Nothing Special   »   [go: up one dir, main page]

The Internet (Autosaved)

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 87

THE

INTERNET
PRESENTATION BY:
GROUP 4 REPORTERS
o1. WHAT IS AN INTERNET?

o2. WHO OWNS THE INTERNET?


o3. BRIEF HISTORY OF THE INTERNET?

o4. WHO USES THE INTERNET?

o5. COMPONENTS OF THE INTERNET?

o6. CHAT AND INSTANT MESSAGING

o7.
MAJOR PROTOCOL
ACCESSIBLE ON THE WEB

THE INTERNET 2
o8. ANATOMY OF A URL
o9. TYPES OF BROWSER
10. THE EXPERIENCE OF THE WEB

11. HOW TO USE THE WEB BROWSER

12. HOW TO BROWSE


WEBSITES AND FILES
13. NETIQUETTE

14. INTERNET TERMS & DEFINITION

15. MAKING VIDEO BLOG (VLOG)


THE INTERNET 3
WHAT IS AN
INTERNET?
The internet is a globalization of billion
of computers and other electronic
devices. With the internet, it's possible
to access a most any information,
communicate with anyone else in the
world, and do much more.

You can do all of this by connecting a


computer to the internet. Which is also
called going online. When someone says
a computer is online, it's just another way
of saying it's connected to internet .
The internet is a
global network of
interconnected
computers, servers,
phones, and smart
appliances that
communicate using
the Transmission
Control Protocol(TCP).
THE INTERNET 5
Transmission Control
Protocol(TCP) is one of the
main protocols of the
Internet protocol suite. It
originated in the initial network
implementation in which it
complemented the
Internet Protocol (IP). It
provides reliable, ordered, and
error-checked delivery of a
stream of octets (bytes)
between applications running
on hosts communicating via an
IP network.
THE INTERNET 6
The Internet is actually a wire.
Well, many wires that connect
computers all around the world.
The Internet is also infrastructure.
 The Internet is also
infrastructure. It's a global
network of interconnected
computers that communicate
through a standardized way with
set protocols.
It's a fully distributed system of
computing devices and it ensures
end to end connectivity through
THE INTERNET 7

every part of the network.


The internet has
revolutionized mass
communication, mass
media, and commerce by
allowing various computer
networks around the world
to interconnected.
That’s why, it is
sometimes referred to as
the "network of all
networks“ as its aim is for
every device to be able to
communicate with any other 8

device.
THE INTERNET
The internet emerged
in the United States in
the 1970s but did not
become visible yet to
the general public until
the early 1990s.
It has since become an
essential part of our
daily lives.
WHO OWNS THE
INTERNET?
There are two answers to the
question of who owns the
internet:

1. NO ONE

2. EVERYONE

THE INTERNET 10
No one
No one owns the internet
If thinking of the internet as a single unified entity, no one owns it.
While a few organizations may determine the internet’s structure,
they don’t have ownership over the internet itself. No company or
government can claim ownership of it. The internet is more of a
concept than an actual tangible entity, and it relies on a physical
infrastructure that connects networks to other networks.

Everyone
Everyone owns the internet
At the same time, thousands of people and organizations own
the internet. These smaller systems each have an owner, and
these owners can control the quality and level of access one has
to the internet. They may not own the entire system, but they
can impact your internet experience.
THE INTERNET 11
BRIEF HISTORY OF THE INTERNET…
The Internet started in the 1960s
as a way for government
researchers to share information.
Computers in the '60s were large
and immobile and in order to make
use of information stored in any one
computer, one had to either travel
to the site of the computer or have
magnetic computer tapes sent
through the conventional postal
system.
THE INTERNET 12
Another catalyst in the formation of the Internet was the
heating up of the Cold War.

The Soviet Union's launch of the Sputnik satellite


spurred the U.S. Defense Department to consider ways
information could still be disseminated even after a
nuclear attack.

This eventually led to the formation of the ARPANET


(Advanced Research Projects Agency Network), the
network that ultimately evolved into what we now know as the
Internet.
13
THE INTERNET
ARPA stands for Advanced Research Project Agency.
It was a Defense Department research project in
Computer Science, a way for scientists and researchers
to share information, findings, knowledge, and
communicate. It also allowed and helped the field of
Computer Science to develop and evolve.
It was there that the vision of J.C.R. Licklider, one of
the directors of ARPA, would start to form in the years to
come.
ARPANET was a great success but membership was
limited to certain academic and research organizations
who had contracts with the Defense Department. In
response to this, other networks were created to provide
information sharing. 14
THE INTERNET
January 1, 1983 is considered the official birthday
of the Internet.

Prior to this, the various computer networks did not


have a standard way to communicate with each other.
A new communications protocol was established
called Transfer Control Protocol/Internetwork Protocol
(TCP/IP). This allowed different kinds of computers on
different networks to "talk" to each other.
ARPANET and the Defense Data Network officially
changed to the TCP/IP standard on January 1, 1983,
hence the birth of the Internet.
All networks could now be connected by a universal
language.
THE INTERNET
15
WHO USES THE
INTERNET?
A wide variety of people use the
internet for numerous reasons.

 Students:
They use the internet for
research, homework, and
learning new things. They also
use it to communicate with
their teachers and classmates.
 Professionals:
Many people use the
internet for work-related
tasks. This includes sending
emails, conducting research,
attending virtual meetings,
and collaborating on projects.

 Businesses:
Businesses use the
internet for marketing, selling
products, providing customer
service, and gathering
 Government organizations:
They use the internet to
provide services,
communicate with citizens,
and share information.

 Everyday people:
Many people use the
internet for personal reasons,
such as connecting with
friends and family, shopping,
entertainment, and staying
informed about current
events.
COMPONENTS OF THE INTERNET
There are three basic components
of the internet:

THE INTERNET 19
CLIENT
it is the computer that connects
with a remote computer or server
to request information.
The data interaction primarily
occurs between the client and the Click icon to add picture

server. The client requests data


from the server.
 The client and server may be
situated very far from each other
but are linked via a network.
THE INTERNET 20
SERVER
it is the computer that provides
service or shares resources to
the client.
The main job of a server is to
respond to the request of the Click icon to add picture

client.
The device or programme is set
up in the way that they provide
the appropriate information to
the client. This functionality of
client and server works on a
THE INTERNET 21
The server performs several tasks
in order to deliver the right
information for each request.
From investigating the client’s
permission of data access to
formatting numerous responses in
order to fetch the most accurate Click icon to add picture

information, the server performs


so many functions within seconds.
For instance, Apache web server
responds to Internet browser
requests via an additional
application, Apache, installed in
THE INTERNET 22
PROTOCOL
are a set of functions that need to
be followed in order to fetch the
desired data.
These internet components enable
us to surf web pages, consume
multimedia, transfer credit and so Click icon to add picture

on within minutes.
In the language of networking,
protocols can be defined as a set of
rules that guide data transmission
between computing devices. These
rules make sure that the data
THE INTERNET 23
The most important internet protocols are –
Transmission Control Protocol (TCP) and
Internet Protocol (IP).
Every single commuting device has its own
unique IP address. These unique addresses
make it easier for computers to recognize
each other. The TCP/IP protocols make the
data request and receiving possible
between two computers via server.
In today’s world, use of the
internet has become easier and
faster than ever before. The
Internet represents the preferred
means of communication,
business and appointments among
THE INTERNET 24
CHATS AND INSTANT
MESSAGING
CHATS AND INSTANT
MESSAGING
 The terms “chat” and “instant messaging” have most probably
been interchanged confusingly by both business owners and end-
users.
 At first glance, both terms seem and sound like both convey
basically one and the same thing, especially in the context of
communication.
 In the online setting, however, these two terms convey different
forms of keeping in touch. There is a huge difference between
chatting and instant messaging.
 Although chat allows users and even businesses to send instant
messages to friends, colleagues and customers, instant message
is still not considered the same as chat.
WHAT IS
CHAT?
 Chat messaging was developed and launched during the 1970’s. The
main goal for its design and conception was to give people the ability to
chat with groups of people instantaneously.
 In the past, the use of the internet was more costly and the charges
incurred were based on the duration spent by a person online. Due to the
expensive costs of the internet then, it left a decline in the number of
people using chat.
 Chat basically transpires in a virtual chat room. It is a forum where
multiple people connect with each other, discuss their shared interest,
and send messages and images to everyone all at once.
 The people that comprise a chat room do not always have to be initially
affiliated or connected for them to be able to send and receive messages
from each other.
 To this day, more new applications and platforms are being developed to
WHAT IS INSTANT
MESSAGING (IM)?
 Instant messaging is usually more suited for a one-on-one
conversation between two individuals. IM’s strong gravitation
towards one-on-one interaction is what marks one of the key
difference between instant messaging and chat.
 Instant messaging was released in the year 1960, when
Massachusetts Institute of Technology (MIT) developed the
platform, they allowed up to 30 users to log and send messages to
each other. It enables users to keep a list of people or contacts to
communicate with.
 The concept of instant messaging grew in popularity as
advancements in technology continued to progress. It was in 1996
that instant messaging began to dominate the lifestyles of internet
Distinct Differences That Help Distinguish How Chat
And IM Operate Differently:

CHAT INSTANT
MESSAGING
User account creation  Download the app and
USER through clicking the install it in the user’s
REQUIREMEN smartphone or computer.
TS ‘Register’ or ‘Sign Up’  Some IM apps require
buttonInternet Connection payment when new users
Group messaging sign up.
Customizable  One-to-one conversation
Message visibility to  Private messaging
everyone with access or link  Multiple IM windows is
allowed (one for each
to the chat room
private message)
FEATURES  Invitation-only option for chat  Quick and real-time
rooms messaging
 Pre-chat forms for customer  Creation of contact list (or
assistance (for some chat ‘Buddy List’) to save screen
software) names of contacts
 Supports online browser  Check contact online
integration statues
 Option to use usernames  Instantly check read
receipts and delivery status
of messages

PROS  Affordable communication  User-friendly interface


resource  Reduced security and
 Boosts customer convenience privacy risk
 Multiple chat rooms is allowed  Reduced instances of spam
 Embedded in websites  Applicable for work or
 Enables live chat support business use
 Boosts website traffic  Video conferencing
 
CONS  Privacy invasion risks  Both users must be online to
 Lack of content filtering enable real-time messaging
 Incompatibility with some  Potential misuse, especially
mobile devices in work settings
 Not ideal for businesses  File sharing via IM increase
catering to the older the risk of virus attacks and
generation or non-computer hacking
literate customers  Unsuitable for lengthy
 Not suitable for users who are messages and discussions
always traveling or on-the-go
Chat and instant messaging both allow users to converse more quickly and easily
through using a short messaging format and enabling the exchange of messages in real-
time.
Ideally, both are used when both or all parties involved are online to ensure that
sent messages can be read promptly. Both instant messaging and chat have dominated
the business sector, as shown by the growing number of chat and IM platforms being
developed to support all business sizes Such as Slack, Microsoft Teams, Line, Skype,
Zoho Cliq, etc.
WEB
When most of us talk about
using the "Internet", we're
typically talking about a
specific part of the Internet:
the World Wide Web (WWW,
or simply, the Web).
The Web is a massive network of webpages, programs,
and files that are accessible via URLs.

We call it a web because of its vast interconnectedness.


Starting from one URL, such as http://wikipedia.org, we can
follow links to eventually reach millions of webpages from
Here's a tiny portion of that
web
A web browser loads a webpage using various protocols:

1. It uses the Domain Name System (DNS) protocol to convert a


domain name into an IP address.
2. It uses the HyperText Transfer Protocol (HTTP) to request the
webpage contents from that IP address.

It may also use the Transport Layer Security (TLS) protocol to serve
the website over a secure, encrypted connection.

The web browser uses these protocols on top of the Internet protocols, so
every HTTP request also uses TCP and IP.

The Web is just one of the applications built on top of the Internet protocols,
but it is by far the most popular.
DOMAIN NAME SYSTEM (DNS) PROTOCOL
 It gives us humans an easy way to identify
where we want to go on the Internet.

 We simply type in a domain name like


"www.wikipedia.org", and our computer
connects us to the computers powering
Wikipedia:
 A domain name is a
human-friendly address for
a website, something
that's easy for us to
remember and type in.
Anatomy of a Domain
Each Name
domain name is made up of parts:

third-level-domain
second-level-domain
top-level-domain
1) There are a limited set of top level domains
(TLDs), and many websites use the most
common TLDs:
".com",
".org",
".edu".
2) The second level domain is unique to the company or
organization that registers it, like;
"wikipedia" or "khanacademy"

3) The third level domain is also called a subdomain,


because it's owned by the same group and that URL
often directs you to a subset of the website, like;
"m.wikipedia.org" (mobile-optimized Wikipedia)
or "es.khanacademy.org" (Spanish-language Khan
Academy)
HYPERTEXT TRANSFER PROTOCOL (HTTP)
 Whenever you visit a page on the web, your computer
uses the Hypertext Transfer Protocol (HTTP) to
download that page from another computer
somewhere on the Internet.
 It is an application layer protocol designed to transfer
information between networked devices and runs on
top of other layers of the network protocol stack.
 An HTTP request is the way
Internet communications
platforms such as web
browsers ask for the
information they need to
TRANSPORT LAYER SECURITY (LTS) PROTOCOL

Transport Layer Security, or TLS, is a


widely adopted security protocol designed
to facilitate privacy and data security for
communications over the Internet.
A primary use case of TLS is encrypting the
communication between web applications
and servers, such as web browsers loading
a website.
TLS encryption can help protect web
applications from data breaches and other
attacks.
What does TLS do?
There are three main components to what the TLS protocol accomplishes:
Encryption, Authentication, and Integrity.

Encryption: hides the data being


transferred from third parties.
Authentication: ensures that the
parties exchanging information are who
they claim to be.
Integrity: verifies that the data has
URL
URL stands for Uniform Resource Locator, or in other words, the web
address of an online resource, i.e. a web site or document.
The URL is created in one of two ways
1.after clicking a link in a web page, bookmark or email
2.by typing the URL directly into the address bar

The protocol's connected to the domain name and the


domain name's connected to the file path...
The three basic parts of a URL are the protocol,
the domain name and the path.
A URL is composed of different parts, some
mandatory and others optional. The most
important parts are these:
1) Scheme

The first part of the URL is the scheme, which indicates the
protocol that the browser must use to request the resource (a
protocol is a set method for exchanging or transferring data
around a computer network). Usually for websites the protocol
is HTTPS or HTTP (its unsecured version). Addressing web
pages requires one of these two, but browsers also know how
to handle other schemes such as
mailto: (to open a mail client), so don't be surprised if you see
other protocols.
2) Authority

Next follows the authority, which is separated from the scheme by the
character pattern ://. If present the authority includes both
the domain (e.g. www.example.com) and the port (80), separated by a colon:

•The domain indicates which Web server is being requested. Usually this
is a domain name, but an IP address may also be used (but this is rare as
it is much less convenient).
•The port indicates the technical "gate" used to access the resources on
the web server. It is usually omitted if the web server uses the standard
ports of the HTTP protocol (80 for HTTP and 443 for HTTPS) to grant
access to its resources. Otherwise it is mandatory.
3) Path to resource

is the path to the resource


/path/to/myfile.html
on the Web server.
In the early days of the Web, a path like
this represented a physical file location
on the Web server. Nowadays, it is mostly
an abstraction handled by Web servers
without any physical reality
4) Parameters

?key1=value1&key2=value2are extra parameters provided


to the Web server.

Those parameters are a list of key/value pairs separated


with the & symbol. The Web server can use those
parameters to do extra stuff before returning the
resource. Each Web server has its own rules regarding
parameters, and the only reliable way to know if a
specific Web server is handling parameters is by asking
5) Anchor
#SomewhereInTheDocument is an anchor to another part of the
resource itself.

An anchor represents a sort of "bookmark" inside the


resource, giving the browser the directions to show the
content located at that "bookmarked" spot. On an HTML
document, for example, the browser will scroll to the
point where the anchor is defined; on a video or audio
document, the browser will try to go to the time the
anchor represents. It is worth noting that the part after
the #, also known as the fragment identifier, is never
HOW TO USE URL?
Any URL can be typed right inside the browser's address
bar to get to the resource behind it
The HTML language — which will be discussed later on —
makes extensive use of URLs:
•to create links to other documents with the <a> element;
•to link a document with its related resources through
various elements such as <link> or <script>;
•to display media such as images (with the <img>
element), videos (with the <video> element), sounds and
music (with the <audio> element), etc.;
•to display other HTML documents with the <iframe>
TYPES OF BROWSER
Before A browser is an application program that provides a
anything way to look at and interact with all the information on
else, what is the World Wide Web. This includes Web pages, videos
a Browser? and images. The word "browser" originated prior to the
Web as a generic term for user interfaces that let you
browse (navigate through and read) text files online.
Many people will use web browsers today for access to
the internet and is seen almost as a necessity in how
many navigate their daily life.
A web browser is a software application that allows you
to access and navigate web pages on the internet. It
displays websites on your computer screen and helps you
interact with them by clicking on links or entering text.
There are many types of web browsers, each with
their own unique features, pros, and cons.
Here are some of the most popular ones:

1.Google Chrome
 This is a popular web browser created by Google.
 Due to its quickness, brevity, and seamless interaction with the
Google ecosystem, it soon became popular after its initial release in
2008.
 Google Chrome is well known for its rapid and effective
performance, making it a top pick for individuals looking for
seamless surfing and quick web page loading.
 Google Chrome was not invented by a single individual, but rather
developed by a team of engineers at Google.
 The project was led by Sundar Pichai, who is now the CEO of Google
and its parent company, Alphabet.
2. Safari
 The default web browser created by Apple Inc. is called Safari.
 The default browser for iOS, macOS, and other Apple products was
originally made available in 2003. When it comes to consumer
privacy, energy efficiency, and integration with the Apple
ecosystem, Safari is renowned.
 It is known for its fast and smooth performance, It also has a clean
and intuitive interface that makes it easy for users to navigate and
find what they need.
 Safari is not formally offered on other systems like Windows or
Android because it was primarily created for Apple devices.Users
who prefer a consistent browsing experience across all devices may
find this to be a disadvantage.
 Safari was developed by a team of engineers at Apple Inc., led by
Don Melton.
 The team worked on creating a new web browser for Apple devices,
specifically for Mac OS X. The initial version of Safari was released
3. Microsoft Edge
 Microsoft created the Microsoft Edge web browser, which replaced
Internet Explorer in 2015.
 Microsoft switched to the Chromium engine in 2020 from its original
proprietary engine, which is the same open-source project that drives
Google Chrome. This modification enhanced its functionality,
compatibility, and general browsing experience.
 Microsoft Edge's performance, rendering capabilities, and support for
current web standards all significantly improved after switching to the
Chromium engine
4. Opera
 Opera Software created this feature-rich web browser. Since its
initial 1995 release, it has developed to offer a variety of
distinctive features with a focus on speed, security, and user
customization.
 Opera has an ad blocker that efficiently eliminates annoying
adverts, resulting in a faster and cleaner browsing experience.
 Additionally, Opera provides a free VPN service that enables
5. Mozilla Firefox
Foundation created the open-source web browser
Mozilla Firefox. Since its initial release in 2004, it
has grown to rank among the most widely used
browsers worldwide.
The dedication of Firefox to user privacy, security,
and customization possibilities is well known.
Mozilla Firefox prioritizes user privacy.
It has features like Enhanced Tracking Protection,
which disables third-party trackers, and the choice
to use Private Browsing mode, which prevents
cookies or history from being saved as you browse
the internet.
The Mozilla team, led by the American developers
Dave Hyatt and Blake Ross, sought to create a light
THE EXPERIENCE OF THE WEB
User experience (UX) is a
term that refers to how an
individual interacts with a
system, such as a website or
mobile application. It
encompasses all aspects of the
user’s interaction, including
visual design, navigation,
functionality, performance, and
content.
MULTIMEDIA

Web multimedia refers


to the combination of
different content
forms such as text,
audio, images,
animations, video, and
other interactive
content that can be
accessed and
1. Images
 Static Images: These are non-moving
images and are the most common form of
multimedia content on the web. Common
formats include:
1.JPEG (Joint Photographic Experts Group):
Suitable for photographs and images with
gradients.
2.PNG (Portable Network Graphics):
Supports transparency and is ideal for
web graphics.
3.GIF (Graphics Interchange Format): Can
be static or animated and is often used
for small animations and low-resolution
film clips.
 Vector Graphics: Unlike raster images like
JPEGs and PNGs, vector graphics use paths
2. Audio
Streaming Audio: This allows
users to start listening to audio
files before they are fully
downloaded. Common formats
include:
1.MP3 (MPEG Audio Layer III): A
standard for audio
compression.
2.WAV (Waveform Audio File
Format): Offers uncompressed
audio.
3.OGG (Ogg Vorbis): An open
standard free container format.
Podcasts and Audio Clips:
Digital audio files that can be
3. Video
 Streaming Video: This lets users
start watching video clips before
they are completely downloaded.
Common formats include:
1.MP4 (MPEG-4 Part 14): A digital
multimedia container format.
2.WEBM: An audiovisual media
file format.
3.AVI (Audio Video Interleave): A
multimedia container format.
 Live Broadcasts and
Webinars: Real-time streaming
of events, lectures, or
presentations over the internet.
4. Animations
 GIFs: Short, looping animations or moving
images.
 Animated SVGs: SVG format images with
added animations.
 CSS and JavaScript Animations:
Animations created using web technologies,
without relying on traditional image formats.
5. Interactive Elements
 Flash (historical context): Previously a
popular tool for creating web animations and
interactive content, but now largely obsolete
due to security concerns and the rise of
HTML5.
 HTML5 Interactive Elements: Uses the
canvas, audio, and video tags among others
to create interactive multimedia experiences.
 REAL-TIME COMMUNICATION
Web Real-Time Communication (WebRTC) is a
new standard and industry effort that extends
the web browsing model. For the first time,
browsers are able to directly exchange real-
time media with other browsers in a peer-to-
peer fashion.
 It is an innovative technology that enables
real-time communication directly through
web browsers.
 WebRTC is integrated into modern
web browsers. (means that anyone with
access to a web browser can leverage this
technology without technical
complications.)
 a powerful tool that enables real-time
communication in a wide variety of
Real-time communications examples
Real-time communications tools and applications are many and varied, ranging from
old-school telephony to cloud communications services.
Examples of real-time communication include the following:
•Fixed-line telephony.
•Mobile telephony.
•Voice over IP.
•Teleconferencing.
•Video calling.
•Video conferencing.
•File sharing.
•Screen sharing.
•Automatic, live meeting transcription.
•Team messaging (real time or near-real time).
•One-to-one IM (real time or near-real time).
•Live customer chat (real time or near-real time).
•Robotic telepresence.
•Two-way or multiway amateur radio.
HOW TO USE
THE WEB
BROWSER

A Web Browser is a software used


to view websites over the internet.
Some commonly used browsers are
Microsoft Edge, Google Chrome,
Opera, and Mozilla Firefox. To
understand how to use a browser
we will consider Chrome browser as
an example to show various things
that can be done in the browser.
Here are some of the most used
tasks we do using the web browser:

•Navigate around the website


•Accessing Websites
•Bookmark a particular page
•Browse using multiple tabs
•Download pages and images
•Printing Web Pages
•Extensions
1. Navigate around the website:
We can search a web page by entering the URL in the search bar.
We also have three navigation buttons for different purposes.

2. Accessing Websites:
We can access a particular website directly by entering the
site URL in the search engine. Once a site is visited we can
also use browser history to access these pages or look into
past visited websites.
3. Bookmark a particular page:
•If you have some page that you visit frequently or is important to you
than it can be bookmarked (also called favorites in some browsers).
Bookmarking is just saving the webpage URL along with its title and logo
which is shown in the bookmarks bar for easy access. If you can’t see the
bookmark bar just press “Ctrl+Shift+B”.
•To bookmark the page just press the star or bookmark icon or just press
“Ctrl+D” to bookmark the current tab and “Ctrl+Shift+D” to bookmark all
opened tabs. This will open and edit the bookmark dialogue box.
4. Browse using multiple tabs:
•To access multiple sites in the browser we have to open different
browser windows but currently, all the latest browsers support tabs.
Tabs are separate areas of software used to access multiple
documents or web pages.
•To start a new tab we can press “Ctrl+T” or the plus icon at the top of
the search bar. You can also drag a tab left or right to rearrange it with
respect to other tabs. You can also drag the tab downwards which
instantly creates a new window of that particular browser.
5. Download pages and images:
We can download the webpage or a particular image present on an
webpage:
•To download a web page press “Ctrl+S” or right-click on the webpage
and select save as. A browse dialog box will appear asking you to select
the location in the drive and the name of the page to be saved.
•To download an image click the image and press save the image from
the context menu that appears. A browse dialog box appears asking you
to select the location in the drive and the name of the image to be saved.
6. Printing Web Pages:
There can be various reasons to print a website, and most browsers
provide this facility. In many browsers, we also have the option to save the
webpage as a PDF document. Both printing and saving the page as pdf
options can be found in the print window. To access it, press “Ctrl+P” or
right-click the page and select “Print” from the menu that appears.

7. Extension:
A browser extension is an addition piece of software that adds different
functionality to a web browser. A browser extension, also called a plug-in.
They can be used for monitoring sites, notes, VPN facility, manage
passwords, block adds and more. In Chrome Browser you can visit chrome
webstore site to add various extension to the browser.
HOW TO BROWSE
WEBSITES AND FILES
To browse a website, you can follow
these steps:
1. Open a web browser: You can
use any web browser such as
Google Chrome, Mozilla Firefox,
Safari, or Microsoft Edge.
2. Type in the website address:
In the address bar at the top of
the browser window, type in the
website address you want to visit
(e.g. www.google.com).
3. Press Enter: After typing in the
website address, press the Enter
To browse files on your computer, you can
follow these steps:
1. Open File Explorer: If you are using
Windows, you can open File Explorer by
clicking on the Start button and then
clicking on File Explorer. If you are using a
Mac, you can open Finder by clicking on
the Apple icon in the top left corner of
your screen and then clicking on Finder.
2. Navigate to the folder containing the
files you want to browse: Use the
navigation pane on the left side of File
Explorer (or Finder) to browse to the
folder where the files are located.
3. Double-click on a file to open it: Once
you have located the file you want to
open, double-click on its name to open it.
NETIQUETTE
 is a combination of the
words network and etiquette
 is defined as a set of rules for
acceptable online behavior.
Similarly, online ethics focuses on
the acceptable use of online
resources in an online social
environment.
 often combined with the concept
of a ’netizen’ which itself is a
contraction of the words
internet and citizen and refers to
both a person who uses the
internet to participate in society,
Importance Of Practicing Netiquette
Practicing netiquette can be important for
strengthening your online reputation. It's also
valuable to practice netiquette so you can
communicate effectively with people like coworkers,
classmates or teachers through online platforms.
For example, you may find it important to know how
to write a kind, professional email when inquiring
about a job opportunity with a potential employer.
1O RULES FOR PRACTICING NETIQUETTE
1. Practice using
2. Use a friendly tone
empathy

3. Use respectful 4. Send messages if


language appropriate

5. Check for grammar 6. Respect other people's


mistakes privacy

7. Ensure messages are 8. Create posts that are


clear appropriate

9. Respond to emails on 10. Read content


time thoroughly
INTERNET TERMS
AND DEFINITIONS
1. BROWSER
 a free software program or mobile
app that displays web pages,
graphics, and other online content.
 Popular web
browsers include Chrome, Firefox,
Microsoft Edge, and Safari, but there
are many others.
 Internet users access the web
through web browser software, which
is included in or can be downloaded
on computers and mobile devices.
 Each web page has a unique address
called a URL, which can be entered in
INTERNET TERMS
AND DEFINITIONS
2. URL (Uniform Resource Locator)
 A unique address that identifies a
specific web page on the
internet.
 For example, the URL for
Google's homepage is
https://www.google.com/.

3. HTTP (Hypertext Transfer Protocol):


 A protocol used for transmitting
data between a web client and
4. HTML (Hypertext Markup
Language):
 A markup language used to
create web pages and define
their structure.
 For example, the HTML code for
a heading might look like this:
<h1> This is a heading</h1>

5. CSS (Cascading Style Sheets):


 A style sheet language used to
describe the presentation of a
document written in HTML or
XML.
6. IP ADDRESS
 Your computer and every device that
connects to the internet uses an Internet
Protocol (IP) address for identification.
 In most cases, IP addresses are assigned
automatically. Beginners don't usually
need to assign an IP address.
 An IP address may look something like
this:
202.3.104.55 Or, like this:
21DA:D3:0:2F3B:2AA:FF:FE28:9C5A
 Every computer, and any mobile device
that accesses the internet is assigned an
IP address for tracking purposes. It may
be a permanently assigned IP address,
7. EMAIL (Electronic Mail):
 It is the sending and receiving
of typewritten messages from
one screen to another. Email is
usually handled by a webmail
service, such as Gmail or Yahoo
Mail, or an installed software
package, such as Microsoft
Outlook or Apple Mail.
8. Download:
 The process of receiving data
from a remote server to a local
computer.
 For example, downloading a file
9. Upload:
 The process of sending data
from a local computer to a
remote server.
 For example, uploading a
photo to a social media
website.
10. Server:
 A computer system that
stores, processes, and delivers
data to other computers
connected to a network.
 For example, a web server
stores and delivers web pages
MAKING VIDEO
BLOG (VLOG)
A vlog is a video blog or
“video log” and is a type of
blog where people create
content in video format.
Vlog content can be about a
person’s life, experience, or
thoughts. But, like blogging,
you can “vlog” about anything
you want, such as makeup
tutorials, product reviews,
video game tutorials, and
 BLOG
 A blog is very similar to a website, where one can
find content regarding any topic in a written/text
format, along with images, gifs, etc. such as
articles, stories, or essays.
 Blogs are text-based, usually presented on
websites or platforms designed for written content.
 VLOG
 A vlog (video blog) is a blog in video
format – with the content presented via
recorded videos published on any topic
 Vlogs are video-based, typically hosted on
video-sharing platforms like TikTok,
YouTube, Vimeo, or dedicated vlogging
THE INTERNET 81
sites.
There are various blogging and vlogging platforms
out there that support both paid and free domains.

THE INTERNET 82
What to Know in
Making Video Blog

1. Create an account at YouTube


or another video platform. Limit
your vlog entries to between two
and six minutes.

2. Post frequently and


authentically. Don't overproduce.
Keep it real.
3. Promote your vlog on social
media channels and include its
URL in your social media
profiles.
Now, vlogging has become a part of our mainstream
culture, with content creators focusing on a massive
variety of topics.
Successful vloggers can establish an excellent
stream of income, generating revenue from advertising,
brand partnerships, and more.
The availability and demand for high-profile vlogging
work have led to talent agencies, management
companies, partner programs, and multi-channel
networks dedicated to managing vloggers and their
content.
As vlogging has become a part of our everyday
entertainment experience, it’s no surprise that a number
of vloggers have earned impressive celebrity status.
THE INTERNET
84
...

References:
 Internet Basics: What is the Internet? (gcfglobal.org)
 Who owns the internet? And who should control it? | World Economic
Forum (weforum.org)
 A Brief History of the Internet (usg.edu)
 Basic Components of Internet and Their Functions- Zajil
 Difference Between Instant Messaging and Chat (newmediaservices.
com.au)
 History of the Internet | Overview & Timeline - Lesson | Study.com
 The World Wide Web (article) | Web protocols | Khan Academy
 What is Transport Layer Security (TLS)? | Cloudflare
 Types of web browsers in 2024: A quick overview | NordVPN
 What is browser? (techtarget.com)
 Different Types of Web Browser [Functions and Examples] (monovm.
com)
 Anatomy of a URL (doepud.co.uk)
 What is a URL? - Learn web development | MDN (mozilla.org)
 Why User Experience of a Website Is Important? (codeconspirators.c
om)
 How to use a Web Browser - GeeksforGeeks
 1. Introduction - Real-Time Communication with WebRTC [Book] (orei
lly.com)
 What is real-time communications (RTC)? | Definition from TechTarge
t
 #1 Sales-Generating Website Development & Web Design Agency in
Singapore (internetdesign.sg)
 What is Netiquette? A Guide to Online Ethics and Etiquette | Webroo
t
 What Is Netiquette? (With 10 Basic Rules To Follow) | Indeed.com
The internet is so
useful, however,
we must learn how
to use it properly!

Use! But Do Not Abuse!

Thank you!
Group 4
REPORTERS:

Sophia Trisha Jerlyn Gantoy


Bartonico
Mj Baynosa
Rancis Poquita
Shanine Lumon
Mylene Intawon
Roberto
Rochelle Ceprado Bendijo
Elyjane Bartonico Jenalyn
Rumong
Javerad Bation
Christa Joy
Junrex Alcanzar Platitas
BSBA-HRM 1D (T-TH 10:30-12:00)

You might also like