Sunteți pe pagina 1din 11

Internet

INTRODUCTION

What is the Internet?


The Internet is a large group of computers that are linked
together. There are millions of computers connected to
this network across 200 countries. The users of these
computers can communicate with each other by sending emails, transferring files, instant messaging, etc. Every
computer that is connected to the Internet has a unique address, which is called an Internet Protocol Address (IP
Address). The IP address is a series of numbers separated by dots, for example: 123.45.67.890.

How does it work?


Computers that are connected to the Internet have different functions. Computers (users) that get information on
the web are called clients. Other computers (servers) only store files such as photos, music, emails, videos or websites.
A client can access a server to visit a website, check an email account, etc.
When two computers exchange information, they are called peers. Some examples of this are instant messaging or
sending photos to a friend directly. When two peers interact with each other it is called peer-to-peer (P2P)
communication. For example, if you receive a photo from your friend, your computer is the client because you access
the file and your friend’s computer acts as a server because he or she supplies the photo.

Who invented the Internet?


In the 1960s, researchers from the Government Defense Department in the United States were looking for a way to
continue working in case some computers were damaged due to a war or natural disaster. They came up with a
network that linked several computers
together. In 1969, their network began
operating and was called the ARPANET.
Over the years, universities, large
businesses, and other major
organizations joined this network to
exchange ideas and resources with each
other.

The ARPANET Network in 1974


Exercise 1: Choose the best answer to complete the sentences below.

1) The Internet is .. 5) Sending messages on WhatsApp is an example of ..


a. a giant network a. P2P b. a server
b. millions of linked PCs c. clients d. A and C are correct
c. a super computer with millions of users
d. A and B are correct 6) Hotmail is a ..
a. P2P b. server
2) Internet users .. c. client d. All are correct
a. have unlimited access to other PCs
b. must download an IP address before they can get 7) The Internet was invented ..
online a. by scientists in the United States
c. are referred to as ‘clients’ b. for military purposes
d. B and C are correct c. during a war
d. in the 21st century
3) When you are looking for information on Wikipedia,
you are a .. 8) The Internet was ..
a. client b. server a. first known as the ARPANET
c. peer d. IP address b. used by large organizations to exchange ideas
c. not designed for ordinary people
4) Google is an example of a .. d. All of the above
a. client b. server c. peer d. computer

Exercise 2: The words below are chopped into pieces. Find the pieces that fit together.

IN NET SER 1) _________________________ 4) _________________________


VER WORK TER
2) _________________________ 5) _________________________
CLI AR NET
3) _________________________ 6) _________________________
PU ENT COM
NET TER PA
Internet
TERMS

Modem Download
Hardware that connects a computer to the Internet To copy a file from a server to a computer via the
with a cable. Internet.

Router Upload
A piece of hardware that connects several computers To send information from your computer to another
to the same Internet connection. computer. It is the opposite of downloading.

Bandwidth Spam
The rate at which information travels through an Unwanted emails.
Internet connection, usually measured in megabytes
per second. Browser
A program that is used to browse the web.
Firewall
A security system on your computer that blocks Spyware
hackers, viruses and other threats to your computer. Software that collects information about you without
your knowledge. The information is sent to the person
Cookie who wrote the program.
A piece of information about your visit to a website
that is stored on your computer. It is information about URL
your preferences on the site, such as the language. The address of a website. For example,
www.google.com

Exercise 3: Answer the questions below. Exercise 4: Fill in the gaps.

1) What is the difference between a modem and a cookies kilobyte search engine
router? modem pop-ups URL
_______________________________________________________

_______________________________________________________ 1) I don't like websites with too many _____________________ .


2) What is the difference between a cookie and It takes so long to close all of them!
spyware?
2) I can’t connect to the Internet, there must be
_______________________________________________________

_______________________________________________________ something wrong with the _____________________ .

_______________________________________________________ 3) It takes so long to download this photo, it is over 900


3) What is the difference between downloading and ________________________ .
uploading?
_______________________________________________________ 4) Amazon uses _____________________ , so that they can
_______________________________________________________
give you a personal welcome when you visit their site.

4) Which terms are software? 5) What is the _____________________ of BBC? Is it


_______________________________________________________ BBC.com or BBC.co.uk?
5) Which terms are hardware? 6) Google is the biggest _____________________ on the
_______________________________________________________ Internet, but Yahoo and Bing are popular too.
Internet VOCABULARY

Exercise 5: Match the words with the pictures and find them in the word search.

( ) Emoticon ( ) Safari ( ) YouTube ( ) Download


( ) E-mail ( ) Web-Shop ( ) Websites ( ) Twitter
( ) Chrome ( ) Modem ( ) Upload ( ) Search engine
( ) Wi-Fi ( ) Virus ( ) Router ( ) Skype
( ) Firefox ( ) Wikipedia ( ) URL ( ) Social network
( ) Server ( ) Chat ( ) Hacker

L M O D E M S K Y P E R E K C A H N W P

I I T W I T T E R E M O R H C I M O E O

A C H A T S E A R C H E N G I N E C B H

M D M D O W N L O A D S E R V E R I S S

E A I D E P I K I W E B U T U O Y T I B

K R O W T E N L A I C O S U R I V O T E

L R U H X O F E R I F U P L O A D M E W

S A F A R I F I W O R E T U O R A E S N

/
14
15 5 11
22 21
10 20
6 3 18 17
2 23
12
19
16
4 1 8 9 7 13
Exercise 6: Choose five words from the previous exercise and write down what these things are and what they are
used for. One word has been defined for you already.

1) Wikipedia is an online encyclopedia that is written 4)


by the people who use it.

2) 5)

3) 6)

Exercise 7: Match the words on the left to their definitions on the right.

Spam Third generation mobile phone network


Bookmark A word or object that is connected to a file
Link Unwanted e-mail
3G Frequently Asked Questions
Online Connected to a computer network
FAQ A marked website for later use
Server A journal where people post about their interests
Blog A computer that provides access to files on a network

Exercise 8: Complete the crossword puzzle.

Down
1) A device used to connect a computer to the internet.
2) A measure of computer memory: 1,000 kilobytes.
4) A social network where people post short messages.
5) Software that allows you to surf the internet.
6) A … is 1,000 megabyte.
8) … is the most popular search engine.
9) People … to communicate with people
online.
11) To transfer something onto the internet.
12) A secret word that protects personal
information.

Across
3) A popular website where people can watch videos.
7) Play a sound or video file at the same time it is being downloaded.
10) Security software that helps protect your computer from viruses.
13) Software to make phone and video calls.
14) To transfer a file from the internet to your computer.
15) When your computer temporarily stops working.
Internet Brands
LOGO QUIZ

Exercise 9: Do you know the brand names of the logos below? Unscramble the words and match them with the pictures.

( ) eologG ______________________ ( ) saatnIrmg ______________________

( ) lGaim ______________________ ( ) xFirefo ______________________

( ) romhCe ______________________ ( ) ikipWedia ______________________

( ) ngiB ______________________ ( ) ndkeIiLn ______________________

( ) obeaFokc ______________________ ( ) !oahoY ______________________

( ) zmonAa ______________________ ( ) pplAe ______________________

( ) Tietrwt ______________________ ( ) fxNelti ______________________

( ) oeuTYub ______________________ ( ) aHotmli ______________________

( ) Spyek ______________________ ( ) Dpoborx ______________________

( ) yPaaPl ______________________ ( ) yaBE ______________________

( ) tWpaasph ______________________ ( ) rklcFi ______________________

20
1 12
22
10
7
16 11
4
3 19 18
5 2
17

8
13 21
9 14 15 6
Chatting ACRONYMS

Exercise 10: An acronym is a word formed from the first or first few letters of several words. Read the dialog below
and write down the meanings of the acronyms used in the conversation.

Tom: Hey everyone! How are you guys doing?


______ = ______________
Jessica: Hi Tom, all good here. WBU? I send you a PM, did you dee it?
Tom:
______ = ______________
Dee? What does it mean?
Jessica: Nothing LOL, it was a typing mistake. I meant ‘see’. ______ = ______________
Tom: Okay, I C ______ = ______________
Kim: Hi guys! In new here. ______ = ______________
Tom: Welcome! ASL? ______ = ______________
Kim: I’m a 16 year-old boy, I live in LA, but I come from Brazil. WBU? ______ = ______________
Tom: Oh, just a moment. My phone is ringing, BRB. ______ = ______________
Jessica: NP, take your time.
______ = ______________
How is it going in L.A. Kim? Do you like to live in America BTW?
Kim: ______ = ______________
IDK, it’s very different.
Tom: Hey guys, I’m back, but I G2G. Dinner is ready. TTYL. ______ = ______________
Jessica: Alright, I got to go too. XOXO ______ = ______________
Tom: See you guys! ______ = ______________
Kim: Bye!

Exercise 11: What are the meanings of the acronyms below? Exercise 12: Which other chatting acronyms do
you know? Write the acronyms and meanings
below.

_____ = _______________________

_____ = _______________________

_____ = _______________________

_____ = _______________________

_____ = _______________________
1) _______________ 6) _______________ _____ = _______________________
2) _______________ 7) _______________
_____ = _______________________
3) _______________ 8) _______________
4) _______________ 9) _______________ _____ = _______________________

5) _______________ 10) ______________ _____ = _______________________


Cyber Crime
ONLINE CRIME

Cyber-crime is one of the fastest growing crimes in the world.


Frequent users of the internet buy things from online shopping
platforms, perform online banking, and store their files on a
‘cloud’. These events provide endless opportunities for cyber
criminals who take advantage of the weaknesses of others.

More than 70% of all Americans have experienced some form of cyber-crime in their lives. Most of these illegal online
activities are hard to detect and solve. In many cases, victims of cyber-crime do not even realize that something illegal
or illegitimate has taken place.

Basically, there are three types of cyber-crime:

• Harassment – Some people use the Internet anonymously and are engaged in illegal activities like
stalking, harassment, and bullying.

• Hacking – Hackers break into online networks and try to corrupt or download all kinds of sensitive or
valuable information.

• Phishing – Phishing is the activity of sending emails to people trying to trick them. The purpose of
phishing is to obtain money from the recipients of these emails. Usually, the elderly, who are not very
computer savvy are the most vulnerable groups for this kind of crime.

ANONYMOUS
Anonymous is a group of hackers that is famous for their distributed
denial-of-service (DDoS) attacks. They target organizations such as
governments and large companies. A DDoS attack is a process in which
many computer systems attack a single target, such as a website or a
server. The enormous number of incoming messages (attacks) slow
down the server so that it cannot be used anymore.
Exercise 13: Are the statements below true or false?

1) Cyber-crime is the most common crime in ( ) 6) Hackers try to trick and harass people ( )
the world. online.

2) Online bullying is a cyber-crime. ( ) 7) More than 70% of all Americans are bullied ( )
on the Internet.
3) More than half of the American population ( )
has been affected by cyber-crime. 8) Phishing is the attempt of trying to acquire
sensitive information.
( )
4) Cyber-crimes are hard to detect and solve. ( )
5) Inexperienced Internet users are more ( )
vulnerable to cyber-crime.

Exercise 14: Answer the questions below.

1) Why do you think it is so difficult to catch and 5) What is Anonymous?


prosecute cyber criminals?
________________________________________________
________________________________________________
________________________________________________
________________________________________________
6) What is a DDoS attack and how does it work?
________________________________________________
________________________________________________
________________________________________________
________________________________________________
2) Have you ever been a victim of an online crime? If
so, can you please describe the situation in detail? ________________________________________________

________________________________________________ ________________________________________________

________________________________________________ ________________________________________________

________________________________________________

3) Have you ever done something that is not allowed


on the web? If yes, what was it and why did you do
so?

________________________________________________

________________________________________________

________________________________________________

4) Which cyber-crime do you think is the most


dangerous? Give reasons to justify your answer.

________________________________________________

________________________________________________

________________________________________________
Mask associated with Anonymous
________________________________________________
Are you addicted?
TO THE INTERNET

Exercise 15: It is hard to imagine a world without the Internet. For some people it is simply impossible to imagine!
Let’s find out how addicted you are to the Internet.

1) I prefer surfing the web or using Facebook to 6) I stay online on my PC or phone longer than I
spending time with my family. intend to.
a) rarely b) sometimes c) often a) rarely b) sometimes c) often

2) When the Internet doesn’t work, I get moody and 7) My family or friends complain that I am online too
nervous. much.
a) rarely b) sometimes c) often a) rarely b) sometimes c) often

3) I feel uncomfortable when people ask about what I 8) My grades at school would be higher if I didn’t
do online. spend so much time online.
a) rarely b) sometimes c) often a) rarely b) sometimes c) often

4) I can’t sleep because I am online or use my phone 9) I check my email before doing other things.
late at night. a) rarely b) sometimes c) often
a) rarely b) sometimes c) often
10) I easily get annoyed when people disturb me while
5) Life without the Internet or my phone would be I am online or using my phone.
boring. a) rarely b) sometimes c) often
a) rarely b) sometimes c) often

Let’s find out if you are addicted to the Internet. Add


up the points of your answers to get your final score.

a) rarely = 1 point My score:


b) sometimes = 3 points
c) often = 5 points __________

10 – 18: You are a normal Internet user. Sometimes


you may use the Internet a bit too much, but you can
control yourself. You go offline when you want to.
19 – 30: You are having some minor problems with the
use of your phone or the Internet. It is time to realize
that you should go online a bit less often.
31 – 50: You are addicted to the Internet and you are
having some serious problems. You should
immediately cut the time you spend online and
evaluate the impact the Internet has on your life!
Reflection
Exercise 16: Write down the names of the images and find the hidden word.

1) _ _ _ _ _ _ _ _ _

2) _ _ _ _ _ _ _
3 6
3) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

4) _ _ _ _ _ _ ______
4 5 1
5) _ _ _ _ _

6) _ _ _ _ _ _
7
7) _ _ _ _ _ _
2
8) _ _ _ _ _ _
8
Answer: _ _ _ _ _ _ _ _

Exercise 17: Unscramble the words. Hints are given below.

1) trtnniee ________ 7) aewfillr ________


A large number of computers around the world Software that blocks threats to your computer.
connected to each other.
8) asmp _ _ _ _
2) omdem _____ Unwanted e-mails.
A device used to connect to the Internet.
9) taentrin ________
3) dodnolwa ________ A network of computers inside an organization.
To copy a file from a server.
10) ybae _ _ _ _
4) rbowers _ _ _ _ _ _ _ A large online auction.
Software that is used to browse the web.
11) kioeoc _ _ _ _ _ _
5) ULR ___ A piece of data about a user from a website.
The address of a website.
12) yparswe _ _ _ _ _ _ _
6) egaytibg ________ Software that collects data about users.
1,000 megabyte.

S-ar putea să vă placă și