Wddba Configer Using Internate
Wddba Configer Using Internate
Wddba Configer Using Internate
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Web Development and Database Administration
Level II
ThismoduleincludesthefollowingLearningGuides
LO3 Work as a team member MODULE CODE: EIS WDDBA2 M03 0322
Introduction to module
The internet developed from software called the ARPANET which the U.S military had
developed. It was only restricting to military personnel and the people who developed it. Only
after it was privatized was it allowed to be used commercially.
The Internet is means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers. When two computers are connected over the Internet, they can
send and receive all kinds of information such as text, graphics, voice, video, and computer
programs.
To use the above function of the internet the user must use different types of browsers like
internet explorer Mozilla Firefox, google chrome, opera and also internet address and web site
what you went to browse.
This module is designed to meet the industry requirement under the Web Development and
Database Administrationoccupational standard, particularly for the unit of competency:
Configuring and Accessing Internet Services
This module covers the units:
Manage internet
Search internet
Work as a team member
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to: -
Required to access internet
Internet or web browser
Managing web browser
Adjust view mode
Setting homepage
Download and upload image.
Save book marks
Managing cookies, history, temporary file
Security of internet
Principles of netiquette
Use different search engine
Saving search results
Printing downloaded file
Communicate with tem member using internet
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Introduction to the internet
Opening different types of internet browsers
Accessing a particular site using its URL to obtain data and browse links
Manage the setting of the browsers
Adjusting display/view modes to suit personal requirements
Loading necessary files depends on the capability of internet
Modifying toolbars to meet user and browsing needs
Deleting cookies and browser history as precaution from virus infection.
This unit will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
WWW: It is a collection of interlinked documents that are accessible over the Internet. It
consists of millions of web pages that contain text, images, voice and videos. Sir Tim Berners-
Lee, a British scientist working at CERN, created the World Wide Web.
Website: A website is a set of web pages consisting of text, audio and video. Web servers
host websites.
URL: It specifies the location of a resource on the Internet. It consists of the basic address
and path.
Web Page: Web pages are resources of information. They are generally created in the
HTML format and provide the web users with navigational abilities through hyperlinks to
other web pages on the web.
Home Page: The term home page is used to refer to the page that is the default page of any
website. It is the main page of a complex website.
Web Browser: A web browser is a software application that facilitates user interaction with
the text, audio, video and other information that is located on the web.
Cache: Web browsers maintain a cache of recently visited web pages. Some of them use an
external proxy web cache, which is a server program through which web requests pass. This
enables the browsers to cache frequently visited pages. Even search engines make available
already indexed web pages through their caches.
HTTP: Hypertext Transfer Protocol, abbreviated as HTTP, is a communications protocol
used for the transfer of information over the Internet. A client makes an HTTP request using a
web browser to which an HTTP response is sent from the server.
Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged between
the web client and the web server. It is sent by the web server to the web client and returned
unchanged by the client each time it accesses the server.
Session: It is an exchange of information between a computer and its user. It is established
for a certain period of time after which it ends.
Hyperlink: A reference in a document to another section of the document or to another
document is termed as a hyperlink. Hyperlinks are used to redirect the user from one section
of a page content to another.
Internet Security: It is one of the major concerns today. As the Internet acts as a
communication platform that can be accessed by millions of users around the world, it
becomes necessary that proper measures be implemented. Issues like Internet Safety that deal
with the content that is made accessible over the Internet are equally important. Internet
Privacy relates to safeguarding the privacy of the web users and the sensitive information on
the web from hackers and stalkers.
There are so many types of internet browsers are usedto upload or download files for different
office intercommunication though it.
Examples of web or internet browser
Mozilla Firefox
Chrome
Microsoft Edge
Safari
Opera
UC Browser
Chedot Browse
If you use Chrome on multiple devices, logging in to your account will give you quick access to
documents you saved in Google Docs, your Gmail messages and your bookmarks, regardless of
the device you’re on. Search history is also saved with your account, so if you’re logged in,
terms you’ve looked for will auto-populate when you start typing in the Google search field on
any device.
Chrome lets you set icons on your toolbar so you can quickly get to the pages you visit most
often. You can also pin bookmarks to the Google Chrome homepage. It has tabbed browsing so
you can have multiple viewing windows open at once and easily toggle between them. During
out in-house tests, we noticed Chrome didn’t identify as many phishing schemes as Firefox, but
it did stop malicious files, including ransomware and Trojans, from opening and infecting our
computer. Chrome’s privacy browser is available on all devices, including cell phones, to keep
your online activity private.
When we tested Edge’s security, it not only warned of phishing schemes and other dangerous
websites, but it also blocked malware files from infecting out test devices. Microsoft Edge
includes Notes, a tool that lets you highlight works or passages on any webpage and save them to
read later.
You can add icons to the toolbar that link you to frequently visited websites and use the URL
field to search the web. Edge has sync capabilities so you can access your bookmarks and search
history across all your devices. Microsoft is one of the few internet browser developers that
offers telephone support if you are having difficulties with its program.
you’re reading an article, Safari has a tool that pushes ads and other distractions aside so you can
read without unrelated text or images breaking in.
This browser is the default for iPhones and iPads, and it syncs through your iCloud account, so
any changes you make on one device will be available on any device connected to your account.
When we tested its default security settings, Safari warned us of malicious websites that had
phishing schemes or dangerous links on them. But it didn’t stop malicious downloads, so we had
to depend on a Mac antivirus program to gather these threats during the download process.
This is one of the few browsers that has live support. It also has great online resources, like
tutorials and searchable FAQs, so you can find answers on your own.
UC Browser is a light, smart browser that gives users the fastest mobile
web browsing experience. UC Browser uses the latest in web kit
technology to offer features like ad-blocking, built-in Google
Translate, and voice search for Android phones. The app also has a
smart download feature so you can easily download files on spot. One of the most talked
about features is UC News.
7. Chedot Browser: beast to download video and audio at the same time
other similar functionality. This application may seem legitimate and useful, however, Chedot
Browser is classed as adware and a potentially unwanted program (PUP).
This rogue application infiltrates systems without users' consent, generates intrusive online
advertisements, and tracks Internet browsing activity. Users who attempt to search the Internet
via this browser are redirected to the search.chedot.com website.
To access or use the web site must now that the term URL. Based on this resource locater the
users view necessary data using browser SW. Before accessing particular web site, the user must
be open browser and write down the URL on the search bar.
Example 1. The users try to access google web site using Microsoft edge
To configure the home page, use the following steps do not forget this is used only Microsoft
edge browser only: -
1. Click on three dot at the right top of the browser.
2. Click on setting
between an end user and a website or other service's server. Proxies are used for different reasons
including efficiency, privacy, and security
A SOCKS5 proxy is an alternative to a VPN. It routes packets between a server and a client
using a proxy server. This means that your real IP address is hidden and you access the internet
with an address provided to you by a proxy provider.
Configuring Your Browser to Use Proxy
1. Select the Manual proxy configuration radio button.
2. Enter 127.0. 0.1 in the SOCKS Host field and 9090 in the Port field.
3. Check the Proxy DNS when using SOCKS v5 checkbox.
4. Click on the OK button to save the settings.
How Does the Proxy Protect Computer Privacy and Data?
A proxy server performs the function of a firewall and filter. The end-user or a network
administrator can choose a proxy designed to protect data and privacy. This examines the data
going in and out of your computer or network. It then applies rules to prevent you from having to
expose your digital address to the world. Only the proxy’s IP address is seen by hackers or other
bad actors. Without your personal IP address, people on the internet do not have direct access to
your personal data, schedules, apps, or files.
browser’s security settings on installation. Failing to correctly set up your browser’s security
features can put you at a higher risk for malware infections and malicious attacks. This
installation of our “Cybersecurity 101” series provides our tips for securing several of today’s
most popular browsers, including Google Chrome, Mozilla Firefox, and Microsoft Internet
Explorer. While it is impossible to guarantee complete protection from cyber threats, following
these tips will greatly increase the security of your web browser.
Each time a user visits a website using Microsoft Internet Explorer, files downloaded with each
web page (including HTML and Javascript code) are saved to the Temporary Internet Files
folder, creating a web cache of the web page on the local computer's hard disk drive, or other
form of digital data storage. The next time the user visits the cached website, only changed
content needs to be downloaded from the Internet; the unchanged data is available in the cache.
Despite the name 'temporary', the cache of a website remains stored on the hard disk until the
user manually clears the cache, the cache expires or if the cache is full. This is often regarded as
a privacy issue, because anyone with access to the computer can view the cache. The contents of
the folder are indexed using an index.dat file, a form of database.
The Temporary Internet Files cache can be useful in certain situations. For example, if
no Internet connection is available, previously cached websites are still available offline. Certain
online media files (such as embedded Flash movies) are not easily accessed directly through
Internet Explorer, but are automatically saved into the cache after viewing them. Depending on
the type of website and how often it is updated, the cached data may not reflect the online
version of the website. The cache is also useful for police to collect forensic evidence.
The cache can be cleared by using Internet Options within the Internet Explorer interface, but
this method is subject to deletion privacy issues. Many alternative tools exist to erase the data
instead.
As a result, websites designed to support the earlier versions of these standards may display
differently when viewed with web browsers designed to support current versions of the
standards, such as Internet Explorer. In order to help such web sites, display correctly, Internet
Explorer supports a display mode called Compatibility View, which displays web pages as if
they were viewed by an earlier version of the browser.
referred to as graphical browsers as they are able to display graphics, colors and multimedia
features.
When a web site is visited, the details of that web page are stored in the browser's cache. Web
pages stored to be read offline are also stored in the cache. Microsoft Internet Explorer's cache is
labeled 'Temporary Internet Files' whereas Netscape Navigator stores its cache in the program
folder. This speeds up the display of pages that are visited frequently because the Web page
details are accessed from the cache instead of from the web. It is possible to increase the size of
the cache, but doing this will reduce the space available for other files on your computer. It is
also possible to delete files from the 'Temporary Internet files' folder to free up space within the
cache. However, deleting files could result in delay if those web pages are required at a later
date, as they can no longer be accessed from the cache and they will have to be downloaded
again.
Many high-profile browser toolbars released over the years have been fraught with problems,
either intentionally as malware or injected with computer viruses or due to poor or conflicting
programming when considering multiple toolbars being included on the single browser.
Many unscrupulous companies use software bundling to force users downloading one program to
also install a browser toolbar, some of which invade the user's privacy by tracking their web
history and search history online. Many antivirus companies refer to these programs as grayware
or Potentially Unwanted Programs (PUPs).
Developing a toolbar
The programming language and development tools behind a browser toolbar vary from one
browser to another.
In Google Chrome 4 or later toolbars can be created as extensions that add browser actions to the
browser window. The logic behind the toolbar is written in JavaScript with access to a special
JavaScript API to interact with the Chrome application and web content. The privileges under
which a Chrome extension runs are governed by a set of permissions.
In Opera 11 or later toolbars can be created as extensions that add buttons to the browser
window. The logic behind the toolbar is written in JavaScript with access to a special JavaScript
API to interact with the Opera application and web content.
In Firefox, Chrome, Safari and Opera toolbar styling is done though CSS.
Native vs. injected toolbars
Some major browsers (Internet Explorer and Firefox) enable the creation of native toolbars i.e.,
toolbars which are directly inserted in the browser window. Examples of native toolbars are
Google Toolbar and Stumble upon Toolbar. Native toolbars use browser-specific code to create
the same toolbar for each different browser version.
Some toolbar developers use a different approach and make the browser extension inject a
JavaScript file in every web page visited by the user. All major browsers support injected
toolbars. The code in this file inserts the toolbar as a part of the DOM in every web page.
Injected toolbars use essentially the same JavaScript code to draw the toolbar for each different
browser version.
1. Opera
Opera doesn’t have a standard toolbar, and the only toolbars that it has are the bookmarks
toolbar and extensions toolbar.
To reveal bookmarks toolbar, do the following:
1. Open the Opera menu.
2. Go to Bookmarks and select Show bookmarks.
2.Firefox
1. Press the Alt key.
2. Select View and select Toolbars.
3. From there you can choose which toolbars you want to keep visibly
3. Drag and drop the icons that you want to use onto your toolbar.
Cookies could also be stolen by hackers to gain access to a victim's web account, thus, the need
to delete cookies.
To clear browsing history and cookies form the different types of computers browser
A. Chrome:
Open Chrome.
In the top right corner of the browser, you will see three dots which indicate a settings
menu.
Click on “More tools” and then select “Clear browsing data”.
This will open a dialog box to delete your browsing and download history, cookies,
cached images and files, saved passwords and more. Select the appropriate time frame
and select “Clear data”.
Exit/quit all browser windows and re-open the browser.
B. Microsoft Edge:
Launch Microsoft Edge.
From the three dots on the top right corner of the browser window, select “Settings”.
Open the hamburger menu (three stacked bars) by Settings and select “Privacy,
search, and services”.
Under Clear Browsing Data, select “Choose what to clear”.
In the dialog box select the appropriate time frame and what you want to clear. Select
“Clear Now”.
Exit/quit all browser windows and re-open the browser.
C. Firefox:
Open Firefox on your computer.
In the upper right-hand corner of the browser, click the “menu bars,” which look like
three parallel lines, and click the “Privacy and Security” tab.
Scroll down to get to “History”.
Click the “Clear History” button to select the time frame and what items you would
like to clear. Select “Ok”.
Exit/quit all browser windows and re-open the browser.
Operation sheet-1.1
Operation sheet-1.2
Operation sheet-1.3
Operation sheet-1.4
Operation sheet-1.5
Operation sheet-1.6
Lap Test-1
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Privacy and security threats on the internet
Observing OHS and netiquette principles
Opening different types of search engines
Defining search requirements using a range of search parameters
Evaluating and assessing the authority, reliability and authenticity of information
This unit will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
Open search engines and search requirements using defined range of search parameters
Save search results according to the required information
Create bookmarks the required web page and save in associated bookmark folder
Modify page set up options and web page or the required information printed
shutdown and exitbrowser
observeOHS and netiquette principles through the process
An internet search, otherwise known as a search query, is an entry into a search engine that
yields both paid and organic results. The paid results are the ads that appear at the top and the
bottom of the page, and they are marked accordingly. The organic results are the unmarked
results that appear in between the ads.
At the core of an internet search is a keyword. In turn, keywords are at the hearts of search
engine marketing (SEM) and search engine optimization (SEO).
A search engine is software, usually accessed on the Internet, that searches a database of
information according to the user's query. The engine provides a list of results that best match
what the user is trying to find.
A search engine is a website that collects and organizes information on the internet and makes it
available for searching. Search engines use algorithms to display the most relevant search results
based on trends, your location, and sometimes even your web activity. Many search engines have
their own mobile apps that make searching easier on your phone or tablet. Check out some of the
most popular search engines:
Google is the most popular search engine in the world. It's so popular that the word "Googling"
is often used in place of "searching the web." Google also has special image and video search
features that make it easy to find all sorts of media.
Yahoo used to be the largest search engine in the world. These days, it's powered by Bing and
delivers similar results.
The Internet is a beautiful thing. You can shop online, conduct business, and watch cute cat
videos. But like the Wild West, the Internet has outlaws.
Hackers steal millions of dollars’ worth of data every day. In fact, half of all small
businesses report suffering a cyber-attack. Even the big guys like Sony aren’t immune to a cyber
thief’s sticky fingers.Knowing is half the battle, especially in the digital space. These five
common computer security threats could ruin you if left undetected.
1. Botnets
These guys are the ninjas of digital crime. If your computer’s infected with one, you won’t know
it.Botnets are a collection of software robots that infect other computers, called zombies. The
creator of the botnets can then control the zombies.
Using the zombies, the controller can send infected emails and spread malware. Worse, they can
recruit your computer into an army, carrying out the next threat on our list.
2. DDOS Attacks
DDOS stands for distributed denial-of-service. It’s one of the nastier online threats.
Hackers use zombie computers to sabotage a server. They contact it again and again, flooding it
with piles of useless data. The traffic increases so much, it can force the server to shut down. The
network then can’t serve legitimate users.For most online businesses, traffic is revenue. A server
slows down, or worse, a shutdown, spells catastrophe.
3. Mobile Malware
More and more people browse the Internet with their phones. Businesses have adapted. They
make phone friendly websites and mobile apps to buy.The trouble is, hackers have gone mobile
too.Using infected apps, hackers steal information with mobile malware. Often, they go after
businesses because most don’t have the proper security.
4. Phishing
Also known as spoofing, phishing is a common cyber scam: easy to do with effortless results.
Hackers bait the hook with fake text messages, websites, and emails appearing legitimate. They
ask you to submit information or update an account.
Don’t let them fool you though. It’s only a trick to steal from you and wreck your system.
5. Ransomware
One of the worst Internet threats is ransomware. It’s a type of malware designed to restrict access
to your computer. It can come from phishing emails or pop-up ads.
Ransomware has two flavors: lock screen and encryption. Lock screen ransomware prevents you
from accessing your computer. Encryption ransomware locks up your files on your hard drive,
shared network, USB, or the cloud.
With each, you’ll receive a notification demanding payment to restore access. Hackers may even
disguise themselves as law enforcement. They might say the money is to avoid prosecution for
illegal activity.
Whatever the case, never pay the ransom. It’s a trick to steal money, and restored access is never
guaranteed.
Avoid posting personal information like off-topic information about your day or questions
about your course performance that would be better suited to a direct email to your
instructor.
5. Don’t Type in ALL CAPS
In online communication, ALL CAPS is considered yelling. This is not a way to emphasize
what you are saying.
6. Return Messages Promptly
If someone sends you an email or an online message, send them a response quickly. If you
cannot send a thorough reply, at least acknowledge that you received the message.
7. Respect the Privacy and Rights of Others
If you have someone’s permission to share their words, then do so, but remember that
people’s words are their own property. Do not forward personal emails or share statuses
without the original person’s permission.
8. Identify Yourself
Identify yourself in online communications, like email. Let the recipient know who you
are. Don’t forget to sign the email at the end. Treat the email with the same professionalism
you would use with a written communication.
Consequences for poor netiquette
The ability to reach out to real people with one quick click of a button can be wonderful.
You’re given access to new worlds of information. But this ease of communication — and
ability to speak behind the cloak of your devices without face-to-face contact — brings up
several issues that can present real challenges.
Cyberbullying and toxic social media behavior are two of the many forms of poor online
behavior that not only can ostracize you, but also can have legal ramifications.
Another issue that children may face if they aren’t taught to safely use social media is their
digital footprint following them as they grow up. Once your words or photos are online, you
may not be able to take them back or delete them.
That’s why it’s smart to teach internet safety before you allow your children to communicate
online. One toxic post or picture could make it tougher for them to get into a school or land a
particular job.
Use double quotation marks to ensure the phrase you are using is located in exactly that
sequence.
Also try different search engines. You will most likely get different results from the same search
terms.
D. Narrowing or broadening a search
The trick to getting good results from your search expression is to be able to broaden or narrow
your search as required. For some topics, you will get millions of results (or hits), while for
others you might get none. As pointed out above you can:
Use words to broaden your search like OR.
Use words to narrow your search like AND, +, -, NOT.
We’re certainly reducing the amount of information to be filtered. Though, this is still way too
many results to work through.
Let’s investigate a different search engine using the same expressions. Firstly, IT Certificate 2
across the Web.
Information resources reflect their creators' expertise and credibility, and are evaluated based on
the information need and the context in which the information will be used. Authority is
constructed in that various communities may recognize different types of authority. Authority is
important in determining the credibility of a website because it establishes who is in charge of
the site, who wrote the information covered there, and more.
Evaluating a source by authority means that you are asking:
Does the author have expertise on the topic about which he/she is writing?
Who is the author?
Is he or she a subject expert on the topic?
What are the author's credentials?
Reliability of information
Data reliability means that data is complete and accurate, and it is a crucial foundation for
building data trust across the organization. Ensuring data reliability is one of the main objectives
of data integrity initiatives, which are also used to maintain data security, data quality, and
regulatory compliance. Data reliability assessment, also referred to as trust assessment, is an
important process that can reveal problem areas about your data that you didn’t even know
existed. The assessment will typically measure three different aspects of data reliability.
validity: - is the data correctly formatted and stored in the right way?
Completeness: - does the dataset include values for all the fields required by your system?
Uniqueness: - is the data free from duplicates and dummy entries?
Data reliability assessment can also take other factors into account and touch on aspects of data
quality, such as looking at how many times a dataset has been relied on, where it originated, and
how the data has been transformed. Getting to this deeper level of understanding is especially
important for data related to sensitive information where complete accuracy is essential. To
support a financial audit, for instance, it is vital to be able to prove data reliability
Authenticity of information
Authenticity are used to establish the process of ascertaining authenticity of information on the
Internet, and in the final section we propose some ways and means through which authenticity of,
content and. purpose of, information in the cyberspace could be instituted.
In the dictionary “authentic” is described as "genuine; real; veritable; not false or copied; sharing
the sense of actuality and lack of falsehood or misrepresentation" and "having the origin
supported by unquestionable evidence; authenticated; verified; or entitled toacceptance or belief
because of agreement with known facts or experience; reliable; trustworthy".
Information generally has bias; therefore, authenticity is not limited to verifying authorship and
diplomatic of a document. In fact, it includes attributes such as completeness, accuracy,
trustworthiness, correctness, validity, integrity, faithfulness, originality, meaningfulness, and
suitability for an intended purpose. The criteria are:
Currency: Timeliness of the information.
Relevance: Importance of the information for your needs.
2.5. Creating bookmarks for required web page and saved in folder
2.5.1. Export, Save and Import Chrome Bookmarks
Whether you just bought a new computer or you just want to start using a different browser,
Google Chrome makes it easy to save all your bookmarks. Then you can import them to a new
computer or browser, so it will feel just like your old one. Here’s how you can export, save, and
import Chrome bookmarks, so you can transfer then to another computer or have a backup.
To export and save your bookmarks, open Chrome and go to
Menu > Bookmarks > Bookmark manager. Then click the three-dot icon and select Export
Bookmarks. Finally, choose where to save your Chrome bookmarks.
1. Open Chrome and click the icon with three vertical dots in the top-right corner.
2. Then hover over Bookmarks. This will open a pop-up menu.
3. Next, click Bookmark manager. Clicking this will open a new tab.
4. Then click the icon with three vertical dots. You will find this next to the Bookmarks
search bar, under the Chrome address bar.
5. Next, click Export Bookmarks. Clicking this will open the File Explorer on a Windows
10 computer or the Finder on a Mac computer.
6. Finally, choose a name and destination and click Save. If you want to transfer your
Chrome bookmarks to a new computer, you can save the HTML file to a flash drive or an
external hard drive. Or, you can save your Chrome bookmarks to your desktop and email it to
yourself as an attachment.
Import Chrome Bookmarks
To import your Chrome bookmarks, open Chrome and go to Menu> Bookmarks >
Bookmark manager and click the three-dot icon. Finally, click Import and select the HTML
file you exported.
1. Open Google Chrome.
2. Click the icon with three vertical dots in the top-right corner.
3. Then go to Bookmarks > Bookmark manager
4. Next, click on the icon with three vertical dots next to the search bar. You will find this
next to the Bookmarks search bar, under the Chrome address bar.
5. Then click Import Bookmarks. Clicking this will open the computer’s Open file dialog
box and prompt you to load a file. Choose the HTML file you saved to import your
Chrome bookmarks.
6. Finally, select the saved bookmarks HTML file and click Open. All your bookmarks will
then be imported.
2.6. Pageset up options and printing required information from web pages
Page set up options
Use “Page Setup” in Internet Explorer if you wish to make any changes to the way your page
looks after it prints. If you’re using Google Chrome, the option to make adjustments to the page
will automatically appear after you hit “Print.”
Printing required information from web pages
Printing a web page is reasonably straightforward, but it differs slightly depending on
the Internet browser used. To proceed, select your preferred browser from the list below and
follow the instructions.
In Internet Explorer, the “Print Preview” option will allow you to see what your page will look
like before your print it out. Google Chrome will automatically show you a preview of the page
to be printed after you select “Print.”
How to print one or more page(s) at a time
1. Open the Google Chrome browser and access the page you want to print.
2. Click Customize and control Google Chrome in the upper-right corner of the
browser window.
3. Select Print from the drop-down
menu that appears.
the or button in
the bottom-right corner.
Click hear
Written Test
Self-check-2
Part I: - Write True if the statement is Correct and False If the statement is Incorrect
1. Online data storage refers to the practice of storing electronic data with a third-party
services accessed via the internet
2. Saving the document means storing the document on to the secondary storage devices.
3. One of the biggest benefits of online storage is the ability to access data from anywhere.
4. Traditional local storage includes disk or tape storages.
5. Portable storages include optical medias or flash drives.
6. Book mark is a saved shortcut that directs your browser to a specific webpage
7. Book mark stores the title, URL, and icon of the corresponding page.
8. To create a bookmark, simply visit the page you want to bookmark and select Add
Bookmark or Bookmark this Page from the Bookmarks menu.
9. A bookmark stores the location of a webpage and store the contents of the webpage itself.
10. Saving bookmarks allows you to easily access your favorite locations on the Web.
Part II: Choose the best answer from the given alternative
1. ______ is a tool we use to find websites and information on the Internet.
A. Internet Explorer C. search engines
B. Cookies D. Book marks
2. . Among the following which one is not categorized under search engine
A. Mozilla Firefox C. Yahoo
B. Google search D. MSN
3. When you are looking for search terms:
A. Type in the question in a full English sentence.
B. Use just the main keywords.
C. Add more keywords to narrow down (reduce) the number of hits. D. All
4. ______ refers to a method of saving a web page
A. search engine C. Browser
B. Book Mark D. Internet
Step 5 Choose the location you wish to save your web page to, ie the drive as well as the
folder you wish to use.
Step 6 Click on Save.
On the Save Web Page screen, when you click on Save, the file IT Framework Course –
Information Technology will be saved into the desktop folder in this example.
Notice that a folder holding all the graphics relating to this web page is also saved. This allows
all information to be viewed offline, i.e., when you are no longer connected to the Internet.
LAP Test-2
This unit will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
3.1Introduction to communication
Introduction to communication
Internet communication is referred to as the sharing of information ideas or simply words over
the World Wide Web or the Internet. The Internet consists of a worldwide string of connected
networks that exchanges data through packet switching using the standardized Internet Protocol
Suite (TCP/IP). Unlike before, people can stay at home and be connected to his or her family,
friends and even colleagues from anywhere around the world.
The internet provides many effective communication tools, including e-mail, mailing lists,
discussion groups, chat services, web conferencing, blogs, and RSS feeds. In recent years, social
networking sites such as Facebook and Twitter have also joined the mix. These various tools
allow you to communicate one-to-one or one-to-many, depending on your communication needs.
They also enable communication locally between people who know one another or world-wide
with people who share common interests.
3.3Communication tools
The process by which people create, exchange, and perceive information using networked
communication classifications. It also includes non-networked computers that facilitate
encoding, transmitting, and decoding information.
Basic Communication Tools are: -
Email.
Telephones. Landline Telephones. Cell Phones. Smartphones. Internet Calling: Google Voice
and Others.
SMS/Text Messaging.
Cell and Data Plans.
Video and Web Conferencing.
Social Networking Sites.
G-Suite and Microsoft 365/Office.
Example 1: - EMAIL
Email is one of the first and most popular forms of electronic communication. It allows the user
to send and receive files and messages over the internet, and can be used on a wide variety of
devices. Here are some of the advantages and disadvantages of email.
Advantages of email
Email is a free tool.
Email is quick. Once you have finished composing a message, sending it is as simple as
clicking a button. Once it is sent and delivered, it can be read almost immediately.
Email is simple. It is easy to use, email allows for the easy and quick access of information
and contacts.
Email allows for easy referencing. Messages that have been sent and received can stored,
and searched through safely and easily.
Email is accessible from anywhere – as long as you have an internet connection.
Email is paperless, and therefore, beneficial for the planet.
Email allows for mass sending of messages, you can send one particular message to
several recipients all at once.
Email allows for instant access of information and files.
Disadvantages of email
Email could potentially cause Emails can cause misunderstandings.
information overload. Email messages can contain viruses.
Email lacks a personal touch. Email should be kept short and brief.
Email can be disruptive. Email requires timely responses.
Email cannot be ignored for a long
time.
Create a Gmail account
To sign up for Gmail, create a Google Account. You can use the username and password to sign
in to Gmail and other Google products like YouTube, Google Play, and Google Drive.
Gmail is one of the most used email services around the world. If you want to create a Gmail
account in just a few simple steps you can create it. But before that, you need to sign up for a
Google account. To create a Gmail account, you need to provide some basic information like
your name, birth date, gender, and location. Even you have to choose a name for your new Gmail
address.
Follow the below steps and create your own Gmail account with the quick sign-up process. You
can use your username and password to sign in to Gmail and other Google products like
YouTube, Google Play, and Google Drive. Follow the steps, create your Gmail account and start
sending emails.
Step 7: On the next page enter your phone number to verify your account. (It is a two-
step verification process for security)
Step 8: On the given mobile number you will receive a text message from Google with a
verification code. Enter the verification code and tap on Verify.
Step 9: On the next page enter your DOB in the specified fields.
Step 10: Choose a Gender.
Step 11: Tap on Next.
Step 12: Read, Google's Terms of Service and Privacy Policy will appear on the screen
and click on I agree.
Congratulations! your account has been created. From now onwards every time you
sign in you just have to enter your email id and password. And every time you sign-in
don't forget to sign-out because it prevents others from viewing your emails.
Do you know how to sign-out?
Navigate to the circle(in the top-right corner of the page). Here tap on it, from the below
option, select Sign-out.
SMTP
As the name suggests, Simple Message Transfer Protocol is responsible for email transfers
between email clients (Windows Mail, Thunderbird, etc.) and email providers’ servers (Gmail,
Outlook, Yahoo).Simple Message Transfer Protocol (SMTP) is responsible only for sending
emails.
Companies use their SMTP server for email marketing and for sending automated transactional
emails like updates on comments and shares, password change, or purchase confirmation. With
the help of a service like SendPulse, you can send promotional and transactional emails via
SMTP server with advanced functions template builder, mailing lists management, email
workflows, A/B testing, etc.
POP3
Email clients use Post Office Protocol 3 for retrieving messages from email servers. Email
clients that use POP3 store messages on the user’s computer, deleting them from the email
server. People using email clients with POP3 also have the option of keeping their emails on the
server after download.
This email protocol was designed to enable users to read, draft, and delete emails when there is
no smooth access to the internet. With POP3, emails are delivered as soon as the user connects to
the internet. Allow both receiving and sending
IMAP
Internet Message Access Protocol is similar to POP3, but unlike it, IMAP allows multiple users
to send emails at a time. This is a helpful feature for business owners, who assign
communication with customers to different team members — especially when they need to have
access to one email address at one time. Allow both receiving and sending
Unlike POP3, IMAP stores emails on the server by default, unless the user deletes them.
SendPulse SMTP Server
SendPulse is a marketing platform that allows you to send emails from a reputable SMTP server
to promote products and services and bring value to people.
You can send your emails via SMTP server without utilizing the whole spectrum of the service’s
functionality.
Written Test
Self-check-3
Part I: - Write True if the statement is Correct and False If the statement is Incorrect
1. One of the major advantages of internet communication over traditional communication is
cost savings.
2. You can use the username and password to sign in to Gmail and other Google products to
communicate to other persons
3. Telephones, Landline Telephones, Cell Phones, Smartphones. Internet Calling, Google
Voice is not a communication tools.
4. These various tools allow you to communicate one-to-one or one-to-many, depending on
your communication needs.
5. Email allows for the easy and quick access of information and contacts.
Part II: - Select the best answer from the given alternative
1. Whichone of the following is the not form of internet communication?
A. Gmail C. Voice
B. Messages D. video calls
2. Which one is the not disadvantages of email
A. Email messages can contain viruses.
B. Email can be disruptive.
C. Email lacks a personal touch
D. Email could potentially cause information overload.
E. Email allows for instant access of information and files.
3. Which one is effective communication tools
A. E-mail C. Smartphones
B. Cell phones D. All
4. The most important protocols for data transmission across the Internet is
A. TCP/IP C. SMTP
B. POP D. HTTP
5. Which one is the not advantages of email
A. Email is a free tool D. Email allows for easy referencing.
B. Email is quickie E. Email can be disruptive
C. Email is simple F. All
Figure 3.
Step 3: The sign-up form will appear. Enter your first and last name.
Step 4: Choose a Username for your account.
Step 5: After choosing a username, enter a password. Type the password again to confirm.)
Step 6: At last tap on Next.
Step 7: On the next page enter your phone number to verify your account. (It is a two-
step verification process for security)
Step 8: On the given mobile number you
will receive a text message
from Google with a verification
code. Enter the verification code and tap
on Verify.
Step 9: On the next page enter
your DOB in the specified fields.
Step 10: Choose a Gender.
Step 11: Tap on Next.
Step 13: Congratulations! your account has been created. From now onwards every
time you sign in you just have to enter your email id and password.
Note: - Then create one document given by your teacher and send this
documents to your teacher.
Lap Test-3
Reference
Book
1) Zadeh J Cryptography on the Internet Proceedings of the 37th annual Southeast regional
conference (CD-ROM), (45-es)
2) Brookes W and Indulska J Teaching internet literacy to a large and diverse audience
Proceedings of the 2nd Australasian conference on Computer science education, (7-15)
3) Introduction to the Internet (3rd Edition), by Scott D. James (Author)
4) Introduction to the Internet August 2000, Scott D. James
5) Introduction Lexicography in the Internet era ByPedro A. Fuertes-Olivera
6) Computer Networks Tanenbaum, Andrew. S. 4th ed Pearson
7) Computer Networks & Internets, Comer, Douglas 2nd ed Pearson
8) Computer Networks & Internets: With Internet Applications
Comer, D. E/ Narayanan, M. S. 4th ed Pearson
9) How to Use the Internet Subsequent Edition Rogers Cadenced, subsequent edition 2002.
10) Computer & Internet Security: A Hands-on Approach Wenliang Du , 2019, 2nd
Edition
Web Link
1) https://quicklearncomputer.com/
2) https://www.ionos.com/digitalguide/websites/web-development/how-are-websites-accessed/
3) Computer Concepts - Services on Internet (tutorialspoint.com)