CA - Module 6 - 1
CA - Module 6 - 1
THE INTERNET
Throughout the 1970's, what would later become the Internet was developed. While
mostly military personnel and scientists used it in its early days, the advent of the World
Wide Web in the early 1990's changed all that.
The history of the Internet began with the development of electronic computers in the
1950s. The public was first introduced to the concepts that would lead to the Internet when
a message was sent over the ARPANet from computer science Professor Leonard
Kleinrock's laboratory at University of California, Los Angeles (UCLA), after the second
piece of network equipment was installed at Stanford Research Institute (SRI).
In 1982, the Internet protocol suite (TCP/IP) was standardized, and consequently,
the concept of a world-wide network of interconnected TCP/IP networks, called the Internet,
was introduced.
Since the mid-1990s, the Internet has had a revolutionary impact on culture and
commerce, including the rise of near-instant communication by electronic mail, instant
messaging, Voice over Internet Protocol (VoIP) “phone calls”, two-way interactive video calls,
and the World Wide Web with its discussion forums, blogs, social networking, and online
shopping sites. Today the Internet continues to grow, driven by ever greater amounts of
online information, commerce, entertainment, and social networking.
1|Computer Applications
Advantages and disadvantages of the Internet
The internet is really useful and has a lot of advantages, but there are also
some disadvantages of using it.
Advantages
Faster Communication: The foremost target of Internet has always been speedy
communication and it has excelled way beyond the expectations. New innovations are only
going to make it faster and more reliable. Now, you can communicate in a fraction of second
with a person who is sitting in the other part of the world. With the help of such services, it
has become very easy to establish a kind of global friendship where you can share your
thoughts and explore other cultures.
Entertainment: Entertainment is another popular reason why many people prefer to surf
the Internet. Downloading games or just surfing the celebrity websites are some of the
uses people have discovered. Even celebrities are using the Internet effectively for
promotional campaigns.
Social Networking: One cannot imagine an online life without Facebook or Twitter.
Social networking has become so popular amongst youth that it might one day replace
physical networking. It has evolved as a great medium to connect with millions of people
with similar interests. Apart from finding long-lost friends, you can also look for a job,
business opportunities.
Online Services: The Internet has made life very convenient. With numerous online
services you can now perform all your transactions online. You can book tickets for a
movie, transfer funds, pay utility bills, taxes etc., and right from your home.
Disadvantages
Theft of Personal Information: If you use the Internet for online banking, social networking
or other services, you may risk a theft to your personal information such as name, address,
credit card number etc. People can access this information through unsecured
connections or by planting software and then use your personal details for their benefit.
Virus Threat: Internet users are often plagued by virus attacks on their systems. Virus
programs are inconspicuous and may get activated if you click a seemingly harmless link.
Computers connected to the Internet are very prone to targeted virus attacks and may end
up crashing.
2|Computer Applications
allows you to access and download millions of pornographic photos, videos and other X-
rated stuff. Such unrestricted access to porn can be detrimental for children and teenagers.
Social Disconnect: People now only meet on social networks. More and more people are
getting are drifting apart from their friends and family. Even children prefer to play online
games rather than going out and mingling with other kids.
A search engine is a web-based tool that enables users to locate information on the
World Wide Web. A search engine makes it possible to find a specific bit of information
amongst the huge mass of data stored on the web.
The first search engine ever developed is ‘Archie’, which was used to search for FTP
files and the first text-based search engine is ‘Veronica’. Today, there are thousands of
different search engines available on the Internet, each with their own abilities and features.
A search engine gives information on websites, images, videos, maps, blogs, books etc.
In some search engines, instead of typing the key word, one can use images to find
similar images. Similarly in some search engines voice can be used to input a query. (See
Google.com)
Search engine optimizations (SEO) the focal point of internet marketing. This
internet marketing innovation is becoming popular day-by-day providing profit worth
billions to companies who are using their services.
There are two reasons why most people log on to the internet. One is for communication
and the secondly it is to search for information on relevant products and services offered
by various businesses. Since there is cutthroat competition between businesses in the same
category these days, hence the need for a good facilitator is essential. SEO marketing will
3|Computer Applications
help a company to create a presence for itself to the potential customers. The popular
search engines include Yahoo and Google.
Search engine optimization is the main driver to increase search ranks of websites.
This is done by including additional contents relevant to keywords used by people during
their searches. This is done based on the indexed data for storage.
The information that is updated into the websites is beneficial to both the site owner
and the visitors. Visitors need to log on a certain keyword in the search engines like Yahoo,
Google or Bing and an entire list of relevant websites pertaining to that keyword will
appear. The site owner on the other hand has an opportunity to provide useful information
to the visitors. The most important part being that they get to promote their products and
services online.
However, SEO marketing has its disadvantages too. Sometimes it has a negative
influence on the web world.
History of E-mail
E-mail is much older than ARPANet or the Internet. It was never invented; it
evolved from very simple beginnings.
Early email was just a small advance on what we know these days as a file directory -
it just put a message in another user's directory in a spot where they could see it when they
logged in. Simple as that. Just like leaving a note on someone's desk.
Probably the first email system of this type was MAILBOX, used at Massachusetts
Institute of Technology from 1965. Another early program to send messages on the same
computer was called SNDMSG.
Email terminology
The email message - Instead of using a pen to write a letter on paper, you're using
your keyboard to type an email message in an email program on your computer.
Sending the email - When the email is finished and has been addressed to the recipient's
email address, you don't put a stamp on it and post it but press the Send button in the email
4|Computer Applications
program. This makes the email message go on its journey.
Email transport - Like postal services transport letters and parcel, email servers transmit
email messages from sender to recipient. Usually, emails are not delivered to the recipient
directly, though, but waiting at the “nearest” mail server to be picked up by them.
Fetching new mail - If you've got new mail in your mailbox, you go and fetch it.
Similarly, your email program can check for new email messages at your mail server and
download them for you to read.
e-mail address
abc@xyz.com
The first portion all e-mail addresses is the alias, user, group, or department of a
company. In our above example abc is the customer relation department at xyz company.
Next, the @ (at sign) is used as a divider in the e-mail address and is always required for all
SMTP e- mail addresses and was first used by Ray Tomlinson. Finally, xyz.com is the
domain name of where the user belongs.
Types of email
When setting up an e-mail account in Windows Mail, you'll be asked to select the type of
mail server your account uses.Windows Mail supports the following e-mail server types.
• Post Office Protocol 3 (POP3) servers hold incoming e-mail messages until you check
your e-mail, at which point they're transferred to your computer. POP3 is the most
common account type for personal e-mail. Messages are typically deleted from the server
when you check your e-mail.
• Internet Message Access Protocol (IMAP) servers let you work with e-mail messages
without downloading them to your computer first. You can preview, delete, and organize
messages directly on the e-mail server, and copies are stored on the server until you choose
to delete them. IMAP is commonly used for business e-mail accounts.
• Simple Mail Transfer Protocol (SMTP) servers handle the sending of your e-mail
messages to the Internet. The SMTP server handles outgoing e-mail, and is used in
conjunction with a POP3 or IMAP incoming e-mail server.
POP3 and IMAP are two different protocols used to access email. POP3 and IMAP
function very differently and each has its own advantages. POP3 is useful in checking
emails from a computer that is in a specific location. IMAP is the better option when you need
to check your emails from multiple locations, such as at work, from home, or on the road,
using different computers.
5|Computer Applications
Given below are the differences between POP3 and IMAP.
You can use only one You can use multiple computers to check your
computer to check your email email
Your mails are stored on Your mails are stored on the server
the computer that you
Web browsers: Surfing (using) the web is made possible by Web browsers. Browsers are
basically software programs that allow you to search for and view various kinds of
information on the Web, such as web sites, video, audio, etc.
As a client/server model, the browser is the client run on a computer that contacts
the Web server and requests information. The Web server sends the information back to the
Web browser which displays the results on the computer or other Internet-enabled device
that supports a browser.
Available web browsers range in features from minimal, text-based user interfaces
with bare-bones support for HTML to rich user interfaces supporting a wide variety of file
formats and protocols. Browsers which include additional components to support e-mail,
Usenet news, and Internet Relay Chat (IRC), are sometimes referred to as “Internet suites”
rather than merely “web browsers”.
A download involves the receipt of a file copied from a remote network location. Often,
a person downloads files to their personal computer from a remote server computer. In
Microsoft email networks, for example, people download their email from an Exchange
server to their Outlook client.
An upload involves sending a copy of a file to a remote network location. For example,
Web publishers upload files to their Web server.
Sending files across a computer network does not necessarily constitute an upload or a
download. The terms are more commonly used in client/server networking than in peer-to-
peer networking.
Internet Glossary
Internet Service Provider: In order to connect to the Internet, you need an ISP. It is
the company that you (or your parents) pay a monthly fee to in order to use the Internet. If
6|Computer Applications
you use a dial-up modem to connect to your ISP, a point-to-point protocol (PPP) connection is
established with another modem on the ISP's end. That modem connects to one of the ISP's
routers, which routes you to the Internet “backbone.” From there, you can access information
from anywhere around the world. DSL and cable modems work the same way, except after
you connect the first time, you are always connected.
IP Address: Also known as an “IP number” or simply an “IP,” this is a code made up of
numbers separated by three dots that identifies a particular computer on the Internet.
Every computer, whether it be a Web server or the computer you're using right now,
requires an IP address to connect to the Internet. IP addresses consist of four sets of
numbers from 0 to 255, separated by three dots. For example "66.72.98.236" or
"216.239.115.148". Your Internet Service Provider (ISP), will assign you either a static IP
address (which is always the same) or a dynamic IP address, (which changes everytime you
log on).
Router: A router is a small box that allows multiple computers to join the same network.
While early routers provided several Ethernet ports for wired connections, most modern
routers offer wireless connectivity as well. These "wireless routers" often have one or two
moveable antennas on the sides, though some models house the antennas inside the
enclosure. Wireless routers allow multiple computers and other devices, such as
smartphones and tablets, to join the same network.
While connecting to a router provides access to a local network (LAN), it does not
necessarily provide access to the Internet. In order for devices on the network to connect to
the Internet, the router must be connected to a modem. Therefore, most routers have a
specific Ethernet port that is designed to connect to the Ethernet port of a cable or DSL
modem.
Dial-up: A method of connection to the internet using existing copper phone lines using
a modem on the client's end to send information at a slow speed, normally reaching
maximum speed at about 56 kbit/s. This technology uses the voice spectrum of the
telephone lines to transmit data using a system of sounds that only the receiving modem or
ISP understand.
7|Computer Applications
long distances simultaneously.”
FTP: File Transfer Protocol - Protocol to exchange files between two computers. FTP is used to
transfer files between computers on a network. You can use FTP to exchange files between
computer accounts, transfer files between an account and a desktop computer, or access
online software archives. Keep in mind, however, that many FTP sites are heavily used
and require several attempts before connecting.
HTML: Hyper Text Markup Language, the coding language used to create hypertext
documents for the World Wide Web. In HTML, a block of text can be surrounded with tags
that indicate how it should appear (for example, in bold face or italics). Also, in HTML a
word, a block of text, or an image can be linked to another file on the Web. HTML files are
viewed with a World Wide Web browser.
HYPERTEXT: On the World Wide Web, the feature, built into HTML, that allows a text
area, image, or other object to become a “link” (as if in a chain) that retrieves another
computer file (another Web page, image, sound file, or other document) on the Internet. The
range of possibilities is limited by the ability of the computer retrieving the outside file to
view, play, or otherwise open the incoming file. It needs to have software that can interact
with the imported file. Many software capabilities of this type are built into browsers or can
be added as “plug- ins.”
Spamming: The act of sending unsolicited email or posting many useless messages in a
forum website. (Possibly derived from a Monty Python sketch, in which Vikings repetitively
8|Computer Applications
sing about SPAM, annoying the other customers.
Bookmarks/Favourites: All major web browsers include a way to store links to sites you
wish to return to. Netscape, Mozilla, and Firefox use the term Bookmarks. The equivalent in
Internet Explorer (IE) is called a “Favorite.”
Cookie: A message from a WEB SERVER computer, sent to and stored by your browser on
your computer. When your computer consults the originating server computer, the cookie is
sent back to the server, allowing it to respond to you according to the cookie's contents. The
main use for cookies is to provide customized Web pages according to a profile of your
interests. When you log onto a “customize” type of invitation on a Web page and fill in
your name and other information, this may result in a cookie on your computer which that
Web page will access to appear to “know” you and provide what you want. If you fill out
these forms, you may also receive e-mail and other solicitation independent of cookies.
URL: Uniform Resource Locator. The unique address of any Web document.May be keyed in
a browser's OPEN or LOCATION / GO TO box to retrieve a document. There is a logic the
layout of a URL:
Domain name, domain name server (DNS) entry: Any of these terms refers to the initial
part of a URL, down to the first /, where the domain and name of the host or SERVER
computer are listed (most often in reversed order, name first, then domain). The domain
name gives you who “published” a page, made it public by putting it on the Web.
A domain name is translated in huge tables standardized across the Internet into a
numeric IP address unique the host computer sought. These tables are maintained on
computers called “Domain Name Servers.” Whenever you ask the browser to find a URL,
the browser must consult the table on the domain name server that particular computer is
networked to consult.
9|Computer Applications
Malware , Viruses, Worms, Trojans etc:
Viruses, worms, Trojans, and bots are all part of a class of software called malware. Malware
or malicious code (malcode) is short for malicious software. It is code or software that is
specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or
illegitimate action on data, hosts, or networks.
Firewall: Connecting a computer to the internet makes it visible to every other computer on
the network, and the opportunity for remote misuse this presents is huge. A firewall sits
between a computer and the network to control which computers can connect to it and what
services they can use. A firewall is a software program or piece of hardware that helps
screen out hackers, viruses, and worms that try to reach your computer over the Internet.
A firewall is a system designed to prevent unauthorized access to or from a private
network. You can implement a firewall in either hardware or software form, or a
combination of both. Firewalls prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. All messages entering or leaving
the intranet (i.e., the local network to which you are connected) must pass through the
firewall, which examines each message and blocks those that do not meet the specified
security criteria.
10 | C o m p u t e r A p p l i c a t i o n s