Said another way, theweb is a part of the internet.

Popular web browsers include Chrome, Firefox,Microsoft Edge, andSafari, but there are many others.

online window software is specifically designed to convert HTML and XML computer code into human-readable documents.

Google search engine page with search results displayed on a computer monitor

Oleksiy Maksymenko / Getty Images

If you want to go back, use the arrow buttons provided for that purpose.

HTTPS is the acronym for Hypertext Transfer Protocol Secure.

HTML and XML

Hypertext Markup Language (HTML) is the programming language of web pages.

Teammates working on photos on laptop

Westend61 / Getty Images

HTML commands a web web app to display text and graphics in a specific fashion.

XML is eXtensible Markup Language, a cousin to HTML.

XML focuses on cataloging and databasing the text content of a web page.

Secure website

KTSDESIGN / Getty Images

XHTML is a combination of HTML and XML.

In most cases,IP addressesare assigned automatically.

Beginners don’t usually need to assign an IP address.

HTTP

SEAN GLADWELL / Getty Images

ISP

You need an internet service provider (ISP) to gain access to the internet.

An ISP is the company or government organization that plugs you into the internet.

Most ISPs provide various internet connection speeds for a monthly fee.

Web Coding

Logovski / Getty Images

A router can be wired or wireless or both.

Often your ISP provides thenetwork routerit prefers for your internet service.

When it does, the router is configured appropriately.

Red Internet Addresses with Blur Effect

Perry Mastrovito / Getty Images

If you choose to use a different router, you may need to enter information into it.

Email

Email iselectronic mail.

It is the sending and receiving of typewritten messages from one screen to another.

Technicians doing maintenance in computer room

Lane Oatey / Blue Jean Images / Getty Images

Beginners start by creating one email address that they give to their family members and friends.

However, you aren’t limited to one address or email service.

You may choose to add other email addresses for online shopping, business, or social networking purposes.

Wireless Router On Table Against White Background

Kittichai Boonpong / EyeEm / Getty Images

Filtering is the popular, but imperfect, defense against spam.

Filtering is included in many email clients.

Look for a spam or junk folder in your mailbox to view quarantined or filtered email.

Network Communications

MirageC / Getty Images

To protect yourself against hackers who want your personal information, be suspicious.

Your bank won’t email you and ask for your password.

The fellow in Nigeria doesn’t need your bank account number.

Mail program on computer screen

Epoxydude / Getty Images

Amazon isn’t handing you a free $50 gift certificate.

Anything that sounds too good to be true probably isn’t true.

Facebook and Snapchat are among the largest social networking sites.

Snapchat App on cellphone screen

Daniel Sambraus / Getty Images

LinkedIn is a combination of a social and professional site.

Other popular sites include YouTube, Instagram, Pinterest, Tumblr, and Reddit.

Social media sites offer free accounts to everyone.

Shopping online with smartphone and credit card on hand.

Guido Mieth / Getty Images

When selecting the ones that interest you, ask your friends and family which ones they belong to.

That way, you could join a group where you know people.

As with all things internet-related, protect your personal information when you sign up for sites.

Online, Networking and Computer Security

John Lund / Getty Images

E-Commerce

E-commerce is electronic commerce, the transactions of selling and buying online.

Every day, billions of dollars exchange hands through the internet and the World Wide Web.

Internet shopping has exploded in popularity with internet users, to the detriment of traditional brick-and-mortar stores and malls.

Downloading message on a computer screen

Epoxydude / Getty Images

Every well-known retailer has a website that showcases and sells its products.

Joining them are dozens of small sites that sell products and enormous sites that sell just about everything.

Encryption and Authentication

Encryptionis the mathematical scrambling of data so that it is hidden from eavesdroppers.

CeBIT 2013 Technology Trade Fair

Sean Gallup / Getty Images

Encryption uses complex math formulas to turn private data into meaningless gobbledygook that only trusted readers can unscramble.

When reliable encryption is in place, banking information and credit card numbers are kept private.

Authentication is directly related to encryption.

selective focus freelance Hand holding mobile phone for shopping online and soft flare filter and cross process

skaman306 / Getty Images

Authentication is the complex way that computer systems verify that you are who you say you are.

Commonly, downloading is associated with songs, music, software, and media files.

For example, you might want to download a song or a trial copy of Microsoft Office or 365.

Hacker concept photo; hacker using a laptop with code streaming down the screen.

krisanapong detraphiphat / Getty Images

The larger the file you are copying, the longer the download takes to transfer to your gear.

Some downloads take seconds; some take minutes or longer, depending on yourinternet speed.

Web-based email is one example of cloud computing.

virus word marked with yellow marker - and a memory card

Towfiqu Photography / Getty Images

The user’s email is stored and accessed in the cloud of the internet.

The cloud is the modern version of the 1970s mainframe computing model.

As part of the cloud computing model is software as a service (SaaS).

Phishing credit card for information

Peter Dazeley / Getty Images

SaaS is a business model that assumes people would rather rent software than own it.

Increasingly, services offer cloud storage to access files from more than one rig.

Cloud computing makes collaboration among individuals on the same files in the cloud possible.

Social media ‘blog’ key on keyboard

Peter Dazeley / Getty Images

Firewall

Firewallis a generic term to describe a barrier against destruction.

Computing firewalls range from small antivirus software packages to complex and expensive software and hardware solutions.

Some firewalls are free.

Many computers ship with a firewall you’re free to activate.

All computer firewalls offer some kind of safeguard against hackers vandalizing or taking over a computer system.

Malware

Malware is a broad term that describes any malicious software designed by hackers.

Protect yourself with a firewall and knowledge of how to prevent these programs from reaching your setup.

Named after the famous Trojan horse tale, Trojan programs masquerade as legitimate files or software programs.

Sometimes, it is an innocent-looking movie file or an installer that pretends to be actual anti-hacker software.

The power of the Trojan attack comes from users naively downloading and running the Trojan file.

Blogs

A blog is a modern online writer’s column.

Absolutely anyone can start a blog.