Podcast
Questions and Answers
Which of the following scenarios would most likely require a broadband connection over a baseband connection?
Which of the following scenarios would most likely require a broadband connection over a baseband connection?
- Conducting a simple online text search
- Reading a text-based document.
- Streaming high-definition video content. (correct)
- Accessing emails with text-based content.
What is the core difference between Kbps, Mbps and Gbps, in the context of data transmission?
What is the core difference between Kbps, Mbps and Gbps, in the context of data transmission?
- They indicate different measures of data transmission speed. (correct)
- They are different transfer protocols with varying levels of security.
- They represent different standards established by various Internet providers.
- They are updated versions of modems that operate at varying frequencies.
What is the most significant limitation of DSL technology compared to other broadband technologies?
What is the most significant limitation of DSL technology compared to other broadband technologies?
- DSL cannot support voice and data transmissions simultaneously.
- DSL speed and availability are affected by the user's distance from the phone company's switching office. (correct)
- DSL is susceptible to interference from household appliances.
- DSL requires specialized equipment that can increase costs.
Considering the historical progression of internet access technologies, what was the principal advantage of dial-up connections (narrowband) at the time of its popularity?
Considering the historical progression of internet access technologies, what was the principal advantage of dial-up connections (narrowband) at the time of its popularity?
Why is the distinction between dynamic and static IP addresses significant for businesses hosting their own servers?
Why is the distinction between dynamic and static IP addresses significant for businesses hosting their own servers?
Which of the following factors primarily determines who controls content published on the Internet?
Which of the following factors primarily determines who controls content published on the Internet?
Why was the development of TCP/IP protocol essential for the growth of the Internet?
Why was the development of TCP/IP protocol essential for the growth of the Internet?
What distinguishes the World Wide Web from the Internet?
What distinguishes the World Wide Web from the Internet?
How do web browsers primarily interpret and display content from web servers?
How do web browsers primarily interpret and display content from web servers?
How does the structure of a URL enable users to access a specific resource on the web?
How does the structure of a URL enable users to access a specific resource on the web?
What role does HTML play in the functionality of hyperlinks on the web?
What role does HTML play in the functionality of hyperlinks on the web?
How do individual search engines compile their searchable databases?
How do individual search engines compile their searchable databases?
How do subject directories differ from individual search engines in organizing and presenting information?
How do subject directories differ from individual search engines in organizing and presenting information?
In what way do metasearch engines enhance the search process compared to using a single search engine?
In what way do metasearch engines enhance the search process compared to using a single search engine?
How does comparing a general search engine and a specialized search engine refine the search process?
How does comparing a general search engine and a specialized search engine refine the search process?
Why is Wikipedia not considered an entirely reliable or authoritative source by some academics and librarians?
Why is Wikipedia not considered an entirely reliable or authoritative source by some academics and librarians?
How does the use of tags enhance information retrieval on the Internet?
How does the use of tags enhance information retrieval on the Internet?
How does SMTP facilitate email communication on the Internet?
How does SMTP facilitate email communication on the Internet?
What is the primary function of POP3 in the process of receiving emails?
What is the primary function of POP3 in the process of receiving emails?
Why is it important to use the address-book feature in email programs?
Why is it important to use the address-book feature in email programs?
Considering email netiquette, which behavior is often considered inappropriate?
Considering email netiquette, which behavior is often considered inappropriate?
What is a primary difference between instant messaging (IM) and traditional email?
What is a primary difference between instant messaging (IM) and traditional email?
How do mailing lists facilitate group communication?
How do mailing lists facilitate group communication?
What is the key characteristic of newsgroups compared to other forms of online discussion forums?
What is the key characteristic of newsgroups compared to other forms of online discussion forums?
What role does FTP play in the distribution of software and other large files over the Internet?
What role does FTP play in the distribution of software and other large files over the Internet?
What is the major benefit of using VoIP for phone calls?
What is the major benefit of using VoIP for phone calls?
How does a 'plug-in' enhance the capabilities of a web browser?
How does a 'plug-in' enhance the capabilities of a web browser?
What is the key difference between downloaded and streaming multimedia content?
What is the key difference between downloaded and streaming multimedia content?
How does push technology change end-users interaction with online content?
How does push technology change end-users interaction with online content?
What is the core purpose of RSS (Really Simple Syndication) newsreaders?
What is the core purpose of RSS (Really Simple Syndication) newsreaders?
What is the main focus of blogs and weblogs?
What is the main focus of blogs and weblogs?
Which of the following is an accurate description of showrooming?
Which of the following is an accurate description of showrooming?
What mainly defines the concept of Web 2.0?
What mainly defines the concept of Web 2.0?
In the context of Web 3.0, what is semantic markup?
In the context of Web 3.0, what is semantic markup?
Which of the following provides employees right to view workplace Emails?
Which of the following provides employees right to view workplace Emails?
Why are unrequested emails considered wasteful?
Why are unrequested emails considered wasteful?
What is the purpose of Phishing?
What is the purpose of Phishing?
Why does Pharming get malware on systems?
Why does Pharming get malware on systems?
Cookies can be considered:
Cookies can be considered:
Spyware can result in:
Spyware can result in:
What is the main reason to avoid easily-guessed characters?
What is the main reason to avoid easily-guessed characters?
Flashcards
Bandwidth
Bandwidth
An expression of how much data can be sent through a communications channel in a given amount of time.
Baseband
Baseband
A slow type of internet connection that allows only one signal to be transmitted at a time.
Broadband
Broadband
High-speed Internet connections.
Data Transmission Speeds
Data Transmission Speeds
Signup and view all the flashcards
Upload
Upload
Signup and view all the flashcards
Download
Download
Signup and view all the flashcards
Narrowband (Dial-Up Modem)
Narrowband (Dial-Up Modem)
Signup and view all the flashcards
Dial-up connection
Dial-up connection
Signup and view all the flashcards
DSL line
DSL line
Signup and view all the flashcards
Cable modem
Cable modem
Signup and view all the flashcards
Satellite Wireless Connections
Satellite Wireless Connections
Signup and view all the flashcards
Wi-Fi
Wi-Fi
Signup and view all the flashcards
Internet Service Provider (ISP)
Internet Service Provider (ISP)
Signup and view all the flashcards
The Internet
The Internet
Signup and view all the flashcards
Client
Client
Signup and view all the flashcards
Server
Server
Signup and view all the flashcards
Point of Presence (POP)
Point of Presence (POP)
Signup and view all the flashcards
Internet Exchange Point (IXP)
Internet Exchange Point (IXP)
Signup and view all the flashcards
Internet Backbone
Internet Backbone
Signup and view all the flashcards
Internet 2
Internet 2
Signup and view all the flashcards
Protocols
Protocols
Signup and view all the flashcards
TCP/IP
TCP/IP
Signup and view all the flashcards
Packets
Packets
Signup and view all the flashcards
Uniform Resource Locator (URL)
Uniform Resource Locator (URL)
Signup and view all the flashcards
HTTP
HTTP
Signup and view all the flashcards
Hypertext Markup Language (HTML)
Hypertext Markup Language (HTML)
Signup and view all the flashcards
Hypertext links
Hypertext links
Signup and view all the flashcards
Web Portals
Web Portals
Signup and view all the flashcards
Search engines
Search engines
Signup and view all the flashcards
Wikipedia
Wikipedia
Signup and view all the flashcards
Push technology
Push technology
Signup and view all the flashcards
Blogs
Blogs
Signup and view all the flashcards
E-Commerce
E-Commerce
Signup and view all the flashcards
Social Networking Sites
Social Networking Sites
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Cookies
Cookies
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Adware
Adware
Signup and view all the flashcards
Browser hijackers
Browser hijackers
Signup and view all the flashcards
Key Loggers
Key Loggers
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Study Notes
- The Internet began in 1969 as ARPANET.
- In the early 1990s, multimedia became available, and the World Wide Web was born.
Connecting to the Internet
- To connect to the Internet, you need an access device (computer with a modem), a means of connection (phone line, cable hookup, or wireless), and an Internet access provider.
- Bandwidth expresses how much data can be transmitted through a communications channel in a given amount of time.
- Baseband is a slow connection that allows only one signal to be transmitted.
- Broadband offers high-speed connections.
- Physical Internet connections can be wired or wireless.
- Wired options include telephone [dial-up] modem, high-speed phone line-DSL, T1/T3, and cable modem.
- Wireless options include satellite and other through-the-air links.
- Data transmission speed was originally measured in bits per second (bps).
- 8 bits are needed to send one character.
- Kbps connections send 1 thousand bits per second.
- Mbps connections send 1 million bits per second.
- Gbps connections send 1 billion bits per second.
- Upload transmits data from local to a remote computer.
- Download transmits data from a remote to a local computer.
Narrowband
- Narrowband (Dial-Up Modem) offers low speed but is inexpensive
- Telephone line equals narrowband, low bandwidth, or low speed.
- Dial-up connection uses a telephone modem to connect to the Internet in rural areas on POTS (plain old telephone system).
Telephone Modems
- Can be either internal or external.
- The maximum speed is 56 Kbps.
- Most ISPs offer local access numbers.
High-Speed Phone Lines
- Costs more but is available in cities and most towns.
DSL line
- Uses regular phone lines, DSL modem.
- Receives data at 7–105Mbps and sends at about 384 Kbps - 1 Mbps.
- Is always on.
- Needs to live no farther than 4.5 miles from phone company switching office.
- Not always available in rural areas.
T1 line
- Traditional trunk line, fiber optic or copper; carries 24 normal telephone circuits.
- The transmission rate is 1.5 – 6 Mbps (T3 = 6 – 47 Mbps).
- The “last mile" can often still be a problem.
- Generally used by large organizations.
Cable modem
- A TV cable system with an Internet connection; the company usually supplies the cable modem.
- Is always on.
- Receives data at up to 100 Mbps and sends at about 2-8 Mbps.
Wireless type Wi-Fi
- Stands for “wireless fidelity.”
- Name for a set of wireless standards (802.11) set by IEEE
- Transmits data wirelessly up to 54 Mbps for 300 – 500 feet from access point (hotspot)
- Typically used with laptops and tablets that have Wi-Fi hardware
"G" Generations
- 3G= third generation and uses existing cellphone system and handles voice, email, multimedia
- 4G= "fourth generation", is faster than 3G, and built specifically for Internet traffic but not standard yet
- Both 3G and 4G used mostly in smartphones
Internet Service Providers (ISPs)
- ISP: Local, regional, or national organization that provides access to the Internet for a fee
- Wireless Internet Service Provider (WISP) enables wireless-equipped laptop/tablet and smartphone users to access the Internet
How the Internet Works
- The Internet is a huge network connecting hundreds of thousands of smaller networks.
- Client/server networks are central to the arrangement.
- Client: computer requesting data or services.
- Server or host computer: central computer supplying data or services requested of it.
Point of Presence (POP)
- A collection of modems and other equipment in a local area.
- A local gateway (access) to an ISP's network
- ISP connects to an IXP
Internet Exchange Point (IXP)
- A routing computer where several connections come together.
- IXPs are run by private companies.
- Allow different ISPs to exchange Internet traffic.
Internet Backbone
- High-speed, high-capacity data transmission lines, usually fiber optic
- Uses the newest technology.
- Providers include AT&T, Sprint, Verizon, CenturyLink, and Deutsche Telekom
Internet 2
- Cooperative university/business education and research project.
- Adds new "toll lanes” to the older Internet to speed things up.
- Advances videoconferencing, research, and collaboration
Internet Communications
- Connecting to your ISP's point of presence (POP) involves Handshaking & Authentication
- Handshaking: fastest transmission speed established.
- Authentication: correct password & user name.
Protocols
- The set of rules a computer follows to electronically transmit data
- TCP/IP (Transmission Control Protocol/Internet Protocol) is the Internet protocol
- Developed in 1978 by ARPA and used for all Internet transactions
Packets
- Fixed-length blocks of data for transmission, determined by TCP/IP
- Data transmissions are broken up into packets and re-assembled at destination with the IP (Internet Protocol) address
- Every device connected to the Internet has an address.
- Each IP address uniquely identifies that device.
- The address is four sets of numbers separated by periods (e.g., 1.160.10.240).
- Each number is between 0 and 255
- Dynamic IP addresses change with every use.
- Static IP addresses don't change and are used by established organizations
- The board of trustees of the Internet Society (ISOC) oversees the standards
- Internet Corporation for Assigned Names and Numbers (ICANN) regulates domain names that underlie IP addresses, but does not control content
Browsers, Websites, & Web Pages
- The web and the Internet are not the same.
- The web is multimedia-based.
- The Internet is the infrastructure that supports the web.
- A browser is software that gets you to websites and their individual web pages.
- The content appears the same regardless of the computer, operating system, and display monitor.
- A website is the location on a particular computer (server) that has a unique address
- It could be anywhere, not necessarily at company headquarters
- A web page is a document on the web that can include text, pictures, sound, and video.
- The first page on a website is the Home page
- It contains links to other pages on the website and other websites
- Uniform Resource Locator (URL): address for a web page.
- A character string that points to a specific piece of information anywhere on the web
- A web sites unique address
- Consists of the web protocol, http://, the domain name of the web server, the directory name or folder, and the file including extension within that directory
HTML & Hyperlinks
- TCP/IP- As explained (p. 60), general Internet Protocol
- HTTP-Protocol Used to Access World Wide Web
- Hypertext Markup Language (HTML) is the "markup" language used in writing and publishing web pages
- HTML consists of a set of instructions used to specify document structure, formatting, and links to other documents on the web.
- Hypertext links connect one web document to another
- Web browsers interpret HTML and allow you to move around the Internet and the web
- Comes preinstalled on most PCs, but you can download others
Basic Elements of Web Browsers
- URL (address) bar
- Menu bar
- Toolbar
- Workspace
- Status bar
- The page you see when you open your web browser is the Home Page
- You can change the Home Page on your browser
- Use the browser's icons to move from one page to another, and can appear on different bars in different browsers
Navigation
- History List
- A list of websites you visited since you opened up your browser for this session
- Allows you to easily return to a particular site
- Bookmark
- Allows you to store the URL from a site on your computer so you can find it again in another browser session
- To save the URL for a site, click on “Favorites” in Internet Explorer, “Bookmarks" in Mozilla Firefox, or the star icon in the URL address bar in Chrome
Interactivity on a Web Page
- Can click on hyperlinks to transfer to another page
- Click on a radio button to choose an option
- Type text in a text box and then hit Enter
- Click on scroll arrows to move up and down, or side to side, on a page
- Click on different frames for separate controllable sections
Web portals
- Starting points for finding information.
- A gateway website that offers resources and services, online shopping malls, email support, community forums, stock quotes, travel info, and to other categories.
- Examples: Yahoo!, Google, Bing, Lycos, and AOL
- Many require that you log in.
- You can then check the Home page for general information, use the subject guide to find a topic you want, or use a keyword to search for a topic
Search Services & Search Engines
- They help you find information on the internet
- Examples: portals like Yahoo! and Bing, plus Google, Ask.com, Gigablast
- Search services maintain search engines-programs that users can use to ask questions or use keywords to find information
- The databases of search engines are compiled using software programs called spiders (crawler, bots, agents) which crawl through the World Wide Web, follow links, and index the words on that site.
- A search never covers the entire web
- Search engines differ in what they cover
Web Search Tool Types
- Individual Search Engines
- Compile their own searchable databases on the web
- You search by typing keywords and receiving “hits”
- Examples are Ask, Bing, Google, and Yahoo!
- Subject Directories
- Created and maintained by human editors, not electronic spiders
- Allow you to search for information by selecting lists of categories or topics
- Example sites are Beaucoup!, LookSmart, Open Directory Project, and Yahoo! Directory
- Metasearch Engines
- Allows you to search several search engines simultaneously
- Examples are Yippy!, Dogpile, Mamma, MetaCrawler, and Webcrawler
- Specialized Search Engines
- Help locate specialized subject matter, such as info on movies, health, jobs
- Examples are Career.com. WebMD, Expedia, U.S. Census Bureau
Smart Searching - Strategies
- Browsing : Try a subject directory and then a metasearch engine
- Specific information : Try a Answers.com “one-click" search, or go to a general search engine, then a specialized one
- Looking for everything : Try the same search on several search engines
Wiki
- A simple piece of software that can be downloaded for free and used to make a website that can be corrected or added to by anyone
- Wikipedia is a free online encyclopedia that anyone around the world can contribute to or edit
- It has more than 25 million articles in more than 285 languages; over 4.1 million articles appear in the English Wikipedia alone
- Wikipedia is not considered reliable or authoritative by Many academics and librarians
Multimedia Search Tools
- Still images e.g., Google Image Search, Bing Images, Fagan Finder
- Audio e.g., Yahoo! Music, Lycos MP3 Search
- Video e.g., AlltheWeb, AOL.video
- Scholarly e.g., Google Scholar
Tagging
- Do-it-yourself labels that people can put on anything found on the Internet to find their favorite sites again and to link them.
- Can be shared easily with other people
- Tags are commonly used on blogs and YouTube and are words listed at the bottom
- Essentially tags are keywords used to classify content. (The # is a hash symbol; thus the Twitter term hashtag.) Tag managing is available through delicious.com and BlinkList, among other companies
-
Outgoing mail is sent from your computer to a Simple Mail Transfer Protocol (SMTP) server run by your ISP
-
Incoming mail uses Post Office Protocol version 3 (POP3).
-
There are two ways to send & receive email:
-
Email Program: Enables you to send email email software that interacts with an email server; Incoming mail is stored on the server in an electronic mailbox
-
Upon access (your ID and password), mail is sent to your software's inbox
-
Examples: Microsoft Outlook, Apple Mail
-
Web-Based Email
-
You send and receive messages by interacting via a browser with a website
-
Advantage: You can easily send and receive messages while traveling by using any computer or equipped mobile device and Yahoo! Mail and Gmail (Google)
-
Disadvantages: Ads and email hacking
-
Get an email address from your ISP, following this format; User name (User ID)@Domain name.Country
Tips for Using Email
- Use the address-book feature to store email addresses
- Use folders to organize email
- Be careful with attachments
- Be aware of email netiquette
Email Attachments:
- Send a copy of a file or document attached to an email
- Recipients must have compatible software to open the attachment in the email
- Be careful when opening attachments to avoid viruses
- Check or scan them with antivirus software.
- Know who has sent the attachments before open them.
Netiquette
- Rules for appropriate Online Behavior:
- Don't waste people's time.
- Don't write anything that you would not say to a person's face.
- Include helpful subject and signature lines.
- Be clear and concise.
- Avoid spelling and grammatical errors.
- Avoid SHOUTING and flaming.
- Be careful with jokes.
- Avoid sloppiness.
- Don't send huge file attachments unless requested.
- Quote only the relevant portion when replying to email
- Don't overforward (don't copy emails to everyone you know).
Instant Messaging
- Enables communication via email with specified other users (“buddies”) in real time
- Users on a given email system can send a message
- The recipient sees a pop up instantly on the screen
- Get IM by downloading IM software from a supplier
- Examples: AOL/AIM, Google Chat, Windows Messenger, Yahoo! Messenger
- Done on computers andnot by Texting
Discussion Groups
- Mailing Lists: One-way or two-way email subscription lists
- Email discussion groups on special-interest topics, in which all subscribers receive email messages sent to the group's email address
- Newsgroups: Giant electronic bulletin board where users can participate with a newsreader program
- Message Boards: Similar to newgroups without the newsreader
- A collection of messages on a particular topic is called a thread
FTP
- Used for transferring large files between computers that have different operating systems
- Transfer files from an FTP site to your PC using your web browser or FTP downloads some examples include-Fetch, Cute, FileZilla, and SmartFTP
Telephony
- Involves Using the Internet to make phone calls via VoIP (Voice over Internet Protocol), thus resulting in either very inexpensive or free long-distance calls. Use a PC having a sound card, microphone, Internet connection with modem & ISP, and internet telephone software or phone such as Skype and Vonage in Addition you have the use of videoconferencing, as well
Multimedia on the Web
- Allows to get images, sound, video, and animation
- Requires plug-in, player, or a viewer- a downloadable program Examples- Flash, RealPlayer, QuickTime
multimedia Applets
- Small programs and Can be quickly downloaded, and used by most browsers. Java is the most common Applet language and Text & Images-great variety available, look at google earth as an example Animation = the rapid sequencing of still images to create the appearance of motion. Used in video games and web images for banners Video & Audio can be downloaded completely for playing
Webcasting
- Sending customized text, video, audio on regular basis RSS newsreaders or (RSS aggregators); scour the web, pull feeds together XMLbased, or extensible markup language web and tagging the use of HTML can exchange data Blogs are weblogs -frequently updated sites on the web for public consumption and Images Podcasting delivers audio through RSS feeds for digital playback and streaming
E-Commerce
- Is Electronic commerce like B2B and B2B or C2C
- Showrooming in which shoppers check items to purchase online on rival webistes at a lower price • Business-to-business e-commerce • Business-to-consumer commerce • Consumer-to-consumer commerce
Web 2.0
- The shift, that leads to the social web, is
- Social networking sites: Online communities that allow members to share and share information
- Media-sharing sites: Online social networks media such as photos, videos, music, ideas
- Social-network aggregators: Content collected from multiple sources and tracked
Computer generated Web.30
- Information will be computer-generated- semantic markup is essential.
- Browser acts like a personal assistant because people have unique browsing histories
Security Threats
- Snooping or Email isnt private. Corporate can manage who sees it then it is also availavle everywhere.
- Spam/ Electronic Junk Mail/ Unsolicited Email. Report Spam so people do not receive message to reduce the volume on your machine. Do not click messages
- Spoofing sending fake so they are trusted. Phishing sending fake data to entice people into scams Pharming - Implants malicious software by downloading. Some removal programs are available
Other threats
Adware =spyware. and pop ups-unsolicited to track movements Browswer Hijackers- changing settings Search hijackers and key stalkers can cause your information to be visible. Malware is used as harm and install antiviral softeware
Defend your systems
- Get virus software programs by McAfee, Norton, etc and scan. Back up your device
- Password rules DO not write anything down or copy it as people will find this. make the password to difficult to memorise, do not use a real word
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.