocol.

The first FTP client applications were interactive command-line tools, implementing standard
commands and syntax. Graphical user interfaces have since been developed for many of the popular
desktop operating systems in use today,[2][3] including general web design programmes like Microsoft
Expression Web, and specialist FTP clients such as CuteFTP.

7. INTERNET CACHE

The Internet Cache Protocol (ICP) is a protocol used for coordinating web caches. Its purpose is to
find out the most appropriate location to retrieve a requested object from in the situation where
multiple caches are in use at a single site. The goal is to use the caches as efficiently as possible, and
to minimize the number of remote requests to the originating server.

10

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

8. COOKIES
A cookie is information that a Web site puts on
your hard disk so that it can remember something
about you at a later time. (More technically, it is
information for future use that is stored by
the server on the client side of
a client/server communication.) Typically, a cookie
records your preferences when using a particular site.
Using the Web's Hypertext Transfer Protocol (HTTP),
each request for a Web page is independent of all
other requests. For this reason, the Web page server has no memory of what pages it has sent to a
user previously or anything about your previous visits. A cookie is a mechanism that allows the
server to store its own information about a user on the user's own computer. You can view the
cookies that have been stored on your hard disk (although the content stored in each cookie may not
make much sense to you). The location of the cookies depends on the browser. Internet Explorer
stores each cookie as a separate file under a Windows subdirectory.

Cookies are commonly used to rotate the banner adverts that a site sends so that it doesn't keep
sending the same adverts as it sends you a succession of requested pages. They can also be used to
customise pages for you based on your browser type or other information you may have provided the
Web site. Web users must agree to let cookies be saved for them, but, in general, it helps Web sites
to serve users better.

Activity 2

Match the correct term with its definition.


___1. Web
A. The system of electronically linking words or pictures
Browser
to other words or pictures
B. The system for transferring web documents over the
___2. Hypertext
Internet.
C. Also called a Web address.
___3. HTTP

D. The formatting language used to create web


___4. URL documents.

E. Software used to surf the web, such as Internet


___5. HTML Explorer or Netscape.

11

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Lesson 3 – web browsers

A web browser is a software application for retrieving, presenting, and traversing information
resources on the World Wide Web. An information resource is identified by a Uniform Resource
Identifier (URI) and may be a web page, image, video, or other piece of content. Hyperlinks present in
resources enable users easily to navigate their browsers to related resources. A web browser can
also be defined as an application software or programme designed to enable users to access, retrieve
and view documents and other resources on the Internet.

Although browsers are primarily intended to access the World Wide Web, they can also be used to
access information provided by web servers in private or files in file systems. The major web browsers
are;

• Firefox,

• Google Chrome,

• Internet Explorer,

• Opera, and

• Safari

FEATURES OF A WEB BROWSER


Outlined below are the main features of Microsoft Internet Explorer and what they do, your web
browser may be slightly different from Microsoft Internet Explorer but the main features are likely to be
the same.

The Browser Window

12

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

The above screenshot shows the Microsoft Internet Explorer browser window - the main part of the
window is taken up by the web page. If you wish to learn how to navigate around a web page please
visit the Navigation section of this tutorial.

The web browser has various tools located above the displayed web page, these are known as
Toolbars, there are additional tools available on the left hand side of the browser called the Explorer
bar, and at the bottom of the web page is the status bar.

We will start by looking at the tool-bars, as you will see when looking at the toolbars there operation is
inter-linked with the Explorer bar.

1. Menu Bar

The Menu bar is normally located at the very top of the web browser, as you can see it has
various sections - File, Edit, View, Favorites, Tools and Help, when you left click on each of
these sections a drop down menu appears enabling you to do various actions as follows.
(Note that not all functions are mentioned - some functions are not normally required when
navigating the world wide web - however the major functions are all discussed.)

2. File - The file menu deals with the current open document, from here you can open a new
document such as another web page, save the web page, alter the page set-up, print the
web page, send the web page by email and find out the properties of the web page.

13

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

3. Edit - The edit page enables you to copy details from a web page to your clipboard (The clipboard
saves the details so you can paste the copied material into another document). The edit section also
allows you to find (on this page) - this allows you to look for a certain word on a web page.

4. View - The view section enables you to change some browser settings; you can select what
toolbars you wish to display. For example you can decide not to show the radio toolbar if you don’t
use it. From this section you can also amend the text size of the web page.

5. Favorites - From here you can create a list of favourite web sites, the chances are that your
Internet Service Provider has already given you a starting list of web sites; If you wish to add more to
your favorites you can do it simply in this section.

6. Tools - The tools section provides some other useful tools, one of the most important sections here
is the Internet Options - from this area you can control your security settings.

7. Help - The help sections gives you various help functions and version details.

8. Standard Buttons

The next toolbar is the Standard Buttons toolbar and it should look like the above. Going from Left to
Right the functions are:-

9. Left pointing arrow - This will move you to the web page previously visited, if you select the down
arrow next to this a list will appear of the previously visited pages - you are able to select any of these
pages.

10. Right Pointing arrow - This will move you forward a web page if you have moved back.

11. The X button - This will stop the current web page from being downloaded.

12. The Revolving Arrows - This will download the current web page again, in case it has not
download properly or it may have been updated (EG A page displaying latest sports scores)

13. The Picture of a House - This will take you to your home page.

14. The Favorites button - This will open the Explorer bar to the left of the web browser - the
explorer bar will contain your favourites.

14

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

15. History - This will open the History of the browser in the Explorer bar. It will include previously
visited web sites to enable you to go back to them.

16. The Address Bar

The address bar details what page on the Web or even your local computer is being displayed. The
address bar is the quickest way to navigate to a website if you know the website address. Simply type
in the address and click the go button.

17. The Links Bar

The Links Bar operates similar to your favorites option and provides a direct link to some websites -
management of the links bar can be controlled through the favorites drop down menu.

15

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

18. The Radio Bar

The Radio Bar allows you to access online radio stations and play music through the internet.

So that is what basically makes up a web browser, as mentioned early there is also a status bar, this
is located at the bottom of the web page and currently you should be able to read text that says
"Happy Online". The status bar can display various messages; it is most useful when you are
following links on a web page. As you know when you point at a link your mouse pointer changes to a
hand, if you look at the status bar the web address where the link goes should appear. (However be
careful web programmemers can code the status bar to do other things!)

IMPORTANCE OF WEB BROWSERS


The following are the benefits of web browsers

1. Speed

A browser should be able to quickly load WebPages, no matter how dynamic the content. “Over 65%
of today’s Web content is made up of images and videos. Over 35 hours of video is uploaded to
YouTube every minute. This is a far cry from text-based Web pages of the past. As the web becomes
more interactive, so should the browser evolve to handle the increased amount of data going through
it.”
Speed and stability is particularly important for people given their Internet activities. According to a
research, People engage in heavy web applications, as 99% watch videos online, 61% upload videos,
and 85% upload photos. The study, which conducted the survey in 30 countries, cited that Filipinos
are on the top of online photo, video sharing, and social networking activities.

2. Simplicity

A browser should also be simple and easy to use. It shouldn’t take up a lot of screen space, which
would be better saved for the Web page a user is actually trying to view. Google Chrome, for
instance, has stripped away everything but the bare minimum in order to let users focus on web
content and not on the browser itself.

3. Security

Browsers should also be very secure, as malware is a constant threat on the Internet. There are two
ways browsers can mitigate this. A browser can keep itself up to date with the latest security patches
without having to rely on a user to download these patches every time vulnerability needs to be
addressed. With Google Chrome, for instance, a user always gets the latest version on his machine,
automatically.

16

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Lesson 4 – Search engines

Search engines are programmes that search documents for specified keywords and returns a list of
the documents where the keywords were found. A search engine is really a general class of
programmes; however, the term is often used to specifically describe systems

Typically, Web search engines work by sending out a spider to fetch as many documents as possible.
Another programme, called an indexer, then reads these documents and creates an index based on
the words contained in each document. Each search engine uses a proprietary algorithm to create its
indices such that, ideally, only meaningful results are returned for each query.

How is document relevancy determined?


Once a search engine has found documents in its database that relate to your input, it will list them
according to their relevance. The questions is now, how is this relevancy determined? The algorithm,
a list of procedures and factors, is different from company to company. Sometimes they are described
on the search engines pages, but mostly they are kept behind the curtain.

TYPES OF SEARCH ENGINES

Type Search Engine Description

Google - The world's most popular search engine.

Bing Search: Microsoft's entry into the burgeoning


search engine market. Better late than never.

Yahoo! Search: The 2nd largest search engine on


the web (as defined by a September 2007 Nielsen
All- Netratings report.
Purpose
Search AltaVista: Launched in 1995, built by researchers at
Engines Digital Equipment Corporation's Western Research
Laboratory. From 1996 powered Yahoo! Search,
since 2003 - Yahoo technology powers AltaVista.

Cuil: Cuil was a search engine website (pronounced


as Cool) developed by a team of ex-Googlers and
others from Altavista and IBM. Cuil, termed as the
'Google Killer' was launched in July, 2008 and
claimed to be world’s largest search engine, indexing
three times as many pages as Google and ten times

17

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

that of MS. Now defunct.

Excite: Now an Internet portal, was once one of the


most recognized brands on the Internet. One of the
famous 90's dotcoms.

Go.com: The Walt Disney Group's search engine is


now also an entire portal. Family-friendly!

HotBot was one of the early Internet search engines


(since 1996) launched by Wired Magazine. Now, just
a front end for Ask.com and MSN.

AllTheWeb: Search tool owned by Yahoo and using


its database, but presenting results differently.

Galaxy: More of a directory than a search engine.


Launched in 1994, Galaxy was the first searchable
Internet directory. Part of the Einet division at the
MCC Research Consortium at the University of
Texas, Austin

search.aol: Now powered by Google.

Live Search (formerly Windows Live Search


and MSN Search) Microsoft's web search engine,
designed to compete with Google and Yahoo!.
Included as part of the Internet Explorer web
browser.

Lycos: Initial focus was broadband entertainment


content, still a top 5 Internet portal and the 13th
largest online property according to Media Metrix.

GigaBlast was developed by an ex-programmer


from Infoseek. Gigablast supports nested Boolean
search logic using parenthesis and infix notation. A
unique search engine, it indexes over 10 billion web
pages.

Alexa Internet: A subsidiary of Amazon known more


for providing website traffic information. Search was
provided by Google, then Live Search, now in-house
applications run their own search.

18

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

ADVANTAGES AND DISADVANTAGES OF SEARCH ENGINES

There are three very compelling advantages of most search engines.

1. The indexes of search engines are usually vast, representing significant portions of the
Internet, offering a wide variety and quantity of information resources.

2. The growing sophistication of search engine software enables us to precisely describe the
information that we seek.

3. The large number and variety of search engines enriches the Internet, making it at least
appear to be organized.

On the other hand, disadvantages

1. Regardless of the growing sophistication, many well thought-out search phrases produce list
after list of irrelevant web pages. The typical search still requires sifting through dirt to find the
gems.

2. Using search engines does involve a learning curve. Many beginning Internet users, because
of these disadvantages, become discouraged and frustrated.

19

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Lesson 5 – legal and ethical issues in relation to internet


use

The government of South Africa has passed a number of legislations to govern the internet. For the
purposes of this module we shall discuss the following;
• Electronic communications and transactions act. 2002
• Regulation of interception of communications and provision of communication-related
information act, 2002
• Constitution of South Africa

1. ELECTRONIC COMMUNICATIONS AND TRANSACTIONS ACT. 2002


The overall objective of the Act is to enable and facilitate electronic transactions by creating legal
certainty around transactions and communications conducted electronically.
The Act seeks to address the following policy imperatives:
• bridging the digital divide by developing a national e-strategy for South Africa;
• ensuring legal recognition and functional equivalence between electronic and paper-based
transactions;
• promoting public confidence and trust in electronic transactions; and
• Providing supervision of certain service providers.

Let’s look at some of the key areas of the ACT

1. Facilitating electronic transactions


Part 1 provides for the legal recognition of data messages and records. Electronic data will, subject to
certain conditions, be permitted to be retained for statutory record retention purposes, will be
regarded as being ‘‘in writing’’, and as a true copy of an ‘‘original’’ record, and provision is made for
securing proper evidentiary weight of electronic evidence.

Part 2 deals with the rights and obligations that follow from the communication of data messages. The
Act also provides for the validity of sending notices and other expressions of intent through data
messages.

2. Cyber inspectors
Chapter XII of the Act seeks to provide for the Department of Communications to appoint cyber
inspectors. The cyber inspectors may monitor Internet web sites in the public domain and are granted
powers of search and seizure of “information systems”, subject to obtaining a warrant
The Act’s definition of ‘‘information system’’ means a system for generating, sending, receiving,
storing, displaying or otherwise processing data messages and includes the Internet;

20

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Under Section 82. (1) A cyber inspector may, in the performance of his or her functions, at any
reasonable time, without prior notice and on the authority of a warrant issued in terms of section
83(1), enter any premises or access an information system that has a bearing on an investigation

[Amongst other things] He is authorised to:


a. search those premises or that information system;
b. search any person on those premises if there are reasonable grounds for believing that the
person has personal possession of an article, document or record that has a bearing on the
investigation;
c. take extracts from, or make copies of any book, document or record that is on or in the
premises or in the information system and that has a bearing on the investigation;
d. demand the production of and inspect relevant licenses and registration certificates as
provided for in any law;
e. inspect any facilities on the premises which are linked or associated with the information
system and which have a bearing on the investigation;
A person who refuses to co-operate or hinders a person conducting a lawful search and seizure in
terms of this section is guilty of an offence.

3. Cyber crime

Chapter XIII of the Act seeks to make the first statutory provisions on cyber crime in South African
jurisprudence. The Act seeks to introduce statutory criminal offences relating to information systems
and includes—

(a) unauthorised access to data;


(b) interception of or interference with data;
(c) computer-related extortion;
(d) fraud; and
(e) forgery.

Under Section 86. (1) Companies and individual should note that subject to the Interception and
Monitoring Prohibition Act, 1992 (Act No. 127 of 1992), a person who intentionally accesses or
intercepts any data without authority or permission to do so, is guilty of an offence. [You don’t have to
do anything with it, just look!]

A person who unlawfully produces, sells, offers to sell, procures for use, designs, adapts for use,
distributes or possesses any device, including a computer programme or a component, which is
designed primarily to overcome security measures for the protection of data, or performs any of those
acts with regard to a password, access code or any other similar kind of data with the intent to

21

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

unlawfully utilise such item to contravene this section, is guilty of an offence. [Therefore, if you are
given the password to a restricted “pay” website, and you use it, you are breaking the law! ]

2. REGULATION OF INTERCEPTION OF COMMUNICATIONS AND PROVISION OF


COMMUNICATION-RELATED INFORMATION ACT, 2002

RICA regulates the interception of communications, the monitoring of radio signals and radio
frequency spectrums and the provision of communication-related information relating to indirect
communication in the records of telecommunication service providers. It also regulates applications
for interception of communications and provision of communication-related information under certain
circumstances. It regulates law enforcement where interception of communications is involved and
prohibits the provision of telecommunication services which do not have the capability to be
intercepted and requires telecommunication service providers to store communication-related
information (CRI).

The law specifies costs to be borne by telecommunication service providers related to these
requirements and compensation to services providers. It provides for the establishment of interception
centres an Office for Interception Centres and an Internet Service Providers Assistance Fund. Lastly it
prohibits the manufacturing, assembling, possessing, selling, purchasing or advertising of interception
equipment without a certificate of exemption issued by the relevant Minister.

3. CONSTITUTION OF THE REPUBLIC OF SOUTH AFRICA


Section 14 of the Bill of Rights in the South African Constitution of 1996 expressly provide that
"everyone has a right to privacy, which includes the right not to have (...) (d) the privacy of their
communications infringed". The rights in the Bill of Rights may be limited, section 36 of the
Constitution. However, various other provisions in the Bill of Rights indirectly imply a right to safety
and security. If citizens have a right to security, it creates a corresponding duty on the State.

Chapter 11 of the Constitution governs this duty and authorise the Police, Defence Force and
Intelligence Agencies to assist the State in its security obligations.

IMPLICATIONS OF PROVIDING INTERNET ACCESS


In addition to using the Internet, especially the World Wide Web and e-mail for work-related purposes,
employees are also using the Internet for personal use, whether for sending personal e-mail
messages, playing games, downloading pornography, ordering goods online, checking stock prices,
or gambling. Accordingly, many issues have arisen involving employee e-mail and Internet use.

Employers are grappling with how much, if any, personal use of the Internet and e-mail to permit in
the workplace. Employers are also grappling with the question of whether to monitor Internet use and
whether to block access to certain Internet sites.

22

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

In this section, we shall concentrate on implications of providing internet access to employees in


terms of security of information and virus protection.

1. VIRUS AND VIRUS PROTECTION

One of the main disadvantages of providing internet access is viruses and worms. According to
Webopedia, a virus (opens in a new browser window) is a "programme or piece of code that is
loaded onto your computer without your knowledge and runs against your wishes."

Many popular programmes like Microsoft Office appear on different computers in different
households. The likelihood is great that many family members, co-workers, friends, and
neighbours use the same software. And when many people use this software, they begin to share
information through downloading files, trading floppy disks or zip disks, opening e-mail
attachments, displaying Web pages, and file-sharing. They unknowingly open the door to viruses.
• Some viruses are disguised as legitimate computer programmes. Others may use macros
written into popular software products -- like Microsoft Word -- where users can
programmeme certain keystrokes to execute certain commands, or to specify certain
processes to run when documents are opened or closed -- may be written to infect data
files.
• Some viruses do little but duplicate themselves, while others can cause serious damage
or affect programme and system performance.

What is a Worm?
Worms are computer programmes that replicate themselves and often interferes with the normal
operation of a computer, programme, or network. Unlike viruses, worms do not attach to other files or
programmes. Worms tend to spread more rapidly than computer viruses because they often take
advantage of automatic file sending and receiving to spread them over the network from one
computer to the next.

While worms have been known to delete files or send email documents they typically reside in
memory, eat up system resources, and slow down your computer.

What is a Trojan Horse?

No, it's not a horse that you saw in the movie Troy. A Trojan horse is a programme that initially
appears useful and fools a user into running it. It frequently hides in games and other small software
programmes so that when you download it, you unknowingly execute it on your computer. Unlike
viruses, Trojans do not replicate themselves. Rather, they leave behind a programme that can be
contacted by another computer. Trojans have also been known to destroy files on your hard disk. One
example of a Trojan Horse is a programme that claims to find and delete viruses, but instead,
introduce a virus to your computer.

23

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Hoaxes
Many of us have received email chain letters that warn impending viruses. Or they might be disguised
as a promotion that sounds too good to resist.

Hoaxes are scare alerts started by malicious people that are passed on by innocent users who think
they are helping the community by spreading the warning. Do not forward these hoax messages.
There have been many reported cases where e-mail systems collapsed after dozens of users
forwarded false alerts to other users. The best course of action is to merely delete these hoax emails.

Symantec, a global leader in information security, maintains a page on its Web site(opens in a new
browser window) that contains a list of known hoaxes. If you are concerned about a bogus email you
received about a new virus or sales promotion, visit this site to see if it is listed and what it says.

Top 10 Tips to Avoid Computer Worms


1. Keep your operating system and applications, particularly email applications like
Microsoft Outlook or Outlook Express, up-to-date. Get the updates directly from the
vendor.
2. Try to avoid sending or receiving mail that contains attachments.
3. Don't open attachments that reveal a file extension of EXE, VBS, SHS, or PIF.
4. Do not share your folders with other users unless it's necessary.
5. Disconnect your network or modem cable when you're not using your computer - or
just power it down.
6. Do not open attachments or follow Web links received in an email advertisement or
other unsolicited e-mail.
7. Avoid attachments with sexual file names (NUDES.VSB) that entice you to execute
them.
8. Never accept attachments from strangers in online chat systems such as AOL Instant
Messenger.

24

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

9. Avoid downloading files from public newsgroups (Usenet news)


10. Don't trust icons or pictures that are associated with file attachments, like a logo of a
well-known software product.

2. INFORMATION SECURITY
Generally speaking, privacy rights are granted (if at all) by specific laws, rules, or regulations. Some of
those rights apply in the workplace and some don't. And even if there is no specific law, a right to
privacy can be based on the legal common law concept of having a "reasonable expectation of
privacy." For employers and employees, privacy issues have become increasingly prevalent in the
workplace, and with the increased use of electronic resources, privacy at work is even more complex
especially with respect to confidential information.

Confidential information that exist in the workplace are things like client records, business planning
and forecasting, employee records, and information collected in the course of research and
development. With the use of the internet, confidentiality of this information can be compromised.

Workplace confidentiality requires that this information be identified and secured to prevent
unauthorized access or release of the information and includes everything from policies
on workplace Internet usage to nondisclosure agreements in employee contracts.

SECURING THE INTERNET

The following can be done to secure the internet; protected website, digital certificate, encryption,
firewall.

1. Firewalls

The best protection against security threats may be anti-virus software and a firewall. In the computer
world, a firewall is a system that keeps dangerous Internet "flames" away from a private computer
network, or LAN. In other words, it prevents unauthorized access to or from a private LAN. One
mechanism blocks traffic, another permits traffic.

Why is a Firewall Necessary?


• Lurking on the Internet, there are thieves and troublemakers who want to log in to your
private network and start snooping around.
• A firewall provides another layer of network security. Firewalls can't really protect against
viruses, so Anti-virus software and regular updates are still a good idea.

2. Digital Certificate
Digital Certificates are the electronic counterparts to driver licenses, passports and membership
cards. You can present a Digital Certificate electronically to prove your identity or your right to access
information or services online.

25

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Digital Certificates, also known as digital certificates, bind an identity to a pair of electronic keys that
can be used to encrypt and sign digital information. A Digital Certificate makes it possible to verify
someone's claim that they have the right to use a given key, helping to prevent people from using
phony keys to impersonate other users. Used in conjunction with encryption, Digital Certificates
provide a more complete security solution, assuring the identity of all parties involved in a transaction.

A Digital Certificate is issued by a Certification Authority (CA) and signed with the CA's private key.
A Digital Certificate typically contains the:
• Owner's public key
• Owner's name
• Expiration date of the public key
• Name of the issuer (the CA that issued the Digital Certificate
• Serial number of the Digital Certificate
• Digital signature of the issuer

The most widely accepted format for Digital Certificates is defined by the CCITT X.509 international
standard; thus certificates can be read or written by any application complying with X.509. Further
refinements are found in the PKCS standards and the PEM standard

3. Encryption
Encryption is the process of scrambling a message so that only the intended recipient can read it.
The actual cryptographic process is generally a complicated mathematical formulation, the more
complex -- the more difficult to break. A key is supplied to the recipient so that they can then
decipher the message. Keys for encryption algorithms are described in terms of the number of
bits. The higher the number of bits - the more difficult that cryptosystem would be to break.

Encryption can provide a means of securing information. As more and more information is stored on
computers or communicated via computers, the need to insure that this information is invulnerable to
snooping and/or tampering becomes more relevant. Any thoughts with respect to your own personal
information (ie. medical records, tax records, credit history, employment history, etc.) may bring to
mind an area in which you DO want, need or expect privacy. As teachers, we are often called upon to
handle sensitive student information. We need to have access to student records, but maintain the
confidentiality of their information..

Encryption is seen by many people as a necessary step for commerce on the internet to succeed.
Without confidence that net transactions are secure, people are unwilling to trust a site enough to
transact any sort of business using it. Encryption may give consumers the confidence they need to do
internet business.

26

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Encryption can also provide a means of "message authentication". The PGP User's Guide explains,
"The sender's own secret key can be used to encrypt a message thereby signing it. This creates a
digital signature of a message...This proves that the sender was the true originator of the message,
and that the message has not been subsequently altered by anyone else, because the sender alone
possesses the secret key that made that signature." [2] This prevents forgery of that signed message,
and prevents the sender from denying the signature.

E-mail is certainly not secure. While you may believe that the use of a password makes your business
private, you should be aware that sending information without encryption has been likened to sending
postcards through the mail. Your message is totally open to interception by anyone along the way.
You may believe that your personal e-mail is not incriminating and does not contain content that you
must keep secret, and you may be right. But there are many common situations, where users have a
legitimate need for security both to protect that information and to insure that information is not
tampered with: Consumers placing orders with credit cards via the Internet, journalists protecting their
sources, therapists protecting client files, businesses communicating trade secrets to foreign
branches, ATM transactions, political dissenters, or whistle-blowers -- all are examples of why
encryption may be needed for e-mail or data files, and why it might be necessary to create a secure
environment through its use.

27

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Lesson 6 – Connecting to the internet

Every computer that is connected to the Internet is part of a network, even the one in your home.
For example, you may use a modem and dial a local number to connect to an Internet Service
Provider (ISP). At work, you may be part of a local area network (LAN), but you most likely still
connect to the Internet using an ISP that your company has contracted with. When you connect to
your ISP, you become part of their network. The ISP may then connect to a larger network and
become part of their network. The Internet is simply a network of networks.

CONNECTING USING ISP

ISPs provide individuals and organizations with Internet access for a fee. The ISP software package
usually includes:

• Username. A unique name used to gain access to a computer system.

• Password. A combination of keyboard characters. Used in combination with a username,


passwords allow access to restricted computer information. It is important to keep passwords
secret.

• Access phone number.

1. Dial-Up
This is the most common (and cheapest way) people connect to the Internet. All you need is your
telephone line, a modem, and special ISP-provided software. Using a data communications method
called Point-to-Point Protocol (PPP), your modem establishes a connection to the Internet by
contacting the ISP's computer. Dial-up connections are fairly simple to set up, usually taking less than
an hour.

2. DSL (Digital Subscriber Line)


DSL uses regular telephone lines to provide high-speed access. With the aid of a special modem-like
device, DSL transfers information across regular telephone lines in digital format, allowing you to be
online and talk on the phone at the same time. Although, DSL costs more than a dial-up connection,
it's still priced quite reasonably. In addition, it's available in most areas, making it a popular alternative.
However, a major drawback of DSL is that subscribers must be within a certain distance of the ISP or
the connection deteriorates considerably.

3. Cable

28

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

The same coaxial cables that provide you with television programming can also be used to connect
you to the Internet. This is done through exclusive cable modems that can send and receive
information at blazing speeds. Unlike DSL, cable signals hold up well over long distances. One
disadvantage of cable Internet access is the problem of shared bandwidth, which means the more
people who subscribe to cable in your area, the slower your connection speed will be.

4. Satellite and Wireless


Some ISPs provide Internet access through satellite dishes or antennae they supply to subscribers.
Both of these options are rather costly because of their fees and equipment.

LAN AND WAN NETWORK


A computer can connect to the internet via LAN and WAN.

There are two types of computer networks:

• Local Area Network (LAN): A LAN is two or more


connected computers sharing certain resources in a
relatively small geographic location (the same building, for
example).

• Wide Area Network (WAN): A WAN typically consists of 2 or more LANs. The computers are
farther apart and are linked by telephone lines, dedicated telephone lines, or radio waves.
The Internet is the largest Wide Area Network (WAN) in existence.

SERVERS

All computers on the Internet (a wide area network, or WAN) can be lumped into two groups: servers
and clients. In a network, clients and servers communicate with one another.

29

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

A server is the common source that:


• Provides shared services (for example, network security measures) with other machines

AND

• Manages resources (for example, one printer many people use) in a network.

The term server is often used to describe the hardware (computer), but the term also refers to the
software (application) running on the computer. Many servers are dedicated, meaning they only
perform specific tasks.

For example,
• An email server is a computer that has software running on it allowing it to "serve" email-
related services.
• A web server has software running on it that allows it to "serve" web-related services.

CLIENTS

Remember, all computers on the Internet (a wide area network, or WAN) can be lumped into two
groups: servers and clients, which communicate with one another.

Independent computers connected to a server are called clients. Most likely, your home or office
computer does not provide services to other computers. Therefore, it is a client.

Clients run multiple client software applications that perform specific functions.

For example,

• An email application such as Microsoft Outlook is client software.

• Your web browser (such as Internet Explorer or Netscape) is client software.

SERVERS AND CLIENTS COMMUNICATE


• Your computer (client hardware) is running a web browser such as Internet Explorer
(client software).

• When you want to surf the web, your browser connects to a remote server and
requests a web page.

• The remote server (server hardware) runs web server software (server software).

• The web server sends the web page to your computer's web browser.

• Your web browser displays the page.

30

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Activity

Match the correct term with its definition.

A. Consists of 2 or more LANs. The computers are farther apart and are
___1. LAN (Local
linked by telephone lines, dedicated telephone lines, or radio waves.
Area Network)

___2. WAN B. Common source that provides shared services to other machines and
(Wide Area manages resources in a network.
Network)
C. A project that allowed researchers and military personnel to communicate
___3. Server with each other in an emergency. The foundation of the Internet.

D. Two or more connected computers sharing certain resources in a relatively


___4. Clients small geographic location.

E. Computers connected to a server and do not provide services to other


___5. ARPAnet computers.

Activity

Whether you are at home, work, or are using a public computer, find out:

• What type of (speed) modem you use


• Who your ISP is
• Determine what ISP offers the best range of services for the least amount of money.

31

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

OPENING A INTERNET EXPLORER APPLICATION


The following are the steps for opening the Internet Explorer Browser

1. Click the Start button.

2. Go to Programmes, highlight and click Internet Explorer.

3. Alternatively click the Internet Explorer icon on the Desktop or on

the Taskbar next to Start button.

BASIC WEB BROWSING


The important thing to remember when you first begin browsing the web is the Web address of a site
you wish to visit. Go up to the "Address Bar" near the top of the page, and click on it. Now you can
type in the Web address of the site you want, and then press enter. Internet Explorer will go to this
site directly from whatever document you were currently viewing. This is much faster than going to a
search engine and trying to locate the site you want in their directories, or searching for it with a
query. (Address Bar shown below)

Your first time that you browse the web, you may have some difficulty. Efficiently browsing the Web is
just like any other complex task in life, it takes practice to be good at it. Internet Explorer has some
built-in features which will help to make it easier for you to browse the web. The fastest way to get to
a place that you don’t know its address and you want to search for, is to click on the "Search" button
on the Internet Explorer main toolbar. This button will take you to a document within Microsoft's home
site. On this document you will find a choice of categories to look through and a list Search Engines to
use. A Search Engine is an application that will attempt to find any documents that contain the subject
or phrase that you enter into the search parameters. You can also browse through the categories of
Web sites that the search engines have already organized for you.

THE MAIN EXPLORER TOOLBAR

32

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

The main toolbar is composed of eleven different buttons. Each of these buttons has a different
function and purpose in Internet Explorer. The individual buttons will each be discussed in the
following sections.

1. The Back Button: This button will take you back to whatever document you were previously
viewing. Pressing it immediately takes you back one document. If you have browsed many
pages, or are well into a multi-page document, pressing it repeatedly will continue to back you
up one page at a time. Once you reach your starting location, it will be greyed-out and
unavailable.
2. The Forward Button: This button will take you forward to the next document if you have
previously browsed multiple documents and had then backed-up to the page you are currently
viewing. (If you have not backed up at all, the forward button will be greyed-out) Pressing it
repeatedly will continue to move you forward one page at a time. You can move forward until
you reach the last page that you had browsed, at which time the forward button will be
greyed-out.
3. The Stop Button: The stop button stops ANY current operations by Internet Explorer. It will
stop any type of file from loading. It can also be used to stop animations from continuing once
a page is loaded. If you press it before a page has finished loading, the page will display
everything it had finished loading before the stop button was pressed. If a document is
completely loaded and there are no animations, movies, or other files still running, the stop
button will have no immediate function.
4. The Refresh Button: This button will reload the current document that you are viewing. It is
useful if the page updates very frequently so that you can view these changes as soon as
they are available. If you are loading a document and the transfer was interrupted, you can
reload the full document again by clicking here.
5. The Home Button: This button will return you to the page you have selected as the default
start-up page for Internet Explorer. It will not take you back to the beginning of your web
browsing; it will just return you to your home location from where you are. If you press back
after reaching your home page, you will go back to the page you left after you hit the Home
button.
6. The Search Button : This button will take you to the page you have selected as the default
Web search page for Internet Explorer. If you have not selected a page it will take you to
Microsoft's default search page.
7. The Favorites Button : This button will open up the Favorites menu. You can choose a
favourite that you wish to go to from the list, add a favourite to the list, or organize your
favourites from this menu.
8. The Print Button: The print button will bring up a Print dialog box. In the box you can decide
if you would like to print the contents of the page you are viewing, how many pages you will
print, and also how many copies you will print. Keep in mind that if you try to print a page that

33

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

is graphics intensive, you will need a printer that is capable of printing graphics. Also, the
more graphics and pages a Web site has, the longer it will take to print.
9. The Font Button: Pressing this button causes Internet Explorer to cycle through the
available font sizes. This button is useful if the text is too small to read, or too large to fit
comfortably in the window.
10. The Mail Button: This button will open into a drop down menu from which you can select to
read or send E-Mail. You can also open up your newsgroups from this menu.
11. The Edit Button: This button will ONLY be on your toolbar if you have a Windows system
Web editor (such as Microsoft Frontpage or Microsoft Word) installed on your computer. If
you press this button, it will launch that editor and open the document you are currently
viewing in it.

TO SAVE A WEBPAGE AS A FILE


1. Open Internet Explorer by clicking the Start button , and then clicking Internet Explorer.

2. Go to the webpage you want to save.

3. Click the Page button, and then click Save As.

4. Navigate to the folder where you want to save the webpage. By default, webpages are saved
in the Documents folder.

5. Type a new name in the File name box if you want to change the name.

6. In the Save as type box, do one of the following:

• To save all the files associated with the page, including graphics, frames, and style
sheets in their original format, select Webpage, complete.

• To save all information as a single file, select Web Archive, single file (*.mht).

• To save just the current HTML page, without graphics, sounds, or other files,
select Webpage, HTML only.

• To save just the text from the current webpage, select Text File.

7. Click Save.

REFRESHING AND STOPPING WEB PAGES


While using your browser's cache may increase ease of use, you may not be getting the most up-to-
date information a site has to offer. To do so, you need to refresh, or reload, a web page.
Refreshing requests fresh pages from the web server rather than from the cache stored on your
machine's disk.

Most browsers include a Refresh button on the toolbar. (F5)

34

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Refresh a web page when:


• You want to view the latest version of the page. For example, when viewing a discussion
forum, or a news-driven website.
• You get a message that a web page cannot be displayed. For example, “Error 404, File Not
found."

Most browsers include a Stop button on the toolbar. (Esc)

Stop a web page when:


• You want to stop a web page from loading.
• A page is taking too long to load.
• You mistyped a URL.

SETTING A HOME PAGE

Your home page is the first page you see when you start Internet Explorer (IE). Change your home
page to make surfing the Web easier and more convenient.

For example, if you want to start each Internet session with Bluebridge.co.za,
http://www.bluebridge.co.za should be your home page. If you like to check the weather every time
you log on, you might prefer http://www.weather.com as your home page.

To change the Home Page:

• Choose Tools Internet Options from the IE menu bar. The Internet Options dialog box
opens.

• If not already selected, click the General tab.

• Type a new URL in the home page section of the General tab.

• Click OK.

OR

• If you like the current page and want to set it as your new home page, click the Use Current
button.

35

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

• The Use Default button sets www.microsoft.com as your home page.

• The Use Blank button sets a blank page as your home page. This option is beneficial to
those who don't want to begin each Internet session waiting for a home page to load.

• Click OK.

36

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Lesson 7 – customising the view and preferences of a


browser

TOOLBARS

Internet Explorer features customizable toolbars to help you navigate the Web. Below are the
toolbars featured in IE 5.

The Standard buttons bar displays commonly used buttons such as the Back, Forward, Stop,
Refresh, Home, Search, Favourites, History, and Print buttons.

The Address bar displays the address, or URL, of the web page you are currently visiting.
Type new URLs or search terms into the Address bar.

The Links bar is a convenient place to add frequently used links.

The Radio bar, available when Windows Media Player is installed, includes a radio station
guide and control button such as "play" and "volume."

Status bar and Explorer bar

Internet Explorer's Status bar and Explorer bar offer additional web navigation methods.

37

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

The Status bar, located at the bottom of the IE window, indicates when a web site is found,
loading, waiting for reply, or if you have a secure connection. It is always a good idea to display
the Status bar, particulary for security reasons discussed in Unit 4.

The Explorer bar is a sidebar located in the left side of the IE window. It's a convenient way of
accessing the Favourites list, History list, and Search function.

SHOW AND HIDE TOOLBARS, STATUS BAR AND EXPLORER BAR

In newer versions of Internet Explorer, you can show and hide the toolbars, Status bar and Explorer
bar.

To show or hide the toolbars:

• Choose View Toolbars from the IE menu bar.

• Click the clear or show the checkmark for each item.

38

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

OR

• Right-click the toolbar and click to clear or show the checkmark for each item.

To show or hide the Status bar:

• Choose View and click to clear or show the checkmark.

To show or hide the Explorer bar:

• Choose View Explorer bar.

• Choose from Search, Favourites, History, or Folders.

OR

• Click on the Standard button toolbar.

• Click button again to hide the Explorer bar or click the X in the upper right corner or the
Explorer bar.

CUSTOMIZING TOOLBARS

In newer versions of Internet Explorer, you can move and resize the toolbars.

To move a toolbar:

• Look for the resize/move toolbar handle.

39

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

• Hover your mouse pointer over the resize/move toolbar handle.

• The mouse pointer becomes a double-headed arrow.

• Click and drag a toolbar up, down, left, or right.

• When moved, toolbars "snap" to the outer edge of the IE window.

To resize a toolbar:

• Look for the resize/move toolbar handle.

• Hover your mouse pointer over the resize/move toolbar handle.

• The mouse pointer becomes a double-headed arrow.

• Click and drag until toolbar is desired size.

CUSTOMIZING THE STANDARD BUTTON BAR:

You can further customize the Standard button toolbar by adding or removing Standard buttons.
You can even change the appearance of your buttons.

Add or remove a button from the Standard button bar:

• Choose View Toolbars Customize from the IE menu bar.


OR
• Right-click the toolbar and click Customize.
• The Customize Toolbar dialog box opens.

• In the left-hand scroll box, there is a list of Available toolbar buttons.

• In the right-hand scroll box, there is a list of Current toolbar buttons.

• In either scroll box, click to select a button you would like to add or remove.

• Click the Add or Remove button.

• The button is now added or removed from the toolbar.

• Click Close to display new options.

40

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

To change the text options featured on your buttons:

• With the Customize Toolbar dialog box open, click the Text Options drop down box to
select No text labels, Show text labels, and Selective text on right.

• Click Close to display new options.

To change the size of your button icons:

• With the Customize Toolbar dialog box open, click the Icon Options drop down box to
select Small icons or Large icons.

• Click Close to display new options.

DISPLAYING AND HIDDING IMAGES


The following are procedures of displaying and hiding images;

1. Click on the "Tools" drop-down menu.

41

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

2. Click on "Internet Options...".

3. Click on the "Advanced" tab.

42

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

4. Scroll down to "Multimedia".

5. Unselect the box "Show pictures".

43

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

6. Click on "Apply".

7. Click on "Ok".

44

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

8. Click on the "Refresh" toolbar button.

9. No pictures will now be displayed on the website.

CHECKING AND DELETING URL HISTORY


Using the History feature, you can find pages you've recently visited in the last few days.

To see a list of pages you've recently visited:

• Click the down arrow at the end of the Address bar.

• To view, click any site from the list.

45

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

OR

To access your History using the IE Explorer bar:

• Choose View Explorer bar History or click the History button on the toolbar.

(Ctrl + H)

• The Explorer bar opens and the History list appears in the left side of the window.

• Click a week or day.

• Click a folder to display individual pages.

• Click the web page icon to display the web page.

To hide the Explorer's bar's History list:

• Click the History button again to hide the Explorer bar's History list.

OR

• Click the X in the upper right.

46

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

CUSTOMIZING YOUR HISTORY LIST


You can specify how many pages are saved in your History list.

To specify how many pages are saved in the History list:

• Choose Tools Internet Options from the IE menu bar.

• Click the General tab

• In the History area, change the number of days that the History list keeps track of your
pages.

• Click the Clear History button to clear your history and temporarily free up disk space on
your computer.

47

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Activity
• Practice moving a toolbar using one of the methods described in this lesson.
• Add two new buttons to the toolbar.
• Remove any button you don't use regularly.
• Change button icons from large to small.
• Set a new home page
• Make sure the toolbar is customized to suit your needs.

48

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Lesson 8 – Navigate on the internet

The browser allows the user to navigate the webpage. For example we want to visit UN home page.
UN web address is http://www.un.org. Locate address bar (indicated with red arrow) now type in the
full web page address into the browser and click GO button at the end of the address bar. Now the
page will start loading, depending on how fast your computer and connection to the internet the page
may appear very quickly or by piece by piece. Once on the UN home page let click on the
word "WELCOME", now the browser is loading another page.

Browser Navigation Buttons.


So far we visited two pages:
1) Home Page and
2) Welcome Page.
You can navigate between the web pages using back and forward button. This is the simplest way to
navigate on the web page. Just like in paper book turning pages backward and then come back
forward to the latest page you were reading.

49

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

BOOKMARKING A SITE
Bookmarking a web page for future reference can be a time saver. Once a web page has been added
to your Favorites simply click Favorites in the browser top menu bar or the Favorites icon at the top of
the browser window, navigate to the bookmarked page you wish to visit and click the shortcut in the
Favorites list.

To access Favourites from the IE menu bar:

• Choose Favourites from the IE menu bar. (Ctrl + I)

• A Favourites list appears. You may need to click the double arrow at the bottom of the list to
expand your choices.

• Click a Favourite to go to that web page.

To access Favourites from the IE Explorer bar:

• Choose View Explorer bar Favourites or click the Favourites button on the toolbar.

• The Explorer bar opens and the Favourites list appears.

• Click a Favourite to go to that web page.

To hide the Explorer bar's Favourites list:

• Click the Favourites button again to hide the Explorer bar. (Ctrl + I)

OR

• Click the in the upper right of the Explorer bar .

50

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

ADD TO FAVOURITES
To add to Favourites using the IE menu bar:

• Go to the page you want to add to your Favourites. For example: http://www.google.com

• Choose Favourites Add to Favourites from the IE menu bar.

• The Add Favourite dialog box opens.

• The page title appears in the Name text box. For example: "Blue Bridge Computer Training."

Change the page title if you wish. For example, "Blue Bridge" may be adequate.

• Click OK to add it to your Favourites list.

To add to Favourites using the IE Explorer bar:

• Click the Favourites button on the toolbar.

• The Explorer bar opens and the Favourites list appears.

• The Add Favourite dialog box opens.

51

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

• The page title appears in the Name textbox. Rename the page if you wish.

• Your new Favourite appears in the Favourites list.

SAVING PICTURES
It's easy to return to previously visited web pages using tools such as Favourites and History. You can
also save specific pictures, text, or links from web pages for later reference.

To save pictures:

• Go to the web page that features a picture you want to save.

• Right-click the item you want to save. The shortcut menu opens.

• Choose Save Picture As from the shortcut menu.

• The Save Picture dialog box opens.

• The default save location is My Pictures. Click the Save in drop down box arrow to navigate
to a new save location.

• Rename the image in the File name text box if needed.

• Click Save.

52

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

To set a web page image as desktop wallpaper:


• Go to the web page.
• Right-click the image, choose Set as Wallpaper from the shortcut menu.
• It will be saved in the list as Internet Explorer wallpaper.
• Minimize the window. Your new wallpaper should display.
• Each new graphic you set as wallpaper will replace the old one.

To edit wallpaper:
• Choose Start Settings Control Panel.
• Double-click the Display icon to open the Display Properties window.
• Click the Background tab and adjust image settings.

COPYING AND PASTING TEXT


You can save specific text from web pages for later reference. For example, if you want to save
content from a site that features regularly changing content, (an online newspaper, for example); you
might want to copy and paste text.

To copy and paste text from a web page:

• Go to the web page.

• Select the text you want to copy.

• Choose Edit Copy from your web browser's menu bar or right-click the text and choose
Copy from the shortcut menu.

• Open another application, such as Word, for example.

53

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

• Choose Edit Paste from the menu bar or right-click and choose Paste from the shortcut
menu to paste the text into the document of choice (for example, a Word document).

EMAILING LINKS
While surfing the Internet, you may come across an interesting site you want to share with friends or
family. There are several different methods of sending a web page via email.

To cut and paste a link:

• Go to the web page.

• In the Address box, select the URL. For example: http://www.bluebridge.co.za/.

• Right-click and choose Copy from the shortcut menu.

• Open your email programme.

• Compose your email message.

• Right-click the body of the email message, and choose Paste from the shortcut menu.

• Send the message.

Some web pages include a "Tell A Friend" or "Email this Article" feature. This may be convenient,
but you may want to be wary of who you give your email address to.

OR

To send a link in email:


• Go to the web page.

54

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

• Choose File Send.


• Click Page by Email or Link by Email.
• Compose your email message, and then send the message.

You need to specially configure your e-mail programme for the send a link in email method to
work.

PRINT A WEB PAGE


Let's say you need to print a web page, such as a map, for offline reference.

To print a web page:

• Choose File Print. The Print dialog box opens.

• Set printing options as you normally would.

To print a frame or item in a web page:

• Right-click the frame or item. The shortcut menu opens.

• Choose Print, Print Frame, or Print Target.

• The Print dialog box opens.

• Set printing options as you normally would.

55

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

WORK OFFLINE
You can revisit useful web sites whether or not you have an Internet connection available. Using the
Work Offline feature, you can view web pages without connecting to the Internet.

To View Web Pages Offline:


• Go to the site you want to visit later.
• Add it to Favourites.
• Before you disconnect from the Internet, choose Tools Synchronize from the menu bar.
• The Items to Synchronize dialog box appears.
• Click Synchronize.

When you want to work offline:


• Choose File Work Offline.
• Open Favourites.
• View the pre-set page offline.

56

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Lesson 9 – Using the search engine

In this section we shall look at how to use Google and Yahoo search engines.

1. GOOGLE SEARCH ENGINE


Google is the most popular search engine in the world. But while so many people use it, few actually
get formal instructions on how to search with Google. Below, tips on how to search on Google.

Step 1: Go To Google

Obviously, to search Google, you have to go to Google. There are a number of ways of getting to
Google. The common one is to go directly to Google.com by typing in http://google.com into your web
browser. That will take you to the main Google web site.

Step 2: Go To Google via a Toolbar

A faster way to use Google is to enter a search into the search box that’s built into most popular
browsers. Microsoft’s Internet Explorer, Apple’s Safari and Mozilla’s Firefox have little boxes in the top
right corners where you can type what you’re searching for, hit return, and the search results will load
into your browser:

Note that Internet Explorer may be already set to use Microsoft’s Bing search engine rather than
Google, if you type into the search toolbar. This is easily changed.

Step 3: Enter Your Search Terms

Actually searching Google is pretty easy. Just type what you’re interested in finding into the search
box on the Google web site or into your toolbar! If you’re using a toolbar, as you type, you may see
words begin to appear below the toolbar’s search box. These are suggestions that Google thinks may
match what you’re interested in. Google calls this “Google Suggest” or “Auto complete.” You can
ignore the suggestions, but if one seems useful, select it to save some typing. On Google itself, you’ll
not only get suggestions but as you type, actual search results will begin to load:

57

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

The search can be done either using a simple or a complex search. Complex search means the use
of common logical operators such as AND, OR, AND NOT, as well as the use of a wild card like ‘*’. At
least one operator should be included in a complex search.

Step 4: Review Your Search Results

After you’ve searched, you’ll get a page full of results. Some of these will be matching pages from
across the web. Some of these will be matching content from those subject-specific versions of
Google that were mentioned above. You might get news or image results mixed in. You may also see
adverts that appear above or to the right of the main search results. The main search results are not
sold, and Google says they are not influenced by advertising. Google keeps the ads separated from
those results and labeled with the word “Ad” or “Ads,” as the arrows point to in the example above.

58

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

This mixing is called “Universal Search,”

Step 5: Preview Your Answers

As you review results, you’ll wonder if some of the listed sites are the best answer to what you’re
looking for. Google provides a way to quickly check on this. It’s called Google Instant Previews.

Next to the web page listings, you’ll see a magnifying glass symbol appear:

Click on this, and you’ll make a preview of the page for that listing appears:

59

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Step 6: Refine Your Google Search


Google doesn’t know exactly what you want, when you enter a search, so the results you get are its
best guess. There are ways you can help it make better guesses. For one, Google provides a variety
of ways to refine your searches, to narrow them down.

You can get back just video answers, restrict results by date, explore answers by browsing through a
“Wonder Wheel” of suggestions or simple review some of the related searches it may list among your
results, like these examples from a search for DVD players:

60

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

YAHOO SEARCH ENGINE


The following are the procedures;

1. Visit the "Yahoo" website provided to you in the Sources section of this article.
2. Enter search terms into the "Search" box for that related to the content and data you want to
find.
Be specific as possible when entering keywords. This can help narrow down your search
results and provide you with the exact information you are looking for. For example, if you
want to learn about dog grooming methods for a poodle, enter "best methods for grooming a
poodle" instead of a basic phrase such as "dog grooming."
3. Click on the "Search" button to begin your search.
4. Review your search results. Yahoo will provide you with a list of relevant websites and articles
that match the keywords you entered into the search box.
Click on the "Next" button at the bottom of any Yahoo search results page to see more
websites and links that match your search criteria.

Refine your Search

To refine the search follow the steps below;

1. Filter your search results by time. You can refine your search results to see content based on
when it was published to the web.
2. Navigate to the left side of your search results, and then indicate whether you want to see
results from the past day, past week, or past month by clicking on the correct option.
Filter search results by category. This can be helpful if you are searching for content within a
specific category. For example, if you want to watch videos about "blogging tips," you can
choose just to have results displayed for videos that feature blogging tips.
• Click on any of the category tabs displayed above your search results to refine your
search. Your options will include images, video, shopping, blogs, news, recipes,
sports, and more.
3. Use Yahoo's suggestions for different keywords. At the top and bottom of your Yahoo search
results pages, you will see suggested keyword combinations next to "Also try," which can help
display results that are more relevant to the content you seek.
• Click on any of the keyword combinations provided next to "Also try" to display new
search results based on those specific keywords.

61

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

Lesson 10 – Obtaining information from a website

Most websites allows the user to download certain documents, music and graphics. Downloading is
the process of copying a file (such as a game or utility) from a website to a computer or external
storage device.

DOWNLOADING A FILE
The following are the generic steps of downloading a file.
1. Click on the download link for the programme you want to download. Many sites offer multiple
download links to the same programme, and you only need to choose one of these links.
2. You may be asked if you want to save the file or run it from its current location. If you are
asked this question, select "Save." If not, don't worry -- some browsers will automatically
choose "Save" for you.

3. You will then be asked to select the folder where you want to save the programme or file,
using a standard "Save As" dialog box. Pay attention to which folder you select before clicking
the "Save" button. It may help you to create a folder like "C:\Download" for all of your
downloads, but you can use any folder you'd like.
4. The download will now begin. Your web browser will keep you updated on the progress of the
download by showing a progress bar that fills up as you download. You will also be reminded
where you're saving the file. The file will be saved as "C:\Download\dweepsetup.exe" in the
picture below.

Note: You may also see a check box labeled "Close this dialog box when download
completes." If you see this check box, it helps to uncheck this box. You don't have to, but if
you do, it will be easier to find the file after you download it.

62

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

5. Depending on which file you're downloading and how fast your connection is, it may take
anywhere from a few seconds to a few minutes to download. When your download is finished,
if you left the "Close this dialog box when download completes" option unchecked, you'll see
a dialog box like this one:

6. Now click the "Open" button to run the file you just downloaded. If you don't see the
"Download complete" dialog box, open the folder where you saved the file and double-click on
the icon for the file there.

63

Downloaded by alex mbatha (udeconsultants@gmail.com)


lOMoARcPSD|27347607

What happens next will depend on the type of file you downloaded. The files you'll download
most often will end in one of two extensions. (An extension is the last few letters of the
filename, after the period.) They are:

o .EXE files: The file you downloaded is a programme. Follow the on-screen
instructions from there to install the programme to your computer and to learn how to
run the programme after it's installed.
o .ZIP files: ZIP is a common file format used to compress and combine files to make
them download more quickly. Some versions of Windows (XP and sometimes ME)
can read ZIP files without extra software. Otherwise, you will need an unzipping
programme to read these ZIP files. Common unzipping programmes
are WinZIP, PKZIP, and BitZipper, but there are also many others. Many unzipping
programmes are shareware, which means you will need to purchase them if you use
them beyond their specified trial period.

SAVING MUSIC FROM A WEBSITE


The following are the steps that a user can follow to download music from a website.
1. Choose "Source" from the View Menu. The Windows notepad will open with the source code.

2. Open "Find" in the Edit Menu (CTRL +F.) The Find dialogue will open above the Notepad
window.

3. Type "mp3" into the "Find What" box. Click on the "Find Next" button. Notepad will highlight
the phrase (you may have to move the dialogue box.) It should part of a URL address. If you
don't find it, try different music formats (".wav," ".aif".)

4. Copy the entire URL linking to the sound file and paste it into the address window. The song
will load into Windows Media Player. Wait for it to play completely.

5. Save the file to your hard drive. Choose "Save Media As..." from the File Menu. Use the file
browser to navigate to your music folder to save the file.

64

Downloaded by alex mbatha (udeconsultants@gmail.com)

You might also like