Using Information Technology, 11e

Download Report

Transcript Using Information Technology, 11e

2
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
Chapter 2 Topics
2
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
UNIT 2A: The Internet & the Web
• The Internet began in 1969 as ARPANET.
• The Internet was text-only. In the early 1990s, multimedia
became available on the Internet, and the World Wide Web
(web) was born.
This is the first image
uploaded to the web, in
1992.
3
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
• To connect to the Internet you need
1. An access device (computer with modem)
2. A means of connection (phone line, cable hookup, or
wireless)
3. An Internet access provider
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
2.1 Connecting to
the Internet
5
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
However you connect to the Internet, the bandwidth will determine the
speed of your connection.
• Bandwidth: Expresses how much data can be sent through a
communications channel in a given amount of time.
• Baseband: Slow type of connection that allows
only one signal to be transmitted at a time.
• Broadband: High-speed connections.
6
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Physical connection to Internet—wired or wireless?
Using Information Technology, 11e
• Telephone [dial-up] modem
• High-speed phone line—DSL, T1/T3
• Cable modem
• Wireless—satellite and other through-the-air links
7
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
• Data Transmission Speeds
•
•
•
•
•
Originally measured in bits per second (bps)
8 bits are needed to send one character, such as A or a
Kbps connections send 1 thousand bits per second
Mbps connections send 1 million bits per second
Gbps connections send 1 billion bits per second
• Uploading & Downloading
• Upload—transmit data from local to remote computer
• Download—transmit data from remote to local computer
8
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
• Narrowband (Dial-Up Modem): Low speed but inexpensive
• Telephone line = narrowband, or low bandwidth, low speed
• Dial-up connection—use of telephone modem to connect to Internet
(used mostly in rural areas on POTS, or plain old telephone system)
• Telephone Modems
• Can be either internal or external
• Maximum speed of 56 Kbps
• Most ISPs offer local access numbers
9
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
Telephone (Dial-Up) Modem
Panel 2.3
Page 55
10
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
High-Speed Phone Lines
Using Information Technology, 11e
• More expensive but available in cities & most towns
• DSL line
•
•
•
•
•
Uses regular phone lines, DSL modem
Receives data at 7 ̶ 105Mbps; sends at about 384 Kbps – 1 Mbps
Is always on
Need to live no farther than 4.5 miles from phone company switching office
Not always available in rural areas
• T1 line—very expensive
• Traditional trunk line, fiber optic or copper; carries 24 normal
telephone circuits
• Transmission rate of 1.5 ̶ 6 Mbps (T3 = 6 – 47 Mbps)
• The “last mile” can still be a problem
• Generally used by large organizations
11
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
High-Speed Phone Lines
• Cable modem
Using Information Technology, 11e
• TV cable system with Internet connection; company usually supplies
cable modem
• Is always on
• Receives data at up to
100 Mbps; sends at
about 2-8 Mbps
12
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
Basic DSL/Cable-PC system
Panel 2.4
Page 57
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Satellite Wireless Connections
Using Information Technology, 11e
• Transmits data between satellite dish
and satellite orbiting earth
• Connection is always on
• Requires Internet access provider with 2-way
satellite transmission
• User needs to buy or lease satellite dish and
modem and have them connected
14
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Other Wireless: Wi-Fi, 3G, & 4G
Using Information Technology, 11e
• Wi-Fi—stands for “wireless fidelity”
• Name for a set of wireless standards (802.11) set by IEEE
• Transmits data wirelessly up to 54 Mbps for 300 – 500 feet from access
point (hotspot)
• Typically used with laptops and tablets that have Wi-Fi hardware
• 3G = “third generation”; uses existing cellphone system; handles voice,
email, multimedia
• 4G = “fourth generation”; faster than 3G; built specifically for Internet traffic
– but not standard yet
• Both 3G and 4G used mostly in smartphones
15
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Internet Access Providers (ISPs)
Using Information Technology, 11e
• ISP: Local, regional, or national organization that provides access to the
Internet for a fee — e.g., Comcast, Charter, AT&T.
• Wireless Internet Service Provider (WISP) — e.g., AT&T, T-Mobile, Verizon
Wireless, Sprint, Credo
• Enables wireless-equipped laptop/tablet and smartphone users to
access Internet
16
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
2.2 How Does the Internet
Work?
17
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
• The Internet is basically a huge network that connects
hundreds of thousands of smaller networks.
• Central to this arrangement are client/server networks
• Client: computer requesting data or services
• Server or host computer: central computer supplying data or services
requested of it
Client
18
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
Internet Connections: POP & IXPs
• Point of Presence (POP)
• A collection of modems and other equipment in a local area
• A local gateway (access) to an ISP’s network
• ISP connects to an IXP
• Internet Exchange Point (IXP)
• A routing computer at a point on the Internet where several
connections come together
• IXPs are run by private companies
• Allow different ISPs to exchange Internet traffic
(continued)
19
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Internet Connections: Backbone, & Internet2
• Internet Backbone
Using Information Technology, 11e
• High-speed, high-capacity data transmission lines, usually
fiber optic
• Uses the newest technology
• Providers include AT&T, Sprint, Verizon, CenturyLink, and
Deutsche Telekom
• Internet 2
• Cooperative university/business education and research project
• Adds new “toll lanes” to older Internet to speed things up
• Advances videoconferencing, research, collaboration
20
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
Panel 2.5
Page 59
21
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Internet Communications: Protocols, Packets,
& IP Addresses
• Handshaking & Authentication: Connecting to your ISP’s point of presence
(POP)
Using Information Technology, 11e
• Handshaking—fastest transmission speed established
• Authentication—correct password & user name
• Protocols
• The set of rules a computer follows to electronically transmit data.
• TCP/IP (Transmission Control Protocol/Internet Protocol) is the Internet protocol
• Developed in 1978 by ARPA; used for all Internet transactions
• Packets
• Fixed-length blocks of data for transmission, determined by TCP/IP
• Data transmissions are broken up into packets and re-assembled at destination (the IP—
Internet Protocol— address)
22
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
IP (Internet Protocol) Addresses
Using Information Technology, 11e
• Every device connected to the Internet has an address
• Each IP address uniquely identifies that device
• The address is four sets of numbers
separated by periods (e.g., 1.160.10.240)
• Each number is between 0 and 255
• Dynamic IP addresses change with
every use; individual computer users
are assigned static IP addresses when
they log on
• Static IP addresses don’t change
(established organizations – including
ISPs – and companies have static IP
addresses, which they pay for)
23
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Who Runs the Internet?
Using Information Technology, 11e
• Basically, no one owns the Internet
• The board of trustees of the Internet Society (ISOC) oversees the
standards
• Internet Corporation for Assigned Names
and Numbers (ICANN) regulates domain
names (such as .com, edu., .net) that
overlie IP addresses; ICANN does not
control content
24
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
2.3 The World Wide Web
25
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
The Face of the Web: Browsers, Websites,
& Web Pages
The World Wide Web brought multimedia to the Internet.
• The web and the Internet are not the same; the web is multimedia-based,
and the Internet is not. The Internet is the infrastructure that supports the
web.
• A browser is software that gets you to websites and their individual web
pages and displays the content in such a way that the content appears
mostly the same regardless of the computer, operating system, and display
monitor.
Examples = Internet Explorer
Mozilla FireFox
Apple Macintosh’s Safari
Google’s Chrome
Microsoft’s Bing
26
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Website
Using Information Technology, 11e
• The location on a particular computer (server) that has a unique
address; example = www.barnesandnoble.com, www.mcgraw-hill.com
• The website (server) could be anywhere — not necessarily at company
headquarters
• Web Page
• A document on the web that can include text, pictures, sound, and
video
• The first page on a website is the Home page
• The Home page contains links to other pages on the website (and
often other websites)
27
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
How the Browser Finds Thing: URLs
• Uniform Resource Locator (URL): address for a web page
Using Information Technology, 11e
• A character string that points to a specific piece of information
anywhere on the web
• A website’s unique address
• It consists of
•
•
•
•
The web protocol, http://
The domain name of the web server
The directory name or folder on that server
The file within the directory, including optional extension
28
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
The Nuts & Bolts of the Web: HTML & Hyperlinks
• TCP/IP— As explained (p. 60), general Internet Protocol
• HTTP—Protocol Used to Access World Wide Web
• Hypertext Markup Language (HTML)
• The “markup” language used in writing and publishing web pages
• Set of instructions used to specify document structure, formatting,
and links to other documents on the web
• Hypertext links connect one web document to another
hypertext link
Tim Berners-Lee saw the possibility of using hyperlinks to link
any information to any other information over the Internet.
29
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Your Browser to Get around the Web
• Web browsers interpret HTML and allow you to move around
Using Information Technology, 11e
the Internet and the web
• Come preinstalled on most PCs, but you can download others
• 5 basic elements
•
•
•
•
•
URL (address)bar
Menu bar
Toolbar
Workspace
Status bar
(displays current status of the
web age; 100% = fully loaded)
30
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Browser’s Home Page
Using Information Technology, 11e
• The page you see when you open your web
browser
• You can change the Home Page on your browser
• Back, Forward, Home
• Use the browser’s icons to
move from one page to another
(these icons can appear on
different bars in different browsers)
31
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Navigation
Using Information Technology, 11e
• History List
• A list of websites you visited since you opened up your browser for this session
• Allows you to easily return to a particular site
• Bookmark
• Allows you to store the URL from a site on your computer so you can find it again
in another browser session
• To save the URL for a site, click on “Favorites” in Internet Explorer, “Bookmarks”
in Mozilla Firefox, or the star icon in the URL address bar in Chrome
32
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
• Interactivity with a web page
• Click on hyperlinks to transfer to another page
• Click on a radio button to choose an option
• Type text in a text box
and then hit Enter
• Click on scroll arrows to move up and down,
or side to side, on a page
• Click on different frames
(separate controllable
sections of a web page)
33
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Web portals: Starting points for finding information
Using Information Technology, 11e
• A portal is gateway website that offers a broad array of resources and
services, online shopping malls, email support, community forums,
stock quotes, travel info, and links to other categories
• Examples: Yahoo!, Google, Bing, Lycos, and AOL
• Most require you to log in, so you can
• Check the Home page for general
information
• Use the subject guide to find a topic
you want
• Use a keyword to search for a topic
34
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Search Services & Search Engines
• Organizations that maintain databases accessible through websites to help
you find information on the internet
Using Information Technology, 11e
• Examples: portals like Yahoo! and Bing, plus Google, Ask.com, Gigablast
• Search services maintain search engines—programs that users can use to ask
questions or use keywords to find information
• Databases of search engines are compiled using software programs called spiders
(crawler, bots, agents)
• Spiders crawl through the World Wide Web
• Follow links from one page to another
• Index the words on that site
• A search never covers the entire web
• Search engines differ in what they cover
35
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Four Web Search Tools
Using Information Technology, 11e
1. Individual Search Engines
• Compile their own searchable databases on the web
• You search by typing keywords and receiving “hits”
• Examples are Ask, Bing, Google, and Yahoo!
2. Subject Directories
• Created and maintained by human editors, not electronic spiders
• Allow you to search for information by selecting lists of categories or
topics
• Example sites are Beaucoup!, LookSmart, Open Directory Project, and
Yahoo! Directory
(continued)
36
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3. Metasearch Engines
Using Information Technology, 11e
 Allows you to search several search engines simultaneously
 Examples are Yippy!, Dogpile, Mamma, MetaCrawler, and Webcrawler
4. Specialized Search Engines
 Help locate specialized subject matter, such as info on movies, health,
jobs
 Examples are Career.com. WebMD, Expedia, U.S. Census Bureau
37
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Smart Searching: Three General Strategies
• If you’re just browsing . . .
Using Information Technology, 11e
• Try a subject directory
• Next try a metasearch engine
• If you’re looking for specific information . . .
• Try a Answers.com “one-click” search
• Or go to a general search engine, then a specialized one
• If you’re looking for everything on a subject . . .
• Try the same search on several search engines
38
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Wikis & Wikipedia
Using Information Technology, 11e
• A wiki is a simple piece of software that can be
downloaded for free and used to make a website (also
called a wiki) that can be corrected or added to by anyone.
• Wikipedia is a free online encyclopedia that anyone around
the world can contribute to or edit. It has more than 25
million articles in more than 285 languages; over 4.1
million articles appear in the English Wikipedia alone.
However, Wikipedia is not considered reliable or
authoritative by many academics and librarians.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
Multimedia Search Tools
•
•
•
•
Still images—e.g., Google Image Search, Bing Images, Fagan Finder
Audio—e.g., Yahoo! Music, Lycos MP3 Search
Video—e.g., AlltheWeb, AOL.video
Scholarly—e.g., Google Scholar
40
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Tagging
Using Information Technology, 11e
• Tags: Do-it-yourself labels that people can put on anything found
on the Internet, from articles to photos to videos, that help them
to find their favorite sites again and to link them.
• Can be shared easily with other people
• Tags are commonly used on blogs and YouTube – word listed at the
bottom. Essentially tags are keywords used to classify content. (The #
is a hash symbol; thus the Twitter term hashtag. )
• Tag managing is available through delicious.com and
BlinkList, among other companies.
41
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
UNIT 2B: The Riches & Risks of Internet Use
42
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
2.4 Email, Instant
Messaging, & Other Ways
of Communicating over
the Net
43
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Email
Using Information Technology, 11e
• Outgoing mail: sent from your computer to a Simple Mail
Transfer Protocol (SMTP) server run by your ISP
• Incoming mail: Email sent to your computer: uses Post Office
Protocol version 3 (POP3)
44
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
Page 77
45
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Two ways to send & receive email:
Using Information Technology, 11e
1. Email Program
• Enables you to send email by running email software on your computer that
interacts with an email server at your Internet access provider
• Incoming mail is stored on the server in an electronic mailbox
• Upon access (your ID and password), mail is sent to your software’s inbox
• Examples: Microsoft Outlook, Apple Mail
2. Web-Based Email
• You send and receive messages by interacting via a browser with a website
• Advantage: You can easily send and receive messages while traveling,
using any computer or equipped mobile device
• Examples: Yahoo! Mail and Gmail (Google)
• Disadvantages are ads and email hacking
46
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Using email
Using Information Technology, 11e
Get an email address from your ISP, following this format:
47
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Tips for Using Email
Using Information Technology, 11e
1.
2.
3.
4.
Use the address-book feature to
store email addresses
Use folders to organize email
Be careful with attachments
Be aware of email netiquette
48
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Email Attachments
Using Information Technology, 11e
• A copy of a file or document that you send attached to an email to
one or more people
• Recipients must have compatible software to open the attachment;
for example, if they don’t have Excel, they probably can’t read the
spreadsheet you sent them.
• Be careful about opening attachments:
• Many viruses hide in them; scan them with antivirus software
• Know who has sent the attachment before you open it
49
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
Netiquette: Appropriate Online Behavior
•
•
•
•
•
•
Don’t waste people’s time.
Don’t write anything that you would not say to a person’s face.
Include helpful subject and signature lines.
Be clear and concise.
Avoid spelling and grammatical errors.
Avoid SHOUTING and flaming.
Also:
•
•
•
•
•
Be careful with jokes.
Avoid sloppiness, but avoid criticizing other’s sloppiness.
Don’t send huge file attachments unless requested.
When replying, quote only the relevant portion.
Don’t overforward (don’t copy emails to everyone you know).
50
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Instant Messaging
Using Information Technology, 11e
• Instant messaging enables you to communicate by email with
•
•
•
•
specified other users (“buddies”) in real time.
Any user on a given email system can send a message and have
it pop up instantly on the screen of anyone logged into that
system.
To get IM: Download IM software from a supplier
Examples: AOL/AIM, Google Chat, Windows Messenger, Yahoo!
Messenger
Done on computers; is not the same as texting.
51
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Discussion Groups
• Mailing Lists:
Using Information Technology, 11e
• One-way (to make announcements) or two-way (for discussions) email
subscription lists
• Email discussion groups on special-interest topics, in which all subscribers
receive email messages sent to the group’s email address
• Newsgroups:
• Giant electronic bulletin board for written discussions about specific subjects
• To participate you need a newsreader program
• Message Boards:
• Special-interest discussion groups without newsreaders
• Accessed through a web browser
• A collection of messages on a particular topic is called a thread
52
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
FTP (File Transfer Protocol)
Using Information Technology, 11e
• Software standard for transferring large files
•
•
•
•
between computers, including those with
different operating systems
You can also transfer files from an FTP site on
the Internet to your PC
FTP sites offer many free files
FTP sites may be either public or proprietary
You can download using your web browser or FTP client
programs, such as Fetch, Cute, FileZilla, and SmartFTP
53
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
2.5 The Online
Gold Mine
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Telephony: The Internet Telephone
Using Information Technology, 11e
• Uses the Internet to make phone calls via VoIP
•
•
•
•
(Voice over Internet Protocol)
Long-distance calls are either very inexpensive or free
With no PC, dial a special phone number to packetize your call
for a standard telephone
Use with a PC that has a sound card, microphone, Internet
connection with modem & ISP, and internet telephone software
such as Skype and Vonage
Also allows videoconferencing
55
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Multimedia on the Web
• Allows you to get images, sound, video, and animation
• May require a plug-in, player, or viewer
Using Information Technology, 11e
• A downloadable program that adds a specific feature to a browser so it
can view certain files
• Examples: Flash, RealPlayer, QuickTime
• Multimedia Applets
• Small programs that can be quickly downloaded and run by most
browsers
• Java is the most common Applet language
• Text & Images: great variety available
• Example: Google Earth
(continued)
56
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Animation
Using Information Technology, 11e
• The rapid sequencing of still images to create the appearance of motion
• Used in video games and web images that seem to move, such as banners
• Video & Audio
• Downloaded completely before the file can be played, or
• Downloaded as streaming video/audio
• Examples: RealVideo and RealAudio
57
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The Web Automatically Comes to You
Using Information Technology, 11e
• Push technology: Software that automatically downloads information
to personal computers.
• Webcasting: Sending users customized text, video, audio on regular
basis.
• RSS newsreaders (RSS aggregators): Programs that scour the web,
sometimes hourly, sometimes more frequently, and pull together in
one place “feeds” from several websites. RSS is based on XML, or
extensible markup language, a web-document tagging and formatting
language that is an advance over HTML and that two computers can
use to exchange information.
58
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
• XML and RSS have led to blogs and blogosphere.
• Blogs (weblogs) are frequently updated sites on the web
intended for public consumption that contain a writer’s
observations, opinions, images, and links to other websites.
• Podcasting: Internet radio or similar Internet audio program
delivered via RSS feed to a subscriber to be played back on
computer or digital audio device.
59
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
E-Commerce: B2B, B2C, & C2C
Using Information Technology, 11e
• E-Commerce (electronic commerce): conducting business activities
online
• E-commerce has led to showrooming, the phenomenon in which
shoppers browse for products in stores, only to buy them from an
online rival, frequently at a lower price.
• B2B is business-to-business e-commerce.
• Business-to-consumer commerce, or B2C, is the electronic sale or
exchange of goods and services from the companies directly to the
public, or end users (e.g., online banking, online shopping, online stock
trading).
• Consumer-to-consumer commerce, or C2C, is the electronic sale or
exchange of goods and services between individuals (e.g., auctions).
Discussion Question: Have you every sold anything on eBay? Used PayPal? Did
you have any problems? What would you warn people about?
60
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Web 2.0: The Social Web
Using Information Technology, 11e
• Web 2.0 refers to the web viewed as a medium in which interactive experience, in
the form of blogs, wikis, forums, social networking, and so on, plays a more
important role than simply accessing information.
• The move toward a more social, collaborative, interactive, and responsive web;
has led to the “social web,” giving rise to:
• Social networking sites: Online communities that allow members to keep track
of friends and share photos, videos, music, stories, and ideas (e.g., Facebook,
LinkedIn).
• Media-sharing sites: Online social networks in which members share media
such as photos, videos, music, ideas (e.g., YouTube, Flicker, Shutterfly).
• Social-network aggregators: Collect content from all of a user’s various social
network profiles into one place, then allow him or her to track friends and
share other social network activities (e.g., Mugshot, Readr).
61
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Web 3.0: Computer-Generated Information
Using Information Technology, 11e
• In Web 3.0, information will be computer-generated with less human
interaction required to discover and integrate that information.
• Two ideas might form the basis for Web 3.0— semantic markup and
a personal browser.
• Semantic markup: Data interchange formats that will allow machines to
understand the meaning—or “semantics”—of information on the web.
• The Web 3.0 browser will probably act as a personal assistant because every
user will have a unique Internet profile based on his or her browsing history.
The more you use the Web, the more your browser learns about you and the
less specific you'll need to be with your questions.
62
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
2.6 The Intrusive Internet
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Snooping
Using Information Technology, 11e
• Email is not private
• Corporate management has the
right to view employees’ email.
• Friends can send email anywhere.
• Not all ISPs protect their customers’ privacy.
• Deleted emails can be retrieved from a hard disk.
64
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
• Spam: Electronic Junk Mail
•
•
•
•
•
•
•
Unsolicited email that takes up your time.
Delete it without opening the message.
Never reply to a spam message.
Do not click on “unsubscribe” at the bottom of an email.
When you sign up for something, don’t give your email address.
Use spam filters.
Fight back by reporting new spammers to www.abuse.net or
www.spamhaus.org.
65
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
• Spoofing
• Using fake email sender names so the message appears to be from a
different source, so you will trust it.
• If you don’t know the sender, don’t open it.
• Phishing
• Sending forged email directing recipient to fake website.
• Purpose: to entice people to share personal or financial data.
• Fake website looks like real website, such as a bank’s.
• Pharming
• Implanting malicious software on a victim’s computer that redirects the user to
an impostor web page even when the individual types the correct address into
his or her browser.
• Use websites with URLs that begin with “https://
• Some spyware removal programs can correct the corruption.
66
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Phishing Examples
Using Information Technology, 11e
Phishing examples
"YOUR NET ID ACCOUNT" Phishing
Scam (3/31/2013)
https://wiki.library.ucsb.edu/display/SYSPUB/Latest+Phishing+Attempts
67
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cookies
• Little text files left on your hard disk by some
Using Information Technology, 11e
•
•
•
•
•
websites you visit.
Can include your log-in name, password, browser
preferences, and credit card information.
Every time you load a particular website, the browser
sends the cookie back to the server to notify the website of your previous
activity.
Can make visiting these websites next time more convenient and faster.
But cookies can be used to gather information about you and your browsing
habits and history; this information can be used without your consent.
A first-party cookie is a cookie from a website that you have visited. Third-party
cookies are placed by trusted partners of the websites you visit. (Third-party
cookies are frequently placed by ad networks.)
68
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Spyware : Adware, Browser & Search Hijackers, & Key Loggers
Using Information Technology, 11e
• Spyware is software surreptitiously installed on your computer
via the web.
• Spyware hides on your PC/device and captures information
about what is on the it, such as keystrokes and passwords
69
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
• Adware, or pop-up generator, is a
kind of spyware that tracks web
surfing or online buying so that
marketers can send you targeted
and unsolicited pop-up and other
ads.
• Browser hijackers change settings in your
browser without your knowledge, often
changing your browser’s home page and
replacing it with another web page.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Search hijackers intercept your legitimate search requests made
Using Information Technology, 11e
to real search engines and return results from phony search
services designed to send you to sites they run.
• Key loggers, or keystroke loggers, can record each character you
type and transmit that information to someone else on the
Internet, making it possible for strangers to learn your
passwords and other information.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Malware
Using Information Technology, 11e
• There are many forms of malicious software—so-called malware—that can
harm a computer system, a common danger being viruses.
• A virus is a rogue program that migrates through the Internet or via
operating systems and attaches itself to different programs that spread
from one computer to another, leaving infections.
• The principal defense is to install antivirus software, which scans a
computer to detect viruses and, sometimes, to destroy them.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
How to Reduce Malware Risks
• Download virus protection software, such as McAfee VirusScan ( www.mcafee.com ) or Norton
Using Information Technology, 11e
•
•
•
•
•
•
•
•
•
AntiVirus ( www.symantec.com/nav ); then follow instructions for installing it on your machine. (Don’t
use antivirus software from companies you know nothing about.)
Scan your entire system with antivirus software the first time it’s installed; then scan it regularly after
that. Also scan any new CDs and drives before using them.
Don’t open, download, or execute any files, email messages, or email attachments if the source is
unknown or if the subject line of an email is questionable or unexpected.
Delete all spam and email messages from strangers. Don’t open, forward, or reply to such
messages.
Use webmail sparingly, since viruses can hide in the HTML coding of the email. Even
the simple act of previewing the message in your email program can activate the virus
and infect your computer.
Don’t start your computer with a flash drive, USB thumb drive, or CD/DVD in place.
Back up your data files regularly, and keep at least one backup device in a location separate from
your computer or use an online (cloud) backup service.
If you discover you have a virus, ask McAfee or Norton to scan your computer online; then follow its
directions for cleaning or deleting the virus. (A computer tech person can do this, too.)
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Passwords
• Never choose a real word or variations of your or your family’s name,
Using Information Technology, 11e
address, phone number, Social Security number, license plate, or birth
date.
• Don’t use passwords that can be easily guessed, such as “12345” or “password.”
• Avoid any word that appears in a dictionary. Instead, mix letters, numbers, and
punctuation marks in an oddball sequence of no fewer than eight characters, such as
2b/orNOT2b% and Alfred!E!Newman7. Or choose a password that is memorable but shift
the position of your fingers on the keyboard, so that, for instance, TIMBERWOLVES
becomes YO,NRTEP;BRD when you move your fingers one position right. For sensitive
sites, such as financial accounts, create long passwords, such as 15-character passwords.
• Don’t use the same password for multiple sites, so that if someone obtains the password
to one account, that person won’t have access to your entire online life.
• Don’t write passwords on sticky notes or in a notebook or tape them under your keyboard.
Don’t carry the passwords in your wallet. If you have to write down all your passwords, find
a safe place to put the paper, or use a software password manager, such as Kaspersky
Password Manager, RoboForm Everywhere, or Last Pass Premium.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.