Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
unit-5 (2).pdf
1. UNIT 5
Working on INTERNET and E-MAIL
..
March 17, 2020
1 INTERNET
The Internet is a global wide area network that connects computer systems
across the world. It includes several high-bandwidth data lines that comprise
the Internet ”backbone.” These lines are connected to major Internet hubs that
distribute data to other locations, such as web servers and ISPs.
In order to connect to the Internet, you must have access to an Internet ser-
vice provider (ISP), which acts the middleman between you and the Internet.
Most ISPs offer broadband Internet access via a cable, DSL, or fiber connec-
tion. When you connect to the Internet using a public Wi-Fi signal, the Wi-Fi
router is still connected to an ISP that provides Internet access. Even cellular
data towers must connect to an Internet service provider to provide connected
devices with access to the Internet.
The Internet provides different online services. Some examples include:
Web – a collection of billions of webpages that you can view with a web
browser
Email – the most common method of sending and receiving messages online
Social media – websites and apps that allow people to share comments,
photos, and videos
Online gaming – games that allow people to play with and against each other
over the Internet
Software updates – operating system and application updates can typi-
cally downloaded from the Internet
In the early days of the Internet, most people connected to the Internet using a
home computer and a dial-up modem. DSL and cable modems eventually pro-
vided users with ”always-on” connections. Now mobile devices, such as tablets
and smartphones, make it possible for people to be connected to the Internet
at all times. The Internet of Things has turned common appliances and home
systems into ”smart” devices that can be monitored and controlled over the
Internet. As the Internet continues to grow and evolve, you can expect it to
become an even more integral part of daily life.
1
2. 2 Internet Terminology
Here you will learn about the history of the Internet, what website files repre-
sent, the role of URLs for identifying the web pages and programs online, and
generally - all you need to know about how the Internet works.
Internet
The user-friendly interface of the Internet is based on a multi-layer global net-
work system connecting hundreds of millions of computers worldwide. This
system is comprised of multiple local and global networks serving private, pub-
lic, business, academic and government purposes.
URL
The Uniform resource locator, popular as URL, is the global web address of doc-
uments, including web pages or image files, and programs such as Java applets.
It is aimed at identifying the location of a document or a program available on
the web and specifies the mechanism for accessing it through a web browser.
Web Page
The web pages, the building units of the websites, contain various types of in-
formation presented to the visitor in an aesthetic and readable manner. Most
of the web pages are widely accessible on the World Wide Web, while others
may also be available online but are only restricted to a certain private network,
such as a corporate intranet.
Index
The index is one of the most widely used terms in the field of computing and
IT technologies. The most popular index types include the website index, the
database index and the search engine index.
Ecommerce
Short for electronic commerce, e-commerce represents a complex term referring
to the process of selling and buying products and services over the Internet or
other electronic systems. It is considered as the sales aspect of the e-business,
saving individuals and businesses tons of precious time and marketing efforts.
Internet Service Provider (ISP)
The ISP is the company responsible for providing you with an uninterrupted
connection to the Internet. The term ’ISP’ represents an abbreviation of Inter-
net Service Provider.
SSH Telnet
SSH Telnet is used to perform an encrypted connection between a certain com-
puter and a remote computer or server for sending commands or exchanging
files between the two machines.
File
The file is a fundamental carrier of information in the process of global data
transfer that Internet and other high technologies are based on. It represents a
sequence of characters stored on a personal computer or on a server, viewable
from any Internet enabled computer in the world.
Website
The wealth of information available on the World Wide Web is carefully orga-
nized and displayed within an endless variety of websites dedicated to any sorts
of topics you could imagine. Websites are stored on web servers and are made
visible on web browsers with the help of the crucial HTTP protocol.
Web Space
2
3. Web space is one of the basic resources of the web hosting services, referring to
the amount of disk space on a web server that is allocated to website owners by
hosting companies. It is made up of the quantity of all the text, images, scripts,
databases, emails and other files related to a website.
Web Browser
The web browsers are computer programs designed to open and read hyper-
text markup language (HTML), PHP and other scripting languages. Using web
browser software users can view websites and other web content on their com-
puters.
Bandwidth
The term ’bandwith’ refers to the speed at which certain data is transferred
over the Internet from the data centers it is located in to the ISPs and to the
consumers’ Internet enabled devices.
Image Galleries
Image galleries rule the web today - they are present on both personal and
corporate profiles, on news portals and blogs. With the quick development of
computer technologies, image galleries have evolved from simple several-image
websites, to multi-album image portals, storing thousand of pictures.
Banners
Image galleries rule the web today - they are present on both personal and
corporate profiles, on news portals and blogs. With the quick development of
computer technologies, image galleries have evolved from simple several-image
websites, to multi-album image portals, storing thousand of pictures.
Freelance
Practicing a freelance job in the IT sphere you can be fully independent as far as
workplace, the company you work for, the project you develop and the payment
you receive for your efforts are concerned.
Search engine
A search engine is a web-based tool that enables users to locate information on
the World Wide Web.
Popular examples of search engines are Google, Yahoo!, and MSN Search.
Search engines utilize automated software applications (referred to as robots,
bots, or spiders) that travel along the Web, following links from page to page,
site to site. The information gathered by the spiders is used to create a search-
able index of the Web.
Educational Search Engines for Students:
1) Educational Resources Information Center (ERIC)
ERIC is an online library of education research and information, sponsored by
the Institute of Education Sciences (IES) of the U.S. Department of Education.
2) Lexis Web
LexisNexis is a corporation providing computer-assisted legal research as well as
business research and risk management services. During the 1970s, LexisNexis
pioneered the electronic accessibility of legal and journalistic documents.
3) Google Scholar
Google Scholar is a freely accessible web search engine that indexes the full text
or metadata of scholarly literature across an array of publishing formats and
disciplines.
4) Microsoft Academic (MA)
3
4. Microsoft Academic is a free public web search engine for academic publications
and literature, developed by Microsoft Research.
5) Wolfram Alpha
WolframAlpha is a computational knowledge engine or answer engine developed
by Wolfram Alpha LLC, a subsidiary of Wolfram Research.
6) iSeek Education
iSEEK Education is a targeted search engine for students, teachers, administra-
tors, and caregivers. • Safe - Put your mind at ease with safe search technologies
. 7) ResearchGate
ResearchGate is a European commercial social networking site for scientists and
researchers to share papers, ask and answer questions, and find collaborators.
Internet applications for research
Common applications of Internet research include personal research on a par-
ticular subject (something mentioned on the news, a health problem, etc.),
students doing research for academic projects and papers, and journalists and
other writers researching stories. Research is a broad term.
A Web directory organizes subjects in a hierarchical fashion that lets users
investigate the breadth of a specific topic and drill down to find relevant links
and content. Web directories can be assembled automatically by algorithms
or handcrafted. Human-edited Web directories have the distinct advantage of
higher quality and reliability, while those produced by algorithms can offer more
comprehensive coverage. The scope of Web directories are generally broad, such
as DOZ, Yahoo! and The WWW Virtual Library, covering a wide range of sub-
jects, while others focus on specific topics.
3 E-MAIL
Email, short for ”electronic mail,” is one of the most widely used features of
the Internet, along with the web. It allows you to send and receive messages to
and from anyone with an email address, anywhere in the world.
Email uses multiple protocols within the TCP/IP suite. For example, SMTP
is used to send messages, while the POP or IMAP protocols are used to retrieve
messages from a mail server. When you configure an email account, you must de-
fine your email address, password, and the mail servers used to send and receive
messages. Fortunately, most webmail services configure your account automat-
ically, so you only need to enter your email address and password. However, if
you use an email client like Microsoft Outlook or Apple Mail, you may need to
manually configure each account. Besides the email address and password, you
may also have to enter the incoming and outgoing mail servers and enter the
correct port numbers for each one.
The original email standard only supported plain text messages. Eventually,
4
5. email evolved to support rich text with custom formatting. Today, email sup-
ports HTML, which allows emails to be formatted the same way as websites.
HTML email messages can include images, links, and CSS layouts. You can
also send files or ”email attachments” along with messages. Most mail servers
allow you to send multiple attachments with each message, but they limit the
total size. In the early days of email, attachments were typically limited to one
megabyte, but now many mail servers support email attachments that are 20
megabytes in size or more.
Email Netiquette
When composing an email message, it is important to use good netiquette. For
example, you should always include a subject that summarizes the topic of the
email. It is also helpful to begin each message with the recipient’s name and
end the message with your name or ”signature.” A typical signature includes
your name, email address, and/or website URL. A professional signature may
include your company name and title as well. Most email programs allow you
to save multiple signatures, which you can insert at the bottom of an email.
If you want to send an email to multiple recipients, you can simply add each
email address to the ”To” field. However, if the email is primarily intended
for one person, you should place the additional addresses in the ”CC” (carbon
copy) field. If you are sending an email to multiple people that don’t know each
other, it is best to use the ”Bcc” (blind carbon copy) field. This hides the email
addresses of each recipient, which helps prevent spam.
1
Parts of an email message
An email message consists of the following general components:
Headers The message headers contain information concerning the sender
and recipients. The exact content of mail headers can vary depending on the
email system that generated the message. Generally, headers contain the fol-
lowing information:
Subject. Subject is a description of the topic of the message and displays in
most email systems that list email messages individually. A subject line could
be something like ”2010 company mission statement” or, if your spam filtering
application is too lenient, ”Lose weight fast!!! Ask me how.”
Sender (From). This is the sender’s Internet email address. It is usually
presumed to be the same as the Reply-to address, unless a different one is
provided.
Date and time received (On). The date and time the message was
received.
Reply-to. This is the Internet email address that will become the recipient
of your reply if you click the Reply button.
Recipient (To:). First/last name of email recipient, as configured by the
sender.
1NOTE: Email was originally written ”e-mail,” but is now more commonly written as
”email” without the dash.
5
6. Recipient email address. The Internet mail address of the recipient, or
where the message was actually sent.
Attachments. Files that are attached to the message.
Body The body of a message contains text that is the actual content, such
as ”Employees who are eligible for the new health care program should contact
their supervisors by next Friday if they want to switch.” The message body also
may include signatures or automatically generated text that is inserted by the
sender’s email system.
junk mail or email spam
Email spam, also known as junk email, is unsolicited bulk messages sent through
email.
Advantages of Email
1. It’s free!
Once you’re online, there is no further expense.
2. Easy to reference
Sent and received messages and attachments can be stored safely, logically
and reliably. It’s a lot easier to organize emails than paper.
3. Easy to use
Once you’re set up, sending and receiving messages is simple. That goes
for a host of other email functions. Data storage and contacts can be accessed
quickly and easily.
4. Easy to prioritize
Incoming messages have subject lines that mean you can delete without
opening. How much time does that save compared to ‘snail mail?’
5. Speed
Message to send? Done, under a second! Email is as fast a form of written
communication as any.
6. Global
Web based email means you can access your messages anywhere online. Go-
ing overseas? Before you go, mail yourself a copy of your passport number,
travel insurance details or your accommodation details.
Disadvantages of Email
1. Emotional responses
Some emails cause upset or anger. A reply in the heat of the moment can’t
be easily retracted, but it can cause lasting damage.
2. Information overload
Too many people send too much information. They cover their backs citing
‘need to know’ as the justification. Learn how to use email effectively and you’ll
reduce time wasted on this.
3. Lacking the Personal Touch
Some things are best left untyped. Email will never beat a hand written
card or letter when it comes to relationships.
4. Misunderstandings
6
7. Emails from people who don’t take the time to read what they write be-
fore clicking ‘send’. Time is wasted, either to clarify or, worse, acting on a
misinterpretation of the message.
5. No Respite
Your email inbox is like a garden; it needs to be constantly maintained.
Leave it and will continue to grow. Ignore it at your peril!
6. Pressure to Reply
Once it’s in your inbox, you feel an ever increasing obligation to act on it.
Procrastinating doesn’t making it go away. Do it, dump it or delegate it.
7. Spam
Having to deal with spam and spoofs is one of the worst avoidable time
wasters online. Use some anti spam software.
2
4 Email Terminology
Email is the new age social service that keeps us always well informed and highly
communicative in a world of events and long distances. Users can gain access
to this service in two basic ways - through the popular free email applications
such as Hotmail, America Online, Yahoo, etc.
Email
Today’s most flexible and reliable method of electronic communication between
people actually represents a multi-layer process of creating, transmitting and
storing e-messages within communication networks.
Email Forwarding
This extremely useful email feature allows users to set email messages deliv-
ered to an email address of theirs to be re-sent automatically to another inter-
nal/external email address of their choice.
Anti-virus Protection
With reliable anti-virus protection enabled for their emails both individuals and
business owners can feel sheltered from the malicious viruses circulating on the
Internet today. It is also important that the software is always kept up to date
with the latest virus versions out there.
Auto-responder e-mails
In a technology-driven world, auto-responders are a truly effective automated
tool for real-time offline management of business communication and are most
often used for email marketing purposes.
Hosted Email
Running personal or business e-correspondence on a hosting server of their
choice gives users independence, much higher levels of security and much more
email management tools than the regular free email services could ensure.
Mailing Lists
Whether it’s about sending regular notifications to community website members
or informing e-commerce store clients about special promo campaigns, the one
and only powerful software recommended is a mailing list client.
2DDU GORAKHPUR UNIVERSITY GORAKHPUR ,DEPARTMENT OF MATHE-
MATICS AND STATISTICS
7
8. Spam Filters
Using SPAM filters you can organize the contents of your mailboxes into separate
folders and thus minimize the risk of spamming attacks to your inboxes. SPAM
filters give you control over the level of email filtering.
Mailing List Members
Mailing list members are all opt-in subscribers to a mailing list. To become a
mailing list subscriber you need to send an email to the administrator’s email
address of the list.
POP3/IMAP e-mail accounts
Managing email communication with the help of well-known mail clients such
as Outlook and Mozilla Thunderbird is done with the help of POP3/ IMAP
protocols, ensured by the web hosting providers.
Set up Email
Setting up email accounts is the fist most important task that everyone wishing
to run e-correspondence will need to deal with, no matter whether the selected
email method is a webmail application or hosted email software.
SMTP server
As an outgoing mail server, the SMTP server receives the mail messages being
sent from users through their mail clients and routes them to the mail recipients
they are intended for.
SPF Protection
This is currently the most widely used method of protecting personal/business
email addresses from being used for unsolicited spamming activity. Moreover,
this service works for saving the online reputation of both individuals and busi-
nesses.
Webmail
Due to the possibility to be accessed via a web browser, webmail is the most
popular email service on the Net, ensuring fast and easy access to mailboxes via
a clear and easy to use interface.
Catch-All Emails
The catch-all emails are aimed to facilitate users’ access to a certain mail-
box. The catch-all functionality allows for a mailbox to catch all emails sent to
mistyped addresses containing the mailbox’s domain name in their syntax.
Email Aliases
Email aliases represent alternative names to the original name of a mailbox.
They do not have their own mailboxes and play the role of a forwarding mail-
box i.e. all the email sent to them is redirected to another actual mailbox.
5 How to Attach a File to an Email
Emails are a popular, effective, and fast way to communicate. Attaching a
file to an email is an easy way to send important documents and/or photos.
Below are a few simple steps that will walk you through the process of sending
an email with an attachment in most email programs.
Attach a File to an Email
Step 1
8
9. Turn on the computer and log onto the internet.
Step 2
Type in the web address of your email host in the address bar and log onto your
email account.
Step 3
Click on ”Compose” to write a new email.
Step 4
Click on the icon to attach a file. This icon appears as a paperclip symbol in
most email programs. After you click on the icon to attach a file a box will pop
up onto your screen.
Step 5
Browse the information on your computer my clicking on the folder that con-
tains the file that you would like to attach. When you find the needed file, click
on it and then click on ”open.” This will start the process of attaching the file
to your outgoing email message.
Step 6
Read the directions on your computer screen. It will most likely say that the
file was attached successfully.
Step 7
Write the text of your email, insert your recipient’s email address and then click
on ”send.”
3
Exercise
compulsory Question
Give short note on following. (i)http (ii) HTML
(i) WWW (ii)URL (iii)TCP/IP
Descriptive Questions
(i)What do you understand by term ’Internet’? what are the different uses of
internet ?
Discuss the significance of different of service of internet in your research area
?
(ii)(a)Define E-mail ,Explain the component of an E-mail .
What are the process of creating and sending an E-mail ?
(b) Give any two advantage of an E-mail . What is junk-mail ? State any two
disadvantage of an E-mail ?
(iii)Search Engine 4
3DDU GORAKHPUR UNIVERSITY GORAKHPUR ,DEPARTMENT OF MATHE-
MATICS AND STATISTICS
4DDU GORAKHPUR UNIVERSITY GORAKHPUR ,DEPARTMENT OF MATHE-
MATICS AND STATISTICS
9