Internet Terms Essay

WORDS
2187
Cite

Introduction

The twenty-first century observed the information and computer revolution; empowering people to have instant communication and permitting them in carrying out activities using computers. The use of the computer is not limited to a single or specific industry and its use would be seen in all the industries or sectors. Presently, we are living in a world wherein nearly everyone has heard about computer technology and over sixty percent of people have information on its usage. We can now find laptops or computers in shops, homes, educational institutions, ticket counters, and so on (Daily Alert, 2013). It is important to have an understanding of some important terms used in the field of computer technology. This essay will provide an understanding of the various terms involving the Internet such as, web browser, URL, Wi-Fi, network, firewalls, email, phishing, malware, and more.

Internet



The internet, in simple terms, occasionally called as ‘Net,’ is a global computer network system - a network system wherein users on one PC could, if they have authorization, get data from any other PC (and sometimes directly talk to users of various other PCs). The concept of internet got introduced in the year 1969 by the U.S. government’s ARPA--Advanced Research Projects Agency and was initially called as the ARPANet. The internet physically uses a part of the total resources from the presently prevailing telecommunication systems. In fact, what makes a technical level of distinction of the internet is about using the various sets of conventions known as Transmission Control Protocol/Internet Protocol or TCP/IP. The most broadly used segments of the internet are the ‘WWW’--World Wide Web which is also known as the ‘Web.’ The remarkable aspect of the internet is the hypertext, which is a method of immediate cross-referencing (Search Win Development, 2014).

Web Browser



One of the largest software being made is that of the web browser. It is software which is unique. It would be used for getting online accessibility for several electronic exchange services like e-learning, e-commerce, e-banking, e-mail, and so on. Hackers have an understanding that browsers could be identified on all tablets, smart phone, computers, and so on (Serrhini, 2013). The browser is usually an operator’s window to the outside world, offering them with an interface to conduct an extensive level of activities such as professional business, personal financial management, social networking, shopping and correspondence through email (Louw et al., 2008). Almost all the browsers have their disabled or enabled features which state their working nature about executing the good ones and putting a stop to the harmful ones. Several users are, however, not willing to set up and use the features accurately for promoting safety since several of them do not even still understand the real concepts of security (Serrhini, 2013).

URL



Websites would be located by the addresses shown on the www--World Wide Web. Such types of addresses could be called Uniform Resource Locators or URLs. Each website has a unique URL allocated to it. Hence, the web services and searchers could effortlessly and quickly find them. There are many data which one could gather from a basic URL, inclusive of the following: the type of server wherein the website would be hosted; the type of organization wherein the website would be categorized; where in the world is the website situated; and the names on the website directories. By doing a careful review of the various parts of a website URL, one could rapidly gather some useful data. What's more, by just removing certain sections of the URL, one could have a better understanding of the website compared to what would be accessed publicly (Boswell, 2017).

WIFI



Wi-Fi is considered as a system of devices which are wirelessly linked and which makes use of the radio waves, permitting linkages between the various devices without the huge costs of complicated cables or without requiring them to face each other. During the recent years, LANs or Wireless Local Area Networks have attained a great measure of growth. When compared to the several technologies of wireless LANs, Wi-Fi, the technology of the wireless LAN that is IEEE 802.11b based, could be considered as the technology that is the main and the most outstanding (Vandana, 2006). Wi-Fi roaming provides significant business benefits for the operators. In today’s world, users expect that Wi-Fi would be accessed when they need it and wherever they travel to (Mohapatra et al., 2014). The technology of Wi-Fi is an ideal method for mobile-phone operators for linking to the internet. The ever-growing demand for devices that are Wi-Fi-empowered and the expanding amount of Wi-Fi systems ensures that this pattern would be continued later also (Robert et al., 2008).

Network



A network consists of peripherals, network devices, mainframes, servers, computers, or other types of devices which get linked to each other for information sharing. A good illustration of a network would be the internet that links several millions of people across the world (Computer Hope, 2017). On a network, computers might be...
...

The two common kinds of networks are Wide Area Network--WAN and Local Area Network—LAN (Winkelman, 2013).

Firewalls



The firewall is usually an intermediate framework of the protected inner networks and the not much protected outer networks. It protects corporate systems from hackers, attackers, and unintentional accessibility into the corporate network systems. The basic varieties of firewalls are stateful inspectors, proxy servers, and screening routers (Desai et al., 2002). The firewall could confirm both hardware and software appliances. Further, there are various kinds of situations wherein a firewall could start from a basic packet filter to various firewalls. Choosing of firewalls is exceptionally alluring. They would be available in all capacities, shapes, and sizes. They would be designed according to the needs of the customer. The type of firewall being used for installation depends on the size, management, and protection of the system. Before selecting a design on the firewall, organizations need to have an exact understanding of the risk or threat (Dandamudi and Eltaeib, 2015).

Email / Email Spam



Email is known as electronic mail. The word ‘email’ is being used when people make use of the technology (or PCs) for sending and getting correspondence starting from one PC to the next one. The receiving and sending of correspondences are not restricted to words. One could use email for sharing website addresses, poems or photographs which one would like to share with other people (CEFLS, 2016). The email spam would target single users using direct mail messages. The list of email spam is usually made by searching websites for getting addresses, stealing lists of internet mails, or scanning of postings in Usenet. Normally, email spam would cost huge money to the users. Any person who has a phone service measured – would receive or read the mail when the meter runs. Hence, a specific offensive variation in email spam is about sending of spam to private or public mailing records (Mueller, n. d.).

Phishing



Phishing is a conspicuous method of making an end-client to show his/her information or delicate facts to an online hacker, like, credit accounts or password, other financial information, or data which are sensitive. When a famous social website’s fake login page, for instance, Yahoo, Facebook, online payment processors and auction sites are being sent to inattentive or incautious users by a hacker via emails or pages of websites asking for the response, then it marks the start of an attack. Such websites or messages would be created to look like the real website, making it practically inconceivable to the victim to understand the difference. An email might seem to originate from the IT services support or system administrator, which requests that the user carries out a few activities, such as, ‘you are soon going to surpass your capacity limit, please click here to stay active’. When the user might click on the link or give the required data, the attacker would use that data for hacking into the user’s system or an account (Yeboah-Boateng et al., 2002).

Malware



Software that is dreadful is known as the malware. The malware is intended to harm the computer networks without the owner’s knowledge. Utilizing the technique and system development is posturing enormous difficulty for researchers in the industry and in academics. Several programs of the malware are complex and large. Hence, one cannot in any way, have an understanding of each detail (Verma et al., 2013). The malware made by the attackers is metamorphic and polymorphic, which could change the code as they proliferate. In addition, the volume and diversity of their variations seriously erode the efficiency of conventional defenses that commonly make use of methods based on signatures and cannot find the malignant executables which were not known earlier (Gandotra and Bansal, 2014). Giving education to the users of the internet on malware and the exact usage of the anti-malware apparatus are important measures in safeguarding the online buyers’ identity against the various malware strikes (Verma et al., 2013).

Router



A router in technical terms is a gateway device of Layer 3 networks, implying that it links two or more than two of the networks and in the OSI model, the router works at the network layer. Routers have a CPU or processor, various types of I/O or input-output interfaces and digital memory. Routers work as computers having a particular aim, one which does not need a display or keyboard. The memory of the router would store a fixed O/S or operating system. By maintaining the information on the configuration in the memory’s segment known as the routing table, the routers can filter the outgoing and incoming traffic by the addresses of the receivers and the senders. Much before when the home networking systems had become famous, routers were found only in schools and businesses. Routers had become a common consumer usage when the households started accumulating several PCs and tried to share the internet connection available at home…

Cite this Document:

"Internet Terms Essay" (2017, December 11) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/internet-terms-essay-essay-2169274

"Internet Terms Essay" 11 December 2017. Web.26 April. 2024. <
https://www.paperdue.com/essay/internet-terms-essay-essay-2169274>

"Internet Terms Essay", 11 December 2017, Accessed.26 April. 2024,
https://www.paperdue.com/essay/internet-terms-essay-essay-2169274

Related Documents

Internet Service Provider (ISP) Web Content Law and Ethics The objective of this work is to answer whether Internet service providers have a responsibility to regulate the content that is available on the World Wide Web? This work will additionally answer as to whether the presence and ease of availability of pornography to the general public a tribute to free speech and a reflection of social maturity or an example of

Internet Media and Its Impact on Shaping Global Economy Internet Media its Impact Shaping Global Economy Internet Media is the means through which information is conveyed to people through cables that are linked together at a certain workstations. Today, Internet media is everywhere and it has become so difficult to avoid it. The use of Internet by people has revolutionized the consumer interacts and their businesses. The use of Internet has become

Internet Fraud Every day, fraudsters and hackers find new ways of making a quick buck via the internet. In that regard, the need to familiarize oneself with the principles and measures necessary to avoid falling victim to internet fraud cannot be overstated. This text largely concerns itself with internet fraud and the measures individuals should take to protect both themselves and their businesses from the same. Internet Fraud: An Overview Fraud according to

" Moreover, users can contact Lynn Tracey with any questions related to the content contained on the Webs site, which increases the author's credibility. The content contained on the Web site is presented in a unique way. Much of the Web site is for students who need to look up their course syllabi. Assignments, readings, and other classroom materials are also offered by Tracey on her Web site. There is no

Internet Marketing Strategy of Argos The purpose of this essay is to examine the Internet marketing strategy of Argos. Argos is a home retail group and market leader in retail sales of home and general merchandise. Argos reports that it is a "unique multi-channel retailer recognized for choice, value, and convenience." (Argos Website, 2011) Argos and the Online Market: Size and Growth Argos customer base is approximately 130 million and reports state that

Internet Security Measures- An Assessment The world of the Internet is truly an amazing and wonderful place where any information on any topic is available, right at your fingertips, with the mere click of a button. The Internet is very much like a huge city where high rises filled with honest people and slums filled with the lower classes coexist side by side; where there are both good people as well