SlideShare a Scribd company logo
1 of 9
Download to read offline
UNIT 5
Working on INTERNET and E-MAIL
..
March 17, 2020
1 INTERNET
The Internet is a global wide area network that connects computer systems
across the world. It includes several high-bandwidth data lines that comprise
the Internet ”backbone.” These lines are connected to major Internet hubs that
distribute data to other locations, such as web servers and ISPs.
In order to connect to the Internet, you must have access to an Internet ser-
vice provider (ISP), which acts the middleman between you and the Internet.
Most ISPs offer broadband Internet access via a cable, DSL, or fiber connec-
tion. When you connect to the Internet using a public Wi-Fi signal, the Wi-Fi
router is still connected to an ISP that provides Internet access. Even cellular
data towers must connect to an Internet service provider to provide connected
devices with access to the Internet.
The Internet provides different online services. Some examples include:
Web – a collection of billions of webpages that you can view with a web
browser
Email – the most common method of sending and receiving messages online
Social media – websites and apps that allow people to share comments,
photos, and videos
Online gaming – games that allow people to play with and against each other
over the Internet
Software updates – operating system and application updates can typi-
cally downloaded from the Internet
In the early days of the Internet, most people connected to the Internet using a
home computer and a dial-up modem. DSL and cable modems eventually pro-
vided users with ”always-on” connections. Now mobile devices, such as tablets
and smartphones, make it possible for people to be connected to the Internet
at all times. The Internet of Things has turned common appliances and home
systems into ”smart” devices that can be monitored and controlled over the
Internet. As the Internet continues to grow and evolve, you can expect it to
become an even more integral part of daily life.
1
2 Internet Terminology
Here you will learn about the history of the Internet, what website files repre-
sent, the role of URLs for identifying the web pages and programs online, and
generally - all you need to know about how the Internet works.
Internet
The user-friendly interface of the Internet is based on a multi-layer global net-
work system connecting hundreds of millions of computers worldwide. This
system is comprised of multiple local and global networks serving private, pub-
lic, business, academic and government purposes.
URL
The Uniform resource locator, popular as URL, is the global web address of doc-
uments, including web pages or image files, and programs such as Java applets.
It is aimed at identifying the location of a document or a program available on
the web and specifies the mechanism for accessing it through a web browser.
Web Page
The web pages, the building units of the websites, contain various types of in-
formation presented to the visitor in an aesthetic and readable manner. Most
of the web pages are widely accessible on the World Wide Web, while others
may also be available online but are only restricted to a certain private network,
such as a corporate intranet.
Index
The index is one of the most widely used terms in the field of computing and
IT technologies. The most popular index types include the website index, the
database index and the search engine index.
Ecommerce
Short for electronic commerce, e-commerce represents a complex term referring
to the process of selling and buying products and services over the Internet or
other electronic systems. It is considered as the sales aspect of the e-business,
saving individuals and businesses tons of precious time and marketing efforts.
Internet Service Provider (ISP)
The ISP is the company responsible for providing you with an uninterrupted
connection to the Internet. The term ’ISP’ represents an abbreviation of Inter-
net Service Provider.
SSH Telnet
SSH Telnet is used to perform an encrypted connection between a certain com-
puter and a remote computer or server for sending commands or exchanging
files between the two machines.
File
The file is a fundamental carrier of information in the process of global data
transfer that Internet and other high technologies are based on. It represents a
sequence of characters stored on a personal computer or on a server, viewable
from any Internet enabled computer in the world.
Website
The wealth of information available on the World Wide Web is carefully orga-
nized and displayed within an endless variety of websites dedicated to any sorts
of topics you could imagine. Websites are stored on web servers and are made
visible on web browsers with the help of the crucial HTTP protocol.
Web Space
2
Web space is one of the basic resources of the web hosting services, referring to
the amount of disk space on a web server that is allocated to website owners by
hosting companies. It is made up of the quantity of all the text, images, scripts,
databases, emails and other files related to a website.
Web Browser
The web browsers are computer programs designed to open and read hyper-
text markup language (HTML), PHP and other scripting languages. Using web
browser software users can view websites and other web content on their com-
puters.
Bandwidth
The term ’bandwith’ refers to the speed at which certain data is transferred
over the Internet from the data centers it is located in to the ISPs and to the
consumers’ Internet enabled devices.
Image Galleries
Image galleries rule the web today - they are present on both personal and
corporate profiles, on news portals and blogs. With the quick development of
computer technologies, image galleries have evolved from simple several-image
websites, to multi-album image portals, storing thousand of pictures.
Banners
Image galleries rule the web today - they are present on both personal and
corporate profiles, on news portals and blogs. With the quick development of
computer technologies, image galleries have evolved from simple several-image
websites, to multi-album image portals, storing thousand of pictures.
Freelance
Practicing a freelance job in the IT sphere you can be fully independent as far as
workplace, the company you work for, the project you develop and the payment
you receive for your efforts are concerned.
Search engine
A search engine is a web-based tool that enables users to locate information on
the World Wide Web.
Popular examples of search engines are Google, Yahoo!, and MSN Search.
Search engines utilize automated software applications (referred to as robots,
bots, or spiders) that travel along the Web, following links from page to page,
site to site. The information gathered by the spiders is used to create a search-
able index of the Web.
Educational Search Engines for Students:
1) Educational Resources Information Center (ERIC)
ERIC is an online library of education research and information, sponsored by
the Institute of Education Sciences (IES) of the U.S. Department of Education.
2) Lexis Web
LexisNexis is a corporation providing computer-assisted legal research as well as
business research and risk management services. During the 1970s, LexisNexis
pioneered the electronic accessibility of legal and journalistic documents.
3) Google Scholar
Google Scholar is a freely accessible web search engine that indexes the full text
or metadata of scholarly literature across an array of publishing formats and
disciplines.
4) Microsoft Academic (MA)
3
Microsoft Academic is a free public web search engine for academic publications
and literature, developed by Microsoft Research.
5) Wolfram Alpha
WolframAlpha is a computational knowledge engine or answer engine developed
by Wolfram Alpha LLC, a subsidiary of Wolfram Research.
6) iSeek Education
iSEEK Education is a targeted search engine for students, teachers, administra-
tors, and caregivers. • Safe - Put your mind at ease with safe search technologies
. 7) ResearchGate
ResearchGate is a European commercial social networking site for scientists and
researchers to share papers, ask and answer questions, and find collaborators.
Internet applications for research
Common applications of Internet research include personal research on a par-
ticular subject (something mentioned on the news, a health problem, etc.),
students doing research for academic projects and papers, and journalists and
other writers researching stories. Research is a broad term.
A Web directory organizes subjects in a hierarchical fashion that lets users
investigate the breadth of a specific topic and drill down to find relevant links
and content. Web directories can be assembled automatically by algorithms
or handcrafted. Human-edited Web directories have the distinct advantage of
higher quality and reliability, while those produced by algorithms can offer more
comprehensive coverage. The scope of Web directories are generally broad, such
as DOZ, Yahoo! and The WWW Virtual Library, covering a wide range of sub-
jects, while others focus on specific topics.
3 E-MAIL
Email, short for ”electronic mail,” is one of the most widely used features of
the Internet, along with the web. It allows you to send and receive messages to
and from anyone with an email address, anywhere in the world.
Email uses multiple protocols within the TCP/IP suite. For example, SMTP
is used to send messages, while the POP or IMAP protocols are used to retrieve
messages from a mail server. When you configure an email account, you must de-
fine your email address, password, and the mail servers used to send and receive
messages. Fortunately, most webmail services configure your account automat-
ically, so you only need to enter your email address and password. However, if
you use an email client like Microsoft Outlook or Apple Mail, you may need to
manually configure each account. Besides the email address and password, you
may also have to enter the incoming and outgoing mail servers and enter the
correct port numbers for each one.
The original email standard only supported plain text messages. Eventually,
4
email evolved to support rich text with custom formatting. Today, email sup-
ports HTML, which allows emails to be formatted the same way as websites.
HTML email messages can include images, links, and CSS layouts. You can
also send files or ”email attachments” along with messages. Most mail servers
allow you to send multiple attachments with each message, but they limit the
total size. In the early days of email, attachments were typically limited to one
megabyte, but now many mail servers support email attachments that are 20
megabytes in size or more.
Email Netiquette
When composing an email message, it is important to use good netiquette. For
example, you should always include a subject that summarizes the topic of the
email. It is also helpful to begin each message with the recipient’s name and
end the message with your name or ”signature.” A typical signature includes
your name, email address, and/or website URL. A professional signature may
include your company name and title as well. Most email programs allow you
to save multiple signatures, which you can insert at the bottom of an email.
If you want to send an email to multiple recipients, you can simply add each
email address to the ”To” field. However, if the email is primarily intended
for one person, you should place the additional addresses in the ”CC” (carbon
copy) field. If you are sending an email to multiple people that don’t know each
other, it is best to use the ”Bcc” (blind carbon copy) field. This hides the email
addresses of each recipient, which helps prevent spam.
1
Parts of an email message
An email message consists of the following general components:
Headers The message headers contain information concerning the sender
and recipients. The exact content of mail headers can vary depending on the
email system that generated the message. Generally, headers contain the fol-
lowing information:
Subject. Subject is a description of the topic of the message and displays in
most email systems that list email messages individually. A subject line could
be something like ”2010 company mission statement” or, if your spam filtering
application is too lenient, ”Lose weight fast!!! Ask me how.”
Sender (From). This is the sender’s Internet email address. It is usually
presumed to be the same as the Reply-to address, unless a different one is
provided.
Date and time received (On). The date and time the message was
received.
Reply-to. This is the Internet email address that will become the recipient
of your reply if you click the Reply button.
Recipient (To:). First/last name of email recipient, as configured by the
sender.
1NOTE: Email was originally written ”e-mail,” but is now more commonly written as
”email” without the dash.
5
Recipient email address. The Internet mail address of the recipient, or
where the message was actually sent.
Attachments. Files that are attached to the message.
Body The body of a message contains text that is the actual content, such
as ”Employees who are eligible for the new health care program should contact
their supervisors by next Friday if they want to switch.” The message body also
may include signatures or automatically generated text that is inserted by the
sender’s email system.
junk mail or email spam
Email spam, also known as junk email, is unsolicited bulk messages sent through
email.
Advantages of Email
1. It’s free!
Once you’re online, there is no further expense.
2. Easy to reference
Sent and received messages and attachments can be stored safely, logically
and reliably. It’s a lot easier to organize emails than paper.
3. Easy to use
Once you’re set up, sending and receiving messages is simple. That goes
for a host of other email functions. Data storage and contacts can be accessed
quickly and easily.
4. Easy to prioritize
Incoming messages have subject lines that mean you can delete without
opening. How much time does that save compared to ‘snail mail?’
5. Speed
Message to send? Done, under a second! Email is as fast a form of written
communication as any.
6. Global
Web based email means you can access your messages anywhere online. Go-
ing overseas? Before you go, mail yourself a copy of your passport number,
travel insurance details or your accommodation details.
Disadvantages of Email
1. Emotional responses
Some emails cause upset or anger. A reply in the heat of the moment can’t
be easily retracted, but it can cause lasting damage.
2. Information overload
Too many people send too much information. They cover their backs citing
‘need to know’ as the justification. Learn how to use email effectively and you’ll
reduce time wasted on this.
3. Lacking the Personal Touch
Some things are best left untyped. Email will never beat a hand written
card or letter when it comes to relationships.
4. Misunderstandings
6
Emails from people who don’t take the time to read what they write be-
fore clicking ‘send’. Time is wasted, either to clarify or, worse, acting on a
misinterpretation of the message.
5. No Respite
Your email inbox is like a garden; it needs to be constantly maintained.
Leave it and will continue to grow. Ignore it at your peril!
6. Pressure to Reply
Once it’s in your inbox, you feel an ever increasing obligation to act on it.
Procrastinating doesn’t making it go away. Do it, dump it or delegate it.
7. Spam
Having to deal with spam and spoofs is one of the worst avoidable time
wasters online. Use some anti spam software.
2
4 Email Terminology
Email is the new age social service that keeps us always well informed and highly
communicative in a world of events and long distances. Users can gain access
to this service in two basic ways - through the popular free email applications
such as Hotmail, America Online, Yahoo, etc.
Email
Today’s most flexible and reliable method of electronic communication between
people actually represents a multi-layer process of creating, transmitting and
storing e-messages within communication networks.
Email Forwarding
This extremely useful email feature allows users to set email messages deliv-
ered to an email address of theirs to be re-sent automatically to another inter-
nal/external email address of their choice.
Anti-virus Protection
With reliable anti-virus protection enabled for their emails both individuals and
business owners can feel sheltered from the malicious viruses circulating on the
Internet today. It is also important that the software is always kept up to date
with the latest virus versions out there.
Auto-responder e-mails
In a technology-driven world, auto-responders are a truly effective automated
tool for real-time offline management of business communication and are most
often used for email marketing purposes.
Hosted Email
Running personal or business e-correspondence on a hosting server of their
choice gives users independence, much higher levels of security and much more
email management tools than the regular free email services could ensure.
Mailing Lists
Whether it’s about sending regular notifications to community website members
or informing e-commerce store clients about special promo campaigns, the one
and only powerful software recommended is a mailing list client.
2DDU GORAKHPUR UNIVERSITY GORAKHPUR ,DEPARTMENT OF MATHE-
MATICS AND STATISTICS
7
Spam Filters
Using SPAM filters you can organize the contents of your mailboxes into separate
folders and thus minimize the risk of spamming attacks to your inboxes. SPAM
filters give you control over the level of email filtering.
Mailing List Members
Mailing list members are all opt-in subscribers to a mailing list. To become a
mailing list subscriber you need to send an email to the administrator’s email
address of the list.
POP3/IMAP e-mail accounts
Managing email communication with the help of well-known mail clients such
as Outlook and Mozilla Thunderbird is done with the help of POP3/ IMAP
protocols, ensured by the web hosting providers.
Set up Email
Setting up email accounts is the fist most important task that everyone wishing
to run e-correspondence will need to deal with, no matter whether the selected
email method is a webmail application or hosted email software.
SMTP server
As an outgoing mail server, the SMTP server receives the mail messages being
sent from users through their mail clients and routes them to the mail recipients
they are intended for.
SPF Protection
This is currently the most widely used method of protecting personal/business
email addresses from being used for unsolicited spamming activity. Moreover,
this service works for saving the online reputation of both individuals and busi-
nesses.
Webmail
Due to the possibility to be accessed via a web browser, webmail is the most
popular email service on the Net, ensuring fast and easy access to mailboxes via
a clear and easy to use interface.
Catch-All Emails
The catch-all emails are aimed to facilitate users’ access to a certain mail-
box. The catch-all functionality allows for a mailbox to catch all emails sent to
mistyped addresses containing the mailbox’s domain name in their syntax.
Email Aliases
Email aliases represent alternative names to the original name of a mailbox.
They do not have their own mailboxes and play the role of a forwarding mail-
box i.e. all the email sent to them is redirected to another actual mailbox.
5 How to Attach a File to an Email
Emails are a popular, effective, and fast way to communicate. Attaching a
file to an email is an easy way to send important documents and/or photos.
Below are a few simple steps that will walk you through the process of sending
an email with an attachment in most email programs.
Attach a File to an Email
Step 1
8
Turn on the computer and log onto the internet.
Step 2
Type in the web address of your email host in the address bar and log onto your
email account.
Step 3
Click on ”Compose” to write a new email.
Step 4
Click on the icon to attach a file. This icon appears as a paperclip symbol in
most email programs. After you click on the icon to attach a file a box will pop
up onto your screen.
Step 5
Browse the information on your computer my clicking on the folder that con-
tains the file that you would like to attach. When you find the needed file, click
on it and then click on ”open.” This will start the process of attaching the file
to your outgoing email message.
Step 6
Read the directions on your computer screen. It will most likely say that the
file was attached successfully.
Step 7
Write the text of your email, insert your recipient’s email address and then click
on ”send.”
3
Exercise
compulsory Question
Give short note on following. (i)http (ii) HTML
(i) WWW (ii)URL (iii)TCP/IP
Descriptive Questions
(i)What do you understand by term ’Internet’? what are the different uses of
internet ?
Discuss the significance of different of service of internet in your research area
?
(ii)(a)Define E-mail ,Explain the component of an E-mail .
What are the process of creating and sending an E-mail ?
(b) Give any two advantage of an E-mail . What is junk-mail ? State any two
disadvantage of an E-mail ?
(iii)Search Engine 4
3DDU GORAKHPUR UNIVERSITY GORAKHPUR ,DEPARTMENT OF MATHE-
MATICS AND STATISTICS
4DDU GORAKHPUR UNIVERSITY GORAKHPUR ,DEPARTMENT OF MATHE-
MATICS AND STATISTICS
9

More Related Content

What's hot

What's hot (20)

Stid1103 ch2 introduction_to_internet_
Stid1103 ch2 introduction_to_internet_Stid1103 ch2 introduction_to_internet_
Stid1103 ch2 introduction_to_internet_
 
Internet basics
Internet basicsInternet basics
Internet basics
 
what is internet
what is internetwhat is internet
what is internet
 
Introduction to Internet By Anamika
Introduction to Internet By AnamikaIntroduction to Internet By Anamika
Introduction to Internet By Anamika
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 
What is internet
What is internetWhat is internet
What is internet
 
Internet Tools in Education
Internet Tools in EducationInternet Tools in Education
Internet Tools in Education
 
Learning activity 2
Learning activity 2Learning activity 2
Learning activity 2
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
 
ICT, Internet and WWW
ICT, Internet and WWWICT, Internet and WWW
ICT, Internet and WWW
 
Internet Concepts Ch 1
Internet Concepts Ch 1Internet Concepts Ch 1
Internet Concepts Ch 1
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Internet Basics Unit-7
Internet Basics  Unit-7Internet Basics  Unit-7
Internet Basics Unit-7
 
Lesson 08 Web Technology
Lesson 08   Web TechnologyLesson 08   Web Technology
Lesson 08 Web Technology
 
Basic's of internet
Basic's of internet Basic's of internet
Basic's of internet
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Internet Basics
Internet BasicsInternet Basics
Internet Basics
 
ict22 lec1
ict22 lec1ict22 lec1
ict22 lec1
 
Internet Tools
Internet ToolsInternet Tools
Internet Tools
 
Itc lec 6 introduction of internet
Itc lec 6 introduction of internetItc lec 6 introduction of internet
Itc lec 6 introduction of internet
 

Similar to unit-5 (2).pdf

Computer Assignment Topic-Internet
Computer Assignment Topic-Internet Computer Assignment Topic-Internet
Computer Assignment Topic-Internet
ArchDuty
 
website, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommercewebsite, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommerce
Sumbal Noureen
 

Similar to unit-5 (2).pdf (20)

INTERNET.pptx
INTERNET.pptxINTERNET.pptx
INTERNET.pptx
 
Fa13 7718-ch3-kim
Fa13 7718-ch3-kimFa13 7718-ch3-kim
Fa13 7718-ch3-kim
 
Educational Technology
Educational TechnologyEducational Technology
Educational Technology
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and internet
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama Reddy
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama Reddy
 
Acsess and Use Internet To access and use
Acsess and Use Internet To access and  useAcsess and Use Internet To access and  use
Acsess and Use Internet To access and use
 
Final draft[2]
Final draft[2]Final draft[2]
Final draft[2]
 
Sai internet ppt
Sai   internet ppt Sai   internet ppt
Sai internet ppt
 
Computer Assignment Topic-Internet
Computer Assignment Topic-Internet Computer Assignment Topic-Internet
Computer Assignment Topic-Internet
 
Internet
InternetInternet
Internet
 
PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2
 
INTERNET.pptx
INTERNET.pptxINTERNET.pptx
INTERNET.pptx
 
Form 1 Term 2 Week 4.2
Form 1   Term 2   Week 4.2Form 1   Term 2   Week 4.2
Form 1 Term 2 Week 4.2
 
Ebusiness
EbusinessEbusiness
Ebusiness
 
The internet
The internetThe internet
The internet
 
Chapter1-HTML.docx
Chapter1-HTML.docxChapter1-HTML.docx
Chapter1-HTML.docx
 
website, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommercewebsite, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommerce
 
Search Engines & Web Browser & Internet & World wide Web (WWW)
Search Engines & Web Browser & Internet & World wide Web (WWW)Search Engines & Web Browser & Internet & World wide Web (WWW)
Search Engines & Web Browser & Internet & World wide Web (WWW)
 
Internet
InternetInternet
Internet
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

unit-5 (2).pdf

  • 1. UNIT 5 Working on INTERNET and E-MAIL .. March 17, 2020 1 INTERNET The Internet is a global wide area network that connects computer systems across the world. It includes several high-bandwidth data lines that comprise the Internet ”backbone.” These lines are connected to major Internet hubs that distribute data to other locations, such as web servers and ISPs. In order to connect to the Internet, you must have access to an Internet ser- vice provider (ISP), which acts the middleman between you and the Internet. Most ISPs offer broadband Internet access via a cable, DSL, or fiber connec- tion. When you connect to the Internet using a public Wi-Fi signal, the Wi-Fi router is still connected to an ISP that provides Internet access. Even cellular data towers must connect to an Internet service provider to provide connected devices with access to the Internet. The Internet provides different online services. Some examples include: Web – a collection of billions of webpages that you can view with a web browser Email – the most common method of sending and receiving messages online Social media – websites and apps that allow people to share comments, photos, and videos Online gaming – games that allow people to play with and against each other over the Internet Software updates – operating system and application updates can typi- cally downloaded from the Internet In the early days of the Internet, most people connected to the Internet using a home computer and a dial-up modem. DSL and cable modems eventually pro- vided users with ”always-on” connections. Now mobile devices, such as tablets and smartphones, make it possible for people to be connected to the Internet at all times. The Internet of Things has turned common appliances and home systems into ”smart” devices that can be monitored and controlled over the Internet. As the Internet continues to grow and evolve, you can expect it to become an even more integral part of daily life. 1
  • 2. 2 Internet Terminology Here you will learn about the history of the Internet, what website files repre- sent, the role of URLs for identifying the web pages and programs online, and generally - all you need to know about how the Internet works. Internet The user-friendly interface of the Internet is based on a multi-layer global net- work system connecting hundreds of millions of computers worldwide. This system is comprised of multiple local and global networks serving private, pub- lic, business, academic and government purposes. URL The Uniform resource locator, popular as URL, is the global web address of doc- uments, including web pages or image files, and programs such as Java applets. It is aimed at identifying the location of a document or a program available on the web and specifies the mechanism for accessing it through a web browser. Web Page The web pages, the building units of the websites, contain various types of in- formation presented to the visitor in an aesthetic and readable manner. Most of the web pages are widely accessible on the World Wide Web, while others may also be available online but are only restricted to a certain private network, such as a corporate intranet. Index The index is one of the most widely used terms in the field of computing and IT technologies. The most popular index types include the website index, the database index and the search engine index. Ecommerce Short for electronic commerce, e-commerce represents a complex term referring to the process of selling and buying products and services over the Internet or other electronic systems. It is considered as the sales aspect of the e-business, saving individuals and businesses tons of precious time and marketing efforts. Internet Service Provider (ISP) The ISP is the company responsible for providing you with an uninterrupted connection to the Internet. The term ’ISP’ represents an abbreviation of Inter- net Service Provider. SSH Telnet SSH Telnet is used to perform an encrypted connection between a certain com- puter and a remote computer or server for sending commands or exchanging files between the two machines. File The file is a fundamental carrier of information in the process of global data transfer that Internet and other high technologies are based on. It represents a sequence of characters stored on a personal computer or on a server, viewable from any Internet enabled computer in the world. Website The wealth of information available on the World Wide Web is carefully orga- nized and displayed within an endless variety of websites dedicated to any sorts of topics you could imagine. Websites are stored on web servers and are made visible on web browsers with the help of the crucial HTTP protocol. Web Space 2
  • 3. Web space is one of the basic resources of the web hosting services, referring to the amount of disk space on a web server that is allocated to website owners by hosting companies. It is made up of the quantity of all the text, images, scripts, databases, emails and other files related to a website. Web Browser The web browsers are computer programs designed to open and read hyper- text markup language (HTML), PHP and other scripting languages. Using web browser software users can view websites and other web content on their com- puters. Bandwidth The term ’bandwith’ refers to the speed at which certain data is transferred over the Internet from the data centers it is located in to the ISPs and to the consumers’ Internet enabled devices. Image Galleries Image galleries rule the web today - they are present on both personal and corporate profiles, on news portals and blogs. With the quick development of computer technologies, image galleries have evolved from simple several-image websites, to multi-album image portals, storing thousand of pictures. Banners Image galleries rule the web today - they are present on both personal and corporate profiles, on news portals and blogs. With the quick development of computer technologies, image galleries have evolved from simple several-image websites, to multi-album image portals, storing thousand of pictures. Freelance Practicing a freelance job in the IT sphere you can be fully independent as far as workplace, the company you work for, the project you develop and the payment you receive for your efforts are concerned. Search engine A search engine is a web-based tool that enables users to locate information on the World Wide Web. Popular examples of search engines are Google, Yahoo!, and MSN Search. Search engines utilize automated software applications (referred to as robots, bots, or spiders) that travel along the Web, following links from page to page, site to site. The information gathered by the spiders is used to create a search- able index of the Web. Educational Search Engines for Students: 1) Educational Resources Information Center (ERIC) ERIC is an online library of education research and information, sponsored by the Institute of Education Sciences (IES) of the U.S. Department of Education. 2) Lexis Web LexisNexis is a corporation providing computer-assisted legal research as well as business research and risk management services. During the 1970s, LexisNexis pioneered the electronic accessibility of legal and journalistic documents. 3) Google Scholar Google Scholar is a freely accessible web search engine that indexes the full text or metadata of scholarly literature across an array of publishing formats and disciplines. 4) Microsoft Academic (MA) 3
  • 4. Microsoft Academic is a free public web search engine for academic publications and literature, developed by Microsoft Research. 5) Wolfram Alpha WolframAlpha is a computational knowledge engine or answer engine developed by Wolfram Alpha LLC, a subsidiary of Wolfram Research. 6) iSeek Education iSEEK Education is a targeted search engine for students, teachers, administra- tors, and caregivers. • Safe - Put your mind at ease with safe search technologies . 7) ResearchGate ResearchGate is a European commercial social networking site for scientists and researchers to share papers, ask and answer questions, and find collaborators. Internet applications for research Common applications of Internet research include personal research on a par- ticular subject (something mentioned on the news, a health problem, etc.), students doing research for academic projects and papers, and journalists and other writers researching stories. Research is a broad term. A Web directory organizes subjects in a hierarchical fashion that lets users investigate the breadth of a specific topic and drill down to find relevant links and content. Web directories can be assembled automatically by algorithms or handcrafted. Human-edited Web directories have the distinct advantage of higher quality and reliability, while those produced by algorithms can offer more comprehensive coverage. The scope of Web directories are generally broad, such as DOZ, Yahoo! and The WWW Virtual Library, covering a wide range of sub- jects, while others focus on specific topics. 3 E-MAIL Email, short for ”electronic mail,” is one of the most widely used features of the Internet, along with the web. It allows you to send and receive messages to and from anyone with an email address, anywhere in the world. Email uses multiple protocols within the TCP/IP suite. For example, SMTP is used to send messages, while the POP or IMAP protocols are used to retrieve messages from a mail server. When you configure an email account, you must de- fine your email address, password, and the mail servers used to send and receive messages. Fortunately, most webmail services configure your account automat- ically, so you only need to enter your email address and password. However, if you use an email client like Microsoft Outlook or Apple Mail, you may need to manually configure each account. Besides the email address and password, you may also have to enter the incoming and outgoing mail servers and enter the correct port numbers for each one. The original email standard only supported plain text messages. Eventually, 4
  • 5. email evolved to support rich text with custom formatting. Today, email sup- ports HTML, which allows emails to be formatted the same way as websites. HTML email messages can include images, links, and CSS layouts. You can also send files or ”email attachments” along with messages. Most mail servers allow you to send multiple attachments with each message, but they limit the total size. In the early days of email, attachments were typically limited to one megabyte, but now many mail servers support email attachments that are 20 megabytes in size or more. Email Netiquette When composing an email message, it is important to use good netiquette. For example, you should always include a subject that summarizes the topic of the email. It is also helpful to begin each message with the recipient’s name and end the message with your name or ”signature.” A typical signature includes your name, email address, and/or website URL. A professional signature may include your company name and title as well. Most email programs allow you to save multiple signatures, which you can insert at the bottom of an email. If you want to send an email to multiple recipients, you can simply add each email address to the ”To” field. However, if the email is primarily intended for one person, you should place the additional addresses in the ”CC” (carbon copy) field. If you are sending an email to multiple people that don’t know each other, it is best to use the ”Bcc” (blind carbon copy) field. This hides the email addresses of each recipient, which helps prevent spam. 1 Parts of an email message An email message consists of the following general components: Headers The message headers contain information concerning the sender and recipients. The exact content of mail headers can vary depending on the email system that generated the message. Generally, headers contain the fol- lowing information: Subject. Subject is a description of the topic of the message and displays in most email systems that list email messages individually. A subject line could be something like ”2010 company mission statement” or, if your spam filtering application is too lenient, ”Lose weight fast!!! Ask me how.” Sender (From). This is the sender’s Internet email address. It is usually presumed to be the same as the Reply-to address, unless a different one is provided. Date and time received (On). The date and time the message was received. Reply-to. This is the Internet email address that will become the recipient of your reply if you click the Reply button. Recipient (To:). First/last name of email recipient, as configured by the sender. 1NOTE: Email was originally written ”e-mail,” but is now more commonly written as ”email” without the dash. 5
  • 6. Recipient email address. The Internet mail address of the recipient, or where the message was actually sent. Attachments. Files that are attached to the message. Body The body of a message contains text that is the actual content, such as ”Employees who are eligible for the new health care program should contact their supervisors by next Friday if they want to switch.” The message body also may include signatures or automatically generated text that is inserted by the sender’s email system. junk mail or email spam Email spam, also known as junk email, is unsolicited bulk messages sent through email. Advantages of Email 1. It’s free! Once you’re online, there is no further expense. 2. Easy to reference Sent and received messages and attachments can be stored safely, logically and reliably. It’s a lot easier to organize emails than paper. 3. Easy to use Once you’re set up, sending and receiving messages is simple. That goes for a host of other email functions. Data storage and contacts can be accessed quickly and easily. 4. Easy to prioritize Incoming messages have subject lines that mean you can delete without opening. How much time does that save compared to ‘snail mail?’ 5. Speed Message to send? Done, under a second! Email is as fast a form of written communication as any. 6. Global Web based email means you can access your messages anywhere online. Go- ing overseas? Before you go, mail yourself a copy of your passport number, travel insurance details or your accommodation details. Disadvantages of Email 1. Emotional responses Some emails cause upset or anger. A reply in the heat of the moment can’t be easily retracted, but it can cause lasting damage. 2. Information overload Too many people send too much information. They cover their backs citing ‘need to know’ as the justification. Learn how to use email effectively and you’ll reduce time wasted on this. 3. Lacking the Personal Touch Some things are best left untyped. Email will never beat a hand written card or letter when it comes to relationships. 4. Misunderstandings 6
  • 7. Emails from people who don’t take the time to read what they write be- fore clicking ‘send’. Time is wasted, either to clarify or, worse, acting on a misinterpretation of the message. 5. No Respite Your email inbox is like a garden; it needs to be constantly maintained. Leave it and will continue to grow. Ignore it at your peril! 6. Pressure to Reply Once it’s in your inbox, you feel an ever increasing obligation to act on it. Procrastinating doesn’t making it go away. Do it, dump it or delegate it. 7. Spam Having to deal with spam and spoofs is one of the worst avoidable time wasters online. Use some anti spam software. 2 4 Email Terminology Email is the new age social service that keeps us always well informed and highly communicative in a world of events and long distances. Users can gain access to this service in two basic ways - through the popular free email applications such as Hotmail, America Online, Yahoo, etc. Email Today’s most flexible and reliable method of electronic communication between people actually represents a multi-layer process of creating, transmitting and storing e-messages within communication networks. Email Forwarding This extremely useful email feature allows users to set email messages deliv- ered to an email address of theirs to be re-sent automatically to another inter- nal/external email address of their choice. Anti-virus Protection With reliable anti-virus protection enabled for their emails both individuals and business owners can feel sheltered from the malicious viruses circulating on the Internet today. It is also important that the software is always kept up to date with the latest virus versions out there. Auto-responder e-mails In a technology-driven world, auto-responders are a truly effective automated tool for real-time offline management of business communication and are most often used for email marketing purposes. Hosted Email Running personal or business e-correspondence on a hosting server of their choice gives users independence, much higher levels of security and much more email management tools than the regular free email services could ensure. Mailing Lists Whether it’s about sending regular notifications to community website members or informing e-commerce store clients about special promo campaigns, the one and only powerful software recommended is a mailing list client. 2DDU GORAKHPUR UNIVERSITY GORAKHPUR ,DEPARTMENT OF MATHE- MATICS AND STATISTICS 7
  • 8. Spam Filters Using SPAM filters you can organize the contents of your mailboxes into separate folders and thus minimize the risk of spamming attacks to your inboxes. SPAM filters give you control over the level of email filtering. Mailing List Members Mailing list members are all opt-in subscribers to a mailing list. To become a mailing list subscriber you need to send an email to the administrator’s email address of the list. POP3/IMAP e-mail accounts Managing email communication with the help of well-known mail clients such as Outlook and Mozilla Thunderbird is done with the help of POP3/ IMAP protocols, ensured by the web hosting providers. Set up Email Setting up email accounts is the fist most important task that everyone wishing to run e-correspondence will need to deal with, no matter whether the selected email method is a webmail application or hosted email software. SMTP server As an outgoing mail server, the SMTP server receives the mail messages being sent from users through their mail clients and routes them to the mail recipients they are intended for. SPF Protection This is currently the most widely used method of protecting personal/business email addresses from being used for unsolicited spamming activity. Moreover, this service works for saving the online reputation of both individuals and busi- nesses. Webmail Due to the possibility to be accessed via a web browser, webmail is the most popular email service on the Net, ensuring fast and easy access to mailboxes via a clear and easy to use interface. Catch-All Emails The catch-all emails are aimed to facilitate users’ access to a certain mail- box. The catch-all functionality allows for a mailbox to catch all emails sent to mistyped addresses containing the mailbox’s domain name in their syntax. Email Aliases Email aliases represent alternative names to the original name of a mailbox. They do not have their own mailboxes and play the role of a forwarding mail- box i.e. all the email sent to them is redirected to another actual mailbox. 5 How to Attach a File to an Email Emails are a popular, effective, and fast way to communicate. Attaching a file to an email is an easy way to send important documents and/or photos. Below are a few simple steps that will walk you through the process of sending an email with an attachment in most email programs. Attach a File to an Email Step 1 8
  • 9. Turn on the computer and log onto the internet. Step 2 Type in the web address of your email host in the address bar and log onto your email account. Step 3 Click on ”Compose” to write a new email. Step 4 Click on the icon to attach a file. This icon appears as a paperclip symbol in most email programs. After you click on the icon to attach a file a box will pop up onto your screen. Step 5 Browse the information on your computer my clicking on the folder that con- tains the file that you would like to attach. When you find the needed file, click on it and then click on ”open.” This will start the process of attaching the file to your outgoing email message. Step 6 Read the directions on your computer screen. It will most likely say that the file was attached successfully. Step 7 Write the text of your email, insert your recipient’s email address and then click on ”send.” 3 Exercise compulsory Question Give short note on following. (i)http (ii) HTML (i) WWW (ii)URL (iii)TCP/IP Descriptive Questions (i)What do you understand by term ’Internet’? what are the different uses of internet ? Discuss the significance of different of service of internet in your research area ? (ii)(a)Define E-mail ,Explain the component of an E-mail . What are the process of creating and sending an E-mail ? (b) Give any two advantage of an E-mail . What is junk-mail ? State any two disadvantage of an E-mail ? (iii)Search Engine 4 3DDU GORAKHPUR UNIVERSITY GORAKHPUR ,DEPARTMENT OF MATHE- MATICS AND STATISTICS 4DDU GORAKHPUR UNIVERSITY GORAKHPUR ,DEPARTMENT OF MATHE- MATICS AND STATISTICS 9