Describe at least one way the internet and an intranet are similar and one way they are different. Which is more secure, and why? Why might you have employees use passwords to sign on to the intranet even though it’s not accessible by people outside your building? What is the difference between a domain name and a URL? Provide a hypothetical or real example of each. What is a web browser, and which one are you using to access this course? What is the most common task you use your browser for? Who hosts your email, both your personal email address and professional or educational accounts you have? How do you access the address books for that email host?

1 answer

Similarities and Differences between the Internet and Intranet

Similarity: One way the internet and an intranet are similar is that both are networks that allow computers to communicate and share data with each other. They use standardized protocols, such as TCP/IP, for data exchange, enabling devices to connect and transfer information.

Difference: The primary difference is that the internet is a global network that connects millions of private, public, academic, business, and government networks, making it accessible to anyone with an internet connection. In contrast, an intranet is a private network restricted to an organization or a specific group, often used to share internal information, resources, and applications securely.

Security Comparison

Generally, an intranet is more secure than the internet because it is restricted to authorized users within a specific organization. It often has additional layers of security such as firewalls, access controls, and encryption methods that ensure sensitive information remains protected from external threats.

Passwords on Intranet

Even though an intranet is not accessible from outside the building, using passwords for access is essential for several reasons:

  • Internal Threats: Employees with malicious intentions or unauthorized access could still compromise sensitive data.
  • User Accountability: Passwords help maintain a level of accountability for actions taken within the network.
  • Regulatory Compliance: Some industries have regulations that require additional security measures to protect data.

Domain Name vs URL

Domain Name: A domain name is the human-readable address used to identify a specific location on the internet. It corresponds to an IP address that computers use to communicate.

Example: example.com

URL (Uniform Resource Locator): A URL is the specific address that includes the domain name along with other components such as the protocol (http/https), path, and parameters. It's a complete reference to a resource on the internet.

Example: https://www.example.com/path/to/resource?query=parameter

Web Browser

A web browser is software that allows users to access the internet by retrieving, presenting, and navigating web pages. Examples of web browsers include Google Chrome, Mozilla Firefox, Safari, and Microsoft Edge.

Using a Browser for this Course: The specific browser being used to access this course may vary but is most likely a commonly used one like Google Chrome or Mozilla Firefox.

Common Browser Tasks

The most common task users perform with a web browser is searching for information. This often involves entering search queries into search engines to find websites, articles, or resources related to those queries.

Email Hosting

Email Hosting: Personal email is often hosted by popular services like Gmail (Google), Outlook (Microsoft), or Yahoo Mail. For professional or educational accounts, organizations may provide internal email hosting or utilize services like Google Workspace or Microsoft 365.

Accessing Address Books

To access the address books for email hosts, you typically log into the web-based email interface (for example, Gmail or Outlook) and navigate to the "Contacts" or "Address Book" section of the email application where you can view and manage contacts.

This information outlines the structure and functioning of both internet and intranet systems, along with the importance of security measures and the usage of digital tools.