You are on page 1of 20

SULTANATE OF OMAN COURSE MATERIAL

MINISTRY OF MANPOWER

AL MUSANNA COLLEGE OF TECHNOLOGY

IT IS 101

FUNDAMENTALS OF INFORMATION
TECHNOLOGY

DEPARTMENT OF IT

1|Page
CHAPTER 1
Understanding Internet Technology

Chapter Objectives:
Upon the completion of this chapter, the students should be able to:
Explain how the Internet works

Use Internet and World Wide Web in conducting basic research

Demonstrate the proper use of anti-plagiarism utility as a tool to promote academic


integrity
Exhibit the ability to safeguard from Internet-related safety risks

Familiar with ethical and legal issues related to the use of Internet resources

1.1. Using the Internet and the World Wide Web


1.1.1 The Internet

The Internet is a vast computer network that allows people all over the world to
communicate with each other. Also, it links millions of businesses, government agencies,
educational institutions and individuals. It is a widely used tool, providing society with access
to global information and instant communications.

More than one billion people around the world use the Internet daily for a variety of
reasons, some of which are listed below:
Interact and communicate with and meet other people

Conduct research and access a wealth of information and news

Buy and Sell Goods and services

Bank and invest

Join online training (E-Learning)

Engage in entertaining activities, such as planning vacations, playing online


games, listening to music, watching or editing videos, and reading books and
magazines
Download music and videos

Share information, photos, and videos

Access and interact with Web applications

2|Page
1.1.2 Navigating the Web

The World Wide Web (www), or Web, is not the same thing as the Internet; it is the
collection of information that can be accessed via the Internet. Each electronic document on
the Web, called a Web Page, can contain text, graphics, audio, and video. Additionally, web
pages usually have built-in connections to other documents. A Web Server is a computer
that delivers requested Web pages to your computer. A Web Browser, or browser, is an
application software that allows users to access and view web pages and Web 2.0 programs.
To browse the web, you need a computer that is connected to the Internet and that has a
web browser. The more widely used web browsers are Google Chrome, Internet Explorer,
Firefox, Opera, and Safari.
The figure 1.0 below shows how a web browser displays a home page:

A web page has a unique address, which is called a URL (Uniform Resource Locator)
or Web Address. For example, the home page for the Shinas College of Technology website

3|Page
has http://www.act.edu.om as its Web address. A web browser retrieves a web page using
its web address. A web address consists of a protocol, domain name, and sometimes the
path to a specific web page or location on a web page. Many web page addresses begin with
http://. The http, which stands for Hypertext Transfer Protocol, is a set of rules that defines
how pages transfer on the Internet. To help minimize errors, many browsers and websites
do not require you enter the http:// and www portions of the Web address in the Address
bar. If you enter an incorrect web address, the browser may display a list of similar
addresses or related websites from which you can select.

Most web pages contain hypertext or hypermedia links. Hypertext refers to links in
text-based documents, whereas hypermedia combines text-based links with graphic, audio,
and video links. Links allow you to obtain information in a nonlinear way. That is, instead of
accessing topics in a specified order, you move directly to a topic of interest. Branching from
one related topic to another in a nonlinear fashion is what makes links so powerful. Some
people use the phrase, surfing the Web, to refer to the activity of using links to explore the
web. Each link on a web page corresponds to a web address or a document. To activate a
link, you click it, that is, point to the link and then press the left mouse button. Clicking a link
causes the web page or document associated with the link to be displayed on the screen.
The linked object might be on the same web page, a different web page at the same
website, or a separate web page at a different website in another city or country. To remind
you visually that you have clicked a link, a text link often changes color after you click it.

Most current web browsers support tabbed browsing, where the top of the browser
displays a tab (similar to a file folder tab) for each web page you open as shown in the figure
2.0 below.

To move from one open web page to another, you click the tab in the web browser.
Tabbed browsing allows users to have multiple home pages that automatically open when
the browser starts.

4|Page
Figure 2.0 Multiple tabs capability in the browser window

The Domain Name System

The Internet uses a system called the Domain Name System (DNS). DNS enables
users to type an address that includes letters as well as numbers. For example,
www.act.edu.om has the numeric address 46.40.224.163 (public).
Table 1.0 Common Top-Level Domain Names
Top-Level Domain Name Used By
.com Commercial businesses
.biz Businesses
.edu Educational institutions
.info Information
.gov Government agencies
.pro Professionals
.mil Military
.aero Aviation
.net Network organizations (such as ISPs)

5|Page
.coop Cooperatives
.org Nonprofit Organizations
.museum Museums
.name Names

Packets in Internet

Everything we do on the Internet involves packets. For example, every Web page
that you receive comes as a series of packets, and every e-mail you send leaves as a series of
packets. Networks that ship data around in small packets are called packet switched
networks.

A data packet is a unit of data made into a single package that travels along a given
network path. Data packets are used in Internet Protocol (IP) transmissions for data that
navigates the Web, and in other kinds of networks. Data usually exists as rather large files.
However, networks cannot operate if computers put large amounts of data on the cable at the
same time. Thus, for instance, the network breaks an e-mail message into parts of a certain size
in bytes. These are the packets. Each packet carries the information that will help it get to its
destination -- the sender's IP address, the intended receiver's IP address, something that tells
the network how many packets this e-mail message has been broken into and the number of
this particular packet. The packets carry the data in the protocols that the Internet uses:
Transmission Control Protocol/Internet Protocol (TCP/IP). Each packet contains part of the body
of your message. A typical packet contains perhaps 1,000 or 1,500 bytes.

Each packet is then sent off to its destination by the best available route -- a route that
might be taken by all the other packets in the message or by none of the other packets in the
message. This makes the network more efficient. First, the network can balance the load across
various pieces of equipment on a millisecond-by-millisecond basis. Second, if there is a problem
with one piece of equipment in the network while a message is being transferred, packets can
be routed around the problem, ensuring the delivery of the entire message.

Depending on the type of network, packets may be referred to by another name:


frame, block, cell, and segment.

6|Page
Understanding the Differences between Internet Connections

In identifying the appropriate type of Internet connection good for you or your
family, its vital to understand the differences between each connection. Today, there are
many ways to connect laptops, desktops, mobile phones, gaming consoles, e-readers and
tablets to the Internet. Some of the most widely used Internet connections are listed below:
1. Wireless: Radio frequency bands are used in place of telephone or cable networks.

One of the greatest advantages of wireless Internet connections is the always-on


connection that can be accessed from any location that falls within network
coverage. Wireless connections are made possible through the use of a modem,
which picks up Internet signals and sends them to other devices.

2. Mobile: Many cell phone and smartphone providers offer voice plans with Internet
access. Mobile Internet connections provide good speeds and allow you to access
the Internet on the go.

3. Hotspots: Hotspots are sites that offer Internet access over a wireless local area
network (WLAN) by way of a router that then connects to an Internet service
provider. Hotspots utilize Wi-Fi technology, which allows electronic devices to
connect to the Internet or exchange data wirelessly through radio waves. Hotspots
can be phone-based or free-standing, commercial or free to the public.

4. Dial-Up: Dial-up connections require users to link their phone line to a computer in
order to access the Internet. This particular type of connectionalso referred to as
analogdoes not permit users to make or receive phone calls through their home
phone service while using the Internet.

5. Broadband: This high-speed Internet connection is provided through either cable or


telephone companies. One of the fastest options available, broadband Internet uses
multiple data channels to send large quantities of information. The term broadband
is shorthand for broad bandwidth. Broadband Internet connections such as DSL and
cable are considered high-bandwidth connections. Although many DSL connections
can be considered broadband, not all broadband connections are DSL.

5.1 DSL: DSL, which stands for Digital Subscriber Line, uses existing 2-wire
copper telephone line connected to ones home so service is delivered at
the same time as landline telephone service. Customers can still place
calls while surfing the Internet.

7|Page
5.2 Cable: Cable Internet connection is a form of broadband access. Through
use of a cable modem, users can access the Internet over cable TV lines.
Cable modems can provide extremely fast access to the Internet.

6 Satellite: In certain areas where broadband connection is not yet offered, a satellite
Internet option may be available. Similar to wireless access, satellite connection
utilizes a modem.

7 ISDN: ISDN (Integrated Services Digital Network) allows users to send data, voice and
video content over digital telephone lines or standard telephone wires. The
installation of an ISDN adapter is required at both ends of the transmissionon the
part of the user as well as the Internet access provider.

There are quite a few other Internet connection options available, including T-1 lines,
T-3 lines, OC (Optical Carrier) and other DSL technologies.

1.1.3 Understanding Search Engine

The web is a worldwide resource of information. A primary reason that people use
the Web is to search for specific information, including text, pictures, music, and video. The
first step in successful searching is to identify the main idea or concept in the topic about
which you are seeking information. Determine any synonyms, alternate spellings, or variant
word forms for the topic. Then, use a search tool to locate the information. Two types of
search tools are search engines and subject directories. A search engine is a program that
finds Web sites, Web pages, images, videos, news, maps, and other information related to a
specific topic. A subject directory classifies Web pages in an organized set of categories,
such as sports or shopping, and related subcategories.

Some Web sites offer the functionality of both a search engine and a subject
directory. The table below lists the Web addresses of several popular general-purpose
search engines and subject directories.

8|Page
Table 2.0 Widely Used Search Tools
Search Tool Web Address Search Engine Subject Directory

A9 a9.com

AlltheWeb alltheweb.com

AltaVista altavista.com

AOL Search search.aol.com

Ask ask.com

Bing bing.com

Cuil (pronounced cool) cuil.com

Dogpile dogpile.com

Excite excite.com

Gigablast gigablast.com

Google google.com

Lycos lycos.com

MSN msn.com

Open Directory Project dmoz.org

WebCrawler webcrawler.com

Yahoo! yahoo.com

9|Page
The figure below shows how to use a search engine

A search can produce hundreds of thousands of hits, not all of them relevant to the
intended subject. It is possible to narrow the search considerably by using search operators
as listed below.

10 | P a g e
Operator Description Examples Explanation
Space or + Display hits that Information+Technology Results have both words
include specific Information Technology Information and Technology in any
words order
OR Display hits that Oman OR Muscat Results have either the word Oman
include only one Oman OR Muscat or Sohar or Muscat
word from a list Results have either the word Oman
or Muscat or Sohar
() Combine hits that Samsung (phone OR Result have the word Samsung and
include specific tablet) either the word phone, or the word,
words with those tablet.
that include only one
word from a list.
- Exclude a word from Automobile convertible Results include automobile but do
the search results not include convertible.
Search for an exact first computer Results have the exact phrase, first
phrase in a certain programmer computer programmer.
order.
* Substitute characters developer* Results include any word that begins
in place of the with developer (e.g. developer,
asterisk developers, developers)

Other techniques you can use to improve your searches include the following:
Use specific nouns, example software

Put the most important terms first in the search text.

List all possible spellings, for example, email, e-mail.

Before using a search engine, read its Help information.

If the search is unsuccessful with one search engine, try another.

There will be many occasions when a user wants to retrieve information from the web,
but does not have a specific address. It is still possible to find relevant information by using a
subject directory. Clicking on the relevant subject will take the user into progressively more
details lists, from which a selection can be made. Advantages of using subject directories are
that they generally contain good quality sites, consequently they contain fewer sites than

11 | P a g e
search engines and therefore save time. Most of the search engines also contain these
directories.

1.1.4 Evaluating a Website

Do not assume that information presented on the Web is correct or accurate. Any
person, company, or organization can publish a Web page on the Internet. No one oversees
the content of these Web pages. The table below lists guidelines for assessing the value of a
website or web page before relying on its content.
Table 3.0 Criteria for Evaluation a Web Sites Content
Evaluation Criteria Reliable Web Sites
Affiliation A reputable institution should support the website without bias
in the information.
Audience The Web site should be written at an appropriate level.
Content The Web site should be organized and the links should work.
Currency The information on the Web page should be current
Design The pages at the Web site should download quickly, be visually
pleasing, and easy to navigate.
Objectivity The Web site should contain little advertising and be free from
promotions.

1.1.5 Copyright and Fair Use

Copyright is the lawful right of an author, artist, composer or other creator to control
the use of his or her work by others. Generally speaking, a copyrighted work may not be
duplicated, disseminated, or appropriated by others without the creator's permission. The
public display or performance of copyrighted works is similarly restricted. Citing your work is
an important way to honor copyright and avoid accusations of inappropriate behavior or
plagiarism.
Refer to the following on how to cite electronic sources using APA referencing:

Websites
o To refer to an entire website:
For a passing reference to a website in text, the URL is sufficient; no
reference list entry is needed.

12 | P a g e
Example:
These United Nations policies are outlined on The International
Narcotics Control board website (http://www.incb.org)

o To cite a particular document or piece of information from a website

In text
Cite the name of the author/authoring body and the date created or last
revised. Example:
(International Narcotics Control Board, 1999)
Reference list
Include the following information:
author (the person or organization responsible for the site)
year (date created or last updated), between parentheses
Title of document
Retrieved from
webpage URL (If possible, ensure that the URL is included without a
line-break).

Example:
International Narcotics Control Board (1999). Psychotropic
Substances. Retrieved from
http://www.incb.org/incb/en/psychotropic-substances/index.html

How to Cite a Website in APA


Structure:
Last, F. M. (Year, Month Date Published). Article title. Retrieved from URL
Example:
Satalkar, B. (2010, July 15). Water aerobics. Retrieved from http://www.buzzle.com
Cain, K. (2012, June 29). The Negative effects of Facebook on communication. Social
Media Today RSS. Retrieved from http://socialmediatoday.com
How to Cite a Blog Post in APA
Structure:
Last, F. M. (Year Month Date Published). Article title [Type of blog post]. Retrieved
from URL.

13 | P a g e
Example:

Schonfeld, E. (2010, May 3). Google throws $38.8 million to the wind [Web log post].
Retrieved May 4, 2010, from http://techcrunch.com

China, The American Press, and the State Department [Web log post]. (2013, January
3). Retrieved from Schonfeld, E. (2010, May 3). Google throws $38.8 million to
the wind [Web log post]. Retrieved May 4, 2010, from http://techcrunch.com


A website with no author
When there is no author for a web page, the title moves to the first position of the
reference entry:

Example:
All 33 Chile miners freed in flawless rescue. (2010, October 13). Retrieved
from http://www.msnbc.msn.com/id/39625809/ns/world_news-americas/


A website with no date and no author

Because there is no date and no author, your text citation would include
the title (or short title) "n.d." for no date, and paragraph number (e.g., "Heuristic,"
n.d., para. 1). The entry in the reference list might look something like this:

Heuristic. (n.d.). In Merriam-Websters online dictionary (11th ed.). Retrieved


from http://www.m-w.com/dictionary/heuristic

A common infringement of copyright is piracy. Some people pirate or illegally copy


software, movies, and music. Many areas are not clear-cut with respect to the law, because
copyright law gives the public fair use of copyrighted material. Thus, the issues surround the
phrase, fair use, which allows use for educational and critical purposes.

Fair use is the right to use a copyrighted work under certain conditions without
permission of the copyright owner. Use of a work for purposes such as criticism, comment,
news reporting, teaching (including multiple copies for classroom use, scholarship, or
research) is not an infringement of copyright.

14 | P a g e
1.2. Internet Life and Privacy
1.2.1. Social Networking and My Privacy

Online social networks are websites that allow users to build connections and relationships
to other Internet users. Social networks store information remotely, rather than on a users
personal computer. Social networking can be used to keep in touch with friends, make new
contacts and find people with similar interests and ideas.

1.2.2. Safety Risks in Online Activities

A computer security risk is any event or action that could cause a loss of or damage
to computer hardware, software, data, information, or processing capability. An
international breach of computer security often involves a deliberate act that is against the
law. Any illegal act involving a computer generally is referred to as a computer crime. The
term cybercrime refers to online or Internet-based illegal acts.
Perpetrators of cybercrime and other intrusions fall into these categories:
1. Hacker: someone who accesses a computer or network illegally.

2. Cracker: someone who accesses a computer or network illegally, but has the
intent of destroying data, stealing information, or other malicious action.

3. Script kiddie: teenagers that use prewritten hacking and cracking programs to
break into computers

4. Corporate Spy: he/she has excellent and network skills and are hired to break into
a specific computer and steal its proprietary data and information.

5. Unethical employees: he/she breaks into employers computers for a variety of


reasons.
6. Cyber extortionist: someone who uses e-mail as a vehicle for extortion.

7. Cyber terrorist: someone who uses the Internet to destroy or damage computers
for political reasons.

Computer Virus: potentially damaging computer program that affects, or infects, a


computer negatively by altering the way the computer works without the users
knowledge, or permission.

Worm: a program that copies itself repeatedly, for example in memory or on a network,
using up resources and possibly shutting down the computer or network.

15 | P a g e
Trojan horse (named after the Greek myth): a program that hides within or looks like a
legitimate program.

Computer viruses, worms, and Trojan horses are classified as malware (short
for malicious software), programs that act without a users knowledge and
deliberately alter the computers operations.

Botnet: a group of compromised computers connected to a network. A compromised


computer, known as a zombie, is one whose owner is unaware the computer is being
controlled remotely by an outsider.

Denial of service attack, or DoS attack: an assault whose purpose to disrupt computer
access to an Internet service such as Web or e-mail.

Back Door: program or set of instructions in a program that allow users to bypass security
controls when accessing a program, computer, or network.

Spoofing: a technique intruders use to make their network or Internet transmission appear
legitimate to a victim computer or network.

Cyberbullying is the use of technology to harass, threaten, embarrass, or target another


person. By definition, it occurs among young people. When an adult is involved, it
may meet the definition of cyber-harassment or cyberstalking, a crime that can
have legal consequences and involve jail time.

Cyberbullying is bullying that takes place using electronic technology which includes devices
and equipment such as cell phones, computers, and tablets as well as
communication tools including social media sites, text messages, chat, and websites.
Examples of cyberbullying include mean text messages or emails, rumors sent by
email or posted on social networking sites, and embarrassing pictures, videos,
websites, or fake profiles.
1.2.3. Securing your Computer

Nowadays, people depend on computers to create, store, and manage important


information. Thus, it is vital that people take measures to secure their computers and data
from loss, damage, and misuse.

Tips for Preventing Virus, Worm, and Trojan horse Infections:

1. Never start a computer with removable media inserted in the drives or plugged in
the ports, unless the media are uninfected.
16 | P a g e
2. Never open an e-mail attachment unless you are expecting it and it is from a trusted
source.
3. Set the macro security in programs so that you can enable or disable macros.

4. Install an antivirus program. Update regularly. Antivirus program protects a


computer against viruses by identifying and removing any computer viruses found in
memory, on storage media, or on incoming files.
5. Check all downloaded programs for viruses, worms, or Trojan horses.

6. If the antivirus program flags an e-mail attachment as infected, delete the


attachment immediately.

7. Before using any removable media, use the antivirus scan program to check the
media for infection.

8. Install a personal firewall program. Personal firewall is a utility that detects and
protects a personal computer and its data from unauthorized intrusion.
9. Stay informed about new virus alerts and virus hoaxes.

Safeguards against Unauthorized Access and Use

1. Access control: a security measure that defines who can access a computer, when
they can access it, and what actions they can take while accessing the computer.

2. Computers should maintain an audit trail that records in a file both successful and
unsuccessful access attempts.

3. Use of username and password. Username is a unique combination of characters,


such as letters of the alphabet or numbers that identifies one specific user. Password
is a private combination of characters associated with the user name that allows
access to certain computer resources.

4. Some Websites use a CAPTCHA to further protect a users password. CAPTCHA,


Completely Automated Public Turing test to tell Computers and Humans apart, is a
program that verifies user input is not computer generated. A CAPTCHA displays a
series of distorted characters and requires the user to enter the characters correctly
to continue using the Web site.

17 | P a g e
1.3. Ethical Issues of Internet Contents

Computer ethics are moral guidelines that govern the use of computers and
information systems. Today, information accuracy is a major concern because many users
access information maintained by other people or companies, such as on the Internet. Thus,
do not assume that because the information is on the Web that is correct.

Information privacy refers to the right of individuals and companies to deny or restrict
the collection and use of information about them. Nowadays, huge databases store this data
online. Much of the data is personal and should be accessible only to authorized users.

E-Commerce and other web applications often rely on cookies to identify users. A
cookie is a small text file that a Web server stores on your computer. Cookie files typically
contain data about you, such as your user name or viewing preferences. Spyware is a
program placed on a computer without the users knowledge thats secretly collects
information about the user. Spyware can enter a computer as a virus or as a result of a user
installing a new program. Adware is a program that displays an online advertisement in a
banner or pop-up window on Web pages, e-mail messages, or other Internet services.

Phishing is a scam in which a perpetrator sends an official looking e-mail message


that attempts to obtain your personal and financial information. Pharming is a scam, similar
to phishing, where a perpetrator attempts to obtain your personal and financial information
via spoofing.

Spam is an unsolicited e-mail message or newsgroup posting sent to multiple


recipients or newsgroups at one. Spam is Internet junk mail. E-mail filtering is a service that
blocks e-mail messages from designated sources. An alternative to e-mail filtering is to get
an anti-spam program that attempts to remove spam before it reaches the inbox.

Social engineering is defined as gaining unauthorized access or obtaining


confidential information by taking advantage or the trusting human nature of some victims
and the naivety of others.

Employee monitoring involves the use of computers to observe, record, and review
an employees use of a computer, including communications such as e-mail messages,
keyboard activity, and Web sites visited. Content filtering is the process of restricting access
to certain material on the Web. Content filtering opponents argue that banning any
materials violates constitutional guarantees of free speech and personal rights. Web
filtering software is a program that restricts access to specified Web sites.

18 | P a g e
Internet Ethics for everyone
Internet ethics refers to the acceptable behavior for using internet. Thus, we should
be honest, respect the rights, and property of other people on the internet.

1. Acceptance: As internet users, we need to accept that Internet is not a value free-
zone .It means World Wide Web is a place where values are considered in the
broadest sense so we must take care while shaping content and services and we
should recognize that internet is not apart from universal society, but it is a primary
component of it.

2. Sensitivity to National and Local cultures: It belongs to all and there is no barrier of
national and local cultures. It cannot be subject to one set of values like the local TV
channel or the local newspaper, thus we have to accommodate multiplicity of usage.

3. While using e-Mail and chatting: Internet must be used for communication with
family and friends. Avoid chatting with strangers and forwarding e-mails from
unknown people or strangers. We must be aware of risks involved in chatting and
forwarding e-mails to strangers.

4. Pretending to be someone else: We must not use internet to fool others by


pretending to be someone else. Hiding our own identity to fool others in the Internet
world is a crime and may also be a risk to others.

5. Avoid Bad language: We must not use rude or bad language while using e-Mail,
chatting, blogging and social networking. We need to respect their views and should
not criticize anyone on the internet.

6. Hide personal information: We should not give personal details like home address,
phone numbers, interests, passwords. No photographs should be sent to strangers
because it might be misused and shared with others without their knowledge.

7. While Downloading: Internet is used to listen and learn about music. It is also used
to watch videos and play games we must not use it to download them or share
copyrighted material. We must be aware of the importance of copyrights and issues
of copyright.

8. Access to Internet: The internet is a time-efficient tool for everyone that enlarges the
possibilities for curriculum growth. Learning depends on the ability to find relevant and
reliable information quickly and easily, and to select, understand and assess that

19 | P a g e
information. Searching for information on the internet can help to develop these
skills. Classroom exercises and take-home assessment tasks, where students are
required to compare website content, are ideal for alerting students to the
requirements of writing for different audiences, the purpose of particular content,
identifying and judging accuracy and reliability. Since many sites adopt particular
views about issues, the internet is a useful tool for developing the skills of
distinguishing fact from opinion and exploring subjectivity and objectivity.

References:

Said Lezzar. (2008). IT Fundamentals and Computer Applications Volume 1. New Jersey: Pearson
Education, Inc.

Vermaat, Shelly. (2008). Discovering Computers Fundamentals Fifth Edition. Boston: Cengage
Learning.

Lesson 2: How Networks Send Data (n.d.). Retrieved


from http://pluto.ksi.edu/~cyh/cis370/ebook/ch03c.htm
Howstuffworks. What is a Packet? (n.d.) Retrieved from
http://computer.howstuffworks.com/question525.htm
Easybib. APA Website (n.d.). http://www.easybib.com/reference/guide/apa/website

American Psychological Association. How do you reference a web page that lists no author?
(n.d.) Retrieved from http://www.apastyle.org/learn/faqs/web-page-no-author.aspx

Stopbullying.gov. What is cyberbullying? (n.d.). Retrieved from


https://www.stopbullying.gov/cyberbullying/what-is-it/

Department of Electronics and Information Technology. Internet Ethics (n.d.). Retrieved from
http://infosecawareness.in/students/internet-ethics

20 | P a g e

You might also like