Internet

  1. Internet,Advantages and Disadvantages of Internet,Services Provided by internet

    Internet:

    Internet is a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
     

Advantages and Disadvantages of Internet:

Advantages:  1) Information on almost every subject imaginable. 2) Powerful search engines 3) Ability to do research from your home versus research libraries. 4) Information at various levels of study. Everything from scholarly articles to ones directed at children. 5) Message boards where people can discuss ideas on any topic. Ability to get wide range of opinions. People can find others that have a similar interest in whatever they are interested in. 6) The internet provides the ability of emails. Free mail service to anyone in the country. 7) Platform for products like SKYPE, which allow for holding a video conference with anyone in the world who also has access. 8) Friendships and love connections have been made over the internet by people involved in love/passion over similar interests. 9) Things such as Yahoo Answers and other sites where kids can have readily available help for homework. 10) News, of all kinds is available almost instantaneously. Commentary, on that news, from every conceivable viewpoint is also available. Disadvantages:  1) There is a lot of wrong information on the internet. Anyone can post anything, and much of it is garbage. 2) There are predators that hang out on the internet waiting to get unsuspecting people in dangerous situations. 3) Some people are getting addicted to the internet and thus causing problems with their interactions of friends and loved ones. 4) Pornography that can get in the hands of young children too easily. 5) Easy to waste a lot of time on the internet. You can start surfing, and then realize far more time has passed than you realized. Internet and television together of added to the more sedentary lifestyles of people which further exacerbates the obesity problem. 6) Internet has a lot of “cheater” sites. People can buy essays and pass them off as their own far more easily than they used to be able to do. 7) There are a lot of unscrupulous businesses that have sprung up on the internet to take advantage of people. 8) Hackers can create viruses that can get into your personal computer and ruin valuable data. 9) Hackers can use the internet for identity theft. 10) It can be quite depressing to be on the internet and realize just how uneducated so many people have become in today’s society.

A summary of advantages and disadvantages of using a internet:

Ten years ago, the Internet was practically unheard of by most people. Today, the Internet is one of the most powerful tools throughout the world. The Internet is a collection of various services and resources. The Internet’s main components are E-mail and the World Wide Web. Actually, there’s a lot more to the Internet than E-mail, search engines, celebrity web sites, up-to-the-second sports scores, and chat rooms full of discussions. The Net also ranks as one of today’s best business tools. Almost all households contain the Internet; however, before people connect to the Internet, they need to be aware of its disadvantages and advantages.

     Many people fear the Internet because of its disadvantages. They claim to not use the Internet because they are afraid of the possible consequences or are simply not interested. People who have yet connected to the Internet claim they are not missing anything. Today’s technological society must realize that it is up to them to protect themselves on the Internet.

     Children using the Internet have become a big concern. Most parents do not realize the dangers involved when their children connect to the Internet. When children are online, they can easily be lured into something dangerous. For example, children may receive pornography online by mistake; therefore, causing concern among parents everywhere. Whether surfing the Web, reading newsgroups, or using email, children can be exposed to extremely inappropriate material. To keep children safe, parents and teachers must be aware of the dangers. They must actively guide and guard their children online. There are a number of tools available today that may help keep the Internet environment safer for children.

     Musicians are also concerned with disadvantages to the Net such as, accessibility and freedom. They are upset because the Internet provides their music online at no charge to consumers. File-sharing services, such as Napster, provide copyrighted songs to all Internet users. The main concern is the music is free! Musicians feel they are not getting paid for their work. Because of Napster, it is almost impossible to close down all file-sharing services because there are too many of them to count.

     Another major disadvantage of the Internet is privacy. Electronic messages sent over the Internet can be easily tracked, revealing who is talking to whom and what they are talking about. As people surf the Internet, they are constantly giving information to web sites. People should become aware that the collection, selling, or sharing of the information they provide online increases the chances that their information will fall into the wrong hands. When giving personal information on the Internet, people should make sure the Web site is protected with a recognizable security symbol. On the other hand, this does not mean they are fully protected because anyone may obtain a user’s information. In other words, the most common Internet crimes are frauds.

     Today, not only humans getting viruses, but computers are also. Computers are mainly getting these viruses from the Internet, yet viruses may also be transferred through floppy disks. However, people should mainly be concerned about receiving viruses from the Internet. Some of these dangerous viruses destroy the computer’s entire hard drive, meaning that the user can no longer access the computer. Virus protection is highly recommended.

     Despite all of the terrible disadvantages of the Internet, there are numerous advantages. In fact, the advantages weigh out the disadvantages. The most common thing the Internet is used for is research. Children and students are among the top people who use the Internet for research. Nowadays, it is almost required that students use the Internet for research. The Internet has become one of the biggest sources for research. Almost everyday, research on medical issues becomes easier to locate. Web sites have become available for people to research diseases and talk to doctors online at sites such as, America’s Doctor.

Entertainment is another popular reason why many people surf the Internet. Downloading games, going into chat rooms or just surfing the Web are some of the uses people have discovered. There are numerous games that may be downloaded from the Internet at no charge. Chat rooms are popular because users can meet new and interesting people. In fact, the Internet has been used by people to find life long partners. When people surf the Web, there are numerous things that can be found. Music, hobbies, news and more can be found on the Internet.

     Another popular thing to do on the Internet is to check out the news. Almost all local news can be obtained through the Internet. Up to date sports scores are probably the most popular looked at news. Sports scores are updated on the Internet as soon as the game ends. Weather is also a popular source to look up on the Internet. Using the Internet to get the weather allows people to view weather all over the world. Live radar all over the country and local forecasts are just to name a few of the things that may be obtained for weather information on the Internet.

     Shopping online has also become a huge success and is considered a great advantage of the Internet. No matter what people are shopping for, it can be found on the Internet. People do not even have to leave their homes. A few companies have collected millions of dollars using the Internet for selling. Clothing is probably one of the most bought items online. Almost every major clothing store has its on Web site. In fact, In US, people can even go grocery shopping online using such sites as Priceline.com. Just one click of the mouse on the items they want to purchase and the items are delivered to their front door. Unfortunately, this kind of service is not yet available in Malaysia for the time being. Groceries and clothing are only a few of the items that may be bought on the Internet.

     In conclusion, today’s society is in the middle of a technological boom. People can either choose to take advantage of this era, or simply let it pass them by. The Internet is a very powerful tool. It has many advantages; however, people need to be extremely aware of the disadvantages as well.

Services Provided By internet:

Internet service providers (ISP – Internet Service Provider) companies or institutions (such as T-Com, Iskon or CARNet in Croatia, AT&T in US and MTNL in India), which satellite or optical connections with several major Internet node abroad (mainly in the direction of America and Europe) and the thus ensuring high capacity connection to the rest of the Internet world. However, practice has shown that it can barely follow the needs of the growing number of members of Internet communities. When selecting an ISP of significance is the number of services that it provides to its customers. All services provided by e-mail, but do not provide any service to FTP, newsgroups, renting space on the disc, certain program support and etc. CARNet allows for almost all university departments.

The Following are the most common service provided by internet.

1)Electronic Mail:

Electronic mail is one of the most popular and basic network services. It’s relatively low risk, but that doesn’t mean it’s risk free. Forging electronic mail is trivial (just as is forging regular postal mail), and forgeries facilitate two different types of attacks: attacks against your reputation and social manipulation attacks (e.g., attacks in which users are sent mail purporting to come from an administrator and advising them to change to a specific password). Accepting electronic mail ties up computer time and disk space, opening you up for denial of service attacks, although with proper configuration, only email service will be denied. Particularly with modern multimedia mail systems, people can send electronic mail containing programs that run with insufficient supervision and may turn out to be Trojan horses .

Although people worry most about the last risk mentioned above, in practice the most common problems with electronic mail are inadvertent floods (including chain letters) and people who put entirely inappropriate confidence in the confidentiality of electronic mail and send proprietary data via electronic mail across the Internet. However, as long as users are educated, and the mail service is isolated from other services so that inadvertent or purposeful denial of service attacks shut down as little as possible, electronic mail is reasonably safe.

Simple Mail Transfer Protocol ( SMTP ) is the Internet standard protocol for sending and receiving electronic mail. SMTP itself is not usually a security problem, but SMTP servers can be. A program that delivers mail to users often needs to be able to run as any user that might receive mail. This gives it broad power and makes it a tempting target for attackers.

The most common SMTP server on UNIX is Sendmail. Sendmail has been exploited in a number of break-ins, including the Internet worm, which makes people nervous about using it. Many of the available replacements, however, are not clearly preferable to Sendmail; the evidence suggests they are less exploited because they are less popular, not because they are less vulnerable. There are exceptions in programs designed explicitly for security, but these don’t support all the functions necessary to send and receive arbitrary mail messages; some things are still best handled by Sendmail running in a secured space.

2)FTP (File Transfer Protocol):

Before the World Wide Web and FTP was the only way to transfer large files between computers of Internet users. Allows access to a computer on the Internet (if it’s public or available to the password), preview content on its hard disk, finding the necessary files and copy on its own disk. This Internet service is not as simple as the World Wide Web, but it is very useful.

Using program support for FTP will set about establishing communication address is similar as in the previous examples:

 'ftp://ftp.domain.hr'              or
 'ftp://computer.domain.hr'         or
 'ftp://×××.×××.×××.×××'

File transfer function is increasingly taking the WWW, so that with a confirmation copy selected files as needed and the auxiliary program with WWW browser (GetRight or similar) which will take over the task of FTP transmission and after stop using the browser.

3)IRC (Internet Relay Chat):

This service allows the Internet to one or more of Internet users who are hooked to the same channel at the same time see the text that you type on your computer, and the texts of other active users typing on his computer. Channels to ‘talk’ to exist for almost all areas of interest. This system is much faster than e-mail because it is conducted almost simultaneously send and read messages, but it is much more expensive than e-mail, because it requires a long term connection with the Internet, but only for those who pay for this service out of his own pocket.

4)Telnet:

Internet service that allows the user logs on and runs on a remote computer and use programs installed on the remote computer. Of course, the remote computer must be enabled in the user access rights to the computer. For security reasons this service on many servers is not allowed. It is better to say that the Telnet ‘Terminal Emulation’ software support, which to communicate with a computer connected via a TCP / IP stack. Thus, the emulator work former unit called ‘Terminal’ (from the mainframe era). This same role today better performed by programs that use SSH (Secure Shell) connections over TCP / IP as the carrier of connection, but all traffic is encrypted. Although this mechanism provides plenty of security in the work with the server, system administrators are reluctant to make this service available to all users.

5)Voice / Video Communication – Skype:

Internet networking service that allows users to voice / video communication. This implies that the devices that use this service have built-in camera and microphone. Although this service is usually used for that purpose, in addition to communicate written messages, internet calls, sharing information and much more. Can be used as a common telephone communications. This service is based on the free program support allows free calls to anyone who has installed a ‘Skype’ program support on his computer, anywhere in the world. Thanks to the high speed internet communication has increasingly better quality. Can be achieved over a fixed PTT communication lines or cell phones or send text messages at very reasonable prices, without any special setup or subscriptions.

It should be emphasized that this is no communication between user devices (phones), but between two user accounts registered on ‘Skype’ service which includes registration, enter the user_name and password protected some basic personal information. The user can later modify the information in their profiles as needed. ‘Skype’ has just developed that allows retrieval of user account and select the desired action and can be installed on a PC with Windows, Mac or Linux operating system, several kinds of mobile phones, and what is best to communicate between multiple users in a commercial version it’s the conference using the ‘Skype Manager’ program support to be purchased. Provides for the use of TV sets in communication. So, a kind of free video phone, which offers even extra specific services. With this program support the new generation of smartphones and tablets, using the resources of the existing SOHO infrastructure, ‘calling’ becomes really cheap. This service should not be confused with VoIP (Voice over Internet Protocol) technology that allows the transmission of voice communications over Internet networks for the purpose of protocol design, that ‘Skype’ is used in the sense of some kind of Peer-to-Peer (P2P) communication.

Something similar is service ‘Viber‘ that allows free calls, SMS and MMS share content with anyone, anywhere, but there is no ability to transfer video as ‘Skype’. Similar to the above mentioned is service ‘WhatsApp‘, multiple platform mobile application to send messages in real time.

6)Social networks:

Social networks are a newer phenomenon and do not belong in a separate category because they contain almost all of the previously mentioned services, unified to work in an easy, friendly way. Not only does it allow communication among users but also represent a form of socializing. There are already quite developed FORUMS, bulletin boards web version, which uses a technology exchange text via the web site, or web sites. It is a debate on a topic initiated by a member of the forum. As a rule, seek enrollment, mostly for free, using the application type USER_NAME  / PASSWORD, typically associated with a user’s address in the e-mail regarding the identification. To service the forum is not abused in any way and to respect the rules of acceptable behavior take care administrators – moderators appointed by the forum owner of the forum members themselves who usually takes this obligation voluntarily reported. These individuals may be excluded from membership and delete and delete malicious content, basically supervise. Depending on the number of members, topic, traffic, and the owner of the forum depends with how the server program to use the forums.

Purpose of writing by arbitrarily selected topics has a BLOG (contraction of the term ‘web log’), a type of website that is usually maintained by an individual, is organized much like a personal diary with respect to input regarding the content of the description of an event or topic, with the possibility of enriching the content and graphics video. As a kind of diary of events, entered contests are usually displayed in reverse chronological order. Usually allows readers can add here your comments on the topic that is currently being processed..

One of the most popular is FACEBOOK, a social network where users can set up their image, disclose your personal information, describe their interests, publish their written and photographic pieces, develop some thematic discussions, etc. with the possibility that any of the members receive in ‘his ‘group or a member of it off. A sort of meeting place, so it is possible even to initiate effective political, protest, humanitarian or some other action. Has a similar purpose, and TWITTER, social networks and mikrobloging service, which uses instant messaging, SMS or web content. There are also ‘LinkedIn‘, ‘Myspace‘, ‘Tumblr‘, ‘Instagram‘ and the other, each with its own characteristics. What made them especially adorned with a tremendously rapid dissemination of information, and misinformation. Thus, the negative effects are possible.

Very specific Internet service YOUTUBE. Used to exchange video content where users can upload, view and evaluate video, up to ‘Full HD’ resolution, respecting copyrights. It is forbidden to support pornography, violence, crime, embarrassment and defamation, and advertising. For your own protection YouTube reserves the right to use, modify and delete content posted. In summary, one can find all sorts of things, from useful to useless content, but also very funny and naughty and critical to everyday events. Whether it is a film and music videos covering YouTube to be a free medium for promoting a filmmaker, musician or politician and there have been cases where people have gained popularity in this way, and then accepted by traditional media such as newspapers, radio and television.

Essentially all of these are web applications that typically require enrollment to confirm the response to the e-mail messages to prospective members. Registration is usually type USER_NAME / PASSWORD or E-MAIL / PASSWORD, and the user alone chooses who will be his personal data are visible in your profile settings. But for one such network services server is usually insufficient. Caring for their functioning in particular computers-servers; datacenter. The forerunner of the above was certainly B.B.S. era of modem communications.

7)Search Engines:

Already these social networks to enable retrieval of content that is stored and monitored, but a special group of interconnected computer servers in a DATACRNTER and interconnected datacenters in a unique system. The basic idea is that all registered facilities are located on one or more servers can be found in some sort of elaborate directory by interest groups (sports, music, movies …). For this purpose, the contents should be reported to the owner who approves the inclusion of datacenter facilities and reported its index. Advanced way of this is that all of the reported content indexes and their keywords are ranked according to their relevance. Through a simple form to enter the desired search term on the basis of which offers all of the titles that describe the content of the list according to the achieved ranking. So, basically it is a huge database that is constantly updated.

Almost every state has its own internal search engine, but the most interesting are those international type as YAHOO!, GOOGLE and BING. Are listed in the order they occurred, although they appear to their versions that preceded them, today its possibilities are not even close. Course and apply them to the desired content complying with the prescribed rules. Basically all are oriented to search HTML text or the images, though some of their skills are recognized and other formats of documents and index them. Currently qualified as a browser web content considered GOOGLE. In addition to enabling the global search and local search free within declared site. Algorithm correspondence of new titles, indexing and ranking their content daily in construction, a mechanism for storing data and their storage is not reduced more on copying disks themselves but to each other constantly copying content themselves datacenter which has quite a few in the world, about forty. Seen from the perspective described something of very great importance should be kept by them.

8)Web-Hosting (DATACENTER):

No long that it is the development of technology, high-speed computers and Internet connections, provided that the user can purchase a server in a datacenter, who cares about the correctness of the service provider, and in which the user via FTP Service set up your web content (web hosting). Of course the service is paid, but in the age of virtualization computing platforms becoming cheaper and more accessible with very reasonable prices. What set the servers and as a server lease depends on the users. This requires the lease currently available domain names and headquarters facilities in which servers become recognizable. ‘IT Alphabet’ uses just one of them and has been reported in the previously mentioned search engines. The basic difference with the search engines is that in these datacenter care about the content (data) leads users, the concern for the safety of equipment and access to available web content leading provider of these services. Impressive is the concept of ‘Google container data center‘ that uses Google.

Electronic versions of NEWSPAPERS and PERIODICALS is also one of the most important services. Main service is not fully available, in addition to the subscription, which is often not expensive and allows access to archived editions. Similar is with the offer of books and multimedia content. In addition to this specialized sites (PORTAL) offers a variety of facilities, from the amendments set out TV content, educational facilities, entertainment facilities to the ××× content. The variety is so great that it is very difficult to share content in a few categories. The above is fundamentally changing habits of users, especially the growing popularity of tablets, which are becoming, for example, an free integral part of restaurants offering. With the morning coffee not to use a paper version of the newspaper rather than a tablet. From the above it is clear why the quality of the program for viewing Internet content (browser) is given more prominence.

What has set up ‘Google’ with its ‘Android’ platform, and skillfully used ‘Facebook’ and others, and is the basis of working at recent ‘Windows’ operating systems – data storage in one location (OneDrive storage), more correctly data centers that are continuously interconnected copy and synchronize data and presented to the user as a single group – CLOUD, somewhere on the Internet, a trend that is increasingly spreading to enable the user to use their data anywhere and anytime, even with different platforms (PC, Tablet , Mobile …). To preserve the privacy of the user traffic to the cloud must be encrypted, so if security required and the data itself is encrypted. On this principle, essentially functioning banks and public institutions that offer customers a variety of services; bill payment, payment processing, issuing various documents and the like.

As usual, the service should be paid, under the principle of ‘How much money – so much music.’, But the services that are beneficial to the general welfare generally are not charged.

 

 

 

 

 

(Visited 253 times, 1 visits today)