1 / 29

Unit 12

Unit 12. The Internet. Introduction. Introduction. The Internet (commonly called the Net) is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. Internet Services.

viveka
Download Presentation

Unit 12

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Unit 12 The Internet

  2. Introduction

  3. Introduction The Internet (commonly called the Net) is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.

  4. Internet Services Different services are made available on the Internet including: • Email(electronic mail): for sending and receiving messages. • Usenet (User Network) : accessing newsgroups. Groups of users who send and read messages on a particular topic.

  5. Internet Services 3. IRC(Internet relay chat): Chatting to other users using text messages in real-time (immediately, while users are logged on to the system) 4. FTP(file transfer protocol): Copying files between computers on a network. • Downloading • Uploading Copying files from a server computer to a client computer Copying files from a client computer to a server computer

  6. Internet Services 5. Telnet (teletype network): Loggingon to your local server across a network communications system at a distance e.g. from another country. Connecting to a network system account, normally using a password

  7. 6. MOOs (Multi-user domain that is Object-oriented): • MOOs are network accessible, multi-user, programmable , interactive systems well-suited to the construction of text-based adventure games, conferencing systems, and other collaborative software. • Is a text-based online virtual reality system to which multiple users (players) are connected at the same time. • Taking part in simulations in a shared environment. Each person assumes a persona and communicates using text messages.

  8. 7. WWW (the World Wide Web): • Commonly referred to as the Web. • Contains interlinked documents called webpages. • Awebsiteis a set of related webpages stored together on a server computer. • Browsingmeans moving from one webpage to another.

  9. 8. Social Networks: • A social network service is an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities. E.g. Facebook, MySpace and Twitter, • A social network service essentially consists of a representation of each user (often a profile), his/her social links, and a variety of additional services. • Social network services make it possible to connect people who share interests and activities across political, economic, and geographic borders.

  10. Facebook launched in 2004, has since become the largest social networking site in the world. • Twitter set the trend for "real time" services, where users can broadcast to the world what they are doing, or what is on their minds within a 140 character limit.

  11. Computer-mediated communication (CMC) Computer-mediated communication (CMC) • A term used to describe systems that allow users to communicate using a computer network. Asynchronous Synchronous Participants are not on-line at the same time and there are delays between messages. Participants are on-line at the same time. There may be a few seconds delay but the communication is closer to face-to-face interaction.

  12. Computer-mediated communication (CMC) • Examples of asynchronous communication: • Mobile phone text messages. • Emails. • newsgroups/discussion lists. • Examples of synchronous communication: • IRC • MOOs. • Audio and videoconferencing.

  13. Computer-mediated communication (CMC) • Videoconferencing: a form of communication over a network that uses video cameras so that the people taking part can see and hear each other.

  14. Computer-mediated communication (CMC) • With the exception of videoconferencing, there is no way to show facial expressions and emotions in text-based CMC systems. • To compensate, users have developed a number of strategies including: • Abbreviations and acronyms. E.g. LOL • Symbols and exclamation marks. E.gYeeeees!! • Emoticons: symbols indicating emotions. E.g. :

  15. Internet Service Provider (ISP) • Most users connect to the internet using a modem. • Modem (modulator-demodulator) is an electronic device that converts signals to enable a computer to be connected to an ordinary telephone line thru a server and a router owned by an ISP (Internet service provider). • ISP is a company that offers its customers access to the Internet. • ISPs employ a range of data transmission technologies to enable customers to connect to the internet, such as dial-up, DSL, cable modem, satellite Internet access, fiber to the home (FTTH). • ISP also provide help and support services to its customers.

  16. Internet Service Provider (ISP) To attract users to connect through their system, ISPs offer various options including: • Unlimited number of email addresses with filtering of email to remove Junkemail(unwanted email normally advertising or trying to sell something). • Web-based mail allows users to access their email form any computer with Internet access. • POP3 email requires a special email program. It is faster and more efficient.

  17. Internet Service Provider (ISP) 4. Unlimited Web space for setting up your own website and viruses checking facilities for checking your computer files to detect programs written with the purpose of causing damage or causing a computer to behave in an unusual way. Web space file storage space for storing webpage files a set of related pages stored on a server on the world wide web. Website

  18. [1] Starter • D • G • B • C • F • A • E

  19. Reading [2]

  20. Language Work: Warnings Warnings are used to: • ensure safety. • prevent damage to equipment and breaches of security • ensure the law is not broken.

  21. Language Work: Warnings • The simplest warning are basic instructions NOT to do something: • Don’t do X • Never do X • Avoid Xing • No Xing For example: Never give out your home address or phone number.

  22. Warnings 2. Sometime the warning is twinned with matching good practice: • Always do Y; never do X. • Do Y rather than doing X. For example: Use an IC extraction tool rather than a screwdriver.

  23. Warnings: 3. Warning may be made stronger by using • must/must not • should/ should not. For example: You must not drink coffee in this lab. If you spill it you may damage the keyboard.

  24. Warnings 4. If there is any reason to fear the warning may not be understood, a reason for the warning may be added. For example: Never remove ICs with a screwdriver. The pins are very fragile.

  25. Where might you see these warning • Advice on taking part in IRC. • Chassis of computer. • Computer handbook. • Data protection Act. • Computer lab notice. • Technician’s handbook.

  26. [4] • Avoid giving open access to PCs because you may get viruses. • Never use your own programs on these machines. You may introduce viruses. • You must not drink coffee in this lab. If you spill it you may damage the keyboard. • Don’t give financial information in a chat rom. Some one may try to cheat you. • Always keep your password a secret. Someone may hack in to your system. • Use up to date antivirus software. New viruses appear all the time.

  27. ….[4] 7. Always wait until a computer has reached normal room temperature before using it or you may damage the hard disk. 8.Never remove cards from there antistatic packing until required. Otherwise you may damage them. 9. Use an IC extraction tool rather than a screwdriver. The pins are fragile. 10. You must not work on a computer with the power on because you may be electrocuted.

  28. [6] problem-solving • 24 seven. • Broadband 2 • Broadband 1 • Pay As You Go

  29. Specialist reading: [A] find the answers to these questions in the following text: • Line 9 • Line 12 • Line 13 • One • Line 28 • Line 35 • Line 45 • Line 52

More Related