

World Wide Web
Presentation
•
Computers
•
University
•
Easy
Seddrico Ferguson
Used 11+ times
FREE Resource
28 Slides • 25 Questions
1
World Wide Web
by Seddrico Ferguson
2
Open Ended
Who own the Internet?
3
Defining the Internet and the Web
Many people use the terms Internet and Web Interchangeably. In reality, they are not the same.
The Internet can not exist without the Web, but the Web can not exist without the Internet.
The Internet (Often referred to as the Net) is a high global interconnection of computer networks around the world.
The World Wide Web (often reffed to as the Web and abbreviated as WWW or W3) is a global collection of interconnected documents (Web pages) and other resources.
4
Fill in the Blanks
5
Multiple Choice
www stands for
Wide World website
World Wide Web
World Web Wide
6
A website is a Web Page or a collection of related Web pages located on the Web. The Page with the Web site can contain text, images, and multimedia elements such as audio, Video, and Animations.
Hyperlinks (often referred to as links) are an essential part of the web because they automatically connect you to another part of the same web page or another web page. A Web page linked can be a word, phrase, or graphic.
7
Open Ended
what elements website can contain list 1 of them
8
Multiple Choice
Web Page or a collection of related Web pages located on the Web.
Website
page site
Internet
Hyperlink
9
Multiple Choice
Hyperlinks often referred as
Chains
connections
links
10
HyperText markup Language (HTML)
is the main markup language used to create Web Pages. HTML defines the format and layout of a web document. Just as most filenames include extension to identify the type (such as docx for a word documents or jpg for a graphical file), the web page file often include file extension to indicate the file type. for example the extension may be .HTML or shtml. SHTML is an HTML file that includes special commands for the server to process.
11
Fill in the Blanks
12
The web pages are transferred between computers via HyperText Transfer Protocol (HTTP) which is the underlying protocol for the Web. This protocol defines how messages are formatted across the Internet. An HTTP client program is required at one end and an HTTP server program is required on the other end. (recall that a client is a type of computer program that makes services request from a server.
13
Each Web site possesses at least one Internet Protocol (IP) address. The Uniform Resource Locator (URL) (often referred to as a Web address) identifies the unique IP address and make it easier to remember.
14
A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures. All devices sharing a common part of the IP address are said to be in the same domain. The domain name provides an online identity (such as an organization or company name ). If your web site has a lof of information to organize, you can create a subdomain. A subdomain is like a folder under your root directory.
15
Multiple Choice
A ________is a group of computers and devices on a network that are administered as a unit with common rules and procedures.
Domain
URL
Hyperlink
Website
16
Extension Description of Domain Type
.biz Business associated with business/commercial and personal website.
.com Commerical; associated with business/ commercial and personal website, most popular.
.edu Education; associated with educational institutions.
.gov Government; associated with U.S government
.info information, both commercial and personal sites
.mil Military, various branches of the Armed Force.
.mobi Mobiles; dedicated to delivering the internet to mobile devices via the mobile web.
.net Network intended to be used only for the network providers
.org Organization, mostly associated with a nonprofit organization.
17
18
Open Ended
.edu stand for
19
Open Ended
.gov stands for
20
Open Ended
.net stands for
21
Open Ended
.Mil stands for
22
Open Ended
.info stands for
23
Open Ended
.com stands for
24
Domain types and extensions are also assigned to specific country.
Examples:
England - .uk
Canada - .ca
Japan - .ja
25
Open Ended
The Bahamas stands for
26
Web Browser
A Web Broswer is a software application you use to view and retrieve documents from the web and to display the document ina readable format. Broswer such as Internet Explorer, Safri, Google Chrome and Mozilla Fox sends a message to a web server to retrieve a requested web page.
27
Open Ended
Name one Browser mentioned
28
Open Ended
Critical Thinking: Bill has an internet connection at home. His router is about 7 years old, but it still works, would you recommend that Bill buy a new router?
Write a brief paragraph about the recommendation to Bill, and provide reasons for your recommendation?
29
Computer Safety and Ethic
By Seddrico Ferguson
30
Addressing Security Risks
You secure data to protect it from harm or destruction from natural causes, accidents, and intentional damage. It is not always evident that some type of computer crime or intrusion has occurred. Therefore, you need to set up safeguards for each type of risk. Computer security can keep hardware, software, and data safe.
Avoiding Data Loss:
Restricting Access
Using Password
Using Protection Programs
31
Multiple Choice
You secure data to protect it from
Family Friends and Worker
Destruction
Power outage
32
Avoiding Data Loss
One easy way to avoid data loss is to save data file frequently. Most software provide an option that can be set to save data periodically.
33
Restricting Acess
The best way to protect data is to effectively control access to it. if Unauthorized people gain access to data, they may obtain valuable information. system administrators and users often restrict access to files. storage devices, computer networks, the internet, or specifitc Interent sites.
34
Using Firewalls
Computer hacking involves invading someone else's Computer, usually for gain or the satisfaction of defeating a security system. hackers are usually experts who enjoy having the power to invade someone's else's privacy.
35
Firewall
A firewall protects against unwanted access to used to form a network. The firewall analyzes data on the specified security criteria. A firewall is implemented in software and hardware.
36
Multiple Choice
A ______protects against unwanted access to used to a form a network
Firewall
Fireware
Firmware
37
Using Protection Programs
software programs and Computer utilities enable you to control internet use and monitor computer usage.
Internet services such as email and file transfers can be blocked for specific users or all users. Furthermore, access to Web sites can be blocked. protecting children from unsuitable. The website is a concern for parents and teachers where children have computer access.
Filtering: is used to block content coming in and going out to the Internet.
38
Multiple Choice
_____ and _____ enable you to control Internet use and monitor computer usage.
Programs and computers
Protections and Securities
Software programs and Computer Utilities
39
Multiple Choice
Filtering is used to _____________ content coming in and going out to the Internet.
Save
Block
Type
40
Using Protection Programs
The benefits of using filtering are that the accessible Web Sites are safe and emails are inspected for spam and virus. In the educational environment, using filtering means children cannot access inappropriate Web sites.
41
Protecting against Malware
In an information-driven world, people and organizations must manage and protect against malware risk, malware refers to any software that is designed to cause damage to a single computer.
42
Fill in the Blanks
43
Virus
A virus is a program that has been written, usually by a hacker, to corrupt data on a computer.
There are several types of viruses:
A worm: A virus makes many copies of itself, consuming system resources so that the computer slows down or halts tasks, Worms don't have to attach themselves to other files.
A time bomb: is a virus that does not cause damage until a specific date or until the system has been launched a certain number of times.
44
Virus
A logic Bomb: is a virus triggered by the appearance or disappearance of specified data.
A Trojan horse: is a virus that does something different from what is expected to do. It may look like it is performing a task while it is actually performing an opposite task (usually something disastrous)
45
Multiple Choice
______is a virus that does something different from what is expected to do. It may look like it is performing a task while it is actually performing an opposite task (usually something disastrous)
A worm
Time Bomb
Trojan horse
Logic Bomb
46
Keylogger
A keylogger is a malicious program that records keystrokes. For example , a key logger might record your keystrokes to keep track of the Web sites you visit. the user names and passwords you enter, and your private information such as credit card and account numbers. because they can identify theft, keyloggers are a particularly dangerous type of harmful software.
47
Spyware
The goal is to collect information about the user', the user's browsing habits, and other personal information. Spyware can significantly slow the performance of your computer by displaying pop-ups and changing system settings, spyware can be annoying. Hackers often use spyware to control your browser.
48
Protecting a system requires a number security tools. You should use Strong Passwords and downloads and install the latest security updates for your operating system.
Antivirus software should always be running on your computer.
49
Multiple Choice
A _______is a malicious program that records keystrokes
Keylogger
Spyware
50
Multiple Choice
_____ is software fraudulently installed on a personal computer.
Keylogger
Spyware
51
Spyware
52
Disregarding False Information
Electronic Fraud , such as email fruad is a computer crime that involves the manipulation if a computer data to dishonestly obtain money, property, information, or things of value, or to cause loss.
53
Confirming E-Commerce Safety
Security concern is providing credit card information over the internet. Before providing personal information credit information on an e-commerce or similar site, first, verify that the site is secure.
World Wide Web
by Seddrico Ferguson
Show answer
Auto Play
Slide 1 / 53
SLIDE
Similar Resources on Wayground
46 questions
Contexto de la programación cliente/servidor 2/2
Presentation
•
University
46 questions
chapter 13
Presentation
•
University
52 questions
português - Termos da oração
Presentation
•
KG
48 questions
DCS1101 - Week 9 (Arrays)
Presentation
•
University
46 questions
GDPR en wetgeving
Presentation
•
KG
49 questions
3.2 - Ethernet
Presentation
•
KG - University
47 questions
Cap1_Set5_Security+
Presentation
•
University
46 questions
Social Engineering: Dig Deeper
Presentation
•
University
Popular Resources on Wayground
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
10 questions
Cinco de Mayo Trivia Questions
Interactive video
•
3rd - 5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
13 questions
Cinco de mayo
Interactive video
•
6th - 8th Grade
20 questions
Math Review
Quiz
•
3rd Grade
30 questions
GVMS House Trivia 2026
Quiz
•
6th - 8th Grade
Discover more resources for Computers
55 questions
Post Malone Addtion (Tres)
Quiz
•
12th Grade - University
20 questions
Disney Trivia
Quiz
•
University
50 questions
AP Biology Exam Review 2017
Quiz
•
11th Grade - University
24 questions
5th Grade Math EOG Review
Quiz
•
KG - University
12 questions
Star Wars Trivia - Easy
Quiz
•
KG - University
215 questions
8th Physical Science GA Milestones Review
Quiz
•
KG - University
40 questions
Famous Logos
Quiz
•
7th Grade - University
14 questions
(5-3) 710 Mean, Median, Mode & Range Quick Check
Quiz
•
6th Grade - University