Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
MINISTRY OF MANPOWER
IT IS 101
FUNDAMENTALS OF INFORMATION
TECHNOLOGY
DEPARTMENT OF IT
1|Page
CHAPTER 1
Understanding Internet Technology
Chapter Objectives:
Upon the completion of this chapter, the students should be able to:
Explain how the Internet works
Familiar with ethical and legal issues related to the use of Internet resources
The Internet is a vast computer network that allows people all over the world to
communicate with each other. Also, it links millions of businesses, government agencies,
educational institutions and individuals. It is a widely used tool, providing society with access
to global information and instant communications.
More than one billion people around the world use the Internet daily for a variety of
reasons, some of which are listed below:
Interact and communicate with and meet other people
2|Page
1.1.2 Navigating the Web
The World Wide Web (www), or Web, is not the same thing as the Internet; it is the
collection of information that can be accessed via the Internet. Each electronic document on
the Web, called a Web Page, can contain text, graphics, audio, and video. Additionally, web
pages usually have built-in connections to other documents. A Web Server is a computer
that delivers requested Web pages to your computer. A Web Browser, or browser, is an
application software that allows users to access and view web pages and Web 2.0 programs.
To browse the web, you need a computer that is connected to the Internet and that has a
web browser. The more widely used web browsers are Google Chrome, Internet Explorer,
Firefox, Opera, and Safari.
The figure 1.0 below shows how a web browser displays a home page:
A web page has a unique address, which is called a URL (Uniform Resource Locator)
or Web Address. For example, the home page for the Shinas College of Technology website
3|Page
has http://www.act.edu.om as its Web address. A web browser retrieves a web page using
its web address. A web address consists of a protocol, domain name, and sometimes the
path to a specific web page or location on a web page. Many web page addresses begin with
http://. The http, which stands for Hypertext Transfer Protocol, is a set of rules that defines
how pages transfer on the Internet. To help minimize errors, many browsers and websites
do not require you enter the http:// and www portions of the Web address in the Address
bar. If you enter an incorrect web address, the browser may display a list of similar
addresses or related websites from which you can select.
Most web pages contain hypertext or hypermedia links. Hypertext refers to links in
text-based documents, whereas hypermedia combines text-based links with graphic, audio,
and video links. Links allow you to obtain information in a nonlinear way. That is, instead of
accessing topics in a specified order, you move directly to a topic of interest. Branching from
one related topic to another in a nonlinear fashion is what makes links so powerful. Some
people use the phrase, surfing the Web, to refer to the activity of using links to explore the
web. Each link on a web page corresponds to a web address or a document. To activate a
link, you click it, that is, point to the link and then press the left mouse button. Clicking a link
causes the web page or document associated with the link to be displayed on the screen.
The linked object might be on the same web page, a different web page at the same
website, or a separate web page at a different website in another city or country. To remind
you visually that you have clicked a link, a text link often changes color after you click it.
Most current web browsers support tabbed browsing, where the top of the browser
displays a tab (similar to a file folder tab) for each web page you open as shown in the figure
2.0 below.
To move from one open web page to another, you click the tab in the web browser.
Tabbed browsing allows users to have multiple home pages that automatically open when
the browser starts.
4|Page
Figure 2.0 Multiple tabs capability in the browser window
The Internet uses a system called the Domain Name System (DNS). DNS enables
users to type an address that includes letters as well as numbers. For example,
www.act.edu.om has the numeric address 46.40.224.163 (public).
Table 1.0 Common Top-Level Domain Names
Top-Level Domain Name Used By
.com Commercial businesses
.biz Businesses
.edu Educational institutions
.info Information
.gov Government agencies
.pro Professionals
.mil Military
.aero Aviation
.net Network organizations (such as ISPs)
5|Page
.coop Cooperatives
.org Nonprofit Organizations
.museum Museums
.name Names
Packets in Internet
Everything we do on the Internet involves packets. For example, every Web page
that you receive comes as a series of packets, and every e-mail you send leaves as a series of
packets. Networks that ship data around in small packets are called packet switched
networks.
A data packet is a unit of data made into a single package that travels along a given
network path. Data packets are used in Internet Protocol (IP) transmissions for data that
navigates the Web, and in other kinds of networks. Data usually exists as rather large files.
However, networks cannot operate if computers put large amounts of data on the cable at the
same time. Thus, for instance, the network breaks an e-mail message into parts of a certain size
in bytes. These are the packets. Each packet carries the information that will help it get to its
destination -- the sender's IP address, the intended receiver's IP address, something that tells
the network how many packets this e-mail message has been broken into and the number of
this particular packet. The packets carry the data in the protocols that the Internet uses:
Transmission Control Protocol/Internet Protocol (TCP/IP). Each packet contains part of the body
of your message. A typical packet contains perhaps 1,000 or 1,500 bytes.
Each packet is then sent off to its destination by the best available route -- a route that
might be taken by all the other packets in the message or by none of the other packets in the
message. This makes the network more efficient. First, the network can balance the load across
various pieces of equipment on a millisecond-by-millisecond basis. Second, if there is a problem
with one piece of equipment in the network while a message is being transferred, packets can
be routed around the problem, ensuring the delivery of the entire message.
6|Page
Understanding the Differences between Internet Connections
In identifying the appropriate type of Internet connection good for you or your
family, its vital to understand the differences between each connection. Today, there are
many ways to connect laptops, desktops, mobile phones, gaming consoles, e-readers and
tablets to the Internet. Some of the most widely used Internet connections are listed below:
1. Wireless: Radio frequency bands are used in place of telephone or cable networks.
2. Mobile: Many cell phone and smartphone providers offer voice plans with Internet
access. Mobile Internet connections provide good speeds and allow you to access
the Internet on the go.
3. Hotspots: Hotspots are sites that offer Internet access over a wireless local area
network (WLAN) by way of a router that then connects to an Internet service
provider. Hotspots utilize Wi-Fi technology, which allows electronic devices to
connect to the Internet or exchange data wirelessly through radio waves. Hotspots
can be phone-based or free-standing, commercial or free to the public.
4. Dial-Up: Dial-up connections require users to link their phone line to a computer in
order to access the Internet. This particular type of connectionalso referred to as
analogdoes not permit users to make or receive phone calls through their home
phone service while using the Internet.
5.1 DSL: DSL, which stands for Digital Subscriber Line, uses existing 2-wire
copper telephone line connected to ones home so service is delivered at
the same time as landline telephone service. Customers can still place
calls while surfing the Internet.
7|Page
5.2 Cable: Cable Internet connection is a form of broadband access. Through
use of a cable modem, users can access the Internet over cable TV lines.
Cable modems can provide extremely fast access to the Internet.
6 Satellite: In certain areas where broadband connection is not yet offered, a satellite
Internet option may be available. Similar to wireless access, satellite connection
utilizes a modem.
7 ISDN: ISDN (Integrated Services Digital Network) allows users to send data, voice and
video content over digital telephone lines or standard telephone wires. The
installation of an ISDN adapter is required at both ends of the transmissionon the
part of the user as well as the Internet access provider.
There are quite a few other Internet connection options available, including T-1 lines,
T-3 lines, OC (Optical Carrier) and other DSL technologies.
The web is a worldwide resource of information. A primary reason that people use
the Web is to search for specific information, including text, pictures, music, and video. The
first step in successful searching is to identify the main idea or concept in the topic about
which you are seeking information. Determine any synonyms, alternate spellings, or variant
word forms for the topic. Then, use a search tool to locate the information. Two types of
search tools are search engines and subject directories. A search engine is a program that
finds Web sites, Web pages, images, videos, news, maps, and other information related to a
specific topic. A subject directory classifies Web pages in an organized set of categories,
such as sports or shopping, and related subcategories.
Some Web sites offer the functionality of both a search engine and a subject
directory. The table below lists the Web addresses of several popular general-purpose
search engines and subject directories.
8|Page
Table 2.0 Widely Used Search Tools
Search Tool Web Address Search Engine Subject Directory
A9 a9.com
AlltheWeb alltheweb.com
AltaVista altavista.com
AOL Search search.aol.com
Ask ask.com
Bing bing.com
Cuil (pronounced cool) cuil.com
Dogpile dogpile.com
Excite excite.com
Gigablast gigablast.com
Google google.com
Lycos lycos.com
MSN msn.com
Open Directory Project dmoz.org
WebCrawler webcrawler.com
Yahoo! yahoo.com
9|Page
The figure below shows how to use a search engine
A search can produce hundreds of thousands of hits, not all of them relevant to the
intended subject. It is possible to narrow the search considerably by using search operators
as listed below.
10 | P a g e
Operator Description Examples Explanation
Space or + Display hits that Information+Technology Results have both words
include specific Information Technology Information and Technology in any
words order
OR Display hits that Oman OR Muscat Results have either the word Oman
include only one Oman OR Muscat or Sohar or Muscat
word from a list Results have either the word Oman
or Muscat or Sohar
() Combine hits that Samsung (phone OR Result have the word Samsung and
include specific tablet) either the word phone, or the word,
words with those tablet.
that include only one
word from a list.
- Exclude a word from Automobile convertible Results include automobile but do
the search results not include convertible.
Search for an exact first computer Results have the exact phrase, first
phrase in a certain programmer computer programmer.
order.
* Substitute characters developer* Results include any word that begins
in place of the with developer (e.g. developer,
asterisk developers, developers)
Other techniques you can use to improve your searches include the following:
Use specific nouns, example software
There will be many occasions when a user wants to retrieve information from the web,
but does not have a specific address. It is still possible to find relevant information by using a
subject directory. Clicking on the relevant subject will take the user into progressively more
details lists, from which a selection can be made. Advantages of using subject directories are
that they generally contain good quality sites, consequently they contain fewer sites than
11 | P a g e
search engines and therefore save time. Most of the search engines also contain these
directories.
Do not assume that information presented on the Web is correct or accurate. Any
person, company, or organization can publish a Web page on the Internet. No one oversees
the content of these Web pages. The table below lists guidelines for assessing the value of a
website or web page before relying on its content.
Table 3.0 Criteria for Evaluation a Web Sites Content
Evaluation Criteria Reliable Web Sites
Affiliation A reputable institution should support the website without bias
in the information.
Audience The Web site should be written at an appropriate level.
Content The Web site should be organized and the links should work.
Currency The information on the Web page should be current
Design The pages at the Web site should download quickly, be visually
pleasing, and easy to navigate.
Objectivity The Web site should contain little advertising and be free from
promotions.
Copyright is the lawful right of an author, artist, composer or other creator to control
the use of his or her work by others. Generally speaking, a copyrighted work may not be
duplicated, disseminated, or appropriated by others without the creator's permission. The
public display or performance of copyrighted works is similarly restricted. Citing your work is
an important way to honor copyright and avoid accusations of inappropriate behavior or
plagiarism.
Refer to the following on how to cite electronic sources using APA referencing:
Websites
o To refer to an entire website:
For a passing reference to a website in text, the URL is sufficient; no
reference list entry is needed.
12 | P a g e
Example:
These United Nations policies are outlined on The International
Narcotics Control board website (http://www.incb.org)
In text
Cite the name of the author/authoring body and the date created or last
revised. Example:
(International Narcotics Control Board, 1999)
Reference list
Include the following information:
author (the person or organization responsible for the site)
year (date created or last updated), between parentheses
Title of document
Retrieved from
webpage URL (If possible, ensure that the URL is included without a
line-break).
Example:
International Narcotics Control Board (1999). Psychotropic
Substances. Retrieved from
http://www.incb.org/incb/en/psychotropic-substances/index.html
13 | P a g e
Example:
Schonfeld, E. (2010, May 3). Google throws $38.8 million to the wind [Web log post].
Retrieved May 4, 2010, from http://techcrunch.com
China, The American Press, and the State Department [Web log post]. (2013, January
3). Retrieved from Schonfeld, E. (2010, May 3). Google throws $38.8 million to
the wind [Web log post]. Retrieved May 4, 2010, from http://techcrunch.com
A website with no author
When there is no author for a web page, the title moves to the first position of the
reference entry:
Example:
All 33 Chile miners freed in flawless rescue. (2010, October 13). Retrieved
from http://www.msnbc.msn.com/id/39625809/ns/world_news-americas/
A website with no date and no author
Because there is no date and no author, your text citation would include
the title (or short title) "n.d." for no date, and paragraph number (e.g., "Heuristic,"
n.d., para. 1). The entry in the reference list might look something like this:
Fair use is the right to use a copyrighted work under certain conditions without
permission of the copyright owner. Use of a work for purposes such as criticism, comment,
news reporting, teaching (including multiple copies for classroom use, scholarship, or
research) is not an infringement of copyright.
14 | P a g e
1.2. Internet Life and Privacy
1.2.1. Social Networking and My Privacy
Online social networks are websites that allow users to build connections and relationships
to other Internet users. Social networks store information remotely, rather than on a users
personal computer. Social networking can be used to keep in touch with friends, make new
contacts and find people with similar interests and ideas.
A computer security risk is any event or action that could cause a loss of or damage
to computer hardware, software, data, information, or processing capability. An
international breach of computer security often involves a deliberate act that is against the
law. Any illegal act involving a computer generally is referred to as a computer crime. The
term cybercrime refers to online or Internet-based illegal acts.
Perpetrators of cybercrime and other intrusions fall into these categories:
1. Hacker: someone who accesses a computer or network illegally.
2. Cracker: someone who accesses a computer or network illegally, but has the
intent of destroying data, stealing information, or other malicious action.
3. Script kiddie: teenagers that use prewritten hacking and cracking programs to
break into computers
4. Corporate Spy: he/she has excellent and network skills and are hired to break into
a specific computer and steal its proprietary data and information.
7. Cyber terrorist: someone who uses the Internet to destroy or damage computers
for political reasons.
Worm: a program that copies itself repeatedly, for example in memory or on a network,
using up resources and possibly shutting down the computer or network.
15 | P a g e
Trojan horse (named after the Greek myth): a program that hides within or looks like a
legitimate program.
Computer viruses, worms, and Trojan horses are classified as malware (short
for malicious software), programs that act without a users knowledge and
deliberately alter the computers operations.
Denial of service attack, or DoS attack: an assault whose purpose to disrupt computer
access to an Internet service such as Web or e-mail.
Back Door: program or set of instructions in a program that allow users to bypass security
controls when accessing a program, computer, or network.
Spoofing: a technique intruders use to make their network or Internet transmission appear
legitimate to a victim computer or network.
Cyberbullying is bullying that takes place using electronic technology which includes devices
and equipment such as cell phones, computers, and tablets as well as
communication tools including social media sites, text messages, chat, and websites.
Examples of cyberbullying include mean text messages or emails, rumors sent by
email or posted on social networking sites, and embarrassing pictures, videos,
websites, or fake profiles.
1.2.3. Securing your Computer
1. Never start a computer with removable media inserted in the drives or plugged in
the ports, unless the media are uninfected.
16 | P a g e
2. Never open an e-mail attachment unless you are expecting it and it is from a trusted
source.
3. Set the macro security in programs so that you can enable or disable macros.
7. Before using any removable media, use the antivirus scan program to check the
media for infection.
8. Install a personal firewall program. Personal firewall is a utility that detects and
protects a personal computer and its data from unauthorized intrusion.
9. Stay informed about new virus alerts and virus hoaxes.
1. Access control: a security measure that defines who can access a computer, when
they can access it, and what actions they can take while accessing the computer.
2. Computers should maintain an audit trail that records in a file both successful and
unsuccessful access attempts.
17 | P a g e
1.3. Ethical Issues of Internet Contents
Computer ethics are moral guidelines that govern the use of computers and
information systems. Today, information accuracy is a major concern because many users
access information maintained by other people or companies, such as on the Internet. Thus,
do not assume that because the information is on the Web that is correct.
Information privacy refers to the right of individuals and companies to deny or restrict
the collection and use of information about them. Nowadays, huge databases store this data
online. Much of the data is personal and should be accessible only to authorized users.
E-Commerce and other web applications often rely on cookies to identify users. A
cookie is a small text file that a Web server stores on your computer. Cookie files typically
contain data about you, such as your user name or viewing preferences. Spyware is a
program placed on a computer without the users knowledge thats secretly collects
information about the user. Spyware can enter a computer as a virus or as a result of a user
installing a new program. Adware is a program that displays an online advertisement in a
banner or pop-up window on Web pages, e-mail messages, or other Internet services.
Employee monitoring involves the use of computers to observe, record, and review
an employees use of a computer, including communications such as e-mail messages,
keyboard activity, and Web sites visited. Content filtering is the process of restricting access
to certain material on the Web. Content filtering opponents argue that banning any
materials violates constitutional guarantees of free speech and personal rights. Web
filtering software is a program that restricts access to specified Web sites.
18 | P a g e
Internet Ethics for everyone
Internet ethics refers to the acceptable behavior for using internet. Thus, we should
be honest, respect the rights, and property of other people on the internet.
1. Acceptance: As internet users, we need to accept that Internet is not a value free-
zone .It means World Wide Web is a place where values are considered in the
broadest sense so we must take care while shaping content and services and we
should recognize that internet is not apart from universal society, but it is a primary
component of it.
2. Sensitivity to National and Local cultures: It belongs to all and there is no barrier of
national and local cultures. It cannot be subject to one set of values like the local TV
channel or the local newspaper, thus we have to accommodate multiplicity of usage.
3. While using e-Mail and chatting: Internet must be used for communication with
family and friends. Avoid chatting with strangers and forwarding e-mails from
unknown people or strangers. We must be aware of risks involved in chatting and
forwarding e-mails to strangers.
5. Avoid Bad language: We must not use rude or bad language while using e-Mail,
chatting, blogging and social networking. We need to respect their views and should
not criticize anyone on the internet.
6. Hide personal information: We should not give personal details like home address,
phone numbers, interests, passwords. No photographs should be sent to strangers
because it might be misused and shared with others without their knowledge.
7. While Downloading: Internet is used to listen and learn about music. It is also used
to watch videos and play games we must not use it to download them or share
copyrighted material. We must be aware of the importance of copyrights and issues
of copyright.
8. Access to Internet: The internet is a time-efficient tool for everyone that enlarges the
possibilities for curriculum growth. Learning depends on the ability to find relevant and
reliable information quickly and easily, and to select, understand and assess that
19 | P a g e
information. Searching for information on the internet can help to develop these
skills. Classroom exercises and take-home assessment tasks, where students are
required to compare website content, are ideal for alerting students to the
requirements of writing for different audiences, the purpose of particular content,
identifying and judging accuracy and reliability. Since many sites adopt particular
views about issues, the internet is a useful tool for developing the skills of
distinguishing fact from opinion and exploring subjectivity and objectivity.
References:
Said Lezzar. (2008). IT Fundamentals and Computer Applications Volume 1. New Jersey: Pearson
Education, Inc.
Vermaat, Shelly. (2008). Discovering Computers Fundamentals Fifth Edition. Boston: Cengage
Learning.
American Psychological Association. How do you reference a web page that lists no author?
(n.d.) Retrieved from http://www.apastyle.org/learn/faqs/web-page-no-author.aspx
Department of Electronics and Information Technology. Internet Ethics (n.d.). Retrieved from
http://infosecawareness.in/students/internet-ethics
20 | P a g e