Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Transcript of The Internet
The internet is a vast thing. It has a deep history, helps stop crime, is a host for crime, and yet if it collapsed, disaster would occur. Improvements are added to the internet everyday and more than 9 million people are working hard on it! We thought, How Has The Internet Affected The Way We Live?
Beaumont, Peter and Hopkins, Nick. “US was ‘key player’ in cyber-attacks on Iran’s nuclear programme.” The Guardian. 2012. December 11, 2013. <http://www.theguardian.com/world/2012/jun/01/obama-sped-up-cyberattack-iran>
Cohen, Tom. “NSA director: Data mining follows law, thwarts terror.” CNN Politics. 2013. December 12, 2013. <http://www.cnn.com/2013/06/12/politics/nsa-terror-hearing/>
Furstenau, Marcel. “Both criminals and police are using the Internet.” Deutsche Welle. 2013. December 11, 2013. <http://www.dw.de/both-criminals-and-police-are-using-the-internet/a-16616770>
Gorman, Siobahn. “Electricity Grid in U.S. Penetrated by Spies.” Wall Street Journal. 2009. December 12, 2013. <http://online.wsj.com/news/articles/SB123914805204099085>
Kushner, David. “The Real Story of Stuxnet—How Kaspersky Lab tracked down the malware that stymied Iran’s nuclear-fuel enrichment program.” IEEE Spectrum. 2013. December 12, 2013. <http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet>
Michaels, Jim. “NSA Data Mining Can Help Stop Cybercrime, Analysts Say.” USA Today. 2013. December 11, 2013. <http://www.usatoday.com/story/news/politics/2013/06/06/nsa-data-mining-cyber-crime-data/2397165/>
Pappalardo, Joe. “NSA Data Mining: How it Works.” Popular Mechanics. 2013. December 12, 2013. <http://www.popularmechanics.com/technology/military/news/nsa-data-mining-how-it-works-15910146>
Perlroth, Nicole; Larson, Jeff; Shane, Scott. “N.S.A. Able to Foil Basic Safeguards of Privacy on Web.” The New York Times. 2013. December 11, 2013. <http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?emc=eta1&_r=0>
Tangel, Andrew. “Spy team is wall Street regulator’s weapon against insider traders.”
latimes.com. 2013. December 11, 2013. <http://articles.latimes.com/2013/jul/30/business/la-fi-insider-dragnet-20130731>
By Eli Doherty,Yuma Salvador, and Lennon Sallee
Netscape Web Browser
Netscape Navigator 2
Internet Explorer 3
Netscape Communicator 4.0
Internet Explorer 4
Google was born!
Internet Explorer 5
Internet Explorer 6
Internet Explorer 7
The Netscape Web Browser had to be payed for to use.
Each browser had it's own unique design.
Apple came out with it's own default
browser - Safari.
Mozilla has made their internet
browser - Firefox, and another browser
came into the competition of all browsers.