Você está na página 1de 36

HTTP

HTTP stands for Hypertext transfer protocol. This is

the language your web browser uses to request pages & graphics from the web server. You can see that your web browser using the HTTP protocol when it is shown at the start of a web address such as : http://www.yahoo.com.

URL
URL( uniform resource locator) is just another name

for a web address. The URL consists of the name of the protocol (usually http or ftp) followed by the address of the computer you want to connect to.

Hyperlink
Hyperlink is a piece of text (or a graphics) on a web

page, which when clicked on will automatically: 1. Take you to a different part of the same page. 2. Take you to a different page within the web site. 3. Take you to a page in a different web site. 4. Enable you to down load a file.

ISP
ISP ( Internet service provider)

If you want to connect to the internet, you need to

subscribe via an internet service provider. The ISP gives you a connection to the internet either via a telephone line or via special digital high speed line.

FTP
FTP (file transfer protocol) is just a way of

transferring data from one place to another over the internet.

E-Mail
Email is a way of sending electronic messages

through the systems and networks that make up the internet. Advantages:
Very fast. Inexpensive Transmission is Secure and Reliable Send the same message to many people.

Web Browser
Web browser allows you to view web pages.

Web browsing applications include Internet

Explorer, Firefox, Google Chrome.

Search Engines
A web search engine is designed to search for

information on the World Wide Web (WWW) and FTP servers. The search results are generally presented in a list of results. The information may consist of web pages, images, information and other types of files. Allows you to search for relevant information on the web.

Protected Web Sites


A protected site is a site which allows only restricted

access. In many cases sites are restricted via a password. If you dont supply the correct password when you access the site, you are not allowed to view the site contents.

Digital certificate
Digital certificate is used to encrypt information for

secure transmission across the internet.

Understanding encryption
Encryption is a means scrambling an email message.

It used to make a message more secured.

Firewall
Firewalls can be implemented in either hardware

or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified security criteria.

Malware
Malware is the short name for malicious software. It

is software designed and developed for the purpose specifically to damage or disrupts a single computer, server, or computer network. Malware can include computer viruses, worms and Trojan horse.

Voice over Internet Protocol (VoIP)


Voice over Internet Protocol (Voice over IP, VoIP) is

communication protocols, and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

Opening and closing a Web browser


To open the Microsoft Internet Explorer: double click on the

Internet Explorer Icon. The Microsoft Internet Explorer: 1. The Back icon: will re-display the previous page which you visited. 2. The forward icon: will display the next page ( assuming that you have first moved back a page). 3. will stop a page from downloading. 4. The refresh icon: reload the information from the web site which you are visiting. 5. The Home icon: will take you to your default starting page. To close the Microsoft Internet Explorer: click on the close icon ( the x at the top right of the window).

Using Help
Click on the Help icon, you will see the Help dialog

box displayed, you can browse through the contents pages or on the SEARCH tab and type in a question.

Setting the Home Page


Click to open the Microsoft Internet Explorer. 2. Navigate to the webpage you would like to set as the home page. 3. Click the arrow to the right of the home button, and then click add or change home page. 4. On the add or change home page do the following: To make your current webpage your only home page click Use this webpage as your only home page. To add the current webpage to your set of home page tabs click, add the webpage to your home page tabs.
1.

Adding webpage to your favorites


When you wish to add the current webpage to your

favorites: 1. Click on the favorites button then select the favorite tab. 2. then click on the Add to favorites command. 3. Then click ok.

Deleting a website from Favorites


Click on the favorites button then select the favorite tab. 2. Select the item which you wish to delete, then click on the delete button.
1.

Copying text, Images and URLs to a Document


Copying images: Right click on the image, then select save picture as command and save image to disk. This picture can be imported into the document. 2. Copying URL: right click over a web address hyperlink and then select the Copy Shortcut command, then you can paste it from the clipboard into your document.
1.

Saving a webpage to a drive as a text.


1. 2. 3. 4. 5. 6.

Display the webpage which you wish to save to disk. Click on the page button and select save as command. Click on the down arrow to the right of save as type section of the dialog box. Select the required file format. You can change the file name and location. Click on the Save button.

Allow or block cookies


Start internet explorer. Click The tools button and select internet options from the menu. Click the privacy tab. In the setting section , the slider can be moved up and down to select more or less strict rules for allowing cookies to be stored on the computer. To accept or prevent cookies from websites do the following: 1. Click The tools button and select internet options from the menu. 2. Click the privacy tab. 3. Click the sites button. 4. Enter a website URL , then click block or allow for all cookies from that site to be blocked or allowed. Then click ok
1. 2. 3. 4.

Clearing the browser Cache and temporary Internet files.


1. 2. 3.

4.
1. 2. 3.

To delete temporary internet files do the following: Start internet explorer. Click the tools button. Select delete browsing history from the menu that opens. The delete browsing history window opens. Click the delete all.. Button. To manually clear the history completely: Click the tools button. Select delete browsing history from the menu that opens. The delete browsing history window opens. Click delete history.

Cont
To set the limit to clear the browsing history:

Start internet explorer. 2. From tools select options. 3. In the browsing history section, click the setting button. The temporary internet files and history settings window opens. 4. In the history section, enter the number of days for which the browsing history should be kept.
1.

Allowing or Blocking Pop-Ups


You can adjust the filter level of the pop-up blocker

to regulate what type of pop-ups you want to block. To adjust the filter level. Do the following: 1. Start internet explorer. 2. In the tools menu, select pop-up blocker. 3. Select turn on pop-up blocker from the sub-menu to block pop-ups. Or Select turn off pop-ups blocker from the sub menu to allow pop-ups.

Web-Based Encyclopedia and dictionaries


Wikipedia has become a very popular free online

encyclopedia. to access wikipedia do the following: 1. Open internet explorer. 2. Browse to www.wikipedia .org 3. Enter the search term. 4. Click the search button and a list of results will be returned. To use an online dictionary, do the following: 1. Go to www.askoxford.com 2. Enter the word to search 3. A search will be performed and the definition returned.

The structure of an E-mail Address


An e-mail address has three parts

1-Username The first part of an email address is the username. The username identifies the person who receive the e-mail sent to the e-mail address. 2-@ sign The middle part of an email address is the @ sign , called @ sign. It separates the username from service provider or e-mail provider name. every email address includes an @ sign.

The structure of an E-mail Address


3-Service provider or e-mail provider

The service provider generally is a company or organization that provides the connection to the internet and provides e-mail.

The benefit of an email address book


Stores the names and e-mail addresses of people. 2. Reduces errors and makes using e-mail quicker and more convenient.
1.

Manage E-mail folders


Inbox: is a mail folder that stores all incoming e

mail. Sent item: when you send a message, a copy of the message is stored in the sent item folder. Outbox: the outbox is a temporary storage folder for messages that have not been sent. Deleted item or Trash: when you delete a message from any folder, it is placed in the Deleted Items or Trash Folder. Junk E-mail or Spam: is unwanted e-mail that arrives from unsolicited sources.

Creating and sending a message


1.

2.
3.

4. 5. 6.

Start your e-mail program. Click the button or link that allows you to create new mail. Enter a valid e-mail address in the To text box as the address of the person to whom you are sending the message. Type the title for your message in the subject box. Type your message in the message window. Click the send button to send your message.

Copy (Cc), Blind copy (Bcc)


( Cc): Send to recipient who need to be aware of the

correspondence between the sender and recipient. ( Bcc): Hides e-mail address of recipient to all others.

Receiving and Replying to a message


1.

2.
3. 4. 5. 6.

7.

Start your email. Click the Get Mail or Check Mail button, then open the inbox in the e-mail program. Double-click the message to open it. Click the reply button. Type your message in the message body as the reply. Click the Send button in the message window. Close the original message if necessary to return to the inbox.

Forwarding a message
Double click the message to open it. 2. Click the forward button. 3. Type a friends e-mail address in the To text box. 4. Click the Send button.
1.

sending a message with an Attachment


1. 2. 3.

4.
5. 6. 7.

In your e-mail program, click the button to open a new mail message window. type your friends e-mail. Type the title in the subject box. Type the message in the message body. Click the Insert File, Attach File, or Attach button. Navigate to the driver and folder where you store your data files. Then click Insert, Open, or Attach.

Email
Flag for attention later. Read and unread email Priorities email: A. normal priority. B. High priority. C. Low priority. Saving an email as draft. Move emails to email folder. Delete email. Restore deleted emails. Empty the deleted item folder. Adding an address to contact list. Delete an address from the contact list

Você também pode gostar