You are on page 1of 3

Task3: Search Engine and Netiquette

What is Search Engine? 1. Even before the World Wide Web, there were search engines that attempted to organize the Internet. 2. The first of these was the Archie search engine from McGill University in 1990, followed in 1991 by WAIS and Gopher. 3. All three of those systems predated the invention of the World Wide Web but all continued to index the Web and the rest of the Internet for several years after the Web appeared. 4. As the Web grew, search engines and Web directories were created to track pages on the Web and allow people to find things. 5. The first full-text Web search engine was WebCrawler in 1994. Before WebCrawler, only Web page titles were searched. Another early search engine, Lycos, was created in 1993 as a university project, and was the first to achieve commercial success. During the late 1990s, both Web directories and Web search engines were popularYahoo! (founded 1994) and Altavista (founded 1995) were the respective industry leaders. 6. By August 2001, the directory model had begun to give way to search engines, tracking the rise of Google (founded 1998), which had developed new approaches to relevancy ranking. Directory features, while still commonly available, became after-thoughts to search engines. Database size, which had been a significant marketing feature through the early 2000s, was similarly displaced by emphasis on relevancy ranking, the methods by which search engines attempt to sort the best results first. Relevancy ranking first became a major issue circa 1996, when it became apparent that it was impractical to review full lists of results. Consequently, algorithms for relevancy ranking have continuously improved. Google's PageRank method for ordering the results has received the most press, but all major search engines continually refine their ranking methodologies with a view toward improving the ordering of results. As of 2006, search engine rankings are more important than ever, so much so that an industry has developed ("search engine optimizers", or "SEO") to help web-developers improve their search ranking, and an entire body of case law has developed around matters that affect search engine rankings, such as use of trademarks in

metatags. The sale of search rankings by some search engines has also created controversy among librarians and consumer advocates.[56]

Netiquette
History:
Netiquette began before the 1991 start of the World Wide Web. Text-based email, Telnet, Usenet, Gopher, Wais, and FTP from educational and research bodies dominated Internet traffic. At that time, it was considered somewhat indecent to make commercial public postings, and the limitations of insecure, text-only communications demanded that the community have a common set of rules. The term "netiquette" has been in use since at least 1983 [5], as evidenced by posts of the satirical "Dear Emily" Postnews column.[6] Definition: Netiquette, or net etiquette, refers to etiquette on the Internet. Good netiquette involves respecting others' privacy and not doing anything online that will annoy or frustrate other people. Three areas where good netiquette is highly stressed are e-mail, online chat, and newsgroups. For example, people that spam other users with unwanted e-mails or flood them with messages have very bad netiquette. You don't want to be one of those people. If you're new to a newsgroup or online chat room, it may help to observe how people communicate with each other before jumping in. Netiquette (a portmanteau formed from "network etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread .Some Usenet guidelines call for use of unabbreviated English ] while users of online chat protocols like IRC and instant messaging protocols like SMS often encourage just the opposite, bolstering use of SMS language. Common characteristics: Common rules for e-mail and USENET such as avoiding flamewars and spam are constant across most mediums and communities. Another rule is to avoid typing in all caps or grossly enlarging script for emphasis, which is considered to

be the equivalent of shouting or yelling. Other commonly shared points, such as remembering that one's posts are (or can easily be made) public, are generally

intuitively understood by publishers of Web pages and posters to USENET, although this rule is somewhat flexible depending on the environment. On more private protocols, however, such as e-mail and SMS, some users take the privacy of their posts for granted. One-on-one communications, such as private messages on chat forums and direct SMSs, may be considered more private than other such protocols, but infamous breaches surround even these relatively private media. For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.

Task 4: Cyber Hygiene:


Definition: The word hygiene derives from the name of the ancient Greek goddess of healthful living, Hygeia. Initially worshipped in her own right, by the fifth century BCE in Athens Hygeia was instead depicted as a demi-god, the daughter or wife of the god of healing, Asclepius. While worship of Asclepius aimed at curing disease through divine intercession, worship of Hygeia emphasized obtaining health by living wisely in accordance with her laws. In contemporary Western society the concept of hygiene has become associated with standards of personal grooming which often have little effect on individual health. We have to configure computer to be safe on Internet. For this we need to first install antivirus software, configure personal firewall and windows update on computer. We need to customize browsers to block pop ups to avoid viruses and/or worms. Antivirus softwares: Kaspersky, Symantec, Norton, Bit defender etc

You might also like