Вы находитесь на странице: 1из 18

LESSON ELEVEN: THE INTERNET AND WORLD WIDE WEB

Introduction
The origin of cyber technology on which web applications operate is the Internet. The Internet is
a network that links millions of computers around the world. It is an interconnection of various
networks across the globe. The Internet started not quite long ago, but now it has become a
viable tool for every progressive mind in research, business, commerce, industries,
communications, manufacturing etc. It is useful to all categories of people irrespective of interest
or profession engineers, scientists, pilots, philosophers, pastors and Islamic scholars to mention
just a few. The Internet has revolutionised how people use computers in home, business, at work,
on journey, at leisure etc. Many people depend on it daily to communicate with others, do
business transactions, play games and watch movies, get the information they need and many
others.
Network Systems
The marriage of computers with data communications is one of the most important and exciting
developments in data processing. Data transmission or communication is the process of
electronically sending data from one point to another. Data transmission can be achieved by
linking or connecting computers in a building, city a country or over a continent. When
computers are connected over a wide area they need other services like a microwave, telephone
lines etc.
There are three basic elements of any communication process which are: A sender (source) which creates the message to be transmitted.
A medium which carries the message
A receiver which receives the message.
Medium
Sender (source)

Receiver
Carries the
message

Creates the message


Data communication is the function of transporting data from one point to another. The sender and
the receiver are always machines (computer devices) like computers, terminals, peripheral devices
like line printers, disks, and the transmission medium may be telephone lines, microwave links,
satellite links etc. The electronic systems that transfer data from one point to another are called data
communication systems. Unlike computers that process and rearrange data, data communication
systems transmit data from one point to another without any change.
A network is a system of interconnected computers, telephones or other communication devices
that can communicate with one another and share applications of data. A network computing
environment is one in which an organization has linked together personal computers that have been

connected into a network. A network environment can range in sophistication from very simple to
very complex.
Some networks are used to support simple electronic mail communication. In other networks,
employees may be able to share documents with each other and carry out the work of their work
groups, project teams, etc. by exchanging electronic documents through e-mail. The most
sophisticated organisations may have automated entire work processes. For instance, draft
documents such as responses to letters sent to senior officials, are sent through various approval
levels (such as action officer to manager to director to senior official) without ever being printed
onto paper (except perhaps the final version, which needs to be signed by the senior official).
A computer that is not connected to a network is referred to as a stand-alone computer. When a
computer is physically connected to a local area network, using a cable or other communications
channel, the computer becomes a workstation on the network. Each device on the network
including workstations, servers, and printers is referred to as a node. Users of workstations will
also have access to network resources, which typically include application software, storage space
for data files, and printers other than those on the local workstation. A computer that is connected
to the network and that serves or distributes resources to network users is called a Network
Server. On a network, the network server typically provides the applications software and storage
space for data files.
Question 1
Explain any three objectives of networking computer systems
Answer for question one
Objectives of networks
1) Sharing of data- if computers are interconnected, data stored in 1 computer can be shared
by many users who are also within the same network. In order to be able to store large
volume of data for sharing purposes, a computer with large capacity hard disc is used to
offer the storage of the shared data. This computer is called file server.
2) Sharing of peripherals- within a network, especially the LAN it is possible to share some
expensive peripherals e.g. laser printers, graph plotters, large capacity hard disc e.t.c. The
printer server is a computer connected to high-speed printer that can offer printing
services to clients within the network.
3) Communication- by use of the network it is possible to communicate information by e.g.
use of E-Mail, electronic bulleting e.t.c
4) Sharing of applications- an application package can be stored in a network drive. Such
can be downloaded by users within the network.
5) The provision of local facilities without the loss of central control
6) The even distribution of work, processing loads.
7) Sharing of complex software

Question 2
What do you understand by the term Network Computing Environment?
Answer for question two
A network computing environment is one in which an organization has linked together personal
computers that have been connected into a network. A network environment can range in
sophistication from very simple to very complex. Some networks are used to support simple
electronic mail communication. In other networks, employees may be able to share documents
with each other and carry out the work of their work groups, project teams, etc. by exchanging
electronic documents through e-mail. The most sophisticated organisations may have automated
entire work processes.
TYPES OF NETWORKING
Networks generally fall into one of two broad network categories:
Client-server networks or Server-Based Networks
Peer-To-Peer Networks
Client/Server-Based Networking
A client/server network consists of a group of user-oriented PCs (called clients) that issue requests to a
server. The client PC is responsible for issuing requests for services to be rendered. The servers function
on the network is to service these requests. Servers generally are higher-performance systems that are
optimized to provide network services to other PCs. The server machine often has a faster CPU, more
memory, and more disk space than a typical client machine. The client/server model is a network in
which the role of the client is to issue requests and the role of the server is to service requests.

Advantages of Server-Based Network

Centralized user accounts, security, and access controls to simplify network


administration.
More powerful equipment means more efficient access to network resources.
A single password for network login deliver access to all.
Server-based networking makes the most sense for networks with 10 or more users or any
networks where resources are used heavily.
Disadvantages of Server-Based Network

At worst, server failure leads to whole network failure.


Complex, special-purpose server software requires allocation of expert staff, which
increases expanses.
Dedicated hardware (server) and special software (NOS) add to the cost.
Suitability of Server-Based Network
In the following situations server-based is appropriate.

There are more than ten people in your organization.

Many of the people are not sophisticated computer users.


Your organisation maintains information that must be centrally controlled.
A central administrator will be Assigned for network setup and maintenance

Peer-To-Peer Networking
In a peer-to-peer network, there are no dedicated servers, and there is no hierarchy among the computers.
All the computers are equal and therefore are known as peers. Each computer functions as both a client
and a server, and there is no administrator responsible for the entire network. The user at each computer
determines what data on that computer is shared on the network. Small networksusually with fewer
than 10 machinescan work well in this configuration.

Advantages of Peer-To-Peer Network

Easy to install and configure.

Individual machines do not depend on the presence of a dedicated server.

Individual users control their own-shared resources.

Its inexpensive to purchase and operate.

No additional software or hardware beyond a suitable operating system is needed.

No dedicated administrators are needed to run the network.

It works best for network with 10 of fewer users

Disadvantages of Peer-To-Peer Network

Network security applies only to a single resource at a time.


Users may be forced to use as many passwords as there are shared resources
Each machine must be backed up individually to protect all shared data.
There is no centralized organizational scheme to locate or control access to data.
Not suitable for more than 10 users

Suitability of Peer-To-Peer Network


In the following situations peer-to-peer is appropriate.

There are fewer than ten people in your organization


The people in your organization are sophisticated computer users
Security is not an issue or the user can be trusted to maintain good security
There is no one central administrator who sets network policies.
Costly to have an additional computer just to server files
User can be relied upon to back up their own data
User are physically close and no plans for expansion on the network

Categories of the Networks


Networks come in all shapes and sizes. Networks may be categorized into three distinct groups
depending upon the physical or geographical (size) area that they cover.
These groups are:
Local Area Network (LAN)

Metropolitan Area Network (MAN) And

Wide Area Network (WAN

Local Area Network (LAN)


A local area network (LAN) is a group of computers and network communication devices
interconnected within a geographically limited area, such as a building or a campus. A local area
network is usually privately owned and links the devices in a single office, building or campus of
up to a few kilometers in size. A LAN can be as simple as two PCs and printer in someones
whole office, or it can extend throughout a company and include voice, sound, and video
peripherals. This kind of network usually is within a limited area appropriate within a radius of
25 km.
Wide Area Networks (WANs)
A wide area network (WAN) interconnects LANs. A WAN can be located entirely within a state,
province or a country, or it can be interconnected around the world. A wide area network
provides long-distance transmission of data, voice, image, and video information over a large
geographical area that may comprises a country, a continent or even the whole world E.g.
telephone network in a country. Microwaves and other types of electromagnetic waves received and
transmitted through communication satellites. This is the norm especially for intercontinental
communication.

Metropolitan Area Network


A metropolitan area network is designed to extend over an entire city, suburb or town. It may be a single
network such as a cable television network, or it may be a means of connecting a number of LANs into a
larger network so that resources may be shared LAN-to-LAN as well as device-to-device. A MAN may
be wholly owned and operated by a private company, or it may be a service provided by a public
company, such as a local telephone company. Many telephone companies provide a popular MAN service
called Switched Multi-megabit Data Services (SMDS).

NETWORK TOPOLOGIES
A topology defines the arrangement of nodes, cables, and connectivity devices that make up the
network. Two categories form the basis for all discussions of topologies:
Physical topology-describes the actual layout of the network transmission media.
Logical topology-describes the logical pathway a signal follows as it passes among the
network nodes.
Physical and logical topologies can take several forms. The most Common topologies for
understanding the Ethernet and token-ring topologies are:
Bus topologies
Ring topologies
Star topologies
Mesh topology
Each topology has its own strengths and weaknesses
a) Bus Topologies
A bus physical topology is one in which all devices connect to a common, shared cable
(sometimes called the backbone).
How a Bus Network Works
On a typical bus network, the entire computers are connected to a single cable. When one
computer sends a signals using the cable, all the computers on the network receive the
information, but only one (the one with the address that matches the one encoded in the message)
accepts the information. The rest disregard the message. Only one computer at a time can send a
message; therefore, the number of computers attached to a bus network can significantly affect
the speed of the network. A computer must wait until the bus is free before it can transmit.
Another important issue in bus network is termination. Without termination, when the signal
reaches the end of the wire, it bounces back and travels back up the wire. When a signal echoes
back and forth along the un-terminated bus, it is called ringing. To stop the signals from ringing,
terminators are attached at either end of the cable. The terminator absorbs the signals and stops

the ringing. Terminator must be placed at the end of the backbone cable to prevent signals from
reflecting back on the cable and causing interference

Advantages of Bus topology


The bus is simple, reliable in very small network, and easy to use.

The bus requires the least amount of cable to connect the computers together and is
therefore less expensive than other cabling arrangements.

It is easy to extend a bus. Two cables can be joined into one longer cable with a BNC
barrel connector, making a longer cable and allowing more computers to join the
network.

Disadvantages of Bus topology

Heavy network traffic can slow a bus considerably.

A break in the cable or lack of proper termination can bring the network down.

It is difficult to troubleshoot a bus.

Bus topology is appropriate in following situation:


The network is small
The network will not be frequently reconfigured.
The least expensive solution is required.
The network is not expected to grow much
b)
Ring Topologies
Ring topologies are wired in a circle. Each node is connected to its neighbors on either side, and
data passes around the ring in one direction only. Each device incorporates a receiver and a
transmitter and serves as a repeater that passes the signal on to the next device in the ring.
Because the signal is regenerated at each device, signal degeneration is low

How a Ring Network Works


Every computer is connected to the next compute in the ring, and each retransmit what it
receives from the previous computer. A small packet called the token passed around the ring to
each computer in turn. If a computer has information to send, it modifies the token, adds address
information and the data and sends it down the ring. The information travels around the ring until
it either reaches its destination or returns to the sender. When the intended destination computer
receives the packet, it returns a message to the sender including its arrival. A new token is then
created by the sender and sent down the ring, allowing another station to capture the token and
begin transmission.
A token can circle a ring 200 meters in diameter at about 10,000 times a second.
Advantages of Ring topology
All the computers have equal access to the network.
Even with many users, network performance is even
Allows error checking, and acknowledgement.
Disadvantages of Ring topology
Failure of one computer can affect the whole network.
It is difficult to troubleshoot the ring network.
Adding or removing computers disturbs the network.
Ring Topology is Appropriate in Following Situation:
The network must operate reasonably under a heavy load
A higher-speed network is required.
The network will not be frequently reconfigured.
c) Star Topologies
Star topologies require that all devices connect to a central hub. The hub receives signals from
other network devices and routes the signals to the proper destinations. Star hubs can be

interconnected to form tree, or hierarchical, network topologies. A star physical topology is often
used to implement a bus or ring logical topology.

How a Star Network Works


Each computer on a star network communicates with a central hub that resends the message
either to all the computers (in a broadcast star network) or only to the destination computer (in a
switched star network). The hub can be active or passive. An active hub regenerates the
electrical signal and sends it to all the computers connected to it. This type of hub is often called
a multiport repeater. Active hub requires electrical power to run. A passive hub, such as wiring
panels, merely acts as a connection point and does not amplify or regenerate the signal. Passive
hubs do not require electrical power to run. Using a hybrid hub, several types of cable can be
used to implement a star network. Hybrid hub is used to connect different types of cables. It is
used to maximise the networks efficiency and utilise the benefits different cables.
Advantages of the Star
It is easy to modify and add new computers to a star network without disturbing the rest
of the network. You simply run a new line from the computer to the central location and
plug it into the hub. When the capacity of the central hub is exceeded, it can be replaced
with one that has a larger number of ports to plug lines into (or multiple hubs can be
connected together to extend the number of ports)

The centre of a star network is a good place to diagnose network faults. Intelligent hubs
(hubs with microprocessors that implement features in addition to repeating network
signals) also provide for centralised monitoring and management of the network.
Single computer failure does not necessarily bring down the whole star network.
Several types of cable can be used in the same network with a hybrid hub.
Disadvantages of Star
If the central hub fails, the whole network fails to operate.
It cost more to cable a star network.
Star topology is appropriate in following situation:
It must be easy to add or remove client computer.
It must be easy to troubleshoot.
The network is large.
The network is expected to grow in the future.
d) Mesh Topology
A mesh topology is really a hybrid model representing an all-channel sort of physical topology.
It is a hybrid because a mesh topology can incorporate all the topologies covered to this point. It
is an all-channel topology in that every device is directly connected to every other device on the
network. When a new device is added, a connection to all existing devices must be made. This
provides for a great deal of fault tolerance, but it involves extra work on the part of the network
administrator. That is, if any transmission media breaks, the data transfer can take alternative
routes. However, cabling becomes much more extensive and complicated
Most mesh topology networks are not true mesh networks. Rather, they are hybrid mesh
networks, which contain some redundant links but not all.

Advantages of Mesh
Because of the dedicated link, no traffic between computers.
Failures of one node computer not affect rest of the network.
Because of the dedicated link privacy and security are guaranteed
Point to point links make fault identification and fault isolation easy.
Disadvantages of Mesh
Due to the amount of cabling and number of input output ports, it is expensive.
Large space is required to run the cables.
Installation and reconfiguration are difficult.
When a Mesh Appropriates to Use
Direct transmission is required for privacy reason
Need to have dedicated link for fast transmission.

Variations of the Major Topologies


Hybrid Star
A star network can be extended by placing another star hub where a computer might otherwise
go, allowing several more computers or hubs to be connected to that hub. Often a network
combines several topologies, as subnetworks linked together are a large topology. For instance
one department of business may have decided to use a bus topology while another department
has a ring. The two can be connected to each other a central controller in a star topology
Star Bus Topology

The star bus topology combines the bus and the star, linking several star hubs together with bus
trunks. If one computer fails, the hub can detect the fault and isolate the computer. If a hub fails,
computers connected to it will not be able to communicate, and the bus network will be broken
into two segments that cannot reach each other.
THE INTERNET AND WWW
Internet is a collection of local, regional and national computer networks that are linked together
to exchange data and distribute processing tasks. The Internet is the worldwide, publicly
accessible network of interconnected computer networks that transmit data by packet switching

using the standard Internet Protocol (IP). The Internet can be defined as a collection of
cooperating networks The Internet is not one network, but many networks that are linked
together and which can talk to each other using a common language or protocol (TCP/IP) The
common term for something such as the Internet is internetwork (meaning a network of
networks)

Communicating Computers
Computers connected to a network can communicate with each other. They send each other
information. The programs running on each computer do the actual communication using the
computers communication facilities. A program running on one computer can send information
to another program running on another computer. Under the TCP/IP communication protocol,
one program (program A) can communicate with another program (program B) running on a
different computer if:
Both computers are connected to the same network or Internetwork
Program A knows the address of the computer running program B (the IP
address)
Program A knows the identity of program B on the other computer (the port
number)
Network Protocol
A network protocol is a system of common rules that helps define the complex process of
transferring data. The data travels from an application on one computer, through the computers
network hardware, across the transmission medium to the correct destination, and up through the
destination computers network hardware to a receiving application
A protocol system such as TCP/IP must be responsible for the following tasks:

Dividing messages into manageable chunks of data that will pass efficiently through the
transmission medium.
Interfacing with the network adapter hardware.
Addressing: The sending computer must be capable of targeting data to a receiving
computer. The receiving computer must be capable of recognizing a message that it is
supposed to receive.
Routing data to the subnet of the destination computer, even if the source subnet and the
destination subnet are dissimilar physical networks.
Performing error control, flow control, and acknowledgment: For reliable
communication, the sending and receiving computers must be able to identify and correct
faulty transmissions and control the flow of data.
Accepting data from an application and passing it to the network.
Receiving data from the network and passing it to an application.

TCP/IP
The IP protocol (IP is short for Internet Protocol) is the backbone of the internet, the foundation
on which all else is built. To be a part of the internet a computer must support IP, which is what
is used for all data transfer on the internet. TCP is another protocol (Transmission Control
Protocol) that extends IP with features useful for most high-level protocols such as HTTP. (Lots
of other protocols also use TCP: FTP, Gopher, SMTP, POP, IMAP, NNTP etc.) Some protocols
use UDP instead of TCP. TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic
communication language or protocol of the Internet. It can also be used as a communications
protocol in a private network (either an intranet or an extranet).
Question 3
What do you understand by the term internet service provider (ISP)?
Answer for question three
Internet Service Provider
There are a variety of ways to access the Internet, the most common being through an
Internet Service Provider (ISP). An ISP is a company that charges an ongoing fee for
providing Internet access to businesses, organisations and individuals. The ISP provides the user
with the necessary communications software (such as e-mail) and user account. The user
supplies a modem that connects the computer to the users phone line. The users computer dials
the ISPs computer and establishes a connection over the phone line. The Internet connects
millions of people through a collection of computer networks. More rapid digital data
transmission is now available from some telecoms providers in various parts of the world. The
World Wide Web was created in 1990 as an easy-to-use source of information.

Client-Server Model
The term client-server refers to a particular model of communication between two programs.
The most common model of program communication on the internet. One program is known as
the client while the other program is known as the server. The client program initiates
communication, sending a message in order to make a request. The client typically controls a
user interface, allowing users to enter some data, validating that data, and requesting services
from other programs (servers). The server program replies to requests from the client by sending
a response message. The server typically implements some service, e.g, database operations,
document search, mail server
WORLD WIDE WEB
A computer network system that allows users to browse through information available on
computers round the world. The World Wide Web opened the Internet to millions of people
interested in finding information. There are over one million Web sites around the world and the
number is growing very quickly. The World Wide Web consists of documents called Web pages
that contain information on a particular topic. A Web page might also contain one or more links
that point to other Web pages. Without the internet, there would be no web!
The web is just a way of publishing information, so that it can be accessed by anyone with an
internet-connected computer and special software capable of reading the information available
The web is made up of
Programs running on different computers, which communicate with each other to
request and send information using the client-server model
Web server (server - sends information)
Web browser (client requests information)
Documents
Such as web pages, images, multi-media etc.
Each document has a unique address its URL which can be used to find it
on the web

Question 4
Discuss the cons and dangers relating to the use of internet
Answer for question four
There are certain cons and dangers relating to the use of Internet that can be summarized
Personal Information:
If you use the Internet, your personal information such as your name, address, etc. can be
accessed by other people. If you use a credit card to shop online, then your credit card
information can also be stolen which could be akin to giving someone a blank check.

Pornography:
This is a very serious issue concerning the Internet, especially when it comes to young children.
There are thousands of pornographic sites on the Internet that can be easily found and can be a
detriment to letting children use the Internet.
Spamming:
This refers to sending unsolicited e-mails in bulk, which serve no purpose and unnecessarily clog
up the entire system. Spam can be considered as the least of Internet security threats. The spam
can also bring viruses in the form of attachments and it can also lead to more severe threats.
Virus
Viruses are in the form of email, websites, etc and it also occurs in various types and strengths. A
virus can make your computer to run slow down or it can totally destroy a computer system.
Virus
Malware is also known as malicious software which installs automatically on the computer
without your knowledge. Malware will also help to steal personal information and it can also
take over the computer completely. There are few programs that can be used to remove malware
like the antivirus software.
Denial-of-Service
Denial-of-service attacks are one of the most severe Internet threats where the remote computers
will overtake computers on Internet with the help of viruses.
Security
The silent security is information theft on the internet. Most of the people are aware that identity
theft is a serious problem. The criminals hack into the databases for stealing your identity and
individual information also is stolen easily from the computer.
Web browser:
A software application that enables a user to locate and view pages on a Web site. Also known
as a browser. To request a Web page the user either types in the URL (Uniform Resource
Locator) address or uses a mouse to click on a Web page link. The Web browser is the
gateway to commercial information services as well as the free sites on the Internet. A
commercial information service provides access to computer-based information for a fee. In
1997, approximately 17 million people subscribed to the top four commercial information
services: America On-Line, Compuserve, Microsoft Network and Prodigy. The server sends the
data for the Web page over the Internet to the computer.
The data includes two things: the information the user wants to view and a set of instructions that
tells the browser how to display it. The instructions include specifications for the color of the
background, the size of the text, and the placement of the graphics. Additional instructions tell
the browser what to do when the user clicks on a link. The browsers menu and tool bars help
users navigate the Web as they follow the links. The Back and Forward buttons trace and retrace
the users path through the links being followed from one Web page to another.

The browser stores and can display a list of the pages being visited during each session. The
browser can also store a list of favorite sites, often called bookmarks, to permit the user to jump
directly to the site they wish to see instead of having to enter its URL every time. Users can find
information on the Web by using a search engine. There are a number of Web sites that provide
search facilities, and the Internet Service Provider will links to these sites. A link is a reference
to another document in an environment like the World Wide Web, that users can go to directly
by clicking on the on-screen reference with the computers mouse. Links make it easy to follow
a thread of related information, even if the pages are stored on computers located in different
countries. Every Web page is stored as an HTML (HyperText Markup Language) document.
HyperText Markup Language (HTML) is one of the main standards that controls how the
World Wide Web works. It is an SGML document type definition that determines how Web
pages are formatted and displayed and thus enables information to be exchanged on the World
Wide Web.
Uniform Resource Locator (URL):
The global address of documents and other resources on the World Wide Web. URLs can point
to executable files that can be fetched using FTP (file transfer protocol, ftp://) or a Web page
that can be retrieved using HTTP (hypertext transfer protocol, http://). After the http://, the next
segment of the address is the server name. The server is the computer and software that make
the data available. A Web server, for instance, is a computer that uses. Web server software to
transmit Web pages over the Internet. Most Web servers have domain names prefixed with
WWW.

By entering the Web server name, one accesses the sites home page. Home page is the main
page of a Website. Typically, the home page serves as an index or table of contents to other
documents stored at the website (that is, the address). A Website is a location on the World Wide
Web. A home page is similar to the title page and table of contents in a book. It identifies the site
and contains links to other pages at the site.
Search engine
A program that searches documents for specified keywords and returns a list of documents where
the keywords were found. It can be used to find websites, pages and the Internet files. It is
helpful in locating specific pages for which one does not know the URL. To find a page or pages,
you enter the search word or phrase called search text or keyword on the search bar of the of
the search engine you are using. The search engine locates and retrieves documents matching the

keyword, displays the number of items retrieved and show them on the screen in pages. There
are quite a number of search engines on the Net, each work in a similar way to retrieve the same
or different result of the search a keyword. Some of the search engines support Boolean search
with logical operators such as AND, OR, NOT. Examples are Google, MSN, and Yahoo etc.
Many search engines use a program call a spider. This program reads Web pages in order to
create catalogue or index of hit; to display a list of Web pages that contain the keyword entered
in the search bar.
Question 5
Discuss how the World Wide Web works from the time one searches for a document until the
document is displayed on the Brower.
The web is a huge collection of data stored at many different computers on the Internet
You sit at your computer and want to see a document somewhere on the web, to which you have
the URL. Type the URL into it (at least you tell the browser somehow where you want to go,
perhaps by clicking on a link). For you to be able to read the document the computer that
contains the document must run a web server. A web server is a just a computer program that
listens for requests from browsers and then execute them. That the browser contacts the server
and requests that the server deliver the document to it. The server then gives a response which
contains the document and the browser happily displays this to the user. The server also tells the
browser what kind of document this is (HTML file, PDF file, ZIP file etc) and the browser then
shows the document with the program it was configured to use for this kind of document. These
requests and responses are issued in a special language called HTTP, which is short for
HyperText Transfer Protocol. Other common protocols that work in similar ways are FTP and
Gopher, but there are also protocols that work in completely different ways. HTTP only defines
what the browser and web server say to each other, not how they communicate. The actual work
of moving bits and bytes back and forth across the network is done by TCP and IP, which are
also used by FTP and Gopher
Conclusion
Looking at the trend in scientific research, business activities, entertainment, education,
government and even administration, it becomes imperative for virtually all living literate people
that want to be relevant in this century to have a competent knowledge of what the Internet is,
and at least some experience of its usage. All hands must be on deck to ensure this is done.
Individuals must be ready with prepared mind, also governments and establishments have a lot to
do in the provision of the Internet facilities and equally finance the training of their personnel.
Self-Assessment Excercises
a) Explain the services offered by the Internet.
b) Explain any five uses of the internet.

c) Explain the characteristics/features of the WWW


d) Briefly examine the history of internet.
References
Berners-Lee, T. (1995). The World Wide Web: a Very Short Personal History.
World Wide Consortium (W3C). http://www.w3.org/Berners- Lee/ShortHistory.html.
H. M. Deitel & P.J. Deitel (2008) Internet & World Wide Web How to Program,
M. Tungare (2000) A Practical Guide to A

Вам также может понравиться