Telecommunications
Download
Report
Transcript Telecommunications
Telecommunications
Tele – distant; at a distance; over a distance
Communication – a process by which
information is exchanged between individuals
through a common system of symbols, signs, or
behavior
Telecommunications – communicating over a distance
Advantages and Uses of
Telecommunications
• Electronically transfer data
• Distance learning
• Taking classes online
• Teleconferencing
• Conducting a meeting with people in different places
using a webcam and/or video phone
The Internet
Background of the Internet
• Early origin in the 1960s
• Original name: ARPANET
• Created so that scientists were able to share
information on military and scientific
research
• The World Wide Web (WWW) began in
March 1989 when Tim Berners-Lee wrote a
small computer program for his personal
computer
Web Protocols
• HTML (Hypertext Markup Language)
•A series of tags that are integrated into text
documents and describes how the text should be
formatted when a Web browser displays it on the
screen.
• HTTP (Hypertext Transfer Protocol)
•Protocol – the standard format for transferring data
between 2 devices
•Standard that defines how messages are formatted
and transmitted.
What do you need to connect to
the Internet?
• Modem
• Internet Service Provider (ISP)
• Browser
What is a browser?
• The software program that you use to
retrieve documents from the World Wide
Web (WWW) and to display them in a
readable format
• Examples:
• Internet Explorer
• Netscape Communicator
• AOL
The Parts of a web page
•
•
•
•
•
•
•
•
Title bar
Menu bar
Tool bar
Address bar
Go button
Status bar
Access indicator
Scroll bars
Title bar
• The bar on the top of
the window that
contains the name of
the document.
Menu bar
• A horizontal menu
that appears on top of
a window.
• Provides a selection of
options related to the
web page.
Tool bar
• Icons for single-click
access to most
commonly used menu
commands
Address bar
• Contains the URL, or
address of the active
web page
• URL stands for Universal
Resource Locator
• Also where you type the
location for the web
page you want to visit
Go button
• Connects you to
address displayed in
the address bar.
• Document window
displays the active
web page.
Status bar
• Located at the bottom
of the browser
• Shows the progress of
web page transactions
Access indicator
• When animated, it
means your browser is
accessing data from a
remote computer
Scroll bars
• Let you scroll
vertically and
horizontally if the web
page is too long or too
wide to fit within one
screen
Automated Features
• AutoSearch helps you find a webpage when
part of the URL is keyed into the address
bar
• AutoComplete keeps track of and provides
a list of sites you have visited
• AutoCorrect is the feature that corrects
typos as you type
Search Engines
What is a search engine?
• A tool that lets you find web pages that
match a particular word or phrase
• Examples:
•
•
•
•
Altavista
Google
Yahoo
AskJeeves
Types of search engines:
• Keyword Search
• Uses keywords to perform search
• Multimedia Search Engines
• Used to find graphics, video clips, animation,
and MP3 music files.
• Meta Search Engines
• Search several major search engines at one time.
• Subject Directories
• Organized by subject categories and displayed in
a series of menus.
Search tools and techniques:
• Phrase Searching
• Search Engine Math
• Boolean Operators
• Wildcard Searching
• Title Searching
Phrase searching
• A phrase is entered using double quotation
marks and only matches those that appear
adjacent to each other and in the order in
which you specify.
• Example: “baseball cards”
Search Engine Math
• Symbols used in formulas to filter out
unwanted listings.
• Use the plus symbol (+) before words that must
appear.
•Also known as an inclusion operator.
• Use the minus symbol (-) before words that you
do not want to appear.
•Also known as an exclusion operator.
Boolean Operators
• Boolean logic consists of three logical
operators:
• AND
• NOT
• OR
Wildcard Searching
• The * symbol, called an asterisk, is
considered a wildcard character.
• Used if you don’t know the spelling of a
word
• Example: N*Ryan to search for Nolan Ryan
• Used to search plurals or variations of words.
Title Searching
• Searching the title
of a web page.
• When a web page
author creates a
Web page, the
Web page
generally contains
a HTML title.
E-Mail
What is E-mail?
• E-mail = electronic
mail
• Similar to regular mail
•
•
•
•
2 addresses
A message
Allows for attachments
A carrier
Advantages
• Faster way to
communicate and respond
• Quick and easy way to
send messages
• Allows you to forward
messages to others, and
send messages to multiple
people
• Allows you to attach files
(pictures, audio files,
images, and documents)
E-Mail Terminology
•
•
•
•
•
•
•
•
Inbox
Outbox
Sent Items
Deleted Items
Drafts
New Message
Send
Address Book
Parts of an E-mail Address
• The username of the person the message is
going to
• Example: msjarrett
• The @ symbol
• The user’s domain name
• Example: aol.com
Types of E-mail addresses:
•
•
•
•
•
•
.edu – educational institution
.com – commercial address
.gov – government address
.org – non-profit organization
.mil – military address
.net – network address
Chat Rooms
What are chat rooms for?
• Using the computer to create real-time
communication between yourself and
another user or a group of users.
• Internet Relay Chat (IRC)
•A text-based chat developed by Jarkko Oikarinen in
1988.
•One of the most widely used chat forums on the
Internet today.
Chat Options
• Web chat
• Incorporates graphics, audio and video
• Hosted by search engines such as Yahoo, Snap, and
Excite.
• Proprietary chat
• Requires that you download and install software from a
company.
• Examples are Microsoft Chat, AOL, and Prodigy.
• Buddy lists
• You specify your list of friends and even tell when they
are online.
• Examples are ICQ and AOL Messenger
Mailing Lists
• A group of people with a shared interest.
• Their email addresses are collected into a
group, and this group is identified by a single
name.
• When a message is sent to the group,
everyone on the list receives that message.
Newsgroups
• A discussion forum or a type of bulletin
board.
• Each board is dedicated to discussion on a
particular topic.
•USENET
•Worldwide network of computers that
facilitates the transmission of messages
among the news servers.
Analyzing Technology Issues
The Impact of Technology
on Education
• Education
• Internet
• Distance Learning
• Computer-Based Learning
• Simulations
The Impact of Technology
on Science
• Science
• Artificial Intelligence
• Genetic Engineering
• Virtual Reality
The Impact of Technology
on Work
• Multinational Economy
• Electronic Commerce
The Impact of Technology
on Our Lives
• Clothes that fight odor and
bacteria
• The flying car
• Voice recognition
• Space travel
• Smart shoes and smart seats
• Smart houses
• Electronic shopping
Exploring Technology Careers
• Business and Office
• Administrative Assistant
• Desktop Publisher/Graphic Designer
• Network Support and Administration
• PC Support Specialist
• Manager of Information Systems
• Web-Based
• Web Developer
• Web Master
Computer Crimes
A criminal act committed through the use of a
computer. It can also involve the theft of a
computer and any equipment associated with
the computer.
Types of Computer Crimes
• Computer fraud
• Conduct that involves the manipulation of a computer
or computer data in order to obtain money, property, or
value dishonestly or to cause loss.
• Computer hacking
• Involves invading someone else’s computer, usually for
personal gain or just the satisfaction of invasion.
Other Computer Crimes
• Theft of computer time
• An employee uses a company’s computer for personal
use such as running a small business, keeping records of
an outside organization, or keeping personal records.
• Data diddling
• Changing data before it is entered into the computer or
after is has been entered into the computer.
Software Usage
Commercial •Copyrighted by an individual or a business
•Permission needed in order to copy
Software
Shareware
Freeware
PublicDomain
•Copyright protected
•Distributed free on a trial basis
•Payment by the honor system for satisfied users
•Given away free of charge
•Owner often retains rights
•Not necessarily free to copy and distribute
•Not copyrighted
•Donated for public use
•Free to copy and distribute
Software Pirates
• Someone that copies software illegally
• Software companies usually prevent users from
making multiple copies of their software by
“locking” it
• You must purchase a site license in order to
software on more than 1 computer
Computer Viruses
A virus is a program that has been written to
cause corruption of data on a computer.
Types of Computer Viruses
Worm
•
•
destructive computer program that bores its way
through a computer’s files or through a computer
network
makes many copies of itself, resulting in the
consumption of system resources that slows down or
actually halts tasks
Time Bomb
•
virus that does not cause its damage until a certain
date or until the system has been booted a certain
number of times
Logic Bomb
•
virus triggered by the appearance or disappearance of
specific data
Trojan Horse
•
Virus that does something different from what it is
expected to do
Privacy and Security Issues
• Any time you submit information on the
Internet, it is possible for the information to
be gathered by many persons and used for
various situations including being sold.
Information can be gathered from online
sources such as schools, banks, hospitals,
insurance companies, and many other
sources.
Security Measures
Maintain and enforce security measures such
as:
• Passwords
• Electronic identification cards
• Firewalls
• Antivirus software
• Selective hiring process
How do I keep my computer
safe?
• Make back-up copies of all files on a regular basis
• Don’t share disks from other computers—this
•
•
•
•
•
increases your chance of catching a virus
Don’t boot from a floppy disk
Write-protect your disks
Use an anti-virus program to scan your files on a
regular basis
Use caution when downloading files from the
Internet—many are virus infected
File sharing on a Local Area Network (LAN) may
also expose your files to a virus