A Basic Internet Guide

What is the Internet? 

Basic Function of Internet

Computer Essentials

Internet Safety

Hand Coded HTML page

 


 

What is the Internet?

There are four basic building blocks to the Internet.

1. Hosts

2. Routers

3. Clients

4. Connections

In most case your computer falls under the "client" category.  A router is a special device. basically routers sit at key points on the Internet and act like traffic cops at an intersection of hundreds of streets.  In most cases, your data  will travel through several routers before reaching its ultimate destination.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

Connections is a term to describe how your data can go from one point to another. As an end user, you only concern is that the connection is good. There are different ways of connecting technologies: dial up phone lines, Fiber optics, ISDN...etc.

DNS (Domain Name Service). DNS servers translate symbolic machine names (such as www.oneonta.edu) into numerical IP addresses. For example, www.oneonat.edu is translated by DNS to 137.141.15.33.  Symbolic names are a great convenience because they are easier to remember than numerical IP addresses.

 

A computer

 
Fig 1.1  Internet Connections
 

Go back to TOP

 

Basic function of Internet

1.  World Wide Web (WWW)

Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News.  The World Wide Web provides a single interface for accessing all these protocols and creates a convenient and user-friendly environment.  Because of the Web's ability to work with multimedia and advanced programming languages, the Web is the most popular component of the Internet.

In addition, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP.  Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML.  The operation of the Web relies primarily on hypertext as its means of information retrieval.

A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.

HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. For example, visual formatting features are now often separated from the HTML document and placed into Cascading Style Sheets (CSS). This has several advantages, including the fact that an external style sheet can centrally control the formatting of multiple documents.

2.  Email

Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.

3.  File Transfer Protocol (FTP)

This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. 

4.   E-MAIL DISCUSSION GROUPS

One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.

5.   CHAT & INSTANT MESSAGING

Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.

Go back to TOP

 

Computer Essentials

Hardware: The computer (hard drive, processor, disk drives, on/off buttons), monitor, keyboard, mouse, printer.

Software: Computer programs 

Internet Safety

Internet users: statistics

Safety Tips for the Internet: From Logging On to Logging Off

For proper Internet and computer safety, users should follow safe practices at every stage of computer use – from the moment the computer is turned on until it is turned off.

Getting Online

Internet safety begins with a safe computer and a safe way to access the Internet.

Surfing the Internet

Once users are online, some simple safety tips can keep both a computer and the user’s personal information secure.

E-mail, Chatting and Messaging

Sending and receiving e-mail and instant messages can make a computer user vulnerable, but these safety tips for the Internet can help keep accounts protected.

Downloads

What looks like an innocent file download may actually be a virus or other damaging program, but proper Internet safety can help users avoid troubling downloads.

Your Own Space

With many social networking sites (such as Facebook) becoming popular online hangouts, understanding security tips for personal online space is critical to protecting personal information.

Credit Card and Identity Theft Protection

Financial Identity Theft – Financial identity theft is the crime of stealing personal identifying information, such as a bank account number, for the purpose of using that information fraudulently.

Criminal Identity Theft – Criminal identity theft occurs when an imposter, posing as another person, provides law enforcement with another person’s identifying information during an investigation or arrest to avoid prosecution.

Identity Cloning – Identity cloning is a type of fraud in which the criminal assumes your entire identity and life, and is able to live as the victim, get married, work, pay taxes and possibly commit crimes.

Business or Commercial Identity Theft – Business or commercial identity theft is the misappropriation of the business or commercial enterprise, with the objective of using the financial status of a business to open financial accounts, obtain credit or transact unauthorized business deals.

Identity Theft Laws and Fraud

Identity Theft Organizations and Help Groups

Online Couponing and Shopping - Basic Consumer Safety

Before starting an online transaction, take time to read the following consumer safety tips. While there are opportunities for a deal around every corner, shoppers need to be prepared. For more information, check out any one of the included resources. A little online shopping savvy goes a long way.

Know Your Merchant

Familiarize yourself with the name and reputation of any online business before making a purchase. If you’ve never dealt with a company before, search for Internet news sources, rating services, or directories to learn more. Even a simple online search could reveal information about the company, its policies, or specific customer experiences.

The Better Business Bureau: Use the search feature to read reviews, based on customer experiences with a business or charity. Search by business name, type of business or website address.

Be a Cautious Consumer: This 2009 Consumer Reports article mentions being cautious about online merchants. 

Tips for Finding Out if a Website is Secure: This information shows consumers how to figure out whether a website is secure, along with other tips for online shoppers.

Protect Your Privacy

It’s worth taking a look at the privacy policy posted on a company’s website. How much of your information are they collecting? Do they plan to sell or share it with others? You should be comfortable with providing information about yourself and the way the information will be used before continuing with your purchase. TRUSTe and BBBOnLine icons on a website demonstrate a company’s commitment to these privacy enforcement organizations. Cautious consumers think twice before providing any personal information, including a social security number, that is unnecessary to the purchase.

Cyber Security Tips for Shopping Safely Online: The United States Computer Emergency Readiness Team provides information on how consumers can protect their bank accounts and their privacy.

Keep Your Private Information to Yourself: This list of tips includes being anonymous online, being aware of cookies, and who could be watching the emails you are sending.

Website Privacy: TRUSTe put together information about how to control the amount of privacy you have on websites and with online merchants. It also explains the public and private distinction when it comes to information sharing.

Get the Details

Reputable companies provide customers with clear information on their policies and contact information. Search for the company’s shipping information, including when packages are shipped, and the fees associated with shipping and handling. Check for return policies or warranties offered by the company or the manufacturer. Finally, make sure you have the company’s contact information. Whether it be an email address or a phone number, you need a way to communicate with the company about your purchase.

Signs of Online Fraud: Be cautious about websites offering opportunities that seem too good to be true.

Tips for Avoiding Internet Fraud: The FBI lists its top suggestions for protecting yourself from all types of fraud including: non-delivery of merchandise, credit card issues, and even online auctions.

Spotting Fake URLs in Fraudulent Emails and Websites: Yale University offers a step by step guide for determining whether a certain web address or email is suspicious or fake. 

Use a Credit Card and Safeguard Your Password

Did you know that using your credit card provides you with some protection for purchases made online? Both federal law and your credit card agreement state that if an unauthorized purchase is made with the card, your liability can only be up to $50. Search the website for evidence of strong security technology. The information could be posted in the company’s policy page or with an icon showing something like a key or padlock. Keep your password safe and don’t share it with anyone else.

Safeguarding Your Password: The Department of Computer Science at the University of Maryland gives several ideas for keeping a password safe, including good and bad ideas for passwords.

Safeguarding Your Identity and Password: James Madison University offers several tricks for coming up with a strong password that you can always remember. The article also discusses when and how to change passwords.

Protection for Your Debit Card Purchases: This site features a list of the Electronic Fund Transfer Act (EFTA) and Regulation E that discuss protection for unauthorized purchases or ATM withdrawals.

Keep Good Records

Print or save a copy of any records involving your online purchases. This gives you the ability to keep track of all the important details of your transaction. You can check on the shipping dates and fees, or the specific amount charged to your credit card. This is also useful if at any point you need to return a product for a refund.

Online Shopping, Printing out Pictures and Receipts: The Harvard Business Review shows how consumers’ expectations of what they bought are attached to printing out a receipt with a picture.

Avoiding Unhappy Returns: The State of Michigan’s Attorney General explains how a receipt can make it easier to return unwanted items purchased online.

An Explanation of the Digital Receipt: Raymond R. Burke explains how digital receipts make life easier for consumers. (PDF)

Miscellaneous Online Safety:

FDIC: Online Banking, Bill Paying and Shopping: In addition to providing tips for online shopping, this article talks about various things to be aware of when banking online and downloading software.

Avoiding Problems When Shopping Online: The US government put together a list of smart shopping tips for consumers looking for a deal online.

Online Safety is a Personal Priority for Americans: A research collaboration between the National Cyber Security Alliance and the Anti-Phishing Working Group produces information about American’s opinions on their own security, or lack thereof.

Tired of Getting Unsolicited Commercial Emails?: The Coalition Against Unsolicited Commercial Email provides news regarding what you can do about unsolicited emails along with other various articles on a variety of online security precautions to consider.

Security Awareness Tip of the Day: Check this site daily to learn more about Internet security. Tips and topics range from protecting a computer to emails with suspicious content.

Mass Marketing Fraud: The Department of Justice presents details about the different types of Internet and email fraud. It also explains how the Department of Justice is working to enforce the laws in these situations.

Holiday Shopping Tips: While the Internet Crime Complaint Center created these tips for the surge of online shopping during the holidays, this information is valid at all times.

Steps to Report Identity Theft: The National Consumers League’s Internet Fraud Watch provides a step by step list of actions necessary to report identity theft.

Your Rights as a Consumer: The National Archives for the United Kingdom features an easy to read and understand explanation of your rights as a consumer.

Online Safety Tips and Volunteer Opportunities: Working to Halt Online Abuse (WHO@) lists out several different ways to stay safe online. This is not just limited to shopping. It includes tips for participating in forums, avoiding conflict, and being careful with personal information.

 

information source: The Internet & http://safety.lovetoknow.com/Safety_Tips_for_the_Internet#

http://merchantwarehouse.com/credit-card-and-identity-theft-protection
http://coupons.answers.com/guide/13892702/Online-Couponing-and-Shopping---Basic-Consumer-Safety.html

Back to TOP

Course Schedule