DCT_Chapter_3 - McGraw Hill Higher Education

Download Report

Transcript DCT_Chapter_3 - McGraw Hill Higher Education

3
Using the Internet
Chapter Contents
pg. 58-82
Lesson 3.1 Browse the Internet (pg. 60)
Lesson 3.2 Customize Your Browser and
Search Online (pg. 63)
Lesson 3.3 Security and Viruses (pg. 70)
Lesson 3.4 Copyright, Fair Use, and Plagiarism (pg. 73)
Lesson 3.5 Computer Crimes (pg. 75)
Chapter Assessment
Copyright © by The McGraw-Hill Companies, Inc. All rights reserved.
Glencoe Digital Communication Tools
3
Using the Internet
You Will Learn To
 Explore the Internet by using a browser and hyperlinks
 Save Web sites as Favorites
 Recognize a Web site by its Web address
 Apply advanced search techniques
 Choose a home page for your browser
 Print Web pages
 Describe anti-virus software
 Describe security for the Internet
 Explain the importance of copyright, fair use, and
avoiding plagiarism
 Describe computer crimes and fraud
Glencoe Digital Communication Tools
3
Using the Internet
3.1 Browse the Internet
browser
An application that
reads the contents of
Web pages and
displays them on your
computer screen.
hyperlink
Any text or graphic on a
Web page that will take
you to a new location
when clicked.
pg. 60-62
Browsers
You need a special software program called a browser
to visit Web sites.
Hyperlinks
Clicking hyperlinks allows you to navigate from page
to page on the Internet.
Glencoe Digital Communication Tools
3
Using the Internet
3.1 Browse the Internet
uniform resource
locator (URL)
A unique Web
address that directs
a browser to a Web
page.
domain name
The part of a URL
that usually
identifies the owner
or the subject of a
Web site.
pg. 60-62
The uniform resource locator (URL) identifies a Web
page. The parts of a URL include:
 Hypertext transfer protocol, or http
 www, which stands for World Wide Web
 The domain name
 The domain extension, which identifies the category
of a Web site
Glencoe Digital Communication Tools
Using the Internet
3
3.1 Browse the Internet
pg. 60-62
Following are examples and descriptions of some
common domain extensions:
Creating folders in
Favorites is similar to
the steps used for
creating folders in My
Computer. Folders are
created to help you
organize data and
make it easier to find
information.
Extension
Description of Site
Example
.com
Originally intended for
commercial or for-profit
businesses; now anyone can
use .com
www.glencoe.com
.edu
Educational institution
www.ucla.edu
.gov
U.S. government organization
www.senate.gov
.mil
U.S. military organization
www.usmc.mil
.org
Professional or nonprofit
organization
www.fbla-pbl.org
Glencoe Digital Communication Tools
3
Using the Internet
3.1 Browse the Internet
pg. 60-62
What can you tell about a Web site by looking at
the URL?
digicom.glencoe.com
Lesson 3.1, Rubric
Glencoe Digital Communication Tools
Using the Internet
3
3.2 Customize Your Browser and Search Online
search engine
A Web site that
finds Web pages
that contain words
you tell it to search
for.
Microsoft Office has an
online search feature
built into the Help menu
of all their programs.
You can quickly access
Help resources online
when you choose this
option.
pg. 63-68
Home Pages
You can customize your browser to open your favorite
Web site as your home page each time you access the
Internet.
Search Engines
Search engines help you find specific information on
the Internet; some examples include:
 Google at www.google.com
 AltaVista at www.altavista.com
 Ask Jeeves at www.ask.com
Glencoe Digital Communication Tools
Using the Internet
3
3.2 Customize Your Browser and Search Online
Boolean operator
A word that can
make an Internet
search more
specific and
effective.
pg. 63-68
Boolean Search
Narrow your search field with Boolean operators such
as:
 AND
 OR
 NOT
Glencoe Digital Communication Tools
Using the Internet
3
3.2 Customize Your Browser and Search Online
pg. 63-68
What is an advantage to setting a home page in
your browser?
digicom.glencoe.com
Lesson 3.2, Rubric
Glencoe Digital Communication Tools
3
Using the Internet
3.3 Security and Viruses
virus
A small computer
program that can
copy itself
repeatedly into a
computer system
and cause a variety
of problems.
pg. 70-71
Internet Security
Security on the Internet is important to the following:
 Schools
 Businesses
 Home users
Firewalls
Home and work computers can be protected against
unauthorized access by installing a firewall.
Anti-Virus Software
Use regularly updated anti-virus software to:
 Alert you if an e-mail or file you are trying to open
contains a virus
 Clean an infected file
 Quarantine or get rid of a virus
Glencoe Digital Communication Tools
3
Using the Internet
3.3 Security and Viruses
pg. 70-71
Why is it important to have anti-virus software on all
business and personal computer systems?
digicom.glencoe.com
Lesson 3.3, Rubric
Glencoe Digital Communication Tools
3
Using the Internet
21st CENTURY CONNECTION
pg. 72
Cyberbullies
Hurtful Messages
Cyberbullies can be found in almost any communication
medium, including:
 Cell phones
 Instant message programs
 Chat rooms
 E-mail
 Web sites allowing users to post photos and comments
Glencoe Digital Communication Tools
3
Using the Internet
21st CENTURY CONNECTION
pg. 72
Cyberbullies
What Should You Do?
It is best to ignore mild harassment. If the harassment
becomes severe or you receive threatening messages,
inform an authority figure such as your:
 Teacher
 Coach
 Counselor
 Parent
Glencoe Digital Communication Tools
3
Using the Internet
21st CENTURY CONNECTION
pg. 72
Cyberbullies
Giving the Wrong Message
In order to avoid becoming a cyberbully yourself, take
some of the following precautions:
 Think before sending messages
 Take a break from the computer and do something
relaxing before re-reading messages you have written
while angry or upset
 Remember that messages may not be private and may
be sent to the wrong person
 Consider how your family or friends would respond to
your message
Glencoe Digital Communication Tools
3
Using the Internet
21st CENTURY CONNECTION
pg. 72
Cyberbullies
Technology Lifeline
Today’s technology affects all areas of life, leading to
increased exposure to all types of harassment and the
need to know how to protect yourself from it.
Glencoe Digital Communication Tools
3
Using the Internet
21st CENTURY CONNECTION
pg. 72
Question 1
If you have ever been a victim of a cyberbully, describe
how you handled the situation or how you should have
responded.
Possible answers include:
 Ignore or delete mildly harassing messages
 Block harassing e-mails or instant messenger buddies
 Show severely harassing messages to an authority
figure
Glencoe Digital Communication Tools
3
Using the Internet
21st CENTURY CONNECTION
pg. 72
Question 2
If you have ever unintentionally become a cyberbully,
describe how you might have been able to prevent the
misunderstanding.
Possible answers include:
 Avoiding potentially heated topics of discussion
 Thinking before responding angrily to others
 Setting aside the cell phone or computer until your
thoughts clear
 Treating others as though you were talking to them
in person
Glencoe Digital Communication Tools
Using the Internet
3
3.4 Copyright, Fair Use, and Plagiarism
copyright
A type of legal
protection for works
that are created or
owned by a person
or company.
pg. 73-74
Computer Ethics
Your sense of ethics determines how you use the
information available online.
Copyright
The law requires you to ask permission before using
any copyrighted work that you find online. Possible
copyrighted materials include:
 Songs
 Novels
 Plays
 Software programs
 Inventions
Glencoe Digital Communication Tools
3
Using the Internet
3.4 Copyright, Fair Use, and Plagiarism
fair use
Describes when
you may use a
copyrighted work
without permission.
pg. 73-74
Fair Use
Borrowing from a copyrighted work is not always illegal.
Fair use applies when the material is used for purposes of:
 Criticism—quoting briefly from a novel in a book review
 News reporting—using excerpts or quotes from
copyrighted material in an article or news broadcast
 Education—a teacher copying part of a book to hand
out to students
 Research—using copyrighted material in a school report
or presentation
Glencoe Digital Communication Tools
3
Using the Internet
3.4 Copyright, Fair Use, and Plagiarism
plagiarism
Using other
people’s ideas and
words without
acknowledging that
the information
came from them.
pg. 73-74
Plagiarism
You must always acknowledge the author’s work when
using someone else’s material; teachers can now use
software to scan student papers for plagiarism.
Glencoe Digital Communication Tools
3
Using the Internet
3.4 Copyright, Fair Use, and Plagiarism
pg. 73-74
Give reasons why you think authors and composers
are careful to copyright their work.
digicom.glencoe.com
Lesson 3.4, Rubric
Glencoe Digital Communication Tools
3
Using the Internet
3.5 Computer Crimes
All software programs
have a copyright
license that states how
many computers you
can install the software
on. If you install the
software on more
computers than
allowed, you could be
fined by the software
developer.
pg. 75-77
Cybercrime
Criminal activity on the Internet includes:
 Fraud
 Embezzlement
 Unauthorized use of computers
 Creating and releasing viruses
 Harassment
 Stalking
Investigation
The FBI’s special computer crimes branch, the National
Computer Crime Squad (NCCS), has the power to
investigate:
 Computer crimes
 Suspects in other countries
Glencoe Digital Communication Tools
3
Using the Internet
3.5 Computer Crimes
pg. 75-77
Computers can also help to solve crimes through Web
sites such as the National Center for Missing and
Exploited Children’s www.missingkids.com, which uses
the Web to track down:
 Runaway children
 Kidnapping victims
Protecting Your Computer
Taking precautions to secure your computer against
unauthorized access will help prevent criminal activity
from affecting you.
Glencoe Digital Communication Tools
3
Using the Internet
3.5 Computer Crimes
pg. 75-77
Why do you think some people choose the Internet as
a place to commit crimes?
digicom.glencoe.com
Lesson 3.5, Rubric
Glencoe Digital Communication Tools
3
Using the Internet
21st CENTURY CONNECTION
pg. 78
Treasure Hunting with Technology
About the Global Positioning System
A Global Positioning System, or GPS, device uses satellite
signals to calculate its exact position on the planet. The
GPS also:
 Uses 24 satellites, launched between 1978 and 1994
 Receives its signals from satellites at an altitude of
12,600 miles above the Earth’s surface
 Costs $400 million per year to maintain
Glencoe Digital Communication Tools
3
Using the Internet
21st CENTURY CONNECTION
pg. 78
Treasure Hunting with Technology
A New Sport
Some people use handheld GPS devices to embark on a
new sport known as geocaching, a type of treasure hunt
which involves:
 Using the Internet to find the latitudes and longitudes of
hidden caches
 Entering the location of a cache into a GPS device
 Reaching the coordinates of the site and finding the
treasure itself
 Signing the logbook and replacing the treasure with a
new find for the next treasure hunter
Glencoe Digital Communication Tools
3
Using the Internet
21st CENTURY CONNECTION
pg. 78
Question
What are some advantages of GPS devices?
Possible answers include:
 The introduction of new sports
 The decreased chance of getting lost while hiking or
exploring
 Allows emergency response teams to more quickly find
someone using a GPS device
 Can locate stationary objects such as motor vehicles
which contain a GPS tracking device; this can help if a
car is stolen or needs roadside assistance
Glencoe Digital Communication Tools
3
Using the Internet
Chapter Assessment
Question 1
Do you have a favorite search engine that you use? What
are the advantages of this search engine? (Lesson 3.2)
Answer:
Some popular search engines include Google at
www.google.com, AltaVista at www.altavista.com, and Ask
Jeeves at www.ask.com. You can research online to find
reviews of your favorite search engine and to compare the
different search engines using keywords such as compare
search engines. Each will have its strengths. For example,
one advantage of using Google is that it currently has the
largest database of Web pages.
Glencoe Digital Communication Tools
3
Using the Internet
Chapter Assessment
Question 2
What is plagiarism? When you write a report, what can you
do to avoid plagiarizing others’ work? (Lesson 3.4)
Answer:
Plagiarism is using other people’s ideas and words without
acknowledging that the information came from them. In
other words, it is taking credit for work that is not yours. To
avoid plagiarizing when writing a report, always give credit
when you use another person’s words or ideas. If you are
doing research, take only brief notes from your source and
then write your report from those notes. Always use your
own words to explain the point you are trying to make.
Glencoe Digital Communication Tools
3
Using the Internet
Chapter Assessment
Question 3
As an off-site salesperson, what steps could you take
to ensure the security of your computer? Also, what
precautions might you need to take to safely share
important project information with coworkers over
the Internet?
Answers may include:
Installing a firewall to protect against unauthorized access
to your computer and installing anti-virus software to
protect against viruses from e-mail or the Internet. Using
password protection would be an important precaution to
keep your project files from being accessed or changed by
unauthorized people as you share them with others.
Glencoe Digital Communication Tools
1
Impact of Digital Communication Tools
Unit Resources
For more resources on this unit, go to the Online Learning
Center at http://www.digicom.glencoe.com.
Glencoe Digital Communication Tools