Glossary of Internet Terms

Size: px
Start display at page:

Download "Glossary of Internet Terms"

Transcription

1 Glossary of Internet Terms block A setting in Instant Messengers that prevents those you have blocked from seeing when you are online, and keeps them from being able to message you. browser cache chat cookie Software that will load and display a web page. The principle browsers are Netscape, Microsoft Internet Explorer, Opera, and Mosaic. Browsers such as Netscape and Microsoft Internet Explorer hold copies of recently visited web files, in disk memory. A form of real-time electronic communications where participants type what they want to say, and it is repeated on the screens of all other participants in the same chat. Internet Relay Chat or IRC is an Internet protocol for chat, and there are many other chat systems in services like Delphi, Yahoo and AOL. Other commonly used programs are MSN, AIM and ICQ. A cookie is a short file put on your computer by a web page which includes information about your usage and facilitates the current interaction. For example, it may include the information that you have logged into a passworded area already in the current session and don't need a second password check. There are many uses for cookies. They may be erased at the end of a session or retained until the next session, and they may be encrypted or in plain text. domain name Domain name addresses, together with IP addresses, are the two forms of Internet addresses in common use. Domain name addresses all end with a correct top-level domain. The top-level domains may be any of com, edu, gov, int, ca, net, org, and many more. download To transfer a file from another computer to your own computer system via a network. 20

2 Electronic mail. One of the earliest standard Internet protocols which enables people with different computers and operating systems to communicate with each other. allows one-to-one or one-to-many mailings. Mail is received and held by a mail server within an organization or by an Internet service provider until the addressee logs on to collect the mail. firewall Firewall refers to the concept of a security interface or gateway between a closed network and the outside Internet that blocks or manages communications in and out of the network. The security may be provided by passwords, authentication techniques, software, and hardware. flaming FTP GIF hacker history hit Writing angry or insulting words about a person. It is most often applied to newsgroups and threads, but it can apply to mailing lists and other forms of public messaging. File Transfer Protocol. The Internet protocol that permits you to transfer files between your computer and another computer. Graphical Interchange Format. A bitmap graphical format originally developed for CompuServe that is widely used in WWW pages. It is particularly good for text art, cartoon art, poster art, and line drawings- -all types with solid colors and distinct lines or borders between different colors. GIF files use a.gif extension. Originally, a hacker was a term of respect among computer designers, programmers, and engineers for those among them who created truly original and ingenious programs, devices, or sometimes very clever practical jokes. Unfortunately, the current popular meaning of the term is to describe those who break into systems, destroy data, steal copyrighted software, and perform other destructive or illegal acts with computers and networks.. List of sites recently visited, saved in the browser. In search terminology, every listing a search engine returns from a search is called a hit. home page HTML A home page is a web page. In most familiar terms, it is a personal page for an individual. It can also be the basic main page for a more complex web site for individuals, organizations, or web communities. It also refers to the first page loaded when a browser opens. HyperText Markup Language. A coding system used to create WWW pages. 21

3 http hub HyperText Transfer Protocol. It is the main protocol used on the World Wide Web that enables linking to other web sites. Addressing to other web pages begins with " and is followed by the domain name or IP address. A device that connects the cables from computers and other devices such as printers in an ethernet local area network. hypertext A form of text which includes visible links to other pages of text or media, accessible by clicking or selecting the links. Instant Messaging IP Real-time conversation, similar to chat, but usually person-to-person, rather than in public groups. You must be invited into the conversation, you cannot just join without permission. Examples are MSN Messenger, ICQ, AIM as well as features within online games. Internet Protocol. See TCP/IP IP address IRC ISDN ISP JPEG link IP addresses, together with domain addresses are the two forms of Internet addresses in common use. IP addresses consist of four numbers between 0 and 255, separated by periods. For example, Internet Relay Chat. An Internet protocol that allows people all over the world to meet in conference groups (called channels) and chat with each other by keying. Integrated Services Digital Network. A technology that carries data over phone. Internet Service Provider. Those companies that provide access to the Internet. Joint Photographic Experts Group, a graphical format that is widely used in WWW pages. These files end with.jpg. An active connection to another web page, location in a web page, file, or other Internet resource. Selecting the link takes you to the new location or resource. mailbomb Flood a single address with a high volume of mail. Used to retaliate against an individual or organization that has bothered the sender(s) in some way. Please note that the practice violates all Internet Service Provider user agreements and wastes bandwidth and resources. Its effects go far beyond the annoyance to the addressee. 22

4 netiquette Short for net etiquette. The basic principles of courtesy and consideration for others that can keep communication on the Internet a pleasure for all. newbie or newby A newcomer to the nets, who reveals his or her inexperience by lack of knowledge of net conventions, netiquette, vocabulary, and know-how. newsgroup POP pop-up See Usenet Newsgroups Post Office Protocol. A protocol for client-server A window that appears without being requested, when you load a particular site. Often they are used for advertising, and can become an irritant. portal A gateway or entrance to the web. In common usage it has come to describe a starting point page with a hierarchical, topical directory, a search window, and added features like news headlines and stock quotes. protocol A standard for the exchange of information. Different computers and operating systems and software are able to communicate with each other on the Internet, because of the adoption of protocols. proxy server router A proxy server is a process that acts like a switchboard through a firewall to manage the various types of permitted communications with the outside world. A router connects networks together, controlling the routing of packets from source to destination and providing alternate paths when necessary. search engine site SMTP A utility that will search the Internet, a site, or a database for terms that you select. A host on the Internet which allows remote access by such protocols as http, ftp, telnet or gopher. A site may consist of a single page or many pages under a common site name. Simple Mail Transfer Protocol. The protocol used to send mail between servers and to send mail from your client to a mail server. 23

5 social engineering spam surf A cracker term for tricking users of a system to reveal passwords so that the cracker can gain entry to the system. A common technique is to contact users in chat or on a system, pretend that they are employees of the system performing security checks, and insist that the users give their password to prove who they are or their account will be closed. Such requests are never legitimate! Social engineering schemes can be quite ingenious and convincing and more subtle than the simple technique above. Never reveal a password or even give hints what it may be. Flooding many inappropriate newsgroups or mailing lists or your mailbox with off- topic articles--usually ads or promotions. It is a major violation of netiquette, and if you try it, it violates your member agreement in most places and can lead to account cancellation. TCP/IP To explore the Internet without any more specific a purpose than to see what is out there. Transmission Control Protocol/Internet Protocol. The protocols that are the basis for transmitting and routing data packets on the Internet. The Internet Protocol is the one thing that all current Internet sites have in common temp files These files are all the pages and pictures from all the sites you ever visit, which remain on your computers until you delete your temporary files in you browser. upload To transfer a file from your computer system to another system via a network. urban legend URL An oft-told tale on the Internet that is untrue, but refuses to die. They keep reappearing in newsgroups, discussion lists, and message bases. Uniform Resource Locator. URLs specify the location of a resource in the Internet. Usenet Newsgroups virus Usenet Newsgroups are discussion groups about a topic that is reflected in their titles, such as comp.sys.ibm.pc.games.adventure or sci.astro.hubble. There are eight major primary series of newsgroups: comp, humanities, misc, news, rec, sci, soc, and talk. Newsgroups in the eight primary series are only created after a formal approval process, which includes formal discussion and voting. A destructive program that has the ability to reproduce itself and infect other programs or disks. Typically a virus will not show itself immediately, but will add itself to programs and disks to spread itself widely on many computers before it is triggered into its destructive phase. The best defense is to run anti-virus software and use it on a regular basis. Anti-virus software should be updated monthly. World Wide Web (WWW) The World Wide Web is an Internet protocol that makes use of the HTML, hypertext and hypermedia to create pages with links to other pages. WWW pages can include graphics, audio, and video as well as text. 24

Internet Jargon. Address: See Uniform Resource Locator.

Internet Jargon. Address: See Uniform Resource Locator. Internet Jargon Address: See Uniform Resource Locator. Address Bar: Part of the window in Internet Explorer that displays the URL of the web site currently being viewed. This is also the location where

More information

Chapter NET 2 What is the Internet? Internet Development Primary Internet Protocol

Chapter NET 2 What is the Internet? Internet Development Primary Internet Protocol Chapter NET 2 INTRODUCTION TO THE INTERNET AND WORLD WIDE WEB Before the 90 s the Internet was the domain of the computer industry, universities, and the government. Today there are many people that are

More information

What really is a Service?

What really is a Service? Internet Services What really is a Service? On internet (network of networks), computers communicate with one another. Users of one computer can access services from another. You can use many methods to

More information

MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet

MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet MMGD0204 Application Technologies Chapter 1 Introduction to Internet Chapter 1 Introduction to Internet What is The Internet? The Internet is a global connection of computers. These computers are connected

More information

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d. C H A P T E R 7 The Internet, Intranets, and Extranets What is the Internet Millions of computers, all linked together on a computer network. A home computer usually links to the Internet using a phone

More information

Chapter 2 - Microsoft Internet Explorer 6

Chapter 2 - Microsoft Internet Explorer 6 Chapter 2 - Microsoft Internet Explorer 6 1 Objectives 2 Outline 2.1 Introduction to the Internet Explorer 6 Web Browser 2.4 Searching the Internet 2.6 Keeping Track of Favorite Sites 2.7 File Transfer

More information

Instant Messaging. Copyright 2006 Haim Levkowitz. Copyright 2006 Haim Levkowitz

Instant Messaging. Copyright 2006 Haim Levkowitz. Copyright 2006 Haim Levkowitz Instant Messaging 1 Outline Goals and Objectives Topics Headlines Introduction Text-only Web Chatting Instant Messaging AIM Yahoo Messenger MSN Messenger Opera Instant Messaging Web Casting Wireless Instant

More information

lesson 19 Internet Basics

lesson 19 Internet Basics lesson 19 Internet Basics This lesson includes the following sections: The Internet: Then and Now How the Internet Works Major Features of the Internet Online Services Internet Features in Application

More information

Chapter 7. The Internet and World Wide Web. What You Will Learn... Computers Are Your Future. The Internet. What You Will Learn...

Chapter 7. The Internet and World Wide Web. What You Will Learn... Computers Are Your Future. The Internet. What You Will Learn... What You Will Learn... Computers Are Your Future Chapter 7 How the Internet works Methods for accessing the Internet The Internet and the World Wide Web Hypertext Web browsers and Web servers The Internet

More information

Internet Services. Sadiq M. Sait, Ph.D

Internet Services. Sadiq M. Sait, Ph.D Internet Services Sadiq M. Sait, Ph.D sadiq@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Internet Short Course 1-1 What really

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

The Internet and website development. The Internet

The Internet and website development. The Internet CHAPTER 12 12 The Internet The Internet and website development Syllabus outcomes 5.2.1 Describes and applies problem-solving processes when creating solutions. 5.2.2 Designs, produces and evaluates appropriate

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

17 FUNDAMENTALS OF INTERNET

17 FUNDAMENTALS OF INTERNET Fundamentals of Internet :: 323 17 FUNDAMENTALS OF INTERNET 17.1 INTRODUCTION The latest buzzword in computer world is Internet. It has taken the entire world by surprise with its cutting edge technology

More information

Technology/Internet Usage Workshop

Technology/Internet Usage Workshop Technology/Internet Usage Workshop 1) Workshop Goals (1 st Slide) 2) Computers Desk Top (Show examples) Lap-Top Hand-held Wireless Device Introduce Tammy Welsh from Gateway 3) What is the Internet? The

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

How to Search the Internet

How to Search the Internet Technology In Action 1 Technology In Action Chapter 3 Using the Internet: Making the Most of the Web s Resources 2 Topics Internet basics Internet data Internet service providers Web browsers URLs Hyperlinks

More information

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen Introduction to Web Technology Content of the course Diana Inkpen The Internet and the WWW. Internet Connectivity. Basic Internet Services. University of Ottawa School of Information Technology and Engineering

More information

Following is information on the skills and computer requirements you need for this program.

Following is information on the skills and computer requirements you need for this program. Welcome to the Building Inspection Technician program. Most of your course material will be delivered to you using an online Learning Management System called Blackboard. You will receive course information

More information

Masters of Science in Information Technology

Masters of Science in Information Technology Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different

More information

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used: Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

Chapter 2 - Microsoft Internet Explorer 6

Chapter 2 - Microsoft Internet Explorer 6 Chapter 2 - Microsoft Internet Explorer 6 1 Outline 2.1 Introduction to the Internet Explorer 6 Web Browser 2.22 Connecting to the Internet 2.3 Internet Explorer 6 Features 2.4 Searching the Internet 2.5

More information

Chapter 9 The Internet

Chapter 9 The Internet CSCA0101 COMPUTING BASICS Chapter 9 1 1. 2. Types of Network 3. What Makes Internet Works? 4. Internet Equipment 5. Internet Applications 2 A global network connecting millions of computers More than 100

More information

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

CITS1231 Web Technologies. Client, Server, the Internet, and the Web CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the

More information

Unit- I Introduction and Web Development Strategies

Unit- I Introduction and Web Development Strategies Introduction to Web Technology 1 (ECS-604) Unit- I Introduction and Web Development Strategies 1. World Wide Web: The World Wide Web is a system of interlinked hypertext documents accessed via the Internet.

More information

Why your own server space? Why should you set it up?

Why your own server space? Why should you set it up? Lab 5 servers Why your own server space? Why should you set it up? -Control factors -Demystifying how things get on the internet -Project from start to finish What is the Difference Between a Digital Art

More information

Web Browsers And Mailing Tools

Web Browsers And Mailing Tools Web Browsers And Mailing Tools Introduction: Network A network is an interconnection between two or more computers or other computing devices which are connected together usually through a cable to share

More information

126.47. Web Design (One Credit), Beginning with School Year 2012-2013.

126.47. Web Design (One Credit), Beginning with School Year 2012-2013. 126.47. Web Design (One Credit), Beginning with School Year 2012-2013. (a) General requirements. Students shall be awarded one credit for successful completion of this course. This course is recommended

More information

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if

More information

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2

More information

THE NATIONAL JUDICIAL COLLEGE

THE NATIONAL JUDICIAL COLLEGE E DUCATION I NNOVATION A DVANCING J USTICE THE NATIONAL JUDICIAL COLLEGE OUTSIDE THE BOX: INTERNET & NETWORK TECHNOLOGY DIVIDER 7 Professor Donald R. Mason OBJECTIVES: After this session, you will be able

More information

Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN

Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN Chapter 12 Topics: Communication links LAN / WAN Internet / WWW A computer network is a set of independent computer systems interconnected by telecommunication links. CMPUT101 Introduction to Computing

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

Higher Computing Networking 1

Higher Computing Networking 1 Networking Briefly state what is meant by a computer network. What does the term topology refer to in this context? What are the ideal goals a network designer should aim for? Compare and contrast a star

More information

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet

More information

Introduction to LAN/WAN. Application Layer (Part II)

Introduction to LAN/WAN. Application Layer (Part II) Introduction to LAN/WAN Application Layer (Part II) Application Layer Topics Domain Name System (DNS) (7.1) Electronic Mail (Email) (7.2) World Wide Web (WWW) (7.3) Electronic Mail (Email) Mostly used

More information

Proxy Services: Good Practice Guidelines

Proxy Services: Good Practice Guidelines Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance Prog. Director Mark Ferrar Owner Tim Davis Version 1.0 Author James Wood Version Date 26/01/2006 Status APPROVED Proxy Services:

More information

Chapter 3 Restricting Access From Your Network

Chapter 3 Restricting Access From Your Network Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax Dual Band Wireless-N Router WNDR3300 to protect your network.

More information

Internet and its Application in Libraries

Internet and its Application in Libraries Internet and its Application in Libraries National Centre for Science Information (NCSI) Indian Institute of Science Bangalore 560 012 (E-Mail: raja@ncsi.iisc.ernet.in) Contents What is Internet? How does

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Cookies and Your Privacy

Cookies and Your Privacy White Paper - October 2009 Cookies and Your Privacy Anyone who uses computers today should be concerned about privacy and security. Any time your computer connects to the outside world, you run the risk

More information

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, dfitzpat@computing.dcu.ie

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, dfitzpat@computing.dcu.ie CA106 Web Design Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, dfitzpat@computing.dcu.ie History of the Internet Terminals attached to mainframe computer From mid 1960 s packet-switching

More information

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used: Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research

More information

CHAPTER 9: THE EVOLVING INTERNET

CHAPTER 9: THE EVOLVING INTERNET CHAPTER 9: THE EVOLVING INTERNET Multiple Choice: 1. What was the department of the U.S. government that developed the initial stages of the Internet? A. Department of Commerce B. Department of Defense

More information

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

Copyright 2006 Comcast Communications, Inc. All Rights Reserved. ii Copyright 2006 Comcast Communications, Inc. All Rights Reserved. Comcast is a registered trademark of Comcast Corporation. Comcast Business IP Gateway is a trademark of Comcast Corporation. The Comcast

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Guide to Analyzing Feedback from Web Trends

Guide to Analyzing Feedback from Web Trends Guide to Analyzing Feedback from Web Trends Where to find the figures to include in the report How many times was the site visited? (General Statistics) What dates and times had peak amounts of traffic?

More information

M3-R3: INTERNET AND WEB DESIGN

M3-R3: INTERNET AND WEB DESIGN M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

NETWORKS AND THE INTERNET

NETWORKS AND THE INTERNET NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place

More information

Computer Networks and Internet working

Computer Networks and Internet working Computer Networks and Internet working By completing this module you will be able to understand and learn the following: Computer Networking, Types of Networks and network Services Different Cables used

More information

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Internet Basics. Basic Terms and Concepts. Connecting to the Internet Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a

More information

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Table of Contents Getting Started... 4 New Features... 4 System Requirements... 4 Configuring Microsoft Internet Explorer... 4 Configuring

More information

Internet Concepts. What is a Network?

Internet Concepts. What is a Network? Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,

More information

Chapter 9. The Internet: Information Technology Infrastructure for the Digital Firm. Essentials of Management Information Systems

Chapter 9. The Internet: Information Technology Infrastructure for the Digital Firm. Essentials of Management Information Systems Chapter 9 The Internet: Information Technology Infrastructure for the Digital Firm 9.1 Prentice Hall Objectives 1. How does the Internet work? What are its major capabilities and benefits to business?

More information

Internet Safety for Kids and Adults

Internet Safety for Kids and Adults Net@office Net@office differs from Proxy in two significant areas: features & configurability. Net@office has advanced features like web page caching, site filtering, privacy options, traffic logging and

More information

Chapter 4 Restricting Access From Your Network

Chapter 4 Restricting Access From Your Network Chapter 4 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax NEXT Wireless Router WNR834B to protect your network. You can

More information

2. Ethernet is a means of implementing which of the following network topologies?

2. Ethernet is a means of implementing which of the following network topologies? Test Bank Chapter Four (Networks and the Internet) Multiple Choice Questions 1. Which of the following is not a way of classifying networks? A. WAN versus LAN B. Closed versus open C. Router versus bridge

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to: The Internet Chapter 10 Learning Objectives After reading this chapter, you should be able to: Discuss the responsibilities of the Internet Protocol (IP) and how IP can be used to create a connection between

More information

Introduction to Internet and WWW

Introduction to Internet and WWW Introduction to Internet and WWW Course No.: CMPE296U Course Name:Web-Based Systems and Tools Instructor: Jerry Gao, Ph.D. Introduction to Internet and WWW - What is the Internet? - History of the Internet

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

This file is divided into two sections. The first

This file is divided into two sections. The first Glossary of Computer and Internet Terms This file is divided into two sections. The first section is a glossary of computer terms, and the second is a glossary of Internet terms. File C6-30 November 2002

More information

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business

More information

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Virus What is a virus? It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It can also be defined as a set of codes written to cause

More information

The Microsoft JPEG Vulnerability and the Six New Content Security Requirements

The Microsoft JPEG Vulnerability and the Six New Content Security Requirements The Microsoft JPEG Vulnerability and the Six New Content Security Requirements Table of Contents OVERVIEW...3 1. THE VULNERABILITY DESCRIPTION...3 2. NEEDED: A NEW PARADIGM IN CONTENT SECURITY...4 3. PRACTICAL

More information

Terminology. Internet Addressing System

Terminology. Internet Addressing System Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics

More information

Enterprise Security Critical Standards Summary

Enterprise Security Critical Standards Summary Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors

More information

FTP Use. Internal NPS FTP site instructions using Internet Explorer:

FTP Use. Internal NPS FTP site instructions using Internet Explorer: FTP Use File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers

More information

PROTECTING NETWORKS WITH FIREWALLS

PROTECTING NETWORKS WITH FIREWALLS 83-10-44 DATA SECURITY MANAGEMENT PROTECTING NETWORKS WITH FIREWALLS Gilbert Held INSIDE Connecting to the Internet; Router Packet Filtering; Firewalls; Address Hiding; Proxy Services; Authentication;

More information

Page 1 Basic Computer Skills Series: The Internet and the World Wide Web GOALS

Page 1 Basic Computer Skills Series: The Internet and the World Wide Web GOALS GOALS Understand the differences between the Internet and the World Wide Web Use a web browser to find and open websites Navigate using links, the back button, and the forward button Use bookmarks and

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Successful WebEx Meetings

Successful WebEx Meetings Successful WebEx Meetings Tips and techniques for meeting hosts and presenters Contents About This Guide 3 Setting Up a Meeting 5 Starting and Conducting a Meeting 11 Presenting Information 15 Hosting

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Using a Cisco PIX Firewall to Limit Outbound Internet Access

Using a Cisco PIX Firewall to Limit Outbound Internet Access Controlling Outbound Internet Access by Use of a Proxy and Firewall A WHITE PAPER PREPARED FOR ASPE TECHNOLOGY www.aspetech.com toll-free: 877-800-5221 Controlling Outbound Internet Access by Use of a

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

White Paper X-Spam for Exchange 2000-2003 Server

White Paper X-Spam for Exchange 2000-2003 Server White Paper X-Spam for Exchange 2000-2003 Server X-Spam for Exchange 2000-2003 (X-Spam) is a highly adaptive Anti-Spam Software that protects the Microsoft Exchange 2000-2003 servers from Spam. X-Spam

More information

How To Upgrade To Symantec Mail Security Appliance 7.5.5

How To Upgrade To Symantec Mail Security Appliance 7.5.5 Release notes Information Foundation 2007 Symantec Mail Security Appliance 7.5 Copyright 1999-2007 Symantec Corporation. All rights reserved. Before installing or upgrading: Migration issues If you are

More information

How To Understand The History Of The Web (Web)

How To Understand The History Of The Web (Web) (World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL

More information

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software

More information

Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:

Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies: Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

COMPUTER-INTERNET SECURITY. How am I vulnerable?

COMPUTER-INTERNET SECURITY. How am I vulnerable? COMPUTER-INTERNET SECURITY How am I vulnerable? 1 COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2 VIRUS A computer virus is a small program written to alter the way a computer

More information

Guidelines for Creating Your Own Troop or Group Web Page

Guidelines for Creating Your Own Troop or Group Web Page Girl Scouts of the USA Guidelines for Creating Your Own Troop or Group Web Page These guidelines are written for adult volunteers, older girls, and others considering developing a Web page or home page

More information

Networks and the Internet A Primer for Prosecutors and Investigators

Networks and the Internet A Primer for Prosecutors and Investigators Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

Sonicwall Reporting Server

Sonicwall Reporting Server Sonicwall Reporting Server How to access the reporting server: Navigate to https://swreports.hitechsupport.com.au, and enter your username and password provided. After you have logged in, click on the

More information

Chakchai So-In, Ph.D.

Chakchai So-In, Ph.D. Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon

More information

Connecting to the Internet

Connecting to the Internet The Internet & The World Wide Web CIT 100 Norm Downey What is the Internet? A global computer network made up of thousands of privately and public owned computers and computer networks. More than one billion

More information

Cyber Security Best Practices. 1. Introduction What is cyber security and why is it important?

Cyber Security Best Practices. 1. Introduction What is cyber security and why is it important? 1. Introduction What is cyber security and why is it important? Computers and the Internet have become commonplace in current day society. Every day these systems store, manipulate and exchange business

More information

Issue 1 April 2, 2009 Using the VT2442 Web User Interface

Issue 1 April 2, 2009 Using the VT2442 Web User Interface Using the VT2442 Web User Interface View the Terms of Service by visiting the Vonage website at www.vonage.com/tos. 1 Table of Contents Introduction to the Web UI... 3 Home Page... 4 Setup... 7 WAN Configuration...

More information

Chapter 4 Security and Firewall Protection

Chapter 4 Security and Firewall Protection Chapter 4 Security and Firewall Protection This chapter describes how to use the Security features of the ProSafe Wireless ADSL Modem VPN Firewall Router to protect your network. These features can be

More information

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol Connecting Computers Networks Computers use networks to communicate like people use telephones or the postal service Requires either some sort of cable point-to-point links connect exactly 2 computers

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Providing public access to information on the Internet

Providing public access to information on the Internet 1 Providing public access to information on the Internet ***- ***- An additional method to provide access to information 2 More and more useful information becomes available online on the Internet»free

More information