Internet
Network of millions of computers connected together.
Widely spread across and interconnected.
Largest information database - vital part of life.
Enables users to share or view information in different ways.
Requires connection via telephone lines/cables.
Great opportunities, but also challenges and threats.
Internet Services
Facilitates sending of messages and files like pictures.
Requires an email ID.
Can send e-mails to multiple people.
CC - Carbon Copy (everyone knows all the people sent to)
BCC - Blind Carbon Copy (only sender knows all the people sent to)
Online Chatting
Video Conferencing
More personalized, quicker and lighter way of communication.
People can send and receive instant messages from others.
Interaction through voice and video is also possible.
Allows face-to-face interaction in real time.
Allows many people in different places to communicate by sharing video and audio at the same time.
Basically a video call, but with greater scope of people and features.
Mainly used for remote business/personal meetings or large group meetings not possible in one location.
E-learning
Electronic learning lets people learn anytime or anywhere using technology.
Less expensive than traditional learning.
Can be used to teach a large group at the same time in an interesting and interactive manner..
Reduces time and cost of classroom-based learning.
Makes use of various formats such as video, audio, text, animation, virtual environments etc. It has a wide scope of possibilities.
Internet Free Calls
Eg. Gmail, Hotmail, Outlook etc.
Eg. Zoom, Google Meet, Cisco Webex, Microsoft Teams
Eg. Whatsapp, Google Hangouts, iMessage
Eg. Udemy, Khan Academy, WhiteHatJr.
Lets you make free voice/video calls to anyone, anywhere.
Particular app must be downloaded on both ends.
An account for the service is also needed.
Eg. Skype, WhatsApp, Tango, Viber
E-groups
Virtual meeting places for people who share the same interests.
Members can post messages and others can reply or view the post as well.
Eg. Discord
Social Networking
Helps build social networks/relations among people who share interests, backgrounds, activities etc.
Place to share personal-life experiences and other information to other users.
Can be used for personal or business purposes (eg. marketing or personal hike experience)
Eg. Facebook, Instagram, Twitter, Linkedin
Internet TV
Delivers television content over the internet.
Available wherever broadband connection is there.
Similar to Cable TV (fees, offering)
Web-based shows, VOD, regular shows on the channel website etc. are available.
Can be watched on any device with the needed app/website and account.
Eg. Netflix, Amazon Prime, Disney Hotstar etc.
Internet Radio
Online radio service broadcasted over the internet on dedicated servers.
Much like traditional radio station in presentation and format.
One of the major pioneering technologies of the internet.
Since late 1990s
No broadcasting limitation unlike traditional radio stations.
Can broadcast graphics, text and links too.
Eg. Vividh Bharti, Radio Mirchi, Pandora
Advantages
Search engines let us find info about any subject.
People connect with each other easily and without much cost.
Brings the world closer.
It lets us do our tasks from the comfort of home, like banking and shopping.
Allows sharing with other users instantly and simultaneously.
Disadvantages
Sharing sensitive information is not always secure.
Information is not always correct.
Computers can be prone to cyber attacks, which compromise the user's security and data.
Cybercrimes
Cyber Threats
Can be intentional or accidental.
Spyware
Secretly collects information about online users
Monitors surfing habits and steals data about visited webpages, email IDs, passwords etc.
Spamming
Sending unwanted messages or advertisements to many people.
Can be used to send e-mails containing Trojan horses, viruses, worms etc.
Scareware
Malware that pops up in a window informing that the system is infected and asks for a fee to clean it.
It tricks user to click a link which downloads the malware in the background.
Malware
Malicious software
Viruses
Secretly embedded on a computer to steal, corrupt or destroy data.
Can spread to other systems
Trojan horses
Embeds itself into legitimate software and pretends to be harmless.
It is an .exe file that will download and run automatically.
It can hide from from antivirus.
Can delete files, record username, passwords etc. by logging keystrokes. Can use your computer to hack others.
Do not replicate themselves like viruses.