Access and Use Internet
Access and Use Internet
Ethiopian TVET-System
INFORMATION
TECHNOLOGY
SUPPORT SERVICE
Level II
Unit of Competence: Access and Use Internet
Module Title: Accessing and using internet
LG Code: ICT ITS1 M05 LO1
TTLM Code: ICT ITS1 TTLM06 1011
This learning guide is developed to provide you the necessary information regarding the following content coverage and
topics –
Introduction to Internet
Internet Browsers Review
Basic Internet Settings and Configuration
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Learning Activities
1. Read the specific objectives of this Learning Guide.
2. Read the information written in the “Information Sheet 1”.
3. Accomplish the “Self-check 1” in page.
4. Submit your accomplished Self-check 1. This will form part of your training portfolio.
5. Read the information written in the “Information Sheet 2”.
6. Accomplish the “Self-check 2” in page.
7. Submit your accomplished Self-check 2. This will form part of your training portfolio.
8. Read the information written in the “Information Sheet 3”.
9. Accomplish the “Self-check 3” in page.
10. Submit your accomplished Self-check 3. This will form part of your training portfolio.
11. Read and perform the “Operation Sheet 1” in page.
12. Read and perform the “Operation Sheet 2” in page.
13. If you earned a satisfactory evaluation proceed to LAP Test.
14. However, if your rating is unsatisfactory, see your teacher for further instructions.
15. Do the “LAP test” in page (if you are ready) and show your output to your teacher.
*Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice you
on additional work. But if satisfactory you can proceed to the next topic.
INTERNET
Definition, use, and basic terminologies of Internet
The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of
networks in which users at any one computer can, if they have permission, get information from any other computer (and
sometimes talk directly to users at other computers).
The internet is computer based global information system. It is composed of many interconnected computer
networks. Each network may link thousands of computers
enabling them to share information. The internet has brought a transformation in many aspects of life. It is one of the
biggest contributors in making the world into a global village. Use of internet has grown tremendously since it was
introduced. It is mostly because of its flexibility. Nowadays one can access the internet easily. Most people have
computers in their homes but even the ones who don’t they can always go to cyber cafes where this service is provided.
The internet developed from software called the ARPANET which the U.S military had developed. It was only
restrict to military personnel and the people who developed it. Only after it was privatized was it allowed to be used
commercially.
The internet has developed to give many benefits to mankind. The access to information is one of the most
important. Students can now have access to libraries around the world. Some charge a fee but most provide free
services. Before students had to spend hours and hours in the libraries but now at the touch of a button students have a
huge database in front of them
ARPANET: The acronym stands for Advanced Research Projects Agency Network. ARPA of the United States
Department of Defense developed ARPANET, which became the world’s first packet switching network. Internet is the
successor of ARPANET.
Internet Service Provider (ISP): A company, which provides users with an access to the Internet, is known as
an Internet service provider or Internet access provider. ISP, as it is called, offers email accounts and other services like
remote storage of files for its customers. Here is a word about choosing a cheap ISP.
IP Address: It is a way of numerically identifying an entity on a computer network. The original addressing
system known as IPv4, used 32 bit addresses. With the growth of the Internet, IPv6 came to be used wherein the
addresses are composed of 128 bits.
Cyberspace: This term coined by William Gibson, is used to refer to the computer networks connected to each
other and the content they host. It is often used to refer to the Internet.
WWW (World Wide Web): It is a collection of interlinked documents that are accessible over the Internet. It
consists of millions of web pages that contain text, images, voice and videos. Sir Tim Berners-Lee, a British scientist
working at CERN, created the World Wide Web.
Website: A website is a set of web pages consisting of text, audio and video. Web servers host websites.
URL (Uniform Resource Locator): It specifies the location of a resource on the Internet. It consists of the
basic address and path.
Web Page: Web pages are resources of information. They are generally created in the HTML format and provide
the web users with navigational abilities through hyperlinks to other web pages on the web.
Home Page: The term home page is used to refer to the page that is the default page of any website. It is the
main page of a complex website.
Web Browser: A web browser is a software application that facilitates user interaction with the text, audio, video
and other information that is located on the web.
Cache: Web browsers maintain a cache of recently visited web pages. Some of them use an external proxy web
cache, which is a server program through which web requests pass. This enables the browsers to cache frequently visited
pages. Even search engines make available already indexed web pages through their caches.
HTTP: Hypertext Transfer Protocol, abbreviated as HTTP, is a communications protocol used for the transfer of
information over the Internet. A client makes an HTTP request using a web browser to which an HTTP response is sent
from the server.
Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged between the web client and
the web server. It is sent by the web server to the web client and returned unchanged by the client each time it accesses
the server.
Session: It is an exchange of information between a computer and its user. It is established for a certain period
of time after which it ends.
Hyperlink: A reference in a document to another section of the document or to another document is termed as a
hyperlink. Hyperlinks are used to redirect the user from one section of page content to another.
Internet Security: It is one of the major concerns today. As the Internet acts as a communication platform that
can be accessed by millions of users around the world, it becomes
necessary that proper measures be implemented. Issues like Internet Safety that deal with the content that is made
accessible over the Internet are equally important. Internet Privacy relates to safeguarding the privacy of the web users
and the sensitive information on the web from hackers and stalkers.
Internet – A Communication Platform : Internet serves as one of the most efficient means of
communication. Computers from different parts of the world can be connected to each other to exchange information,
thanks to the Internet. Emails and chats are excellent means of communication over the Internet. Blogs and online forums
give the Internet users a platform to reach out to the masses. Here is a list of the basic Internet terms associated with the
Internet as a communication platform. Also look at some Internet terms related to the security threats to network
communication.
Email: It is a store-and-forward method of writing, sending and receiving written messages. Electronic mail is an
Internet e-mail system that uses network-based protocols to exchange messages between network subsystems.
Email Address: It identifies the network location to which an email can be delivered. An email address is a
combination of the username of the mail user and the host name of the mailing system. It is of the form, ‘username
domain-name’. An email alias is a forwarding email address. It simply forwards emails to specific email addresses.
Spamming: The act of sending unsolicited bulk messages over an email system is known as spamming. It is an
undesirable use of the electronic messaging systems.
Phishing: It is a fraudulent activity of acquiring the sensitive information by the use of a fake identity during
electronic communication. It is implemented by means of emails and instant messages wherein a user is lured to enter
his/her details, which are actually captured by a fraudulent website.
Hacking: Hacking is the activity of programmatically gaining access to a computer application that is otherwise
inaccessible. The act of gaining an unauthorized access to a computer is known as hacking. Hacking of passwords that
leads to breach of email privacy is a threat to communication over the Internet. Internet crimes refer to all the criminal
activities that are carried over the Internet.
Email Scams: With the increase in the use of email systems, its security needs also rose. Fraudulent users
started tampering with the email systems to breach security.
Email Virus: It is a computer code that is transmitted through an email in the form of an attachment. The email
attachment causes the destruction of some of the files on the receiver computer’s hard disk and is programmatically
emailed to the contacts in the address book of the receiver.
Internet Bookmark: The Internet browsers of the modern times aim at enabling the users to organize the web
pages they access. Links once visited can be saved in the favorites or preferences categories. Bookmarks are usually
integrated into browsers. Social bookmarking is a method used by the Internet users to store and manages web pages.
Web Directories: It is a directory, which links to other websites and organizes those links. They should not be mistaken
as being search engines.
http://www.microsoft.com
Thus if you wish to visit the Web site of the company that produced this training material you would use the URL:
http://www.cctglobal.com
Due to the very large number of organizations who now have Web sites, you can also use a search engine, in
which you can enter a word or phrase connected with what you wish to find and it will then display sites that match the
information that you have entered. The results can be overwhelming however. A recent search using the search words
"PC courseware" displayed a list of 4.5 million sites containing these words!
What is a hyperlink?
A hyperlink is simply part of the text (or graphic) on a Web page, that when clicked on will automatically:
Take you to a different part of the same page
Take you to a different page within the Web site
Take you to a page in a different Web site
Enable you to download a file
Launch an application, video or sound
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications – feel free to ask your teacher.
1. ____________ It is sometimes called simply "the Net," is a worldwide system of computer networks – a network
of networks in which users at any one computer can.
2. ____________ It is a collection of interlinked documents that are accessible over the Internet. It consists of
millions of web pages that contain text, images, voice and videos. Sir Tim Berners-Lee, a British
scientist working at CERN, created it.
3. ____________ The world’s first packet switching network, the Internet is its successor.
4. ____________ It is simply data that is stored on a WWW server and which can be freely accessed by people
'surfing the Net'.
5. ____________ It specifies the location of a resource on the Internet. It consists of the basic address and path.
6. ____________ This term coined by William Gibson, is used to refer to the computer networks connected to each
other and the content they host. It is often used to refer to the Internet.
7. ____________ It is a software application that facilitates user interaction with the text, audio, video and other
information that is located on the web.
8. ____________ It is a reference in a document to another section of the document or to another document. These
are used to redirect the user from one section of a page content to another.
9. ____________ A company, which provides users with an access to the Internet. It offers email accounts and
other services like remote storage of files for its customers.
10. ___________ This term is used to refer to the page that is the default page of any website. It is the main page of
a complex website.
II. What is a hyperlink? What does hyperlink do?
Note: Satisfactory rating –points above / Unsatisfactory - below points. You can ask you teacher for the copy of the
correct answers
Internet Browsers
There were several web browsers that we can use to search from the web. Let’s take a look at some of it.
Netscape Navigator
Netscape Navigator was a proprietary web browser that was popular in the 1990s. The Netscape Navigator web
browser was succeeded by Netscape Communicator. Netscape Communicator's 4.x source code was the base for the
Netscape-developed Mozilla Application Suite, which was later renamed SeaMonkey. Netscape's Mozilla Suite also
served as the base for a browser-only spinoff called Mozilla Firefox and Netscape versions 6 through 9.
Mozilla Firefox
Mozilla Firefox is a free and open source web browser descended from the Mozilla Application Suite and
managed by Mozilla Corporation. As of August 2011, Firefox is the second most widely used browser, with approximately
30% of worldwide usage share of web browsers. The browser has had particular success in Germany and Poland, where
it is the most popular browser with 55% usage and 47% respectively.
Firefox runs on various operating systems including Microsoft Windows, GNU/Linux, Mac OS X, FreeBSD, and
many other platforms.
Galeon
Galeon is a web browser for GNOME based on Mozilla’s Gecko layout engine. Galeon’s self-declared mission
was to deliver “the web and only the web.” At the time of Galeon’s creation, the most popular web browsers,
including Netscape, Mozilla, and Internet Explorer, were large multi-functional programs.
Galeon was the first mainstream graphical web browser which specifically focused on the reduction of peripheral
functionality. Galeon is also notable for introducing “Smart Bookmarks,” bookmarks that take an argument and can be
used as toolbar buttons with a text field used to enter the value for the argument.
Opera
Opera is a web browser and Internet suite developed by Opera Software. The browser handles common Internet-
related tasks such as displaying web sites, sending and receiving e-mail messages, managing contacts, chatting on IRC,
downloading files via BitTorrent, and reading web feeds. Opera is offered free of charge for personal and mobile phones.
Opera does not come packaged with any desktop operating system. However, it is the most popular desktop
browser in some countries, such as Ukraine. Opera Mini, which is the most popular mobile web browser as of May 2011,
has been chosen as the default integrated web browser in several mobile handsets by their respective manufacturers.
Opera is known for originating many features later adopted by other web browsers. Opera runs on a variety of
personal computer operating systems, including Microsoft Windows, Mac OS X, Linux, and FreeBSD.
Phoenix
The Mozilla Firefox project was created by Dave Hyatt and Blake Ross as an experimental branch of
the Mozilla project. Hyatt, Ross, Hewitt and Chanial's browser was created to combat the perceived software bloat of
the Mozilla Suite (codenamed, internally referred to, and continued by the community as SeaMonkey), which integrated
features such as IRC, mail and news, and WYSIWYG HTML editing into one software suite.
Firefox retains the cross-platform nature of the original Mozilla browser, using the XUL user interface markup
language. The use of XUL makes it possible to extend the browser's capabilities through the use
of extensions and themes. The development and installation processes of these add-ons raised security concerns, and
with the release of Firefox 0.9, the Mozilla Foundation opened a Mozilla Update website containing "approved" themes
and extensions. The use of XUL sets Firefox apart from other browsers, including other projects based on
Mozilla's Gecko layout engine and most other browsers, which use interfaces native to their respective platforms
(Galeon and Epiphany use GTK+; K-Meleon uses MFC; and Camino uses Cocoa). Many of these projects were started
before Firefox, and probably served as inspiration.
Although the Mozilla Foundation had intended to make the Mozilla Suite obsolete and replace it with Firefox, the
Foundation continued to maintain the suite until April 12, 2006 because it had many corporate users and was bundled
with other software. The Mozilla community (as opposed to the Foundation) continues to release new versions of the
suite, using the product name SeaMonkey to avoid confusion with the original Mozilla Suite.
On February 5, 2004, business and IT consulting company AMS categorized Mozilla Firefox (then known as
Firebird) as a "Tier 1" ("Best of Breed") open source product, considering it technically strong and virtually risk-free.
The project which became Firefox started as an experimental branch of the Mozilla Suite
called m/b (or mozilla/browser). After it had been sufficiently developed, binaries for public testing appeared in September
2002 under the name Phoenix.
The Phoenix name was kept until April 14, 2003, when it was changed because of a trademark dispute with
the BIOS manufacturer, Phoenix Technologies (which produces a BIOS-based browser called Phoenix First Ware
Connect). The new name, Firebird, met with mixed reactions, particularly as the Firebird database server already carried
the name. In response, the Mozilla Foundation stated that the browser should always bear the name Mozilla Firebird to
avoid confusion with the database software. Continuing pressure from the Firebird community forced another change, and
on February 9, 2004 the project was renamed Mozilla Firefox (or Firefox for short).
The name "Firefox" (a reference to the red panda)was chosen for its similarity to "Firebird", but also for its
uniqueness in the computing industry. To ensure that no further name changes would be necessary, the Mozilla
Foundation began the process of registering Firefox as a trademark with the United States Patent and Trademark
Office in December 2003. This trademark process led to a delay of several months in the release of Firefox 0.8 when the
foundation discovered that Firefox had already been registered as a trademark in the UK for Charlton Company
software. The situation was resolved when the foundation was given a license to use Charlton's European trademark.
Konqueror
Konqueror is a web browser and file manager that provides file-viewer functionality to a wide variety of things:
local files, files on a remote ftp server and files in a disk image. It is designed
As a core part of the KDE desktop environment.It is developed by volunteers and can run on most Unix-like operating
systems and on Windows systems, too. Conqueror, along with the rest of the
Components in the KDEBase package, is licensed and distributed under the GNU General Public License version 2.
The name "Conqueror" is a reference to the two primary competitors at the time of the browser's first release:
"first comes the Navigator, then Explorer, and then the Conqueror". It also follows the KDE naming convention: the names
of most KDE programs begin with the letter K.
Konqueror came with the version 2 of KDE, released on October 23, 2000. It replaces its predecessor, KFM (KDE
file manager). With the release of KDE4, Conqueror was replaced as a file manager by Dolphin.
Lynx
Lynx is a text-based web browser for use on cursor-addressable character cell terminals and is very configurable.
Browsing in Lynx consists of highlighting the chosen link using cursor keys, or
Having all links on a page numbered and entering the chosen link's number. Current versions support SSL and
many HTML features. Tables are formatted using spaces, while frames are identified by name and can be explored as if
they were separate pages. Lynx cannot inherently display various types of non-text content on the web, such as images
and video, but it can launch external programs to handle it, such as an image viewer or a video player.
Because of its text-to-speech–friendly interface, Lynx was once popular with visually impaired users, but
better screen readers have reduced the appeal of this application. Lynx is also used to check for usability of websites in
older browsers. It is still included in a number of Unix products and Linux distributions, and is particularly useful for
reading documentation or downloading files when only a text-based environment is available. It is also useful for
accessing websites from a remotely connected system in which no graphical display is available. Despite its text-only
nature and age, it can still be used to effectively browse much of the modern web, including performing interactive tasks
such as editing Wikipedia. The speed benefits of text-only browsing are most apparent when using low bandwidth internet
connections, or older computer hardware that may be slow to render image-heavy content.
Instruction: Answer all the questions listed below, if you have some clarifications – feel free to ask your teacher.
I. Matching type: Match the Internet browser describes in Column A to Column B. Write only the letter of your answer.
Home page
The term home page is used to refer to the page that is the default page of any website. It is the main page of a
complex website.
Setting-up your home page means that when you open your web browser, the web page that you have set will be
immediately launched by your browser. The most common site that you often use will be your consideration for setting-up
your home page. So every time you will open your browser, it will automatically go to your favorite site.
Privacy Level
Internet Explorer offers a number of features to help protect your security and privacy when you browse the web.
Under Settings, there were several privacy level options you can choose:
Block All Cookies. Internet Explorer prevents all Web sites from storing cookies on your computer, and Web
sites cannot read existing cookies on your computer. Per-site privacy actions do not override these settings.
High. Internet Explorer prevents Web sites from storing cookies that do not have a compact privacy policy—a
condensed computer-readable P3P privacy statement. The browser prevents Web sites from storing cookies that
use personally identifiable information without your explicit consent. Per-site privacy actions override these
settings.
Medium High. Internet Explorer prevents Web sites from storing third-party cookies that do not have a compact
privacy policy or that use personally identifiable information without your explicit consent. The browser prevents
Web sites from storing first-party cookies that use personally identifiable information without your implicit consent.
The browser also restricts access to first-party cookies that do not have a compact privacy policy so that they can
only be read in the first-party context. Per-site privacy actions override these settings.
Medium (default). Internet Explorer prevents Web sites from storing third-party cookies that do not have a
compact privacy policy or that use personally identifiable information without your implicit consent. The browser
allows first-party cookies that use personally identifiable information without your implicit consent but deletes
these cookies from your computer when you close the browser. The browser also restricts access to first-party
cookies that do not have a compact privacy policy so that they can only be read in the first-party context. Per-site
privacy actions override these settings.
Low. Internet Explorer allows Web sites to store cookies on your computer, including third-party cookies that do
not have a compact privacy policy or that use personally identifiable information without your implicit consent.
When you close the browser, though, it deletes these third-party cookies from your computer. The browser also
restricts access to first-party cookies that do not have a compact privacy policy so that they can only be read in
the first-party context. Per-site privacy actions override these settings.
Accept All Cookies. Internet Explorer allows all Web sites to store cookies on your computer, and Web sites that
create cookies on your computer can read them. Per-site privacy actions do not override these settings.
Security Level
Why are security settings for web browsers important?
Your web browser is your primary connection to the rest of the internet, and multiple applications may rely on your
browser, or elements within your browser, to function. This makes the security settings within your browser even more
important. Many web applications try to enhance your browsing experience by enabling different types of functionality, but
this functionality might be unnecessary and may leave you susceptible to being attacked. The safest policy is to disable
the majority of those features unless you decide they are necessary. If you determine that a site is trustworthy, you can
choose to enable the functionality temporarily and then disable it once you are finished visiting the site.
Automatically detect settings: Proxy Settings and configuration settings are automatically detected.
Use automatic configuration script: Settings are retrieved from a file created by the network
administrator. You must also specify the URL to the file or file name.
Use a proxy server for your LAN: Specifies that Internet Explorer must connect to the Internet
through a proxy server. Provide the address and port number of the proxy server. By selecting the Advance button,
you can configure which proxy server and port number to use for different protocols such as HTTP and FTP. You
can then create an exception list. When accessing computers on the exception list, the proxy server is not used.
Bypass proxy server for local addresses: Select this option if you do not want to use a proxy
server for a local (intranet) addresses. Selecting this option can improve performance when accessing computers
on your intranet.
The connection settings also allow you to configure what Internet Explorer should do when a connection to
the Internet is needed. These settings include:
Never dial a connection – Internet Explorer will not automatically establish a connection when one is not
present but required. A connection must be established manually.
Dial whenever a network connection is not present – Internet Explorer will attempt to establish a connection
using your default dial-up connections when a network connection is not available.
Always dial my default connection – Internet Explorer will always attempt to connect using your default dial-
up networking connection.
What's in a Cookie?
Each cookie is effectively a small lookup table containing pairs of (key, data) values - for example (first name,
John) (last name, Smith). Once the cookie has been read by the code on the server or client computer, the data can be
retrieved and used to customize the web page appropriately.
Cookies are a convenient way to carry information from one session on a website to another, or between sessions
on related websites, without having to burden a server machine with massive amounts of data storage. Storing the data
on the server without using cookies would also be problematic because it would be difficult to retrieve a particular user's
information without requiring a login on each visit to the website.
Loading Images
Images on a web page often make the page load more slowly, especially if you have a relatively slow connection
(e.g., a dial-up connection). To decrease the time it takes to load a page by preventing images from loading you would
need to disable loading of images. But for many instances, you would need to load images to your browser.
Opening URL
Each time that you type a URL in the address bar or click on a link in Internet Explorer browser, the URL address
is automatically added to the history index file. When you type a sequence of characters in the address bar, Internet
Explorer automatically suggests you all URLs that begin with characters sequence that you typed (unless AutoComplete
feature for Web addresses is turned off). However, Internet Explorer doesn’t allow you to view and edit the entire URL list
that it stores inside the history file.
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications – feel free to ask your teacher.
1. What do you call a page that when you set, it will automatically be launched by your browser when you open it? (1
point)
2. What are the six (6) privacy level options? (6 points)
3. What is the default privacy level setting? (1 point)
4. This settings are used to configure how the Web browser will connect to the Internet. These settings are available from
the Internet Options window. (1 point)
5. It is a Proxy Settings and configuration settings are automatically detected. (1 point)
6. It is a Proxy Settings when you do not want to use a proxy server for a local (Intranet) addresses. Selecting this option
can improve performance when accessing computers on your intranet. (1 point)
Note: Satisfactory rating – points above / Unsatisfactory – below points. You can ask you teacher for the copy of
the correct answers
You can show or hide the Menu bar, Favorites or Links bar, Command bar, and status bar.
Here's how:
1. Open Internet Explorer by clicking the Start button , and then clicking Internet Explorer.
2. Click the Tools button, point to Toolbars, and then click the toolbar you want to show or hide.
The Command bar is located at the upper-right side of the Internet Explorer window and offers easy access to
almost any setting or feature in Internet Explorer. You can customize the Command bar buttons to suit your preferences.
To change the buttons on the Command bar
1. Open Internet Explorer by clicking the Start button , and then clicking Internet Explorer.
2. In Internet Explorer 8, right-click the Command bar, point to Customize, and then click Add or Remove Commands. In
Internet Explorer 7, right-click the Command bar, point to Customize Command Bar, and then click Add or Remove
Commands.
3. Make one or more of the following changes:
To add a button, click the button you want to add in the Available toolbar buttons list, and then click Add.
To remove a button, click the button you want to remove in the Current toolbar buttons list, and then
click Remove.
To change the order in which buttons are displayed, click a button in the Current toolbar buttons list, and
then click either Move Up or Move Down.
To restore the Command bar buttons to their default settings, click Reset.
4. When you're done, click Close.
You should see your changes immediately. If you've added a lot of buttons, you might need to resize the Command bar to
see them all.
Lap Test Practical Demonstration
Instructions: You are required to perform the following individually with the presence of your teacher.
Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall
advice you on additional work. But if satisfactory, you can proceed to the next topic.