O Leary2008 Ce Complete Chapter2


Published on

Published in: Technology, Design
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • At the end of this chapter you should be able to: 1 Discuss the origins of the Internet and the Web. 2 Describe how to access the Web using providers and browsers. 3 Discuss Internet communications, including email, instant messaging, and social networking. 4 Describe search tools, including search engines and metasearch engines. 5 Discuss electronic commerce, including B2C, C2C, B2B, and security issues. 6 Describe these Web utilities: Web-based application, FTP, plug-ins, and filters.
  • Most developed network system currently in use; connects people all over the world Originally started in 1969 when US funded a research project (ARPANET—Advanced Research Project Agency Network) CERN – Center for European Nuclear Research World Wide Web (Web) is a part of the Internet – not the Internet; introduced in 1992 by consortium in Switzerland. Originally started as research and text-based network to exchange research ideas from university to university Developed into a network of networks One of the most powerful tools of the 21 st century Internet & Web further clarified Internet is the actual physical network comprised of wires, cables (Key Term), & satellites Being connected to the network is often referred to as being online (Key Term) The Web is a multimedia interface to resources available on the internet
  • Most common Internet applications Communicating - sending e-mail and discussion group participation You can chat live with others Ask students what chat software they use Shopping – fastest-growing applications Searching - using virtual libraries Entertainment – music downloads; integration of TV and PC Education or e-learning (Key Term) You can take classes on almost any subject (Key Term)
  • The common way to access the Internet is through a provider or host computer Providers - already connected to the Internet -- furnish a pathway for other users Typical providers include: Colleges and universities – usually “free” Internet service providers ( ISP ) (Key Term)can be local (regional) or national Ask students to identify various ISPs used in their environment Types of providers National – like AOL Regional – smaller service area Wireless No telephone lines used Provide connection through wireless modems (Key Term) Client-server network is comprised of users that are connected to a ISP via a variety of connecting technologies (dial-up (Key Term), telephone connections, wireless modems, DSLs (Key Term), etc…) The users computer is the client that requests services from the provider’s computer or server
  • Browsers allow you to search or surf (Key Term) the Web Navigate, search for information and communicate using the Web Use URL (uniform resource locator) (Key Term) to connect to other resources
  • Two parts to URL: protocol (Key Term), rules for exchanging data between computers (usually http://); domain name (Key Term) also known as a top-level domain (Key Term) or server where the resource is located (www.mtv.com)
  • Browser is software that allows users to navigate the Web and read the multimedia formatted pages Connect to Web sites using URL addresses (uniform resource locator) Document is sent to computer usually coded in HTML (Hypertext Markup Language) (Key Term) or some variation Interprets the HTML codes displaying page May contain Hyperlinks (Key Term) -- allow users to quickly connect to other pages or Web sites Graphics Text Web server– the computer that stores and shares graphics, test, audio & video clip files Web pages contain links (Key Term) to programs called applets (Key Term) These are special programs written in a programming language called Java (Key Term) These programs can be quickly downloaded and run by most browsers
  • Communication is the most popular Internet activity Types of communications: Email (Key Term) Instant Messaging (Key Term) Social Networking (Key Term)
  • E-mail or electronic mail (Key Term) Transmission of electronic messages over the Internet Has three basic parts: header (Key Term), message (Key Term), and signature line (Key Term) Header (Key Term) Address (Key Term) Subject (Key Term) – very important to include this in a message Attachments (Key Term)
  • Internet uses the domain name system (DNS), which gives names and numbers to people and computers Address (Key Term) has two parts User name - identifies unique user or computer in the domain Domain name (Key Term) - references a specific organization Top-level domain code identification includes geographical location or organizational identification .com = commercial .edu = education and research .org = organizations (usually non-profit) .net = major network centers (usually easier to access than commercial) .gov = government
  • Spam (Key Term) – unsolicited e-mail Distraction, Nuisance Computer viruses (Key Term) can also be attached to spam Spam blockers (Key Term) use a variety of different approaches to identify and eliminate spam CAN-SPAM Act requires that every marketing related email provide an opt-out option Tips to blocking spam: Choose a complex address Keep a low profile Don’t ever respond to spam Use ez-mail filter options Use anti-spam To learn how to block spam from your inbox, reference Making IT Work For You: Blocking Spam on pages 38 & 39
  • Instant Messaging (Key Term) Extension of email that allows two or more people to contact each other via direct, live communication To use instant message, specify list of friends (Key Term) and register with an instant messaging server Some services include video and file-sharing Different services do not always play well together. Universal instant messenger (Key Word) programs are being developed (i.e. Gaim, Odigo, Trilogy), to overcome this limitation. Direct students to p. 36 for table on Spam Blocker(s)
  • Social Networking (Key Term) One of the fastest growing uses of the Internet Connecting individuals to one another Three basic categories Reunite – member databases used for finding long lost friends (Classmates Online and Facebook) Friend of a friend – connecting friends of friends via profile information (Friendster and MySpace) Common interest – connecting those with common interests or hobbies Consider carefully the information you are disclosing when joining social networking sites.
  • Specialized programs that assist you in locating information on the Web and the Internet Search services (Key Term) help you locate information; they maintain the database that helps you get where you want Special programs called spiders (Key Term) continually look for information and updated services Search engines (Key Term) – assist you to locate information Use keyword search (Key Term); know “rules” i.e. use + or quotes to look for phrases rather than individual words Use directory search (Key Term) – list of categories or topics; also known as index search (Key Term) Examples AOL Ask Jeeves Google MSN Search Yahoo! Metasearch engines (Key Term) – programs that automatically submit your search request to several search engines simultaneously Specialized search engines (Key Term) - Programs that focus on subject specific Web sites
  • Keyword search (Key Term) – enter a keyword or a phrase reflecting the information you want Returns a number of hits (Key Term) Each hit includes a hyperlink Directory search (Key Term) Known as an index search Select a category or topic that fits the information you want Note: a recent study by the NEC Research Institute found that any one search engine includes only a fraction of the informational sources on the Web. Therefore, it is good to use more than one search engine when researching important topics.
  • Programs that automatically submit your search request to several engines simultaneously The engine receives the results, eliminates duplicates, orders hits, and then provides the edited list to you
  • Programs that focus on subject specific Web sites Specialized sites can potentially save you time by narrowing your search
  • Anyone can publish to the web Not all Web information has been subjected to peer review or submission guidelines Ways to evaluate accuracy of Web information: Authority – Is author an expert in the subject area? Is the site an official site for the information presented, or, is it an individual person’s Web site? Accuracy – Is the information subject to critical review prior to posting? Does the site provide a means to report errors to the author? Objectivity – Is the information factual, or does the author have a bias? Currency – Is the information current? Is there a “published on” date or “updated on” date indicated?
  • Electronic commerce is buying and selling over the Internet Three basic types of electronic commerce: business to consumer; consumer to consumer; and business to business B2C (Key Term) Involves the sale of a product or service to the general public or end users C2C (Key Term) Involves individuals selling to individuals B2B (Key Term) Involves the sale of a product or service from one business to another
  • B2C is fastest growing type of e-commerce Three types Online banking (Key Term) Becoming a standard feature of banking institutions Customers use standard browser to perform many banking operations Financial trading Online stock trading allows investors to research, buy, and sell stocks and bonds over the Internet Shopping Buying and selling of consumer goods via the Internet Sites exist that provide support for consumers looking to compare products and locate bargains
  • Recent trend in C2C e-commerce is Web auctions (Key Term); similar to traditional auctions – no one sees each other Auction house sites (Key Term) – merchandise presented for auction Person-person auction sites (Key Term) – more like flea markets; forum for buyers and sellers to gather Similar to Web traditional auctions Buyers and sellers seldom meet face-to-face Ask the students if they have ever used E-bay Example auction sites include Amazon, Bidz, eBay, Sotheby’s, and Yahoo!
  • A challenge is the payment for goods Should be reliable, secure, and fast Electronic payment -- easy, secure payment method Checks -- slowest and least convenient Credit cards -- easier to work with, somewhat vulnerable to theft Criminals known as carders (Key Term) specialize in stealing, trading, and using stolen credit cards over the internet Digital cash (Key Term) Purchased from third party (usually a special bank); more secure than credit cards Providers include Ecash, Google, Internet Cash, and PayPal
  • Web-based applications (Key Term) are offered by Web-based services (Key Term) (often free) that provide Internet access to programs with capabilities similar to Microsoft Word, Excel, and PowerPoint. FTP transfers files; file transfer protocol (Key Term) ; Internet service for file transfer Downloading (Key Term) - transmitting files to your computer Uploading (Key Term) - transmitting files from your computer to another computer Plug-ins (Key Term) -- automatically loaded by and work with your browser; Acrobat Reader; Cosmos from Silicon Graphics (3-d displays); Media Player; QuickTime from Apple; RealPlayer; and Shockwave from Macromedia Filters (Key Term) – block access to specified sites; set time limits Internet Security Suites (Key Term) – collection of utility programs designed to maintain your security and privacy while you are on the Web
  • Internet Security Suites (Key Term) control… Spam (Key Term) Protect against computer viruses (Key Term) Provide Filters (Key Term)
  • Webmasters (Key Term) can expect to earn a salary of $48,000 to $73,000 Position is relatively new in many corporations and tends to have fluid responsibilities Experience in this field could lead to managerial opportunities
  • Downsides example: Infiltration of Internet viruses and spyware may enable your every move at home to be broadcast over the Internet
  • Have students turn to the end of Chapter 2 in their textbooks to view the same “Open-Ended” questions/statements
  • Have students turn to the end of Chapter 2 in their textbooks to view the same “Open-Ended” questions/statements
  • O Leary2008 Ce Complete Chapter2

    1. 1. Chapter 2 The Internet, The Web, and Electronic Commerce
    2. 2. Competencies (1 of 2) <ul><li>Discuss the origins of the Internet and the Web </li></ul><ul><li>Describe how to access the Web using providers and browsers </li></ul><ul><li>Discuss Internet communications, including e-mail, instant messaging, and social networking </li></ul>Page 28
    3. 3. Competencies (2 of 2) <ul><li>Describe search tools, including search engines and metasearch engines </li></ul><ul><li>Discuss electronic commerce, including B2C, C2C, B2B, and security </li></ul><ul><li>Describe Web utilities: Web-based applications, FTP, plug-ins, and filters </li></ul>Page 28
    4. 4. Introduction <ul><li>The Internet is often referred to as the Information Superhighway because it connects millions of people across the globe. </li></ul><ul><li>Unlike a typical highway, the Internet moves idea and information. </li></ul><ul><li>The Web provides an easy-to-use, intuitive interface to connect to the Internet and is used by millions of people every day. </li></ul>Page 29
    5. 5. The Internet and the Web <ul><li>Large network that connects smaller networks globally </li></ul><ul><li>The Internet was Launched in 1969 </li></ul><ul><ul><li>National computer network </li></ul></ul><ul><ul><li>US funded project called ARPANET </li></ul></ul><ul><li>World Wide Web or WWW was introduced in 1992 at CERN </li></ul>Page 30
    6. 6. Common Internet Uses <ul><li>Communicating </li></ul><ul><ul><li>Exchange e-mail </li></ul></ul><ul><ul><li>Discussion Groups </li></ul></ul><ul><li>Online shopping </li></ul><ul><li>Searching </li></ul><ul><ul><li>Virtual Libraries </li></ul></ul><ul><li>Entertainment </li></ul><ul><li>Education or e-learning </li></ul>Page 30
    7. 7. Internet Access Providers <ul><li>Common way to access the Internet </li></ul><ul><li>Commercial Internet Service Providers (ISP) </li></ul><ul><ul><li>National Service Providers </li></ul></ul><ul><ul><li>Regional Service Provider </li></ul></ul><ul><ul><li>Wireless service providers </li></ul></ul>Page 31
    8. 8. Browsers <ul><li>Programs that provide access to Web resources </li></ul><ul><li>Allow you to surf the Internet </li></ul><ul><li>Three well-known browsers </li></ul><ul><ul><li>Mozilla Firefox </li></ul></ul><ul><ul><li>Netscape Communications </li></ul></ul><ul><ul><li>Microsoft Internet Explorer </li></ul></ul><ul><li>Address or location of the resource must be specified </li></ul><ul><ul><li>URL </li></ul></ul>Page 31
    9. 9. URLs <ul><li>Uniform Resource Locators </li></ul><ul><ul><li>All URLs have at least two parts </li></ul></ul><ul><ul><ul><li>Protocol </li></ul></ul></ul><ul><ul><ul><li>Domain name </li></ul></ul></ul><ul><li>Locates Web sites </li></ul>Page 32
    10. 10. More on Browsers <ul><li>Browsers interpret HTML commands </li></ul><ul><ul><li>Hypertext Markup Language </li></ul></ul><ul><ul><li>Contained in a document </li></ul></ul><ul><li>Display document as a Web page </li></ul>Page 33
    11. 11. Communication <ul><li>Most popular Internet activity </li></ul><ul><li>Types of communication </li></ul><ul><ul><li>Electronic Mail ( E-Mail ) </li></ul></ul><ul><ul><ul><li>E-Mail Address </li></ul></ul></ul><ul><ul><ul><li>Spam </li></ul></ul></ul><ul><ul><li>Instant Messaging </li></ul></ul><ul><ul><li>Social Networking </li></ul></ul>Page 33
    12. 12. E-Mail <ul><li>Transmission of electronic messages over the Internet </li></ul><ul><li>Basic parts </li></ul><ul><ul><li>Header </li></ul></ul><ul><ul><ul><li>Address </li></ul></ul></ul><ul><ul><ul><li>Subject </li></ul></ul></ul><ul><ul><ul><li>Attachment </li></ul></ul></ul><ul><ul><li>Message </li></ul></ul><ul><ul><li>Signature Line </li></ul></ul>Page 34 Return
    13. 13. E-Mail Address Example Page 34 Return
    14. 14. Spam Page 35 <ul><li>Junk and/or unwanted Email </li></ul><ul><li>Computer viruses or destructive programs are often attached to unsolicited email </li></ul><ul><ul><li>CAN-SPAM Act </li></ul></ul><ul><li>Spam blockers incorporate a myriad of approached to identify and control spam </li></ul><ul><li>Spam blockers are also referred to as: </li></ul><ul><ul><li>Junk mail filters </li></ul></ul><ul><ul><li>Anti-spam programs </li></ul></ul>Return
    15. 15. Instant Messaging Page 35 <ul><li>Is an extension of email that provides direct, live communication between two or more people </li></ul><ul><li>Instant messaging programs also include: </li></ul><ul><ul><li>Video conferencing features </li></ul></ul><ul><ul><li>File sharing </li></ul></ul><ul><ul><li>Remote assistance </li></ul></ul><ul><li>Most widely used instant messaging services: </li></ul><ul><ul><li>AOL’s Instant Messenger </li></ul></ul><ul><ul><li>Microsoft’s MSN Messenger </li></ul></ul><ul><ul><li>Yahoo Messenger </li></ul></ul>Return
    16. 16. Social Networking Page 36 <ul><li>One of the fastest growing uses of the Internet </li></ul><ul><li>Three basic categories: </li></ul><ul><ul><li>Reunite </li></ul></ul><ul><ul><li>Friend of a friend </li></ul></ul><ul><ul><li>Common interest </li></ul></ul>
    17. 17. Search Tools <ul><li>Search engines </li></ul><ul><li>Metasearch engines </li></ul><ul><li>Specialized search engines </li></ul><ul><li>Tips </li></ul><ul><ul><li>Start with the right approach </li></ul></ul><ul><ul><li>Be as precise as possible </li></ul></ul><ul><ul><li>Use multiple words </li></ul></ul><ul><ul><li>Use Boolean operators </li></ul></ul><ul><ul><li>Check your spelling </li></ul></ul><ul><ul><li>Keep moving </li></ul></ul>Page 37
    18. 18. Search Engines <ul><li>Specialized programs to assist in locating information </li></ul><ul><li>Types of searches </li></ul><ul><ul><li>Keyword search </li></ul></ul><ul><ul><li>Directory search </li></ul></ul>Page 40 Return
    19. 19. Metasearch Engines Page 41 Return www.webmetasearch.com Web Meta Search www.search.com Search www.metacrawler.com MetaCrawler www.ixquick.com Ixquick www.dogpile.com Dogpile Site Metasearch
    20. 20. Specialized Search Engines Page 42 Return www.medsite.com Medicine www.lawcrawler.com Law www.historynet.com History www.infomat.com Fashion www.eco-web.com Environment Site Specialized Service
    21. 21. Content Evaluation <ul><li>Not all information on the web is accurate </li></ul><ul><li>Ways to evaluate accuracy of Web information include: </li></ul><ul><ul><li>Authority </li></ul></ul><ul><ul><li>Accuracy </li></ul></ul><ul><ul><li>Objectivity </li></ul></ul><ul><ul><li>Currency </li></ul></ul>Page 42
    22. 22. Electronic Commerce <ul><li>Also known as e-commerce </li></ul><ul><li>Buying and selling of goods over the Internet </li></ul><ul><ul><li>Business-to-consumer (B2C) </li></ul></ul><ul><ul><li>Consumer-to-consumer (C2C) </li></ul></ul><ul><ul><ul><li>Web auctions </li></ul></ul></ul><ul><ul><li>Business-to-business (B2B) </li></ul></ul>Page 42
    23. 23. Business to Business <ul><li>Involves the sale of a product or service from one business to another (B2B) </li></ul><ul><li>Primarily a manufacturer supplier relationship </li></ul>Page 43
    24. 24. Business to Consumer <ul><li>Fastest growing type of e-commerce </li></ul><ul><li>Three most widely used B2C applications: </li></ul><ul><ul><li>Online banking </li></ul></ul><ul><ul><li>Financial trading </li></ul></ul><ul><ul><li>Shopping </li></ul></ul>Page 43 Return
    25. 25. Consumer to Consumer Web Auctions <ul><li>Consumer-to-consumer e-commerce (C2C) </li></ul><ul><li>Similar to traditional auctions </li></ul><ul><li>Types </li></ul><ul><ul><li>Auction house sites </li></ul></ul><ul><ul><li>Person-to-person auction sites </li></ul></ul>Page 44
    26. 26. Security <ul><li>Payment methods must be fast, reliable, and secure </li></ul><ul><li>Three basic options </li></ul><ul><ul><li>Checks </li></ul></ul><ul><ul><li>Credit card </li></ul></ul><ul><ul><li>Digital cash </li></ul></ul>Page 44
    27. 27. Web Utilities <ul><li>Specialized utility programs that make using the internet & web safer and easier </li></ul><ul><ul><li>Web-based applications </li></ul></ul><ul><ul><li>FTP </li></ul></ul><ul><ul><li>Plug-Ins </li></ul></ul><ul><ul><li>Filters </li></ul></ul><ul><ul><li>Internet Security Suites </li></ul></ul>Page 46
    28. 28. Plug-Ins Page 48 Return www.adobe.com Shockwave www.service.real.com Real Player www.apple.com QuickTime www.microsoft.com Media Player www.adobe.com Acrobat Reader
    29. 29. Filters Page 47 Return www.safeeyes.com Safe Eyes Platinum www.netnanny.com Net Nanny www.softforyou.com IProtectYou Pro Web Filter www.cybersitter.com Cybersitter www.cyberpartrol.com CyberPatrol
    30. 30. Internet Security Suites <ul><li>Collection of utility programs designed to maintain your security and privacy while on the web </li></ul><ul><ul><li>McAfee </li></ul></ul><ul><ul><li>Norton </li></ul></ul>Page 48
    31. 31. Careers In IT - Webmasters <ul><li>Develop & maintain websites </li></ul><ul><li>Back-up of the company website, updating resources, and development of new resources </li></ul><ul><li>Work with the marketing department to increase the site traffic flow </li></ul>Page 49
    32. 32. A Look to the Future Homes of Tomorrow <ul><li>“ Smart” appliances in homes will have their own Web page </li></ul><ul><li>Refrigerators will be able to manage their inventory and automatically order to re-supply </li></ul><ul><li>Internet cameras, wireless technologies, & high-speed internet will allow you to virtually monitor your home while on travel </li></ul><ul><li>Downsides? </li></ul>Page 50
    33. 33. <ul><li>Discuss the uses of the Internet. Which activities have you participated in? Which one do you think is the most popular? </li></ul><ul><li>Explain the differences between the three types of providers. </li></ul><ul><li>What are the basic elements of an e-mail message? </li></ul>Discussion Questions (Page 1 of 2) Page 57
    34. 34. <ul><li>What is social networking? Describe the three types of social networking sites. </li></ul><ul><li>Describe the different types of search engines. Give an example of the type of search each engine is best for. </li></ul>Discussion Questions (Page 2 of 2) Page 57