Lesson10 ICT 0417
Lesson10 ICT 0417
Lesson10 ICT 0417
This chapter covers certain aspects of using the internet. We will consider
rules and regulations when sending emails and look at several features of
the internet. In particular, we will define and explain many of the internet
terms used and how to search for information on the internet. Part of the
chapter also considers the differences between the internet, the World
Wide Web (WWW) and intranets.
226
Many countries
require senders of
emails to obtain ‘opt-in’
permission before
emails are sent out.
It is important that A company or
emails are not sent out individual must have a
with false or misleading clear way for recipients
subject lines. to ‘opt out’.
Acceptable language
The language used by people when writing emails should follow an acceptable
code of practice. The following is a list of unacceptable content to be used in
emails, text messages and online forums:
» obscene images
» language that is regarded as abusive, profane, inflammatory, coercive,
defamatory or blasphemous
» racist, exploitative or violent messages
» use of illegal materials or messages.
This list does not cover everything, but gives some idea of what is not acceptable
when sending emails. It is not regarded as adequate that recipients can simply
delete images or messages.
It is essential that anyone writing emails, or posting messages on bulletin
boards, etc. is aware of the above constraints.
227
• A
ll employees should only assume they can use a company’s email system for
business use; it is up to companies to decide if personal emails should be permitted
on their systems
• C
ompanies may specify which company devices are allowed to be used for sending
and receiving emails
• T
he acceptable style and tone of emails should be made clear (see sections on
acceptable language and netiquette); there needs to be a company standard style
when sending emails
• It must be made clear what email content is not permitted
• E
mployees should be told to only use their own accounts when sending emails (and
these accounts should be password protected)
• T
here must be clear rules regarding confidentiality of information and that all staff
must be aware of their contractual obligations
• Staff need to be aware of the method and duration of storing emails
• I ncoming emails should only be read by the recipient; they can only be read by another
member of staff if so nominated
• T
he company policy on how to deal with and prevent viruses (and other security
threats) must be clearly laid out (these could include use of anti-virus software,
filtering of incoming and outgoing email traffic, use of auto-responders when staff are
not in work, and so on)
• Monitoring of emails may be carried out and staff must be aware that the company
has the right to read all emails
• S
uitable ongoing training will take place to ensure staff follow company policy at all
times and that the company policy on emails will be enforced at all times
228
It is common for the message to then make some statement that the views
and opinions in the email may not represent those of the company, and that
the contents may be subject to disclosure under any Freedom of Information
legislation. Companies are clearly very concerned about any potential risk of
copyright infringement.
Security and password protection
It is very important to consider the security of emails. Many security aspects
have been covered elsewhere in this book but some of the factors to consider are
repeated here for completeness.
Some methods of increasing the security of emails include:
» using strong passwords when logging on to your email account (for example,
the name of your pet is a weak password; strong passwords contain a
combination of letters, numbers and other symbols: Sy12@#TT90kj=0 would
be regarded as a strong password)
» changing passwords on a regular basis
» using spam filters to remove certain suspicious emails to a ‘junk folder’ or
even to block the email entirely
» running anti-virus and anti-spam software at all times on your computer, to
protect against emails from unknown or malicious sources.
Emails are said to be vulnerable to both passive and active attacks. Passive
attacks include the release of email material to other users without your consent.
Active attacks involve the modification of your messages or even denial of Link
service (that is, overloading your system by sending thousands of emails, which
See Section 8.3 for
basically ‘clogs up’ your computer and makes internet access almost impossible).
more on data security
Active attacks can also involve viruses or phishing attacks (these are covered
threats.
elsewhere in the book).
Netiquette
Netiquette is a shortened form of the phrase interNET etIQUETTE, which refers
to the need to respect other users’ views and display common courtesy when
posting views in online discussion groups or when sending out emails. It is
very important to consider what you write always, because the reader cannot
see your facial expressions or body language. What may have been intended to
be humorous could offend somebody if they misunderstood your message, and
they could draw the wrong conclusions. Always be aware of this when posting
messages or sending emails.
There are a number of rules governing netiquette – one such source is The Core
Rules of Netiquette by Virginia Shea (published in 1994); but Figure 10.3 gives you
some idea of what constitutes netiquette.
229
Email groups
Email groups are used for a number of purposes:
» It is easier for a user to send out multiple emails if the addresses are all
grouped together under a single name; the user only needs to use that single
name in the ‘to’ box.
» Companies and organisations can group people together for marketing
purposes, for example according to age, hobbies, favourite music and so on –
this means that each email can target specific groups.
» ‘Spammers’ can create email groups by buying addresses of people from certain
companies or from software that ‘raids’ address books on computers or email
companies – this means that several thousand people can be sent spam at one
time.
» Companies use email groups to set up meetings (for example, for a video
conference) to ensure that everybody is always invited to attend – it
would be easy to forget a person if the email addresses were all typed in
individually; this way you can be sure all the correct recipients are sent
messages.
230
Exercise 10a
1 Which recipients of the email can be seen by John, Mary and Karl?
2 Which recipients of the email can be seen by Tim, Ahmed and Dimitri?
3 Which recipients of the email can be seen by Nick, Ivan and Christina?
4 Who can see that the email was sent to Nick, Ivan and Christina?
231
Forwarding of emails
Forwarding of emails should be treated with great care. Suppose your name is
Dave and you work for a company with the domain hothouse-design.co.uk. You
have been given a company email address box where all your emails are received:
[email protected].
You have decided to forward all of your emails to [email protected] where
you can read them at your leisure. This means that all your emails, including
spam, will be sent to this yahoo address. Two problems exist here:
1 Some internet service providers (ISPs) do not recognise the true source of emails
and regard all emails as actually coming from the hothouse-design.co.uk
domain, including spam, because they will have been forwarded from that
domain.
2 Some ISPs have spam filters in place based on email volumes from just one
address.
Both outcomes are undesirable, because there will now be an increased risk that
many of the emails sent to the Yahoo address will be spam. You could end up
being blacklisted by your ISP. For this reason, many web hosts are now putting a
ban on the email forward feature.
Attachments
Always treat attachments with great caution. Spam and phishing (see Chapter 8)
emails can potentially contain malicious attachments. Your computer can become
infected if the attachment contains an executable file. Examples of executable
files are those ending in: .exe, .msi, .bat, .cmd, and so on.
It is also important to remember when sending attachments that the ISP will
have a limit on the size of file that can be sent. Emails were never intended to
include large files. It is probably better to look at alternatives when sending
large files, such as:
» file compression (zip files)
» selecting a web service that allows files to be transferred: upload the file(s)
and then create a link. This link can be sent in an email and the recipient can
then easily download very large files by clicking on it.
232
Spam is not just a problem for computer users – it can also affect mobile phones.
In this case it is usually text messages being send to multiple phones. It is Link
sometimes referred to as ‘m-spam’, ‘mobile spamming’ or ‘spam SMS’). At the basic
Look back at
level it just annoys people, but with some mobile phone providers users are Chapter 8 for ways to
charged for each message they receive. It then becomes more than just an prevent spam.
annoyance!
host host
network
hub
gateway
gateway
network network
hub
hub
In contrast, the World Wide Web (WWW) is only a part of the internet which
users can access using web browser software. The World Wide Web consists of a
massive collection of web pages, and has been based on the hypertext transfer
protocol (http) since 1989. The World Wide Web is a way of accessing information
using the internet; so, the internet and the World Wide Web are actually quite
different. Table 10.1 summarises the differences.
233
▼ Table 10.1 Summary of differences between the internet and the World Wide Web
234
Intranet
▲ Figure 10.5 Connecting to an intranet though a mobile phone network or virtual private
network
Figure 10.6 shows how intranets, extranets and the internet can all be connected
together. Access to servers behind a firewall is limited for external users.
internet internet
external
server firewall
users
extranet extranet
235
» An intranet often requires a password and user ID, and can only be accessed
from agreed points/computers; whereas the internet can be accessed by
anyone from anywhere in the world, provided the user has an ISP account.
» An intranet is behind a firewall, which gives some protection against hackers,
viruses, and so on; there is much less protection against hackers and malware
when accessing the internet.
» Information used in intranets is usually stored on local servers, which makes
it more secure from outside users for the same reasons as above.
Microblogs are similar to blogs, but are most often used on social networking
sites to make short, frequent posts. The posts can be done using instant
messaging, emails or use other social networking vehicles (such as tweets).
Social networking sites use microblogs to allow members to update their personal
profiles, for example.
Another version is a b-blog – short for business blog – which is used by
businesses to promote themselves on the internet.
Wikis
Wikis are web applications or websites that allow any user to create and edit
their web pages using any web browser. A wiki will support hyperlinks and uses a
very simple syntax (known as wiki markup) to create pages. They have often been
described as ‘web pages with an <edit> button’.
Features of wikis:
» anyone can edit, delete or modify the content
» many authors can be involved in a wiki
» it is possible to organise a page any way the author(s) wish(es)
» shows/keeps track of all entries – that is, stores a document history
» can be easily edited using a web browser
» allows large documents to be seen by many people – it is easier than emailing
several people.
236
Forums
A moderated forum refers to an online discussion forum in which all the
posts are checked by an administrator before they are allowed to be posted.
Many users prefer this type of forum, compared to an unmoderated one, as
the moderator can not only prevent spam, but can also filter out any posts
that are inappropriate, rude or offensive, or even those that wander off the
main topic.
The internet is essentially a huge unmoderated forum. No one ‘owns’ the
internet, and it is essentially not policed. The only real safeguards are a
voluntary cooperation between the users and the network operators. However,
most social forums or networking groups on the internet have a set of rules or
protocols that members are requested to follow or they will be deleted.
237
Advice
Web browsers are usually just referred to as browsers.
Web browsers use uniform resource locators (URLs) to access websites, retrieve
files, and so on. URLs are text addresses used to access websites. A URL is typed
into a browser address bar using the following format:
protocol://website address/path/filename
where:
» protocol is usually either http or https
» website address:
– domain host (www)
– domain name (name of website)
– domain type (.com, .org, .co, .net, .gov)
– sometimes a country code (.uk, .us, .de, .in, .mu, .cn)
» path, which is a web page (if omitted then it is the root directory of website)
» filename is the item on the web page.
For example:
https://www.hoddereducation.co.uk/IGCSE/ICT
An error will occur if any part of the URL is incorrect. Most frequently, error page
‘HTTP 404’ will display on the computer screen.
238
As discussed, the URL contains the protocol, site address and file name. If you
type in: https://www.hoddereducation.co.uk/ to a web browser as shown here,
you will go to the home page for the website.
If you know the URL for a page within the website, you can type the full entry
into the web browser to get a particular page. For example, if you want the
IGCSE ICT page within the website, you could type in the full URL: h t t p s: / /www.
hoddereducation.co.uk/cambridge-igcse-it to get the page shown in Figure 10.8.
If you want to use this page frequently, you can add it to your favourites which
saves you having to type in the URL every time.
It is also possible to search through the website using the navigation tools until
you find the web page you are looking for.
239
For example, if we type ‘ICT text books’ into a typical search engine, the options
in Figure 10.10 will appear.
240
As you can see, about 86 million ‘hits’ or web pages have been found. This is a
lot of information. We could narrow down the search by now typing in ‘ICT text
books+Hodder+IGCSE’, and we now get a much-reduced selection (Figure 10.11).
We now have reduced the number of web pages to 268 000, which is a vast
reduction. However, the search can be further refined using the advanced search
option, as shown in Figure 10.12.
241
242
243
If HTTP is omitted from the address, most web browsers now default to HTTP.
When some form of security (for example, SSL) certification or encryption is used
(see below) then the protocol is changed to HTTPS (this is often seen along with
the padlock symbol ). The letter ‘S’ in https refers to secure(d).
File transfer protocol (FTP)
File transfer protocol (FTP) is a network protocol used when transferring files
from one computer to another computer over the internet. It is similar to HTTP,
but the protocol is specifically for the transfer of files.
Web browsers can be used to connect to an FTP address in much the same
way as you would connect to an HTTP address, for example:
f tp://[email protected]/
Secure sockets layer (SSL)
Secure Sockets Layer (SSL) is a protocol that allows data to be sent and
received securely over the internet.
SSL is designed to work with communication protocols like HTTP and FTP. When
used with HTTP, a user logs onto a website as normal, but SSL encrypts the
data – only the user’s computer and the web server are able to make sense of
what is being transmitted. As mentioned earlier, a user will know if SSL is being
applied when they see HTTPS, or the small padlock in the status bar at the
top of the screen.
The address window in the browser when HTTPS protocol is being applied, rather
than just HTTP protocol, is quite different:
Advice
The term SSL certificate was mentioned in Figure 8.12. An SSL certificate is a
form of digital certificate which is used to authenticate a website. This means any
communication or data exchange between browser and website is secure as long
as this certificate can be authenticated.
244
» Voice over Internet Protocol (VoIP) when carrying out video chatting and/or
audio chatting over the internet
» used in instant messaging
» when making use of a social networking site.
245
Exercise 10b
Looking at the arguments in favour (Figure 10.13) and against (Figure 10.14), what
is your opinion?
Should we police the internet and tighten up the laws to prevent illegal use, and
prevent the posting of offensive or harmful material?
Would increasing the monitoring of the internet prevent crime? Would it stop
certain agencies hacking into government websites in other countries to try and
alter the democratic processes in these countries?
Or do you believe this would stop the internet working properly and would it be an
invasion of freedom of speech?
246
Exam-style questions
1 Indicate which of the following statements are TRUE or FALSE by
putting a tick (✓) in the appropriate box. [7]
Statement TRUE (✓) FALSE (✓)
The internet is part of the World Wide Web (WWW)
All recipients of emails can see all the recipients in
the Bcc and Cc lists
Extranets allow intranets to be extended outside the
normal organisation
Forwarding of emails is always good practice to keep
everyone in the organisation or family informed
Using email groups increases the risk of identity
theft
Netiquette refers to the need to respect other users
on the internet
It is not always illegal to copy or forward email
attachments
3 A company’s employees can have access to the internet and the company
intranet.
Describe the differences between an intranet and the internet. [6]
Cambridge IGCSE Information and Communication Technology (0417) Paper 11 Q12,
October/November 2019
247
6 Six descriptions are shown on the left and six computer terms on the right.
Draw lines to connect each description to its correct term. [6]
Discussion website consisting of discrete Netiquette
diary-style entries; displayed in reverse
chronological order
7 For each of these questions, choose the correct response from the
five options given.[10]
a Which of the following provides a user with internet access?
a TCP
b ISP
c FTP
d HTTP
e HTTPS
248
d Which of the following is the name of the protocol used when browsing a
website?
a TCP
b HTTP
c FTP
d ISP
e WWW
f When moving between websites, what is the correct name when doing this?
a Downloading
b Uploading
c Surfing
d Browsing
e Attaching
249
i Which of the following is the name of the network that allows personal
private networks to be extended outside organisations?
a Intranet
b Internet
c Extranet
d World wide net
e Netiquette
250