Chapter 2 - Troup ISD

Download Report

Transcript Chapter 2 - Troup ISD

Lesson 2
The Internet
The Internet
 The largest and most
widely accessed
network is the Internet, a
worldwide network of
computers that is not
controlled by any one
organization. It allows
users to communicate
and access information
in a matter of seconds.
Searching the Web
 The World Wide Web
is used to search and
access information on
the Internet and
requires a Web Browser
application, such as
Microsoft Internet
Explorer to view the
Web site pages.
 A search engine is
used to locate
information on the Web.
A search engine usually
works by sending out an
agent, such as a spider .
They search a database
of Web pages for specific
words or phrases and
then list the hyperlinks
to the pages containing
the text.
Searching the Web
 The words or phrases used in a
search are called the search
criteria . Search criteria
should be carefully specified by
using keywords related to
the topic of interest. Ways to
specify search criteria are:
1.
Surrounding phrases with
quotation marks finds Web
pages that contain the entire
phrase exactly.
plus sign (+)
2. The
can be used to find pages that
contain specified words.
Separating the words with a
space has the same
effect.
3.
4.
The minus sign (-)
can be used to exclude
unwanted Web pages.
The logical operators
AND, OR, and NOT can also
be used. The operator AND
has the same effect as the +
and space. The operator OR
is used to find Web pages that
contain one word or another
or both. The operator NOT
has the same effect as - .
When operators are used in
search criteria, a Boolean
expression is formed, which
evaluates to either true or
false.
Citing Web Sources
 If information from a Web site is to be referenced or
quoted in a report, essay, or other document, a
citation must be used to give credit to the
original author and allow the reader to locate the cited
information. All sources of information used to
support research must be cited. This includes:
Email messages, graphics, sounds, video clips,
and news-groups postings
Citations for Online Sources
 A widely accepted form for citation is published by the
Modern Language Association often referred to as
MLA Style . General citation for material
located at a Web site:
Author’s Last Name, First Name MI. "Article Name." Name of Site.
Version Number. Name of institution/organization affiliated with
the site, date of resource creation (if available). Web. Date of access.
<URL>.
Example Citations
 Citing an entire website:
 The Purdue OWL Family of Sites. The Writing Lab and
OWL at Purdue and Purdue U, 2008. Web. 23 Apr.
2008.
 A Page on a Web Site
 "How to Make Vegetarian Chili." eHow.com. eHow, n.d.
Web. 24 Feb. 2009.
 An Article in a Web Magazine
 Bernstein, Mark. "10 Tips on Writing the Living Web."
A List Apart: For People Who Make Websites. A List
Apart Mag., 16 Aug. 2002. Web. 4 May 2009.
Multitasking
 Multitasking is an
0perating system
feature that allows more
than one application
to run at a time. The
Windows taskbar
displays buttons for each
open file or application.
Email and Help
What is E-Mail?
 E-mail means
electronic mail
and is the sending
messages
and files over a
and receiving of
communications network such as a
or the
Internet.
With
Microsoft
LAN
(Local
Area
Network)
Office, documents can be e-mailed directly from
within the
used to create the document or
sent as an
.
application
attachment
Email
 An e-mail
address
is required in order to send and
receive e-mail messages. E-mail addresses are provided
when you sign up with an
ISP (Internet
Provider
or a Webmail service.
A typicalService
e-mail address
is
similar to:
 The domain name includes the
domain
after the dot, which indicates the domain top
type.level
For
example, .com, .edu, .gov, .net, etc.
Email Clients
 An email client is software that is used to read
messages, create and send messages, list and organize
messages, and manage e-mail addresses in an address
book. Some popular e-mail clients are:
.
Outlook, Eudora, Yahoo! Mail, Gmail
E-Mail Etiquette and Ethics
 E-mail etiquette for composing messages includes:
 Be
.
concise
 Use manners
. Include “please” and “thank you” and
properly address people you do not know as Mr., Ms.,
Mrs., Dr., etc.
Spelling, grammar, capitalization
 Use proper
Do not use all capital letters to type a message—
this is the equivalent of SCREAMING!
Re-read
before

a messageTo:
it Subject:
is sent.
 Always fill in the box and the
box.
Email
Crime
Spoofing

is the
unethical and illegal
practice of providing a
Subject that lures an
individual into opening
an e-mail about an
entirely different topic.
Email
Ethics
Using e-mail requires following a code of ethics:
 Send messages through your
only.
account
subject in the message header short and
 Keep the





truly representative of the message.
subject
language
Use appropriate
matter and
.
beliefs
Be considerate of other people’s
and
opinions
.
Respond to e-mail in a timely manner.
Do not attempt to access e-mail from someone else’s
permission
account without
.
Do not give out someone’s e-mail address without their
permission
.
Email Messages
 E-mail messages are not

private
!
Employers and
have
school administrators
the right to read any e-mail
messages sent over the
corporate or school network,
as well as the right to track
activity.
online
Using
Outlook
 The Microsoft Outlook email client is a
personal information
manager with tools for
managing e-mail
messages.

Outlook Today
is displayed when Outlook
is started. Click the
link or the
folder toMessages
display the
Mail Window. Inbox
Creating/Sending Email
 To create a new e-mail
message, click
on
New
the toolbar or select
.
File-New-Mail Message
 To retrieve messages
from the e-mail server,
click
.
Send/Receive
The Address Book
 The Address Book stores
contact
names and
e-mail addresses. To add a new contact, select
File-New
. An e-mail address
canEntry
also be
selected by clicking
or
A
list
a group of related
To:consists of
Cc…
contacts
and is used to send messages to a group of
distribution
people.
E-Mail Attachments
 In a new message window, click
Insert – Attach
File
to attach a file. The name of the
attached file is displayed in the
box
in the e-mail
header. The recipient can choose to
Attachment
the attachment or
it directly.
save
open
Attachments
 To open an attachment, the
recipient will need to have
theapplication
appropriate
. The best solution to
keep all document formatting
is to export the file to
format before attachingPDF
it to
e-mail. To view a PDF,
recipients use
, a free
Adobe Reader
application
from Adobe
Systems.
 When a folder of files is to be
attached to an e-mail, a
compression utility,
such as
WinZip
, is needed to maintain
the folder structure and
compress the files into one
file. The recipient must
.zip
then use
the same utility to
the files.
extract
Organizing E-mail Messages
Deleted Items
Related e-mail messages should be
organized into
.
folders
-click the folder name and
Right
then select New Folder to display
the Create New Folder dialog box.
These folders are displayed in the
Navigation Pane:


messages.
Inbox
stores received
stores
messages
have been sent.
Sentthat
Items

stores
messages that have been deleted
until they are permanently deleted
or retrieved.

Drafts stores unfinished
messages that have been
automatically saved.

Outbox stores messages that
be been created and not yet sent.

stores
received
messages
that have a
Junk
E-mail
subject line or e-mail address which
has been flagged by antivirus
software or another e-mail filtering
system.
E-mail Security
 Junk mail is often
referred to as spam .
Outlook has a
folder, which
Junk E-mail
catches obvious
messages.
Crime
Cybercrime

includes the delivery of malicious code in an
e-mail message.
have varying
effects, such as
Viruses
displaying annoying messages, causing programs to run
incorrectly, and erasing the contents of the hard drive. A
appears like a useful computer program, but
actually causes damage to data and can download stronger
threats.
A Horse is a malicious program that can replicate
Trojan
itself, use up a system’s memory, and bring the system down.
worm
Crime
 A growing phishing
security threat
ispharming and
e-mails. Both
involve online
fraud
and are forms of
cybercrime. The crime is
also known as
 Invest in

software.
update
antivirus
the antivirus
software frequently.
 attachment
Always save an
file and then virusthe file
identity theft checkbefore
opening it.
personal
 Precautions that should be
 Protect your
taken to minimize the
information and
review
bank
credit
card
possibility of malicious
and
code are:
statements regularly.
Using
Microsoft
Office
Help
 The Microsoft Office Help
window is displayed by
clicking
or by
pressing
the
key. The
Help?
Help window functions
F1
much like a
.
 HelpWeb
also supports
browser
search for finding
Help topics below the
keyword
toolbar
in the
box.
search