Welcome to Effective Use of the Internet!
Hi everyone! This chapter is incredibly relevant because the internet is now central to communication, learning, and business. We will explore how the internet actually works, how to use search tools effectively, and, most importantly, how to stay safe and secure online.
Mastering the concepts of secure data transfer and evaluating information will be vital for your exams!
1. Defining the Internet and the World Wide Web (WWW)
Many people use "Internet" and "WWW" interchangeably, but they refer to two slightly different things. Understanding this difference is fundamental.
What is the Internet?
The Internet is the massive, global system of interconnected computer networks. Think of it as the hardware infrastructure—the physical cables, routers, and servers all linked together.
- Characteristic: A worldwide network, accessible to the public (usually via an ISP).
- Use: Provides the backbone for almost all modern digital communication.
What is the World Wide Web (WWW)?
The World Wide Web (WWW) is the collection of documents, pages, and resources (like websites) accessed via the Internet. It is a service that runs on top of the Internet.
- Characteristic: It uses the HTTP protocol and relies on hyperlinks (links) to connect information.
- Analogy: If the Internet is the roads, the WWW is the traffic flowing on those roads (the web pages, images, and videos).
Key Takeaway: The Internet is the network; the WWW is the content system we access on that network.
2. Key Functionality of the Internet
To use the internet, several components and protocols must work together:
Internet Service Provider (ISP)
An ISP is a company that provides you with access to the internet, usually for a monthly fee. They connect your home or school network to the larger, global network.
Uniform Resource Locator (URL)
The URL is the specific address of a resource on the World Wide Web (e.g., https://www.cambridgeinternational.org).
- Structure: A typical URL includes the protocol (like HTTP or HTTPS), the domain name, and often the path to a specific file.
Web Browser
A Web Browser (like Chrome, Edge, or Safari) is application software that retrieves and displays information from the WWW. It interprets the code (like HTML) to show you text, images, and videos.
Hyperlink
A hyperlink is a piece of text or an image that, when clicked, leads to another web page or resource. This is how the WWW links documents together.
3. Network Comparisons: Intranet and Extranet
The Internet is public, but two other network types use the same technology (protocols) but restrict access:
1. Intranet
- Definition: A private network restricted to members of a single organisation (e.g., a school or corporation).
- Use: Internal communication, sharing company documents, and managing staff information.
- Accessibility: Only accessible from within the organisation's premises or via secure VPN login.
2. Extranet
- Definition: A private network that allows controlled, limited access to external users (like suppliers, vendors, or customers).
- Use: Securely sharing certain data with specific partners.
- Accessibility: Requires strong authentication (passwords, user IDs). It is essentially a piece of the Intranet opened up securely to external partners.
Quick Review Table
- Internet: Open, global, public.
- Intranet: Private, internal to one organisation.
- Extranet: Private, allows authorised external access.
4. Effective Searching and Evaluating Information
The internet holds massive amounts of data. Using a search engine efficiently and ensuring the information is reliable are crucial skills.
Using Search Engines
A Search Engine is designed to index web pages and allow users to query this index using keywords.
- Advantages: Incredible speed of searching and access to an enormous amount of information.
- The Challenge: The speed and ease of finding *relevant and reliable* information depend entirely on your search technique and your ability to evaluate the sources.
Evaluating Internet Information (The four checks)
You must judge information based on four critical criteria. Remember this when you are doing research!
1. How up to date is it?
Check the publication date. Information from ten years ago might be completely irrelevant in ICT or science fields. If the date is missing, be cautious.
2. Is it reliable?
Who is the author? Are they an expert? Is the website a known, reputable source (e.g., a university site .edu or a government site .gov)? A personal blog is less reliable than a university research paper.
3. Is it biased?
Bias means the information is presented in a one-sided or unfair way, often to promote a specific viewpoint or product. You must look for objective facts, not just opinions.
4. Is it valid?
Validity means the information is accurate and supported by evidence. If a website makes a big claim without citing sources, its validity is questionable.
Key Takeaway: Never assume that information found first on a search engine is the best or most accurate. Always check the source and the date!
5. Internet Protocols for Security (HTTP, HTTPS, FTP, SSL)
Protocols are the digital languages computers use to communicate. Some are designed specifically for security.
HyperText Transfer Protocol (HTTP)
HTTP is the basic protocol for sending web pages. The main drawback is that data transmission is not encrypted. This is acceptable for simple browsing, but dangerous for sharing personal details.
HyperText Transfer Protocol secure variant (HTTPS)
HTTPS is the secure version. It ensures that all data sent between your browser and the server is encrypted (scrambled), making it secure from interception. Look for the padlock symbol in the address bar when banking or shopping.
Secure Socket Layer (SSL) / Transport Layer Security (TLS)
SSL (and its successor, TLS) is the technology that provides the encryption for HTTPS. It creates a secure, encrypted link between the server and the client computer.
File Transfer Protocol (FTP)
FTP is the protocol used specifically for transferring files (uploading and downloading) from a local computer to a server, or vice versa. It is widely used by website authors to upload their finished pages.
Did you know? Encryption makes your data look like nonsense if a hacker intercepts it. Only the intended recipient (the server or your browser) has the key to unscramble it!
6. Risks of Using the Internet and Safety Controls
While the internet is a powerful tool, it presents serious risks, especially concerning unsuitable content.
Risks of Using the Internet
- Exposure to inappropriate material: Content that is not suitable for minors, or that is offensive.
- Exposure to criminal material: Content that promotes or involves illegal activities (e.g., fraud, terrorism).
Important Note: Always apply the principles of eSafety when using the internet, especially social media and email (refer to section 8.2 of the syllabus).
Methods for Restricting Data and Content
To minimise exposure to risks, various measures can be put in place:
1. Parental Control:
Software installed at home that allows parents to:
- Block specific websites or categories of content (e.g., violence, gambling).
- Set time limits for internet usage.
- Monitor browsing history.
2. Educational Control:
Filtering systems implemented by schools. These filters usually:
- Block social networking sites and games during school hours.
- Prevent access to any domain deemed unsuitable for educational purposes.
3. ISP Control:
Filters provided by the Internet Service Provider. These controls are applied at the network level, meaning the unsuitable content is blocked before it even reaches your home router. Customers often have to opt-in to use these features.
Key Takeaway: Security controls rely on filtering systems (parental and educational controls) and network-level blocking (ISP control) to create a safer environment.