+ All Categories
Home > Documents > N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

Date post: 01-Apr-2015
Category:
Upload: kaley-muncy
View: 217 times
Download: 0 times
Share this document with a friend
Popular Tags:
69
NETWORKS AND THE INTERNET
Transcript
Page 1: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

NETWORKS AND THE INTERNET

Page 2: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

DESKTOP COMPUTING (pp 1-2)

Page 3: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

Desktop computers are oftengenerically referred to asPCs or MACs. Regardless ofthe brand name, desktopcomputers have the samecomponents.

Hardware: The physical components of the computer, such as the monitor and base unit.Input Devices: external devices used to enter data and instructions into the computer, such as a keyboard mouse, scanner microphone, digital camera, and flash drives.

Page 4: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

Peripheral Devices: externaldevices attached to thecomputer, suchas printers and scanners

Output Devices: devices used to convey useful information processed by the computer, such as monitors, printers, speakers and memory drives

Page 5: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

CPU: Central Processing Unit – the“brain” of the computer

operating system software: programsthat run automatically that allow the userto communicate with the computer andthe computer to process data

application software: programswritten to perform specific tasks(word processing, photo editing)

Page 6: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS

What are input devices used for?to enter data to the computer for processing

What are output devices used for?to display processed data in a useful format

Describe one difference between operating system software and application software.

operating system software runs the computer, application software allows the user to tell the computer to perform specific tasks

Page 7: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

MOBILE COMPUTING (pp 2-3)

Page 8: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

Bluetooth: wireless technology thatallows mobile computing devices to communicate with one another

notebook computer: portable,lightweight computer with capabilitiesof a typical desktop system

tablet PC: a computer that uses handwriting recognition software to interpret data the user “writes” on the screen with a stylus

Page 9: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

handheld computer (PDA): palm-sized computers that are used primarilyfor personal management tasks suchas scheduling, lists, games

Smart phone: cell phones that haveInternet and central processingcapability

wearable computer: computing devices integrated into clothing and wearable accessories

Page 10: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

cross-platform connectivity: the ability of different operating systems to communicate with one another

Page 11: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS Describe four types of mobile computing

devices.notebook computertablet PChandheld computersmart phonewearable computer

Describe one type of wearable computer.MP3 player integrated into watchescameras integrated into eyewear

Quiz tomorrow!

Page 12: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

NETWORKS (pp 3-5)

Page 13: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

A network is a combination of hardware and software that allows computers to exchange data and share software and devices.

Businesses, schools and other organizations use networks because:o users can share and exchange datao costs are reduced by sharing deviceso passwords can restrict access to certain

fileso software updates and file backups can

be performed at one locationo private email can be provided for

network users.

Page 14: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

LAN: Local Area Network – connectsdevices within a small area such as abuilding or a campus

WAN: Wide Area Network – connectsdevices over a large geographicaldistance

HAN: Home Area Network – connects devices within a home

Page 15: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

network architecture: the design of a network that includes computers and devices and how they relate to each other

peer-to-peer network: eachcomputer on the network hasequal sharing capabilities

client/server network: a group of computers that are connected to a single server

clients

server

Page 16: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

wireless network : uses high frequency radio waves or infrared signals to transmit data

WiFi: Wireless Fidelity – a protocol for wireless networks

Page 17: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

Netiquette: the polite rules forusing a network

do not access the account ofanother user withoutpermission

do not share your password

use appropriate subject matter and language

be considerate of other people’s beliefs and opinions

Page 18: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS What does “network architecture” refer to?

the devices that are included in the structure of a network

What are three rules of “netiquette”?do not access the account of another user without permissiondo not share your passworduse appropriate subject matter and languagebe considerate of other people’s beliefs and opinions

Quiz tomorrow!

Page 19: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

FILES & FOLDERS (p 6)

A collection of data stored on a memory drive is called a file.A file can be an application program or the

product of an application (a word processor program or a document created with a word processor program)

Each file must have a unique file name.Applications add an extension to the file

name when it is saved. .doc = word processing file.htm = basic HTML document.css = cascading style sheet

Page 20: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

Folders are used to organized related files.Each folder must

have a unique file name.

A folder can contain other folders and all types of files.

Page 21: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

INTRANETS, EXTRANETS,AND THE INTERNET (p 7)

An intranet is a private network used by a single organization

firewall: network security system that prevents unauthorized access to the network

An extranet allows the public to access a network, such as the district server

The Internet is the largest and most widely accessed network – a world-wide network of computers that is not controlled by any one organization.

IP Address: a unique identifier for a computer or device on a network

Page 22: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS

What is the difference between an intranet and an extranet?

An intranet is used by a single organization. An extranet can be accessed by the public.

Who controls the Internet?No one person or organization.

Page 23: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

TELCOMMUNICATIONS SERVICES (pp 7-8)

Telecommunications is transmitting and receiving of data through a line or cable

Page 24: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

conventional modem: uses standard phone lines to convert analog signals to digital; the slowest form of telecommunications

DSL: Digital Subscriber Line – uses standard phone lines with high rates of data transmission

cable modem: transmits data through coaxial cable TV networks

dedicated line: allows a permanent connection to the internet that is always active

ISDN: Integrated Services Digital Network – digital network access provided by a phone company

Page 25: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS

What is the slowest telecommunications option?

conventional modem

Quiz tomorrow!

Page 26: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

INTERNET SERVICES (pp 8-10)

Page 27: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

Internet services include:World Wide Web - used to search and

access information that is available on the Internet

e-mail - messages transmitted over a communications network

instant messaging - immediate text-based communication

bulletin board services - allows users to participate in discussion groups

The World Wide Web is the most widely used Internet service.

A web browser application provides a graphical interface to present information in the form of web sites.

Page 28: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

TYPES OF WEB SITES

Personal Web Sites created by individuals display information about hobbies, pets family

members, etc.

Page 29: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

TYPES OF WEB SITES (CONT.)

Commercial Web Sites created by companies and organizations

corporate presence web sites = display information about products and services

e-commerce web sites = sell products and services online

Page 30: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

TYPES OF WEB SITES (CONT.)

Informational Web Sites display factual information about a topic created by educational institutions, governments,

and organizations

Page 31: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

Media Web Sites created by companies Inform readers about current events and issues;

usually online newspapers and periodicals

Types of Web Sites (cont.)

Page 32: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

Portal Web Sites created by businesses a starting point for people to enter the Web contain hyperlinks to a wide range of topics and

access to a search engine.

Types of Web Sites (cont.)

Page 33: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

URL (UNIFORM RESOURCE LOCATOR)

Every web page has a URL A URL is an address that is interpreted by a

web browser to identify the location of a page on the web.

The web protocol used for transmission of pages from a server to a web browser.

http://www.earthday.net

top-level domain – identifies the type of web site

domain name

Page 34: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

TOP LEVEL DOMAINS

Top-level domains identify the type of web site..gov = government agency.edu = educational institution.org = non profit organization.com = commercial business

Page 35: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS

What is the most widely used Internet service?

The World Wide Web What is a URL?

the unique address of a web page on the Internet

Identify each part of this URL:

http://www.google.comThe web protocol used for transmission of pages from a server to a web browser.

top-level domain – identifies the type of web site

domain name

Page 36: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS

What is one benefit of e-mail over standard mail?

Email is faster than regular mail What is one advantage of sending an instant

message instead of an e-mail?Can be faster than email

Quiz tomorrow!

Page 37: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

ASSIGNMENTS

1) Complete Exercise #3 on page 37 in your binder. Write your answers on a separate sheet of paper. Be sure to include your name and class period on your paper.

2) Grab a partner and complete the “Internet Search Skills Activity” handout. You can do it alone if you want.

Page 38: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

INTERNET EXPLORER (pp11-15)

title bar: displays the web page title

address bar: displays the URL of the web page

menu bar: displays menus from which you can select commands

favorites bar: allows you to add sites for quick access

status bar: displays information about the web page

scroll bar: drag to bring unseen parts of the page into view

Page 39: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

ASSIGNMENT

Complete the Internet Explorer Practice on page 12-15 in your binder

Page 40: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

SEARCHING THE WEB (pp 16-17)

Page 41: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

search engine: a program that searches databases of web pages for key words

sponsored site results: sites that contain information being searched for, but their owners have paid for them to be listed at first

Page 42: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)
Page 43: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

search criteria: words or phrases that are used to search for web pages

o + (plus sign) or AND – limits a search to only web pages that contain all of the words in the search criteria

insects+arachnids+achatina

insectsANDarachnidsANDachatina

o OR – used to find web pages that contain any words in the search criteria

insectsORarachnidsORachatina

Page 44: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

o - (minus sign) or NOT – used to exclude web pages from a search

insects-mosquitoes

insectsNOTmosquitoes

Page 45: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

ASSIGNMENTS

1) Complete the “Searching the Web” Practice on page 17 of your binder.

2) Grab a partner and complete the “Search Criteria” Activity handout.

Page 46: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

EVALUATING ANDCITING WEB -PAGES (pp 17-19)

Page 47: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

When evaluating a web site, ask these questions:Is the site up-to-date?

When was the page last updated?

Is the site biased?Does the information have a slanted view of the topic?

Is the site valid?What is the primary source of the site’s information?Is the primary source trustworthy?

Who is the site’s author?Does that person/organization have the credentials to be a reliable source on the topic?

Page 48: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

When citing a web site, use this general format:

Author’s last name, first name, middle initial. Site Title. Access date. Organization name. <URL>.

Specific instructions are included on the “Citing Electronic Resources in MLA Format”

handout.

Page 49: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS

What are four questions to answer when evaluating a web site?

Is the site up-to-date? Is the site biased? Is the site valid? Who is the site’s author?

Page 50: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS

On August 9, 2011 you accessed a posting on the Clewiston Kite Surfing discussion list at http://www.lpdatafiles.com/kitesurf/color.txt. The posting was made by Tara Perez on the topic of kite colors. Write a citation for a research paper that quotes Tara’s posting.

Perez, Tara. Clewiston Kite Surfing. 9 August 2011. < http://www.lpdatafiles.com/kitesurf/

color.txt>

Page 51: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

ASSIGNMENTS

1) Complete the “Citing a Website” Practice on pages 18-19

2) Complete Exercise 4 through 6 on page 38

Page 52: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

E-MAIL ETIQUETTE (p 21)

Page 53: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

spam: junk email

Email Etiquette rules:

o use your manners and polite wordso write in short, complete sentenceso be professional – use correct spelling and

grammaro re-read the message before sendingo send message through your account onlyo use appropriate subject matter and

languageo be considerate of other people’s beliefs

and opinions

Page 54: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

INTERNET PRIVACY ISSUES (pp 22-23)

Page 55: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

Electronic Communications Privacy Act: makes it a crime to access and/or publish electronic data without permission

Electronic Freedom of Information Act: required government agencies to make information available for pubic inspection online

Children’s Online Privacy Protection Act: requires web sites that collect information from children under 13 to obtain parental consent

Safety and Freedom Through Encryption Act: allows American to use any type of encryption to protect their personal information

PATRIOT Act of 2001: allows law enforcement to monitor individual’s internet and email activity

Page 56: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

spyware: software that uses the Internet to gather information about users without their knowledge

online profiling: a marketing technique that collects data about users visiting web sites

cookie: a text file created by a server when a user enters information into a web site; it is stored on the user’s computer and accessed every time the site is visited

web beacon/web bug/pixel tag: tiny, hidden graphics on web pages or in emails that collect data about users; monitored by ad agencies

privacy policy: a legally binding document that explains how user’s personal information will be used

Page 57: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS

Why is ending an email message like sending a post card?

anyone along the path from sender to recipient can read it’s contents

What are three examples of email etiquette?use your manners and polite wordswrite in short, complete sentencesbe professional – use correct spelling and grammarre-read the message before sendingsend message through your account onlyuse appropriate subject matter and languagebe considerate of other people’s beliefs and opinions

Page 58: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS

Who usually monitors the information collected by web beacons?

advertising agencies who design targeted ads on the Internet

Quiz tomorrow!

Page 59: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

INTERNET ACCEPTEABLE USE POLICY (p 23)

Enforceable rules for using computers and/or the Internet through an organization’s computers:ouse appropriate languageodo not reveal personal addresses or phone numbersodo not access, upload, download, or distribute inappropriate materialsodo not access another user’s accountodo not install or uninstall softwareodo not use organization computers for personal reasons

Page 60: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS

Why would a school require an Acceptable Use Policy for students?

You must have an AUP on file with the office

to take this class!

Page 61: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

ETHICAL IMPLICATIONS OF COMPUTER USE (pp 23-24)

Page 62: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

identity theft – personal information is stolen and used to make fraudulent purchases or obtain loans

Laws the protect privacy:Fair Credit Reporting Act – gives you the right to see information collected about you for use by credit, insurance, and employment agenciesPrivacy Act – restricts the way personal information can be used by federal agenciesFinancial Privacy Act – requires that government have a subpoena or search warrant to access your financial records

Page 63: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

ASSIGNMENTS

1) Complete Exercise 8 on page 39

Page 64: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

PROTECTING SOFTWARE AND DATA (pp 24-25)

Page 65: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

copyright – the illegal use orreproduction of digital information,images, videos, photos, etc.

No Electronic Theft Act – protect against copyright infringement

piracy – the distribution of illegalcopies of copyrighted files

Page 66: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

virus – a program the reproduces itself without the user’s knowledge; can destroy data on computers

trojan horse – a damaging program that appears to be trustworthy; running the program damages a computer

worm – a damaging program the reproduces itself on a network and uses up resources

Page 67: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

antivirus program – software that detects and removes damaging programs

hacker/cracker – an individual whogains access to large computer networksto cause vandalism

phishing – sending an email claiming to be a legitimate business to trick a user into providing personal information

Page 68: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

REVIEW QUESTIONS

What are two precautions to take to protect yourself from damaging programs?

Use and update antivirus software Don’t open email attachments until

they have been scanned for damaging programs

Quiz tomorrow!

Page 69: N ETWORKS AND THE I NTERNET. D ESKTOP C OMPUTING (pp 1-2)

ASSIGNMENTS

1) Complete Exercises 4, 5, and 6 on page 38 and Exercise 12 on page 40


Recommended