Know and understand characteristics, uses, advantages and disadvantages of using the internet including the differences between the internet, an intranet, an extranet and the World Wide Web (WWW), blog, forum, wiki, social networking

10 Communication – The Internet and Related Services

1. What is the Internet?

The Internet is a global network of interconnected computers, servers, smartphones, tablets and other devices that communicate using the TCP/IP protocol suite. It provides the underlying infrastructure for a wide range of services such as email, file transfer, streaming media and the World Wide Web (WWW).

2. Key Characteristics of the Internet

  • Open & public: Anyone with a connection (usually via an ISP) can access most resources.
  • Decentralised: No single organisation controls the whole network; many independent networks inter‑connect.
  • Packet‑switched: Data is broken into small packets that travel independently and are re‑assembled at the destination.
  • Scalable: The architecture can accommodate millions of users and billions of devices.
  • Standardised protocols: TCP/IP, HTTP/HTTPS, FTP, SMTP, DNS, SSL/TLS, etc., ensure interoperability.

3. Common Uses of the Internet

  1. Communication: email, instant messaging, video‑conferencing (e.g., Zoom, Teams).
  2. Information retrieval: search engines, online encyclopaedias, news sites.
  3. Online services: banking, e‑shopping, e‑learning platforms.
  4. Entertainment: streaming video/music, online gaming, digital publishing.
  5. Collaboration: cloud storage, shared documents, social media, project‑management tools.

4. Advantages of Using the Internet

  • Instant access to a vast amount of information – e.g., a student can read a Wikipedia article in seconds.
  • Rapid communication across any distance – e.g., a family can video‑call from different continents.
  • Supports remote working and learning – e.g., teachers deliver lessons via virtual classrooms.
  • Cost‑effective distribution of goods and services – e.g., small businesses sell products worldwide through an online store.
  • Platforms for creativity and self‑expression – e.g., blogging, video‑sharing, digital art.

5. Disadvantages of Using the Internet

  • Exposure to inappropriate or harmful content – e.g., violent or extremist material.
  • Cyber‑security threats such as malware, phishing, ransomware and hacking.
  • Privacy concerns – personal data can be collected, sold or misused.
  • Digital divide – not everyone has reliable or affordable access.
  • Information overload and difficulty judging credibility – e.g., fake news or biased articles.

6. Email – A Core Internet Service (10.1)

Email is the most widely used electronic communication tool. It is essential for both personal and professional contexts.

  • Components of an email: address (user@domain), subject line, body, attachments.
  • Netiquette: clear subject, polite tone, avoid ALL CAPS, sign‑off with name.
  • Attachments: keep file size reasonable (< 10 MB), use common formats (PDF, JPG, DOCX).
  • Spam & phishing: recognise unsolicited requests for personal data, avoid clicking unknown links.
  • Security: use strong passwords, enable two‑factor authentication (2FA), encrypt sensitive messages (PGP, S/MIME).

7. e‑Safety and Responsible Use (10.8)

  • Strong passwords: at least 8 characters, mix of letters, numbers and symbols; never share.
  • Safe browsing: look for “https://” and the padlock icon; avoid clicking unknown links.
  • Phishing awareness: verify the sender’s address, never give personal details to unsolicited emails.
  • Content filtering & parental controls: use built‑in OS or router filters, enable age‑appropriate settings on devices.
  • Digital citizenship: respect others, avoid cyber‑bullying, give proper credit for online material.
  • Data protection (GDPR): data must be collected lawfully, stored securely and deleted when no longer needed.
  • Scenario question (AO3): “You receive an email from a ‘bank’ asking for your password to ‘verify your account’. What steps should you take?” – students should identify the email as phishing, avoid replying, report to the teacher/parent, and delete the message.

8. Evaluating Information Found on the Internet (10.5)

Use the five‑point evaluation framework. A printable checklist can be given to students.

CriterionWhat to Look ForChecklist (✓/✗)
AuthorityAuthor’s credentials, reputable domain (.gov, .edu, recognised news outlet)
AccuracyEvidence, references, cross‑check with other sources
Bias & PurposeObjective presentation vs. persuasion or advertising
CurrencyPublication date, recent updates
RelevanceDirectly answers the question or need

9. Searching the Internet Effectively (10.4)

  • Use specific keywords; place quotation marks around exact phrases.
  • Apply Boolean operators: AND, OR, NOT.
  • Utilise advanced search filters (date, file type, site:domain).
  • Practice activity: Formulate three search queries using Boolean operators to find:

    1. “climate change” AND “impact on agriculture” (last 5 years)
    2. “Newton’s laws” OR “laws of motion” (PDF file)
    3. “healthy snack ideas” NOT “nut allergy” (site:.gov)

10. Internet Protocols – A Quick Overview (10.2)

ProtocolPurposeTypical Use
TCP/IPReliable data transmission and addressingAll Internet communication
HTTP / HTTPSTransfers web pages; HTTPS adds encryptionBrowsing the World Wide Web
FTPFile Transfer Protocol – moves files between client and serverUploading website files, sharing large documents
SMTPSimple Mail Transfer Protocol – sends e‑mailAll e‑mail services
DNSDomain Name System – translates domain names to IP addressesFinding websites (e.g., converting “google.com” to an IP)
SSL / TLSSecure Sockets Layer / Transport Layer Security – encrypts data in transitSecure online transactions, e‑banking, login pages

Why HTTPS matters: It encrypts the data exchanged between your browser and the web server, protecting passwords, credit‑card numbers and personal details from eavesdropping.

TCP/IP stack diagram showing Application, Transport, Internet and Link layers

11. Internet‑Related Terminology (Essential for the Exam – 10.3)

  • URL (Uniform Resource Locator): the address of a web page (e.g., https://www.bbc.co.uk).
  • Hyperlink: clickable text or image that links to another document or location.
  • ISP (Internet Service Provider): company that provides Internet access (e.g., BT, Virgin Media).
  • Bandwidth: the amount of data that can be transmitted per second, measured in Mbps.
  • Latency: delay before data begins to transfer, measured in milliseconds.
  • Cookie: small file stored on a device to remember user preferences or login status.
  • Cache: temporary storage of web resources to speed up loading.
  • Search Engine: software that indexes web pages and retrieves results (e.g., Google, Bing).

12. Comparing Internet, Intranet, Extranet and the World Wide Web (10.7)

FeatureInternetIntranetExtranetWorld Wide Web (WWW)
DefinitionGlobal public network of interconnected devices using TCP/IP.Private network confined to a single organisation; uses the same protocols but is isolated from the public Internet.Controlled extension of an intranet that allows selected external users (partners, suppliers) to access specific resources.A service that runs on top of the Internet; a system of interlinked hypertext documents accessed via HTTP/HTTPS.
ScopeWorldwide, open to anyone with an ISP connection.Limited to employees, students or members of the owning organisation.Restricted to authorised external parties plus internal users.Accessible through the Internet (or an intranet) wherever a web browser can connect.
Access controlOpen – generally no authentication required to reach public sites.Closed – requires internal login credentials and often network‑level security.Controlled – uses authentication (username/password, VPN, secure web gateway).Usually public, but individual sites may require registration or passwords.
Typical usesEmail, web browsing, streaming, cloud services.Internal email, HR systems, document repositories, company intranet portals.Supplier order systems, partner collaboration tools, secure file exchange.Websites, web applications, online shopping, e‑government services.
Technology baseTCP/IP, DNS, HTTP/HTTPS, FTP, SSL/TLS, etc.Same protocols as the Internet, but traffic is confined to a LAN/WAN.Internet protocols plus additional security layers (VPN, firewalls, SSL/TLS).HTTP/HTTPS protocol; runs over the Internet or an intranet.

Suggested Venn diagram: Place four overlapping circles labelled Internet, Intranet, Extranet and WWW. Populate each exclusive area with examples (e.g., “public websites” in Internet‑only, “company HR portal” in Intranet‑only, “supplier order system” in Extranet‑only, “Wikipedia” in the WWW overlap). This diagram can be printed for the classroom.

13. Web‑Based Communication Tools (10.6)

13.1 Blog

A blog (short for “web log”) is an online journal where entries appear in reverse chronological order.

  • Uses: personal diaries, classroom reflections, marketing, publishing tutorials.
  • Advantages: easy to update, encourages reader interaction via comments, improves SEO for a site.
  • Disadvantages: requires regular content creation, can attract spam or negative comments, quality depends on author’s skill.
  • Real‑world example: a school‑run blog where each class posts weekly project updates.

13.2 Forum

A forum is a discussion board where users post messages in topic‑based threads.

  • Uses: technical support, hobby communities, Q&A for subjects.
  • Advantages: searchable archives, asynchronous communication, peer‑to‑peer help.
  • Disadvantages: needs moderation, can become cluttered with off‑topic or duplicate posts.

13.3 Wiki

A wiki is a collaborative website that allows multiple users to create, edit and organise content collectively.

  • Uses: knowledge bases, project documentation, collaborative learning resources.
  • Advantages: rapid content development, version control, encourages teamwork.
  • Disadvantages: risk of inaccurate information or vandalism, requires clear editing policies.
  • Real‑world example: a class wiki for a history project where each student edits a page about a different era.

13.4 Social Networking Sites (SNS)

Social networking sites enable users to create personal profiles, connect with others and share content.

  • Uses: staying in touch with friends/family, brand promotion, professional networking (e.g., LinkedIn).
  • Advantages: wide reach, real‑time interaction, targeted advertising, community building.
  • Disadvantages: privacy concerns, cyber‑bullying, potential for time‑wasting, data mining.

14. Command‑Word Awareness (AO1‑AO3)

Cambridge IGCSE ICT exam frequently uses the following command words. Knowing the required depth of answer helps maximise marks.

Command WordWhat the Examiner Expects
Define / StateGive a brief, accurate description (1‑2 sentences).
DescribeProvide a detailed account, covering main features or steps.
ExplainShow cause‑and‑effect or reasons; include examples.
CompareIdentify similarities and differences, using a table or Venn diagram where appropriate.
EvaluateMake a judgement, weighing advantages and disadvantages; give a reasoned conclusion.
AssessJudge the reliability or suitability of something, using criteria (e.g., the five‑point evaluation).

15. Sample Exam‑Style Questions (All Command Words)

  1. Explain the difference between an intranet and the World Wide Web.
  2. Evaluate the advantages and disadvantages of using blogs for school projects.
  3. Describe three e‑safety measures a student should adopt when using social networking sites.
  4. Compare the roles of HTTP and FTP in Internet communication.
  5. Assess the reliability of information found on a newly discovered website using the five‑point evaluation criteria.
  6. Scenario (AO3): You receive an instant‑message from a classmate asking for the password to the school’s online library. What should you do and why?

16. Summary

The Internet is a powerful, global communication platform. Mastery of its characteristics, the differences between related concepts (intranet, extranet, WWW) and the various web‑based tools (blogs, forums, wikis, social networking) enables learners to use these technologies effectively, safely and responsibly. Strong e‑safety habits, systematic information‑evaluation skills and clear knowledge of key terminology are essential for success in the Cambridge IGCSE ICT examination.