You are on page 1of 9

FM-AA-CIA-15 Rev.

0 10-July-2020

Study Guide in (GE111 – Living in the IT ERA) Module No. 2

STUDY GUIDE FOR MODULE NO. 2

Chapter 2 – The Web and the Internet


MODULE OVERVIEW

In this chapter, we will discuss the evolution of the Internet along with various ways to connect to the
Internet, how data travels the Internet, and how the Internet works with domain names and IP
Addresses. It also introduces services available on the Internet, such as email, video conferencing,
telenet, file transferring, world wide web, ecommerce, newsgroup, and internet relay chat. Finally,
understand the ethical issues and how you protect yourself while using the Internet.

MODULE LEARNING OBJECTIVES

At the end of this, students are expected to:


• Explore the current breakthrough technologies and disruptive innovations that have emerged over the
past few years.
• Identify the different services offered through the web.
• Appreciate the evolution of world wide web.
• Understand the risk of putting your information over the internet.

LEARNING CONTENTS (Introduction to Internet)

• Internet is a worldwide collection of networks that connects millions of businesses, government


agencies, educational institutions, and individuals. Each of the networks on the Internet provides
resources that add to the abundance of goods, services, and information accessible via the
Internet.
• The Internet has its roots in a networking project started by the Pentagon’s Advanced Research
Projects Agency (ARPA), an agency of the U.S> Department of Defense. ARPA’s goal was to
build a network that (a) allowed scientists at different physical locations to share information and
work together on military and scientific projects and (b) could function even if part of the network
were disabled or destroyed by a disaster such as a nuclear attack. That network, called
ARPANET, became functional in September 1969, linking scientific and academic researchers
across the United States.
• The Internet consists of many local, regional, national, and international networks. Both public and
private organization own networks on the Internet. These networks, along with phone companies,
cable and satellite companies, and the government, all contribute toward the internal structure of
the Internet.
• The popular term for the Internet is the “information highway”.
• Rather than moving through geographical space, it moves your ideas and information through
cyberspace – the space of electronic movement of ideas and information.

Connecting to the Internet


• Users can connect their computers and mobile devices to the Internet through wired or wireless
technology and then access its services free or for a fee. With wired connections, a computer or
device physically attaches via a cable or wire to a communication device such as a modem, that
transmits data and other items over a transmission media to the Internet. For wireless
connections, many mobile computers and devices include the necessary built-in technology so
that they can transmit data and other items wirelessly.

PANGASINAN STATE UNIVERSITY 1


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in (GE111 – Living in the IT ERA) Module No. 2

• A wireless modem uses a wireless communication technology (such as satellite or WIFI) to


connect to the Internet. Figure 1 below shows example of modem that connects to a computer
and enables additional functions when attached.

Figure 1. Using modem/s to connect computers and mobile devices to the Internet
(Source: Cengage Learning)
• Today, users often connect to the Internet via broadband Internet service because of its fast data
transfer speeds and its always-on connection. Through broadband Internet service, users can
download webpages quickly, play online games, communicate in real time with others, and more.
• Many public locations, such as shopping malls, coffee shops, restaurants, schools, airports,
hotels, and city parks have WI-FI hot spots. Hot Spot is a wireless network that provides Internet
connections to mobile computers and devices. Although most hot spots enable unrestricted or
open access, some require that users agree to terms of service, obtain a password or perform
some other action in order to connect the Internet.

INTERNET SERVICE PROVIDERS (ISP)


An Internet Service Provider (ISP), sometimes called an Internet access provider, is a business
that provides individuals and organizations access to the Internet free or for a fee. ISPs often charge
a fixed amount for an Internet connection, offering customers a variety of plans based on desired
speeds, bandwidth, and services.
Bandwidth is a measure of the capability of a network to send and receive data. A high
bandwidth connection transmits more data than a low bandwidth connection during the same time.
Data sizes typically are stated in terms of megabytes and gigabytes.
Megabyte (MB) is equal to approximately one million characters.
Gigabyte (GB) is equal to approximately one billion characters.

MOBILE SERVICE PROVIDER


A mobile service provider, sometimes called a wireless data provider, ia an ISP that offers wireless
Internet access to computers and mobile devices with the necessary built-in wireless capability,
wireless modems, or other communications devices that enable wireless connectivity. An Antenna on

PANGASINAN STATE UNIVERSITY 2


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in (GE111 – Living in the IT ERA) Module No. 2

or built into the computer or device, wireless modem, or communications device typically sends
signals through the airwaves to communicate with a mobile service provider.

How data travels the Internet


Computers and devices connected to the Internet work together to transfer data around the
world using servers and clients and various wired and wireless transmission media. On the Internet,
your computer or device is a client that can access data and services on a variety of servers. Wired
transmission media includes phone line, coaxial cable, and fiber-optic cable. Wireless transmission
media includes radio waves and satellite signals.

IP Addresses and Domain Names


IP Address, short for Internet Protocol address is a sequence of numbers that uniquely
identifies the location of each computer or device connected to the Internet or any other network.
Domain Name is a text-based name that corresponds to the IP address of a server, such as a
web server that hosts a website. It is part of the web address that you type in a browser’s address bar
to access a website.
The suffix of the domain name, called the top-level domain (TLD), identifies the type of
organization associated with the domain. The following table lists some popular TLDs.
TLD Intended Purpose
.biz Businesses
.com Commercial organization, businesses, and companies
.edu Educational institutions
.gov Government agencies
.mil Military organizations
.net Network providers or commercial companies
.org Nonprofit organizations
.pro Licensed professionals

• The organization that approves and controls TLDs is the Public Technical Identifiers (PTI). This
nonprofit organization is an affiliate of ICANN which stands for Internet Corporation for Assigned
Names and Numbers.
• The domain name system (DNS) is the method that the Internet uses to store domain names
and their corresponding IP addresses.

LEARNING CONTENTS (Services offered through the Internet)

Some of the services provided by the internet are as follows.


1. Electronic Mail. (E-mail)
Electronic Mail is an electronic message that is transferred from one computer to another
computer through the Internet.
Advantages of Email:
a. It is the cheapest and fastest mail service.
b. you can send any form of data like text, image, video, etc.
c. physical presence or recipient is not required.
d. It can be read anywhere in the world

2. Telenet
It is the facility on the Internet through which a computer at a far distance can be used from another
location. Using Telenet, a remote computer can be accessed from another location.

3. File Transferring
The Internet provides the facility of downloading and uploading large volume of files. We need FTP
Client program to upload or download file from remote computer.

PANGASINAN STATE UNIVERSITY 3


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in (GE111 – Living in the IT ERA) Module No. 2

4. Video Conference
The advanced service of the Internet through which the people of different locations communicate by
watching each other is known as video conference.

5. World Wide Web (WWW)


This provides millions of information on various topics. There are millions of web sites on the web which
provide information. Each web site is identified by the Internet Address or Uniform Resource Locator
(URL).

6. E-commerce
It is the service on the Internet through which we can sell or buy goods. We can use it through some
special websites. The web sites which provide buying and selling facilities to the users are known as
electronic commerce sites.

7. Electronic Fax (E-Fax)


It is the service through which user send and receive faxes directly from one computer to another. To
use Electronic Fax service, a computer should have a modem, e-fax program, and internet.

8. Newsgroup
Newsgroup is one of the facilities provided by the Internet through which post notes or messages on
various subjects.

9. Internet Relay Chat


It is also one of the most popular services of the Internet which allows people at different locations to
send and receive instant message. We can send voice or ext message through Internet Relay Chat.

LEARNING CONTENTS (Evolution of the World Wide Web)

While the Internet was developed in the late 1960s, the World Wide Web emerged in the early 1990s as an
easier way to access online information using a browser.
• World Wide Web (WWW) is defined as a system of interlinked hypertext documents accessed via the
internet. Anyone who has internet connection can see web pages which involve multimedia tools such as
text, images, or videos. The proposal of Tim Berners-Lee in 1989 and Robert Cailliau, a computer scientist
was to use hypertext to integrate information into a web as nodes where users can view. In this way, World
Wide Web was designed as the first web service.
• Web 1.0
Web 1.0 was coined by Tim Berners-Lee as “read only” web. It is the first generation of WWW and lasted
between 1989 and 2005. Internet users were only reading information presented to them. It was not as
dynamic, vivid, and interactive as the web we use now. The primary aim of the websites was to make
information public for anyone and set up an online presence. In other words, the focus was on content
delivery rather than interaction and production.
• Web 2.0
Web 2.0 is described as the wisdom, people-centric, participative, and read- write web. Unlike 1.0 version,
Web 2.0 allows more control to users and provides interaction. Dale Dougherty working as the vice
president of O’Reilly Media delivered a speech about Web 2.0 in a conference, 2004. He defined web 2.0

PANGASINAN STATE UNIVERSITY 4


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in (GE111 – Living in the IT ERA) Module No. 2

as follows “Web 2.0 is the business revolution in the computer industry caused by the move to the internet
as platform, and an attempt to understand the rules for success on that new platform. Chief among those
rules is this: Build applications that harness network effects to get better the more people use them.”
• Web 3.0
Web 3.0 was suggested by John Markoff as the new kind of web in 2006. It is defined as semantic web and
includes integration, automation, discovery, and data. It encourages mobility and globalization.
Web 3.0 is also described as the intelligent semantic web. It allows users to find, share and combine more
easily. The semantic web allows a person or a computer to start off in one database, and then move through
an unending set of databases. The goal of linked data is to enable computers to do more useful work for us
by teaching machines to read web pages.
• Tim Berners-Lee explains semantic web as follows: “If HTML and the Web made all the online
documents look like one huge book, RDF, schema, and inference languages will make all the data
in the world look like on huge database”.

• Web 4.0
Web 4 is “based on wireless communication (mobile devices or computer) connecting people and objects
whenever and wherever in the physical or virtual world in real time”. The GPS which helps people to find
their way is a good example for this type.
• Web 5.0
Web 5.0 is still progressing and does not complete its formation however, it is defined as linked, emotive,
and symbolic web that communicates with humans. In addition, it is based on emotional association with
humans. It functions like a personal assistant. Technology and human interaction become inseparable.
Now, technology cannot understand how humans feel however, there are already some startups

PANGASINAN STATE UNIVERSITY 5


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in (GE111 – Living in the IT ERA) Module No. 2

like wefeelfine and emotiv that seek to explore human emotion. In this way, they will pave the way for more
personalized experience, which will attract more people ever.

LEARNING CONTENTS (Ethical Issue – A Glimpse of Privacy)

➢ Ethics are a set of moral principles that govern an individual or a group on what is acceptable behavior
while using a computer.
➢ Computer ethics is a set of moral principles that govern the usage of computers. One of the common issues
of computer ethics is violation of copyright issues.
➢ Duplicating copyrighted content without the author’s approval, accessing personal information of others are
some of the examples that violate ethical principles.

Ethical Issues
The foundations of all secure systems are the moral principles and practices and the professional standards of
all employees of the organization, i.e., while people are part of the solution, they are also most of the problem.
The following issues are examples of security problems that an organization may have to deal with.

A. Ethics and Responsible Decision-Making


The student should be made aware of his individual responsibility in making ethical decisions
associated with information security.

B. Confidentiality & Privacy


Computers can be used symbolically to intimidate, deceive, or defraud victims. Attorneys, government
agencies, and businesses increasingly use mounds of computer-generated data quite legally to confound their
audiences. Criminals also find useful phony invoices, bills, and checks generated by the computer.The
computer lends an ideal cloak for carrying out criminal acts by imparting a clean quality to the crime.
The computer has made the invasion of our privacy a great deal easier and potentially more dangerous than
before the advent of the computer. A wide range of data is collected and stored in computerized files related to
individuals. These files hold banking information, credit information, organizational fundraising, opinion polls,
shop at home services, driver license data, arrest records, and medical records. The potential threats to privacy
include the improper commercial use of computerized data, breaches of confidentiality by releasing confidential
data to third parties, and the release of records to governmental agencies for investigative purposes.

C. Piracy
This is the act of illegally reproducing or disseminating copyrighted material, such as computer
programs, books, music, and films.

D. Fraud & Misuse


The computer can create a unique environment in which unauthorized activities can occur. Crimes in
this category have many traditional names including theft, fraud, embezzlement, extortion, etc. Computer-
related fraud includes the introduction of fraudulent records into a computer system, theft of money by electronic
means, theft of financial instruments, theft of services, and theft of valuable data.

E. Liability
Promises and affirmations made by the software developer to the user about the nature and quality of
the program can also be classified as an express warranty. Programmers or retailers possess the right to define
express warranties. Thus, they must be realistic when they state any claims and predictions about the ca-
pabilities, quality, and nature of their software or hardware. They should consider the legal aspects of their
affirmative promises, their product demonstrations, and their product description. Every word they say may be
as legally effective as though stated in writing. Thus, to protect against liability, all agreements should be in
writing. A disclaimer of express warranties can free a supplier from being held responsible for any informal,
hypothetical statements or predictions made during the negotiation stages.

PANGASINAN STATE UNIVERSITY 6


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in (GE111 – Living in the IT ERA) Module No. 2

F. Patent and Copyright Law


A patent can protect the unique and secret aspects of an idea. It is very difficult to obtain a patent
compared to copyright (please see discussion below). With computer software, complete disclosure is required;
the patent holder must disclose the complete details of a program to allow a skilled programmer to build the
program.
Copyright law provides a very significant legal tool for use in protecting computer software, both before
a security breach and certainly after a security breach. This type of breach could deal with the misappropriation
of data, computer programs, documentation, or similar material. For this reason, the information security
specialist will want to be familiar with basic concepts of copyright law.

G. Trade Secrets
A trade secret protects something of value and usefulness. This law protects the unique and secret aspects of
ideas, known only to the discoverer of his/her confidants. Once disclosed the trade secret is lost as such and
can only be protected under one of the following laws. The application of trade secret law is very important in
the computer field, where even a slight head start in the development of software or hardware can provide a
significant competitive advantage.

H. Sabotage
The computer can be the object of attack in computer crimes such as the unauthorized use of computer facilities,
alternation or destruction of information, data file sabotage, and vandalism against a computer system.
Computers have been shot, stabbed, short-circuited, and bombed.

Protecting Yourself While Using the Internet

Personal Information. Think before you post anything online or share information in emails. What you post
online, can be seen by anyone. Sharing personal information with others you do not know personally is one of
your biggest risks online. Sharing sensitive information such as your address, phone number, family members’
names, car information, passwords, work history, credit status, social security numbers, birth date, school
names, passport information, driver’s license numbers, insurance policy numbers, loan numbers, credit/ debit
card numbers, PIN numbers, and bank account information is risky and should be avoided. Consider removing
your name from websites that share your personal information obtained from public records (including your
phone number, address, social media avatars, and pictures) with anyone on the internet.

Photos. Photos taken from smartphones embed the GPS Coordinates in the photo, which will allow others to
know the location of where the picture was taken and may be used to find you. Beware of this when posting
photos to online social media sites. Remember that pictures posted online may be copied, altered, and shared
with many people without your knowledge or consent, unless you use privacy settings to limit who has access
to the pictures.

Emails, Phishing, and Malware. Beware when opening emails from unknown people or sources,
especially when they are unsolicited. Clicking on links or downloading attachments can infect your computer
with a virus or subject you to fraud, malware, or a scam. Some viruses harm your computer, while others could
steal your personal information and ultimately your identity. Be skeptical when receiving emails that look as if
they came from your bank or other financial institution particularly if they ask you to verify or enter personal or
financial information. Beware of scams that use links in emails directing you to a website or providing you with
a phone number to call. Some links in emails can be deceiving. Consider typing in your own link to the banks
and companies or look up the phone number yourself. In general, beware of email scams and websites that try
to trick you into sharing your personal information. A website that looks legitimate can be set up
quickly. Remember legitimate customer service representatives will never ask you for personal information or
passwords. Consider not responding to unsolicited emails, never click on links in these emails, and be cautious
if you are asked to respond quickly. Consider purchasing or downloading a good antivirus suite with spyware
protection.

PANGASINAN STATE UNIVERSITY 7


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in (GE111 – Living in the IT ERA) Module No. 2

Updates. Keep your computer’s operating system, browsers, antivirus, and other software up to date with the
latest or daily security patches.

Passwords. Choose strong passwords using 10 characters and combinations of upper-case letters, lower
case letters, symbols, and numbers. Do not include personal information. Consider changing your password
at least every 90 days when information is sensitive. Never leave passwords near your computer or in plain
sight. Use different passwords for various online activities because if one password is compromised, all will be
compromised. Never share your password. If given a choice to set up a password “hint” on an account, do not
choose something others can easily guess.

Social. Beware of meeting people in-person whom you meet on the internet or through emails. Not everyone
is honest with their identity, age, gender, and intentions. If necessary, do your research using public records
and consider seeking reputable references. If you decide to meet someone, never go alone, let others know
where you are going, meet in a very public place, and have your cell phone readily available.

Educating Children/ Teens. Talk to and educate your children about internet risks and dangers of internet
predators. Tell them never to meet people they met online in-person and never talk to people they really don’t
know. Discuss the importance of not posting identifying information, sensitive information, pictures, and details
of upcoming activities on the internet. Be sure they understand what someone portrays on the internet may not
be true. Teach them what they post online anyone can see unless they carefully control the privacy
settings. Spend time with your child on the internet, know their favorite online destinations, know their
passwords, limit the time they spend online, and consider placing the computer in a public room in the
house. Periodically review your child’s computer and emails. Know who your kids are chatting with online

Parental Controls. Parents should consider applying parental controls by their internet service provider and/
or blocking software on family computers and smartphones to limit the internet to safe websites. Contact your
internet provider if you have questions. Be sure to research your options regarding parental controls on
products.

Webcams. Be careful when using webcams. They can be high-jacked and turned on remotely. This allows
others to illegally view and listen to individuals without their knowledge. Consider turning them off or
disconnecting them when not in use. Limit or do not allow your children to use webcams and talk to them about
the risks.

Wireless. Beware when connecting your laptop or mobile device to unsecured networks. Computer hackers
on the same network can intercept your internet use and in some cases access files on your
computer. Consider password protecting your home wireless network and using a personal firewall program
for additional protection.

Shopping. Avoid purchasing goods and services from websites that do not have secure check-out using
“HTTPS.” Pay attention to the address line on the checkout page which asks you to enter your credit card
information. If the page does not have an “S” following “HTTP” in the address line, consider shopping
somewhere else. Be aware that some information transmitted on HTTP pages is done so using plain text which
can be intercepted by computer hackers.

Selling. Beware of selling and listing items in local ads or elsewhere online. Never meet someone alone. If
necessary, consider meeting in a public place, like a post office or bank rather than a parking lot. Beware of
posting photos taken from smartphones for online adds. You could be sharing your home address
with a criminal.

Public Computers. Avoid typing sensitive information on public computers, such as those in a public library
or an internet café. Spyware may be installed on these computers that record your every keystroke. Also, you
never know who may be watching your activity. Never select the feature that automatically signs you on to
email or check any box to “Remember my Password” on websites.

PANGASINAN STATE UNIVERSITY 8


FM-AA-CIA-15 Rev. 0 10-July-2020

Study Guide in (GE111 – Living in the IT ERA) Module No. 2

LEARNING ACTIVITY 1

Answer the questions below.


1. Who owns the Internet?
2. How to use public WI-FI hotspot safely?
3. How to register a domain name?

Watch the videos (link)


1. History of the World Wide Web - https://youtu.be/WlryJFlyr10
2. Uses of the Internet - https://youtu.be/sawN1GVgDmE
3. Tim Berners Lee: https://youtu.be/OM6XIICm_qo

SUMMARY

Module 2 presented the current breakthrough technologies and disruptive innovations that have emerged over
the past few years and discussed the different services offered through the web. It presented the evolution of
world wide web from web 1.0 to web 5.0. Finally, this module listed the different ethical issues and some tips
on how to protect yourself while using the Internet.

REFERENCES

E-SOURCES:
https://studywidpranay.wordpress.com/chapter-10-introduction-to-internet-and-web/
http://myeltcafe.com/teach/evolution-of-web-from-1-0-to-5-0/
http://www.evolutionoftheweb.com/
https://kullabs.com/class-10/computer-science/internet-and-its-services/services-on-the-internet
https://www.infosecawareness.in/concept/student/internet-ethics
https://www.niatec.iri.isu.edu/ViewPage.aspx?id=153

PANGASINAN STATE UNIVERSITY 9

You might also like