{"id":388,"date":"2020-11-27T14:44:25","date_gmt":"2020-11-27T19:44:25","guid":{"rendered":"https:\/\/opentextbc.ca\/computerstudies\/chapter\/web-search-engine\/"},"modified":"2022-07-25T15:12:55","modified_gmt":"2022-07-25T19:12:55","slug":"web-search-engine","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/computerstudies\/chapter\/web-search-engine\/","title":{"raw":"Topic C: Web search engine","rendered":"Topic C: Web search engine"},"content":{"raw":"<p style=\"text-align: center;\">Click play on the following audio player to listen along as you read this section.<\/p>\r\nhttps:\/\/media.bccampus.ca\/id\/0_7wpmngx0?width=608&amp;height=70&amp;playerId=23449753\r\n<h1>Perform a Search using a Web Search Engine<\/h1>\r\n[pb_glossary id=\"475\"]Search engine[\/pb_glossary] \u2013 an Internet search engine is a web-based tool (a software) that is designed to search the content of web pages and to find particular information on the Internet.\r\n<h2>Some popular search engines<\/h2>\r\n<ul>\r\n \t<li><img class=\"alignright wp-image-1363\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/magnifying-glass.png\" alt=\"\" width=\"208\" height=\"139\" \/>Google<\/li>\r\n \t<li>Bing<\/li>\r\n \t<li>Baidu<\/li>\r\n \t<li>Yahoo!<\/li>\r\n \t<li>Yandex<\/li>\r\n \t<li>Ask.com<\/li>\r\n \t<li>DuckDuckGo<\/li>\r\n<\/ul>\r\n<h2>Search the Internet using a web search engine<\/h2>\r\n<ol>\r\n \t<li>Open a search engine in a web browser (such as Google in Chrome).<\/li>\r\n \t<li>Type a few specific keywords or phrases to describe whatever you wish to search in the search bar. Search engines look for the keywords in your query.<\/li>\r\n \t<li>Press the <strong>Enter<\/strong> key on the keyboard.<\/li>\r\n \t<li>Repeat above steps if necessary.<img class=\"aligncenter wp-image-1364\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/Google-search-bar-screenshot-.png\" alt=\"\" width=\"500\" height=\"197\" \/><\/li>\r\n<\/ol>\r\n<h1>Security Issues on the Internet<\/h1>\r\n<h2>Internet security issues<\/h2>\r\nAlthough Internet led to many benefits, it also poses a greater potential for security threats.\r\n<h2>The common Internet security issues<\/h2>\r\n<ul>\r\n \t<li>[pb_glossary id=\"394\"]Hacker[\/pb_glossary] \u2013 refers to a person who can gain unauthorized access (break into) to a computer or a network to commit crimes.<\/li>\r\n \t<li>Some things a skilled hacker can do to your computer:\r\n<ul>\r\n \t<li>Hijack your usernames and passwords;<\/li>\r\n \t<li>Gain access to the personal information (credit card numbers, bank account, social insurance number, etc.);<\/li>\r\n \t<li>Steal, change, exploit, sell or destroy data;<\/li>\r\n \t<li>Damage or bring down systems;<\/li>\r\n \t<li>Hold those system hostages to collect ransom.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li>[pb_glossary id=\"491\"]Malware[\/pb_glossary] (short for malicious software) \u2013 a software that is designed to damage, disrupt, or infect computers.\r\n<ul>\r\n \t<li>Malware can gain unauthorized access to a computer and continuously run in the background without owner\u2019s knowledge.<\/li>\r\n \t<li>Malware is a single term that refers to all the different types of threats to your computer safety such as virus, Trojan horse, worm, spyware, etc.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li>[pb_glossary id=\"513\"]Computer virus[\/pb_glossary] \u2013 a specific type of malware that is designed to replicate (copy) and spread from one computer to another.\r\n<ul>\r\n \t<li>A virus can make a copy of itself over and over again.<\/li>\r\n \t<li>A virus can spread from one computer to another through email, removable storage devices, networks (e.g. internet messaging services, download infected files \u2026), etc.<\/li>\r\n \t<li>A virus can damage your computer by corrupting system files, sending spam, stealing data and personal information from your computer, destroying data, deleting everything on your hard drive, etc.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li>[pb_glossary id=\"467\"]Trojan horse[\/pb_glossary](or Trojan) \u2013 a type of malware that looks harmless but can damage, disrupt, steal data on your computer.\r\n<ul>\r\n \t<li>A Trojan misleads users of its true intent.<\/li>\r\n \t<li>A Trojan may claim to get rid of your computer viruses but instead introduces viruses onto your computer.<\/li>\r\n \t<li>A Trojan can take the form of an innocent-looking email attachment, download, etc.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li>[pb_glossary id=\"460\"]Worm[\/pb_glossary] \u2013 it is similar to a virus (a sub-class of a virus). It is designed to quickly self-replicate and spread copies of themselves from one computer to another.\r\n<ul>\r\n \t<li>The key difference between a virus and a worm is that a virus needs human action to replicate, whereas, a worm doesn\u2019t.<\/li>\r\n \t<li>A virus only spreads when a user opens an affected file whereas a worm spreads without the use of a host file.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li>[pb_glossary id=\"486\"]Phishing[\/pb_glossary] \u2013 a scammer uses deceptive emails or websites and tries to obtain valuable personal information (i.e., username, password, account number, etc.).\r\n<ul>\r\n \t<li>Phishing is a common online scam used by cyber criminals.<\/li>\r\n \t<li>A scammer may use a deceptive email or website appearing to represent a legitimate firm.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li><img class=\"wp-image-1365 alignright\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/Warning-cyber-attack.jpg\" alt=\"\" width=\"208\" height=\"139\" \/>[pb_glossary id=\"472\"]Spyware[\/pb_glossary] \u2013 a software that secretly monitors (spies) user\u2019s online behavior and gets sensitive information about a person or organization without the user\u2019s knowledge.\r\n<ul>\r\n \t<li>A spyware can record a user's Web browsing habits, e-mail messages, keystrokes on online advertisements, personal information, etc., and forward it to a third party.<\/li>\r\n \t<li>Advertisers can use spyware to target specific advertisements to your tastes.<\/li>\r\n \t<li>Criminal organizations can use spyware to collect financial information (banking accounts, credit card information, password, etc.).<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h1>Prevent Cyber Threats<\/h1>\r\n<h2>Tips on how to prevent malware from infecting your computer<\/h2>\r\n<ul>\r\n \t<li>Backup files and store in different locations.<\/li>\r\n \t<li>Don\u2019t open any suspicious \/ unknown emails or the websites. The second part (the part after the @ ) of an email \/ website address should represent the company that owns the email \/ website (domain).\r\n<img class=\"aligncenter wp-image-1366\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/Email-domain-example.png\" alt=\"\" width=\"480\" height=\"65\" \/><\/li>\r\n \t<li>Don't download an unknown or a suspicious attachment (document, picture, music, game, video, etc.).<\/li>\r\n \t<li>Do not call fake tech support numbers (tech support scams). If you get pop-up window from fake companies offering to help you with a malware infection, don't call the number.<\/li>\r\n \t<li>Use a secure and strong password (unique, hard to guess, etc.).<\/li>\r\n \t<li>Install anti-malware \/ virus software (keep it up to date).<\/li>\r\n \t<li>Scan with antivirus software on a regular basis.<\/li>\r\n<\/ul>\r\n<img class=\"wp-image-1367 alignright\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/security-2910624_640.jpg\" alt=\"\" width=\"208\" height=\"130\" \/>\r\n\r\nSome free antivirus software:\r\n<ul>\r\n \t<li>Comodo Free Antivirus<\/li>\r\n \t<li>AVAST Free Antivirus<\/li>\r\n \t<li>AVG Antivirus Free<\/li>\r\n \t<li>Avira Antivirus<\/li>\r\n \t<li>Bitdefender Antivirus Free<\/li>\r\n<\/ul>","rendered":"<p style=\"text-align: center;\">Click play on the following audio player to listen along as you read this section.<\/p>\n<p><iframe loading=\"lazy\" id=\"kaltura_player\" title=\"Unit 11 Topic C: Web search engine\" src=\"https:\/\/api.ca.kaltura.com\/p\/148\/sp\/14800\/embedIframeJs\/uiconf_id\/23449753\/partner_id\/148?iframeembed=true&#38;playerId=kaltura_player&#38;entry_id=0_7wpmngx0&#38;flashvars[leadWithHTML5]=true&#38;flashvars[streamerType]=auto&#38;flashvars[localizationCode]=en&#38;flashvars[sideBarContainer.plugin]=true&#38;flashvars[sideBarContainer.position]=left&#38;flashvars[sideBarContainer.clickToClose]=true&#38;flashvars[chapters.plugin]=true&#38;flashvars[chapters.layout]=vertical&#38;flashvars[chapters.thumbnailRotator]=false&#38;flashvars[streamSelector.plugin]=true&#38;flashvars[EmbedPlayer.SpinnerTarget]=videoHolder&#38;flashvars[dualScreen.plugin]=true&#38;flashvars[Kaltura.addCrossoriginToIframe]=true&#38;wid=0_521pl2gc\" width=\"608\" height=\"70\" allowfullscreen=\"allowfullscreen\" sandbox=\"allow-downloads allow-forms allow-same-origin allow-scripts allow-top-navigation allow-pointer-lock allow-popups allow-modals allow-orientation-lock allow-popups-to-escape-sandbox allow-presentation allow-top-navigation-by-user-activation\" frameborder=\"0\"><\/iframe><\/p>\n<h1>Perform a Search using a Web Search Engine<\/h1>\n<p><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_388_475\">Search engine<\/a> \u2013 an Internet search engine is a web-based tool (a software) that is designed to search the content of web pages and to find particular information on the Internet.<\/p>\n<h2>Some popular search engines<\/h2>\n<ul>\n<li><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1363\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/magnifying-glass.png\" alt=\"\" width=\"208\" height=\"139\" \/>Google<\/li>\n<li>Bing<\/li>\n<li>Baidu<\/li>\n<li>Yahoo!<\/li>\n<li>Yandex<\/li>\n<li>Ask.com<\/li>\n<li>DuckDuckGo<\/li>\n<\/ul>\n<h2>Search the Internet using a web search engine<\/h2>\n<ol>\n<li>Open a search engine in a web browser (such as Google in Chrome).<\/li>\n<li>Type a few specific keywords or phrases to describe whatever you wish to search in the search bar. Search engines look for the keywords in your query.<\/li>\n<li>Press the <strong>Enter<\/strong> key on the keyboard.<\/li>\n<li>Repeat above steps if necessary.<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1364\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/Google-search-bar-screenshot-.png\" alt=\"\" width=\"500\" height=\"197\" \/><\/li>\n<\/ol>\n<h1>Security Issues on the Internet<\/h1>\n<h2>Internet security issues<\/h2>\n<p>Although Internet led to many benefits, it also poses a greater potential for security threats.<\/p>\n<h2>The common Internet security issues<\/h2>\n<ul>\n<li><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_388_394\">Hacker<\/a> \u2013 refers to a person who can gain unauthorized access (break into) to a computer or a network to commit crimes.<\/li>\n<li>Some things a skilled hacker can do to your computer:\n<ul>\n<li>Hijack your usernames and passwords;<\/li>\n<li>Gain access to the personal information (credit card numbers, bank account, social insurance number, etc.);<\/li>\n<li>Steal, change, exploit, sell or destroy data;<\/li>\n<li>Damage or bring down systems;<\/li>\n<li>Hold those system hostages to collect ransom.<\/li>\n<\/ul>\n<\/li>\n<li><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_388_491\">Malware<\/a> (short for malicious software) \u2013 a software that is designed to damage, disrupt, or infect computers.\n<ul>\n<li>Malware can gain unauthorized access to a computer and continuously run in the background without owner\u2019s knowledge.<\/li>\n<li>Malware is a single term that refers to all the different types of threats to your computer safety such as virus, Trojan horse, worm, spyware, etc.<\/li>\n<\/ul>\n<\/li>\n<li><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_388_513\">Computer virus<\/a> \u2013 a specific type of malware that is designed to replicate (copy) and spread from one computer to another.\n<ul>\n<li>A virus can make a copy of itself over and over again.<\/li>\n<li>A virus can spread from one computer to another through email, removable storage devices, networks (e.g. internet messaging services, download infected files \u2026), etc.<\/li>\n<li>A virus can damage your computer by corrupting system files, sending spam, stealing data and personal information from your computer, destroying data, deleting everything on your hard drive, etc.<\/li>\n<\/ul>\n<\/li>\n<li><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_388_467\">Trojan horse<\/a>(or Trojan) \u2013 a type of malware that looks harmless but can damage, disrupt, steal data on your computer.\n<ul>\n<li>A Trojan misleads users of its true intent.<\/li>\n<li>A Trojan may claim to get rid of your computer viruses but instead introduces viruses onto your computer.<\/li>\n<li>A Trojan can take the form of an innocent-looking email attachment, download, etc.<\/li>\n<\/ul>\n<\/li>\n<li><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_388_460\">Worm<\/a> \u2013 it is similar to a virus (a sub-class of a virus). It is designed to quickly self-replicate and spread copies of themselves from one computer to another.\n<ul>\n<li>The key difference between a virus and a worm is that a virus needs human action to replicate, whereas, a worm doesn\u2019t.<\/li>\n<li>A virus only spreads when a user opens an affected file whereas a worm spreads without the use of a host file.<\/li>\n<\/ul>\n<\/li>\n<li><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_388_486\">Phishing<\/a> \u2013 a scammer uses deceptive emails or websites and tries to obtain valuable personal information (i.e., username, password, account number, etc.).\n<ul>\n<li>Phishing is a common online scam used by cyber criminals.<\/li>\n<li>A scammer may use a deceptive email or website appearing to represent a legitimate firm.<\/li>\n<\/ul>\n<\/li>\n<li><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1365 alignright\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/Warning-cyber-attack.jpg\" alt=\"\" width=\"208\" height=\"139\" \/><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_388_472\">Spyware<\/a> \u2013 a software that secretly monitors (spies) user\u2019s online behavior and gets sensitive information about a person or organization without the user\u2019s knowledge.\n<ul>\n<li>A spyware can record a user&#8217;s Web browsing habits, e-mail messages, keystrokes on online advertisements, personal information, etc., and forward it to a third party.<\/li>\n<li>Advertisers can use spyware to target specific advertisements to your tastes.<\/li>\n<li>Criminal organizations can use spyware to collect financial information (banking accounts, credit card information, password, etc.).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h1>Prevent Cyber Threats<\/h1>\n<h2>Tips on how to prevent malware from infecting your computer<\/h2>\n<ul>\n<li>Backup files and store in different locations.<\/li>\n<li>Don\u2019t open any suspicious \/ unknown emails or the websites. The second part (the part after the @ ) of an email \/ website address should represent the company that owns the email \/ website (domain).<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1366\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/Email-domain-example.png\" alt=\"\" width=\"480\" height=\"65\" \/><\/li>\n<li>Don&#8217;t download an unknown or a suspicious attachment (document, picture, music, game, video, etc.).<\/li>\n<li>Do not call fake tech support numbers (tech support scams). If you get pop-up window from fake companies offering to help you with a malware infection, don&#8217;t call the number.<\/li>\n<li>Use a secure and strong password (unique, hard to guess, etc.).<\/li>\n<li>Install anti-malware \/ virus software (keep it up to date).<\/li>\n<li>Scan with antivirus software on a regular basis.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1367 alignright\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/security-2910624_640.jpg\" alt=\"\" width=\"208\" height=\"130\" \/><\/p>\n<p>Some free antivirus software:<\/p>\n<ul>\n<li>Comodo Free Antivirus<\/li>\n<li>AVAST Free Antivirus<\/li>\n<li>AVG Antivirus Free<\/li>\n<li>Avira Antivirus<\/li>\n<li>Bitdefender Antivirus Free<\/li>\n<\/ul>\n<div class=\"glossary\"><span class=\"screen-reader-text\" id=\"definition\">definition<\/span><template id=\"term_388_475\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_388_475\"><div tabindex=\"-1\"><p>a web-based tool that is designed to search the content of web pages and find particular information on the Internet.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_388_394\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_388_394\"><div tabindex=\"-1\"><p>a person who can gain unauthorized access to (break into) a computer or a network to commit crimes.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_388_491\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_388_491\"><div tabindex=\"-1\"><p>a software that is designed to damage, disrupt, or infect computers.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_388_513\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_388_513\"><div tabindex=\"-1\"><p>a specific type of malware that is designed to replicate (copy) and spread from one computer to another.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_388_467\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_388_467\"><div tabindex=\"-1\"><p>(or Trojan) a type of malware that looks harmless but can cause harm to a computer system.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_388_460\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_388_460\"><div tabindex=\"-1\"><p>a type of virus designed to quickly self-replicate and spread copies of itself from one computer to another.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_388_486\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_388_486\"><div tabindex=\"-1\"><p>when an Internet scammer uses deceptive emails or websites to try to obtain valuable personal information from people.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_388_472\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_388_472\"><div tabindex=\"-1\"><p>a software that secretly monitors (spies) a user\u2019s online behaviour and gets sensitive information about a person or organization without the user\u2019s knowledge.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><\/div>","protected":false},"author":90,"menu_order":3,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-388","chapter","type-chapter","status-publish","hentry"],"part":351,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters\/388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/users\/90"}],"version-history":[{"count":2,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters\/388\/revisions"}],"predecessor-version":[{"id":624,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters\/388\/revisions\/624"}],"part":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/parts\/351"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters\/388\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/media?parent=388"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapter-type?post=388"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/contributor?post=388"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/license?post=388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}