0% found this document useful (0 votes)
31 views

Modul Internet Saint Johns School

The document provides an introduction to the history and development of the Internet. It discusses how the Internet began in 1969 as ARPANET, a network created by the US Department of Defense to link computers and avoid central points of failure. Standard protocols like TCP/IP were established in the 1980s, allowing universities and other networks to connect. In 1990, NSFNET replaced ARPANET as the main research network in the US. The World Wide Web was invented at CERN in 1990, with the first graphical web browser, Mosaic, released in 1993. Today, users connect to the Internet through devices like computers and phones, accessing services via an Internet Service Provider (ISP) using various connection methods.

Uploaded by

ICT HIGH SCHOOL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Modul Internet Saint Johns School

The document provides an introduction to the history and development of the Internet. It discusses how the Internet began in 1969 as ARPANET, a network created by the US Department of Defense to link computers and avoid central points of failure. Standard protocols like TCP/IP were established in the 1980s, allowing universities and other networks to connect. In 1990, NSFNET replaced ARPANET as the main research network in the US. The World Wide Web was invented at CERN in 1990, with the first graphical web browser, Mosaic, released in 1993. Today, users connect to the Internet through devices like computers and phones, accessing services via an Internet Service Provider (ISP) using various connection methods.

Uploaded by

ICT HIGH SCHOOL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Introduction of Internet 2019

Chapter I. Introduction of Internet

Competency Standards : Using the Internet for information and communication


Basic Competence : Knowing the hardware of Internet Access, Using the Internet to
obtain information, finding information and communicate over the internet
Indicators:
 Know the historical development of the Internet
 Describing the function of the hardware used for Internet access.
 Describing the role of Internet Service Provider (ISP).
 Describing the services of the World Wide Web (WWW) as a source of information.
 Using the menus and facilities available on the Web Browser to access the site.
 Describing the terms URL and Homepage
 Describing the Hypertext and HTML
 Managing the information obtained
 Knowing some sites that provide search engine facility in accessing information from the
Internet
 Using the Internet services in information access and communication to complete the tasks
given by teachers
 Using the chat service to communicate with the OL on the Internet
 Using Mailing List on Yahoo groups to communicate with groups milis.

A. Definition of Internet
Internet (short for interconnected-networking) is a series of computers connected in a series.
When the Internet (the letter 'I' big) is the common computer system, which connected globally
and using TCP / IP as the protocol of packet switching (packet switching communication
protocol). How to connect the circuit is called internetworking.

The Internet provides access to telecommunications services and information resources to


millions of users spread across the world. Internet services include direct communication
(email, chat), discussions (Usenet News, email, mailing lists), distributed information resources
(World Wide Web, Gopher), remote login and file traffic (Telnet, FTP), and various other
services .

The protocol sets out the allowable data formats, error handling (error handling), message
traffic, and other communications standards. On internet standard protocol known as TCP / IP
(Transmission Control Protocol / Internet Protocol). This protocol has the ability to work on all
types of computers, without being influenced by the differences in hardware and operating
system used. A computer system is connected directly to the network has a domain name and
Introduction of Internet 2019

IP address (Internet Protocol) in numerical form with a specific format as an identifier. The
Internet also has gateways to networks and other protocol-based services.

B. History of the Internet


Network of the Internet we know today was first developed in 1969 by the United States
Department of Defense with the name of the ARPAnet (U.S. Defense Advanced Research
Projects Agency). ARPAnet was built with the goal to create a computer network that spread to
avoid the centralization of information at one point considered prone to be destroyed in case of
war.

Picture 1. ARPAnet network

In the early 1980s, ARPANET was split into two networks, the ARPANET and MILNET (a
military network), but both have a relationship so that communication between the network can
still be made. At the beginning of this interconnection network called the DARPA Internet, but
eventually called the Internet only. Later the Internet began to be used for academic interests by
linking several universities, each of UCLA, the University of California at Santa Barbara,
University of Utah, and Stanford Research Institute. This was followed by the opening of
Usenet and Bitnet service that allows Internet access through the means of personal computers
(PCs). Next, the standard protocol TCP / IP was introduced in 1982, followed by use of the
system DNS (Domain Name System) in 1984. In 1986 was born the National Science
Foundation Network (NSFNET), which connects researchers across the country with 5 super
computer center.

Picture 2. NSFNET network


Introduction of Internet 2019

This network is then developed to connect a variety of other academic networks consisting of
university-research consortium and the consortium. NSFNET then began to replace the
ARPANET as the main research network in the U.S. until in March 1990 the ARPANET was
officially disbanded. At the NSFNET was built, many established international network and
connected to the NSFNET. Australia, Scandinavian countries, Britain, France, Germany,
Canada and Japan soon joined into this network. At first, the internet only offer text-based
services, including remote access, email / messaging, and discussion via newsgroups (Usenet).
Graphics-based services such as the World Wide Web (WWW) while it was still not there.

Picture 3. World Wide Web

There is only the service called Gopher that in some ways similar to the web that we know
today, except the system works is still text based. Significant progress achieved in 1990 when
the World Wide Web was developed by CERN (Particle Physics Laboratory in Switzerland)
based on proposals made by Tim Berners-Lee. However, the first WWW browser newly born
two years later, in 1992 under the name “Viola”. Viola w
as launched by Pei Wei and distributed with CERN WWW. Of course, the first web browser is
still very simple, not sophisticated modern browsers we use today.

Picture 4. Vioala Web Browser


Introduction of Internet 2019

Other meaningful breakthrough occurred in 1993 when it was set up to run the InterNIC
domain registration services. Simultaneously, the White House (White House) began online on
the Internet and the United States government passed the National Information Infrastructure
Act. The use of commercial Internet began in 1994 spearheaded by the company's Pizza Hut,
and Internet Banking was first applied by First Virtual. A year later, CompuServe, America
Online, and Prodigy begin providing access to Internet services for the general public.
Meanwhile, in Indonesia we are only able to enjoy a commercial Internet service in around
1994. Previously, some colleges like the University of Indonesia have been first connected to
the Internet network through a gateway that connects the university with overseas networks.

To connect to the Internet network, the user must use a special service called ISP (Internet
Service Provider). The media commonly used is through the phone line (known as PPP, Point
to Point Protocol). Users utilize a computer equipped with a modem (modulator and
demodulator) to dial up to the ISP's server. Once connected to the ISP's server, the user's
computer is ready to use to access the Internet network. Phone lines via modem is not the only
way to connect to the internet service. Connections can also be done through a dedicated line
channels such as ISDN (Integrated Systems Digital Network) and ADSL (Asymetric Digital
Subscriber Line), or via satellite through a VSAT (Very Small Aperture Terminal).
Unfortunately, the alternative is relatively quite expensive for the size of individual customers.

These are samples of Internet Service Provider in Indonesia

Picture 5. Internet Service Provider logo.

Today, alternative channels for a more affordable Internet access is still being developed.
Among the alternatives available is via radio waves (radio modem), or through cable TV
channels that are currently emerging. Another alternative that is currently under review is by
laying the cable channel the flow of data on electricity (known as PLC, Power Line
Communication). In Indonesia, the technology is being tested by PLN in Jakarta, while in
developed countries is said to have started socialized. Later, the Internet was also developed for
wireless applications (no cable) with the use of cell phones.
Introduction of Internet 2019

This protocol is used for WAP (Wireless Application Protocol). WAP is the result of
cooperation between the industry to create an open standard (open standard) based on Internet
standards, and some protocols that are optimized for wireless environments. WAP works in text
mode with a speed of about 9.6 kbps.

Picture 6. Wireless Application Protocol.

Except WAP, also developed GPRS (General Packet Radio Service) as one of the
wireless communication standard. Compared with the protocol WAP, GPRS has advantages in
speed that can reach 115 kbps and a broader application support, including graphics and
multimedia applications.

Picture 7. The work of GPRS network.


Introduction of Internet 2019

Practice
Answer these questions below correctly!

1. What is the Internet, explain clearly!


2. What stands for TCP / IP and its functions, explain and write clearly!
3. When the Internet was first created and by what name, explain clearly!
4. Write down what is meant by control and what year made?
5. Write down what is meant by the WWW, what year was created and by whom?
6. Write down the first browser ever made and by whom?
7. Internet service is still text-based is called what? Write down clearly!
8. Write down, what is meant by the ISP and what is function of ISP?
9. Write down, what internet connection via satellite?
10. Write down, Internet connection is developed by PLN?
Introduction of Internet 2019

date :

Name :
………………………….
Class: ………………………….
No. : ………………………….

A. Answer sheet

1. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
2. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
3. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
4. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
5. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
Introduction of Internet 2019

6. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
7. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
8. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
9. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
10. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………

Score Teacher’s sign Parent’s sign

Date : Date :
Introduction of Internet 2019

Chapter II. Applications of Internet

Competency Standards : Using the Internet for information and communication


Basic Competence : Using the Internet to obtain information, Finding information and
communicate over the internet
Indicators:
 Processing the information
 Downloading and determine the location of file storage
 Accessing to the Web Browser Website
 Knowing URL and Homepage

The Internet provides a variety of applications that can be used for various purposes. Each application
running on a particular protocol. The term "protocol" on the Internet refers to a set of rules that govern how
an application to communicate in a network. While the software application running on a protocol referred
to as client applications. In this section, we will meet in passing with the applications most frequently used
by Internet users.

A. Web Browser

As an alternative, the web browser Mozilla Firefox is a reliable and safe can be used as a
complement to existing browsers. Mozilla Firefox features include tabbed browsing, pop-up blocking,
integrated search facilities, live bookmarks and much more. Plug-in general such as Java, Macromedia
Flash, and Real Player is also supported. Mozilla Firefox is not installed directly. Mozilla Firefox can be
obtained by installing the firefox package.

The picture 2.1. Mozilla Firefox

B. WWW (World Wide Web)

WWW often referred to as "web" it is the most popular Internet applications. Technically, the web is
a system whereby the information in the form of text, images, sounds, etc. they are stored in an internet
webserver presented in the form of hypertext. Information on the web in text form is generally written in
HTML (Hypertext Markup Language). Other information presented in graphical form (in GIF, JPG,
PNG), sound (in AU format, WAV), and other multimedia objects (such as MIDI, Shockwave, Quicktime
Movie, 3D World).

Picture 2.2 Hypertext Markup Language


Introduction of Internet 2019

Web can be accessed by a web client software which is popularly referred to as a browser. The
browser reads web pages stored on the webserver via a protocol called HTTP (Hypertext Transfer
Protocol). There are several browsers that are quite popular and widely used, such as Microsoft Internet
Explorer, Netscape Navigator, and Opera, Mozilla, but there are also some products that are less known
browsers and is only used in restricted environments.

These are some samples of browser icon in the internet.

Picture 2.3. Icons of Web Browser.

Link makes it easy for web users move from one page to another, and "roam" from one server to
another server. This web page search activities commonly termed as browsing, there is also a call as
surfing (surfing).

Along with the development of Internet network throughout the world, then the number of websites
available have also increased. The web users may use a search engine (search engine). Search based on
search engines based on keywords (keywords) which will then be matched by the search engines with a
database (database) hers. Today, search engines are often used, among others, are Google
(www.google.com) and Yahoo (www.yahoo.com)..

Picture2. 4. Search engine.

C. Electronic Mail/E-mail/Messaging.

Email stands for electronic mail, is an application that allows Internet users to send each other
messages through the electronic address on the internet. Messages received will be accommodated in the
mailbox, then the owner of the mailbox at any time can check his contents, reply to the message, delete, or
edit and send email messages.

Email services are usually grouped into two bases, which is based email client and web-based email.
For users based email client, per-emailan activities carried out by using an email client software, such as
Introduction of Internet 2019

Eudora or Outlook Express. This software provides the functions of editing and reading email offline (not
connected to the internet). Understanding of E-mails will be explained in later chapters.

Picture 2.5. Outlook Express as email client software

D. File Transfer

This facility allows Internet users to make deliveries (upload) or copy (download) a file between a
local computer with other computers connected in a network the Internet. Standard protocol used for this
purpose called the File Transfer Protocol (FTP).

Picture 2.6. The work of file transfer protocol

FTP is generally used as a means of support for the benefit of the exchange and dissemination of a
file through the Internet. FTP is also used to make the process of uploading a web page to a webserver that
can be accessed by other Internet users. Technically, the FTP application is referred to as an FTP client,
and the popular use today include Cute FTP and WS_FTP, These applications are generally used for the
transaction is two-way FTP (active FTP). This mode allows the user to perform both the upload and
download process.

E. Remote Login

Remote login service is a program that provides functionality that enables an internet user to access
(login) to a terminal (remote host) in Internet network environment. By utilizing remote login, an Internet
user can operate a remote host without having to physically deal with the host in question. From there he
Introduction of Internet 2019

can do the maintenance (maintenance), run a program or even install new programs on a remote host. A
common protocol used for remote login is Telnet (Telecommunications Network). Telnet was developed as
a method that allows a terminal to access the resource belongs to the other terminal (including the hard disk
and the programs installed in it) by way of link building through existing communication channels, such as
a modem or network adapter.

Picture 2.7. Telnet (telecommunication network).

F. IRC (Internet Relay Chat)

RC services, or commonly referred to as "chat" it is a form of communication on the Internet that


uses a means of lines of typed text via the keyboard. Chat activity requires a software called an IRC client,
including the most popular is mIRC software. In addition there are known as MUDs (Multi-User Dungeon
or Multi-User Dimension). In contrast to the IRC chat only accommodate, applications on MUD is much
more flexible and broad. MUDs provide a facility where users can interact with each other as well as in the
real world, for example by conducting exchange of files or leave a message. Example: IM, IRC, MSN,
GoogleTalk, etc.

These are samples of Internet Relay Chat

Picture 2.8 Internet Relay Chatting icons.


Introduction of Internet 2019

G. Some other important protocol.

 UDP, User Datagram Protocol is a connectionless TCP. This means that a packet is sent over the
network and reach another computer without making a connection. So the way to the destination of
the packet can be lost because there is no direct connection between two hosts, so its not realibel
UDP, but UDP is faster than TCP because it does not require a direct connection.

 SMTP, Simple Mail Transfer Protocol is used to send electronic mail (Email). One disadvantage of
this protocol is not doing the authentication for the client, so that someone can easily use the telnet
to port 25/tcp, and send emails to anyone, and can manipulate the data source address.

 POP, Post Office Protocol. Lately POP3 is the most popular standards. POP is used to receive and
read email from a web page. A POP3 daemon listening on a 110/TCP do. One disadvantage of this
protocol is to send a username and password in Clear Text, so it can easily be taken with a packet
sniffer program.

 DHCP: Dynamic Host Configuration Protocol.


If you get a Cable-connection using DHCP to get IP from your ISP.

 OSPF (Open Shortest Path First) & RIP (Routing Information Protocol) is used to determine the
best method of routing.

 BOOTP is used to boot (usually) a diskless workstation to read the boot information on the server.
Server defaults to listening on 67/UDP.

 ARP & RARP: Address Resolution Protocol. I'll explain with an example: If you want to send data
to a host and you have a MAC-address (Media Access Control, Ethernet-address) you can perform
queries to the router to obtain its IP, it is handled by the ARP, if you have sautu IP from the host
and you want to get the MAC address is, you can use RARP (Reverse Address Resolution
Protocol).

 Telnet (network terminal protocol) is used to log in remotely to a computer (usually on a UNIX
system-base). Telnet sends username and password in the form of the Clear Text via network, so
easy to take someone else with a Packet Sniffer. There is a protocol called SSH (Secured Shell) is
also used to log in remotely safer: where the data to be transmitted in encrypted, so the data
obtained packet sniffer becomes meaningless. Telnet and SSH is often used in UNIX environments.
Perform a telnet daemon listening on 23/TCP and perform SSH daemon listening on 22/tcp.

Exercise
1. What is the WWW, explain and write clearly!
2. Mention 4(four) kinds of browsers that are available now!
3. What is meant by E-mail, explain and write!
4. What is a Mailing List, explain and write?
5. What is FTP and what's the point, write down?
6. Write the functions of remote login?
7. Explain what is meant by UDP? Write!
8. Write down, what is IRC and what does it do?
Introduction of Internet 2019

9. Write down, what is meant by HTTP?


10. Write down, what is meant by DHCP?
Introduction of Internet 2019

Date :

Name : ………………………….
Class : ………………………….
No. : ………………………….

A. Answer Sheet

1. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
2. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
3. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
4. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
5. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
6. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
7. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
8. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
9. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
Introduction of Internet 2019

10. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………

Score Teacher’s sign Parent’s sign

Date : Date :
Introduction of Internet 2019

Chapter III. Cybercrime

Competency Standards : Using the Internet for information and communication


Basic Competence : Performing a secure data from cybercrime.
Indicators:
 Knowing the definitions of various forms of cybercrime
 Knowing the differences in each of cybercrime
 Knowing the laws that apply in cyberspace

Picture 3.1 Hacker.

In the virtual world of the Internet as well as many invites the hands of criminals in the act,
either to seek material gain or simply to wreak mischief. This raises a typical phenomenon often
referred to cybercrime (crime in the cyber world).

Within the scope of cybercrime, we often see the term “hacker”. The use of this term in the
context of cybercrime is actually a misnomer. The term of hacker usually refers to someone who
had a great interest to study in detail the computer systems and how to improve capabilities. The
amount of interest owned by a hacker can push salts have the ability to control the system above the
average of most users. So, the hacker actually has a neutral connotation.

Picture 3.2 Cracker of system

SAINT JOHNS SCHOOL


Introduction of Internet 2019

As for those who frequently perform acts of vandalism on the internet is typically referred to as
“crackers” (free translation: breaker). Arguably this is actually crackers are hackers who exploit its
ability to things that are negative. Cracking activity on the internet has a very broad scope,
ranging from hijacking other people's accounts, piracy website, probing, spreading the virus to
target disablement. This latter action is known as a DoS (Denial of Services). Compared to other
modes, including the denial of the most dangerous because not only do the theft or destruction of
data on systems owned by others, but also undermine and cripple a system.

One of the cracking activity of the best known is the hijacking of a website and then change
the page display face. This action is commonly known as “defacement”. The motive of this action
vary, ranging from just a fun test "miracle" his knowledge, business competition, until political
motives. Sometimes, there is also a cracker that does this simply to show the weaknesses of a system
administrator to manage it. Other destructive activities that could be categorized as cybercrime is the
spread of a virus (worm) over the internet.

Not all of cybercrime can immediately be categorized as a crime in a very real sense. There are
also types of crimes that fall into "gray areas". One is “probing or portscanning”. This is the name for
a kind of surveillance act against another person's system by gathering as much information from the
system under surveillance, including the operating system used, the ports are either open or closed,
and so on. If the analogy, this activity is similar to the thief who did a survey prior to the intended
target. At this point the perpetrator does not perform any action against the diintainya system, but the
data that he got would be very useful for the real action that may be destructive.

Also included into the "gray area" this is a crime associated with the domain name on the
internet. Many people who do some sort of activity "brokering" the domain name to buy a domain
that is similar to a trademark or the name of a particular company and then sell it at a high price to
the owner of the brand or the company concerned. This activity is termed as “cyber squatting”.
Another activity that is almost similar to known as “typo squatting”, which is making the domain
name "pun" of a domain that already popular.

The perpetrators of “typo squatting” hope to make profits from the visitors who strayed into the
site because of typo domain names designated in the browser. In addition to crimes that require
technical skills are adequate, there is also a crime that uses the Internet only as a means. Such crimes
are not worthy classified as cybercrime, but purely criminal. Example: Such crimes are carding, ie
theft of credit card numbers belonging to others for use in trade transactions on the Internet. Also the
use of internet media (webserver, mailing lists) to spread the pirated material. Delivery anonymous
email that contains a promotion (spamming) can also be included in the sample who use the internet
SAINT JOHNS SCHOOL
Introduction of Internet 2019

crime as a means. In some developed countries, the perpetrators of spamming (which is termed as a
spammer) can be prosecuted on charges of invasion of privacy.

Picture 3.3 The kind of Spam Email.

Cyber Law is known as “Cyber-Law”, usually contains the regulations that must be adhered to by
Internet users in the country concerned, complete with the laws and penalties for the offenders.
Nevertheless, it is not easy to be ensnared by law cybercrime perpetrators. Unlike the Internet knows
no state boundaries, then the application of Cyberlaw is still constrained by jurisdictional boundaries.
In fact, an offender does not need to be in the jurisdiction of the countries concerned to perform the
action.

Picture 3.4 Sample of Cyber Crime

SAINT JOHNS SCHOOL


Introduction of Internet 2019

Chapter IV. Email

Competency Standards : Using the Internet for information and communication


Basic Competence : Using the Internet to obtain information, Finding information and
communicate over the internet
Indicators:

 Knowing the definition of e-mail


 Knowing the difference webmail with the email clien
 Downloading and determine the location of file storage
 Knowing the email creation steps
 Able to reactivate an inactive mail.

Most of us already know of course what is meant by e-mail, the functions of email and so forth
associated with the name email. Therefore, prior to further elaborate on the things that make your
blog or website, it's good to know what the mean by email and all matters relating to the Email.

A. Definition of Email

Email stands for Electronic Mail. Just like an ordinary letter, e-mail function to send a letter or
message to others. Differences between letters. The email is no longer need a paper as a
medium to write the message, the media in use is a form of digital data as it travels over the
Internet.

What are the advantages of Email?

A lot of benefits of using email , one of the most prominent is super fast message delivery
process that only takes a few minutes or even a few seconds to arrive at their destination,
although the distance between the sender and the recipient of the message so far. Different cities,
provinces or even different countries though not an obstacle.

The terms related to Email:

WebMail
Webmail is a website or a website that provides email facility.
Some Web sites that provide free email:
 Google mail (gmail)
 Yahoo mail
 And other

SAINT JOHNS SCHOOL


Introduction of Internet 2019

Email Adress.
Email Address is the address that we can be when making an email on the website email
providers.
Example email address:
[email protected]
[email protected]

MailBox
Mailbox is the mailbox URLs in general, so if there are posts from other people, then the letter
will go into the mailbox or mailboxes.

CC or BCC
CC (Carbon Copy), BCC (Blind Copy) is the same with a copy. So if you want to send a letter to
more than one person, then the other input that address into the CC.

B. Email Client.
Email Client is a tool or software easier to manage email. With your email client software does
not log into the site but the email provider directly downloaded to your computer via the
software.
Examples of email client software:
 Microsoft Outlook Express
 Thunder bird
 And other other

Picture 4.1 Sample of Email Client.

SAINT JOHNS SCHOOL


Introduction of Internet 2019

Differences Webmail with Email clients.

Webmail is an email service that uses a web browser (Internet Explorer, FireFox, Opera, etc.) as
its email client.
 Advantages of webmail is that it can be opened on different computers directly without
having to re-service setting.
 Disadvantages of webmail, there is always to use the domain provider ([email protected]),
so many ads that really is not needed is also displayed so that the process of reading your
email in addition to impaired ads, also becomes slower.

Email client is a email service that uses email client (Outlook Express, Fedora Eudora,
Thunderbird, etc.).
 Advantages of the most major email client is the process of reading email faster because it is
not disturbed ad, eye relief (due to no advertising, email features more structured and
unambiguous), and privacy is guaranteed.
 shortcomings, to open the email on different computers, should be setting back.

C. POP and SMTP access.

SMTP, POP, and IMAP are protocols TCP / IP is used for sending emails.
For those of you who want to manage your email using an email client like outlook express or
thunder bird, you can set your email to be forwarded to the email client.

 SMTP (Simple Mail Transfer Protocol). This protocol is used for sending email using
email client (Outlook Express, Eudora, thunderbird), with the identity of port 25.

 POP (Post Office Protocol) is more popularly known as POP3. This protocol is used by
email client applications to download email from mail server. The workings of this protocol
is to download emails and delete emails from the mail server. so the process of reading
email on the email client application is performed “offline”. The identity of this protocol is
port 110.

 IMAP (Internet Message Access Protocol). This protocol similar to POP protocol (the same
protocol for downloading emails), an excess of this protocol compared with POP, IMAP
allows email remain in the mail server. The identity of the protocol port 143.

SAINT JOHNS SCHOOL


Introduction of Internet 2019

D. Yahoo! Messenger access.

Yahoo! Messenger is one of the yahoo facilities are very popular in the world, with yahoo
messenger we can easily interact with others either through writing, sound (voice), and can also
directly use the webcam so they can see a person through a layer the monitor. To use this service
you must have a yahoo account! Or in other words, we must have an email on Yahoo!

Sign up to the Web or Blog search engine Yahoo! (Yahoo! Search Engine)
The search engine Yahoo! (Yahoo! Search Engine) is the second largest search engine in the
world after the search engine Google. For those of you who already have a website or blog you
want to register a website or blog into a search engine Yahoo! Then you need an account in
Yahoo!.

Access Yahoo! Geocities


By Yahoo! Geocities you can create a web page with ease and can be made as a host for images
or scripts, and other data that you want in the store on the internet.

My blog access
Mybloglog.com is one of the family of Yahoo in terms of a community on the Internet, to
register to the site is required to use your yahoo account.
And many more facilities from yahoo that you can enjoy with the requirement to use yahoo
account.

E. Making email

There are several reasons why you should create an email (account) on yahoo!, Including:
Data storage capacity is large enough. Since Yahoo provides a large capacity, then you no longer
need to delete the emails that existed before. There have been many people who use.

The steps to make yahoo email;

1. Enter the address of yahoo webmail

Picture 4.2. Writing an address email


2. Then it will appear

SAINT JOHNS SCHOOL


Introduction of Internet 2019

Picture 4.3. Interface of Web Email of Yahoo.


Click the icon list to enter the email registration form.

3. Click on the list will appear ;

Picture4.4. Input data


4. Enter the data that needs to be filled
 My Name : with the first name and last name. Example: john Adrianus
 Gender: fill in your gender, male or female.
 Date of Birth: fill in your birth date.
 Country: select country where you live.
 Post Code: Fill in your zip code. Example 45 320.

SAINT JOHNS SCHOOL


Introduction of Internet 2019

 Yahoo! ID and Email: fill in the name ID that you want. Example: jawdev. For the
dropdown menu to choose yahoo.co.id I suggest that later can be forwarded to the
POP and SMTP access, click the "check" to check the ID is still available for use or
not. Replace ID with a new name if the ID in the input could not be made.
 Password: fill in with a password that you want, suggest that the password contains a
mix between letters with numbers. Example: @ ma1La1ng (remember, password is
sensitive to small and large letters).
 Retype Password: fill again with a password that had been written. Example: @
ma1La1ng
 Security Questions 1 and 2: select the questions provided. For example: what is the
name of your pet?
 Your answer: fill in the answer that you will remember always. For example: elephant
 Enter the code in the show: fill in the numbers that appear.
 Click the "Create My Account".

5. If there is nothing wrong to input your email has been so


as an illustration, please click the image below:

Picture 1.5. Interface of a successful email


6. After clicking the next button to get into email

SAINT JOHNS SCHOOL


Introduction of Internet 2019

Picture 4.6. First Interface of email begin.

7. To send email click on “Write” and to check email and click “check mail”
Congratulations, you already have an account in yahoo which later can be used for a variety of
facilities that is provided by Yahoo!

F. Attachment.

In electronic mail, attachment (attachment) is a file (file) is sent together with electronic mail (e-
mail or email). Different from regular mail attachments, email attachments can form any file, for
example: a picture (*. jpg), video (*. mpg), and songs (*. wav).
The existence of the e-mail attachment email would make the size bigger. ISP or webmail
services beyond the generally limit the maximum size of any email.
Attachment certain type, such as *. txt, *. WRD, and *. html, can be compressed in order for the
attachment size becomes small.

Step sending emails with attachments;


Fill in the following sections:
1. To: Enter e-mail address of the intended
2. Cc: Enter your e-mail address another target (if any) (a copy).
3. Bcc: Enter your e-mail address another target (if any) (a copy).
4. Subject: Fill in the subject or title of the e-mail
5. After that type in your message.

SAINT JOHNS SCHOOL


Introduction of Internet 2019

6. When finished click the Attach Files / attach the file to include file attachments in emails,
so the display appears Upload File dialog box as follows:

Picture 4.7. Interface of Attachment file

7. Select the location of your file in the Look in box, and select the file you want to attach,
then click “Open” button..
8. Wait a moment until the file upload process is complete
9. After the file upload process is complete, press “Send” button to send an e-mail with file
attachments.
10. Wait a moment until the message "Sent Massage", this indicates that your message has
been successfully sent.
11. If there is no need to e-mail account, do not forget to press “Sign Out” button.

Opening the email sent


Inbox

Picture 4.8. Inbox or incoming email

1. It will appear as follows

Picture 4.9. Interface of incoming email.

And click on the title of email on incoming email.

SAINT JOHNS SCHOOL


Introduction of Internet 2019

2. Next, the content of e-mails can be read

Opening an email with attachments


1. After the email will open up

Picture 4.10. Email with attachment file

2. Click to download all attachments sent to retrieve. And appear;

Picture 4.11. Tab command to download files

On this tab you can open it or stored in a storage medium.


3. The download file can be opened in a state of offline or not connected to the Internet
4. If you are finished click “Sign Out”.

G. Yahoo! Mail account is not active.


The message appears when I open my email I have not opened in Yahoo! Mail. The cause of
disabling the account at Yahoo! Mail. Firstly because Yahoo! Mail has never been opened for 4

SAINT JOHNS SCHOOL


Introduction of Internet 2019

months or more, and at the request of the user itself to Yahoo! Mail

Picture 4.12. Warning for the old email is not active

Since Yahoo! Mail account is inactive, the consequences of all that stored in Yahoo! Mail will be
deleted and can’t be restored again, during the inactive all messages received will be returned to
the sender.
But the account is not 100% either disabled or not be used again. Email could still be reactivated
by pressing the "Turn Back the Yahoo! Mail". At the end of the email can be reused.

Student’s worksheet

1. The following devices which serve to connect two LANs is ….


a. Hub c. Bridge
b. Router d. UTP Cable
2. The following device that allows two computers to communicate with each other and treat
the data exchanged in the network is ..….
a. Hub c. Bridge
b. Router d. LAN Card
3. The process of sending and receiving data from two computers on a network is called ….
a. Data communication c. chatting
b. Back-up data d. download
4. Collection of protocols that work together to manage the process of sending / data
communications, is called….
a. TCP/IP c. Network
b. LAN Card d. Connector
5. The way to secure the data by filtering the flow of incoming and outgoing communication is
known as ….
a. Firewall c. SSL
b. Cryptography d. Destructive Device
6. Sending a file or enter the site so it can be accessible to Internet users is called ….

SAINT JOHNS SCHOOL


Introduction of Internet 2019

a. Public Internet c. Down load


b. Chatting d. Upload
7. To open “Control Panel” in windows program that we do is... .
a. Click Start – Choose Program – Click Control panel
b. Click Start – Choose Program – Click Windows Explorer
c. Click Start – Choose Setting – Click Control panel
d. Click Start – Choose Document – Click Control panel
8. Among Internet Service Providers below which can be accessed without having to register
is...
a. RAT net c. Meganet
b. Indonet d. Telkomnet@ instan
9. Here is a way to save the Web page, which is yaitu ... .
a. Click menu File – Click “Save”
b. Click menu File – Click “Save As”
c. Click menu File – Click “Open” – Click “Save”
d. Click menu File – Click “Close” – Click “Save As”
10. The way to get into a network illegally with the intent to steal, alter, or destroy files / data
stored on the computer is ….
a. SSL c. Hacking
b. Cracking d. Virus
11. Company that service connection to the internet is called ….
a. Backbone c. Microsoft
b. ISP d. Telkomnet
12. The following are characteristics of ISPs who will we choose, except..
a. Having its own backbone
b. Subscription cost of expensive
c. Access is very fast
d. Having a proxy server
13. The features of an ISP that is related to data security ….
a. Having a large bandwidth
b. Having a firewall
c. Having a proxy server.
d. Having backbone itself
14. Channel data is passed jointly by the data transferred, called ….
a. Backbone c. Modem
b. Bandwith d. ISP
15. Unit of internet data transfer rate is called….
a. Bps c. km/hour
b. Bandwith d. data/seconds
16. Below is one of the Web browser, which is... .

SAINT JOHNS SCHOOL


Introduction of Internet 2019

a. Open Writer c. Mozilla Firefox


b. www d. Google.co.id

17. The main requirement or condition to be able to send e-mail is... .


a. Having a personal website
b. Using Microsoft Word.
c. Having an e-mail
d. are able to use the Search engine
18. To save your favorite addresses of subscribers on the Internet web, is ….
a. Website c. Server
b. Backbone d. Server proxy
19. Functions of a phone line to connect to the internet is ….
a. To connect one computer to another computer
b. To convert digital signals to analog or vice versa
c. To connect the computer to an ISP that used
d. To send data to another computer
20. To convert digital signals into analog signals (electrical signals) or vice versa in order to pass
a phone line and can be read by a computer, it is a function of ….
a. Phone c. Slot Card
b. Modem d. Hand-phone
21. Here's advantages of an internal modem is….
a. easy to install
b. easily transferred to another computer
c. cheaper
d. well-known brand
22. Modem that is separated with a computer and it’s connected with or without wires, is called
of a modem ….
a. Internal c. Internet
b. External d. Outdoor
23. Data transmission technology in the form of packages using radio waves is called ….
a. GPRS c. TV kabel
b. ADSL d. Dial-up
24. The following software is used as a browser on the Internet, is ….
a. Windows XP c. Microsoft Outlook
b. mIRC d. Internet Explorer
25. Chatting applications using Yahoo's servers, is….
a. Windows c. Yahoo Messenger
b. mIRC d. Internet Explorer

SAINT JOHNS SCHOOL


Introduction of Internet 2019

B. Answer the following questions clearly!


1. Facilities on the internet that allows a number of users that can join to communicate with
each other via computer directly is ....
2. Is a collection of e-mails that form a community is a sense of ....
3. Internet applications are used to access a computer that is located geographically so far is.
4. The program used as a tool to search for information on the Internet is the sense of ....
5. HTML stands for ....
6. HTTP stands for ....
7. LAN stands for ....
8. ISP stands for ....
9. A person or group of people who use the internet to ruin someone else's computer system
is called....
10. The size-speed internet access is ....
11. Which serves as access controller in a Hotspot location is ....
12. To be able to connect to the Internet via phone lines, we need a tool called ....
13. The benefits of Wi-Fi is ....

C. Answer the following questions clearly!


1. Mention and explain two types of network architecture!
2. What are the advantages compared to the model Internal External Modem?
3. Explain the advantages of ADSL technology!
4. Explain the terms Download and Upload!
5. Explain the advantages and disadvantages of using “Dial-Up” connection!
6. Explain the advantages of 3G than a Wi-Fi connection to use!
7. What is a Hotspot?

SAINT JOHNS SCHOOL


Introduction of Internet 2019

Answer Sheet Date :

Name : ………………………….
Class : ………………………….
No. : ………………………….

A. Multiple Choice
1 A B C D 14 A B C D
2 A B C D 15 A B C D
3 A B C D 16 A B C D
4 A B C D 17 A B C D
5 A B C D 18 A B C D
6 A B C D 19 A B C D
7 A B C D 20 A B C D
8 A B C D 21 A B C D
9 A B C D 22 A B C D
10 A B C D 23 A B C D
11 A B C D 24 A B C D
12 A B C D 25 A B C D
13 A B C D

B. Answer Sheet

1. …………………………………………………………..…………………………………
………………………..……………………………………………………………………
…………………………
2. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
…………………………
3. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
…………………………
4. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
…………………………

SAINT JOHNS SCHOOL


Introduction of Internet 2019

5. ……………………………………………………………..………………………………
…………………………..………………………..…………………………………………
…………………………
6. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
…………………………
7. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
…………………………
8. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
……………………….
9. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
……………………….
10. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
……………………….
11. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
……………………….
12. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
……………………….
13. …………………………………………………………..…………………………………
……………………………………………………….…………..…………………………
…………………………

C. Essay Answer
1. ………………………………………………………………………………………………
………………………………………………………………………………………………

SAINT JOHNS SCHOOL


Introduction of Internet 2019

………………………………………………………………………………………………
………………………………………………………………………………………………
……………………..…………………………
2. ………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………..………………………………………………………………………
………………………………………
3. ………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………
4. ………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………..…………………………
5. ………………………………………………………………………………………………
……………………………………………………………………………………………….
………………………………………………………………………………………………
………………………………………………………..………………………………………
…………………………………………………..
6. ………………………………………………………………………………………………
……………………………………………………………………………………………….
………………………………………………………………………………………………
………………………………………..

SAINT JOHNS SCHOOL


Introduction of Internet 2019

7. ………………………………………………………………………………………………
……………………………………………………………………………………………….
………………………………………………………………………………………………
………………………………………………………………………………………………
…………………………………………………….

Score Teacher’s sign Parent’s sign

Date : Date :

SAINT JOHNS SCHOOL

You might also like