Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

8 Internet and World Wide Web

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 76

Subsidiary

ICT for
Uganda

Curriculum Topic 8 out of 15:


INTERNET AND WORLD WIDE WEB
Recommended Coverage Duration: 12 periods (2 weeks)
Senior Five Term II

ORDER TEXTBOOK / DOWNLOAD AT:


WWW.MUKALELE.NET

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 1


Background
• The number of users of the internet is exponentially growing
due to increasing ease of use, low cost of the hardware and
availability of adequate facilities in schools, public libraries,
internet cafes etc.
• Although the basic use of internet was research, the number
of users of e-mail has outgrown that of research. One can use
the internet to communicate with anyone else online, in any
place in the world without incurring any extra cost. It can also
be used to join mailing list, bulletin boards or discussion
groups that cover a huge variety of subjects.
• Learning Outcome: The learner should be able to use the
Internet to communicate and enhance research in order to
develop the lifelong learning skill
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 2
Presentation Outline
UACE Sub – ICT Topic 8:
Topic 8: Internet and World Wide Web
• Sub Topic 8.1. Introduction to the Internet
• Sub Topic 8.2. Internet Services
• Sub Topic 8.3. World Wide Web

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 3


Sub Topic 8.1: Introduction to the Internet

Sub topic Objectives:


8.1.1. Meaning of Internet
– Explaining the meaning of the Internet
8.1.2. Implications of the Internet
– Discussing the advantages and
disadvantages of using the Internet

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 4


8.1.1 Meaning of Internet
• Internet refers to the global
interconnection of computer networks.
• Computers within a laboratory or office
can be connected together using
transmission media such as cables to
form a local area network (LAN).
• Several LANs can be connected to form
Wide Area Networks (WANs), which
constitute the global Internet.
• The Internet enables millions of
computers to communicate and share
resources globally.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 5
8.1.1 Meaning of Internet
• History of the Internet: In 1969 the U.S. •
It is this ARPANET that
Department of Defense commissioned the evolved into the
Advanced Research Projects Agency Internet after computer
Network (ARPANET). The purpose was to networks were
provide communication links between connected to it in
supercomputers located at various regional different parts of the
sites (Universities and defense bases) world.
within the United States. • By1992, more than 1
million hosts existed on
the Internet

In 1973www.mukalele.net
ARPANET was extended to Europe.
UACE SUB-ICT 8: Internet and World Wide Web Slide 6
8.1.1 Meaning of Internet
• History of the Internet: Timeline of Key Developments

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 7


8.1.1 Meaning of Internet
c) Modem: This is a device
Requirements for Connecting that converts analogue
to the Internet: These include: telephone signals into
a. Computer / Device with a digital computer
Network Interface Card. The NIC information and vice-
may be based on Ethernet or versa. Some computers
wireless technologies. have internal / inbuilt
modems.
b. An Internet Service Provider (ISP):
the company that takes care of the d) Required Software:
technical aspects of connecting to programs necessary to
the internet. ISPs available in use the internet services
Uganda include Mobile telephone such as web browsers
companies like Orange, MTN, and Email Clients, FTP
Airtel, UTL, etc. software, etc.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 8
8.1.1 Meaning of Internet
• Methods of Connecting to the Internet
• As technologies develop, bigger, better and faster Internet
connections methods evolve. ISPs provide internet connectivity
through the following
• (a) Dial Up/ Analog access / Phone Line Connection,

• (b) Broadband (cable or Digital Subscriber Line (DSL))/ Fiber


• (c) Satellite Connection, and other
• (d) Wireless broadcasts e.g Wi-Fi hotspots and Wi-Max.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 9
8.1.1 Meaning of Internet
• Methods of Connecting to the Internet

Wireless broadcasts

In 1973www.mukalele.net
ARPANET was extended to Europe.
UACE SUB-ICT 8: Internet and World Wide Web Slide 10
8.1.1 Meaning of Internet

FACTORS TO CONSIDER WHEN g. Compatibility: That the


speed of their modems
CHOOSING ISPS: These include: and their software
a. Availability: Not all ISPs offer should match
services in on all areas. the speed of yours
h. Email addresses:
b. Speed/ Network Performance Check whether the ISP
c. Price. Prices vary by package has email and WWW
d. Support Services / Customer services. Some ISPs
can set up a custom
care
email address when you
e. Restrictions of use activate your account.
f. Reliability : How long the ISP This would appear
has been in business something like
name@isp.com.
In 1973www.mukalele.net
ARPANET was extended to Europe.
UACE SUB-ICT 8: Internet and World Wide Web Slide 11
8.1.1 Meaning of Internet
g. Positioning of wireless
FACTORS AFFECTING THE access points
SPEED OF AN INTERNET h. Memory available.
CONNECTION: These include: i. Computer internet
settings
a. Computer Processor speed j. Technological
b. . Distance the data travels Circumstances such as
c. Traffic / number of users on loose connections of
cables or maintenance
the network
works being
d. Malware, Spyware and done by the ISP.
Viruses. k. Cookies: Over time,
e. Modem speed. cookie files saved by
websites in browser can
f. Natural Conditions compromise the speed .
In 1973www.mukalele.net
ARPANET was extended to Europe.
UACE SUB-ICT 8: Internet and World Wide Web Slide 12
8.1.2 Implications of the Internet
• The Internet is available for everybody’s use
(public use). Unlike traditional broadcasting
media, such as radio and television, the
Internet does not have a centralized
distribution system, or ownership.
• This flexibility has greatly contributed to the
success and proliferation/expansion of the
Internet.
• The increased use of the internet has come
with both advantages and disadvantages.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 13
8.1.2 Implications of the Internet
Advantages of using the Internet
• Interactive communication; internet offers several
communication tools such as emails, chatting, instant
messaging, audio and video conferencing, online telephone
calls etc.
• Resource sharing; data, information, software programs
can be shared over the internet.
• Research; internet helps in conducting research using
books online, encyclopaedia, audio and video tutorial to
answer research questions.
• Entertainment tools for leisure; through on-line games,
online chats, multimedia (audio, video) etc.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 14
8.1.2 Implications of the Internet
Advantages of using the Internet
• Online services; internet offers online services like e-
business, e-commerce and e-learning.
• Information on the World Wide Web is easily accessible,
powered by search engines.
• Telecommuting. Through internet connectivity and
interactivity one can now work from home and
communicate with the office through networked computers
and telephone facilities.
• Has storage where you can store information safely and can
access it anywhere.
• It is accessible 24/7 (always on)
• Plus a lot more advantages!!
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 15
8.1.2 Implications of the Internet

Disadvantages of using the Internet


• Computer viruses can be spread over the internet.
• Internet provides access to unsuitable material such
as Pornography, the biggest threat to healthy
mental life.
• Theft of Personal information: If you use the
Internet, you may be facing grave danger as your
personal information such as name, address, credit
card number etc. can be accessed by hackers or
thieves.
• Spamming: Spamming refers to sending unwanted
e-mails in bulk, which provide no purpose and
needlessly obstruct the entire system.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 16
8.1.2 Implications of the Internet

Disadvantages of using the Internet


• Some people get addicted to the internet, causing
problems with their social interactions of friends
and loved ones.
• The initial cost of connecting to the internet is high.
e.g. buying computers.
• Many people are computer illiterate and so can not
use internet, hence miss.
• There is a lot of wrong information on the internet.
Anyone can post anything, and much of it is
garbage/ inaccurate.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 17


Sub Topic 8.2. Internet Services

Sub topic objectives:


• 8.2.1 Identifying the different internet services.
• 8.2.2 Using email to communicate.
• 8.2.3 Using internet facility for research.
• 8.2.4 Explaining the concept of netiquette.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 18


8.2.1 Internet services
Below are some of the services enabled by the internet
a. Telnet – enables users to use the resources of a computer
in another part of the world. This is done by remotely
logging to the distant computer which is
called the host.
b. Email – It allows the transfer of messages, documents,
and pictures among others, across the Internet.
c. Mailing list – This is based on the email protocol. As an
electronic mailing list
it is very convenient when somebody wants to send a
message or newsletter, for example, to many people in
one go.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 19
8.2.1 Internet services
d. Internet Relay Chat (IRC) – A live interactive discussion in
which parties on the network exchange ideas and
observation electronically. Chats are usually organized in
what we call chat rooms.
e. File Transfer Protocol – The standard method for
transferring files, whether downloading or uploading, to and
from your computer with another computer on the Internet.
f. Newsgroups – Worldwide discussion areas where notices
can be posted for anyone to view. They are equivalent to a
discussion group or an electronic bulletin board. There are
newsgroups for every conceivable topic and more, e.g.
educational technology.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 20


8.2.1 Internet services
g. World Wide Web – This refers to the global collection of
websites consisting of linked electronic documents called
Webpages stored on internet servers all over the world.
The www is the most exciting service that has
revolutionized the Internet, people use this service to
browse for information.
h. Instant Messaging: A combination of real-time chat and e-
mail by which short text messages are rapidly exchanged
over the Internet, with messages appearing on recipient’s
display screen immediately upon arrival.
i. Usenet: A system of worldwide discussion groups.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 21


8.2.1 Internet services
j. Internet Telephony or Voice over IP: Real-time voice
conversations transmitted between computers on the
Internet.
k. Web Directory: A listing of Web sites and their URLs,
categorized by topic.
l. Electronic Commerce/e-commerce: Conducting
commercial activities on the Internet.
m. Social Networking. A type of service where users can seek
others who share their interests, find out what's going on
in their areas of concern, and share information with one
another (e.g. Facebook, Twitter).

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 22


8.2.1 Internet services

n. Cloud Computing: A service in which computer


software, hardware and data are used remotely
over the Internet, instead of acquiring and using
them on a local computer.
o. Search Engines: Software programs that look
through the Web to locate sites matching a
keyword entered by the user. Keyword: A string of
letters or words that indicates the subject to be
searched.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 23


8.2.2 Using email to communicate
• Email communications refers to the transmission of
messages via computer networks such as; a local area
network, WANs, or internet.
• The email can be simple text, or include an attachment
such as a word processing document, PDF or graphic.
• Email software (Commonly known as email client) is a
computer program used to access and manage a user‘s
email account. It may be web based or not.
• Popular locally installed email clients include Microsoft
Outlook, Pegasus Mail, KMail, Evolution and Apple Mail.
• Popular web-based email clients / webmail include: GMail,
Yahoo!, Lycos mail, and Hotmail.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 24
8.2.2 Using email to communicate
Advantages of using email as a means of communication
1. Easy to use. Emails applications have user friendly tools
that help during composing messages.
2. Email supports sending of attachments like documents,
zipped files, e.t.c
3. It is very fast in terms of speed: The e-mail is delivered
instantly, anywhere across the globe.
4. Easy to prioritize: Since the mails have subject lines, it is
easy to prioritize them and ignore unwanted mails.
5. Email messages can be sent to many recipients at the
same time

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 25


8.2.2 Using email to communicate
Advantages of using email as a means of communication
6. Emails can also carry hyperlinks that lead to other
webpages with just a click
7. One can subscribe to news and other online services
through email
8. Email software have management features that help users
to organize their messages in folders like inbox, sent, draft,
etc.
9. Easier for reference: When one needs to reply to a mail,
there is a provision in the mailing system to attach the
previous mails as references. This refreshes the recipient's
knowledge, on what he is reading.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 26
8.2.2 Using email to communicate
Advantages of using email as a means of communication
10. Environment friendly: Compared to postal mails which use
paper and fuel to transport letters. Electronic mail saves a
lot of trees from being axed. It also saves fuel needed in
transportation.
11. Email software have address book features that may be
sorted in alphabetical order.
12. Email software has a good degree of security features such
as username and password before sign in
13. Email applications have inbuilt English dictionary which
safeguards the sender from incorrect spelling and
grammar.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 27
8.2.2 Using email to communicate
Advantages of using email as a means of communication
14. Email is a relatively cheap means of communication since
there are no printing or postage expenses involved.
15. 24/7 any time access. At any time of the day or night, one
can communicate with friends, relatives, professors and
business associates.
16. Messages remain permanent for future access from
anywhere.
17. Use of graphics such as colorful greeting cards and
interesting pictures can be sent through e-mails.
18. Advertising tool: many individuals and companies are
using e-mails to advertise their products, services, etc.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 28
8.2.2 Using email to communicate
Limitations of using Email as means of communication.
1. Emails can spread Viruses: The recipient needs to scan the
mails, as viruses are transmitted through them and have the
potential to harm computer systems.
2. Spam and Junk: E-mails when used to send unsolicited
messages and unwanted advertisements create nuisance
called Spam. Checking and deleting these unwanted mails
can unnecessarily consume a lot of time, and it has become
necessary to block or filter the unwanted e-mails by means
of spam filters.
3. E-mail spoofing is another common practice. Spoofing
involves disguising as different sender by altering the e-mail
headers or the addresses from which the mail is sent.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 29
8.2.2 Using email to communicate
Limitations of using Email as means of communication.
4. Hacking and email interception: The act of unauthorized attempts
to bypass the security mechanisms of an information system or
network is termed as hacking. After the e-mail is sent and before it is
received by the desired recipient, it "bounces" between servers
located in different parts of the world. Hence, the e-mail can be
intercepted by a professional hacker.
5. Misinterpretation: One has to be careful while posting any kind of
content through an e-mail. If typed in a hurry, the matter could be
misinterpreted.
6. Since the content posted via e-mails is considered informal, there is
a chance of business documents going unnoticed. Thus, vital
communications and especially those requiring signatures are not
managed through e-mails.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 30
8.2.2 Using email to communicate
Limitations of using Email as means of communication.
7. Crowded inbox: Over a period of time, the e-mail inbox may get
crowded with mails. It becomes difficult for the user to manage such
a huge chunk of mails.
8. Need to check the inbox regularly: In order to be updated, one has
to check his e-mail account regularly, which may be expensive in the
long run.
9. Email cannot be used without computers especially in remote areas
without electricity.
10. In case one forgets his/her password, signing in is not possible and
this can lead to loss of information.
11. Email may violate privacy in case someone else gets to know your
user password since the other may check your mails.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 31


8.2.2 Using email to communicate
Components of an e-mail message: Headers, Body, and Attachments
1. Headers : The message headers contain information concerning
the sender and recipients. The exact content of mail headers can
vary depending on the email system that generated the message.
Generally, headers contain the following information:
– Subject. The theme of the email message
– Sender (From). This is the senders Internet email address.
–  Date and time received (On). The time the message was received.
–  Recipient (To :). First/last name of email recipient, as configured by the sender.
– CC: “Carbon copy” enables copies of the email message to be sent to third
party while acknowledging other recipients
– Bcc: Enables copies of the mail message to be sent to the third party without
acknowledging nay other recipients.
–  Reply-to. This is the Internet email address that will become the recipient of
your reply if you click the Reply button.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 32
8.2.2 Using email to communicate
Components of an e-mail message: Headers, Body, and Attachments
2. Body:
– The body of a message contains text that is the actual content.
– The message body also may include signatures or automatically generated text
that is inserted by the sender's email system.
3. Attachments
– Attachments are optional and include any separate files that may be part of the
message.

ASSIGNMENT: Use an Internet facility to search for a


webpage with the lyrics of the East African Anthem including
both Kiswahili and English versions. Copy the lyrics text and
save it in a new word document. Send it as an attachment to
your friend’s email and send a blind carbon copy to your
teachers’ email.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 33
8.2.3 Using internet facility for
research
• Research on the World Wide Web is very different from
traditional library research, and the differences can cause
problems. The internet is a tremendous resource, but it
must be used carefully and critically. Here are a few basic
guidelines to remember:
– Don’t rely exclusively on Net resources. Cross-checking
information from the Net against information from the Library is a
good way to make sure that the Net material is reliable and
authoritative.
– Narrow your research topic before logging on.. Before you start
your search, think about what you’re looking for, and if possible
formulate some very specific questions to direct and limit your
search.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 34


8.2.3 Using internet facility for
research
– Narrow your research topic before logging on.. Before you start
your search, think about what you’re looking for, and if possible
formulate some very specific questions to direct and limit your
search.
– Keep a detailed record of sites you visit and the sites you use.
Keeping track is necessary so that you can revisit the useful ones
later, and also put the required references in your paper.
– Know your subject directories and search engines. There are
several high quality peer-reviewed subject directories containing
links selected by subject experts. INFOMINE and Academic Info
are good examples. Google, Bing, Yahoo, Ask.com and other
search engines differ how much of the Net they search. Get to
know the best search engine to use for the needed information.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 35


8.2.3 Using internet facility for
research
Guidelines for evaluating specific resources on the
internet. If you ask these questions when looking at a
Web site, you can avoid many errors and problems.
• Authority
– Who is the author?
– Is the author’s name given?
– Are her qualifications specified?
– Is there a link to information about her and her position?
– Is there a way to contact her (an address or a “Mailto” link)?
– Have you heard of her elsewhere (in class, or cited in your course
text or in Library material)?

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 36


8.2.3 Using internet facility for
research
• Affiliation
– Who is the sponsor of the Web site? Is the author
affiliated with a reputable institution or organization?
– Check the URL.
• It may contain the name of a university or the extension .edu,
which is used by many educational institutions.
• Government sites are identified by the extension .gov.
• URLs containing .org are sponsored by non-profit
organizations, some of which are reliable sources.
• Sites with the .com extension should also be used with caution,
because they have commercial sponsors who probably want to
sell you something and may give biased information.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 37


8.2.3 Using internet facility for
research
• Audience Level
– What audience is the Web site designed for? Don’t use
sites intended for elementary students or sites that are
too technical for your needs.
• Currency
– Is the Web site current? Is the date of the most recent
update given? Internet resources should be up-to-date;
after all, getting the most current information is the main
reason for using the Net for research.
– Are all the links up-to-date and working? Broken links
may mean the site is out-of-date; they’re certainly a sign
that it’s not well-maintained.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 38
8.2.3 Using internet facility for
research
• Content Reliability/Accuracy
– Is the site free of errors in spelling or grammar and other
signs of carelessness in its presentation of the material?
– Is a valid source of the information clearly stated,
whether original research material or secondary material
borrowed from elsewhere?
– Is the information factual, not opinion? Is the author’s
language free of emotion and bias?
– Are additional electronic and print sources provided to
complement or support the material on the Web site?
If you can answer all these questions positively when looking at a
particular site, then you can be pretty sure it’s a good one
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 39
8.2.3 Using internet facility for
research
ASSIGNMENT:
1. Use an Internet facility to search for a webpage
with the lyrics of the East African Anthem including
both Kiswahili and English versions. Copy the lyrics
text and save it in a new word document. Send it as
an attachment to your friend’s email and send a
blind carbon copy to your teachers’ email.
2. Use the internet to search for the forex rates of the
US Dollar to Uganda Shillings. Evaluate the
reliability of your forex rates.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 40
8.2.4 The concept of Netiquette
• Netiquette: rules of Behavior when
using the Internet
• "Netiquette" refers to Internet
etiquette. This simply means the use
of good manners in online
communication such as e-mail,
forums, blogs, and social networking
sites.
• It is important to use netiquette and
communicate to people online in the
same manner you would
communicate physically.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 41
8.2.4 The concept of Netiquette
Netiquette guidelines:
• Be clear: Make sure the subject line (e-mail) or title (web
page) reflects your content
• Use appropriate language: Avoid sending Abusive and
Emotional messages.
• Don't use ALL CAPITAL LETTERS--it's equal to shouting or
screaming
• Be brief: If your message is short, people will be more likely
to read it
• Make a good impression: Your words and content
represent you; review/edit your words and images before
sending
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 42
8.2.4 The concept of Netiquette
Netiquette guidelines:
• Don’t Forward e-mail messages you receive without
permission of the original sender.
• Obey copyright laws: Don't use others' images, content or
use web site content without permission.
• Do not send SPAM: Spamming is posting or e-mailing
unsolicited e-mail, often advertising messages, to a wide
audience (another way of thinking of it is electronic junk
mail).
• Don't respond to "flames" or personal attacks
• Always keep messages brief and use proper grammar and
spellings.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 43
8.2.4 The concept of Netiquette
Netiquette guidelines • Respect other people’s time and
• Never read someone’s bandwidth.
private mail. • Make yourself look good online.
• Don’t Click on hyperlinks to • Respect other people’s privacy.
unknown sites, especially on • Logout or log off your account after
adverts and popups. use.
• Don’t download • Post only acceptable information that
attachments from unknown has no harm to the public.
sources. • Remember you are not anonymous.
• Avoid impersonation. What you write in an e-mail and web
• Adhere to the same site can be traced back to you.
standards of behaviour • Know where you are in cyber
online that you follow in real space.
life.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 44
Sub Topic 8.3. World Wide Web
Sub topic Objectives:
8.3.1 Defining a web browser
8.3.2 Identifying different web browsers.
8.3.3 Defining a search engine.
8.3.4 Identifying different search engines.
8.3.5 Searching for information from the web.
8.3.6 Using search engine syntax.
8.3.7 Defining a website.
8.3.8 Identifying different types of websites.
8.3.9 Explaining the concept of cloud computing.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 45


8.3.1 Defining a web browser
• This is the type of software that is used for displaying Webpages from
the internet or html documents on computers. It enables people to
browse the World Wide Web.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 46


8.3.2 Identifying different web browsers

• There are hundreds of web browsers. Popular ones


include: Mozilla Firefox, Google Chrome, Opera,
Apple Safari and Microsoft Internet Explorer/ Edge

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 47


8.3.3 Defining a search engine

• The world wide web is a big place. If you know the


web address, or URL, of a site you can find it by
typing it into the address bar along the top of your
browser. But what if you don’t know the URL?
• You can find pages easily search by using a search
engine.
• A web search engine is a system that takes in user
keywords, looks for information on the World Wide
Web and return a line of results (hits), usually in
form of a mix of links to matching webpages.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 48
8.3.3 Defining a search engine
How search Engines Work
• Web search engines work by storing information about
many web pages, which they retrieve by a spider (an
automated Web crawler) which follows every link on the
web pages.
• The search engine analyzes the contents of web pages and
determines words to store in an index database.
• Index words can be extracted from the
– titles,
– page content,
– headings (eg <H1>, <H2>), etc or
– special fields called meta tags.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 49
8.3.3 Defining a search engine
• How
search
Engines
Work

• When a user enters a query into a search engine (typically by using


keywords), the engine examines its index database and provides a listing of
best-matching web pages according to its criteria, usually with a short
summary containing the document's title and sometimes parts of the text.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 50
8.3.4 Identifying different search engines
• Popular search engines on
the world wide web
include
• Google,
• Bing,
• Yahoo,
• Ask.com, AOL.com, etc

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 51


8.3.5 Searching for information from the
web
Effective Internet Searching
• The challenge is to ask your question
the right way, so that you don’t end up
overwhelmed with too many search
results, underwhelmed with too few,
or simply unable to locate the material
SEARCH STRATEGIES
that you need.
• Keyword Searching
• Keywords: Search engines don’t read
• Boolean
sentences the way people do: instead,
• Advanced
they look for the key words in your
– Specify Filetypes
query in the websites they search. – Search within a website
Common words are ignored (that, to, – Search By Date
which, a, the, …) – Use browser history etc
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 52
8.3.6 Using search engine syntax

• Use “quotation marks” to search as a phrase and


keep the words linked together.
• + and – can be used to include or exclude a word
• Boolean Syntax: Enter words and connect with Boolean
Operators: AND, OR, NOT
– AND will include sites where both words are found. Uses: joining
different topics eg (ie. “global warming” AND California).
– OR - requires at least one of the terms is found Uses: join similar
or synonymous topics (ie. “global warming” OR “greenhouse effect”)
– NOT – searches for the first term and excludes sites that have the
second term Uses: join similar or synonymous topics (ie. Washington
NOT school)

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 53


8.3.6 Using search engine syntax

Other Syntax:
• The wildcard operator (*): Google calls it the fill in
the blank operator. For example, amusement *
• Site search: Many Web sites have their own site
search feature, but you may use a search engine to
get results from one website Example:
site:www.newvision.co.ug ICT in schools.
• Related sites: For example,
related:www.youtube.com can be used to find sites
similar to YouTube.
• etc
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 54
8.3.7 Defining a website
• A collection of linked Web pages that has a common theme
or focus is called a Web site.
• The Web (World Wide Web) consists of websites hosted on
servers on the internet globally.
• Webpages are electronic documents with text and graphic
images, written in Hyper Text Markup Language (HTML).
• Websites contain information organized into Web pages.
• It contains hypertext links, or highlighted keywords and
images that lead to related information.
• The main page that all of the pages on a particular Web site
are organized around and link back to is called the site’s
home page.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 55
8.3.7 Defining a website
Client/Server Structure of the Web
• Web is a collection of files that reside on computers,
called Web servers, that are located all over the world
and are connected to each other through the
Internet.
• When you use your Internet connection to become
part of the Web, your computer becomes a Web
client in a worldwide client/server network.
• A Web browser is the software that you run on your
computer to make it work as a web client.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 56


8.3.7 Defining a website
Hypertext Markup Language (HTML)
• WebPages are written in HTML, which is interpreted by web
browsers.
• HTML uses codes, or tags, to tell the Web browser software
how to display the text contained in the document.
• For example, a Web browser reading the following line of
text:
<B> A Review of the Book<I>Wind Instruments of
the 18th Century</I></B>
• recognizes the <B> and </B> tags as instructions to display
the entire line of text in bold and the <I> and </I> tags as
instructions to display the text enclosed by those tags in
italics.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 57
8.3.7 Defining a website
Website Addresses • Most web browsers do not use the
IP address to locate Web sites and
• Each computer on the individual pages.
internet does have a •
They use domain name addressing.
unique identification
• A domain name is a unique name
number, called an IP associated with a specific IP
(Internet Protocol) address by a program that runs on
address. an Internet host computer.
• The IPv4 addressing • This program, which coordinates
system uses a four- the IP addresses and domain
part number. For names for all computers attached
example, to it, is called DNS (Domain Name
106.29.242.17 System ) software.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 58
8.3.7 Defining a website
Uniform Resource Locators
• The IP address and the domain name each identify a particular
computer on the Internet.
• However, they do not indicate where a Web page’s HTML
document resides on that computer.
• To identify a Web pages exact location, Web browsers rely on a
Uniform Resource Locator (URL).
• URL is a four-part addressing scheme that tells the Web
browser:
 What transfer protocol to use for transporting the file
 The domain name of the computer on which the file resides
 The pathname of the folder or directory on the computer on
which the file resides
 The name of the file
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 59
8.3.7 Defining a website
Structure of a Uniform Resource Locator
pathname
protocol

http://www.chicagosymphony.org/civicconcerts/index.htm

File/webpage
http => Hypertext Domain name
Transfer Protocol

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 60


8.3.7 Defining a website
READING WEB ADDRESSES
Let's look at the parts of a typical URL:
• http://www.sc.edu/beaufort/library/pages/bones/lesson1.html
• Here's what it all means:
• "http" means hypertext transfer protocol and refers to the rules used to transfer
and deal with information
• "www" stands for World Wide Web and is the general name for the host server
that supports text, graphics, sound files, etc. (It is not an essential part of the
address, and some sites choose not to use it)
• "sc" is the second-level domain name and usually designates the server's location,
in this case, the University of South Carolina
• "edu" is the top-level domain name (see below)
• "beaufort" is the directory name
• "library" is the sub-directory name
• "pages" and "bones" are the folder and sub-folder names
• "lesson1" is the file name
• "html" is the file type extension and, in this case, stands for “hypertext mark-up
language" (that's the language the computer reads).

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 61


8.3.8 Types of websites
• 1. Web portal : An internet-based • 3. A wiki: A website that allows
website that can perform many collaborative editing of its content
electronic functions and provide and structure by its users. E.g.
the user with quick access to a Wikipedia
variety of information and • 4. A blog: A blog is a website in
services. EG. UNEB Results Portal
which journal entries are posted
• 2. Content aggregator: Combines on a regular basis. A person who
information such as news and posts entries is called a blogger
entertainment, sports scores,
• Blog posts are typically displayed
weather forecasts, photographs
and video from a variety of sources in reverse chronological order (the
and makes the combined content most recent post appears first).A
available to its customers e.g Web- majority are interactive, allowing
based feed readers like RSS Feeds, visitors to leave comments.
delicious.com, etc.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 62
8.3.8 Types of websites
5. Media sharing website 6. Social networking Website
• Media sharing sites allow • An online service, platform, or site
you to upload your photos, that focuses on building social
videos and audio to a relations among people who share
website that can be interests by posting information,
accessed from anywhere in comments, messages, images, etc.
the world. E.g • A type of website where users can
youtube.com, seek others who share their interests,
dailymotion.com, blip.tv, find out what's going on in their areas
slideshare.net, archive.org, of concern, and share information
podbean.com, and many, with one another
many others. • Examples include i).Facebook (ii)
Twitter (iii) Google Plus, etc.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 63


8.3.8 Types of websites
Social Networking Websites: Advantages
• Staying Connected: The main purpose of social
media is to be able to stay connected to friends
and families The main purpose of social media
is to be able to stay connected to friends and
families
• Finding People With Common Interests: Social
networking is also a great way to meet peers.
• Invaluable Promotional Tool: Companies,
artists, etc use Social Media for advertising to
the masses
• Information Spreads Incredibly Fast
Breaking news and other important information
can spread like wildfire on social media sites.
• Helps To Catch And Convict Criminals: The
Police uses social media to to persecute
criminals.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 64
8.3.8 Types of websites
Social Networking Websites: Disadvantages • The Addiction Is Real: One of
• Perpetuates False And Unreliable the biggest problems with the
Information: Anyone can post any unverified social media craze is that
rumours which cause panic and severe people are becoming more and
misinformation in society. more addicted to using it. It is
• Causing Major Relationship Problems: Online the number one time waster at
social interactions have cause many breakups. work, in school, and at home.
• Cyber Bullying: A new trend of cyber bullying • Privacy Violation: Social
is wreaking havoc all across the world. This is Networks may violate privacy in
especially true with young kids publicly case someone else gets to know
harassing one another, and posting mean or your user password.
slanderous things which are broadcasted to • Misinterpretation: One has to
the entire cyber world. be careful while posting any
• Used To Profile and Discriminate In The Job kind of information on social
World: Employers are using social media to networks. If typed in a hurry,
pre-screen their applicants. the matter could be
misinterpreted.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 65
8.3.8 Types of websites
Sample Examination Type Question:
(a) The World Wide Web has greatly evolved and it
consists of different types of websites, including
blogs and wikis. Tabulate three differences between
blogs and wikis. (3 marks)
(b) Describe two ways to evaluate the reliability of
information found on a website. (2 marks)

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 66


8.3.8 Types of websites
Possible Answer:(a) Differences between a Blog and a Wiki
Blog Wiki
1. Blog usually has a single author 1. a Wiki usually has many authors

1. Blog is usually in reverse 1. a Wiki has a structure determined


chronological structure by content and users

1. Blog is usually 1. a Wiki is usually objective


personal/someone’s opinion

1. The public can’t edit someone’s 1. a Wiki can be edited by the public
blog, can only add comments to a users.
blog.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 67
8.3.8 Types of websites
B)Evaluating the reliability of • Can compare information from sites to
information found on a website see if it is reliable. If information is
• Check the last part of the URL. The comparable to information from
top level domain can help to reliable/ authenticated/text books it is
identify reliability (for example .gov, likely to be reliable.
.ac, .ed, .sch are usually fairly • Check the date of the last update. If
reliable, while.org, .co, .com are the date of the last update was a long
less reliable). time ago it is likely to be unreliable.
• See if responsible bodies have • Are any advertisements present?
endorsed the site e.g. UNEB. If site If site has excessive advertising it
is endorsed by reliable/reputable could be unreliable. If the
people/organizations it can be advertising is related only to its
accepted as being reliable.
own products it could be
• Checking the author’s credentials.
unreliable. If it has testimonials it
If the author’s credentials are good
it is likely to be reliable. is likely to be reliable.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 68
8.3.9 Cloud computing
• Cloud computing is Internet-based computing, whereby shared
resources e.g hardware, software and information are provided to
other devices on-demand.
• In simple terms, Cloud computing is using the internet to access
someone else's software running on someone else's hardware in
someone else's data center.
• Cloud computing operates on a similar principle as web-based email
clients, allowing users to access all of the features and files of the system
without having to keep the bulk of that system on their own computers.
In fact, most people already use a variety of cloud computing services
without even realizing it such as Gmail, Google Drive, Google Docs, etc.
• The online software services ‘on the cloud’ have long been
referred to as Software as a Service (SaaS) and the hardware
as Infrastructure as a service (IaaS).

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 69


8.3.9 Cloud computing
Some Examples of
Cloud computing
applications
Right: Online Google Sheets, Part of
Google Docs Suite, the Cloud
Alternative to Microsoft Office
Programs

Comparison of
Google Suite
vs Microsoft Suite

Google Cloud Print Service


www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 70
8.3.9 Cloud computing
Advantages of Cloud Computing
• Lower computer costs:
– You do not need a high-powered and high-priced computer to run cloud
computing's web-based applications.
– Since applications run in the cloud, not on the desktop PC, your desktop PC
does not need the processing power or hard disk space demanded by
traditional desktop software.
• Improved performance: With few large programs hogging your computer's
memory, you will see better performance from your PC.
• Reduced software costs:
– Instead of purchasing expensive software applications, you can get most of
what you need cheaply, e.g most cloud computing applications today, such as the Google
Docs suite better than paying for similar commercial software .
• Better Security: By using encryption, information on the cloud is less accessible by
hackers or anyone not authorized to view the data. As an added security measure, with most
cloud-based services, different security settings can be set based on the user.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 71


8.3.9 Cloud computing
Advantages of Cloud Computing
• Instant software updates:
– Another advantage to cloud
computing is that you are no
longer faced with choosing
between obsolete software and
high upgrade costs.
– When the application is web-
based, updates happen
automatically.
• Improved document format
compatibility.
– You do not have to worry about
the documents you create on your
machine being compatible with
other users' applications.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 72
8.3.9 Cloud computing
Advantages of Cloud Computing
• Unlimited storage capacity: Cloud computing offers virtually
limitless storage on servers in powerful datacenters.
• Increased data reliability/ safety: Unlike desktop computing, in
which if a hard disk crashes and destroy all your valuable data, a computer
crashing in the cloud should not affect the storage of your data.
• Universal document access: That is not a problem with cloud
computing, because you can access it whenever you have a computer
and an Internet connection.
• Easier group collaboration: multiple users can collaborate easily on
documents and projects
• Device independence: Even to a portable device, and your
applications and documents are still available.
www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 73
8.3.9 Cloud computing
Disadvantages of Cloud Computing
• Requires a constant Internet connection: Cloud computing
is impossible if you cannot connect to the Internet. A dead
Internet connection means no work.
• Does not work well with low-speed connections: Web-
based applications require a lot of bandwidth to download,
as do large documents.
• Features might be limited: Many web-based applications
simply are not as full-featured as their desktop-based
applications. For example, you can do a lot more with Microsoft
PowerPoint than with Google Presentation's web-based offering.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 74


8.3.9 Cloud computing
Disadvantages of Cloud Computing
• Can be slow: Even with a fast connection, web-based applications can
sometimes be slower than accessing a similar software program on
your desktop PC. Everything about the program, from the interface to
the current document, has to be sent back and forth from your
computer to the computers in the cloud.
• Stored data might not be secure: With cloud computing, all your data
is stored on the cloud. Any unauthorised users gaining access to your
password may access confidential data.
• Migration issues: Each cloud systems uses different protocols and
different APIs, so your normal applications will have to be adapted to
execute on these platforms.

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 75


Subsidiary
ICT for
Uganda

End of Topic 8:
Internet and World Wide Web
Next Topic:
Topic 9: Computer Word Processing II

www.mukalele.net UACE SUB-ICT 8: Internet and World Wide Web Slide 76

You might also like