Académique Documents
Professionnel Documents
Culture Documents
Home Page Home page also refers to the main Web page out of a collection of Web pages. Internet Browser An Internet browser is a software program that enables you to access and navigate the Internet by viewing Web pages on your computer.
Web Site A site or area on the World Wide Web that is accessed by its own
Modem
A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted
External vs. Internal Modems External Modem: This is a modem separated from the system unit in
Internet communication protocols Computers connected to the internet communicate by using Internet Protocol (IP).
Internet hosts
Each computer on the internet is called a host computer or host. Computers on the internet are connected by cables, phone lines and satellite connections.
IP Address
Each host computer on the internet has a unique number called its IP address. IP addresses identify the host computers, so that packets reach the
correct computer.
If we use dial-up account, ISP assigns your computer an IP address each time you connect. Computers on LAN usually have IP addresses that are reserved for use on LAN. The most common IP assignment server is called DHCP (Dynamic Host Configuration Protocol).
Commands Used
Ping (Command Name: Ping Ipaddress of the system) sends out a packet to a designated internet host or network computer
Digital data transmission (Frequency) over the wires of a local telephone network (telephone lines).
Broadband
A type of data transmission in which a single wire can carry several channels at once.
The Browser
A browser is a software program used to view, download, upload, browse or otherwise access pages on the Internet.
Dial-Up connections
This works over an ordinary phone line. It uses the point-to-point protocol. A modem is needed.
DSL connections
Digital Subscriber Line is a digital, high-speed line that uses the normal phone wires with special modems on either end. The line is asymmetric, because it has more capacity for data received by the computer than for data sent from the computer.
With DSL line we can connect the computer to the internet and talk on
the phone at the same time on the same phone line. DSL modems connect to the computer through an Ethernet or other
line that can be used for faster internet access and for
regular voice calls.
Using one line, we can talk on the phone and surf the web.
For residential use ISDN provides BRI. On one line, BRI provides two 64-Kbps channels, or B channels, and one 16Kbps channel, or D channel. An ISDN adapter is needed to connect the computer to an ISDN line.
oLeased Lines
If large amount of data is to be transferred we can go fo leased line. Leased lines come in various speeds including T! and T3. Cable TV internet connections
Domain Name System The name of each host computer consists of a series of words
separated by dots.
The last part of the domain name is called the top-level domain (TLD).
The last two parts of a host computer name constitute the domain.
The second to last part of the name (second-level-domain) is chosen by the organization that owns the computer. Eg:yahoo.com Because most organizations own more than on computer on the internet, most host computer names have at least one more part,
preceding
the
domain
name
called
third-level-domain.
Eg:
www.yahoo.com, mail.yahoo.com.
numeric IP addresses that identify each host computer on the internet and the corresponding domain names.
Web Address or URL The address for a website. (URL stands for
Uniform Resource Locator web addresses usually start with the letters www (for World Wide Web) and end with a dot followed by letters that indicate the type of website it is:
com = commercial enterprise or business .org = non-profit organization .edu = educational institution .gov = government agency .mil = military agency .net = another ending for a commercial website
10/21/13
E-Mail Concepts
E-mail messages are passed through the internet by using a protocol called simple mail transfer protocol.
E-mail Addressing
Internet e-mail addresses consists of two parts joined by @ sign. User name It contains characters other than letters-they can contain numbers, underscores, periods, and some
Formatted E-mail HTML This is formatted with HTML tags, just like web
Web-Based E-mail
Using web based email we can access the web as well as read our mail.
Sending Attachments
To send a file by e-mail, create a message to which the file is to be attached.
Receiving Attachments
Most e-mail applications store the attachments in the
mail message.
First, open the message and then open or save the attachment. When the message with an attachment is deleted, the attachment is also deleted.
If successfully attached you should see an icon of the attachment in your e-mail. Below is an alternative method of attaching a file into an email. Open My computer or Windows explorer and browse to the location of where your pictures are located.
Spam
33
34
But because the Internet is public, there is really little that can be
done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent
35
36
The phrase anti spam (or anti-spam) refers to any software, hardware or process that is used to fight the creation of spam or to keep spam from entering a system.
37
38
1. Prevention: Prevention is the best medicine so avoid giving your email address to unfamiliar recipients. Use more than one email address; one for friends, family and colleagues and second for unfamiliar sources. If you have an e-mail address that receives a large amount of spam replace it with a new address.
39
41
Spam is a business, and the spammers keep doing it because people keep falling for scams like penny stocks or clicking on links to install key loggers. Don't be fooled by phrases such as "to be removed from this list, click here. Spammers use these types of catch phrases to entice users to respond to the emails.
43
By clicking and performing the action you have told the spammer that your email address is valid and reaches a real person.
44
1. Spammers in most cases need to know your email address before they can spam you so keep your email address to yourself as much as possible and use it only for work
purposes
2. When posting on a forum do not include your email address as part of your signature
45
4.Do not use your work email for this kind of personal use. 5.When signing up for forums, offers and other public services never use your work email address;
46
You need to know that whoever youre signing up with will not
give away your email address to third parties who might actually end up selling your email address for money. 8.If you use IRC and chatrooms ensure that youre not displaying your email address publicly
47
48
49
Worms are pieces of software that use that of computer networks and security holes to replicate themselves.
The worm has replicated itself, a copy of it will then scan the network for any another machine that has a security hole. And if it finds one, it will then copy itself to this new machine, and will then start replicating from there as well.
50
51
If you receive an email from someone - even if you know the person- and you were not expecting it, you should simply delete it, especially if there is an attachment that came with the email itself.
Never open the attachment to see what it is, for even if you know
the person who sent the email,. The computer may be infected with a virus and they may not even realize it, and so there is no point in taking that risk if you don't have to.
52
53
The best idea here is to make sure that you have file extension
viewing enabled.
54
Turn on your firewall to alert you on suspect over any harmful sites, data download and access over insecure data on the internet. Protect your system and internet mailing accounts with strong password; changing your password frequently helps to protect your
55
56
57
12/18/2013
Videoconferencing
Videoconferencing What Is It? : Video conferencing in its most basic form is the transmission of image (video) and speech (audio) back and forth between two or more physically separate locations.
Collaborate
Benefits of Videoconferencing : Benefits of Videoconferencing Can improve work quality Reduce costs Improves communication Groups can meet more frequently
Limitations of Videoconferencing :
Multi-point conferencing.
Point-to-point : Point-to-point A videoconference that connects two locations. Each site sees and hears the other sites at all times.
Point-to-multipoint :
Various Uses:
Presentations Virtual meetings Videoconference-based learning JIT (just in time) events Recruitment/search committees General
meetings
Various Uses: Various Uses: Presentations Virtual meetings Videoconferencebased learning JIT (just in time) events Recruitment/search
Additional Uses: : Additional Uses: Project coordination Informal work sessions sessions Alumni relations Question and answer