Said another way, theweb is a part of the internet.
Popular web browsers include Chrome, Firefox,Microsoft Edge, andSafari, but there are many others.
online window software is specifically designed to convert HTML and XML computer code into human-readable documents.

Oleksiy Maksymenko / Getty Images
If you want to go back, use the arrow buttons provided for that purpose.
HTTPS is the acronym for Hypertext Transfer Protocol Secure.
HTML and XML
Hypertext Markup Language (HTML) is the programming language of web pages.

Westend61 / Getty Images
HTML commands a web web app to display text and graphics in a specific fashion.
XML is eXtensible Markup Language, a cousin to HTML.
XML focuses on cataloging and databasing the text content of a web page.

KTSDESIGN / Getty Images
XHTML is a combination of HTML and XML.
In most cases,IP addressesare assigned automatically.
Beginners don’t usually need to assign an IP address.

SEAN GLADWELL / Getty Images
ISP
You need an internet service provider (ISP) to gain access to the internet.
An ISP is the company or government organization that plugs you into the internet.
Most ISPs provide various internet connection speeds for a monthly fee.

Logovski / Getty Images
A router can be wired or wireless or both.
Often your ISP provides thenetwork routerit prefers for your internet service.
When it does, the router is configured appropriately.

Perry Mastrovito / Getty Images
If you choose to use a different router, you may need to enter information into it.
Email iselectronic mail.
It is the sending and receiving of typewritten messages from one screen to another.

Lane Oatey / Blue Jean Images / Getty Images
Beginners start by creating one email address that they give to their family members and friends.
However, you aren’t limited to one address or email service.
You may choose to add other email addresses for online shopping, business, or social networking purposes.

Kittichai Boonpong / EyeEm / Getty Images
Filtering is the popular, but imperfect, defense against spam.
Filtering is included in many email clients.
Look for a spam or junk folder in your mailbox to view quarantined or filtered email.

MirageC / Getty Images
To protect yourself against hackers who want your personal information, be suspicious.
Your bank won’t email you and ask for your password.
The fellow in Nigeria doesn’t need your bank account number.

Epoxydude / Getty Images
Amazon isn’t handing you a free $50 gift certificate.
Anything that sounds too good to be true probably isn’t true.
Facebook and Snapchat are among the largest social networking sites.

Daniel Sambraus / Getty Images
LinkedIn is a combination of a social and professional site.
Other popular sites include YouTube, Instagram, Pinterest, Tumblr, and Reddit.
Social media sites offer free accounts to everyone.

Guido Mieth / Getty Images
When selecting the ones that interest you, ask your friends and family which ones they belong to.
That way, you could join a group where you know people.
As with all things internet-related, protect your personal information when you sign up for sites.

John Lund / Getty Images
E-Commerce
E-commerce is electronic commerce, the transactions of selling and buying online.
Every day, billions of dollars exchange hands through the internet and the World Wide Web.
Internet shopping has exploded in popularity with internet users, to the detriment of traditional brick-and-mortar stores and malls.

Epoxydude / Getty Images
Every well-known retailer has a website that showcases and sells its products.
Joining them are dozens of small sites that sell products and enormous sites that sell just about everything.
Encryption and Authentication
Encryptionis the mathematical scrambling of data so that it is hidden from eavesdroppers.

Sean Gallup / Getty Images
Encryption uses complex math formulas to turn private data into meaningless gobbledygook that only trusted readers can unscramble.
When reliable encryption is in place, banking information and credit card numbers are kept private.
Authentication is directly related to encryption.

skaman306 / Getty Images
Authentication is the complex way that computer systems verify that you are who you say you are.
Commonly, downloading is associated with songs, music, software, and media files.
For example, you might want to download a song or a trial copy of Microsoft Office or 365.

krisanapong detraphiphat / Getty Images
The larger the file you are copying, the longer the download takes to transfer to your gear.
Some downloads take seconds; some take minutes or longer, depending on yourinternet speed.
Web-based email is one example of cloud computing.

Towfiqu Photography / Getty Images
The user’s email is stored and accessed in the cloud of the internet.
The cloud is the modern version of the 1970s mainframe computing model.
As part of the cloud computing model is software as a service (SaaS).

Peter Dazeley / Getty Images
SaaS is a business model that assumes people would rather rent software than own it.
Increasingly, services offer cloud storage to access files from more than one rig.
Cloud computing makes collaboration among individuals on the same files in the cloud possible.

Peter Dazeley / Getty Images
Firewall
Firewallis a generic term to describe a barrier against destruction.
Computing firewalls range from small antivirus software packages to complex and expensive software and hardware solutions.
Some firewalls are free.
Many computers ship with a firewall you’re free to activate.
All computer firewalls offer some kind of safeguard against hackers vandalizing or taking over a computer system.
Malware
Malware is a broad term that describes any malicious software designed by hackers.
Protect yourself with a firewall and knowledge of how to prevent these programs from reaching your setup.
Named after the famous Trojan horse tale, Trojan programs masquerade as legitimate files or software programs.
Sometimes, it is an innocent-looking movie file or an installer that pretends to be actual anti-hacker software.
The power of the Trojan attack comes from users naively downloading and running the Trojan file.
Blogs
A blog is a modern online writer’s column.
Absolutely anyone can start a blog.