Internet essentials

Aims and objectives

This module will:

  • help you understand what the internet is and how it is regulated
  • explain the basics of cyber security.

At the end of this module, you will be able to:

  • implement strategies to protect your identity in an online environment
  • identify the elements of uniform resource locators (URLS)
  • resolve common issues with your web browser.

6. Check your knowledge

Take the quiz

Check what you know and get a certificate if you pass!

UQ students and staff (UQ login required):

Log in and start the quiz

You are welcome to take the quiz without logging in:

Take the quiz anonymously

Use the UQ login version if your course coordinator has asked you to complete this module. Your completion status may be shared with them.

Module summary

 The internet

  • Internet is a system of computer networks, which rely on shared protocols, or standards, in order to communicate with each other. The web is one of the applications which runs on the internet.

 The web

  • The web is a collection of hypertext pages. Web pages are constructed using HTML, which stands for Hypertext Markup Language.
  • Only a fraction of the content of the web is available to you (the surface web). Much of the content of the web resides in databases, or behind paywalls. 
  • Web browsers are graphical interfaces which allow you to interact with and navigate the web. You can change your browser settings and download add-ons to enhance your browsing experience and to protect your privacy.

 URLs and domains

  • A URL (Uniform Resource Locator) is the web address you use to locate websites or other documents on the web. URLs have three component parts: protocol, domain, and path.
  • Check for the https:// protocol in the URL before giving any personal information to a website or starting a transaction.

 Who controls the internet?

  • Much of the architecture and underlying technologies of the internet and web are free.
  • There are a range of criminal and civil laws that regulate how Australians behave online.
  • Internet users are also bound by terms and conditions they agree to when using online services.

 Cyber security

  • Our digital connectedness leaves us vulnerable to cyber security threats.
  • A common security threat is phishing, which involves a person using electronic communication, typically email, to induce the user to click on a malicious link, or provide sensitive data.
  • Installing Install anti-virus software is recommended, but there is a range of additional steps you can take.

Duration:   Approximately 20 minutes


Graduate attributes

Knowledge and skills you can gain to contribute to your Graduate attributes:

 Critical judgement

 Ethical and social understanding


Check your knowledge

Check what you know about this topic:

Take the quiz

Support at UQ

Access UQ services to assist you with personal or study-related issues.