Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of The Internet
The internet is a vast thing. It has a deep history, helps stop crime, is a host for crime, and yet if it collapsed, disaster would occur. Improvements are added to the internet everyday and more than 9 million people are working hard on it! We thought, How Has The Internet Affected The Way We Live?
Beaumont, Peter and Hopkins, Nick. “US was ‘key player’ in cyber-attacks on Iran’s nuclear programme.” The Guardian. 2012. December 11, 2013. <http://www.theguardian.com/world/2012/jun/01/obama-sped-up-cyberattack-iran>
Cohen, Tom. “NSA director: Data mining follows law, thwarts terror.” CNN Politics. 2013. December 12, 2013. <http://www.cnn.com/2013/06/12/politics/nsa-terror-hearing/>
Furstenau, Marcel. “Both criminals and police are using the Internet.” Deutsche Welle. 2013. December 11, 2013. <http://www.dw.de/both-criminals-and-police-are-using-the-internet/a-16616770>
Gorman, Siobahn. “Electricity Grid in U.S. Penetrated by Spies.” Wall Street Journal. 2009. December 12, 2013. <http://online.wsj.com/news/articles/SB123914805204099085>
Kushner, David. “The Real Story of Stuxnet—How Kaspersky Lab tracked down the malware that stymied Iran’s nuclear-fuel enrichment program.” IEEE Spectrum. 2013. December 12, 2013. <http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet>
Michaels, Jim. “NSA Data Mining Can Help Stop Cybercrime, Analysts Say.” USA Today. 2013. December 11, 2013. <http://www.usatoday.com/story/news/politics/2013/06/06/nsa-data-mining-cyber-crime-data/2397165/>
Pappalardo, Joe. “NSA Data Mining: How it Works.” Popular Mechanics. 2013. December 12, 2013. <http://www.popularmechanics.com/technology/military/news/nsa-data-mining-how-it-works-15910146>
Perlroth, Nicole; Larson, Jeff; Shane, Scott. “N.S.A. Able to Foil Basic Safeguards of Privacy on Web.” The New York Times. 2013. December 11, 2013. <http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?emc=eta1&_r=0>
Tangel, Andrew. “Spy team is wall Street regulator’s weapon against insider traders.”
latimes.com. 2013. December 11, 2013. <http://articles.latimes.com/2013/jul/30/business/la-fi-insider-dragnet-20130731>
By Eli Doherty,Yuma Salvador, and Lennon Sallee
Netscape Web Browser
Netscape Navigator 2
Internet Explorer 3
Netscape Communicator 4.0
Internet Explorer 4
Google was born!
Internet Explorer 5
Internet Explorer 6
Internet Explorer 7
The Netscape Web Browser had to be payed for to use.
Each browser had it's own unique design.
Apple came out with it's own default
browser - Safari.
Mozilla has made their internet
browser - Firefox, and another browser
came into the competition of all browsers.