Internet and Email Notes

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

INTERNET AND E-MAIL

Introduction
- In the past, the most efficient way to send and receive messages was through ordinary mails commonly referred to
now days as snail mail. Today, more efficient modes of communication such as through mobile phones and the
Internet have become the choice of many.
Definition of Internet
- A network is a set of connected people or things. The size and shape of a network is determined by the number of
items connected to it, their locations, the needs of the users and the available technology.
- Computers within an office or building can be connected together using transmission media such as cables to
communicate with one another. Such interconnection of computers is referred to as networking.
- Therefore the term Internet refers to the global interconnection of computer networks for the purpose of
communication and resource sharing.
The networks that form the Internet are individually run by government agencies, universities, commercial and
voluntary organizations. No single organization owns or controls the Internet, though there is an Internet Society
(the World Wide Web Consortium – W3C) that coordinates and sets the standards for the use of the Internet.
- Internet can be broken down into two words, inter and net which implies that there is an interconnection of
networks.
- Internet enables millions of computers from different organizations and people to communicate and share resources
globally. Because of its large size and the great volume of information that passes through it, it is sometimes called
an information superhighway.
DEVELOPMENT OF THE INTERNET
- Internet, computer-based global information system. The Internet is composed of many interconnected computer
networks. Each network may link tens, hundreds, or even thousands of computers, enabling them to share
information and processing power. The Internet has made it possible for people all over the world to communicate
with one another effectively and inexpensively. Unlike traditional broadcasting media, such as radio and television,
the Internet does not have a centralized distribution system. Instead, an individual who has Internet access can
communicate directly with anyone else on the Internet, post information for general consumption, retrieve
information, use distant applications and services, or buy and sell products.
- The Internet has brought new opportunities to government, business, and education. Governments use the Internet
for internal communication, distribution of information, and automated tax processing. In addition to offering goods
and services online to customers, businesses use the Internet to interact with other businesses. Many individuals use
the Internet for communicating through electronic mail (e-mail), retrieving news, researching information, shopping,
paying bills, banking, listening to music, watching movies, playing games, and even making telephone calls.
Educational institutions use the Internet for research and to deliver online courses and course material to students.
- Use of the Internet has grown tremendously since its inception. The Internet’s success arises from its flexibility.
Instead of restricting component networks to a particular manufacturer or particular type, Internet technology allows
interconnection of any kind of computer network. No network is too large or too small, too fast or too slow to be
interconnected. Thus, the Internet includes inexpensive networks that can only connect a few computers within a
single room as well as expensive networks that can span a continent and connect thousands of computers.
- Internet service providers (ISPs) provide Internet access to customers, usually for a monthly fee. A customer who
subscribes to an ISP’s service uses the ISP’s network to access the Internet. Because ISPs offer their services to the
general public, the networks they operate are known as public access networks. In the United States, as in many
countries, ISPs are private companies; in countries where telephone service is a government-regulated monopoly,
the government often controls ISPs.
- An organization that has many computers usually owns and operates a private network, called an intranet, which
connects all the computers within the organization. To provide Internet service, the organization connects its intranet
to the Internet. Unlike public access networks, intranets are restricted to provide security. Only authorized
computers at the organization can connect to the intranet, and the organization restricts communication between the
intranet and the global Internet. The restrictions allow computers inside the organization to exchange information
but keep the information confidential and protected from outsiders.
- The Internet has doubled in size every 9 to 14 months since it began in the late 1970s. In 1981 only 213 computers
were connected to the Internet. By 2000 the number had grown to more than 400 million. The current number of
people who use the Internet can only be estimated. Some analysts said that the number of users was expected to top
1 billion by the end of 2005.
- Before the Internet was created, the U.S. military had developed and deployed communications networks, including
a network known as ARPANET. Uses of the networks were restricted to military personnel and the researchers who
developed the technology. Many people regard the ARPANET as the precursor of the Internet. From the 1970s until
the late 1980s the Internet was a U.S. government-funded communication and research tool restricted almost
exclusively to academic and military uses. It was administered by the National Science Foundation (NSF). At
universities, only a handful of researchers working on Internet research had access. In the 1980s the NSF developed
an “acceptable use policy” that relaxed restrictions and allowed faculty at universities to use the Internet for
research and scholarly activities. However, the NSF policy prohibited all commercial uses of the Internet. Under

AGHS COMPUTER STUDIES © 2010 TOPIC: INTERNET AND E-MAIL Page 1


this policy advertising did not appear on the Internet, and people could not charge for access to Internet content or
sell products or services on the Internet.
- By 1995, however, the NSF ceased its administration of the Internet. The Internet was privatized, and commercial
use was permitted. This move coincided with the growth in popularity of the World Wide Web (WWW), which was
developed by British physicist and computer scientist Timothy Berners-Lee. The Web replaced file transfer as the
application used for most Internet traffic. The difference between the Internet and the Web is similar to the
distinction between a highway system and a package delivery service that uses the highways to move cargo from one
city to another: The Internet is the highway system over which Web traffic and traffic from other applications move.
The Web consists of programs running on many computers that allow a user to find and display multimedia
documents (documents that contain a combination of text, photographs, graphics, audio, and video). Many analysts
attribute the explosion in use and popularity of the Internet to the visual nature of Web documents. By the end of
2000, Web traffic dominated the Internet—more than 80 percent of all traffic on the Internet came from the Web.
- Companies, individuals, and institutions use the Internet in many ways. Companies use the Internet for electronic
commerce, also called e-commerce, including advertising, selling, buying, distributing products, and providing
customer service. In addition, companies use the Internet for business-to-business transactions, such as exchanging
financial information and accessing complex databases. Businesses and institutions use the Internet for voice and
video conferencing and other forms of communication that enable people to telecommute (work away from the
office using a computer). The use of e-mail speeds communication between companies, among coworkers, and
among other individuals. Media and entertainment companies run online news and weather services over the
Internet, distribute music and movies, and actually broadcast audio and video, including live radio and television
programs. File sharing services let individuals swap music, movies, photos, and applications, provided they do not
violate copyright protections. Online chat allows people to carry on discussions using written text. Instant messaging
enables people to exchange text messages; share digital photo, video, and audio files; and play games in real time.
Scientists and scholars use the Internet to communicate with colleagues, perform research, distribute lecture notes
and course materials to students, and publish papers and articles. Individuals use the Internet for communication,
entertainment, finding information, and buying and selling goods and services.
- The term Internet access refers to the communication between a residence or a business and an ISP that connects to
the Internet. Access falls into three broad categories: dedicated, dial-up, and wireless. With dedicated access, a
subscriber’s computer remains directly connected to the Internet at all times through a permanent, physical
connection. Most large businesses have high-capacity dedicated connections; small businesses or individuals that
desire dedicated access choose technologies such as digital subscriber line (DSL) or cable modems, which both use
existing wiring to lower cost. A DSL sends data across the same wires that telephone service uses, and cable
modems use the same wiring that cable television uses. In each case, the electronic devices that are used to send data
over the wires employ separate frequencies or channels that do not interfere with other signals on the wires. Thus, a
DSL Internet connection can send data over a pair of wires at the same time the wires are being used for a telephone
call, and cable modems can send data over a cable at the same time the cable is being used to receive television
signals. Another, less-popular option is satellite Internet access, in which a computer grabs an Internet signal from
orbiting satellites via an outdoor satellite dish. The user usually pays a fixed monthly fee for a dedicated connection.
In exchange, the company providing the connection agrees to relay data between the user’s computer and the
Internet.
- Dial-up is the least expensive access technology, but it is also the least convenient. To use dial-up access, a
subscriber must have a telephone modem, a device that connects a computer to the telephone system and is capable
of converting data into sounds and sounds back into data. The user’s ISP provides software that controls the modem.
To access the Internet, the user opens the software application, which causes the dial-up modem to place a telephone
call to the ISP. A modem at the ISP answers the call, and the two modems use audible tones to send data in both
directions. When one of the modems is given data to send, the modem converts the data from the digital values used
by computers—numbers stored as a sequence of 1s and 0s—into tones. The receiving side converts the tones back
into digital values. Unlike dedicated access technologies, a dial-up modem does not use separate frequencies, so the
telephone line cannot be used for regular telephone calls at the same time a dial-up modem is sending data.
How Information Travels Over The Internet
- All information is transmitted across the Internet in small units of data called packets. Software on the sending
computer divides a large document into many packets for transmission; software on the receiving computer regroups
incoming packets into the original document. Similar to a postcard, each packet has two parts: a packet header
specifying the computer to which the packet should be delivered, and a packet payload containing the data being
sent. The header also specifies how the data in the packet should be combined with the data in other packets by
recording which piece of a document is contained in the packet.
- A series of rules known as computer communication protocols specify how packet headers are formed and how
packets are processed. The set of protocols used for the Internet is named TCP/IP after the two most important
protocols in the set: the Transmission Control Protocol and the Internet Protocol. TCP/IP protocols enable the
Internet to automatically detect and correct transmission problems. For example, if any network or device
malfunctions, protocols detect the failure and automatically find an alternative path for packets in order to avoid the
malfunction. Protocol software also ensures that data arrives complete and intact. If any packets are missing or
damaged, protocol software on the receiving computer requests that the source resend them. Only when the data has

AGHS COMPUTER STUDIES © 2010 TOPIC: INTERNET AND E-MAIL Page 2


arrived correctly does the protocol software make it available to the receiving application program, and therefore to
the user.
- Hardware devices that connect networks in the Internet are called IP routers because they follow the IP protocol
when forwarding packets. A router examines the header in each packet that arrives to determine the packet’s
destination. The router either delivers the packet to the destination computer across a local network or forwards the
packet to another router that is closer to the final destination. Thus, a packet travels from router to router as it passes
through the Internet. In some cases, a router can deliver packets across a local area wireless network, allowing
desktop and laptop computers to access the Internet without the use of cables or wires. Today’s business and home
wireless local area networks (LANs), which operate according to a family of wireless protocols known as Wi-Fi, are
fast enough to deliver Internet feeds as quickly as wired LANs.
- Increasingly, cell phone and handheld computer users are also accessing the Internet through wireless cellular
telephone networks. Such wide area wireless access is much slower than high-capacity dedicated, or broadband,
access, or dial-up access. Also, handheld devices, equipped with much smaller screens and displays, are more
difficult to use than full-sized computers. But with wide area wireless, users can access the Internet on the go and in
places where access is otherwise impossible. Telephone companies are currently developing so-called 3G—for
“third generation”—cellular networks that will provide wide area Internet access at DSL-like speeds.
Network Names and Addresses
- To be connected to the Internet, a computer must be assigned a unique number, known as its IP (Internet Protocol)
address. Each packet sent over the Internet contains the IP address of the computer to which it is being sent.
Intermediate routers use the address to determine how to forward the packet. Users almost never need to enter or
view IP addresses directly. Instead, to make it easier for users, each computer is also assigned a domain name;
protocol software automatically translates domain names into IP addresses.
- Users encounter domain names when they use applications such as the World Wide Web. Each page of information
on the Web is assigned a URL (Uniform Resource Locator) that includes the domain name of the computer on
which the page is located. Other items in the URL give further details about the page. For example, the string http
specifies that a browser should use the http protocol, one of many TCP/IP protocols, to fetch the item.
- Internet applications, such as the Web, are based on the concept of client/server architecture. In a client/server
architecture, some application programs act as information providers (servers), while other application programs act
as information receivers (clients). The client/server architecture is not one-to-one. That is, a single client can access
many different servers, and a single server can be accessed by a number of different clients. Usually, a user runs a
client application, such as a Web browser, that contacts one server at a time to obtain information. Because it only
needs to access one server at a time, client software can run on almost any computer, including small handheld
devices such as personal organizers and cellular telephones. To supply information to others, a computer must run a
server application. Although server software can run on any computer, most companies choose large, powerful
computers to run server software because the company expects many clients to be in contact with its server at any
given time. A faster computer enables the server program to return information with less delay.
IMPORTANCE OF INTERNET
- The Internet is an extensive system of interlinked yet independent networks. It has evolved from a specialized
communication network previously only used for military and academic purposes, to a public network that is
changing the way people carry out their daily activities.
- It is playing an important role in all aspects of life, leading to the emergence of an elite society called the
Information society.
- The Internet’s importance can be seen through its contribution to research, news and information dissemination,
leisure and communication, businesses and other profitable activities.
Some of the major uses of Internet includes:-
a) It provides Communication services.
Some of the services offered include:-
E-mail:-
- It is a quick, convenient, efficient and cheap way to communicate with both individuals and groups
Chat: -
- It is a real-time one-to-one or group conversation, with discussions in typed form. One needs to be connected to
Internet and join a channel to be able to chat. The recent chatting site is Facebook which enables people to be able
to chat with their friends who are far.
- Facebook is a social networking website that is operated and privately owned by Facebook, Inc. Users can add
friends and send them messages, and update their personal profiles to notify friends about themselves. Additionally,
users can join networks organized by city, workplace, school, and region. The website's name stems from the
colloquial name of a book given to incoming students at Zuckerberg's high school alma mater, Phillips Exeter
Academy. The book shows the faces and names of the school's students and faculty
Conferencing:-
- Holding of conference using information technology: the holding of a conference, meeting, or discussion in
which the participants are linked by telephone audioconferencing, by telephone and video equipment
videoconferencing, or by computer computer conferencing – in the context of a structured conversation organized

AGHS COMPUTER STUDIES © 2010 TOPIC: INTERNET AND E-MAIL Page 3


by item and allowing a participant to contribute spontaneous responses to any item in the conversation. The goal
of the conversation may be decision-making, technical support, community building, distance learning/education,
electronic meetings etc.
Health sector
- It provides information, daily news and other resources about health. The Internet allows one to access
inaccessible or prohibitively expensive foreign expertise, and it makes it possible for hospitals in one country to
use consultants or even surgeoens in another country e.g. Kenya and USA respectively.
- It also enables one to get first-hand information on the latest development in the field of medical research and
drugs. For example, the latest information about the development in the search for cure for the HIV/AIDS
epidemic.
News and information
- The Internet allows one to get headlines and in-depth stories on everything from the latest political going-on. It
also provides information on weather around the globe, travel information and tourist guides, entertainment. It
also provides the latest information in the world of sports like football, athletics etc.
Job opportunities
- Currently, employers use the Internet to advertise for vacancies in their organizations. Job seekers can post their
curriculum vitae to potential employers.
- It also provides information on interview tips and techniques.

Commerce and industry


- It facilitates trade on the world economy which has great impact. Traditional method used in the past like telephone,
fax etc are now being replaced by modern technology. This has resulted to new-buzz word called e-business or e-
commerce.
Benefits to business include:-
i. It enables faster and cheaper communications with suppliers and consumers via e-mail.
ii. It enables business people to advertise and sell their products to the entire world throughout the year.
iii. Ability to select the best, most appropriate and cheapest raw materials for products from a world-wide
source.
iv. It has lead to a seamless online supply-distribution chain. Customers can order goods online, retailers and
manufacturers can order supplies online, and suppliers can process orders online.
b) Speedy, Inexpensive communication
- The internet provides a speedy, inexpensive and convenient means of communication via electronic mail (e-mail).
The e-mail allows one to get in touch with many friends and business contacts world-wide.
c) Education sector.
Books
- In many developing nations e.g. Kenya, many schools lack enough reference materials in their libraries and where
they are available, they lack up-to-date books and reference materials.
- The few books and reference materials available are too expensive for the schools and teachers/lecturers. The use of
Internet makes it possible for the developing nations to be able to have access to the current and up-to-date materials
for instructors and their students. For example, the latest information about the new Operating system called
Microsoft Windows 7.
In-Service Training for Teachers/Lecturers
- Lack of in-service training for teachers/lecturers has contributed to low quality education in many developing
nations.
- Through the use of Internet, it enables trainees to have access to reference materials and self-paced “in-service” that
equips them with the latest new technologies and up-to-date skills.
Virtual learning
- Methods of instruction that utilize different communications technologies to carry teaching to learners in different
places. Distance education programs enable learners and teachers to interact with each other by means of computers,
artificial satellites, telephones, radio or television broadcasting, or other technologies. Instruction conducted through
the mail is often referred to as correspondence education, although many educators simply consider this the
forerunner to distance education. Distance education is also sometimes called distance learning. While distance
learning can refer to either formal or informal learning experiences, distance education refers specifically to formal
instruction conducted at a distance by a teacher who plans, guides, and evaluates the learning process. As new
communications technologies become more efficient and more widely available, increasing numbers of elementary
schools, secondary schools, universities, and businesses offer distance education programs.
- This method of education can be especially valuable in developing countries. By reaching a large number of
students with relatively few teachers, it provides a cost-effective way of using limited academic resources. Many
businesses use distance education programs to train employees or to help them update skills or knowledge.
Employees may take such programs in the workplace or at home in their spare time .
AGHS COMPUTER STUDIES © 2010 TOPIC: INTERNET AND E-MAIL Page 4
d) E-Commerce
Online Shopping
- The Internet has enabled people to carry out online buying and selecting of items without travelling. This is carried
out through Web-based shopping malls to take advantage of everything - from online grocery shopping to back-to-
school shopping.
- One looks for the item he wants to purchase and makes payment through a credit card, and then the goods are
delivered to his home.
Online Banking
- The Internet has enabled people to check their bank statements, transfer funds, even make payments from home.
Such kind of transactions they require secure connections so that the information transmitted cannot be obtained by
unauthorized people.
Online Travel Arrangements
- The Internet has enabled people allover the world to be able to make reservations (booking) for holidays, hotels,
flights from their homes like Kenya Airways. They can be able to check out the latest travel news and confirm train
and ferry times before they set out.
e) Newsgroups
- The newsgroups or electronic discussion groups allow people to discuss and exchange information on a vast array of
topics. The discussion groups range from social issues to scientific and research.
f) Software downloading
- On the Internet, there are a variety of software which users can download and use. The available software for
downloading is free (public domain). The software’s are useful for both students and learning institutions that can
not afford expensive software.
- It enables users to get updates of different software like computer antivirus program updates, and Music or Video
samples which are also downloaded from the Internet.
g) Linking to Traditional Communication Media.
Through the use of Internet, it enables one to be able to access traditional media:-
Telephone: - It enables the transmission of voice over the Internet thus; this enables telephone conversation including
international calls at local charges through the Internet e.g. discussions on BBC.
Radio/TV: - Some radio and television stations have looped their channels into the Internet, by using YouTube so that
they can give a more global audience access to their live programmes. For example, Nation TV, Radio Citizen plus TV,
CNN (Cable News Network), BBC etc.
Short Message Service (SMS):- The SMS can be sent through the Internet to any network globally, unlike the trend
where local networks can only be reached in a limited number of networks.
Banking: - Banks world wide enable their customers to access their accounts using their mobile telephones. They enable
customers to make electronic payment for bills straight from their mobile telephones.

INTERNET CONNECTIVITY REQUIREMENTS


a. Data terminal equipments
b. Transmission media
c. Internet service provider
d. Software

1. DATA TERMINAL EQUIPMENTS


- They are devices used to process, host and transmit data on a network. Examples include personal computers,
mobile phones, personal digital assistant (PDAS).
2. TRANSMISSION MEDIA
- They are physical or wireless pathways used to transmit data and information from one point to another. Examples
include telephone lines, radio waves, microwaves and satellite.
a. Telecommunication lines
A computer is connected to the Internet using a telephone line and has to dial a remote computer via a device known
as a modem.
- A remote computer is a computer to which a user does not have physical access but which he or she can access or
manipulate via some kind of network.
- Computer information is stored in digital form whereas information transmitted over telephone lines is transmitted
in the form of analog waves.
- Therefore a Modem is device that enables computers, facsimile machines, and other equipment to communicate with
each other across telephone lines or over cable television network cables. Alternatively, a modem is a device that
converts between analog signals, such as sound waves, and digital signals, which are used by computers.
- Modems transmit data at different speeds, measured by the number of bits of data they send per second (bps). A 28.8
Kbps modem sends data at 28,800 bits per second. A 56 Kbps modem is twice as fast, sending and receiving data at
a rate of 56,000 bits per second.

AGHS COMPUTER STUDIES © 2010 TOPIC: INTERNET AND E-MAIL Page 5


- An analog modem converts the digital signals of the sending computer to analog signals that can be transmitted
through telephone lines. When the signal reaches its destination, another modem reconstructs the original digital
signal, which is processed by the receiving computer. A standard analog modem has a maximum speed of 33.6
Kbps.
- The word modem is an acronym formed from the two basic functions of an analog modem: modulation and
demodulation. To convert a digital signal to an analog one, the modem generates a carrier wave and modulates, or
adjusts, it according to the digital signal. The kind of modulation used depends on the application and the speed of
operation for which the modem is designed. The process of receiving the analog signal and converting it back to a
digital signal is called demodulation.
Diagram
Telephone lines

Analog signal

Digital signal

Modem

Sending computer Modem Receiving computer

Sending of data via a telephone line

Since dial-up connection is slow and unreliable, it is being replaced by dedicated digital leased lines and fibre optic
cables.

b. Satellite transmission
Intercontinental transfer of data is achieved by having satellite base stations transmitting the data through a wireless
uplink channel to the satellite. The satellite then sends the data signal to the base station on another continent where
it is picked up and sent to telephone exchanges for transfer to the destination computer.

c. Wireless telecommunication
- With the dynamic growth in mobile communication and computing, it is now possible to access Internet using
devices such as mobile phones, PDAs and notebook, PCs. Wi-Fi, an abbreviation for wireless fidelity, is a wireless
communication technology that can provide connections between portable computers and wired connections to the
Internet. To connect users with the Internet, Wi-Fi devices use low-power transmitters and receivers equipped with
special computer chips containing radio modems. The chips can be installed in laptop computers, personal digital
assistants (PDAs), and cellular telephones.
- Global system for mobiles (GSM) provides a wireless connectivity to mobile devices users known as General Packet
Radio Service (GPRS). The GPRS core network is the centralized part of the GPRS system. The GSM also provides
support for WCDMA (Wide band Code Division Multiple Access) based 3G (3rd Generation) networks. 3G is a
family of standards for mobile telecommunications defined by International Telecommunication Union (ITU).
Services offered by 3G include wide-area wireless voice, telephone, video calls and wireless data all in a mobile.
Compared to 2G and 2.5G, 3G allows simultaneous use of speech and data services at a higher data rate of up to
14.0 Mbit/s on downlink and 5.8Mbit/s on the uplink. 3G they were developed to facilitate growth, increase
bandwidth and support more diverse application
3. INTERNET SERVICE PROVIDERS.
- Also referred to as Internet Access Providers. These are companies that offer internet services to end users. The ISP
connects to its customers using a data transmission technology appropriate for delivering internet Protocol
datagram’s, such as dial-up, DSL, cable modem, wireless or dedicated high-speed interconnects.
- The ISP provides Internet e-mail accounts to users; they remotely store data on behalf of their customers as well as
other services unique to each particular ISP.
- ISP’s employ a range of technologies to enable consumers to connect to their network. Typical home user
connection use:-
a. Dial-up
b. DSL
c. Asymmetric Digital Subscriber Line. (ADSL)
d. Broadband wireless access

AGHS COMPUTER STUDIES © 2010 TOPIC: INTERNET AND E-MAIL Page 6


e. Cable modem
f. Integrated Services Digital Network (ISDN).
g. Wi – Fi.
Typical business type:-
a. DSL
b. SHDSL
c. Ethernet technologies.
In Kenya there are different ISP companies which include:- AccessKenya, SwiftGlobal, Jambonet, Todays online,
Africaonline, Interconnect, Wananchi online.
4. SOFTWARE
A computer must be installed with internet software to facilitate access to Internet services. The software’s include
Internet Protocol, a browser and e-mail client.
a. Internet Protocol
- Since Internet interconnects millions of computers and telecommunication devices that have different hardware and
software configurations to bridge the gap, software known as Internet Protocol is needed.
- A protocol is a set of rule that governs how two computers can sent and receive data on the network.
- For the Internet, the protocol used is the Transmission control protocol and Internet protocol (TCP/IP). As the name
suggests, TCP governs how data is transferred from one place to the next, while IP determines the addressing system
on the Internet. For example, each network and computer on the Internet is recognized by a special number called
the IP address that enables data to be sent and received by it.
b. Browser (Web browser)
A browser is a program that lets the user surf or browses the Internet. One can be able to view text, pictures,
animations, videos, hear sound make up Websites etc.
Examples include Microsoft Internet Explorer, Mozilla Firefox and Netscape navigator.
c. E-mail software
E-mail client on the other hand is a software that enables the user to receive, compose and send e-mails.
Examples include: - Microsoft Outlook Express, Eudora, Yahoo mail, Gmail etc.

INTERNET SERVICES
There are different services offered on the Internet; this includes the following:-
a. World wide web
The World Wide Web (www) can be viewed as a vast virtual space on the Internet where information is made
available. The web is basically made up of Web pages, Web sites and Links.
Web Pages – It is a single screen of information which may contain text, images, animation and perhaps sound and
video.
Web Sites – It is a group of related web pages or other resources located on a web server. The first page on a website
is called a home page.
Links – To move from one Web page to another within a Web site, or to another Web sites altogether one has to
find a Hypertext or Hypermedia on the Page you are viewing.
Other sites where information is made available on the web include:-
Web Portals: - They offer specialized services such as searching, e-mail, sports updates, financial, news and links to
selected websites.
A blog – a website that contains personal information which can easily be updated. Some blogs acts as resume, diary
and may be used for business, advocacy and campaign purposes.
Multimedia sites contain photos, movies, music, web TV and internet radio. They are mean for entertainment.
- To enable easier access to information and data on the Internet, a standard method of preparing documents
accessible on the Internet was developed.
- This method uses a special language such as Hypertext Markup Language (HTML) to prepare documents called web
pages. To access information on websites portals or blogs, you type that site’s Uniform Resource Locator (URL)
simply known as address.
- URL (Uniform Resource Locator) is the Internet address of a particular web page.
Structure of URL.
It has two basic parts: a portion specifying the method of file access and a portion specifying the Internet location
of the file to be accessed.
Example
http://www.Alliancegirls.ac/admission.html
 Method of file access.
The first part of the URL ending with a: //, indicates the type of file access that is permitted from the
Internet. The preceding example, http:// tells the “server” that the file requested is of type “http” –
(HyperText Transfer Protocol). Other commonly used include File Transfer Protocol (FTP)
 Internet location of the file.
It specifies the Internet address of the machine housing the file and the location of the file at that Internet
address. In the example www.Allianceugirls.ac specifies the IP address of the http server that houses the

AGHS COMPUTER STUDIES © 2010 TOPIC: INTERNET AND E-MAIL Page 7


file. The rest of the URL address gives the location of the file on the machine. For example in the URL
address: http://www.Alliancegirls.ac/admission.html the file being accessed is called admission.html on a
machine with IP address www.Alliancegirls.ac and running on the http protocol.

b. Electronic mail and fax


An electronic mail simply referred to as e-mail is a message transmitted electronically over the Internet. One
requires sending and receiving e-mails by opening an e-mail account.
Other than sending and receiving e-mails one can also use the computer to receive and send fax messages in place of
using an ordinary fax machine.
c. Instant messaging
It is a more enhanced messaging service that allows two or more people to communicate directly. For one to get
services, you must first register with an instant messenger such as Yahoo! Messenger.
d. Electronic commerce (E-Commerce)
- Many companies are increasingly using the Internet to sell and buy goods and services. This new business strategy
where goods and services are sold over the Internet is called electronic commerce (e-commerce).
- One advantage of e-commerce is that, a company can access customers allover the world and is not limited by space
and time.
Hence small companies that establish websites auction their goods and services not only reduce operating costs but
increase their sales. For example most vehicle importers buy vehicles directly from international dealers by
accessing their websites and placing orders. However, the major challenges that face e-commerce is that, people deal
with each without ever meeting physically and there lacks of proper laws to govern such businesses.
The key business processes that are carried out by E-commerce include: procurement, order entry, transaction
processing, payment, inventory, fulfillment, and customer support.
e. Electronic learning (E-learning)
This involves learning through electronic means. This has gained momentum in the recent past due to development
in ICT (Information and Communication Technology). Open learning is one example of e-learning service where
learning materials are made available online over the Internet.
f. Newsgroups
They are organized groups of Internet users who wish to share ideas and interests. Once you join a newsgroup, one
can participate in discussion forums and debates.
g. Searching
Search engines are specialized programs that help the user easily search for information on the Internet. Examples
are; Google, Alta vista, Excite and Yahoo. Searching tips include:-
- Indentify a search engine
- Enter the keywords in the search textbox. Be as precise as possible.
- Use quotation marks to identify the keywords.
ACCESSING INTERNET SERVICES
Browsing the web
- Browsing is also referred to as surfing is to explore or navigate from one website to another. There are different web
browsers which include Microsoft Internet Explorer, Netscape Navigator etc.
Search Engines
- A search engine is a program that searches documents for specified keywords and returns a list of the documents
where the key words were found. There are various search engines which includes:- Google, Yahoo search, Alta
vista, Excite etc.
Uniform Resource Locator
The URL, simply referred to as the web address, connects the user to a particular website. The URL has two basic parts:-
a. Protocol – standard used to connect to the resource e.g. hypertext transfer protocol (http ://) and file transfer
protocol (ftp ://). For example if one types http://www.google.co.ke , Google homepage will be displayed.
b. Domain name: - name of the web server where the resource is located.
Hyperlinks
- It is an element in an electronic document that links to another place in the same document or to an entirely different
document. They are used to navigate from one web page to another.
Downloading web pages
- The term downloading refers to copying data from the main source to a peripheral device. It can also be referred as
copying a file from a network file server to a computer on the network.
- The opposite of download is upload – which means to copy a file from your computer to another computer.
To download web content:-
1. Connect to the webpage to be downloaded or;
2. On the File menu choose File, then click Save File As
3. Select the destination folder, then click Save.
Printing a web page
- Printing involves production of a hardcopy or a printout through a printer (printout of data stored in a computer). A
printout is considered hard because it is physically on a paper, whereas a soft copy exists only electronically.

AGHS COMPUTER STUDIES © 2010 TOPIC: INTERNET AND E-MAIL Page 8


ELECTRONIC MAIL (E-MAIL)
- An electronic mail simply referred to as e-mail is a message transmitted electronically over the Internet. To create,
receive and send electronic mails (e-mails), a special e-mail program (software) such as Microsoft Outlook Express,
Yahoo mail, Gmail and Eudora are required. To launch an e-mail program from Start menu or Taskbar.
E-mail facilities:-
One can perform a number of tasks using e-mail facilities: - checking your mails, compose, send, attach or even forward
mails.
Checking for mails in Yahoo
To use Yahoo mail, you first sign up for an e-mail account. Yahoo assigns each user a unique user name referred to as an ID
and a password.
To open an e-mail in Yahoo mail:-
- Sign in using your ID and password.
- Click check mail button then Inbox.
The e-mails usually are stored in separate folders as described bellow.
a. Inbox – all incoming e-mails are stored here. It contains other folders so that you can organize your e-mails.
b. Outbox – contains e-mails that are awaiting to be sent.
c. Drafts – contain e-mails that are being worked on and are not yet ready to be sent.
d. Deleted Items – contains e-mails that have been deleted. You recover a deleted e-mail as long as you have not
emptied this folder.
NB:-
The e-mail software helps in sending and reception of electronic mails; they also help in data transmission, storage and
provision of data security. For example for one to access his/her e-mail, he must provide user name and password for you to
be able to access the mailbox.
Composing and sending an E-mail
- Before sending an e-mail, one needs to create it first. To create the mail, you start with a Compose Mail, Create Mail
or New Mail Message command.
- Type the recipient address or get it from the address book. Type in the subject of the message. Type in the message
in the message box. Click the send button.
- A typical e-mail compose window has three basic elements:-
1. Header
The E-mail header is made up of the following parts:-
To: Here you enter the e-mail address of the recipient
From: Here, the e-mail software will enter your address
Subject: It contains a few words outlining the nature of your message. It is not mandatory to enter something here, but it
generally helps the recipients to know what is contained in the e-mail.
CC: Stands for carbon copy, and is used to copy an e-mail to other recipients. The main recipient is able to see who the
e-mail has been copied to.
BCC: Stands for blind carbon copy, meaning that a copy of your message is sent to an extra address without any
indication of that action appearing in the main recipient’s copy of the message.
Date: The date and time the message is sent.
2. Message
This is the content of the e-mail. It is typically short and to the point. It may include text and graphics.
3. Signature
The signature provides additional information about the sender such as full name, address and telephone number.

E-mail address format


Just like the normal postal address, an e-mail address determines the destination of the e-mail sent.
A typical e-mail address would look like this:-
1 2 3 4 5

[email protected]
1. Aghschool - is the user name and is usually coined by the user during e-mail account register.
2. @ - is the symbol for “at” which separates the user name from the rest of the address.
3. yahoo – is the name of the host computer in the network i.e. the computer on which the e-mail account is hosted.
4. The period “.” – is read as dot and is used to separate different parts of the e-mail address.
5. com – identifies the type of organization offering a particular service(s) and is called the domain, meaning it is a
commercial institution.
Other commonly used domains include:-
Domain Type
.edu Educational institution
AGHS COMPUTER STUDIES © 2010 TOPIC: INTERNET AND E-MAIL Page 9
.gov Government institution
.org Non-profit making organization
.mil Military organization
.co Commercial institution
.net An institution or organization offering networking services
.ac An academic institution

Sometimes a two letter extension is added after the domain name to show the country where the site is located e.g. in
the address [email protected]
The domain .ke stands for Kenya. Other domain names include .uk (United Kingdom), .us (United States), .ug
(Uganda), .tz (Tanzania), .jp (Japan), .au (Australia).
File attachment
The way you would attach a document such as a resume to an ordinary mail, one can also attach a file to an e-mail. A file
may contain pictures, video or text etc.
To attach a file to an e-mail:-
1. Click the Attachment button on the toolbar.
2. In the dialog box that appears, select the file(s) to attach.
3. Click Attach button to attach the files.
Contacts management
To avoid typographical errors when entering an e-mail address, add the contacts in the address book.
To add a contact in Yahoo mail:-
1. Click the e-mail address of the sender.
2. Click Add to contacts button
3. Enter other contacts details.

Online Meeting (Net meeting)


Microsoft Corporation developed a product that enables groups to teleconference using the Internet as the transmission
medium. NetMeeting supports VoIP (Voice over Internet Protocol), chat sessions, application sharing etc.
Teleconferencing
- It refers to holding a conference via a telephone or network connection.
Video-conferencing
- It involves conducting a conference between two or more participants at different sites by using computer networks
to transmit audio and video data. Example point-to-point (two people) video conferencing system works much like a
video telephone. Each participant has a video camera, microphone, and speakers mounted on his computer.
- As the two participants speak to one another, their voices are carried over the network and delivered to the other’s
speaker and whatever image appear in front of the video camera appear in a window on the other participant’s
monitor.
- Multipoint videoconferencing allows three or more participants to sit in a virtual conference room and communicate
as if they were sitting right next to each other.
EMERGING ISSUES
Although Internet is such an important resource, it has also brought with some challenges. This includes:-
a. Accessibility to dirty sites: - such as pornography by the young hence affecting their morals. This has resulted to
premarital sex, drug and substance abuse. The solution to this problem is to restrict the known offensive sites using
filter programs such as CyberPatrol, Cybersitter or Net Nanny.
b. Security and privacy: - Internet has made it easy for criminals to illegally access organizations private information
hence posing security concerns. To improve on security, install a Firewall and antispyware programs.
c. Spread of malicious software: - this includes virus like; Trojan horse and worm. These results to frustrations and
loss of data. Install Internet security programs and update them regularly.

AGHS COMPUTER STUDIES © 2010 TOPIC: INTERNET AND E-MAIL Page 10


END OF TOPIC

AGHS COMPUTER STUDIES © 2010 TOPIC: INTERNET AND E-MAIL Page 11

You might also like