Networks and the Internet

Download Report

Transcript Networks and the Internet

N

ETWORKS AND THE

I

NTERNET

D

ESKTOP

C

OMPUTING

(pp 1-2)

Desktop computers are often generically referred to as PCs or MACs. Regardless of the brand name, desktop computers have the same components .

 

Hardware

: The physical components of the computer, such as the monitor and base unit.

Input Devices

: external devices used to enter data and instructions into the computer, such as a keyboard mouse, scanner microphone, digital camera, and flash drives.

Peripheral Devices

computer, such : external devices attached to the as printers and scanners 

Output Devices

memory drives : devices used to convey useful information processed by the computer, such as monitors, printers, speakers and

CPU

: Central Processing Unit – the “brain” of the computer 

operating system software

the computer to process data : programs that run automatically that allow the user to communicate with the computer and 

application software

: programs written to perform specific tasks (word processing, photo editing)

R EVIEW Q UESTIONS   

What are input devices used for?

to enter data to the computer for processing What are output devices used for?

to display processed data in a useful format Describe one difference between operating system software and application software.

operating system software runs the computer, application software allows the user to tell the computer to perform specific tasks

M

OBILE

C

OMPUTING

(pp 2-3)

Bluetooth

: wireless technology that allows mobile computing devices to communicate with one another 

notebook computer

: portable, lightweight computer with capabilities of a typical desktop system 

tablet PC

: a computer that uses handwriting recognition software to interpret data the user “writes” on the screen with a stylus

handheld computer (PDA)

as scheduling, lists, games : palm sized computers that are used primarily for personal management tasks such 

Smart phone

capability : cell phones that have Internet and central processing 

wearable computer

accessories : computing devices integrated into clothing and wearable

cross-platform connectivity

with one another : the ability of different operating systems to communicate

R EVIEW Q UESTIONS  

Describe four types of mobile computing devices.

notebook computer tablet PC handheld computer smart phone wearable computer Describe one type of wearable computer.

MP3 player integrated into watches cameras integrated into eyewear

Quiz tomorrow!

N

ETWORKS

(pp 3-5)

 A

network

is a combination of hardware and software that allows computers to exchange data and share software and devices.

 Businesses, schools and other organizations use networks because: o o o o o users can share and exchange data costs are reduced by sharing devices passwords can restrict access to certain files software updates and file backups can be performed at one location private email can be provided for network users.

LAN

: Local Area Network – connects devices within a small area such as a building or a campus 

WAN

: Wide Area Network – connects devices over a large geographical distance 

HAN

: Home Area Network – connects devices within a home

network architecture:

the design of a network that includes computers and devices and how they relate to each other 

peer-to-peer network

: each computer on the network has equal sharing capabilities 

client/server network

: a group of computers that are connected to a single server

server clients

wireless network

: uses high frequency radio waves or infrared signals to transmit data 

WiFi

: Wireless Fidelity – a protocol for wireless networks

Netiquette:

the polite rules for using a network 

do not access the account of another user without permission

do not share your password

use appropriate subject matter and language

be considerate of other people’s beliefs and opinions

R EVIEW Q UESTIONS  

What does “network architecture” refer to?

the devices that are included in the structure of a network What are three rules of “netiquette”?

do not access the account of another user without permission

  

do not share your password use appropriate subject matter and language be considerate of other people’s beliefs and opinions

Quiz tomorrow!

F

ILES

& F

OLDERS

(p 6)  A collection of data stored on a memory drive is called a

file

.

 A file can be an application program or the product of an application (a word processor program or a document created with a word processor program)   Each file must have a unique

file name

.

Applications add an when it is saved.

extension

to the file name  .doc = word processing file  .htm = basic HTML document  .css = cascading style sheet

Folders

organized related files.

are used to   Each folder must have a unique file name.

A folder can contain other folders and all types of files.

I

NTRANETS

, E

XTRANETS

,

AND THE

I

NTERNET

(p 7)   An

intranet

organization is a private network used by a single

firewall

: network security system that prevents unauthorized access to the network An

extranet

allows the public to access a network, such as the district server   The

Internet

is the largest and most widely accessed network – a world-wide network of computers that is not controlled by any one organization.

IP Address

: a unique identifier for a computer or device on a network

R EVIEW Q UESTIONS 

What is the difference between an intranet and an extranet?

An intranet is used by a single organization. An extranet can be accessed by the public.

Who controls the Internet?

No one person or organization.

T

ELCOMMUNICATIONS

(pp 7-8)

S

ERVICES

Telecommunications

is transmitting and receiving of data through a line or cable

    

conventional modem:

uses standard phone lines to convert analog signals to digital; the slowest form of telecommunications

DSL:

Digital Subscriber Line – uses standard phone lines with high rates of data transmission

cable modem:

transmits data through coaxial cable TV networks

dedicated line:

allows a permanent connection to the internet that is always active

ISDN:

Integrated Services Digital Network – digital network access provided by a phone company

R EVIEW Q UESTIONS 

What is the slowest telecommunications option?

conventional modem

Quiz tomorrow!

I

NTERNET

S

ERVICES

(pp 8-10)

Internet services include:    

World Wide Web

- used to search and access information that is available on the Internet

e-mail

- messages transmitted over a communications network

instant messaging

- immediate text-based communication

bulletin board services

- allows users to participate in discussion groups  The World Wide Web is the most widely used Internet service.

 A

web browser

sites.

application provides a graphical interface to present information in the form of web

T

YPES OF

W

EB

S

ITES

Personal Web Sites

  created by individuals display information about hobbies, pets family members, etc.

T YPES OF W EB S ITES ( CONT .)

Commercial Web Sites

 created by companies and organizations  corporate presence web sites = display information about products and services  e-commerce web sites = sell products and services online

T YPES OF W EB S ITES ( CONT .)

Informational Web Sites

  display factual information about a topic created by educational institutions, governments, and organizations

Types of Web Sites

(cont.)

Media Web Sites

  created by companies Inform readers about current events and issues; usually online newspapers and periodicals

Types of Web Sites

(cont.)

Portal Web Sites

   created by businesses a starting point for people to enter the Web contain hyperlinks to a wide range of topics and access to a search engine.

URL (U NIFORM R ESOURCE L OCATOR )

  Every web page has a URL A

URL

browser to identify the location of a page on the web.

is an address that is interpreted by a web domain name

http://www.earthday.net

The web protocol used for transmission of pages from a server to a web browser.

top-level domain

– identifies the type of web site

T

OP

L

EVEL

D

OMAINS

 Top-level domains identify the type of web site.

    .gov = government agency .edu = educational institution .org = non profit organization .com = commercial business

R EVIEW Q UESTIONS 

What is the most widely used Internet service?

The World Wide Web

What is a URL?

the unique address of a web page on the Internet

Identify each part of this URL:

domain name

http://www.google.com

The web protocol used for transmission of pages from a server to a web browser.

top-level domain

– identifies the type of web site

R EVIEW Q UESTIONS  

What is one benefit of e-mail over standard mail?

Email is faster than regular mail What is one advantage of sending an instant message instead of an e-mail?

Can be faster than email

Quiz tomorrow!

A SSIGNMENTS

1) Complete Exercise #3 on page 37 in your binder. Write your answers on a separate sheet of paper. Be sure to include your name and class period on your paper.

2)

Grab a partner and complete the “Internet Search Skills Activity” handout. You can do it

alone if you want.

I

NTERNET

E

XPLORER

(pp11-15)

title bar

: displays the web page title

address bar

: displays the URL of the web page

status bar

: displays information about the web page

menu bar

: displays menus from which you can select commands

favorites bar

: allows you to add sites for quick access

scroll bar

: drag to bring unseen parts of the page into view

A SSIGNMENT 

Complete the Internet Explorer Practice on page 12-15 in your binder

S

EARCHING THE

W

EB

(pp 16-17)

search engine:

a program that searches databases of web pages for key words 

sponsored site results:

sites that contain information being searched for, but their owners have paid for them to be listed at first

search criteria:

words or phrases that are used to search for web pages o

+ (plus sign)

or

AND

only web pages that contain all of the words in the search criteria – limits a search to

insects

+

arachnids

+

achatina insects

AND

arachnids

AND

achatina

o

OR

– used to find web pages that contain any words in the search criteria

insects

OR

arachnids

OR

achatina

o

- (minus sign)

or

NOT

– used to exclude web pages from a search

insects

-

mosquitoes insects

NOT

mosquitoes

A SSIGNMENTS

1)

Complete the “Searching the Web” Practice on

page 17 of your binder.

2)

Grab a partner and complete the “Search Criteria” Activity handout.

E

VALUATING AND

C

ITING

W

EB

-P

AGES

(pp 17-19)

When evaluating a web site, ask these questions:

 Is the site up-to-date?

When was the page last updated?

   Is the site biased?

Does the information have a slanted view of the topic?

Is the site valid?

What is the primary source of the site’s information?

Is the primary source trustworthy?

Who is the site’s author?

Does that person/organization have the credentials to be a reliable source on the topic?

When citing a web site, use this general format:

Author’s last name, first name, middle initial. Site Title. Access date. Organization name. .

Specific instructions are included on the “Citing Electronic Resources in MLA Format” handout.

R EVIEW Q UESTIONS 

What are four questions to answer when evaluating a web site?

 Is the site up-to-date?

   Is the site biased?

Is the site valid?

Who is the site’s author?

R EVIEW Q UESTIONS 

On August 9, 2011 you accessed a posting on the Clewiston Kite Surfing discussion list at http://www.lpdatafiles.com/kitesurf/color.txt. The posting was made by Tara Perez on the topic of kite colors. Write a citation for a research paper that quotes Tara’s posting.

Perez, Tara. Clewiston Kite Surfing. 9 August 2011. < http://www.lpdatafiles.com/kitesurf/ color.txt>

A SSIGNMENTS

1)

Complete the “Citing a Website” Practice on

pages 18-19 2) Complete Exercise 4 through 6 on page 38

E-

MAIL

E

TIQUETTE

(p 21)

spam:

junk email

Email Etiquette

rules: o o o o o o o use your manners and polite words write in short, complete sentences be professional – use correct spelling and grammar re-read the message before sending send message through your account only use appropriate subject matter and language be considerate of other people’s beliefs and opinions

I

NTERNET

P

RIVACY

I

SSUES

(pp 22-23)

    

Electronic Communications Privacy Act:

permission makes it a crime to access and/or publish electronic data without

Electronic Freedom of Information Act:

pubic inspection online required government agencies to make information available for

Children’s Online Privacy Protection Act:

13 to obtain parental consent requires web sites that collect information from children under

Safety and Freedom Through Encryption Act:

allows American to use any type of encryption to protect their personal information

PATRIOT Act of 2001:

allows law enforcement to monitor individual’s internet and email activity

    

spyware:

knowledge software that uses the Internet to gather information about users without their

online profiling:

a marketing technique that collects data about users visiting web sites

cookie:

a text file created by a server when a user enters information into a web site; it is stored on the user’s computer and accessed every time the site is visited

web beacon/web bug/pixel tag:

tiny, hidden graphics on web pages or in emails that collect data about users; monitored by ad agencies

privacy policy:

will be used a legally binding document that explains how user’s personal information

R EVIEW Q UESTIONS  

Why is ending an email message like sending a post card?

anyone along the path from sender to recipient can read it’s contents What are three examples of email etiquette?

      

use your manners and polite words write in short, complete sentences be professional – use correct spelling and grammar re-read the message before sending send message through your account only use appropriate subject matter and language be considerate of other people’s beliefs and opinions

R EVIEW Q UESTIONS 

Who usually monitors the information collected by web beacons?

advertising agencies who design targeted ads on the Internet

Quiz tomorrow!

I

NTERNET

P

OLICY

(p 23)

A

CCEPTEABLE

U

SE

Enforceable rules for using computers and/or the Internet through an organization’s computers:

o o o o o o use appropriate language do not reveal personal addresses or phone numbers do not access, upload, download, or distribute inappropriate materials do not access another user’s account do not install or uninstall software do not use organization computers for personal reasons

R EVIEW Q UESTIONS 

Why would a school require an Acceptable Use Policy for students?

You must have an AUP on file with the office to take this class!

E

THICAL

I

MPLICATIONS OF

C

OMPUTER

U

SE

(pp 23-24)

identity theft –

personal information is stolen and used to make fraudulent purchases or obtain loans

Laws the protect privacy:

Fair Credit Reporting Act –

agencies gives you the right to see information collected about you for use by credit, insurance, and employment 

Privacy Act –

restricts the way personal information can be used by federal agencies 

Financial Privacy Act –

requires that government have a subpoena or search warrant to access your financial records

A SSIGNMENTS

1) Complete Exercise 8 on page 39

P

ROTECTING SOFTWARE AND DATA

(pp 24-25)

copyright –

the illegal use or reproduction of digital information, images, videos, photos, etc.

No Electronic Theft Act –

copyright infringement protect against

piracy –

the distribution of illegal copies of copyrighted files

virus –

a program the reproduces itself without the user’s knowledge; can destroy data on computers

trojan horse –

to be trustworthy; running the program damages a computer a damaging program that appears

worm –

a damaging program the reproduces itself on a network and uses up resources

antivirus program –

software that detects and removes damaging programs

hacker/cracker –

gains access to large computer networks to cause vandalism an individual who

phishing –

sending an email claiming to be a legitimate business to trick a user into providing personal information

R EVIEW Q UESTIONS 

What are two precautions to take to protect yourself from damaging programs?

 

Use and update antivirus software Don’t open email attachments until they have been scanned for damaging programs

Quiz tomorrow!

A SSIGNMENTS

1) Complete Exercises 4, 5, and 6 on page 38 and Exercise 12 on page 40