Difference Between Surfing And Surfing

Superior Essays
Firstly, the World Wide Web is not the Internet. The web is a feature of the internet, which is a network of computer networks whereas the World Wide Web is a series of interlinked HTML webpages connected by Hyperlinks. Therefore, “surfing” the Web and “surfing” the internet are two different things.
Although the task of retrieving a webpage can be completed in a matter of seconds, it is actually a complex process. Firstly, your device sends a request to the Domain Name System through a router and modem (These are now commonly built into one device), this message then travels to an exchange via a telephone line (ADSL) or Fibre Optic cable (FTTH) and then on to the Internet Service Provider’s network and their DNS. This domain name is then searched
…show more content…
An Internet Service Provider is a telecommunications company which provides Internet access to businesses and people. Historically, an ISP was also the provider of a customer’s telephone service as a telephone line is required for either Dial Up or Asymmetric Digital Subscriber Line (ADSL) connection. However, there has recently been an increase in the number of customers using Fibre To The Home (FTTH), which doesn’t require a BT Telephone line. FTTH has introduced a more competition into the ISP market. The issue with ADSL is the physical limitations of telephone lines, for example, Sky Broadband’s connection has a limit of 17MB/s and in some areas ADSL speeds can drop to just 2MB/s. On the other hand, Virgin Media trailing a 1000MB/s FTTH connection and has rolled out speeds of up 152 MB/s to most of the country. Due to the increased number of devices that can be connected to a home network, the limitations of ADSL means that the the usability of websites has been affected. A large number of people using the same slow ADSL connection could mean that speeds decreased and therefore website take longer to load and complete tasks. A slow download speed is arguably the biggest user side …show more content…
There are numerous ways for hackers to gain access to a user’s computer however the most common way is through a file that has been dowloaded from the world wide web. Hackers have also made use of email by attaching files or hyperlinks to malicious websites. A more recent example of hackers gaining access to internet users’ information is Heartbleed. Heart bleed was discovered in April 2014 as a vulnerability in the Secure Socket Layer security system used on website. This weakness led to the security of almost 4.5 million patient records in the US being compromised.
Phishing has also become a common tactic adopted by malicious users of the internet. Phishing is where a reputable organisation, be it a bank or retailer’s website is copied identically and used to trick customers to log in and therefore handing over their credentials accidentally.
Viruses, which are malicious pieces of software that replicates itself on a computer, have also been transferred through downloads from

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Threat Assessment of ‘Important Security Alert From Windows’ Pop-Ups: ‘Important Security Alert From Windows’ Pop-Ups has created havoc among computer users that does not allow them to usually work in the computer. Where this adware has found its own method to attack the targeted system and to make the infected computer almost useless. In order to trouble computer user, it performs several malicious activities to use the security gaps in the system and it leads to freeze the entire running programs of the computer. Firstly, this malware program affect the processing speed of the infected computer to stop the basic functions of the system so that the computer will respond very slowly when user give any instructions.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    It also may include a firewall, virtual private network handling and other security functions. But, these can be handled by dedicated/separate devices. Browsers “A web browser (commonly referred to as a browser) is a software application for retrieving, presenting, and traversing information resources on the World Wide Web,, Basically, it allows any user to browse on the web (access data/information).…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    2. Explain how the submission engine plan will handle submissions in other languages, including Portuguese and Mandarin. When the data is submit through the submission engine using the web form, email, Twitter, Facebook, Internet crawler and other data input, Google translate API will start the translation from the other languages using it data-driven approach of millions of multilingual documents into English, then to the target language of the user. When the source text is short, the submission will use rule-based machine translations, for better accurately on the translation. If the language does not have direct translation, Google will translate to a closely related language that maybe more spoken in that area.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment

    • 867 Words
    • 4 Pages

    ISP: An Internet Service Provider is a company that provides you with services that provide you with the connection to the internet. The main services the company provides are: Broadband, TV and Phone. Here are some ISP’s: Virgin Media, Sky, BT and Talk Talk. Different companies offer different broadband speeds, Virgin Media provide speeds from 50Mb, 100Mb and 200Mb.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1380 Words
    • 6 Pages

    First to connect to the internet you need an internet service provider to have access to the internet which is a router to connect to your home network to the ISP. It can be wired or wireless connected to your home network. The web browser is a program which allows me to browse web pages such as my sync email account. You need a domain name to identify the IP address to have access; they are used in URLs to find particular web pages. URL first part is named a protocol finder and indicates what protocol should be used, the last part is a resource name and it identifies the IP address of where the resource is placed.…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The appearance of the Internet and fast development of the computer play an important role in changing our world into the era of globalization. Communication of computer network has made humankind having the fastest and cheapest data transfer to all over the world, which is symbolized by the Internet (Batinic, 2013). The Internet is by far the most…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Adl2 Research Paper

    • 547 Words
    • 3 Pages

    Today, internet has become a necessity of everyone's life as it assists in connnecting with the rest of the world in a blink of a second. It is the fastest way of get information on any topic. Hence, all these features make them a need of our life and internet providers in Melbourne are striving hard to fulfill the desires of the customers by providing the best services…

    • 547 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Most of us probably believe we have absolute freedom when it comes to what we view on the internet. However, Barbara van Schewick points out in her article ‘Network Neutrality Nuances’, that we only have access to bits and pieces of the internet (Schewick, 2009). What we are able to view is all decided upon by our ISP. Schewick states that ISPs select what we view in order to maximize profits, to ban content which they consider to be inappropriate, or to keep track of all signals on their network (Schewick, 2009). She does an excellent job of explaining why this is wrong by bringing forth real world examples, using thought-provoking literary devices, as well as by connecting with the reader (Schewick, 2009).…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most people don’t know what the internet really is. In his book Tubes: a journey to the center on the internet, Andrew Blum goes all around the world to finally put an answer to the question. Blum acknowledges how we are becoming a more internet dependent society, and questions why the world inside the screen seemed to have no physical reality. Blum battles the public’s conception of the internet as a “nebulous electronic solar system, a cosmic cloud” (Blum 6). The internet is not some ethereal concept lurking behind our computer screens, but a collection of wires and computer.…

    • 649 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Morgantown

    • 549 Words
    • 3 Pages

    Whether it’s by using your phone or sending emails from your laptop, the internet is a necessity in Morgantown. With a broadband coverage of 92.8%, Morgantown ranks 7th for most coverage in West Virginia. With 19 providers, they are the third fastest city at 45.5 MBPS. West Virginia ranks 45th in the country for the most connected state. I…

    • 549 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    It 340 Network Management

    • 519 Words
    • 3 Pages

    IT 340 – Network Management Assignment No. 1 Rami Mansour Aljuhani 130183364 Question No. 1 Compare the telephone network and the Internet. What are the similarities? What are the differences? The telephone network and the Internet are both networks, they both send signals from end to end.…

    • 519 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In his article entitled “Internet Access Is Not a Human Right” published on the website of The New York Times on 4 January 2012, Vincent G. Cerf, a vice president and chief Internet evangelist for Google, presents his perspective on a controversial issue regarding access to the Internet. He argues that access to the Internet should not be accepted as a human right, “it’s just a tool to achieve those rights.” According to Internet World Stats (2014), over a third of the world’s population are accessing the Internet as a part of their everyday life. This proves that the Internet plays numerous significant roles in society. It makes our lives easier and more convenient than in the past, by providing information, education, communication, business, and freedom of expression.…

    • 1148 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Visa Inc. Research Paper

    • 1010 Words
    • 5 Pages

    It operates in more than 200 countries with availability of services on every possible platform such as cards, laptops, and mobile phones. What is a…

    • 1010 Words
    • 5 Pages
    Great Essays