{"id":63,"date":"2024-07-29T20:02:35","date_gmt":"2024-07-29T20:02:35","guid":{"rendered":"https:\/\/computerbasicshub.net\/?page_id=63"},"modified":"2025-06-24T20:56:46","modified_gmt":"2025-06-24T20:56:46","slug":"webaccess","status":"publish","type":"page","link":"https:\/\/computerbasicshub.net\/index.php\/webaccess\/","title":{"rendered":"Accessing the Internet"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull has-global-padding is-layout-constrained wp-container-core-group-is-layout-3 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<p><\/p>\n\n\n\n<div class=\"wp-block-group alignfull has-base-2-background-color has-background is-layout-flow wp-block-group-is-layout-flow\" style=\"border-radius:16px;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<!DOCTYPE html>\n<html>\n<head>\n\t<meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\"\/>\n\t<title><\/title>\n\t<meta name=\"generator\" content=\"LibreOffice 7.6.0.3 (Windows)\"\/>\n\t<meta name=\"created\" content=\"2021-04-15T17:03:38.056000000\"\/>\n\t<meta name=\"changed\" content=\"2023-10-30T16:54:07.437000000\"\/>\n\t<style type=\"text\/css\">\n\t\t@page { margin: 2cm }\n\t\ttd p { line-height: 115%; margin-bottom: 0.25cm; background: transparent }\n\t\tp { line-height: 115%; margin-bottom: 0.25cm; background: transparent }\n\t\ta:link { so-language: zxx }\n\t<\/style>\n<\/head>\n<body lang=\"en-US\" dir=\"ltr\"><p style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"center\" style=\"margin-bottom: 0cm\"><font size=\"6\" style=\"font-size: 30pt\"><b>Accessing the\nInternet<\/b><\/p>\n<table width=\"860\" cellpadding=\"0\" cellspacing=\"0\" style=\"page-break-inside: avoid\">\n\t<col width=\"860\"\/>\n\t<tr>\n\t\t<td width=\"860\" valign=\"top\" style=\"border: none; padding: 0cm\"><p align=\"left\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/computerbasicshub.net\/interneticon.jpg\" name=\"Image5\" align=\"right\" width=\"187\" height=\"187\" border=\"0\"\/>\n<br\/>\n\n\t\t\t<\/p>\n\t\t<\/td>\n\t<\/tr>\n<\/table>\n<p style=\"line-height: 50%; margin-left: 0.3cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-before: auto\"><font size=\"6\" style=\"font-size: 16pt\">\nComputers can access the Internet through web browsers and apps. Web\nbrowsers are used to display websites and their web pages to users\nand provide a means of inputting data where required on them. Apps\ncan access the Internet for a number of tasks as described below. The\nscope of what apps can do using Internet connections can be more\nlimited than others. A web browser can access web pages and enable\nthem to function at the level they were designed to function at. An\nemail client is limited to accessing email accounts. It is important\nto recognize that any access to the Internet has to be from an\nInternet Service Provider. For example, a home with Internet access\nin the Boston area in America can get Internet access through Comcast\nor another Internet Service Provider. The main physical connections\nto the Internet are coax cable lines and fiber lines which can\nconnect directly to the home or to telephone lines.<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-before: auto\">\n<b>Web Browsers<\/b><\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\nWeb browsers are the primary access point to websites on the\nInternet. There are numerous brands of them. Some examples are\nChrome, Firefox and Microsoft Edge. A web browser consists of the URL\nbox at the top underneath the menu bar and the web page viewing area.\nExtensions can also be added to web browsers, too. One example in\nChrome is, PDF Viewer. This extension allows Chrome to display PDF\ndocuments in the browser instead of having to download them to view\nthe contents. Browser extensions allow browsers to have additional\nfunctionality than what they have by default.<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<b>URL Box:<\/b><\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\nThe URL box in a web browser allows users to enter website addresses\nto be accessed. Search terms which are entered into search engine\nboxes for search terms can also be entered into URL boxes. An example\nof a URL box is the following. For security reasons, https web pages\nare permitted to be freely accessed. However, for remaining http web\npages, security exceptions on browsers can be made. Most http web\npages are now https web pages, through protocol upgrades.<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<br\/>\n<br\/>\n\n<\/p>\n<table width=\"1637\" cellpadding=\"4\" cellspacing=\"0\">\n\t<col width=\"1629\"\/>\n\t<tr>\n\t\t<td width=\"1629\" valign=\"top\" style=\"border: none; padding: 0cm\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/computerbasicshub.net\/chromeurl_box.png\" name=\"Image1\" align=\"right\" width=\"1571\" height=\"48\" border=\"0\"\/>\n<p style=\"margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n\t\t\t<br\/>\n<br\/>\n\n\t\t\t<\/p>\n\t\t\t<p style=\"margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n\t\t\t<br\/>\n\n\t\t\t<\/p>\n\t\t<\/td>\n\t<\/tr>\n<\/table>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\nGoogle Search<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\nNote: The Lock symbol means that the web page is secure. A secure web\npage is a https web page.<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<b>Search Engines:<\/b><\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent\">\nSearch engines produce search results of indexed websites on the\nInternet based on keywords. The returned search results contain links\nwith descriptions of the search result&#8217;s searched websites&#8217;\nhomepages. There is a link to the website&#8217;s homepage and a\ndescription of it, below the link for each listed website in the\nsearch result. Some examples of search engines are listed below.<\/p>\n<ul>\n\t<li><p style=\"line-height: 115%; background: transparent; border: none; padding: 0cm; background: transparent\">\n\tGoogle<\/p><\/li>\n\t<li><p style=\"line-height: 115%; background: transparent; border: none; padding: 0cm; background: transparent\">\n\tYahoo<\/p><\/li>\n\t<li><p style=\"line-height: 115%; background: transparent; border: none; padding: 0cm; background: transparent\">\n\tBing<\/p><\/li>\n\t<li><p style=\"line-height: 115%; background: transparent; border: none; padding: 0cm; background: transparent\">\n\tAOL<\/p><\/li>\n<\/ul>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.7cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-before: auto\">\nGoogle is the dominant search engine on the Internet. It also has a\nmap search, too. \n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.7cm; background: transparent; border: none; padding: 0cm; background: transparent\">\nThe common types of search results are for the following.<\/p>\n<ul>\n\t<li><p style=\"line-height: 115%; background: transparent; border: none; padding: 0cm; background: transparent\">\n\tWebsites<\/p><\/li>\n\t<li><p style=\"line-height: 115%; background: transparent; border: none; padding: 0cm; background: transparent\">\n\tNews<\/p><\/li>\n\t<li><p style=\"line-height: 115%; background: transparent; border: none; padding: 0cm; background: transparent\">\n\tImages<\/p><\/li>\n\t<li><p style=\"line-height: 115%; background: transparent; border: none; padding: 0cm; background: transparent\">\n\tVideos<\/p><\/li>\n<\/ul>\n<p style=\"line-height: 115%; margin-left: 0.7cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.7cm; background: transparent; border: none; padding: 0cm; background: transparent\">\nMap searches can be done on numerous search engines, too. Map\nsearches include the below types of searches.<\/p>\n<ul>\n\t<li><p style=\"line-height: 115%; background: transparent; border: none; padding: 0cm; background: transparent\">\n\tMap directions<\/p><\/li>\n\t<li><p style=\"line-height: 115%; background: transparent; border: none; padding: 0cm; background: transparent\">\n\tSpecific address<\/p><\/li>\n\t<li><p style=\"line-height: 115%; background: transparent; border: none; padding: 0cm; background: transparent\">\n\tPoints of interest<\/p><\/li>\n\t<li><p style=\"line-height: 115%; background: transparent; border: none; padding: 0cm; background: transparent\">\n\troad layouts<\/p><\/li>\n<\/ul>\n<p style=\"line-height: 115%; margin-left: 0.7cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.7cm; background: transparent; border: none; padding: 0cm; background: transparent\">\nAn example of a map search is, the National Arts Centre, Ottawa to\nthe Museum of Nature, Ottawa. Detailed road directions will be\nproduced by Google Maps. An address search will zoom in to the\nlocation of the address on a map. Numerous online maps also have the\noption to view satellite imagery of maps, too. Google Maps has the\noption available to users to view satellite imagery of map search\nresults. Below, a link to Google Maps is on the left side.<\/p>\n<p style=\"line-height: 115%; margin-left: 0.7cm; background: transparent; border: none; padding: 0cm; background: transparent\">\nGoogle Maps:<\/p>\n<p style=\"line-height: 115%; margin-left: 0.7cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<a href=\"https:\/\/www.google.ca\/maps\/@45.4198655,-75.4535278,3z?hl=en\"><font color=\"#0000ff\">Google\nMaps<\/font><\/a><\/p>\n<p style=\"line-height: 115%; margin-left: 0.7cm; background: transparent; border: none; padding: 0cm; background: transparent\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.7cm; background: transparent; border: none; padding: 0cm; background: transparent\">\nRegions of interest can be zoomed into from the map of Earth.<\/p>\n<p style=\"line-height: 115%; margin-left: 0.7cm; background: transparent; border: none; padding: 0cm; background: transparent\">\nBelow, is an example.<\/p>\n<table width=\"100%\" cellpadding=\"5\" cellspacing=\"0\">\n\t<col width=\"38*\"\/>\n\t<col width=\"83*\"\/>\n\t<col width=\"135*\"\/>\n\t<tr valign=\"top\">\n\t\t<td width=\"15%\" style=\"background: transparent; border: none; padding: 0cm\"><p align=\"left\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/computerbasicshub.net\/nyczoom1.jpg\" name=\"Image2\" align=\"left\" width=\"237\" height=\"165\" border=\"0\"\/>\n<br\/>\n\n\t\t\t<\/p>\n\t\t<\/td>\n\t\t<td width=\"33%\" style=\"background: transparent; border: none; padding: 0cm\"><p align=\"left\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/computerbasicshub.net\/nyczoom2.jpg\" name=\"Image3\" align=\"left\" width=\"558\" height=\"279\" border=\"0\"\/>\n<br\/>\n\n\t\t\t<\/p>\n\t\t<\/td>\n\t\t<td width=\"53%\" style=\"background: transparent; border: none; padding: 0cm\"><p align=\"left\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/computerbasicshub.net\/nyczoom3.jpg\" name=\"Image4\" align=\"left\" width=\"627\" height=\"304\" border=\"0\"\/>\n<br\/>\n\n\t\t\t<\/p>\n\t\t<\/td>\n\t<\/tr>\n<\/table>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; background: transparent; page-break-before: auto; page-break-after: auto\">\nSource: Google Maps<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<b>Extensions:<\/b><\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\nWeb browsers can have add-ons which are extensions to them for\nadditional functionality. They can be enabled or disabled. One\nexample of a Chrome browser extension is, PDF Viewer. It allows users\nto view PDF documents in the Chrome browser instead of having to\ndownload PDF files to the computer in order to view the contents\nusing a PDF file viewing app. Browser extensions have settings which\ncan be modified. In Chrome, the settings of extensions can be\naccessed by clicking on the, &#8216;Details&#8217;, button. Third-party browser\nextensions are extensions for the given browser not developed by the\ndeveloper of the browser but developed by external software\ndevelopers. It is important to be cautious when installing and\nenabling a third-party extension to a browser. Third-party extensions\ncan potentially cause harm. Safety of third-party extensions can be\ndetermined by the purpose of them along with the source. For example,\na browser extension made by Adobe would be considered to be safe\nsince Adobe is a software developer with a sound reputation. It is\ngenerally a good practice to not install questionable extensions to\nbrowsers. This will help you avoid compromising your computer. \n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<b>Bookmarks:<\/b><\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\nWebsites can be bookmarked by web browsers. Bookmarks are pointers to\nspecific web pages to enable easier access to them. In the Microsoft\nEdge browser, bookmarks are known as Favorites. Bookmark names can be\nmodified, too. Bookmarks can be put into sub-folders if desired. When\na backup of a browser&#8217;s bookmarks is needed, bookmarks can be\nexported to a file from which they can be imported from. They can be\nexported to an HTML file. However, it is possible to export bookmarks\nto files of different file formats like CSV files, too.<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<b>Security:<\/b><\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\nWhile accessing the Internet, security is important. Both for the\ncomputer and yourself, this is true. For more information regarding\nonline security, please see the web page in the below link.<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<a href=\"https:\/\/computerbasicshub.net\/win10security.html\"><font color=\"#0000ff\">Windows\nSecurity<\/font><\/a><\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\nEmail security is just as important, too. Viruses and malware can\ninfect computers if they are downloaded. This could lead to file\ncorruption and even damage to the computer&#8217;s operating system. For\nthis reason, files attached to small of large junk mail should never\nbe downloaded or even opened. It is best to just delete these emails.\nApplication files in spam pose the highest risk in terms of malware\nand viruses in attachments. Email providers have spam filtering\nsystems to identify spam which could be dangerous to computer\nfilesystems and isolate or delete them. SpamAssassin is one example\nof a spam filtering system for email servers. It filters out spam\nbased on a spam score.<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\nFor more information, see the below link.<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<a href=\"https:\/\/computerbasicshub.net\/emailsecurity.html\"><font color=\"#0000ff\">Email\nSecurity<\/font><\/a><\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"line-height: 115%; margin-left: 0.6cm; background: transparent; border: none; padding: 0cm; background: transparent; page-break-after: auto\">\n<br\/>\n<br\/>\n\n<\/p>\n<\/body>\n<\/html>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Accessing the Internet Computers can access the Internet through web browsers and apps. Web browsers are used to display websites and their web pages to users and provide a means of inputting data where required on them. Apps can access the Internet for a number of tasks as described below. The scope of what apps [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"page-no-title","meta":{"footnotes":""},"class_list":["post-63","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages\/63","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/comments?post=63"}],"version-history":[{"count":5,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages\/63\/revisions"}],"predecessor-version":[{"id":404,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages\/63\/revisions\/404"}],"wp:attachment":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/media?parent=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}