The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

BASIC INTERNET SEARCHING TECHNIQUES AND EMAIL

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Penerbitan PMS, 2023-02-21 00:00:52

BASIC INTERNET SEARCHING TECHNIQUES AND EMAIL

BASIC INTERNET SEARCHING TECHNIQUES AND EMAIL

BASIC INTERNET SEARCHING TECHNIQUES & EMAIL NOR SHARIDAH MOHD ROSLAN MOHD NOOR SALLEH NOR HIDAYAH ABDUL SHUKOR JABATAN MATEMATIK, SAINS DAN KOMPUTER POLITEKNIK MUADZAM SHAH


Published By: JABATAN MATEMATIK SAINS DAN KOMPUTER POLITEKNIK MUADZAM SHAH, PAHANG, MALAYSIA Design and Layout by: NOR SHARIDAH MOHD ROSLAN MOHD NOOR SALLEH NOR HIDAYAH ABDUL SHUKOR


i www. EDITOR COMMITEES Managing Editor Nor Hidayah Abdul Shukor Editor Nor Sharidah Mohd Roslan Nor Hidayah Abdul Shukor Writer Nor Sharidah Mohd Roslan Mohd Noor Salleh Nor Hidayah Abdul Shukor Application Publishers and Developers Nor Sharidah Mohd Roslan Nor Hidayah Abdul Shukor 1 st Edition 2022 All rights reserved. No part of this work may be reproduced, stored in any form or by any means without the written permission of the publisher. Published by: Politeknik Muadzam Shah Lebuhraya Tun Abdul Razak 26700 Muadzam Shah Pahang Darul Makmur.


ii www. ACKNOWLEDGEMENT We would like to express our appreciation and thanks to those who have provide a lot of guidance and encouragement towards the arrangement of this Basic Internet Searching Techniques & Email eBook. We aim to continuously contribute our efforts and knowledge for our students and look forward to provide the best for their understanding in information technology. Nor Sharidah Mohd Roslan Mohd Noor Salleh Nor Hidayah Abdul Shukor Lecturer Mathematics, Science and Computer Department Politeknik Muadzam Shah, Pahang.


iii www. TABLE OF CONTENTS Editor Committees ……………………………………………. i Acknowledgement …………………………………………….. ii Table of Content ……………………………………………….. iii Internet ……………………………………………………………… 1 Computer Network ..………………………………………. 2 Internet Applications ………………………………….... 3 Web Browser …………………………………………………. 4 World Wide Web …………………………………………… 5 Search Engine ………………………………………………… 6 How Internet Work ………………………………………… 7 Internet Searching Techniques …………………….. 8 - 16 Exercise …………………………………………………………….. 17 Email ………………………………………………………….. 18 - 24 Email Security & Privacy …………………………….. 25 - 26 Reference ………………………………………………….. 27 - 28


nternet is known as the interconnection of computer networks. The connection involves millions computing devices that carry and transfer information from one device to the other. Desktop computers, smartphones, video game consoles and even car alarms can communicate and share information with any other devices as long as they are connected to the Internet. Internet 1 I Global Position System (GPS) technology is introduced by US Department of Defense The born of ARPANET 1960 1969 The beginning of email World Wide Web (www) is available for public use 1974 1991 1998 2000 The growth of Social media platforms like Facebook, Twitter Google search engine launched for public use Introduction of domain name (DNS) such as .com, .edu More than 6 billions people or almost 65 % of world population use Internet 1983 • Brief History of Internet


Computer Network 2 Personal Area Network (PAN) PAN is the most basic type of computer network that centered to individual’s work space. Examples of PAN are USB, computer, phone and printer. Metropolitan Area Network (MAN) MAN is a large computer network that usually spans a city or a large campus, typically covers area between from 5 km to 50 km. Wide Area Network (WAN) WAN covers a large geographic area such as country, continent or even whole of the world. In order to gain access to Internet, a user need to register to Internet Service Provider (ISP). Each computer connected to the Internet have a unique address call Internet Protocol (IP). IP address makes device accessible for communication where it allow the device to identify what computer is trying to communicate with it and which one is requesting information. Computer network advantages: • Communicating using email, video conference • Sharing devices such as printers, scanners. • Sharing files • Sharing software and operating programs on remote systems • Allowing network users to easily access and maintain information Local Area Network (LAN) LAN connects network devices over a relatively short distance, for example at office building, school. A computer network is a set of computers connected for the purpose of sharing information electronically. • Type of Computer Network • Internet Access


Internet Applications 3 • Communication Communication is one of the most used applications of the Internet and almost everyone is communicating through the Internet. • Entertainment Online entertainment applications or sites such as Netflix, Amazon Prime, YouTube. • Business Internet not only help in selling and transactions process, it also helps business and e-commerce in commercialize product globally. • Shopping Apart from online shopping applications, shoppers also use Internet to do survey regarding products, stores or services. • Job Search Job seekers can easily find job opportunity related through the Internet as well make preparation for the job interview • Research Using Internet to conduct research offers many advantages like free and fast access to vast information regarding of any issues • Social Networking Social networking platforms allow users to connect with friends, family, classmates, customers, and clients. • Education Internet has become an important tool for teaching as well as learning. Through Internet, educators and students can gain information and even sharing knowledge. • Sport Internet plays important role in e-games as well as help athletes and coaches in others sport in developing their sport performances.


Web Browser 4 Web browsers can be used on many devices such as personal computer, laptop, tablet and smartphones. eb browser or commonly known as a browser is an application software Wused to access websites and web pages such as World Wide Web (www). According to my.oberlo.com, Google’s Chrome is the most used browser in May 2022 followed by Apple’s Safari. Chrome has covered 64% global market share on all devices, with Safari on second place with 19 %. When a user requests a web page from a particular website, the web browser retrieves the necessary content from the web server and displaysthe page on the user's device. There are several browsers such as Internet Explorer, Google Chrome, Firefox, Safari, and Opera. www. Figure 1: Icons of web browser


orld Wide Web (www) is an internet-based service, which has massive collection of digital pages to access information over the Internet. It uses a common set of rules known as protocols, to distribute documents across the Internet in a standard way. The World Wide Web is viewed through web browser software. User can access the digital libraries containing numerable articles, journals, e-books, news, tutorials stored in the form of web pages on computers around the world via hyperlinks. Each web page has a unique address called Uniform Resource Locator or URL. World Wide Web W 5 Figure 2: URL for Politeknik Muadzam Shah website is www.pms.edu.my http://www.pms.edu.my/pms4/info-korporat Type of site World Wide Web Server Domain Country Sub directory File on server


Search Engine earch engine is different from web browser. While web browser is a software, search engine is a website that provides links to other websites. S Figure 4: Microsoft g search engine There are several search engine offered to Internet users with the popular one include Google, Yahoo! and g. Figure 3: Google search engine 6 .


How Internet Works 7 ❑ STEP 1 User connects computer or any communication device to Internet ❑ STEP 2 Type in URL of the web site a user wishes to browse into web browser or simply type the keyword. It is called search query. ❑ STEP 3 The query is processed and pushed to user ISP. User browser looks up the IP address for the domain name of the web site through Domain Name Server (DNS). DNS will translate the textbased domain into number-bases IP address. ❑ STEP 4 Browser sends Hypertext Transfer Protocol (HTTP) request to the target server to send a copy of the web page to the user using IP. HTTP is a language used in Internet communication ❑ STEP 5 The server then approves request and sends a “200 OK” message to user computer or device and sends web page files to the browser in the form of data packets. ❑ STEP 6 As user browser reassembles the data packets, the web page will loads and allowing user to enjoy the browse. How does search engine work? ▪ When a user enter the keywords on the search engine, it will scan its index of sites and match the keywords and phrases with those in the texts of documents available on the Internet. ▪ The information you retrieve will depend on the search engines and the searchterms you use. ▪ Then, the search engine will returns a list of documents matched with the. • How Internet Works


8 Internet Searching Techniques Each search engine has basic setting like “tools”, “images”, “videos”, “news” and “maps” to help user in quick searching. nternet searching or web search query is a request for information made by IInternet user using search engine. Technique in Internet Searching - There are several techniques in searching information on Internet: i) Use Keyword, Phrases and Synonym - Use Keyword - Use Phrases - Use Synonym - Use tilde symbol (~ ) - Use + and - sign ii) Use Boolean operator iii) Use truncation earch string is a string of characters used in search query to find desired results. The string of character can be a comation of words, number and symbols. S With the existence of billions of websites, users can get variety of information from Internet. Therefore, techniques in Internet searching are very necessary. Figure 5: Google search engine tool setting


9 Keyword is a basic in all Internet searching techniques. It acted like foundation between what users are searching for and the content that providing their need. How to find right keyword for your searching a) Identify topic and specific about what you are looking for. b) Break the topic into key concepts or points. c) Write down all the keywords and phrases that best describe your topic. d) Think of synonyms or related terms for each concept or point. e) Consider spelling variations as well as the singular and plural of words. Keyword is a words or phrases that define the content that a user try to search on Internet. A user only needs to enter the keyword into search engines and search engine will find the information related to the content. General keyword may return with too many result on user search as some words has several synonyms. Therefore, finding the right keyword will help in searching process and bring user to the right content in fastest way Internet Searching Techniques • Use keyword, phrases and synonym


i) Use multiple keywords A multiple keyword searches retrieves more specific or focused results. When using a multiple keywords search, put the most important keywords first Example: Topic: Impact of social media among the teenagers If you are researching on social media and the teenager consider these related terms: Social Media: Social media sites, apps, platforms, social networks. Teenager: boys, girls, age Internet Searching Techniques 10 Figure 6: Google search result using multiple keyword • Use keyword, phrases and synonym


ii) Use phrases Use quotation mark (“ ”) around phrases to make sure the search engines will look for result that come all word in the phrases. Example: i. “caffeine sport performance” ii. “Covid-19 Epidemic in Malaysia” Figure 7: Google search result using quotes Figure 8: Google search result without using quotes Internet Searching Techniques 11 • Use keyword, phrases and synonym


iv. Tilde symbol (~ keyword) Use tilde symbol to include search with synonyms word with the keyword. Example: engineering ~ study The results included with synonym to study like lesson and learning. Figure 9: Google search result without using ~ symbol Internet Searching Techniques 12 Figure 10: Google search result using ~ symbol • Use keyword, phrases and synonym


i) Operator AND The “operator” AND will narrow the search because the results will contain allof the search terms connected by the word AND. Example: caffeine AND sport performance Internet Searching Techniques Figure 11: Google search result using AND operator Figure 12: Google search result without using AND operator 13 • Boolean Operator


Internet Searching Techniques 14 ii) Operator OR Use operator” OR or Vertical bar (| ) broadens the search because the results must contain at least one of the search terms connected by the word OR. OR is default operator in engine search. Example: heart OR lung Figure 13: Google search result using OR operator • Boolean Operator iii) Operator NOT Use of the operator NOT to excludes the unwanted term from the search results. Example: lung disease NOT smoking • Boolean Operator


Internet Searching Techniques 15 Use plus sign (+) in front the word to includes the word in search results. Vice versa, use a minus sign (–) in front of the word to exclude the unwanted word form the search result. Example: Microsoft +gates (no space between the minus sign and the word gates) Example: Heart -disease (no space between the minus sign and the word gates) • Using + and - signs Figure 14: Google search result using - sign Figure 15: Google search result without using - sign


Internet Searching Techniques 16 Truncation is a technique that broadens search by using truncation symbol (*, !, ?, #) When using truncation, user only need to put root of the keyword followed by the truncation symbol. The engine search will display all result related to the root word Example: learn* = learn, learns, learning For Google users, the search engine automatically truncate every keyword, means user did not need to put the truncation symbol. • Use Truncation Figure 16: Google search result using truncation


Internet Searching Techniques 17 This activity should be done in group. Enter the following keywords. Within group, discuss the result. Try different engine search and compare the result from each engine search. 1. The impact of social media on teenagers 2. The effect of social media on teenagers 3. “Effect of social media” on teenagers 4. Effect of social media on –teenagers 5. Effect of social media NOT teenagers Discuss the following questions 1. Why search engine is needed on internet? 2. Discuss the purposes of search on Internet. 3. Discuss features of advanced search techniques. 4. How do the Boolean operators work? 5. What do you understand by search engines in vernacular language? 6. Discuss various steps of effective search on internet. • Activity • Exercise


lectronic mail or e-mail is a method of transmitting messages by any electronic communication system. E-mail E E-mail is an efficient communication tool and it overcome difficulties faced during communication process by telephone. It is used widely from personal need, education and business. Most e-mail systems have features that allow recipients of email to view, print, save, react or forward the message. Even it can be used to send the same message to a group of people on a list. Today email is can be sent from other devices such as mobile phones, television or even games consoles. MIT first demonstrated a Compatible Time-Sharing System (CTSS) that allowed many users to log into the IBM 7094 from a remote dial terminal and online store filesto disk E-mail was started as a method for many mainframe computer users to share time to communicate with each other E-mail evolved into network mail that allowed users to send messages between different computers The beginning of the use of “@” symbol to separate usernames and machine names 1961 1965 1966 1971 Figure 17: Brief history of e-mail 18 The history of email start with the invention of computer-based messaging between users of the same system by Massachusetts Institute of Technology (MIT). 29th October 1969 mark as the historical day as the first message was sent from computer to computer on ARPANET. • History of Email


Figure 19: Example of spam email 19 Spam or sometime referred as junk email is an unsolicited message sent in a group to a large group of recipients. via email. Spam usually sent for commercial purposes but can be harmful as it ,may include malicious link that can infect receiver computer with malware. There are two types of email services provider; e-mail clients and webmail. Example of free email service and provider like Gmail, Yahoo! Mail or Microsoft Outlook. Between them, Gmail is the most used and popular among user. Figure 18: Example of email provider E-mail • Email Service Provider • Spam


20 E-mail ❖ Fast - Emails are delivered extremely fast when compared to traditional post. ❖ Simple - Emails can be sent at any time, anywhere in the world, as long as sender and receiver have internet connection. ❖ Cheap - Email can be considered cheap and free than traditional mail. Users only need Internet connection. ❖ Many receiver - Emails can be sent to one person or many receiver at one time. • Advantages of using Email ❖ The recipient needs access to the internet to receive email. ❖ Viruses are easily spread via email attachments (most email providers scan emails for viruses on your behalf). ❖ Spamming and Phishing activities - While spam considered as a junk mail that sometimes do not carry bad intention, phishing is an email sent from an Internet criminal disguised as an email from a legitimate, trustworthy source to scam the user into providing personal information or bank account numbers. ❖ There is no guarantee the mail will be read until the user logs in and checks their email. • Disadvantages of using Email


To create a Gmail address, user need to create a Google account through www.gmail.com. Gmail will redirect you to the Google account sign-up page. User needs to provide some basic information like name for your new Gmail address, birth date, gender, and location. Once the account is created, you'll be able to start adding contacts and adjusting your mail settings. Figure 20: Gmail sign up window Figure 21: Gmail sign in window 21 E-mail • Setting-up Gmail Account • Sign-in Gmail Account


At Gmail side bar, user can look at new messages at Inbox, check the message sent at Sent, save the composed message at Draft and Starred important message. Figure 22 : Interface of Gmail Sent Display all emails sent by the sender Inbox Inbox is where received e-mail is located Starred Display received emails that starred Draft Display unsent composed email 22 E-mail Figure 23 : Interface of Gmail • Gmail Interface • Gmail Side Bar


23 E-mail Figure 24 : Interface of Gmail Inbox Figure 25 : Interface of Gmail Sent • Inbox • Sent


Figure 27: New Message window Figure 26: Compose new message To write new email, use compose window as shown in Figure 26. “To” at new message window to add the email address of the recipient, the subject, and the body of the message. You'll also be able to add various types of text formatting, as well as one or more attachments. Even a signature can be added to the end of every email you send. 24 E-mail • Composing and Sending Email • Email Creation Features


Each user who has registered an email account must verify and complete the registration across multiple media such as SMS verification, second email verification, and ReCaptcha verification. The authentication techniques for this email provider are shown in the table below. E-mail Security & Privacy A password is a string of characters used by user for user identification or self-authenticate when accessing a computer network or any services. A strong password is a unique one that can protect your email, files and personal info from hackers. mail security is a term the define the procedures and techniques to protect email accounts, content, and communication against unauthorized access or any harmful activity. The process of sending email is often view as safe or in other words, nobody can view our email during the transmission process. In fact, email is often used by cyber criminal to spread malware, spam and phishing attacks. Email is also being used by attackers to gain a foothold in an enterprise network and obtain valuable company data. E 25 • Email Verification • Creating Strong Password How to create a strong password: ▪ Use longer password ▪ Avoid using personal info or common word


• Users who use routers and network adapters at home should change their passwords as often as possible Rename the router and network. • Comed the password with several characters Use strong passwords • The router needs to be updated periodically. Constantly update antivirus and operating system. • One of the easiest methods to secure your internet connection Turn on encryption • A firewall is a security device that protect network by filtering traffic and blocking hackers from gaining unauthorized access to computer Use various firewalls • WPS help user to pair more than one device with Internet. Disable the router to secure the connection. Disable Wi-Fi protected setup (WPS) • One of the best way to protect internet connection by. It hide users activity on Internet from other users. Use virtual private network (VPN) 26 E-mail Security & Privacy Network security prevents unauthorized users and hackers from accessing Wi-Fi networks and devices that use them. Several techniques can be practiced protecting the security of internet access • How to Secure Internet Access


Reference 1. A brief history of email: dedicated to Ray Tomlinson. https://phrasee.co/blog/a-brief-history-of-email 2. Database Search Tips. https://libguides.mit.edu/c.php?g=175963&p=1158679 3. Email that keeps your private information safe. https://safety.google/gmail/ 4. Google Account Help. https://support.google.com/accounts/answer/32040?hl=en#zippy=%2Cm ake-your-password-unique 5. How Does the Internet Work: A Step-by-Step Pictorial. https://www.hp.com/us-en/shop/tech-takes/how-does-the-internetwork#:~:text=It%20works%20by%20using%20a,where%20you're%20using %20it. 6. How to Choose Effective Keyword Phrases for Search Engine. https://www.dummies.com/article/technology/internet-basics/how-tochoose-effective-keyword-phrases-for-search-engines-189756/ 7. Internet of Things. Freepik. https://www.freepik.com/vectors/computernetwork'>Computer network vector created by freepik - www.freepik.com</a> 8. Jose Stigliano & Marco Bruni (2003). End-User Computing Tools. Encyclopedia of Information Systems, 2003 9. Most Popular Web Browsers in 2022. http://.my.oberlo.com 10. Thomas J. Law (2022, April 10). Meet the Top 10 Search Engines in the World 2022. http://.my.oberlo.com 11. Peggy Barker. Information Technologies. Clinician's Guide to Assistive Technology 12. Rebecca Edwards (2022, Jun 20). How Can I Secure My Internet Connection. SafeWise. https://www.safewise.com/online-securityfaq/secure-internet-connection/ 13. Sonic (2021, Jun 6). Top 8 Browser Software. https://commercecambodia.com/2021/06/06/top-8-browser-software/ 27


References 14. What is Email Security?. https://www.proofpoint.com/us/threatreference/email-security 15. Avinesh Panday. 10 Applications of Internet. https://quicklearncomputer.com/applications-of-internet/ 16. Samantha Olsson (2020, Jan 22). A Brief History of Telematics. https://www.redtailtelematics.com/en_us/a-brief-history-of-telematics/ 17. A Timeline of the Internet: 1969 - 2018. https://www.digitalinformationworld.com/2018/08/history-of-theinternet-infographic.html 18. Internet Basics. https://edu.gcfglobal.org/en/internetbasics 19. How Does the Internet Work: A Step-by-Step Pictorial. https://www.hp.com/us-en/shop/tech-takes/how-does-the-internetwork 20. Digital Population Worldwide. https://www.statista.com/statistics/617136/digital-populationworldwide/ 28


Click to View FlipBook Version