SlideShare a Scribd company logo
1 of 215
Topics for today:
 Final Website Project Recap
 Computers & Networks – Part 2
 Inclass Assignment
Website Creation
Final Project Requirements
• 2-3 webpage website linking.
• Changes in Font, color, size, and
background should be included.
• At least three images along with
a link to an external URL should
be included.
Part 2 – Computer & Network
Topics
• Network Types – LAN, MAN, and WAN
• Packet Switching
• Additional Network Terms
• Mobile Network
Network Types
Ring Star Bus
 Closed loop or ring Forming a continuous
circle.
 All devices are connected to a
central hub
 All devices are connected to a
single central cable
 Data travels in a unidirectional or
bidirectional manner around the ring
 Data travels directly between the
device and the central hub
 Data is sent along the central
cable
 Relatively fault-tolerant.  Less fault-tolerant if central hub or
switch fails, it can disrupt the entire
network.
 Less fault-tolerant if cable fails,
it can disrupt the entire
network.
 Simpler in terms of cabling and hardware  More scalable add/remove easy  Relatively simple, less cabling
Three common LAN (Local Area Network) topologies: Ring, Star, and Bus.
Local coffee shop's Wi-Fi network is a simple example of a LAN.
For these companies, do you think they are
ring, star, or bus? Why?
• Financial Trading firms that are involved in
high-frequency trading where low latency and
quick data transmissions are crucial for
success.
• Small businesses that are simpler, cost-
efficient with limited resources like mall
offices, retail stores, or local businesses.
• Company with centralized IT allowing for easier
management, troubleshooting, and security
enforcement. Each department or branch can
have its own dedicated connection to the
central server.
Other Network Types
Metropolitan Area Network (MAN)
Covers a larger geographical area than a Local Area
Network (LAN) but is smaller than a Wide Area
Network (WAN)
• Interconnected Campus Networks like UNH
• City-Wide Wi-Fi Networks
Wide Area Network (WAN)
• Large geographic area like Liberty Mutual
• Allows internetworking
Packet Switching
An efficient and reliable transmission of data between devices over a network. It involves breaking data into
smaller units called packets and then routing these packets independently through the network to their
destination.
What is it?
At the destination, these packets are
collected, and then reassembled to the
original message
Discussion:
Why do you think packet
switching is necessary?
 TCP and IP are separate protocols that work together to ensure data is delivered to its intended destination
within a network.
 IP obtains and defines the address—the IP address—of the application or device the data must be sent to.
 TCP is then responsible for transporting and routing data through the network architecture and ensuring it
gets delivered to the destination application or device that IP has defined.
More Network Terms
Transmission Control Protocol (TCP) and Internet Protocol (IP) often referred to as TCP/IP:
A set rules for sending packets over the network
How does packet switching know “how data should be transmitted”?
Breakdown of steps:
1
A connection is
established before
data can be
transferred
2
Breaks data (e.g.,
file, image, etc.) into
packets
3
Puts the address
and a sequence
number on each
packet
4
Check incoming
packets’ sequence
numbers
5
Sort the packets in
the proper order
6
Reassemble data
 1G, 2G, …, 5G are generations of wireless
cellular network technology. These
generational terms refer to the different
stages of advancement and
improvements in mobile
telecommunications standards.
 Main differences between the
technologies are the bandwidth and the
frequency range that data is transferred
between devices
Mobile’s Golden Age
Next HTML Assignment with link to another webpage
1. Open your last HTML file (the one we did on Tuesday including an image and a background.)
2. Save that file on desktop (for some students) or in the inclass activity folder on your desktop with a new name with
page 1 within the name.
3. Save that file on desktop (for some students) or in the inclass activity folder on your desktop with a new name with
page 2 within the name.
4. You should now have 2 identical files but with two different names one with page 1 and one with page 2.
5. Open in your editor the page 1 file.
6. We are going to replace this line:
<p>Thank you for visiting my webpage.</p>
with a link to your page 2 file.
7. Update the text to be this:
<p>If you would like to see other photos</p><a href=“filenamepage2.html">Click Here</a>
8. Save the file (this is page 1)
<!DOCTYPE html>
<html>
<head>
<title>My Dog Bean</title>
</head>
<body style="background-image: url('dog paws.jpg'); text-align: center;">
<h1><b><font face="arial" color="blue" size="15">Welcome to My Web Page showcasing my favorite four-legged Pal
Bean!</font></b></h1>
<p><font face="arial" color="black" size="10">This is a recent photo of Bean.</font></p>
<img src="Bean.jpg">
<h2 style="text-align: left;"><font face="arial" color="red" size="20">Her favorite things include:</font></h2>
<ol style="font-size: 20px; list-style-type: decimal;">
<li style="text-align: left; font-size: 20px;"><font face="arial" color="black" size="20">Belly Rubbing</font></li>
<li style="text-align: left; font-size: 20px;"><font face="arial" color="black" size="20">Walks in the Park</font></li>
<li style="text-align: left; font-size: 20px;"><font face="arial" color="black" size="20">Treats</font></li>
</ol>
<p><font face="arial" color="black" size="20">If you would like to see other photos <a href="HTML Inclass Activity Page 2.html">Click
Here</a></font></p>
</body>
</html>
Next HTML Assignment with link to another webpage (continued)
1. You have now updated page 1 with a link going to page 2.
2. Open page 2 and make some changes including a link to an external site.
3. We are going to replace this line:
<p>Thank you for visiting my webpage.</p>
with a link to an external site
4. Update the text to be this:
<p>To learn more about Stratham Hill Park</p><a href="https://www.strathamnh.gov/stratham-
hill-park-shp">Click Here</a>
5. Save and close the file.
6. We now want to use a browser to look at page 1 html.
7. Click the link to go to page 2.
8. Click the external link.
<!DOCTYPE html>
<html>
<head>
<title>My Dog Bean</title>
</head>
<body style="background-image: url('dog paws.jpg'); text-align: center;">
<h1><b><font face="arial" color="blue" size="15">Additional Pictures of Bean!</font></b></h1>
<p><font face="arial" color="black" size="10">Here is one at Stratham Hill Park.</font></p>
<img src="Bean Park.jpg">
<p><font face="arial" color="black" size="10">Near the tower at Stratham Hill Park.</font></p>
<img src="Bean Hill.jpg">
<p>To learn more about Stratham Hill Park</p><a href="https://www.strathamnh.gov/stratham-hill-park-shp">Click Here</a>
<p>Thank you for visiting my webpage.</p>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>My Dog Bean</title>
</head>
<body style="background-image: url('dog paws.jpg'); text-align: center;">
<h1><b><font face="arial" color="blue" size="15">Welcome to My Web Page showcasing my favorite four-legged Pal
Bean!</font></b></h1>
<p><font face="arial" color="black" size="10">This is a recent photo of Bean.</font></p>
<img src="Bean.jpg">
<h2 style="text-align: left;"><font face="arial" color="red" size="20">Her favorite things include:</font></h2>
<ol style="font-size: 20px; list-style-type: decimal;">
<li style="text-align: left; font-size: 20px;"><font face="arial" color="black" size="20">Belly Rubbing</font></li>
<li style="text-align: left; font-size: 20px;"><font face="arial" color="black" size="20">Walks in the Park</font></li>
<li style="text-align: left; font-size: 20px;"><font face="arial" color="black" size="20">Treats</font></li>
</ol>
<p>If you would like to see other photos</p><a href="C:UsersLisaDesktopPracticePractice2.html">Click Here</a>
</body>
</html>
Computers and Network
Part 1
Formal definition
A programmable machine which
can accept input, process it,
produce (display) output, and
stores results or communicate.
There are 2 components: Hardware (HW) and Software (SW)
1. Hardware
• Input: keyboard, mouse, microphone, scanner, touch-screen,
etc.
• Output: printer, speaker, monitor, touch-screen
• Processing: CPU (central processing unit), ALU (arithmetic-logic
unit), CU (control unit), etc.
• Storage: memory (Random-Access Memory, Read-Only
Memory), secondary storage (hard disk, floppy disk, external
disk, etc.)
• Communication: modem (modulator/demodulator)
2. Software
• Operating System (OS): Windows, MacOS, Unix, Linux, etc.
• Applications: web browsers, work processing, antivirus,
database management systems, games, programming, etc.
Computer
Modem (modulator/demodulator):
A device that transforms the signal from
digital to analog, and vice versa
Router:
Connects more than one devices into the network; sends data
from a device to its destination (IP for Internet Protocol
Network and
Terminologies
Computer network:
• A collection of computing devices that are
connected in various ways to communicate and
share resources
• Connections between computers in a
network are made possible by:
• Physical wires, cables, optical fiber
• Wireless connection usually by
radio waves or infrared signals
• Note that computer networks may contain
devices that are not just physical computers
(e.g., printers, scanners, cameras, node/host)
Network and Terminologies
• Data Transfer Rate (bandwidth):
• Speed with which data is transferred from
one place (on the network) to another
• Computers communicate between each other
using specific protocols
• In networking, a protocol is a set of rules
describing how transferred data should be
formatted and processed between devices
• Client/Server model (centralized)
• File server
• Web server
Next 2 weeks (Week 6 and 7)
Today (2/27)
• Tracking Cookies
• Internet Memes
Thursday (2/29)
• Hacktivism, Cyber Warfare, and Identity Theft
• UNH Security Awareness
Week 7
Tuesday (3/5)
• Assessment #1 what to expect and topic review
• Final Presentation and Final Project assistance,
review, and guidance
Thursday, 3/7
• Assessment #1 please bring your laptops
(Reminder you must take the assessment in the
classroom. Please let me know of any concerns.)
Data Brokers end-to-end View
Let’s now discuss how they are getting the data…
How Do They
Collect It Online?
Various methods of data collection
that we reviewed:
 Browser fingerprinting
 Web and email beacons
 IP address tracking (mention
the limitations of VPNs)
 Ecommerce sites
Let’s look at Tracking Cookies…
Tracking Cookies……
Common Way to Collect Data
Online
The Dual Nature of Cookies:
Cookies are digital entities with a dual nature. On one hand, they enhance your
web experience, making it more convenient and personalized. On the other
hand, if misused, they can become tools for surveillance and potential threats to
your online privacy.
Understanding Cookies and Their Dual Nature
 Cookies let websites remember you, your website login
information, shopping carts, and more.
 With that said, they are also a treasure trove of private
information for cybercriminals to spy on you.
 A basic understanding of cookies can help keep unwanted
eyes off your internet activities.
• At their core, cookies are small text files containing pieces of data.
• They serve as identifiers for your computer when you're connected to a network, such as the internet.
• These identifiers help websites and web applications remember you and your preferences, making your online
interactions smoother and more tailored to your needs.
What are Cookies?
Cookies are employed for several purposes:
1. Session Management: Session cookies are used to manage your
interactions with websites during a single browsing session. They
enable functionalities like keeping you logged in, retaining items in
your shopping cart, and remembering your preferences on a site.
2. Personalization: Cookies personalize your web experience. They
remember your language preferences, themes, and user settings,
ensuring that when you return to a website, it feels familiar and
comfortable.
3. Tracking: Tracking cookies monitor your online behavior and
interactions. They record the pages you visit, the links you click, and
the time you spend on each site. This data can be used to create user
profiles and deliver targeted content and advertisements.
Purposes of Cookies:
Cookies come in various flavors, each with its own characteristics:
1. Session Cookies: These temporary cookies are crucial for session management. They are stored in your device's memory
and are deleted once you close your web browser. They are harmless and used for maintaining your active session.
Example: Shopping Cart Feature of a Website.
2. Persistent Cookies: Persistent cookies have a longer lifespan and are stored on your device's hard drive. They can
remember your login details and preferences across multiple sessions, making them convenient but potentially risky if
misused.
Example: Login Credentials
3. Zombie Cookies: Also known as "evercookies," these persistent cookies are difficult to remove and can be regenerated
even after deletion. They are often used for tracking and can be invasive if not controlled.
Example: web analytics companies to track unique individuals' browsing histories.
4. Super Cookies: Super cookies are a more advanced form of tracking cookies. They use various techniques, such as
browser fingerprinting, to persistently track your online activities. These cookies are particularly concerning for privacy.
Example: Type of cookie that is used to track users’ online activities and preferences.
Different Types of Cookies
Cookie Storage
Where Are Cookies Stored
Cookies are stored in two primary locations:
• Local Storage: Cookies are saved locally on your device,
typically organized by each web browser you use. You can
view and manage cookies through your browser settings.
• Web Server Database: Websites also store data related
to cookies in their databases. This information helps them
recognize returning users and deliver personalized
content.
Cookies In Conclusion…
• Cookies are both your companions and potential spies on the web.
• Understanding their roles, types, and potential risks empowers you
to make informed decisions about your online privacy.
• As you navigate the digital landscape, remember that while cookies
can enhance your web experience, it's crucial to be vigilant and
protect your online identity and data from misuse.
After learning about cookies and their implications, do
you think you will change the way you manage cookies
on your own web browser? Why or why not?
Discussion
Internet
Memes
Topics
• What is a Meme?
• History of Memes
• Meme Effectiveness and Usage
• Memes as a Form of Language and Communication
• Memes in Advertising and Marketing
What is a Meme?
 A meme is an idea, behavior, or style that spreads by
means of imitation from person to person within a culture
and often carries symbolic meaning representing a
particular phenomenon or theme.
 Memes are a worldwide social phenomenon. The more a
meme resonates with people, the more they'll share it and
the farther it will spread.
The history of memes is a fascinating journey that predates the internet and extends into the digital age.
Here's a brief overview of the history of memes:
History of Memes
Pre-Internet Era (Pre-1970s):
 The concept of a "meme" was coined by British evolutionary biologist Richard
Dawkins in his 1976 book, "The Selfish Gene." He used the term to describe an idea,
behavior, style, or cultural practice that spreads within a culture, much like genes
spread within a biological population.
The Early Internet (1970s-1990s):
 The concept of memes began to evolve on early internet forums, where users shared
inside jokes and humorous images. These early examples are often referred to as
"internet memes."
 The first meme to gain widespread internet recognition was the "smiley face"
emoticon, created by Scott Fahlman in 1982.
 In the 1990s, internet users began to create and share viral content, such as chain
emails and animated GIFs. These were the precursors to modern internet memes.
• In the early 2000s, internet culture saw the
emergence of image macros.
An image macro is a piece of digital media
featuring a picture or artwork with some
form of text superimposed.
• One of the most famous early image macros
was "I Can Has Cheezburger?" featuring a cat
with a caption in broken English. It was created
in 2007 by Eric Nakagawa and his friend Kari
Unebasami. The website was one of the most
popular Internet sites of its kind receiving as
many as 1,500,000 hits per day at its peak in
May 2007.
• The website 4chan played a significant role in
the early development of internet memes. It
introduced concepts like "Rickrolling" and
"Advice Animals.“
Advice Animals are a photograph of an
animal captioned with advice.
The Rise of Image Macros 1990’s and 2000s:
YouTube and Viral Videos (2000s-Present):
• With the rise of YouTube and other video-sharing
platforms in the mid-2000s, viral videos became a
major part of meme culture. Videos like "Charlie
Bit My Finger" and "Gangnam Style" became
global sensations.
• YouTube also gave rise to "reaction videos,"
where individuals record their reactions to
watching popular videos, creating a new form of
meme content.
Discussion Questions
 How do you think the early internet meme culture,
characterized by image macros like 'I Can Has
Cheezburger?' and concepts from 4chan like
'Rickrolling' and 'Advice Animals,' laid the foundation
for the development of contemporary meme culture
on platforms like YouTube and social media?
 In what ways have memes evolved in terms of format,
content, and their role in internet culture since the
early 2000s?"
Effectiveness of memes depend on their context and audience.
They should aim to engage and provoke thought of the audience and can convey different messages.
Bridging the gap between the serious and the whimsical. When politicians communicate through memes
Serious vs. Whimsical Political Values
Other Ways Memes are Conveying Different Messages
The values that memes hold dear. Building communities one laugh at a time.
Meme Values Online Community Building
One More Way Memes are Used in Conveying Different Messages…
When memes go viral: The superhero of the digital
world. Memes have the power to spread rapidly.
Meme Values
Memes as a Form of Language and
Communication
 Memes have become a dynamic and
influential form of language and
communication, especially among younger
generations.
 They rely on shared cultural references and
inside jokes to create a sense of community
and connection among those who engage
with them.
 Memes are not just a form of
entertainment; they are a reflection of the
way we communicate, share ideas, and
express ourselves in the digital age.
Key Components of Memes
1. Visual Language: Memes are predominantly visual, often
consisting of images or short videos accompanied by text. This
visual component makes them highly accessible and instantly
recognizable, allowing for quick and efficient communication.
2. Universal Appeal: Memes often tap into universal emotions,
experiences, and situations that people from diverse backgrounds
can relate to. This universal appeal transcends linguistic and
cultural boundaries, making memes a global phenomenon.
3. Shared Cultural References: Memes frequently draw upon
shared cultural references. They reference popular movies, TV
shows, music, historical events, and even internet phenomena.
This reliance on shared cultural knowledge allows meme creators
to create a sense of camaraderie and understanding among their
audience.
Key Components of Memes
Continued…
4. Inside Jokes: Memes are essentially inside jokes on a massive
scale. They create a sense of belonging among those who
understand them while simultaneously excluding those who do
not. This exclusivity can foster a sense of community among
meme enthusiasts.
5. Social Commentary: Memes are not limited to humor; they
often serve as a vehicle for social and political commentary. They
allow individuals to express their views, critique societal norms,
and engage in discussions about various issues in a format that is
easily shareable and digestible.
6. Memes as a Language Evolution: In many ways, memes are
reshaping the way we communicate. They are concise, often
conveying complex ideas or emotions in just a few words and an
image. This brevity mirrors the way language has evolved in the
digital age, with a focus on conciseness and speed.
Key Components of Memes Continued…
7. Adaptability and Remix Culture: Memes are highly adaptable. They
can evolve rapidly as they are remixed, parodied, and modified by
various users. This adaptability allows for the continuous reinvention
of ideas and the creation of new meme dialects.
8. Memes as Cultural Timestamps: Memes serve as cultural
timestamps, reflecting the prevailing attitudes, trends, and sentiments
of a particular moment in time. They capture the trends and provide
insight into the collective consciousness of a generation.
9. Emojis and Reaction Memes: Emojis and reaction memes are a
subset of memes that have become a shorthand for expressing
emotions and reactions in online conversations. They help convey
tone and mood in text-based communication.
In Class Activity – Your Meme Example
 Take a few minutes to think about a Meme that comes to
mind.
 Find one online if you don't have a favorite in mind.
 Once you've chosen a meme, what it is about that meme that
resonates with you.
• What message or emotion do you think it's trying to convey?
• How does it capture a shared cultural reference or inside
joke?
• Additionally, consider how this meme reflects the evolution
of meme culture and its role in contemporary digital
communication.
Memes in Advertising and Marketing
Memes have infiltrated the world of advertising and marketing
as brands seek innovative ways to connect with younger
audiences in the digital age.
Distracted Boyfriend Meme by IKEA
IKEA used the popular "Distracted Boyfriend" meme
in one of its print advertisements. The meme was
reimagined to depict a person choosing IKEA
furniture over their old furniture, cleverly conveying
the idea of attraction to IKEA's products.
Leveraging memes in advertising campaigns can be a powerful
strategy, but it also comes with certain advantages and
potential drawbacks
Burger King's "Whopper Detour" Campaign
Burger King ran a campaign offering Whoppers for one cent, but
the catch was that customers had to order through the Burger
King app while at a McDonald's location. This cheeky campaign
played on rivalry and location-based targeting, generating buzz
and downloads of the Burger King app.
Benefits of Using Memes in
Advertising and Marketing
1. Youthful and Relatable: Memes are often created and
shared by younger audiences, so incorporating them into
marketing efforts can make a brand appear more
youthful and relatable.
2. Increased Engagement: Memes tend to receive higher
engagement on social media platforms due to their
humor and shareability, potentially increasing brand
visibility.
3. Viral Potential: A well-executed meme-based
campaign has the potential to go viral, significantly
amplifying brand exposure without the need for a
substantial advertising budget.
4. Cost-Effective: Creating memes is typically more cost-
effective than producing traditional advertisements,
making it an attractive option for smaller businesses.
Potential Pitfalls of Using Memes in
Advertising and Marketing
• Relevance and Appropriateness: Memes have a short
lifespan, and using outdated or irrelevant memes can make a
brand seem out of touch or insincere.
• Risk of Backlash: Memes can be edgy and sarcastic, which
may not align with a brand's image. Attempting to use memes
that don't match the brand's tone can lead to backlash.
• Cultural Insensitivity: Memes often rely on cultural
references and humor, and brands must be cautious not to
inadvertently offend or appropriate cultures.
• Overuse: Overusing memes in marketing can dilute their
effectiveness and make a brand appear gimmicky. It's crucial
to strike a balance between meme-based content and other
forms of marketing.
Conclusion:
Memes in Advertising and Marketing
 Memes can be a valuable tool in advertising and
marketing, especially when targeting younger
audiences.
 They offer a way to connect, engage, and entertain,
but it's essential for brands to use them thoughtfully,
staying attuned to cultural shifts and potential pitfalls to
ensure their campaigns are both effective and well-
received.
The Good, Bad, and the Ugly of the Internet
1.Assets of Information: Platforms like YouTube have democratized content creation and allowed
individuals to share valuable information and knowledge.
2.Marketing Strategies: Effectiveness of online marketing strategies and how businesses use
social media for self-promotion.
3.Dispersal of Information: News and information can spread rapidly through social media
platforms and there are implications of this phenomenon.
4.Globalization: The internet has connected people across borders and facilitated international
collaborations.
5.Stay Up-to-Date: Keeps individuals informed about current events and trends.
6.Social Media: Has been used as a tool for social movements and activism.
7.Personal Finance: Online banking, budgeting tools, and personal finance management apps.
8.Crowdfunding: Successful crowdfunding campaigns have enabled creative projects to come to
life.
9.Streaming Content: Convenience of streaming services for entertainment and education
The Good
Highlight how social media is used to mobilize people and/or provide other significant social
movement visibility.
Discussion Activity for The Good
1.Desensitization: Excessive exposure to certain content can desensitize individuals
to real-world issues.
2.Misinformation: Misinformation spreads rapidly online and its impact on public
perception.
3.Lazy Habits: The internet might contribute to procrastination and laziness.
4.Online Gambling: The rise of online gambling platforms and the potential risks
associated with them.
5.Negative Social Skills: Excessive online interactions can affect face-to-face
communication skills.
6.Attention Span: Studies have indicated a decrease in attention span due to
frequent internet use.
7.Vulnerability of Personal Information: Personal information can be compromised
online
The Bad
Think of an example of misinformation that has spread online. Discuss why it might be misleading,
and brainstorm ways to verify information before sharing it.
Discussion Activity for The Bad
1.Censorship: Internet censorship and its implications for freedom of speech.
2.Toxic Online Behavior: Cyberbullying, online stalking, and other forms of toxic behavior.
3.Dark Web: Dark web and its association with illegal activities.
4.Fraud: Online scams and fraud, leading to the importance of online security.
5.Sex Trafficking: How the internet can facilitate illegal activities.
6.Personal Identity Loss: Risk of sharing too much personal information online.
7.Surveillance: Online surveillance by governments and corporations.
8.Parental Control: Challenges and benefits of parental control tools for internet usage
The Ugly
.Before we jump to discussion let’s take a look at a real-world current example of Fraud and Personal
Identity Loss – Next slide
Real Example of Fraud and Personal Identity
Think of an example where the internet significantly impacted individuals through online usage. Discuss why it is
damaging and any ways it could be avoided
Warm-up Discussion: The Good, the Bad,
and the Ugly of the Internet
• What are your
perceptions of the internet
- positive, negative, and
any concerning aspects?
• Share personal
experiences and
observations.
HTML
Introduction
Who has experience with HTML?
Topics
• History of HTML
• Parts of an HTML Document
• Basic Structure
• Hands-on In-class Activity
History of HTML
Websites are the building blocks of the internet, and they consist of web pages.
HTML is the backbone of web pages.
What is HTML (HyperText Markup Language)?
 A Web page is a text file written in a language called HTML.
 HTML is not a programming language or a formatting language. It is a markup language.
 A markup language is a language that describes a documents:
 Content (what data to display including text, images, links)
 Structure (how to display it including layout, input forms)
 Styles are format descriptions written in a separate language from HTML that tell browsers how to render
each element for particular devices
History of HTML
 A group of web developers, programmers, and authors of the W3C (http://www.w3.org/)
created a set of standards or specifications that all browser manufacturers were to follow.
 The W3C has no enforcement power
 The recommendations of the W3C are usually followed since a uniform approach to Web page
creation is beneficial to everyone
MARKUP LANGUAGE
VERSUS
PROGRAMMING LANGUAGE
DOCTYPE
• To define a Document Type
Head
• Meta information
• Only <title> is required
• The content of the head element is not
displayed within the Web page
Body
• Text/Content of the webpage to render
<!DOCTYPE html>
<html>
<head> … </head>
<body> … </body>
</html>
Three Parts to an HTML Document
Anything between these two tags (<html> and </html>) makes up the document content
The opening <html> tag marks the start of
an HTML document
Closing </html> tag tells a browser when
it has reached the end of that HTML
document
Basic Structure
The <HEAD> element contains information about the
document, for example the document title or the
keywords The content of the head element is not
displayed within the Web page
The </TITLE> element contains the page’s title: A
document’s title is usually displayed in the browser’s title
bar.
The </BODY> element contains all of the content to
appear on the Web page. The body element can contain
code that tells the browser how to render the content.
 A two-sided tag is a tag that contains some document content. General syntax for a two-sided tag:
<element> content </element>
For example: <P> content </P>
 HTML elements are made up of the start tag, end tag, and the content between these tags
 The core building block of HTML is the tag, which marks the presence of an element
Tags and Elements
For MAC users, you can use TextMate, TextEdit, SubLime, Webstorm, or Atom.
For Windows users, you can use Notepad, Notepad++, Sublime Text, or Atom.
What Software to Use?
Microsoft Word is not the ideal tool for creating HTML documents because it is primarily designed for
creating and editing word processing documents (like .docx files) rather than web pages. Microsoft
Word may introduce unnecessary formatting and code that is not suitable for web development.
Using a code editor will give you more control over your
HTML code and ensure that it is structured properly for
web browsers. Microsoft Word may introduce
unnecessary formatting and code that is not suitable for
web development.
CAUTION!!!
• Always save your html file
with filename.html
extension.
• If you save your file as
filename.txt, your
webpage will not render
in the browser
For MAC Users
using TextEdit
• If you are using TextEdit, click on Text
Edit (top left corner) -> Preferences ->
Open and Save -> check the option
“Display HTML files as html code
instead of formatting text.
• Uncheck the option Add “.txt”
extension o plain text files
For MAC Users
using TextEdit
• Go to Format, change the
option Make Rich text to
make plain text
Let’s try it!
• Open Canvas and open the presentation called HTML Introduction. This will enable you to copy and paste the
text from the last slide.
• Create a folder on your desktop called Inclass Activity.
• Windows Users – Right click on the desktop and select New and Folder.
• Mac Users – Either right click on the desktop (like Windows) or use Finder and add a new folder.
• For Windows users, you can use Notepad, Notepad++, Sublime Text, or Atom. Create a new file.
• For MAC users, you can use TextMate, TextEdit, SubLime, Webstorm, or Atom.
• TextEdit, click on Text Edit (top left corner) -> Preferences -> Open and Save -> check the option “Display
HTML files as html code instead of formatting text.
• Uncheck the option Add “.txt” extension to plain text files
• Go to Format, change the option Make Rich text to make plain text
***See next slide for image references. ***
• Copy and paste all of the text from slide 13
• Always save your html file with filename.html extension. Save it in the new desktop folder you created.
• If you save your file as filename.txt, your webpage will not render in the browser
• Right click on the filename and open with a browser.
Let’s try it!
<!DOCTYPE html>
<html>
<head>
<title>Sample Webpage</title>
</head>
<body>
<header>
<h1>Welcome to My Webpage</h1>
</header>
<p> This is my first webpage creation using HTML. I am
learning about HTML in our “Living in a Connected World
Class”.
<footer>
<p>&copy; 2023 Sample Webpage</p>
</footer>
</body>
</html>
This week
Tuesday, 1/30
• Internet Review
• Search
Thursday, 2/1
• Search (continued)
• HTML Introduction
The Evolution of the Internet:
From Tim Berners-Lee to Web 2.0
Topics
• The World Wide Web (WWW) and its significance in today’s digital age
• Tim Berners-Lee and his role in the Creation of the WWW
• Technologies/Tools Used by Tim Berners-Lee
• The Why?
• Marc Andreessen and Mosaic
• Two-Way Links and Revenue Models
• Blogs and Personal Publishing
• Wikis and Wikipedia
• Conclusion
The World Wide Web (WWW) and its significance in today’s digital age
WWW is a system of interconnected documents and resources, accessed via the internet, that has
transformed the way we communicate, share information, and conduct business.
Key Concepts of the World Wide Web *
• Hypertext: Where resources are linked through clickable links.
This allows users to navigate between different resources easily.
• HTTP and HTML: Hypertext Transfer Protocol (HTTP) is the set of
rules for how web browsers and web servers communicate.
Hypertext Markup Language (HTML) is the language used to
structure and format web content.
• Web Browsers and Web Servers: Web Browsers are software
that displays web content) and Web Servers are software that
hosts web content and serves it to users.
*More detail on slide 6
• Global Information Access: Anyone with internet access can access a vast amount
of information on virtually any topic, which has transformed education, research,
and personal knowledge.
• Communication and Collaboration: WWW has revolutionized communication.
People can easily connect and collaborate through various online platforms, such
as social media, email, and messaging apps.
• Economic Impact: It has created new business models, such as e-commerce and
online services, and has transformed traditional industries like publishing,
entertainment, and advertising.
Significance in Today's Digital Age
• Cultural and Social Changes: There are cultural and social changes brought about by the WWW. It has facilitated the
spread of cultures, ideas, and movements, and has shaped new forms of expression, like memes and online
communities.
• Data and Privacy: Significant challenges related to data privacy and security in the digital age. The WWW has raised
concerns about personal data collection, online surveillance, and cybersecurity.
How often do you use the internet in your daily lives and how has it impacted your education, work, and personal life?
Discussion Activity
Tim Berners-Lee and his role in the Creation of the WWW
Innovative vision and technological contributions revolutionized information
accessibility, leading to the birth of the World Wide Web
Background:
• Tim Berners-Lee, a British computer scientist, developed foundational
technologies for global information sharing.
Inspiration:
• Berners-Lee's vision for the web was inspired by "Enquire Within Upon
Everything," a publication with diverse topics and connections.
Early Prototype:
• Created a prototype called "Enquire" at CERN, consisting of
interconnected documents, foreshadowing the hypertext structure of the
Web.
Vision Realization:
• Proposed the concept of the WWW in 1989.
• Developed foundational technologies like HTTP, HTML, web browser, and
web server.
• The first website went live in 1991, bringing his ideas into practical
implementation.
Technologies/Tools Used by Tim Berners-Lee
Web browser software (like the one Berners-Lee used to develop) retrieves and
displays web content to users.
Web server software responds to requests from web browsers, delivering the
requested web pages and resources.
HTTP is the protocol that governs how information is exchanged between web
browsers and servers. It enables the retrieval of web pages and resources. (think
of it as an address)
HTML is the language used to structure and format web content. It uses tags to
define headings, paragraphs, links, images, and more.
Hypertext Transfer Protocol (HTTP):
Hypertext Markup Language (HTML):
Web Browser Software:
Web Server Software:
Limitations of Computers and Linking Information
•Computers excel at performing tasks step by step but struggle with
making random associations or connections.
•Human brains can make creative leaps and associations that
computers cannot easily replicate.
•For example, a human can associate a word with multiple
meanings or connect seemingly unrelated ideas.
Have you ever thought about how information on the internet is connected? Share examples of how
you navigate information online using hyperlinks.
Discussion Activity
Marc Andreessen and the Mosaic Web Browser
Marc Andreessen is a prominent figure in the history of the internet and web browsing. He co-authored the Mosaic
web browser while he was a student at the University of Illinois. Mosaic is often credited as one of the earliest
graphical web browsers that played a crucial role in popularizing the World Wide Web.
Tim Berners-Lee's role was in creating
the foundational technologies and
concepts of the WWW, while Mosaic
was a web browser developed by Marc
Andreessen that improved upon those
concepts by introducing graphical
capabilities so these creations
complimented each others.
Tim Berners-Lee's Early Text-Based
Web Browser
• Designed to access and display
text-based information from
WWW.
• Early web pages were primarily
composed of text and
hyperlinks, allowing users to
navigate between different
documents.
• Limited in its ability to display
images, videos, and other
multimedia content.
Marc Andreessen’s Mosaic
• Marked a significant advancement by
introducing graphical capabilities to web
browsing.
• This allowed web pages to incorporate
images, making the content more
visually appealing and engaging for
users.
• The addition of images transformed the
way information was presented,
enabling websites to convey information
more effectively enhancing the overall
user experience of browsing the web.
• Images allowed websites to provide
visual context and illustrate concepts,
making the content more
comprehensible and memorable.
Browser Evolution…
But…it’s not all rosy…there were compatibility issues associated with the release of
Mosaic, especially in its early versions
When Mosaic was first released in the early 1990s, web technology was still in its infancy, and there was a lack of
standardization. This lack of standardization led to compatibility challenges with various computer systems and
web servers. Mosaic's initial version was designed to work primarily on NeXT computers. This limited its
accessibility to users as NeXT was a niche platform.
To significantly expand the user base, Mosaic was made available on popular computing platforms like
Windows and Macintosh.
As Mosaic evolved, it became more user-friendly and accessible on different platforms, helping to lay the
groundwork for the widespread adoption of graphical web browsers.
Have you have ever encountered compatibility issues while using modern web browsers or applications.
Have you had a different experience when using different browsers?
Discussion Activity
Mosaic's Introduction of Graphical Capabilities and Enhanced User Experience
Inline Images and Visual Integration
 Mosaic's innovation of inline images, where images could be
displayed directly within the text of a web page.
 inline images allowed for seamless integration of visual
content alongside textual information, enhancing the
cohesiveness of web pages.
 This concept revolutionized content presentation, enabling
designers to create more dynamic and engaging layouts.
A confrontation between Tim Berners-Lee and Marc Andreessen regarding web ideals and ownership
Tim Berners-Lee, had a vision of the web as an open, collaborative, and freely
accessible platform. He believed in the importance of sharing information openly
and promoting universal access to knowledge. He did not intend for the web to
be a commercialized platform.
Marc Andreessen had different ideas about the web's future. He saw the
potential for commercializing the web and believed in the concept of
ownership and potential profits from web technologies.
Ultimately, the conflict was resolved in favor of openness and collaboration. Tim Berners-
Lee's vision of a free and open web prevailed, and the World Wide Web Consortium
(W3C) was established to develop web standards in an open and collaborative manner.
Confrontation Arises
A two-way link, also known as a reciprocal link, is a hyperlink between
two web pages that points to each other. This type of link is bidirectional,
creating a connection between the two pages.
Two-way links involve a system where links require approval from both parties.
For example, if website A wants to link to website B, website B must approve
the link for it to become active. This is different from one-way links, which don't
require approval.
Two-Way Links and Revenue Models
Traditionally, web links are one-way connections, meaning one page links to another.
Micropayments to Content Producers
 Micropayments to content producers involve making very small financial transactions, often in fractions of a cent,
to access or support digital content.
 Imagine a digital platform for news articles where users typically encounter a paywall when trying to access
premium content. Instead of requiring users to commit to a monthly subscription, the platform adopts a
micropayments model.
Impacts on Media Industry
 Micropayments have allowed content producers to receive small payments from users directly, potentially creating
a new revenue model.
 This system has the potential to shift the focus away from traditional advertising-driven revenue models, which
often rely on large user bases and extensive data collection.
Implementing a micropayment system for content had its challenges. Handling very small payments efficiently, dealing
with transaction costs, and ensuring security are some of the technical challenges.
Challenges and Drawbacks
With the challenges of micropayments, the predominant revenue model on the web is ad-driven, with platforms
relying heavily on advertising for income.
Have you ever encountered websites or platforms that charge micro-fees for access to specific content or
features?
Would you be willing to pay small amounts for premium content or services on the web.
Discussion Activity
Regarded as one of the pioneering figures in the world of
blogging played a pivotal role in shaping the concept of personal
blogging.
Justin Hall
Early Days of Blogging
Justin Hall began his online presence in 1994 with a personal website, which he continued to update regularly. At that
time, the term "blogging" had not yet been coined, and what he was doing was essentially the precursor to blogging.
Justin's Links from the Underground
One of Justin Hall's notable features on his website, "Justin's Links from the Underground,“ was where he curated and
shared interesting links and resources from the early web. This feature was essentially a form of early content curation,
which is a common aspect of modern blogs. The website wasn't limited to just links; he also shared personal
experiences, thoughts, and stories, which is another defining characteristic of blogging.
His website was also considered a virtual support group. His willingness to openly share personal experiences and
challenges, such as his father's suicide led to people sharing their stories and experiences, creating a sense of virtual
support and community.
 Justin’s website was called a weblog to start but then shortened to "blog”. His early online activities played a role in
popularizing the blog term. His early blogging laid the foundation for what has become a massive and diverse
blogosphere.
 His willingness to share personal stories and experiences set a precedent for the personal and authentic nature of
blogging.
Blogs
Discussion Activity
Do you have personal blogs or follow any bloggers? What is the role of personal storytelling and
authenticity in modern blogs?
Some of the most popular blogs in the world include:
• Huffington Post
• TechCrunch
• BuzzFeed
• LifeHacker
• TheVerge
Ward Cunningham and Wiki Software
A computer programmer and software developer who significantly contributed to the
development of wiki software, which is a significant innovation in collaborative content
creation on the internet.
Wikis and the Read-Write Web
Wikis are content management applications that enable a "read-write web.“ A “read-write web” goes beyond simple
consumption of content (the "read" aspect) to enable users to actively contribute, create, and edit content (the "write"
aspect). It signifies a shift from passive web browsing to active participation and collaboration.
Wikis use a simplified markup language to make it easy for users to edit and link pages within the wiki. This markup
language is designed to be user-friendly, even for those with limited technical expertise. By using this simplified markup
language, wikis enable collaborative editing and linking of pages with minimal technical hurdles. This approach makes it
easy for users to contribute, edit, and organize content within the wiki, fostering a culture of collaboration and
knowledge sharing.
Creation of Nupedia and Rigorous Editing Process
 Nupedia is a free online encyclopedia with the goal of providing high-quality, expert-reviewed content.
There is a rigorous editing process for the content of Nupedia which involved seven steps, expert reviews,
and assigning topics to proven experts with vetted credentials.
 This approach aimed to ensure the accuracy and reliability of the content but was time-consuming and
slow. There were challenges in terms of scalability and the ability to keep up with the rapidly changing
landscape of online knowledge sharing. This led to the development of Wikipedia, a more open and
collaborative platform, which allowed for faster content creation and a wider range of contributors.
Wikipedia
 Wikipedia was created as a complementary
project to Nupedia, with the goal of
accelerating the content creation process.
 It was envisioned as a "feeder product" for
Nupedia, allowing for more rapid and
collaborative content generation.
 It encourages both volunteers and experts
to contribute their knowledge and
expertise collaboratively. The idea is to tap
into the vast pool of knowledge available
within a community or society and use it to
benefit a broader audience or address
specific challenges.
Challenges of Elitism and Clash of Wisdom
 Nupedia exemplified a traditional, expert-driven model of knowledge creation creating a culture of Elitism. This clashed
with the open and inclusive model that Wikipedia represented.
 Nupedia, had a desire for deference to authority, which conflicted with the Wikipedia community's ethos of inclusivity.
 This highlights a key ideological difference between two prominent platforms in the early history of online encyclopedias:
Nupedia and the Wikipedia community.
 It underscores the pivotal moment in the history of online encyclopedias when the open and collaborative model of
Wikipedia gained prominence and redefined how knowledge is created and shared on the internet.
 Wikipedia's approach, which embraced the wisdom of the crowd, allowed for more rapid content creation but raised
concerns about accuracy and reliability
Nupedia v. Wikipedia
Elitism v. Open and Collaborative
Discussion Activity
Have you used Wikipedia or contributed to it?
What is your perspectives on the balance between expert-driven content and collaborative, crowd-sourced content on
platforms like Wikipedia?
Deep Dive Into Wikipedia
Wikipedia, the world's largest online encyclopedia, is a prime example of commons-based peer production in action
What is Commons-Based Peer Production?
Commons-based peer production is a collaborative model of content creation and resource sharing that relies on the
collective contributions of a distributed network of individuals.
It is characterized by the following key principles:
1.Commons: In commons-based peer production, there is a shared resource or "commons" that is collectively owned
and managed by a community of participants. This commons can be digital content, software, knowledge, or any other
resource that can be collaboratively produced and shared.
2.Peer Production: The production process is decentralized and involves a large number of participants, often referred
to as "peers." These peers are individuals who contribute to the creation and maintenance of the commons voluntarily
and without a traditional hierarchical structure.
3.Open Participation: Participation in commons-based peer production is typically open to anyone who wishes to
contribute. There are no gatekeepers or central authorities controlling access or contributions. This open participation
encourages diversity and inclusivity.
4.Modularity: Projects are often broken down into modular components or tasks that can be worked on independently.
This modularity allows contributors to focus on specific areas of interest or expertise.
5.Meritocracy: Contributions are evaluated based on their quality, usefulness, and relevance rather than on the
contributor's status or credentials. This meritocratic aspect encourages a culture of excellence.
Here's how it applies to Wikipedia
1.Commons: Wikipedia's commons is the vast repository of articles and knowledge covering a wide range of topics. It is
collectively owned by the global community of Wikipedia editors and readers.
2.Peer Production: Wikipedia is written, edited, and maintained by a decentralized network of volunteers, known as
Wikipedians or editors. These volunteers come from diverse backgrounds and locations around the world.
3.Open Participation: Wikipedia is open for anyone with internet access to edit and contribute to its articles. There are
minimal barriers to entry, and new contributors are welcomed.
4.Modularity: Wikipedia articles are broken down into discrete topics, making it easy for contributors to focus on specific
subjects of interest. Each article is a modular unit that can be improved independently.
5.Meritocracy: Wikipedia's content is continually reviewed and improved by the community. Edits and contributions are
assessed based on their accuracy, verifiability, neutrality, and adherence to Wikipedia's guidelines. High-quality
contributions are recognized and retained.
Commons-based peer production has been instrumental in Wikipedia's success. It has allowed Wikipedia to harness the
collective knowledge, skills, and efforts of a global community to create a vast and freely accessible knowledge resource.
Wikipedia's success demonstrates the power of open collaboration and the ability of a decentralized network of
volunteers to create and maintain valuable content on the internet.
Wikipedia Application of Commons-based Peer Production
Wikipedia
Contributors
Contributing to Wikipedia is driven
by a wide range of motivations,
reflecting the diversity of its
volunteer community. These
motivations can be grouped into
several drivers:
• Interaction with others
• Personal gratification
• Recognition and Prestige
• Altruism
• Intellectual Curiosity
• Advocacy and Activism
• Sense of Ownership
WikiPedia Success Story
Shared Knowledge and Distributed Power
With the collective goal of building and
maintaining a shared knowledge resource,
Wikipedia embodies the concept of
shared knowledge, where information is
collaboratively created and made freely
available to the public.
Distributed power is a key feature of
Wikipedia's governance model. While
there are guidelines and policies, decisions
are made collectively through consensus-
building among contributors. No single
authority dictates content, and the
community has the power to shape
Wikipedia's content and rules.
This distributed power ensures that no
single individual or group controls the
platform, aligning with Wikipedia's
commitment to openness and neutrality.
In summary, Wikipedia's success as a
collaborative platform is driven by the
diverse motivations of its contributors, the
addictive nature of editing ("wiki-crack"),
the principles of shared knowledge, and
the distribution of power within the
community. It represents a unique and
powerful model for harnessing collective
expertise and providing free access to a
vast repository of knowledge.
Today…
• How to sign up for a 15-minute final
presentation time slot
• Search
• HTML Introduction
Recap from Tuesday:
• The World Wide Web (WWW)
• Tim Berners-Lee (TBL)
• Technologies/Tools Used by TBL
• Marc Andreessen and Mosaic
• Two-Way Links and Revenue
Models
• Blogs and Personal Publishing
• Wikis and Wikipedia
Signing up for a Final Presentation 15-minute slot
 Make sure you aren’t using Safari – Canvas doesn’t always work. Use Chrome or Edge.
 Click on the Calendar icon on the left hand navigation.
 Starting March 26, you will see 15-minute slots. If a slot is taken, it will be grayed out and you will not be
able to sign up for that slot.
 On the right hand side, click find appointment. This will show all of the slots.
 Click on the slot you would like and click edit.
 Type your name in the box and hit update.
Search
Internet Part 2
How often do you use Google or other search engines in
your daily life, and for what purposes?
Topics
• Web directories and crawlers
• Search Engines
• Yahoo! Combines Search with Web Directories
• Google
• The Inception and Early Development of Google
• Google Roots
• Google’s User-Centered Design
• Key Milestones in Google’s History
• Human-Machine Symbiosis
Web Directories and Crawlers
Introduction to the Early Challenges of Web Content Explosion:
 During the early 1990s, the World Wide Web experienced an explosive growth of
web pages and websites.
 As more individuals, organizations, and businesses began creating web content, it
became increasingly difficult for users to locate relevant information.
 Navigating the web was akin to exploring a vast, uncharted territory with no maps
or signposts.
Explanation of Web Directories as Hand-Compiled Indices of Websites:
 Web directories were among the earliest attempts to organize the chaotic web
landscape.
 They functioned as structured lists or indices of websites, categorized by topics
or themes.
 Unlike search engines, web directories were typically created and maintained by
human editors who manually reviewed and organized website submissions.
 Users could browse these directories to discover websites related to their
interest
 In 1994, two Stanford University graduate students, Jerry Yang and David Filo,
launched "Jerry and David's Guide to the World Wide Web.“ This guide later evolved
into Yahoo!, one of the most prominent and influential web directories of its time.
 Yahoo! initially started as a hand-compiled directory, featuring a hierarchical structure
with categories and subcategories, making it easier for users to navigate the web.
Introduction to Web Crawlers (Bots) Automating the Indexing Process:
 As the web continued to expand rapidly, the need for automated methods to index web
content became evident.
 Web crawlers, also known as bots or spiders, were developed to automate the process of
exploring websites and collecting information about them.
 These crawlers would follow hyperlinks from one page to another, indexing the content they
encountered.
 This automation significantly sped up the process of indexing the web and allowed for more
comprehensive search results.
Web Directories and Crawlers
How do you think web
crawlers (bots) have
revolutionized the process
of indexing websites,
compared to manual
methods?
Let’s Discuss
Search Engines
In addition to web
directories, search engines
emerged as another solution
to the challenge of finding
information on the web.
Early search engines used
algorithms to index and rank
web pages
Users could enter keywords
or phrases, and these search
engines would return a list of
relevant web pages based on
their algorithms.
These search engines played
a pivotal role in transitioning
from manual web exploration
to more focused and intent-
based searches.
Yahoo! Combines Search with Web Directories
Yahoo! recognized the importance of both web directories and search
engines in helping users navigate the web. In 1995, Yahoo! integrated a
search engine into its directory, offering users the convenience of
searching for specific information while still benefiting from the
directory's structured organization.
This integration marked a significant step in the evolution of web search,
as it combined the strengths of both approaches.
Consideration of User Behavior, including Exploration and Discovery
• During the early web era, user behavior was shaped by the novelty of
the internet.
• Users often approached web browsing as a form of exploration and
discovery, similar to flipping through a physical directory or
encyclopedia.
• Intent-based searching, where users entered specific queries to find
answers, was less common than today.
Google
Larry Page and Sergey Brin:
Larry Page and Sergey Brin are renowned computer scientists and entrepreneurs who
co-founded Google, one of the world's most influential technology companies.
Their innovative search engine transformed how people access information on the
internet.
Profit Motive: Larry
Page recognized the
importance of not only
inventing technology
but also making it
accessible and
profitable. He
emphasized that
innovation should be
brought to the world in
a way that generates
revenue and sustains
further development.
Interests: Page's
interests spanned
computer science and
business, making him a
unique visionary in the
tech industry. He
believed in creating
products that not only
solved technical
problems but also had
a practical impact on
people's lives.
Human-Computer
Interaction: Page had a
strong interest in
human-computer
interaction, aiming to
make technology more
user-friendly and
intuitive.
Larry Page’s Profit Motive and Interest
Google
Sergey Brin, like Page, had a strong background in computer science. He also had a
strong foundation in mathematics, which contributed to the development of Google's
innovative algorithms. Brin's expertise in data mining played a pivotal role in shaping
Google's search engine.
Larry Page and Sergey Brin met as graduate students at Stanford University, where they
pursued their Ph.D. studies.
Stanford University is renowned for fostering academic excellence and innovation. It has a
rich history of producing successful entrepreneurs and tech leaders.
The university's environment encouraged and supported tech entrepreneurship, making it an
ideal place for Page and Brin to develop their groundbreaking ideas.
Together, Larry Page and Sergey Brin leveraged their academic backgrounds and
entrepreneurial drive to create Google, a company that not only revolutionized web
search but also became a global technology powerhouse.
Why do you think Larry Page and Sergey Brin were motivated to develop a
better search engine, considering their academic backgrounds and interests?
Discussion
Larry Page and Sergey Brin initiated the Backrub project, a
precursor to Google, while still at Stanford.
The project aimed to compile a comprehensive collection
of backlinks (inbound links) pointing to various web pages.
However, the explosive growth of the web posed
significant computational challenges in managing and
analyzing this vast dataset.
Sergey Brin joined forces with Larry Page, and together, they
developed a more sophisticated ranking system known as
PageRank.
PageRank assigned numerical values to web pages based on
the quantity and quality of backlinks they received.
It introduced the idea that a web page's importance could be
determined by considering the importance of pages linking to
it.
PageRank's recursive process incorporated multiple feedback
loops to refine the ranking of web pages.
The Backrub Project
Development of PageRank
Google Roots
The Anatomy of a Large-Scale Hypertextual Web
Search Engine
In 1998, Larry Page and Sergey Brin authored this
groundbreaking paper. This paper laid out the
fundamental principles of Google's search engine
and introduced the PageRank algorithm. It also
emphasized the importance of assessing web
page importance based on the quantity and
quality of backlinks. The paper also highlighted
the scalability of Google's search engine
architecture.
How Google Search Works (in 5 minutes)
Google’s User-Centered Design
Google's approach to search differed significantly from its predecessors. While other
search engines at the time relied on various factors to rank pages, Google tapped into the
wisdom of the crowds by assessing what the world thought of a page.
This approach aimed to provide users with more relevant and valuable search results
User-Centered Design and Algorithm Improvement
• Google placed a strong emphasis on user-centered design, guided by the principle that
the user is never wrong.
• Instead of blaming users for poor search results, Google continually studied user
behavior to enhance its algorithms.
• This iterative process involved automated adjustments based on user interactions,
leading to more accurate and relevant search results.
How has the widespread
availability of search engines
like Google changed the way
we access and use information
compared to the pre-internet
era?
Discussion
Key Milestones in Google’s History
Commercialization Attempts and the Shift to an Ad-Based Revenue Model:
 Google initially attempted to license its search technology to established search companies for a $1 million fee.
However, many companies failed to see the significance of search technology at that time.
 As a result, Larry Page, Sergey Brin, and their team decided to start Google as an independent company in 1998.
 Google adopted an ad-based revenue model, which would later become one of its primary sources of income.
 This shift marked the beginning of Google's transition from a research project to a commercial enterprise.
Google's Business Values:
Google's core business values have been central to its success:
 Product Improvement: Google has consistently invested resources in improving its products and services. It
emphasizes innovation and strives to provide users with the best possible experience.
 Customer-Centricity: Google is known for its commitment to the user experience. It focuses on understanding
user needs, addressing their concerns, and delivering valuable solutions.
 User-Centered Design: Google's products are designed with the principle that the user is never wrong. It
actively studies user behavior and continuously refines its algorithms to better serve users.
 Iterative Development: Google's approach involves iterative development, meaning it makes automated
adjustments based on user interactions to enhance its services.
These milestones, including the influential paper and the adoption of an ad-based revenue model, played pivotal roles
in Google's transformation from a research project into a global technology giant. Google's commitment to product
improvement and a customer-centric approach has been key to its continued success and innovation.
Human-Machine Symbiosis
 Google's search algorithm relies on billions of human judgments, even though
the algorithm itself is automated. Google's search engine is designed as an
automated way to tap into the collective wisdom and knowledge of humanity.
 This reliance stems from the fact that Google's search results are determined by
the collective wisdom and preferences of billions of internet users worldwide.
 When users interact with Google's search results by clicking, staying on pages,
and engaging with content, they provide implicit feedback that informs the
algorithm. As users search for information, their actions and preferences are
recorded and analyzed by the algorithm.
Reliance on human judgments to automate the tapping into human wisdom
This automated process considers what users find valuable, trustworthy, and relevant, effectively harnessing the
wisdom and insights of a global audience. In essence, Google's search engine serves as a remarkable example of
human-machine symbiosis, where automation and algorithms work in harmony with human behaviors, preferences,
and wisdom to provide valuable information to users on a global scale.
What do you envision as the future of web search, and how might emerging technologies like artificial
intelligence and voice search impact it?
Discussion
Week 5 – 2/20 and 2/22
Today
• Final Presentation
Overview/Reminder
• Network Individualism cont.
• In Class Activity - Reflection
• Data and Browser Fingerprinting
• In Class Activity – Browser
Fingerprinting
Thursday
• Cookies
• Internet Memes
Due Sunday, 2/25
• Week 5 Homework
• Week 5 In Class Activities:
• Network Individualism Reflection
• Browser Fingerprinting
Final Presentation
• Topic 10
• Introduction 5
• Organization 10
• Subject Knowledge 30
• Conclusion 5
• Presentation Length 5
• Vocal Delivery 10
• Language Skills 5
• Use of Visual Displays/Content 10
• Physical Presence 10
1. Final Presentation Rubric
2. Final Project Rubric
2 New Documents on Canvas
Under Important Information
Topics to Cover
• What is Networked Individualism?
• Five Key Points of Networked Individualism
• The Impact of Digital Technologies
• Crafting Online Personas
• Authenticity vs. Presentation
• The Role of Social Media in Identity Formation
• The Data Dilemma:
• Surveillance vs. Personalization
• Online Privacy and its Challenges
• Ethical Implications of Data Collection
• Social Media Algorithms
• Confirmation Bias and Echo Chambers
• Diverse Perspectives in the Digital Age
Topics to Cover
• The Power of Online Communities
• Crowdsourcing and Social Movements
• The Role of Hashtags and Viral Campaigns
• Emerging Technologies: AI, VR, AR, and Beyond
• Predictions and Speculations about the Future of Technology
• Ethical Considerations and Responsible Digital Citizenship
Social Media Algorithms
• Social media algorithms are complex mathematical
formulas used by platforms like Facebook, Instagram,
Twitter, and YouTube to determine what content users
see in their feeds.
• These algorithms analyze user behavior and
preferences to personalize content delivery, but they also
have significant implications for the type of information
users encounter.
Five Key Points
Content Personalization
Social media algorithms aim to create a tailored user experience. They analyze user data, such as past interactions,
interests, and demographics, to prioritize content that is most likely to engage users.
Engagement Metrics
Algorithms often prioritize content with high engagement metrics, such as likes, comments, and shares. This can result in
a feedback loop, where popular content becomes more prominent, and less popular content is marginalized.
Filtering and Ranking
Algorithms filter through vast amounts of content and rank it based on relevance. Content that the algorithm deems less
relevant to a user's interests may not appear in their feed at all.
Five Key Points continued
Algorithmic Bias
Algorithms can inadvertently perpetuate biases present in the data they're trained on. This can result in
discriminatory or polarizing content being recommended to users.
User Experience vs. Engagement
There is a tension between optimizing user experience and maximizing user engagement. Algorithms often
prioritize the latter, which can lead to content that evokes strong emotions or reinforces preexisting beliefs.
Discussion
How do social media algorithms influence the content you see on your feeds? Have you noticed a
particular type of content being promoted more often?
Confirmation Bias and Echo Chambers
• Confirmation bias is the tendency for
individuals to seek, interpret, and remember
information in a way that confirms their
preexisting beliefs.
• This cognitive bias can lead to the formation
of echo chambers, where people are exposed
to and reinforce their existing viewpoints while
dismissing opposing perspectives.
Five Key Points
Confirmation Bias
Confirmation bias occurs when individuals actively seek out information that confirms their existing beliefs and values
while avoiding or dismissing information that challenges them.
Echo Chambers
Echo chambers are environments, often digital, where individuals are exposed primarily to information and opinions that
align with their existing beliefs. These chambers reinforce confirmation bias and limit exposure to diverse perspectives.
Information Silos
Social media algorithms and self-selection of online communities can contribute to information silos, where individuals
only engage with like-minded individuals and ideas
Five Key Points continued
Polarization
Confirmation bias and echo chambers can lead to political and ideological polarization. When individuals are
consistently exposed to one perspective, they may become more extreme in their beliefs and less willing to
consider alternative viewpoints.
Mitigating Echo Chambers
Encouraging exposure to diverse perspectives, critical thinking, and media literacy are strategies to mitigate the
effects of echo chambers and confirmation bias.
Discussion
Have you observed echo chambers in online communities or social media platforms you engage with?
How might these echo chambers impact individuals and society as a whole?
Diverse Perspectives in the Digital Age
• The digital age has created unprecedented
opportunities for individuals to access and engage with
diverse perspectives from around the world.
• This diversity can enrich our understanding and
challenge our preconceptions.
Five Key Points
Global Connectivity
The internet has connected people from different cultures, backgrounds, and experiences. This global connectivity allows
for the sharing of diverse perspectives and ideas.
Exposure to Different Cultures
Online platforms, such as social media and video-sharing sites, enable users to learn about and engage with cultures and
viewpoints they may not encounter in their offline lives.
Enhanced Empathy
Exposure to diverse perspectives can lead to greater empathy and understanding. Hearing from individuals with different
life experiences can challenge stereotypes and biases.
Five Key Points continued
Challenges of Information Overload
With the abundance of information available online, individuals must learn to critically evaluate sources and
differentiate between credible information and misinformation.
Filtering and Curation
While algorithms can contribute to echo chambers, they can also be used to curate diverse content. Platforms can
introduce users to content from various sources and viewpoints.
Discussion
How has the internet and digital platforms enriched your exposure to diverse perspectives, cultures,
and ideas? Can you share an example of a particularly impactful experience?
The Power of Online Communities
• Online communities are groups of individuals who
come together on digital platforms to connect, share
information, discuss common interests, and provide
support.
• These communities have gained significant influence
and impact in the digital age.
Five Key Points
Community Formation
Online communities can form around virtually any interest, from hobbies and fandoms to professional networking and
social causes. They provide a sense of belonging and shared identity.
Support Networks
Many online communities serve as valuable support networks for their members. People can find emotional support,
advice, and camaraderie within these groups, often across geographical boundaries.
Amplification of Voices
Online communities can amplify the voices of individuals and causes. When a community rallies around a particular issue
or idea, it can generate significant attention and influence public discourse.
Five Key Points continued
Information Sharing
Communities are hubs for information sharing and learning. Members often share news, resources, and expertise
related to their shared interests.
Challenges
Online communities can face challenges, including issues related to moderation, toxicity, and the spread of
misinformation. Maintaining a healthy and inclusive community environment is important.
What are some examples of online communities that have made a significant impact on society, either
in a positive or negative way?
Discussion
Crowdsourcing and
Social Movements
• Crowdsourcing is a collaborative approach that
involves obtaining input, ideas, services, or content
by soliciting contributions from a large group of
people, often through online platforms.
• An example is Kickstarter. This is a crowdfunding
platform that allows individuals or small businesses
to raise funds for creative projects such as films,
music albums, gadgets, and more. People who are
interested in supporting a project can contribute
money to help bring it to fruition, and in return, they
may receive rewards or incentives based on their
level of contribution. The platform relies on the
collective support of a large number of individuals, or
the "crowd," to fund a diverse range of creative
endeavor
Five Key Points
Crowdsourced Activism
Crowdsourcing allows activists and social movements to leverage the collective power of participants. It can involve
gathering signatures for petitions, raising funds for causes, or sharing information and resources.
Global Reach
Online crowdsourcing platforms enable social movements to reach a global audience, allowing individuals from diverse
backgrounds to join in and contribute.
Resource Mobilization
Crowdsourcing can quickly mobilize resources, such as funds, volunteers, and expertise, to support social causes and
humanitarian efforts.
Five Key Points continued
Challenges and Ethical Considerations
Crowdsourcing may raise ethical questions related to transparency, accountability, and the exploitation of labor.
Additionally, not all crowdsourced initiatives are successful.
Examples
Examples of crowdsourced social movements include crowdfunding for disaster relief, citizen journalism, and
collective data collection for human rights monitoring.
How can individuals effectively engage with crowdsourced initiatives, and what role does technology
and online platforms play in facilitating such engagement?
Discussion
The Role of Hashtags and Viral Campaigns
• Hashtags and viral campaigns are popular tools used on
social media platforms to raise awareness, promote
causes, and mobilize support for various issues.
• They have become essential components of online
activism and digital marketing.
Five Key Points
Hashtags for Awareness
Hashtags serve as labels that group together content related to a specific topic or theme. They are often used to raise
awareness about social issues, movements, or events.
Viral Campaigns
Viral campaigns are marketing or activism efforts that quickly gain widespread attention and engagement. They often rely
on compelling storytelling, shareable content, and social media trends.
Amplification and Engagement
Hashtags and viral campaigns can amplify the voices of individuals and organizations by encouraging users to share, like,
and comment on related content.
Five Key Points continued
Trends and Memes
Viral campaigns often create trends and memes that capture the public's attention. Memes, in particular, are easily
shareable and can convey complex messages in a humorous or relatable way.
Challenges
While hashtags and viral campaigns can be powerful, they can also face backlash or criticism. It's important for
creators to consider potential negative consequences and unintended interpretations.
Can you recall any recent viral campaigns or hashtags that caught your attention or had a
significant impact? What made them effective?
Discussion
Emerging Technologies: AI, VR, AR, and Beyond
• Emerging technologies, such as Artificial Intelligence
(AI), Virtual Reality (VR), and Augmented Reality (AR), are
transforming the way we interact with the digital world
and each other.
• These technologies offer new opportunities and
challenges for individuals and society as a whole.
Five Key Points
Artificial Intelligence (AI)
AI encompasses machine learning, natural language processing, and computer vision. It enables machines to perform tasks that
typically require human intelligence, such as decision-making, problem-solving, and language understanding.
Example: Autonomous vehicles, such as self-driving cars. These vehicles use AI systems to perceive their
surroundings, make decisions, and navigate without human intervention.
Virtual Reality (VR)
VR immerses users in a computer-generated, interactive environment. It is often used for gaming, education, training, and
simulations.
Example: VR in action is its use in the field of healthcare, particularly in medical training and therapy
Augmented Reality (AR)
AR overlays digital information onto the real-world environment. It is used in applications like mobile games, navigation, and
education.
Example: Use in mobile applications and games, like the popular mobile game "Pokémon GO.“players use their smartphones'
GPS and camera functions to explore the real world while encountering virtual PokĂŠmon characters in an augmented
reality overlay.
Five Key Points continued
Impact on Daily Life
Emerging technologies are influencing daily life, from virtual meetings and AI-powered virtual assistants to
immersive gaming experiences and medical applications.
Ethical and Privacy Concerns
As these technologies become more integrated into daily life, concerns about data privacy, security, bias in AI, and
the potential for addiction in VR/AR have gained prominence.
How have you personally interacted with AI, VR, or AR technologies in your daily life, and what have
your experiences been like?
Discussion
Predictions and Speculations about the Future of Technology
• Predicting the future of technology is both an exciting
and challenging endeavor.
• Speculations about upcoming innovations and their
potential societal impacts shape our understanding of
what's to come.
Five Key Points
Technological Evolution
Predictions often revolve around the evolution of existing technologies and the emergence of entirely new ones.
Concepts like quantum computing, brain-computer interfaces, and sustainable energy sources are subjects of speculation.
Societal Transformations
Speculations extend to how technology will transform society. Questions about automation's impact on jobs, the potential
for extended human lifespans, and the future of transportation are common topics.
Ethical Considerations
Discussions about the future of technology also involve ethical considerations, including the responsible use of AI, privacy
in an increasingly digital world, and the distribution of benefits and risks.
Five Key Points continued
Innovation Drivers
Predictions often consider factors driving innovation, such as government policies, industry trends, global
challenges, and societal demands.
The Role of Imagination
Speculating about the future requires imagination and creativity. It involves thinking beyond current limitations
and imagining possibilities that may seem far-fetched today.
What are some technological advancements you anticipate in the next decade or beyond? How might
these innovations impact various aspects of society?
Discussion
Ethical Considerations and Responsible Digital Citizenship
• In an increasingly digital world, responsible digital
citizenship involves understanding and addressing the
ethical implications of our online actions and
interactions.
Five Key Points
Digital Footprint
Every online action contributes to a digital footprint. This includes the data we share, the content we create, and our
interactions on social media platforms.
Data Privacy
Protecting personal data and respecting the privacy of others are key aspects of responsible digital citizenship. Individuals
and organizations should be mindful of data collection and sharing practices.
Cybersecurity
Being aware of cybersecurity risks and practicing good online security habits is essential. This includes using strong
passwords, updating software, and recognizing phishing attempts.
Five Key Points continued
Media Literacy
Critical thinking and media literacy skills are crucial for navigating the digital landscape. Responsible digital citizens
should be able to discern credible sources from misinformation and fake news.
Online Behavior
Treating others with respect and empathy online is vital for fostering positive digital communities. Cyberbullying,
harassment, and hate speech have real-world consequences.
How aware are you of your digital footprint and the data you generate online? What steps can
individuals take to protect their privacy and personal information?
Discussion
Counts towards In-Class Activity Grade
• Crowdsourcing and Social Movements
• The Role of Hashtags and Viral Campaigns
• Emerging Technologies: AI, VR, AR, and Beyond
• Predictions and Speculations about the Future of
Technology
• Ethical Considerations and Responsible Digital
Citizenship
• What is Networked Individualism?
• Five Key Points of Networked Individualism
• The Impact of Digital Technologies
• Crafting Online Personas
• Authenticity vs. Presentation
• The Role of Social Media in Identity Formation
• The Data Dilemma:
• Surveillance vs. Personalization
• Online Privacy and its Challenges
• Ethical Implications of Data Collection
• Social Media Algorithms
• Confirmation Bias and Echo Chambers
• Diverse Perspectives in the Digital Age
Based on our discussions this week, select and provide a reflection on one of the
topics (150 – 200 words).
• The Impact of Social Media Algorithms: Reflect on your own experiences with social media algorithms. How do you think
these algorithms influence the content you see? Have you ever encountered a situation where an algorithm reinforced
your existing beliefs or exposed you to diverse viewpoints?
• Online Privacy and Personal Data: Consider your online behaviors and the data you share. What steps do you take to
protect your online privacy? Have you ever felt uncomfortable with the amount of data collected about you online
• Diverse Perspectives in the Digital Age: Describe an instance where you engaged with diverse perspectives online. How
did this experience impact your understanding of a particular topic or issue? How can individuals actively seek out diverse
viewpoints in the digital age?
• The Power of Online Communities: Reflect on any online communities or forums you've been a part of. How have these
communities influenced your interests, beliefs, or actions? Can you think of a situation where an online community had a
positive or negative impact on your life?
• Ethical Considerations in Technology Use: Consider the ethical dilemmas discussed in class, such as data ethics, online
behavior, and digital responsibility. Have you ever faced an ethical dilemma related to technology use? How did you
navigate it, and what did you learn from the experience?
• Predictions and Speculations about Technology: Imagine the future of technology and how it might impact society. What
are your predictions or speculations about emerging technologies like AI or VR? How do you envision these technologies
shaping our lives in the years to come?
Some Ideas...
Network Individualism
Topics to Cover
• What is Networked Individualism?
• Five Key Points of Networked Individualism
• The Impact of Digital Technologies
• Crafting Online Personas
• Authenticity vs. Presentation
• The Role of Social Media in Identity Formation
• The Data Dilemma:
• Surveillance vs. Personalization
• Online Privacy and its Challenges
• Ethical Implications of Data Collection
• Social Media Algorithms
• Confirmation Bias and Echo Chambers
• Diverse Perspectives in the Digital Age
Topics to Cover
• The Power of Online Communities
• Crowdsourcing and Social Movements
• The Role of Hashtags and Viral Campaigns
• Emerging Technologies: AI, VR, AR, and Beyond
• Predictions and Speculations about the Future of Technology
• Ethical Considerations and Responsible Digital Citizenship
What is it???
A concept that explores the balance between individualism and
collectivism. Collectivism is the practice or principle of giving a group
priority over each individual in it.
Especially in the context of social networks and online communities
Touches on social, cultural, and ethical aspects of our digital lives
Network Individualism
What is it?
Network Individualism Deep Dive
• It encompasses the idea of personal autonomy and
self-expression within the context of digital networks,
social media, and online communities.
• It reflects the way individuals construct and present
their identities, interact with others, and participate in
digital spaces while maintaining a sense of
individuality.
• In essence, it's the fusion of individualism and
connectivity in the digital age.
Five Key Points
Online Self-Presentation
Network Individualism involves how individuals curate and present their digital selves on social media profiles, blogs, and
other online platforms. It encompasses the choices people make about what to share, how to share it, and how they
portray themselves.
Expression and Authenticity
It's about expressing one's unique perspectives, interests, and values online while navigating the tension between
authenticity and self-presentation. Individuals often make conscious choices about what to reveal and what to keep
private.
Online Relationships
Network Individualism acknowledges the diverse and personalized nature of online relationships. People can form
connections with others based on shared interests, beliefs, or experiences, even if they are geographically distant.
Five Key Points continued
Digital Communities
It extends to the participation in various digital communities, such as forums, social networks, and interest-based
groups, where individuals can find like-minded individuals or engage in debates with diverse viewpoints.
Data and Personalization
It's closely tied to data collection and personalization. Online platforms use data to tailor content and
advertisements to individuals, creating a unique online experience for each user.
Discussion
In what ways has technology influenced the way individuals express themselves in online spaces?
The Impact of Digital Technologies
• The advent of digital technologies has had profound
effects on society, transforming how we communicate,
interact, and express ourselves.
• These changes have both positive and negative
implications for Network Individualism.
Five Key Points
Communication Revolution
Digital technologies have revolutionized communication. Social media, instant messaging, and video conferencing enable
real-time interactions with people worldwide, breaking down geographic barriers.
Information Access
The internet provides unprecedented access to information and diverse perspectives. Individuals can explore a wide range
of ideas and viewpoints, contributing to the development of their personal beliefs and identities.
Self-Expression
Digital platforms offer various ways for individuals to express themselves, from posting photos and videos to sharing
personal stories and creative works. These outlets allow for unique and creative forms of self-expression
Five Key Points continued
Data and Privacy
The use of digital technologies also raises concerns about data privacy and surveillance. Online activities generate
vast amounts of data that can be used for targeted advertising or even surveillance by governments and
corporations.
Algorithmic Influence
Algorithms on social media platforms curate content based on user preferences and behaviors. This can create
echo chambers where individuals are exposed primarily to information that aligns with their existing beliefs.
Discussion
Do you think the accessibility of information online has led to a more informed and open society, or
has it contributed to the spread of misinformation and polarization?
Crafting Online Personas
• This involves the intentional construction and
management of one's digital identity on various online
platforms.
• It's about how individuals choose to represent
themselves, their interests, and their values in the digital
world.
• Online personas are not necessarily false, but they are
curated to some extent to present a specific image or
narrative.
Five Key Points
Self-Presentation
Crafting an online persona begins with the choices individuals make about what to share and how to share it. This
includes selecting profile pictures, writing bios, and posting content that aligns with the image they want to project.
Narrative Building
Online personas often involve storytelling. Individuals may create a coherent narrative about their lives, experiences, and
interests, emphasizing certain aspects while downplaying others.
Contextual Adaptation
People may adapt their online personas depending on the platform and audience. For example, the persona presented on
a professional networking site like LinkedIn may differ from the one on a personal blog or Instagram.
Five Key Points continued
Identity Play
Some individuals use online personas as a form of identity play, exploring different facets of their personalities or
experimenting with creative alter egos.
Managing Authenticity
Balancing authenticity and presentation is crucial when crafting online personas. While some degree of curation is
natural, straying too far from one's true self can lead to feelings of inauthenticity.
Discussion
How do you craft your online persona on social media or other online platforms? Are there aspects of
your identity that you intentionally emphasize or downplay?
Have you ever encountered situations where the online persona of someone you know differs
significantly from their offline self? How did this affect your perception of them?
Authenticity vs. Presentation
• The tension between authenticity and presentation is a
central theme in the realm of online identity.
• It reflects the struggle individuals face when deciding
how much of their true selves to reveal in their online
presence versus how much they want to craft a particular
image or narrative.
Five Key Points
Authenticity
Authenticity refers to being genuine and true to oneself in both online and offline interactions. It involves being honest
about one's feelings, beliefs, and experiences.
Presentation
Presentation involves the deliberate effort to shape how others perceive you. This can include carefully curating what you
share online, using filters or editing tools, and even portraying a lifestyle that may not fully align with reality.
The Authenticity Paradox
The authenticity paradox arises when individuals are torn between being true to themselves and conforming to societal or
online norms. They may fear judgment or rejection if they reveal their unfiltered selves.
Five Key Points continued
Vulnerability and Connection
Authenticity can lead to more meaningful connections with others, as it fosters vulnerability and empathy. When
people are authentic, they often find others who relate to their struggles and experiences.
Social Pressure
Social media and online communities can exert pressure on individuals to present an idealized version of
themselves. This pressure can lead to mental health issues and a sense of disconnection from one's true self.
Discussion
Do you think society's expectations of online personas are changing over time? Are we becoming more
accepting of authenticity, imperfections, and vulnerability online?
The Role of Social Media in Identity Formation
• Social media platforms have become integral to how
individuals shape their identities and interact with others.
• They offer unique opportunities for self-expression, but
they also come with challenges related to identity
construction and self-esteem
Five Key Points
Identity Exploration
Social media platforms provide a space for individuals to explore and experiment with different aspects of
their identity. They can join communities that align with their interests and values.
Comparative Identity
Social media often leads to comparative identity, where individuals compare their lives, achievements, and
appearances to others. This can sometimes result in negative self-perception and low self-esteem.
Self-Presentation
Users of social media engage in self-presentation by selecting what to share and how to share it. This can
include carefully curated posts, selfies, and status updates that reflect a particular image or lifestyle.
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam
Networked World Assesment Powerpoint for Exam

More Related Content

Similar to Networked World Assesment Powerpoint for Exam

Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notesRavi Rajput
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
Bis Chapter5
Bis Chapter5Bis Chapter5
Bis Chapter5Chun Hoi Lam
 
computer networks
computer networks computer networks
computer networks MiXvideos
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfshubhangisonawane6
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Lakeisha Jones
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsssshahinaz Altabbakh
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)Nimmi Weeraddana
 
CN project 713711699701-5.pdf
CN project 713711699701-5.pdfCN project 713711699701-5.pdf
CN project 713711699701-5.pdfDakshBaveja
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfshubhangisonawane6
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyManas Saha
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networksSagar Gor
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxCatherineBotardo3
 

Similar to Networked World Assesment Powerpoint for Exam (20)

Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Bis Chapter5
Bis Chapter5Bis Chapter5
Bis Chapter5
 
computer networks
computer networks computer networks
computer networks
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
 
Hardware &amp; networking
Hardware &amp; networkingHardware &amp; networking
Hardware &amp; networking
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)
 
CN project 713711699701-5.pdf
CN project 713711699701-5.pdfCN project 713711699701-5.pdf
CN project 713711699701-5.pdf
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & Technology
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptx
 
Kai
KaiKai
Kai
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 

Recently uploaded

Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Trucks in Minnesota
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis GagnĂŠ
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 

Recently uploaded (20)

Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 

Networked World Assesment Powerpoint for Exam

  • 1. Topics for today:  Final Website Project Recap  Computers & Networks – Part 2  Inclass Assignment
  • 2. Website Creation Final Project Requirements • 2-3 webpage website linking. • Changes in Font, color, size, and background should be included. • At least three images along with a link to an external URL should be included.
  • 3. Part 2 – Computer & Network
  • 4. Topics • Network Types – LAN, MAN, and WAN • Packet Switching • Additional Network Terms • Mobile Network
  • 5. Network Types Ring Star Bus  Closed loop or ring Forming a continuous circle.  All devices are connected to a central hub  All devices are connected to a single central cable  Data travels in a unidirectional or bidirectional manner around the ring  Data travels directly between the device and the central hub  Data is sent along the central cable  Relatively fault-tolerant.  Less fault-tolerant if central hub or switch fails, it can disrupt the entire network.  Less fault-tolerant if cable fails, it can disrupt the entire network.  Simpler in terms of cabling and hardware  More scalable add/remove easy  Relatively simple, less cabling Three common LAN (Local Area Network) topologies: Ring, Star, and Bus. Local coffee shop's Wi-Fi network is a simple example of a LAN.
  • 6. For these companies, do you think they are ring, star, or bus? Why? • Financial Trading firms that are involved in high-frequency trading where low latency and quick data transmissions are crucial for success. • Small businesses that are simpler, cost- efficient with limited resources like mall offices, retail stores, or local businesses. • Company with centralized IT allowing for easier management, troubleshooting, and security enforcement. Each department or branch can have its own dedicated connection to the central server.
  • 7. Other Network Types Metropolitan Area Network (MAN) Covers a larger geographical area than a Local Area Network (LAN) but is smaller than a Wide Area Network (WAN) • Interconnected Campus Networks like UNH • City-Wide Wi-Fi Networks Wide Area Network (WAN) • Large geographic area like Liberty Mutual • Allows internetworking
  • 8. Packet Switching An efficient and reliable transmission of data between devices over a network. It involves breaking data into smaller units called packets and then routing these packets independently through the network to their destination. What is it? At the destination, these packets are collected, and then reassembled to the original message Discussion: Why do you think packet switching is necessary?
  • 9.  TCP and IP are separate protocols that work together to ensure data is delivered to its intended destination within a network.  IP obtains and defines the address—the IP address—of the application or device the data must be sent to.  TCP is then responsible for transporting and routing data through the network architecture and ensuring it gets delivered to the destination application or device that IP has defined. More Network Terms Transmission Control Protocol (TCP) and Internet Protocol (IP) often referred to as TCP/IP: A set rules for sending packets over the network How does packet switching know “how data should be transmitted”? Breakdown of steps: 1 A connection is established before data can be transferred 2 Breaks data (e.g., file, image, etc.) into packets 3 Puts the address and a sequence number on each packet 4 Check incoming packets’ sequence numbers 5 Sort the packets in the proper order 6 Reassemble data
  • 10.  1G, 2G, …, 5G are generations of wireless cellular network technology. These generational terms refer to the different stages of advancement and improvements in mobile telecommunications standards.  Main differences between the technologies are the bandwidth and the frequency range that data is transferred between devices Mobile’s Golden Age
  • 11. Next HTML Assignment with link to another webpage 1. Open your last HTML file (the one we did on Tuesday including an image and a background.) 2. Save that file on desktop (for some students) or in the inclass activity folder on your desktop with a new name with page 1 within the name. 3. Save that file on desktop (for some students) or in the inclass activity folder on your desktop with a new name with page 2 within the name. 4. You should now have 2 identical files but with two different names one with page 1 and one with page 2. 5. Open in your editor the page 1 file. 6. We are going to replace this line: <p>Thank you for visiting my webpage.</p> with a link to your page 2 file. 7. Update the text to be this: <p>If you would like to see other photos</p><a href=“filenamepage2.html">Click Here</a> 8. Save the file (this is page 1)
  • 12. <!DOCTYPE html> <html> <head> <title>My Dog Bean</title> </head> <body style="background-image: url('dog paws.jpg'); text-align: center;"> <h1><b><font face="arial" color="blue" size="15">Welcome to My Web Page showcasing my favorite four-legged Pal Bean!</font></b></h1> <p><font face="arial" color="black" size="10">This is a recent photo of Bean.</font></p> <img src="Bean.jpg"> <h2 style="text-align: left;"><font face="arial" color="red" size="20">Her favorite things include:</font></h2> <ol style="font-size: 20px; list-style-type: decimal;"> <li style="text-align: left; font-size: 20px;"><font face="arial" color="black" size="20">Belly Rubbing</font></li> <li style="text-align: left; font-size: 20px;"><font face="arial" color="black" size="20">Walks in the Park</font></li> <li style="text-align: left; font-size: 20px;"><font face="arial" color="black" size="20">Treats</font></li> </ol> <p><font face="arial" color="black" size="20">If you would like to see other photos <a href="HTML Inclass Activity Page 2.html">Click Here</a></font></p> </body> </html>
  • 13. Next HTML Assignment with link to another webpage (continued) 1. You have now updated page 1 with a link going to page 2. 2. Open page 2 and make some changes including a link to an external site. 3. We are going to replace this line: <p>Thank you for visiting my webpage.</p> with a link to an external site 4. Update the text to be this: <p>To learn more about Stratham Hill Park</p><a href="https://www.strathamnh.gov/stratham- hill-park-shp">Click Here</a> 5. Save and close the file. 6. We now want to use a browser to look at page 1 html. 7. Click the link to go to page 2. 8. Click the external link.
  • 14. <!DOCTYPE html> <html> <head> <title>My Dog Bean</title> </head> <body style="background-image: url('dog paws.jpg'); text-align: center;"> <h1><b><font face="arial" color="blue" size="15">Additional Pictures of Bean!</font></b></h1> <p><font face="arial" color="black" size="10">Here is one at Stratham Hill Park.</font></p> <img src="Bean Park.jpg"> <p><font face="arial" color="black" size="10">Near the tower at Stratham Hill Park.</font></p> <img src="Bean Hill.jpg"> <p>To learn more about Stratham Hill Park</p><a href="https://www.strathamnh.gov/stratham-hill-park-shp">Click Here</a> <p>Thank you for visiting my webpage.</p> </body> </html>
  • 15.
  • 16.
  • 17.
  • 18. <!DOCTYPE html> <html> <head> <title>My Dog Bean</title> </head> <body style="background-image: url('dog paws.jpg'); text-align: center;"> <h1><b><font face="arial" color="blue" size="15">Welcome to My Web Page showcasing my favorite four-legged Pal Bean!</font></b></h1> <p><font face="arial" color="black" size="10">This is a recent photo of Bean.</font></p> <img src="Bean.jpg"> <h2 style="text-align: left;"><font face="arial" color="red" size="20">Her favorite things include:</font></h2> <ol style="font-size: 20px; list-style-type: decimal;"> <li style="text-align: left; font-size: 20px;"><font face="arial" color="black" size="20">Belly Rubbing</font></li> <li style="text-align: left; font-size: 20px;"><font face="arial" color="black" size="20">Walks in the Park</font></li> <li style="text-align: left; font-size: 20px;"><font face="arial" color="black" size="20">Treats</font></li> </ol> <p>If you would like to see other photos</p><a href="C:UsersLisaDesktopPracticePractice2.html">Click Here</a> </body> </html>
  • 20. Formal definition A programmable machine which can accept input, process it, produce (display) output, and stores results or communicate. There are 2 components: Hardware (HW) and Software (SW) 1. Hardware • Input: keyboard, mouse, microphone, scanner, touch-screen, etc. • Output: printer, speaker, monitor, touch-screen • Processing: CPU (central processing unit), ALU (arithmetic-logic unit), CU (control unit), etc. • Storage: memory (Random-Access Memory, Read-Only Memory), secondary storage (hard disk, floppy disk, external disk, etc.) • Communication: modem (modulator/demodulator) 2. Software • Operating System (OS): Windows, MacOS, Unix, Linux, etc. • Applications: web browsers, work processing, antivirus, database management systems, games, programming, etc. Computer
  • 21. Modem (modulator/demodulator): A device that transforms the signal from digital to analog, and vice versa Router: Connects more than one devices into the network; sends data from a device to its destination (IP for Internet Protocol
  • 22. Network and Terminologies Computer network: • A collection of computing devices that are connected in various ways to communicate and share resources • Connections between computers in a network are made possible by: • Physical wires, cables, optical fiber • Wireless connection usually by radio waves or infrared signals • Note that computer networks may contain devices that are not just physical computers (e.g., printers, scanners, cameras, node/host)
  • 23. Network and Terminologies • Data Transfer Rate (bandwidth): • Speed with which data is transferred from one place (on the network) to another • Computers communicate between each other using specific protocols • In networking, a protocol is a set of rules describing how transferred data should be formatted and processed between devices • Client/Server model (centralized) • File server • Web server
  • 24. Next 2 weeks (Week 6 and 7) Today (2/27) • Tracking Cookies • Internet Memes Thursday (2/29) • Hacktivism, Cyber Warfare, and Identity Theft • UNH Security Awareness Week 7 Tuesday (3/5) • Assessment #1 what to expect and topic review • Final Presentation and Final Project assistance, review, and guidance Thursday, 3/7 • Assessment #1 please bring your laptops (Reminder you must take the assessment in the classroom. Please let me know of any concerns.)
  • 25. Data Brokers end-to-end View Let’s now discuss how they are getting the data…
  • 26. How Do They Collect It Online? Various methods of data collection that we reviewed:  Browser fingerprinting  Web and email beacons  IP address tracking (mention the limitations of VPNs)  Ecommerce sites Let’s look at Tracking Cookies…
  • 27. Tracking Cookies…… Common Way to Collect Data Online
  • 28. The Dual Nature of Cookies: Cookies are digital entities with a dual nature. On one hand, they enhance your web experience, making it more convenient and personalized. On the other hand, if misused, they can become tools for surveillance and potential threats to your online privacy. Understanding Cookies and Their Dual Nature  Cookies let websites remember you, your website login information, shopping carts, and more.  With that said, they are also a treasure trove of private information for cybercriminals to spy on you.  A basic understanding of cookies can help keep unwanted eyes off your internet activities.
  • 29. • At their core, cookies are small text files containing pieces of data. • They serve as identifiers for your computer when you're connected to a network, such as the internet. • These identifiers help websites and web applications remember you and your preferences, making your online interactions smoother and more tailored to your needs. What are Cookies? Cookies are employed for several purposes: 1. Session Management: Session cookies are used to manage your interactions with websites during a single browsing session. They enable functionalities like keeping you logged in, retaining items in your shopping cart, and remembering your preferences on a site. 2. Personalization: Cookies personalize your web experience. They remember your language preferences, themes, and user settings, ensuring that when you return to a website, it feels familiar and comfortable. 3. Tracking: Tracking cookies monitor your online behavior and interactions. They record the pages you visit, the links you click, and the time you spend on each site. This data can be used to create user profiles and deliver targeted content and advertisements. Purposes of Cookies:
  • 30. Cookies come in various flavors, each with its own characteristics: 1. Session Cookies: These temporary cookies are crucial for session management. They are stored in your device's memory and are deleted once you close your web browser. They are harmless and used for maintaining your active session. Example: Shopping Cart Feature of a Website. 2. Persistent Cookies: Persistent cookies have a longer lifespan and are stored on your device's hard drive. They can remember your login details and preferences across multiple sessions, making them convenient but potentially risky if misused. Example: Login Credentials 3. Zombie Cookies: Also known as "evercookies," these persistent cookies are difficult to remove and can be regenerated even after deletion. They are often used for tracking and can be invasive if not controlled. Example: web analytics companies to track unique individuals' browsing histories. 4. Super Cookies: Super cookies are a more advanced form of tracking cookies. They use various techniques, such as browser fingerprinting, to persistently track your online activities. These cookies are particularly concerning for privacy. Example: Type of cookie that is used to track users’ online activities and preferences. Different Types of Cookies
  • 31. Cookie Storage Where Are Cookies Stored Cookies are stored in two primary locations: • Local Storage: Cookies are saved locally on your device, typically organized by each web browser you use. You can view and manage cookies through your browser settings. • Web Server Database: Websites also store data related to cookies in their databases. This information helps them recognize returning users and deliver personalized content.
  • 32. Cookies In Conclusion… • Cookies are both your companions and potential spies on the web. • Understanding their roles, types, and potential risks empowers you to make informed decisions about your online privacy. • As you navigate the digital landscape, remember that while cookies can enhance your web experience, it's crucial to be vigilant and protect your online identity and data from misuse. After learning about cookies and their implications, do you think you will change the way you manage cookies on your own web browser? Why or why not? Discussion
  • 34. Topics • What is a Meme? • History of Memes • Meme Effectiveness and Usage • Memes as a Form of Language and Communication • Memes in Advertising and Marketing
  • 35. What is a Meme?  A meme is an idea, behavior, or style that spreads by means of imitation from person to person within a culture and often carries symbolic meaning representing a particular phenomenon or theme.  Memes are a worldwide social phenomenon. The more a meme resonates with people, the more they'll share it and the farther it will spread.
  • 36. The history of memes is a fascinating journey that predates the internet and extends into the digital age. Here's a brief overview of the history of memes: History of Memes Pre-Internet Era (Pre-1970s):  The concept of a "meme" was coined by British evolutionary biologist Richard Dawkins in his 1976 book, "The Selfish Gene." He used the term to describe an idea, behavior, style, or cultural practice that spreads within a culture, much like genes spread within a biological population. The Early Internet (1970s-1990s):  The concept of memes began to evolve on early internet forums, where users shared inside jokes and humorous images. These early examples are often referred to as "internet memes."  The first meme to gain widespread internet recognition was the "smiley face" emoticon, created by Scott Fahlman in 1982.  In the 1990s, internet users began to create and share viral content, such as chain emails and animated GIFs. These were the precursors to modern internet memes.
  • 37. • In the early 2000s, internet culture saw the emergence of image macros. An image macro is a piece of digital media featuring a picture or artwork with some form of text superimposed. • One of the most famous early image macros was "I Can Has Cheezburger?" featuring a cat with a caption in broken English. It was created in 2007 by Eric Nakagawa and his friend Kari Unebasami. The website was one of the most popular Internet sites of its kind receiving as many as 1,500,000 hits per day at its peak in May 2007. • The website 4chan played a significant role in the early development of internet memes. It introduced concepts like "Rickrolling" and "Advice Animals.“ Advice Animals are a photograph of an animal captioned with advice. The Rise of Image Macros 1990’s and 2000s:
  • 38. YouTube and Viral Videos (2000s-Present): • With the rise of YouTube and other video-sharing platforms in the mid-2000s, viral videos became a major part of meme culture. Videos like "Charlie Bit My Finger" and "Gangnam Style" became global sensations. • YouTube also gave rise to "reaction videos," where individuals record their reactions to watching popular videos, creating a new form of meme content.
  • 39. Discussion Questions  How do you think the early internet meme culture, characterized by image macros like 'I Can Has Cheezburger?' and concepts from 4chan like 'Rickrolling' and 'Advice Animals,' laid the foundation for the development of contemporary meme culture on platforms like YouTube and social media?  In what ways have memes evolved in terms of format, content, and their role in internet culture since the early 2000s?"
  • 40. Effectiveness of memes depend on their context and audience. They should aim to engage and provoke thought of the audience and can convey different messages. Bridging the gap between the serious and the whimsical. When politicians communicate through memes Serious vs. Whimsical Political Values
  • 41. Other Ways Memes are Conveying Different Messages The values that memes hold dear. Building communities one laugh at a time. Meme Values Online Community Building
  • 42. One More Way Memes are Used in Conveying Different Messages… When memes go viral: The superhero of the digital world. Memes have the power to spread rapidly. Meme Values
  • 43. Memes as a Form of Language and Communication  Memes have become a dynamic and influential form of language and communication, especially among younger generations.  They rely on shared cultural references and inside jokes to create a sense of community and connection among those who engage with them.  Memes are not just a form of entertainment; they are a reflection of the way we communicate, share ideas, and express ourselves in the digital age.
  • 44. Key Components of Memes 1. Visual Language: Memes are predominantly visual, often consisting of images or short videos accompanied by text. This visual component makes them highly accessible and instantly recognizable, allowing for quick and efficient communication. 2. Universal Appeal: Memes often tap into universal emotions, experiences, and situations that people from diverse backgrounds can relate to. This universal appeal transcends linguistic and cultural boundaries, making memes a global phenomenon. 3. Shared Cultural References: Memes frequently draw upon shared cultural references. They reference popular movies, TV shows, music, historical events, and even internet phenomena. This reliance on shared cultural knowledge allows meme creators to create a sense of camaraderie and understanding among their audience.
  • 45. Key Components of Memes Continued… 4. Inside Jokes: Memes are essentially inside jokes on a massive scale. They create a sense of belonging among those who understand them while simultaneously excluding those who do not. This exclusivity can foster a sense of community among meme enthusiasts. 5. Social Commentary: Memes are not limited to humor; they often serve as a vehicle for social and political commentary. They allow individuals to express their views, critique societal norms, and engage in discussions about various issues in a format that is easily shareable and digestible. 6. Memes as a Language Evolution: In many ways, memes are reshaping the way we communicate. They are concise, often conveying complex ideas or emotions in just a few words and an image. This brevity mirrors the way language has evolved in the digital age, with a focus on conciseness and speed.
  • 46. Key Components of Memes Continued… 7. Adaptability and Remix Culture: Memes are highly adaptable. They can evolve rapidly as they are remixed, parodied, and modified by various users. This adaptability allows for the continuous reinvention of ideas and the creation of new meme dialects. 8. Memes as Cultural Timestamps: Memes serve as cultural timestamps, reflecting the prevailing attitudes, trends, and sentiments of a particular moment in time. They capture the trends and provide insight into the collective consciousness of a generation. 9. Emojis and Reaction Memes: Emojis and reaction memes are a subset of memes that have become a shorthand for expressing emotions and reactions in online conversations. They help convey tone and mood in text-based communication.
  • 47. In Class Activity – Your Meme Example  Take a few minutes to think about a Meme that comes to mind.  Find one online if you don't have a favorite in mind.  Once you've chosen a meme, what it is about that meme that resonates with you. • What message or emotion do you think it's trying to convey? • How does it capture a shared cultural reference or inside joke? • Additionally, consider how this meme reflects the evolution of meme culture and its role in contemporary digital communication.
  • 48. Memes in Advertising and Marketing Memes have infiltrated the world of advertising and marketing as brands seek innovative ways to connect with younger audiences in the digital age. Distracted Boyfriend Meme by IKEA IKEA used the popular "Distracted Boyfriend" meme in one of its print advertisements. The meme was reimagined to depict a person choosing IKEA furniture over their old furniture, cleverly conveying the idea of attraction to IKEA's products. Leveraging memes in advertising campaigns can be a powerful strategy, but it also comes with certain advantages and potential drawbacks Burger King's "Whopper Detour" Campaign Burger King ran a campaign offering Whoppers for one cent, but the catch was that customers had to order through the Burger King app while at a McDonald's location. This cheeky campaign played on rivalry and location-based targeting, generating buzz and downloads of the Burger King app.
  • 49. Benefits of Using Memes in Advertising and Marketing 1. Youthful and Relatable: Memes are often created and shared by younger audiences, so incorporating them into marketing efforts can make a brand appear more youthful and relatable. 2. Increased Engagement: Memes tend to receive higher engagement on social media platforms due to their humor and shareability, potentially increasing brand visibility. 3. Viral Potential: A well-executed meme-based campaign has the potential to go viral, significantly amplifying brand exposure without the need for a substantial advertising budget. 4. Cost-Effective: Creating memes is typically more cost- effective than producing traditional advertisements, making it an attractive option for smaller businesses.
  • 50. Potential Pitfalls of Using Memes in Advertising and Marketing • Relevance and Appropriateness: Memes have a short lifespan, and using outdated or irrelevant memes can make a brand seem out of touch or insincere. • Risk of Backlash: Memes can be edgy and sarcastic, which may not align with a brand's image. Attempting to use memes that don't match the brand's tone can lead to backlash. • Cultural Insensitivity: Memes often rely on cultural references and humor, and brands must be cautious not to inadvertently offend or appropriate cultures. • Overuse: Overusing memes in marketing can dilute their effectiveness and make a brand appear gimmicky. It's crucial to strike a balance between meme-based content and other forms of marketing.
  • 51. Conclusion: Memes in Advertising and Marketing  Memes can be a valuable tool in advertising and marketing, especially when targeting younger audiences.  They offer a way to connect, engage, and entertain, but it's essential for brands to use them thoughtfully, staying attuned to cultural shifts and potential pitfalls to ensure their campaigns are both effective and well- received.
  • 52. The Good, Bad, and the Ugly of the Internet
  • 53. 1.Assets of Information: Platforms like YouTube have democratized content creation and allowed individuals to share valuable information and knowledge. 2.Marketing Strategies: Effectiveness of online marketing strategies and how businesses use social media for self-promotion. 3.Dispersal of Information: News and information can spread rapidly through social media platforms and there are implications of this phenomenon. 4.Globalization: The internet has connected people across borders and facilitated international collaborations. 5.Stay Up-to-Date: Keeps individuals informed about current events and trends. 6.Social Media: Has been used as a tool for social movements and activism. 7.Personal Finance: Online banking, budgeting tools, and personal finance management apps. 8.Crowdfunding: Successful crowdfunding campaigns have enabled creative projects to come to life. 9.Streaming Content: Convenience of streaming services for entertainment and education The Good Highlight how social media is used to mobilize people and/or provide other significant social movement visibility. Discussion Activity for The Good
  • 54. 1.Desensitization: Excessive exposure to certain content can desensitize individuals to real-world issues. 2.Misinformation: Misinformation spreads rapidly online and its impact on public perception. 3.Lazy Habits: The internet might contribute to procrastination and laziness. 4.Online Gambling: The rise of online gambling platforms and the potential risks associated with them. 5.Negative Social Skills: Excessive online interactions can affect face-to-face communication skills. 6.Attention Span: Studies have indicated a decrease in attention span due to frequent internet use. 7.Vulnerability of Personal Information: Personal information can be compromised online The Bad Think of an example of misinformation that has spread online. Discuss why it might be misleading, and brainstorm ways to verify information before sharing it. Discussion Activity for The Bad
  • 55. 1.Censorship: Internet censorship and its implications for freedom of speech. 2.Toxic Online Behavior: Cyberbullying, online stalking, and other forms of toxic behavior. 3.Dark Web: Dark web and its association with illegal activities. 4.Fraud: Online scams and fraud, leading to the importance of online security. 5.Sex Trafficking: How the internet can facilitate illegal activities. 6.Personal Identity Loss: Risk of sharing too much personal information online. 7.Surveillance: Online surveillance by governments and corporations. 8.Parental Control: Challenges and benefits of parental control tools for internet usage The Ugly .Before we jump to discussion let’s take a look at a real-world current example of Fraud and Personal Identity Loss – Next slide
  • 56. Real Example of Fraud and Personal Identity Think of an example where the internet significantly impacted individuals through online usage. Discuss why it is damaging and any ways it could be avoided
  • 57. Warm-up Discussion: The Good, the Bad, and the Ugly of the Internet • What are your perceptions of the internet - positive, negative, and any concerning aspects? • Share personal experiences and observations.
  • 59. Topics • History of HTML • Parts of an HTML Document • Basic Structure • Hands-on In-class Activity
  • 60. History of HTML Websites are the building blocks of the internet, and they consist of web pages. HTML is the backbone of web pages. What is HTML (HyperText Markup Language)?  A Web page is a text file written in a language called HTML.  HTML is not a programming language or a formatting language. It is a markup language.  A markup language is a language that describes a documents:  Content (what data to display including text, images, links)  Structure (how to display it including layout, input forms)  Styles are format descriptions written in a separate language from HTML that tell browsers how to render each element for particular devices History of HTML  A group of web developers, programmers, and authors of the W3C (http://www.w3.org/) created a set of standards or specifications that all browser manufacturers were to follow.  The W3C has no enforcement power  The recommendations of the W3C are usually followed since a uniform approach to Web page creation is beneficial to everyone
  • 62. DOCTYPE • To define a Document Type Head • Meta information • Only <title> is required • The content of the head element is not displayed within the Web page Body • Text/Content of the webpage to render <!DOCTYPE html> <html> <head> … </head> <body> … </body> </html> Three Parts to an HTML Document Anything between these two tags (<html> and </html>) makes up the document content The opening <html> tag marks the start of an HTML document Closing </html> tag tells a browser when it has reached the end of that HTML document
  • 63. Basic Structure The <HEAD> element contains information about the document, for example the document title or the keywords The content of the head element is not displayed within the Web page The </TITLE> element contains the page’s title: A document’s title is usually displayed in the browser’s title bar. The </BODY> element contains all of the content to appear on the Web page. The body element can contain code that tells the browser how to render the content.
  • 64.  A two-sided tag is a tag that contains some document content. General syntax for a two-sided tag: <element> content </element> For example: <P> content </P>  HTML elements are made up of the start tag, end tag, and the content between these tags  The core building block of HTML is the tag, which marks the presence of an element Tags and Elements For MAC users, you can use TextMate, TextEdit, SubLime, Webstorm, or Atom. For Windows users, you can use Notepad, Notepad++, Sublime Text, or Atom. What Software to Use? Microsoft Word is not the ideal tool for creating HTML documents because it is primarily designed for creating and editing word processing documents (like .docx files) rather than web pages. Microsoft Word may introduce unnecessary formatting and code that is not suitable for web development. Using a code editor will give you more control over your HTML code and ensure that it is structured properly for web browsers. Microsoft Word may introduce unnecessary formatting and code that is not suitable for web development.
  • 65. CAUTION!!! • Always save your html file with filename.html extension. • If you save your file as filename.txt, your webpage will not render in the browser
  • 66. For MAC Users using TextEdit • If you are using TextEdit, click on Text Edit (top left corner) -> Preferences -> Open and Save -> check the option “Display HTML files as html code instead of formatting text. • Uncheck the option Add “.txt” extension o plain text files
  • 67. For MAC Users using TextEdit • Go to Format, change the option Make Rich text to make plain text
  • 68. Let’s try it! • Open Canvas and open the presentation called HTML Introduction. This will enable you to copy and paste the text from the last slide. • Create a folder on your desktop called Inclass Activity. • Windows Users – Right click on the desktop and select New and Folder. • Mac Users – Either right click on the desktop (like Windows) or use Finder and add a new folder. • For Windows users, you can use Notepad, Notepad++, Sublime Text, or Atom. Create a new file. • For MAC users, you can use TextMate, TextEdit, SubLime, Webstorm, or Atom. • TextEdit, click on Text Edit (top left corner) -> Preferences -> Open and Save -> check the option “Display HTML files as html code instead of formatting text. • Uncheck the option Add “.txt” extension to plain text files • Go to Format, change the option Make Rich text to make plain text ***See next slide for image references. *** • Copy and paste all of the text from slide 13 • Always save your html file with filename.html extension. Save it in the new desktop folder you created. • If you save your file as filename.txt, your webpage will not render in the browser • Right click on the filename and open with a browser.
  • 69.
  • 70. Let’s try it! <!DOCTYPE html> <html> <head> <title>Sample Webpage</title> </head> <body> <header> <h1>Welcome to My Webpage</h1> </header> <p> This is my first webpage creation using HTML. I am learning about HTML in our “Living in a Connected World Class”. <footer> <p>&copy; 2023 Sample Webpage</p> </footer> </body> </html>
  • 71. This week Tuesday, 1/30 • Internet Review • Search Thursday, 2/1 • Search (continued) • HTML Introduction
  • 72. The Evolution of the Internet: From Tim Berners-Lee to Web 2.0
  • 73. Topics • The World Wide Web (WWW) and its significance in today’s digital age • Tim Berners-Lee and his role in the Creation of the WWW • Technologies/Tools Used by Tim Berners-Lee • The Why? • Marc Andreessen and Mosaic • Two-Way Links and Revenue Models • Blogs and Personal Publishing • Wikis and Wikipedia • Conclusion
  • 74. The World Wide Web (WWW) and its significance in today’s digital age WWW is a system of interconnected documents and resources, accessed via the internet, that has transformed the way we communicate, share information, and conduct business. Key Concepts of the World Wide Web * • Hypertext: Where resources are linked through clickable links. This allows users to navigate between different resources easily. • HTTP and HTML: Hypertext Transfer Protocol (HTTP) is the set of rules for how web browsers and web servers communicate. Hypertext Markup Language (HTML) is the language used to structure and format web content. • Web Browsers and Web Servers: Web Browsers are software that displays web content) and Web Servers are software that hosts web content and serves it to users. *More detail on slide 6
  • 75. • Global Information Access: Anyone with internet access can access a vast amount of information on virtually any topic, which has transformed education, research, and personal knowledge. • Communication and Collaboration: WWW has revolutionized communication. People can easily connect and collaborate through various online platforms, such as social media, email, and messaging apps. • Economic Impact: It has created new business models, such as e-commerce and online services, and has transformed traditional industries like publishing, entertainment, and advertising. Significance in Today's Digital Age • Cultural and Social Changes: There are cultural and social changes brought about by the WWW. It has facilitated the spread of cultures, ideas, and movements, and has shaped new forms of expression, like memes and online communities. • Data and Privacy: Significant challenges related to data privacy and security in the digital age. The WWW has raised concerns about personal data collection, online surveillance, and cybersecurity. How often do you use the internet in your daily lives and how has it impacted your education, work, and personal life? Discussion Activity
  • 76. Tim Berners-Lee and his role in the Creation of the WWW Innovative vision and technological contributions revolutionized information accessibility, leading to the birth of the World Wide Web Background: • Tim Berners-Lee, a British computer scientist, developed foundational technologies for global information sharing. Inspiration: • Berners-Lee's vision for the web was inspired by "Enquire Within Upon Everything," a publication with diverse topics and connections. Early Prototype: • Created a prototype called "Enquire" at CERN, consisting of interconnected documents, foreshadowing the hypertext structure of the Web. Vision Realization: • Proposed the concept of the WWW in 1989. • Developed foundational technologies like HTTP, HTML, web browser, and web server. • The first website went live in 1991, bringing his ideas into practical implementation.
  • 77. Technologies/Tools Used by Tim Berners-Lee Web browser software (like the one Berners-Lee used to develop) retrieves and displays web content to users. Web server software responds to requests from web browsers, delivering the requested web pages and resources. HTTP is the protocol that governs how information is exchanged between web browsers and servers. It enables the retrieval of web pages and resources. (think of it as an address) HTML is the language used to structure and format web content. It uses tags to define headings, paragraphs, links, images, and more. Hypertext Transfer Protocol (HTTP): Hypertext Markup Language (HTML): Web Browser Software: Web Server Software:
  • 78. Limitations of Computers and Linking Information •Computers excel at performing tasks step by step but struggle with making random associations or connections. •Human brains can make creative leaps and associations that computers cannot easily replicate. •For example, a human can associate a word with multiple meanings or connect seemingly unrelated ideas. Have you ever thought about how information on the internet is connected? Share examples of how you navigate information online using hyperlinks. Discussion Activity
  • 79. Marc Andreessen and the Mosaic Web Browser Marc Andreessen is a prominent figure in the history of the internet and web browsing. He co-authored the Mosaic web browser while he was a student at the University of Illinois. Mosaic is often credited as one of the earliest graphical web browsers that played a crucial role in popularizing the World Wide Web. Tim Berners-Lee's role was in creating the foundational technologies and concepts of the WWW, while Mosaic was a web browser developed by Marc Andreessen that improved upon those concepts by introducing graphical capabilities so these creations complimented each others.
  • 80. Tim Berners-Lee's Early Text-Based Web Browser • Designed to access and display text-based information from WWW. • Early web pages were primarily composed of text and hyperlinks, allowing users to navigate between different documents. • Limited in its ability to display images, videos, and other multimedia content. Marc Andreessen’s Mosaic • Marked a significant advancement by introducing graphical capabilities to web browsing. • This allowed web pages to incorporate images, making the content more visually appealing and engaging for users. • The addition of images transformed the way information was presented, enabling websites to convey information more effectively enhancing the overall user experience of browsing the web. • Images allowed websites to provide visual context and illustrate concepts, making the content more comprehensible and memorable. Browser Evolution…
  • 81. But…it’s not all rosy…there were compatibility issues associated with the release of Mosaic, especially in its early versions When Mosaic was first released in the early 1990s, web technology was still in its infancy, and there was a lack of standardization. This lack of standardization led to compatibility challenges with various computer systems and web servers. Mosaic's initial version was designed to work primarily on NeXT computers. This limited its accessibility to users as NeXT was a niche platform. To significantly expand the user base, Mosaic was made available on popular computing platforms like Windows and Macintosh. As Mosaic evolved, it became more user-friendly and accessible on different platforms, helping to lay the groundwork for the widespread adoption of graphical web browsers. Have you have ever encountered compatibility issues while using modern web browsers or applications. Have you had a different experience when using different browsers? Discussion Activity
  • 82. Mosaic's Introduction of Graphical Capabilities and Enhanced User Experience Inline Images and Visual Integration  Mosaic's innovation of inline images, where images could be displayed directly within the text of a web page.  inline images allowed for seamless integration of visual content alongside textual information, enhancing the cohesiveness of web pages.  This concept revolutionized content presentation, enabling designers to create more dynamic and engaging layouts.
  • 83. A confrontation between Tim Berners-Lee and Marc Andreessen regarding web ideals and ownership Tim Berners-Lee, had a vision of the web as an open, collaborative, and freely accessible platform. He believed in the importance of sharing information openly and promoting universal access to knowledge. He did not intend for the web to be a commercialized platform. Marc Andreessen had different ideas about the web's future. He saw the potential for commercializing the web and believed in the concept of ownership and potential profits from web technologies. Ultimately, the conflict was resolved in favor of openness and collaboration. Tim Berners- Lee's vision of a free and open web prevailed, and the World Wide Web Consortium (W3C) was established to develop web standards in an open and collaborative manner. Confrontation Arises
  • 84. A two-way link, also known as a reciprocal link, is a hyperlink between two web pages that points to each other. This type of link is bidirectional, creating a connection between the two pages. Two-way links involve a system where links require approval from both parties. For example, if website A wants to link to website B, website B must approve the link for it to become active. This is different from one-way links, which don't require approval. Two-Way Links and Revenue Models Traditionally, web links are one-way connections, meaning one page links to another. Micropayments to Content Producers  Micropayments to content producers involve making very small financial transactions, often in fractions of a cent, to access or support digital content.  Imagine a digital platform for news articles where users typically encounter a paywall when trying to access premium content. Instead of requiring users to commit to a monthly subscription, the platform adopts a micropayments model. Impacts on Media Industry  Micropayments have allowed content producers to receive small payments from users directly, potentially creating a new revenue model.  This system has the potential to shift the focus away from traditional advertising-driven revenue models, which often rely on large user bases and extensive data collection.
  • 85. Implementing a micropayment system for content had its challenges. Handling very small payments efficiently, dealing with transaction costs, and ensuring security are some of the technical challenges. Challenges and Drawbacks With the challenges of micropayments, the predominant revenue model on the web is ad-driven, with platforms relying heavily on advertising for income. Have you ever encountered websites or platforms that charge micro-fees for access to specific content or features? Would you be willing to pay small amounts for premium content or services on the web. Discussion Activity
  • 86. Regarded as one of the pioneering figures in the world of blogging played a pivotal role in shaping the concept of personal blogging. Justin Hall Early Days of Blogging Justin Hall began his online presence in 1994 with a personal website, which he continued to update regularly. At that time, the term "blogging" had not yet been coined, and what he was doing was essentially the precursor to blogging. Justin's Links from the Underground One of Justin Hall's notable features on his website, "Justin's Links from the Underground,“ was where he curated and shared interesting links and resources from the early web. This feature was essentially a form of early content curation, which is a common aspect of modern blogs. The website wasn't limited to just links; he also shared personal experiences, thoughts, and stories, which is another defining characteristic of blogging. His website was also considered a virtual support group. His willingness to openly share personal experiences and challenges, such as his father's suicide led to people sharing their stories and experiences, creating a sense of virtual support and community.
  • 87.  Justin’s website was called a weblog to start but then shortened to "blog”. His early online activities played a role in popularizing the blog term. His early blogging laid the foundation for what has become a massive and diverse blogosphere.  His willingness to share personal stories and experiences set a precedent for the personal and authentic nature of blogging. Blogs Discussion Activity Do you have personal blogs or follow any bloggers? What is the role of personal storytelling and authenticity in modern blogs? Some of the most popular blogs in the world include: • Huffington Post • TechCrunch • BuzzFeed • LifeHacker • TheVerge
  • 88. Ward Cunningham and Wiki Software A computer programmer and software developer who significantly contributed to the development of wiki software, which is a significant innovation in collaborative content creation on the internet. Wikis and the Read-Write Web Wikis are content management applications that enable a "read-write web.“ A “read-write web” goes beyond simple consumption of content (the "read" aspect) to enable users to actively contribute, create, and edit content (the "write" aspect). It signifies a shift from passive web browsing to active participation and collaboration. Wikis use a simplified markup language to make it easy for users to edit and link pages within the wiki. This markup language is designed to be user-friendly, even for those with limited technical expertise. By using this simplified markup language, wikis enable collaborative editing and linking of pages with minimal technical hurdles. This approach makes it easy for users to contribute, edit, and organize content within the wiki, fostering a culture of collaboration and knowledge sharing.
  • 89. Creation of Nupedia and Rigorous Editing Process  Nupedia is a free online encyclopedia with the goal of providing high-quality, expert-reviewed content. There is a rigorous editing process for the content of Nupedia which involved seven steps, expert reviews, and assigning topics to proven experts with vetted credentials.  This approach aimed to ensure the accuracy and reliability of the content but was time-consuming and slow. There were challenges in terms of scalability and the ability to keep up with the rapidly changing landscape of online knowledge sharing. This led to the development of Wikipedia, a more open and collaborative platform, which allowed for faster content creation and a wider range of contributors.
  • 90. Wikipedia  Wikipedia was created as a complementary project to Nupedia, with the goal of accelerating the content creation process.  It was envisioned as a "feeder product" for Nupedia, allowing for more rapid and collaborative content generation.  It encourages both volunteers and experts to contribute their knowledge and expertise collaboratively. The idea is to tap into the vast pool of knowledge available within a community or society and use it to benefit a broader audience or address specific challenges.
  • 91. Challenges of Elitism and Clash of Wisdom  Nupedia exemplified a traditional, expert-driven model of knowledge creation creating a culture of Elitism. This clashed with the open and inclusive model that Wikipedia represented.  Nupedia, had a desire for deference to authority, which conflicted with the Wikipedia community's ethos of inclusivity.  This highlights a key ideological difference between two prominent platforms in the early history of online encyclopedias: Nupedia and the Wikipedia community.  It underscores the pivotal moment in the history of online encyclopedias when the open and collaborative model of Wikipedia gained prominence and redefined how knowledge is created and shared on the internet.  Wikipedia's approach, which embraced the wisdom of the crowd, allowed for more rapid content creation but raised concerns about accuracy and reliability Nupedia v. Wikipedia Elitism v. Open and Collaborative Discussion Activity Have you used Wikipedia or contributed to it? What is your perspectives on the balance between expert-driven content and collaborative, crowd-sourced content on platforms like Wikipedia?
  • 92. Deep Dive Into Wikipedia Wikipedia, the world's largest online encyclopedia, is a prime example of commons-based peer production in action What is Commons-Based Peer Production? Commons-based peer production is a collaborative model of content creation and resource sharing that relies on the collective contributions of a distributed network of individuals. It is characterized by the following key principles: 1.Commons: In commons-based peer production, there is a shared resource or "commons" that is collectively owned and managed by a community of participants. This commons can be digital content, software, knowledge, or any other resource that can be collaboratively produced and shared. 2.Peer Production: The production process is decentralized and involves a large number of participants, often referred to as "peers." These peers are individuals who contribute to the creation and maintenance of the commons voluntarily and without a traditional hierarchical structure. 3.Open Participation: Participation in commons-based peer production is typically open to anyone who wishes to contribute. There are no gatekeepers or central authorities controlling access or contributions. This open participation encourages diversity and inclusivity. 4.Modularity: Projects are often broken down into modular components or tasks that can be worked on independently. This modularity allows contributors to focus on specific areas of interest or expertise. 5.Meritocracy: Contributions are evaluated based on their quality, usefulness, and relevance rather than on the contributor's status or credentials. This meritocratic aspect encourages a culture of excellence.
  • 93. Here's how it applies to Wikipedia 1.Commons: Wikipedia's commons is the vast repository of articles and knowledge covering a wide range of topics. It is collectively owned by the global community of Wikipedia editors and readers. 2.Peer Production: Wikipedia is written, edited, and maintained by a decentralized network of volunteers, known as Wikipedians or editors. These volunteers come from diverse backgrounds and locations around the world. 3.Open Participation: Wikipedia is open for anyone with internet access to edit and contribute to its articles. There are minimal barriers to entry, and new contributors are welcomed. 4.Modularity: Wikipedia articles are broken down into discrete topics, making it easy for contributors to focus on specific subjects of interest. Each article is a modular unit that can be improved independently. 5.Meritocracy: Wikipedia's content is continually reviewed and improved by the community. Edits and contributions are assessed based on their accuracy, verifiability, neutrality, and adherence to Wikipedia's guidelines. High-quality contributions are recognized and retained. Commons-based peer production has been instrumental in Wikipedia's success. It has allowed Wikipedia to harness the collective knowledge, skills, and efforts of a global community to create a vast and freely accessible knowledge resource. Wikipedia's success demonstrates the power of open collaboration and the ability of a decentralized network of volunteers to create and maintain valuable content on the internet. Wikipedia Application of Commons-based Peer Production
  • 94. Wikipedia Contributors Contributing to Wikipedia is driven by a wide range of motivations, reflecting the diversity of its volunteer community. These motivations can be grouped into several drivers: • Interaction with others • Personal gratification • Recognition and Prestige • Altruism • Intellectual Curiosity • Advocacy and Activism • Sense of Ownership
  • 95. WikiPedia Success Story Shared Knowledge and Distributed Power With the collective goal of building and maintaining a shared knowledge resource, Wikipedia embodies the concept of shared knowledge, where information is collaboratively created and made freely available to the public. Distributed power is a key feature of Wikipedia's governance model. While there are guidelines and policies, decisions are made collectively through consensus- building among contributors. No single authority dictates content, and the community has the power to shape Wikipedia's content and rules. This distributed power ensures that no single individual or group controls the platform, aligning with Wikipedia's commitment to openness and neutrality. In summary, Wikipedia's success as a collaborative platform is driven by the diverse motivations of its contributors, the addictive nature of editing ("wiki-crack"), the principles of shared knowledge, and the distribution of power within the community. It represents a unique and powerful model for harnessing collective expertise and providing free access to a vast repository of knowledge.
  • 96. Today… • How to sign up for a 15-minute final presentation time slot • Search • HTML Introduction Recap from Tuesday: • The World Wide Web (WWW) • Tim Berners-Lee (TBL) • Technologies/Tools Used by TBL • Marc Andreessen and Mosaic • Two-Way Links and Revenue Models • Blogs and Personal Publishing • Wikis and Wikipedia
  • 97. Signing up for a Final Presentation 15-minute slot  Make sure you aren’t using Safari – Canvas doesn’t always work. Use Chrome or Edge.  Click on the Calendar icon on the left hand navigation.  Starting March 26, you will see 15-minute slots. If a slot is taken, it will be grayed out and you will not be able to sign up for that slot.  On the right hand side, click find appointment. This will show all of the slots.  Click on the slot you would like and click edit.  Type your name in the box and hit update.
  • 98. Search Internet Part 2 How often do you use Google or other search engines in your daily life, and for what purposes?
  • 99. Topics • Web directories and crawlers • Search Engines • Yahoo! Combines Search with Web Directories • Google • The Inception and Early Development of Google • Google Roots • Google’s User-Centered Design • Key Milestones in Google’s History • Human-Machine Symbiosis
  • 100. Web Directories and Crawlers Introduction to the Early Challenges of Web Content Explosion:  During the early 1990s, the World Wide Web experienced an explosive growth of web pages and websites.  As more individuals, organizations, and businesses began creating web content, it became increasingly difficult for users to locate relevant information.  Navigating the web was akin to exploring a vast, uncharted territory with no maps or signposts. Explanation of Web Directories as Hand-Compiled Indices of Websites:  Web directories were among the earliest attempts to organize the chaotic web landscape.  They functioned as structured lists or indices of websites, categorized by topics or themes.  Unlike search engines, web directories were typically created and maintained by human editors who manually reviewed and organized website submissions.  Users could browse these directories to discover websites related to their interest
  • 101.  In 1994, two Stanford University graduate students, Jerry Yang and David Filo, launched "Jerry and David's Guide to the World Wide Web.“ This guide later evolved into Yahoo!, one of the most prominent and influential web directories of its time.  Yahoo! initially started as a hand-compiled directory, featuring a hierarchical structure with categories and subcategories, making it easier for users to navigate the web. Introduction to Web Crawlers (Bots) Automating the Indexing Process:  As the web continued to expand rapidly, the need for automated methods to index web content became evident.  Web crawlers, also known as bots or spiders, were developed to automate the process of exploring websites and collecting information about them.  These crawlers would follow hyperlinks from one page to another, indexing the content they encountered.  This automation significantly sped up the process of indexing the web and allowed for more comprehensive search results. Web Directories and Crawlers How do you think web crawlers (bots) have revolutionized the process of indexing websites, compared to manual methods? Let’s Discuss
  • 102. Search Engines In addition to web directories, search engines emerged as another solution to the challenge of finding information on the web. Early search engines used algorithms to index and rank web pages Users could enter keywords or phrases, and these search engines would return a list of relevant web pages based on their algorithms. These search engines played a pivotal role in transitioning from manual web exploration to more focused and intent- based searches.
  • 103. Yahoo! Combines Search with Web Directories Yahoo! recognized the importance of both web directories and search engines in helping users navigate the web. In 1995, Yahoo! integrated a search engine into its directory, offering users the convenience of searching for specific information while still benefiting from the directory's structured organization. This integration marked a significant step in the evolution of web search, as it combined the strengths of both approaches. Consideration of User Behavior, including Exploration and Discovery • During the early web era, user behavior was shaped by the novelty of the internet. • Users often approached web browsing as a form of exploration and discovery, similar to flipping through a physical directory or encyclopedia. • Intent-based searching, where users entered specific queries to find answers, was less common than today.
  • 104. Google Larry Page and Sergey Brin: Larry Page and Sergey Brin are renowned computer scientists and entrepreneurs who co-founded Google, one of the world's most influential technology companies. Their innovative search engine transformed how people access information on the internet. Profit Motive: Larry Page recognized the importance of not only inventing technology but also making it accessible and profitable. He emphasized that innovation should be brought to the world in a way that generates revenue and sustains further development. Interests: Page's interests spanned computer science and business, making him a unique visionary in the tech industry. He believed in creating products that not only solved technical problems but also had a practical impact on people's lives. Human-Computer Interaction: Page had a strong interest in human-computer interaction, aiming to make technology more user-friendly and intuitive. Larry Page’s Profit Motive and Interest
  • 105. Google Sergey Brin, like Page, had a strong background in computer science. He also had a strong foundation in mathematics, which contributed to the development of Google's innovative algorithms. Brin's expertise in data mining played a pivotal role in shaping Google's search engine. Larry Page and Sergey Brin met as graduate students at Stanford University, where they pursued their Ph.D. studies. Stanford University is renowned for fostering academic excellence and innovation. It has a rich history of producing successful entrepreneurs and tech leaders. The university's environment encouraged and supported tech entrepreneurship, making it an ideal place for Page and Brin to develop their groundbreaking ideas. Together, Larry Page and Sergey Brin leveraged their academic backgrounds and entrepreneurial drive to create Google, a company that not only revolutionized web search but also became a global technology powerhouse. Why do you think Larry Page and Sergey Brin were motivated to develop a better search engine, considering their academic backgrounds and interests? Discussion
  • 106. Larry Page and Sergey Brin initiated the Backrub project, a precursor to Google, while still at Stanford. The project aimed to compile a comprehensive collection of backlinks (inbound links) pointing to various web pages. However, the explosive growth of the web posed significant computational challenges in managing and analyzing this vast dataset. Sergey Brin joined forces with Larry Page, and together, they developed a more sophisticated ranking system known as PageRank. PageRank assigned numerical values to web pages based on the quantity and quality of backlinks they received. It introduced the idea that a web page's importance could be determined by considering the importance of pages linking to it. PageRank's recursive process incorporated multiple feedback loops to refine the ranking of web pages. The Backrub Project Development of PageRank Google Roots The Anatomy of a Large-Scale Hypertextual Web Search Engine In 1998, Larry Page and Sergey Brin authored this groundbreaking paper. This paper laid out the fundamental principles of Google's search engine and introduced the PageRank algorithm. It also emphasized the importance of assessing web page importance based on the quantity and quality of backlinks. The paper also highlighted the scalability of Google's search engine architecture.
  • 107. How Google Search Works (in 5 minutes)
  • 108. Google’s User-Centered Design Google's approach to search differed significantly from its predecessors. While other search engines at the time relied on various factors to rank pages, Google tapped into the wisdom of the crowds by assessing what the world thought of a page. This approach aimed to provide users with more relevant and valuable search results User-Centered Design and Algorithm Improvement • Google placed a strong emphasis on user-centered design, guided by the principle that the user is never wrong. • Instead of blaming users for poor search results, Google continually studied user behavior to enhance its algorithms. • This iterative process involved automated adjustments based on user interactions, leading to more accurate and relevant search results. How has the widespread availability of search engines like Google changed the way we access and use information compared to the pre-internet era? Discussion
  • 109. Key Milestones in Google’s History Commercialization Attempts and the Shift to an Ad-Based Revenue Model:  Google initially attempted to license its search technology to established search companies for a $1 million fee. However, many companies failed to see the significance of search technology at that time.  As a result, Larry Page, Sergey Brin, and their team decided to start Google as an independent company in 1998.  Google adopted an ad-based revenue model, which would later become one of its primary sources of income.  This shift marked the beginning of Google's transition from a research project to a commercial enterprise. Google's Business Values: Google's core business values have been central to its success:  Product Improvement: Google has consistently invested resources in improving its products and services. It emphasizes innovation and strives to provide users with the best possible experience.  Customer-Centricity: Google is known for its commitment to the user experience. It focuses on understanding user needs, addressing their concerns, and delivering valuable solutions.  User-Centered Design: Google's products are designed with the principle that the user is never wrong. It actively studies user behavior and continuously refines its algorithms to better serve users.  Iterative Development: Google's approach involves iterative development, meaning it makes automated adjustments based on user interactions to enhance its services. These milestones, including the influential paper and the adoption of an ad-based revenue model, played pivotal roles in Google's transformation from a research project into a global technology giant. Google's commitment to product improvement and a customer-centric approach has been key to its continued success and innovation.
  • 110. Human-Machine Symbiosis  Google's search algorithm relies on billions of human judgments, even though the algorithm itself is automated. Google's search engine is designed as an automated way to tap into the collective wisdom and knowledge of humanity.  This reliance stems from the fact that Google's search results are determined by the collective wisdom and preferences of billions of internet users worldwide.  When users interact with Google's search results by clicking, staying on pages, and engaging with content, they provide implicit feedback that informs the algorithm. As users search for information, their actions and preferences are recorded and analyzed by the algorithm. Reliance on human judgments to automate the tapping into human wisdom This automated process considers what users find valuable, trustworthy, and relevant, effectively harnessing the wisdom and insights of a global audience. In essence, Google's search engine serves as a remarkable example of human-machine symbiosis, where automation and algorithms work in harmony with human behaviors, preferences, and wisdom to provide valuable information to users on a global scale. What do you envision as the future of web search, and how might emerging technologies like artificial intelligence and voice search impact it? Discussion
  • 111. Week 5 – 2/20 and 2/22 Today • Final Presentation Overview/Reminder • Network Individualism cont. • In Class Activity - Reflection • Data and Browser Fingerprinting • In Class Activity – Browser Fingerprinting Thursday • Cookies • Internet Memes Due Sunday, 2/25 • Week 5 Homework • Week 5 In Class Activities: • Network Individualism Reflection • Browser Fingerprinting
  • 112. Final Presentation • Topic 10 • Introduction 5 • Organization 10 • Subject Knowledge 30 • Conclusion 5 • Presentation Length 5 • Vocal Delivery 10 • Language Skills 5 • Use of Visual Displays/Content 10 • Physical Presence 10 1. Final Presentation Rubric 2. Final Project Rubric 2 New Documents on Canvas Under Important Information
  • 113. Topics to Cover • What is Networked Individualism? • Five Key Points of Networked Individualism • The Impact of Digital Technologies • Crafting Online Personas • Authenticity vs. Presentation • The Role of Social Media in Identity Formation • The Data Dilemma: • Surveillance vs. Personalization • Online Privacy and its Challenges • Ethical Implications of Data Collection • Social Media Algorithms • Confirmation Bias and Echo Chambers • Diverse Perspectives in the Digital Age
  • 114. Topics to Cover • The Power of Online Communities • Crowdsourcing and Social Movements • The Role of Hashtags and Viral Campaigns • Emerging Technologies: AI, VR, AR, and Beyond • Predictions and Speculations about the Future of Technology • Ethical Considerations and Responsible Digital Citizenship
  • 115. Social Media Algorithms • Social media algorithms are complex mathematical formulas used by platforms like Facebook, Instagram, Twitter, and YouTube to determine what content users see in their feeds. • These algorithms analyze user behavior and preferences to personalize content delivery, but they also have significant implications for the type of information users encounter.
  • 116. Five Key Points Content Personalization Social media algorithms aim to create a tailored user experience. They analyze user data, such as past interactions, interests, and demographics, to prioritize content that is most likely to engage users. Engagement Metrics Algorithms often prioritize content with high engagement metrics, such as likes, comments, and shares. This can result in a feedback loop, where popular content becomes more prominent, and less popular content is marginalized. Filtering and Ranking Algorithms filter through vast amounts of content and rank it based on relevance. Content that the algorithm deems less relevant to a user's interests may not appear in their feed at all.
  • 117. Five Key Points continued Algorithmic Bias Algorithms can inadvertently perpetuate biases present in the data they're trained on. This can result in discriminatory or polarizing content being recommended to users. User Experience vs. Engagement There is a tension between optimizing user experience and maximizing user engagement. Algorithms often prioritize the latter, which can lead to content that evokes strong emotions or reinforces preexisting beliefs. Discussion How do social media algorithms influence the content you see on your feeds? Have you noticed a particular type of content being promoted more often?
  • 118. Confirmation Bias and Echo Chambers • Confirmation bias is the tendency for individuals to seek, interpret, and remember information in a way that confirms their preexisting beliefs. • This cognitive bias can lead to the formation of echo chambers, where people are exposed to and reinforce their existing viewpoints while dismissing opposing perspectives.
  • 119. Five Key Points Confirmation Bias Confirmation bias occurs when individuals actively seek out information that confirms their existing beliefs and values while avoiding or dismissing information that challenges them. Echo Chambers Echo chambers are environments, often digital, where individuals are exposed primarily to information and opinions that align with their existing beliefs. These chambers reinforce confirmation bias and limit exposure to diverse perspectives. Information Silos Social media algorithms and self-selection of online communities can contribute to information silos, where individuals only engage with like-minded individuals and ideas
  • 120. Five Key Points continued Polarization Confirmation bias and echo chambers can lead to political and ideological polarization. When individuals are consistently exposed to one perspective, they may become more extreme in their beliefs and less willing to consider alternative viewpoints. Mitigating Echo Chambers Encouraging exposure to diverse perspectives, critical thinking, and media literacy are strategies to mitigate the effects of echo chambers and confirmation bias. Discussion Have you observed echo chambers in online communities or social media platforms you engage with? How might these echo chambers impact individuals and society as a whole?
  • 121. Diverse Perspectives in the Digital Age • The digital age has created unprecedented opportunities for individuals to access and engage with diverse perspectives from around the world. • This diversity can enrich our understanding and challenge our preconceptions.
  • 122. Five Key Points Global Connectivity The internet has connected people from different cultures, backgrounds, and experiences. This global connectivity allows for the sharing of diverse perspectives and ideas. Exposure to Different Cultures Online platforms, such as social media and video-sharing sites, enable users to learn about and engage with cultures and viewpoints they may not encounter in their offline lives. Enhanced Empathy Exposure to diverse perspectives can lead to greater empathy and understanding. Hearing from individuals with different life experiences can challenge stereotypes and biases.
  • 123. Five Key Points continued Challenges of Information Overload With the abundance of information available online, individuals must learn to critically evaluate sources and differentiate between credible information and misinformation. Filtering and Curation While algorithms can contribute to echo chambers, they can also be used to curate diverse content. Platforms can introduce users to content from various sources and viewpoints. Discussion How has the internet and digital platforms enriched your exposure to diverse perspectives, cultures, and ideas? Can you share an example of a particularly impactful experience?
  • 124. The Power of Online Communities • Online communities are groups of individuals who come together on digital platforms to connect, share information, discuss common interests, and provide support. • These communities have gained significant influence and impact in the digital age.
  • 125. Five Key Points Community Formation Online communities can form around virtually any interest, from hobbies and fandoms to professional networking and social causes. They provide a sense of belonging and shared identity. Support Networks Many online communities serve as valuable support networks for their members. People can find emotional support, advice, and camaraderie within these groups, often across geographical boundaries. Amplification of Voices Online communities can amplify the voices of individuals and causes. When a community rallies around a particular issue or idea, it can generate significant attention and influence public discourse.
  • 126. Five Key Points continued Information Sharing Communities are hubs for information sharing and learning. Members often share news, resources, and expertise related to their shared interests. Challenges Online communities can face challenges, including issues related to moderation, toxicity, and the spread of misinformation. Maintaining a healthy and inclusive community environment is important. What are some examples of online communities that have made a significant impact on society, either in a positive or negative way? Discussion
  • 127. Crowdsourcing and Social Movements • Crowdsourcing is a collaborative approach that involves obtaining input, ideas, services, or content by soliciting contributions from a large group of people, often through online platforms. • An example is Kickstarter. This is a crowdfunding platform that allows individuals or small businesses to raise funds for creative projects such as films, music albums, gadgets, and more. People who are interested in supporting a project can contribute money to help bring it to fruition, and in return, they may receive rewards or incentives based on their level of contribution. The platform relies on the collective support of a large number of individuals, or the "crowd," to fund a diverse range of creative endeavor
  • 128. Five Key Points Crowdsourced Activism Crowdsourcing allows activists and social movements to leverage the collective power of participants. It can involve gathering signatures for petitions, raising funds for causes, or sharing information and resources. Global Reach Online crowdsourcing platforms enable social movements to reach a global audience, allowing individuals from diverse backgrounds to join in and contribute. Resource Mobilization Crowdsourcing can quickly mobilize resources, such as funds, volunteers, and expertise, to support social causes and humanitarian efforts.
  • 129. Five Key Points continued Challenges and Ethical Considerations Crowdsourcing may raise ethical questions related to transparency, accountability, and the exploitation of labor. Additionally, not all crowdsourced initiatives are successful. Examples Examples of crowdsourced social movements include crowdfunding for disaster relief, citizen journalism, and collective data collection for human rights monitoring. How can individuals effectively engage with crowdsourced initiatives, and what role does technology and online platforms play in facilitating such engagement? Discussion
  • 130. The Role of Hashtags and Viral Campaigns • Hashtags and viral campaigns are popular tools used on social media platforms to raise awareness, promote causes, and mobilize support for various issues. • They have become essential components of online activism and digital marketing.
  • 131. Five Key Points Hashtags for Awareness Hashtags serve as labels that group together content related to a specific topic or theme. They are often used to raise awareness about social issues, movements, or events. Viral Campaigns Viral campaigns are marketing or activism efforts that quickly gain widespread attention and engagement. They often rely on compelling storytelling, shareable content, and social media trends. Amplification and Engagement Hashtags and viral campaigns can amplify the voices of individuals and organizations by encouraging users to share, like, and comment on related content.
  • 132. Five Key Points continued Trends and Memes Viral campaigns often create trends and memes that capture the public's attention. Memes, in particular, are easily shareable and can convey complex messages in a humorous or relatable way. Challenges While hashtags and viral campaigns can be powerful, they can also face backlash or criticism. It's important for creators to consider potential negative consequences and unintended interpretations. Can you recall any recent viral campaigns or hashtags that caught your attention or had a significant impact? What made them effective? Discussion
  • 133. Emerging Technologies: AI, VR, AR, and Beyond • Emerging technologies, such as Artificial Intelligence (AI), Virtual Reality (VR), and Augmented Reality (AR), are transforming the way we interact with the digital world and each other. • These technologies offer new opportunities and challenges for individuals and society as a whole.
  • 134. Five Key Points Artificial Intelligence (AI) AI encompasses machine learning, natural language processing, and computer vision. It enables machines to perform tasks that typically require human intelligence, such as decision-making, problem-solving, and language understanding. Example: Autonomous vehicles, such as self-driving cars. These vehicles use AI systems to perceive their surroundings, make decisions, and navigate without human intervention. Virtual Reality (VR) VR immerses users in a computer-generated, interactive environment. It is often used for gaming, education, training, and simulations. Example: VR in action is its use in the field of healthcare, particularly in medical training and therapy Augmented Reality (AR) AR overlays digital information onto the real-world environment. It is used in applications like mobile games, navigation, and education. Example: Use in mobile applications and games, like the popular mobile game "PokĂŠmon GO.“players use their smartphones' GPS and camera functions to explore the real world while encountering virtual PokĂŠmon characters in an augmented reality overlay.
  • 135. Five Key Points continued Impact on Daily Life Emerging technologies are influencing daily life, from virtual meetings and AI-powered virtual assistants to immersive gaming experiences and medical applications. Ethical and Privacy Concerns As these technologies become more integrated into daily life, concerns about data privacy, security, bias in AI, and the potential for addiction in VR/AR have gained prominence. How have you personally interacted with AI, VR, or AR technologies in your daily life, and what have your experiences been like? Discussion
  • 136. Predictions and Speculations about the Future of Technology • Predicting the future of technology is both an exciting and challenging endeavor. • Speculations about upcoming innovations and their potential societal impacts shape our understanding of what's to come.
  • 137. Five Key Points Technological Evolution Predictions often revolve around the evolution of existing technologies and the emergence of entirely new ones. Concepts like quantum computing, brain-computer interfaces, and sustainable energy sources are subjects of speculation. Societal Transformations Speculations extend to how technology will transform society. Questions about automation's impact on jobs, the potential for extended human lifespans, and the future of transportation are common topics. Ethical Considerations Discussions about the future of technology also involve ethical considerations, including the responsible use of AI, privacy in an increasingly digital world, and the distribution of benefits and risks.
  • 138. Five Key Points continued Innovation Drivers Predictions often consider factors driving innovation, such as government policies, industry trends, global challenges, and societal demands. The Role of Imagination Speculating about the future requires imagination and creativity. It involves thinking beyond current limitations and imagining possibilities that may seem far-fetched today. What are some technological advancements you anticipate in the next decade or beyond? How might these innovations impact various aspects of society? Discussion
  • 139. Ethical Considerations and Responsible Digital Citizenship • In an increasingly digital world, responsible digital citizenship involves understanding and addressing the ethical implications of our online actions and interactions.
  • 140. Five Key Points Digital Footprint Every online action contributes to a digital footprint. This includes the data we share, the content we create, and our interactions on social media platforms. Data Privacy Protecting personal data and respecting the privacy of others are key aspects of responsible digital citizenship. Individuals and organizations should be mindful of data collection and sharing practices. Cybersecurity Being aware of cybersecurity risks and practicing good online security habits is essential. This includes using strong passwords, updating software, and recognizing phishing attempts.
  • 141. Five Key Points continued Media Literacy Critical thinking and media literacy skills are crucial for navigating the digital landscape. Responsible digital citizens should be able to discern credible sources from misinformation and fake news. Online Behavior Treating others with respect and empathy online is vital for fostering positive digital communities. Cyberbullying, harassment, and hate speech have real-world consequences. How aware are you of your digital footprint and the data you generate online? What steps can individuals take to protect their privacy and personal information? Discussion
  • 142. Counts towards In-Class Activity Grade • Crowdsourcing and Social Movements • The Role of Hashtags and Viral Campaigns • Emerging Technologies: AI, VR, AR, and Beyond • Predictions and Speculations about the Future of Technology • Ethical Considerations and Responsible Digital Citizenship • What is Networked Individualism? • Five Key Points of Networked Individualism • The Impact of Digital Technologies • Crafting Online Personas • Authenticity vs. Presentation • The Role of Social Media in Identity Formation • The Data Dilemma: • Surveillance vs. Personalization • Online Privacy and its Challenges • Ethical Implications of Data Collection • Social Media Algorithms • Confirmation Bias and Echo Chambers • Diverse Perspectives in the Digital Age Based on our discussions this week, select and provide a reflection on one of the topics (150 – 200 words).
  • 143. • The Impact of Social Media Algorithms: Reflect on your own experiences with social media algorithms. How do you think these algorithms influence the content you see? Have you ever encountered a situation where an algorithm reinforced your existing beliefs or exposed you to diverse viewpoints? • Online Privacy and Personal Data: Consider your online behaviors and the data you share. What steps do you take to protect your online privacy? Have you ever felt uncomfortable with the amount of data collected about you online • Diverse Perspectives in the Digital Age: Describe an instance where you engaged with diverse perspectives online. How did this experience impact your understanding of a particular topic or issue? How can individuals actively seek out diverse viewpoints in the digital age? • The Power of Online Communities: Reflect on any online communities or forums you've been a part of. How have these communities influenced your interests, beliefs, or actions? Can you think of a situation where an online community had a positive or negative impact on your life? • Ethical Considerations in Technology Use: Consider the ethical dilemmas discussed in class, such as data ethics, online behavior, and digital responsibility. Have you ever faced an ethical dilemma related to technology use? How did you navigate it, and what did you learn from the experience? • Predictions and Speculations about Technology: Imagine the future of technology and how it might impact society. What are your predictions or speculations about emerging technologies like AI or VR? How do you envision these technologies shaping our lives in the years to come? Some Ideas...
  • 145. Topics to Cover • What is Networked Individualism? • Five Key Points of Networked Individualism • The Impact of Digital Technologies • Crafting Online Personas • Authenticity vs. Presentation • The Role of Social Media in Identity Formation • The Data Dilemma: • Surveillance vs. Personalization • Online Privacy and its Challenges • Ethical Implications of Data Collection • Social Media Algorithms • Confirmation Bias and Echo Chambers • Diverse Perspectives in the Digital Age
  • 146. Topics to Cover • The Power of Online Communities • Crowdsourcing and Social Movements • The Role of Hashtags and Viral Campaigns • Emerging Technologies: AI, VR, AR, and Beyond • Predictions and Speculations about the Future of Technology • Ethical Considerations and Responsible Digital Citizenship
  • 148. A concept that explores the balance between individualism and collectivism. Collectivism is the practice or principle of giving a group priority over each individual in it. Especially in the context of social networks and online communities Touches on social, cultural, and ethical aspects of our digital lives Network Individualism What is it?
  • 149. Network Individualism Deep Dive • It encompasses the idea of personal autonomy and self-expression within the context of digital networks, social media, and online communities. • It reflects the way individuals construct and present their identities, interact with others, and participate in digital spaces while maintaining a sense of individuality. • In essence, it's the fusion of individualism and connectivity in the digital age.
  • 150. Five Key Points Online Self-Presentation Network Individualism involves how individuals curate and present their digital selves on social media profiles, blogs, and other online platforms. It encompasses the choices people make about what to share, how to share it, and how they portray themselves. Expression and Authenticity It's about expressing one's unique perspectives, interests, and values online while navigating the tension between authenticity and self-presentation. Individuals often make conscious choices about what to reveal and what to keep private. Online Relationships Network Individualism acknowledges the diverse and personalized nature of online relationships. People can form connections with others based on shared interests, beliefs, or experiences, even if they are geographically distant.
  • 151. Five Key Points continued Digital Communities It extends to the participation in various digital communities, such as forums, social networks, and interest-based groups, where individuals can find like-minded individuals or engage in debates with diverse viewpoints. Data and Personalization It's closely tied to data collection and personalization. Online platforms use data to tailor content and advertisements to individuals, creating a unique online experience for each user. Discussion In what ways has technology influenced the way individuals express themselves in online spaces?
  • 152. The Impact of Digital Technologies • The advent of digital technologies has had profound effects on society, transforming how we communicate, interact, and express ourselves. • These changes have both positive and negative implications for Network Individualism.
  • 153. Five Key Points Communication Revolution Digital technologies have revolutionized communication. Social media, instant messaging, and video conferencing enable real-time interactions with people worldwide, breaking down geographic barriers. Information Access The internet provides unprecedented access to information and diverse perspectives. Individuals can explore a wide range of ideas and viewpoints, contributing to the development of their personal beliefs and identities. Self-Expression Digital platforms offer various ways for individuals to express themselves, from posting photos and videos to sharing personal stories and creative works. These outlets allow for unique and creative forms of self-expression
  • 154. Five Key Points continued Data and Privacy The use of digital technologies also raises concerns about data privacy and surveillance. Online activities generate vast amounts of data that can be used for targeted advertising or even surveillance by governments and corporations. Algorithmic Influence Algorithms on social media platforms curate content based on user preferences and behaviors. This can create echo chambers where individuals are exposed primarily to information that aligns with their existing beliefs. Discussion Do you think the accessibility of information online has led to a more informed and open society, or has it contributed to the spread of misinformation and polarization?
  • 155. Crafting Online Personas • This involves the intentional construction and management of one's digital identity on various online platforms. • It's about how individuals choose to represent themselves, their interests, and their values in the digital world. • Online personas are not necessarily false, but they are curated to some extent to present a specific image or narrative.
  • 156. Five Key Points Self-Presentation Crafting an online persona begins with the choices individuals make about what to share and how to share it. This includes selecting profile pictures, writing bios, and posting content that aligns with the image they want to project. Narrative Building Online personas often involve storytelling. Individuals may create a coherent narrative about their lives, experiences, and interests, emphasizing certain aspects while downplaying others. Contextual Adaptation People may adapt their online personas depending on the platform and audience. For example, the persona presented on a professional networking site like LinkedIn may differ from the one on a personal blog or Instagram.
  • 157. Five Key Points continued Identity Play Some individuals use online personas as a form of identity play, exploring different facets of their personalities or experimenting with creative alter egos. Managing Authenticity Balancing authenticity and presentation is crucial when crafting online personas. While some degree of curation is natural, straying too far from one's true self can lead to feelings of inauthenticity. Discussion How do you craft your online persona on social media or other online platforms? Are there aspects of your identity that you intentionally emphasize or downplay? Have you ever encountered situations where the online persona of someone you know differs significantly from their offline self? How did this affect your perception of them?
  • 158. Authenticity vs. Presentation • The tension between authenticity and presentation is a central theme in the realm of online identity. • It reflects the struggle individuals face when deciding how much of their true selves to reveal in their online presence versus how much they want to craft a particular image or narrative.
  • 159. Five Key Points Authenticity Authenticity refers to being genuine and true to oneself in both online and offline interactions. It involves being honest about one's feelings, beliefs, and experiences. Presentation Presentation involves the deliberate effort to shape how others perceive you. This can include carefully curating what you share online, using filters or editing tools, and even portraying a lifestyle that may not fully align with reality. The Authenticity Paradox The authenticity paradox arises when individuals are torn between being true to themselves and conforming to societal or online norms. They may fear judgment or rejection if they reveal their unfiltered selves.
  • 160. Five Key Points continued Vulnerability and Connection Authenticity can lead to more meaningful connections with others, as it fosters vulnerability and empathy. When people are authentic, they often find others who relate to their struggles and experiences. Social Pressure Social media and online communities can exert pressure on individuals to present an idealized version of themselves. This pressure can lead to mental health issues and a sense of disconnection from one's true self. Discussion Do you think society's expectations of online personas are changing over time? Are we becoming more accepting of authenticity, imperfections, and vulnerability online?
  • 161. The Role of Social Media in Identity Formation • Social media platforms have become integral to how individuals shape their identities and interact with others. • They offer unique opportunities for self-expression, but they also come with challenges related to identity construction and self-esteem
  • 162. Five Key Points Identity Exploration Social media platforms provide a space for individuals to explore and experiment with different aspects of their identity. They can join communities that align with their interests and values. Comparative Identity Social media often leads to comparative identity, where individuals compare their lives, achievements, and appearances to others. This can sometimes result in negative self-perception and low self-esteem. Self-Presentation Users of social media engage in self-presentation by selecting what to share and how to share it. This can include carefully curated posts, selfies, and status updates that reflect a particular image or lifestyle.

Editor's Notes

  1. Computer overview + terminologies of the internet (which you will/have already use(d)/hear(d) multiple times from this class, and later in your life)
  2. Physical Layout: In a ring topology, devices are connected in a closed loop or ring. Each device is connected to exactly two other devices, one on each side, forming a continuous circle. Data Transmission: Data travels in a unidirectional or bidirectional manner around the ring, passing through each device until it reaches its destination. Fault Tolerance: Ring topologies are relatively fault-tolerant. If one device or cable segment fails, data can still flow in the opposite direction around the ring to reach its destination. Complexity: Ring topologies tend to be simpler in terms of cabling and hardware compared to star topologies. However, adding or removing devices can be more challenging because it can disrupt the entire ring. . Star Topology: Physical Layout: In a star topology, all devices are connected to a central hub or switch. Each device has its own dedicated connection to the hub. Data Transmission: Data travels directly between the device and the central hub. If one device wants to communicate with another, it sends data to the hub, which then forwards it to the appropriate recipient. Fault Tolerance: Star topologies are less fault-tolerant compared to ring topologies. If the central hub or switch fails, it can disrupt the entire network. Scalability: Star topologies are more scalable and flexible than ring or bus topologies. Adding or removing devices is relatively easy, as it doesn't affect the rest of the network. 3. Bus Topology: Physical Layout: In a bus topology, all devices are connected to a single central cable, which acts as a shared communication medium. Data Transmission: Data is sent along the central cable and is accessible to all devices on the network. To prevent data collisions, a method like CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is often used. Fault Tolerance: Bus topologies are less fault-tolerant than ring topologies. If the central cable is damaged or experiences a fault, it can disrupt the entire network. Simplicity: Bus topologies are relatively simple and require less cabling compared to star topologies. However, they can become less efficient as more devices are added, leading to potential data collisions. In summary, the choice of LAN topology depends on factors such as the network's size, scalability needs, fault tolerance requirements, and ease of maintenance. Ring topologies offer fault tolerance but can be less scalable. Star topologies are scalable and easy to manage but less fault-tolerant. Bus topologies are simple but less fault-tolerant and can experience efficiency issues as more devices are added.
  3. Ring Topology: These companies are involved in high-frequency trading, where low latency and quick data transmission are crucial. The fault tolerance of ring topologies ensures continuous data flow, minimizing the risk of disruptions in trading operations. Star Topology: Large Corporations with Centralized IT: Many large corporations adopt a star topology where all devices connect to a central hub or server. This structure allows for easier management, troubleshooting, and security enforcement. Each department or branch can have its own dedicated connection to the central server. Bus Topology: Small to Medium-Sized Businesses (SMBs): Bus topologies are simpler and cost-effective, making them suitable for smaller organizations with limited resources. Small offices, retail stores, or local businesses might opt for bus topologies to connect their computers and devices. Ring and Star Hybrid Topology: University Campus Networks: Large university campuses often employ a combination of ring and star topologies. The main campus backbone may use a ring for fault tolerance, while individual buildings or departments use star topologies to connect to the central campus network. Star and Mesh Hybrid Topology: Cloud Service Providers: Companies offering cloud services often utilize a hybrid network topology. The core network may have a star topology for central management, while multiple redundant connections between data centers create a mesh-like structure for high availability. Star Topology with Redundancy: Data Centers of Tech Giants (e.g., Google, Amazon): These companies typically use a star topology within individual data centers for simplicity and manageability. However, they incorporate redundancy and mesh-like connections to ensure high availability and fault tolerance in case of hardware failures. Ring Topology in Manufacturing Plants: Manufacturing Companies with Automated Production Lines: In manufacturing environments with automated production lines, a ring topology might be implemented to connect control systems and sensors. This helps ensure uninterrupted communication for efficient and reliable production processes. Bus Topology in Small Office/Home Office (SOHO) Networks: Freelancers or Small Businesses: Individuals or small businesses with limited networking needs may opt for a bus topology due to its simplicity and cost-effectiveness. This could include freelancers, consultants, or small startups operating from home offices. These examples demonstrate how different types of network topologies are selected based on the size, requirements, and priorities of various organizations and industries.
  4. Metropolitan Area Network (MAN): Geographic Coverage: A Metropolitan Area Network (MAN) covers a larger geographical area than a Local Area Network (LAN) but is smaller than a Wide Area Network (WAN). It typically spans a city or a metropolitan area, such as a campus, a group of buildings, or multiple office locations within a city. Purpose: A MAN is designed to connect multiple LANs within the same metropolitan area. It serves as an intermediary between LANs, enabling data exchange and resource sharing between different parts of the city or organization. Connectivity: MANs often use high-capacity fiber optic cables or wireless technologies to interconnect the LANs within the metropolitan area. This allows for fast and reliable data transmission over longer distances. Examples: Common examples of MANs include city-wide Wi-Fi networks, interconnected campus networks, or a network connecting multiple branches of a large corporation within the same city. Ownership: MANs can be privately owned by organizations or service providers, or they can be operated as public networks by municipalities. Data Transfer: MANs are capable of carrying both voice and data traffic and are often used for services like video conferencing, IP telephony, and high-speed internet access. Wide Area Network (WAN): Geographic Coverage: A Wide Area Network (WAN) covers a much larger geographic area than both LANs and MANs. WANs can span countries, continents, or even the entire globe. Purpose: WANs are designed to connect devices and networks that are geographically distant from each other. They enable long-distance communication and data exchange between locations separated by significant geographical barriers. Connectivity: WANs use a variety of technologies, including leased lines, satellite links, microwave links, and the Internet, to connect different LANs, MANs, or remote sites. The Internet is the largest and most well-known example of a WAN. Examples: WANs are used by organizations to connect branch offices, data centers, and remote sites. The global internet itself is the largest WAN, connecting networks and devices worldwide. Ownership: WANs can be owned and operated by private organizations, government agencies, or telecommunications companies. The Internet, for example, is a public WAN that is accessible to anyone with an internet connection. Data Transfer: WANs are designed for long-distance data transfer and can carry various types of data, including text, voice, video, and multimedia content. They facilitate communication on a global scale and support services like email, web browsing, and online collaboration. In summary, a MAN is a network that covers a metropolitan area, typically connecting multiple LANs within that area. It serves as a bridge between LANs in the same city or region. On the other hand, a WAN covers a much larger geographic area and is used to connect networks and devices that are widely dispersed, often on a global scale, enabling long-distance communication and data exchange.
  5. packet switching is necessary because it provides the foundation for efficient, adaptable, and resilient data transmission in modern computer networks and telecommunications systems. It is a fundamental technology that underpins the functionality of the Internet and a wide range of communication services.
  6. 1G (First Generation): 1G represents the first generation of mobile cellular technology. It was introduced in the early 1980s. 1G networks were analog and provided basic voice call services. They had limited capacity, security, and reliability. 1G was primarily used for voice communication and had no support for data or internet services. 2G (Second Generation): 2G followed 1G and marked a significant advancement in mobile technology. It was introduced in the early 1990s. 2G networks were digital, providing improved call quality, encryption for security, and support for text messaging (SMS). Data services like text-based mobile internet access (GPRS) were introduced in 2G networks. 2G technologies include GSM (Global System for Mobile Communications) and CDMA (Code Division Multiple Access). 3G (Third Generation): 3G represented the third generation of mobile technology. It was introduced in the early 2000s. 3G networks provided faster data speeds, enabling services like video calling, mobile internet browsing, and multimedia messaging (MMS). Data transfer rates in 3G networks were significantly higher than in 2G. Technologies like UMTS (Universal Mobile Telecommunications System) and CDMA2000 were part of 3G networks. 4G (Fourth Generation): 4G marked a significant leap forward in mobile data speeds and capabilities. It was introduced in the late 2000s. 4G networks provided much faster data rates, allowing for high-definition video streaming, online gaming, and faster internet browsing. They offered lower latency and improved overall network performance. Technologies like LTE (Long-Term Evolution) and WiMAX were part of 4G networks. 5G (Fifth Generation): 5G is the latest generation of mobile technology, introduced in the 2010s and continuing to roll out worldwide. 5G networks promise even faster data speeds, reduced latency, and increased capacity compared to 4G. They support a wide range of applications, including augmented reality (AR), virtual reality (VR), autonomous vehicles, IoT (Internet of Things) devices, and ultra-high-definition video streaming. 5G networks use advanced technologies such as millimeter-wave (mmWave) frequencies, massive MIMO (Multiple Input, Multiple Output), and network slicing to achieve these improvements. 5G is expected to be a key enabler for the development of various new technologies and services. In summary, 1G through 5G represent different generations of mobile cellular network technology, each characterized by advancements in data speeds, capacity, and capabilities. 5G is the latest generation and offers significant improvements over its predecessors, making it a critical part of the modern telecommunications landscape.
  7. Rickrolling is an Internet meme that involves a bait-and-switch prank. It is a type of prank where a person is tricked into clicking on a hyperlink that leads to the music video of the 1987 hit song “Never Gonna Give You Up” by English singer Rick Astley. The meme originated from the 4chan website in 2006 and grew popular on April Fools’ Day in 2007. It then spread to other Internet sites later that year. The meme is usually executed by disguising the hyperlink as something else, such as a news article or a video game trailer, and then redirecting the user to the music video when they click on it. The music video has over 1.4 billion views on YouTube. The meme has also extended to using the song’s lyrics, or singing it, in unexpected contexts.
  8. Here are some examples of successful crowdfunding campaigns Brewdog: Scottish brewery Brewdog was able to grow thanks to crowdfunding. Pebble Time: Pebble Time is a world-famous smartwatch launched on Kickstarter. The Paradox Paradox Flow Hive 2 Gloomhaven and Frosthaven OUYA Oculus: Oculus is one of the best crowdfunding examples. PopSocket: PopSocket is a simple product that is now one of the most popular products on Amazon.
  9. Misinformation (Spread of False Information): Widely shared false news story that had real-world consequences, such as the "Pizzagate" conspiracy theory. Lazy Habits (Procrastination): Studies show how excessive use of social media and entertainment websites can lead to procrastination and decreased productivity. Negative Social Skills (Online Communication vs. Face-to-Face): Research highlights the potential negative effects of spending too much time communicating online at the expense of in-person interactions. Online Gambling (Gambling Addiction): Statistics on the rise of online gambling platforms and the associated risks of addiction. Vulnerability of Personal Information (Data Breaches): Recent data breach that exposed personal information of millions of users, such as the Equifax breach. "Pizzagate" refers to a debunked conspiracy theory that emerged during the 2016 United States presidential election. It claimed that high-ranking members of the Democratic Party, including Hillary Clinton, were involved in a child sex trafficking ring that operated out of a Washington, D.C. pizzeria called Comet Ping Pong. The conspiracy theory was based on a series of misinterpreted emails from John Podesta, Hillary Clinton's campaign chairman, which were leaked by WikiLeaks. Some individuals believed that certain phrases in these emails contained coded references to illicit activities. Additionally, social media posts, images, and symbols from the pizzeria were misconstrued as evidence of the conspiracy. Despite being thoroughly debunked by multiple investigations, including law enforcement and media outlets, the theory gained traction among some online communities and even led to a real-life incident in December 2016 when a man fired shots inside Comet Ping Pong. No evidence was ever found to support the claims of child trafficking, and the incident highlighted the dangers of misinformation and fake news spreading through social media and online platforms. The Equifax data leak, also known as the Equifax data breach, was a significant cybersecurity incident that occurred in 2017. Equifax, one of the major credit reporting agencies in the United States, experienced a breach that resulted in the exposure of sensitive personal information of approximately 147 million people. The breach was discovered in July 2017, and it was revealed that hackers had exploited a vulnerability in Equifax's website software to gain unauthorized access to a vast amount of personal data, including names, social security numbers, birth dates, addresses, and in some cases, even credit card information. The breach raised serious concerns about the security of individuals' personal information and their vulnerability to identity theft and financial fraud. Equifax faced widespread criticism for its handling of the breach, including delays in disclosing the incident and providing adequate information to affected individuals. The company eventually set up a website for people to check if their information had been compromised and offered free credit monitoring services to those affected. The breach prompted discussions about the need for stronger cybersecurity measures, regulations to protect consumer data, and the importance of promptly notifying individuals and authorities in the event of a data breach. It also highlighted the potential consequences of inadequate security practices in an increasingly digital and interconnected world. Regenerate
  10. Censorship (Internet Censorship): Discuss countries where the government heavily censors internet content and the implications for freedom of speech, using examples like the Great Firewall of China. Toxic Online Behavior (Cyberbullying): Share a story of a cyberbullying incident that had severe consequences for the victim and discuss strategies to prevent and address such behavior. Dark Web (Illegal Activities): Provide a brief overview of the dark web and its association with illegal markets, using examples like Silk Road. Fraud (Online Scams): Share a case study of a notable online scam that affected a large number of people, such as the Bernie Madoff Ponzi scheme. Sex Trafficking (Online Facilitation): Present a case where online platforms were used to facilitate sex trafficking, while emphasizing the importance of collaboration between law enforcement and technology companies to combat this issue. The dark web refers to a part of the internet that is not indexed by traditional search engines and is intentionally hidden from mainstream access. It requires special software and configurations, such as Tor (The Onion Router), to access. The dark web is known for its anonymity and privacy-focused environment, which can be both a boon and a challenge. Here are the key points: Anonymity and Privacy: The dark web provides a level of anonymity and privacy that is not typically available on the surface web. This is achieved through encryption and routing methods that conceal users' identities and locations. Tor Network: The Tor network is a major gateway to the dark web. It routes internet traffic through a series of volunteer-operated servers, making it difficult to trace the origin of the traffic. This helps users maintain their privacy. Marketplaces and Illegal Activities: While the dark web has legitimate uses, such as providing a platform for users in repressive regimes to communicate securely, it's also infamous for hosting illicit activities. This can include illegal marketplaces selling drugs, weapons, stolen data, counterfeit money, and other contraband. Cybersecurity and Hacking: The dark web is a hub for cybercriminals who exchange tools, techniques, and stolen data. Hacking services, malware, and other cyber threats can often be found in these corners. Legitimate Uses: Not all dark web activity is illegal. Some individuals use it for privacy reasons, such as journalists communicating with sources, researchers studying online criminal behavior, and individuals in countries with strict internet censorship. Legal and Ethical Considerations: The legality and ethics of accessing the dark web can be complex. While using it for legitimate purposes is legal, engaging in illegal activities is not. Laws regarding the dark web can vary by jurisdiction. In summary, the dark web is a hidden part of the internet that provides anonymity and privacy to users, but it's also associated with various illegal activities. Its complex nature requires users to exercise caution and ethical judgment when navigating its depths. Bernard "Bernie" Madoff was a respected financier and former chairman of NASDAQ. In the early 1960s, he founded an investment advisory firm, Bernard L. Madoff Investment Securities LLC. For decades, Madoff operated a massive Ponzi scheme, wherein he used new investments to pay returns to earlier investors, creating the illusion of consistent and high returns. Key points in the story: Early Success: Madoff's firm initially showed impressive and steady returns, attracting a wide range of investors, including celebrities, charities, hedge funds, and wealthy individuals. The scheme appeared to thrive on Madoff's reputation and referrals. Fabricated Returns: Madoff's reported returns were consistently high, even during market downturns. This steady performance increased the appeal of his investments. Secrecy and Deception: Madoff was secretive about his investment strategy, claiming it was a proprietary trading system. He used his connections and reputation to gain trust, discouraging inquiries. Unraveling: In December 2008, amidst the global financial crisis, Madoff confessed to his sons that his investment operation was a fraud. They reported him to authorities, leading to his arrest on December 11, 2008. Impact: The Madoff scheme was estimated to have defrauded investors of approximately $65 billion in principal. Many investors lost their life savings, and numerous charities were severely impacted. Guilty Plea and Sentencing: Madoff pleaded guilty to 11 federal felonies, including securities fraud, money laundering, and perjury, in March 2009. In June 2009, he was sentenced to 150 years in prison, one of the harshest penalties for financial crimes in history. Legal Proceedings: Madoff's family members, who were also involved in the firm, faced legal scrutiny. Some of them cooperated with authorities, while others faced criminal charges. The aftermath led to lawsuits and efforts to recover funds for victims. Lessons Learned: The Madoff scandal highlighted regulatory failures, as the scheme had gone on for years despite suspicions. It also underscored the importance of due diligence and skepticism in investment decisions. Bernie Madoff's Ponzi scheme not only caused massive financial losses but also revealed vulnerabilities in the financial system. The case became a cautionary tale about the dangers of unchecked financial fraud and the need for stricter regulations and oversight.
  11. Berners-Lee's vision of linking information stored on computers worldwide. He imagined a vast network of documents linked together, accessible to anyone with an internet connection. Revolutionary concept of making information available globally and easily navigable through hyperlinks.
  12. variations in how web pages were displayed on different systems. In the early days of the web, websites were often designed without considering the diverse range of browsers and operating systems that users might have. This lack of standardization led to inconsistencies in how web pages appeared on different platforms. For example, a website created with Mosaic might have displayed text and images perfectly on a NeXT computer, but when accessed from a Windows PC, the same website could appear distorted, with misaligned text and images, or even missing elements. The reason for these discrepancies was the variation in how different browsers interpreted HTML code, handled fonts, and rendered images. This inconsistency created frustration for both web developers and users. Web developers had to invest extra time and effort in coding and testing to ensure that their websites appeared correctly on different platforms and browsers. Users often had to choose their browsers carefully to access websites that were compatible with their systems. These compatibility issues underscored the need for web standards and the development of cross-platform web browsers that could render web pages consistently across different systems. Over time, efforts were made to establish these standards, leading to improved compatibility and a more consistent web browsing experience for users.
  13. .
  14. Micropayments generally refer to very small financial transactions, often involving fractions of a cent or a few cents, made for individual pieces of content, such as articles, videos, or songs. These micropayments are designed to be a low-cost way for users to access specific content without the need for traditional subscriptions.
  15. Justin Hall's contributions played a significant role in shaping the blogging landscape as we know it today.
  16. In summary, while both computer programmers and software developers play crucial roles in creating software, programmers are typically more focused on coding and implementing specific software components, while software developers have a more comprehensive role that involves design, planning, testing, and often, project management
  17. Interaction with Others: Many Wikipedia contributors are motivated by the opportunity to collaborate with people from around the world who share their passion for a particular subject. This social aspect of Wikipedia allows contributors to connect, share ideas, and work together to improve articles. 2. Personal Gratification: Contributing to Wikipedia can be personally fulfilling. It provides a sense of accomplishment and purpose, as contributors see their efforts result in the creation or improvement of valuable knowledge resources. This personal gratification often stems from the intrinsic reward of making a positive contribution to society. 3. Recognition and Prestige: Wikipedia offers a system of recognition through features like user profiles, edit histories, and user badges. Contributors can earn recognition for their expertise and dedication, which can be a powerful motivator. Achieving recognition as a top contributor or expert in a specific field can be personally satisfying. "Wiki-Crack": The term "wiki-crack" refers to the addictive nature of Wikipedia editing. It describes the phenomenon where contributors find themselves continually drawn to making edits and improvements on the platform. The constant availability of opportunities for editing, the sense of accomplishment, and the positive feedback from the community can create a cycle of motivation, encouraging contributors to make more contributions. 5. Altruism and the Desire to Share Knowledge: Many Wikipedia contributors are motivated by a sense of altruism. They believe in the principle of freely sharing knowledge and making it accessible to anyone with an internet connection. This altruistic motivation aligns with Wikipedia's mission to provide free knowledge to the world. 6. Intellectual Curiosity: Some contributors are driven by their natural curiosity and the desire to learn. Wikipedia offers a platform where individuals can explore a wide range of topics and deepen their understanding. Editing becomes a way to satisfy intellectual curiosity and expand one's knowledge. 7. Advocacy and Activism: Wikipedia allows individuals and organizations to advocate for causes, promote underrepresented topics, or correct inaccuracies related to specific subjects. This motivation aligns with the goal of raising awareness and promoting social or political change. 8. Sense of Ownership: Contributors often develop a sense of ownership and responsibility for the articles they work on. They feel invested in the quality and accuracy of the content and are motivated to maintain and improve it over time. Shared Knowledge and Distributed Power: Contributing to Wikipedia is not just about individual motivations; it's also about the collective goal of building and maintaining a shared knowledge resource. Wikipedia embodies the concept of shared knowledge, where information is collaboratively created and made freely available to the public. Distributed power is a key feature of Wikipedia's governance model. While there are guidelines and policies, decisions are made collectively through consensus-building among contributors. No single authority dictates content, and the community has the power to shape Wikipedia's content and rules. This distributed power ensures that no single individual or group controls the platform, aligning with Wikipedia's commitment to openness and neutrality. In summary, Wikipedia's success as a collaborative platform is driven by the diverse motivations of its contributors, the addictive nature of editing ("wiki-crack"), the principles of shared knowledge, and the distribution of power within the community. It represents a unique and powerful model for harnessing collective expertise and providing free access to a vast repository of knowledge.
  18. like AltaVista (1995), Lycos (1994), and Excite (1995)
  19. These detailed explanations provide a comprehensive understanding of the challenges faced in the early days of the web, the role of web directories and crawlers, and the transition from manual exploration to more structured and intent-based web searching.
  20. A VPN, or Virtual Private Network, is a technology that enables secure and private communication over the internet or any public network. It creates a secure and encrypted connection, often referred to as a "tunnel," between your device and a remote server. This tunnel allows you to send and receive data as if your device were directly connected to the private network, even if you're using a public Wi-Fi network or a network in a different geographical location. Here are the key aspects of a VPN: Encryption: VPNs use encryption protocols to secure the data transmitted between your device and the VPN server. This encryption ensures that even if someone intercepts the data, it's unreadable without the encryption key. Anonymity and Privacy: VPNs mask your IP address by routing your internet traffic through the VPN server. This makes it difficult for websites, advertisers, and even your internet service provider (ISP) to track your online activities and trace them back to you. Access to Restricted Content: VPNs can be used to bypass geo-restrictions and access websites and online services that are otherwise unavailable in your current location. By connecting to a VPN server in a different country, you can make it appear as if you're browsing from that location. Enhanced Security on Public Wi-Fi: When connected to public Wi-Fi networks, such as those in cafes, airports, or hotels, your data can be vulnerable to hackers. A VPN encrypts your connection, making it significantly more secure and protecting your sensitive information from potential threats. Business and Remote Work: VPNs are commonly used by businesses to provide remote workers with secure access to company resources and data. This allows employees to work from remote locations while maintaining a secure connection to the corporate network. Torrenting and P2P File Sharing: Some VPN services allow users to engage in peer-to-peer (P2P) file sharing and torrenting while maintaining anonymity and privacy. However, not all VPNs support or condone such activities, so it's essential to choose a VPN provider with policies aligned with your needs. Privacy and Data Protection: VPNs are often used to protect user privacy and data from government surveillance or censorship in countries with strict internet regulations. Multiple Devices: Many VPN services allow you to use a single subscription on multiple devices, including computers, smartphones, tablets, and routers, providing protection for all your internet-connected devices. It's important to note that while VPNs provide a significant level of privacy and security, the effectiveness of a VPN depends on the provider you choose and the protocols and encryption methods they employ. Additionally, not all VPNs are created equal, so it's essential to research and select a reputable VPN service that aligns with your specific needs and priorities, whether it's privacy, speed, or access to specific locations. Regenerate