Chapter 9 - Algonquin College

Download Report

Transcript Chapter 9 - Algonquin College

Tomorrow’s Technology
and You
Chapter 9
The Internet
© 2006 Prentice-Hall, Inc.
Slide 1
Chapter 9
Objectives
Explain what we can learn from ARPANET.
 Discuss some of the most important ethical
and political issues raised by the growth of the
Internet
Describe how to publish on the Internet, and
guidelines for building effective Web sites.
© 2006 Prentice-Hall, Inc.
Slide 2
What can we learn from ARPANET? (p317-318)
“In the 1960’s the world of computers was a… Tower of
By expanding the number of people
Babel”?
who have the power to transmit
 what does that
mean? the Web might trigger a
knowledge,
 how did ARPANET
help?
power
shift that changes
everything.
“Its peer-to-peer networking
philosophy
—Howard Rheingold
were the basis of today’s Internet
and protocols”
 what does ‘peer-to-peer’ mean?
 what ‘protocols’?
So what?
 effects of ‘peer-to-peer’ philosophy?
 effects of choice of TCP/IP on reliability?
© 2006 Prentice-Hall, Inc.
Slide 3
Chapter 9
Objectives
Explain what we can learn from ARPANET.
 Discuss some of the most important ethical
and political issues raised by the growth of the
Internet
Describe how to publish on the Internet, and
guidelines for building effective Web sites.
© 2006 Prentice-Hall, Inc.
Slide 4
Internet Issues (pp 339-349)
 ‘Push’ vs ‘Pull’ (RSS)
how does this work? Pros and cons?
The Digital Divide
What does this mean?
Do you think it’s a problem?
Scam sites, ‘drive-by downloads’ of viruses, spyware
Does https assure safety?
Do Security seals help?
Other safety measures?
Cookies - what are they? Dangers? How to control?
Internet addiction how big a problem? why? solutions?
Net neutrality
what is it? Why is it threatened? Is that a problem?
© 2006 Prentice-Hall, Inc.
Slide 5
In-class Activity
• Find site with security seal
• Open verify box, take screen shot
• Paste to Word, explain how to use this to
verify site
• How does this differ from https?
• Upload to Forum (as PDF)
• Be sure to check that doc view works!
Slide 6
Chapter 9
Objectives
Explain what we can learn from ARPANET.
 Discuss some of the most important ethical
and political issues raised by the growth of the
Internet
Describe how to publish on the Internet, and
guidelines for building effective Web sites.
© 2006 Prentice-Hall, Inc.
Slide 7
Publishing on the Web (p320-337)
Where to publish - need a URL
How does URL addressing work?

Case sensitivity?

https? be careful!
What are the “TLD’s”? Who controls them?
What is the function of a DNS Server?
How do I get access to a domain? (p 325)
“Free sites” – such as? downside?
Buy your own – where? how do I choose one?
© 2006 Prentice-Hall, Inc.
Slide 8
Publishing on the Web (p320-337)
 How do I prepare a document for publishing?
 Must use HTML - learn to write ?
 Can use MS Word, PPT etc and convert document into HTML


how?
pros and cons?
 Can use Web authoring programs


Macromedia Dreamweaver, MS Expression Web
pros and cons?
 Edit!
 Upload
 FTP as per Online Portfolio exercise
 Why does X show in my picture box?
 other methods?
 Test! (with various browsers) – why?
© 2006 Prentice-Hall, Inc.
Slide 9
Weaving Winning Web Sites (p 337)
How will you apply these ideas to your portfolio?
Start with a plan

what is your portfolio supposed to accomplish?
Include graphics, audio, video, search engine?
Write for the Web – how?
Keep it simple – avoid?
Keep it consistent & ‘obvious’ – how?
Keep it small – why and how?
Keep it honest – what does this mean?

Offer contact info




© 2006 Prentice-Hall, Inc.
what are the risks? how can I reduce them?
Test it! – why and how?
Keep it current – why and how?
Printer friendly – why? how?
Slide 10
The Evolving Internet (pp 349-352)
What will ‘cyberspace’ look like to future
‘netizens’?
more regulated? more dangerous?
 more useful? more ‘interpersonal’?
why should we call it the ‘infosphere’?
‘Internet appliances’ are increasing rapidly
What scenarios are possible?
Is there a downside?
© 2006 Prentice-Hall, Inc.
Slide 11
CBC national technology
correspondent Tod Maffin
“…Oh, and consider re-assigning whoever is writing your web copy.”
Slide 12
• The worm converts mp3 files to the .WMA format (without changing
the .mp3 extension) and adds a marker with a link to an infected
web page. During file playback, it opens an infected page where the
user is asked to download and install a codec. If the user agrees, a
Trojan is downloaded, giving cybercriminals control of the PC.
• Unlike earlier Trojans this worm infects audio files. According to
Kaspersky Lab virus analysts, this is the first such case. The
likelihood of a successful attack is increased because most users
trust their audio files and do not associate them with possible
infections. It should be noted that the file on the counterfeit web
page is digitally signed by Inter Technologies and is identified by
www.usertrust.com, the resource that issued the digital signature, as
trusted.
• Immediately after Worm.Win32.GetCodec.a was detected, its
signatures were added to Kaspersky Lab’s antivirus databases.
Slide 13