2 - The Internet
2 - The Internet
2 - The Internet
The internet
Course Objectives:
a. Define internet terminologies;
b. discuss the evolution of Web;
c. differentiate the Internet from the Web; and
d. Compare and contrast the surface web, deep web, and the dark web.
Motivation:
When you hear the word “internet”, what comes into your mind?
Definition of Terms:
Internet Service Provider (ISP)
o Business that provides individuals and organizations access to the Internet free or for a fee
o Examples: Smart, PLDT, Globe, Sky Cable
Bandwidth
o Amount of data that travels over a network
o Measured according by bits (b) / bytes (B) per second
Kilobit per second (Kbps)
Megabit per second (Mbps)
Internet Protocol (IP) Address
o A sequence of numbers that uniquely identifies:
Each device connected to the internet
Address of a website on the internet
Domain Name
o Text-based name that corresponds to the IP address
o Examples: google.com, facebook.com
Domain Name System (DNS)
o Translates the domain name into its associated IP address
The Internet
Definitions
o A worldwide collection of networks that links millions of businesses, government agencies,
educational institutions and individuals
o Global wide area network that connects computer systems across the world
Connection Types
o Wired
Physical connectivity to the internet via the use of cables or wires
Examples:
- Cable Internet Service - Local Area Network (LAN)
- Digital Subscriber Line (DSL) - Coaxial Cable
- Dial-up
o Wireless
"Having no wires" or no physical attachment needed in order to connect to the internet
Examples:
- Wireless Fidelity (WiFi) - Wireless Area Network (WAN)
- Mobile Broadband - Satellite Internet Service
- Fiber Optics
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & 11H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
Other Terms
Hypertext Transfer Protocol (HTTP)
o Method being used to transfer information on the web
Hypertext Transfer Protocol Secure (HTTPS)
o Also termed as Hypertext Transfer Protocol over Secure Socket Layer (SSL)
o A more secure way of transferring information
o Commonly used when authenticating data
Illustration on the Difference between HTTP and HTTPS
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & 11H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
Top-Level Domain
o Last segment; followed by dot
o Types:
Generic: .com, .net, .edu, etc.
Country: .ph, .sg, .us, etc.
TLD Intended Purpose Examples
.com Commercial organization, businesses, and https://www.facebook.com
companies https://www.shopee.com
.edu Educational institutions https://www.uc-bcf.edu.ph
.gov Government agencies https://www.deped.gov.ph
.mil Military organizations https://www.army.mil.ph
.net Network providers https://www.behance.net
.org Non-profit organizations https://www.change.org
Search Engine
o Software system that finds sites, webpages, images, and other information related to a topic
o Examples: google.com, bing.com, search.com
Internet Browsers
o Application software that is used to access the web
o Examples: Google Chrome, Mozilla Firefox, Microsoft Edge
Subject Directory
o Classifies web pages in an organized set of categories
Content Can be search through the Bulk of information present Most contents are in illegal
regular search engines are those that are sensitive,
private and personal
WikiLeaks (http://76ssfjn22svo4vyl.onion)
o Deep web organization for News
o Read news for CIA, FBI, Google, etc.
o Use the search engine and find news on this website
Gorfnets (http://gorfpiehonruqzzh.onion)
o A chatroom with host and IP, mail channels, and slot game
Vend0r (http://vendolkwsu5thjxb.onion)
o Selling of hacked PayPal accounts and credit card dumps
o Can help with conversion into clean Bitcoins
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & 11H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
Further Watching:
How does the Internet work?: https://www.youtube.com/watch?v=x3c1ih2NJEg
What is the World Wide Web? https://www.youtube.com/watch?v=J8hzJxb0rpc
Surface Web vs. Deep Web vs. Dark web https://www.youtube.com/watch?v=QR_fEcCqk5s
How the TOR works: https://www.youtube.com/watch?v=6czcc1gZ7Ak
References:
Callo, Erwin Reyes. 2017. SCIENCE in Today’s World for SENIOR HIGH SCHOOL
Empowerment Technologies. Sibs Publishing House
CarikeLoretz, V. A. P. B. (2017, March 17). The rld Wide Web – From Web 1.0 to Web 5.0. Social
Media Networks in Business. https://carikesocial.wordpress.com/2017/03/15/the-world-wide-
web-from-web-1-0-to-web-5-0/
CISO Guide: Surface Web, Deep Web and Dark Web - Are they different? (n.d.). CISO
Platform. https://www.cisoplatform.com/profiles/blogs/surface-web-deep-web-and-dark-
web-are-they-different
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & 11H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
Innovative Training Works, Inc. (2016). Empowering Technologies. First edition. Manila: Rex
Bookstore.
Krauter, C. (2020, June 17). Web 1.0, 2.0 and 3.0 for dummies. Datanova.
https://datanova.com.au/web-1-0-2-0-and-3-0-for-dummies/
FORMATIVE ASSESSMENT
4. A. .edu C. .net
B. .mil D. .phd
7. A. Ask C. Bing
B. Amazon D. Google
Instructions – Multiple Choice. Read and analyze each situation/question carefully and choose the
correct answer. Write the letter that corresponds to your answer. (10 items, 1 pt. each)
11. The following are types of wired internet connection. Which of the following is an exception?
A. Dial-up C. Fiber optics
B. Digital Subscriber Line D. Local Area Network
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & 11H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
12. The BZA café provides a free internet access to their customers with their Fiber optics connection
through PLDT. What is PLDT?
A. Bandwidth C. IP Address
B. DNS Server D. Internet Service Provider
13. What is defined as classified webpages in an organized set of categories?
A. Search directory C. Subject directory
B. Search engine D. Subject engine
14. Which of the following does not describe Web 1.0?
A. Executable C. Readable
B. Has flat data D. Static
15. Web 2.0 is described below. Which of the following is an exception?
A. Dynamic C. Telepathic
B. Social in nature D. Writable
16. What is defined as the sequence of numbers that uniquely identifies each device connected to
the Internet?
A. Host name C. MAC address
B. IP address D. URL
17. What is the internet currency that is used in a virtual transaction, usually in the deep web?
A. Bitcoin C. Share
B. Cryptocurrency D. US Dollar
18. Who created The Onion Router?
A. United States Department of Defense C. United States Naval Research Laboratory
B. Unites States Intelligence D. United States Research Department
19. The following are characteristics of the dark web. Which is an exemption?
A. Can be accessed by a regular browser C. Drugs, guns and ammos are sold easily
B. Contains most of the internet information D. Users can find hackers-for-hire
20. Which of the following doesn’t describe the deep web?
A. Can be accessed using TOR only C. The hidden Web
B. Contains personal information D. The Invisible web
How to Submit:
Answer “WW2 – The Internet” under “Module 2 – The Internet”.
For Messenger submissions, use your device’s note-taking software (Notepad, Sticky Notes,
Google Keep, Notes, etc.) to place the LETTERS only of your answers. Don’t forget to write your
name and section.
Submission Channels:
Canvas K-12 LMS (Quizzes)
Private messenger in Facebook messenger: fb.com/lovelyjenn.reformado.50