URL’s Anatomy
Understand how to validate, authenticate, and legally use information from the Internet. Finding information is easy ….but
How can you validate information obtained from the Internet and determine if it is authentic?
Several criteria are used to validate the authenticity of a web page and the first criterion we will discuss is the URL. What do you know about the Uniform Resource Locator (URL)?
Protocol Extension Directory/folder
http://www.dpi.state.nc.us/directory/staff.html
Page/Document/ Server/Host Name Country Filename code
Domain Name Understand how to validate, authenticate, and legally use information from the Internet. Slide 3 URL’s Anatomy
Protocol determines how the file the file will be transferred (in whole or in part).
– Examples: http and ftp
Domain name includes the name of the server where the information is stored and a suffix (also called an extension) which indicates the type and location of the server.
Understand how to validate, authenticate, and legally use information from the Internet. Slide 4 Know your suffixes/extensions
Do you know what What about these? these suffixes indicate? . .uk . .com . .au . .edu . .ca . .gov . .de . .org
. .net
. .mil
Understand how to validate, authenticate, and legally use information from the Internet. Slide 5 URL’s Anatomy (Continued)
A directory tells the computer specifically where to look for the requested information on the file server.
A filename tells which specific document or program should be retrieved from the directory.
Understand how to validate, authenticate, and legally use information from the Internet. Slide 6 URL’S Appendages
Other parts of an URL may include
. ~ (tilde) indicates a personal web page
. .exe or .hqx indicates an executable program
. = (equals) indicates a specific document or program
. Question mark (?) indicates that the web server will perform some type of calculation before returning the results
Understand how to validate, authenticate, and legally use information from the Internet. Slide 7 The End
Understand how to validate, authenticate, and legally use information from the Internet. Slide 8