-
Essay / The Exponential Growth of the Internet - 1112
Growth of the InternetThe growth of the Internet has become colossal over the last 10 years. According to Science Daily, on average, a person “will use about 15.5 hours of the Internet per day” (University of Southern California, 2013). This is a huge increase from 11.7% to 40.7% between March 2004 and March 2014, according to Internet statistics. (Internet Growth Statistics) The Internet has come a long way since the development of Web 1.0, other developments have taken place in the Web, such as Web 2.0, and the current development of Web 3.0. Web 2.0. Web 2.0 is the second stage of development of the Internet. Web 2.0 “characterized in particular by the shift from static web pages to dynamic or user-generated content and by the growth of social media” (Wikipedia). According to TechTerms' article on Web 2.0, "Web 2.0 does not refer to a specific version of the Web, but rather a series of technological improvements." (Terms, 2008)What is Web 2.0?Web 2.0 was created in the late 1990s. It was different from Web 1.0 because Web 1.0 was primarily for read-only data. Web 2.0 is what we use today. Rather, it is an interactive social web. Web 2.0 is an easy way to use the web because it can provide you with the information you are looking for with just one click. People who have access to the Internet are now able to write and read reviews, upload and share items, and download files from the web. Social networks, blogs, wikis and web applications are all examples of Web 2.0. Facebook is an example of a social networking site in Web 2.0. Facebook was created in 2004 and has since become the largest social networking site on the Internet. Facebook is used by billions of people every year. Facebook allows people to share and upload from...... middle of paper ...... prevents threats from accessing the network. Malware Protection Malware protects against viruses, worms, Trojans, spyware and adware. Viruses, Trojan Horses and WormsVirus - A virus is a computer program transmitted to a computer. Unchecked viruses can damage your computer. Trogan Horses - These are viruses that act as a game or are useful. They are very harmful. Worms – These are the viruses that spread the fastest. Worms use the network to spread. They can destroy networks. How does it work? Malware uses antispyware programs that can be installed on your computer to protect your data from threats that may arise. The software scans your computer regularly. Norton's antivirus system uses the same technique as a backup. Based on information provided on the Norton website (Norton's antivirus)