Professional Documents
Culture Documents
Introduction
Web is just one of the many services on the Internet. As we all know right now in the 21st
century, the technology is continuously innovating and the services that users can do on the
internet are also multiplying as time goes by. The internet has changed business, education,
government, healthcare, and even the ways in which we interact with our loved ones – especially
right now with the pandemic going on, there are countless of fresh ideas in which people use the
internet to communicate with everyone around the globe, and no doubt - internet has become one
of the key drivers of social evolution. With the help of the internet, communication can easily
take place without the parties ever meeting each other.
In this presentation, I will show you some of the internet services that helps humanity
communicate.
E-mail
The first service is, e-mail which we are all very familiar of. Electronic Mail or called e-
mail is the transmission of messages and files via a computer network. It is a method of
distributing a message or messages by electronic means from one computer user to one or more
recipients via a network. People use an e-mail program to create, send, receive, forward, store,
print, and delete e-mail messages. It may contain text, files, images, or other attachments.
Going back to history, the first e-mail was sent by Ray Tomlinson in 1971. He sent the e-
mail to himself as a test e-mail message. Now can I ask a question guys? Do you guys happen to
know the content of the first ever sent email? Actually, he doesn’t quite remember what the
content of that email is, so he said that the email is containing the text something like
“TEST123” or “QWERTYUIOP”. By the year 1996, more electronic mail was being sent than
postal mail. The original email standard only supported plain text messages. Eventually,
email evolved to support rich text with custom formatting. Today, email supports HTML
(Hypertext mark-up language; which refers to the hyperlinks that an HTML page may
contain)
First step, choose and use an email program or email software. There are countless email
programs and some of them are outlook, yahoo mail, gmail, zoho mail, proton mail, Microsoft
exchange online, MDaemon email server, and spike.
Secondly, you need to register an email account on one or more of the many e-mail
programs. To be recognized by your recipient, you will be needing an e-mail address. An e-mail
address is a combination of a user name and a domain name that identifies a user so that he or
she can receive Internet e-mail. A user name is according to your choice and if it is still available
as a username. It is a unique combination of characters, such as letters of the alphabet and/or
numbers, that identifies a specific user; while a domain name is provided by your chosen service
provider. For example, my chosen and available user name is blairecutie21 and my email
program is gmail, so my email address would be blairecutie21@gmail.com.
This are the steps on how to send an e-mail using gmail – an e-mail service provider.
First start an e-mail program and point to the New Mail Message button. Click the New Mail
Message button to display the Message window. Enter the recipient’s e-mail address, the subject,
and the message in the Message window. Click the Attach File button on the Message tab to
attach a file containing a photo to the message. Click the Send button to send the message. And
then the email recipient will receive it in just a matter of seconds, and voila, you have sent your
first email message.
And if you will ask, Blaire can my computer get a virus through e-mail? The answer
is yes. A virus is a computer program that can damage files and the operating system. One
way that virus authors attempt to spread a virus is by sending virus-infected e-mail
attachments. Now if you want to protect your computer from viruses, which obviously all
of us want, you may set up an antivirus program in your computer and use it to verify if
the email that you’re getting is virus free.
Mailing Lists
A mailing list, also called an e-mail list or distribution list, is a group of e-mail names
and addresses given a single name. It is used by an individual or an organization to send material
to multiple recipients. So rather than individually sending an email to each user, which
probably have the same message content, mailing lists makes the work a lot easier by
sending email to specific user groups through a single email message.
To add your e-mail name and address to a mailing list, you subscribe to it. To remove
your name, you unsubscribe from it, as easy as that. Mailing lists are generally used as a means
to share content, news and any product or service-related information with subscribers. One
good example of using mailing list is when your credit card company adds you to its mailing list
in order to send you special offers along with the other subscribers of that credit card company.
Moreover, spammers and bulk email senders also maintain mailing lists to instantly send bulk
emails to a large number of end users.
So basically, mailing list can be compared to what our generation used to do in junior
high school era, then we used to send group messages to a list of people and then send the same
message to all of them with one click. Those messages that contain a hashtag at the end,
#gmtoall #gudnyt, like that.
Instant Messaging
Instant Messaging (IM) is a real-time Internet communications service that notifies you
when one or more people are online and then allows you to exchange messages or files or to
even join a private chat room with your online buddies. So basically, this is a form of a text-
based communication in which two persons or more participate in a single conversation
over their computers or mobile devices within an internet-based chatroom. This IM service
is in any application that we use right now to communicate with other people, like, messenger,
telegram, the chat services in Instagram and twitter, etc.
So, how does it work? In its simplest form, instant messaging seeks to accomplish two
goals. One is to monitor presence for the purpose of sending presence-based alerts to users in the
IM. When a user logs on to an IM system, the login is recognized, and other online users who
have that address listed as a “buddy,” or friend, are notified of the user’s presence. The software
establishes a direct connection between users so they can talk to each other synchronously, in
real time.
Instant messaging systems date back to the 1960’s when the Compatible Time-Sharing
System (CTSS) was launched and it allowed up to 30 users to log in and send messages to each
other, all the way back in 1961. The design of the CTSS represents the beginning of the idea that
operating systems can work on multiple threads or multitask.
According to Britannica.com, the actual Instant Messaging was invented in 1971 by an
American computer scientist Murray Turoff as a chat function on a government computer
network. Its original purpose was to help exchange information which would aid the U.S.
government during emergencies.
In 1996, ICQ or I Seek You was launched and it allowed users to chat one-on-one or in
groups, share files, and search for other users.
In 1997, AOL Instant Messenger (AIM) was launched and it allows users to organize
their “buddies” by screen-name and displays who was online and available to chat.
In 1999, Microsoft joined the game and they launched MSN Messenger.
In the 2000s, when most of us here were born, the development of technology paved the
way for a host of instant messaging applications to emerge and evolve into multifunctional
platforms.
In 2003, Skype was launched and it utilized users’ microphone and webcam to
accommodate voice and video chat.
In 2008, Facebook chat debuted allowing users to chat with friends or a group of friends
through the Facebook platform.
In 2009, WhatsApp was launched as a way to send texts, audio, videos, and pictures
while bypassing SMS fees.
In 2010, Viber was released.
In 2011, WeChat has been launched to grow as a clone of WhatsApp.
In 2014, Facebook Chat was relaunched as a Messenger app which is a widely used
Instant Messaging application nowadays.
And in 2017 and 2018, both AIM and Yahoo Messenger ceased service and it is a proof
that Instant Messengers must adapt and innovate as the IM landscape further develops and
expands.
Chat Rooms
Chat room is a location, note that it is a location, IM is a service, okay so chat room is a
location on an Internet server that permits users to chat with each other. Chat is a real-time typed
conversation that takes place on a computer. IM differs from “Chat,” in which the user
participates in a more public real-time conversation within a chatroom where everyone on the
channel sees everything being written by all other users.
In 1974, the first online conferencing system was developed by David Wooley and Doug
Brown. It allowed five people, take note of this, it allowed five people per channel to
communicate with each other and it offered several channels. When a user typed a message,
each character would show up on the screen of the other users as they were being typed in
real time.
To start a chat session, you need to connect to a chat server through a program called a
chat client. Once you have installed a chat client, you can create or join a conversation on the
chat server to which you are connected. As you type on your keyboard, the letters and symbols
that you are typing is displayed on your computer screen and also on the computer screens of
other people in the same chat room. To save time chatting, the users of chat rooms and IM
likes to type abbreviations and acronyms for phrases such as “R u there” which stands for
“Are you there?”.
VoIP
VoIP (Voice over IP), also called Internet telephony, enables users to speak to other users
over the Internet instead of using a public switched telephone network. Voice over Internet
Protocol (VoIP) is a proven technology that lets anyone place phone calls over an internet
connection. With the rise of broadband, VoIP has become the definitive choice for phone
service for consumers and businesses alike. They enjoy it over traditional phone lines
because it offers more capabilities than analog phones and it can do it all for less than half
the cost. So it would be very practical and budget wise for you to choose VoIP over the
traditional phone call.
To place an Internet telephone call, you need a high-speed Internet connection via
cable or DSL (digital subscriber line) modem; Internet telephone service; a microphone or
telephone, depending on the Internet telephone service; and an Internet telephone software
or VoIP broadband router or a telephone adapter, which also depending on the Internet
telephone service.
What’s interesting about VoIP is that there is not just one way to place a call, there are
more than two ways to do it. With this presentation, I will discuss about conducting VoIP
using IP phones. IP phone is different from your traditional telephone because it connects
directly to your router and have the hardware and software necessary right on board to
handle the IP call. In four steps, here’s how VoIP works.
1. Your phone connects to your switch or router in your Local Area Network (LAN).
2. When you dial a telephone number, your IP phone tells your VoIP service provider to call
the other party.
3. Your VoIP service establishes the call and exchanges data packets from your IP phone.
4. Your VoIP phone converts these digital signals which forms the sound you can hear.
So in order to learn more about VoIP, let’s watch this short video.
FTP
FTP is a way to transfer files online. There are many other protocols that, collectively,
make up the internet. IMAP (Internet Message Access Protocol) and POP (Post Office Protocol),
for instance, are two protocols that email clients use to send and receive messages. XMPP
(Extensible Messaging Presence Protocol) is a protocol used to send and receive instant
messages. FTP is another such protocol.
[What is protocol? The internet relies on a number of protocols in order to function
properly. A protocol is simply a standard for enabling the connection, communication, and
data transfer between two places on a network.”
File Transfer Protocol (FTP) is an Internet standard that permits the process of file
uploading and downloading with other computers on the Internet. Uploading is the process of
transferring documents, graphics, and other objects from your computer to a server on the
Internet while downloading is the process of transferring documents, graphics, and other objects
from a server on the Internet to your computer.
FTP is one of the simplest, and earliest formats created to quickly move files from one device to
another. It has its origins all the way in 1971, when the first version was created and published
by Abhay Bhushan. In the 1980s, the FTP format was updated to the TCP/IP version associated
with servers.
Is FTP secure? No. Not by design. When the FTP was created, cybersecurity was also in
the process of being developed. It means that security on the technology, internet, and such is not
yet being developed taken into consideration. So basically, FTP was not built to be secure. It
generally considered to be an insecure protocol because it relies on clear-text usernames and
passwords for authentication and does not use encryption. Data sent via FTP is vulnerable to
sniffing, spoofing, port stealing, anonymous vulnerability, and brute force attacks.
Newsgroups and Message Boards
A newsgroup is an online area in which users have written discussions about a particular
subject. Some newsgroups require you to enter a user name and password to participate in the
discussion. To participate in a newsgroup, typically you use a program called a newsreader. In
order to participate in a discussion, a user sends a message to the newsgroup, and other users in
the newsgroup read and reply to the message.
A message board is a popular Web-based type of discussion group that does not require
a newsreader. Many web sites use message boards instead of newsgroups because they are easier
to use.
Discussion boards (which are often called message boards) and newsgroups in general
both accomplish the same task. They each have general topics, and visitors can post messages
about those topics on them. Discussion boards are usually read through a web browser, while
newsgroups are usually read through a special program called a (newsgroup) reader.
Now we are finished discussing other internet services. Now let’s proceed to the
etiquettes while using them.
Netiquette
Netiquette, which is short for Internet etiquette, is the code of acceptable behaviors or
conduct that is expected for users to follow while they are using the Internet.
In this presentation, we’ll show you some of the Internet etiquette that we should execute
in our daily Internet life.
1. Remember that you are communicating with real people - What frequently gets
people into trouble when communicating online is that they easily forget they are
communicating with real people. You are not communicating with robots, or a wood, or a
screen, you are talking with someone who has life. Adhere to the same standards of
behavior online as to the standards that you adhere in real life. So remember to always be
respectful, always, at all times. Which leads us to our second netiquette
2. Use respectful language - Name-calling, cursing, expressing deliberately offensive
opinions—if you wouldn't do it to the face of anyone who might see what you write, don't
write it. This goes for any social media site, forum, chat room, or even email message,
even if you think it can't be traced back to you, even if you are using an anonymous or
fake account, don’t do it. As simple as that. And it's not just what you say, but how you
say it. Remember to write in all lower case, don't use caps lock because text in all caps is
generally perceived as yelling even if you don’t mean it like that. It can be easily
misunderstood so please take that into consideration. Also, please don't forget to say
please and thank you as appropriate.
3. Fact check before posting – That cure for cancer might sound pretty impressive, but it
will just cause upset if it is a hoax. And urban myths add to the noise of the internet can
definitely waste people's time. If you aren't sure of the facts, make sure to do a research
about it first and if you can’t really find a reliable source about it, just believe on it at
your own risk, never share it unless you’re sure of it, by sure I mean, you have fact
checked it from a reliable source. Don't forget that many viruses are circulated via chain
letters and invitations, so unless you’re sure it’s virus free, don’t share it.
4. Respect people’s privacy – the ability to share information at the touch of a button
comes with responsibility. You should not publicly identify or post private information
about someone especially as a form of punishment or revenge. You should also avoid
snooping around in someone’s else’s computer or email to find out information that
normally wouldn’t be open to you. Don’t forward information sent to you without
checking with the original sender first. Make sure to receive permission before sharing it.
The same goes for uploading photos or videos that include other people’s faces and
personal information to public space. For example, their face, plate number, mobile
numbers, id card numbers, etc. It would be better to just blur it all out before posting or
sharing.
Netiquette follows the Golden rule; treat others as you would like them to treat you.
The ability to reach out to real people with one quick click of a button can be wonderful.
You’re given access to new worlds of information. But this ease of communication — and ability
to speak behind the cloak of your devices without face-to-face contact — brings up several
issues that can present real challenges.
One of those issues is cyberbullying. Cyber-bullying is the harassment of computer users,
it often happens to teens and preteens, through various forms of Internet communications. The
bullying may be in the form of threats, spreading of rumors, or humiliation. To know more about
cyberbullying and how to possibly fight it, let’s watch these two short videos.
This is why Netiquette literacy is very important especially in the contemporary world
where everyone has Internet on the palm of their hands. So remember guys to always be careful
because what goes around comes around just like a flip turn.