You are on page 1of 24

INTERNET TECHNOLOGY

Lecture 6
BROWSING SAFELY

Risks of Browsing
•Privacy at risk
•Computer could become infected with a virus
•Identity theft
In Private Browsing: view Web sites without browser saving personal
information
In Private Filtering: prevents Web site or third-party developers from
collecting information about sites you visit
Digital Certificate: verifies the identity of a person or indicates the
security of a Web site

2
BROWSING SAFELY

• Phishing is an illicit activity where people send you


fraudulent Web sites to gather your personal information
for possible illegal purposes.
• Smart Screen Filter is a feature in Internet Explorer 8
that helps detect phishing Web sites.

3
SEARCHING FOR INFORMATION

Search options:
• Enter keywords in the Search bar
• Enter keywords in the Search box

Use search engines


• Bing
• MSN Search
• Google
• Yahoo! Search
4
SEARCHING FOR INFORMATION

5
SEARCHING FOR INFORMATION

Blocking pop-ups:
•Pop-ups are windows that open on your screen as you visit Web
sites, generally to advertise products that you might or might not want
6
•Internet Explorer comes with a built-in Pop-up Blocker
•Pop-up Blocker can be turned on or off
GETTING HELP AND EXITING INTERNET EXPLORER
• Getting Help
• •Internet Explorer provides a Help system with
information and instructions on various features and
commands
• •Internet Explorer Accelerator button links to services
related to text you highlight in a page

7
UNIFORM RESOURCE LOCATORS (URL)
• The IP address and the domain name each identify a particular computer on
the Internet.
• However, they do not indicate where a Web page’s HTML document resides
on that computer.
• To identify a Web pages exact location, Web browsers rely on Uniform
Resource Locator (URL).
• URL is a four-part addressing scheme that tells the Web browser:
• What transfer protocol to use for transporting the file
• The domain name of the computer on which the file resides
• The pathname of the folder or directory on the computer on which the file
resides 8
• The name of the file
UNIFORM RESOURCE LOCATORS (URL)

9
WHAT IS HYPERTEXT?
Hypertext is a method of presenting information, where selected
words in text can be expanded at any time to provide other
information about the word. Those words are links to other
documents which may be text, file, pictures etc., Links can be
identified by highlighted (underlined) and coloured text.

HTML (Hypertext Markup Language) is the language used to


create WWW pages and associated links.

10
WHAT IS HYPERTEXT?
Hypertext is a method of presenting information, where selected
words in text can be expanded at any time to provide other
information about the word. Those words are links to other
documents which may be text, file, pictures etc., Links can be
identified by highlighted (underlined) and coloured text.

HTML (Hypertext Markup Language) is the language used to


create WWW pages and associated links.

11
DOMAIN NAME
• Domain Name: The name always has two or more parts
separated by a dot. The last part of the name identifies the
site.
• Top-Level Domains:
– .edu – Educational Institutions
– .com – Company / Commercial Organizations
– .org – Non-profit Organizations
– .net – Network, network of sites
– .mil – Military Installations
– .gov – Government sites
• Sub Domains:
– .sa – Saudi Arabia
– .in - India
– .jp - Japan
12
– .uk – United Kingdom
File Transfer protocol (FTP)

One of the most popular uses of the internet is to download/ upload files that is
transfer files from a computer on the internet to your computer and vise versa.
– Various types of files (executable programs, graphics, audio, text)
– Different types of FTP Sites all use Logon & Password
• anonymous FTP sites (anonymous & email address as passwords) or
automatic logon
• Private FTP Sites (account number & password)
– FTP runs on a Client / Server model.
• windows has a client command-line FTP program, but other
software programs such as WS_FTP95 are simpler and easier to use.

13
WHAT IS E-MAIL AND HOW TO USE IT?
• Electronic mails are another form of communication
which nowadays has replaced our traditional hand
written letter.

• E-mails are letters that can be sent through the internet


and can arrive almost instantly and without cost.

• E-mails are an essential part of every company and


every person who needs to communicate with people that
live far away from them.

14
ELECTRONIC MAILS
• Encryption for E-Mail Privacy
– Public & Private Keys most common form of encryption

• How E-Mail Spam Works


– Spam is Unsolicited Junk E-mail
– Blocking Spam
• Write back to Spammer and asked to be removed

• E-mail Software filters e-mail addresses

• ISP like AOL block spammers from sending bulk mail to

subscribers
• Ensure that your email address isn’t added to spam list

– Notify e-mail directories to remove your e-mail address


– When posting to UseNet newsgroups edit your header so that it
doesn’t contain your e-mail address
15
ELECTRONIC MAILS
• Email: Advantages and Disadvantages:

Disadvantages
Advantages
• Misdirection
• Convenience
• Interception
• Speed
• Forgery
• Inexpensive • Overload
• Printable • Junk
• Reliable • No response
• Global
• Generality

16
EMAIL SHORT HAND

EML Email me later


10Q Thank you
FYI: For your information
PYR Per Your Request
EOM End of message.
FWD Forwarded
ASAP As soon as possible
BTW By the way
IMO In my opinion
NBD not big deal
OIC oh, I see!
OTOH on the other hand
17
POV point of view
HOW TO CREATE E-MAIL
• The most popular e-mail programs in the internet world are
Google, Yahoo and Hotmail.
• First of all the user must create a new account in one of
these programs to make an e-mail. That will be by pressing
on “Create New Account” to fill some information like
personal information and pick up an e-mail address.
• If no problems occurred such as missing information
then the user can establish using the e-mail for sending and
receiving information.
18
HOW TO CREATE E-MAIL

19
HOW TO CREATE E-MAIL

20
• HMessages
OW TOsent
CREATE E-Mmail
by electronic AILnormally reach a recipient’s account
within seconds. They frequently include more than just text; images
and numerous types of formatted documents are now easily included as
attached files.
• Moreover, it is no longer necessary to be sitting in front of a PC to
send or receive an email. A variety of mobile devices, such as tablet
computers and smart phones, make it possible manage correspondence
on the go.
• If the user wants to read the coming emails he must press on
“inbox” then pressing on the message.
• If the user wants to write a message to someone then he must press
on “Compose Message”.
21
HOW TO CREATE E-MAIL
Sending a Message

• When the user wants to send a message he must know the e-mail
address for the recipient in the other side.
• There is a text box named be “To” to write the e-mail address in it.
• Then the user can write the title of his message in a text box named
by “Subject”.
• Then he can write the message in the bigger text box and then press
on “Send”.

22
HOW TO CREATE E-MAIL

23
HOW TO CREATE E-MAIL
A. Attaching Files
• Also the user can attach a file which can contain a text,
pictures or videos by pressing on “Attachment” button for
attaching any file saved in the computer.

24

You might also like