SlideShare uma empresa Scribd logo
1 de 16
Unit 7 Information and Communication
HTTP…. Stands for ‘Hypertext Transfer Protocol’ It is a ‘Protocol’ or a set of rules that define webpage's and webpage language.
URL Stands for ‘Uniform Resource Locator’ It is the unique web address for every single webpage http://www.amazon.co.uk The  Protocol WWW: World Wide Web Domain Name Country or organisation type
Hyperlink A link from a web page, which when clicked takes you to another page. The link can be a button, words or an image.
ISP Stands for ‘Internet Service Provider’ An organisation that provides a service to which enables you to access the Internet. You have to pay them for this service.
Web Browser A web browser is a piece of software that allows you to view webpage's. The web browser that use most of the time is Internet Explorer. Others are Netscape, Opera and Firefox
FTP Stands for ‘File Transfer Protocol’ This is the method used to ‘upload’ and ‘download’ files and webpage's to and from the internet.
Search Engines Search Engines enable you to search for specific things on the Internet by using Keywords. You can use a ‘logical operator’ to search E.g. Jaguar AND Cars will search for pages that must contain both terms ‘Jaguar’ and ‘Cars’ Jaguar OR Cars will search for pages that contain the words Jaguar or Cars so you might get a page about cars or you might get one about a big cat
WWW and Internet The Internet tends to mean all of the webpage's that are available for you access. The WWW includes the webpage's, but also e-mail, newsgroups, bulletin boards, research databases etc.
Cookie A ‘Cookie’ is a bit of software or code that is downloaded onto your computer from a webpage. It can store things like your password details or your preference for a page. You can choose not to allow cookies to be downloaded if you are worried about security or privacy
Cache The first time you visit a webpage all of the text and the images have to be downloaded and you might notice it is slow. Once you have visited that page, it is stored in your ‘cache’ on the computer (a bit like memory) so that next time you want to view that webpage, it will be loaded from your cache, so making it faster to access. You can clear your cache regularly or periodically as it can get full.
Digital Certificate An electronic file that verifies the identify of an organisation. This helps you to be sure that you are dealing with a trustworthy company if you want to purchase something from them.
Digital Signature A digital code that can be attached to an electronically transmitted message that uniquely identifies the sender. Like a written signature, the purpose of a digital signature is to guarantee that the individual sending the message really is who he or she claims to be.
Encryption In order to keep some details secure such as you credit card number when you choose to purchase an item from the Internet, encryption will be used. The credit card details are ‘scrambled’ and put into a complicated code. The details are sent from the computer in this encrypted form and arrive at the recipients computer still encrypted. The recipient has a special ‘key‘ to de-encrypt the file.
Fraud Fraud is becoming more commonplace with the increasing use of the Internet for business. Criminals try to steal credit card details or identities in order to commit crimes. Encryption can help to reduce fraud.
Firewall A firewall is a piece of software that you load onto your computer to protect it from hackers and viruses. The firewall is set to only allow certain IP addresses to access your computer. Hackers use programs to scan the internet looking for vulnerable machines.

Mais conteúdo relacionado

Mais procurados

Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using OutlookMichael Lew
 
Online security & encryption
Online security & encryptionOnline security & encryption
Online security & encryptionQamar Farooq
 
Week13presentation
Week13presentationWeek13presentation
Week13presentations1160163
 
Internet Terms Slideshow
Internet Terms SlideshowInternet Terms Slideshow
Internet Terms SlideshowTori Small
 
Certificate Locker.docx
Certificate Locker.docxCertificate Locker.docx
Certificate Locker.docxAnbuShare
 

Mais procurados (6)

SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using Outlook
 
Online security & encryption
Online security & encryptionOnline security & encryption
Online security & encryption
 
Week13presentation
Week13presentationWeek13presentation
Week13presentation
 
Internet Terms Slideshow
Internet Terms SlideshowInternet Terms Slideshow
Internet Terms Slideshow
 
Certificate Locker.docx
Certificate Locker.docxCertificate Locker.docx
Certificate Locker.docx
 

Destaque

Mahara Walk Through
Mahara Walk ThroughMahara Walk Through
Mahara Walk ThroughCraig Higham
 
Presentatiepersonalbranding
PresentatiepersonalbrandingPresentatiepersonalbranding
Presentatiepersonalbrandingkvdwater
 
Aspire Consulting Group
Aspire Consulting GroupAspire Consulting Group
Aspire Consulting GroupRahul Ranjan
 

Destaque (7)

Shannon Cannes Presentation
Shannon Cannes PresentationShannon Cannes Presentation
Shannon Cannes Presentation
 
Mahara Walk Through
Mahara Walk ThroughMahara Walk Through
Mahara Walk Through
 
Erp present
Erp presentErp present
Erp present
 
E marketing
E marketingE marketing
E marketing
 
Presentatiepersonalbranding
PresentatiepersonalbrandingPresentatiepersonalbranding
Presentatiepersonalbranding
 
Smo ratiwat
Smo ratiwatSmo ratiwat
Smo ratiwat
 
Aspire Consulting Group
Aspire Consulting GroupAspire Consulting Group
Aspire Consulting Group
 

Semelhante a Email and Internet Overview

Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
What Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika BhatiaWhat Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika Bhatiakulachihansraj
 
How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely SreeramulaSatya
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossarythinkict
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDumindu Pahalawatta
 
Acsess and Use Internet To access and use
Acsess and Use Internet To access and  useAcsess and Use Internet To access and  use
Acsess and Use Internet To access and useTsegabrehanZerihun
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commercemahesh tawade
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital SecurityRichard Homa
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using ITMirza Ćutuk
 
Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitionsRozell Sneede
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerCheapSSLUSA
 
Data Security
Data SecurityData Security
Data Securitybackdoor
 

Semelhante a Email and Internet Overview (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19
 
What Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika BhatiaWhat Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika Bhatia
 
How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossary
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Acsess and Use Internet To access and use
Acsess and Use Internet To access and  useAcsess and Use Internet To access and  use
Acsess and Use Internet To access and use
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Powerpoint Lejla Gacevic
Powerpoint Lejla GacevicPowerpoint Lejla Gacevic
Powerpoint Lejla Gacevic
 
Powerpoint Lejla Gacevic
Powerpoint Lejla GacevicPowerpoint Lejla Gacevic
Powerpoint Lejla Gacevic
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitions
 
Web 2.0 glossary
Web 2.0 glossaryWeb 2.0 glossary
Web 2.0 glossary
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Information security
Information securityInformation security
Information security
 
Ppt
PptPpt
Ppt
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
Data Security
Data SecurityData Security
Data Security
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Email and Internet Overview

  • 1. Unit 7 Information and Communication
  • 2. HTTP…. Stands for ‘Hypertext Transfer Protocol’ It is a ‘Protocol’ or a set of rules that define webpage's and webpage language.
  • 3. URL Stands for ‘Uniform Resource Locator’ It is the unique web address for every single webpage http://www.amazon.co.uk The Protocol WWW: World Wide Web Domain Name Country or organisation type
  • 4. Hyperlink A link from a web page, which when clicked takes you to another page. The link can be a button, words or an image.
  • 5. ISP Stands for ‘Internet Service Provider’ An organisation that provides a service to which enables you to access the Internet. You have to pay them for this service.
  • 6. Web Browser A web browser is a piece of software that allows you to view webpage's. The web browser that use most of the time is Internet Explorer. Others are Netscape, Opera and Firefox
  • 7. FTP Stands for ‘File Transfer Protocol’ This is the method used to ‘upload’ and ‘download’ files and webpage's to and from the internet.
  • 8. Search Engines Search Engines enable you to search for specific things on the Internet by using Keywords. You can use a ‘logical operator’ to search E.g. Jaguar AND Cars will search for pages that must contain both terms ‘Jaguar’ and ‘Cars’ Jaguar OR Cars will search for pages that contain the words Jaguar or Cars so you might get a page about cars or you might get one about a big cat
  • 9. WWW and Internet The Internet tends to mean all of the webpage's that are available for you access. The WWW includes the webpage's, but also e-mail, newsgroups, bulletin boards, research databases etc.
  • 10. Cookie A ‘Cookie’ is a bit of software or code that is downloaded onto your computer from a webpage. It can store things like your password details or your preference for a page. You can choose not to allow cookies to be downloaded if you are worried about security or privacy
  • 11. Cache The first time you visit a webpage all of the text and the images have to be downloaded and you might notice it is slow. Once you have visited that page, it is stored in your ‘cache’ on the computer (a bit like memory) so that next time you want to view that webpage, it will be loaded from your cache, so making it faster to access. You can clear your cache regularly or periodically as it can get full.
  • 12. Digital Certificate An electronic file that verifies the identify of an organisation. This helps you to be sure that you are dealing with a trustworthy company if you want to purchase something from them.
  • 13. Digital Signature A digital code that can be attached to an electronically transmitted message that uniquely identifies the sender. Like a written signature, the purpose of a digital signature is to guarantee that the individual sending the message really is who he or she claims to be.
  • 14. Encryption In order to keep some details secure such as you credit card number when you choose to purchase an item from the Internet, encryption will be used. The credit card details are ‘scrambled’ and put into a complicated code. The details are sent from the computer in this encrypted form and arrive at the recipients computer still encrypted. The recipient has a special ‘key‘ to de-encrypt the file.
  • 15. Fraud Fraud is becoming more commonplace with the increasing use of the Internet for business. Criminals try to steal credit card details or identities in order to commit crimes. Encryption can help to reduce fraud.
  • 16. Firewall A firewall is a piece of software that you load onto your computer to protect it from hackers and viruses. The firewall is set to only allow certain IP addresses to access your computer. Hackers use programs to scan the internet looking for vulnerable machines.