Transcript Chapter 1

Chapter 1
Let’s Get
Online, Already!
Online Activity
- Many activities involve “Seeking Information”
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-2
Connecting to the Internet
• Methods
– Internet Service Provider (ISP)
A company that provides a home or business access to the internet
– Local Area Network (LAN)
A collection of computers and resources, such as printers and shared
network drives, spread out over a localized area.
– Wide Area Network (WAN)
A collection of computers and resources, such as printers and shared
network drives to store files, spread out over a wide area.
– Telecommunications and Fiber Optic Lines
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-3
Connecting to the Internet
• Materials
– To Update need
• Random Access Memory Fast computer memory that provides
temporary storage required for programs
to run.
• Hard drive upgrade
– Modem (Modulator/ demodulator)
A device connecting a computer to a communications network by
translating a signal such that it is suitable for a channel through which it
must pass.
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-4
Connecting to the Internet (Cont’d)
• What does Internet Service Include?
– Email address
– Ability to surf the web
– Storage space
– 24/7 Technical Support
– Spam filter
Unsolicited email or newsgroup postings
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-5
Data Travels
• In two directions
– Downloading
– Uploading
Data transmission from another computer over
the Internet received by your computer
Sending data transmissions from your computer
to another computer on the Internet
• Bandwidth is measured in
The data transmission rate over a network or the Internet
(Kilobits per Second) one-thousand bits per second, roughly
125 characters per second
– Kbps
– Mbps
– Gbps
(Megabits per Second) one million bits per second, roughly
1250 characters per second
(Gigabits per Second) one-billion bits per second, roughly
12,500 characters per second
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-6
Dial-up Services
1. Traditional Dial-up Services
2. Broadband Services
–
Telephone
•
•
–
–
DSL (Digital Subscriber Line) a high-speed telephone Internet connection
ADSL (Asymmetrical Digital Subscriber Line) uses the frequencies not
Cable
Satellite
3. Wi-fi
–
–
used for voice, transmits data over them
(Wireless Fidelity) high-frequency wireless LAN
Hotspots Location where a wireless signal can be detected
Wardriving Technique of driving around a city in a vehicle, with a
notebook computer and antenna, detecting open WLANs
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-7
Wireless at Home
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-8
ISPs for Travelers
• ISP resource http://www.thelist.com
• Look for national dial-up service
• Hotels
• Cyber cafes
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-9
Connecting to Work
• Local Area Networks (LAN)
– Gateway
A special-purpose computer used by ISPs,, which connects to
a powerful leased Internet line, such as T3 or OC48
– Ethernet
A method of networking computers using copper cabling
– Protocol
A system of communicating data from one location to another
• Intranets
• VPN
–
–
–
–
An internal Internet for employees to access information about a
company; not meant for public consumption
(Vitrual Private Network) A LAN or series of of LANS that are
secured behind a firewall or gateway, and have restrictions for
user connections
VPN Dial-up Network (VPDN) Way to connect to VPN at work
Software to connect to NAS
Desktop client software
Network Access Server (NAS) Connects user and VPN
Employing a protocol to connect to a VPN
Tunneling
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-10
Acceptable Use Policies and
Privacy Policies
• Transmited information- Who is responsible?
• Acceptable Use Policy (AUP)
A legal document, written to protect ISPs, corporations and educational
institutions from unlawful use of its service, and in doing so, outlines
prohibited and acceptable uses of the service, and possible
consequences of misuse.
• Right to suspend service
• Privacy Policy
Document that outlines an Internet Service Provider’s policy for
protecting your personal information
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-11
Hand-Held and Other Devices
• Internet without a computer?
• Cell phones
• PDAs ex: Blackberry
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-12
Internet Software
• In order to Surf the Web…
Figure of speech: describes
browsing the Web
– Web Browser Software used to download and view Web pages
(Uniform or Universal Resource Locator) Web page address
– URL’s
• Protocol
System of communicating data from one location to another
• HTML
(HyperText Markup Language) language used to construct Web
pages
• http
(HyperText Transfer Protocol) protocol governing exchange of files
on the Web
• https
• mailto:
• ftp://
(HyperText Transfer Protocol Secure) specific protocol set employed
when a page of a Web site must be encrypted for secure transfer
Protocol for sending mail
(File Transfer Protocol) protocol for sending files
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-13
Web Browser Basics
Learn more…
http://www.aw.com
http://www.yahoo.com
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-14
Other Web Browser Basics
• Temporary Files (Cache)
• Clearing the Cache
– Temporary Files
Temporary files stored on the hard
drive
Term used by Internet Explorer to
describe the files in the cache
• Missing Page Errors (“404 Error”)
• Bookmarks and Favorites
• History and Clearing the History
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-15
More Browser Basics
Browser Options and Features
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-16
More Browser Basics
Setting the Home Page
Advertisements on the Web
click-through rates, pop-ups, pop-unders, pop-up blocker
Email Clients
Client software that works in conjunction with a server
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-17
Security Risks
• Virus
•
•
•
•
•
Small program that can that causes destruction ranging
from simple annoyances to rendering the computer
inoperable
program designed to gather information such as
Trojan Horse Small
passwords to send to the person who wrote it
Program designed to copy itself and send itself to other
Worm
computers on the network (worms may contain viruses)
Advertising-supported software
Adware
Any computer program that takes advantage of your
Spyware
Internet connection and tracks your internet use
Browser Hijacker A program that is designed to change the settings
• Web Bug
on your Web browser: home page hijacker,
browser helper objects
A small invisible image on a Web page that is designed to
track the Web pages you view as you surf other pages that
also contain Web bugs
• mDDos
Mini Distributed Denial of Service Attacks
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-18
Security Measures
1.
2.
3.
4.
5.
Choose a good ISP
Keep your computer up to date
Anti-virus software
Spyware removal software
Install fireware software or use in a router
Providing Credit Card and Other
Sensitive Information
Encryption: Encryption Symbol
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-19
Downloading Software
• (http://www.download.com) (http://www.tucows.com)
• Commercial Software
Software that is purchased, either online or from a retail outlet
• Shareware
Software that may be freely distributed and is essentially on a trial basis
• Freeware
Software that is completely free and may be freely distributed
• Open Source
The source code, or original program, is made available and others are
invited to help with the development and submit improvements,
becoming part of the group who is developing it. Open source can also
mean that the software use requires a paid license, and the source code
is available.
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-20
What Happens When You
Connect?
•
Internet Protocol (IP) Address
A numeric identifier for a computer or peripheral device connected to a network
•
•
Domain Name System (DNS)
– Host
Computer connected directly to the internet
Troubleshooting
1. Pay attention to each character
2. Click stop then reload
3. Try loading a different page
Copyright © 2006 Pearson Addison-Wesley. All rights reserved.
1-21