Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

ECDL Module 7: Web Browsing and Communication

4,675 views

Published on

This presentation covers module 7 in ECDL which is divided into two sections. The first section, Web Browsing, requires the candidate to know about the Internet and to use a web browsing application. The second section, Communication, requires the candidate to understand some of the concepts of electronic mail (e-mail) and know about other communication options.
Through studying this module, the learner will be able to understand how to use internet and email in a safe and secure way, explaining key terms and developing fundamental knowledge of computer security.

References
1. http://www.yatlearning.com/
2.http://www.bcs.org/

Published in: Education

ECDL Module 7: Web Browsing and Communication

  1. 1. Web Browsing and Communication BY HASSAN AYAD TA, Cairo University
  2. 2. Web Browsing and Communication Web Browsing Communication 2
  3. 3. Web Browsing  The Internet  Using the Browser  Using the Web  Web Outputs 3
  4. 4. Communication  Electronic Communication  Using e-mail  E-mail Management 4
  5. 5. The Internet 5
  6. 6. Concepts/Terms set of millions of computers worldwide, connected to the network with a purpose of exchanging data among users World Wide Web – one of the services on the Internet which we use to browse web pages (set of HTML documents connected with hyperlinks) Hypertext Transfer Protocol – protocol (rules) that allows transmission of information contained on the Web Internet WWW HTTP 6
  7. 7. Concepts/Terms Uniform Resource Locator An address that directs your request to the appropriate server and directory A special type of text string that accesses a file or page by simply clicking the link A company that provides access to the Internet, usually for a fee The protocol used to exchange (a form of downloading) files via the Internet URL Hyperlink ISP FTP 7
  8. 8. Web Address Structure  Web address elements of the URL http://www.ITdesk.info are:  http - protocol (rules of transmission)  www – type of service available on the Internet  ITdesk –domain name  info –top-level domain  Site types (.com, .gov, .edu, .org)  International domains (.hr, .si, .it, .de…) are ccTLD - country code top-level domain 8
  9. 9. What is a web browser?  Web browser is a software (program) which allows us to browse web pages.  Some web browsers are: Mozilla Firefox, Opera, Safari, Internet Explorer, Google Chrome etc. 9
  10. 10. What's a Search Engine?  A search engine is software that runs a keyword or phrase search on Internet documents.  Some web browsers are: google, yahoo, bing, etc. 10
  11. 11. RSS & Podcast  RSS (Really Simple Syndication) is a method used to publish information that needs to be frequently updated.  You can view a demo on RSS in the uploaded slides RSS.pptx  Podcast is a recording of a radio broadcast or a video that can be taken from the internet  You can view a demo on Podcast in the uploaded slides Podcast.pptx 11
  12. 12. Security Consideration  Protected Web site requires use of username and password.  Https and lock symbol identify a secure website. 12
  13. 13.  Digital certificate proves the identity of a website.  Encryption is a means of 'scrambling' a message or web page 13 Security Consideration
  14. 14. Security Consideration  Malware is a software such as a virus on a computer or computer network that the user does not know about or want.  Install antivirus and update regularly.  Firewall is program that controls and protects ports, allowing only authorized communication. 14
  15. 15. Security Consideration  Risk associated with online activities:  Unintentional disclosure of personal information.  Bullying or harassment.  Targeting of users by predators . 15
  16. 16. Security Consideration  Parental control options  Supervision  Web browsing  Computer games restrictions  Computer usage time limits.  You can view a demo on Parental Control in the uploaded slides PC.pptx 16
  17. 17. Using the Browser/The Web & Web Output 17
  18. 18. Using Internet Explorer  You can view a demo on using IE browser in the uploaded slides IE.pptx 18
  19. 19. Electronic Communication 19
  20. 20. What is an E-mail? 20
  21. 21. E-mail Structure  Structure of an e-mail address is:  user name,  @ symbol,  domain name (name of the computer on the Internet where mail will be delivered to the recipient)  top-level domain 21
  22. 22. SMS & VoIP  SMS (Short Message Service) allows you to send and receive text messages between mobile (cell) phones.  VoIP(Voice over Internet Protocol ) is a technology that allows you to talk with other people via the Internet. 22
  23. 23. IM  Instant messaging (IM) provides a mechanism for real-time communication between two or more people sending text messages via their computers.  Benefits of IM:  Real-time communication  Knowing whether contacts are online  Low cost  Ability to transfer files 23
  24. 24. Online Virtual Community Social Networking Internet Forums Chat Rooms Online Computer Games 24
  25. 25. Security Considerations  Be aware of the possibility receiving a fraudulent and unsolicited e-mail.  Phishing refers to efforts to trick you into revealing your personal or financial information.  Be aware of the danger of infecting the computer with a virus by opening an unrecognized e-mail message, by opening an attachment. 25
  26. 26. Security Considerations A digital signature  Information on an electronic message that proves who the person sending the message is Sign with your Digital Signature 26
  27. 27. Advantages of E-mail  E-mail system has many advantages like:  Speed of delivery  Low cost  Flexibility of using web-based e-mail account in different locations. 27
  28. 28. Network Etiquette (Netiquette)  Netiquette includes:  Using accurate and brief descriptions in e-mail message subject fields  Brevity in e-mail responses  Spell checking outgoing e-mail, etc. 28
  29. 29. E-mail with attachment  When sending file attachments, you may encounter problem like:  File size limits  File type restrictions (for example, executable) 29
  30. 30. Differences between TO, CC, BCC  When you send an e-mail, specify contacts with the headers TO, CC, BCC as the following:  TO: People for which the message is aimed specifically.  CC (Carbon file): People to whom a copy of the email will be delivered, but they are notified with all addresses the message is sent to.  BCC (Blind Carbon file): People to whom a copy of the email will be delivered, but they don’t know which addresses the message is sent to. 30
  31. 31. Using E-mail & E-mail Management 31
  32. 32. Using E-mail & E-mail Management  You can view a demo on using the Outlook email in the uploaded slides outlook.pptx 32

×