Podcast
Questions and Answers
What is a primary advantage of using search engines like Google and Bing?
What is a primary advantage of using search engines like Google and Bing?
Which of the following is a disadvantage of the internet related to computer security?
Which of the following is a disadvantage of the internet related to computer security?
What does spyware do in relation to a user's information?
What does spyware do in relation to a user's information?
Which internet threat involves malicious software intended to sabotage computer performance?
Which internet threat involves malicious software intended to sabotage computer performance?
Signup and view all the answers
How can e-banking be considered both an advantage and a potential threat of the internet?
How can e-banking be considered both an advantage and a potential threat of the internet?
Signup and view all the answers
What is one of the main uses of the internet in daily life?
What is one of the main uses of the internet in daily life?
Signup and view all the answers
Which of the following best describes e-commerce?
Which of the following best describes e-commerce?
Signup and view all the answers
What is a primary benefit of using Google Drive?
What is a primary benefit of using Google Drive?
Signup and view all the answers
How can individuals express their views online?
How can individuals express their views online?
Signup and view all the answers
What is a key difference between a website and a blog?
What is a key difference between a website and a blog?
Signup and view all the answers
What is the first step to creating an email account?
What is the first step to creating an email account?
Signup and view all the answers
What is one requirement for a strong password?
What is one requirement for a strong password?
Signup and view all the answers
Which of the following steps is NOT involved in logging into an email account?
Which of the following steps is NOT involved in logging into an email account?
Signup and view all the answers
What happened to Hotmail accounts?
What happened to Hotmail accounts?
Signup and view all the answers
What is the first step while composing and sending an email?
What is the first step while composing and sending an email?
Signup and view all the answers
What is the primary function of viruses in the context of malware?
What is the primary function of viruses in the context of malware?
Signup and view all the answers
Which type of malware is specifically designed to disguise itself as a harmless program?
Which type of malware is specifically designed to disguise itself as a harmless program?
Signup and view all the answers
What defines a worm compared to other types of malware?
What defines a worm compared to other types of malware?
Signup and view all the answers
Which of the following best describes the function of keyloggers?
Which of the following best describes the function of keyloggers?
Signup and view all the answers
What is the purpose of cookies in online contexts?
What is the purpose of cookies in online contexts?
Signup and view all the answers
What is a primary reason for using email over conventional mail?
What is a primary reason for using email over conventional mail?
Signup and view all the answers
Which of the following is considered inappropriate behavior when using email?
Which of the following is considered inappropriate behavior when using email?
Signup and view all the answers
What components make up an email address?
What components make up an email address?
Signup and view all the answers
What is one way to minimize the risks of cyber threats associated with email usage?
What is one way to minimize the risks of cyber threats associated with email usage?
Signup and view all the answers
What happens to emails that are moved to the Trash folder in Gmail?
What happens to emails that are moved to the Trash folder in Gmail?
Signup and view all the answers
What should be done when wanting to share someone else's email content?
What should be done when wanting to share someone else's email content?
Signup and view all the answers
Which of the following statements about Google Drive is correct?
Which of the following statements about Google Drive is correct?
Signup and view all the answers
Which of the following actions is an example of spamming?
Which of the following actions is an example of spamming?
Signup and view all the answers
What is an example of a domain name in an email address?
What is an example of a domain name in an email address?
Signup and view all the answers
Which of the following actions will successfully log a user out of their Gmail account?
Which of the following actions will successfully log a user out of their Gmail account?
Signup and view all the answers
In creating an email account, which information is least likely required?
In creating an email account, which information is least likely required?
Signup and view all the answers
What type of messages does the Spam folder typically contain?
What type of messages does the Spam folder typically contain?
Signup and view all the answers
What is the primary purpose of the Outbox in email services?
What is the primary purpose of the Outbox in email services?
Signup and view all the answers
What is the purpose of the Bcc field in an email?
What is the purpose of the Bcc field in an email?
Signup and view all the answers
What happens if you try to attach a file larger than 25 MB?
What happens if you try to attach a file larger than 25 MB?
Signup and view all the answers
What information is typically found in the header of received emails in the Inbox?
What information is typically found in the header of received emails in the Inbox?
Signup and view all the answers
Which of the following is the correct sequence to attach a file to an email?
Which of the following is the correct sequence to attach a file to an email?
Signup and view all the answers
What is the primary function of the Subject line in an email?
What is the primary function of the Subject line in an email?
Signup and view all the answers
Study Notes
Advantages and Disadvantages of the Internet
- Information can be found easily with search engines
- People with similar interests can communicate using social media and email
- Online services such as banking and shopping can be done remotely
- Information can be shared with many people at the same time
- Sensitive information can be compromised by cyberattacks
- Not all information found online is accurate
- Computers connected to the internet are vulnerable to malware
- Cybercrimes such as forgery and phishing are increasing
Learning Outcomes for using the internet
- Communicate over email
- Explain online services like e-commerce
- Share views and opinions using blogs
- Store and share data using Google Drive
- Create blogs and podcasts
- Differentiate between a website and a blog
The Internet
- Is a global network of computers connected through telephone lines or cables
- Allows for information sharing, data storage, and communication
- Electronic mail sent through the internet
- It functions like traditional mail but is more convenient and efficient
- Emails can be sent to multiple recipients at once
- Attachments such as photos, videos, and data can be added to emails
Netiquette
- A set of rules for behaving politely online
- Includes appropriate behavior for emails, forums, blogs, and social media
Malware
- Malicious software that can harm computer systems
- Includes viruses, trojans, worms, and ransomware
- Viruses spread from computer to computer and can corrupt or delete data
- Worms replicate automatically and spread quickly through networks
- Trojans disguise themselves as harmless programs and can steal sensitive information
Email Address
- Users need to create a personal account
- A unique email address is generated for each account
- Consists of a username and a domain name separated by the @ symbol
- Example: [email protected]
Creating an Email Account
- Users need to fill a registration form with a username and password
- An email account is created if all details are filled correctly
Logging into an Email Account
- Users need to enter their username and password to access their account
Composing and Sending an Email
- Clicking "Compose" opens a window for writing an email
- The email includes fields for the recipient's email address, subject, and message body
- Users can attach files to emails
Gmail Features
- Inbox: Displays received emails
- Outbox: Stores outgoing emails that are in the process of sending
- Trash: Holds deleted emails
- Spam: Stores unwanted messages
Google Drive
- A free service that allows users to store and share files online
- Provides 15 GB of free storage
- Users can access files from anywhere at any time
- Supports various file types and enables collaboration on documents
Protecting Yourself Online
- Never disclose sensitive information like passwords or credit card numbers online
- Be cautious of phishing scams and suspicious links
- Use strong passwords and update security software regularly
Fact Files
- The first email was sent by Raymond Samuel Tomlinson
- Hotmail was a popular email site that was merged with Outlook.com
Gmail Features
- Outbox: stores unsent messages
- Trash: permanently deletes emails after 30 days
- Spam: holds unwanted emails
- Logout/Sign Out: allows users to exit their email account
Additional Tips for Using the Internet Safely
- Be respectful in online discussions
- Do not read or forward other people's emails without permission
- Cite sources when using information from the internet
- Avoid sending spam
- Use appropriate language
Other Threats
- Spamming: sending unwanted messages
- Keyloggers: record every keystroke
- Cookies: used by websites to track user behavior
Fact Files
- The first antivirus software was created by Ray Tomlinson in 1972
- Gmail was created by Paul Buchheit
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Explore the multifaceted nature of the internet in this quiz. Learn about the ease of access to information and communication, as well as the potential risks such as cyberattacks and misinformation. Test your knowledge about online services and communication tools.