You are on page 1of 8

The Internet

The Internet

History
Applications
Ethics in Computer and Invasion
Privacy

Advantages and Disadvantages


Group Members
Advantages and
Ethics in Computer and
Disadvantages
Invasion Privacy
Applications
History

The Internet
1968
This
How - DARPA
How the
eventually
the internet
(Defense led
internet to
Advancedworks
the
works :
formation
Research :Projects of
Agency) the
The HOW
What
How
MAJOR
How
contracts
The the
Internet
DOMAINS with
Creation
WORLD
the THE
was
BBN
the
internet
TELNET
E-MAIL
What NEWS
started
internetAND
(Bolt, is
of
INTERNET
FEATURES
in
the
works
the
Beranek WIDE
Internet?
the
works
&
:
Internet
1960s
Newman) : to as aOF
create way
ARPANET
The ROUTING
January
“Victorian
WORKS
creation 1, (Advanced
1983
of TRAFFIC
is
Internet”
the Research
considered
Internet Projects
solved thethe Agency
official
for TCP/IP
ARPAnet
• ADDRESSING
The government
largest
Electronic
SUBDOMAINS
•Network),
ACROSS
following the INTERNETWEB
network
network
challenges:THE of SCHEMES
researchers
networks
mail(e-mail)
that
INTERNET in
ultimately to the share
world.
evolved
1970
birthday
In
The
TCP
- First
addition of
Telegraph
/ IP
five the
nodes:
to Internet.
an IP Prior
address, to this,
most the
in Computer and


information.
 ••
•intoTelnet
The
One
is the
Basically
Every
Useswhat world
is
TCP/IP Computers
specialized
Internet-based
most
inventing
computer
we wide
protocols
now web
popular
digital
and
know in the
services
is
networking
and network
packet
as a '60s
services
the part
as we
on
switchingwere
that
of .
Internet.
Applications

Group Members

WORLD WIDE WEB


Advantages and

Invented in the 1840s.


Invasion Privacy

UCLA
Disadvantages

various

Most
In
Internetorder
know
ROUTING
letsthe
called computer
computers
you to
it hosts
Internet use
News networks
communicate
or
TRAFFIC
one don’t
which
, servers
computer
includes did
connectnot
across
have
ACROSS
supports –
tenshave
a a a
the
of

History
Stanford
the internet uses the same
large
•ARPANET
•UC–Runsand
reason
Signals
onimmobile
was
sent
Survivability
Santa any
Barbara a
why
over
of great
an and
wires
communications in
success
peopleorder
that
infrastructure but
were to make
membership
use
substrate.
to send / use

directly
standard
Domain E-MAIL
Internet,
Telnet
THEhypertext
thousands
Uprotocols
established
ofreceive
to
way
Name
host
INTERNET a the
Utah, andhigh-speed to directly
computer
communicate
System
documents,
of
to controls
over vast news to
must
(DNS)the
timing
distances
electronic
have
with
allowing
groups.
messages and a
each
was
of BBN
Internet.
unique
address
• Telnet

limited
information
Internet.
users toto
Instead,
address.
which
program
certain
stored
view uses andacademic
in
they any one
navigate
connect
words.
creates
and research
computer,
to
other.
 Used
data
NEWS A new
extensively
format.
Reliability
ADDRESSING communications
of by
computer the U.S.
messaging
SCHEMES protocol
Government
was
Ethics

organizations
one 1974
internet
• had- TCP
different
a”window”
during to
the who
either
specification
backbone.types
into
American had
travel
aby contracts
to
Vint
ofhost
Civil data.
War, the
Cerf
so site
you
1861 with
- ofcanthe
the
established

 The
You
DOMAIN:
 DOMAINS
Defense
1984
 TELNET
1865
access
HTML–
protocol
can
Department.
On January
files called
also
ibm.com used
AND
1, In
the Transfer
postby the
response
Internet articles
withto Control
Internet
this,
its 1000foris
other
computer
Example
the
others
or :
Transmissionto
haveread
magnetic
205.46.117.104 Control
and
computer
Protocol
respond
tapes
/
Protocol/Internetwork
•SUBDOMAIN:
hosts
Morse converts
SUBDOMIANS
networks
 URL Code
were en
wasmasse
createddots toProtocol
products.ibm.com
using
and
to (TCP/IP).
TCP/IP
dashes,
provide for its
or
information
sent to.through
Internet
short
messaging
signalsFromthe Dr.conventional
Protocol
and Vinton
long orsignals
Cerf,TCP/IP postal system.
sharing. Co-Creator of TCP/IP
Group Members
Advantages and
Ethics in Computer and
Disadvantages
Invasion Privacy

TRAVEL
HEALTH

BANKING
BUSINESS
MATERIALS
FINDING STUDY

ENTERTAINMENT
COMMUNICATION

Applications
History
INVASION
Ethical rules forOF PRIVACY
computer
ETHICS IN COMPUTER users:
Posting things on the Internet can be
Posting thingsinvolves
Internet privacy on thethe Internet can be
right or mandate
harmful
of personalor privacy
exposeconcerning
people to the malicious
storing,
harmful
1. Do not
or use
Ethics isSomeexpose
computer
aprovision people
setinformation
of to to
moral to
harm
malicious
principles
attacks.
repurposing, third posted and
parties, on
attacks.
others. Some information posted on
the Internet
that Internet
govern
displaying persists
the behavior
of information for decades,
of anto
pertaining

Ethics in Computer and


the persists for decades,

Applications
2. Do not
via use computers ofto steal
Group Members
Advantages and

depending
oneself
individual on the
Internet.
or terms
Internet
group service,
of privacy and
is a
people.
Disadvantages

Invasion Privacy
depending
other’s
subset on the
information.
of data termsPrivacy
privacy. of service, and
concerns
privacy policies of particular services

History
Computer
privacy ethics
have beenpolicies is the
of from
articulated application
particular ofof
services
the beginnings
offered
3. Do not online.
access This
file can
without include
the
offered
large-scale online. This
computer sharing.
moral principles to the can use include
of
comments
permission written
of the on blogs, pictures,
owner.
comments
computers written andonasblogs, pictures,
the Internet.
and websites, such Facebook and
4. Always
and websites,
Internet and respectsuchcopyrighted
digital as Facebook
privacy are laws and
viewed
Twitter.
Examples It is absorbed into cyberspace
include 
and policies.
Twitter.
differentlyIt is
from absorbed into
traditional cyberspace
expectations of
and once
intellectual it is posted, anyone can
and once
privacy.
5. Use itproperty rights,
Internet
internet isethically.
posted, is privacy
privacy anyone can
primarily
potentiallywithfindprotecting
it and access.
potentially
concerned
policies, find online
and it and access.
user information.
etiquette, or "
Law Professor Jerry Kang explains that the
netiquette".
term privacy expresses space, decision, and
information.
ADVANTAGES
DISADVANTAGES

in Computer and

Applications
Group Members

x A Waste of Time

Advantages and

Invasion Privacy
Disadvantages
Source
 Not of Information

History
x Safe Place for Children
Source
 Privacy
x of Entertainment
Exposure
x
 Viruses/Malware
Keep Informed
x Online Threatening or

Ethics
Harassment
x Social Isolation, Obesity and
Depression
MARY JANE MUSNI

MA. LIVY M. VERDE


DENICE PEARL G. MUTYA
LOVELY ALYZA H. MAGBANUA

Group Members
Advantages and
Ethics in Computer and
Disadvantages
Invasion Privacy
Applications
History

You might also like