LESSON 4 Example of browsers:
THE INTERNET Google Chrome, Safari, Internet Explorer, Opera, Mozilla
INTERNET OR NET (network of network) INTERNET SERVICE PROVIDER (ISP)
The largest computer network in the world that The phonebook of internet. We access information
connects billions of computer user. online through domain names.
The word internet comes from combination between
“interconnection” and “network”
NETWORK
A collection of computers and devices connected via
communication channels and transmission media allow to
share resources (hardware, software, data, information).
BRIEF HISTORY OF INTERNET TWO TYPES OF ISP
ADVANCED RESEARCH PROJECT AGENCY (ARPA) NATIONAL ISP
January 2, 1969 started an experimental computer network. Provided internet access to a specific geographic area.
CONCEPT REGIONAL ISP
No server, but equal importance/participation to every Business that provides internet access in cities and towns
computer in the network. nationwide.
Example of ISP: Sky Broadband, PLDT, Converge
MAJOR COMPONENTS OF THE INTERNET
SERVERS
A computer program that provides service to another computer
program and its user.
Types of Servers
Application Server
Web Server
Proxy Server
Mail Server
File Server
Policy Server
DOMAIN NAME SYSTEM (DNS)
IP ADDRESS (Internet Protocol) An organization that provides services for accessing,
using or participating in the internet.
A numerical label assigned to each device. This
provides identity to a network device. Example of DNS: www.facebook.com, www.shc.edu.ph
BROWSER INTERNET TERMS AND DEFINITION
An application program that provides a way to look INTERNET
information on the web.
A global network of thousands of computer networks UPLOAD
linked by data lines and wireless systems.
To upload is to transfer data from your computer to
WEB another computer.
A collection of billions of webpages that you can DOWNLOAD
view with a web browser.
To download is to transfer data from another
computer to your computer.
EMAIL
The most common method of sending and receiving HYPERTEXT TRANSFER PROTOCOL (HTTP)
messages online.
The data communication standard of web pages.
When a web page has this prefix, the links, text, and pictures
should work correctly in a web browser.
SOCIAL MEDIA
Websites and apps that allow people to share
comments, photos, and videos. HYPERTEXT TRANSFER PROTOCOL SECURE
(HTTPS)
This indicates that the web page has a special layer of
ONLINE GAMING encryption added to hide your personal information and
Games that allow people to play with and against passwords from others.
each other over the Internet.
ROUTER OR ROUTER-MODEM COMBINATION
SOFTWARE UPDATES The hardware device that acts as the traffic cop for
Operating system and application updates can network signals arriving at your home or business from your
typically be downloaded from the Internet ISP. A router can be wired or wireless or both.
HYPERTEXT MARKUP LANGUAGE (HTML) ENCRYPTION
A coding language used to tell a browser how to The mathematical scrambling of data so that it is
place pictures, text, multimedia and links to create a web page. hidden from eavesdroppers. Encryption uses complex math
When a user clicks on a link within a web page, that link, formulas to turn private data into meaningless gobbledygook
which is coded with HTML, links the user to a specific linked that only trusted readers can unscramble.
web page.
WEB BOT
UNIFORM RESOURCE LOCATOR (URL) A term that applies to programs/applets (macros and
A web address used to connect to a remote resource intelligent agents) used on the Internet. Such bots perform a
on the world wide web. repetitive function, such as posting messages to multiple
newsgroups or doing searches for information.
BIT
SEARCH ENGINE
A single digit in the binary numbering system (base
2). For example: 1 is a bit or 0 is a bit. Specialized software, such as Google and Yahoo, that
lets www browser users search for information on the web by
using keywords, phrases.
BYTE
Generally, consists of eight bits.
Proofreading your messages before you send them is
a best practice for effective and efficient communication.
Strive to make your communications concise and free of any:
LESSON 5
Spelling and grammar errors
COMPUTER ETHICS Confusing terms or phrases that could be
misunderstood
Errors of omission, such as missing content or
NETIQUETTE recipients
Errors in accuracy of information
Simply stated, it’s network etiquette. The etiquette of
cyberspace and “etiquette” means the forms of required by
good breeding or prescribed by authority to be required in
social or official life. EXERCISE GOOD JUDGEMENT WHEN SHARING
INFORMATION WITH OTHERS
Concerned with the "proper" way to communicate in
an online environment. ONLINE – E-mail and chat messages that you send
or receive are considered private and should not be forwarded
or copied to others without gaining the consent of all involved
participants.
REMEMBER THE GOLDEN RULE
It is a good practice to always ask a post’s author for
Make a good impression - treat others with the same
permission before sharing a post with other parties.
respect that you would like to receive and avoid
confrontational or offensive language. If the material you share with others online came
from another source, make every effort to gain permission
To help convey meaning when creating messages, it
from the original author or copyright holder.
is sometimes acceptable to include appropriate emoticon
symbols, such as a smiley face :) Copying someone else's work and passing it off as
your own is plagiarism. It damages your reputation and could
However, for professional communications these
subject you to serious academic and legal consequences.
would be inappropriate.
RESPECT DIVERSITY IN VIEWPOINTS
AVOID SLANG, ACRONYMS, AND TEXT TALK
Be constructive and respectful when sharing
Communicating effectively in college and business
opinions, beliefs, and criticisms, or responding to those of
environments requires the use of correct terminology, spelling,
others in the conversation.
and grammar that can easily be understood.
When sharing a viewpoint that differs from someone
Example:
else’s, it is a best practice to first acknowledge the other
Use “your” instead of “ur”. person by briefly restating what he or she said, but in your
own words.
When presenting an opinion or criticism, it is helpful
AVOID SCREAMING IN TYPED MESSAGES to use phrases that identify to whose point of view you are
referring.
Typing an entire message using all capital letters is
known as “screaming”. If the opinion is yours, you can begin with the phrase
It is better to draw emphasis to selected words or Example:
phrases by: using italic or bold text; using a different color for
text or background color; or denoting emphasis using special “In my experience” or “In my opinion”.
characters
If it is a viewpoint of someone else, make sure you identify
Example: that in your message
**Important** Example:
“According to Eric Ericson,” or “The president believes”
PROOFREAD YOUR MESSAGES BEFORE SENDING
You will, however, be judged by the quality of your
writing, so keep the following tips in mind: Always check for
spelling and grammar errors Know what you're talking about
TEN COMMANDMENTS OF COMPUTER ETHICS and state it clearly be pleasant and polite.
RULE 1 | PRACTICE THE GOLDEN RULE RULE 6 | SHARE EXPERT KNOWLEDGE
Do unto others as you would have others do unto Information can be shared or accessed and in fact,
you. Remember, your written words are read by real people, this "information sharing.
all deserving of respectful communication. When you post a question and receive intelligent
Before you press "send" or "submit," ask yourself, answers, share the results with others. Post resources and
"Would I be okay with this if someone else had written it?" references about your subject matter.
RULE 2 | ADHERE TO THE SAME STANDARDS OF RULE 7 | HELP KEEP FLAME WARS UNDER
BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL CONTROL
LIFE Flaming is what people do when they express a
You should do your best to act within the laws and strongly held opinion without holding back any emotion."
ethical manners of society whenever you inhabit "cyberspace." (Shea, 1994).
Would you behave rudely to someone face-to-face? On most Don't feed the flames; extinguish them by guiding the
occasions, no. Neither should you behave this way in the discussion back to a more productive direction.
virtual world.
RULE 8 | RESPECT OTHER PEOPLE’S PRIVACY
RULE 3 | KNOW WHERE YOU ARE IN CYBERSPACE
Depending on what you are reading in the virtual
"Netiquette varies from domain to domain." (Shea, world, be it an online class discussion forum, Facebook page,
1994) Depending on where you are in the virtual world, the or an email, you may be exposed to some private or personal
same written communication can be acceptable in one area, information that needs to be handled with care.
where it might be considered inappropriate in another.
Perhaps someone is sharing some medical news
What you text to a friend may not be appropriate in about a loved one or discussing a situation at work. What do
an email to a classmate or colleague. you think would happen if this information "got into the
wrong hands?" Embarrassment? Hurt feelings? Loss of a job?
RULE 4 | RESPECT OTHER PEOPLE’S TIME AND
BANDWIDTH RULE 9 | DON’T ABUSE YOUR POWER
Electronic communication takes time: time to read Just like in face-to-face situations, there are people in
and time in which to respond. cyberspace who have more "power" than others.
Most people today lead busy lives, just like you do, More expertise in technology or have years of
and don't have time to read or respond to frivolous emails or experience in a particular skill or subject matter.
discussion posts.
Just remember: knowing more than others do or
As a virtual world communicator, it is your having more power than others may have does not give you
responsibility to make sure that the time spent reading your the right to take advantage of anyone. Think of Rule 1:
words isn't wasted. Remember the human.
RULE 5 | MAKE YOURSELF LOOK GOOD ONLINE RULE 10 | BE FORGIVING OF OTHER PEOPLE’S
WRITING MISTAKES
One of the best things about the virtual world is the Not everyone has the same amount of experience
lack of judgment associated with your physical appearance, working in the virtual world. And not everyone knows the
sound of your voice, or the clothes you wear. rules of netiquette.
At some point, you will see a stupid question, read an Offline
unnecessarily long response, or encounter misspelled words;
when this happens, practice kindness and forgiveness as you Generally used when speaking about excessive gaming
would hope someone would do if you had committed the same behavior, which can be practiced both offline and online.
offense.
CYBERCRIMES Online
CYBER Also known as “Internet Addiction”, gets more
It is the characteristics of the culture of computers, attention in general from scientific research than offline
information, technology and virtual reality. computer addiction, mainly because most cases of computer
addiction are related to the excessive use of the Internet.
CYBERCRIME
Virtual Self
Defined as a crime in which a computer is the object
of the crime (hacking, phishing, spamming and child The persona you create about yourself virtually.
pornography) is used as a tool to commit an offense.
Cybercriminals may use computer technology to CRIMINAL ACTIVITIES
access personal information, business trade secrets or use the
internet for exploitative or malicious purposes. HACKING
Unauthorized access of or interference with computer
systems, servers, or other information and communication
REPUBLIC ACT NO. 10175 (Cybercrime Prevention Act systems
of 2012)
Unauthorized access to corrupt, alter, steal, or destroy
A law in the Philippines approved on September 12,2012 electronic data using computers or other information and
which aims to address legal issues concerning online communication systems without the computer or system
interactions and internet. owner’s knowledge and consent.
The introduction of computer viruses resulting in the
REPUBLIC ACT NO. 10173 (Data Privacy Act of 2012) corruption, alteration, theft, or loss of such data
An act protecting individual personal information. Illegal Access
Illegal Interception
Data Interference
System Interference
COMMON FORMS OF CYBERCRIMES Misuse of Devices
COPYRIGHT Infection of IT Systems with Malware – if the act is
The exclusive legal right, given to an originator or an committed against critical infrastructure of the Philippines the,
assignee to print, publish, perform, film, or record literary, penalty is between 12-20 years reclusion temporal
artistic, or musical material, and to authorize others to do the Six years up to twelve years of imprisonment also known as
same. prison mayor.
COPYRIGHT INFRINGEMENT
The violation, piracy or theft of a copyright holder's COMPUTER-RELATED FORGERY, FRAUD, AND
exclusive rights through the unauthorized use of a copyrighted IDENTITY THEFT
material or work.
An attempt to obtain sensitive information such as
usernames, passwords, and credit card details and (indirectly
PLAGIARISM money), often for malicious reasons.
An act or instance of using or closely imitating the Phishing
language and thoughts of another author without authorization. Pharming
Spam
Maximum of Php 200,000 fine or prison mayor.
COMPUTER ADDICTION
ELECTRONIC THEFT
Illegal Downloading
Obtaining files that you do not have the right to use
from the internet.
Digital Piracy
Practice of illegally copying and selling digital music,
video, computer software, etc.
Copyright Infringement
Penalty of Php 50,000 – 500, 000 and or prison mayor.
CYBERBULLYING
The use of electronic communication to bully a
person, typically by sending a message of an intimidating or
threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
CYBERSEX
Willful engagement, maintenance, control, or
operation, directly or indirectly of any lascivious exhibition of
sexual organs or sexual activity with the aid of a computer
system for favor or consideration.
There is a discussion on this matter if it involves
“couples” or “people in relationship” who engage in cybersex.
Penalty at least Php 200,000 and or prison mayor.
CHILD PORNOGRAPHY
A form of child sexual exploitation. Unlawful or
prohibited acts defined and punishable by Republic Act No.
9775 or the Anti- Child Pornography Act of 2009, committed
through a computer system.
Penalty of 12-20 years of imprisonment or reclusion temporal
CYBER DEFAMATION
An unprivileged false statement of fact which tends
to harm the reputation of a person or company.
Penalty of 6-12 years of imprisonment or prison mayor.