Chapter 9 - Algonquin College
Download
Report
Transcript Chapter 9 - Algonquin College
Tomorrow’s Technology
and You
Chapter 9
The Internet
© 2006 Prentice-Hall, Inc.
Slide 1
Chapter 9
Objectives
Explain what we can learn from ARPANET.
Discuss some of the most important ethical
and political issues raised by the growth of the
Internet
Describe how to publish on the Internet, and
guidelines for building effective Web sites.
© 2006 Prentice-Hall, Inc.
Slide 2
What can we learn from ARPANET? (p317-318)
“In the 1960’s the world of computers was a… Tower of
By expanding the number of people
Babel”?
who have the power to transmit
what does that
mean? the Web might trigger a
knowledge,
how did ARPANET
help?
power
shift that changes
everything.
“Its peer-to-peer networking
philosophy
—Howard Rheingold
were the basis of today’s Internet
and protocols”
what does ‘peer-to-peer’ mean?
what ‘protocols’?
So what?
effects of ‘peer-to-peer’ philosophy?
effects of choice of TCP/IP on reliability?
© 2006 Prentice-Hall, Inc.
Slide 3
Chapter 9
Objectives
Explain what we can learn from ARPANET.
Discuss some of the most important ethical
and political issues raised by the growth of the
Internet
Describe how to publish on the Internet, and
guidelines for building effective Web sites.
© 2006 Prentice-Hall, Inc.
Slide 4
Internet Issues (pp 339-349)
‘Push’ vs ‘Pull’ (RSS)
how does this work? Pros and cons?
The Digital Divide
What does this mean?
Do you think it’s a problem?
Scam sites, ‘drive-by downloads’ of viruses, spyware
Does https assure safety?
Do Security seals help?
Other safety measures?
Cookies - what are they? Dangers? How to control?
Internet addiction how big a problem? why? solutions?
Net neutrality
what is it? Why is it threatened? Is that a problem?
© 2006 Prentice-Hall, Inc.
Slide 5
In-class Activity
• Find site with security seal
• Open verify box, take screen shot
• Paste to Word, explain how to use this to
verify site
• How does this differ from https?
• Upload to Forum (as PDF)
• Be sure to check that doc view works!
Slide 6
Chapter 9
Objectives
Explain what we can learn from ARPANET.
Discuss some of the most important ethical
and political issues raised by the growth of the
Internet
Describe how to publish on the Internet, and
guidelines for building effective Web sites.
© 2006 Prentice-Hall, Inc.
Slide 7
Publishing on the Web (p320-337)
Where to publish - need a URL
How does URL addressing work?
Case sensitivity?
https? be careful!
What are the “TLD’s”? Who controls them?
What is the function of a DNS Server?
How do I get access to a domain? (p 325)
“Free sites” – such as? downside?
Buy your own – where? how do I choose one?
© 2006 Prentice-Hall, Inc.
Slide 8
Publishing on the Web (p320-337)
How do I prepare a document for publishing?
Must use HTML - learn to write ?
Can use MS Word, PPT etc and convert document into HTML
how?
pros and cons?
Can use Web authoring programs
Macromedia Dreamweaver, MS Expression Web
pros and cons?
Edit!
Upload
FTP as per Online Portfolio exercise
Why does X show in my picture box?
other methods?
Test! (with various browsers) – why?
© 2006 Prentice-Hall, Inc.
Slide 9
Weaving Winning Web Sites (p 337)
How will you apply these ideas to your portfolio?
Start with a plan
what is your portfolio supposed to accomplish?
Include graphics, audio, video, search engine?
Write for the Web – how?
Keep it simple – avoid?
Keep it consistent & ‘obvious’ – how?
Keep it small – why and how?
Keep it honest – what does this mean?
Offer contact info
© 2006 Prentice-Hall, Inc.
what are the risks? how can I reduce them?
Test it! – why and how?
Keep it current – why and how?
Printer friendly – why? how?
Slide 10
The Evolving Internet (pp 349-352)
What will ‘cyberspace’ look like to future
‘netizens’?
more regulated? more dangerous?
more useful? more ‘interpersonal’?
why should we call it the ‘infosphere’?
‘Internet appliances’ are increasing rapidly
What scenarios are possible?
Is there a downside?
© 2006 Prentice-Hall, Inc.
Slide 11
CBC national technology
correspondent Tod Maffin
“…Oh, and consider re-assigning whoever is writing your web copy.”
Slide 12
• The worm converts mp3 files to the .WMA format (without changing
the .mp3 extension) and adds a marker with a link to an infected
web page. During file playback, it opens an infected page where the
user is asked to download and install a codec. If the user agrees, a
Trojan is downloaded, giving cybercriminals control of the PC.
• Unlike earlier Trojans this worm infects audio files. According to
Kaspersky Lab virus analysts, this is the first such case. The
likelihood of a successful attack is increased because most users
trust their audio files and do not associate them with possible
infections. It should be noted that the file on the counterfeit web
page is digitally signed by Inter Technologies and is identified by
www.usertrust.com, the resource that issued the digital signature, as
trusted.
• Immediately after Worm.Win32.GetCodec.a was detected, its
signatures were added to Kaspersky Lab’s antivirus databases.
Slide 13