60003 PPW The Internet

  • View
    127

  • Download
    2

Embed Size (px)

Text of 60003 PPW The Internet

  1. 1. Fast and Easy Not Hard to Learn at All.
  2. 2. It is a vast interconnection of computer networks. It is a network of networks. The Internet has become a massive, public spider web.
  3. 3. How Is the 'Internet' Different from the 'Web'? The Internet, or 'Net', stands for Interconnection of Computer Networks. It is a massive conglomeration of millions of computers and smartphone devices, all connected by wires and wireless signals. Although it started in the 1960's as a military experiment in communication, the Net evolved into a public free broadcast forum in the 70's and 80's. No single authority owns or controls the Internet. No single set of laws governs its content. You connect to the Internet through a private Internet service provider, a public Wi-Fi network, or through your office's network. Netforbeginners.about.com
  4. 4. In 1989, a large subset of the Internet was launched: the World Wide Web. The 'Web' is a massive collection of HTML pages that transmits through the Internet's hardware. The expressions 'Web' and 'Internet' are used interchangeably by the layperson. This is technically incorrect, as the Web is contained by the Internet. In practice, however, most people don't bother with the distinction Netforbeginners.about.com There is an important distinction to be made:
  5. 5. Sir Timothy John "Tim" Berners-Lee, OM, KBE, FRS, FREng, FRSA, DFBCS, is an English computer scientist, best known as the inventor of the World Wide Web. Born June 8, 1955 London, United Kingdom. The Father of the World Wide Web
  6. 6. Authentication/Encryption: These are related and speak to the security of data over the public internet: Authentication is the complex way that computer systems verify that you are who you say you are. Encryption is the mathematical scrambling of data by use of cyphers to hide data from eavesdropping. Browser: Primary tool for reading web pages and exploring the Internet. Often comes free with the device. (Google Chrome; Mozilla Firefox; Internet Explorer)
  7. 7. Download: In computer networks, to download means to receive data to a local system from a remote system, or to initiate such a data transfer. Examples of a remote system from which a download might be performed include a web server, email server, or other similar systems. Email: a system for sending messages from one individual to another via telecommunications links between computers or terminals using dedicated software
  8. 8. HyperText Markup Language (HTML) : Is a set of standards used to tag the elements of a hypertext document. It is the standard protocol for formatting and displaying documents on the World Wide Web. Internet Service Provider (ISP): Refers to a company that provides Internet services, including personal and business access to the Internet. For a monthly fee, the service provider usually provides a software package, username, password and access phone number.
  9. 9. Malware: Malware includes: viruses, trojans, ratware, keyloggers, zombie programs. Vandalizes your computer in some way that steals your private information takes remote control of your computer for other ends manipulates you into purchasing something Malware programs are the time bombs and wicked minions of dishonest programmers.
  10. 10. Social Media: Are computer mediated tools that allow people to create, share or exchange information, ideas, and pictures/videos in virtual communities and networks.
  11. 11. Voice over Internet Provider (VoIP): is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol(IP) networks, such as the Internet.
  12. 12. A query to Google for computer security yields 313,000,000 results. There is no end of help and advice on the subject. Because there are no end of dangers. As the Internet has no governing body security, both personal and global is of great concern. Governments spend vast amounts of time and money to secure their systems. Individuals need to do the same.
  13. 13. Consider these Ten Tips to Secure Your Personal Computer: Use antivirus software and keep it up-to-date. Dont open emails or attachments from unknown sources Protect your computer from intruders use firewalls. Regularly download security updates and patches for operating systems and other software. Use Hard To Guess Passwords
  14. 14. Back up your computer data on disks or CDs regularly Dont share access to your computers with strangers Disconnect your computer from the Internet when not in use Check your security on a regular basis Make sure your family members know what to do if your computer becomes infected. National Cyber Security Alliance: www.staysafeonline.info
  15. 15. Software means computer instructions or data. Anything that can be stored electronically is software. Software is often divided into two categories: Systems software includes the operating system and all the utilities that enable the computer to function. Application software includes programs that do real work for users.
  16. 16. Computer hardware refers to the physical parts or components of a computer such as the monitor, mouse, keyboard, computer data storage, hard disk drive (HDD), system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that can be touched (known as tangible).
  17. 17. Buy a computer. Remember to keep it simple. Resist the urge to open the box. Find a millennial: a person reaching young adulthood around the year 2000. They are everywhere and grew up with this technology. Ask them to help you put your computer system together. Sign up with an Internet Service Provider with the help of the millennial you have found. Ask them all your questions do not be afraid. If you can find a geek millennial all the better! But remind them multiple times that this is all new to you. They will look at you funny but motor on.
  18. 18. Email: sign up either with your ISP or use a free one like Gmail. The millennial you are now acquainted with will be invaluable here. You do this on your computer. It is not instant. And please DO NOT USE ALL CAPITALS IT IS LIKE YELLING AT SOMEONE. (!) Texting: this is done on a smart phone that includes texting as part of the plan you are on. You do not call the person but you do use their phone number. There is a limit to characters and it is often fee based you pay for what you type. It is a bit more instantaneous but only if the person has their phone and hears the text sound announcing your text.
  19. 19. Video chat: this is the new big thing and it is not hard. There are choices to be made as to what fits your needs. Google Talk Video & Voice Plug-in 4.5 Free Google Talk Video and Voice plug-in is a program that allows you to enjoy video chatting sessions in Google Mail, iGoogle and Orkut. You can use voice and video chat capabilities in your Google Chat properties and instantly go from an email conversation to a group video call.
  20. 20. Skype (Windows/Mac/Linux) Skype is a popular VoIP application capable of making PC-to-PC and PC- to-phone calls; as long as you've got a webcam, any PC- to-PC call can instantly become a video chat. Skype's cross-platform compatibility and generally smooth video are the key elements that keep users coming back to Skype for their video chat needs. Webcam: this is a camera that you can purchase although many new monitors and laptops already have them installed.
  21. 21. Facebook Video Chat is a third party plugin for Facebook that allows you to video and audio chat via Facebook. Of course, video and audio chatting are now possible in Facebook thanks to Skype integration. Facebook Video Chat simply offers an alternative way of doing it. It simply adds 4 extra icons to your Facebook chat dialog window - a webcam, a microphone, a games icon and a smiley.
  22. 22. Any Questions? Thank You.