1 / 44

The Internet and the World Wide Web

The Internet and the World Wide Web. The Internet. Millions of Computers all around the world No one person, company, or entity owns or controls the Internet. The Internet’s Hardware. Owned or Shared by thousands of private and public organizations

nakia
Télécharger la présentation

The Internet and the World Wide Web

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Internet and the World Wide Web

  2. The Internet • Millions of Computers all around the world • No one person, company, or entity owns or controls the Internet.

  3. The Internet’s Hardware • Owned or Shared by thousands of private and public organizations • Supercomputers called NAPs (Network Access Points), that serve as major hubs. • NAPs are connect to each other and to Regional Routers through the largest lines of the Internet call “Backbones” • Regional Routers are connect to Regional Networks

  4. The Internet’s Hardware • Regional Networks connect to the various ISP. How do you connect to the internet from home?

  5. Computers on the Internet • Request Data • Provide Data • Help Send Data Along the Network

  6. Computers on the Internet • Your personal computer at your house is an example of a computer that primarily requests data, called a Client. • Computers that provide data are called Servers, since they “Serve” data to other computers. • Computers that help information travel across the Internet are called Routers. • Every time data takes a turn on the Internet, a Router is there to send it in the right direction.

  7. The Internet

  8. Services on the Internet • Voice Over IP (Internet Protocol) • Online Muli-Player Gaming • Internet Relay Chat(IRC)

  9. Services on the Internet • Peer to Peer File Sharing • Video Conferencing • Electronic Mail (e-mail)

  10. Services on the Internet • FTP (File Transfer Protocol) • World Wide Web

  11. How the WWW Works http:// - This is a “Protocol Prefix” that designates the file being requested as accessible via Hypertext Transfer Protocol. www - designates a requested file as World Wide Web document, originally needed to distinguish between Web files and other Internet files, this is often no longer needed. For example, you can go to edulaunch’s web site by typing http://www. edulaunch.com or just http:// edulaunch.com edulaunch - Domain name that points to the server computer of the edulaunch web site. .com – Domain Name Extension designated for web sites with a commercial focus student_showcase - Directory or folder within which the web page being requested is located. bachelor_bet.html - This is the name of the exact file requested. You may be wondering: What is the purpose of slashes?  They signify that you are moving deeper within the web site by entering a new folder or directory.  For example, the bachelor_bet.html file is inside the student showcase directory.

  12. How the WWW Works

  13. Searching the Web • Two Types of Web Searches • Directories • Search Engines

  14. Search Engines • Method of searching that uses software programs to search the web and record information. • Programs • Spiders • Robots • Crawlers • Intelligent Agents

  15. Search Engines • All the Web www.alltheweb.com • Alta Vista www.altavista.com • Ask Jeeves www.ask.com • Google www.google.com • HotBot www.hotbot.com • Lycos www.lycos.com • Wise Nut www.wisenut.com

  16. How a Search Engine Works • Enter Your Request • (Called a Query) • Request Compares it to the Search Engine (Database) • Search Engine Delivers List based on relevancy.

  17. How Google Works Information found on Google Inc.

  18. Directories • Directory-based searches use people to search the web for similar web sites, they then place them in a directory. • Most Popular Directory-Based Search Engine www.yahoo.com

  19. Directories • Directory-based searches use people to search the web for similar web sites, they then place them in a directory.

  20. Getting the Whole Story? • Web searches only a cover around 20-40% of the web. Much of the content on the web is hidden through password protected sites, firewalls, Flash™ sites, databases, and other things that search engines can’t read.

  21. Boolean Searching • Most People Just Type What They are Looking For • Best Way to Search the Web • Allows the Search to be More Specific

  22. Boolean Searching

  23. Boolean Searching

  24. Boolean Searching

  25. Boolean Searching

  26. Web Searching Activities • Taken Over Common Research Tools • Dictionary • Thesaurus • Replaced Trips to the Library for Professional Research • The Web has become the new phone book.

  27. Web Searching Activities You will complete two short Web search projects. First, you will use the Web to make a personal phone directory. The directory will contain the addresses and phone numbers of family and friends along with some helpful numbers from your local area. Second, you will use the Web to plan a trip. Included will be the route driven, the price and location of a rental car, the price and location of a hotel at your vacation destination and any stops or sights that will be taken in along the way.

  28. Activity 1 – Making Your Own Phone Directory The internet has many natural advantages over the traditional phonebook. Some of those advantages are: • Internet directories contain the most current listings available. • Internet directories have access to all the nations telephone books. • Internet directories do not need storage space in your home. • Using internet directories you may search an entire state at once.

  29. Activity 1 – Making Your Own Phone Directory In this activity you will construct your own personal directory. Included will be phone numbers and addresses of family members and friends, local schools, restaurants, car repair shops etc.

  30. Activity 2 – Planning Your Vacation on the Web In this project you will use the internet to plan a fictitious car trip. Conditions for the trip include: • Your destination must be at least 600 miles from your school and no more than 1200 miles • You will choose a hotel at your destination that costs less than $140 per night. • You will find exact directions from your school to the hotel at your destination. • You will find a mid-size car to rent with unlimited miles for at a cost of no more than $500.00. • You will plan at least 2 activities at your destination and determine the cost of each. • Your vacation will take place from June 1st to June 6th. You will need a six night hotel stay and a car rental for 6 days.

  31. Activity 2 – Planning Your Vacation on the Web In this project you will use the internet to plan a fictitious car trip. Step One - Choose a Destination Step Two - Choose Lodging at Your Destination Step Three - Choose a Route Step Four - Reserve Your Rental Car Step Five - Plan Your Vacation Activities

  32. Web Content Who’s Behind the Web Page? • Anyone can publish to the web • No Laws to Monitor or Regulate its accuracy • Always a Good Idea to Double-Check all information with a 2nd Source. http://www.britannica.com/

  33. Web Security Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[1] The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing.[2] Different methods have been used to protect the transfer of data, including encryption.

  34. Web Security Web Tracking • When a web site makes a record of your visit • “Cookie” – A small text file that helps with web tracking • Cookies enable the web site to determine how often you have: • Visited Their Site • Date & Time of Your Last Visit • Specific Pages viewed on Site

  35. Web Security Web Tracking Example: • Amazon.com, you may have seen a message on the site that appears to be customized for you. “Hello, we thought you might be interested in these CDs”, then the CDs listed are all your favorites. • A cookie by itself is not a bad thing. In fact they can make surfing the web a richer experience and many well known sites will not function properly without them.

  36. Web Security Advertising Spyware • Advertising spyware is software installed on a computer without the computer owner’s knowledge or permission.

  37. Web Security Advertising Spyware • Uses Gathered Information to: • Download Advertisements (Pop-Up Banners) • Identify Theft • Computer Damage

  38. Web Security Online Purchases & Encryption • Shop From a Secure PC • Shop Smart, and Only at Sites You Know & Trust • Shop with Your Credit Card • Consider Alternative Payment Methods • One-time use • Get a Handle on Spam

  39. Web Security Online Purchases & Encryption • Encryption- Converts your text into gibberish • File would need to be decrypt or translate it back to original format • Majority of all reputable sites now offer encryption services. • Look for the Lock Icon at the bottomw of the browser window. • Encrypt your Own Files • Use PGP (Pretty Good Privacy)

  40. Web Security Viruses • A program designed to replicate and spread to as many computers as possible. • Immediately Visible • Working unseen on your computer for months

  41. Web Security Viruses • Email Attachments • DO NOT OPEN ANY FILE ATTACHMENT UNTIL YOU HAVE CONFIREMD ITS ORIGIN • Even From a Friend – Viruses will over take address books to spread itself.

  42. Web Security Viruses • Trojan Horse • Pretends to be something it is not, such as a product update or a free software download. Once you open it, the virus will begin to execute its programming. • Keep Anti-Virus Software on your computer & up to date.

  43. The Future of the WWW It will be almost impossible to predict what the Web will be like in the future. Ten years ago, few people would have predicted the rapid growth of the web in size and content. There are three things you can bet on.1) More and more people will use the web. Not only is the world’s population increasing, but computer prices keep falling.  As the “computer generation” grows into adulthood, replacing the "baby-boom" generation in the work force, web use will increase.2) The Web will get faster and faster. Not too long ago, you would have been happy to have a 28.8 Kilobytes per/sec modem. Then 56k modems came along. Now there is DSL and Cable offering speeds over 1000k. Over 70% of high school students in suburbia America already has a high speed connection. There is already talk about an Internet2, bringing technology enabling everyone will have the speed that only today’s backbone lines enjoy.3) The Web will grow continually grow more wireless. Popping up all over the United States are “hot spots”, areas where a business, school, or home is broadcasting their Internet connection. All laptops are now equipped with Mobile Technology to automatically connect to any wireless Internet signal it can find. Many restaurants are broadcasting a wireless signal in an effort to attract more customers. Many predict that within a few years, you may not need a wired connection at all.

  44. The Internet and the World Wide Web

More Related