Task 7 Web Browsers
Task 7 Web Browsers
Search
engines and usage of various search engines, Need of anti-virus, Installation of anti-virus, configuring personal firewall
and windows update.
(Students should get connected to their Local Area Network and access the internet. In the process they should
configure the TCP/IP setting and demonstrate how to access the websites and email. Students customize their web
browsers using bookmarks, search tool bars and pop up blockers)
AIM: To learn local area network and access the internet. In the process they configure the TCP/IP setting, Finally students
should demonstrate, to the instructor, how to access the websites and email.
Theory:
LANs are privately owned networks with in a single building or campus of up to few kilometers in size.
WAN is a network that connects computers across a large geographic area such as a city or country
Collection of methods used to connect servers on the internet and to exchange data.
1. Go to start>control Panel
2. open Network Connections
3. Click create a new connection and then click next
Theory:
A software application used to access information on the World Wide Web is called a Web Browser. When a user
requests some information, the web browser fetches the data from a web server and then displays the webpage
on the user’s screen.
Given below are the examples of the most commonly used web browsers:
• Google Chrome
• Internet Explorer
• Mozilla Firefox
• Opera
Our dependency on the Internet has massively increased. Stated below are functions of web browsers and how
are they useful:
The main function is to retrieve information from the World Wide Web and making it available for users
Visiting any website can be done using a web browser. When a URL is entered in a browser, the web
server takes us to that website
It makes Internet surfing easy as once we reach a website, we can easily check the hyperlinks and get
more and more useful data online
Browsers user internal cache which gets stored, and the user can open the same webpage time and again
without losing extra data
Options like back, forward, reload, stop reload, home, etc. are available on these web browsers, which
make using them easy and convenient
Bookmark:
Each web browser is built-in with the support of Internet Bookmarks which serve as a named anchor –
primarily to URLs. The primary purpose of this bookmark is to easily catalog and access web pages that the
web browser user has visited or plans to visit, without having to navigate the web to get there.
Steps to add a bookmark (write these steps in the left side white page)
Add a bookmark
Pop-up Blockers:
Pop-ups are a form of online advertising on the WWW intended to attract the attention of the users. These
pop ups are hosted on the web sites which are frequently visited by the people. These pop ups are
activated when these web sites open a new web browser window and there by displaying the
advertisements.
Steps to be followed to allow/block pop-up (write these steps in the left side white page)
Theory:
Search engine:
A search engine can be defined as a web site with tools which help you to find information on the internet
Function of a search engine:
User can search for any information by passing query in form of keywords or phrase. It then searches for
relevant information in its database and return to the user.
Web crawler, database and the search interface are the major component of a search engine that actually makes
search engine to work. Search engines make use of Boolean expression AND, OR, NOT to restrict and widen the
results of a search. Following are the steps that are performed by the search engine:
The search engine looks for the keyword in the index for predefined database instead of going directly to the web
to search for the keyword.
It then uses software to search for the information in the database. This software component is known as web
crawler.
Once web crawler finds the pages, the search engine then shows the relevant web pages as a result. These
retrieved web pages generally include title of page, size of text portion, first several sentences etc.
These search criteria may vary from one search engine to the other. The retrieved information is ranked according
to various factors such as frequency of keywords, relevancy of information, links etc.
Aim: To learn various threats on the internet and configure the computer to be safe on the internet.
Theory:
Antivirus:
virus is any unwanted program that enters a user's system without their knowledge
Antivirus Software is a data security utility which is installed in a computer system with a purpose of protection
from viruses, spyware, malware, rootkits, Trojans, phishing attacks, spam attack, and other online cyber threats.
Need of Antivirus:
Antivirus software is designed to detect, prevent and take action against malicious software in your computer,
including viruses. Even if you're smart with how you use your computer to avoid coming into contact with a
virus, antivirus software is an essential part of a good security strategy
Firewall:
A firewall is a special software or hardware designed to protect a private computer network from unauthorized
access. A firewall is a set of related programs located at a network gateway server which protects the resources of
the private network from users from other networks.
Firewall comes at both levels, i.e., hardware and software, though it's best to have both.
A hardware firewall is a physical device that attaches between a computer network and a gateway. For
example, a broadband router.
On the other hand, a software firewall is a simple program installed on a computer that works through
port numbers and other installed software.
Need of Firewall:
Firewalls are primarily used to prevent malware and network-based attacks. Additionally, they can help in blocking
application-layer attacks. These firewalls act as a gatekeeper or a barrier. They monitor every attempt between our
computer and another network. They do not allow data packets to be transferred through them unless the data is
coming or going from a user-specified trusted source.
Open Access
Network Crashes
Procedure: (write these steps on the left side white paper)
License agreement will open. Click I accept the terms of the license agreement and then click next.
Choose a setting
Click OK
Block Pop ups:
Windows Firewall:
Go to Start>control panel>Network and Internet Connections >windows firewall
In the general tab check the On(recommended) box
If you don‘t want any exceptions check on Don’t allow exceptions box
RESULT: Antivirus is installed