Verified Document

Internet Protocols The Internet Is More Than Essay

Internet Protocols The internet is more than what it appears to many of its users. The World Wide Web is the standard and most popular method or protocol of acquiring information off the interconnectivity that the internet provides. The purpose of this essay is to define an internet protocols and give examples of several different types and the advantages and disadvantages they provide for myself and other users of this technology.

HTTP stands for Hyper Text Transfer Protocol and is most likely the most commonly used but least understood of all the internet protocols in use today. This protocol allows web servers to display their information and data to other remote computers. Addresses are used to route and direct communication.

FTP

File Transfer Protocol (FTP) is method of transferring files from computer to computer has its own unique rules and methods of use. This protocol allows a user to remotely log on to a computer, search and...

This protocol does have its restrictions. A user cannot actually look at the file itself before downloading it. This protocol is used in many applications where a web browser will ask the user if it desires to download this file? The file is presented with a title and extension, but previewing of this type of file is not allowed in this type of protocol.
Gopher

Gopher is another protocol that can assist users in browsing for information. This protocol is menu based and works like a map. Files in this protocol are organized in a hierarchical manner and are located by file names with some actual data available unlike FTP. Gopher is rarely seen in my browsing use, but on occasion old sites will have some of these ordered sets of information that are quick to retrieve and easy to navigate in my opinion.

Telnet

Telnet is a powerful…

Sources used in this document:
Works Cited
Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Document Type: Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Internet in Basic Terms the
Words: 1553 Length: 5 Document Type: Thesis

References www.questiaschool.com/PM.qst?a=o&d=113454035 Cole, C., Ray, K., & Zanetis, J. (2004). Videoconferencing for K-12 Classrooms: A Program Development Guide. Eugene, or: International Society for Technology in Education. Retrieved November 26, 2008, from Questia database: http://www.questia.com/PM.qst?a=o&d=113454035 FAQs about Internet2. Retrieved November 26, 2008, at http://www.internet2.edu/about/faq.html www.questiaschool.com/PM.qst?a=o&d=106217067 Goodman, P.S. (Ed.). (2002). Technology Enhanced Learning: Opportunities for Change. Mahwah, NJ: Lawrence Erlbaum Associates. Retrieved November 26, 2008, from Questia database: http://www.questia.com/PM.qst?a=o&d=106217070 Hanss T. Internet2: Building and Deploying Advanced,

Internet Security
Words: 1386 Length: 4 Document Type: Term Paper

Internet Security With the increasing awareness and use of the internet, organizations and individuals are facing newer security issues each day. Everyday people purchase goods on the internet and any hacking as a "joke" could cause the customer's credit card information to fall in the wrong hands. Misuse of such had been on a rise recently all over the world. Governments have now started to enforce strict internet laws to minimize

Internet Business Proposal & Implementation
Words: 5406 Length: 15 Document Type: Term Paper

With the widespread use of such technologies, we require greater understanding of the personal and social attributes that affect why people use computer-mediated communication (CMC) and the outcomes of CMC-related behavior." (Papacharissi & Rubin, 2000) Barriers and Issues The most fundamental concern in the refurbishment building's networking and VoIP proposal is also the industry's most basic barriers to accomplishing the goal of networking success. In other words, instituting a highly efficient

Internet Way: A Unifying Theory and Methodology
Words: 4205 Length: 15 Document Type: Term Paper

Internet Way: a Unifying Theory and Methodology for Corporate Systems Development The face of business has changed drastically since the advent of the Internet. Traditional brick and mortar businesses are finding themselves with new marketing avenues. The Internet has led to the invention of a new comer to the business world as well, the e-business. These businesses exist only on the Internet. They do not have a traditional brick and mortar

Internet Blogging the Changing Computer
Words: 1140 Length: 3 Document Type: Term Paper

The Web has grown increasingly fast and sophisticated, as podcasts, streaming video, and other movie-like aspects of entertainment have become part of the Web experience. Features such as YourTube allow persons to see videos, homemade by uses, over the web. As digital cameras and video cameras become more common, the language of the Web and the media exposed upon Web blogs are sure to expand in the future, and to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now