internet is a matrix of networks that connects computers around the world.
The World Wide Web is an information server on the Internet composed of
interconnected sites and files, accessible with a browser.
Browser is a program that accesses and displays files available on the World
Engines are web sites that have search capabilities built into them.
Access a search engine, type in a keyword of what you are looking for, click
send then you will see listings for that keyword displayed from their
database. Here are a few popular search engines to try: Google
cross-reference in an electronic document that, when activated (clicked),
causes the application (browser) reading the document to load a different
section of the document, a new document, or a resource that the application
can display or use. A hyperlink is usually text, with an underline. Top
When clicked, will transport you to its destination file.
person who is in charge of the design, marketing, developing and maintaining
of a web site.
is a language used to arrange documents in a web site. This language
is read by a browser and translated into a readable format. An example of
HTML is: <a href="http://www.5starsupport.com">5 Star
Support</a> When read by a browser the example would look like
Star Support It would be a clickable
is a protocol used to request and transmit files, especially Web pages
and Web page components, over the Internet or other computer network. An
example of HTTP in action is : HTTP://www.5starsupport.com
HTTP is instructing the browser to transfer the file name.
URL is the means by which browsers are able to transfer file names
throughout the internet. An example of a URL is:
HTTP is the instruction to transfer the file. The two forward slashes
introduce the main file name (www.5starsupport.com). The single forward
slash indicates a sub file off of the main file (/url.htm).
ISP is the company providing the internet access. There are many ISP's
to choose from and they all vary in price. Depending on what you are
looking for in an ISP would decide which one would best suit your needs.
It is not uncommon for people to change ISP's until they find one that they
that controls the execution of computer programs and may provide various
services. Examples of some Operating Systems are:
386BSD, AIX, AOS, Amoeba, Angel, Artemis microkernel, BeOS, Brazil, COS, CP/M, CTSS, Chorus,
DACNOS, DOSEXEC 2, GCOS, GEORGE 3, GEOS, ITS, KAOS, Linux, LynxOS, MPV, MS-DOS, MVS, Mach,
Macintosh operating system, MINIX, Multics, Multipop-68, Novell NetWare, OS-9, OS/2, Pick,
Plan 9, QNX, RISC OS, STING, System V, System/360, TOPS-10, TOPS-20, TRUSIX, TWENEX, TYMCOM-X,
Thoth, Unix, VM/CMS, VMS, VRTX, VSTa, VxWorks, WAITS, Windows 3.1, Windows 95, Windows 98,
Windows 2000, Windows NT, Windows XP.
computer virus is generated by people. It can have many different
functions and all are generally destructive in nature. A virus is
usually transmitted through .EXE files or executable programs. These are
files that need to be downloaded in to your system and then executed. Always use caution
when downloading .EXE files. A rule of thumb is, never download from
an unknown source. You should always keep your anti-virus software
up to date. Some anti-virus companies are:
IBM. Visit any of these companies to learn more
about Computer Viruses and how you can protect your computer from harm. Also,
visit 5 Star Support's Virus Information
|There are many hundreds of
discussion forums on the web today. They are gaining in popularity constantly.
They are a very quick and easy way to gain answers to questions and discuss items of interest. If you are looking for a specific type of forum, try searching for one in your favorite search engine.
The 5 Star Support forums can be found here:
JPEG format (Joint Photographic Experts Group) is for photographic images
where GIF (Graphics Interchange Format) is for line-art images such as
graphs, icons and other computer generated art work. The use of transparent
GIF's are very popular due to the smooth transition into a web page.
GIF is the only format that supports transparency.
bookmark is simply saving a web site to your favorite places area in your
browser. AOL (America Online) has a little red heart that you can click on
that resides at the the top right of your web page window. It will
allow you to insert the web site into an email, instant message or favorite
In Internet Explorer, all you have to do is select favorites in the top toolbar, click on "add to favorites". Name it whatever you want in the "Name:" area or the browser will pick up the name of the site automatically. Choose "OK" to insert it into your favorite places. The next time you click on "Favorites" at the top toolbar, you will notice that the web site is there now. Just click on it and you will be transported to the selected site.
In Netscape, click on "Bookmarks" in the top toolbar. Select "add bookmark". It will now be added to your bookmarks. Click on "Bookmarks" again in the top toolbar and you will see the site that you added. Click on it and you will be transported to the selected site.
|Hardware||The physical components of the computer.|
|Software||Information which is used to control the hardware.|
|Program||A collection of instructions which the computer can implement.|
|Data||Information in the form which the computer uses.|
|MHz or Megahertz||Speed at which the various components of the computer works. One hertz is equal to one cycle per second. Mega = million.|
|Byte||One computer word of information; equal to 8 bits. Bits are single digits when grouped into 8 digits, equal one computer word.|
|Kb or Kilobyte||1024 bytes of information or 1024 times 8.|
|Mb or Megabyte||One million bytes of information.|
|Msec or Millisecond||One thousandth of a second.|
|µSec or Microsecond||One millionth of a second.|
|Nsec or Nanosecond||One 1/1000th of a Microsecond.|
|File||A program or collection of data residing on a permanent storage medium.|
For a more in depth Glossary of terms compilation, visit 5 Star Support's Computer Glossary
E-mail is a very simple device that anyone can use. You create your E-mail,
log on to your ISP (Internet Service Provider) and send your mail. Your
message travels thru your ISP's mail server and routes it to the recipients
mail server and then is placed in the recipients mail box. The message
will sit in the recipients mail box until the person accesses the mail. This
whole communications process is done using TCP/IP (Transmission Control
The E-mail address is broken down as follows:
YourName@ Domain.Com The first part, "YourName" can be any predetermined name that you have chosen with your ISP. The "@" or (AT) symbol provides a break between "YourName" and the "Domain" name. It shows that you are at a certain domain. The ".Com" is the type of institution. It can also be .Org, .Net, .Edu...etc.
can cause severe damage to your computer. A thunder and lightning storm
miles away can induce surges of current along power and phone lines. Even a
small spike in voltage could cause unpredictable problems. It is advisable
to turn off your computer and unplug the modem from the phone line during
severe storms. It's better to be safe than sorry!
call waiting feature on your phone line can interrupt your online session.
You can disable this feature every time you dial out by adding *70, in front
of your number. This code depends on the phone company, so make sure
that it is the correct code for your telephone service provider especially
if you're not in the USA. For example, if your current dial-up number is
555-1212 change it to *70,555-1212. *70 actually does the disabling of the
call waiting feature, and the comma (,) afterwards, adds a delay to bypass
the acknowledgment of the command. If your dialer won't interpret the commas
in the phone number, try using just *70. To re-enable call waiting, dial
use the "Drag and Drop" method, move your mouse arrow over the
file that you would like to move. Left click it one time and hold the click
in its depressed position. Move "drag" your mouse to the location
where you would like to place the file and let go of the click thus "drop" ping
use the "Cut and Paste" method, move your mouse arrow to the text
(as an example) that you would like to move. Left click and drag your
mouse thru the text which will highlight the text as you drag. Let go
of the click. While the text is highlighted, hit "CTRL" then
"C" on your keyboard. This will copy the text that is highlighted.
Hit "CTRL" then "X" and this will "Cut" the
text that is highlighted removing it from site. To place the text in
the area desired, move the mouse to your new location, click one time to
place the cursor in the desired spot. Once the cursor is flashing in
the location of choice, hit "CTRL" then "V" which will
"Paste" the text to that location.
Downloading from the internet can be very
addictive because there is SO much free stuff. To download, follow the steps
on the Windows desktop.
1. In File
Manager, click the root directory (usually C:).
1. In the
Finder, select "New Folder" under the File menu.
Download is done from FTP (file transfer protocol)
or web sites. Where-ever you choose to download files is up to you. I
must caution you that downloading over the internet has some risk. I
recommend having an up-to-date virus scanner installed before doing any
Files are compressed to reduce the download time
and keep all of the files together in one file transfer. There are many file
extensions that are used when compressing files, but the most common type is
the .EXE extension. It is (more than likely) a self-extracting file that
will decompress when double-clicked. Other files with other file extensions
like .ARC, .ARJ or .ZIP will have to be decompressed using a decompression
software such as WinZip for PC users and
StuffIt Expander for Mac users.
WinZip makes the install process easy. If a ZIP file contains a program called Install or Setup, WinZip detects it and creates a button labeled "Install" at the right end of the WinZip button bar. Before you click this button, check the software's "read-me" file for any special instructions. To continue, click the "Install" button. WinZip will now setup and install the software for you. Since installation routines vary widely, you'll have to follow any instructions as they come up.
If the "Install" button does not exist, you will have to install the software yourself. You will need to read the software's "read-me" file to acquire the correct installation procedures.
Mac users: Open the "read-me" file after expanding the software to get specific installation instructions.
Bandwidth is the capacity of the network, usually expressed in storage
divided by time. . .i.e. megabytes per second.
If they talk about megabits per second, they are usually trying for an impressive figure which should be divided by 10, as it usually takes a whole ten bits to send one byte [8 bits] due to start and stop bits.
CDROMs can hold 1 gigabyte-- 1,000 of these can hold 1 million books and will fit in a medium sized suitcase Stack up 100 of these suitcases. . .and you can hold every word of the "Library of Congress."
Can you get a virus from simply visiting a web
page? Yes, you sure can! This is something that was previously thought impossible...
the delivery of a Trojan by simply accessing a web page. The user simply accesses the web site and "may"
be presented with a download option (not always), however the download has already begun and cannot be
stopped. What makes this dangerous is not the forced download but the fact that the downloaded program
is run ... all without the user knowing anything is going on.
According to one expert there are actually a few ways to accomplish this; java script active x control (particularly HHCtrl...the active help control), perl, with an html 'internet zone' attack, and even a shockwave exploit.
However, it should be noted there is always a draw. The e-mail is the draw that sets up the web page and is the medium to draw unsuspecting users in. Usually something along the lines of "Did you know someone was talking bad about you? To check it out visit this web page."
At this time all such attacks are PC oriented but with the advent of OSX this may open the Mac up to such attacks since it will be running a UNIX shell.
The representation of separate shapes such as lines, polygons and text, and groups
of such objects, as opposed to bitmaps. The advantage of vector graphics ("drawing") programs over bitmap
("paint") editors is that multiple overlapping elements can be manipulated independently without using
different layers for each one. It is also easier to render an object at different sizes and to transform
it in other ways without worrying about image resolution and pixels.
What is Spam?
Spam is unsolicited, commercial or bulk email. Typically, a spammer buys or steals lists of email addresses, or harvests addresses from the Internet. If your email address appears in a newsgroup, a web site, a chat room, or an online membership directory, it may find its way onto these lists. The spammer then uses software to send thousands, or millions, of messages. There are four types of spam, with the first two accounting for 25% of the email messages on the Internet through 2002:
What Is Email Spoofing?
Email spoofing is the deliberate forging of the sender's email address. The culprit pretends to be another person you may know or uses a name you may trust, for example: "email@example.com"
What Should I Do When I Receive Spam Email?
What Can I Do To Avoid Receiving Spam Email?
You can keep current on the status of the Federal Government bill, CAN-SPAM, at spamlaws.com/federal/108s877.html.
What Can Be Done To Protect Users From Spam Email?
There is currently no technical solution that will stop spam, without impeding legitimate email. Frustrating for users, as well as for technical support personnel, it is a basic fact of Internet life that if you use the Internet, you will get some unsolicited email.
Fight and Report Spam