Monday, March 14, 2016

I3 Internet AT01

Introduction

In this task we were required to access the internet to obtain answers to the following 16 questions. References to the information gathered were to be listed at the end of the document.

Question 1

Describe the benefits of two search engines and how to obtain product information and technical support.

- Ask.com

Formerly Ask Jeeves, it began with a natural language input then changed to both algorithmic and human editable search queries. Using Smart Search a system called Expert Rank determines listings based on expertise clusters rather than popularity. As the third largest search engine with 300 million monthly visitors, its algorithm is also influenced by its audience. Social network features are built-in rather than handled, and its affiliate network consists of sites like Ask Jeeves for Kids, MySearch and MyWebSearch. A range of portals include images, video, weather, maps, news, blogs and binocular icons for quick previews. Product information and technical support can be found by posting to Ask Questions, searching on the engine, or via the human editable search prompts. They also have their own thesaurus and dictionary for terminology suggestion.

- Google.com

Google is the most popular search engine, with the largest database of indexed web pages and file formats. Indexing over 1 trillion pages with over 1 billion monthly visitors it utilises a system called Page Rank. Results are given a score based on the sum of scores to linked pages. The main page includes Universal Search providing related results for news, images, video, blogs and maps. Other features include weather, sports, unit and currency conversion, stock report and travel services. Google utilises an advanced query operator set that provides users with more control than other platforms. Apps have been released for Google Search on Android, Windows and iOS devices. Product information and technical support can be searched by voice recognition software, entering queries, Google images, books or scholar, or by posting to platforms such as Google+.

Question 2

Name two browsers.

- Internet Explorer 11

Internet Explorer 11 was released for Windows 7 as part of a Windows 8.1 update in November 2013. It is a free browser developed by Microsoft, first released in August 1995, and has since spread to Xbox and mobile devices. Designed to view a broad range of web pages, it often uses non semantic code due to its array of proprietary extensions. This version has been replaced by Microsoft Edge on the windows 10 platform. Internet Explorer’s popularity has fallen to 6% of worldwide desktop usage.

- Mozilla Firefox 45.0

Mozilla Firefox 45.0 is the current stable Windows version, also available for Windows Mobile, iOS and Android devices. It is a free open source platform created in 2002 under the name Phoenix by the Mozilla Community, then in November 2004 released as Firefox. Features include smart bookmarks, download manager, geo-location browsing, and integrated Yahoo and Bing results. It provides a web development environment using tools such as Error Console and a strict adherence to semantic code. Firefox is a popular browser currently with 18% of worldwide desktop usage.

Question 3

What is a URL ?

URL stands for Uniform Resource Locator, informally termed a web address, specifying a web resources location on a computer network. The term combines the domain system created in 1985 with the file path syntax that separates directories and file names with slashes. IRI stands for Internationalised Resource Identifier and is a form of URL that includes Unicode characters. A non semantic URL is composed of paths, script names, and query strings, and a slug is usually the end part of a semantic URL that identifies the page in human terms. Not always a reference to a web page (http), a URL may also refer to resources such as file transfer (ftp), email (mailto) and database access (JDBC).

Question 4

What is HTML ?

HTML stands for HyperText Markup Language, released in November 1995, the most recent version HTML5 approved by the W3C consortium in October 2014. A browser does not display the content of semantic tags, as it is a markup language that renders HTML into visible and audible web content. It enables headings, paragraphs, lists, links, images and quotes to be defined, and can reference external Cascading Style Sheets (CSS) for styling. Scripts can be embedded to affect the behaviour of the page such as Javascript, jQuery, XML, Flash, ASP or PHP. Correct semantic markup improves the accessibility of web documents as per the Web Content Accessibility Guidelines.

Question 5

What is shareware ?

Shareware can include any type of software but is known as less secure and stable then official versions. In contrast to open-source software the code is distributed without the course code and is copyrighted. In 1982, Andrew Fluegelman used the term freeware “as an experiment in economics”, Jim Knopf calling it “user supported software” then Bob Wallace first called it “shareware”. Types include Adware, generating revenue, Demoware, software with less features, Crippleware, vital features removed, Trialware, with built-in time limits, Donationware, requesting donations, Nagware, persistent reminders to purchase, and Freemium, free products at a premium standard . The theory behind shareware is to give uses a chance to test software before buying it, market software before launch, and promote products with minimal over heads and costs.

Question 6

What is a zip file ?

A ZIP file is a file format describing an archive of files and directories stored with lossless data compression. The most common algorithm used is Deflate since its creation in 1989 by Phil Katzof PKWARE. Systems Enhancement Associates filed a law suit against PKWARE for similarities in their ARC system and their response was to name the format ZIP, implying it was faster than its competitor. Microsoft includes built-in ZIP support since 1998 and Apple have the Archive Utility. Each file is stored separately allowing files within a package to be extracted, added, or compressed using varied methods. This is in contrast to TAR files where random access it not possible.

Question 7

Approx how long would it take to download a hundred megabytes (100mB) of data at Broadband speed ?

http://www.download-time.com/ http://vic.speedtest.bigpond.net.au/

The above results use an online calculator to show an average broadband speed of 8 Mbps takes 1.44 mins to download a 100 Mb file. My service provider Telstra has a Victorian speed test which returned a broadband ADSL2 download speed of 6.17 Mbps. Using an online bit rate converter this equals 0.77125 MBps or (100 / 0.77125) / 60 = 2.095 minutes to download a 100 Mb file.

Question 8

What are cookies ?

A cookie is a small packet of data sent from a website and stored on a computer by a browser. Designed as a mechanism to record state information the term cookie was first coined by programmer Lou Montullu in June 1994 for Netscape in an e-commerce application. Types of cookies include, Session Cookies, existing while navigating with no expiration date such as shopping carts, Persistent or Tracking Cookies, existing until the expiry date storing browsing habits, Secure or Authentication Cookies, transmitted over HTTPS for storing sensitive information such as passwords and credit cards, HTTPOnly Cookies, not accessible from APIs such as Javascript, Third-party Cookies, belonging to parties external to the website, Super Cookies, belonging to top level domains, and Zombie cookies, automatically created after deletion via client-side scripting.

Question 9

What is FTP ?

The File Transfer Protocol (FTP) is a network protocol used to transfer files between a client and server. The original specification was written by Abhay Bhushan in April 1971, currently replaced by the TCP / IP specification in October 1980. Most common web browsers display files hosted on FTP servers, by default using passive mode more compatible with firewalls. In active mode the client listens for server data connections, while passive mode sends commands to open a connection. FTP does not encrypt its traffic and all data can be read using network packet capturing.

Question 10

When should you scan for viruses ?

The best defence is prevention, updating antivirus software and definitions, service packs, browser and browser plugins such as Adobe Flash, Reader and Java, using anti-spyware such as Spybot, Peer Block for bad IP ranges, AVG a free alternative to Norton, setting browser security to medium high, ensuring UAC is running without extended privileges and practicing safe web browsing by not opening unknown links or unsolicited email attachments. Most anti-virus software include real time protection, ensuring suspicious links are automatically moved to quarantine. They also offer a quick and deep scan mode, quick scans searching common locations for malware, deep scans often automated, searching all local drives. Cleaning in safe mode enables hidden or locked index.dat files to be purged. If regular scans fail, using drive image software such as Norton Ghost or free Paragon Recovery, a system can be restored fully installed to SSD in 4 minutes.

Question 11

Who owns copyright on the types of data you retrieve ?

In general, the author(s) own the copyright. There are exceptions such as works created by an employee, owned by the employer, commissioned work, owned by the client, journalists and photographers, owned only for publishing, works commissioned by Government bodies, owned by the relevant body, and typographical arrangements, owned by the publisher. Copyright duration changed on 1st January 2005 when the Australian US Free Trade Agreement came into effect. Usually copyright lasts for the life of the author plus 50 years, this was extended to 70 years for items still in copyright. Moral rights last for the duration of copyright, the exception is rights of integrity in a film lasting until the death of the creator. Performer rights last for 50 years from the date of performance for copying and inclusion in sound tracks.

Question 12

What is the difference between Java and JavaScript ?

Java was released in 1995 by Sun Microsystems as a general purpose class based OOP language to produce applets and standalone applications. It’s used on desktop and mobile devices and is part of the Android OS. Java code is compiled and run in a virtual machine or browser, platform independent, uses any amount of memory, and requires installation. Javascript was released in 1995 by Netscape as a simple object orientated scripting language to add behaviour to HTML in the form or interactivity and embedded applications. Alongside HTML and CSS it’s the third essential tool in website development, originally a client-side language now used for server-side programming. Code contains text, is subject to browser compatibility, uses less memory, and most modern browsers have it pre-installed.

Question 13

Name some online tools.

- Google Spreadsheets
https://www.google.com.au/sheets/about/

Google Sheets is a web based spreadsheet tool used to create, edit and share documents on Google Drive. A range of templates are available including budgets and schedules, and sheets can be accessed or edited from any device phone, tablet or computer, all changes saved automatically. All the basic spreadsheet formulas and conditional formatting are present with add-ons available. Excel files can be opened and edited and exports options include OpenOffice, PDF, Text, HTML, and CSV.

- Zoho
https://www.zoho.com/

Zoho Office Suite is a web based online office with word processing, spreadsheet, database, project management and web conferencing tools. Zoho has integrated some of its applications with the Google Online Suite enabling users to sign into both suites under one login. The cloud environment enables users to create, stare, collaborate and manage documents used for sales and marketing, email collaboration, business processes, human resources and help desk requirements.

- Pic Monkey
http://www.picmonkey.com/

Pic Monkey is an online photo editing service using a freemium business model with free and premium services. As well as editing photos via crop, rotate, textures, effects and touch ups, greeting cards, custom invitations, branding logos and watermarks can be created. The service is cloud based allowing image uploads from Facebook, Flickr, Dropbox, Pinterest and Tumblr, with an open API for developer integration into websites. It has been rated in the top 100 photo editing tools by PC Magazine.

- Be Funky
https://www.befunky.com/

Be Funky is a web based image design and editing tool that puts the user in creative control. They offer a selection of icons, images and effects, more available on premium plans. The toolkit includes hue, saturation, crop, rotate, exposure, colour and many normally seen in Photoshop. As well a unique font collection, fonts can be uploaded, and access to Facebook, Flickr, Photobucket and Picasa can create holiday cards, covers spreads and photo grids. A large community of artists are available.

Question 14

List the devices that are available to view websites.

  • Smartphones including iPhones
  • Tablets including iPads
  • Desktop PCs and iMacs
  • Notepads and Laptops
  • Smart Readers
  • Smart TVs
  • Internet Terminals

Question 15

Describe the importance of privacy and security measures related to online tasks.

Identity theft is the misuse of personal information to access an account, open an account, or any fraudulent use of this data. Studies show over ¼ of users use a privacy tool while over ½ of users feel there is a lack of privacy during online tasks. Almost 1/10 of adults will have their identities misused each costing approximately $3,500. Although these statistics also cover wallet theft, burglary, mail and phone scams, the fact credit card details, personally identifying and sensitive information, and anything from passwords to taxation numbers are stored in both secure and unsecure online databases is highly concerning. Hacking corporate and government databases or using elaborate networks of botnets hijacking computers with no trace are serious offences due to the huge quantity of confidential information these databases hold.

Question 16

What information would you refuse to provide when filling out a form on a web page ?

If deemed relevant I would supply my name or password, but generally not my address, phone or date of birth. Government or financial bodies often require ids such as drivers licence, taxation or medicare numbers but have terms and conditions covering loss of sensitive data. This or other information given during website registration, online shopping, or social media should be approached with caution. Forms requesting data using non encrypted connections, as in HTTP are vulnerable. Often login scripts use secure HTTPS connections, but not the actual order / activity form, and even secure sites can misappropriate user details so always do a background check on the website and registered owner.

...Top

References

Question 1
- Wikipedia list of Search Engines
- Wikipedia comparison of Search Engines
- Infopeople Search Engine comparison chart
- Ebizmba 15 popular Search Engines
- Webreference article on SEO
  Ask.com (formerly Ask Jeeves)
- Wikipedia Ask.com
- Readwrite article differences between Ask and Google
- Ehow article benefits of Ask Jeeves
- Ask.com Search Tips 1
- Ask.com Search Tips 2
- Ask.com Expert Rank Info
- Ask.com Frequently Asked Questions
  Google.com
- Wikipedia Google
- Brighthub article on Google
- Google Support Search Tips
- Google Support Search Operators
- Google Support Advanced Searches
Question 2
- W3Schools Browser Stats
  Internet Explorer 11
- Wikipedia Internet Explorer
- Wikipedia Microsoft Edge
  Mozilla Firefox 45.0
- Wikipedia Firefox
- Wikipedia Firefox release history
Question 3
- Wikipedia Uniform Resource Locator
- Wikipedia Semantic URLs
- Wikipedia Internationalized Domain Names
Question 4
- Wikipedia HTML
- Wikipedia Web Content Accessibility Guidelines
Question 5
- Wikipedia Shareware
- Wikipedia Adware
- Wikipedia Crippleware
- Wikipedia Donationware
- Wikipedia Nagware
- Wikipedia Freemium
Question 6
- Wikipedia ZIP file format
- Wikipedia ARC file format
- Wikipedia TAR file format
Question 7
- Download Time
- Victorian Speedtest
- Matisse Bitrate Calculator
Question 8
- Wikipedia HTTP Cookies
- Wikipedia Program States
- Wikipedia Cookie Privacy
- IETF Cookie Specifications
Question 9
- Wikipedia File Transfer Protocol
- Wikipedia Communications Protocol
- Network Working Group FTP Specifications
- Wikipedia list of FTP commands
Question 10
- Microsoft forum post on Security
Question 11
- Univercity of Sydney copyright ownership
- Australian Copyright Council
Question 12
- Wikipedia Java
- Wikipedia JavaScript
- Java article differences between Java and Javascript
- HTMLGoogies article Java vs Javascript
- Javarevisted differences between Java and Javascript
- Stackoverflow Java Applications
Question 13
- Google Sheets
- Google Drive
- Zoho
- Wikipadia Zoho
- Pic Monkey
- Wikipedia Pic Monkey
- Be Funky
- WebtoolsWiki Be Funky
Question 15
- Article on online privacy and security
- HackerNews article on online privacy
- Statisticbrain Identity Theft
- Identity Theft Victims
Question 16
- Wikepedia HTTPS
- InstantSSL HTTP vs HTTPS
- Webguide Online Forms