Discovering Computers 17th Edition PDF
Document Details
Uploaded by Deleted User
2023
Jennifer T. Campbell
Tags
Related
Summary
This textbook, "Discovering Computers", details digital technology, data, and devices. It covers topics like digital citizenship, internet use, hardware evaluation, and software applications, in an easy-to-understand format. The 17th edition is a great resource for students studying computer science, digital technology, or related areas.
Full Transcript
Discovering Computers Digital Technology, Data, and Devices The Shelly Cashman Series® Discovering Computers Digital Technology, Data, and Devices 17th Edition Jennifer T. Campbell ;::cengage...
Discovering Computers Digital Technology, Data, and Devices The Shelly Cashman Series® Discovering Computers Digital Technology, Data, and Devices 17th Edition Jennifer T. Campbell ;::cengage Aust ralia · Brazil Canada Mexico· Singapore · Unit ed Kingdom United States Copyright 2023 Ccngage Leaming. All Right!. Reserved. May nOI be copied, scanned, or duplicated. in whole or in part. Due lO electroni c rights, some third party content may be suppressed from the cBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Leaming reserves the right to remove additional contcnl at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Important Notice: Media content referenced within the product description or the product text may not be available in the eBook version. Copyrigh1 2023 Cengage Leaming. All Rights Reserved. May 001 be copied, scanned. or duplicaced, in whole or in part. D1.1c 10 electronic rights. some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect lhe overall learning experience. Centage Learning rcser\!es the right to remove additional content at any time if subsequent rights restrictions require iL ;:~cengage Discovering Computers: Digital Technology, Data, © 2023, © 2018 and Devices, 17t h Ed ition Copyright© 2023 (engage Learning, Inc. ALL RIGHTS RESERVED. Jennifer T. Campbell No part of this work covered by the copyright herein may be reproduced or distributed in any form or by any means, except as permitted by U.S. copyright law, without the prior written permission of the copyright owner. SVP, Product: Erin Joyner Unless otherwise noted, all content is Copyright © Cengage, Inc. VP, Product: Tha is Alencar Microsoft and the Office logo are either registered trademarks or Portfolio Product Director: Mark Santee trademarks of Microsoft Corporation in the United States and/or other countries. This product is an independent publication and is neither Senior Portfolio Product Manager: Amy Savino affiliated with, nor authorized, sponsored, or approved by, Microsoft Product Assistant: Ciara Horne Corporation. Learning Designer: Zenya Molnar Some of the product names and company names used in this book have been used for identification pu rposes only and may be trademarks or Content Manager: Grant Davis registered trademarks of Microsoft Corporation in the United States and/or other countries. Digital Project Manager: Jim Vaughey Developmental Editor: Lyn Markowicz For product information and technology assistance, contact us at VP, Product Marketing: Jason Sakos Cengage Custome r & Sales Support, 1-800-354-9706 or sup port. cengage.com. Director, Product Marketing: Danae April Executive Product Marketing Manager: Jill Staut For permission to use material from this text or product, submit all requests on line at www.copyright.com. Content Acqu isition Analyst: Ann Hoffman Production Service: Lumina Datamatics Library of Congress Control Number: 2022911675 Designer: Erin Griffin Student Edition ISBN: 978-0-357-67536-6 Looseleaf ISBN: 978-0-357-67537-3* Cover Image Source: MirageC/Getty Images * Looseleaf available as part of a digital bundle ID:669263934 Cengage 200 Pier 4 Boulevard Boston, MA 02210 USA Cengage is a lead ing provider of customized learning solutions w ith employees res iding in nearly 40 different countries and sa les in more than 165 countries around the world. Find your local representative at www.cengage.com. To learn more about Cengage platforms and services, register or access your on line learning solution, or purchase materials for your course, visit www.cengage.com. Notice to the Reader Publisher does not warrant or guarantee any of the products described herein or perform any independent analysis in connection with any of the product information contained herein. Publisher does not assume, and expressly disclaims, any obligation to obtain and include information other than that provided to it by the manufacturer. The reader is expressly warned to consider and adopt all safety precautions that might be indicated by the activities described herein and to avoid all potential hazards. By following the instructions contained herein, the reader willingly assumes all risks in connection with such instructions. The publisher makes no representa tions or warranties of any kind, including but not limited to, the warranties of fitness for particular purpose or merchantabil ity, nor are any such representations implied with respect to the material set forth herein, and the pub lisher takes no responsibility with respect to such material. The publisher sha ll not be liable for any special, consequent ial, or exemplary damages resu lt ing, in whole or part, from the readers' use of, or reliance upon, th is material. Printed in the United States of America Print Number: 01 Print Year: 2022 Copyright 2023 Ccngage Leaming. All Right!. Reserved. May nOI be copied, scanned, or duplicated. in whole or in part. Due lO electroni c rights, some third party content may be suppressed from the cBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Leaming reserves the right to remove additional contenl at any time if subsequent rights restrictions requ ire it. Table of Contents at a Glance Module 1 Module 9 Being a Digital Citizen: Networks and Network Devices: At Home, School, and Work......... 1-1 Communicating and Connecting..... 9-1 I Module 2 The Internet: Connecting and Communicating Online............. 2-1 I Module 10 Databases: Understanding Data Storage..................... 10-1 Module 3 Module 11 Evaluating Hardware: For Home Program Development: and Work.......................... 3-1 Creating Systems and Applications 11 -1 Module 4 Programs and Apps: Using Apps for Productivity, Graphics, I Module 12 Web Development: Creating and Publishing Online Content......... 12-1 and Security....................... 4-1 Module 13 Module 5 I Digital Security, Ethics, and Privacy: Avoiding and Recognizing Threats..... 5- 1 Technology Careers: Exploring and Preparing for Opportunities...... 13-1 Appendix: Technology Technology Timeline............... TT-1 Acronyms............ APP-1 Index............................ IND-1 I Module 6 Input and Output: Entering Data and Producing Information.......... 6-1 Module 7 Digital Storage: Preserving Your Content.................... 7-1 I Module 8 Operating Systems: Managing, Coordinating, and Monitoring Resources....................... 8-1 ,. ~pyrig.h t 2023 Ccng:ige Leaming. All Rights RtScn. 00.. May not be Cl)picd. i,c:mncd. or duplicatt."4.r.rb), l?.d1ton1tl rcv~w h.i" d~a,)Cd 1h31 any suppressed con1cn1 ~~ not tnAtcrudl)' tlln;t the o,cnil1 lc:irnin1 C ). ~ Cenga~ Lcarnins ~5el"\t'!t the ri'1,hl lo rt'flkt\'C addtlKJrull content Al any tune if subsequ~nt righb l't,tricl10nli ~ 4oln, 11, Discovering Computers Contents V Inside the Case........................................ 3-22 Module 5 Cases............................................. 3-22 The Arithmetic Logic Unit............................. 3-24 Digital Security, Ethics, and Privacy: Machine Cycle....................................... 3-24 Avoiding and Recognizing Threats 5-1 How To: Protect Yourself When Using Devices................ 3-25 Define and Prevent Risks to Physical Health................ 3-25 Risks Associated with Technology Use....................... 5-2 Define and Prevent Risks to Behavioral Health.............. 3-26 Cybercrime.......................................... 5-2 Define and Prevent Risks to Social Health................. 3-27 Digital Detox......................................... 5-3 Ethics & Issues: Dispose of Hardware Responsibly............ 3-27 Cybercrimes and Criminals................................ 5-3 Ethics and Society....................................... 5-5 Student Assignments: Study Guide Key Terms Extend Your Knowledge Information Accuracy................................... 5-5 Checkpoint Problem Solving How To: Your Turn Intellectual Property Rights.............................. 5-5 Internet Research Critical Thinking.................... 3-29 Green Computing..................................... 5-6 Internet and Network Attacks.............................. 5-7 Malware............................................ 5-7 Module 4 Botnets............................................. 5-8 Denial of Service Attacks................................ 5-8 Programs and Apps: Using Apps for Back Doors.......................................... 5-8 Spoofing............................................ 5-8 Productivity, Graphics, and Security 4-1 Protection from Viruses and Other Malware................. 5-8 How Do You Use Programs and Apps?....................... 4-2 Secure IT: Protect Yourself and Your Data..................... 5·9 Types of Apps........................................ 4-2 Information Theft...................................... 5-9 Common Features of Apps............................... 4-4 Firewalls........................................... 5-10 Use Mobile Apps...................................... 4-5 Unauthorized Access and Use........................... 5-1 O Current Trends in App Development....................... 4-6 Access Controls...................................... 5-11 Ethics and Issues: Acquire Programs and Apps Responsibly....... 4-7 Backing Up......................................... 5-12 Legal Protections for Programs and Apps................... 4-7 Wireless Security....................................... 5-13 Distributing Programs and Apps.......................... 4-7 Protect Mobile Devices................................ 5-13 Install, Update, and Uninstall Programs Secure Your Wireless Network........................... 5-14 and Apps............................................ 4-9 Cloud Data Privacy................................... 5-14 Acquire Legitimate Programs and Apps.................... 4-11 Information Privacy..................................... 5-15 Productivity Apps......................................4-12 Use Strong Authentication.............................. 5-15 Word Processing..................................... 4-13 Biometrics.......................................... 5-17 Spreadsheet......................................... 4-14 Two-Factor Authentication.............................. 5-18 Presentation........................................ 4-16 CAPTCHAs......................................... 5-18 Databases.......................................... 4-18 Encryption.......................................... 5-18 Common Database Tasks............................... 4-19 Protect Yourself while Online........................... 5-19 Productivity Suite..................................... 4-19 Privacy Laws........................................ 5-21 Enterprise Computing................................. 4-20 How To: Establish Policies to Ensure Safety.................. 5-22 Computer-Aided Technology............................ 4-20 Establishing Policies.................................. 5-22 Graphics and Media Applications.......................... 4-21 Disaster Recovery.................................... 5-23 Types of Digital Media................................. 4-21 Ethics and Issues: lnclusivity and Digital Access............... 5-24 Digital Graphics...................................... 4-23 Digital Inclusion...................................... 5-24 Digital Animation..................................... 4-27 Student Assignments: Study Guide Key Terms Extend Your Knowledge Digital Media Creation and Editing Apps................... 4-29 Checkpoint Problem Solving How To: Your Turn Digital Media on the Web................................ 4-30 Internet Research Critical Thinking.................... 5-25 Smart TVs and Streaming Devices........................ 4-30 Stream Digital Audio.................................. 4-30 Technology Time line................................. TT-1 Virtual and Augmented Reality and Artificial Intelligence....... 4-31 Virtual and Augmented Reality.......................... 4-31 Artificial Intelligence.................................. 4-33 Module 6 Personal Interest Applications............................. 4-34 Secure IT: Security Tools................................. 4-35 Input and Output: Entering Data and How To: Use System Management Tools..................... 4-37 Producing Information 6-1 Student Assignments: Study Guide Key Terms Extend Your Knowledge Input and Output....................................... 6-2 Checkpoint Problem Solving How To: Your Turn How Do You Use Input?................................ 6-2 Internet Research Critical Thinking.................... 4-39 How Do You Use Output?............................... 6-3 Copyright 2023 Cengage Leaming. A ll Ri ghts Rescived. May 001be copied, scanned. or duplicated, i n whole or in pan. Due to el ectronic rights. some third party content may be suppressed from the eBook and/or cChapter(s). Editorial review has deemed that any suppressed conient does no1 materially affect the over,lll learning experience. Cengage Leaming rcscrws the right to rcmo~·e additional content a1 any time if subsc - - -C:O,, at SIMllordlJni-,lly llld _ _ _ l n t _ 0o11101Prcglwlt1 -~CIOflOll>IStcmlheFiald\ cYQ.MlESprllject-t,yl. a a - ,...,.. _ _ __. _.. ,. _..__....,_ ~Dy_.....,_le_..._.,bejOlned.,_,1_cl _ _ cc1 TCP>f' - - l l l l l e - ~ l o r..._,_111"1urf 11 1 S 1 - d l a ~ c l l > l ! l r w l.. - l - l o r 8 1.... ,. _ ~r ~ -- FNmffl5 ~ C ~..., --- _,.,111tARPANETwu--1n1ea,........... _ _ _ INSflllnledN Oon'IIIMl_,...._ (CSNET). ln111ee..ii, CltM- 111801,NINSF_llle_cl_~- ----~---- cow-.tl)-1'1111b NSFNET prejlct_, 111118. TIIIARAI.NET-lornl)_,. _ _.ln1980,. ,.~ - - -......... ,.. _ - _,.,..11"4111r)' h a d - ~ - O l C p O l l l l o n l R : l l l & n _. , _ , c l - - - - ' - - l t l O" - ' ' ' --"""' Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated. in whole or in part. Due 10 electronic rights, some third party conte nt may be suppressed from the cBook and/or eChapter(s). Editorial review has deemed that any suppressed con1enl ~s nOl materially affect the o\'crall lcaming experience. C engagc Uaming rcsen es lhe right to rcmo\le additional conte nt at any time if subsequent rights restrictions require it. Connecting and Communicating Online Module 2 2-15 Entertainment An entertainment website offers music, Travel and Tourism Travel and tourism websites videos, shows, performances, events, sports, games, and enable users to research travel options and make travel more in an interactive and engaging environment. On arrangements. On these websites, you typically can read entertainment websites, you can view or discuss activities travel reviews, search for and compare flights and prices, ranging from sports to videos. For example, you can cast order airline tickets, book a room, or reserve a rental car. a vote on a topic for a television show. Many entertainment websites support streaming Mapping Several mapping websites and web apps exist that media, which allows users to access and use a file enable you to display up-to-date maps by searching for an while it is transmitting. You can listen to stream- address, postal code, phone number, or point of interest (such as ing audio or watch streaming video, such as a live an airport, lodging, or historical site). The maps can be displayed performance or broadcast, as it downloads to your in a variety of views, including terrain, aerial, maps, streets, buildings, traffic, and weather. These websites also provide computer, mobile device, or an Internet-connected directions when a user enters a starting and destination point. television. Many work with GPS to determine where a user is located, Banking and Finance Online banking and online eliminating the need for a user to enter the starting point and trading enable users to access their financial records enabling the website to recommend nearby points of interest. from anywhere in the world, provided they have an Internet connection. Using online banking, users can Retail and Auctions You can purchase just about any access accounts, pay bills, transfer funds, calculate mort- product or service on the web. To purchase online, you gage payments, and manage other financial activities visit the business's electronic storefront, which con- from their computer or mobile device (Figure 2-18). tains product descriptions, images, and a shopping cart. With online trading, users can invest in stocks, options, A shopping cart allows the customer to collect items bonds, treasuries, certificates of deposit, money market to purchase. When ready to complete the sale, the cus- accounts, annuities, mutual funds, and so on, without tomer enters personal data and the method of payment, using a broker. which should be through a secure Internet connection. Figure 2-18 You can manage your bank account, make transfers, and more with a banking website, such as Bank of America. Source: Bank of America - - - _,,..__ -5-- &,cull)' -9".AbauU, l!llespa'lal CoructU. lidp BANK OF AMERICA ~ ,... ,..,, -. Checking Savings Credit Cards Home Loans Autol.oals ll'll/esUng ~ Better Money Hablue Open a checking account Consider the benefits of opening a Bank or America Adl/aricage Banking Account. Fifi iili:11 n ~ ~.tll'ldJUlf~ttrSJnci.aict'f'lt""Of.,.., 11,, ·,1 ,.,.... - - -- - 0.-nlo. ot Anwn:: ss-41.01 Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated. in whole or in part. Due 10 electronic rights, some third party conte nt may be suppressed from the cBook and/or eChapter(s). Editorial review has deemed that any suppressed con1enl ~s nOl materially affect the o\'crall lcaming experience. Cengage Uaming resen es the right to remo\le additional conte nt at any time if subsequent rights restrictions require it. The Internet With an online auction, users bid on an item being Portals A portal is a website that combines pages from sold by someone else (Figure 2-19). The highest bid- many sources and provides access to those pages. Most web der at the end of th e bidding period purchases the portals are customized to meet your needs and interests. item. eBay is one of the more popular online auction For example, your bank might create a web portal that websites. includes snapshots of your accounts and access to financial information. Portals exist that offer a selection of services, Careers and Employment You can search the web including the following: search engine; news, sports, and for career information and job openings. Job search weather; web publishing; yellow pages; stock quotes; maps; websites list thousands of openings in hundreds of shopping; and email and other communications services. fields, companies, and locations. This information may Content Aggregation A content aggregator site, include required training and education, salary data , sometimes called a curation website, such as News360 or working conditions, job descriptions, and more. In Flipboard, gathers, organizes, and then distributes web content addition, many organizations advertise careers on their (Figure 2-20). As a subscriber, you choose the type of content websites. you want and receive updates when new content is available. Figure 2-19 Online auction sites enable you to bid on and pay for it ems sold by users. Source: eBay '".. -y "'-y.a a eb ,,.4 pum Figure 2-20 Flipboard is an example of a content aggregator. Source: Flipboard t:il FUPBOAR.D S. - Fllpooord : --~- 1 1:11....... ltOIIIOlOliY RIIIOWITV e RoolW.............._ 30-Mlnute Chicken Scalloplni with a Sauce That Will Make You 39 Ju Icy, Goryeous Strawberry Recipe Ideas -- Most-Requested French Chicken Recipe: 4-lngredient Baked Swoon Chicken Recipe for the Win t!J 13,,...,._ t!J 20haur.- i.!.; Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated. in whole or in part. Due 10 electronic rights, some third party conte nt may be suppressed from the cBook and/or eChapter(s). Editorial review has deemed that any suppressed con1enl ~s nOl materially affect the o\'crall lcaming experience. Cengage Uaming rcsen es lhe right to remo\le addi1ional conte nt at any time if subsequent rights restrictions require it. Connecting and Communicating Online Module 2 2-17 Types of content that may be compiled include news, Consumers use e-commerce because it is convenient, reviews, images, videos, biogs, and more. Content aggre- and businesses use e-commerce because it can increase gation websites save users time because they need to visit revenue. E-commerce has reshaped the modern market- only one source to obtain information. place. Business analysts say that physical retail stores are in decline, while e-commerce websites such as Amazon are WebApps more popular than ever. In addition to using a browser to visit websites and Three types of e-commerce websites are business-to display webpages, you can use it to access web apps, which -consumer, consumer-to-consumer, and are apps you can run entirely in a browser. Most of the business-to-business. website types and examples described in this module have Business-to-consumer (B2C) e-commerce consists of a corresponding app that has similar functionality. A web the sale of goods and services to the general public, such app resides on a server on the Internet, rather than on your as at a shopping website. computer or mobile device. For example, Microsoft Office Consumer-to-consumer (C2C) e-commerce occurs provides Excel, PowerPoint, and Word as web apps, and when one consumer sells directly to another, such as in Google offers a suite of online productivity apps. Other an online auction. popular web apps include Slack (for group collaboration), Business-to-business (B2B) e-commerce occurs Trello (for project management), and Google Docs (for when businesses provide goods and services to other word processing). businesses, such as online advertising, recruiting, credit, Other examples include Box (which lets you store and sales, market research, technical support, and training. exchange files on the cloud) and Skype (which lets you communicate with others using video and voice). Many web apps also have mobile versions, which you operate Figure 2-21 E-commerce transactions have outpaced from your mobile device. The apps sync data between traditional shopping. iStock.com/Filadendron them, enabling you to access your account information, or perform actions, using either version of the app. Table 2-3 summarizes the pros and cons of using web apps. E-commerce E-commerce, short for electronic commerce, is a business transaction that occurs over an electronic network, such as the Internet (Figure 2-21). Anyone with access to a computer or mobile device, an Internet connection, and a means to pay for purchased goods or services can participate in e-commerce. Popular uses of e-commerce by consumers include shopping and auctions, finance, travel, entertainment, and health. Table 2-3 Pros and Cons of Web Apps I Pros Cons I Access web apps from any device with a browser and Internet You must be online to use web apps. connection. Collaborate with others no matter their location. Your files are more vulnerable to security and privacy violations. Store your work on the app's website so you can access it anytime If the web app provider has technical problems, you might not be and anywhere. able to access your work. Save storage space on your device. If the web app provider goes out of business, you can lose your files. Access the latest version of the app without installing updates. Web apps often offer fewer features and may run more slowly than installed apps. Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated. in whole or in part. Due 10 electronic rights, some third party conte nt may be suppressed from the cBook and/or eChapter(s). Editorial review has deemed that any suppressed con1enl ~s nOl materially affect the o\'crall lcaming experience. C engagc Uaming resen es lhe right to rcmo\le additional conte nt at any time if subsequent rights restrictions require it. The Internet Use E-commerce in Business Transactions Most Secure IT: Stay Safe Online e-comm erce actually is between businesses. B2B services include advertising, technical support, and training. B2B A secure website uses encryption to safeguard transmitted products include raw materials, tools and machinery, and elec- information. Encryption is a security method that scrambles tronics. For B2B purchases, pricing can vary based on the level or codes data as it is transmitted over a network so that it is of service provided, negotiated terms, and other factors. At not readable until it is decrypted. B2C websites, the consumer is the decision maker. In a B2B An encrypted website connection displays https transaction, a team of people often need to review and make a instead of http in the U RL. T he "s" in https stands for purchasing decision. T hey usually must follow company pro- "secure," so https means Hypertext Transfer Protocol cedures, which can lengthen or complicate the transaction. Secure. W ebsites, such as banks and retail stores, use the https protocol to make a secure connection to Use E-commerce in Personal Transactions You can pur- your compu ter. Secure websites often use a digital chase just about any product or service at a B2C e-commerce certificate to verify a user's identity with a digita l website. To purchase online, you visit an electronic store- key that has been "signed" by a trusted third party front, which contains product descriptions, images, and a (Figure 2-22). T his third party verifies th e owner and shopping cart to collect items you want to purchase. To that the key belo ngs to that own er. complete the sale, you enter personal data and the method of payment, which should be through a secure Internet connection. A B2C website tracks your selected items using Figure 2-22 Digital certificates provide security when cookies. Cookies store shopping cart item numbers, saved visiting websites. iStock.com/Anyaberkut preferences, and other information. B2 C websites ar e usu- ~------------- ally designed to be easy to use so that you can find what you want quickly. T hey include reviews from other customers to help you make purchasing decisions, special offers for web customers only, and wish lists to encourage you to return to the site. Many B2C websites let you research online and then pick up the purchased item in a physical store. Online classified ads and online auctions are examples of C2C e-commerce websites. An online auction works much like a real- life auction or yard sale. You bid on an item being sold by someone else. The highest bidder at the end of the bidding period purchases the item. eBay is one of the more popular online auction websites. C2C sites have many sellers promoting the goods, rather than a single merchant hosting a B2C site. Many C2C sites use emai l forwarding, which hides real email identities, to An insecure website does not include indicators such as a connect buyer with seller and still protect everyone's privacy. lock icon. In addition, the URL starts with "http," indicat- You pay a small fee to the auction site if you sell an item. ing an unprotected protocol for transmitting information. The address bar in the C hrome browser iden tifies such websites as " ot secure." @ Consider This - - - - - - - - - - - - - - How can you ensure you are getting a good price when shopping online? Online Safety Tips You can find online deals in at least two ways: visiting comparison It is important to keep the following in mind when using shopping sites and using digital deals. Websites such as BizRate and the web: PriceG rabber are comparison shopping websites that save you ti me Verify the website is safe. Type the website address of and money by letting you compare prices from multiple vendors. your em ail, banking, on line social network, and other Digital deals come in the form of gift certificates, gift cards, and cou- personal accounts directly in a browser; never visit pons. Groupon and NewEgg are examples of deal-of-the-day websites, these websites merely by clicking links found in email which help you save money on restaurant meals, retail products, travel, messages. Before you sign in, double-check the web and personal services. Digital coupons consist of promotional codes that address to verify it is correct. Browsers may change the you enter when you check out and pay for on line purchases. Sites such as RetailMeNot and browser extensions such as Honey provide coupon codes color of some of the text in the address bar to verify the and offer alerts for discounts. Have you ever used Groupon or other cou- website is legitimate. Also, check that the web address pon websites or apps?What types of deals did you find? Was it worth it? begins with https instead of the less secure http, and look for a closed padlock symbol beside it. Copyright 2023 Ccngage Learning. All Rights Reserved. May not be copied, M:anncd, or duptica1cd. in whole or in p:1rt. Due 10 elemonic righ1s. some 1hird pany content may be suppressed from 1hc cBook and/or cChaptcr(s). Edilorial review has dl'Cmcd that any suppressed content does nOI mnterially affect the ovcnill lcaming experience. Cengage Leaming reserves the right to remove additional content at any 1imc if subsequent rights rc~trictions require it. Connecting and Communicating Online Module 2 2-19 Tum off location sharing. At times, you may want to Use private browsing. Prevent people using your allow location sharing, which gives websites access to your computer or mobile device from seeing the websites current location. This feature is handy when you want to you viewed or searches you conducted by using private obtain current weather conditions or use a navigation app. browsing. The browser discards passwords, temporary This information could be misused by dishonest individ- Internet files, data entered into forms, and other uals, however, so it is recommended you turn off location information when you exit the browser. sharing. Use a proxy server. To protect your online identity, use Clear your browsing history. A copy of every website a proxy server, which is another computer that screens all you visit is stored in the browser's cache. If you perform your incoming and outgoing messages. The proxy server online banking or view your credit card transactions, the will prevent your browsing history, passwords, usernames, cache could contain personal information, such as pass- and other personal information from being revealed. words and account numbers. You can specify to clear the cache automatically each time you exit a browser. Never store passwords. Many browsers can store your Make Secure E-commerce Payments passwords so that you do not need to type them each Before you make a payment on a website or provide time you visit the same websites. Although you may sensitive information such as a credit card number, make consider this feature a convenience, keep in mind that sure the website is secure. Otherwise, an unauthorized web anyone who accesses your computer can view these user could intercept the payment or information and steal secure websites easily using your account information. your funds or identity. Use a phishing filter. Many browsers include a To make e-commerce payments in an e-commerce phishing filter, which is a program that warns or blocks transaction, you can provide a credit card number. Be sure you from potentially fraudulent or suspicious websites. the B2C website uses a secure connection. 3D Secure is a Enable a pop-up or pop-under blocker. Malicious standard protocol for securing credit card transactions over software creators can develop pop-up ads or pop-under the Internet. Using both encryption and digital certificates, ads, which are Internet advertisements that suddenly 3D Secure provides an extra layer of security on a website. appear in a new window on top of or behind a webpage Besides the https protocol, e-commerce sites also use displayed in a browser. A pop-up blocker is a filtering pro- Transport Layer Security (TLS) to encrypt data. This helps gram that stops pop-up ads from displaying on webpages; protect consumers and businesses from fraud and identity similarly, a pop-under blocker stops pop-under ads. Many theft when conducting commerce on the Internet. Using an browsers include these blockers. You also can download online payment service, such as PayPal, Square Cash, Venmo them from the web at no cost. (Figure 2-23), and Zelle is another layer of protection. Figure 2-23 Ven mo enables you to pay contacts directly from your account to theirs. Source: PayPal X venmo (i) 41 Fast, safe, social pa~ments Pay. Get pmd. Shop. Sl\aro. Join more than 70 million..... people who use the Venmo app. Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated. in whole or in part. Due 10 electronic rights, some third party conte nt may be suppressed from the cBook and/or eChapter(s). Editorial review has deemed that any suppressed con1enl ~s nOl materially affect the o\'crall lcaming experience. Cengage Uaming resen es lhe right to remo\le addi1ional conte nt at any time if subsequent rights restrictions require it. The Internet You can also use smartwatches and smartphones to make You use an email app to create, send, receive, forward, e-commerce payments. ApplePay and Google Wallet are two store, print, and delete email messages. An email mes- of several mobile payment and digital wallet services avail- sage can be simple text or can include an attachment, able on smartphones. Scan the watch or phone over a reader, such as a document, a graphic, an audio clip, or a video often available in stores, to make the electronic payment. clip. A clip is a media file, such as a graphic, sound, ani- Another payment method is to use a one-time or virtual mation, or movie, that you can add to documents and account number, which lets you make a single online payment webpages. without revealing your actual account number. These account Just as you address a letter when using the postal system, numbers are good only at the time of the transaction; if they you address an email message with the email address of are stolen, they are worthless to thieves. your intended recipient. Likewise, when someone sends you a message, the sender must have your email address. @ Consider This - - - - - - - - - - - - - - An email address is a combination of a username 1s it safe to enter financial information online? and a domain name that identifies a user so that the As an alternative to entering credit card, bank account, or other user can receive Internet email. A usemame is a unique financial information online, some shopping and auction websites combination of characters, such as letters of the alphabet allow consumers to use an online payment service, such as PayPal. To and/or numbers, that identifies a specific user. Your use an online payment service, you create an account that is linked to username must be different from the other usernames in your credit card or funds at a financial institution. When you make a the same domain. purchase, you use your online payment service account, which man- Sometimes, organizations decide the format of user- ages the payment transaction without revealing your financial infor- names for new users so that the usernames are consistent mation. These services include an app, which can be used to transfer across the company. In many cases, however, users choose funds to any person or entity that also uses the same service. their own usernames, often selecting a nickname or any other combination of characters for their username. Many users select a combination of their first and last names so Communicating Online that others can remember it easily. In an Internet email address, an @ (pronounced at) symbol As with other aspects of convergence, where capabilities separates the username from the domain name. Your service of devices, apps, and services overlap, many online provider supplies the domain name. A possible email address communication tools have similar features to one another. for Rick Claremont would be rclaremont®esite.com, Biogs and wikis are also considered online communication which would be read as follows: R Claremont at e site dot tools. Online conferencing tools have chat and messaging com. Most email programs allow you to create a contacts features. Many social networking apps have options to list or address book, which contains names, addresses, phone message and bookmark or share content. Digital com- numbers, email addresses, and other details about people with munications you should be familiar with include email, whom you communicate. messaging, podcasts, online conferencing, VoIP, and FTP. When you send an email message, an outgoing mail server determines how to route the message through the Email Internet and then sends the message (Figure 2-25). As you Email was one of the original services on the Internet, receive email messages, an incoming mail server holds the enabling scientists and researchers working on govern- messages in your mailbox until you use your email pro- ment-sponsored projects to communicate with colleagues gram to retrieve them. Most email programs have a mail at other locations (Figure 2-24). notification alert that informs you via a message and/or sound when you receive a new email message(s). Figure 2-24 You can send email to anyone, anywhere in the world. Email Lists An email list, or electronic mailing list, is iStock.com/Anyaberkut a group of email addresses used for mass distribution of a message. When a message is sent to an email list, each person on the list receives a copy of the message in their mailbox. Users may elect to receive the messages immediately or in a digest form sent at a specified interval, such as daily or after a number of messages have accumulated. You subscribe to an email list by adding your email address to the mailing list, which is stored on a list server. To remove your name, you unsubscribe from the mailing list. Many companies and organizations subscribe to an email marketing and mailing Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated. in whole or in part. Due 10 electronic rights, some third party conte nt may be suppressed from the cBook and/or eChapter(s). Editorial review has deemed that any suppressed con1enl ~s nOl materially affect the o\'crall lcaming experience. Cengagc Uaming rcsen es lhe right to rcmo\lC addi1ional content at any time if subsequent rights restrictions require it. Connecting and Communicating Online Module 2 2-21 Figure 2-25 How an email message may travel from a sender to a receiver. Oleksiy/ Shutterstock.com; iStock.com/ luismmolina; Courtesy of Juniper Networks; Courtesy of Juniper Networks;© iStock.com/hocus-focus Step 2 Step 3 Step 1 Your email program contacts Software on the Using an email program, you software on the outgoing outgoing mail create and send a message mail server. server determines on a computer or mobile device. the best route for the data and sends the message, which travels along Internet routers to the recipient's.,.~ ming mail server. incom ing mail server Internet router Step4 When the recipient uses an email program to check for email messages, the message transfers from the incoming mail server to the recipient's computer or mobile device. Internet router service, such as Constant Contact. Email marketing services device, such as a smartphone, you plan to use. Many online allow organizations to create campaigns and then send them social networks include a messaging feature (Figure 2-26). by email to everyone whose name is on a list for distribution. To ensure successful communications, all individuals on the These services allow users to opt out from receiving future friend list need to use the same or a compatible messenger. messages, forward messages to others, and track the number of people who opened the message. Figure 2-26 Facebook Messenger is an example of a messaging app. Messaging Apps Source: Facebook Internet messaging services, which often occur in real- time, are communications services that notify you when What time does your class end one or more of your established contacts are online and ltusa11amoon? then allow you to exchange messages or files or join a pri- [1 I gei out a l 5.15 14 vate chat room with them. Real-time means that you and the people with whom you are conversing are online at Would you llNIN ] -- IIUt Of' 'IOIIIW( The Secret Lives of Trees Why Oo 1..eMM Chango COb-and Fol? 0 0 ~ _,_ 0 0 0 e -.. , · - lllouly ,...... """'_,ot.. Ea1h9 ea;mys&anabul......ffllftlOIWnfWIITWltl ,,_.,. ftOtn ~ t.niw-tl - - - ClllldiCa.... lhl!!t 1W9 IO....... ~llffWOt\lOl'l.llllfcwal floor, amw~hn...,l'lddln"°""ll'c:I......_ - Heiden omong tho - ~ - on Eor11>? Wtndd Oohoo........ --- Ci> ~ 11'+1 ,].lf Tllo 8iOllc Pump: - -.. CINlo Rein -- 0 (£) How don.to SUm.. Wlnt«! With a media sharing site, such as YouTube or Flickr, you Manage your profile. Check for privacy settings, usually can manage media such as photos, videos, and music and share found on the Settings or Options tabs, to set permissions them with other site members. Use a media sharing site to so that you can control who can review your profile and post, organize, store, and download media (Figure 2-3 1). With photos, determine how people can search for you and photo sharing sites, such as Instagram, Flickr, P hotobucket, make comments, and if desired, block certain people from and Shutterfly, you can post photos and then organize them viewing your page. Be aware that online social networks into albums, add descriptive tags to categorize them, and invite may change privacy settings. Periodically check your comments. Photos and other posts on social network sites settings to ensure you have the most up-to-date settings. also include information that generally does not appear to site Choose friends carefully. You may receive a friend users, called metadata, which is data that describes other data. r equest that appears to be from someone you know. In Metadata for a picture includes the GPS location coordinates r eality, this message may originate from an identity thief where it was taken, when it was posted, and who posted it. who created a fake profile in an attempt to obtain your personal information. Confirm with the sender that the r equest is legitimate. Privacy and Security Risks with Online Limit friends. While many online social networks Social Networks encourage the practice, do not try to gather too many O nline social networks can be excellent places to share friends in your social network. Some experts believe messages, photos, and videos. T hey can, however, be risky that a functional online social network should not places to divulge personal information. Follow these tips to exceed 150 people. O ccasionally review what your help protect against thieves who are following the network friends are posting about you. traffic and attempting to invade private facets of your life. Divulge only relevant information. W rite details Register with caution. During the registration process, about yourself that are relevant to the reasons you are provide only necessary information. D o not disclose participating in an online social network. When posting your birthdate, age, place of birth, or the city where information, be aware that the message may be accessible you currently are living. If an email address is required, publicly and associated with your identity permanently. consider using a new address so that the online social D o not post anything you would not want to be made network cannot access your email address book. Online public. social networks occasionally ask users to enter their Be leery of urgent requests for help. Avoid email address and password to determine if their friends r esponding to emergency pleas for financial assistance also are members of the network. In turn, the network from alleged family members. In addition, do not reply obtains access to contacts in your address book and can to messages concerning lotteries you did not enter and send spam (unsolicited email messages) to your friends. fabulous deals that sound too good to be true. Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated. in whole or in part. Due 10 electronic rights, some third party conte nt may be suppressed from the cBook and/or eChapter(s). Editorial review has deemed that any suppressed con1enl ~s nOl materially affect the o\'crall lcaming experience. Cengagc U aming resen es the right to rcmo\le additional conte nt at any time if subsequent rights restrictions require it. Connecting and Communicating Online Module 2 2-27 Read the privacy policy. Evaluate the website's privacy Discussion forum networks let you have online policy, which describes how it uses your personal conversations on any topic. For example, Quora features information. For example, if you watch a video while signed discussions in 10 areas, including literature, technology, in to your account, an external website or app may have science, writing, health, and books. You can follow topics access to this information and post this activity as an entry you select, and post questions, opinions, and links. You in both your activity stream and your friends' news feeds. can also receive notifications when others post to a topic that interests you. The site lets you upvote, or promote, Video sharing sites, such as YouTube and Vimeo, let answers that you find useful. users post clips. Clips can be user-created, or they can be short portions of published digital media from other sources. You can set up a post so that anyone, or only Business Uses of Social Media people you invite, can view or comment on your clip. Businesses use online social networks to connect On Instagram, followers "like" (show approval of or with their customers, provide promotional offers, and appreciation for) photos. offer targeted advertising. For example, users who With the growth of online shopping, users need a recommend online content about travel services may way to evaluate products before they buy. Consumer see travel-related advertising on their online social review networks let purchasers post online ratings and network's webpage. reviews of practically any product or service. For example, Businesses also use data from online social networks to TripAdvisor helps travelers choose accommodations, better connect with and understand customers. They can flights, experiences, and restaurants by providing price review comments from customers about their experiences and feature comparisons, as well as customer ratings and using companies' products or services. Monitoring these reviews. Yelp helps consumers find professionals of all feeds continuously gives companies immediate feedback kinds, such as dentists, hair stylists, or mechanics, while from customers. Angi helps people search for service professionals, such Nonprofit organizations use online social networks to as contractors or plumbers, in their area (Figure 2-32). promote activities and causes, accept donations, and allow Shopping sites such as Amazon also feature review volunteers to contact one another online. capabilities to help users decide which products to buy. Figure 2-32 Ang i is an example of a consumer review website. Source: Angi cAngi.Jain OUr Pro ~ lntenor I e.tetior I ul'rn a Gatckn I Hore I Attklu II Adw,ce Your home for everything home Whn c:an help you with 1od.ly? Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated. in whole or in part. Due 10 electronic rights, some third party conte nt may be suppressed from the cBook and/or eChapter(s): Editorial review has deemed that any suppressed con1enl ~s nOl materially affect the o\'crall lcaming experience. Cengagc Uaming resen es lhe right to rcmo\le additional conte nt at any time if subsequent rights restrictions require it. The Internet @ Consider This - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - How do you use hashtags? On Twitter and other online socia l networks, a hashtag is a descriptive word or phrase (without spaces between words) that starts with the hash symbol (#). Hashtags allow users to classify posts related to a particular topic. Some online social networks list trending topics based on popu lar hashtags. Many television broadcasts, advertisements, and businesses post hashtags to encourage viewers and cus- tomers to share comments on Twitter or Facebook. Have you ever added hashtags to a social media post? For what purpose? Have you searched for topics by hashtags? What were the results? Apply Information Literacy Standards Evaluate whether information is misleading, biased, or out of date. to Web Searches Manage information to become a knowledgeable Using a search site, such as Google, you can find decision maker. websites, webpages, images, videos, news, maps, and You become information literate by understanding and other information related to a specific topic. Search sites selecting the tools, techniques, and strategies for locating use search engines to enable users to pose queries that and evaluating information (Figure 2-33). return a list of websites or webpages that may provide the information the user needs. You also can use a search How Search Engines Work engine to solve mathematical equations, define words, Suppose you are working on a presentation about mobile find flights, and more. phone technology and need to know about current Of the billions of webpages you can access using Google innovations. How can you find this information quickly? or another search site, some are valuable and some are not. You probably would use a general search engine and enter Telling the difference is a skill you need to succeed in work a search term or phrase, such as mobile phone innovations. and life. Within seconds, the first page of search results lists a dozen webpages that might contain the information you need. How does a general search engine choose the results you Define Information Literacy see? When you perform a search, a general search engine How you find, evaluate, use, and communicate online does not search the entire Internet. Instead, it compiles a information depends on your information literacy, which database of information about webpages. It uses programs is the ability to find, evaluate, use, and communicate online called spiders or crawlers. A spider or crawler is software information. If you have information literacy, you can do that combs the web to find webpages and add new data the following: about them to the database, thereby building an index, or Navigate many sources of information, including the listing of terms and their locations. Internet, online libraries, and popular media sites. A query is a search term entered into a search engine Select the right tool for finding the information on the web to obtain results. When you enter a query, a you need. general search engine refers to its database index and then Recognize that not all information is reliable, accurate, lists pages that match your search term, ranked by how or from reputable sources. closely they answer your query. Figure 2-33 Search tools, techniques, and st rat egies. Jeramey l ende/ Shutterstock.com....... Search tool Search results Copyright 2023 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated. in whole or in part. Due 10 electronic rights, some third party conte nt may be suppressed from the cBook and/or eChapter(s). Editorial review has deemed that any suppressed con1enl ~s nOl materially affect the o\'crall lcaming experience. Cengage Uaming resen es lhe right to rcmo\lC addi1ional content at any time if subsequent rights restrictions require it. Connecting and Communicating Online