You are on page 1of 5

THE EVOLUTION OF THE INTERNET

Part 1: Click (ctrl + click) on the link below.
http://www.youtube.com/watch?v=aKi-cj39-xg

As you watch the video, answer the following questions in point form. Use this file as a template to fill in your responses (re-save it as your last name internet). Be sure to save your work regularly and format your document so that it is easily readable as this will become your note. Double click on my name that appears in the right hand corner above and replace it with your name so that you can identify your work when finished. You will have two periods to complete this activity. Pause the video as required to allow you to review the information and provide adequate time to record the answers. 1. Why is the INTERNET so important? The internet is important because it is the communication breakthrough for our era. It allows us to communicate with others around the globe. It also is the world’s largest market place, and it is extremely revolutionary. It allows us to do things that would have been impossible hundreds of years ago.

2.

Make a list of the parts (components) of the INTERNET. The four parts of the internet are www (world wide web), FTP (File transfer protocol0, E-MAIL, and instant messaging.

3.

When did the INTERNET begin? The internet was first used in the military in the 60’s and 70’s. It became public in 1989.

4.

Why was ARPA created and what does it mean? ARPA means “Advanced Research Projects Agency.” ARPA was created in early 1958 to make up ground lost to the Soviet technology advances that allowed the launch of Sputnik.

5.

What are ‘Packets’ and describe their properties. Packets slice up bits and pieces of data in an email, all with the same address, sending parts of the email bit by bit until it all gets to the recipient. Packets can carry between 1000 bytes and 1500 bytes of information at a time.

6.

Why are messages sliced up into packets? It slices the data into packets because it sends the email more efficiently (quicker) because it’s not sending the data all at once.

7.

What do ‘Nodes’ do and what do they do with packets? Nodes are other computers all connected to a certain network. The packets can travel from node to node until they get to their final destination.

8.

What was the ‘Killer App’ and why was it so important? The first killer app was the @ symbol. A killer app is something that is so needed/desirable that users would be willing to buy a more expensive unit just to install the software.

9.

What do LAN and WAN mean? Insert the video images of them here. LAN: local area network WAN: wide area network

10.

What is TCP/IP and why is it so important? The Internet protocol suite is the networking model and a set of communication protocols used for the internet and similar networks

11.

Why was it difficult to find information on the net? It was difficult to find information because the internet was just forming so it still had some glitches. Many people started using it so it also was a lot slower than it is now. It was difficult because not as many web pages were published so it made searching things a lot more difficult.

12.

Why has the INTERNET not reached the end of its development? The internet has not reached the end of its development, and it never will. It will be constantly become faster and more advanced, and people are always going to want what’s bigger and better. Society is going to shape what the internet evolves into, because what society wants, it gets.

PART 2 : Define the following using an appropriate search engine. 1. ADWARE: an advertising supporting software is any software package that automatically renders advertisements in order to generate revenue to its author. 2. CLOUD STORAGE: networked storage where data is stored on multiple virtual servers. 3. SEARCH ENGINE: a program for the retrieval of data, files or programs 4. COOKIE: a small piece of data sent from a website to the users browser while the user is occupying it. 5. FIREWALL: a barrier that is intended to stop the spread of viruses to the system. 6. DATA-MINING: data processing using sophisticated data search capabilities to discover patterns. 7. DENIAL OF SERVICE ATTACK: an attempt to make a machine or network unavailable for its intended users. 8. MALWARE: software that is intended to harm or disable a computer or a computer system. 9. NET NEUTRALITY: the principle that all Internet Service Providers should treat all data on the internet equally, not charging differently by user. 10. P2P: peer to peer, no dedicated server involved 11. PHARMING: a fraudulent practice of directing internet users to bogus webpages. 12. PHISHING: the fraudulent practice of pretending to be legitimate companies and sending emails to users demanding personal information.

13. SPAM: to send the same message indiscriminately over the internet to a large mass of people. 14. SPYWARE: software that installs itself to your computer and collects personal information. 15. TROJAN HORSE: an invisible infection on your computing device. 16. VIRUS: an infection on your computing device. 17. WORM: a standalone Malware computer system duplicating itself to spread to other computers 18. DOMAIN NAME: a series of alphanumeric strings giving a webpage an address on the internet. 19. META TAG: elements used to provide structured meta data about a web page. 20. MODEM: to send data by. 21. NETIQUETTE: the acceptable way of communicating on the internet.