Module 03 Configuring and Using Internet
Module 03 Configuring and Using Internet
Document No.
Institution Name
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level II
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
ThismoduleincludesthefollowingLearningGuides
LO3 Work as a team member MODULE CODE: EIS WDDBA2 M03 0322
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Introduction to module
The internet developed from software called the ARPANET which the U.S military had
developed. It was only restricting to military personnel and the people who developed it. Only
after it was privatized was it allowed to be used commercially.
The Internet is means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers. When two computers are connected over the Internet, they can
send and receive all kinds of information such as text, graphics, voice, video, and computer
programs.
To use the above function of the internet the user must use different types of browsers like
internet explorer Mozilla Firefox, google chrome, opera and also internet address and web site
what you went to browse.
This module is designed to meet the industry requirement under the Web Development and
Database Administrationoccupational standard, particularly for the unit of competency:
Configuring and Accessing Internet Services
This module covers the units:
Manage internet
Search internet
Work as a team member
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to: -
Required to access internet
Internet or web browser
Managing web browser
Adjust view mode
Setting homepage
Download and upload image.
Save book marks
Managing cookies, history, temporary file
Security of internet
Principles of netiquette
Use different search engine
Saving search results
Printing downloaded file
Communicate with tem member using
internet
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 4 of 71
Module Instruction
For effective use these modules trainees are expected to follow the following module instruction:
1. Read the specific objectives of this Learning Guide.
2. Read the information about unit one content in page
3. Read the information written in unit one from page 3-22
4. Read the information written in unit two from page 31-41
5. Read the information written in unit three from page 51-57
6. Accomplish the “Self-check-1, Self-check-2, and Self-check-3in page 23,44, 58respectively
7. If you earned a satisfactory evaluation from the “Self-check” proceed to
Operation Sheet for unit oneis from24 -29
Operation Sheet for unit two is from 45-49
Operation Sheet unit three is from 59 - 62
8. Do the “LAP test for unit one, unit two, unit three”in page 30,50, 63respectively
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Introduction to the internet
Opening different types of internet browsers
Accessing a particular site using its URL to obtain data and browse links
Manage the setting of the browsers
Adjusting display/view modes to suit personal requirements
Loading necessary files depends on the capability of internet
Modifying toolbars to meet user and browsing needs
Deleting cookies and browser history as precaution from virus infection.
This unit will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
Delete Cookies and history of internet browser as precaution from virus infection
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
No one owns Internet, although several organizations the world over collaborate in its
functioning and development. The high-speed, fiber-optic cables (called backbones) through
which the bulk of the Internet data travels are owned by telephone companies in their respective
countries.
The internet developed from software called the ARPANET which the U.S military had
developed. It was only restricting to military personnel and the people who developed it. Only
after it was privatized was it allowed to be used commercially.
The internet has developed to give many benefits to mankind. The access to information is one
of the most important. Student can now have access to libraries around the world. Some charge a
fee but most provide free services. Before students had to spend hours and hours in the libraries
but now at the touch of a button students have a huge database in front of them.
1.1.1. Basic Internet Terms and Terminology
Here is a look at the buzzwords of the world of Internet.
ARPANET: The acronym stands for Advanced Research Projects Agency Network. ARPA
of the United States Department of Defense developed ARPANET, which became the world’s
first packet switching network. Internet is the successor of ARPANET.
Internet Service Provider: A company, which provides users with an access to the Internet,
is known as an Internet service provider or Internet access provider. ISP, as it is called, offers
W/R SIHEENPOLYTECHNICCOLLEGE
email accounts s
and other services like remote storage of files for its customers.Issue
HereNo. is a word
Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
about choosing a cheap ISP.
W/R SIHEENPOLYTECHNICCOLLEGE
HTTP: s
Hypertext Transfer Protocol, abbreviated as HTTP, is a communications
Issue No.
protocol
Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
used for the transfer of information over the Internet. A client makes an HTTP request using a
web browser to which an HTTP response is sent from the server.
Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged between
the web client and the web server. It is sent by the web server to the web client and returned
unchanged by the client each time it accesses the server.
Session: It is an exchange of information between a computer and its user. It is established
for a certain period of time after which it ends.
Hyperlink: A reference in a document to another section of the document or to another
document is termed as a hyperlink. Hyperlinks are used to redirect the user from one section
of a page content to another.
Internet Security: It is one of the major concerns today. As the Internet acts as a
communication platform that can be accessed by millions of users around the world, it
becomes necessary that proper measures be implemented. Issues like Internet Safety that deal
with the content that is made accessible over the Internet are equally important. Internet
Privacy relates to safeguarding the privacy of the web users and the sensitive information on
the web from hackers and stalkers.
W/R SIHEENPOLYTECHNICCOLLEGE
However, there are a number of very good sbrowsers to choose between, and the
Title:Information Sheet
Issueright
No. onePage
forNo.
COLLEGE 1 Page 57 of 72
you will depend on your requirements.
There are so many types of internet browsers are usedto upload or download files for different
office intercommunication though it.
W/R SIHEENPOLYTECHNICCOLLEGE
2. Chrome: Best for Google Drive s Issue No. Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
Google Chrome comes standard on most Android mobile devices, so it is a good
choice for cell phones and tablets. Plus we’ve found that it works a bit better than
Firefox on Android devices. Chrome is also a good choice for Windows and Mac
computers.
If you use Chrome on multiple devices, logging in to your account will give you quick
access to documents you saved in Google Docs, your Gmail messages and your
bookmarks, regardless of the device you’re on. Search history is also saved with your
account, so if you’re logged in, terms you’ve looked for will auto-populate when you
start typing in the Google search field on any device.
Chrome lets you set icons on your toolbar so you can quickly get to the pages you visit most
often. You can also pin bookmarks to the Google Chrome homepage. It has tabbed browsing so
you can have multiple viewing windows open at once and easily toggle between them. During
out in-house tests, we noticed Chrome didn’t identify as many phishing schemes as Firefox, but
it did stop malicious files, including ransomware and Trojans, from opening and infecting our
computer. Chrome’s privacy browser is available on all devices, including cell phones, to keep
your online activity private.
3. Microsoft Edge: Best for battery life
W/R SIHEENPOLYTECHNICCOLLEGE
to use less power, which is importants on a laptop. The trade-off is that it doesn't
Title:Information Sheet
Issue No. havePage
theNo.
COLLEGE 1 Page 57 of 72
wealth of extensions or apps you'll find with those other browsers.
When we tested Edge’s security, it not only warned of phishing schemes and other dangerous
websites, but it also blocked malware files from infecting out test devices. Microsoft Edge
includes Notes, a tool that lets you highlight works or passages on any webpage and save them to
read later.
You can add icons to the toolbar that link you to frequently visited websites and use the URL
field to search the web. Edge has sync capabilities so you can access your bookmarks and search
history across all your devices. Microsoft is one of the few internet browser developers that
offers telephone support if you are having difficulties with its program.
W/R SIHEENPOLYTECHNICCOLLEGE
phishing schemes s But it didn’t stop malicious downloads,
or dangerous links on them. Issue No. so we Page
had No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
to depend on a Mac antivirus program to gather these threats during the download process.
This is one of the few browsers that has live support. It also has great online resources, like
tutorials and searchable FAQs, so you can find answers on your own.
UC Browser is a light, smart browser that gives users the fastest mobile
web browsing experience. UC Browser uses the latest in web kit
technology to offer features like ad-blocking, built-in Google
Translate, and voice search for Android phones. The app also has a
smart download feature so you can easily download files on spot. One of the most talked
about features is UC News.
7. Chedot Browser: beast to download video and audio at the same time
W/R SIHEENPOLYTECHNICCOLLEGE
other similarTitle:functionality. This application smay seem legitimate and useful, however,
Information Sheet
Issue No. Chedot
Page No.
COLLEGE 1 Page 57 of 72
Browser is classed as adware and a potentially unwanted program (PUP).
This rogue application infiltrates systems without users' consent, generates intrusive online
advertisements, and tracks Internet browsing activity. Users who attempt to search the Internet
via this browser are redirected to the search.chedot.com website.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
W/R SIHEENPOLYTECHNICCOLLEGE
To configure s
the home page, use the following steps do not forget this is used Issue
only No. Microsoft
Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
edge browser only: -
1. Click on three dot at the right top of the browser.
2. Click on setting
3. Click on start, home and new tab.
4. Write down what you went to home page
5. Click on save
6. To open the home page use (ALT +HOME KEY) short cut
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
W/R SIHEENPOLYTECHNICCOLLEGE
Each time aTitle:
user visits a website s
Sheet using COLLEGE
Microsoft Internet Explorer, files downloaded
Issue No. with each
Page No.
Information 1 Page 57 of 72
web page (including HTML and Javascript code) are saved to the Temporary Internet Files
folder, creating a web cache of the web page on the local computer's hard disk drive, or other
form of digital data storage. The next time the user visits the cached website, only changed
content needs to be downloaded from the Internet; the unchanged data is available in the cache.
Despite the name 'temporary', the cache of a website remains stored on the hard disk until the
user manually clears the cache, the cache expires or if the cache is full. This is often regarded as
a privacy issue, because anyone with access to the computer can view the cache. The contents of
the folder are indexed using an index.dat file, a form of database.
The Temporary Internet Files cache can be useful in certain situations. For example, if
no Internet connection is available, previously cached websites are still available offline. Certain
online media files (such as embedded Flash movies) are not easily accessed directly through
Internet Explorer, but are automatically saved into the cache after viewing them. Depending on
the type of website and how often it is updated, the cached data may not reflect the online
version of the website. The cache is also useful for police to collect forensic evidence.
The cache can be cleared by using Internet Options within the Internet Explorer interface, but
this method is subject to deletion privacy issues. Many alternative tools exist to erase the data
instead.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Example: - use win +RThen type %temp% then click Enter
W/R SIHEENPOLYTECHNICCOLLEGE
1.6. Loaded Images
Title:Information depending ons modem speed, computer andIssue
Sheet 1
browser
No. Page No.
Page 57 of 72
COLLEGE
capabilities
In accessing information on the Internet you may have to consider whether to load or not load
images. Understanding the capabilities of your modem, computer and browser will help you to
make an informed decision.
Modem Speed
The latest modems on the market would normally be installed to run at the fastest speed possible,
for example 115200 bits per second. Having a fast modem connected to your computer will
download images quickly. If a slower speed modem is connected to your computer, then images
will be downloaded at a much slower rate. Being aware of your modem’s capabilities will help
you decide on whether images should be loaded or not loaded. Time should also be considered
when accessing the Internet. Even a fast modem cannot take into consideration a country’s
business hours, or a 'high activity period, for example, after school hours or early evening. Do
not forget to consider these points if you are having difficulty in browsing the web site you
require.
The bandwidth of your Internet connection is dependent on the speed of your modem. If the
bandwidth is small, it will not be able to download images very quickly. The file format of any
image saved on the computer will take up much more memory area than text. Hence, you must
make sure that you have adequate storage area for image file and the bandwidth is large enough
to transfer the image file.
Computer speed and capacity
The speed and capacity of your computer also affects the speed at which images are loaded. If
the computer's speed is slow and the capacity minimal, it may be better to turn off multimedia
features such as pictures, sounds and videos in order to speed up the delivery and display of web
page information.
To display a web page without graphics, select Tools from the menu bar and choose Internet
Options. From the Internet Options dialogue box there are six tabbed sections. Select the
Advanced tabbed section.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Browser Capabilities
To display web page details as quickly as possible, consideration should be given to the types of
browsers available. Browsers such as Microsoft Internet Explorer and Netscape Navigator are
referred to as graphical browsers as they are able to display graphics, colors and multimedia
features.
When a web site is visited, the details of that web page are stored in the browser's cache. Web
pages stored to be read offline are also stored in the cache. Microsoft Internet Explorer's cache is
labeled 'Temporary Internet Files' whereas Netscape Navigator stores its cache in the program
folder. This speeds up the display of pages that are visited frequently because the Web page
details are accessed from the cache instead of from the web. It is possible to increase the size of
the cache, but doing this will reduce the space available for other files on your computer. It is
also possible to delete files from the 'Temporary Internet files' folder to free up space within the
cache. However, deleting files could result in delay if those web pages are required at a later
date, as they can no longer be accessed from the cache and they will have to be downloaded
again.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
history and search history online. Many antivirus companies refer to these programs as grayware
or Potentially Unwanted Programs (PUPs).
Developing a toolbar
The programming language and development tools behind a browser toolbar vary from one
browser to another.
In Internet Explorer5 or later toolbars may be created as browser extensions written in C# or C+
+. More specifically, it is possible to create up to three different kinds of toolbars (custom
explorer bars, tool bands and desk bands) and to combine them with browser helper objects in
order to provide added functionality.
In Firefox toolbars can be created as add-ons that contribute to the GUI by extending the browser
with XUL (support for XUL was removed in Firefox version 57). The logic behind the toolbar is
written in JavaScript running under expanded privileges. Mozilla Jetpack can be used to simplify
the development of add-ons for Firefox.
In Safari 5 or later toolbars can be created as extensions that add bars and buttons. The logic
behind the toolbar is written in JavaScript with access to a special JavaScript API to interact with
the Safari application and web content.
In Google Chrome 4 or later toolbars can be created as extensions that add browser actions to the
browser window. The logic behind the toolbar is written in JavaScript with access to a special
JavaScript API to interact with the Chrome application and web content. The privileges under
which a Chrome extension runs are governed by a set of permissions.
In Opera 11 or later toolbars can be created as extensions that add buttons to the browser
window. The logic behind the toolbar is written in JavaScript with access to a special JavaScript
API to interact with the Opera application and web content.
In Firefox, Chrome, Safari and Opera toolbar styling is done though CSS.
Native vs. injected toolbars
Some major browsers (Internet Explorer and Firefox) enable the creation of native toolbars i.e.,
toolbars which are directly inserted in the browser window. Examples of native toolbars are
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Google Toolbar and Stumble upon Toolbar. Native toolbars use browser-specific code to create
the same toolbar for each different browser version.
Some toolbar developers use a different approach and make the browser extension inject a
JavaScript file in every web page visited by the user. All major browsers support injected
toolbars. The code in this file inserts the toolbar as a part of the DOM in every web page.
Injected toolbars use essentially the same JavaScript code to draw the toolbar for each different
browser version.
1. Opera
Opera doesn’t have a standard toolbar, and the only toolbars that it has are the bookmarks
toolbar and extensions toolbar.
To reveal bookmarks toolbar, do the following:
1. Open the Opera menu.
2. Go to Bookmarks and select Show bookmarks.
2.Firefox
1. Press the Alt key.
2. Select View and select Toolbars.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
3. From there you can choose which toolbars you want to keep visibly
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
3. Drag and drop the icons that you want to use onto your toolbar.
W/R SIHEENPOLYTECHNICCOLLEGE
OpenTitle:Chrome. s Issue No. Page No.
Information Sheet COLLEGE 1 Page 57 of 72
In the top right corner of the browser, you will see three dots which indicate a settings
menu.
Click on “More tools” and then select “Clear browsing data”.
This will open a dialog box to delete your browsing and download history, cookies,
cached images and files, saved passwords and more. Select the appropriate time frame
and select “Clear data”.
Exit/quit all browser windows and re-open the browser.
B. Microsoft Edge:
Launch Microsoft Edge.
From the three dots on the top right corner of the browser window, select “Settings”.
Open the hamburger menu (three stacked bars) by Settings and select “Privacy,
search, and services”.
Under Clear Browsing Data, select “Choose what to clear”.
In the dialog box select the appropriate time frame and what you want to clear. Select
“Clear Now”.
Exit/quit all browser windows and re-open the browser.
C. Firefox:
Open Firefox on your computer.
In the upper right-hand corner of the browser, click the “menu bars,” which look like
three parallel lines, and click the “Privacy and Security” tab.
Scroll down to get to “History”.
Click the “Clear History” button to select the time frame and what items you would
like to clear. Select “Ok”.
Exit/quit all browser windows and re-open the browser.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Self-Check-1
Part I: - choose the best answer from the given alternate
1. Each website is located at a unique global address called
A. Uniform Resource Locator (URL C. Hyperlinks
B. HTTP D. Web site
2. _______ is a connection from one web resource to another
A. Link C. Internet
B. Uniform Resource locator D. E- Mail
3. Three pieces of information needed to retrieve a document used by URL is:
A. the protocol to be used
B. the server address and port to which to connect
C. the path to the information
D. All
4. Microsoft Internet Explorer and Google chrome are referred to as:
A. graphical browsers C. Browser soft wares
B. Mozilla fire fox D. All
5. ____________ is means of connecting a computer to any other computer anywhere in
the world via dedicated routers and servers
A. Browser soft wares C. Computer system
B. Internet D. Search engines
6. A company which provides users with an access to the Internet is
A. Google C. Internet service Provider
B. Yahoo D. home page
7. A reference in a document to another section of the document or to another document is
termed as
A. Temporary files C. Internet
B. Hyperlink D. World Wide Web
8. _____ is used to refer to the page that is the default page of any website
A. Web page C. Home Page
B. Web site D. HTTP
W/R SIHEENPOLYTECHNICCOLLEGE
9. A collection of interlinked documents thatsare accessible over the Internet is:
Title:Information Sheet
Issue No. Page No.
COLLEGE 1 Page 57 of 72
A. Internet Security C. World Wide Web
B. Mozilla fire fox D. Arpanet
10. The acronym of URL stands for
A. Unified resource loader C. Uniform resource loader
B. Unified resource locater D. Uniform resource locator
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
W/R SIHEENPOLYTECHNICCOLLEGE
Figure 1. 11Title:
Enabling and Sheet s screen
disabling chrome full Issue No. Page No.
Information COLLEGE 1 Page 57 of 72
W/R SIHEENPOLYTECHNICCOLLEGE
OperationTitle:Sheet 1.3.Procedures s
to Modifying Toolbars Issue No. Page No.
Information Sheet COLLEGE 1 Page 57 of 72
Operation title:Modifying browser toolbars
Purpose: to steps required to modifying browser toolbars and customize the overflow menu
or the toolbar
Instruction: Using the figure below and given equipment. You have given 30Minut for the
task and you are expected to complete tasks.
Tools and requirement:
1. Computer 2. Internet 3. Network infrastructure
Steps in doing the task
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
W/R SIHEENPOLYTECHNICCOLLEGE
OperationTitle:Sheet 1.5: Sheet s
upload a new file Issue No. Page No.
Information COLLEGE 1 Page 57 of 72
Step 5 Click open.
Quality Criteria: the upload new file correctly
W/R SIHEENPOLYTECHNICCOLLEGE
Purpose: Accessing to opening URL s Issue No. Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
Instruction: Using the figure below and given equipment. You have given 30Minut for the
task and you are expected to complete tasks.
Tools and requirement:
Computer Internet Network infrastructure
Steps in doing the task
Step 1 Open one of your favorite browsers
Step 2 Write the address you want to access on the Address Bar
Step 3 Press Enter from key board or
Step 4 Click Go
Lap Test-1
W/R SIHEENPOLYTECHNICCOLLEGE
Task 1 Change TheSheet s browser
home page of your Issue No. Page No.
Title: Information COLLEGE 1 Page 57 of 72
LO 2. Search internet
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Privacy and security threats on the internet
Observing OHS and netiquette principles
Opening different types of search engines
Defining search requirements using a range of search parameters
Evaluating and assessing the authority, reliability and authenticity of information
Downloading the required files
Saving search results and presenting as a report according to the information required
Creating bookmarks for required web page and saved in associated bookmark folder
W/R SIHEENPOLYTECHNICCOLLEGE
Modifying s
page set up options and printing required information from webIssuepages
No. Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
This unit will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
Open search engines and search requirements using defined range of search parameters
Save search results according to the required information
Create bookmarks the required web page and save in associated bookmark folder
Modify page set up options and web page or the required information printed
shutdown and exitbrowser
observeOHS and netiquette principles through the process
W/R SIHEENPOLYTECHNICCOLLEGE
Yahoo usedTitle:
toInformation
be the largest search engine sin the world. These days, it's powered
Sheet
Issue by
No. Bing Page
and No.
COLLEGE 1 Page 57 of 72
delivers similar results.
B. Identification Threat: In this type of threat the attacker can receive sporadic updates of
user location, which can be used to identify the user’s frequently visited locations (such as
home or work place)
C. Profiling Threat: In this type of threat the attacker may not have the required information
to identify the user but can use the locations to profile the user. For example, an attacker
can identify which hospitals or religious places a user visits, or which places the user goes
for shopping, and how often.
Through the above location privacy threats an attacker gathers information of user locations
through which the attacker can obtain clues about the user’s private information such as user
lifestyle, time and purpose of movements through different locations, and so on, even if the user
does not disclose their identity
2.2.1. Top Computer Security Threats
The Internet is a beautiful thing. You can shop online, conduct business, and watch cute cat
videos. But like the Wild West, the Internet has outlaws.
Hackers steal millions of dollars’ worth of data every day. In fact, half of all small
businesses report suffering a cyber-attack. Even the big guys like Sony aren’t immune to a cyber
W/R SIHEENPOLYTECHNICCOLLEGE
thief’s sticky fingers.Knowing is half the sbattle, especially in the digital space.
Title:Information Sheet
Issue No.These Page
five No.
COLLEGE 1 Page 57 of 72
common computer security threats could ruin you if left undetected.
1. Botnets
These guys are the ninjas of digital crime. If your computer’s infected with one, you won’t know
it.Botnets are a collection of software robots that infect other computers, called zombies. The
creator of the botnets can then control the zombies.
Using the zombies, the controller can send infected emails and spread malware. Worse, they can
recruit your computer into an army, carrying out the next threat on our list.
2. DDOS Attacks
DDOS stands for distributed denial-of-service. It’s one of the nastier online threats.
Hackers use zombie computers to sabotage a server. They contact it again and again, flooding it
with piles of useless data. The traffic increases so much, it can force the server to shut down.
The network then can’t serve legitimate users.For most online businesses, traffic is revenue. A
server slows down, or worse, a shutdown, spells catastrophe.
3. Mobile Malware
More and more people browse the Internet with their phones. Businesses have adapted. They
make phone friendly websites and mobile apps to buy.The trouble is, hackers have gone mobile
too.Using infected apps, hackers steal information with mobile malware. Often, they go after
businesses because most don’t have the proper security.
4. Phishing
Also known as spoofing, phishing is a common cyber scam: easy to do with effortless results.
Hackers bait the hook with fake text messages, websites, and emails appearing legitimate. They
ask you to submit information or update an account.
Don’t let them fool you though. It’s only a trick to steal from you and wreck your system.
5. Ransomware
One of the worst Internet threats is ransomware. It’s a type of malware designed to restrict access
to your computer. It can come from phishing emails or pop-up ads.
Ransomware has two flavors: lock screen and encryption. Lock screen ransomware prevents you
from accessing your computer. Encryption ransomware locks up your files on your hard drive,
shared network, USB, or the cloud.
W/R SIHEENPOLYTECHNICCOLLEGE
With each, you’ll s
receive a notification demanding payment to restore access. Hackers
Issue No. may even
Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
disguise themselves as law enforcement. They might say the money is to avoid prosecution for
illegal activity.
Whatever the case, never pay the ransom. It’s a trick to steal money, and restored access is never
guaranteed.
Netiquette refers to your Internet custom, or the way you behave online and on social media.
Because the majority of online communication is completely non-verbal, you cannot see or use
facial expressions or tone of voice to back what you are typing.
W/R SIHEENPOLYTECHNICCOLLEGE
If someone s
sends you an email or an online message, send them a response Issue
quickly.
No. If Page
you No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
cannot send a thorough reply, at least acknowledge that you received the message.
7. Respect the Privacy and Rights of Others
If you have someone’s permission to share their words, then do so, but remember that
people’s words are their own property. Do not forward personal emails or share statuses
without the original person’s permission.
8. Identify Yourself
Identify yourself in online communications, like email. Let the recipient know who you
are. Don’t forget to sign the email at the end. Treat the email with the same professionalism
you would use with a written communication.
W/R SIHEENPOLYTECHNICCOLLEGE
MSN s Issue No. Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
Lycos
AltaVista
Netscape
Ask
A. Differences between search engines
There are a huge variety of search engines. Most search engines explore most of the
computers connected to the Internet. However, some ‘search engines’ are really a
search of a particular site, or perhaps a group of sites.
examples include:
Explore — specialises in information related to international law
Travelocity — specialises in information related to travel
Hotwire —specialises in information related to computer and communications
technology.
B. Searching information on the internet the Internet
i. Creating a search expression
In order to use a search engine, you must first locate the search engine on the Internet. Usually,
you would do this either by typing in the URL of the search engine you wish to use. A search bar
will appear and you type your expression into this bar. How you express your search will be
explained later.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
W/R SIHEENPOLYTECHNICCOLLEGE
Use s the phrase you are using is locatedIssue
double quotation marks to ensure inNo.exactly Page
that No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
sequence.
Also try different search engines. You will most likely get different results from the same search
terms.
D. Narrowing or broadening a search
The trick to getting good results from your search expression is to be able to broaden or narrow
your search as required. For some topics, you will get millions of results (or hits), while for
others you might get none. As pointed out above you can:
Use words to broaden your search like OR.
Use words to narrow your search like AND, +, -, NOT.
We’re certainly reducing the amount of information to be filtered. Though, this is still way too
many results to work through.
Let’s investigate a different search engine using the same expressions. Firstly, IT Certificate 2
across the Web.
W/R SIHEENPOLYTECHNICCOLLEGE
InformationTitle:
resources reflect s
their creators' expertise and credibility, and are evaluated
Issue No. basedPageon
No.
Information Sheet COLLEGE 1 Page 57 of 72
the information need and the context in which the information will be used. Authority is
constructed in that various communities may recognize different types of authority. Authority is
important in determining the credibility of a website because it establishes who is in charge of
the site, who wrote the information covered there, and more.
Evaluating a source by authority means that you are asking:
Does the author have expertise on the topic about which he/she is writing?
Who is the author?
Is he or she a subject expert on the topic?
What are the author's credentials?
Reliability of information
Data reliability means that data is complete and accurate, and it is a crucial foundation for
building data trust across the organization. Ensuring data reliability is one of the main objectives
of data integrity initiatives, which are also used to maintain data security, data quality, and
regulatory compliance. Data reliability assessment, also referred to as trust assessment, is an
important process that can reveal problem areas about your data that you didn’t even know
existed. The assessment will typically measure three different aspects of data reliability.
validity: - is the data correctly formatted and stored in the right way?
Completeness: - does the dataset include values for all the fields required by your system?
Uniqueness: - is the data free from duplicates and dummy entries?
Data reliability assessment can also take other factors into account and touch on aspects of data
quality, such as looking at how many times a dataset has been relied on, where it originated, and
how the data has been transformed. Getting to this deeper level of understanding is especially
important for data related to sensitive information where complete accuracy is essential. To
support a financial audit, for instance, it is vital to be able to prove data reliability
Authenticity of information
W/R SIHEENPOLYTECHNICCOLLEGE
AuthenticityTitle:are used to establish s
Sheet the process of ascertaining authenticity of information on the
Issue No. Page No.
Information COLLEGE 1 Page 57 of 72
Internet, and in the final section we propose some ways and means through which authenticity of,
content and. purpose of, information in the cyberspace could be instituted.
In the dictionary “authentic” is described as "genuine; real; veritable; not false or copied; sharing
the sense of actuality and lack of falsehood or misrepresentation" and "having the origin
supported by unquestionable evidence; authenticated; verified; or entitled toacceptance or belief
because of agreement with known facts or experience; reliable; trustworthy".
Information generally has bias; therefore, authenticity is not limited to verifying authorship and
diplomatic of a document. In fact, it includes attributes such as completeness, accuracy,
trustworthiness, correctness, validity, integrity, faithfulness, originality, meaningfulness, and
suitability for an intended purpose. The criteria are:
Currency: Timeliness of the information.
Relevance: Importance of the information for your needs.
W/R SIHEENPOLYTECHNICCOLLEGE
Using one ofTitle:the above download s
Sheet manager you can download any file or document, image,
Issue No. Page No.
Information COLLEGE 1 Page 57 of 72
audio, video, application and other.
2.5. Creating bookmarks for required web page and saved in folder
2.5.1. Export, Save and Import Chrome Bookmarks
Whether you just bought a new computer or you just want to start using a different browser,
Google Chrome makes it easy to save all your bookmarks. Then you can import them to a new
computer or browser, so it will feel just like your old one. Here’s how you can export, save, and
import Chrome bookmarks, so you can transfer then to another computer or have a backup.
To export and save your bookmarks, open Chrome and go to
Menu > Bookmarks > Bookmark manager. Then click the three-dot icon and select Export
W/R SIHEENPOLYTECHNICCOLLEGE
5. Next, s
click Export Bookmarks. Clicking this will open the File Explorer Issue
onNo.a Windows
Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
10 computer or the Finder on a Mac computer.
6. Finally, choose a name and destination and click Save. If you want to transfer your
Chrome bookmarks to a new computer, you can save the HTML file to a flash drive or an
external hard drive. Or, you can save your Chrome bookmarks to your desktop and email it to
yourself as an attachment.
Import Chrome Bookmarks
To import your Chrome bookmarks, open Chrome and go to Menu> Bookmarks >
Bookmark manager and click the three-dot icon. Finally, click Import and select the HTML
file you exported.
1. Open Google Chrome.
2. Click the icon with three vertical dots in the top-right corner.
3. Then go to Bookmarks > Bookmark manager
4. Next, click on the icon with three vertical dots next to the search bar. You will find this
next to the Bookmarks search bar, under the Chrome address bar.
5. Then click Import Bookmarks. Clicking this will open the computer’s Open file dialog
box and prompt you to load a file. Choose the HTML file you saved to import your
Chrome bookmarks.
6. Finally, select the saved bookmarks HTML file and click Open. All your bookmarks will
then be imported.
2.6. Pageset up options and printing required information from web pages
Page set up options
Use “Page Setup” in Internet Explorer if you wish to make any changes to the way your page
looks after it prints. If you’re using Google Chrome, the option to make adjustments to the page
will automatically appear after you hit “Print.”
Printing required information from web pages
W/R SIHEENPOLYTECHNICCOLLEGE
Printing a web s
page is reasonably straightforward, but it differs slightly Issue
depending
No. on
Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
the Internet browser used. To proceed, select your preferred browser from the list below and
follow the instructions.
In Internet Explorer, the “Print Preview” option will allow you to see what your page will look
like before your print it out. Google Chrome will automatically show you a preview of the page
to be printed after you select “Print.”
How to print one or more page(s) at a time
1. Open the Google Chrome browser and access the page you want to print.
2. Click Customize and control Google Chrome in the upper-right corner of the
browser window.
3. Select Print from the drop-down
menu that appears.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Click
Page hear
57 of 72
Self-check-2
Part I: - Write True if the statement is Correct and False If the statement is Incorrect
1. Online data storage refers to the practice of storing electronic data with a third-party
services accessed via the internet
2. Saving the document means storing the document on to the secondary storage devices.
3. One of the biggest benefits of online storage is the ability to access data from anywhere.
W/R SIHEENPOLYTECHNICCOLLEGE
4. Traditional s tape storages.
local storage includes disk or Issue No. Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
5. Portable storages include optical medias or flash drives.
6. Book mark is a saved shortcut that directs your browser to a specific webpage
7. Book mark stores the title, URL, and icon of the corresponding page.
8. To create a bookmark, simply visit the page you want to bookmark and select Add
Bookmark or Bookmark this Page from the Bookmarks menu.
9. A bookmark stores the location of a webpage and store the contents of the webpage itself.
10. Saving bookmarks allows you to easily access your favorite locations on the Web.
Part II: Choose the best answer from the given alternative
1. ______ is a tool we use to find websites and information on the Internet.
A. Internet Explorer C. search engines
B. Cookies D. Book marks
2. . Among the following which one is not categorized under search engine
A. Mozilla Firefox C. Yahoo
B. Google search D. MSN
3. When you are looking for search terms:
A. Type in the question in a full English sentence.
B. Use just the main keywords.
C. Add more keywords to narrow down (reduce) the number of hits.
D. All
4. ______ refers to a method of saving a web page
A. search engine C. Browser
B. Book Mark D. Internet
W/R SIHEENPOLYTECHNICCOLLEGE
1. Title:Computer s
2. Internet 3. NetworkIssue
infrastructure
No. Page No.
Information Sheet COLLEGE 1 Page 57 of 72
Steps in doing the task
Step 1 Open one of your preferable browsers
Step 2 Write the search engine you want to use
Step 3 Click search
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Step 5 Choose the location you wish to save your web page to, ie the drive as well as the
folder you wish to use.
Step 6 Click on Save.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
On the Save Web Page screen, when you click on Save, the file IT Framework Course –
Information Technology will be saved into the desktop folder in this example.
W/R SIHEENPOLYTECHNICCOLLEGE
Notice that Title:
a folder holding
Information all the graphics srelating to this web page is also saved.
Sheet This allows
Issue No. Page No.
COLLEGE 1 Page 57 of 72
all information to be viewed offline, i.e., when you are no longer connected to the Internet.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Operation Sheet 2.3 Creating and saving bookmarks
Operation title:Creating and saving bookmarks
Purpose:Creating and saving bookmarks
Instruction: Using the figure below and given equipment. You have given 30Minut for the
task and you are expected to complete tasks.
Tools and requirement:
A. Computer B. Internet C. Network
infrastructure
Steps in doing the task
Step 1 Go to the website you wish to save as a favourite.
Step 2 Choose bookmark menu or click on the bookmark button on the toolbar.
Step 3 Choose Add to bookmark.
Step 4 At the next screen, click on Create In if you cannot see the New Folder option.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
LAP Test-2
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Effective and appropriate forms of communications with team members.
Making effective and appropriate contributing to complement team activities and
Objectives, based on individual skills, competencies and workplace context
Observing protocols in reporting using standard operating procedures
Development of team work plans based on understanding of team’s role, objectives and
individual competencies.
This unit will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
3.1Introduction to communication
Internet communication is referred to as the sharing of information ideas or simply words over
the World Wide Web or the Internet. The Internet consists of a worldwide string of connected
networks that exchanges data through packet switching using the standardized Internet Protocol
Suite (TCP/IP). Unlike before, people can stay at home and be connected to his or her family,
friends and even colleagues from anywhere around the world.
The internet provides many effective communication tools, including e-mail, mailing lists,
discussion groups, chat services, web conferencing, blogs, and RSS feeds. In recent years, social
networking sites such as Facebook and Twitter have also joined the mix. These various tools
allow you to communicate one-to-one or one-to-many, depending on your communication needs.
They also enable communication locally between people who know one another or world-wide
with people who share common interests.
W/R SIHEENPOLYTECHNICCOLLEGE
Real time interaction s Issue No. Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
Increased data accuracy
Increased interaction process
Multiple user participation
Open and transparent exchange
Sharing of information
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Telephones. Landline Telephones. Cell Phones. Smartphones. Internet Calling: Google Voice
and Others.
SMS/Text Messaging.
Cell and Data Plans.
Video and Web Conferencing.
Social Networking Sites.
G-Suite and Microsoft 365/Office.
Example 1: - EMAIL
Email is one of the first and most popular forms of electronic communication. It allows the user
to send and receive files and messages over the internet, and can be used on a wide variety of
devices. Here are some of the advantages and disadvantages of email.
Advantages of email
Email is a free tool.
Email is quick. Once you have finished composing a message, sending it is as simple as
clicking a button. Once it is sent and delivered, it can be read almost immediately.
Email is simple. It is easy to use, email allows for the easy and quick access of information
and contacts.
Email allows for easy referencing. Messages that have been sent and received can stored,
and searched through safely and easily.
W/R SIHEENPOLYTECHNICCOLLEGE
Email Title:
is Information
accessible from s
Sheetanywhere – as long as you have an internet connection.
Issue No. Page No.
COLLEGE 1 Page 57 of 72
Email is paperless, and therefore, beneficial for the planet.
Email allows for mass sending of messages, you can send one particular message to
several recipients all at once.
Email allows for instant access of information and files.
Disadvantages of email
Email could potentially cause Emails can cause misunderstandings.
information overload. Email messages can contain viruses.
Email lacks a personal touch. Email should be kept short and brief.
Email can be disruptive. Email requires timely responses.
Email cannot be ignored for a long
time.
Create a Gmail account
To sign up for Gmail, create a Google Account. You can use the username and password to sign
in to Gmail and other Google products like YouTube, Google Play, and Google Drive.
Gmail is one of the most used email services around the world. If you want to create a Gmail
account in just a few simple steps you can create it. But before that, you need to sign up for a
Google account. To create a Gmail account, you need to provide some basic information like
your name, birth date, gender, and location. Even you have to choose a name for your new Gmail
address.
Follow the below steps and create your own Gmail account with the quick sign-up process. You
can use your username and password to sign in to Gmail and other Google products like
YouTube, Google Play, and Google Drive. Follow the steps, create your Gmail account and start
sending emails.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Step 7: On the next page enter your phone number to verify your account. (It is a two-
step verification process for security)
Step 8: On the given mobile number you will receive a text message from Google with a
verification code. Enter the verification code and tap on Verify.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Step 9: On the next page enter your DOB in the specified fields.
Step 10: Choose a Gender.
Step 11: Tap on Next.
Step 12: Read, Google's Terms of Service and Privacy Policy will appear on the screen
and click on I agree.
Congratulations! your account has been created. From now onwards every time you
sign in you just have to enter your email id and password. And every time you sign-in
don't forget to sign-out because it prevents others from viewing your emails.
Do you know how to sign-out?
Navigate to the circle(in the top-right corner of the page). Here tap on it, from the below
option, select Sign-out.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Companies use their SMTP server for email marketing and for sending automated transactional
emails like updates on comments and shares, password change, or purchase confirmation. With
the help of a service like SendPulse, you can send promotional and transactional emails via
SMTP server with advanced functions template builder, mailing lists management, email
workflows, A/B testing, etc.
POP3
Email clients use Post Office Protocol 3 for retrieving messages from email servers. Email
clients that use POP3 store messages on the user’s computer, deleting them from the email
server. People using email clients with POP3 also have the option of keeping their emails on the
server after download.
This email protocol was designed to enable users to read, draft, and delete emails when there is
no smooth access to the internet. With POP3, emails are delivered as soon as the user connects to
the internet. Allow both receiving and sending
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
IMAP
Internet Message Access Protocol is similar to POP3, but unlike it, IMAP allows multiple users
to send emails at a time. This is a helpful feature for business owners, who assign
communication with customers to different team members — especially when they need to have
access to one email address at one time. Allow both receiving and sending
Unlike POP3, IMAP stores emails on the server by default, unless the user deletes them.
SendPulse SMTP Server
SendPulse is a marketing platform that allows you to send emails from a reputable SMTP server
to promote products and services and bring value to people.
You can send your emails via SMTP server without utilizing the whole spectrum of the service’s
functionality.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Self-check-3
Part I: - Write True if the statement is Correct and False If the statement is Incorrect
1. One of the major advantages of internet communication over traditional communication is
cost savings.
2. You can use the username and password to sign in to Gmail and other Google products to
communicate to other persons
3. Telephones, Landline Telephones, Cell Phones, Smartphones. Internet Calling, Google
Voice is not a communication tools.
4. These various tools allow you to communicate one-to-one or one-to-many, depending on
your communication needs.
5. Email allows for the easy and quick access of information and contacts.
Part II: - Select the best answer from the given alternative
1. Whichone of the following is the not form of internet communication?
A. Gmail C. Voice
B. Messages D. video calls
2. Which one is the not disadvantages of email
A. Email messages can contain viruses.
B. Email can be disruptive.
C. Email lacks a personal touch
D. Email could potentially cause information overload.
E. Email allows for instant access of information and files.
3. Which one is effective communication tools
A. E-mail C. Smartphones
B. Cell phones D. All
4. The most important protocols for data transmission across the Internet is
A. TCP/IP C. SMTP
B. POP D. HTTP
5. Which one is the not advantages of email
A. Email is a free tool C. Email is simple
B. Email is quickie D. Email allows for easy referencing.
W/R SIHEENPOLYTECHNICCOLLEGE
E. Email can be disruptive s Issue No. Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
F. All
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
W/R SIHEENPOLYTECHNICCOLLEGE
Steps in s
Title:doing
the Sheet
Information task Issue No.
1
Page No.
Page 57 of 72
COLLEGE
Step 1: Visit Google account creation page, accounts.google.com
Step 2: Click on Create account and select myself or you went
Figure 3.
W/R SIHEENPOLYTECHNICCOLLEGE
s Issue No. Page No.
Title: Information Sheet COLLEGE 1 Page 57 of 72
Step 12: Read, Google's Terms of Service and Privacy Policy will appear on the screen
and click on I agree.
Step 13: Congratulations! your account has been created. From now onwards every
time you sign in you just have to enter your email id and password.
Note: - Then create one document given by your teacher and send this
documents to your teacher.
Lap Test-3
Page 72 of 75 WSPTC Department of IT Support Service Level ll Date: Oct 2022
ICT Configuring and Accessing Version -1
Internet Services
ወ/ሮ ስህንፖሊቴክኒክኮሌጅ
Document No.
Institution Name
W/R SIHEENPOLYTECHNICCOLLEGE
ReferenceTitle:
Task 1: Open Sheet s
Google account website Issue No. Page No.
Information COLLEGE 1 Page 57 of 72
Book
1) Zadeh J Cryptography on the Internet Proceedings of the 37th annual Southeast regional
conference (CD-ROM), (45-es)
W/R SIHEENPOLYTECHNICCOLLEGE
2) Brookes s
W and Indulska J Teaching internet literacy to a large and diverseIssueaudience
No. Page No.
Title:Information Sheet
COLLEGE 1 Page 57 of 72
Proceedings of the 2nd Australasian conference on Computer science education, (7-15)
3) Introduction to the Internet (3rd Edition), by Scott D. James (Author)
4) Introduction to the Internet August 2000, Scott D. James
5) Introduction Lexicography in the Internet era ByPedro A. Fuertes-Olivera
6) Computer Networks Tanenbaum, Andrew. S. 4th ed Pearson
7) Computer Networks & Internets, Comer, Douglas 2nd ed Pearson
8) Computer Networks & Internets: With Internet Applications
Comer, D. E/ Narayanan, M. S. 4th ed Pearson
9) How to Use the Internet Subsequent Edition Rogers Cadenced, subsequent edition 2002.
10) Computer & Internet Security: A Hands-on Approach Wenliang Du , 2019, 2nd
Edition
Web Link
1) https://quicklearncomputer.com/
2) https://www.ionos.com/digitalguide/websites/web-development/how-are-websites-accessed/
3) Computer Concepts - Services on Internet (tutorialspoint.com)