SlideShare a Scribd company logo
1 of 58
 
 
 
 
The Internet
[object Object],[object Object],[object Object]
ARPA   (1957 )  Advanced   Research Projects  Agency 1962   Packet-switching   technology is propose.  Wherein messages are divided into  packets   before they are sent. Each packet is then  transmitted individually and can even follow  different routes to its destination.
Once all the packets forming a  message arrive at the destination, they are recompiled into the original message. Packet   is a piece of a message transmitted over a packet-switching network.   http://www.pbs.org/opb/nerds2.0.1/geek_glossary/packet_switching_flash.html Who owns the Internet? No organization, corporation or government owns or runs the internet, the equipment –the computers, the cables, the routers are owns by the gov’t & private org. are paid for taxes & user fees.
Internet Explorer Window
MENU BAR STATUS BAR  BROWSER PANE STANDARD TOOLBAR ADDRESS BAR Links bar EXPLORER BAR TITLE BAR
Menu bar  -   contains all the commands you  need to access and move around the web page. Address bar   – displays the address of the  current page. Title bar   –a displays the name of the web page you are viewing. Standard Toolbar   – provides buttons to access & move around the web pages & work in  Internet Explorer.
Status bar  –   shows the progress of loading page. Links toolbar  -   contains buttons for quick  access  to your favorite web sites. Browser pane  –   displays the current doc. or web page. Explore bar  –   displays links to web pages from  search result, favorite list
The Internet Explorer  Standard Buttons
The  Back button   allows you to go back to the previous internet page you visited .
Forward button   lets you display the next page if you had used the Back button to get to the current page..
Stop button   stops internet activities.
Refresh button   used to resend the request to open a particular URL again once the connection has been reset .   .
Search button  allows you to gain access to search provider.
Favorites button  allows you to  store the websites that you like .
History button   shows you the list of sites that you have recently visited.
Home button   allows you to return to the home page of the site that you are visiting. Last
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Parts of an E-mail address: 1.  user name 2.  domain name   username@domain name E-mail addresses: [email_address] [email_address] [email_address] [email_address] standard format of the e-mail address
My E-mail address:   [email_address]   [email_address] [email_address] My Username is:  k05132007 My Domain name are:  yahoo.com gmail.com hotmail.com
How E-mail works?  http://www.learnthenet.com/english/animate/email.html
 
Direction: Fill in the blank. ___ 1. It is an international web of interconnected   government, education & business     computer networks. ___ 2. It is a piece of a message transmitted over   a packet-switching network. ___ 3. What is the standard format of the  email address? ___ 4. The acronym ARPA stands for ?  ___ 5. Packet-switching technology is propose in    the year  ____?
Enumeration: 6-10. Give at least 5 parts of Internet Explorer Window.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Organizational Domain Com  –  commercial company Edu   –  educational institution Gov   -  government institution Mil   –  military Net  –  an internet service provider Geographical Domain ph   –  Philippines  jp  -  Japan  au  –  Australia  us  –  USA
E-mail Abbreviations: BFN   –  OIC   – TGIF   –  BTW   – TIA   –  CUL  –  LOL  –  bye for now Oh I see thanks God its Friday by the way see you later thanks in advance laughing out loud
[object Object],[object Object],[object Object],[object Object]
Hidden Emoticons :-??  I don't know  ~O)  coffee !%-(  not listening  *-:)  idea :@)  pig  :-L  frustrated :(|)  monkey  [-O<  praying  ~:>  chicken  b-(  feeling beat  up @};-  rose  :)>-  peace sign %%-  good luck  [-X  shame on you
D/  dancing >:/  bring it on  :-j  oh go on ;))  hee hee  >-)  alien :-@  chatterbox  ^:)^  not worthy
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Yahoo! Mail appears in the browser & displays your Mail Home page.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

More Related Content

What's hot

Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide Web
Samudin Kassan
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 

What's hot (20)

Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Careers in Information Technology
Careers in Information TechnologyCareers in Information Technology
Careers in Information Technology
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide Web
 
cyber security
cyber securitycyber security
cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Internet ppt
Internet  ppt Internet  ppt
Internet ppt
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Grade 8 COMPUTER
Grade 8 COMPUTERGrade 8 COMPUTER
Grade 8 COMPUTER
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Similar to Internet lesson

6 module how to use a browser 1
6 module how to use a browser 16 module how to use a browser 1
6 module how to use a browser 1
Rozell Sneede
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway Lesson
Buffalo Seminary
 
Web Concepts
Web ConceptsWeb Concepts
Web Concepts
skrato
 
Cuthbert terminology student note
Cuthbert terminology student noteCuthbert terminology student note
Cuthbert terminology student note
etrain397
 
Lesson 6 fundamentals of internet and java programming (140 kb)
Lesson 6  fundamentals of internet and java programming (140 kb)Lesson 6  fundamentals of internet and java programming (140 kb)
Lesson 6 fundamentals of internet and java programming (140 kb)
IMRAN KHAN
 
chapter1internetande-mail-23529080408-faea35a5.ppt
chapter1internetande-mail-23529080408-faea35a5.pptchapter1internetande-mail-23529080408-faea35a5.ppt
chapter1internetande-mail-23529080408-faea35a5.ppt
enukahansana
 

Similar to Internet lesson (20)

First step to internet
First step to internet First step to internet
First step to internet
 
6 module how to use a browser 1
6 module how to use a browser 16 module how to use a browser 1
6 module how to use a browser 1
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1
 
Form 1 Term 2 Week 4.2
Form 1   Term 2   Week 4.2Form 1   Term 2   Week 4.2
Form 1 Term 2 Week 4.2
 
PPt on internet
PPt on internetPPt on internet
PPt on internet
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway Lesson
 
education technology
education technologyeducation technology
education technology
 
Internet web & eCommerce
Internet web & eCommerce Internet web & eCommerce
Internet web & eCommerce
 
Web Concepts
Web ConceptsWeb Concepts
Web Concepts
 
Internet Tools in Education
Internet Tools in EducationInternet Tools in Education
Internet Tools in Education
 
Internet
InternetInternet
Internet
 
Int d 1
Int d 1Int d 1
Int d 1
 
Cuthbert terminology student note
Cuthbert terminology student noteCuthbert terminology student note
Cuthbert terminology student note
 
Lesson 6 fundamentals of internet and java programming (140 kb)
Lesson 6  fundamentals of internet and java programming (140 kb)Lesson 6  fundamentals of internet and java programming (140 kb)
Lesson 6 fundamentals of internet and java programming (140 kb)
 
Internet
InternetInternet
Internet
 
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
 
Networking
NetworkingNetworking
Networking
 
Internet unit - 4 Of Computer
Internet unit - 4 Of ComputerInternet unit - 4 Of Computer
Internet unit - 4 Of Computer
 
IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado
 
chapter1internetande-mail-23529080408-faea35a5.ppt
chapter1internetande-mail-23529080408-faea35a5.pptchapter1internetande-mail-23529080408-faea35a5.ppt
chapter1internetande-mail-23529080408-faea35a5.ppt
 

More from San Mateo National High School/YneAhunin (7)

Html color codes and names
Html color codes and namesHtml color codes and names
Html color codes and names
 
Html color codes and names
Html color codes and namesHtml color codes and names
Html color codes and names
 
Excel ppt
Excel pptExcel ppt
Excel ppt
 
Edu20.smnhs
Edu20.smnhsEdu20.smnhs
Edu20.smnhs
 

 Rubric in Making Mosaic

 Rubric in Making Mosaic 
 Rubric in Making Mosaic

 Rubric in Making Mosaic
 
Parts of computer, keyboarding, mouse
Parts of computer, keyboarding, mouseParts of computer, keyboarding, mouse
Parts of computer, keyboarding, mouse
 
History of computer
History of computerHistory of computer
History of computer
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 

Internet lesson

  • 1.  
  • 2.  
  • 3.  
  • 4.  
  • 6.
  • 7. ARPA (1957 ) Advanced Research Projects Agency 1962 Packet-switching technology is propose. Wherein messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination.
  • 8. Once all the packets forming a message arrive at the destination, they are recompiled into the original message. Packet is a piece of a message transmitted over a packet-switching network. http://www.pbs.org/opb/nerds2.0.1/geek_glossary/packet_switching_flash.html Who owns the Internet? No organization, corporation or government owns or runs the internet, the equipment –the computers, the cables, the routers are owns by the gov’t & private org. are paid for taxes & user fees.
  • 10. MENU BAR STATUS BAR BROWSER PANE STANDARD TOOLBAR ADDRESS BAR Links bar EXPLORER BAR TITLE BAR
  • 11. Menu bar - contains all the commands you need to access and move around the web page. Address bar – displays the address of the current page. Title bar –a displays the name of the web page you are viewing. Standard Toolbar – provides buttons to access & move around the web pages & work in Internet Explorer.
  • 12. Status bar – shows the progress of loading page. Links toolbar - contains buttons for quick access to your favorite web sites. Browser pane – displays the current doc. or web page. Explore bar – displays links to web pages from search result, favorite list
  • 13. The Internet Explorer Standard Buttons
  • 14. The Back button allows you to go back to the previous internet page you visited .
  • 15. Forward button lets you display the next page if you had used the Back button to get to the current page..
  • 16. Stop button stops internet activities.
  • 17. Refresh button used to resend the request to open a particular URL again once the connection has been reset . .
  • 18. Search button allows you to gain access to search provider.
  • 19. Favorites button allows you to store the websites that you like .
  • 20. History button shows you the list of sites that you have recently visited.
  • 21. Home button allows you to return to the home page of the site that you are visiting. Last
  • 22.
  • 23. Parts of an E-mail address: 1. user name 2. domain name username@domain name E-mail addresses: [email_address] [email_address] [email_address] [email_address] standard format of the e-mail address
  • 24. My E-mail address: [email_address] [email_address] [email_address] My Username is: k05132007 My Domain name are: yahoo.com gmail.com hotmail.com
  • 25. How E-mail works? http://www.learnthenet.com/english/animate/email.html
  • 26.  
  • 27. Direction: Fill in the blank. ___ 1. It is an international web of interconnected government, education & business computer networks. ___ 2. It is a piece of a message transmitted over a packet-switching network. ___ 3. What is the standard format of the email address? ___ 4. The acronym ARPA stands for ? ___ 5. Packet-switching technology is propose in the year ____?
  • 28. Enumeration: 6-10. Give at least 5 parts of Internet Explorer Window.
  • 29.
  • 30.  
  • 31. Organizational Domain Com – commercial company Edu – educational institution Gov - government institution Mil – military Net – an internet service provider Geographical Domain ph – Philippines jp - Japan au – Australia us – USA
  • 32. E-mail Abbreviations: BFN – OIC – TGIF – BTW – TIA – CUL – LOL – bye for now Oh I see thanks God its Friday by the way see you later thanks in advance laughing out loud
  • 33.
  • 34. Hidden Emoticons :-?? I don't know ~O) coffee !%-( not listening *-:) idea :@) pig :-L frustrated :(|) monkey [-O< praying ~:> chicken b-( feeling beat up @};- rose :)>- peace sign %%- good luck [-X shame on you
  • 35. D/ dancing >:/ bring it on :-j oh go on ;)) hee hee >-) alien :-@ chatterbox ^:)^ not worthy
  • 36.
  • 37. Yahoo! Mail appears in the browser & displays your Mail Home page.
  • 38.  
  • 39.  
  • 40.  
  • 41.  
  • 42.  
  • 43.  
  • 44.  
  • 45.  
  • 46.  
  • 47.  
  • 48.  
  • 49.  
  • 50.  
  • 51.  
  • 52.  
  • 53.  
  • 54.  
  • 55.  
  • 56.  
  • 57.  
  • 58.