Presentation on the Basics of Writing. Writing a Paragraph
COMPED9 Module 3 Access, Communication, and Other Internet Services
1. COMPUTER EDUCATION 9
MODULE 3
Access, Communication, and
Other Internet Services
Prepared By: Engr. Jeremy M. Flores
2. ACCESS
The Internet and telephone
systems are similar. You can
connect a computer to the
Internet much like you
connect a phone to the
telephone system.
3. ACCESS
The most common way to
access the Internet is through
an Internet Service Provider
(ISP).
4. ACCESS
The providers are already
connected to the Internet and
provide a path or connection
for individuals to access the
Internet.
5. ACCESS
The most widely used
commercial Internet Service
Providers use telephone lines,
cable, and/or wireless
connections.
7. ACCESS
Browsers are programs that
provide access to Web
resources. It allows you to
explore, or to surf, the Web by
easily moving from one
Website to another.
9. ACCESS
For browsers to connect to
resources, the location or
address of the resources must
be specified. These addresses
are called Uniform Resource
Locators (URLs).
11. ACCESS
HTTP presents the protocol
used to connect to the
resource. It is used for Web
traffic and is the most widely
used Internet Protocol.
12. ACCESS
Domain Name indicates the
specific address where the
resource is located. The last
part of the Domain Name
following the dot (.) is the Top
Level Domain (TLD).
13. ACCESS
TLD, also known as the Web
Suffix, typically identifies the
type of organization of the
Website.
17. COMMUNICATION
Electronic Mail (E-mail) is the
transmission of electronic
messages over the Internet.
Web-Based E-mail Accounts
Client-Based E-mail Accounts
19. COMMUNICATION
Once your computer’s browser
connects to an E-mail Service
Provider, a special program
called Webmail Client is run on
the E-mail Service Provider’s
computer to begin E-mailing.
26. COMMUNICATION
Text Messaging is the process
of sending a short electronic
message, typically less than
160 characters, using a
wireless network to another
person.
39. COMMUNICATION
LinkedIn provides tools to
maintain business contacts,
develop extended business
networks, research individual
businesses, search for job
opportunities, and more.
41. COMMUNICATION
Blogs are personal Websites
used to keep in touch with
family and friends. Blog posts
are time-stamped and
arranged with the newest item
first.
45. COMMUNICATION
Podcasts do not use streaming
technology. Before a podcast
can be run, the media files
have to be downloaded and
saved to your computer.
46. COMMUNICATION
Wikis are Websites specifically
designed to allow visitors to
use their browser to add, edit,
or delete the site’s content.
47. COMMUNICATION
Wiki comes from the Hawaiian
word for FAST, which describes
the simplicity of editing and
publishing through Wiki
software.
55. CLOUD COMPUTING
Cloud Computing uses the
Internet and the Web to shift
many of these computer
activities from the user’s
computer to other computers
on the Internet.
59. CLOUD COMPUTING
Service Providers are the
organizations with computers
connected to the Internet that
are willing to provide access to
software, data, and storage.
60. CLOUD COMPUTING
Efficiency of Cloud Computing
The speed and reliability of the
user’s access to the Internet, and
the Internet’s capability to
provide safe and reliable
transmission or data and
programs.
62. WEB UTILITIES
Plug-Ins are programs that are
automatically started and
operate as a part of your
browser.
63. WEB UTILITIES
Widely Used Plug-Ins
Adobe Acrobat Reader
Adobe Flash Player
Apple QuickTime
Microsoft Windows Media Player
RealNetworks / RealPlayer
64. WEB UTILITIES
Filters block access to selected
Websites. It allows individuals,
as well as organizations, to
restrict selected sites and set
time limits.
65. WEB UTILITIES
File Transfer Utilities allow you to
copy files to your computer from
specifically configured servers
(downloading) and to copy files
from your computer to another
computer on the Internet
(uploading).
66. INTERNET SECURITY SUITES
An Internet Security Suite is a
collection of utility programs
designed to maintain your
security and privacy while you
are on the Web.