SlideShare a Scribd company logo
Faculty: PG Dept. of Library & Information Science
T. M. Bhagalpur University, Bhagalpur, Bihar
GYAN-LIS-CLASSES
by
Er. Dev Kumar (Thakur)
Basics of INTERNET and INTRANET
The Internet and Intranet are two types of computer networks with different scopes and purposes.
The Internet: is a global network of computers and devices that communicate with each other
using standardized protocols, such asTCP/IP.
 It connects millions of users around the world, allowing them to share information,
communicate, and access various services and resources.
 The Internet is a public network, which means that anyone with an Internet connection can
access it.
 Examples of Internet services include email, file sharing, social media, and online shopping.
An Intranet: on the other hand, is a private network that is restricted to a specific organization,
such as a company, school, or government agency.
 It uses the same protocols as the Internet, but it is accessible only to authorized users within the
organization.
 Intranets are often used to share information, documents, and resources among employees,
departments, and teams.
 They can also be used for internal communication, collaboration, and project management.
 Intranets are typically secured by firewalls and other security measures to protect sensitive
information from external threats.
In summary, the Internet is a global network of public computers and devices, while an intranet is a
private network that is restricted to a specific organization.
Internet Intranet
Definition
A global network of computers
accessible to the public
A private network of computers
accessible only to authorized users
Access Public Private
Security
Public networks are less secure
and more vulnerable to attacks
Private networks are more secure and
can be controlled more tightly
Users Anyone can access it Limited to authorized users
Scope Global Local or within an organization
Purpose
Sharing Information,
Entertainment, Communication,
E-Commerce
Sharing internal information and
resources within an organization
Examples
World Wide Web (www), Email,
Social media, Cloud services
Company Intranet, Local Area Network
(LAN), Enterprise Resource Planning
(ERP) Systems
Internet vs. Intranet
Internet Intranet
Accessible to everyone with a
connection and authorization
Accessible only to authorized users within
an organization
Security is a major concern due to
public access
Security is easier to manage due to limited
access
Often used for communication and
information exchange between
individuals, companies, and
organizations
Primarily used for internal communication,
collaboration, and information sharing
within a specific organization
Content is typically available publicly
Content is often confidential and only
available to internal staff
Internet service providers (ISPs)
control internet access
Network administrators control access to
the intranet
Multiple protocols are used, including
HTTP, FTP, and SMTP
TCP/IP protocol is commonly used
Connection speed can vary depending
on location and provider
Connection speed is generally faster due to a
smaller user base and dedicated
infrastructure
The internet is a global network
connecting millions of devices
worldwide
An intranet is a private network that is
limited to a specific organization or entity
E-mail Basics| Components| Services
E-mail (Electronic Mail) is a widely used method of exchanging digital messages
between individuals or groups.
The basic components of an e-mail message include:
 Sender:The person who creates and sends the e-mail message.
 Recipient:The person or group who receives the e-mail message.
 Subject:A brief summary of the message content.
 Body:The main content of the message.
 Attachments: Files or documents attached to the message.
Some popular e-mail services include:
 Gmail:A free web-based e-mail service provided by Google.
 Outlook: An e-mail and personal information management service provided by
Microsoft.
 Yahoo! Mail:A free e-mail service provided byYahoo!.
 iCloud Mail:A free e-mail service provided byApple for its users.
 ProtonMail:A secure e-mail service that offers end-to-end encryption for privacy-
conscious users.
E-mail services typically offer features such as:
 Composing and sending e-mails to one or multiple recipients.
 Receiving and reading e-mails from other senders.
 Organizing and managing e-mails with folders or labels.
 Searching for specific e-mails or keywords.
 Filtering and blocking unwanted or spam e-mails.
 Setting up automatic replies or vacation messages.
 Syncing e-mails across multiple devices.
 Providing access to other productivity tools such as calendars and
contacts.
Overall, e-mail has become an essential tool for communication in
both personal and professional settings, and the availability of various
e-mail services has made it more accessible and convenient for people
to use.
Some special features of email
 Speed: Email is delivered almost instantly, making it an ideal communication tool for
fast-paced environments.
 Convenience: Emails can be sent and received from anywhere in the world, as long as
you have an internet connection.This makes it a highly convenient communication tool.
 Accessibility: Emails can be accessed from multiple devices such as desktop
computers, laptops, tablets, and smartphones, allowing you to stay connected at all
times.
 Archiving: Emails can be saved and archived, making it easy to retrieve important
messages and references at a later time.
 Attachments: Emails allow you to attach documents, images, and other files to your
message, making it a versatile communication tool.
 Delivery confirmation: Many email services offer delivery confirmation, which
allows you to know when your message has been delivered to the recipient.
 Group messaging: Email allows you to send messages to multiple recipients
simultaneously, making it a useful tool for group communication.
 Security: Many email services offer secure messaging options, ensuring that your
messages and attachments are protected from unauthorized access.
Term Meaning
To
The primary recipient(s) of the email. These are the people who
are intended to read and respond to the email.
CC
(Carbon
Copy)
Stands for "carbon copy." The recipients in the CC field receive
a copy of the email and are visible to all other recipients. They
are not the primary recipients and are not expected to take
action on the email.
BCC
(Blind
Carbon
Copy)
Stands for "blind carbon copy." The recipients in the BCC field
receive a copy of the email, but their names are not visible to
any other recipients. They are not the primary recipients and
are not expected to take action on the email. The BCC field is
often used to send a copy of an email to someone without the
other recipients knowing.
 Reply/ReplyAll:Allows you to respond to an email and either reply only to the
sender or reply to everyone included in the original message.
 Forward: Enables you to send a received email to another recipient.
 Attachments:Allows you to add files to an email to share with the recipient(s).
 Signature: Provides the ability to create a personalized signature to include at the end
of an email.
 Priority: Enables you to set the level of importance of an email message.
 Read Receipt: Requests the sender to receive a notification when the email has been
opened and read by the recipient.
 Spam Filter:Automatically identifies and moves unwanted or suspicious emails to a
spam or junk folder.
 Folder Organization:Allows users to create folders to organize and store emails.
 Search Function: Enables users to search for specific emails using keywords, phrases,
or sender/recipients.
 Vacation Responder: Sends an automated email response to anyone who emails the
user during a designated period of time, informing them that the user is currently
away and unable to respond to emails.
 Email Forwarding: This feature allows users to forward an email message they have
received to another recipient.This can be useful if the original recipient wants to share the
message with someone else or if they need someone else to take over a conversation or task.
 Email Filtering: Email filtering is the process of automatically sorting incoming emails
based on certain criteria, such as sender, subject line, or keywords.This can be helpful for
organizing and prioritizing incoming messages, or for filtering out spam and other
unwanted messages.
 Email Archiving: Email archiving is the process of storing old or inactive email messages
in a separate location, typically for compliance or regulatory purposes.Archiving can also be
useful for freeing up storage space on an email server or for preserving important messages
for future reference.
 Email Encryption: Email encryption is the process of encoding an email message to
protect its contents from unauthorized access or interception. This can be useful for
transmitting sensitive information, such as financial data or confidential business
information.
 Email Signatures: An email signature is a block of text that is automatically appended to
the end of an email message. It typically includes the sender's name, contact information,
and any other relevant details. Email signatures can be customized and used to convey
important information or to promote a business or organization.
24_Basics_INTERNET_INTRANET_GYAN-LIS-CLASSES
24_Basics_INTERNET_INTRANET_GYAN-LIS-CLASSES
24_Basics_INTERNET_INTRANET_GYAN-LIS-CLASSES
24_Basics_INTERNET_INTRANET_GYAN-LIS-CLASSES
ThankYou
Er. Dev Kumar

More Related Content

PDF
Final year project report on Internet And Interanet Emailing server
PPTX
Email and groupware
PDF
Electrnic mail
DOCX
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
PDF
E -MAIL AND INTERNET
PPT
Cyber security and emails presentation refined
PPT
Outlook and thunderbird ii
PPTX
First step to internet
Final year project report on Internet And Interanet Emailing server
Email and groupware
Electrnic mail
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
E -MAIL AND INTERNET
Cyber security and emails presentation refined
Outlook and thunderbird ii
First step to internet

Similar to 24_Basics_INTERNET_INTRANET_GYAN-LIS-CLASSES (20)

PPTX
UNIT-I NETWORKING - II.pptx. For class iX
PPSX
PPTX
Access and use of internet of level 1 course
PPTX
grade 6.pptx
PPT
Internet Tutorial 02
 
PPTX
E-mail & Search Engines
PDF
How to Secure Communication Channels.pdf
PPTX
Networking and internet
PPTX
L5_Electronic communication.pptx
PDF
Introduction to internet (239 kb)
PPT
Cyber security and emails presentation
PPTX
Internet unit - 4 Of Computer
PPTX
History of Email PowerPoint presentation
DOCX
An email policy for your employeesA clear email policy hel.docx
PPTX
Encrypting E-mail Messages
PPTX
Communication using email internet www social media
PPTX
New PPT Presentation.pptx
PDF
Unit 2-email and its uses protocols bcom 3 sem
PPTX
Exch2010 compliance ngm f inal
PPTX
it ppt-2.pptx
UNIT-I NETWORKING - II.pptx. For class iX
Access and use of internet of level 1 course
grade 6.pptx
Internet Tutorial 02
 
E-mail & Search Engines
How to Secure Communication Channels.pdf
Networking and internet
L5_Electronic communication.pptx
Introduction to internet (239 kb)
Cyber security and emails presentation
Internet unit - 4 Of Computer
History of Email PowerPoint presentation
An email policy for your employeesA clear email policy hel.docx
Encrypting E-mail Messages
Communication using email internet www social media
New PPT Presentation.pptx
Unit 2-email and its uses protocols bcom 3 sem
Exch2010 compliance ngm f inal
it ppt-2.pptx
Ad

More from devkumar940802 (20)

PPTX
64_Teaching Aptitude_GYAN-LIS-CLASSES___
PPTX
63_Policies, Governance, and Administration in Higher Education_GYAN-LIS-CLASSES
PPTX
61_Value Education and Environment Education_GYAN-LIS-CLASSES
PPTX
59_Oriental, Conventional and Non-Conventional Learning Programmes in India_G...
PPTX
52_E-Waste Management_GYAN-LIS-CLASSES__
PPTX
49_Liquid Waste Management Source Effects Description_GYAN-LIS-CLASSES
PPTX
48_Solid Waste Management Source Effects Description_GYAN-LIS-CLASSES
PPTX
46_Renewable Energy Resources_GYAN-LIS-CLASSES
PPTX
43_Sustainable Development Goals_GYAN-LIS-CLASSES
PPTX
42_Millennium Development Goals_GYAN-LIS-CLASSES
PPTX
41_GYAN-LIS-CLASSES_Mitigation Strategies Environmental Issues.pptx
PPTX
40_International Solar Alliance_GYAN-LIS-CLASSES
PPTX
39_International Environmental Agreements_GYAN-LIS-CLASSES
PPTX
38_Impacts of Pollutants on Human Health_GYAN-LIS-CLASSES
PPTX
37_Waste Management Types Effects Sources Description_GYAN-LIS-CLASSES
PPTX
36_Noise Pollutant Reason Pollutant Name Their Effects_GYAN-LIS-CLASSES
PPTX
35_Soil Pollutant Reason Pollutant Name Their Effects_GYAN-LIS-CLASSES
PPTX
34_Water Pollutant Reason Pollutant Name Their Effects_GYAN-LIS-CLASSES
PPTX
33_Air Pollutant Reason Pollutant Name Their Effects_GYAN-LIS-CLASSES
PPTX
31_General Abbreviations and Terminology of ICT_GYAN-LIS-CLASSES
64_Teaching Aptitude_GYAN-LIS-CLASSES___
63_Policies, Governance, and Administration in Higher Education_GYAN-LIS-CLASSES
61_Value Education and Environment Education_GYAN-LIS-CLASSES
59_Oriental, Conventional and Non-Conventional Learning Programmes in India_G...
52_E-Waste Management_GYAN-LIS-CLASSES__
49_Liquid Waste Management Source Effects Description_GYAN-LIS-CLASSES
48_Solid Waste Management Source Effects Description_GYAN-LIS-CLASSES
46_Renewable Energy Resources_GYAN-LIS-CLASSES
43_Sustainable Development Goals_GYAN-LIS-CLASSES
42_Millennium Development Goals_GYAN-LIS-CLASSES
41_GYAN-LIS-CLASSES_Mitigation Strategies Environmental Issues.pptx
40_International Solar Alliance_GYAN-LIS-CLASSES
39_International Environmental Agreements_GYAN-LIS-CLASSES
38_Impacts of Pollutants on Human Health_GYAN-LIS-CLASSES
37_Waste Management Types Effects Sources Description_GYAN-LIS-CLASSES
36_Noise Pollutant Reason Pollutant Name Their Effects_GYAN-LIS-CLASSES
35_Soil Pollutant Reason Pollutant Name Their Effects_GYAN-LIS-CLASSES
34_Water Pollutant Reason Pollutant Name Their Effects_GYAN-LIS-CLASSES
33_Air Pollutant Reason Pollutant Name Their Effects_GYAN-LIS-CLASSES
31_General Abbreviations and Terminology of ICT_GYAN-LIS-CLASSES
Ad

Recently uploaded (20)

PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
master seminar digital applications in india
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Institutional Correction lecture only . . .
PDF
RMMM.pdf make it easy to upload and study
PDF
Classroom Observation Tools for Teachers
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Pre independence Education in Inndia.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Insiders guide to clinical Medicine.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
human mycosis Human fungal infections are called human mycosis..pptx
master seminar digital applications in india
Computing-Curriculum for Schools in Ghana
Institutional Correction lecture only . . .
RMMM.pdf make it easy to upload and study
Classroom Observation Tools for Teachers
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pre independence Education in Inndia.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Insiders guide to clinical Medicine.pdf
Supply Chain Operations Speaking Notes -ICLT Program
TR - Agricultural Crops Production NC III.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Renaissance Architecture: A Journey from Faith to Humanism
102 student loan defaulters named and shamed – Is someone you know on the list?

24_Basics_INTERNET_INTRANET_GYAN-LIS-CLASSES

  • 1. Faculty: PG Dept. of Library & Information Science T. M. Bhagalpur University, Bhagalpur, Bihar GYAN-LIS-CLASSES by Er. Dev Kumar (Thakur)
  • 2. Basics of INTERNET and INTRANET The Internet and Intranet are two types of computer networks with different scopes and purposes. The Internet: is a global network of computers and devices that communicate with each other using standardized protocols, such asTCP/IP.  It connects millions of users around the world, allowing them to share information, communicate, and access various services and resources.  The Internet is a public network, which means that anyone with an Internet connection can access it.  Examples of Internet services include email, file sharing, social media, and online shopping. An Intranet: on the other hand, is a private network that is restricted to a specific organization, such as a company, school, or government agency.  It uses the same protocols as the Internet, but it is accessible only to authorized users within the organization.  Intranets are often used to share information, documents, and resources among employees, departments, and teams.  They can also be used for internal communication, collaboration, and project management.  Intranets are typically secured by firewalls and other security measures to protect sensitive information from external threats. In summary, the Internet is a global network of public computers and devices, while an intranet is a private network that is restricted to a specific organization.
  • 3. Internet Intranet Definition A global network of computers accessible to the public A private network of computers accessible only to authorized users Access Public Private Security Public networks are less secure and more vulnerable to attacks Private networks are more secure and can be controlled more tightly Users Anyone can access it Limited to authorized users Scope Global Local or within an organization Purpose Sharing Information, Entertainment, Communication, E-Commerce Sharing internal information and resources within an organization Examples World Wide Web (www), Email, Social media, Cloud services Company Intranet, Local Area Network (LAN), Enterprise Resource Planning (ERP) Systems Internet vs. Intranet
  • 4. Internet Intranet Accessible to everyone with a connection and authorization Accessible only to authorized users within an organization Security is a major concern due to public access Security is easier to manage due to limited access Often used for communication and information exchange between individuals, companies, and organizations Primarily used for internal communication, collaboration, and information sharing within a specific organization Content is typically available publicly Content is often confidential and only available to internal staff Internet service providers (ISPs) control internet access Network administrators control access to the intranet Multiple protocols are used, including HTTP, FTP, and SMTP TCP/IP protocol is commonly used Connection speed can vary depending on location and provider Connection speed is generally faster due to a smaller user base and dedicated infrastructure The internet is a global network connecting millions of devices worldwide An intranet is a private network that is limited to a specific organization or entity
  • 5. E-mail Basics| Components| Services E-mail (Electronic Mail) is a widely used method of exchanging digital messages between individuals or groups. The basic components of an e-mail message include:  Sender:The person who creates and sends the e-mail message.  Recipient:The person or group who receives the e-mail message.  Subject:A brief summary of the message content.  Body:The main content of the message.  Attachments: Files or documents attached to the message. Some popular e-mail services include:  Gmail:A free web-based e-mail service provided by Google.  Outlook: An e-mail and personal information management service provided by Microsoft.  Yahoo! Mail:A free e-mail service provided byYahoo!.  iCloud Mail:A free e-mail service provided byApple for its users.  ProtonMail:A secure e-mail service that offers end-to-end encryption for privacy- conscious users.
  • 6. E-mail services typically offer features such as:  Composing and sending e-mails to one or multiple recipients.  Receiving and reading e-mails from other senders.  Organizing and managing e-mails with folders or labels.  Searching for specific e-mails or keywords.  Filtering and blocking unwanted or spam e-mails.  Setting up automatic replies or vacation messages.  Syncing e-mails across multiple devices.  Providing access to other productivity tools such as calendars and contacts. Overall, e-mail has become an essential tool for communication in both personal and professional settings, and the availability of various e-mail services has made it more accessible and convenient for people to use.
  • 7. Some special features of email  Speed: Email is delivered almost instantly, making it an ideal communication tool for fast-paced environments.  Convenience: Emails can be sent and received from anywhere in the world, as long as you have an internet connection.This makes it a highly convenient communication tool.  Accessibility: Emails can be accessed from multiple devices such as desktop computers, laptops, tablets, and smartphones, allowing you to stay connected at all times.  Archiving: Emails can be saved and archived, making it easy to retrieve important messages and references at a later time.  Attachments: Emails allow you to attach documents, images, and other files to your message, making it a versatile communication tool.  Delivery confirmation: Many email services offer delivery confirmation, which allows you to know when your message has been delivered to the recipient.  Group messaging: Email allows you to send messages to multiple recipients simultaneously, making it a useful tool for group communication.  Security: Many email services offer secure messaging options, ensuring that your messages and attachments are protected from unauthorized access.
  • 8. Term Meaning To The primary recipient(s) of the email. These are the people who are intended to read and respond to the email. CC (Carbon Copy) Stands for "carbon copy." The recipients in the CC field receive a copy of the email and are visible to all other recipients. They are not the primary recipients and are not expected to take action on the email. BCC (Blind Carbon Copy) Stands for "blind carbon copy." The recipients in the BCC field receive a copy of the email, but their names are not visible to any other recipients. They are not the primary recipients and are not expected to take action on the email. The BCC field is often used to send a copy of an email to someone without the other recipients knowing.
  • 9.  Reply/ReplyAll:Allows you to respond to an email and either reply only to the sender or reply to everyone included in the original message.  Forward: Enables you to send a received email to another recipient.  Attachments:Allows you to add files to an email to share with the recipient(s).  Signature: Provides the ability to create a personalized signature to include at the end of an email.  Priority: Enables you to set the level of importance of an email message.  Read Receipt: Requests the sender to receive a notification when the email has been opened and read by the recipient.  Spam Filter:Automatically identifies and moves unwanted or suspicious emails to a spam or junk folder.  Folder Organization:Allows users to create folders to organize and store emails.  Search Function: Enables users to search for specific emails using keywords, phrases, or sender/recipients.  Vacation Responder: Sends an automated email response to anyone who emails the user during a designated period of time, informing them that the user is currently away and unable to respond to emails.
  • 10.  Email Forwarding: This feature allows users to forward an email message they have received to another recipient.This can be useful if the original recipient wants to share the message with someone else or if they need someone else to take over a conversation or task.  Email Filtering: Email filtering is the process of automatically sorting incoming emails based on certain criteria, such as sender, subject line, or keywords.This can be helpful for organizing and prioritizing incoming messages, or for filtering out spam and other unwanted messages.  Email Archiving: Email archiving is the process of storing old or inactive email messages in a separate location, typically for compliance or regulatory purposes.Archiving can also be useful for freeing up storage space on an email server or for preserving important messages for future reference.  Email Encryption: Email encryption is the process of encoding an email message to protect its contents from unauthorized access or interception. This can be useful for transmitting sensitive information, such as financial data or confidential business information.  Email Signatures: An email signature is a block of text that is automatically appended to the end of an email message. It typically includes the sender's name, contact information, and any other relevant details. Email signatures can be customized and used to convey important information or to promote a business or organization.