Please enable JavaScript.
Coggle requires JavaScript to display documents.
INTERNET PRINCIPLE OF OPERATION - Coggle Diagram
INTERNET PRINCIPLE OF OPERATION
BROWSER
THE ROLE OF WER BROWSER
is a software that enables users with an internet connection TO
ACCESS AND VIEW PAGES
on a computer or mobile devide
in order to connect to and display websites on their device, a user needs to have a web browser installed
THE PURPOSE OF WEB BROWSER
the tools we use to navigate the web
download the data we want , and then translate it into a visible image
to search for specific information, including text, pictures, music and video
to share for specific information
allow users to modify the website content
EXAMPLE OF WEB BROWSER
mozilla firefox
vivaldi
google chrome
safari
microsoft edge
opera
maxthon
ISP
THE ROLE OF ISP
PROVIDES INDIVIDUALS AND ORGANIZATIONS ACCESS TO THE INTERNET FREE OR FOR A FEE
EXAMPLE OF ISP
TM
unifi home, unifi postpade mobile, unifi prepaid
MAXIS
maxis home fibre , maxis 4G wifi
CITY BROADBAND
CELCOM
celcom home fibre, celcom wireless
TIME
DIGI
digi home fibre, digi mobile broadband
ISP also provide related services such as
website hosting and development
email hosting
online storage
RESPONSIBILITY OF AN ISP
providing and maintaining a connection to the internet
support the hardware and software neede to service that connection
to protect their site and network from external threats such as viruses , hacker attacks and other illegal activities
provide 24-hour customer service and technical support
FACTOR TO CONSIDER WHEN SELECTING AN ISP
speed of your connection
access location
type of connection
price and cost
HTTP( HYPER TEXT TRANFER PROTOCOL)
EXAMPLE
http://portal.kmpp.matrik.edu.my
A secure tranfer system that encrypts the data before the connection is formed for sending or retreiving the data from the server
a system for tranmitting snd receiving informations from a server
is less secure as the data is vulnerable to hackers
no certificates are required
HTTPS
A secure version of the HTTP [rotocol that uses the SSL/TLS protocol for encryption and authentication
EXAMPLE
https:www.cimbclicks.com.my
by using https, the computers agree om a "code" between them and this keeps your information safe from sackers
a system for tranmitting and receiving information in a secure format from a server
is more as the data is encrypted before it is sent across a network
requires SSL digital certificate