You are on page 1of 74

The Internet &

the World
Wide Web:
Exploring
Cyberspace

Chapter

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Chapter 2 Topics

Using Information Technology, 11e

UNIT 2A: The Internet & the Web


UNIT 2A: The Internet & the Web
2.1 Connecting to the Internet: Narrowband, Broadband, & Access Providers
2.1 Connecting to the Internet: Narrowband, Broadband, & Access Providers
2.2 How Does the Internet Work?
2.2 How Does the Internet Work?
2.3 The World Wide Web
2.3 The World Wide Web

UNIT 2B: The Riches & Risks of Internet Use


UNIT 2B: The Riches & Risks of Internet Use
2.4 Email & Other Ways of Communicating over the Net
2.4 Email & Other Ways of Communicating over the Net
2.5 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce,
2.5 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce,
& Social Networking
& Social Networking
2.6 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies,
2.6 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies,
& Spyware
& Spyware

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

UNIT 2A: The Internet & the Web

The Internet began in 1969 as ARPANET.


The Internet was text-only. In the early 1990s,
multimedia became available on the Internet, and
the World Wide Web (web) was born.

This is the first image


uploaded to the web,
in 1992.
3

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

To connect to the Internet you need


1. An access device (computer with modem)
2. A means of connection (phone line, cable
hookup, or
wireless)
3. An Internet access provider

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

2.1 Connecting to
the Internet
Narrowband, Broadband,
& Access Providers

5
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

However you connect to the Internet, the bandwidth


will determine the speed of your connection.

Bandwidth: Expresses how much data can be sent


through a communications channel in a given
amount of time.

Baseband: Slow type of connection that allows

only one signal to be transmitted at a time.

Broadband: High-speed connections.


6

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Physical connection to Internetwired or wireless?


Telephone [dial-up] modem
High-speed phone lineDSL, T1/T3
Cable modem
Wirelesssatellite and other through-the-air links

7
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Data Transmission Speeds

Originally measured in bits per second (bps)


8 bits are needed to send one character, such as A or a
Kbps connections send 1 thousand bits per second
Mbps connections send 1 million bits per second
Gbps connections send 1 billion bits per second

Uploading & Downloading


Uploadtransmit data from local to remote computer
Downloadtransmit data from remote to local computer
8

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Narrowband (Dial-Up Modem): Low speed but


inexpensive
Telephone line = narrowband, or low bandwidth, low
speed
Dial-up connectionuse of telephone modem to
connect to Internet (used mostly in rural areas on POTS,
or plain old telephone system)

Telephone Modems
Can be either internal or external
Maximum speed of 56 Kbps
Most ISPs offer local access numbers

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Telephone (Dial-Up) Modem

Panel
Panel 2.3
2.3
Page
Page 55
55

10
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

High-Speed Phone Lines


More expensive but available in cities & most towns
DSL line

Uses regular phone lines, DSL modem


Receives data at 7 105Mbps; sends at about 384 Kbps 1 Mbps
Is always on
Need to live no farther than 4.5 miles from phone company switching office
Not always available in rural areas

T1 linevery expensive
Traditional trunk line, fiber optic or copper; carries 24 normal
telephone circuits
Transmission rate of 1.5 6 Mbps (T3 = 6 47 Mbps)
The last mile can still be a problem
Generally used by large organizations
11

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

High-Speed Phone Lines

Using Information Technology, 11e

Cable modem
TV cable system with Internet connection; company usually
supplies cable modem
Is always on
Receives data at up to
100 Mbps; sends at
about 2-8 Mbps

12
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Basic DSL/Cable-PC system

Panel
Panel 2.4
2.4
Page
Page 57
57

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Satellite Wireless Connections

Using Information Technology, 11e

Transmits data between satellite dish


and satellite orbiting earth
Connection is always on
Requires Internet access provider with 2-way
satellite transmission
User needs to buy or lease satellite dish and
modem and have them connected

14
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Other Wireless: Wi-Fi, 3G, & 4G


Wi-Fistands for wireless fidelity
Name for a set of wireless standards (802.11) set by IEEE
Transmits data wirelessly up to 54 Mbps for 300 500 feet
from access point (hotspot)
Typically used with laptops and tablets that have Wi-Fi
hardware

3G = third generation; uses existing cellphone system;


handles voice, email, multimedia

4G = fourth generation; faster than 3G; built specifically for


Internet traffic but not standard yet
Both 3G and 4G used mostly in smartphones

15
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Internet Access Providers (ISPs)

Using Information Technology, 11e

ISP: Local, regional, or national organization that provides


access to the Internet for a fee e.g., Comcast, Charter,
AT&T.
Wireless Internet Service Provider (WISP) e.g., AT&T,
T-Mobile, Verizon Wireless, Sprint, Credo
Enables wireless-equipped laptop/tablet and smartphone
users to access Internet

16
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

2.2 How Does the


Internet Work?

17
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

The Internet is basically a huge network that


connects hundreds of thousands of smaller
networks.
Central to this arrangement are client/server
networks
Client: computer requesting data or services
Server or host computer: central computer supplying
data or services requested of it
Client
18
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Internet Connections: POP & IXPs

Point of Presence (POP)


A collection of modems and other equipment in a local
area
A local gateway (access) to an ISPs network
ISP connects to an IXP
Internet Exchange Point (IXP)
A routing computer at a point on the Internet where
several connections come together
IXPs are run by private companies
Allow different ISPs to exchange Internet traffic
(continued)
19

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Internet Connections: Backbone, &


Internet2

Using Information Technology, 11e

Internet Backbone
High-speed, high-capacity data transmission lines, usually
fiber optic
Uses the newest technology
Providers include AT&T, Sprint, Verizon, CenturyLink, and
Deutsche Telekom

Internet 2
Cooperative university/business education and research project
Adds new toll lanes to older Internet to speed things up
Advances videoconferencing, research, collaboration
20

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

How the Internet


works

Panel
Panel 2.5
2.5
Page
Page 59
59
21

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Internet Communications: Protocols,


Packets,
& IP Addresses

Using Information Technology, 11e

Handshaking & Authentication: Connecting to your ISPs


point of presence (POP)
Handshakingfastest transmission speed established
Authenticationcorrect password & user name

Protocols
The set of rules a computer follows to electronically transmit data.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the
Internet protocol
Developed in 1978 by ARPA; used for all Internet transactions

Packets
Fixed-length blocks of data for transmission, determined by TCP/IP
Data transmissions are broken up into packets and re-assembled at
destination (the IPInternet Protocol address)
22

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

IP (Internet Protocol) Addresses


Every device connected to the Internet has an address
Each IP address uniquely identifies that device
The address is four sets of numbers

separated by periods (e.g., 1.160.10.240)


Each number is between 0 and 255
Dynamic IP addresses change with
every use; individual computer users
are assigned static IP addresses when
they log on
Static IP addresses dont change
(established organizations including
ISPs and companies have static IP
addresses, which they pay for)

23

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Who Runs the Internet?


Basically, no one owns the Internet
The board of trustees of the Internet Society (ISOC)
oversees the standards
Internet Corporation for Assigned Names
and Numbers (ICANN) regulates domain
names (such as .com, edu., .net) that
overlie IP addresses; ICANN
does not
control content

24
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

2.3 The World Wide


Web

25
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

The Face of the Web: Browsers,


Websites,
& Web Pages
The World Wide Web brought multimedia to the Internet.
The web and the Internet are not the same; the web is
multimedia-based, and the Internet is not. The Internet is the
infrastructure that supports the web.
A browser is software that gets you to websites and their
individual web pages and displays the content in such a way
that the content appears mostly the same regardless of the
computer, operating system, and display monitor.
Examples = Internet Explorer
Mozilla FireFox
Apple Macintoshs Safari
Googles Chrome
Microsofts Bing
26
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Website
The location on a particular computer (server) that has a
unique address; example = www.barnesandnoble.com,
www.mcgraw-hill.com
The website (server) could be anywhere not necessarily at
company headquarters

Web Page
A document on the web that can include text, pictures, sound,
and video
The first page on a website is the Home page
The Home page contains links to other pages on the website
(and often other websites)
27

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

How the Browser Finds Thing:


URLs
Using Information Technology, 11e

Uniform Resource Locator (URL): address for a


web page

A character string that points to a specific piece of


information anywhere on the web
A websites unique address
It consists of

The
The
The
The

web protocol, http://


domain name of the web server
directory name or folder on that server
file within the directory, including optional extension

28
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

The Nuts & Bolts of the Web: HTML


& Hyperlinks
TCP/IP As explained (p. 60), general Internet Protocol
HTTPProtocol Used to Access World Wide Web
Hypertext Markup Language (HTML)
The markup language used in writing and publishing web
pages
Set of instructions used to specify document structure,
formatting,
and links to other documents on the web

Hypertext
links connect
one web
document to another
Tim Berners-Lee
saw the possibility
of using

hypertext link

hyperlinks to link any information to any other


information over the Internet.
29

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Your Browser to Get around


the Web
Using Information Technology, 11e

Web browsers interpret HTML and allow you to move


around the Internet and the web
Come preinstalled on most PCs, but you can download others
5 basic elements

URL (address)bar
Menu bar
Toolbar
Workspace
Status bar
(displays current status of the
web age; 100% = fully loaded)
30

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Browsers Home Page


The page you see when you open your web
browser
You can change the Home Page on your browser

Back, Forward, Home


Use the browsers icons to
move from one page to another
(these icons can appear on
different bars in
different browsers)
31

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Navigation
History List
A list of websites you visited since you opened up your browser for
this session
Allows you to easily return to a particular site

Bookmark
Allows you to store the URL from a site on your computer so you
can find it again in another browser session
To save the URL for a site, click on Favorites in Internet Explorer,
Bookmarks in Mozilla Firefox, or the star icon in the URL address
bar in Chrome
32

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Interactivity with a web page


Click on hyperlinks to transfer to another page
Click on a radio button to choose an option
Type text in a text box
and then hit Enter
Click on scroll arrows to move up and down,
or side to side, on a page
Click on different frames
(separate controllable
sections of a web page)
33
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Web portals: Starting points for finding information


A portal is gateway website that offers a broad array of

resources and services, online shopping malls, email


support, community forums, stock quotes, travel info, and
links to other categories
Examples: Yahoo!, Google, Bing, Lycos, and AOL
Most require you to log in, so you can
Check the Home page for general
information
Use the subject guide to find a topic
you want
Use a keyword to search for a topic

34
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Search Services & Search Engines

Using Information Technology, 11e

Organizations that maintain databases accessible through


websites to help you find information on the internet

Examples: portals like Yahoo! and Bing, plus Google, Ask.com,

Gigablast
Search services maintain search enginesprograms that users can
use to ask questions or use keywords to find information
Databases of search engines are compiled using software programs
called spiders (crawler, bots, agents)
Spiders crawl through the World Wide Web
Follow links from one page to another
Index the words on that site
A search never covers the entire web
Search engines differ in what they cover
35

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Four Web Search Tools

Using Information Technology, 11e

1. Individual Search Engines


Compile their own searchable databases on the web
You search by typing keywords and receiving hits
Examples are Ask, Bing, Google, and Yahoo!

2. Subject Directories
Created and maintained by human editors, not electronic
spiders
Allow you to search for information by selecting lists of
categories or topics
Example sites are Beaucoup!, LookSmart, Open Directory
Project, and Yahoo! Directory

(continued)

36

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

3. Metasearch Engines
Allows you to search several search engines simultaneously
Examples are Yippy!, Dogpile, Mamma, MetaCrawler, and
Webcrawler

4. Specialized Search Engines


Help locate specialized subject matter, such as info on
movies, health, jobs
Examples are Career.com. WebMD, Expedia, U.S. Census
Bureau

37
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Smart Searching: Three General


Strategies

Using Information Technology, 11e

If youre just browsing . . .


Try a subject directory
Next try a metasearch engine

If youre looking for specific information . . .


Try a Answers.com one-click search
Or go to a general search engine, then a specialized one

If youre looking for everything on a subject . . .


Try the same search on several search engines

38
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Wikis & Wikipedia

Using Information Technology, 11e

A wiki is a simple piece of software that can be


downloaded for free and used to make a website
(also
called a wiki) that can be corrected or added
to by anyone.
Wikipedia is a free online encyclopedia that anyone
around
the world can contribute to or edit. It has
more than 25
million articles in more than 285
languages; over 4.1
million articles appear in the
English Wikipedia alone. However, Wikipedia is not
considered reliable or
authoritative by many
academics and librarians.

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Multimedia Search Tools

Using Information Technology, 11e

Still imagese.g., Google Image Search, Bing Images,


Fagan Finder
Audioe.g., Yahoo! Music, Lycos MP3 Search
Videoe.g., AlltheWeb, AOL.video
Scholarlye.g., Google Scholar

40
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Tagging

Using Information Technology, 11e

Tags: Do-it-yourself labels that people can put on


anything found on the Internet, from articles to
photos to videos, that help them to find their favorite
sites again and to link them.
Can be shared easily with other people
Tags are commonly used on blogs and YouTube word
listed at the bottom. Essentially tags are keywords used to
classify content. (The # is a hash symbol; thus the Twitter
term hashtag. )
Tag managing is available through delicious.com and
BlinkList, among other companies.
41
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

UNIT 2B: The Riches & Risks of Internet Use

42
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

2.4 Email, Instant


Messaging, & Other
Ways of
Communicating over
the Net
43

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Email

Using Information Technology, 11e

Outgoing mail: sent from your computer to a


Simple Mail Transfer Protocol (SMTP) server run by
your ISP
Incoming mail: Email sent to your computer: uses
Post Office Protocol version 3 (POP3)

44
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Page
Page 77
77
45

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Two ways to send & receive email:


1. Email Program
Enables you to send email by running email software on your computer
that interacts with an email server at your Internet access provider
Incoming mail is stored on the server in an electronic mailbox
Upon access (your ID and password), mail is sent to your softwares inbox
Examples: Microsoft Outlook, Apple Mail

2. Web-Based Email
You send and receive messages by interacting via a browser with a website
Advantage: You can easily send and receive messages while traveling,
using any computer or equipped mobile device
Examples: Yahoo! Mail and Gmail (Google)
Disadvantages are ads and email hacking
46

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Using email
Get an email address from your ISP, following this format:

47
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Tips for Using Email


1. Use the address-book feature to
store email addresses
2. Use folders to organize email
3. Be careful with attachments
4. Be aware of email netiquette

48
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Email Attachments
A copy of a file or document that you send attached to an
email to one or more people
Recipients must have compatible software to open the
attachment; for example, if they dont have Excel, they
probably cant read the spreadsheet you sent them.
Be careful about opening attachments:
Many viruses hide in them; scan them with antivirus software
Know who has sent the attachment before you open it

49
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Netiquette: Appropriate Online


Behavior

Dont waste peoples time.


Dont write anything that you would not say to a persons face.
Include helpful subject and signature lines.
Be clear and concise.
Avoid spelling and grammatical errors.
Avoid SHOUTING and flaming.
Also:
Be careful with jokes.
Avoid sloppiness, but avoid criticizing others sloppiness.
Dont send huge file attachments unless requested.
When replying, quote only the relevant portion.
Dont overforward (dont copy emails to everyone you know).
50

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Instant Messaging

Using Information Technology, 11e

Instant messaging enables you to communicate

by email with
specified other users (buddies) in real time.
Any user on a given email system can send a message
and have it pop up instantly on the screen of anyone
logged into that system.
To get IM: Download IM software from a supplier
Examples: AOL/AIM, Google Chat, Windows Messenger,
Yahoo! Messenger
Done on computers; is not the same as texting.
51

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Discussion Groups

Using Information Technology, 11e

Mailing Lists:
One-way (to make announcements) or two-way (for discussions) email
subscription lists
Email discussion groups on special-interest topics, in which all subscribers
receive email messages sent to the groups email address

Newsgroups:
Giant electronic bulletin board for written discussions about specific subjects
To participate you need a newsreader program

Message Boards:
Special-interest discussion groups without newsreaders
Accessed through a web browser
A collection of messages on a particular topic is called a thread
52

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

FTP (File Transfer Protocol)

Using Information Technology, 11e

Software standard for transferring large files

between computers, including those with


different operating systems
You can also transfer files from an FTP site on
the Internet to your PC
FTP sites offer many free files
FTP sites may be either public or proprietary
You can download using your web browser or FTP
client programs, such as Fetch, Cute, FileZilla, and
SmartFTP
53

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

2.5 The Online


Gold Mine
Telephony, Multimedia, Webcasting,
Blogs, E-Commerce, & Social
Networking

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Telephony: The Internet Telephone

Using Information Technology, 11e

Uses the Internet to make phone calls via VoIP

(Voice over Internet Protocol)


Long-distance calls are either very inexpensive or free
With no PC, dial a special phone number to packetize
your call for a standard telephone
Use with a PC that has a sound card, microphone,
Internet connection with modem & ISP, and internet
telephone software such as Skype and Vonage
Also allows videoconferencing
55

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Multimedia on the Web


Allows you to get images, sound, video, and animation
May require a plug-in, player, or viewer
A downloadable program that adds a specific feature to a
browser so it can view certain files
Examples: Flash, RealPlayer, QuickTime

Multimedia Applets
Small programs that can be quickly downloaded and run by
most browsers
Java is the most common Applet language

Text & Images: great variety available


Example: Google Earth
(continued)

56

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Animation
The rapid sequencing of still images to create the appearance

of motion
Used in video games and web images that seem to move, such
as banners

Video & Audio


Downloaded completely before the file can be played, or
Downloaded as streaming video/audio
Examples: RealVideo and RealAudio

57
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

The Web Automatically Comes to You

Using Information Technology, 11e

Push technology: Software that automatically

downloads information to personal computers.


Webcasting: Sending users customized text, video, audio
on regular basis.
RSS newsreaders (RSS aggregators): Programs that
scour the web, sometimes hourly, sometimes more
frequently, and pull together in one place feeds from
several websites. RSS is based on XML, or extensible
markup language, a web-document tagging and
formatting language that is an advance over HTML and
that two computers can use to exchange information.
58

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

XML and RSS have led to blogs and blogosphere.


Blogs (weblogs) are frequently updated sites on

the web intended for public consumption that


contain a writers observations, opinions, images,
and links to other websites.
Podcasting: Internet radio or similar Internet
audio program delivered via RSS feed to a
subscriber to be played back on computer or digital
audio device.
59

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

E-Commerce: B2B, B2C, & C2C

Using Information Technology, 11e

E-Commerce (electronic commerce): conducting business


activities online
E-commerce has led to showrooming, the phenomenon in which
shoppers browse for products in stores, only to buy them from an
online rival, frequently at a lower price.
B2B is business-to-business e-commerce.
Business-to-consumer commerce, or B2C, is the electronic sale or
exchange of goods and services from the companies directly to the
public, or end users (e.g., online banking, online shopping, online
stock trading).
Consumer-to-consumer commerce, or C2C, is the electronic sale or
exchange of goods and services between individuals (e.g., auctions).

Discussion Question: Have you every sold anything on eBay?


Used PayPal? Did you have any problems? What would you
60
warn
people
about?
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Web 2.0: The Social Web

Using Information Technology, 11e

Web 2.0 refers to the web viewed as a medium in which interactive


experience, in the form of blogs, wikis, forums, social networking, and so
on, plays a more important role than simply accessing information.
The move toward a more social, collaborative, interactive, and responsive
web; has led to the social web, giving rise to:
Social networking sites: Online communities that allow members to
keep track of friends and share photos, videos, music, stories, and ideas
(e.g., Facebook, LinkedIn).
Media-sharing sites: Online social networks in which members share
media such as photos, videos, music, ideas (e.g., YouTube, Flicker,
Shutterfly).
Social-network aggregators: Collect content from all of a users
various social network profiles into one place, then allow him or her to
track friends and share other social network activities (e.g., Mugshot,
Readr).

61

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Web 3.0: Computer-Generated


Information

Using Information Technology, 11e

In Web 3.0, information will be computer-generated with


less human interaction required to discover and integrate
that information.
Two ideas might form the basis for Web 3.0 semantic
markup and a personal browser.
Semantic markup: Data interchange formats that will allow
machines to understand the meaningor semanticsof
information on the web.
The Web 3.0 browser will probably act as a personal assistant
because every user will have a unique Internet profile based on his
or her browsing history. The more you use the Web, the more your
browser learns about you and the less specific you'll need to be
with your questions.

62

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

2.6 The Intrusive


Internet
Snooping, Spamming, Spoofing,
Phishing, Pharming, Cookies, Spyware,
& Malware

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Snooping
Email is not private
Corporate management has the
right to view employees email.
Friends can send email anywhere.
Not all ISPs protect their customers privacy.
Deleted emails can be retrieved from a hard disk.

64
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Spam: Electronic Junk Mail

Unsolicited email that takes up your time.


Delete it without opening the message.
Never reply to a spam message.
Do not click on unsubscribe at the bottom of an
email.
When you sign up for something, dont give your email
address.
Use spam filters.
Fight back by reporting new spammers to
www.abuse.net or www.spamhaus.org.

65

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Spoofing
Using fake email sender names so the message appears to be from a
different source, so you will trust it.
If you dont know the sender, dont open it.
Phishing
Sending forged email directing recipient to fake website.
Purpose: to entice people to share personal or financial data.
Fake website looks like real website, such as a banks.
Pharming
Implanting malicious software on a victims computer that redirects
the user to an impostor web page even when the individual types the
correct address into his or her browser.
Use websites with URLs that begin with https://
Some spyware removal programs can correct the corruption.
66
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Phishing Examples

Using Information Technology, 11e

Phishing examples

"YOUR NET ID ACCOUNT"


Phishing Scam
(3/31/2013)
https://wiki.library.ucsb.edu/display/SYSPUB/Latest+Phishing
+Attempts

67

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Cookies

Using Information Technology, 11e

Little text files left on your hard disk by some

websites you visit.


Can include your log-in name, password, browser
preferences, and credit card information.
Every time you load a particular website, the browser
sends the cookie back to the server to notify the website of your
previous activity.
Can make visiting these websites next time more convenient and faster.
But cookies can be used to gather information about you and your browsing
habits and history; this information can be used without your consent.
A first-party cookie is a cookie from a website that you have visited. Thirdparty cookies are placed by trusted partners of the websites you visit.
(Third-party cookies are frequently placed by ad networks.)
68

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Spyware : Adware, Browser & Search Hijackers, & Key


Loggers

Using Information Technology, 11e

Spyware is software surreptitiously installed on


your computer via the web.
Spyware hides on your PC/device and captures
information about what is on the it, such as
keystrokes and passwords

69
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Adware, or pop-up generator, is a


kind of spyware that tracks
web
surfing or online
buying so that
marketers can
send you targeted
and
unsolicited pop-up and other
ads.

Browser hijackers change settings in


your browser without your knowledge,
often changing your browsers home page
and replacing it with another web page.

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Using Information Technology, 11e

Search hijackers intercept your legitimate search


requests made to real search engines and return
results from phony search services designed to send
you to sites they run.

Key loggers, or keystroke loggers, can record each


character you type and transmit that information to
someone else on the Internet, making it possible for
strangers to learn your passwords and other
information.

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Malware

Using Information Technology, 11e

There are many forms of malicious softwareso-called


malwarethat can harm a computer system, a common
danger being viruses.
A virus is a rogue program that migrates through the Internet
or via operating systems and attaches itself to different
programs that spread from one computer to another, leaving
infections.
The principal defense is to install antivirus software, which
scans a computer to detect viruses and, sometimes, to
destroy them.

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

How to Reduce Malware Risks

Using Information Technology, 11e

Download virus protection software, such as McAfee VirusScan ( www.mcafee.com ) or Norton

AntiVirus ( www.symantec.com/nav ); then follow instructions for installing it on your machine.


(Dont use antivirus software from companies you know nothing about.)
Scan your entire system with antivirus software the first time its installed; then scan it regularly
after that. Also scan any new CDs and drives before using them.
Dont open, download, or execute any files, email messages, or email attachments if the source
is unknown or if the subject line of an email is questionable or unexpected.
Delete all spam and email messages from strangers. Dont open, forward, or reply to such
messages.
Use webmail sparingly, since viruses can hide in the HTML coding of the email. Even
the simple act of previewing the message in your email program can activate the virus
and infect your computer.
Dont start your computer with a flash drive, USB thumb drive, or CD/DVD in place.
Back up your data files regularly, and keep at least one backup device in a location separate
from your computer or use an online (cloud) backup service.
If you discover you have a virus, ask McAfee or Norton to scan your computer online; then
follow its directions for cleaning or deleting the virus. (A computer tech person can do this, too.)

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

Passwords

Using Information Technology, 11e

Never choose a real word or variations of your or your familys name,


address, phone number, Social Security number, license plate, or birth
date.

Dont use passwords that can be easily guessed, such as 12345 or password.
Avoid any word that appears in a dictionary. Instead, mix letters, numbers, and
punctuation marks in an oddball sequence of no fewer than eight characters, such as
2b/orNOT2b% and Alfred!E!Newman7. Or choose a password that is memorable but shift
the position of your fingers on the keyboard, so that, for instance, TIMBERWOLVES
becomes YO,NRTEP;BRD when you move your fingers one position right. For sensitive
sites, such as financial accounts, create long passwords, such as 15-character passwords.

Dont use the same password for multiple sites, so that if someone obtains the password
to one account, that person wont have access to your entire online life.

Dont write passwords on sticky notes or in a notebook or tape them under your keyboard.
Dont carry the passwords in your wallet. If you have to write down all your passwords,
find a safe place to put the paper, or use a software password manager, such as
Kaspersky Password Manager, RoboForm Everywhere, or Last Pass Premium.

2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.

You might also like