Chapter 5: The Internet and Its Uses – [2210/0478] IGCSE/GCE CS Notes

Based on Cambridge Syllabus 2026-2028


The Internet and the World Wide Web

Internet vs World Wide Web

These two terms are often used interchangeably, but they mean different things.

ConceptDescription
InternetA global network of interconnected computers. This is the physical infrastructure (cables, routers, servers).
World Wide Web (WWW)A service on the internet that consists of web pages and websites. This is the content you access.

Simple Analogy:

  • The internet is the highway system (roads, bridges, traffic lights)
  • The World Wide Web is the traffic (cars, trucks, buses) using the highways

Key Difference

  • The internet is the infrastructure that connects devices globally
  • The World Wide Web is a collection of information (web pages) accessed via the internet

Other services that use the internet (but are NOT the web):

  • Email (SMTP, POP3)
  • File transfer (FTP)
  • Online gaming
  • Video conferencing (Zoom, Skype)

URLs and Web Addresses

What is a URL?

URL stands for Uniform Resource Locator. It is the text-based address used to locate a web page or resource on the internet.

Example URL:

https://www.example.com:443/products/page.html?id=123#section2

Structure of a URL

ComponentExamplePurpose
Protocolhttps://Rules for communication between browser and server
SubdomainwwwSpecific section of the website (optional)
Domain Nameexample.comHuman-readable name of the website
Port:443Specific gateway on the server (optional)
Path/products/page.htmlSpecific file or page location
Query String?id=123Additional parameters (optional)
Fragment#section2Specific part of the page (optional)

Breaking Down a Simple URL

https://www.cambridge.org/education/subject/computer-science
│      │               │               │
│      │               │               └── Path (specific location)
│      │               └── Domain name (website name)
│      └── Subdomain (often www)
└── Protocol (how to communicate)

Domain Name System (DNS)

DNS translates human-readable domain names (like google.com) into IP addresses (like 142.250.185.46) that computers understand.

Think of DNS as the phonebook of the internet.


HTTP and HTTPS Protocols

What is a Protocol?

A protocol is a set of rules that determines how data is transmitted between devices.

HTTP (Hypertext Transfer Protocol)

HTTP is the protocol used to transfer web pages over the internet.

Characteristics:

  • Used for communication between web browsers and web servers
  • Requests web pages and sends them back
  • Not secure – data is sent in plain text

HTTPS (HTTP Secure)

HTTPS is the secure version of HTTP. It encrypts data using SSL/TLS.

Characteristics:

  • Same functions as HTTP
  • Adds encryption layer (SSL/TLS)
  • Data is scrambled and unreadable if intercepted
  • Essential for sensitive information (banking, logins, payments)

Comparison: HTTP vs HTTPS

FeatureHTTPHTTPS
SecurityNone – data in plain textEncrypted using SSL/TLS
PortPort 80Port 443
Padlock iconNoYes (in browser address bar)
Data confidentialityNoYes
Data integrityNoYes
AuthenticationNoYes (verifies website identity)
Use casesPublic informationBanking, shopping, logins

Why HTTPS Matters

  • Confidentiality: Prevents eavesdropping on your data
  • Integrity: Ensures data hasn’t been tampered with during transmission
  • Authentication: Confirms you’re connected to the real website, not a fake

Web Browsers

What is a Web Browser?

A web browser is software that retrieves, renders, and displays web pages from the internet.

Popular browsers: Chrome, Firefox, Safari, Edge, Opera

Main Purpose of a Web Browser

The primary purpose of a web browser is to render HTML (Hypertext Markup Language) and display web pages in a user-friendly format.

Key Functions of a Web Browser

FunctionDescription
Render HTMLInterprets HTML code and displays it as formatted web pages
Address BarAllows user to enter URLs to visit specific websites
Navigation ToolsButtons for Back, Forward, Refresh/Reload, Home
Multiple TabsOpen several web pages simultaneously in one window
Bookmarks/FavouritesSave links to frequently visited websites
HistoryRecords previously visited websites for easy access
CookiesStores small text files to remember user information
Download ManagerManages files downloaded from the internet
Privacy FeaturesIncognito/private browsing, clear history, delete cookies
Extensions/Add-onsAdditional features added by third-party developers

Browser Interface Components

┌─────────────────────────────────────────────────────┐
│ [←] [→] [↻]  [https://www.example.com]  [🔍] [⋮]  │
├─────────────────────────────────────────────────────┤
│                                                     │
│                                                     │
│                 WEB PAGE CONTENT                    │
│                   RENDERED HERE                      │
│                                                     │
│                                                     │
└─────────────────────────────────────────────────────┘

How Web Pages are Located and Displayed

Step-by-Step Process

When a user enters a URL into a browser, the following happens:

User enters URL: https://www.example.com/page.html

      ↓

1. Browser checks cache for DNS record
      ↓
2. Browser asks operating system for DNS lookup
      ↓
3. DNS server translates domain to IP address
      ↓
4. Browser establishes connection to web server
      ↓
5. Browser sends HTTP/HTTPS request
      ↓
6. Web server processes request and finds page
      ↓
7. Web server sends back HTML content
      ↓
8. Browser receives HTML and begins rendering
      ↓
9. Browser requests additional resources (CSS, images)
      ↓
10. Page is fully rendered and displayed

Detailed Explanation

Step 1-3: DNS Lookup

  • Browser needs to find the IP address of the web server
  • Checks local cache first (browser cache, OS cache)
  • If not found, asks a DNS server
  • DNS server returns the IP address (e.g., 93.184.216.34)

Step 4-5: Connection and Request

  • Browser connects to the web server at that IP address
  • Sends an HTTP request asking for the specific page
  • Request includes information like browser type, accepted formats

Step 6-7: Server Response

  • Web server finds the requested HTML file
  • Sends it back to the browser with a status code (e.g., 200 OK)
  • If page not found, sends 404 error

Step 8-10: Rendering

  • Browser receives HTML and starts parsing
  • Builds the Document Object Model (DOM) structure
  • Requests any additional files (CSS for styling, images, JavaScript)
  • Assembles and displays the complete web page

Key Components Involved

ComponentRole
Web BrowserSends requests, receives and renders HTML
DNS ServerTranslates domain names to IP addresses
Web ServerStores web pages and sends them to browsers
IP AddressUnique numerical identifier for each device
HTMLLanguage used to structure web page content

Cookies

What are Cookies?

Cookies are small text files stored on a user’s device by a web browser when they visit a website. They contain information about the user’s activity on that site.

Purpose of Cookies

Cookies are used to:

  • Remember user preferences
  • Keep users logged in
  • Track items in shopping carts
  • Personalise content and ads
  • Analyse website traffic

Types of Cookies

TypeDescriptionDurationExamples
Session CookiesTemporary cookies that exist only while browser is openDeleted when browser closesShopping cart items during a single visit
Persistent CookiesRemain on device after browser closesSet expiration date (days/months/years)Login details, language preferences

Session Cookies

Characteristics:

  • Stored in temporary memory
  • Deleted when user closes the browser
  • No expiration date set
  • Used for single-session activities

Uses:

  • Keeping items in a shopping cart during one visit
  • Remembering what page you were on
  • Tracking form progress

Persistent Cookies

Characteristics:

  • Stored on hard drive
  • Remain after browser closes
  • Have an expiration date
  • Used for long-term preferences

Uses:

  • “Remember me” login functionality
  • Language preferences
  • Website theme choices
  • Tracking user behaviour over time

Common Cookie Uses

Use CaseCookie TypeExplanation
Login detailsPersistentKeeps you logged in between visits
Shopping cartSessionRemembers items while browsing the site
Language preferencePersistentShows site in your preferred language
AnalyticsPersistentTracks how you use the site
AdvertisingPersistentShows relevant ads based on browsing

Privacy Concerns

  • Cookies can track browsing habits across websites
  • Third-party cookies track users for advertising
  • Privacy laws (like GDPR) require websites to ask for cookie consent

Digital Currency

What is Digital Currency?

Digital currency is money that exists only in electronic form. It has no physical equivalent (no coins or notes).

Examples:

  • Cryptocurrencies (Bitcoin, Ethereum)
  • Central Bank Digital Currencies (CBDCs)
  • E-money (PayPal balance,支付宝)

Characteristics of Digital Currency

FeatureDescription
Electronic onlyNo physical form
Decentralised (cryptocurrencies)Not controlled by banks or governments
Peer-to-peerCan be sent directly between users
GlobalWorks across borders
SecureUses cryptography to prevent fraud

How Digital Currencies are Used

  • Online purchases – Buy goods and services
  • Investment – Buy and hold as investment
  • Money transfers – Send money across borders cheaply
  • Payments – Pay for transactions without banks

Blockchain

What is Blockchain?

Blockchain is a digital ledger (record book) that stores transactions in a series of blocks. Each block is linked to the previous one, forming a chain.

Think of it as a shared, unchangeable record book that everyone can see but no one can alter.

Structure of a Blockchain

Block 1 (Genesis)          Block 2                   Block 3
┌──────────────┐          ┌──────────────┐          ┌──────────────┐
│ Block Header │          │ Block Header │          │ Block Header │
│ • Timestamp  │◄────────►│ • Timestamp  │◄────────►│ • Timestamp  │
│ • Previous   │          │ • Previous   │          │ • Previous   │
│   Hash: 0    │          │   Hash: 7B3  │          │   Hash: 9F2  │
│ • This Hash: │          │ • This Hash: │          │ • This Hash: │
│   7B3        │          │   9F2        │          │   D4E        │
├──────────────┤          ├──────────────┤          ├──────────────┤
│ Transactions │          │ Transactions │          │ Transactions │
│ • Tx 1       │          │ • Tx 4       │          │ • Tx 7       │
│ • Tx 2       │          │ • Tx 5       │          │ • Tx 8       │
│ • Tx 3       │          │ • Tx 6       │          │ • Tx 9       │
└──────────────┘          └──────────────┘          └──────────────┘

Key Characteristics of Blockchain

CharacteristicDescription
DecentralisedNo single authority controls it
ImmutableOnce data is added, it cannot be changed
TransparentAll transactions are visible to participants
Time-stampedEach block has a timestamp
Cryptographically securedUses complex maths to ensure security

How Blockchain Tracks Digital Currency Transactions

  1. Transaction occurs – Person A sends 1 Bitcoin to Person B
  2. Transaction is verified – Network computers check if Person A has sufficient funds
  3. Added to a block – Transaction grouped with others into a block
  4. Block is added to chain – New block permanently linked to previous blocks
  5. Transaction complete – Record is now permanent and unchangeable

Why Blockchain is Secure

  • No central point of failure – Copies exist on many computers
  • Cannot alter past blocks – Changing one block would require changing all subsequent blocks
  • Cryptographic hashing – Each block has a unique fingerprint
  • Consensus mechanism – Network agrees on valid transactions

Cyber Security Threats

Cyber security is about protecting systems, networks, and data from digital attacks.

Common Cyber Security Threats

ThreatDescription
Brute-force attackRepeatedly trying different passwords until one works
Data interceptionCapturing data while it’s being transmitted
DDoS attackOverwhelming a server with traffic to make it unavailable
HackingGaining unauthorised access to computer systems
MalwareMalicious software designed to cause harm
PharmingRedirecting users to fake websites without their knowledge
PhishingTricking users into revealing sensitive information
Social engineeringManipulating people to give up confidential information

Detailed Explanation of Each Threat

Brute-force Attack

  • Process: Automated software tries millions of password combinations
  • Aim: Gain unauthorised access to accounts
  • Prevention: Strong passwords, account lockout after failed attempts, CAPTCHA

Data Interception

  • Process: Attacker captures data as it travels across networks
  • Aim: Steal sensitive information (passwords, credit card details)
  • Prevention: Encryption (HTTPS, VPN), secure networks

Distributed Denial of Service (DDoS) Attack

  • Process: Multiple compromised computers flood a server with traffic
  • Aim: Make the service unavailable to legitimate users
  • Prevention: Firewalls, traffic filtering, DDoS protection services

Hacking

  • Process: Exploiting vulnerabilities to gain unauthorised access
  • Aim: Steal data, cause damage, or use system for other attacks
  • Prevention: Strong authentication, regular updates, firewalls

Malware Types

Malware is any software intentionally designed to cause damage.

TypeDescriptionHow it Spreads
VirusAttaches to legitimate programs and replicatesInfected files, downloads
WormSelf-replicates across networks without user actionNetwork vulnerabilities
Trojan HorseDisguised as legitimate softwareFake downloads, email attachments
SpywareSecretly monitors and collects informationBundled with other software
AdwareDisplays unwanted advertisementsBundled with free software
RansomwareEncrypts files and demands payment for decryptionPhishing emails, infected downloads

Social Engineering and Deception-Based Threats

Phishing

  • Process: Sending fake emails pretending to be legitimate organisations
  • Aim: Trick users into revealing passwords, credit card details
  • Example: Email claiming to be from your bank asking you to verify account

Pharming

  • Process: Redirecting users to fake websites even if they type correct address
  • Aim: Steal login credentials
  • Method: DNS poisoning, malicious code on computer

Social Engineering

  • Process: Manipulating people through psychological tricks
  • Aim: Gain confidential information or access
  • Examples: Pretending to be IT support, impersonating colleagues

Cyber Security Solutions

Range of Solutions to Protect Data

SolutionDescription
Access LevelsLimiting what users can see and do
Anti-malwareSoftware to detect and remove malicious programs
AuthenticationVerifying user identity
Software UpdatesFixing security vulnerabilities
Checking CommunicationsVerifying emails and links before clicking
FirewallsBlocking unauthorised network access
Privacy SettingsControlling what information is shared
Proxy ServersIntermediaries that hide your identity
SSL/TLSEncrypting data in transit

Detailed Explanation of Each Solution

Access Levels

  • Users only have permission to access what they need
  • Examples: Read-only access, admin privileges restricted
  • Prevents: Unauthorised access to sensitive data

Anti-malware (including Anti-virus and Anti-spyware)

  • Scans files and programs for known malware signatures
  • Monitors system behaviour for suspicious activity
  • Removes or quarantines detected threats
  • Requires regular updates to recognise new threats

Authentication Methods

MethodDescriptionExamples
Username and PasswordSomething you knowTraditional login
BiometricsSomething you areFingerprint, face recognition
Two-step verificationTwo different methodsPassword + code sent to phone
Multi-factor authenticationMultiple methodsPassword + biometric + security key

Automating Software Updates

  • Updates often contain security patches
  • Automatic updates ensure protection is current
  • Reduces window of vulnerability

Checking the Spelling and Tone of Communications

  • Phishing emails often contain spelling mistakes
  • Urgent or threatening language is suspicious
  • Verify sender email address carefully

Checking the URL Attached to a Link

  • Hover over links to see actual destination
  • Look for misspelled domain names (e.g., go0gle.com)
  • HTTPS does not guarantee site is legitimate

Firewalls

  • Monitors incoming and outgoing network traffic
  • Blocks unauthorised access based on security rules
  • Can be hardware or software based
  • Prevents: Unauthorised access, some DDoS attacks

Privacy Settings

  • Controls what information apps and websites can access
  • Limits data collection and sharing
  • Examples: Location services, camera access, ad personalisation

Proxy Servers

  • Acts as intermediary between user and internet
  • Hides user’s real IP address
  • Can filter content and block malicious sites
  • Provides anonymity

Secure Socket Layer (SSL) Security Protocol

  • Encrypts data between browser and server
  • Creates secure, encrypted connection
  • Indicated by HTTPS and padlock icon
  • Prevents: Data interception, eavesdropping

Matching Threats to Solutions

ThreatSolution
Brute-force attackStrong passwords, account lockout, two-step verification
Data interceptionSSL/HTTPS, encryption
DDoS attackFirewalls, traffic filtering
HackingFirewalls, authentication, access levels
MalwareAnti-malware, software updates
PhishingChecking emails/URLs, authentication
PharmingCheck URLs, use trusted DNS
Social engineeringUser education, verification procedures

Summary & Key Takeaways

Internet vs WWW

InternetWorld Wide Web
InfrastructureService
Network of networksCollection of web pages
HardwareContent

URL Components

Protocol://Domain:Port/Path?Query#Fragment

HTTP vs HTTPS

HTTPHTTPS
No encryptionEncrypted (SSL/TLS)
Port 80Port 443
Not secureSecure

Web Browser Functions

  • Render HTML
  • Address bar
  • Navigation tools
  • Multiple tabs
  • Bookmarks
  • History
  • Store cookies

How Web Pages Load

URL → DNS Lookup → Connect to Server → Request Page → Receive HTML → Render

Cookies

SessionPersistent
TemporaryPermanent until expiry
Deleted on closeStored on device
Single visitAcross visits

Digital Currency & Blockchain

  • Digital currency: Electronic only money
  • Blockchain: Unchangeable digital ledger
  • Characteristics: Decentralised, immutable, transparent

Cyber Security Threats

ThreatWhat It Does
Brute-forceGuesses passwords
Data interceptionCaptures transmitted data
DDoSOverwhelms servers
HackingUnauthorised access
MalwareMalicious software
PharmingRedirects to fake sites
PhishingFake emails/websites
Social engineeringManipulates people

Cyber Security Solutions

SolutionWhat It Does
Access LevelsLimits permissions
Anti-malwareDetects/removes malware
AuthenticationVerifies identity
Software UpdatesFixes vulnerabilities
Check communicationsIdentifies scams
FirewallsBlocks unauthorised access
Privacy settingsControls data sharing
Proxy serversHides identity
SSL/HTTPSEncrypts data

Practice Questions

Section A: Internet and WWW

  1. Explain the difference between the internet and the World Wide Web.
  2. Give two examples of internet services that are NOT the World Wide Web.

Section B: URLs and Protocols

  1. Label the components of this URL: https://www.school.com:443/students/year10/page.html?id=45
  2. What is the purpose of a DNS server?
  3. State two differences between HTTP and HTTPS.
  4. Why is HTTPS important for online banking?

Section C: Web Browsers

  1. List four functions of a web browser.
  2. What does it mean when we say a browser “renders HTML”?
  3. Name three popular web browsers.

Section D: How Web Pages Load

  1. Describe the steps that occur when a user types a URL into a browser and presses Enter.
  2. What role does the web server play in displaying a web page?

Section E: Cookies

  1. What is a cookie?
  2. Explain the difference between session cookies and persistent cookies.
  3. Give three examples of how cookies are used on websites.

Section F: Digital Currency and Blockchain

  1. What is digital currency?
  2. Describe what a blockchain is.
  3. Explain two characteristics of blockchain that make it secure.
  4. How does blockchain track digital currency transactions?

Section G: Cyber Security Threats

  1. Describe each of the following cyber security threats:
    a) Brute-force attack
    b) Phishing
    c) DDoS attack
    d) Ransomware
  2. Explain the difference between a virus, a worm, and a Trojan horse.
  3. What is social engineering? Give an example.

Section H: Cyber Security Solutions

  1. Describe how each of the following helps protect data:
    a) Firewall
    b) Anti-malware software
    c) Two-step verification
    d) SSL/HTTPS
  2. Why are automatic software updates important for security?
  3. How can users protect themselves from phishing attacks?
  4. What is the purpose of a proxy server?

Quick Reference Card

TopicKey Points
InternetPhysical network infrastructure
WWWCollection of web pages
URLProtocol + Domain + Path
HTTPPort 80, not secure
HTTPSPort 443, encrypted
DNSTranslates domain to IP
BrowserRenders HTML, tabs, bookmarks, history
Session cookieTemporary, deleted on close
Persistent cookieStored, has expiry date
Digital currencyElectronic only
BlockchainUnchangeable digital ledger
Brute-forceGuessing passwords
PhishingFake emails
DDoSOverload with traffic
MalwareVirus, worm, Trojan, spyware, ransomware
FirewallBlocks unauthorised access
Anti-malwareDetects and removes
SSL/HTTPSEncrypts data
Two-step verificationTwo authentication methods

End of Chapter 5: The Internet and Its Uses

Below are the slides for this chapter. You can download the presentation to study from slides.

Scroll to Top