Search Header Logo
World Wide Web

World Wide Web

Assessment

Presentation

Computers

University

Easy

Created by

Seddrico Ferguson

Used 11+ times

FREE Resource

28 Slides • 25 Questions

1

World Wide Web

by Seddrico Ferguson

media

2

Open Ended

Who own the Internet?

3

​Defining the Internet and the Web

​Many people use the terms Internet and Web Interchangeably. In reality, they are not the same.

The Internet can not exist without the Web, but the Web can not exist without the Internet.

​The Internet (Often referred to as the Net) is a high global interconnection of computer networks around the world.

The World Wide Web (often reffed to as the Web and abbreviated as WWW or W3) is a global collection of interconnected documents (Web pages) and other resources.

4

Fill in the Blanks

5

Multiple Choice

www stands for 

1

Wide World website 

2

World Wide Web

3

World Web Wide

6

​A website is a Web Page or a collection of related Web pages located on the Web. The Page with the Web site can contain text, images, and multimedia elements such as audio, Video, and Animations.

Hyperlinks (often referred to as links) are an essential part of the web because they automatically connect you to another part of the same web page or another web page. A Web page linked can be a word, phrase, or graphic.

7

Open Ended

what elements website can contain list 1 of them

8

Multiple Choice

Web Page or a collection of related Web pages located on the Web.

1

Website 

2

page site

3

Internet 

4

Hyperlink

9

Multiple Choice

Hyperlinks often referred as

1

Chains

2

connections

3

links

10

​HyperText markup Language (HTML)

​is the main markup language used to create Web Pages. HTML defines the format and layout of a web document. Just as most filenames include extension to identify the type (such as docx for a word documents or jpg for a graphical file), the web page file often include file extension to indicate the file type. for example the extension may be .HTML or shtml. SHTML is an HTML file that includes special commands for the server to process.

11

Fill in the Blanks

12

​The web pages are transferred between computers via HyperText Transfer Protocol (HTTP) which is the underlying protocol for the Web. This protocol defines how messages are formatted across the Internet.  An HTTP client program is required at one end and an HTTP server program is required on the other end. (recall that a client is a type of computer program that makes services request from a server.

13

​Each Web site possesses at least one Internet Protocol (IP) address. The Uniform Resource Locator (URL) (often referred to as a Web address) identifies the unique IP address and make it easier to remember. 

14

A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures. All devices sharing a common part of the IP address are said to be in the same domain. The domain name provides an online identity (such as an organization or company name ). If your web site has a lof of information to organize, you can create a subdomain. A subdomain is like a folder under your root directory. 

15

Multiple Choice

A ________is a group of computers and devices on a network that are administered as a unit with common rules and procedures.

1

Domain

2

URL

3

Hyperlink

4

Website

16

​Extension                   Description of Domain Type 

​.biz           Business associated with business/commercial and personal website.

​.com        Commerical; associated with business/ commercial and personal website, most popular.

​.edu          Education; associated with educational institutions. 

​.gov         Government; associated with U.S government 

​.info         information, both commercial and personal sites

​.mil           Military, various branches of the Armed Force.

​.mobi       Mobiles; dedicated to delivering the internet to mobile devices via the mobile web.

​.net          Network intended to be used only for the network providers

​.org         Organization, mostly associated with a nonprofit organization. 

17

media

18

Open Ended

.edu stand for

19

Open Ended

.gov stands for

20

Open Ended

.net stands for 

21

Open Ended

.Mil stands for

22

Open Ended

.info stands for

23

Open Ended

.com stands for

24

​Domain types and extensions are also assigned to specific country.

​Examples:

​England - .uk

​Canada - .ca

​Japan - .ja

25

Open Ended

The Bahamas stands for

26

​Web Browser

​A Web Broswer is a software application you use to view and retrieve documents from the web and to display the document ina readable format. Broswer such as Internet Explorer, Safri, Google Chrome and Mozilla Fox sends a message to a web server to retrieve a requested web page.

27

Open Ended

Name one Browser mentioned 

28

Open Ended

Critical Thinking: Bill has an internet connection at home. His router is about 7 years old, but it still works, would you recommend that Bill buy a new router?

Write a brief paragraph about the recommendation to Bill, and provide reasons for your recommendation?

29

Computer Safety and Ethic ​

By Seddrico Ferguson​

30

​Addressing Security Risks

​You secure data to protect it from harm or destruction from natural causes, accidents, and intentional damage. It is not always evident that some type of computer crime or intrusion has occurred. Therefore, you need to set up safeguards for each type of risk. Computer security can keep hardware, software, and data safe.

  • Avoiding Data Loss:

  • Restricting Access

  • Using Password

  • Using Protection Programs ​

31

Multiple Choice

You secure data to protect it from

1

Family Friends and Worker

2

Destruction

3

Power outage

32

​Avoiding Data Loss

​One easy way to avoid data loss is to save data file frequently. Most software provide an option that can be set to save data periodically.

33

​Restricting Acess

​The best way to protect data is to effectively control access to it. if Unauthorized people gain access to data, they may obtain valuable information. system administrators and users often restrict access to files. storage devices, computer networks, the internet, or specifitc Interent sites.

34

​Using Firewalls

​Computer hacking involves invading someone else's Computer, usually for gain or the satisfaction of defeating a security system. hackers are usually experts who enjoy having the power to invade someone's else's privacy.

35

​Firewall

​A firewall protects against unwanted access to used to form a network. The firewall analyzes data on the specified security criteria. A firewall is implemented in software and hardware.

36

Multiple Choice

A ______protects against unwanted access to used to a form a network

1

Firewall

2

Fireware

3

Firmware

37

​Using Protection Programs

​software programs and Computer utilities enable you to control internet use and monitor computer usage.

​Internet services such as email and file transfers can be blocked for specific users or all users. Furthermore, access to Web sites can be blocked. protecting children from unsuitable. The website is a concern for parents and teachers where children have computer access.

​Filtering: is used to block content coming in and going out to the Internet.

38

Multiple Choice

_____ and _____ enable you to control Internet use and monitor computer usage.

1

Programs and computers

2

Protections and Securities

3

Software programs and Computer Utilities

39

Multiple Choice

Filtering is used to _____________ content coming in and going out to the Internet.

1

Save

2

Block

3

Type

40

​Using Protection Programs

The benefits of using filtering are that the accessible Web Sites are safe and emails are inspected for spam and virus. In the educational environment, using filtering means children cannot access inappropriate Web sites.

41

​Protecting against Malware

​In an information-driven world, people and organizations must manage and protect against malware risk, malware refers to any software that is designed to cause damage to a single computer.

media

42

Fill in the Blanks

43

​Virus

​A virus is a program that has been written, usually by a hacker, to corrupt data on a computer.

​There are several types of viruses:

​A worm: A virus makes many copies of itself, consuming system resources so that the computer slows down or halts tasks, Worms don't have to attach themselves to other files.

​A time bomb: is a virus that does not cause damage until a specific date or until the system has been launched a certain number of times.

44

​Virus

A logic Bomb: is a virus triggered by the appearance or disappearance of specified data.

​A Trojan horse: is a virus that does something different from what is expected to do. It may look like it is performing a task while it is actually performing an opposite task (usually something disastrous)

45

Multiple Choice

______is a virus that does something different from what is expected to do. It may look like it is performing a task while it is actually performing an opposite task (usually something disastrous)

1

A worm

2

Time Bomb

3

Trojan horse

4

Logic Bomb

46

​Keylogger

​A keylogger is a malicious program that records keystrokes. For example , a key logger might record your keystrokes to keep track of the Web sites you visit. the user names and passwords you enter, and your private information such as credit card and account numbers. because they can identify theft, keyloggers are a particularly dangerous type of harmful software.

47

​Spyware

​ The goal is to collect information about the user', the user's browsing habits, and other personal information. Spyware can significantly slow the performance of your computer by displaying pop-ups and changing system settings, spyware can be annoying. Hackers often use spyware to control your browser.

48

​Protecting a system requires a number security tools. You should use Strong Passwords and downloads and install the latest security updates for your operating system.

​Antivirus software should always be running on your computer.

49

Multiple Choice

A _______is a malicious program that records keystrokes

1

Keylogger

2

Spyware

50

Multiple Choice

_____ is software fraudulently installed on a personal computer.

1

Keylogger

2

Spyware

51

​Spyware

media
media
media
media
media

52

​Disregarding False Information

​Electronic Fraud , such as email fruad is a computer crime that involves the manipulation if a computer data to dishonestly obtain money, property, information, or things of value, or to cause loss.

53

​Confirming E-Commerce Safety

​Security concern is providing credit card information over the internet. Before providing personal information credit information on an e-commerce or similar site, first, verify that the site is secure.

World Wide Web

by Seddrico Ferguson

media

Show answer

Auto Play

Slide 1 / 53

SLIDE