Transcript Internet
Chapter 2
Technology Essentials
© John Wiley & Sons Canada, Ltd.
2-1
WHAT WE WILL COVER
• The Components of IT
• The Internet
• The World Wide Web
• Internet Security
• Meaningful Applications of Technology
© John Wiley & Sons Canada, Ltd.
2-2
THE COMPONENTS OF IT
All IT, including computers, mobile
phones, and PDAs, are actually limited to
the following capabilities:
◦
◦
◦
◦
◦
accepting and storing information
performing mathematical calculations
applying logic to make decisions
retrieving, displaying, and sending information
consistently repeating the above actions many
times
© John Wiley & Sons Canada, Ltd.
2-3
IT CATEGORIES
Hardware
◦ the electronic and mechanical components
that you can see and touch
Software
◦ the set of instructions that direct the
hardware
Networks
◦ technology that allows users to share
resources (hardware, software, & information)
© John Wiley & Sons Canada, Ltd.
2-4
THE THREE BASIC CATEGORIES
TOGETHER MAKE UP WHAT IS
KNOWN AS A PLATFORM
© John Wiley & Sons Canada, Ltd.
2-5
ALL IT DEVICES SHARE A
COMMON SET OF SIX SYSTEM
COMPONENTS
© John Wiley & Sons Canada, Ltd.
2-6
COMPUTER HIERARCHY
Mainframe
Relative
Processing
Power
Largest and
fastest
Large
Server farms
Medium/many
Personal
computer (PC)
Personal digital
assistant
(PDA)/Tablets/
Smart phones
Embedded
processors
Small to
medium
Very small
Computer
Type
Supercomputer
Extremely small
Purpose
Performs processor intensive computations using parallel
processing.
Carries out many of the organizational processing needs
using high-speed processing chips and large amounts of
memory.
Allows multiple servers to handle network processing
activities.
Enables users to carry out processing tasks needed to
perform their job; usually networked together.
Provides users with portable computing power; often using
specially designed applications, and enable the ability to
connect to the Internet and e-mail
Provides low-scale processing and/or identification;
embedded in appliances and products.
2-7
SOFTWARE TYPES
System Software
◦ software required to control the hardware
components and to support the execution of
application software
Application Software
◦ complete, self-contained program or set of programs
for performing a specific job
Middleware
◦ its purpose is to link applications that use dissimilar
software or hardware platforms
Open Source Software
◦ software that can be used, modified, improved, and
redistributed
© John Wiley & Sons Canada, Ltd.
2-8
NETWORKS
Today, the fastest-growing network is
arguably our global computer
network, known as the Internet
© John Wiley & Sons Canada, Ltd.
2-9
COMPONENTS OF A NETWORK
data (the resource) that computers share
on the network
special hardware
software that allows computers to
communicate and share the data
communication media to link the
computers together
© John Wiley & Sons Canada, Ltd.
2-10
TYPES OF NETWORKS
Network
PAN (private area
network) (private)
LAN (local area network)
(private)
MAN (metropolitan area
network) (private/public)
Size
Covers a very small space
that ranges from the size of
a human body to a small
office
Within the immediate
location or building
WAN (wide area network)
(private/public)
Ranges in size from a few
blocks to an entire
metropolitan area
Over a large geographical
area
Internet (public)
Worldwide
© John Wiley & Sons Canada, Ltd.
Purpose
Communication among
computer devices in close
proximity
Share files, resources,
servers, and other
hardware among the
members of an
organization
Provides data and voice
transmission typically at
high speeds (≈100 Mbps)
Share data, information,
and resources among units
of an organization distant
from one another
Share data and information
with all stakeholders in the
organization, as well as
with the general public
2-11
THE INTERNET
any computer network that connects
several networks together is an internet
(short for inter-networking)
no single organization or governmental
entity owns it. Instead, several
international organizations provide
committees that discuss and propose
Internet standards
© John Wiley & Sons Canada, Ltd.
2-12
WHAT MAKES THE INTERNET
POSSIBLE?
The Internet uses the TCP/IP suite of
packet switching protocols. This is a very
general, non-proprietary set of
communication rules. By adopting these
rules and making software compatible
with the TCP/IP standards, any computer,
regardless of the platform, processor, and
OS, can connect and communicate over
the Internet
2-13
ACCESSING THE INTERNET
Most users do not connect directly to the
Internet. Instead, they contract with an
Internet service provider (ISP).
◦ Connect at home through dial-up (traditional
phone lines), broadband (cable or ISDN)
◦ Connect at work through a WAN or LAN
© John Wiley & Sons Canada, Ltd.
2-14
THE WORLD WIDE WEB
For many, the Internet is synonymous with
two of its most popular applications:
◦ the World Wide Web (WWW), including ecommerce, and
◦ electronic mail (email).
However, the World Wide Web, often called
simply the Web, is not the same as the
Internet.
Think of the Internet as the technology
platform, and the Web as an application that
works on that platform.
© John Wiley & Sons Canada, Ltd.
2-15
BASIC TECHNOLOGIES REQUIRED
TO MAKE THE WEB WORK
client/server networks—the networks
over which data travel
browser—application software that lets
users request and view web pages
HTTP protocol—the standardized rules
for exchanging data over the Web
HTML—the language that guides the
display of a requested page
© John Wiley & Sons Canada, Ltd.
2-16
THE SEQUENCE OF ACTIVITIES ON
THE WEB OVER A CLIENT/SERVER
NETWORK
© John Wiley & Sons Canada, Ltd.
2-17
COMPONENTS FOR DISPLAYING
AND VIEWING A WEB PAGE
© John Wiley & Sons Canada, Ltd.
2-18
INTERNET SECURITY
Internet security is seen as a serious issue
around the world
In 2010, the Internet Crime Complaint
Center ranked Canada as fifth in the world
for the origin of Internet crime perpetrators
and second in the world for the number of
complaints about Internet crime
It is important to remember that both
individuals and enterprises can be the
victims of Internet crime
© John Wiley & Sons Canada, Ltd.
2-19
COMMON INTERNET SECURITY
THREATS
Security Threat
Malware
Scareware
Virus
Description of Threat
The use of malicious code as part of a subversive, organized
scheme. Such schemes are resulting in massive intrusions
into sensitive financial and intellectual property areas.
Viruses, worms, and trojans are all types of malware.
A type of malware designed to trick victims into purchasing
and downloading useless and potentially dangerous
software. Ironically, scareware is often disguised as virus
protection software and shows a window telling you that
your PC is not being protected or is currently infected.
A program that is able to copy itself and infect a computer.
Viruses are designed to spread to as many computers as
possible. It usually needs some human action, like opening
an email attachment, to occur in order to spread. There are
thousands of known viruses on the Web. Most PC users use
anti-virus software to prevent viruses.
© John Wiley & Sons Canada, Ltd.
2-20
COMMON INTERNET THREATS (cont’d)
Worm
Spam (electronic)
Phishing
Denial of Service
Attack (DoS)
Destructive software that can spread by itself, such as
MyDoom and its later version, DoomJuice. The MyDoom
worm is particularly nasty. Once started on a computer (by
clicking an email attachment), it automatically sends out
infected emails to everybody in the user’s address book, using
one or more of the names on the address book as the sender. In
addition to overwhelming email servers around the world (at
one point, the virus generated as many as one in three emails
in circulation), it creates a “back door” to allow a system to be
used to further propagate viruses and malware.
Unsolicited and undesired emails. Aside from being annoying,
spam may facilitate the installation of malware or phishing.
An attempt to gain personal and confidential information (e.g.,
passwords, credit card information) for fraudulent purposes
such as identity theft.
An attempt to make a website unavailable to its users. An
attacker will do this by sending a target so many
communication requests that the target server eventually goes
down and becomes unavailable. No website is safe from DoS
attacks. Both Twitter and Facebook have been the victims of
DoS attacks.
© John Wiley & Sons Canada, Ltd.
2-21
ACTIONS TO MINIMIZE INTERNET
SECURITY THREATS
Install, and keep up to date, both antivirus
software and a personal firewall
Update your software, such as Windows, to
patch security holes or move to less
vulnerable systems, like Linux
Do not open email messages or attachments
from unknown sources
Follow safe computing practices, such as
effective password policies
© John Wiley & Sons Canada, Ltd.
2-22
MEANINGFUL APPLICATIONS OF
TECHNOLOGY
Hardware, software, networks, the
Internet, the web, and Internet security
are meaningless unless it has a function
and creates a benefit.
◦ For businesses, this benefit might be the
creation of value and competitive advantage.
◦ For individuals, it may mean being more
efficient and productive.
© John Wiley & Sons Canada, Ltd.
2-23
COLLABORATION
◦
◦
◦
◦
Groupware
Intranets
Instant messaging (IM)
Virtual meetings
© John Wiley & Sons Canada, Ltd.
2-24
RECAP
1.
What are the fundamentals of information
technology that will help increase your productivity
as a business professional?
2.
How do software and hardware come together to
create business capability?
3.
What makes the Internet and World Wide Web so
valuable?
© John Wiley & Sons Canada, Ltd.
2-25