Chapter-5

The Internet & The World Wide Web

Page 1: Introduction

  • Overview of the topic.

Page 2: Differences Between The Internet & The World Wide Web

  • Clarifications on the two terms: the Internet is a broader network; the World Wide Web is specifically part of it.

Page 3: Relationship

  • The World Wide Web (WWW) is a component of the Internet.

  • Web addresses typically start with "www."

Page 4: The Internet

  • Definition: A worldwide collection of interconnected computer networks.

  • Nature: It is a conceptual framework rather than a physical entity.

  • Infrastructure:

    • Requires physical hardware: computers, devices, servers.

    • Service providers facilitate connections between networks and devices.

Page 5: The World Wide Web (WWW) Explained

  • Definition: Section of the Internet accessible via web browsers.

  • Content: Contains a vast number of web pages hosted on servers.

Page 6: WWW Additional Explanation

  • Functionality: Displayed through web browsers.

  • Key Component: URLs designate specific web pages for access.

    • URLs provide unique addresses within the web domain.

Page 7: URL Analysis

  • Example of URL analysis for educational purposes via Instagram profile.

  • Discusses elements like posts, followers, and shared content.

Page 8: URLs

  • Full Form: Uniform Resource Locators.

  • Function: Text addresses that identify web pages on the Internet.

  • Similar in concept to IP addresses but user-friendly.

Page 9: Example Format of a URL

  • Example: https://www.instagram.com/havilinternationalschool/reels/.

Page 10: URL Breakdown

  • Protocol: https (Hypertext Transfer Protocol Secure)

  • Components:

    • Domain Name (e.g., instagram.com)

    • Path (e.g., /havilinternationalschool/reels/).

Page 11: Hypertext Transfer Protocol

  • Definition: Rules for transferring data on the web.

Page 12: Data Transmission Protocols

  • HTTP: Primary protocol for transferring web pages; enables smooth connectivity and info exchange.

Page 13: HTTPS (Secure)

  • Ensures encrypted data transmission for privacy and protection.

  • Uses Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols.

Page 14: Lesson Objectives

  1. Understand web browsers' functions.

  2. Familiarize with web page elements and structures.

  3. Learn about Domain Name Server (DNS) and its functionality.

  4. Comprehend the retrieval of web pages from servers.

  5. Explore different types of cookies.

  6. Understand the operational flow of cookies.

Page 15: Web Browser Overview

  • Software applications for accessing and displaying web content.

Page 16: Web Browser Functions

  • Functionalities: Retrieve, display, and manage web pages.

Page 17: Features of Web Browsers (Part 1)

  • HINT: Reference to mnemonic device (BAN CAR) for easy recall.

Page 18: Features of Web Browsers (Part 2)

  • Common functions include:

    • Bookmarks/Favorites.

    • Multiple tab support.

    • Navigation tools (back, forward, home).

    • Cookies management.

    • Address bar for URL input.

    • Logs browsing history.

Page 19: Locating and Viewing Web Pages

  • Mechanisms of finding content on the web.

Page 20: HTML Basics

  • Definition: HyperText Markup Language; the foundational coding language for web content.

  • Hosting and IP address details.

Page 21: Domain Name Servers (DNS)

  • Functionality: Match domain names (URLs) to corresponding IP addresses, simplifying user navigation.

Page 22: Flow of Web Page Retrieval

  1. User enters URL in the browser.

  2. DNS resolves the URL into an IP address.

  3. The browser communicates with the web server using the IP.

  4. HTML files are downloaded and displayed to the user.

Page 23: Web Page Retrieval Steps Overview

  • Visual summary of data flow and interactions.

Page 24: Cookies Overview

  • Brief explanation of cookies and their purposes in web browsing.

Page 25: Detailed Uses of Cookies

  • Store user preferences, login information, and manage online shopping carts.

Page 26: Types of Cookies

  • Session Cookies: Temporary cookies deleted when the browser closes.

  • Persistent Cookies: Remain on the user’s device until they expire or are manually deleted.

Pages 27-29: Cookie Details

  • Session Cookies:

    • Temporary; only active during a browsing session.

    • Example: Allows user to remain logged in on shopping sites.

  • Persistent Cookies:

    • Track user activity and preferences across sessions.

    • Store critical information (e.g., login credentials).

  • Workflow of cookies when revisiting sites.

Page 30: Exam Question Sample

  • Theory behind website requests and their display process.

Page 31: Sample Exam Responses

  • Authentication flow in web requests and server communications.

Page 32: Role of Browsers in Internet Access

  • Explains the multifaceted functions of web browsers.

Page 33: Sample Responses to Browser Role

  • Examination of comprehensive functions handled by browsers.

Page 34: Additional Lesson Objectives

  • Discusses advanced computing topics, such as blockchain.

Page 35: Digital Currency Overview

  • Defines digital currency and electronic transactions.

Page 36: Characteristics of Digital Currency

  • Nature: Invisible; data format exists on databases.

  • Used as electronic payment.

Page 37: Digital Currency as Payment Medium

  • Comparison to traditional payment systems.

Page 38: Central Banking Mechanics

  • Illustrates typical bank interactions for money transfer.

Page 39: Central Banking Example

  • Demonstrates the role of central banks in transactions.

Page 40: Issues with Centralization

  • Concerns:

    • Confidentiality risks.

    • Security challenges.

Page 41: Decentralization Example

  • Describes cryptocurrency and its non-centralized nature.

Page 42: Impact of Public Figures on Cryptocurrency

  • Mention of Elon Musk and his influence on digital currency values.

Page 43: Cryptocurrency Mining Process

  • Explanation of mining and transactional fee processes.

Page 44: Differences Between Traditional and Cryptocurrency

  • Traditional currencies are regulated; cryptocurrencies are communal.

Page 45: Blockchain Technology Basics

  • Defines blockchain and its security applications.

Pages 46-48: Blockchain Operation

  • Chain Concept: How transactions are linked to blocks, ensuring data integrity.

Page 49: Inside a Blockchain Block

  • Elements: Hash value, timestamp, previous block reference, transaction data.

Pages 50-57: Security Mechanisms in Blockchain

  • Discusses why modifications to blockchain are complex, enhancing security against hacking.

Pages 58-60: Consensus Mechanism in Blockchain

  • Emphasizes network consensus and its role in validating transactions securely.

Pages 61-70: Cyber Security Fundamentals

  • Overview of cyber threats, prevention strategies, and importance of awareness.

Pages 71-80: Types of Cyber Security Threats

  • Detailed classifications of attacks, such as Denial of Service and Data Interception.

Pages 81-88: Malware Overview

  • Definitions and types of malware explaining their functions and impacts on systems.

Pages 89-92: In-Depth Malware Types

  • Specific characteristics of viruses, trojans, worms, spyware, adware, and ransomware.

Pages 93-100: Distinction of Malicious Software

  • Comparison between viruses and worms.

Pages 101-108: Phishing and its Prevention

  • Types of phishing strategies and how to safeguard against them.

Pages 109-111: Pharming Techniques

  • Explanation of pharming, its implications, and preventive measures.

Pages 112-114: Exam Question Samples

  • Case studies exploring risks and phishing scenarios in-depth.

Pages 115-120: Cyber Security Solutions

  • Discusses strategies and tools for enhancing online security defenses.

Pages 121-129: Anti-Malware & Preventive Measures

  • Benefits of anti-virus software and its impact on maintaining system integrity.

Pages 130-139: Authentication Techniques

  • Diverse methods including passwords, biometrics, and two-step verification for user security.

Pages 140-146: Software Updates & Privacy Settings

  • Emphasizing the critical nature of keeping software updated and managing privacy settings.

Pages 147-157: Firewalls & Proxy Servers

  • Describes their function and significance in protecting network security.

Pages 158-166: Secure Socket Layer (SSL) and Transport Layer Security (TLS)

  • Importance of SSL/TLS in protecting online transactions, data integrity, and privacy.

Pages 167-179: Exam Preparation and Revision

  • Sample questions focusing on cyber security, firewalls, and data protection mechanisms to prepare students for assessments.

robot