SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Lindsey Monroe
Computer Applications One
                   Block 2
FOUNDERS: Sergey Brin and Larry Page

    FOUNDED: Menlo Park, California September 4th 1998

    WHY: The founders wanted to find a way to organize

    information from all different websites, this was also
    for a college project.
FOUNDED: Santa Clara, California March 1st

    1995
    FOUNDERS: David Filo and Jerry Yang

    WHY: To keep track of their personal interest

    on the web.
META SEARCH: is a search tool that sends user requests to

    several other search engines and/or databases and aggregates
    the results into a single list or displays them according to their
    source. Met search engines enable users to enter search criteria
    once and access several search engines simultaneously.
Boolean search commands have been used by

    professionals for searching through
    traditional databases for years.
    Example 1: +

    Example 2:-

    Example 3:NOT

    Example 4: “ “

Web

    Images

    Maps

    News

    Video

    Gmail

Mostly through advertising, but they are far from

    quot;just a search enginequot;, they provide email
    services, an online office suite, website statistic
    services, and a host of other applications - most
    of which are available in private ad-free versions
    for companies willing to pay
A Web browser

    is a software
    application
    which enables a
    user to display
    and interact with
    text, images,
    videos, music,
    games and other
    information
    typically located
    on a Web page
    at a Web site on
    the World Wide
    Web or a local
    area network.
Chrome

    ◦ Speed
    ◦ Security
    ◦ stability

Weitere ähnliche Inhalte

Andere mochten auch

Alimentacion Saludable
Alimentacion SaludableAlimentacion Saludable
Alimentacion Saludablecomahue
 
Myspace Presentation Veronika Perez
Myspace Presentation Veronika PerezMyspace Presentation Veronika Perez
Myspace Presentation Veronika Perezveronikaperez
 
Bancos y empresas industriales de españa
Bancos y empresas industriales de españaBancos y empresas industriales de españa
Bancos y empresas industriales de españaguest1a9d2d
 
Accesibility group 3
Accesibility group 3Accesibility group 3
Accesibility group 3forteip
 

Andere mochten auch (6)

Alimentacion Saludable
Alimentacion SaludableAlimentacion Saludable
Alimentacion Saludable
 
ANDARÁS NA LUZ
ANDARÁS NA LUZANDARÁS NA LUZ
ANDARÁS NA LUZ
 
Side By Side
Side By SideSide By Side
Side By Side
 
Myspace Presentation Veronika Perez
Myspace Presentation Veronika PerezMyspace Presentation Veronika Perez
Myspace Presentation Veronika Perez
 
Bancos y empresas industriales de españa
Bancos y empresas industriales de españaBancos y empresas industriales de españa
Bancos y empresas industriales de españa
 
Accesibility group 3
Accesibility group 3Accesibility group 3
Accesibility group 3
 

Ähnlich wie Internet Search

(3 12 09) Internet Search
(3 12 09) Internet Search(3 12 09) Internet Search
(3 12 09) Internet Searchchairesj
 
Internet Search
Internet SearchInternet Search
Internet SearchTori Small
 
Microsoft Power Point Lib1 #1262264 V1 Social Networking
Microsoft Power Point   Lib1 #1262264 V1 Social NetworkingMicrosoft Power Point   Lib1 #1262264 V1 Social Networking
Microsoft Power Point Lib1 #1262264 V1 Social Networkingtmdomish
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)Ian Forrester
 
Internet Search
Internet SearchInternet Search
Internet Searcherowell
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docxjoyjonna282
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Securitymmavis
 
internet searches
internet searchesinternet searches
internet searcheskevpatel
 
Trending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted MarketingTrending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted MarketingcdasLLP
 
Internet Search Ppt1
Internet Search Ppt1Internet Search Ppt1
Internet Search Ppt1Dyern
 
Cloud Computingfor Lti Final
Cloud Computingfor Lti FinalCloud Computingfor Lti Final
Cloud Computingfor Lti FinalLynn McCormick
 
Internet awareness by bhalani mansi
Internet awareness by bhalani mansiInternet awareness by bhalani mansi
Internet awareness by bhalani mansibhalanimahi
 
Internet awareness by komalvekariya
Internet awareness by komalvekariyaInternet awareness by komalvekariya
Internet awareness by komalvekariyakomalatel
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1alicelagajino
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Evan Donovan
 
The Interwebs, Social Media and Cloud Computing...
The Interwebs, Social Media and Cloud Computing...The Interwebs, Social Media and Cloud Computing...
The Interwebs, Social Media and Cloud Computing...benbennett
 
Implementing the Social Web
Implementing the Social WebImplementing the Social Web
Implementing the Social WebChris Messina
 
web 2.0 Implementing the Social Web
web 2.0 Implementing the Social Webweb 2.0 Implementing the Social Web
web 2.0 Implementing the Social WebAnabelle P
 

Ähnlich wie Internet Search (20)

(3 12 09) Internet Search
(3 12 09) Internet Search(3 12 09) Internet Search
(3 12 09) Internet Search
 
Internet Search
Internet SearchInternet Search
Internet Search
 
Microsoft Power Point Lib1 #1262264 V1 Social Networking
Microsoft Power Point   Lib1 #1262264 V1 Social NetworkingMicrosoft Power Point   Lib1 #1262264 V1 Social Networking
Microsoft Power Point Lib1 #1262264 V1 Social Networking
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)
 
Internet Search
Internet SearchInternet Search
Internet Search
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
internet searches
internet searchesinternet searches
internet searches
 
Trending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted MarketingTrending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted Marketing
 
Internet Search Ppt1
Internet Search Ppt1Internet Search Ppt1
Internet Search Ppt1
 
Cloud Computingfor Lti Final
Cloud Computingfor Lti FinalCloud Computingfor Lti Final
Cloud Computingfor Lti Final
 
Internet awareness by bhalani mansi
Internet awareness by bhalani mansiInternet awareness by bhalani mansi
Internet awareness by bhalani mansi
 
Internet awareness
Internet awarenessInternet awareness
Internet awareness
 
Internet awareness by komalvekariya
Internet awareness by komalvekariyaInternet awareness by komalvekariya
Internet awareness by komalvekariya
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
 
The Interwebs, Social Media and Cloud Computing...
The Interwebs, Social Media and Cloud Computing...The Interwebs, Social Media and Cloud Computing...
The Interwebs, Social Media and Cloud Computing...
 
Implementing the Social Web
Implementing the Social WebImplementing the Social Web
Implementing the Social Web
 
web 2.0 Implementing the Social Web
web 2.0 Implementing the Social Webweb 2.0 Implementing the Social Web
web 2.0 Implementing the Social Web
 

Mehr von monroel

Fjdaslhfwejkahsdkl
FjdaslhfwejkahsdklFjdaslhfwejkahsdkl
Fjdaslhfwejkahsdklmonroel
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionmonroel
 
Internet Citing
Internet CitingInternet Citing
Internet Citingmonroel
 
Electronic Communication
Electronic CommunicationElectronic Communication
Electronic Communicationmonroel
 
Types Of Computer Systems
Types Of Computer SystemsTypes Of Computer Systems
Types Of Computer Systemsmonroel
 
Outside Of The Computer Workstation
Outside Of The Computer WorkstationOutside Of The Computer Workstation
Outside Of The Computer Workstationmonroel
 
Inside The Computer Workstation Slide Show 1
Inside The Computer Workstation Slide Show 1Inside The Computer Workstation Slide Show 1
Inside The Computer Workstation Slide Show 1monroel
 

Mehr von monroel (7)

Fjdaslhfwejkahsdkl
FjdaslhfwejkahsdklFjdaslhfwejkahsdkl
Fjdaslhfwejkahsdkl
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Internet Citing
Internet CitingInternet Citing
Internet Citing
 
Electronic Communication
Electronic CommunicationElectronic Communication
Electronic Communication
 
Types Of Computer Systems
Types Of Computer SystemsTypes Of Computer Systems
Types Of Computer Systems
 
Outside Of The Computer Workstation
Outside Of The Computer WorkstationOutside Of The Computer Workstation
Outside Of The Computer Workstation
 
Inside The Computer Workstation Slide Show 1
Inside The Computer Workstation Slide Show 1Inside The Computer Workstation Slide Show 1
Inside The Computer Workstation Slide Show 1
 

Kürzlich hochgeladen

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Internet Search

  • 2. FOUNDERS: Sergey Brin and Larry Page  FOUNDED: Menlo Park, California September 4th 1998  WHY: The founders wanted to find a way to organize  information from all different websites, this was also for a college project.
  • 3. FOUNDED: Santa Clara, California March 1st  1995 FOUNDERS: David Filo and Jerry Yang  WHY: To keep track of their personal interest  on the web.
  • 4. META SEARCH: is a search tool that sends user requests to  several other search engines and/or databases and aggregates the results into a single list or displays them according to their source. Met search engines enable users to enter search criteria once and access several search engines simultaneously.
  • 5. Boolean search commands have been used by  professionals for searching through traditional databases for years. Example 1: +  Example 2:-  Example 3:NOT  Example 4: “ “ 
  • 6. Web  Images  Maps  News  Video  Gmail 
  • 7. Mostly through advertising, but they are far from  quot;just a search enginequot;, they provide email services, an online office suite, website statistic services, and a host of other applications - most of which are available in private ad-free versions for companies willing to pay
  • 8. A Web browser  is a software application which enables a user to display and interact with text, images, videos, music, games and other information typically located on a Web page at a Web site on the World Wide Web or a local area network.
  • 9. Chrome  ◦ Speed ◦ Security ◦ stability