Manage Internet
Manage Internet
Level II
Based on March, 2022 Version-I
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Introduction to the internet
Opening different types of internet browsers
Accessing a particular site using its URL to obtain data and browse links
Manage the setting of the browsers
Adjusting display/view modes to suit personal requirements
Loading necessary files depends on the capability of internet
Modifying toolbars to meet user and browsing needs
Deleting cookies and browser history as precaution from virus infection.
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon
completion of this learning guide, you will be able to:
No one owns Internet, although several organizations the world over collaborate in its functioning
and development. The high-speed, fiber-optic cables (called backbones) through which the bulk
of the Internet data travels are owned by telephone companies in their respective countries.
The internet developed from software called the ARPANET which the U.S military had developed.
It was only restricting to military personnel and the people who developed it. Only after it was
privatized was it allowed to be used commercially.
The internet has developed to give many benefits to mankind. The access to information is one of
the most important. Student can now have access to libraries around the world. Some charge a fee
but most provide free services. Before students had to spend hours and hours in the libraries but
now at the touch of a button students have a huge database in front of them.
1.1.1. Basic Internet Terms and Terminology
Here is a look at the buzzwords of the world of Internet.
ARPANET: The acronym stands for Advanced Research Projects Agency Network. ARPA
of the United States Department of Defense developed ARPANET, which became the world’s
first packet switching network. Internet is the successor of ARPANET.
Internet Service Provider: A company, which provides users with an access to the Internet,
is known as an Internet service provider or Internet access provider. ISP, as it is called, offers
email accounts and other services like remote storage of files for its customers. Here is a word
about choosing a cheap ISP.
IP Address: It is a way of numerically identifying an entity on a computer network. The
original addressing system known as IPv4, used 32 bit addresses. With the growth of the
Internet, IPv6 came to be used wherein the addresses are composed of 128 bits.
Cyberspace: This term coined by William Gibson, is used to refer to the computer networks
connected to each other and the content they host. It is often used to refer to the Internet.
WWW: It is a collection of interlinked documents that are accessible over the Internet. It
consists of millions of web pages that contain text, images, voice and videos. Sir Tim Berners-
Lee, a British scientist working at CERN, created the World Wide Web.
There are so many types of internet browsers are used to upload or download files for different
office intercommunication though it.
Examples of web or internet browser
Mozilla Firefox
Chrome
Microsoft Edge
Safari
Opera
UC Browser
Chedot Browse
If you use Chrome on multiple devices, logging in to your account will give you quick access to
documents you saved in Google Docs, your Gmail messages and your bookmarks, regardless of
the device you’re on. Search history is also saved with your account, so if you’re logged in, terms
you’ve looked for will auto-populate when you start typing in the Google search field on any
device.
Chrome lets you set icons on your toolbar so you can quickly get to the pages you visit most often.
You can also pin bookmarks to the Google Chrome homepage. It has tabbed browsing so you can
have multiple viewing windows open at once and easily toggle between them. During out in-house
tests, we noticed Chrome didn’t identify as many phishing schemes as Firefox, but it did stop
malicious files, including ransomware and Trojans, from opening and infecting our computer.
Chrome’s privacy browser is available on all devices, including cell phones, to keep your online
activity private.
3. Microsoft Edge: Best for battery life
Compatibility issues for older Windows machines Microsoft Edge comes
standard with computers running the Windows 10 operating system, but it
also works on both Android and iOS cell phones. It isn’t, however,
compatible with older Windows versions. It's much leaner and faster than Internet
Explorer, which it replaces. In some respects, it's also a better proposition than Chrome or
Firefox. That's because Edge tends to use less memory (RAM) so it will feel faster on
older computers and tends to use less power, which is important on a laptop. The trade-
off is that it doesn't have the wealth of extensions or apps you'll find with those other
browsers.
When we tested Edge’s security, it not only warned of phishing schemes and other dangerous
websites, but it also blocked malware files from infecting out test devices. Microsoft Edge includes
Notes, a tool that lets you highlight works or passages on any webpage and save them to read later.
You can add icons to the toolbar that link you to frequently visited websites and use the URL field
to search the web. Edge has sync capabilities so you can access your bookmarks and search history
across all your devices. Microsoft is one of the few internet browser developers that offers
telephone support if you are having difficulties with its program.
UC Browser is a light, smart browser that gives users the fastest mobile web
browsing experience. UC Browser uses the latest in web kit technology to
offer features like ad-blocking, built-in Google Translate, and voice search
for Android phones. The app also has a smart download feature so you can
easily download files on spot. One of the most talked about features is UC News.
7. Chedot Browser: beast to download video and audio at the same time
This rogue application infiltrates systems without users' consent, generates intrusive online
advertisements, and tracks Internet browsing activity. Users who attempt to search the Internet via
this browser are redirected to the search.chedot.com website.
To access or use the web site must now that the term URL. Based on this resource locater the users
view necessary data using browser SW. Before accessing particular web site, the user must be
open browser and write down the URL on the search bar.
Example 1. The users try to access google web site using Microsoft edge
To configure the home page, use the following steps do not forget this is used only Microsoft edge
browser only: -
1. Click on three dot at the right top of the browser.
2. Click on setting
3. Click on start, home and new tab.
4. Write down what you went to home page
5. Click on save
6. To open the home page use (ALT +HOME KEY) short cut
Each time a user visits a website using Microsoft Internet Explorer, files downloaded with each
web page (including HTML and Javascript code) are saved to the Temporary Internet Files folder,
creating a web cache of the web page on the local computer's hard disk drive, or other form of
digital data storage. The next time the user visits the cached website, only changed content needs
to be downloaded from the Internet; the unchanged data is available in the cache.
Despite the name 'temporary', the cache of a website remains stored on the hard disk until the user
manually clears the cache, the cache expires or if the cache is full. This is often regarded as
Many high-profile browser toolbars released over the years have been fraught with problems,
either intentionally as malware or injected with computer viruses or due to poor or conflicting
programming when considering multiple toolbars being included on the single browser.
Many unscrupulous companies use software bundling to force users downloading one program to
also install a browser toolbar, some of which invade the user's privacy by tracking their web history
and search history online. Many antivirus companies refer to these programs as grayware or
Potentially Unwanted Programs (PUPs).
Developing a toolbar
The programming language and development tools behind a browser toolbar vary from one
browser to another.
In Google Chrome 4 or later toolbars can be created as extensions that add browser actions to the
browser window. The logic behind the toolbar is written in JavaScript with access to a special
JavaScript API to interact with the Chrome application and web content. The privileges under
which a Chrome extension runs are governed by a set of permissions.
In Opera 11 or later toolbars can be created as extensions that add buttons to the browser window.
The logic behind the toolbar is written in JavaScript with access to a special JavaScript API to
interact with the Opera application and web content.
In Firefox, Chrome, Safari and Opera toolbar styling is done though CSS.
Native vs. injected toolbars
Some major browsers (Internet Explorer and Firefox) enable the creation of native toolbars i.e.,
toolbars which are directly inserted in the browser window. Examples of native toolbars are
Google Toolbar and Stumble upon Toolbar. Native toolbars use browser-specific code to create
the same toolbar for each different browser version.
Some toolbar developers use a different approach and make the browser extension inject a
JavaScript file in every web page visited by the user. All major browsers support injected toolbars.
The code in this file inserts the toolbar as a part of the DOM in every web page. Injected toolbars
use essentially the same JavaScript code to draw the toolbar for each different browser version.
1. Opera
Opera doesn’t have a standard toolbar, and the only toolbars that it has are the bookmarks
toolbar and extensions toolbar.
2. Firefox
1. Press the Alt key.
2. Select View and select Toolbars.
3. From there you can choose which toolbars you want to keep visibly
3. Drag and drop the icons that you want to use onto your toolbar.
1.8 Deleting cookies and browser history as precaution from virus infection.
A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin
website to send state information to a user's browser and for the browser to return the state
information to the origin site. The state information can be used for authentication, identification
of a user session, user's preferences, shopping cart contents, or anything else that can be
accomplished through storing text data.
Cookies are not software. They cannot be programmed, cannot carry viruses, and cannot install
malware on the host computer. However, they can be used by spyware to track user's browsing
activities – a major privacy concern that prompted European and US law makers to take action.
Cookies could also be stolen by hackers to gain access to a victim's web account, thus, the need to
delete cookies.
To clear browsing history and cookies form the different types of computers browser
A. Chrome:
Open Chrome.
Task 4 Using the required address access some data over the internet
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:
Open search engines and search requirements using defined range of search parameters
Save search results according to the required information
Create bookmarks the required web page and save in associated bookmark folder
Modify page set up options and web page or the required information printed
shutdown and exit browser
observe OHS and netiquette principles through the process
Netiquette refers to your Internet custom, or the way you behave online and on social media.
Because the majority of online communication is completely non-verbal, you cannot see or use
facial expressions or tone of voice to back what you are typing.
1. Never Send Spam
Reliability of information
Data reliability means that data is complete and accurate, and it is a crucial foundation for
building data trust across the organization. Ensuring data reliability is one of the main objectives
of data integrity initiatives, which are also used to maintain data security, data quality, and
regulatory compliance. Data reliability assessment, also referred to as trust assessment, is an
important process that can reveal problem areas about your data that you didn’t even know existed.
The assessment will typically measure three different aspects of data reliability.
validity: - is the data correctly formatted and stored in the right way?
Completeness: - does the dataset include values for all the fields required by your system?
Uniqueness: - is the data free from duplicates and dummy entries?
Data reliability assessment can also take other factors into account and touch on aspects of data
quality, such as looking at how many times a dataset has been relied on, where it originated, and
how the data has been transformed. Getting to this deeper level of understanding is especially
important for data related to sensitive information where complete accuracy is essential. To
support a financial audit, for instance, it is vital to be able to prove data reliability
Authenticity of information
Authenticity are used to establish the process of ascertaining authenticity of information on the
Internet, and in the final section we propose some ways and means through which authenticity of,
content and. purpose of, information in the cyberspace could be instituted.
2.6. Page set up options and printing required information from web
pages
Page set up options
Use “Page Setup” in Internet Explorer if you wish to make any changes to the way your page looks
after it prints. If you’re using Google Chrome, the option to make adjustments to the page will
automatically appear after you hit “Print.”
Printing required information from web pages
Printing a web page is reasonably straightforward, but it differs slightly depending on the Internet
browser used. To proceed, select your preferred browser from the list below and follow the
instructions.
In Internet Explorer, the “Print Preview” option will allow you to see what your page will look
like before your print it out. Google Chrome will automatically show you a preview of the page to
be printed after you select “Print.”
How to print one or more page(s) at a time
1. Open the Google Chrome browser and access the page you want to print.
2. Click Customize and control Google Chrome in the upper-right corner of the
browser window.
the or button in
the bottom-right corner.
Click hear
Step 5 Choose the location you wish to save your web page to, ie the drive as well as the
folder you wish to use.
Step 6 Click on Save.
On the Save Web Page screen, when you click on Save, the file IT Framework Course –
Information Technology will be saved into the desktop folder in this example.
Notice that a folder holding all the graphics relating to this web page is also saved. This allows all
information to be viewed offline, i.e., when you are no longer connected to the Internet.
This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically,
upon completion of this learning guide, you will be able to:
Effective and appropriate forms of communications used and interactions undertaken with
team members who contribute to known team activities and objectives
Effective and appropriate contributions made to complement team activities and
objectives, based on individual skills and competencies and workplace context
Observe protocols in reporting using standard operating procedures
Contribution is made to the development of team work plans based on understanding of
team’s role and objectives and individual competencies of the members.
Telephones. Landline Telephones. Cell Phones. Smartphones. Internet Calling: Google Voice
and Others.
SMS/Text Messaging.
Cell and Data Plans.
Video and Web Conferencing.
Social Networking Sites.
G-Suite and Microsoft 365/Office.
Example 1: - EMAIL
Email is one of the first and most popular forms of electronic communication. It allows the user
to send and receive files and messages over the internet, and can be used on a wide variety of
devices. Here are some of the advantages and disadvantages of email.
Advantages of email
Email is a free tool.
Email is quick. Once you have finished composing a message, sending it is as simple as
clicking a button. Once it is sent and delivered, it can be read almost immediately.
Email is simple. It is easy to use, email allows for the easy and quick access of information
and contacts.
Email allows for easy referencing. Messages that have been sent and received can stored,
and searched through safely and easily.
Email is accessible from anywhere – as long as you have an internet connection.
Email is paperless, and therefore, beneficial for the planet.
Email allows for mass sending of messages, you can send one particular message to several
recipients all at once.
Email allows for instant access of information and files.
Disadvantages of email
Email could potentially cause Emails can cause misunderstandings.
information overload. Email messages can contain viruses.
Email lacks a personal touch. Email should be kept short and brief.
Email can be disruptive. Email requires timely responses.
Email cannot be ignored for a long time.
Create a Gmail account
To sign up for Gmail, create a Google Account. You can use the username and password to sign
in to Gmail and other Google products like YouTube, Google Play, and Google Drive.
Gmail is one of the most used email services around the world. If you want to create a Gmail
account in just a few simple steps you can create it. But before that, you need to sign up for a
Google account. To create a Gmail account, you need to provide some basic information like your
name, birth date, gender, and location. Even you have to choose a name for your new Gmail
address.
Follow the below steps and create your own Gmail account with the quick sign-up process. You
can use your username and password to sign in to Gmail and other Google products like YouTube,
Google Play, and Google Drive. Follow the steps, create your Gmail account and start sending
emails.
Step 7: On the next page enter your phone number to verify your account. (It is a two-
step verification process for security)
Step 8: On the given mobile number you will receive a text message from Google with a
verification code. Enter the verification code and tap on Verify.
Step 9: On the next page enter your DOB in the specified fields.
Step 10: Choose a Gender.
Step 11: Tap on Next.
Step 12: Read, Google's Terms of Service and Privacy Policy will appear on the screen
and click on I agree.
Congratulations! your account has been created. From now onwards every time you sign
in you just have to enter your email id and password. And every time you sign-in don't
forget to sign-out because it prevents others from viewing your emails.
Step 13: Congratulations! your account has been created. From now onwards every time you
sign in you just have to enter your email id and password.
Note: - Then create one document given by your teacher and send this documents to
your teacher.