Home » Technology » Internet


  • What does Internet mean?
  • The Internet is an electronic communication network connecting computer systems.
  • The Internet is a multi-protocol network and can be defined as all of the interconnected computer networks. It is formed by connecting thousands of academic and commercial networks, state and free computer networks. Information between computers is transferred in packets according to various protocols. There are a wide variety of information and services on the Internet, such as electronic mail and linked pages. Games can also be played over the Internet.


  • The roots of the Internet are based on research from the 1960s by the United States government, which wanted to build a fault-tolerant, robust and private computer network. Special funds collected by the National Science Foundation in the 1980s for the financing of a new US backbone led to Worldwide participation and the merging of many private networks. With the proliferation of an international network in the 1990s, the Internet was at the heart of modern human life.


  • Internet Etymology
  • The English word Internet, which began to be used in 1985, is an abbreviation for Interconnected Networks, which means “networks connected to each other”. Inter- in the foreground comes in between English and mutual meanings. Net word means network.
  • The abbreviation “WWW“, which is sometimes used in place of the Internet word, is the word of the World Wide Web and is not synonymous with the Internet.


  • History of the Internet
  • Semi-Automatic Ground Environment (SAGE), the military communication system, which is computer systems that communicate via the Internet via the network, and the Semi-Automatic Business Research Environment (SABER), a commercial airline reservation system, In the 1960s, the Advanced Research Projects Agency (ARPA) became the design fund of the Advanced Research Projects Agency Network (ARPANET) for the US defense system. Thanks to the projects created in the 1960s, the Internet reached its peak in 1969. After this date, ARPANET has entered our lives as a modern internet that we know. At the beginning of the ’70s, e-mail (SMTP) and NNTP applications became popular after American universities were given the opportunity to benefit from this project. They track FTP and HTTP. On April 30, 1993, CERN introduced the WWW prefix to the Internet.
  • Personal Internet use
  • To connect to the Internet with personal computers usually requires a telephone line. It can also be connected to the Internet via satellite, cable and radio broadcasts called Wi-Fi. The most common is to take advantage of the service of a company that provides an Internet service at a certain speed with an analog modem. Modem settings are adjusted according to the company’s service phone number and specifications, and the connect command is given. The analog modem converts the digital data (bits) of the computer into various audio frequencies and transmits it to the Internet service from the telephone line, in the same way the data is received.
  • Each displayed site has an address number. This is an address of four spaces, each of which has a value between 0 and 255. However, since the user can not actually hold this lean value for every site that will be dialed, there are DNS computers that keep these addresses equal to the Web page. Their task is to keep the IP address equivalent to each site name to be displayed and to direct the packets of the information transport protocol (TCP / IP) to this address. So you can reach the information on the internet that the internet traveler calls for a little effort.
  • Today, analog modems are replaced by digital (ADSL) modems that are faster and less error-prone. Their usage fees are reduced to a reasonable level due to the increase of plural participation. ADSL has an analog modem speed of 10x – 1500x times, allowing live video chatting as well as uploading a movie file in a short time frame.
  • WWW. Today, hundreds of millions of people around the world use virtual chat rooms, eCommerce, discussion rooms, Internet chat, and direct message (IM) downloads.


  • Today’s Internet use
  • Today, the Internet can be accessed almost anywhere with mobile Internet devices in particular. Mobile phones that support wireless networking, such as portable game consoles, laptop computers, can access the Internet from wherever they want. Service providers’ offerings and wireless data transmission charges may be higher than other access methods.


  • Internet Spread
  • When the time it takes to reach 50 million users from radio, television and Internet is examined, 38 years for radio, 13 years for television, while only five years for the Internet.
  • The Internet is an information source technology product that is used every day in the seventh 70, which is also common today and is renewed every day.


  • Internet related terms
  • The Internet and the words “World Wide Web” are commonly used in everyday use in the same sense, but they are not the same thing. Internet is a global data communication network provided by software and hardware infrastructure, but the web is only one of the forms of communication provided by the Internet.


  • Site
  • A website is a group of digital pages on the Internet where text, images and other files are shared. These are the environments in which the Internet is used visually through the screen, and also via the speakers and audibly. An Internet site can consist of a page or thousands of pages. The first page facing a user of a site is called the “home page“. From the main page, links to other parts of the site or foreign sites can be reached via links.


  • Modem
  • It is an electronic device that converts telephone signals to digital data and allows the computer to connect to the Internet.






  • TCP / IP
  • The Internet is the TCP / IP file communication protocol that makes the communication environment of the age. Expansion; Transmission Control Protocol / Internet Protocol (Transmission Control Rule / Internet Rule).
  • TCP / IP is a rule that is independent of the operating system or application software, which in essence allows the machines to speak. With this feature, your mobile phone can talk to other devices connected to the Internet, such as a personal computer or even a clock.


  • Address mark (@)
  • One of the symbols commonly used on the Internet is @ (pronounced et). In e-mail addresses, the user distinguishes the destination field (site name) sent with the name. The address mark is also known as the nice a.


  • Email
  • E-mail (English: e-mail) is an abbreviation for “electronic mail“. They are digital letters sent and received over the Internet. It is also referred to as “mail” in daily use. There is no big difference between them visually with a paper letter. Any kind of file, such as e-mail pictures, music, video, can be added and transferred to the recipient’s computer. Every day, billions of e-mails are sent on Earth. It is more widely used than paper letters because of its cheapness and convenience, but its use in official business is very limited due to the lack of reliability.
  • E-mail accounts can be opened free of charge or at a specified fee from various sites that provide this service. E-mail addresses; The user name, the address mark, the name of the e-mail server, the dot (.), And the site extension of the site where the account was created. For example: wik@whatisthewik.com
  • Digital threats that may come into devices that can connect to the Internet
  • Apart from its many benefits, unfortunately, the Internet opens our doors to various threats. From the moment you are connected to the Internet network, it can become vulnerable to attacks from a variety of malicious software; You may witness that the hackers, defined as “hackers,” can take over your computer; Your bank account can be evacuated via online banking; Your device may start to find strange behavior that you can not understand.


  • Viruses
  • Computer viruses, malicious code and programs. Disks carrying data to computers enter through portable memories, local networks or the Internet. They perform harmful activities such as copying themselves, deleting data, running unwanted programs, spreading personal (password, etc.) information. This name has been deemed appropriate because the methods of damaging computers seem to resemble viral infections in vivo.
  • Some viruses are those that have been timed or decoded by a program, that is, those that are inadvertently running and often whose tasks are unclear. Trojan, Win32, Win29, Worm etc. prepared for bad buyer. Viruses are transmitted by others. It is difficult for viruses to form on their own, and should be cleaned immediately when noticed.


  • Spy programs
  • Spyware programs, called malware, adware, spyware, etc., are small software programs designed to collect information from computers. Some of them are also called viruses because they act like viruses. The computer user sends information such as Internet habits, account numbers, etc. to harmful persons and organizations. While some are not so harmful, they work in the background while collecting data and occupy computer memory unnecessarily. Some spyware programs have been developed by official organizations to monitor criminals and terrorist activities.In addition, states use spying methods in computer environment instead of old methods of espionage, thereby reducing risk and cost accordingly.


  • Hackers
  • Other people are people who steal personal information by unauthorized access to information on electronic devices such as computers and phones. But that is not necessary. In sites where some hackers are involved, hackers help technical development of the sites.


  • Methods of protection from these hazards
  • The most effective way to protect computers against threats from the Internet is to use anti-virus, anti-spyware and firewall software. Many commercial security software today, such as Norton, Kaspersky, and McAfee, contain these three protections.


  • Other threats from the Internet
  • The end result of the spread of the Internet is that every day millions of people share their personal information with people they have never known, which is a much more grave threat than viruses. Careless use of the Internet may result in theft of identity information or involuntary interference with police incidents.
  • The chat rooms and play rooms are open to very good friendships and associations, as well as threats of theft, pedophilia, exhibition, harassment, rape and even murder.
  • The fact that pornography access is fast and easy, increases the risk of pornography addiction in every age, threatens sexual life, family life and occasionally psychology of individuals. The fact that children can easily access pornography at a very young age can cause serious sexual and psychological distress at later ages.


  • Methods of protection from these hazards
  • You need to be more careful when you make friends, because it is very easy to hide your identity, age, appearance, economic situation, education status, briefly everything belonging to a person or create a false identity. Especially avoid giving addresses and phone calls to people who are not well known, and avoid giving clues that will enable them to reach them.
  • Today, many Internet security software comes with “parental control” features. Setting the computer access hours with parental control panel allows to prevent access to unwanted sites, these settings can be protected via passwords.
Author: wik Date: 7:17 am

Wik's Random Content