SlideShare ist ein Scribd-Unternehmen logo
1 von 41
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page1
Ethiopian TVET-System
INFORMATION TECHNOLOGY SUPPORT SERVICE
Level II
LEARNING GUIDE # 1
Unit of Competence: Use and access the Internet
Module Title: Use and access the Internet
LG Code: ICT ITS2 MO5 LO1- 02
TTLM Code: ICT ITS2 TTLM1 1114
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page2
LO 1: Access the Internet
Introduction Learning Guide # 1
This learning guide is developed to provide you the necessary information regarding the following content
coverage and topics –
 Introduction to the internet
 Internet browsers review
 basic internet settings and configuration
This guide will also assist you to attain the learning outcome stated in the cover page. Specifically, upon
completion of this Learning Guide, you will be able to –
 Open Internet browser and a home page of personal choice set up by setting internet options
 Adjust display/view modes to suit personal requirements
 Modify toolbar to meet user and browsing needs
 Access and retrieve particular site data
 Load or unload images depending on modem speed, computer and browser capabilities
 Open URL to obtain data and browse link
 Delete cookies and history of internet browser as precaution from virus infection
Learning Activities
1. Read the specific objectives of this Learning Guide.
2. Read the information written in the “Information Sheets 1”.
3. Accomplish the “Self-check” in page.
4. If you earned a satisfactory evaluation proceed to “Information Sheet 2”. However, if your rating is
unsatisfactory, see your teacher for further instructions or go back to Learning Activity #1.
5. Submit your accomplished Self-check. This will form part of your training portfolio.
6. Read the information written in the “Information Sheet 2”.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page3
7. Accomplish the “Self-check” in page.
8. If you earned a satisfactory evaluation proceed to “Information Sheet 3”. However, if your rating is
unsatisfactory, see your teacher for further instructions or go back to Learning Activity #2.
9. Submit your accomplished Self-check. This will form part of your training portfolio.
10. Read the information written in the “Information Sheet 3”.
11. If you earned a satisfactory evaluation proceed to “Operation Sheet” in page . However, if your rating is
unsatisfactory, see your teacher for further instructions or go back to Learning Activity #3.
12. Read the “Operation Sheet” and try to understand the procedures discussed.
13. You can use your working PC to simulate the activity.
14. Do the “LAP test” in page (if you are ready) and show your output to your teacher. Your teacher will
evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice you on
additional work. But if satisfactory you can proceed to Learning Guide.
Information Sheet-1 Introduction to the internet
INTERNET
Definition, use, and basic terminologies of Internet
The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a
network of networks in which users at any one computer can, if they have permission, get information from any
other computer (and sometimes talk directly to users at other computers).
The internet is computer based global information system. It is composed of many interconnected
computer networks. Each network may link thousands of computers
enabling them to share information. The internet has brought a transformation in many aspects of life. It is one
of the biggest contributors in making the world into a global village. Use of internet has grown tremendously
since it was introduced. It is mostly because of its flexibility. Nowadays one can access the internet easily. Most
people have computers in their homes but even the ones who don’t they can always go to cyber cafes where this
service is provided.
The internet developed from software called the ARPANET which the U.S military had developed. It
was only restrict to military personnel and the people who developed it. Only after it was privatized was it
allowed to be used commercially.
The internet has developed to give many benefits to mankind. The access to information is one of the
most important. Student can now have access to libraries around the world. Some charge a fee but most provide
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page4
free services. Before students had to spend hours and hours in the libraries but now at the touch of a button
students have a huge database in front of them
Basic Internet Terms and Terminology
Here is a look at the buzzwords of the world of Internet.
ARPANET: The acronym stands for Advanced Research Projects Agency Network. ARPA of the
United States Department of Defense developed ARPANET, which became the world’s first packet switching
network. Internet is the successor of ARPANET.
Internet Service Provider: A company, which provides users with an access to the Internet, is known
as an Internet service provider or Internet access provider. ISP, as it is called, offers email accounts and other
services like remote storage of files for its customers. Here is a word about choosing a cheap ISP.
IP Address: It is a way of numerically identifying an entity on a computer network. The original
addressing system known as IPv4, used 32 bit addresses. With the growth of the Internet, IPv6 came to be used
wherein the addresses are composed of 128 bits.
Cyberspace: This term coined by William Gibson, is used to refer to the computer networks connected
to each other and the content they host. It is often used to refer to the Internet.
WWW: It is a collection of interlinked documents that are accessible over the Internet. It consists of
millions of web pages that contain text, images, voice and videos. Sir Tim Berners-Lee, a British scientist
working at CERN, created the World Wide Web.
Website: A website is a set of web pages consisting of text, audio and video. Web servers host websites.
URL: It specifies the location of a resource on the Internet. It consists of the basic address and path.
Web Page: Web pages are resources of information. They are generally created in the HTML format
and provide the web users with navigational abilities through hyperlinks to other web pages on the web.
Home Page: The term home page is used to refer to the page that is the default page of any website. It is
the main page of a complex website.
Web Browser: A web browser is a software application that facilitates user interaction with the text,
audio, video and other information that is located on the web.
Cache: Web browsers maintain a cache of recently visited web pages. Some of them use an external
proxy web cache, which is a server program through which web requests pass. This enables the browsers to
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page5
cache frequently visited pages. Even search engines make available already indexed web pages through their
caches.
HTTP: Hypertext Transfer Protocol, abbreviated as HTTP, is a communications protocol used for the
transfer of information over the Internet. A client makes an HTTP request using a web browser to which an
HTTP response is sent from the server.
Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged between the web
client and the web server. It is sent by the web server to the web client and returned unchanged by the client
each time it accesses the server.
Session: It is an exchange of information between a computer and its user. It is established for a certain
period of time after which it ends.
Hyperlink: A reference in a document to another section of the document or to another document is
termed as a hyperlink. Hyperlinks are used to redirect the user from one section of a page content to another.
Internet Security: It is one of the major concerns today. As the Internet acts as a communication
platform that can be accessed by millions of users around the world, it becomes necessary that proper measures
be implemented. Issues like Internet Safetythat deal with the content that is made accessible over the Internet
are equally important. Internet Privacyrelates to safeguarding the privacy of the web users and the sensitive
information on the web from hackers and stalkers.
Internet - A communication Platform :Internet serves as one of the most efficient means of
communication. Computers from different parts of the world can be connected to each other to exchange
information, thanks to the Internet. Emails and chats are excellent means of communication over the Internet.
Blogs and online forums give the Internet users a platform to reach out to the masses. Here is a list of the basic
Internet terms associated with the Internet as a communication platform. Also look at some Internet terms
related to the security threats to network communication.
Email: It is a store-and-forward method of writing, sending and receiving written messages. Electronic
mail is an Internet e-mail system that uses network-based protocols to exchange messages between network
subsystems.
Email Address: It identifies the network location to which an email can be delivered. An email address
is a combination of the username of the mail user and the host name of the mailing system. It is of the form,
‘username@domain-name’. An email alias is a forwarding email address. It simply forwards emails to specific
email addresses.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page6
Spamming: The act of sending unsolicited bulk messages over an email system is known as spamming.
It is an undesirable use of the electronic messaging systems.
Phishing: It is a fraudulent activity of acquiring the sensitive information by the use of a fake identity
during electronic communication. It is implemented by means of emails and instant messages wherein a user is
lured to enter his/her details, which are actually captured by a fraudulent website.
Hacking: Hacking is the activity of programmatically gaining access to a computer application that is
otherwise inaccessible. The act of gaining an unauthorized access to a computer is known as hacking. Hacking
of passwords that leads to breach of email privacy is a threat to communication over the Internet. Internet
crimesrefer to all the criminal activities that are carried over the Internet.
Email Scams: With the increase in the use of email systems, its security needs also rose. Fraudulent
users started tampering with the email systems to breach security.
Email Virus: It is a computer code that is transmitted through an email in the form of an attachment.
The email attachment causes the destruction of some of the files on the receiver computer’s hard disk and is
programmatically emailed to the contacts in the address book of the receiver.
Internet Bookmark: The Internet browsers of the modern times aim at enabling the users to organize
the web pages they access. Links once visited can be saved in the favorites or preferences categories.
Bookmarks are usually integrated into browsers. Social bookmarkingis a method used by the Internet users to
store and manage web pages.
Web Directories: It is a directory, which links to other websites and organizes those links. They should
not be mistaken as being search engines.
Some Funny and Interesting Internet Terms
Googling: The Google search engine, being the most popularly used one, has made the word, ‘google’
synonymous to the concept of search engines. Searching the Internet by using the Google search engine is
known as googling.
Copypasta: If a text is copy pasted from somewhere and posted in a forum, it is termed as a copypasta.
The source is often unknown in such cases. Are you into copypastas?
Egosurfer: The web users who search over the Internet for themselves fall under the class of egosurfers.
I am sure most of you play an egosurfer once in a while.
Netiquette: This term is short for net etiquette and refers to the principles of courtesy and consideration
for the people using the Internet. It refers to certain basic principles to adhere to while using the Internet. The
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page7
general ethical principles to be followed in relation to using mailing systems of the Internet are termed as email
etiquettes.
Trasher: The users who search over the Internet using all possible means, sometimes even risking the
Internet security are known as trashers.
Troll: Trolls are the users who try to become infamous on chat by introducing disturbing links,
mimicking other users’ posts and profiles and fighting with others.
You tuber: A person who is addicted to watching videos on the Internet is referred to as a you tuber.
Makeup and structure of web addresses
Web Sites and URLs
A Web site is simply data that is stored on a WWW server and which can be freely accessed by people
'surfing the Net'. For instance Microsoft have their own Web site from which you can download information
and software. The trouble is that you have to know the address of the Web site; in much the same way as if you
want to phone someone you have to know his or her phone number. The address of a Web site is given by
something called its URL (Uniform Resource Locator). The structure of the URL is very precise. For instance,
if you wish to use your Web browser to visit the Microsoft Web site you would have to use the URL below.
http://www.microsoft.com
Thus ifyou wish to visit the Web site of the company that produced this training material you would use
the URL:
http://www.cctglobal.com
Due to the very large number of organizations who now have Web sites, you can also use a search
engine, in which you can enter a word or phrase connected with what you wish to find and it will then display
sites that match the information that you have entered. The results can be overwhelming however. A recent
search using the search words "PC courseware" displayed a list of 4.5 million sites containing these words!
What is a hyperlink?
A hyperlink is simply part of the text (or graphic) on a Web page, that when clicked on will
automatically:
 Take you to a different part of the same page
 Take you to a different page within the Web site
 Take you to a page in a different Web site
 Enable you to download a file
 Launch an application, video or sound
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page8
The illustration below displays a fragment of a Web page. The words that are underlined
indicate a hyperlink. By default these text links are normally displayed in blue.
Legal Issues, Ethical Issues, Privacy, and Security
It's useful to take a brief look at the history of the Internet, which is related to some of these issues.
The Internet and the World Wide Web have grown rapidly from a research project into something that
involves millions of people worldwide. Much of the Internet's usefulness comes from the fact that it is shared by
users, service providers, and others, in the sense that each depends on the other and needs to support the other.
Hopefully, that sort of sharing and respect will continue. Your behavior, your expectations for others, and your
activities will make the difference.
"It is important to realize that the Web is what we make it. 'We' being the people who read, the people
who teach children how to surf the Web, the people who put information up on the Web. Particularly the people
who make links.... The Web doesn't force anything down your throat. If you are worried that your children are
going to read low-quality information, teach them. Teach them what to read. Teach them how to judge
information."
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page9
Privacy and Civil Liberties
The Electronic Frontier Foundation (EFF) was formed in 1990 to, among other things, bring issues
dealing with civil liberties related to computing and telecommunications technology to the attention of the
public at large, legislators, and court and law enforcement officials. As a non-profit public interest organization,
EFF maintains collections of files and documents.
E-Mail Privacy
When you send a message by e-mail, the message is broken into packets and the packets are sent
out over the Internet. The number of packets depends on the size of the message. Each message has the
Internet address of the sender (your address) and the address of the recipient. Packets from a single
message may take different routes to the destination, or may take different routes at different times. This
works well for the Internet and for you since packets are generally sent through the best path depending
on the traffic load on the Internet, the path doesn't depend on certain systems being in operation, and all
you have to give is the address of the destination.
The packets making up an e-mail message may pass through several different systems before
reaching their destination. This means there may be some places between you and the destination where
the packets could be intercepted and examined.
Electronic Communications Privacy Act
One example of a law to ensure the privacy of e-mail is the Electronic Communications Privacy
Act (ECPA) passed in 1986 by Congress.
The “electronic communication” means any transfer of signs, signals, writing, images, sounds,
data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic,
photo electronice or photooptical system that affects interstate or foreign commerce, but does not
include (A) any wire or oral communication; (B) any communication made through a tone-only paging
device; (C) any communication from a tracking device (as defined in section 3117 of this title); or (D)
electronic funds transfer information stored by a financial institution in a communications system used
for the electronic storage and transfer of funds.
Title I of the ECPA protects wire, oral, and electronic communications while in transit. It sets
down requirements for search warrants that are more stringent than in other settings.
Title II of the ECPA, the Stored Communications Act (SCA), protects communications held in
electronic storage, most notably messages stored on computers. Its protections are weaker than those of
Title I, however, and do not impose heightened
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page10
standards for warrants. Title III prohibits the use of pen register and/or trap and trace devices to record
dialing, routing, addressing, and signalling information used in the process of transmitting wire or
electronic communications without a court order.
The Electronic Communications Privacy Act of 1986 (ECPA Pub. L. 99-508, Oct. 21, 1986,
100 Stat. 1848, 18 U.S.C. § 2510-2522)was enacted by the United States Congress to extend
government restrictions on wire taps from telephone calls to include transmissions of electronic data by
computer. Specifically, ECPA was an amendment to Title III of the Omnibus Crime Control and Safe
Streets Act of 1968 (the Wiretap Statute), which was primarily designed to prevent unauthorized
government access to private electronic communications.
The ECPA also added new provisions prohibiting access to stored electronic communications,
i.e., the Stored Communications Act,18 U.S.C. §§ 2701-12. The ECPA also included so-called pen/trap
provisions that permit the tracing of telephone communications. §§ 3121-27. Later, the ECPA was
amended, and weakened to some extent, by some provisions of the USA PATRIOT Act. In addition,
Section 2709 of the Act, which allowed the FBI to issue National Security Letters (NSLs) to Internet
service providers (ISPs) ordering them to disclose records about their customers, was
ruledunconstitutional under the First (and possibly Fourth) Amendments in ACLU v. Ashcroft (2004). It
is thought that this could be applied to other uses of National Security Letters.
Encryption
With public key encryption there are two keys, one public and the other private. The public key needs to
be known. To send a message to a friend, you use her or his public key to encrypt the message. Your friend then
uses her or his private key to decode the message after receiving it.
You can obtain a version of public key encryption software called PGP, Pretty Good Privacy.
Sexually-Explicit Material and Pornography
There are a number of programs that can be installed on a computer to restrict the material that can be
accessed on the World Wide Web. The programs work with lists of Web and ways of describing the content of
Web pages to filter material. One source of information about these programs and related topics isPEDINFO
Parental Control of Internet Access.
The culture of the Internet has fostered personal rights and liberties, so some argue it's content ought not
be restricted or censored. There are laws banning or restricting pornography; some countries have more
stringent laws than others and some laws restrict the distribution of the material.
Ethical Issues
Some resources for guidelines for Ethics and Net Etiquette
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page11
In January 1989 the Internet Architecture Board (IAB) issued a statement of policy concerning Internet
ethics. This document is referred to as RFC 1087 'Ethics and the Internet'.
An extract of RFC 1087 follows:
The IAB strongly endorses the view of the Division Advisory Panel of the National Science
Foundation Division of Network, Communications Research and Infrastructure which, in paraphrase,
characterized as unethical and unacceptable any activity which purposely:
 Seeks to gain unauthorized access to the resources of the Internet.
 Disrupts the intended use of the Internet.
 Wastes resources (people, capacity, computer) through such actions.
 Destroys the integrity of computer-based information.
 Compromises the privacy of users.
Inappropriate Business Practices
It is common to find advertising, marketing, and commercial activities readily available on the World
Wide Web, and most of is done in a responsible manner.
One particularly offensive means of advertising is called spamming. When used in this way the term
means sending a message to many unrelated newsgroups or interest groups. It's not too hard to do, but it almost
always is met with great opposition and feelings of hatred. One way to deal with it is to send a copy of the
message and a complaint to postmaster@the.other.site.
Libel
 Defamation—also called calumny, vilification, traducement, slander (for transitory statements),
and libel (for written, broadcast, or otherwise published words)—is the communication of a statement
that makes a claim, expressly stated or implied to be factual, that may give
an individual, business, product, group, government, or nation a negative image. It is usually a
requirement that this claim be false and that the publication is communicated to someone other than the
person defamed (the claimant).[1]
 In common law jurisdictions, slander refers to a malicious, false, and defamatory spoken statement or
report, while libel refers to any other form of communication such as written words or images. Most
jurisdictions allow legal actions, civil and/or criminal, to deter various kinds of defamation and retaliate
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page12
against groundless criticism. Related to defamation is public disclosure of private facts, which arises
where one person reveals information that is not of public concern, and the release of which would
offend a reasonable person. "Unlike [with] libel, truth is not a defense for invasion of privacy."
 False light laws are "intended primarily to protect the plaintiff's mental or emotional well-being." If
a publication of information is false, then a tort of defamation might have occurred. If
thatcommunication is not technically false but is still misleading, then a tort of false light might have
occurred.
 In most civil law jurisdictions, defamation is dealt with as a crime rather than a tort.
 A person who harms another's reputation may be referred to as a famacide, defamer, or slanderer.
The Latin phrase famosuslibellus means a libelous writing.
Intellectual Property and Copyright
The notion of ownership of something, whether it has a physical form, does still make sense as
intellectual property. There are a number of laws and agreements throughout the world to protect intellectual
property rights. The right to copy or duplicate materials can be granted only by the owners of the information.
This is called the copyright. Many documents on the Internet contain a statement that asserts the document is
copyrighted and gives permission for distributing the document in an electronic form, provided it isn't sold or
made part of some commercial venture. Even items that don't contain these statements are protected by the
copyright laws of the United States, the Universal Copyright Convention, or the Berne Union.
Most of the copyright conventions or statutes include a provision so that individuals may make copies of
portions of a document for short-term use. If information is obtainable on the Internet, and there is no charge to
access the information, it often can be shared in an electronic form. That certainly doesn't mean you can copy
images or documents and make them available on the Internet, or make copies and share them in a printed form
with others. Quite naturally, many of the folks who create or work at providing material available on the
Internet, expect to get credit and be paid for their work.
Internet Security
When you use a computer system connected to the Internet, you're able to reach a rich variety of sites
and information. By the same token, any system connected to the Internet can be reached in some manner by
any of the other computer systems connected to the Internet. Partaking of the material on the Internet also
means that you have to be concerned about the security of your computer system and other systems.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page13
You don't want unauthorized persons accessing your information or information belonging to others
who share your system-you want to protect your system from malicious or unintentional actions that could
destroy stored information or halt your system. You don't want others masquerading as you. You need to be
concerned about the security of other systems so you can have some faith in the information you retrieve from
those systems, and so you can conduct business transactions.
A lack of security results in damage, theft, and what may be worse in some cases, a lack of confidence
or trust.
If you access the Internet by logging into a computer system, your primary defense against intrusion is
your password. You need to choose a password that will be difficult to guess. This means choosing a password
that's at least six characters long. You'll also want to use a password contain upper and lowercase letters and
some non-alphabetic characters. Additionally, the password shouldn't represent a word, and it shouldn't be
something that's easy to identify with you such as a phone number, room number, birthdates, or license number.
 Selecting good passwords
Because connecting a network to the Internet allows access to that network, system administrators and
other persons concerned with network security are very concerned about making that connection. One device or
part of a network that can help enhance security is called a firewall.
One type of program that causes problems for Internet users is called a virus. This doesn't necessarily
copy your data or attempt to use your system. However, it can make it difficult or impossible to use your
system. A virus is a piece of code or instructions that attaches itself to existing programs. Just like a biological
virus, a computer virus can't run or exist on its own, but must be part of an executing program. When these
programs are run, the added instructions are also executed.
Internet security is very important to many users, as well it should be. We need to make sure that
messages are private and that monetary transaction and data sources are secure.
The Trail You Leave When You Use the Web. A brief description of log files kept by Web servers,
cookies, and the information about how you use the Web that's saved in the browser's cache and history list.
The Different Types of Search Engines
Although the term “search engine” is often used indiscriminately to describe crawler-based search
engines, human-powered directories and everything in between, they are not all the same. Each type of “search
engine” gathers and ranks listings in radically different ways.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page14
Crawler-Based
Crawler-based search engines such as Google and Yahoo, compile their listings automatically. They
“crawl” or “spider” the web and people search through their listings. These listings are what made up the
search engine’s index or catalogue. You can think of the index as a massive electronic filing cabinet containing
a copy of every web page the spider finds. Because spiders scour the web on a regular basis, any changes you
make to a website, or links to or from your own website, may affect your search engine ranking.
It is also important to remember that it may take a while for a spidered page to be added to the index.
Until that happens, it is not available to those searching with a search engine.
Search Engine Optimization (SEO) refers to making changes to a website so that it can attain higher
search positions for specific key phrases in organic results.
Organic results refer to the regular search engine results displayed by crawler-based search engines; as
opposed to sponsored results which are paid advertising.
Directories
Directories such as Open Directory depend on human editors to compile their listings. Webmasters
submit an address, title and brief description of their site and then editors review the submission. Unless you
sign up for a paid inclusion program, it may take months for your website to be reviewed. Even then, there’s no
guarantee that your website will be accepted.
After a website makes into a directory however, it is generally very difficult to change its search engine
ranking. So before you submit to a directory, spend some time working on your titles and descriptions or hire a
professional to submit to directories for you.
Paid Inclusion
Most directories offer some form of paid inclusion. Paid inclusion guarantees your website gets
reviewed and/or indexed promptly. Keep in mind that these search engines usually still allow people to submit
for free; it just takes longer.
Pay Per Click
PPC advertising is the name for ads you see at the top or on the right of the organic results in most
search engines. Services such as Yahoo SM, Google AdWrds, and MSN AdCenter allow you to pay to show
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page15
your ads on their search engine results page. How much you pay (your bid), along with the click-through rate
of the ad (CTR) and the relevance of the landing page, determine the ranking of your PPC ads.
There are companies such as Red Carpet Web Promotion that set up and manage PPC campaigns for
companies that bid on many key phrases (which can number in the thousands) Contact Red Carpet Web
Promotion if this or other web promotion services interest you.
Self Check–1 Written Test
Name: ______________________________________ Date:
________________________________________
Time started: _______________________________ Time finished:
_______________________________
Directions: Answer all the questions listed below.
1. It is a worldwide system of computer networks in which users at any one computer can, if they have
permission, get information from any other computer. (1 point)
2. Internet is sometimes called as what? (1 point)
3. Give at least 5 common internet terminologies. (5 points)
4. It specifies the location of a resource on the Internet. It consists of the basic address and path.(1 point)
5. It is used to refer to the page that is the default page of any website. It is the main page of a complex
website.(1 point)
6. It is a store-and-forward method of writing, sending and receiving written messages.
(1 point)
7. It refers to the principles of courtesy and consideration for the people using the Internet. It refers to certain
basic principles to adhere to while using the Internet. (1 point)
8.It is simply part of the text or graphic on a Web page, that when clicked on will automatically take you to a
different part of the same page, Take you to a different page within the Web site, Take you to a page in a
different Web site, Enable you to download a file or Launch an application, video or sound.(1 point)
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page16
9. It was formed in 1990 to, among other things, bring issues dealing with civil liberties related to computing
and telecommunications technology to the attention of the public at large, legislators, and court and law
enforcement officials. (1 point)
10. It is a law that ensures the privacy of e-mail which was passed in 1986 by Congress.
(1 point)
11. It is an offensive means of advertising that sends a message to many unrelated newsgroups or interest
groups.(1 point)
12. The notion of ownership of something, whether it has a physical form, does still make sense as what? (1
point)
13. Give the 4 types of search engines. (4 points)
Note: Satisfactory rating - 16 points, Unsatisfactory - below 16 points
You can ask you teacher for the copy of the correct answer
Self Check – 1 Written Test
Answer keys:
1. Internet
2. The Net
3. Any five terminologies among the list below
 ARPANET, Internet Service Provider, IP Address, Cyberspace, WWW, Website, URL, Web Page,
Home Page, Web Browser, Cache, HTTP, Web Cookie, Session, Hyperlink, Internet Security,
Internet - A communication Platform, Email, Email Address, Spamming, Phishing, Hacking, Email,
Scams, Email Virus, Internet Bookmark, Web Directories
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page17
4. URL
5. Home page
6. Email
7. Netiquette
8. Hyperlink
9. The Electronic Frontier Foundation (EFF)
10. Electronic Communications Privacy Act (ECPA)
11. Spamming
12. Intellectual Property
13. Crawler-Based,Directories, Paid Inclusion and Pay Per Click
Information Sheet-2 Internet browsers review
Internet Browsers
There were several web browsers that we can use to search from the web. Let’s take a look at some of
it.
Netscape Navigator
Netscape Navigator was a
proprietary web browser that was popular
in the 1990s. It was the flagship product of
the Netscape Communications Corporation
and the dominant web browser in terms of
usage share, although by 2002 its usage
had almost disappeared. This was primarily
due to the increased usage of Microsoft's
Internet Explorer web browser software,
and partly because the Netscape
Corporation (later purchased by AOL) did
not sustain Netscape Navigator's technical
innovation after the late 1990s.
The Netscape Navigator web browser
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page18
was succeeded by Netscape Communicator.
Netscape Communicator's 4.x source code
was the base for the Netscape-developed
Mozilla Application Suite, which was later renamed SeaMonkey.Netscape's Mozilla Suite also served as the
base for a browser-only spinoff called Mozilla Firefox and Netscape versions 6 through 9.
AOL formally stopped development of Netscape Navigator on December 28, 2007, but continued
supporting the web browser with security updates until March 1, 2008, when AOL canceled technical support.
AOL allows downloading of archived versions of the Netscape Navigator web browser family. Moreover, AOL
maintains the Netscape website as an Internet portal.
Windows Internet Explorer
Windows Internet Explorer
(formerly Microsoft Internet Explorer,
commonly abbreviated IE or MSIE) is a
series of graphical web browsers developed
by Microsoft and included as part of the
Microsoft Windows line of operating systems,
starting in 1995. It was first released as part
of the add-on package Plus! for Windows 95
that year. Later versions were available as
free downloads, or in service packs, and
included in theOEM service releases of Windows 95 and later versions of Windows.
Internet Explorer has been the most widely used web browser since 1999, attaining a peak of about
95% usage share during 2002 and 2003 with Internet Explorer 5 and Internet Explorer 6. Since its peak of
popularity, its usage share has been declining in the face of renewed competition from other web browsers,
and is currently 43.55% as of February 2011. Microsoft spent over $100 million USD per year on Internet
Explorer in the late 1990s,[1] with over 1000 people working on it by 1999.
Mozilla FireFox
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page19
Mozilla Firefox is a free and open
source web browser descended from the
Mozilla Application Suite and managed by
Mozilla Corporation. As of August 2011,
Firefox is the second most widely used
browser, with approximately 30% of
worldwide usage share of web browsers.
The browser has had particular success in
Germany and Poland, where it is the most
popular browser with 55% usage and 47%
respectively.
Firefox runs on various operating systems including Microsoft Windows, GNU/Linux, Mac OS
X, FreeBSD, and many other platforms. Its current stable release is version 6.0, released on August 16,
2011. Firefox's source code is tri-licensed under the GNU GPL, GNU LGPL, or Mozilla Public License.
Galeon
Galeon is a web browser for GNOME
based on Mozilla’s Gecko layout engine.
Galeon’s self-declared mission was to deliver
“the web and only the web.”
At the time of Galeon’s creation, the
most popular web browsers, including
Netscape, Mozilla, and Internet Explorer,
were large multi-functional programs.
This made them slow to start and often
impractical due to their high memory usage
and processor requirements. Galeon was the
first mainstream graphical web browser
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page20
which specifically focused on the reduction of peripheral functionality. Galeon is also notable for introducing
“Smart Bookmarks,” bookmarks that take an argument and can be used as toolbar buttons with a text field used
to enter the value for the argument.
Opera
Opera is a web browser and Internet
suitedeveloped by Opera Software. The
browser handles common Internet-related
tasks such as displaying web sites, sending
and receiving e-mail messages, managing
contacts, chatting on IRC, downloading files
via BitTorrent, and readingweb feeds. Opera
is offered free of charge for personal
and mobile phones.
Opera does not come packaged with any desktop operating system. However, it is the most popular
desktop browser in some countries, such as Ukraine. Opera Mini, which is the most popularmobile web
browser as of May 2011, has been chosen as the default integrated web browser in several mobile handsets by
their respective manufacturers.
Opera is known for originating many features later adopted by other web browsers.
Opera runs on a variety of personal computer operating systems, including Microsoft Windows, Mac
OS X, Linux, and FreeBSD. Editions of Opera are available for devices using
the Maemo, BlackBerry, Symbian, Windows Mobile, Android, and iOS operating systems, as well as Java ME-
enabled devices. Approximately 120 million mobile phones have been shipped with Opera.Opera is the only
commercial web browser available for the Nintendo DS and Wii gaming systems. Some television set-top
boxes use Opera. Adobe Systems has licensed Opera technology for use in the Adobe Creative Suite.
Phoenix
The Mozilla Firefox project was
created by Dave Hyatt and Blake Ross as
an experimental branch of the Mozilla
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page21
project.
Hyatt, Ross, Hewitt and Chanial's browser was created to combat the perceived software bloat of
the Mozilla Suite (codenamed, internally referred to, and continued by the community as SeaMonkey), which
integrated features such as IRC, mail and news, and WYSIWYG HTML editing into one software suite.
Firefox retains the cross-platform nature of the original Mozilla browser, using the XUL
user interface markup language. The use of XUL makes it possible to extend the browser's capabilities through
the use of extensions and themes. The development and installation processes of these add-ons raised security
concerns, and with the release of Firefox 0.9, the Mozilla Foundation opened a Mozilla Update website
containing "approved" themes and extensions. The use of XUL sets Firefox apart from other browsers,
including other projects based on Mozilla's Gecko layout engine and most other browsers, which use interfaces
native to their respective platforms (Galeon and Epiphany use GTK+; K-Meleon uses MFC; and Camino
uses Cocoa). Many of these projects were started before Firefox, and probably served as inspiration.
Although the Mozilla Foundation had intended to make the Mozilla Suite obsolete and replace it with
Firefox, the Foundation continued to maintain the suite until April 12, 2006 because it had many corporate users
and was bundled with other software. The Mozilla community (as opposed to the Foundation) continues to
release new versions of the suite, using the product name SeaMonkey to avoid confusion with the original
Mozilla Suite.
On February 5, 2004, business and IT consulting company AMS categorized Mozilla Firefox (then known
as Firebird) as a "Tier 1" ("Best of Breed") open source product, considering it technically strong and virtually
risk-free.
The project which became Firefox started as an experimental branch of the Mozilla Suite
called m/b (or mozilla/browser). After it had been sufficiently developed, binaries for public testing appeared in
September 2002 under the name Phoenix.
The Phoenix name was kept until April 14, 2003, when it was changed because of a trademark dispute
with the BIOS manufacturer, Phoenix Technologies (which produces a BIOS-based browser called Phoenix
First Ware Connect). The new name, Firebird, met with mixed reactions, particularly as the Firebird database
server already carried the name. In response, the Mozilla Foundation stated that the browser should always bear
the name Mozilla Firebird to avoid confusion with the database software. Continuing pressure from the Firebird
community forced another change, and on February 9, 2004 the project was renamed Mozilla
Firefox (or Firefox for short).
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page22
The name "Firefox" (a reference to the red panda)was chosen for its similarity to "Firebird", but also for
its uniqueness in the computing industry. To ensure that no further name changes would be necessary, the
Mozilla Foundation began the process of registering Firefox
as a trademark with the United States Patent and Trademark Office in December 2003. This trademark process
led to a delay of several months in the release of Firefox 0.8 when the foundation discovered that Firefox had
already been registered as a trademark in the UK for Charlton Company software. The situation was resolved
when the foundation was given a license to use Charlton's European trademark.
Konqueror
Konqueror is a web browser and
file manager that provides file-viewer
functionality to a wide variety of things:
local files, files on a remote ftp server
and files in a disk image. It is designed
as a core part of the KDE desktop
environment. It is developed by volunteers
and can run on most Unix-like operating
systemsand on Windows systems, too.
Konqueror, along with the rest of the
components in the KDEBase package, is
licensed and distributed under the GNU General Public License version 2.
The name "Konqueror" is a reference to the two primary competitors at the time of the browser's first
release: "first comes the Navigator, thenExplorer, and then the Konqueror". It also follows the KDE naming
convention: the names of most KDE programs begin with the letter K.
Konqueror came with the version 2 of KDE, released on October 23, 2000. It replaces its predecessor,
KFM (KDE file manager). With the release of KDE4, Konqueror was replaced as a file manager by Dolphin.
Lynx
Lynx is a text-based web browser
for use on cursor-addressable character cell
terminals and is very configurable.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page23
Browsing in Lynx consists of
highlighting the chosen link using cursor
keys, or having all links on a page
numbered and entering the chosen link's
number. Current versions support SSL and
many HTML features. Tables are formatted
using spaces, while frames are identified
by name and can be explored as if they were separate pages. Lynx cannot inherently display various types of
non-text content on the web, such as images and video, but it can launch external programs to handle it, such as
an image viewer or a video player.
Because of its text-to-speech–friendly interface, Lynx was once popular with visually impaired users,
but better screen readers have reduced the appeal of this application. Lynx is also used to check for usability of
websites in older browsers. It is still included in a number of Unix products and Linux distributions, and is
particularly useful for reading documentation or downloading files when only a text-based environment is
available. It is also useful for accessing websites from a remotely connected system in which no graphical
display is available. Despite its text-only nature and age, it can still be used to effectively browse much of the
modern web, including performing interactive tasks such as editing Wikipedia. The speed benefits of text-only
browsing are most apparent when using low bandwidth internet connections, or older computer hardware that
may be slow to render image-heavy content.
Self Check – 2 Written Test
Name: ______________________________________ Date:
________________________________________
Time started: _______________________________ Time finished:
_______________________________
Directions: Answer all the questions listed below.
1. Give at least five common web browsers that you know. (5 points)
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page24
2. It is a series of graphical web browsers developed by Microsoft and included as part of the Microsoft
Windows line of operating systems, starting in 1995.
(1 point)
3. It is a free and open source web browser and the second most widely used browser worldwide.(1 point)
4. This browser is also known as Mozilla Firefox. (1 point)
5. It is a web browser and Internet suite. It handles common Internet-related tasks such as displaying web sites,
sending and receiving e-mail messages, managing contacts, chatting on IRC, downloading files
via BitTorrent, and reading web feeds. It is offered free of charge for personaland mobile phones.(1 point)
6. It is a text-based web browser for use on cursor-addressable character cell terminals and is very configurable.
(1 point)
7.What three file-viewer functionalities do the Konqueror browser provides?(3 point)
Note: Satisfactory rating - 10 points, Unsatisfactory - below 10 points
You can ask you teacher for the copy of the correct answer
Self Check – 2 Written Test
Answer keys:
1. Any five browsers among the list :Netscape Navigator, Internet Explorer, Mozilla, Opera, Galleon, Phoenix,
Konqueror, Lynx.
2. Windows Internet Explorer
3. Mozilla Firefox
4. Phoenix
5. Opera
6. Lynx
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page25
7. local files, files on a remote ftp server and files in a disk image.
Information Sheet-3 Basic Internet Settings and configuration
Home page
The term home page is used to refer to the page that is the default page of any website. It is the main
page of a complex website.
Setting-up your home page means that when you open your web browser, the web page that you have
set will be immediately launched by your browser. The most common site
that you often use will be your consideration for setting-up your home page. So every time you will open your
browser, it will automatically go to your favorite site.
Location of Temporary Files
Webpages are stored in a temporary Internet files folder the first time you view them in your web
browser. This speeds up the display of pages you frequently visit or have already seen, because Internet
Explorer can open them from your hard disk instead of from the Internet.
Privacy Level
Internet Explorer offers a number of features to help protect your security and privacy when you browse
the web.
Under Settings, there were several privacy level options you can choose:
 Block All Cookies. Internet Explorer prevents all Web sites from storing cookies on your computer, and
Web sites cannot read existing cookies on your computer. Per-site privacy actions do not override these
settings.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page26
 High. Internet Explorer prevents Web sites from storing cookies that do not have a compact privacy
policy—a condensed computer-readable P3P privacy statement. The browser prevents Web sites from
storing cookies that use personally identifiable information without your explicit consent. Per-site
privacy actions override these settings.
 Medium High. Internet Explorer prevents Web sites from storing third-party cookies that do not have a
compact privacy policy or that use personally identifiable information without your explicit consent. The
browser prevents Web sites from storing first-party cookies that use personally identifiable information
without your implicit consent. The browser also restricts access to first-party cookies that do not have a
compact privacy policy so that they can only be read in the first-party context. Per-site privacy actions
override these settings.
 Medium (default). Internet Explorer prevents Web sites from storing third-party cookies that do not
have a compact privacy policy or that use personally identifiable information without your implicit
consent. The browser allows first-party cookies that use personally identifiable information without your
implicit consent but deletes these cookies from your computer when you close the browser. The browser
also restricts access to first-party cookies that do not have a compact privacy policy so that they can only
be read in the first-party context. Per-site privacy actions override these settings.
 Low. Internet Explorer allows Web sites to store cookies on your computer, including third-party
cookies that do not have a compact privacy policy or that use personally identifiable information without
your implicit consent. When you close the browser, though, it deletes these third-party cookies from
your computer. The browser also restricts access to first-party cookies that do not have a compact
privacy policy so that they can only be read in the first-party context. Per-site privacy actions override
these settings.
 Accept All Cookies. Internet Explorer allows all Web sites to store cookies on your computer, and Web
sites that create cookies on your computer can read them. Per-site privacy actions do not override these
settings.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page27
Security Level
Why are security settings for web browsers important?
Your web browser is your primary connection to the rest of the internet, and multiple applications may
rely on your browser, or elements within your browser, to function. This makes the security settings within your
browser even more important. Many web applications try to enhance your browsing experience by enabling
different types of functionality, but this functionality might be unnecessary and may leave you susceptible to
being attacked. The safest policy is to disable the majority of those features unless you decide they are
necessary. If you determine that a site is trustworthy, you can choose to enable the functionality temporarily and
then disable it once you are finished visiting the site.
While every application has settings that are selected by default, you may discover that your browser
also has predefined security levels that you can select. For example, Internet Explorer offers custom settings
that allow you to select a particular level of security; features are enabled or disabled based on your selection.
Even with these guides, it is helpful to have an understanding of what the different terms mean so that you can
evaluate the features to determine which settings are appropriate for you.
How do you know what your settings should be?
Ideally, you would set your security for the highest level possible. However, restricting certain features
may limit some web pages from loading or functioning properly. The best approach is to adopt the highest level
of security and only enable features when you require their functionality.
What do the different terms mean?
Different browsers use different terms, but here are some terms and options you may find:
 Zones - Your browser may give you the option of putting web sites into different segments, or zones,
and allow you to define different security restrictions for each zone.
For example, Internet Explorer identifies the following zones:
 Internet - This is the general zone for all public web sites. When you browse the internet, the settings
for this zone are automatically applied to the sites you visit. To give you the best protection as you
browse, you should set the security to the highest level; at the very least, you should maintain a medium
level.
 Local intranet - If you are in an office setting that has its own intranet, this zone contains those internal
pages. Because the web content is maintained on an internal web server, it is usually safe to have less
restrictive settings for these pages. However, some viruses have tapped into this zone, so be aware of
what sites are listed and what privileges they are being given.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page28
 Trusted sites - If you believe that certain sites are designed with security in mind, and you feel that
content from the site can be trusted not to contain malicious materials, you can add them to your trusted
sites and apply settings accordingly. You may also require that only sites that implement Secure Sockets
Layer (SSL) can be active in this zone. This permits you to verify that the site you are visiting is the site
that it claims to be. This is an optional zone but may be useful if you personally maintain multiple web
sites or if your organization has multiple sites. Even if you trust them, avoid applying low security levels
to external sites—if they are attacked, you might also become a victim.
 Restricted sites - If there are particular sites you think might not be safe, you can identify them and
define heightened security settings. Because the security settings may not be enough to protect you, the
best precaution is to avoid navigating to any sites that make you question whether or not they're safe.
 JavaScript - Some web sites rely on web scripts such as JavaScript to achieve a certain appearance or
functionality, but these scripts may be used in attacks.
 Java and ActiveX controls - These programs are used to develop or execute active content that
provides some functionality, but they may put you at risk.
 Plug-ins - Sometimes browsers require the installation of additional software known as plug-ins to
provide additional functionality. Like Java and ActiveX controls, plug-ins may be used in an attack, so
before installing them, make sure that they are necessary and that the site you have to download them
from is trustworthy.
You may also find options that allow you to take the following security measures:
 Manage cookies - You can disable, restrict, or allow cookies as appropriate. Generally, it is best to
disable cookies and then enable them if you visit a site you trust that requires them.
 Block pop-up windows - Although turning this feature on could restrict the functionality of certain web
sites, it will also minimize the number of pop-up ads you receive, some of which may be malicious.
Setting the types of connection
Internet Connection settings are used to configure how the Web browser will connect to the Internet.
These settings are available from the Internet Options window.
The Connections tab will list anyInternet connections currently configuredon the computer, including
dial-up andVirtual Private Network (VPN) connections.If a connection to the Internet is through a proxy server,
you can use the LAN Settings button to configure the required proxy settings.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page29
These settings are summarized below.
 Automatically detect settings: Proxy Settings and configuration settings are automatically detected.
 Use automatic configuration script: Settings are retrieved from a file created by the network
administrator. You must also specify the URL to the file or file name.
 Use a proxy server for your LAN: Specifies that Internet Explorer must connect to the Internet through a
proxy server. Provide the address and port number of the proxy server. By selecting the Advance button,
you can configure which proxy server and port number to use for different protocols such as HTTP and
FTP. You can then create an exception list. When accessing computers on the exception list, the proxy
server is not used.
 Bypass proxy server for local addresses: Select this option if you do not want to use a proxy server for a
local (intranet) addresses. Selecting this option can improve performance when accessing computers on
your intranet.
The connection settings also allow you to configure what Internet Explorer should do when a
connection to the Internet is needed. These settings include:
 Never dial a connection – Internet Explorer will not automatically establish a connection when one is
not present but required. A connection must be established manually.
 Dial whenever a network connection is not present – Internet Explorer will attempt to establish a
connection using your default dial-up connections when a network connection is not available.
 Always dial my default connection – Internet Explorer will always attempt to connect using your
default dial-up networking connection.
Setting Browsing History
As you browse the Internet, each of the items you view was saved locally on your hard disk drive. This
helps web pages you visit frequently load faster by loading the files from youhard disk drive instead of having
to downloading the web page again. To conserve hard disk drive space or to help keep their Internet browsing
private, users may find it necessary to delete their Internet History, below is how to do this.
Adjusting display/view modes
In recent versions, Windows Internet Explorer has dramatically improved support for established and
emerging industry standards, such as HTML5, Cascading Style Sheets (CSS), Level 3 (CSS3), and Scalable
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page30
Vector Graphics (SVG). By default, Internet Explorer properly displays webpages designed to support these
standards. Because some of these standards are still evolving, older websites may not fully support them. In
addition, later versions of certain standards specify different behaviors than earlier versions of the same
standard.
As a result, websites designed to support the earlier versions of these standards may display differently
when viewed with web browsers designed to support current versions of the standards, such as Internet
Explorer. In order to help such websites display correctly, Internet Explorer supports a display mode
called Compatibility View, which displays webpages as if they were viewed by an earlier version of the
browser.
Customize the Internet Explorer toolbars
Internet Explorer has several toolbars, including the Menu bar, the Favorites or Links bar, and the
Command bar. There is also the Address bar, where you can type a web address, and the status bar, which
displays messages such as a webpage's download progress. All of these toolbars can be customized in one way
or another.
Assessing and Retrieving Site Data
What Are Cookies?
Cookies are small files which are stored on a user's computer. They are designed to hold a modest
amount of data specific to a particular client and website, and can be accessed either by the web server or the
client computer. This allows the server to deliver a page tailored to a particular user, or the page itself can
contain some script which is aware of the data in the cookie and so is able to carry information from one visit to
the website (or related site) to the next.
What's in a Cookie?
Each cookie is effectively a small lookup table containing pairs of (key, data) values - for example (first
name, John) (last name, Smith). Once the cookie has been read by the code on the server or client computer, the
data can be retrieved and used to customize the web page appropriately.
When are Cookies Created?
Writing data to a cookie is usually done when a new webpage is loaded - for example after a 'submit'
button is pressed the data handling page would be responsible for storing the values in a cookie. If the user has
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page31
elected to disable cookies then the write operation will fail, and subsequent sites which rely on the cookie will
either have to take a default action, or prompt the user to re-enter the information that would have been stored in
the cookie.
Why are Cookies Used?
Cookies are a convenient way to carry information from one session on a website to another, or between
sessions on related websites, without having to burden a server machine with massive amounts of data storage.
Storing the data on the server without using cookies would also be problematic because it would be difficult to
retrieve a particular user's information without requiring a login on each visit to the website.
If there is a large amount of information to store, then a cookie can simply be used as a means to identify
a given user so that further related information can be looked up on a server-side database. For example the first
time a user visits a site they may choose a username which is stored in the cookie, and then provide data such as
password, name, address, preferred font size, page layout, etc. - this information would all be stored on the
database using the username as a key. Subsequently when the site is revisited the server will read the cookie to
find the username, and then retrieve all the user's information from the database without it having to be re-
entered.
Loading Images
Images on a web page often make the page load more slowly, especially if you have a relatively slow
connection (e.g., a dial-up connection). To decrease the time it takes to load a page by preventing images from
loading you would need to disable loading of images. But for many instances, you would need to load images
to your browser.
Opening URL
Each time that you type a URL in the address bar or click on a link in Internet Explorer browser, the
URL address is automatically added to the history index file. When you type a sequence of characters in the
address bar, Internet Explorer automatically suggests you all URLs that begin with characters sequence that you
typed (unless AutoComplete feature for Web addresses is turned off). However, Internet Explorer doesn't allow
you to view and edit the entire URL list that it stores inside the history file.
This utility reads all information from the history file on your computer, and displays the list of all
URLs that you have visited in the last few days. It also allows you to select one or more URL addresses, and
then remove them from the history file or save them into text, HTML or XML file. In addition, you are allowed
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page32
to view the visited URL list of other user profiles on your computer, and even access the visited URL list on a
remote computer, as long as you have permission to access the history folder.
Deleting Cookies and Browsing History
A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin
website to send state information to a user's browser and for the browser to return the state information to the
origin site. The state information can be used for authentication, identification of a user session, user's
preferences,shopping cart contents, or anything else that can be accomplished through storing text data.
Cookies are not software. They cannot be programmed, cannot carry viruses, and cannot install malware
on the host computer. However, they can be used byspyware to track user's browsing activities – a major
privacy concern that prompted European and US law makers to take action. Cookies could also be stolen
by hackers to gain access to a victim's web account, thus, the need to delete cookies.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page33
Self Check – 3 Written Test
Name: ______________________________________ Date:
________________________________________
Time started: _______________________________ Time finished:
_______________________________
Directions: Answer all the questions listed below.
1. What do you call a page that when you set, it will automaticallybe launched by your browser when you open
it.(1 point)
2. What are the 6 privacy level options? (6 points)
3. What is the default privacy level setting? (1 point)
4. This settings are used to configure how the Web browser will connect to the Internet. These settings are
available from the Internet Options window.
(1 point)
5. It is a Proxy Settings and configuration settings are automatically detected.
(1 point)
6. It is a Proxy Settings when you do not want to use a proxy server for a local (intranet) addresses. Selecting
this option can improve performance when accessing computers on your intranet.(1 point)
7.
Note: Satisfactory rating - 25 points, Unsatisfactory - below 25 points
You can ask you teacher for the copy of the correct answer
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page34
Self Check – 3 Written Test
Answer keys:
1. Home page
2. Block All Cookies, High, Medium High, Medium, Low, Accept All Cookies
3. Medium
4. Internet Connection
5. Automatically detect settings
6. Bypass proxy server for local addresses
Operation Sheet Basic internet settings and configuration
Setting-up your Home page
To do it, follow the steps below:
1. On your browser, go to tools, then options
2. On the Internet Options, click on the General tab
3. Type the address that you what for your home page
then click Apply then OK
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page35
Location of Temporary Files
This information applies to Windows Internet Explorer 7 and Windows Internet Explorer 8.
To view temporary Internet files
1. Open your Internet Explorer
2. Click the Tools button, and then click
Internet Options.
3. Click the General tab, and then, under
Browsing history, click Settings.
4. In the Settings dialog box,
click View files.
Setting the Privacy Level
1. Open your Internet Explorer.
2. Click the Tools button, and then click
Internet Options.
3. Click the Privacy tab.
4. Under Settings, do either of the following:
 To allow or block cookies from specific
websites, click Sites.
 To load a customized settings file, click
Import. These are files that modify the rules that Internet Explorer uses handle cookies. Since these files
can override default settings, you should only import them if you know and trust the source.
Under Settings, move the slider to the privacy level you want:
 Block All Cookies.
 High.
 Medium High
 Medium (default)
 Low.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page36
 Accept All Cookies.
5. When you are finished making changes to your privacy settings, click OK.
Setting the Security Level
1. Open your Internet Explorer.
2. Click the Tools button, and then
click Internet Options.
3. Click the Security tab.
4. Click the Internet icon.
5. Do one of the following:
 To pick a preset security level, move the slider.
 To change individual security settings,
click Custom level. Change the settings as
desired and click OK when you are done.
 To set Internet Explorer back to the default
security level, click Default level.
 Click Reset all zones to default level to clear
any custom settings.
6. When you are finished making changes to the security settings, click OK.
Setting the types of connection
1. Open your Internet Explorer.
2. Click the Tools button, and then
click Internet Options.
3. Click the Connections tab.
4. Click Apply then Ok when done.
These settings are summarized below.
 Automatically detect settings
 Use automatic configuration
script:
 Use a proxy server for your LAN
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page37
 Bypass proxy server for local addresses
How to configure Internet Explorer when a connection to the Internet is needed:
 Never dial a connection
 Dial whenever a network connection is not present
 Always dial my default connection
Setting Browsing History
Viewing History using Internet Explorer
 Microsoft Internet Explorer 7 and above users can view their history files by
clicking the "Tools" menu, "Internet Options", clicking the "Settings" button under
the Browsing history, and then clicking the "View Files" button.
 Microsoft Internet Explorer 6.x users can view their history files by clicking the
"Tools" menu, "Internet Options", clicking the "Settings" button, and then clicking
the "View Files" button.
Deleting History
 Microsoft Windows users running Microsoft Internet Explorer 6.x and 7.x can
delete their history files by clicking the "Tools" menu, "Internet Options", and
clicking the "Delete Files" or "Delete" button. Users also have the option of
automatically deleting files each time the close the browser window by clicking the
"Advanced" tab and checking "Empty Temporary Internet Files folder when browser
is closed" under the "Security" section.
 Microsoft Internet Explorer 4.x users on an Apple Macintosh can delete the history
by clicking the "Hard Drive" icon, "System", "Preferences", "Explorer", and moving
the history file into the trash.
 Microsoft Internet Explorer 3.02 and lower users can delete their history by
clicking the "View" menu, "Options", open the tab "Advanced", click the "Settings"
tab, and click the "Empty Folder" button.
Viewing History using Internet Mozilla Firefox
Viewing History
Press Ctrl + H to open the left-side history bar. or
Click History at the top of the window. or
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page38
Users using earlier versions of Mozilla Firefox can also view their history by clicking "Go" and clicking
"History."
Deleting History
Mozilla Firefox users can clear their history by clicking the "Tools" menu, "Options", clicking the
"Privacy" button, and under "History" click the "Clear" or "Clear Now" button. or
Press CTRL + Shift + DEL to open the Clear Data Window.
Adjusting display/view modes
The following list describes different ways that enable Compatibility View:
 You click the Compatibility View button in the Address bar when viewing a webpage. When displayed,
this button appears to the left of theRefresh button and contains an image of a broken piece of paper.
This enables Compatibility View for all documents in the domain of the website being viewed.
 The "Display all websites in Compatibility Mode setting" in the Compatibility View Settings is enabled.
 The "Automatically recover from page layout errors with Compatibility View" setting is enabled and a
webpage stops responding or crashes the browser. When this happens, Internet Explorer opens the page
in Compatibility View after recovering from the problem.
 Group policies that identify sites to be opened in Compatibility View are enabled by the administrator of
your computer.
 You have used the F12 developer tools to change the browser mode to identify Internet Explorer as an
earlier version of the browser.
 The Compatibility View List is enabled, which defines a list of websites that are automatically displayed
in Compatibility View.
The Compatibility View List contains a number of websites known to have problems when viewed, by
default, with Internet Explorer; when Internet Explorer opens a webpage from a site on the Compatibility View
List, it automatically displays the page in a way that allows it to be viewed correctly.
Modify Toolbars
Show or hide the Internet Explorer toolbars
You can show or hide the Menu bar, Favorites or Links bar, Command bar, and status bar. Here's how:
1. Open Internet Explorer by clicking the Start button , and then clicking Internet Explorer.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page39
2. Click the Tools button, point to Toolbars, and then click the toolbar you want to show or hide.
3. Customize the Command bar
The Command bar is located at the upper-right side of the Internet Explorer window and offers easy
access to almost any setting or feature in Internet Explorer. You can customize the Command bar buttons to suit
your preferences.
To change the buttons on the Command bar
1. Open Internet Explorer by clicking the Start button , and then clicking Internet Explorer.
2. In Internet Explorer 8, right-click the Command bar, point to Customize, and then click Add or
Remove Commands. In Internet Explorer 7, right-click the Command bar, point to Customize
Command Bar, and then click Add or Remove Commands.
3. Make one or more of the following changes:
 To add a button, click the button you want to add in the Available toolbar buttons list, and
then click Add.
 To remove a button, click the button you want to remove in the Current toolbar
buttons list, and then click Remove.
 To change the order in which buttons are displayed, click a button in theCurrent toolbar
buttons list, and then click either Move Up or Move Down.
 To restore the Command bar buttons to their default settings, click Reset.
4. When you're done, click Close.
You should see your changes immediately. If you've added a lot of buttons, you might need to resize the
Command bar to see them all.
Assessing and Retrieving Site Data
How do I Enable or Disable Cookies?
This section will tell you how to enable cookies (turning cookies on) and also how to disable them.
Since cookies are maintained by your web browser, the method of enabling or disabling them will vary
depending on which browser you are using.
Microsoft Internet Explorer 8.0
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page40
Select the 'Tools->Internet Options' menu item, and then open the 'Privacy' tab - you can then adjust the
slider to block or allow various categories of cookie. Alternatively by clicking 'Advanced...' you can exercise
finer control over the browser's behavior, choosing whether to accept, block, or prompt for cookies originating
either on the website you are visiting (first party cookies) or originating from websites other than the one you
are visiting (third party cookies, typically used by banner advertisements hosted on an advertiser's website).
Loading Images
To enable that follow these steps: for Internet Explorer 5.x and later for Windows:
1. From the Tools menu, select Internet Options... .
If the menu bar is hidden, press Alt to make it visible.
2. In the window that appears, select the Advanced tab.
3. Scroll down the list to "Multimedia", and check Show Pictures.
4. Click OK.
Opening URL
For Internet Explorer 5
1. Open Internet Explorer.
2. Click to highlight whatever is in the address bar (the big white space at the top of the window, next to the
word "Address").
3. Type the Internet address over it, or press Delete on your keyboard and then type.
4. Press Enter on your keyboard to go to the page.
Deleting Cookies and Browsing History – for Internet Explorer 8
Once your browser is open, select the Tools menu and click Internet Options and select the General tab.
1. To delete all cookies, in the Browsing History section, click Delete....
2. Uncheck the top Preserve Favorite Website Data box.
3. Then check the box next to Cookies.... Check the other boxes at your own discretion.
4. Click Delete.
If you wish to delete only specific cookies and keep others, instead of Step 2:
1. Click the Settings button, then click View Files.
2. Scroll through the list and select the cookies you want to delete.
3. Multiple cookies can be selected by holding down the CTRL key while clicking.
WOLKITE POLYTECHNIC COLLAGE
Training, Teaching and Learning Material
DEPARTMENT OF ICT: - INFO-GENUINE QCC Page41
4. Press the Delete key.
5. Press OK on any dialog boxes that appear.
Or
Hit Ctrl+Shift+Delete

Weitere ähnliche Inhalte

Was ist angesagt?

PST SC015 Chapter 3 Internet Technology (IV) 2017/2018
PST SC015 Chapter 3 Internet Technology (IV)  2017/2018PST SC015 Chapter 3 Internet Technology (IV)  2017/2018
PST SC015 Chapter 3 Internet Technology (IV) 2017/2018Fizaril Amzari Omar
 
Lesson 6 fundamentals of internet and java programming (140 kb)
Lesson 6  fundamentals of internet and java programming (140 kb)Lesson 6  fundamentals of internet and java programming (140 kb)
Lesson 6 fundamentals of internet and java programming (140 kb)IMRAN KHAN
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018Fizaril Amzari Omar
 
Introduction to internet (239 kb)
Introduction to internet (239 kb)Introduction to internet (239 kb)
Introduction to internet (239 kb)IMRAN KHAN
 
IJSRED-V2I2P20
IJSRED-V2I2P20IJSRED-V2I2P20
IJSRED-V2I2P20IJSRED
 
Md.sajal khan(182482510)
Md.sajal khan(182482510)Md.sajal khan(182482510)
Md.sajal khan(182482510)SajalKhan18
 
182482527, md najmul hasan
182482527, md najmul hasan 182482527, md najmul hasan
182482527, md najmul hasan MD Najmul Hasan
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018Fizaril Amzari Omar
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and serviceslearnt
 
Internet Training For Teachers
 Internet Training For Teachers Internet Training For Teachers
Internet Training For TeachersGNSHI
 

Was ist angesagt? (20)

PST SC015 Chapter 3 Internet Technology (IV) 2017/2018
PST SC015 Chapter 3 Internet Technology (IV)  2017/2018PST SC015 Chapter 3 Internet Technology (IV)  2017/2018
PST SC015 Chapter 3 Internet Technology (IV) 2017/2018
 
web technology
 web technology web technology
web technology
 
Lesson 6 fundamentals of internet and java programming (140 kb)
Lesson 6  fundamentals of internet and java programming (140 kb)Lesson 6  fundamentals of internet and java programming (140 kb)
Lesson 6 fundamentals of internet and java programming (140 kb)
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
 
Social network
Social networkSocial network
Social network
 
Introduction to internet (239 kb)
Introduction to internet (239 kb)Introduction to internet (239 kb)
Introduction to internet (239 kb)
 
IJSRED-V2I2P20
IJSRED-V2I2P20IJSRED-V2I2P20
IJSRED-V2I2P20
 
Md.sajal khan(182482510)
Md.sajal khan(182482510)Md.sajal khan(182482510)
Md.sajal khan(182482510)
 
182482527, md najmul hasan
182482527, md najmul hasan 182482527, md najmul hasan
182482527, md najmul hasan
 
3.2.1 The Internet
3.2.1 The Internet3.2.1 The Internet
3.2.1 The Internet
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Internet
InternetInternet
Internet
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and services
 
Internet
InternetInternet
Internet
 
unit-5 (2).pdf
unit-5 (2).pdfunit-5 (2).pdf
unit-5 (2).pdf
 
Internet Training For Teachers
 Internet Training For Teachers Internet Training For Teachers
Internet Training For Teachers
 
Assignment on internet
Assignment on internetAssignment on internet
Assignment on internet
 

Andere mochten auch

Anza dottore salvatore anza' condannato a 18 mesi reg sent 5455 2012 udienza ...
Anza dottore salvatore anza' condannato a 18 mesi reg sent 5455 2012 udienza ...Anza dottore salvatore anza' condannato a 18 mesi reg sent 5455 2012 udienza ...
Anza dottore salvatore anza' condannato a 18 mesi reg sent 5455 2012 udienza ...Pino Ciampolillo
 
Piano aria regione sicilia audizioni in commissione territorio ambiente inter...
Piano aria regione sicilia audizioni in commissione territorio ambiente inter...Piano aria regione sicilia audizioni in commissione territorio ambiente inter...
Piano aria regione sicilia audizioni in commissione territorio ambiente inter...Pino Ciampolillo
 
Piani qualita' dell'aria indici dei piani regioni sicilia abruzzo lombardia c...
Piani qualita' dell'aria indici dei piani regioni sicilia abruzzo lombardia c...Piani qualita' dell'aria indici dei piani regioni sicilia abruzzo lombardia c...
Piani qualita' dell'aria indici dei piani regioni sicilia abruzzo lombardia c...Pino Ciampolillo
 
Piano aria sicilia capitolo 7 pag 219 a 233 righe copiate dal piano veneto ...
Piano aria sicilia capitolo 7 pag 219  a 233  righe copiate dal piano veneto ...Piano aria sicilia capitolo 7 pag 219  a 233  righe copiate dal piano veneto ...
Piano aria sicilia capitolo 7 pag 219 a 233 righe copiate dal piano veneto ...Pino Ciampolillo
 
Mozione movimento 5 stelle assemblea regionale siciliana ritiro dal sito re...
Mozione movimento 5 stelle assemblea regionale siciliana ritiro  dal sito  re...Mozione movimento 5 stelle assemblea regionale siciliana ritiro  dal sito  re...
Mozione movimento 5 stelle assemblea regionale siciliana ritiro dal sito re...Pino Ciampolillo
 
Evaluation Question 3
Evaluation Question 3Evaluation Question 3
Evaluation Question 3ReeReeLaFleur
 
Piano aria sicilia il copiato riga dopo riga non solo dal piano aria del veneto
Piano aria sicilia il copiato riga dopo riga  non solo dal piano aria del venetoPiano aria sicilia il copiato riga dopo riga  non solo dal piano aria del veneto
Piano aria sicilia il copiato riga dopo riga non solo dal piano aria del venetoPino Ciampolillo
 
Decreto emissioni schema di decreto legislativo recante recepimento della dir...
Decreto emissioni schema di decreto legislativo recante recepimento della dir...Decreto emissioni schema di decreto legislativo recante recepimento della dir...
Decreto emissioni schema di decreto legislativo recante recepimento della dir...Pino Ciampolillo
 
Piano aria regione sicilia interrogazioni parlamento europeo
Piano aria regione sicilia interrogazioni parlamento europeoPiano aria regione sicilia interrogazioni parlamento europeo
Piano aria regione sicilia interrogazioni parlamento europeoPino Ciampolillo
 
Tirreno power vado ligure gazzetta ufficiale 5 gennaio 2013 decreto ministeri...
Tirreno power vado ligure gazzetta ufficiale 5 gennaio 2013 decreto ministeri...Tirreno power vado ligure gazzetta ufficiale 5 gennaio 2013 decreto ministeri...
Tirreno power vado ligure gazzetta ufficiale 5 gennaio 2013 decreto ministeri...Pino Ciampolillo
 
Documento confutazione ctu aggiornato 24 12 12 _3_
Documento confutazione ctu aggiornato 24 12 12 _3_Documento confutazione ctu aggiornato 24 12 12 _3_
Documento confutazione ctu aggiornato 24 12 12 _3_Pino Ciampolillo
 
Scioglimento c.c. isola scioglimento consiglio comunale isola porto isola bil...
Scioglimento c.c. isola scioglimento consiglio comunale isola porto isola bil...Scioglimento c.c. isola scioglimento consiglio comunale isola porto isola bil...
Scioglimento c.c. isola scioglimento consiglio comunale isola porto isola bil...Pino Ciampolillo
 
Cannova gianfranco dic 2008 drs996
Cannova gianfranco dic  2008 drs996Cannova gianfranco dic  2008 drs996
Cannova gianfranco dic 2008 drs996Pino Ciampolillo
 
Piano aria sicilia errori refusi o copiature decreto 43 gab del 12 marzo 2008
Piano aria sicilia errori refusi o copiature decreto 43 gab del 12 marzo 2008Piano aria sicilia errori refusi o copiature decreto 43 gab del 12 marzo 2008
Piano aria sicilia errori refusi o copiature decreto 43 gab del 12 marzo 2008Pino Ciampolillo
 

Andere mochten auch (15)

Anza dottore salvatore anza' condannato a 18 mesi reg sent 5455 2012 udienza ...
Anza dottore salvatore anza' condannato a 18 mesi reg sent 5455 2012 udienza ...Anza dottore salvatore anza' condannato a 18 mesi reg sent 5455 2012 udienza ...
Anza dottore salvatore anza' condannato a 18 mesi reg sent 5455 2012 udienza ...
 
Learning 2
Learning 2Learning 2
Learning 2
 
Piano aria regione sicilia audizioni in commissione territorio ambiente inter...
Piano aria regione sicilia audizioni in commissione territorio ambiente inter...Piano aria regione sicilia audizioni in commissione territorio ambiente inter...
Piano aria regione sicilia audizioni in commissione territorio ambiente inter...
 
Piani qualita' dell'aria indici dei piani regioni sicilia abruzzo lombardia c...
Piani qualita' dell'aria indici dei piani regioni sicilia abruzzo lombardia c...Piani qualita' dell'aria indici dei piani regioni sicilia abruzzo lombardia c...
Piani qualita' dell'aria indici dei piani regioni sicilia abruzzo lombardia c...
 
Piano aria sicilia capitolo 7 pag 219 a 233 righe copiate dal piano veneto ...
Piano aria sicilia capitolo 7 pag 219  a 233  righe copiate dal piano veneto ...Piano aria sicilia capitolo 7 pag 219  a 233  righe copiate dal piano veneto ...
Piano aria sicilia capitolo 7 pag 219 a 233 righe copiate dal piano veneto ...
 
Mozione movimento 5 stelle assemblea regionale siciliana ritiro dal sito re...
Mozione movimento 5 stelle assemblea regionale siciliana ritiro  dal sito  re...Mozione movimento 5 stelle assemblea regionale siciliana ritiro  dal sito  re...
Mozione movimento 5 stelle assemblea regionale siciliana ritiro dal sito re...
 
Evaluation Question 3
Evaluation Question 3Evaluation Question 3
Evaluation Question 3
 
Piano aria sicilia il copiato riga dopo riga non solo dal piano aria del veneto
Piano aria sicilia il copiato riga dopo riga  non solo dal piano aria del venetoPiano aria sicilia il copiato riga dopo riga  non solo dal piano aria del veneto
Piano aria sicilia il copiato riga dopo riga non solo dal piano aria del veneto
 
Decreto emissioni schema di decreto legislativo recante recepimento della dir...
Decreto emissioni schema di decreto legislativo recante recepimento della dir...Decreto emissioni schema di decreto legislativo recante recepimento della dir...
Decreto emissioni schema di decreto legislativo recante recepimento della dir...
 
Piano aria regione sicilia interrogazioni parlamento europeo
Piano aria regione sicilia interrogazioni parlamento europeoPiano aria regione sicilia interrogazioni parlamento europeo
Piano aria regione sicilia interrogazioni parlamento europeo
 
Tirreno power vado ligure gazzetta ufficiale 5 gennaio 2013 decreto ministeri...
Tirreno power vado ligure gazzetta ufficiale 5 gennaio 2013 decreto ministeri...Tirreno power vado ligure gazzetta ufficiale 5 gennaio 2013 decreto ministeri...
Tirreno power vado ligure gazzetta ufficiale 5 gennaio 2013 decreto ministeri...
 
Documento confutazione ctu aggiornato 24 12 12 _3_
Documento confutazione ctu aggiornato 24 12 12 _3_Documento confutazione ctu aggiornato 24 12 12 _3_
Documento confutazione ctu aggiornato 24 12 12 _3_
 
Scioglimento c.c. isola scioglimento consiglio comunale isola porto isola bil...
Scioglimento c.c. isola scioglimento consiglio comunale isola porto isola bil...Scioglimento c.c. isola scioglimento consiglio comunale isola porto isola bil...
Scioglimento c.c. isola scioglimento consiglio comunale isola porto isola bil...
 
Cannova gianfranco dic 2008 drs996
Cannova gianfranco dic  2008 drs996Cannova gianfranco dic  2008 drs996
Cannova gianfranco dic 2008 drs996
 
Piano aria sicilia errori refusi o copiature decreto 43 gab del 12 marzo 2008
Piano aria sicilia errori refusi o copiature decreto 43 gab del 12 marzo 2008Piano aria sicilia errori refusi o copiature decreto 43 gab del 12 marzo 2008
Piano aria sicilia errori refusi o copiature decreto 43 gab del 12 marzo 2008
 

Ähnlich wie amaha internet course

The internet
The internetThe internet
The internetAniqa Zai
 
Sai internet ppt
Sai   internet ppt Sai   internet ppt
Sai internet ppt Sai Swamy
 
Computer Assignment Topic-Internet
Computer Assignment Topic-Internet Computer Assignment Topic-Internet
Computer Assignment Topic-Internet ArchDuty
 
How our network_works
How our network_worksHow our network_works
How our network_worksRobin Nappi
 
Computer Literacy Lesson 28
Computer Literacy Lesson 28Computer Literacy Lesson 28
Computer Literacy Lesson 28cpashke
 
Web tehnology
Web tehnologyWeb tehnology
Web tehnologygurchet
 
Societal Impact of Information Technology
Societal Impact of Information TechnologySocietal Impact of Information Technology
Societal Impact of Information Technologyvethics
 
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDIINFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDIAman Dwivedi
 
24.9.14 internet applications notes-miss sushma jaiswal
24.9.14 internet applications notes-miss sushma jaiswal24.9.14 internet applications notes-miss sushma jaiswal
24.9.14 internet applications notes-miss sushma jaiswalVivek Khandelwal
 

Ähnlich wie amaha internet course (20)

Ict u5
Ict u5Ict u5
Ict u5
 
The internet
The internetThe internet
The internet
 
Sai internet ppt
Sai   internet ppt Sai   internet ppt
Sai internet ppt
 
PPt on internet
PPt on internetPPt on internet
PPt on internet
 
Computer Assignment Topic-Internet
Computer Assignment Topic-Internet Computer Assignment Topic-Internet
Computer Assignment Topic-Internet
 
Internet
InternetInternet
Internet
 
How our network_works
How our network_worksHow our network_works
How our network_works
 
Computer Literacy Lesson 28
Computer Literacy Lesson 28Computer Literacy Lesson 28
Computer Literacy Lesson 28
 
PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2
 
Web tehnology
Web tehnologyWeb tehnology
Web tehnology
 
E_commerce_chap_2.pptx
E_commerce_chap_2.pptxE_commerce_chap_2.pptx
E_commerce_chap_2.pptx
 
Assignment - 01
Assignment - 01Assignment - 01
Assignment - 01
 
Networking
NetworkingNetworking
Networking
 
Societal Impact of Information Technology
Societal Impact of Information TechnologySocietal Impact of Information Technology
Societal Impact of Information Technology
 
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDIINFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
 
Md Abdullah al Mamun, 182482034
Md Abdullah al Mamun, 182482034Md Abdullah al Mamun, 182482034
Md Abdullah al Mamun, 182482034
 
Mis pdf
Mis pdfMis pdf
Mis pdf
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
24.9.14 internet applications notes-miss sushma jaiswal
24.9.14 internet applications notes-miss sushma jaiswal24.9.14 internet applications notes-miss sushma jaiswal
24.9.14 internet applications notes-miss sushma jaiswal
 
Powerpoint.pptx
Powerpoint.pptxPowerpoint.pptx
Powerpoint.pptx
 

Kürzlich hochgeladen

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Kürzlich hochgeladen (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

amaha internet course

  • 1. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page1 Ethiopian TVET-System INFORMATION TECHNOLOGY SUPPORT SERVICE Level II LEARNING GUIDE # 1 Unit of Competence: Use and access the Internet Module Title: Use and access the Internet LG Code: ICT ITS2 MO5 LO1- 02 TTLM Code: ICT ITS2 TTLM1 1114
  • 2. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page2 LO 1: Access the Internet Introduction Learning Guide # 1 This learning guide is developed to provide you the necessary information regarding the following content coverage and topics –  Introduction to the internet  Internet browsers review  basic internet settings and configuration This guide will also assist you to attain the learning outcome stated in the cover page. Specifically, upon completion of this Learning Guide, you will be able to –  Open Internet browser and a home page of personal choice set up by setting internet options  Adjust display/view modes to suit personal requirements  Modify toolbar to meet user and browsing needs  Access and retrieve particular site data  Load or unload images depending on modem speed, computer and browser capabilities  Open URL to obtain data and browse link  Delete cookies and history of internet browser as precaution from virus infection Learning Activities 1. Read the specific objectives of this Learning Guide. 2. Read the information written in the “Information Sheets 1”. 3. Accomplish the “Self-check” in page. 4. If you earned a satisfactory evaluation proceed to “Information Sheet 2”. However, if your rating is unsatisfactory, see your teacher for further instructions or go back to Learning Activity #1. 5. Submit your accomplished Self-check. This will form part of your training portfolio. 6. Read the information written in the “Information Sheet 2”.
  • 3. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page3 7. Accomplish the “Self-check” in page. 8. If you earned a satisfactory evaluation proceed to “Information Sheet 3”. However, if your rating is unsatisfactory, see your teacher for further instructions or go back to Learning Activity #2. 9. Submit your accomplished Self-check. This will form part of your training portfolio. 10. Read the information written in the “Information Sheet 3”. 11. If you earned a satisfactory evaluation proceed to “Operation Sheet” in page . However, if your rating is unsatisfactory, see your teacher for further instructions or go back to Learning Activity #3. 12. Read the “Operation Sheet” and try to understand the procedures discussed. 13. You can use your working PC to simulate the activity. 14. Do the “LAP test” in page (if you are ready) and show your output to your teacher. Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice you on additional work. But if satisfactory you can proceed to Learning Guide. Information Sheet-1 Introduction to the internet INTERNET Definition, use, and basic terminologies of Internet The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). The internet is computer based global information system. It is composed of many interconnected computer networks. Each network may link thousands of computers enabling them to share information. The internet has brought a transformation in many aspects of life. It is one of the biggest contributors in making the world into a global village. Use of internet has grown tremendously since it was introduced. It is mostly because of its flexibility. Nowadays one can access the internet easily. Most people have computers in their homes but even the ones who don’t they can always go to cyber cafes where this service is provided. The internet developed from software called the ARPANET which the U.S military had developed. It was only restrict to military personnel and the people who developed it. Only after it was privatized was it allowed to be used commercially. The internet has developed to give many benefits to mankind. The access to information is one of the most important. Student can now have access to libraries around the world. Some charge a fee but most provide
  • 4. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page4 free services. Before students had to spend hours and hours in the libraries but now at the touch of a button students have a huge database in front of them Basic Internet Terms and Terminology Here is a look at the buzzwords of the world of Internet. ARPANET: The acronym stands for Advanced Research Projects Agency Network. ARPA of the United States Department of Defense developed ARPANET, which became the world’s first packet switching network. Internet is the successor of ARPANET. Internet Service Provider: A company, which provides users with an access to the Internet, is known as an Internet service provider or Internet access provider. ISP, as it is called, offers email accounts and other services like remote storage of files for its customers. Here is a word about choosing a cheap ISP. IP Address: It is a way of numerically identifying an entity on a computer network. The original addressing system known as IPv4, used 32 bit addresses. With the growth of the Internet, IPv6 came to be used wherein the addresses are composed of 128 bits. Cyberspace: This term coined by William Gibson, is used to refer to the computer networks connected to each other and the content they host. It is often used to refer to the Internet. WWW: It is a collection of interlinked documents that are accessible over the Internet. It consists of millions of web pages that contain text, images, voice and videos. Sir Tim Berners-Lee, a British scientist working at CERN, created the World Wide Web. Website: A website is a set of web pages consisting of text, audio and video. Web servers host websites. URL: It specifies the location of a resource on the Internet. It consists of the basic address and path. Web Page: Web pages are resources of information. They are generally created in the HTML format and provide the web users with navigational abilities through hyperlinks to other web pages on the web. Home Page: The term home page is used to refer to the page that is the default page of any website. It is the main page of a complex website. Web Browser: A web browser is a software application that facilitates user interaction with the text, audio, video and other information that is located on the web. Cache: Web browsers maintain a cache of recently visited web pages. Some of them use an external proxy web cache, which is a server program through which web requests pass. This enables the browsers to
  • 5. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page5 cache frequently visited pages. Even search engines make available already indexed web pages through their caches. HTTP: Hypertext Transfer Protocol, abbreviated as HTTP, is a communications protocol used for the transfer of information over the Internet. A client makes an HTTP request using a web browser to which an HTTP response is sent from the server. Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged between the web client and the web server. It is sent by the web server to the web client and returned unchanged by the client each time it accesses the server. Session: It is an exchange of information between a computer and its user. It is established for a certain period of time after which it ends. Hyperlink: A reference in a document to another section of the document or to another document is termed as a hyperlink. Hyperlinks are used to redirect the user from one section of a page content to another. Internet Security: It is one of the major concerns today. As the Internet acts as a communication platform that can be accessed by millions of users around the world, it becomes necessary that proper measures be implemented. Issues like Internet Safetythat deal with the content that is made accessible over the Internet are equally important. Internet Privacyrelates to safeguarding the privacy of the web users and the sensitive information on the web from hackers and stalkers. Internet - A communication Platform :Internet serves as one of the most efficient means of communication. Computers from different parts of the world can be connected to each other to exchange information, thanks to the Internet. Emails and chats are excellent means of communication over the Internet. Blogs and online forums give the Internet users a platform to reach out to the masses. Here is a list of the basic Internet terms associated with the Internet as a communication platform. Also look at some Internet terms related to the security threats to network communication. Email: It is a store-and-forward method of writing, sending and receiving written messages. Electronic mail is an Internet e-mail system that uses network-based protocols to exchange messages between network subsystems. Email Address: It identifies the network location to which an email can be delivered. An email address is a combination of the username of the mail user and the host name of the mailing system. It is of the form, ‘username@domain-name’. An email alias is a forwarding email address. It simply forwards emails to specific email addresses.
  • 6. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page6 Spamming: The act of sending unsolicited bulk messages over an email system is known as spamming. It is an undesirable use of the electronic messaging systems. Phishing: It is a fraudulent activity of acquiring the sensitive information by the use of a fake identity during electronic communication. It is implemented by means of emails and instant messages wherein a user is lured to enter his/her details, which are actually captured by a fraudulent website. Hacking: Hacking is the activity of programmatically gaining access to a computer application that is otherwise inaccessible. The act of gaining an unauthorized access to a computer is known as hacking. Hacking of passwords that leads to breach of email privacy is a threat to communication over the Internet. Internet crimesrefer to all the criminal activities that are carried over the Internet. Email Scams: With the increase in the use of email systems, its security needs also rose. Fraudulent users started tampering with the email systems to breach security. Email Virus: It is a computer code that is transmitted through an email in the form of an attachment. The email attachment causes the destruction of some of the files on the receiver computer’s hard disk and is programmatically emailed to the contacts in the address book of the receiver. Internet Bookmark: The Internet browsers of the modern times aim at enabling the users to organize the web pages they access. Links once visited can be saved in the favorites or preferences categories. Bookmarks are usually integrated into browsers. Social bookmarkingis a method used by the Internet users to store and manage web pages. Web Directories: It is a directory, which links to other websites and organizes those links. They should not be mistaken as being search engines. Some Funny and Interesting Internet Terms Googling: The Google search engine, being the most popularly used one, has made the word, ‘google’ synonymous to the concept of search engines. Searching the Internet by using the Google search engine is known as googling. Copypasta: If a text is copy pasted from somewhere and posted in a forum, it is termed as a copypasta. The source is often unknown in such cases. Are you into copypastas? Egosurfer: The web users who search over the Internet for themselves fall under the class of egosurfers. I am sure most of you play an egosurfer once in a while. Netiquette: This term is short for net etiquette and refers to the principles of courtesy and consideration for the people using the Internet. It refers to certain basic principles to adhere to while using the Internet. The
  • 7. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page7 general ethical principles to be followed in relation to using mailing systems of the Internet are termed as email etiquettes. Trasher: The users who search over the Internet using all possible means, sometimes even risking the Internet security are known as trashers. Troll: Trolls are the users who try to become infamous on chat by introducing disturbing links, mimicking other users’ posts and profiles and fighting with others. You tuber: A person who is addicted to watching videos on the Internet is referred to as a you tuber. Makeup and structure of web addresses Web Sites and URLs A Web site is simply data that is stored on a WWW server and which can be freely accessed by people 'surfing the Net'. For instance Microsoft have their own Web site from which you can download information and software. The trouble is that you have to know the address of the Web site; in much the same way as if you want to phone someone you have to know his or her phone number. The address of a Web site is given by something called its URL (Uniform Resource Locator). The structure of the URL is very precise. For instance, if you wish to use your Web browser to visit the Microsoft Web site you would have to use the URL below. http://www.microsoft.com Thus ifyou wish to visit the Web site of the company that produced this training material you would use the URL: http://www.cctglobal.com Due to the very large number of organizations who now have Web sites, you can also use a search engine, in which you can enter a word or phrase connected with what you wish to find and it will then display sites that match the information that you have entered. The results can be overwhelming however. A recent search using the search words "PC courseware" displayed a list of 4.5 million sites containing these words! What is a hyperlink? A hyperlink is simply part of the text (or graphic) on a Web page, that when clicked on will automatically:  Take you to a different part of the same page  Take you to a different page within the Web site  Take you to a page in a different Web site  Enable you to download a file  Launch an application, video or sound
  • 8. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page8 The illustration below displays a fragment of a Web page. The words that are underlined indicate a hyperlink. By default these text links are normally displayed in blue. Legal Issues, Ethical Issues, Privacy, and Security It's useful to take a brief look at the history of the Internet, which is related to some of these issues. The Internet and the World Wide Web have grown rapidly from a research project into something that involves millions of people worldwide. Much of the Internet's usefulness comes from the fact that it is shared by users, service providers, and others, in the sense that each depends on the other and needs to support the other. Hopefully, that sort of sharing and respect will continue. Your behavior, your expectations for others, and your activities will make the difference. "It is important to realize that the Web is what we make it. 'We' being the people who read, the people who teach children how to surf the Web, the people who put information up on the Web. Particularly the people who make links.... The Web doesn't force anything down your throat. If you are worried that your children are going to read low-quality information, teach them. Teach them what to read. Teach them how to judge information."
  • 9. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page9 Privacy and Civil Liberties The Electronic Frontier Foundation (EFF) was formed in 1990 to, among other things, bring issues dealing with civil liberties related to computing and telecommunications technology to the attention of the public at large, legislators, and court and law enforcement officials. As a non-profit public interest organization, EFF maintains collections of files and documents. E-Mail Privacy When you send a message by e-mail, the message is broken into packets and the packets are sent out over the Internet. The number of packets depends on the size of the message. Each message has the Internet address of the sender (your address) and the address of the recipient. Packets from a single message may take different routes to the destination, or may take different routes at different times. This works well for the Internet and for you since packets are generally sent through the best path depending on the traffic load on the Internet, the path doesn't depend on certain systems being in operation, and all you have to give is the address of the destination. The packets making up an e-mail message may pass through several different systems before reaching their destination. This means there may be some places between you and the destination where the packets could be intercepted and examined. Electronic Communications Privacy Act One example of a law to ensure the privacy of e-mail is the Electronic Communications Privacy Act (ECPA) passed in 1986 by Congress. The “electronic communication” means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photo electronice or photooptical system that affects interstate or foreign commerce, but does not include (A) any wire or oral communication; (B) any communication made through a tone-only paging device; (C) any communication from a tracking device (as defined in section 3117 of this title); or (D) electronic funds transfer information stored by a financial institution in a communications system used for the electronic storage and transfer of funds. Title I of the ECPA protects wire, oral, and electronic communications while in transit. It sets down requirements for search warrants that are more stringent than in other settings. Title II of the ECPA, the Stored Communications Act (SCA), protects communications held in electronic storage, most notably messages stored on computers. Its protections are weaker than those of Title I, however, and do not impose heightened
  • 10. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page10 standards for warrants. Title III prohibits the use of pen register and/or trap and trace devices to record dialing, routing, addressing, and signalling information used in the process of transmitting wire or electronic communications without a court order. The Electronic Communications Privacy Act of 1986 (ECPA Pub. L. 99-508, Oct. 21, 1986, 100 Stat. 1848, 18 U.S.C. § 2510-2522)was enacted by the United States Congress to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer. Specifically, ECPA was an amendment to Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (the Wiretap Statute), which was primarily designed to prevent unauthorized government access to private electronic communications. The ECPA also added new provisions prohibiting access to stored electronic communications, i.e., the Stored Communications Act,18 U.S.C. §§ 2701-12. The ECPA also included so-called pen/trap provisions that permit the tracing of telephone communications. §§ 3121-27. Later, the ECPA was amended, and weakened to some extent, by some provisions of the USA PATRIOT Act. In addition, Section 2709 of the Act, which allowed the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers, was ruledunconstitutional under the First (and possibly Fourth) Amendments in ACLU v. Ashcroft (2004). It is thought that this could be applied to other uses of National Security Letters. Encryption With public key encryption there are two keys, one public and the other private. The public key needs to be known. To send a message to a friend, you use her or his public key to encrypt the message. Your friend then uses her or his private key to decode the message after receiving it. You can obtain a version of public key encryption software called PGP, Pretty Good Privacy. Sexually-Explicit Material and Pornography There are a number of programs that can be installed on a computer to restrict the material that can be accessed on the World Wide Web. The programs work with lists of Web and ways of describing the content of Web pages to filter material. One source of information about these programs and related topics isPEDINFO Parental Control of Internet Access. The culture of the Internet has fostered personal rights and liberties, so some argue it's content ought not be restricted or censored. There are laws banning or restricting pornography; some countries have more stringent laws than others and some laws restrict the distribution of the material. Ethical Issues Some resources for guidelines for Ethics and Net Etiquette
  • 11. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page11 In January 1989 the Internet Architecture Board (IAB) issued a statement of policy concerning Internet ethics. This document is referred to as RFC 1087 'Ethics and the Internet'. An extract of RFC 1087 follows: The IAB strongly endorses the view of the Division Advisory Panel of the National Science Foundation Division of Network, Communications Research and Infrastructure which, in paraphrase, characterized as unethical and unacceptable any activity which purposely:  Seeks to gain unauthorized access to the resources of the Internet.  Disrupts the intended use of the Internet.  Wastes resources (people, capacity, computer) through such actions.  Destroys the integrity of computer-based information.  Compromises the privacy of users. Inappropriate Business Practices It is common to find advertising, marketing, and commercial activities readily available on the World Wide Web, and most of is done in a responsible manner. One particularly offensive means of advertising is called spamming. When used in this way the term means sending a message to many unrelated newsgroups or interest groups. It's not too hard to do, but it almost always is met with great opposition and feelings of hatred. One way to deal with it is to send a copy of the message and a complaint to postmaster@the.other.site. Libel  Defamation—also called calumny, vilification, traducement, slander (for transitory statements), and libel (for written, broadcast, or otherwise published words)—is the communication of a statement that makes a claim, expressly stated or implied to be factual, that may give an individual, business, product, group, government, or nation a negative image. It is usually a requirement that this claim be false and that the publication is communicated to someone other than the person defamed (the claimant).[1]  In common law jurisdictions, slander refers to a malicious, false, and defamatory spoken statement or report, while libel refers to any other form of communication such as written words or images. Most jurisdictions allow legal actions, civil and/or criminal, to deter various kinds of defamation and retaliate
  • 12. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page12 against groundless criticism. Related to defamation is public disclosure of private facts, which arises where one person reveals information that is not of public concern, and the release of which would offend a reasonable person. "Unlike [with] libel, truth is not a defense for invasion of privacy."  False light laws are "intended primarily to protect the plaintiff's mental or emotional well-being." If a publication of information is false, then a tort of defamation might have occurred. If thatcommunication is not technically false but is still misleading, then a tort of false light might have occurred.  In most civil law jurisdictions, defamation is dealt with as a crime rather than a tort.  A person who harms another's reputation may be referred to as a famacide, defamer, or slanderer. The Latin phrase famosuslibellus means a libelous writing. Intellectual Property and Copyright The notion of ownership of something, whether it has a physical form, does still make sense as intellectual property. There are a number of laws and agreements throughout the world to protect intellectual property rights. The right to copy or duplicate materials can be granted only by the owners of the information. This is called the copyright. Many documents on the Internet contain a statement that asserts the document is copyrighted and gives permission for distributing the document in an electronic form, provided it isn't sold or made part of some commercial venture. Even items that don't contain these statements are protected by the copyright laws of the United States, the Universal Copyright Convention, or the Berne Union. Most of the copyright conventions or statutes include a provision so that individuals may make copies of portions of a document for short-term use. If information is obtainable on the Internet, and there is no charge to access the information, it often can be shared in an electronic form. That certainly doesn't mean you can copy images or documents and make them available on the Internet, or make copies and share them in a printed form with others. Quite naturally, many of the folks who create or work at providing material available on the Internet, expect to get credit and be paid for their work. Internet Security When you use a computer system connected to the Internet, you're able to reach a rich variety of sites and information. By the same token, any system connected to the Internet can be reached in some manner by any of the other computer systems connected to the Internet. Partaking of the material on the Internet also means that you have to be concerned about the security of your computer system and other systems.
  • 13. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page13 You don't want unauthorized persons accessing your information or information belonging to others who share your system-you want to protect your system from malicious or unintentional actions that could destroy stored information or halt your system. You don't want others masquerading as you. You need to be concerned about the security of other systems so you can have some faith in the information you retrieve from those systems, and so you can conduct business transactions. A lack of security results in damage, theft, and what may be worse in some cases, a lack of confidence or trust. If you access the Internet by logging into a computer system, your primary defense against intrusion is your password. You need to choose a password that will be difficult to guess. This means choosing a password that's at least six characters long. You'll also want to use a password contain upper and lowercase letters and some non-alphabetic characters. Additionally, the password shouldn't represent a word, and it shouldn't be something that's easy to identify with you such as a phone number, room number, birthdates, or license number.  Selecting good passwords Because connecting a network to the Internet allows access to that network, system administrators and other persons concerned with network security are very concerned about making that connection. One device or part of a network that can help enhance security is called a firewall. One type of program that causes problems for Internet users is called a virus. This doesn't necessarily copy your data or attempt to use your system. However, it can make it difficult or impossible to use your system. A virus is a piece of code or instructions that attaches itself to existing programs. Just like a biological virus, a computer virus can't run or exist on its own, but must be part of an executing program. When these programs are run, the added instructions are also executed. Internet security is very important to many users, as well it should be. We need to make sure that messages are private and that monetary transaction and data sources are secure. The Trail You Leave When You Use the Web. A brief description of log files kept by Web servers, cookies, and the information about how you use the Web that's saved in the browser's cache and history list. The Different Types of Search Engines Although the term “search engine” is often used indiscriminately to describe crawler-based search engines, human-powered directories and everything in between, they are not all the same. Each type of “search engine” gathers and ranks listings in radically different ways.
  • 14. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page14 Crawler-Based Crawler-based search engines such as Google and Yahoo, compile their listings automatically. They “crawl” or “spider” the web and people search through their listings. These listings are what made up the search engine’s index or catalogue. You can think of the index as a massive electronic filing cabinet containing a copy of every web page the spider finds. Because spiders scour the web on a regular basis, any changes you make to a website, or links to or from your own website, may affect your search engine ranking. It is also important to remember that it may take a while for a spidered page to be added to the index. Until that happens, it is not available to those searching with a search engine. Search Engine Optimization (SEO) refers to making changes to a website so that it can attain higher search positions for specific key phrases in organic results. Organic results refer to the regular search engine results displayed by crawler-based search engines; as opposed to sponsored results which are paid advertising. Directories Directories such as Open Directory depend on human editors to compile their listings. Webmasters submit an address, title and brief description of their site and then editors review the submission. Unless you sign up for a paid inclusion program, it may take months for your website to be reviewed. Even then, there’s no guarantee that your website will be accepted. After a website makes into a directory however, it is generally very difficult to change its search engine ranking. So before you submit to a directory, spend some time working on your titles and descriptions or hire a professional to submit to directories for you. Paid Inclusion Most directories offer some form of paid inclusion. Paid inclusion guarantees your website gets reviewed and/or indexed promptly. Keep in mind that these search engines usually still allow people to submit for free; it just takes longer. Pay Per Click PPC advertising is the name for ads you see at the top or on the right of the organic results in most search engines. Services such as Yahoo SM, Google AdWrds, and MSN AdCenter allow you to pay to show
  • 15. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page15 your ads on their search engine results page. How much you pay (your bid), along with the click-through rate of the ad (CTR) and the relevance of the landing page, determine the ranking of your PPC ads. There are companies such as Red Carpet Web Promotion that set up and manage PPC campaigns for companies that bid on many key phrases (which can number in the thousands) Contact Red Carpet Web Promotion if this or other web promotion services interest you. Self Check–1 Written Test Name: ______________________________________ Date: ________________________________________ Time started: _______________________________ Time finished: _______________________________ Directions: Answer all the questions listed below. 1. It is a worldwide system of computer networks in which users at any one computer can, if they have permission, get information from any other computer. (1 point) 2. Internet is sometimes called as what? (1 point) 3. Give at least 5 common internet terminologies. (5 points) 4. It specifies the location of a resource on the Internet. It consists of the basic address and path.(1 point) 5. It is used to refer to the page that is the default page of any website. It is the main page of a complex website.(1 point) 6. It is a store-and-forward method of writing, sending and receiving written messages. (1 point) 7. It refers to the principles of courtesy and consideration for the people using the Internet. It refers to certain basic principles to adhere to while using the Internet. (1 point) 8.It is simply part of the text or graphic on a Web page, that when clicked on will automatically take you to a different part of the same page, Take you to a different page within the Web site, Take you to a page in a different Web site, Enable you to download a file or Launch an application, video or sound.(1 point)
  • 16. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page16 9. It was formed in 1990 to, among other things, bring issues dealing with civil liberties related to computing and telecommunications technology to the attention of the public at large, legislators, and court and law enforcement officials. (1 point) 10. It is a law that ensures the privacy of e-mail which was passed in 1986 by Congress. (1 point) 11. It is an offensive means of advertising that sends a message to many unrelated newsgroups or interest groups.(1 point) 12. The notion of ownership of something, whether it has a physical form, does still make sense as what? (1 point) 13. Give the 4 types of search engines. (4 points) Note: Satisfactory rating - 16 points, Unsatisfactory - below 16 points You can ask you teacher for the copy of the correct answer Self Check – 1 Written Test Answer keys: 1. Internet 2. The Net 3. Any five terminologies among the list below  ARPANET, Internet Service Provider, IP Address, Cyberspace, WWW, Website, URL, Web Page, Home Page, Web Browser, Cache, HTTP, Web Cookie, Session, Hyperlink, Internet Security, Internet - A communication Platform, Email, Email Address, Spamming, Phishing, Hacking, Email, Scams, Email Virus, Internet Bookmark, Web Directories
  • 17. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page17 4. URL 5. Home page 6. Email 7. Netiquette 8. Hyperlink 9. The Electronic Frontier Foundation (EFF) 10. Electronic Communications Privacy Act (ECPA) 11. Spamming 12. Intellectual Property 13. Crawler-Based,Directories, Paid Inclusion and Pay Per Click Information Sheet-2 Internet browsers review Internet Browsers There were several web browsers that we can use to search from the web. Let’s take a look at some of it. Netscape Navigator Netscape Navigator was a proprietary web browser that was popular in the 1990s. It was the flagship product of the Netscape Communications Corporation and the dominant web browser in terms of usage share, although by 2002 its usage had almost disappeared. This was primarily due to the increased usage of Microsoft's Internet Explorer web browser software, and partly because the Netscape Corporation (later purchased by AOL) did not sustain Netscape Navigator's technical innovation after the late 1990s. The Netscape Navigator web browser
  • 18. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page18 was succeeded by Netscape Communicator. Netscape Communicator's 4.x source code was the base for the Netscape-developed Mozilla Application Suite, which was later renamed SeaMonkey.Netscape's Mozilla Suite also served as the base for a browser-only spinoff called Mozilla Firefox and Netscape versions 6 through 9. AOL formally stopped development of Netscape Navigator on December 28, 2007, but continued supporting the web browser with security updates until March 1, 2008, when AOL canceled technical support. AOL allows downloading of archived versions of the Netscape Navigator web browser family. Moreover, AOL maintains the Netscape website as an Internet portal. Windows Internet Explorer Windows Internet Explorer (formerly Microsoft Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft and included as part of the Microsoft Windows line of operating systems, starting in 1995. It was first released as part of the add-on package Plus! for Windows 95 that year. Later versions were available as free downloads, or in service packs, and included in theOEM service releases of Windows 95 and later versions of Windows. Internet Explorer has been the most widely used web browser since 1999, attaining a peak of about 95% usage share during 2002 and 2003 with Internet Explorer 5 and Internet Explorer 6. Since its peak of popularity, its usage share has been declining in the face of renewed competition from other web browsers, and is currently 43.55% as of February 2011. Microsoft spent over $100 million USD per year on Internet Explorer in the late 1990s,[1] with over 1000 people working on it by 1999. Mozilla FireFox
  • 19. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page19 Mozilla Firefox is a free and open source web browser descended from the Mozilla Application Suite and managed by Mozilla Corporation. As of August 2011, Firefox is the second most widely used browser, with approximately 30% of worldwide usage share of web browsers. The browser has had particular success in Germany and Poland, where it is the most popular browser with 55% usage and 47% respectively. Firefox runs on various operating systems including Microsoft Windows, GNU/Linux, Mac OS X, FreeBSD, and many other platforms. Its current stable release is version 6.0, released on August 16, 2011. Firefox's source code is tri-licensed under the GNU GPL, GNU LGPL, or Mozilla Public License. Galeon Galeon is a web browser for GNOME based on Mozilla’s Gecko layout engine. Galeon’s self-declared mission was to deliver “the web and only the web.” At the time of Galeon’s creation, the most popular web browsers, including Netscape, Mozilla, and Internet Explorer, were large multi-functional programs. This made them slow to start and often impractical due to their high memory usage and processor requirements. Galeon was the first mainstream graphical web browser
  • 20. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page20 which specifically focused on the reduction of peripheral functionality. Galeon is also notable for introducing “Smart Bookmarks,” bookmarks that take an argument and can be used as toolbar buttons with a text field used to enter the value for the argument. Opera Opera is a web browser and Internet suitedeveloped by Opera Software. The browser handles common Internet-related tasks such as displaying web sites, sending and receiving e-mail messages, managing contacts, chatting on IRC, downloading files via BitTorrent, and readingweb feeds. Opera is offered free of charge for personal and mobile phones. Opera does not come packaged with any desktop operating system. However, it is the most popular desktop browser in some countries, such as Ukraine. Opera Mini, which is the most popularmobile web browser as of May 2011, has been chosen as the default integrated web browser in several mobile handsets by their respective manufacturers. Opera is known for originating many features later adopted by other web browsers. Opera runs on a variety of personal computer operating systems, including Microsoft Windows, Mac OS X, Linux, and FreeBSD. Editions of Opera are available for devices using the Maemo, BlackBerry, Symbian, Windows Mobile, Android, and iOS operating systems, as well as Java ME- enabled devices. Approximately 120 million mobile phones have been shipped with Opera.Opera is the only commercial web browser available for the Nintendo DS and Wii gaming systems. Some television set-top boxes use Opera. Adobe Systems has licensed Opera technology for use in the Adobe Creative Suite. Phoenix The Mozilla Firefox project was created by Dave Hyatt and Blake Ross as an experimental branch of the Mozilla
  • 21. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page21 project. Hyatt, Ross, Hewitt and Chanial's browser was created to combat the perceived software bloat of the Mozilla Suite (codenamed, internally referred to, and continued by the community as SeaMonkey), which integrated features such as IRC, mail and news, and WYSIWYG HTML editing into one software suite. Firefox retains the cross-platform nature of the original Mozilla browser, using the XUL user interface markup language. The use of XUL makes it possible to extend the browser's capabilities through the use of extensions and themes. The development and installation processes of these add-ons raised security concerns, and with the release of Firefox 0.9, the Mozilla Foundation opened a Mozilla Update website containing "approved" themes and extensions. The use of XUL sets Firefox apart from other browsers, including other projects based on Mozilla's Gecko layout engine and most other browsers, which use interfaces native to their respective platforms (Galeon and Epiphany use GTK+; K-Meleon uses MFC; and Camino uses Cocoa). Many of these projects were started before Firefox, and probably served as inspiration. Although the Mozilla Foundation had intended to make the Mozilla Suite obsolete and replace it with Firefox, the Foundation continued to maintain the suite until April 12, 2006 because it had many corporate users and was bundled with other software. The Mozilla community (as opposed to the Foundation) continues to release new versions of the suite, using the product name SeaMonkey to avoid confusion with the original Mozilla Suite. On February 5, 2004, business and IT consulting company AMS categorized Mozilla Firefox (then known as Firebird) as a "Tier 1" ("Best of Breed") open source product, considering it technically strong and virtually risk-free. The project which became Firefox started as an experimental branch of the Mozilla Suite called m/b (or mozilla/browser). After it had been sufficiently developed, binaries for public testing appeared in September 2002 under the name Phoenix. The Phoenix name was kept until April 14, 2003, when it was changed because of a trademark dispute with the BIOS manufacturer, Phoenix Technologies (which produces a BIOS-based browser called Phoenix First Ware Connect). The new name, Firebird, met with mixed reactions, particularly as the Firebird database server already carried the name. In response, the Mozilla Foundation stated that the browser should always bear the name Mozilla Firebird to avoid confusion with the database software. Continuing pressure from the Firebird community forced another change, and on February 9, 2004 the project was renamed Mozilla Firefox (or Firefox for short).
  • 22. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page22 The name "Firefox" (a reference to the red panda)was chosen for its similarity to "Firebird", but also for its uniqueness in the computing industry. To ensure that no further name changes would be necessary, the Mozilla Foundation began the process of registering Firefox as a trademark with the United States Patent and Trademark Office in December 2003. This trademark process led to a delay of several months in the release of Firefox 0.8 when the foundation discovered that Firefox had already been registered as a trademark in the UK for Charlton Company software. The situation was resolved when the foundation was given a license to use Charlton's European trademark. Konqueror Konqueror is a web browser and file manager that provides file-viewer functionality to a wide variety of things: local files, files on a remote ftp server and files in a disk image. It is designed as a core part of the KDE desktop environment. It is developed by volunteers and can run on most Unix-like operating systemsand on Windows systems, too. Konqueror, along with the rest of the components in the KDEBase package, is licensed and distributed under the GNU General Public License version 2. The name "Konqueror" is a reference to the two primary competitors at the time of the browser's first release: "first comes the Navigator, thenExplorer, and then the Konqueror". It also follows the KDE naming convention: the names of most KDE programs begin with the letter K. Konqueror came with the version 2 of KDE, released on October 23, 2000. It replaces its predecessor, KFM (KDE file manager). With the release of KDE4, Konqueror was replaced as a file manager by Dolphin. Lynx Lynx is a text-based web browser for use on cursor-addressable character cell terminals and is very configurable.
  • 23. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page23 Browsing in Lynx consists of highlighting the chosen link using cursor keys, or having all links on a page numbered and entering the chosen link's number. Current versions support SSL and many HTML features. Tables are formatted using spaces, while frames are identified by name and can be explored as if they were separate pages. Lynx cannot inherently display various types of non-text content on the web, such as images and video, but it can launch external programs to handle it, such as an image viewer or a video player. Because of its text-to-speech–friendly interface, Lynx was once popular with visually impaired users, but better screen readers have reduced the appeal of this application. Lynx is also used to check for usability of websites in older browsers. It is still included in a number of Unix products and Linux distributions, and is particularly useful for reading documentation or downloading files when only a text-based environment is available. It is also useful for accessing websites from a remotely connected system in which no graphical display is available. Despite its text-only nature and age, it can still be used to effectively browse much of the modern web, including performing interactive tasks such as editing Wikipedia. The speed benefits of text-only browsing are most apparent when using low bandwidth internet connections, or older computer hardware that may be slow to render image-heavy content. Self Check – 2 Written Test Name: ______________________________________ Date: ________________________________________ Time started: _______________________________ Time finished: _______________________________ Directions: Answer all the questions listed below. 1. Give at least five common web browsers that you know. (5 points)
  • 24. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page24 2. It is a series of graphical web browsers developed by Microsoft and included as part of the Microsoft Windows line of operating systems, starting in 1995. (1 point) 3. It is a free and open source web browser and the second most widely used browser worldwide.(1 point) 4. This browser is also known as Mozilla Firefox. (1 point) 5. It is a web browser and Internet suite. It handles common Internet-related tasks such as displaying web sites, sending and receiving e-mail messages, managing contacts, chatting on IRC, downloading files via BitTorrent, and reading web feeds. It is offered free of charge for personaland mobile phones.(1 point) 6. It is a text-based web browser for use on cursor-addressable character cell terminals and is very configurable. (1 point) 7.What three file-viewer functionalities do the Konqueror browser provides?(3 point) Note: Satisfactory rating - 10 points, Unsatisfactory - below 10 points You can ask you teacher for the copy of the correct answer Self Check – 2 Written Test Answer keys: 1. Any five browsers among the list :Netscape Navigator, Internet Explorer, Mozilla, Opera, Galleon, Phoenix, Konqueror, Lynx. 2. Windows Internet Explorer 3. Mozilla Firefox 4. Phoenix 5. Opera 6. Lynx
  • 25. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page25 7. local files, files on a remote ftp server and files in a disk image. Information Sheet-3 Basic Internet Settings and configuration Home page The term home page is used to refer to the page that is the default page of any website. It is the main page of a complex website. Setting-up your home page means that when you open your web browser, the web page that you have set will be immediately launched by your browser. The most common site that you often use will be your consideration for setting-up your home page. So every time you will open your browser, it will automatically go to your favorite site. Location of Temporary Files Webpages are stored in a temporary Internet files folder the first time you view them in your web browser. This speeds up the display of pages you frequently visit or have already seen, because Internet Explorer can open them from your hard disk instead of from the Internet. Privacy Level Internet Explorer offers a number of features to help protect your security and privacy when you browse the web. Under Settings, there were several privacy level options you can choose:  Block All Cookies. Internet Explorer prevents all Web sites from storing cookies on your computer, and Web sites cannot read existing cookies on your computer. Per-site privacy actions do not override these settings.
  • 26. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page26  High. Internet Explorer prevents Web sites from storing cookies that do not have a compact privacy policy—a condensed computer-readable P3P privacy statement. The browser prevents Web sites from storing cookies that use personally identifiable information without your explicit consent. Per-site privacy actions override these settings.  Medium High. Internet Explorer prevents Web sites from storing third-party cookies that do not have a compact privacy policy or that use personally identifiable information without your explicit consent. The browser prevents Web sites from storing first-party cookies that use personally identifiable information without your implicit consent. The browser also restricts access to first-party cookies that do not have a compact privacy policy so that they can only be read in the first-party context. Per-site privacy actions override these settings.  Medium (default). Internet Explorer prevents Web sites from storing third-party cookies that do not have a compact privacy policy or that use personally identifiable information without your implicit consent. The browser allows first-party cookies that use personally identifiable information without your implicit consent but deletes these cookies from your computer when you close the browser. The browser also restricts access to first-party cookies that do not have a compact privacy policy so that they can only be read in the first-party context. Per-site privacy actions override these settings.  Low. Internet Explorer allows Web sites to store cookies on your computer, including third-party cookies that do not have a compact privacy policy or that use personally identifiable information without your implicit consent. When you close the browser, though, it deletes these third-party cookies from your computer. The browser also restricts access to first-party cookies that do not have a compact privacy policy so that they can only be read in the first-party context. Per-site privacy actions override these settings.  Accept All Cookies. Internet Explorer allows all Web sites to store cookies on your computer, and Web sites that create cookies on your computer can read them. Per-site privacy actions do not override these settings.
  • 27. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page27 Security Level Why are security settings for web browsers important? Your web browser is your primary connection to the rest of the internet, and multiple applications may rely on your browser, or elements within your browser, to function. This makes the security settings within your browser even more important. Many web applications try to enhance your browsing experience by enabling different types of functionality, but this functionality might be unnecessary and may leave you susceptible to being attacked. The safest policy is to disable the majority of those features unless you decide they are necessary. If you determine that a site is trustworthy, you can choose to enable the functionality temporarily and then disable it once you are finished visiting the site. While every application has settings that are selected by default, you may discover that your browser also has predefined security levels that you can select. For example, Internet Explorer offers custom settings that allow you to select a particular level of security; features are enabled or disabled based on your selection. Even with these guides, it is helpful to have an understanding of what the different terms mean so that you can evaluate the features to determine which settings are appropriate for you. How do you know what your settings should be? Ideally, you would set your security for the highest level possible. However, restricting certain features may limit some web pages from loading or functioning properly. The best approach is to adopt the highest level of security and only enable features when you require their functionality. What do the different terms mean? Different browsers use different terms, but here are some terms and options you may find:  Zones - Your browser may give you the option of putting web sites into different segments, or zones, and allow you to define different security restrictions for each zone. For example, Internet Explorer identifies the following zones:  Internet - This is the general zone for all public web sites. When you browse the internet, the settings for this zone are automatically applied to the sites you visit. To give you the best protection as you browse, you should set the security to the highest level; at the very least, you should maintain a medium level.  Local intranet - If you are in an office setting that has its own intranet, this zone contains those internal pages. Because the web content is maintained on an internal web server, it is usually safe to have less restrictive settings for these pages. However, some viruses have tapped into this zone, so be aware of what sites are listed and what privileges they are being given.
  • 28. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page28  Trusted sites - If you believe that certain sites are designed with security in mind, and you feel that content from the site can be trusted not to contain malicious materials, you can add them to your trusted sites and apply settings accordingly. You may also require that only sites that implement Secure Sockets Layer (SSL) can be active in this zone. This permits you to verify that the site you are visiting is the site that it claims to be. This is an optional zone but may be useful if you personally maintain multiple web sites or if your organization has multiple sites. Even if you trust them, avoid applying low security levels to external sites—if they are attacked, you might also become a victim.  Restricted sites - If there are particular sites you think might not be safe, you can identify them and define heightened security settings. Because the security settings may not be enough to protect you, the best precaution is to avoid navigating to any sites that make you question whether or not they're safe.  JavaScript - Some web sites rely on web scripts such as JavaScript to achieve a certain appearance or functionality, but these scripts may be used in attacks.  Java and ActiveX controls - These programs are used to develop or execute active content that provides some functionality, but they may put you at risk.  Plug-ins - Sometimes browsers require the installation of additional software known as plug-ins to provide additional functionality. Like Java and ActiveX controls, plug-ins may be used in an attack, so before installing them, make sure that they are necessary and that the site you have to download them from is trustworthy. You may also find options that allow you to take the following security measures:  Manage cookies - You can disable, restrict, or allow cookies as appropriate. Generally, it is best to disable cookies and then enable them if you visit a site you trust that requires them.  Block pop-up windows - Although turning this feature on could restrict the functionality of certain web sites, it will also minimize the number of pop-up ads you receive, some of which may be malicious. Setting the types of connection Internet Connection settings are used to configure how the Web browser will connect to the Internet. These settings are available from the Internet Options window. The Connections tab will list anyInternet connections currently configuredon the computer, including dial-up andVirtual Private Network (VPN) connections.If a connection to the Internet is through a proxy server, you can use the LAN Settings button to configure the required proxy settings.
  • 29. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page29 These settings are summarized below.  Automatically detect settings: Proxy Settings and configuration settings are automatically detected.  Use automatic configuration script: Settings are retrieved from a file created by the network administrator. You must also specify the URL to the file or file name.  Use a proxy server for your LAN: Specifies that Internet Explorer must connect to the Internet through a proxy server. Provide the address and port number of the proxy server. By selecting the Advance button, you can configure which proxy server and port number to use for different protocols such as HTTP and FTP. You can then create an exception list. When accessing computers on the exception list, the proxy server is not used.  Bypass proxy server for local addresses: Select this option if you do not want to use a proxy server for a local (intranet) addresses. Selecting this option can improve performance when accessing computers on your intranet. The connection settings also allow you to configure what Internet Explorer should do when a connection to the Internet is needed. These settings include:  Never dial a connection – Internet Explorer will not automatically establish a connection when one is not present but required. A connection must be established manually.  Dial whenever a network connection is not present – Internet Explorer will attempt to establish a connection using your default dial-up connections when a network connection is not available.  Always dial my default connection – Internet Explorer will always attempt to connect using your default dial-up networking connection. Setting Browsing History As you browse the Internet, each of the items you view was saved locally on your hard disk drive. This helps web pages you visit frequently load faster by loading the files from youhard disk drive instead of having to downloading the web page again. To conserve hard disk drive space or to help keep their Internet browsing private, users may find it necessary to delete their Internet History, below is how to do this. Adjusting display/view modes In recent versions, Windows Internet Explorer has dramatically improved support for established and emerging industry standards, such as HTML5, Cascading Style Sheets (CSS), Level 3 (CSS3), and Scalable
  • 30. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page30 Vector Graphics (SVG). By default, Internet Explorer properly displays webpages designed to support these standards. Because some of these standards are still evolving, older websites may not fully support them. In addition, later versions of certain standards specify different behaviors than earlier versions of the same standard. As a result, websites designed to support the earlier versions of these standards may display differently when viewed with web browsers designed to support current versions of the standards, such as Internet Explorer. In order to help such websites display correctly, Internet Explorer supports a display mode called Compatibility View, which displays webpages as if they were viewed by an earlier version of the browser. Customize the Internet Explorer toolbars Internet Explorer has several toolbars, including the Menu bar, the Favorites or Links bar, and the Command bar. There is also the Address bar, where you can type a web address, and the status bar, which displays messages such as a webpage's download progress. All of these toolbars can be customized in one way or another. Assessing and Retrieving Site Data What Are Cookies? Cookies are small files which are stored on a user's computer. They are designed to hold a modest amount of data specific to a particular client and website, and can be accessed either by the web server or the client computer. This allows the server to deliver a page tailored to a particular user, or the page itself can contain some script which is aware of the data in the cookie and so is able to carry information from one visit to the website (or related site) to the next. What's in a Cookie? Each cookie is effectively a small lookup table containing pairs of (key, data) values - for example (first name, John) (last name, Smith). Once the cookie has been read by the code on the server or client computer, the data can be retrieved and used to customize the web page appropriately. When are Cookies Created? Writing data to a cookie is usually done when a new webpage is loaded - for example after a 'submit' button is pressed the data handling page would be responsible for storing the values in a cookie. If the user has
  • 31. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page31 elected to disable cookies then the write operation will fail, and subsequent sites which rely on the cookie will either have to take a default action, or prompt the user to re-enter the information that would have been stored in the cookie. Why are Cookies Used? Cookies are a convenient way to carry information from one session on a website to another, or between sessions on related websites, without having to burden a server machine with massive amounts of data storage. Storing the data on the server without using cookies would also be problematic because it would be difficult to retrieve a particular user's information without requiring a login on each visit to the website. If there is a large amount of information to store, then a cookie can simply be used as a means to identify a given user so that further related information can be looked up on a server-side database. For example the first time a user visits a site they may choose a username which is stored in the cookie, and then provide data such as password, name, address, preferred font size, page layout, etc. - this information would all be stored on the database using the username as a key. Subsequently when the site is revisited the server will read the cookie to find the username, and then retrieve all the user's information from the database without it having to be re- entered. Loading Images Images on a web page often make the page load more slowly, especially if you have a relatively slow connection (e.g., a dial-up connection). To decrease the time it takes to load a page by preventing images from loading you would need to disable loading of images. But for many instances, you would need to load images to your browser. Opening URL Each time that you type a URL in the address bar or click on a link in Internet Explorer browser, the URL address is automatically added to the history index file. When you type a sequence of characters in the address bar, Internet Explorer automatically suggests you all URLs that begin with characters sequence that you typed (unless AutoComplete feature for Web addresses is turned off). However, Internet Explorer doesn't allow you to view and edit the entire URL list that it stores inside the history file. This utility reads all information from the history file on your computer, and displays the list of all URLs that you have visited in the last few days. It also allows you to select one or more URL addresses, and then remove them from the history file or save them into text, HTML or XML file. In addition, you are allowed
  • 32. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page32 to view the visited URL list of other user profiles on your computer, and even access the visited URL list on a remote computer, as long as you have permission to access the history folder. Deleting Cookies and Browsing History A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to a user's browser and for the browser to return the state information to the origin site. The state information can be used for authentication, identification of a user session, user's preferences,shopping cart contents, or anything else that can be accomplished through storing text data. Cookies are not software. They cannot be programmed, cannot carry viruses, and cannot install malware on the host computer. However, they can be used byspyware to track user's browsing activities – a major privacy concern that prompted European and US law makers to take action. Cookies could also be stolen by hackers to gain access to a victim's web account, thus, the need to delete cookies.
  • 33. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page33 Self Check – 3 Written Test Name: ______________________________________ Date: ________________________________________ Time started: _______________________________ Time finished: _______________________________ Directions: Answer all the questions listed below. 1. What do you call a page that when you set, it will automaticallybe launched by your browser when you open it.(1 point) 2. What are the 6 privacy level options? (6 points) 3. What is the default privacy level setting? (1 point) 4. This settings are used to configure how the Web browser will connect to the Internet. These settings are available from the Internet Options window. (1 point) 5. It is a Proxy Settings and configuration settings are automatically detected. (1 point) 6. It is a Proxy Settings when you do not want to use a proxy server for a local (intranet) addresses. Selecting this option can improve performance when accessing computers on your intranet.(1 point) 7. Note: Satisfactory rating - 25 points, Unsatisfactory - below 25 points You can ask you teacher for the copy of the correct answer
  • 34. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page34 Self Check – 3 Written Test Answer keys: 1. Home page 2. Block All Cookies, High, Medium High, Medium, Low, Accept All Cookies 3. Medium 4. Internet Connection 5. Automatically detect settings 6. Bypass proxy server for local addresses Operation Sheet Basic internet settings and configuration Setting-up your Home page To do it, follow the steps below: 1. On your browser, go to tools, then options 2. On the Internet Options, click on the General tab 3. Type the address that you what for your home page then click Apply then OK
  • 35. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page35 Location of Temporary Files This information applies to Windows Internet Explorer 7 and Windows Internet Explorer 8. To view temporary Internet files 1. Open your Internet Explorer 2. Click the Tools button, and then click Internet Options. 3. Click the General tab, and then, under Browsing history, click Settings. 4. In the Settings dialog box, click View files. Setting the Privacy Level 1. Open your Internet Explorer. 2. Click the Tools button, and then click Internet Options. 3. Click the Privacy tab. 4. Under Settings, do either of the following:  To allow or block cookies from specific websites, click Sites.  To load a customized settings file, click Import. These are files that modify the rules that Internet Explorer uses handle cookies. Since these files can override default settings, you should only import them if you know and trust the source. Under Settings, move the slider to the privacy level you want:  Block All Cookies.  High.  Medium High  Medium (default)  Low.
  • 36. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page36  Accept All Cookies. 5. When you are finished making changes to your privacy settings, click OK. Setting the Security Level 1. Open your Internet Explorer. 2. Click the Tools button, and then click Internet Options. 3. Click the Security tab. 4. Click the Internet icon. 5. Do one of the following:  To pick a preset security level, move the slider.  To change individual security settings, click Custom level. Change the settings as desired and click OK when you are done.  To set Internet Explorer back to the default security level, click Default level.  Click Reset all zones to default level to clear any custom settings. 6. When you are finished making changes to the security settings, click OK. Setting the types of connection 1. Open your Internet Explorer. 2. Click the Tools button, and then click Internet Options. 3. Click the Connections tab. 4. Click Apply then Ok when done. These settings are summarized below.  Automatically detect settings  Use automatic configuration script:  Use a proxy server for your LAN
  • 37. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page37  Bypass proxy server for local addresses How to configure Internet Explorer when a connection to the Internet is needed:  Never dial a connection  Dial whenever a network connection is not present  Always dial my default connection Setting Browsing History Viewing History using Internet Explorer  Microsoft Internet Explorer 7 and above users can view their history files by clicking the "Tools" menu, "Internet Options", clicking the "Settings" button under the Browsing history, and then clicking the "View Files" button.  Microsoft Internet Explorer 6.x users can view their history files by clicking the "Tools" menu, "Internet Options", clicking the "Settings" button, and then clicking the "View Files" button. Deleting History  Microsoft Windows users running Microsoft Internet Explorer 6.x and 7.x can delete their history files by clicking the "Tools" menu, "Internet Options", and clicking the "Delete Files" or "Delete" button. Users also have the option of automatically deleting files each time the close the browser window by clicking the "Advanced" tab and checking "Empty Temporary Internet Files folder when browser is closed" under the "Security" section.  Microsoft Internet Explorer 4.x users on an Apple Macintosh can delete the history by clicking the "Hard Drive" icon, "System", "Preferences", "Explorer", and moving the history file into the trash.  Microsoft Internet Explorer 3.02 and lower users can delete their history by clicking the "View" menu, "Options", open the tab "Advanced", click the "Settings" tab, and click the "Empty Folder" button. Viewing History using Internet Mozilla Firefox Viewing History Press Ctrl + H to open the left-side history bar. or Click History at the top of the window. or
  • 38. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page38 Users using earlier versions of Mozilla Firefox can also view their history by clicking "Go" and clicking "History." Deleting History Mozilla Firefox users can clear their history by clicking the "Tools" menu, "Options", clicking the "Privacy" button, and under "History" click the "Clear" or "Clear Now" button. or Press CTRL + Shift + DEL to open the Clear Data Window. Adjusting display/view modes The following list describes different ways that enable Compatibility View:  You click the Compatibility View button in the Address bar when viewing a webpage. When displayed, this button appears to the left of theRefresh button and contains an image of a broken piece of paper. This enables Compatibility View for all documents in the domain of the website being viewed.  The "Display all websites in Compatibility Mode setting" in the Compatibility View Settings is enabled.  The "Automatically recover from page layout errors with Compatibility View" setting is enabled and a webpage stops responding or crashes the browser. When this happens, Internet Explorer opens the page in Compatibility View after recovering from the problem.  Group policies that identify sites to be opened in Compatibility View are enabled by the administrator of your computer.  You have used the F12 developer tools to change the browser mode to identify Internet Explorer as an earlier version of the browser.  The Compatibility View List is enabled, which defines a list of websites that are automatically displayed in Compatibility View. The Compatibility View List contains a number of websites known to have problems when viewed, by default, with Internet Explorer; when Internet Explorer opens a webpage from a site on the Compatibility View List, it automatically displays the page in a way that allows it to be viewed correctly. Modify Toolbars Show or hide the Internet Explorer toolbars You can show or hide the Menu bar, Favorites or Links bar, Command bar, and status bar. Here's how: 1. Open Internet Explorer by clicking the Start button , and then clicking Internet Explorer.
  • 39. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page39 2. Click the Tools button, point to Toolbars, and then click the toolbar you want to show or hide. 3. Customize the Command bar The Command bar is located at the upper-right side of the Internet Explorer window and offers easy access to almost any setting or feature in Internet Explorer. You can customize the Command bar buttons to suit your preferences. To change the buttons on the Command bar 1. Open Internet Explorer by clicking the Start button , and then clicking Internet Explorer. 2. In Internet Explorer 8, right-click the Command bar, point to Customize, and then click Add or Remove Commands. In Internet Explorer 7, right-click the Command bar, point to Customize Command Bar, and then click Add or Remove Commands. 3. Make one or more of the following changes:  To add a button, click the button you want to add in the Available toolbar buttons list, and then click Add.  To remove a button, click the button you want to remove in the Current toolbar buttons list, and then click Remove.  To change the order in which buttons are displayed, click a button in theCurrent toolbar buttons list, and then click either Move Up or Move Down.  To restore the Command bar buttons to their default settings, click Reset. 4. When you're done, click Close. You should see your changes immediately. If you've added a lot of buttons, you might need to resize the Command bar to see them all. Assessing and Retrieving Site Data How do I Enable or Disable Cookies? This section will tell you how to enable cookies (turning cookies on) and also how to disable them. Since cookies are maintained by your web browser, the method of enabling or disabling them will vary depending on which browser you are using. Microsoft Internet Explorer 8.0
  • 40. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page40 Select the 'Tools->Internet Options' menu item, and then open the 'Privacy' tab - you can then adjust the slider to block or allow various categories of cookie. Alternatively by clicking 'Advanced...' you can exercise finer control over the browser's behavior, choosing whether to accept, block, or prompt for cookies originating either on the website you are visiting (first party cookies) or originating from websites other than the one you are visiting (third party cookies, typically used by banner advertisements hosted on an advertiser's website). Loading Images To enable that follow these steps: for Internet Explorer 5.x and later for Windows: 1. From the Tools menu, select Internet Options... . If the menu bar is hidden, press Alt to make it visible. 2. In the window that appears, select the Advanced tab. 3. Scroll down the list to "Multimedia", and check Show Pictures. 4. Click OK. Opening URL For Internet Explorer 5 1. Open Internet Explorer. 2. Click to highlight whatever is in the address bar (the big white space at the top of the window, next to the word "Address"). 3. Type the Internet address over it, or press Delete on your keyboard and then type. 4. Press Enter on your keyboard to go to the page. Deleting Cookies and Browsing History – for Internet Explorer 8 Once your browser is open, select the Tools menu and click Internet Options and select the General tab. 1. To delete all cookies, in the Browsing History section, click Delete.... 2. Uncheck the top Preserve Favorite Website Data box. 3. Then check the box next to Cookies.... Check the other boxes at your own discretion. 4. Click Delete. If you wish to delete only specific cookies and keep others, instead of Step 2: 1. Click the Settings button, then click View Files. 2. Scroll through the list and select the cookies you want to delete. 3. Multiple cookies can be selected by holding down the CTRL key while clicking.
  • 41. WOLKITE POLYTECHNIC COLLAGE Training, Teaching and Learning Material DEPARTMENT OF ICT: - INFO-GENUINE QCC Page41 4. Press the Delete key. 5. Press OK on any dialog boxes that appear. Or Hit Ctrl+Shift+Delete