Free Essay

Internet

In:

Submitted By slimhotboy
Words 4402
Pages 18
TERMS OF REFERENCE
The objective of this research is to assess provision of internet connection to customers living in rural Ireland and to a customer living in central Dublin. This research is also aiming to consider safety and confidentiality on the internet, and to examine various potential external threats. An overview on the ISP services available in Ireland, taking into consideration both home and business users, will also be given.

SECURITY AND CONFIDENTIALITY ON THE INTERNET
Various types of computer threats have been around since the invention of the internet. The following will explain what they are and how they work.
According to the website BusinessDictionary.com a computer virus is a ‘small but insidious piece of programming-code that attacks computers and network systems through 'contaminated' (infected) data files, introduced into a system via disks or internet. As a digital equivalent of biological microorganisms, it attaches itself to the target computer’s operating systems or other programs, and automatically replicates itself to spread to other computers or networks’. (1)
Computer viruses are a small piece of software that are able attach to disks or other files (viruses can be created for any operating system including DOS and other programs such as Excel) replicating itself without the users consent or knowledge. Some attach to files so when the infected programme is used the virus also executes, whilst others lie dormant in the memory and infect files when the computer is turned on. Sometimes symptoms are displayed, or files become corrupted, others can replicate. However, even if no visible damage is evident, a virus still poses a theat. E-mail viruses appear like innocuous attachments but once opened spread quickly to the address book infecting the e-mail client and the recipients included in the contacts.
The creeper virus was one of the first viruses to be introduced in 1971. Although it was an experimental self-replicating virus, it gained access via the ARPANET copying itself to the remote system displaying the message “I’m the creeper, catch me if you can!” A program called The Reaper had to be written to delete Creeper. In 1983, Frederick Cohen used the term “virus” for the first time describing it as a self-replicating computer programme. Computer viruses were largely seen in the late 1980’s as prior the 1980’s home computers were not widespread but mostly used by experts. IBM and Apple introduced home computers respectively in 1982 and 1984. Floppy disks were used, and virus authors used them to spread viruses replicating mostly into the computer memory. Viruses have evolved since they started circulating and today McAfee, one of the leading anti-virus companies worldwide, detects more than 57.000 types of viruses including Trojan and other malicious software, (2)
(1) http://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms
(2) http://home.mcafee.com/virusinfo/glossary?ctst=1
Computer viruses have become more elaborate during the ensuing years. Even the scope has changed: from teenagers who create malware for random mayhem to organised professionals, part of criminal groups or working for foreign governments or intelligence agencies bringing potential damage and destruction. One of the most destructive was a malware called “I love you” that not only compromised millions of computers masquerading as a love letter, but to date is also the only virus that even compromised the Pentagon and the CIA in the USA. The record in terms and destruction is however held by a virus combined with a worm and a Trojan together called “Nimda”, infecting computers within 22 minutes since it was unleashed on September 18, 2011 after the WTC and the Pentagon terrorist attacks, leading to speculation that it was connected to Al Qaeda. The “Slammer” was released in 2005 and quickly infected 75,000 machines.
Computer viruses are not the only threat nowadays. The variety of internet threats to watch-out for have increased along with more modern technology, to the point that big criminal gangs are able to steal personal information including credit card numbers unsuspiciously. The following is a list of other potential risks: * Computer worms are programs that replicate themselves and plant a destructive code onto other systems. They can infect through e-mail attachments and therefore spread through computer networks. A good way to protect from these attacks is to avoid opening sources from unknown e-mail sources. The use of patches and firewalls to block them is also useful.

* Trojan Horses are downloaded unwittingly and disguise themselves as legitimate games, music player programmes etc. as they lurk in files that are shared between individuals through peer-to-peer file networks. Hackers use security weakness on websites disguised as legitimate software downloaded by customers to obtain personal information. Running a good security software, caution when opening e mails, enabling Windows updates and ascertaining that web sites are legitimate help protecting against Trojan Horses.

* Keyloggers are programs that record each key pressed on the keyboard and can be used by hackers to obtain confidential data such as passwords, credit card details etc.

* Spyware is a type of malware, a software that can be installed unbeknownst to the owner of the computer and is used to collect data such as personal information, internet surfing habits, logins and in some cases credit card and bank details. It can be installed by the owner of the machine through software installation or is simply included in an official software from a trusted vendor as in this case will use personal information to collect data about surfing habits. Some of them can modify the computer, browser settings and connection speed. Although an anti-spy ware is sufficient to detect some, others will remain hidden.

* Adware is a non-replicating software package designed to analyse the web pages surfed by the user, creating free custom-advertised based. It can be legitimate, for example it can be installed by the computer’s owner granting permission to run such software by clicking on the license agreement.

* Phishing a term used since 1985. It alludes to the term “to bait” hoping that the victim will click on a malicious attachment in an attempt to obtain personal information such as credit card and bank details or username and password to access the victim’s web sites. They masquerade as legitimate and trustworthy websites, often bearing logos and other features similar to the original site.

* Spam or unsolicited advertising is most commonly sent in form of bulk e-mails especially advertising as it’s viable and economic for many businesses. The term spam is also applied when these are sent via instant messaging, mobile phones, internet forums, blogs and search engines. E-mail spam remains an unresolved issue for business in terms in terms of lost productivity and fraud. The costs of the damage caused by spam are carried by internet service providers by adding extra storage space to cope with the amount of spam being sent. In many countries spamming is subjected to law. According to the article 13 of the European Directive 2002/58/EC Article 13 : ‘The use of automated calling and communication systems without human intervention (automatic calling machines), facsimile machines (fax) or electronic mail for the purposes of direct marketing may be allowed only in respect of subscribers or users who have given their prior consent.’ (1)

* Cookies are small files created when a web page is accessed. They do not contain viruses or any other types of malware but they are stored on a user’s computer to retain specific information such as buttons clicked, logins or information about the pages viewed in order to create a profile tailored to the user carrying information from one page to another. Tracking cookies and third-party cookies are used to retain records of browser histories, causing major privacy issues that have been regulated since 2011 in Europe and in The US. In most browsers cookies can be deleted but the storage of a cookie can also automatically be moved in other programmes such as Flash.

* To control what websites can be viewed, filtering software can be installed (sometimes filtering software includes parental control) and it is often used when children are given access to the internet. Using a rating system, the software prevents access to pornography and other offensive or inappropriate material. It is also used by many businesses to control the sites that the company deems appropriate for their workers to view in order to improve productivity. Computers that are in public places such as libraries, airports etc. also restrict access to the websites that can be visited.

(1) http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32002L0058:en:HTML

* Firewalls can be either a software or hardware (routers) and are needed to keep the network secure, controlling incoming and outgoing data. The firewall works on a set rule analysing the data sent or received building a wall between a network and another network that is not assumed safe and trusted, screening potential threats such as hackers, viruses and worms. Many OS have a built in firewall.
To protect personal computers and laptops (today viruses have also spread to Android mobile phones) an updated antivirus is necessary and a scan must be run on a regular basis. If a threat is found, quarantine and file deletion often solves the problem. However, an anti-virus alone sometimes is not enough to protect against external threats. The issue of privacy remains and can be minimized by following some basic rules: * If unsure about the sender avoid opening e-mail. * If a file looks suspicious do not open it. Files with extension ending in .exe, .bat, .hpl can be fatal when the sender is unknown. Anti-virus programmes can scan files to determine whether they are infected or not. * Change password often using a different one for each account. Use strong passwords containing letters, numbers, upper or lower cases. Many websites offer a password strength check. * When accessing a website that requires log in data (i.e. username and password), always log out. Some anti-virus programmes include a virtual keyboard that enables protection when typing confidential data. * If parental or user control is required it can be enabled on the OS (i.e. Windows>Control Panel>User Account and Family Safety) or the anti-virus package (if included in it). * Back up data regularly (preferably on external storage drives or cloud). * If using credit cards, makes sure that the address is hhtp secure (the address bar should display https). * Minimize the personal information shared. * Many browsers incorporate ‘private browsing mode’ that can help minimise risks.
The use of encryption data is also a useful tool to protect against threats that can steal personal information. Today it’s becoming essential for a business not only to protect corporate data, but also to protect their customer’s personal information. To maintain the data protection confidential, encryption systems are used to convert data into an unreadable and scrambled format until is decrypted using the correct key and cipher. It’s important to stress that the efficacy of the cypher relies on the secrecy of the mathematical formula used, not the complexity. Web based information and e-mail are also encrypted using Transport Layer Security system.
Digital signature or certificate is a resident file installed on a computer used to verify and confirm the identity to third parties. Along with the identity they also verify that the data has not been compromised, ensure confidentiality and verification of date and time in which the message was sent. They are released by a CA (Certification Authority).

THE RANGE OF SERVICES OFFERED BY THE ISP
The acronym ISP stands for Internet Service Provider and is the firm that provides subscribed internet access. In order to pay for the maintenance of the cables and services, these companies charge a monthly fee to cover their costs and deliver the service. Today in Ireland there are many ISPS delivering a wide range of services that is possible to avail from surfing the net: mail hosting, e-mail and fax services, file sharing and transfer, television, voice over IP, gaming, instant messaging and blogs.
However, due increased competition (after state owned Eircom monopoly ceased) and to maximise profits, ISPS have diversified their products offering different packages to suit different want and needs of the customer. It’s possible in fact to subscribe just to avail of internet connection, but many companies have extended their range of products including other options such as a fixed telephone line and television, mixing in different packages that can be customized for both home users and businesses.
Some of the main internet service providers In Ireland are: Eircom, UPC, Digiweb, Vodafone, Imagine, Smarttelecom, Magnet Entertainment, Irish Broadband, whilst other companies such as Tooway, Qsat and Onwave offer Satellite broadband for areas in which internet is accessible through other means of connections.
When choosing an ISP is important to consider different factors: * Price. There is a wide range of products to suit all needs. Price varies according to the package selected and speed. * Upload speed or the speed at which data can be sent to the internet. * Download speed. Downloadable speed from internet to the computer. * Installation fee. Some companies charge a fee for installation and/or router. * Coverage. It’s always a good idea to check with the internet service providers if the area is covered by their services.
Another factor to keep in mind is the duration of the contract. Many ISPS often require signing up for the service for a period of time (normally 12 months, but this can vary according to ISP) and may charge a fee to terminate the contract before the end. Reading terms and conditions it is recommended before signing up. Price varies according to the package and the speed offered and they are different for business and home users.

AVAILABLE METHODS OF INTERNET CONNECTION FOR HOME AND BUSINESS USERS
To avail of the use of internet, apart from the physical hardware (a laptop, desktop pc or even the latest tablets), subscription to an ISP is essential. Today, thanks to the modern technology, all personal computers and tablets are easy to set up and if the ISP is available in the area and the user has subscribed, it can be done in a matter of seconds. However if an older computer or an alternative connection other than wireless and broadband are used, additional cables are required for analogue (dial-up) and cable connection.
Other additional cables that may be needed are network cables (Ethernet and Powerline). Ethernet cables connect computers to each other and other hardware (hubs, routers, external network adapters). Powerline adapters are external and connect to a computer with Ethernet or USB depending on the adapter.
Like technology, internet connections have improved substantially over the years: * Analogue or dial-up is the first type of internet connection that was made available to the public and although it is still used in some areas where broadband is not a viable solution, they are being replaced by more up to date types of connections as they are considerably slow and when in use, the landline is not accessible at the same time.

* Cable connection instead connects to the internet via a television cable line to the modem of the computer. Coaxial cables compared to dial up are faster because they have a larger bandwidth but they are more expensive than dial-up and not available in all areas. Furthermore, the speed can fluctuate depending how many people are using the service in a specific area.

* Wireless connection, is a type of computer network that doesn’t require any cables of any kind and uses radio communication to send and receive data. It’s widely available and used by both business and home users as long as a router and a subscription to an ISP are available. Equipment is provided by the ISP. Most new laptops and tablets have built-in wireless technology, if not, a dongle can be plugged in to an USB and used as wireless connection.

* Broadband is perhaps one of the fastest connections available and requires a modem or router connected to the telephone line that transmits data to the ISP. Thanks to advanced technology, nowadays a telephone line can be removed and connect the router to cable (cable tv companies offer such service often in conjunction with other service). It’s very easy to set up and can be used with wireless technologies.

* Satellite connections are usually the last option to consider when choosing an ISPS as it’s usually suitable for those who live in remote areas that have no access to cable, ADSL broadband and it requires a special satellite dish for the installation. It is widely available in Ireland and can be more expensive compared to other types of connection.
Recently, new fibre-optics wires are also being used by some ISPS and they are faster than ADSL, but because the ISP must replace the all the existent wires with fibre-optic ones, this is not yet available in all areas.
There are several well- known issues with the availability of broadband in Ireland as some areas are still deprived of higher speed internet connection. See map released by the Department of Communications, Energy and Natural Resources (Table 1 - Area Covered by NBS). According to a document released the 30th of August 2012 by the Department of Communications, Energy and Natural Resources, “A National Broadband Plan for Ireland” with foreword by Pat Rabbitte TD Minister for Communications, Energy & Natural Resources: ‘High speed broadband is core to competitiveness. As a knowledge services oriented economy trading worldwide our workforce needs to be better connected than most in the world. However, ensuring fast connectivity is not only about jobs. It is also increasingly a key conduit of modern society – entertainment, learning, health and citizenship.
This Government is committed to delivering high-speed broadband throughout Ireland as soon as possible.
Accelerating broadband rollout is not a new idea and we have seen progress in recent years. However, demand for bandwidth is increasing fast and now is the time to take a significant leap forward.
Our commitment is to high-speed broadband availability across the country during the lifetime of this Government – specifically: * 70Mbps - 100Mbps to more than half of the population by 2015;

* At least 40Mbps, and in many cases much faster speeds, to at least a further 20% of the population and potentially as much as 35% around smaller towns and villages; and;

* A minimum of 30Mbps for every remaining home and business in the country – no matter how rural or remote.
These are dramatic increases in speeds – particularly for those outside urban centres who often can only access 1Mbps or 2Mbps today. The faster speeds will come from ongoing industry investment, the release, this year, of spectrum for 4G mobile services and from State investment to address market failure. Notwithstanding the constraints imposed on the exchequer at present, Government will intervene where – but only where – it is evident that the market will not deliver. Ireland’s population is more broadly dispersed than that of many other countries so reaching the target will require State investment to encourage the private sector to offer services which would not otherwise make commercial sense…’ (1)

(1) http://www.dcenr.gov.ie/NR/rdonlyres/1EA7B477-741B-4B74-A08E-6350135C32D2/0/NBP.pdf

Ireland can be compared to any other European country in terms of internet connection with good internet connection available in most urban and residential areas; however, some rural areas in Cork, Kerry, south Tipperary and West Waterford. are more under developed and low penetration is mostly due to high cost and high retail prices, leaving some areas deprived of favourable and fast internet access. Since 2008, the National Broadband Scheme, a government initiative to bring broadband where unavailable, awarded ISP Three, the contract and have been extending their network to provide broadband to those area.

METHODS OF RESEARCH
Internet has been used as primary source to find information. Although many other search engines such as Yahoo!, Altavista, Excite, Aol etc., are available to the public, Google and Bing are ranked top two search engines. All search engines use different algorithms to produce results based on information about the user (location, user behaviour and search history). When searching “map of broadband coverage in Ireland”, Bing listed mostly commercial results linked to internet service providers, whilst with Google using the same wording, after the first three commercial advertisements shown in a pink background, it was easy to obtain a map as the desired result was shown first directing to the link to website of the National Broadband scheme of the department of Communications, Energy and Natural Resources.
Having worked in IT for many years, it was easy to use the appropriate terminology in order to obtain the desired information. When searching for “virus” for instance, “computer virus” was used instead to avoid obtaining results relevant to biological viruses.
For this research, Google was used exclusively and produced faster and more reliable searches, except for the example discussed above.

RECOMMENDATION AND FINDINGS
Although Ireland can be considered on par with other European countries, there is still a gap between urban areas and rural areas where internet access still needs addressing. The government has taken a stance, committing to improve in those areas that are badly affected, recognising the importance of high-speed broadband for competitiveness and economic growth.
There are wide choices for those who live in Dublin: broadband is highly accessible for home users with companies such as Eircom, Digiweb, Vodafone, Imagine, Smarttelecom, Magnet Entertainment, Irish Broadband all offering different packages at different prices and cater for all different types of speed and usage levels.
The monthly subscription prices offered can be high, and to increase competition, UPC offers bundles that can also include a fixed line and television along with high speed fibre optic broadband. Such options are perhaps the most economic and worth considering when the user has also television at home. Sky will be introducing soon its own broadband in Ireland in conjunction with TV services, and this will increase competition in this particular range of service.

For those who live in rural areas, it is highly recommended to check with ISPS if their services are available and if they aren’t, satellite broadband is the best solution (as opposed to cable) as these are more reliable, and WI-FI is also available with companies such as Tooway, avoiding unnecessary cables and enabling different computers and/or tablets to connect with the same dish under the same roof. The National Broadband Scheme in conjunction with ISP Three, can also be used if available in the area but depending on the area but connection may be slower compared to satellite connection.
Thanks to technological advances that were and are still made, internet has certainly revolutionised and improved communications, facilitating and providing a faster and cheaper way to make business all over the world. Many discussions are still open over the control and censorship of this powerful tool that has managed to stay open and free in most countries. However, this has also opened the gate to many internet threats that are increasingly worrying and to which we all remain vulnerable. From viruses to cybercrime, protection and common sense when using the internet is essential, and it is recommended to use a good updated anti-virus. A parental control is also good tool to keep children safe if left unattended to browse the internet.

Table 1
Bibliography

Anon., 2002. Directive 2002/58/EC of the European Parliament and of the Council. [Online]
Available at: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CONSLEG:2002L0058:20091219:EN:PDF
[Accessed 01 11 2012].
Anon., 2012. Computer Virus. [Online]
Available at: http://www.businessdictionary.com/definition/computer-virus.html
[Accessed 01 11 2012].
Anon., n.d. About email viruses and worms. [Online]
Available at: http://www.firetrust.com/en/products/benign/support/about_email_viruses_and_worms
[Accessed 01 11 2012].
Anon., n.d. Adware. [Online]
Available at: http://en.wikipedia.org/wiki/Adware
[Accessed 01 11 2012].
Anon., n.d. Broadband Types. [Online]
Available at: http://www.comparebroadband.ie/broadband-guide/broadband-types/
[Accessed 13 12 2012].
Anon., n.d. Defending Against Malware and Trojan Horse Threats. [Online]
Available at: http://home.mcafee.com/advicecenter/?id=ad_vp_damatht
[Accessed 01 11 2012].
Anon., n.d. Fast ineternet for everyone, everywhere... now. [Online]
Available at: http://www.toowaysatellitebroadband.ie/
[Accessed 02 11 2012].
Anon., n.d. Glossary. [Online]
Available at: http://home.mcafee.com/virusinfo/glossary?ctst=1#V
[Accessed 01 11 2012].
Anon., n.d. How Computer Viruses / Malware Attack?. [Online]
Available at: http://software.4reviews.net/how-computer-viruses-attack.htm
[Accessed 11 11 2012].
Anon., n.d. National Broadband Scheme. [Online]
Available at: http://www.dcenr.gov.ie/communications/communications+development/national+broadband+scheme.htm
[Accessed 02 11 2012].
Anon., n.d. National Broadband Scheme with Three. [Online]
Available at: http://www.three.ie/nbs/
[Accessed 02 11 2012].
Anon., n.d. Nimda. [Online]
Available at: http://en.wikipedia.org/wiki/Nimda
[Accessed 01 11 2012].
Anon., n.d. Phishing. [Online]
Available at: http://en.wikipedia.org/wiki/Phishing
[Accessed 01 11 2012].
Anon., n.d. Protect your privacy. [Online]
Available at: http://www.truste.com/products-and-services/consumer_privacy/privacy_tips
[Accessed 01 11 2012].
Anon., n.d. Spam. [Online]
Available at: http://en.wikipedia.org/wiki/Spam
[Accessed 01 11 2012].
Anon., n.d. Top 10 viruses. [Online]
Available at: http://www.secpoint.com/Top-10-Viruses.html
[Accessed 01 11 2012].
Anon., n.d. What are cookies? Computer Cookies Explained. [Online]
Available at: whatarecookies.com
[Accessed 01 11 2012].
Anon., n.d. What is a firewall?. [Online]
Available at: http://www.microsoft.com/security/pc-security/firewalls-whatis.aspx
[Accessed 01 11 2012].
Anon., n.d. What is Virtual Keyboard in Kaspersky Anti-Virus 2012?. [Online]
Available at: http://support.kaspersky.com/6617
[Accessed 12 11 2012].
Anon., n.d. What you need to set up a home network. [Online]
Available at: http://windows.microsoft.com/en-IE/windows-8/what-you-need-setup-home-network
[Accessed 02 11 2012 ].
Kelly, G. & Bruce , M., 2002. Security, privacy, and confidentiality issues on the Internet. [Online]
Available at: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761937/
[Accessed 01 11 2012].
Ricky M., M. M., 2004. Digital signatures. [Online]
Available at: http://www.windowsecurity.com/articles/digital_signatures.html
[Accessed 01 11 2012].

Similar Documents

Premium Essay

Internet

...INTERNET There's a new technology that blooms in the modern civilization and that is the Internet. Internet is a new way of communicating, sharing memories, and connecting to other people. Bill Gates’ vision of an ‘Internet revolution’ and Jeremy Deller’s ‘steampowered Internet machine’ exemplify much of the contemporary discourse about the Internet and information and communication technologies (ICT). The Internet is widely thought to represent not just a new form of communication, but instead a new organizational form of modern society (Castells 2002) The imaginary of an ‘Internet revolution’ has been readily adopted in discussions of economic development. Development practice has always employed existing links and created links between developers and those who are being developed. Those links (e.g. roads or Internet connections) are not only integral to the actual implementation of development, but are also often justified as desirable in and of them. However, unlike past links between developers and developing, the Internet appears almost free of spatial constraints: any two computers can connect to one another irrespective of geographic location. INTERNET PRINCIPLES: * The Ability to Connect. The edge-dominant end-to-end architecture of the Internet is essential to its utility as a platform for innovation, creativity, and economic opportunity. * The Ability to Speak. The Internet is a powerful mass medium for self-expression which depends on the ability of...

Words: 655 - Pages: 3

Premium Essay

The Internet

...of the Internet There is no denying that technological advancements bring about social change. In today’s society, nothing has made a greater impact in this regard then the internet. The internet is defined as a global system of interconnected CPU networks that use the Internet protocol suite to link several billion devices on a global scale. This network consists of over millions of private, public, academic, business, and government networks, linked by a broad array of electronic, wireless, and optical networking technologies. The internet has made the entire globe, in essence, just a click away, with a multitude of information being brought to your fingertips. It is exceptionally difficult to picture today’s societal, economic, entertainment, information, academic or business sectors operating without the use of the internet’s resources to connect to people worldwide. The internet has become vital, simplifying the search for information or resources as well as carrying the extensive range of said information resources, such as website information and domain names, to support social interaction through file sharing, emails, web applications, telephone services, etc. According to Bill Stewart’s article, The Living Internet,[1] the origin of the Internet dates back to research commissioned by the United States government in the 1960’s to build a robust, fault-tolerant communication via computer networks. There is no consensus on the exact date when the modern Internet came into...

Words: 828 - Pages: 4

Premium Essay

Internet

...What is internet?? Internet is a concept and can be defined as Universal network which connects billions of computers across the globe which will constantly distribute the information needed by various entities, people, and organizations of the world. The journey of the internet and behind the scenes of when internet is being accessed by any individual can be described according to the video as follows 1.       An URL is typed in the browser. 2.      The information travels to the mail room where packaging of the information and assign the address of the sender, receiver and will be done and sends it to the Local Area Network. 3.      Local router reads address and sends it to the corresponding destination. 4.      The corporate intranet will receive the information and sends the data to the next level 5.      The network interface will pick the data and send to the proxy and packets of different sizes based on the content will be loaded to next level 6.      The proxy will open packet and search for URL and if address is acceptable, the packet will be sent to the internet. 7.      The next level will be firewall will check to make sure the confidential corporate information is not going out and does not allow sensitive information to go in to internet. 8.      The packet which makes it to firewall will enter the internet and World Wide Web. 9.      Another firewall of the web server will check for the same criteria and will try to make the address to enter through...

Words: 457 - Pages: 2

Premium Essay

The Internet

...The Impact of the Internet Have you ever wondered how the internet has evolved, where it’s headed, and how it’s affected the world we live in? The truth is it has transformed drastically over time. It has reformed the way we communicate, how we receive our education, and not to mention how health careers have improved because of it. Initially, the internet has changed how we as societies communicate, interact, live, work and play. The internet is used virtually by everyone who has access to a computer. It has changed how fast information gets from place to place, like emailing and chatting with one another. Once someone emails or sends an IM to an legit email it is received instantly. Social media is a big part of everyone’s life, from young to old. We have also been introduced to web cams. With web cams and the internet we can actually communicate and see the person we’re talking to. People can use Skype or ooVoo to see someone who is 200,000 miles across the world. The internet is now taking the place of mail, magazines, and newspapers. Overall the internet has become essential to almost everyone’s daily life. Furthermore, the Internet has impacted and will continue to impact education and health related fields. The invention of iPods, smartphones, tablets, iPads, and e-readers, has made it easier and convenient for students. Students can now buy books offline, and look up information very quickly, all at their fingertips. School systems are also putting iPads and tablets...

Words: 835 - Pages: 4

Free Essay

The Internet

...The Internet is a social technology, but the effect it has on face to face relationships can potentially be very detrimental. Like any activity, the Internet takes up a person's time; the amount of time varies depending on the person's level of addiction. Often this time usage could be spent bettering face to face relationships. It is not uncommon for an Internet user to begin to replace their face to face relationships with those formed on the Internet. By doing this they often negatively affect their lives. The Internet has become one of the most universal methods for communication with over 100 million users worldwide. From e-mail to the possibly billions of web pages, there is an infinite amount of information flowing. And another enticing aspect of the Internet is the opportunity to interact with other people. Chat Rooms and MUD (Multi-User Dimensional) games offer the person the ability to talk and mingle with others online. But with this newfound freedom, also comes the possibility of abuse and addiction. It is also known in developed countries as internet addiction. Internet addiction, also known as Pathological Internet use, has emerged as a very destructive force in today's society. An estimated 6 percent of the web user's 100 million people are thought to be online addicts and that number is growing every day. But what causes Internet Addiction? There are many different causes, but one of the most essential, is thought to be a personality disorder. The lone...

Words: 471 - Pages: 2

Premium Essay

Internet

...THE INTERNET BACKGROUND The Internet is the world’s largest computer network. It is a network of networks. The networks of various organizations as well as the computers of individuals are linked together via the internet. The Intern was originated by the Advanced Research Projects Agency (ARPA) of the Department for Defense (DOD) to allow four universities doing research for the DOD to exchange information. At the time (1969), the network was called ARPANET. One of the results of how it was originated is that there is no central control of the Internet. The DOD wanted to ensure that in the network couldn’t be taken out by an attack on the control center. The internet now has hundreds of millions of users, but there is still no central control. SERVICES There are many services available on the internet. Some of them are: * E-mail * Newsgroups * Chat rooms * Instant messaging * The World Wide Web (often just called the Web) The web is the most widely used service on the internet which is why it is confused with being the Internet. However the web and the internet are not synonymous. The Web is just one of the services available on the Web. NAVIGATING THE INTERNET You can use a URL to find resources on the Internet. A URL is a Uniform Resource Locator. You enter it into the address bar of your Web Browser. It will look something like http://somestuff.com. If it is an address for a Web site will have www at the beginning like this: http://www...

Words: 288 - Pages: 2

Premium Essay

Internet

...The internet is such a wonderful and amazing addition in our lives. So much information is available to us at just the click of a mouse. It is an excellent way to connect people from all over the world in an instant via E-mail, Facebook, Instagram and other social networks. Through these facilities people are able to stay in touch with family and friends who maybe living away overseas or it can be used to help people learn of other cultures and different ethnicities around the world. Another advantage of using the internet is as a research tool. You can have immediate access to a huge range of information with reference to a particular topic. Using a search engine like Google or Ask.com along with specific and unique words or terms will give you a more precise search result. The internet is also used for entertainment. People can download games, music and movies. Some people use the internet to browse the many celebrity websites available, keeping up with the latest fashions and gossip. There is so much that you can do on the internet. You can access your bank accounts, pay your bills, do your shopping all in the comforts of your own home. Despite the numerous advantages of using the internet, there are also some disadvantages to note. When using the internet for banking, social networking or other services, it will often leave our personal information vulnerable to theft. Our name, address, phone number, credit card details can land in the wrong hands of hackers who will...

Words: 504 - Pages: 3

Free Essay

Internet

...Universidad Interamericana de Puerto Rico Recinto de San Germán Departamento de Ciencias Empresariales y Gerenciales PROBLEMAS PARTE 2 Angel Luis Rodriguez Olivera EE0160576 BADM 6250 Sección IN Prof. Luis M. Zornosa Capitulo 4 Soluciones 4.2 La combinación de la introducción del acceso comercial a la web; y una interfaz gráfica de usuario para la web habilitado el acceso generalizado y dio impulso para su uso. 4.3 Usted puede obtener la lista de servidores raíz por medio de ' dig.NS ' , como los servidores raíz de zona están autorizados. 4.4 Los servidores raíz no admiten búsquedas recursivas, ya que deben desactivarlas con el fin de ayudar a evitar la carga excesiva. Además de eso, deshabilitación de las búsquedas recursivas (junto con la expedición y cualquier otra función que les permita dar respuestas en caché) reduce sus posibilidades de almacenamiento en caché y propagar información incorrecta. . 4.5 La mayoría de los resolutorias ordenan los registros de recursos devueltos por los servidores de nombres, para que las direcciones de la misma red; que el host de la emisión de la consulta aparece primero en la lista devuelven a la aplicación que llama a la función librería de resolución, en la premisa de que les van a prestar a una más eficiente la comunicación. 4.7 4.10 Entrando nslookup sin argumentos se abre una sesión interactiva...

Words: 1198 - Pages: 5

Free Essay

Internet

...ASSIGNMENT: INTERNET ADOPTION 1. UNIT OF ANALYSIS AND GEOGRAPHICAL SCOPE Said that the unit of analysis is the person or household or company, in this case, we see that in this case the subject being analyzed is Internet. The geographical scope of the analysis is the whole world. 2. MARKET POTENTIAL AND CURRENT MARKET DEMAND If we consider the projections till 2017, the current market demand is around 50% of the total population of the world, that it means that is approximately 3,6 billions of people. In order to calculate the market potential we will consider all those customers that are or not aware or that are unable to use the internet ( illiterate for instance) or that because of infrastractures or incentives have lacks of benefit or people that live in places where internet is not available. Said that, the potential market demand is around 7,1 billions of people. 3. MDI The MDI is : 50,7 It means that companies (internet providers) should stress on benefits deficiencies and price reductions. And I think that it’s quite conform to the information we had from the case. In fact, in the case are highlighted the lack of benefits and infrastructures and the low income of the people that are offline. 4. REASONS WHY PEOPLE DO NOT USE INTERNET The barriers that people find in adopting internet span, mostly, in four categories: * incentives * low incomes and affordability * user capability * infrastructure The first category comprises reasons...

Words: 589 - Pages: 3

Free Essay

Internet of

...4 The Impact of the Internet of Things on Business and Society · Ubiquitous services for connected consumers · Open source and collaborative business models · The optimisation of things: towards a truly sustainable development W ith the Internet of Everything, it will possible for everybody and everything to be connected at all times, receiving and processing information in real time. The result will be new ways of making decisions, backed by the availability of information. The option of being online and traceable at all times has also led to the emergence of a new generation of consumers, who demand new products and services based on ubiquity and interconnection. These shifts in production and consumption patterns are changing the relations between all the agents in the system. There is a whole host of new opportunities to design and offer new products and services and make more efficient use of existing assets, creating a fertile ground for entrepreneurs. The dynamic of change of the technologies involved in the Internet of Everything is particularly interesting. In many fields, successful new solutions will turn their backs on traditional models of evolution, based on standards set out by large corporations or supranational bodies. Instead, they will consist of “cheap hacks” promoted by entrepreneurs who are capable of identifying efficient problem-solving alternatives and distributing them efficiently thanks to permanent and ubiquitous connectivity, enabling collaboration...

Words: 3674 - Pages: 15

Free Essay

Internet

...INTERNET ADDICTION: USE OF SOCIAL NETWORKING SITES AND ITS IMPACT ON INTERMEDIATE STUDENTS Abstract: Widespread use of internet has led to a kind of addiction. The present study examined the use of Internet and getting addicted to the social networking sites and on the whole its impact on intermediate level students. The sample comprised of 285 students out of which the addicts were pulled out. The tools used were questionnaire developed by Dr. Kimberly Young, the IAT which is a 20-item questionnaire that measures mild, moderate, and severe levels of Internet Addiction with its sociological impact. An additional questionnaire drafted at International Development Research Centre (IDRC) was used to gauge the behavioural, psychological and physical impact of internet on Intermediate students. And finally a questionnaire was coined in the assistance of Miss Sunanda Jati, lecturer, Dau Dayal Girls P.G. College to check the indulgence of intermediate students on social networking sites. The researcher used dichotomous questions. It was found that the students have positive tendency towards the useful and easy reflections of internet and a greater tendency towards getting addicted. The advent of computer brought about a major revolution in the history of human culture; a major debate broke through whole world whether this machine could replace human beings and become our master. Eminent scholars, learned people, high profile politicians and almost every literate being were voicing...

Words: 314 - Pages: 2

Premium Essay

Internet

...The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia Europe Direct is a service to help you find answers to your questions about the European Union New freephone number * 00 800 6 7 8 9 10 11 Certain mobile telephone operators do not allow access to 00800 numbers or these calls may be billed. In certain cases, these calls may be chargeable from telephone boxes or hotels. «The views expressed are those of the authors and not necessarily those of the European Commission or any of its officials» A great deal of additional information on the European Union is available on the Internet. It can be accessed through the Europa server (http://www.europa.eu). Cataloguing data can be found at the end of this publication. ISBN 978-92-79-08008-1 © European Communities, 2008 Reproduction is authorised provided the source is acknowledged. Printed in Belgium PRINTED ON CHLORE FREE PAPER The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia ••• 2 Preface 5 priorities identified by the Internet Governance Forum: openness, security, access, diversity and critical Internet resources. The use of the Internet in public policies will considerably grow in areas such as education, culture, health and e-government...

Words: 66329 - Pages: 266

Free Essay

Internet

...N Gene A Cooks EDCI 573 Instructional Lesson Plans On Digital Citizenship Content: Digital Citizenship Grade level: 9-12 Introduction: The lesson plans that I have created here will be designed to educate students about digital citizenship. The lesson will help students learn how to Interact with others online in an ethical manner. These lessons are established for high school students. The main idea in these seven lessons is to bring awareness to the seven of nine elements to digital citizen. The seven elements that will be taught are: Digital Commerce, Digital Communication, Digital Literacy, Digital Etiquette, Digital Law, Digital Rights and Responsibilities, Digital Health and Wellness Digital Security. The lessons are meant to examine and discuss the ethical approach to all these elements. Each activity, game, reading, quiz and video will help students make better choices while engaged in the world of digital citizenship. It is very important that students in the 21st century and beyond be taught these concepts, so they are protected and make appropriate decisions online. There are thirty-five students in my class with the addition of one English Learner; one special needs student and two GATE students. The duration of each lesson will be approximately forty-five minutes. The student diversity in my class will be accommodated through cooperative learning activities, peer coaching, and feedback and checking for understanding. The formative assessments...

Words: 4102 - Pages: 17

Premium Essay

The Internet

...Internet is a connection of network of computers. Internet is popularly known as "Network of Networks". We can connect to any computer throughout the world through internet. Internet is the product of a military undertaking. The Pentagon's, Advanced Research Project Agency (ARPA) funded its creation in 1969, as ARPA net. The intention was, to develop a geographical communication network for military use. All over America, engineers and scientists working on military contracts were allowed to share computers and computer resource through ARPA net. Then internet becomes popular. According to the definition provided by Oxford dictionary, the Internet is an arrangement of connected computers, which lets the computer users all over the globe exchange data. Essentials of Internet are computer, telephone connection, modem and Internet Connection. There are so many uses of Internet. There are so many uses of internet. I will describe the 10 best uses of the internet. First, we use internet to research. The internet has tons of information. Anything we may want to know or need to know about is just online. . Search for and read millions of files stored in the computers throughout the world. Also a great way to know what is going on in your city. Second, we can use internet as a library. Technology has dramatically changed the internet and to libraries. Many library website have plenty to offer for information that you need. Third, internet same as E-Books. There are number o books...

Words: 1244 - Pages: 5

Free Essay

The Internet

...THE INTERNET  The internet is the largest computer network in the world, connecting millions of computers.  A network is a group of two or more computer systems linked together. Types of Computer Networks  Local Area Network (LAN) - two or more connected computers sharing certain resources in a relatively small geographic location.  Wide Area Network (WAN) -two or more LANs. The computers are farther apart and are linked by telephone lines or radio waves. -The internet is the largest Wide Area Network (WAN) in existence. Servers and Clients  Server -a computer that "serves" many different computers in a network by running specialized software and storing information.  Client -communicates with the server to get the information it requires. Peer-to-Peer (P2P) Network  each computer acts as both a server and a client. The World Wide Web (WWW)  The internet is the physical network of computers all over the world.  The World Wide Web is a virtual network of web sites connected by hyperlinks (or "links"). Web sites are stored on servers on the internet, so the World Wide Web is a part of the internet. HTML  The backbone of the World Wide Web is made of HTML files, which are specially-formatted documents that can contain links, as well as images and other media. URL  To get to a web page, you can type the URL (Uniform Resource Locator) in a browser.  The URL, also known as the web address, tells the browser exactly where to find the page...

Words: 3555 - Pages: 15