Internet Operations


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Course Overview Intro:Livebinder,Multiurl
  • Discuss and explain Show: Web Terminologies: Distribute “Glossary”
  • Explain: Service: LAN, VPN, ISP: dial-up, broadband; cable, DSL, wireless mobile phone with wireless application protocol (WAP); intranet server (eg via parallel, serial or USB connections). Hardware: Telephone, modem, router, Quick raise-your-hand quiz of features
  • Help facilities to solve any Internet connection problems
  • Discuss and explain: speed, stability, services offered by ISP, accessibility.
  • First Demo, then hands on, then demo next item: enter, back, forward, refresh, stop, history, bookmark, new window, new tab. Toolbar, search bar, address bar; home, go to, follow link, Distribute handout: “Terminology”
  • URL (Read from Kit)
  • Domain types: .com .edu / .ac .net .org .info .museum .gov .in
  • First Demo, then hands on, then demo next item: homepage, autofill, pop-ups, search engine, temporary file storage privacy, cookies, security, toolbars, zoom, software updates
  • delete cache, delete temporary files, work offline, save websites
  • Keyword: history of paper Directory: education k-12
  • First Demo, then hands on, then demo next item: Website relevant to curriculum area water cycle “water cycle” Einstein -relativity Einstein +relativity Grade 4 AND Grade 5 Class OR Grade School NOT college (“rain formation” OR “water cycle”) ~grade Water* Water cycle filetype:ppt Water cycle 123 + 48 Define: algorithm 128 USD in INR
  • First Demo, then hands on, then demo next item: Tips: search within results, turn questions into key words Distribute “Cheasheet_Google” Distribute “BeyondGoogle” Meta Search Engines Kid-friendly Search Engines 20 free educational video sites “” 10 Open Educational Resources “”
  • Discuss and explain: • Check for bibliographical information on the Author • Check other materials written by the Author • Compare articles by the Author with other Authors of similar topics for bias • Government and University sites will be pretty reliable
  • 5W Poster (Kit)
  • Discuss and explain Demo then hands on
  • Demo then hands on
  • Discuss and explain: saved information: pod-casts, text, images real time information: blogs, instant messaging, VOIP
  • Demo and hands-on
  • Demo and hands on:
  • Discuss and explain: malicious programs (including viruses, worms, trojans, spyware, adware), hackers, phishing identity theft
  • Discuss and explain: abusive behaviour (“cyber bullying”), inappropriate behaviour; abuse of young people; false identities; financial deception
  • Eye strain Neck problem RSI – Repetitive Strain Injury: this is a danger when using the keyboard and mouse.
  • Discuss and explain: Settings: security, privacy, content, block sites, parental controls. Software: virus-checking software, anti-spam software, firewall Caution: treat messages, file
  • Demo and explain
  • Explain Distribute “Cheatsheet_InternetSafety”
  • Explain username and password/PIN selection and management online identity/profile: Real name, Pseudonym, Avatar personal information: what to include, who can see the information, withhold personal information.
  • Explain
  • Copyright and Fair use (Read from kit)
  • Explain solutions Distribute “Troubleshooting”
  • Internet Operations

    1. 1. Internet Operations
    2. 2. Connect to the Internet
    3. 3. 1.1 Get online <ul><li> </li></ul><ul><li>Take the quiz </li></ul>
    4. 4. 1.2 Connection types <ul><li> </li></ul><ul><li>Take the quiz </li></ul><ul><li>Services </li></ul><ul><li>Hardware </li></ul><ul><li>Browser </li></ul><ul><li> </li></ul><ul><li>Take the quiz </li></ul>
    5. 5. 1.3 F1
    6. 6. 1.4 Connection Methods <ul><li>Benefits </li></ul><ul><li>Drawbacks </li></ul>
    7. 7. Browsing the Internet
    8. 8. 2.1 Navigate WebPages <ul><li>Video: </li></ul><ul><li>Animation </li></ul><ul><li> </li></ul>
    9. 9. 2.1 Navigate WebPages <ul><li>Browsers </li></ul><ul><li> </li></ul><ul><li>Take the quiz </li></ul><ul><li>Browser Interface </li></ul><ul><li>Buttons </li></ul><ul><li>Toolbars </li></ul>
    10. 10. 2.1 Navigate WebPages <ul><li> </li></ul><ul><li>Take the quiz </li></ul>
    11. 11. URL <ul><li> </li></ul><ul><li>Take the quiz </li></ul>
    12. 12. URL Element Description http:// Protocol to access a file www Website is on World Wide Web microsoft name of website .com Domain /learning/default.asp Access path
    13. 13. 2.2 Browser Settings <ul><li>General </li></ul><ul><li>Appearance </li></ul><ul><li>Privacy </li></ul><ul><li>Security </li></ul>
    14. 14. 2.3 Improve Performance <ul><li>Tips </li></ul>
    15. 15. Search Information
    16. 16. 3.1 Search Techniques <ul><li>Video: </li></ul><ul><li>Search Engine </li></ul><ul><li> </li></ul><ul><li>Take the quiz </li></ul>
    17. 17. 3.1 Search Techniques 1 <ul><li>Keyword </li></ul><ul><li>Directory </li></ul><ul><li>Search Engine </li></ul><ul><li>Meta Search Engine </li></ul><ul><li>Specialized Search Engine </li></ul><ul><li>Real-time </li></ul>
    18. 18. 3.1 Search Techniques 2 <ul><li>“ “ </li></ul><ul><li>- </li></ul><ul><li>+ </li></ul><ul><li>AND </li></ul><ul><li>OR </li></ul><ul><li>NOT </li></ul><ul><li>( ) </li></ul>* ~ Filetype Site Math Conversion define
    19. 19. 3.1 Search Techniques 3 <ul><li>Tips </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>Challenge: </li></ul><ul><li> </li></ul><ul><li> </li></ul>
    20. 20. 3.2 Information Literacy <ul><li>Reliable ( </li></ul><ul><li>Accurate </li></ul><ul><li>Current </li></ul><ul><li>Relevant </li></ul><ul><li>Bias </li></ul><ul><li>Intention </li></ul><ul><li>Owner </li></ul>
    21. 21. <ul><li> </li></ul>
    22. 22. 3.3 Manage Information <ul><li> </li></ul><ul><li>Take the quiz </li></ul><ul><li>History </li></ul><ul><li>Bookmarks </li></ul><ul><li>RSS </li></ul><ul><li>Saved search results </li></ul>
    23. 23. 3.4 Download and store <ul><li> </li></ul><ul><li>Take the quiz </li></ul><ul><li>Webpage </li></ul><ul><li>Website </li></ul><ul><li>Images </li></ul><ul><li>Text </li></ul><ul><li>Video </li></ul><ul><li>Music </li></ul><ul><li>software </li></ul>
    24. 24. Online Communication
    25. 25. 4.1 Communicate information <ul><li>saved information </li></ul><ul><li>real time information </li></ul><ul><li> </li></ul><ul><li>Take the quiz </li></ul>
    26. 26. 4.3 Share information <ul><li>Link </li></ul><ul><li>Webpage </li></ul><ul><li>Photograph </li></ul><ul><li>Calendar </li></ul><ul><li>feed </li></ul>
    27. 27. 4.3 Submit information <ul><li> </li></ul><ul><li>Take the quiz </li></ul><ul><li> </li></ul><ul><li>Take the quiz </li></ul><ul><li>Rating </li></ul><ul><li>Review </li></ul><ul><li>Recommendation </li></ul><ul><li>Wiki </li></ul><ul><li>Comment </li></ul>
    28. 28. Netiquettes <ul><li>Do’s and Don’ts </li></ul><ul><li> </li></ul><ul><li>Email </li></ul><ul><li>Chat </li></ul>
    29. 29. Safety and Security
    30. 30. 5.1 Threats to system <ul><li>Extreme temperatures </li></ul><ul><li>Voltage problems </li></ul><ul><li>Hackers </li></ul><ul><li>Physical Theft </li></ul><ul><li>Virtual Theft </li></ul><ul><li>Viruses, Worms, and Trojan Horses </li></ul><ul><li>Spyware </li></ul><ul><li>Internet Scams </li></ul><ul><li>Online Predators </li></ul><ul><li>Human Error </li></ul><ul><li>Hardware damage </li></ul>
    31. 31. 5.2 Threats to information <ul><li>Malicious program </li></ul><ul><li> </li></ul><ul><li>Take the quiz </li></ul><ul><li>Hacker </li></ul><ul><li>Phishing </li></ul><ul><li>Identity theft </li></ul>
    32. 33. 5.3 Threats to user <ul><li>Behavior </li></ul><ul><li>Identity </li></ul><ul><li>Deception </li></ul><ul><li> </li></ul><ul><li>Take the quiz </li></ul>
    33. 34. <ul><li>Health, safety </li></ul><ul><li>Accidents </li></ul><ul><li>Repetitive Strain Injury (RSI) </li></ul>
    34. 35. 5.4 Minimize risk <ul><li>Settings </li></ul><ul><li>Software </li></ul><ul><li>Caution </li></ul><ul><li>Backup </li></ul>
    35. 36. Guidelines <ul><li>Set a username and password </li></ul><ul><li>Use hard-to-guess passwords </li></ul><ul><li>Keep passwords secure </li></ul><ul><li>Lock your computer </li></ul><ul><li>Encrypt data </li></ul><ul><li>Clear history, cache, cookies </li></ul>
    36. 37. 5.6 Precautions: Software <ul><li>Firewall </li></ul><ul><li>Browser </li></ul><ul><li>content filtering </li></ul><ul><li>proxy servers </li></ul>
    37. 38. 5.6 Precautions: Tips <ul><li>Report </li></ul><ul><ul><li>inappropriate behavior </li></ul></ul><ul><ul><li>security threats or breaches </li></ul></ul><ul><li>Avoid </li></ul><ul><ul><li>inappropriate disclosure of information </li></ul></ul><ul><li>Follow </li></ul><ul><ul><li>Netiquette </li></ul></ul>
    38. 39. 5.7 Secure access <ul><li>Username and password </li></ul><ul><li>Password strength </li></ul><ul><li>Online identity </li></ul><ul><li>Personal information </li></ul>
    39. 40. 5.8 Laws <ul><li>Data Protection Act 1998 </li></ul><ul><li>Piracy </li></ul>
    40. 41. 3 P’s <ul><li>Privacy - I will protect my privacy and respect the privacy of others. </li></ul><ul><li>Property - I will protect my property and respect the property of others. </li></ul><ul><li>a(P)propriate Use - I will use technology in constructive ways and in ways which do not break the rules of my family, church, school, or government. </li></ul><ul><li>- Doug Johnson, Director of Media and Technology for the Mankato (MN) Public Schools </li></ul>
    41. 42. Copyright Violation <ul><li>Plagiarism (Read from kit) </li></ul><ul><li>Inappropriate-use and piracy </li></ul><ul><ul><li>Music </li></ul></ul><ul><ul><li>Software </li></ul></ul><ul><ul><li>Logo </li></ul></ul><ul><li>Unauthorized access </li></ul><ul><li> </li></ul>
    42. 43. Copyright Prevention <ul><li>Legal use </li></ul><ul><ul><li>Using copyrighted material for educational purposes </li></ul></ul><ul><ul><li>Sharing links instead of downloaded material </li></ul></ul><ul><ul><li>Using copyrighted material with the copyright owner's permission </li></ul></ul><ul><ul><li>Copyleft </li></ul></ul>
    43. 44. Copyright Prevention <ul><li>If you use material from the Internet: </li></ul><ul><ul><li>Give reference of the source </li></ul></ul><ul><ul><li>Quote the name of the author </li></ul></ul><ul><ul><li>where you found the information from </li></ul></ul><ul><ul><li>document date </li></ul></ul><ul><ul><li>date of visit </li></ul></ul><ul><ul><li>Title of the work </li></ul></ul>
    44. 45. IPR <ul><li>Owner has exclusive rights to control the use of the material to: </li></ul><ul><ul><li>Copy, reproduce, or distribute the property. </li></ul></ul><ul><ul><li>Share or sell the rights to the property. </li></ul></ul><ul><ul><li>Give away the rights to the property for free. </li></ul></ul>
    45. 46. Troubleshooting
    46. 47. 6.1 Problems <ul><li>cannot connect </li></ul><ul><li>cannot browse </li></ul><ul><li>page does not exist/removed </li></ul><ul><li>JavaScript </li></ul><ul><li>plug-in missing </li></ul><ul><li> </li></ul><ul><li>Take the quiz </li></ul>