SlideShare a Scribd company logo
Web Development and Database Administration
Level II
MODULE TITLE: Configuring and Using Internet
MODULE CODE: EIS WDDBA2 M03 0322
NOMINAL DURATION: 40 Hours
CHAPTER ONE
Manage Internet
1.1. Introduction to Internet
 The Internet is a means of connecting a computer to any other computer anywhere in
the world via dedicated routers and servers.
 When two computers are connected over the Internet, they can send and receive all kinds
of information such as
 text
 Graphics
 voice
 video and computer programs
 The high-speed, fiber-optic cables (called backbones) through which the bulk of the
Internet data travels are owned by telephone companies in their respective countries.
Cont…
 The internet developed from software called the ARPANET which the U.S military had
developed.
 It was only restricting to military personnel and the people who developed it.
 Only after it was privatized was it allowed to be used commercially.
 The internet has developed to give many benefits to mankind.
Cont….
1.1.1 Basic Internet Terms and Terminology
1. ARPANET: The acronym stands for Advanced Research Projects Agency Network.
 ARPA of the United States Department of Defense developed ARPANET, which became
the world’s first packet switching network.
 Internet is the successor of ARPANET.
2. Internet Service Provider: A company, which provides users with an access to the
Internet, is known as an Internet service provider or Internet access provider.
 ISP, as it is called, offers email accounts and other services like remote storage of files for
its customers.
3. IPAddress: It is a way of numerically identifying an entity on a computer network.
 The original addressing system known as IPv4, used 32 bit addresses.
 With the growth of the Internet, IPv6 came to be used where in the addresses are composed
of 128 bits.
Cont…
4. Cyberspace: This term coined by William Gibson, is used to refer to the computer
networks connected to each other and the content they host.
 It is often used to refer to the Internet.
5. WWW: It is a collection of interlinked documents that are accessible over the
Internet.
 It consists of millions of web pages that contain text, images, voice and videos.
 Sir Tim Berners-Lee, a British scientist working at CERN, created the World Wide
Web.
6. Website: A website is a set of web pages consisting of text, audio and video.
 Web servers host websites.
7. URL: It specifies the location of a resource on the Internet.
 It consists of the basic address and path.
Cont….
8. Web Page: Web pages are resources of information.
 They are generally created in the HTML format and provide the web users with
navigational abilities through hyperlinks to other web pages on the web.
9. Home Page: The term home page is used to refer to the page that is the default page of
any website.
 It is the main page of a complex website.
10. Web Browser: A web browser is a software application that facilitates user
interaction with the text, audio, video and other information that is located on the web.
Cont…
11. Cache: Web browsers maintain a cache of recently visited web pages.
 Some of them use an external proxy web cache, which is a server program through which web
requests pass.
 This enables the browsers to cache frequently visited pages.
12. HTTP: Hypertext Transfer Protocol(HTTP), is a communications protocol used for the transfer
of information over the Internet.
 A client makes an HTTP request using a web browser to which an HTTP response is sent from
the server.
13. Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged between the
web client and the web server.
 It is sent by the web server to the web client and returned unchanged by the client each time it
accesses the server.
cont….
14. Session: It is an exchange of information between a computer and its user.
 It is established for a certain period of time after which it ends.
15. Hyperlink: A reference in a document to another section of the document or to another
document is termed as a hyperlink.
Hyperlinks are used to redirect the user from one section of a page content to another.
16. Internet Security: It is one of the major concerns today.
 Internet Privacy relates to safeguarding the privacy of the web users and the sensitive
information on the web from hackers and stalkers.
1.2. Internet browsers
 A web browser is s a software program that allows a user to locate, access, and display
web pages over the internet.
 There are many different types of browsers. Some of them are free and some cost money.
 You can find out which is best for you by comparing the features offered by each browser.
 There are so many types of internet browsers are used to upload or download files for
different office intercommunication though it.
 Mozilla Firefox
 Chrome
 Microsoft Edge
 Safari
 Opera
 UC Browser
 Chedot Browser
Cont… Synchronize :happen at the same time
1. Mozilla Firefox: Best overall: one of the fastest internet browsers we tested for
navigating between sites and for fully loading pages.
 This browser is compatible with Mac and Windows operating systems, and with Android
and iOS cell phones and tablets.
 It syncs your passwords, bookmarked pages and browser settings so you have access to
these – as well as your search history – on other computers and mobile devices.
 Mozilla includes a privacy browser so you can search online without cookies or other
trackers.
 And you can set this browser to delete all the cookies, cache and browser history each
time the browser closes.
 Mozilla is nicely laid out and has a clean interface, so it’s easy to find most tools and
features.
Cont…
2. Chrome: Best for Google Drive
 Google Chrome comes standard on most Android mobile devices, so it is a good choice
for cell phones and tablets.
 It works a bit better than Firefox on Android devices.
 Chrome is also a good choice for Windows and Mac computers.
 If you use Chrome on multiple devices, logging in to your account will give you quick
access to documents you saved in Google Docs, your Gmail messages and your
bookmarks, regardless of the device you’re on.
 Search history is also saved with your account.
3. Microsoft Edge: Best for battery life
 Compatible to older window machines and window 10 OS.
 But it also works on both Android and iOS cell phones.
Cont….
 It's much leaner and faster than Internet Explorer, which it replaces.
 In some respects, it's also a better proposition than Chrome or Firefox.
 That's because Edge tends to use less memory (RAM) so it will feel faster on
older computers and tends to use less power, which is important on a laptop.
 it warned of phishing schemes and other dangerous websites, and also
blocked malware files from infecting out test devices.
 You can add icons to the toolbar that link you to frequently visited websites
and use the URL field to search the web.
Cont….
4. Safari: Best for Macs
 Safari is one of the best choices for Mac devices because it is designed
specifically for Apple’s machines.
 It connects quickly and loads full sites faster than any macOS-compatible
browser we tested.
 Safari takes a moment to learn if you’re not already familiar with Mac computers,
and you can’t customize this browser with toolbars.
 But you still get tabbed browsing like Firefox and Chrome offer.
 Safari warned us of malicious websites that had phishing schemes or dangerous
links on them.
 But it didn’t stop malicious downloads, so we had to depend on a Mac antivirus
program to gather these threats during the download process.
Cont…
5. Opera: Good all-rounder
 Opera is decently fast, about on par(the same) with Firefox and Chrome when it
comes to initial startup, site navigation and page loading.
 It’s compatible with both Windows and Mac computers, and works on iOS and
Android mobile devices.
 The URL bar doubles as a search bar, which means you can drag and drop open tabs
in the order you want them.
6. UC Browser: - Good all-rounder
 UC Browser is a light, smart browser that gives users the fastest mobile web browsing
experience.
 UC Browser uses the latest in web kit technology to offer features like ad-blocking,
built-in Google Translate, and voice search for Android phones.
 The app also has a smart download feature so you can easily download files on spot.
Cont…
7. Chedot Browser: best to download video and audio at the same time
 Chedot Browser is a deceptive Chromium-based Internet browser that supposedly (not believable)
provides faster file downloads, an Internet search service, browsing protection, and other similar
functionality.
 This application may seem legitimate and useful, however, Chedot Browser is classed as adware and
a potentially unwanted program (PUP).
 Users who attempt to search the Internet via this browser are redirected to the search.chedot.com
website.
 This rogue application infiltrates systems without users' consent, generates intrusive online
advertisements, and tracks Internet browsing activity.
 NB: A PUP is software that a user may perceive as unwanted (even if a user potentially consented to
install it or wishes to continue to use it).
 PUPs may engage in unwanted behavior, such as:
 Installing toolbars in web browsers
 Displaying advertising, and changing the default browser homepage and/or search engine.
 PUPs may also consume PC resources and cause operating system slowdowns, crashes, security
breaches and other issues.
1.3. Accessing a particular site using its URL
 URL is used to locate a unique global address of a website.
 When you know the address of a web site it is much easier to locate.
 Referencing the Uniform Resource Locator URL allows you to jump directly to that
page at that URL regardless of where you currently are on the web.
 All web browsers let you jump directly to a Uniform Resource Locator (URL) a
unique address for Internet resources that are available through a web browser,
including files or directories.
 URL structured
Cont…
 URL’s specify three pieces of information needed to retrieve a document:
 The protocol to be used
 The server address and port to which to connect
 The path to the information
 The format for a URL is: Protocol://server-name: port/path.
 For example, http://home.netscape.com/welcome/html
 To access or use the web site must now that the term URL. Based on this resource locater
the users view necessary data using browser SW.
 Eg. The users try to access google web site using Microsoft edge
 Writing www.google.com on search bar
1.4. Manage internet browsers
 To manage any browser used in your computer must be used the browsers setting.
1.4.1. Set Home page
 Home page is generally the main page a visitor navigating to a website from a web
search engine will see.
 And it may also serve as a landing page to attract visitors.
 It is used to refer to the page that is the default page of any website.
1.4.2. Configuring a socks proxy
 A Proxy or Proxy Server is an intermediary server, either software or hardware, the sits
between an end user and a website or other service's server.
 Proxies are used for different reasons including efficiency, privacy, and security
 A SOCKS5 proxy is an alternative to a VPN.
Cont…
 It routes packets between a server and a client using a proxy server.
 This means that your real IP address is hidden and you access the internet with an
address provided to you by a proxy provider.
 How Does the Proxy Protect Computer Privacy and Data?
 A proxy server performs the function of a firewall and filter.
 The end-user or a network administrator can choose a proxy designed to protect data
and privacy. This examines the data going in and out of your computer or network.
 It then applies rules to prevent you from having to expose your digital address to the
world.
 Only the proxy’s IP address is seen by hackers or other bad actors.
 Without your personal IP address, people on the internet do not have direct access to
your personal data, schedules, apps, or files.
Cont…
1.4.3. Verifying internet options security and privacy level
 Optimizing your browser’s settings is a critical step in using the Internet securely
and privately.
 Failing to correctly set up your browser’s security features can put you at a higher
risk for malware infections and malicious attacks.
 Installation of “Cybersecurity 101” series provides securing today’s most popular
browsers, including Google Chrome, Mozilla Firefox, and Microsoft Internet
Explorer.
 While it is impossible to guarantee complete protection from cyber threats.
Cont…
 1.4.4. Managing location of temporary files
 Temporary Internet Files are a folder on Microsoft Windows which serves as the browser
cache for Internet Explorer to cache pages and other multimedia content, such as video
and audio files, from websites visited by the user.
 This allows such websites to load more quickly the next time they are visited.
 Despite the name 'temporary', the cache of a website remains stored on the hard disk until
the user manually clears the cache, the cache expires or if the cache is full.
 The contents of the folder are indexed using an index.dat file, a form of database.
 The Temporary Internet Files cache can be useful in certain situations.
 For example, if no Internet connection is available, previously cached websites are still
available offline.
1.5. Display or view modes of internet browser
 In recent versions, Windows Internet Explorer has dramatically improved support emerging industry
standards, such as HTML5, (CSS), Level 3 (CSS3), and Scalable Vector Graphics (SVG).
 By default, Internet Explorer properly displays Web Pages designed to support these standards.
 Because some of these standards are still evolving, older websites may not fully support them.
 As a result, websites designed to support the earlier versions of these standards may display
differently when viewed with web browsers designed to support current versions of the standards, such
as Internet Explorer.
 In order to help such web sites, display correctly, Internet Explorer supports a display mode
called Compatibility View, which displays web pages as if they were viewed by an earlier version of the
browser.
1.6. Loaded Images depending on:
 In accessing information on the Internet you may have to consider whether to load or not
load images.
 Modem Speed
 Having a fast modem connected to your computer will download images quickly.
 The bandwidth of your Internet connection is dependent on the speed of your modem. If the
bandwidth is small, it will not be able to download images very quickly.
 Computer speed and capacity
 The speed and capacity of your computer also affects the speed at which images are loaded.
 If the computer's speed is slow and the capacity minimal, it may be better to turn off
multimedia features such as pictures, sounds and videos in order to speed up the delivery and
display of web page information.
 Browser Capabilities
 Browsers such as Microsoft Internet Explorer and Netscape Navigator are referred to as
graphical browsers as they are able to display graphics, colors and multimedia features.
Cont…
 When a web site is visited, the details of that web page are stored in the
browser's cache.
 Web pages stored to be read offline are also stored in the cache.
 Microsoft Internet Explorer's cache is labeled 'Temporary Internet Files’
 Whereas Netscape Navigator stores its cache in the program folder. This
speeds up the display of pages that are visited frequently because the Web
page details are accessed from the cache instead of from the web.
1.7. Modifying toolbars to meet user and browsing needs
 A browser toolbar is a toolbar that resides(placed) within a browser’s window.
 All major web browsers provide support to browser toolbar development as a way to extend
the browser's GUI and functionality.
 Browser toolbars are specific to each browser, which means that a toolbar working on a
browser does not work on another one.
 All browser toolbars must be installed in the corresponding browser before they can be
used, and require updates when new versions are released.
 Developing a toolbar
 The programming language and development tools behind a browser toolbar vary from one
browser to another.
 In Internet Explorer 5 or later toolbars may be created as browser extensions written in C#
or C++.
Cont…
 In Firefox toolbars can be created as add-ons that contribute to the GUI by extending
the browser with XUL.
 The toolbar is written in JavaScript running under expanded privileges.
 Mozilla Jetpack can be used to simplify the development of add-ons for Firefox.
 In Safari 5 or later toolbars can be created as extensions that add bars and buttons.
 The toolbar is written in JavaScript with access to a special JavaScript API to interact with
the Safari application and web content.
 In Google Chrome 4 or later toolbars can be created as extensions that add browser
actions to the browser window.
 The toolbar is written in JavaScript.
 In Opera 11 or later toolbars can be created as extensions that add buttons to the
browser window.
 The toolbar is written in JavaScript.
Cont…
 Native vs. injected toolbars
 Some major browsers (Internet Explorer and Firefox) enable the creation of
native toolbars i.e., toolbars which are directly inserted in the browser window.
 Examples of native toolbars are Google Toolbar and Stumble upon Toolbar.
 Native toolbars use browser-specific code to create the same toolbar for each
different browser version.
 Injected toolbars use essentially the same JavaScript code to draw the toolbar
for each different browser version.
 All major browsers support injected toolbars.
1.8. Deleting cookies and browser history as precaution from virus
infection.
 A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an
origin website to send state information to a user's browser and for the browser to return
the state information to the origin site.
 Cookies are not software. They cannot be programmed, cannot carry viruses, and cannot
install malware on the host computer.
 However, they can be used by spyware to track user's browsing activities
 spyware is a computer program that watches what people do with their computers, and
then sends that information over the Internet .
 Cookies could also be stolen by hackers to gain access to a victim's web account, thus, the
need to delete cookies.
Any Question?

More Related Content

PDF
Administrate network and hardware peripherals Lecture #2
PPTX
Connect internal hardware components.pptx
PPTX
Maintaining equipment and consumables ppt.pptx
PPTX
Confirm Client Requirements
PPTX
Care for Network and Computer Hardware L-2 (3).pptx
PDF
Record-client-support-pptx.pdf
PPTX
connecte hardware peripherals level 1.ppt.pptx
PPTX
5 Protect-Application-or-System-Software (2).pptx
Administrate network and hardware peripherals Lecture #2
Connect internal hardware components.pptx
Maintaining equipment and consumables ppt.pptx
Confirm Client Requirements
Care for Network and Computer Hardware L-2 (3).pptx
Record-client-support-pptx.pdf
connecte hardware peripherals level 1.ppt.pptx
5 Protect-Application-or-System-Software (2).pptx

What's hot (12)

PDF
Design and Implementation in Software Engineering
PDF
Introduction to software engineering
PDF
Speech Recognition , Noise Filtering and Content Search Engine , Research Do...
PPTX
golden rules of user interface design
PPT
Managing People in Software Engineering SE22
PPT
Ooad ch 2
PPT
Ian Sommerville, Software Engineering, 9th Edition Ch2
PPTX
Unix features, posix and single unix specification
PPTX
Software and Networking tools
PPTX
IntrIntroduction
PPTX
PPT
Advanced Operating System Lecture Notes
Design and Implementation in Software Engineering
Introduction to software engineering
Speech Recognition , Noise Filtering and Content Search Engine , Research Do...
golden rules of user interface design
Managing People in Software Engineering SE22
Ooad ch 2
Ian Sommerville, Software Engineering, 9th Edition Ch2
Unix features, posix and single unix specification
Software and Networking tools
IntrIntroduction
Advanced Operating System Lecture Notes
Ad

Similar to configuring and using internet.pptx (20)

PPTX
Acsess and Use Internet To access and use
PPTX
A%UIS.pptx
DOCX
20 internet terms
PPTX
ICT-Lec-3.pptx bkjojbjdbjkklbhsdkssscduigi
PPT
Internet Tutorial 01
 
PPTX
Unit5 presentation of computer bussiness interface
PPTX
Chapter2_2018 The Internet, the Web, and Electronic Commerce.pptx
PPTX
Ch03 internet-2-browser.pptx
PDF
unit oe 1.pdf
PPTX
Internet.pptx
PDF
Computer science Chapter 17 - Web Designing.pdf
PPTX
M09 identify Accessing and Using Internet.pptx
PPTX
Week 4 internet overview
PPTX
Internet and Its Applications
PPTX
WWW and Web Browser.pptx
PPTX
WWW and web browser
PPTX
The Concepts of Internet and Networking.pptx
PPTX
Internet and its applications
PPTX
Lecture 3.pptx the new topiccccccc forrr
PPTX
Introduction To Internet and Applications.pptx
Acsess and Use Internet To access and use
A%UIS.pptx
20 internet terms
ICT-Lec-3.pptx bkjojbjdbjkklbhsdkssscduigi
Internet Tutorial 01
 
Unit5 presentation of computer bussiness interface
Chapter2_2018 The Internet, the Web, and Electronic Commerce.pptx
Ch03 internet-2-browser.pptx
unit oe 1.pdf
Internet.pptx
Computer science Chapter 17 - Web Designing.pdf
M09 identify Accessing and Using Internet.pptx
Week 4 internet overview
Internet and Its Applications
WWW and Web Browser.pptx
WWW and web browser
The Concepts of Internet and Networking.pptx
Internet and its applications
Lecture 3.pptx the new topiccccccc forrr
Introduction To Internet and Applications.pptx
Ad

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Pre independence Education in Inndia.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
master seminar digital applications in india
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
Anesthesia in Laparoscopic Surgery in India
O7-L3 Supply Chain Operations - ICLT Program
Abdominal Access Techniques with Prof. Dr. R K Mishra
Pre independence Education in Inndia.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Pharma ospi slides which help in ospi learning
Microbial diseases, their pathogenesis and prophylaxis
master seminar digital applications in india
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
TR - Agricultural Crops Production NC III.pdf
Insiders guide to clinical Medicine.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Microbial disease of the cardiovascular and lymphatic systems
Basic Mud Logging Guide for educational purpose
Final Presentation General Medicine 03-08-2024.pptx
human mycosis Human fungal infections are called human mycosis..pptx

configuring and using internet.pptx

  • 1. Web Development and Database Administration Level II MODULE TITLE: Configuring and Using Internet MODULE CODE: EIS WDDBA2 M03 0322 NOMINAL DURATION: 40 Hours
  • 2. CHAPTER ONE Manage Internet 1.1. Introduction to Internet  The Internet is a means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.  When two computers are connected over the Internet, they can send and receive all kinds of information such as  text  Graphics  voice  video and computer programs  The high-speed, fiber-optic cables (called backbones) through which the bulk of the Internet data travels are owned by telephone companies in their respective countries.
  • 3. Cont…  The internet developed from software called the ARPANET which the U.S military had developed.  It was only restricting to military personnel and the people who developed it.  Only after it was privatized was it allowed to be used commercially.  The internet has developed to give many benefits to mankind.
  • 4. Cont…. 1.1.1 Basic Internet Terms and Terminology 1. ARPANET: The acronym stands for Advanced Research Projects Agency Network.  ARPA of the United States Department of Defense developed ARPANET, which became the world’s first packet switching network.  Internet is the successor of ARPANET. 2. Internet Service Provider: A company, which provides users with an access to the Internet, is known as an Internet service provider or Internet access provider.  ISP, as it is called, offers email accounts and other services like remote storage of files for its customers. 3. IPAddress: It is a way of numerically identifying an entity on a computer network.  The original addressing system known as IPv4, used 32 bit addresses.  With the growth of the Internet, IPv6 came to be used where in the addresses are composed of 128 bits.
  • 5. Cont… 4. Cyberspace: This term coined by William Gibson, is used to refer to the computer networks connected to each other and the content they host.  It is often used to refer to the Internet. 5. WWW: It is a collection of interlinked documents that are accessible over the Internet.  It consists of millions of web pages that contain text, images, voice and videos.  Sir Tim Berners-Lee, a British scientist working at CERN, created the World Wide Web. 6. Website: A website is a set of web pages consisting of text, audio and video.  Web servers host websites. 7. URL: It specifies the location of a resource on the Internet.  It consists of the basic address and path.
  • 6. Cont…. 8. Web Page: Web pages are resources of information.  They are generally created in the HTML format and provide the web users with navigational abilities through hyperlinks to other web pages on the web. 9. Home Page: The term home page is used to refer to the page that is the default page of any website.  It is the main page of a complex website. 10. Web Browser: A web browser is a software application that facilitates user interaction with the text, audio, video and other information that is located on the web.
  • 7. Cont… 11. Cache: Web browsers maintain a cache of recently visited web pages.  Some of them use an external proxy web cache, which is a server program through which web requests pass.  This enables the browsers to cache frequently visited pages. 12. HTTP: Hypertext Transfer Protocol(HTTP), is a communications protocol used for the transfer of information over the Internet.  A client makes an HTTP request using a web browser to which an HTTP response is sent from the server. 13. Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged between the web client and the web server.  It is sent by the web server to the web client and returned unchanged by the client each time it accesses the server.
  • 8. cont…. 14. Session: It is an exchange of information between a computer and its user.  It is established for a certain period of time after which it ends. 15. Hyperlink: A reference in a document to another section of the document or to another document is termed as a hyperlink. Hyperlinks are used to redirect the user from one section of a page content to another. 16. Internet Security: It is one of the major concerns today.  Internet Privacy relates to safeguarding the privacy of the web users and the sensitive information on the web from hackers and stalkers.
  • 9. 1.2. Internet browsers  A web browser is s a software program that allows a user to locate, access, and display web pages over the internet.  There are many different types of browsers. Some of them are free and some cost money.  You can find out which is best for you by comparing the features offered by each browser.  There are so many types of internet browsers are used to upload or download files for different office intercommunication though it.  Mozilla Firefox  Chrome  Microsoft Edge  Safari  Opera  UC Browser  Chedot Browser
  • 10. Cont… Synchronize :happen at the same time 1. Mozilla Firefox: Best overall: one of the fastest internet browsers we tested for navigating between sites and for fully loading pages.  This browser is compatible with Mac and Windows operating systems, and with Android and iOS cell phones and tablets.  It syncs your passwords, bookmarked pages and browser settings so you have access to these – as well as your search history – on other computers and mobile devices.  Mozilla includes a privacy browser so you can search online without cookies or other trackers.  And you can set this browser to delete all the cookies, cache and browser history each time the browser closes.  Mozilla is nicely laid out and has a clean interface, so it’s easy to find most tools and features.
  • 11. Cont… 2. Chrome: Best for Google Drive  Google Chrome comes standard on most Android mobile devices, so it is a good choice for cell phones and tablets.  It works a bit better than Firefox on Android devices.  Chrome is also a good choice for Windows and Mac computers.  If you use Chrome on multiple devices, logging in to your account will give you quick access to documents you saved in Google Docs, your Gmail messages and your bookmarks, regardless of the device you’re on.  Search history is also saved with your account. 3. Microsoft Edge: Best for battery life  Compatible to older window machines and window 10 OS.  But it also works on both Android and iOS cell phones.
  • 12. Cont….  It's much leaner and faster than Internet Explorer, which it replaces.  In some respects, it's also a better proposition than Chrome or Firefox.  That's because Edge tends to use less memory (RAM) so it will feel faster on older computers and tends to use less power, which is important on a laptop.  it warned of phishing schemes and other dangerous websites, and also blocked malware files from infecting out test devices.  You can add icons to the toolbar that link you to frequently visited websites and use the URL field to search the web.
  • 13. Cont…. 4. Safari: Best for Macs  Safari is one of the best choices for Mac devices because it is designed specifically for Apple’s machines.  It connects quickly and loads full sites faster than any macOS-compatible browser we tested.  Safari takes a moment to learn if you’re not already familiar with Mac computers, and you can’t customize this browser with toolbars.  But you still get tabbed browsing like Firefox and Chrome offer.  Safari warned us of malicious websites that had phishing schemes or dangerous links on them.  But it didn’t stop malicious downloads, so we had to depend on a Mac antivirus program to gather these threats during the download process.
  • 14. Cont… 5. Opera: Good all-rounder  Opera is decently fast, about on par(the same) with Firefox and Chrome when it comes to initial startup, site navigation and page loading.  It’s compatible with both Windows and Mac computers, and works on iOS and Android mobile devices.  The URL bar doubles as a search bar, which means you can drag and drop open tabs in the order you want them. 6. UC Browser: - Good all-rounder  UC Browser is a light, smart browser that gives users the fastest mobile web browsing experience.  UC Browser uses the latest in web kit technology to offer features like ad-blocking, built-in Google Translate, and voice search for Android phones.  The app also has a smart download feature so you can easily download files on spot.
  • 15. Cont… 7. Chedot Browser: best to download video and audio at the same time  Chedot Browser is a deceptive Chromium-based Internet browser that supposedly (not believable) provides faster file downloads, an Internet search service, browsing protection, and other similar functionality.  This application may seem legitimate and useful, however, Chedot Browser is classed as adware and a potentially unwanted program (PUP).  Users who attempt to search the Internet via this browser are redirected to the search.chedot.com website.  This rogue application infiltrates systems without users' consent, generates intrusive online advertisements, and tracks Internet browsing activity.  NB: A PUP is software that a user may perceive as unwanted (even if a user potentially consented to install it or wishes to continue to use it).  PUPs may engage in unwanted behavior, such as:  Installing toolbars in web browsers  Displaying advertising, and changing the default browser homepage and/or search engine.  PUPs may also consume PC resources and cause operating system slowdowns, crashes, security breaches and other issues.
  • 16. 1.3. Accessing a particular site using its URL  URL is used to locate a unique global address of a website.  When you know the address of a web site it is much easier to locate.  Referencing the Uniform Resource Locator URL allows you to jump directly to that page at that URL regardless of where you currently are on the web.  All web browsers let you jump directly to a Uniform Resource Locator (URL) a unique address for Internet resources that are available through a web browser, including files or directories.  URL structured
  • 17. Cont…  URL’s specify three pieces of information needed to retrieve a document:  The protocol to be used  The server address and port to which to connect  The path to the information  The format for a URL is: Protocol://server-name: port/path.  For example, http://home.netscape.com/welcome/html  To access or use the web site must now that the term URL. Based on this resource locater the users view necessary data using browser SW.  Eg. The users try to access google web site using Microsoft edge  Writing www.google.com on search bar
  • 18. 1.4. Manage internet browsers  To manage any browser used in your computer must be used the browsers setting. 1.4.1. Set Home page  Home page is generally the main page a visitor navigating to a website from a web search engine will see.  And it may also serve as a landing page to attract visitors.  It is used to refer to the page that is the default page of any website. 1.4.2. Configuring a socks proxy  A Proxy or Proxy Server is an intermediary server, either software or hardware, the sits between an end user and a website or other service's server.  Proxies are used for different reasons including efficiency, privacy, and security  A SOCKS5 proxy is an alternative to a VPN.
  • 19. Cont…  It routes packets between a server and a client using a proxy server.  This means that your real IP address is hidden and you access the internet with an address provided to you by a proxy provider.  How Does the Proxy Protect Computer Privacy and Data?  A proxy server performs the function of a firewall and filter.  The end-user or a network administrator can choose a proxy designed to protect data and privacy. This examines the data going in and out of your computer or network.  It then applies rules to prevent you from having to expose your digital address to the world.  Only the proxy’s IP address is seen by hackers or other bad actors.  Without your personal IP address, people on the internet do not have direct access to your personal data, schedules, apps, or files.
  • 20. Cont… 1.4.3. Verifying internet options security and privacy level  Optimizing your browser’s settings is a critical step in using the Internet securely and privately.  Failing to correctly set up your browser’s security features can put you at a higher risk for malware infections and malicious attacks.  Installation of “Cybersecurity 101” series provides securing today’s most popular browsers, including Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer.  While it is impossible to guarantee complete protection from cyber threats.
  • 21. Cont…  1.4.4. Managing location of temporary files  Temporary Internet Files are a folder on Microsoft Windows which serves as the browser cache for Internet Explorer to cache pages and other multimedia content, such as video and audio files, from websites visited by the user.  This allows such websites to load more quickly the next time they are visited.  Despite the name 'temporary', the cache of a website remains stored on the hard disk until the user manually clears the cache, the cache expires or if the cache is full.  The contents of the folder are indexed using an index.dat file, a form of database.  The Temporary Internet Files cache can be useful in certain situations.  For example, if no Internet connection is available, previously cached websites are still available offline.
  • 22. 1.5. Display or view modes of internet browser  In recent versions, Windows Internet Explorer has dramatically improved support emerging industry standards, such as HTML5, (CSS), Level 3 (CSS3), and Scalable Vector Graphics (SVG).  By default, Internet Explorer properly displays Web Pages designed to support these standards.  Because some of these standards are still evolving, older websites may not fully support them.  As a result, websites designed to support the earlier versions of these standards may display differently when viewed with web browsers designed to support current versions of the standards, such as Internet Explorer.  In order to help such web sites, display correctly, Internet Explorer supports a display mode called Compatibility View, which displays web pages as if they were viewed by an earlier version of the browser.
  • 23. 1.6. Loaded Images depending on:  In accessing information on the Internet you may have to consider whether to load or not load images.  Modem Speed  Having a fast modem connected to your computer will download images quickly.  The bandwidth of your Internet connection is dependent on the speed of your modem. If the bandwidth is small, it will not be able to download images very quickly.  Computer speed and capacity  The speed and capacity of your computer also affects the speed at which images are loaded.  If the computer's speed is slow and the capacity minimal, it may be better to turn off multimedia features such as pictures, sounds and videos in order to speed up the delivery and display of web page information.  Browser Capabilities  Browsers such as Microsoft Internet Explorer and Netscape Navigator are referred to as graphical browsers as they are able to display graphics, colors and multimedia features.
  • 24. Cont…  When a web site is visited, the details of that web page are stored in the browser's cache.  Web pages stored to be read offline are also stored in the cache.  Microsoft Internet Explorer's cache is labeled 'Temporary Internet Files’  Whereas Netscape Navigator stores its cache in the program folder. This speeds up the display of pages that are visited frequently because the Web page details are accessed from the cache instead of from the web.
  • 25. 1.7. Modifying toolbars to meet user and browsing needs  A browser toolbar is a toolbar that resides(placed) within a browser’s window.  All major web browsers provide support to browser toolbar development as a way to extend the browser's GUI and functionality.  Browser toolbars are specific to each browser, which means that a toolbar working on a browser does not work on another one.  All browser toolbars must be installed in the corresponding browser before they can be used, and require updates when new versions are released.  Developing a toolbar  The programming language and development tools behind a browser toolbar vary from one browser to another.  In Internet Explorer 5 or later toolbars may be created as browser extensions written in C# or C++.
  • 26. Cont…  In Firefox toolbars can be created as add-ons that contribute to the GUI by extending the browser with XUL.  The toolbar is written in JavaScript running under expanded privileges.  Mozilla Jetpack can be used to simplify the development of add-ons for Firefox.  In Safari 5 or later toolbars can be created as extensions that add bars and buttons.  The toolbar is written in JavaScript with access to a special JavaScript API to interact with the Safari application and web content.  In Google Chrome 4 or later toolbars can be created as extensions that add browser actions to the browser window.  The toolbar is written in JavaScript.  In Opera 11 or later toolbars can be created as extensions that add buttons to the browser window.  The toolbar is written in JavaScript.
  • 27. Cont…  Native vs. injected toolbars  Some major browsers (Internet Explorer and Firefox) enable the creation of native toolbars i.e., toolbars which are directly inserted in the browser window.  Examples of native toolbars are Google Toolbar and Stumble upon Toolbar.  Native toolbars use browser-specific code to create the same toolbar for each different browser version.  Injected toolbars use essentially the same JavaScript code to draw the toolbar for each different browser version.  All major browsers support injected toolbars.
  • 28. 1.8. Deleting cookies and browser history as precaution from virus infection.  A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to a user's browser and for the browser to return the state information to the origin site.  Cookies are not software. They cannot be programmed, cannot carry viruses, and cannot install malware on the host computer.  However, they can be used by spyware to track user's browsing activities  spyware is a computer program that watches what people do with their computers, and then sends that information over the Internet .  Cookies could also be stolen by hackers to gain access to a victim's web account, thus, the need to delete cookies.