Profile
Online biography
Network of friends
Group of friends online
Online community
Community of people online
Virtual world
The world of the online community (i.e. not the real world)
Chat
Communicating in real time online
Chatroom
A virtual setting where groups of people can communicate in real time
Netiquette
Online etiquette (e.g. being aware of other people's feelings)
Electronic mail (e-mail) – send a message to another person or persons
Instant messaging (chat) – send short messages to another person for real time chat
Newsgroup – a site where groups of people can read and write information of common interest
Social networking – sites where you can meet and interact with people all over the world
Conferencing – groups of people in different areas/countries meeting together online to discuss matters (e.g. business conference, Google hangout)
Blogs – online journals of individuals or groups
Vlogs – similar to blogs but with video (perhaps on YouTube)
A run through of what happens to an email on Google Mail can be seen here:
http://www.google.com/green/storyofsend/desktop/
With increasing use of internet enabled mobile devices (smart phones) email is becoming more like instant messaging as you can receive notifications on your phone anywhere.
This diagram shows how anything could be connected to the internet, e.g.:
A mobile (smart) phone can be used to access email, web pages, apps.
Pot plants can have their water level monitored.
Parcels can be tracked.
Pets can be monitored.
Contents of fridges can be noted.
Elderly people can be monitored.
Books can be tracked.
Bicycles can be tracked.
The heating and lighting controls in your home could be accessible via the internet so you could set the heating, etc., before you get home.
An Internet Service Provider (ISP) is a company which provides access to the internet for individuals or other companies (e.g. BT).
An ISP will have many servers to do different things depending on the size of the company and amount of customers, e.g. one for outgoing email, one for incoming email, and may well have several for general net traffic, users’ details, search engines, user web pages, etc.
This URL or website address shows the use of http://. However there are other protocols that learners may see:
https:// (the secure version of HTTP)
ftp:// (File Transfer Protocol)
mailto:// (used to identify the url as an email address).
The domain (between :// and /) is the name of the server the website is hosted on, in this case w3schools.com. These can be spoofed in so far as users unfamiliar with how urls work could be looking at a spoof website, e.g. w3schools.com.spoof.net – imagine if it is your bank's website that is spoofed.
The path (the bit after the /) is the direction to the file or page you want to see on the server, in this case html/default.asp; a folder called html and a file called default.asp are being loaded in your web browser when this url is put in its address bar.
<html> – this is the beginning of an HTML document
<head> – the head is where important information not related to the content of the page should go
<title>My page</title> – this is the title of the page which will be displayed in the top of the window or tab that the page is being displayed in
</head> – this is the end of the head section
<body> – the body is the web page itself, the bit that you will see in the web browser
Hello, world!
</body> – this is the end of the body section
</html> – this is the end of the HTML document
Review quiz
Are the following simplex, half-duplex or duplex:
blogs
instant messaging
conferencing?
Blogs – simplex (readers can reply to your blog but that does not send back to you)
Instant messaging – half-duplex(users can type at the same time but messages are sent one at a time)
Conferencing – duplex (all users can speak at any time)
Databases are made up of:
Table – a collection of records
Record – an item stored with relevant information (e.g. member)
Field – the type of information that is needed in the record (e.g. name, address)
Relationship – the connection between two or more tables
Each element of data will be of a specific data type – the type of data a field must hold (e.g. date of birth, date)
Opportunist – a computer left logged on can be a tempting target for some people
Computer virus – a small software program that can duplicate itself and spread like a real virus. They often make some changes to your files, some are a nuisance and others are a serious problem
Trojan – a small program that hides in your computer files and opens gateways for hackers
Phishing – can take many forms, but usually attempts to steal information from you by directing you to a website that looks like a one you trust. Often an email linking to a spoof website
Your e-reputation is you online.
Many of the websites you visit, including search engines (e.g. Google, Yahoo!) record what you are doing and keep a log of your activities, usually to better serve your future needs (e.g. search ‘Football’ on Google and your stored profile will identify whether you mean Association Football, Rugby Football or American Football, etc.).
What happens if you blog or tweet/post something that is socially unacceptable or something derogatory about another person? Is this logged somewhere? Can it be found?