Telecommunications

Download Report

Transcript Telecommunications

Telecommunications

Tele – distant; at a distance; over a distance Communication – a process by which information is exchanged between individuals through a common system of symbols, signs, or behavior

Telecommunications – communicating over a distance

Advantages and Uses of Telecommunications

• Electronically transfer data • Distance learning • Taking classes online • Teleconferencing • Conducting a meeting with people in different places using a webcam and/or video phone

The Internet

Background of the Internet

• • • • Early origin in the 1960s Original name: ARPANET Created so that scientists were able to share information on military and scientific research The World Wide Web (WWW) began in March 1989 when Tim Berners-Lee wrote a small computer program for his personal computer

Web Protocols

• • HTML (Hypertext Markup Language) • A series of tags that are integrated into text documents and describes how the text should be formatted when a Web browser displays it on the screen.

HTTP (Hypertext Transfer Protocol) • Protocol – the standard format for transferring data between 2 devices • Standard that defines how messages are formatted and transmitted.

What do you need to connect to the Internet?

• Modem • Internet Service Provider (ISP) • Browser

What is a browser?

• The software program that you use to retrieve documents from the World Wide Web (WWW) and to display them in a readable format • Examples: • • • Internet Explorer Netscape Communicator AOL

The Parts of a web page

• • • • • • • • Title bar Menu bar Tool bar Address bar Go button Status bar Access indicator Scroll bars

Title bar

• The bar on the top of the window that contains the name of the document.

• A horizontal menu that appears on top of a window.

Menu bar

• Provides a selection of options related to the web page.

Tool bar

• Icons for single-click access to most commonly used menu commands

Address bar

• Contains the URL, or address of the active web page • URL stands for

U

niversal

R

esource

L

ocator • Also where you type the location for the web page you want to visit

• Connects you to address displayed in the address bar.

Go button

• Document window displays the active web page.

• Located at the bottom of the browser

Status bar

• Shows the progress of web page transactions

Access indicator

• When animated, it means your browser is accessing data from a remote computer

Scroll bars

• Let you scroll vertically and horizontally if the web page is too long or too wide to fit within one screen

Automated Features

• • AutoSearch helps you find a webpage when part of the URL is keyed into the address bar • AutoComplete keeps track of and provides a list of sites you have visited AutoCorrect is the feature that corrects typos as you type

Search Engines

What is a search engine?

• A tool that lets you find web pages that match a particular word or phrase • Examples: • • • • Altavista Google Yahoo AskJeeves

Types of search engines:

• Keyword Search • Uses keywords to perform search • Multimedia Search Engines • Used to find graphics, video clips, animation, and MP3 music files.

• Meta Search Engines • Search several major search engines at one time.

• Subject Directories • Organized by subject categories and displayed in a series of menus.

Search tools and techniques:

• Phrase Searching • Search Engine Math • Boolean Operators • Wildcard Searching • Title Searching

Phrase searching

• A phrase is entered using double quotation marks and only matches those that appear adjacent to each other and in the order in which you specify.

• Example: “baseball cards”

Search Engine Math

• Symbols used in formulas to filter out unwanted listings.

• Use the plus symbol (+) before words that must appear.

• Also known as an inclusion operator.

• Use the minus symbol (-) before words that you do not want to appear.

• Also known as an exclusion operator.

Boolean Operators

• Boolean logic consists of three logical operators: • AND • NOT • OR

Wildcard Searching

• The * symbol, called an asterisk, is considered a wildcard character.

• Used if you don’t know the spelling of a word • Example: N*Ryan to search for Nolan Ryan • Used to search plurals or variations of words.

Title Searching

• Searching the title of a web page.

• When a web page author creates a Web page, the Web page generally contains a HTML title.

E-Mail

What is E-mail?

• E-mail = electronic mail • Similar to regular mail • • • • 2 addresses A message Allows for attachments A carrier • • • • Advantages Faster way to communicate and respond Quick and easy way to send messages Allows you to forward messages to others, and send messages to multiple people Allows you to attach files (pictures, audio files, images, and documents)

E-Mail Terminology

• • • • • • • • Inbox Outbox Sent Items Deleted Items Drafts New Message Send Address Book

Parts of an E-mail Address

• The username of the person the message is going to • Example: msjarrett • The @ symbol • The user’s domain name • Example: aol.com

Types of E-mail addresses:

• • • • • • .edu – educational institution .com – commercial address .gov – government address .org – non-profit organization .mil – military address .net – network address

Chat Rooms

What are chat rooms for?

• Using the computer to create real-time communication between yourself and another user or a group of users.

• Internet Relay Chat (IRC) • A text-based chat developed by Jarkko Oikarinen in 1988.

• One of the most widely used chat forums on the Internet today.

Chat Options

• Web chat • Incorporates graphics, audio and video • Hosted by search engines such as Yahoo, Snap, and Excite.

• Proprietary chat • Requires that you download and install software from a company.

• Examples are Microsoft Chat, AOL, and Prodigy.

• Buddy lists • You specify your list of friends and even tell when they are online.

• Examples are ICQ and AOL Messenger

Mailing Lists

• A group of people with a shared interest.

• Their email addresses are collected into a group, and this group is identified by a single name.

• When a message is sent to the group, everyone on the list receives that message.

Newsgroups

• A discussion forum or a type of bulletin board.

• Each board is dedicated to discussion on a particular topic.

•USENET •Worldwide network of computers that facilitates the transmission of messages among the news servers.

Analyzing Technology Issues

The Impact of Technology on Education

• Education • Internet • Distance Learning • Computer-Based Learning • Simulations

The Impact of Technology on Science

• Science • Artificial Intelligence • Genetic Engineering • Virtual Reality

The Impact of Technology on Work

• Multinational Economy • Electronic Commerce

The Impact of Technology on Our Lives

• Clothes that fight odor and bacteria • The flying car • Voice recognition • Space travel • Smart shoes and smart seats • Smart houses • Electronic shopping

Exploring Technology Careers • Business and Office • Administrative Assistant • Desktop Publisher/Graphic Designer • Network Support and Administration • PC Support Specialist • Manager of Information Systems • Web-Based • Web Developer • Web Master

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer.

Types of Computer Crimes • Computer fraud • Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss.

• Computer hacking • Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion.

Other Computer Crimes • Theft of computer time • An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records.

• Data diddling • Changing data before it is entered into the computer or after is has been entered into the computer.

Software Usage

Commercial Software

•Copyrighted by an individual or a business •Permission needed in order to copy

Shareware Freeware Public Domain

•Copyright protected •Distributed free on a trial basis •Payment by the honor system for satisfied users •Given away free of charge •Owner often retains rights •Not necessarily free to copy and distribute •Not copyrighted •Donated for public use •Free to copy and distribute

Software Pirates

• Someone that copies software illegally • • Software companies usually prevent users from making multiple copies of their software by “locking” it You must purchase a site license in order to software on more than 1 computer

Computer Viruses A virus is a program that has been written to cause corruption of data on a computer.

Types of Computer Viruses • •

Worm

destructive computer program that bores its way through a computer’s files or through a computer network makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks •

Time Bomb

virus that does not cause its damage until a certain date or until the system has been booted a certain number of times •

Logic Bomb

virus triggered by the appearance or disappearance of specific data •

Trojan Horse

Virus that does something different from what it is expected to do

Privacy and Security Issues • Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources.

Security Measures Maintain and enforce security measures such as: • Passwords • Electronic identification cards • Firewalls • Antivirus software • Selective hiring process

How do I keep my computer safe?

• • • • • • • Make back-up copies of all files on a regular basis Don’t share disks from other computers—this increases your chance of catching a virus Don’t boot from a floppy disk Write-protect your disks Use an anti-virus program to scan your files on a regular basis Use caution when downloading files from the Internet—many are virus infected File sharing on a Local Area Network (LAN) may also expose your files to a virus