<<
Home , URL

URL’s Anatomy

Understand how to validate, authenticate, and legally use information from the . Finding information is easy ….but

 How can you validate information obtained from the Internet and determine if it is authentic?

 Several criteria are used to validate the authenticity of a and the first criterion we will discuss is the URL. What do you know about the Uniform Resource Locator (URL)?

Protocol Extension Directory/folder

http://www.dpi.state.nc.us/directory/staff.

Page/Document/ Server/Host Name Country code

Domain Name Understand how to validate, authenticate, and legally use information from the Internet. Slide 3 URL’s Anatomy

 Protocol determines how the file the file will be transferred (in whole or in part).

– Examples: http and ftp

includes the name of the server where the information is stored and a suffix (also called an extension) which indicates the type and location of the server.

Understand how to validate, authenticate, and legally use information from the Internet. Slide 4 Know your suffixes/extensions

 Do you know what  What about these? these suffixes indicate? . .uk . .com . .au . .edu . .ca . .gov . .de . .org

. .net

. .mil

Understand how to validate, authenticate, and legally use information from the Internet. Slide 5 URL’s Anatomy (Continued)

 A directory tells the computer specifically where to look for the requested information on the file server.

 A filename tells which specific document or program should be retrieved from the directory.

Understand how to validate, authenticate, and legally use information from the Internet. Slide 6 URL’S Appendages

 Other parts of an URL may include

. ~ () indicates a personal web page

. .exe or .hqx indicates an executable program

. = (equals) indicates a specific document or program

. Question mark (?) indicates that the will perform some type of calculation before returning the results

Understand how to validate, authenticate, and legally use information from the Internet. Slide 7 The End

Understand how to validate, authenticate, and legally use information from the Internet. Slide 8