Documente Academic
Documente Profesional
Documente Cultură
look like a lowercase blue e with a yellow ring around it. This is the Home will take you back to your home page. On library computers this
logo for Internet Explorer, and
is the librarys website; if you
clicking on it will open the browser. None of these options for opening have a home computer, you can set it to any page you want.
up a browser are right or
Print will send the page you are on to the printer.
wrongits just a matter of personal preference. They all take you to There are other options on the toolbar as well, although most of them
the same final destination!
are for more advanced
www.CincinnatiLibrary.org, Page 3
users. You can also customize your toolbar on your home computer to
Internet Explorer Firefox Google Chrome Safari Opera
include more (or less)
Wi-Fi
options than the ones listed.
Internet Explorer
The Status Bar
www.CincinnatiLibrary.org, Page 4
The status bar is at the bottom of the page directly above the
Basic parts of the browser
taskbar/Start button. When you move
When you open your browser window, no matter which browser you your mouse pointer over a hyperlink the web address of the link will
use, you will usually see several
show up on the left side of the
main parts:
status bar. When you click on a link, you will see a blue bar start
The address bar is where the web address of the page you are
moving across the bottom middle
currently on is displayed. Its the white
of the status bar. This shows that the page you just clicked on is
bar at the very top of your page. If you want to go to a new website
loading. Often this will move very
and know the Uniform Resource
quickly, but if the page you're trying to look at is a very large page
Locator (URL), or web address, of the site you'd like to go to, you can with lots of pictures, or if you're
click in the address bar and type
on a slower connection at home, the bar can move more slowly. The
in the URL followed by the enter button to go directly to that page.
rectangle that says Internet
Tip: One cool thing about the address bar is that sometimes as you
indicates that, yes, you are connected to the internet (this may
are typing, a drop down list of
register as no connection if you are
different webpages will open. This is called an auto-suggest or auto- at home and a cable comes unplugged). By clicking on the upside
complete feature (youll see this
down triangle next to 100% you can
later when we learn about search engines too!). If you see the site you choose the size of your browser screen. An upside down triangle or
want to visit on the list, you can
arrow pointing down in any
click it with the mouse to go to the page without typing the whole
context is a good indication that there are choices to select from.
address in.
loading page
Next to the address bar on the left, you'll see the Back button and
(blue or green bar)
Forward button. Once you leave
size of browser screen
the first webpage you are on, the back button will become active.
www.CincinnatiLibrary.org, Page 6
Clicking on it will take you back
Parts of a web address
one page at a time along your path since opening up your web
There are typically four main parts to a URL or web address. Lets look
browser. For example, if you start on
at the example below.
www.cincinnatilibrary.org and go to www.cnn.com and finally
http://www.CincinnatiLibrary.org
www.cincinnati.com, clicking the back
(a) The http:// stands for hypertext transfer protocol which we
arrow button twice will bring you back to your starting point. Once you discussed earlier. This helps your
have gone back a page at some
web browser locate the webpage or website, and to display it for you
point during your session, the forward button will become active. This to see. Most browsers
will allow you to move forward
will automatically add this prefix, so you don't have to worry about
a page and revisit pages that you have already seen.
typing it every time.
On the right of the address bar, you'll see two buttons. One has a red (b) The www stands for World Wide Web. This means that the page
"X" on it. This is the Stop button.
you're looking for is somewhere
You can use it to stop loading a page. The other button loads pages, on the World Wide Web. For some websites, its not even necessary to
but the way it displays will change
type in the www part.
depending on what you are doing. If you are typing a web address into (c) The next section, which is cincinnatilibrary in this example, is
the address bar, a button called
the name of the webpage or
the Go button will appear as a single arrow. If you click the Go Button, website (aka the host). It is flanked by dots on either side which
it will send a command to "go"
separate it from other sections
to the webpage. If you don't want to take your hands off the keyboard, of the web address.
pressing "Enter" will
(d) The .org here is the top level domain name. This tells you where
accomplish the same thing as pushing the Go button. If you are
the webpage is registered, and
already on a webpage, it will display
often tells you what kind of website it is. For instance, .com usually
as two arrows, which is called the Refresh button. If you would like to means that you're looking at
reload the page, click the
a commercial site, or a site that someone has paid to use. Some other
refresh button. This will bring up the most current version of the
common domain names
webpage that you are viewing. It is
are .edu (sites for educational institutions), .org (sites belonging to
especially useful on sites like CNN.com that are updated constantly
organizations), and .gov (sites
throughout the day.
sponsored by local, state, or federal governments).
Back
Links
Button
When you move the mouse around on your desk it will move your little
Forward
pointer in the same direction
Button
around the screen. If you took the Computers for Beginners, Part I
Stop
class here at the Library, you may
Button
remember the different shapes that your mouse cursor may take.
Go
Heres a quick review.
Button
The hand pointer cursor is the one you will be looking for most
Refresh
often on the internet. When you put your mouse on top of a word
Button
or picture or video and it changes to the hand pointer, you know
www.CincinnatiLibrary.org, Page 5
that you can click on that spot and it will take you to another
The Toolbar
webpage. Text, images, video or other content that is clickable
In most computer programs, the toolbar is located on the top of the
and takes you to another website are called hyperlinks, or just
screen and contains all of the
links for short. The entire World Wide Web is based of this idea
various options, effects, and well, tools, you might need while using
pages being chained together through the use of hyperlinks.
that particular program.
Often times (although not always) text links will be either underlined
In the most recent version of Internet Explorer the Toolbar is located or they will be in a different color
on the right side of the
(usually blue) to help them stand out from other text. As you click on a
page and looks like this:
text link it will usually change
The Internet Explorer toolbar contains buttons for some of the tasks
color (usually to red) indicating that you have clicked on it. Once you
you are likely to want to do while
have clicked on a link and you
on the web. Here are the ones you'll use most:
return back to the same page, the link may be yet another color
links across the top of the web page or down one side. These links
placeholder for the user to type in a different website URL into the
divide the websites content
browser address bar. You can have
into categories. Some of the categories you are likely to find:
several tabs open in the same browser window and switch between
Home This allows you to return to the
the different website tabs. To close
starting page (the Home page) of the
a tab, click on the close button (X) that appears on any active tab.
website at any time.
Browser Toolbars
About Us This lists some information
A browser toolbar is a type of browser extension, or add on. Browser
about the purpose, history and owners
toolbars add additional
of an organization.
buttons to the browser interface to accomplish frequently used tasks.
Locations This will give you information about
Typically, toolbars are offered
the various locations of an organization as well
as free downloads from popular sites like Google, Yahoo, Amazon,
as telephone numbers and street addresses
AOL, and Bing. Once downloaded,
(such as the locations and phone numbers
the toolbar will sit across the top of your viewing window in the web
of library branches).
browser, and below the built
Register New User - This allows you to create
in toolbar (where you will find the home, print, RSS feed, etc. buttons).
an account with the website.
So why would you want a toolbar? Toolbars can come in handy for
Sign In This allows you to login to an
tasks that you do frequently on the
existing account.
computer, like using a search engine. By installing the Google toolbar,
Use common sense banking and shopping sites will require more
for example, you can do a Google
information than most. If
search from any page you are on. This saves time from having to open
youre just trying to register to read a vegetarian cooking chat group, a new tab or browser window do
you will not have to provide
a search. Toolbars also frequently have options like alerting you when
too much personal information.
you have new email, giving you
www.CincinnatiLibrary.org, Page 6
the option to spell check text you have typed into a form, and allowing
Across the bottom of the page you will generally find a small print that you to bookmark a website.
act as links to even
www.CincinnatiLibrary.org, Page 7
more categories, such as:
DOWNLOADING A FILE FROM THE INTERNET
Contact Us This will give you one, or several methods to contact Downloading is the process of transferring information from another
the organization
computer to your own computer.
(phone, mail, or email).
This information can be any digital content, such as videos, pictures,
Privacy Policy and/or Terms & Conditions Legal information
or text.
about the terms of using the
If the file is a picture, downloading is an easy process.
website and about what the organization may or may not do with your First, find the picture you want to download (Figure 1). Put the mouse
personal information, etc.
cursor over the image and
Help This is a good place to start if you are having trouble locating click the right mouse button. This will display a menu (Figure 2). Select
what you need.
Save Picture As. You will
There will also likely be a search box located somewhere on the
then have to decide where to save the image to (generally the My
page. You use a search box to type in
Pictures folder will be the default
keywords to help you find website content. For example, on the
location, although you may want to change it to a flash drive or other
Librarys website you can type in the
location). You can leave the file
title of a book you are trying to locate and the search function will list name the same if you so choose or you can change it to whatever
books in our catalog with that title.
name you would like. Click save.
BOOKMARKS, TABS, AND TOOLBARS
The download will now begin. You may also come across files with a
People who spend a lot of time on the computer are
direct download link. Microsoft
a notoriously impatient bunch. Therefore, there are
Word files, for example, will usually have a link that says Click here to
always shortcuts and time savers built into programs.
download or something similar.
These shortcuts may eliminate a mouse click or a
Simply click on that link and select where you want to save the file
keystroke (or two) and thus make your time spent
and give the file a name, just like
on the computer more efficient.
the above process. For smaller files like pictures, it should take only a
Bookmarks
second or two to download. For
If you are using a computer at home, one excellent time
larger files like music or videos, it may take a few minutes. Note the
saver is to save links to your most visited web sites.
status bar which will give you an
These links are called Bookmarks and they allow you
estimated wait time before your download is complete.
to save a website address for easy access the next time
Once the file is complete, you will be asked to Open, Open Folder,
you need it. Instead of typing out the whole address, you
or Cancel. If you select Open,
can simply go to your favorites and find the site you are
the file will automatically open in the appropriate program (a picture
looking for.
will open in the Windows Picture
Keep in mind that the exact wording and location for these links may Viewer, a song in Windows Media Player, a text file in Microsoft Word,
vary from site to site. What
etc.) If you select Open Folder
one site calls Locations another site will call Find a store. Contact then the folder you saved the file in will open up (for example, the My
us may be replaced
Pictures folder). If you do
with Ask us a question. The point is not to look for one certain
not need to view the file once you download it, you can simply click
heading or terms, but to be able
cancelthis does not delete
to identify where to begin your information quest and know which
the download, it simply allows you to skip the process of viewing it
path to choose to get there.
immediately.
If you are using a shared computer, like here at the Library, you may www.CincinnatiLibrary.org, Page 8
be unable to save
Figure 1 photo by cobalt123 Figure 2
bookmarks to the browser. However, you can use an online
UPLOADING A FILE TO THE INTERNET
bookmarking service like
The opposite of downloading a file is uploading a file
Delicious (http://delicious.com/) that allows you to store all of your
in this case you are sending information from your
bookmarks on the website,
computer to the internet. Common examples of
divide them up into categories and keywords, and access your
uploading are adding videos to websites such as
bookmarks from any computer
YouTube or resumes to websites like CareerBuilder.
that has an internet connection.
When you go to upload a file you will see a button that
Tabs
says Browse When you click on the Browse button
One of the features most web browsers offer is the ability to use
it will open Windows Explorer and allow you to
browser tabs. Browser tabs allow you
locate the file you wish to upload. When you find the
to view multiple webpages in the same browser without the need to file, click on it and select Open. Now click Upload
open a separate browser window.
on the webpage to transfer the file.
To open a new tab, click on the small blank tab button to the far right Like with a download, the length of time an upload
(pictured above). A new tab will
will take depends on the size of the file. A picture
be opened to a text page called "about: Tabs." This page gives a brief or word document should only take a few seconds.
explanation of tabs and acts as a
A music or video file may take several minutes,
It is this openness and flexibility that is the primary reason for the
innovation and democratic and economic successes of the Internet.
the Internet.
A DIGITAL ADDRESS
An IP address is a numerical address that is assigned to every device The following image demonstrates the stages of public key encryption
connected to the Internet. 01
this works on the basis of a pair of keys one public and one private:
not to be.
217.72.179.7DNSresolverDNSresolverDNSrecursivesearchINSIDE
When you put a website on the Internet, it will be reachable via the
numerical IP address of the web server hosting it (at time of writing,
EDRi.orgs address is 217.72.179.7, for example). IP addresses are,
however, not easy to remember for humans. Using them to identify
If you know the domain name of the website you want to visit, the
Domain Name System is used invisibly and automatically to find
the corresponding IP address of the web server where the website can
be found. So, when you type http://edri.org, your computer identifies
this as being 217.72.179.7 and sends a request specifically for our
website to retrieve it.
not, it will refer the query to a higher level of authority, where the
confidentiality. A frequent technique to bypass encryption is to capture same process is followed. At the highest level of authority are 13 root
the message before it even gets encrypted for example by a stealth servers that ultimately collect together DNS servers. The 13 root
Trojan horse program installed on senders computer that will monitor servers are very robust and have huge capacity. They have so much
all keys pressed on the keyboard or even in the victims mobile
telephone.
Another attribute you almost always need to protect when encrypting THEWORLD WIDE WEB
LINKING THE INFORMATION SOCIETYThis page is about dogs. We spotted a When a user buys a new computer or installs a new web browser, it
websiteabout cats here. There isa site on the life of
micetoo.WEBSERVERWEBSERVERHTTPHTTPWEBSERVERHTTP
list of entities from which the user will trust the certificates given out
the World Wide Web Consortium (W3C), and specify special markers to MAIL IN THE DIGITAL WORLDSMTP SERVERTRANSMITSEindicate typograhy and layout properties. For example, text in bold will MAILRECIPIENTMAIL SERVERRECEIVESEhave <b> before it and </b> after it.
While there are several versions of the specification (HTML5 being the
most recent), the HTML development process is continuous and open
MAILRECIPIENTCOLLECTSE-MAILE-MAIL
TO:recipient@location.euHELLO!HELLO!
INTERNETRequestlocation.euDNSresolver
to participation. Once the standards have been set, there is no licence Electronic mails, or e-mails, are messages sent by one sender to one
or fee for using HTML. The advantage is that all available computer
SMTP (Simple Mail Transfer Protocol) which, like HTTP, is also built on
anyone can use the language (for free) and be sure that every device the Internet Protocol.
will display the web page in the same way. The Web (and the world)
would be far poorer if people had to pay to develop pages in the
languages of different types of computer.
This open and free character of HTML is essential to ensure
compatibility of web pages across all sorts of devices: desktop
computers, mobile phones, tablets, laptops How the internet works 9
and more. Proper application of the HTML specification to format
webpages also ensures accessibility for people who are visually
impaired otherwise text reading systems will not be able to
understand the pages being accessed.
Webpages are published on machines known as web servers. A web
server is a computer that can be found by its unique IP address (as
described on page 5). Usually many domain names (such as
www.edri.org and www.bitsoffreedom.nl) can be found at the same IP
address because they are stored (hosted) on the same server. Thus,
a single web server with a unique IP address can host numerous
websites. In the case of commercial web hosting companies, there can
be hundreds of unrelated websites on one single web server. Attempts
to block individual websites on the basis of their IP address have
therefore always had disastrous consequences for the unrelated pages
on the same server.
In addition to HTTP, there is also a secure variant called HTTPS. HTTP
connections (and, therefore, uploaded and downloaded information)
are not encrypted, and anyone with access to the network cables or
equipment between the computer of the end-user and the web server
can gain access to all information going back and forth.
HTTPS adds encryption to this connection, so that (in theory) only the
end-user and the web server can decipher the information that is
going back-and-forth. This is based on trust: the web page publisher
asks a trusted party to give them a strictly personal certificate,
digitally signed to confirm the identity of the publisher; much like a
wax seal used in previous centuries to seal documents.
the network;
authority;
separated in any other way than logical definition of boundaries. Its ..Faults have minimal impact
just a matter of analysing a few next bytes than we were analysing so because there are no
far e.g. for routing purposes. Or go even deeper and look inside the
duplication of resources;
equal footing.
inspection (DPI) gives them much more control over the network
users data than it was possible before. DPI techniques are already in
use for law enforcement (surveillance, blocking, etc), market profiling,
and advertisement targeting, service level agreement enforcement
and is being proposed for copyright enforcement.
From a users point of view DPI techniques can be blocked by using
encryption the deep contents of an encrypted packet is completely
opaque to the operator.
PEER-TO-PEER
FROM ME TO YOU, WITH NO ONE IN THE MIDDLEPEER TO
..There is no administration
peer-to-peer application is to
centralised system.
Websites such as
anonymity to participating
thepiratebay.org and
peers.
Users are not prompted for their consent for this processing of their
personal data. The advertisement business argues that this kind of
tracking is in the interest of the user, because this helps to ensure
that they only receive relevant advertisement. They also propose an
opt-out-procedure that is claimed by some to fulfil the requirements of
the e-Privacy directive.
The key issue in question is, whether the cookies settings (that are
Internet users neither know about cookies nor ever change their
cookie acceptance settings. Technically the proposed solution also
faces difficulties, since the opt-out regime does not include all
advertisers. Furthermore, the current opt-out system itself uses
cookies, so deleting cookies also deletes the opt-out.
plug-ins, such as Flash) offer many more ways to store and retrieve
request might also send cookie data back from your computer.
to manage for the average user and not always covered by cookie
preferences in browsers.
number. If the user then reads a news article on cars, the behavioural Currently European citizens have a European law to protect them, but
advertising companies will be able to make assumptions about
remain de facto unprotected due to a lack of will to implement the law.
somebody who reads articles about both cars and football. In our
example, a primitive assumption might be made that the user is
someone who would react favourably to beer advertising. The
assumption might also be made that it is not a good idea to show
special offers on car insurance to the user, because it is probably a
young man.
The more websites the user visits that are part of the tracking network
of the behavioural advertising services, like most newspaper web sites
and many others, the more data is collected on their profile. Within a Any Web author can link to any other online content. Through the
relatively short period of time of reading somebodys online habits, a practice of linking all Internet users help with organising the
very detailed profile can be developed and the identifiability of
the data grows, even though in theory it is anonymous.
Large amounts of behavioural data can reduce the size of the group
might fit to this pattern. Several years ago, one search engine
every link on every page, indexes the linked pages and then follows
vast amounts of data in the cloud using virtual hard disks, such as
the match between a users search query and the information in the
Alongside the organic results (i.e. the pages found by the search
computing, where almost all software is built into the computer with
SOCIAL MEDIA
WHERE WE MEET
Social media are a set of
1. Collaborative projects
Other important techniques for better matching the users information that allow the creation and
needs with the index include the analysis of the content of the
content.
existing articles;
use cookies to store users search queries, clicks on the links and
more in individualised form in their databases for long periods of time. Social media are fundamentally
different from regular media as
A vertical or specialised search engine focuses on search for a
specialised search engines in their service as extra features. A meta- interaction can be as simple as
search engine is a search engine that does not produce its own index asking for your comments,
and search results, but instead uses the results from one or more
into different categories. The Yahoo! directory and the Open Directory other users. Each user is not just
Project are famous examples.
CLOUD COMPUTING
THE INTERNET BECOMES YOUR COMPUTER
available.
Protection, in particular
privacy protection, of social
media users is an important
different types:
Nations Development
in the past.
Programme;
companies;
governmental organisations
users;
..International organisations:
International
Telecommunication Union, UN
Educational, Scientific and
Cultural Organisation, United