Escolar Documentos
Profissional Documentos
Cultura Documentos
the language your web browser uses to request pages & graphics from the web server. You can see that your web browser using the HTTP protocol when it is shown at the start of a web address such as : http://www.yahoo.com.
URL
URL( uniform resource locator) is just another name
for a web address. The URL consists of the name of the protocol (usually http or ftp) followed by the address of the computer you want to connect to.
Hyperlink
Hyperlink is a piece of text (or a graphics) on a web
page, which when clicked on will automatically: 1. Take you to a different part of the same page. 2. Take you to a different page within the web site. 3. Take you to a page in a different web site. 4. Enable you to down load a file.
ISP
ISP ( Internet service provider)
subscribe via an internet service provider. The ISP gives you a connection to the internet either via a telephone line or via special digital high speed line.
FTP
FTP (file transfer protocol) is just a way of
E-Mail
Email is a way of sending electronic messages
through the systems and networks that make up the internet. Advantages:
Very fast. Inexpensive Transmission is Secure and Reliable Send the same message to many people.
Web Browser
Web browser allows you to view web pages.
Search Engines
A web search engine is designed to search for
information on the World Wide Web (WWW) and FTP servers. The search results are generally presented in a list of results. The information may consist of web pages, images, information and other types of files. Allows you to search for relevant information on the web.
access. In many cases sites are restricted via a password. If you dont supply the correct password when you access the site, you are not allowed to view the site contents.
Digital certificate
Digital certificate is used to encrypt information for
Understanding encryption
Encryption is a means scrambling an email message.
Firewall
Firewalls can be implemented in either hardware
or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified security criteria.
Malware
Malware is the short name for malicious software. It
is software designed and developed for the purpose specifically to damage or disrupts a single computer, server, or computer network. Malware can include computer viruses, worms and Trojan horse.
communication protocols, and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
Internet Explorer Icon. The Microsoft Internet Explorer: 1. The Back icon: will re-display the previous page which you visited. 2. The forward icon: will display the next page ( assuming that you have first moved back a page). 3. will stop a page from downloading. 4. The refresh icon: reload the information from the web site which you are visiting. 5. The Home icon: will take you to your default starting page. To close the Microsoft Internet Explorer: click on the close icon ( the x at the top right of the window).
Using Help
Click on the Help icon, you will see the Help dialog
box displayed, you can browse through the contents pages or on the SEARCH tab and type in a question.
favorites: 1. Click on the favorites button then select the favorite tab. 2. then click on the Add to favorites command. 3. Then click ok.
Display the webpage which you wish to save to disk. Click on the page button and select save as command. Click on the down arrow to the right of save as type section of the dialog box. Select the required file format. You can change the file name and location. Click on the Save button.
4.
1. 2. 3.
To delete temporary internet files do the following: Start internet explorer. Click the tools button. Select delete browsing history from the menu that opens. The delete browsing history window opens. Click the delete all.. Button. To manually clear the history completely: Click the tools button. Select delete browsing history from the menu that opens. The delete browsing history window opens. Click delete history.
Cont
To set the limit to clear the browsing history:
Start internet explorer. 2. From tools select options. 3. In the browsing history section, click the setting button. The temporary internet files and history settings window opens. 4. In the history section, enter the number of days for which the browsing history should be kept.
1.
to regulate what type of pop-ups you want to block. To adjust the filter level. Do the following: 1. Start internet explorer. 2. In the tools menu, select pop-up blocker. 3. Select turn on pop-up blocker from the sub-menu to block pop-ups. Or Select turn off pop-ups blocker from the sub menu to allow pop-ups.
encyclopedia. to access wikipedia do the following: 1. Open internet explorer. 2. Browse to www.wikipedia .org 3. Enter the search term. 4. Click the search button and a list of results will be returned. To use an online dictionary, do the following: 1. Go to www.askoxford.com 2. Enter the word to search 3. A search will be performed and the definition returned.
1-Username The first part of an email address is the username. The username identifies the person who receive the e-mail sent to the e-mail address. 2-@ sign The middle part of an email address is the @ sign , called @ sign. It separates the username from service provider or e-mail provider name. every email address includes an @ sign.
The service provider generally is a company or organization that provides the connection to the internet and provides e-mail.
mail. Sent item: when you send a message, a copy of the message is stored in the sent item folder. Outbox: the outbox is a temporary storage folder for messages that have not been sent. Deleted item or Trash: when you delete a message from any folder, it is placed in the Deleted Items or Trash Folder. Junk E-mail or Spam: is unwanted e-mail that arrives from unsolicited sources.
2.
3.
4. 5. 6.
Start your e-mail program. Click the button or link that allows you to create new mail. Enter a valid e-mail address in the To text box as the address of the person to whom you are sending the message. Type the title for your message in the subject box. Type your message in the message window. Click the send button to send your message.
correspondence between the sender and recipient. ( Bcc): Hides e-mail address of recipient to all others.
2.
3. 4. 5. 6.
7.
Start your email. Click the Get Mail or Check Mail button, then open the inbox in the e-mail program. Double-click the message to open it. Click the reply button. Type your message in the message body as the reply. Click the Send button in the message window. Close the original message if necessary to return to the inbox.
Forwarding a message
Double click the message to open it. 2. Click the forward button. 3. Type a friends e-mail address in the To text box. 4. Click the Send button.
1.
4.
5. 6. 7.
In your e-mail program, click the button to open a new mail message window. type your friends e-mail. Type the title in the subject box. Type the message in the message body. Click the Insert File, Attach File, or Attach button. Navigate to the driver and folder where you store your data files. Then click Insert, Open, or Attach.
Email
Flag for attention later. Read and unread email Priorities email: A. normal priority. B. High priority. C. Low priority. Saving an email as draft. Move emails to email folder. Delete email. Restore deleted emails. Empty the deleted item folder. Adding an address to contact list. Delete an address from the contact list