Professional Documents
Culture Documents
Module 2
Module 2
0 10-July-2020
In this chapter, we will discuss the evolution of the Internet along with various ways to connect to the
Internet, how data travels the Internet, and how the Internet works with domain names and IP
Addresses. It also introduces services available on the Internet, such as email, video conferencing,
telenet, file transferring, world wide web, ecommerce, newsgroup, and internet relay chat. Finally,
understand the ethical issues and how you protect yourself while using the Internet.
Figure 1. Using modem/s to connect computers and mobile devices to the Internet
(Source: Cengage Learning)
• Today, users often connect to the Internet via broadband Internet service because of its fast data
transfer speeds and its always-on connection. Through broadband Internet service, users can
download webpages quickly, play online games, communicate in real time with others, and more.
• Many public locations, such as shopping malls, coffee shops, restaurants, schools, airports,
hotels, and city parks have WI-FI hot spots. Hot Spot is a wireless network that provides Internet
connections to mobile computers and devices. Although most hot spots enable unrestricted or
open access, some require that users agree to terms of service, obtain a password or perform
some other action in order to connect the Internet.
or built into the computer or device, wireless modem, or communications device typically sends
signals through the airwaves to communicate with a mobile service provider.
• The organization that approves and controls TLDs is the Public Technical Identifiers (PTI). This
nonprofit organization is an affiliate of ICANN which stands for Internet Corporation for Assigned
Names and Numbers.
• The domain name system (DNS) is the method that the Internet uses to store domain names
and their corresponding IP addresses.
2. Telenet
It is the facility on the Internet through which a computer at a far distance can be used from another
location. Using Telenet, a remote computer can be accessed from another location.
3. File Transferring
The Internet provides the facility of downloading and uploading large volume of files. We need FTP
Client program to upload or download file from remote computer.
4. Video Conference
The advanced service of the Internet through which the people of different locations communicate by
watching each other is known as video conference.
6. E-commerce
It is the service on the Internet through which we can sell or buy goods. We can use it through some
special websites. The web sites which provide buying and selling facilities to the users are known as
electronic commerce sites.
8. Newsgroup
Newsgroup is one of the facilities provided by the Internet through which post notes or messages on
various subjects.
While the Internet was developed in the late 1960s, the World Wide Web emerged in the early 1990s as an
easier way to access online information using a browser.
• World Wide Web (WWW) is defined as a system of interlinked hypertext documents accessed via the
internet. Anyone who has internet connection can see web pages which involve multimedia tools such as
text, images, or videos. The proposal of Tim Berners-Lee in 1989 and Robert Cailliau, a computer scientist
was to use hypertext to integrate information into a web as nodes where users can view. In this way, World
Wide Web was designed as the first web service.
• Web 1.0
Web 1.0 was coined by Tim Berners-Lee as “read only” web. It is the first generation of WWW and lasted
between 1989 and 2005. Internet users were only reading information presented to them. It was not as
dynamic, vivid, and interactive as the web we use now. The primary aim of the websites was to make
information public for anyone and set up an online presence. In other words, the focus was on content
delivery rather than interaction and production.
• Web 2.0
Web 2.0 is described as the wisdom, people-centric, participative, and read- write web. Unlike 1.0 version,
Web 2.0 allows more control to users and provides interaction. Dale Dougherty working as the vice
president of O’Reilly Media delivered a speech about Web 2.0 in a conference, 2004. He defined web 2.0
as follows “Web 2.0 is the business revolution in the computer industry caused by the move to the internet
as platform, and an attempt to understand the rules for success on that new platform. Chief among those
rules is this: Build applications that harness network effects to get better the more people use them.”
• Web 3.0
Web 3.0 was suggested by John Markoff as the new kind of web in 2006. It is defined as semantic web and
includes integration, automation, discovery, and data. It encourages mobility and globalization.
Web 3.0 is also described as the intelligent semantic web. It allows users to find, share and combine more
easily. The semantic web allows a person or a computer to start off in one database, and then move through
an unending set of databases. The goal of linked data is to enable computers to do more useful work for us
by teaching machines to read web pages.
• Tim Berners-Lee explains semantic web as follows: “If HTML and the Web made all the online
documents look like one huge book, RDF, schema, and inference languages will make all the data
in the world look like on huge database”.
• Web 4.0
Web 4 is “based on wireless communication (mobile devices or computer) connecting people and objects
whenever and wherever in the physical or virtual world in real time”. The GPS which helps people to find
their way is a good example for this type.
• Web 5.0
Web 5.0 is still progressing and does not complete its formation however, it is defined as linked, emotive,
and symbolic web that communicates with humans. In addition, it is based on emotional association with
humans. It functions like a personal assistant. Technology and human interaction become inseparable.
Now, technology cannot understand how humans feel however, there are already some startups
like wefeelfine and emotiv that seek to explore human emotion. In this way, they will pave the way for more
personalized experience, which will attract more people ever.
➢ Ethics are a set of moral principles that govern an individual or a group on what is acceptable behavior
while using a computer.
➢ Computer ethics is a set of moral principles that govern the usage of computers. One of the common issues
of computer ethics is violation of copyright issues.
➢ Duplicating copyrighted content without the author’s approval, accessing personal information of others are
some of the examples that violate ethical principles.
Ethical Issues
The foundations of all secure systems are the moral principles and practices and the professional standards of
all employees of the organization, i.e., while people are part of the solution, they are also most of the problem.
The following issues are examples of security problems that an organization may have to deal with.
C. Piracy
This is the act of illegally reproducing or disseminating copyrighted material, such as computer
programs, books, music, and films.
E. Liability
Promises and affirmations made by the software developer to the user about the nature and quality of
the program can also be classified as an express warranty. Programmers or retailers possess the right to define
express warranties. Thus, they must be realistic when they state any claims and predictions about the ca-
pabilities, quality, and nature of their software or hardware. They should consider the legal aspects of their
affirmative promises, their product demonstrations, and their product description. Every word they say may be
as legally effective as though stated in writing. Thus, to protect against liability, all agreements should be in
writing. A disclaimer of express warranties can free a supplier from being held responsible for any informal,
hypothetical statements or predictions made during the negotiation stages.
G. Trade Secrets
A trade secret protects something of value and usefulness. This law protects the unique and secret aspects of
ideas, known only to the discoverer of his/her confidants. Once disclosed the trade secret is lost as such and
can only be protected under one of the following laws. The application of trade secret law is very important in
the computer field, where even a slight head start in the development of software or hardware can provide a
significant competitive advantage.
H. Sabotage
The computer can be the object of attack in computer crimes such as the unauthorized use of computer facilities,
alternation or destruction of information, data file sabotage, and vandalism against a computer system.
Computers have been shot, stabbed, short-circuited, and bombed.
Personal Information. Think before you post anything online or share information in emails. What you post
online, can be seen by anyone. Sharing personal information with others you do not know personally is one of
your biggest risks online. Sharing sensitive information such as your address, phone number, family members’
names, car information, passwords, work history, credit status, social security numbers, birth date, school
names, passport information, driver’s license numbers, insurance policy numbers, loan numbers, credit/ debit
card numbers, PIN numbers, and bank account information is risky and should be avoided. Consider removing
your name from websites that share your personal information obtained from public records (including your
phone number, address, social media avatars, and pictures) with anyone on the internet.
Photos. Photos taken from smartphones embed the GPS Coordinates in the photo, which will allow others to
know the location of where the picture was taken and may be used to find you. Beware of this when posting
photos to online social media sites. Remember that pictures posted online may be copied, altered, and shared
with many people without your knowledge or consent, unless you use privacy settings to limit who has access
to the pictures.
Emails, Phishing, and Malware. Beware when opening emails from unknown people or sources,
especially when they are unsolicited. Clicking on links or downloading attachments can infect your computer
with a virus or subject you to fraud, malware, or a scam. Some viruses harm your computer, while others could
steal your personal information and ultimately your identity. Be skeptical when receiving emails that look as if
they came from your bank or other financial institution particularly if they ask you to verify or enter personal or
financial information. Beware of scams that use links in emails directing you to a website or providing you with
a phone number to call. Some links in emails can be deceiving. Consider typing in your own link to the banks
and companies or look up the phone number yourself. In general, beware of email scams and websites that try
to trick you into sharing your personal information. A website that looks legitimate can be set up
quickly. Remember legitimate customer service representatives will never ask you for personal information or
passwords. Consider not responding to unsolicited emails, never click on links in these emails, and be cautious
if you are asked to respond quickly. Consider purchasing or downloading a good antivirus suite with spyware
protection.
Updates. Keep your computer’s operating system, browsers, antivirus, and other software up to date with the
latest or daily security patches.
Passwords. Choose strong passwords using 10 characters and combinations of upper-case letters, lower
case letters, symbols, and numbers. Do not include personal information. Consider changing your password
at least every 90 days when information is sensitive. Never leave passwords near your computer or in plain
sight. Use different passwords for various online activities because if one password is compromised, all will be
compromised. Never share your password. If given a choice to set up a password “hint” on an account, do not
choose something others can easily guess.
Social. Beware of meeting people in-person whom you meet on the internet or through emails. Not everyone
is honest with their identity, age, gender, and intentions. If necessary, do your research using public records
and consider seeking reputable references. If you decide to meet someone, never go alone, let others know
where you are going, meet in a very public place, and have your cell phone readily available.
Educating Children/ Teens. Talk to and educate your children about internet risks and dangers of internet
predators. Tell them never to meet people they met online in-person and never talk to people they really don’t
know. Discuss the importance of not posting identifying information, sensitive information, pictures, and details
of upcoming activities on the internet. Be sure they understand what someone portrays on the internet may not
be true. Teach them what they post online anyone can see unless they carefully control the privacy
settings. Spend time with your child on the internet, know their favorite online destinations, know their
passwords, limit the time they spend online, and consider placing the computer in a public room in the
house. Periodically review your child’s computer and emails. Know who your kids are chatting with online
Parental Controls. Parents should consider applying parental controls by their internet service provider and/
or blocking software on family computers and smartphones to limit the internet to safe websites. Contact your
internet provider if you have questions. Be sure to research your options regarding parental controls on
products.
Webcams. Be careful when using webcams. They can be high-jacked and turned on remotely. This allows
others to illegally view and listen to individuals without their knowledge. Consider turning them off or
disconnecting them when not in use. Limit or do not allow your children to use webcams and talk to them about
the risks.
Wireless. Beware when connecting your laptop or mobile device to unsecured networks. Computer hackers
on the same network can intercept your internet use and in some cases access files on your
computer. Consider password protecting your home wireless network and using a personal firewall program
for additional protection.
Shopping. Avoid purchasing goods and services from websites that do not have secure check-out using
“HTTPS.” Pay attention to the address line on the checkout page which asks you to enter your credit card
information. If the page does not have an “S” following “HTTP” in the address line, consider shopping
somewhere else. Be aware that some information transmitted on HTTP pages is done so using plain text which
can be intercepted by computer hackers.
Selling. Beware of selling and listing items in local ads or elsewhere online. Never meet someone alone. If
necessary, consider meeting in a public place, like a post office or bank rather than a parking lot. Beware of
posting photos taken from smartphones for online adds. You could be sharing your home address
with a criminal.
Public Computers. Avoid typing sensitive information on public computers, such as those in a public library
or an internet café. Spyware may be installed on these computers that record your every keystroke. Also, you
never know who may be watching your activity. Never select the feature that automatically signs you on to
email or check any box to “Remember my Password” on websites.
LEARNING ACTIVITY 1
SUMMARY
Module 2 presented the current breakthrough technologies and disruptive innovations that have emerged over
the past few years and discussed the different services offered through the web. It presented the evolution of
world wide web from web 1.0 to web 5.0. Finally, this module listed the different ethical issues and some tips
on how to protect yourself while using the Internet.
REFERENCES
E-SOURCES:
https://studywidpranay.wordpress.com/chapter-10-introduction-to-internet-and-web/
http://myeltcafe.com/teach/evolution-of-web-from-1-0-to-5-0/
http://www.evolutionoftheweb.com/
https://kullabs.com/class-10/computer-science/internet-and-its-services/services-on-the-internet
https://www.infosecawareness.in/concept/student/internet-ethics
https://www.niatec.iri.isu.edu/ViewPage.aspx?id=153