Full Transcript

2 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. ...

2 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Chapter 2 Topics Using Information Technology, 11e 2 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. UNIT 2A: The Internet & the Web The Internet began in 1969 as ARPANET. Using Information Technology, 11e The Internet was text-only. In the early 1990s, multimedia became available on the Internet, and the World Wide Web (web) was born. This is the first image uploaded to the web, in 1992. 3 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. To connect to the Internet, you need 1. An access device (computer with modem) 2. A means of connection (phone line, cable hookup, or wireless) Using Information Technology, 11e 3. An Internet access provider © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 2.1 Connecting to Using Information Technology, 11e the Internet 5 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. However you connect to the Internet, the bandwidth will determine the speed of your connection. Bandwidth: Expresses how much data can be sent through a Using Information Technology, 11e communications channel in a given amount of time. Baseband: Slow type of connection that allows only one signal to be transmitted at a time. Broadband: High-speed connections. 6 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Physical connection to Internet—wired or wireless? Telephone [dial-up] modem High-speed phone line—DSL, T1/T3 Using Information Technology, 11e Cable modem Wireless—satellite and other through-the-air links 7 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Data Transmission Speeds Originally measured in bits per second (bps) 8 bits are needed to send one character, such as A or a Using Information Technology, 11e Kbps connections send 1 thousand bits per second Mbps connections send 1 million bits per second Gbps connections send 1 billion bits per second Uploading & Downloading Upload—transmit data from local to remote computer Download—transmit data from remote to local computer 8 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Narrowband (Dial-Up Modem): Low speed but inexpensive Telephone line = narrowband, or low bandwidth, low speed Dial-up connection—use of telephone modem to connect to Internet Using Information Technology, 11e (used mostly in rural areas on POTS, or plain old telephone system) Telephone Modems Can be either internal or external Maximum speed of 56 Kbps Most ISPs offer local access numbers 9 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Telephone (Dial-Up) Modem Using Information Technology, 11e Panel 2.3 Page 55 10 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. High-Speed Phone Lines More expensive but available in cities & most towns DSL line Uses regular phone lines, DSL modem Receives data at 7 ̶ 105Mbps; sends at about 384 Kbps – 1 Mbps Using Information Technology, 11e Is always on Need to live no farther than 4.5 miles from phone company switching office Not always available in rural areas T1 line—very expensive Traditional trunk line, fiber optic or copper; carries 24 normal telephone circuits Transmission rate of 1.5 ̶ 6 Mbps (T3 = 6 – 47 Mbps) Generally used by large organizations 11 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. High-Speed Phone Lines Cable modem TV cable system with Internet connection; company usually supplies cable modem Is always on Using Information Technology, 11e Receives data at up to 100 Mbps; sends at about 2-8 Mbps 12 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Basic DSL/ Cable-PC system Using Information Technology, 11e Panel 2.4 Page 57 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Satellite Wireless Connections Transmits data between satellite dish and satellite orbiting earth Connection is always on Using Information Technology, 11e Requires Internet access provider with 2-way satellite transmission User needs to buy or lease satellite dish and modem and have them connected 14 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Other Wireless: Wi-Fi, 3G, 4G, & 5G Wi-Fi—stands for “wireless fidelity” Name for a set of wireless standards (802.11) set by IEEE Transmits data wirelessly up to 54 Mbps for 300 – 500 feet from access point (hotspot) Using Information Technology, 11e Typically used with laptops and tablets that have Wi-Fi hardware 3G = “third generation”; uses existing cellphone system; handles voice, email, multimedia 4G = “fourth generation”; faster than 3G; built specifically for Internet traffic Both 3G and 4G used mostly in smartphones 5G = “fifth generation”; faster than 4G; 15 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Internet Access Providers (ISPs) ISP: Local, regional, or national organization that provides access to the Internet for a fee — e.g., Comcast, Charter, AT&T. Wireless Internet Service Provider (WISP) — e.g., AT&T, T-Mobile, Verizon Wireless, Sprint, Credo Using Information Technology, 11e Enables wireless-equipped laptop/tablet and smartphone users to access Internet 16 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 2.2 How Does the Internet Using Information Technology, 11e Work? 17 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. The Internet is basically a huge network that connects hundreds of thousands of smaller networks. Central to this arrangement are client/server networks Using Information Technology, 11e Client: computer requesting data or services Server or host computer: central computer supplying data or services requested of it Client 18 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Internet Connections: POP & IXPs Point of Presence (POP) A collection of modems and other equipment in a local area A local gateway (access) to an ISP’s network Using Information Technology, 11e ISP connects to an IXP Internet Exchange Point (IXP) A routing computer at a point on the Internet where several connections come together IXPs are run by private companies Allow different ISPs to exchange Internet traffic (continued) 19 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Internet Connections: Backbone, & Internet2 Internet Backbone High-speed, high-capacity data transmission lines, usually fiber optic Uses the newest technology Using Information Technology, 11e Providers include AT&T, Sprint, Verizon, CenturyLink, and Deutsche Telekom 20 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Using Information Technology, 11e Panel 2.5 Page 59 21 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Internet Communications: Protocols, Packets, & IP Addresses Handshaking & Authentication: Connecting to your ISP’s point of presence (POP) Handshaking—fastest transmission speed established Authentication—correct password & user name Using Information Technology, 11e Protocols The set of rules a computer follows to electronically transmit data. TCP/IP (Transmission Control Protocol/Internet Protocol) is the Internet protocol Developed in 1978 by ARPA; used for all Internet transactions Packets Fixed-length blocks of data for transmission, determined by TCP/IP Data transmissions are broken up into packets and re-assembled at destination (the IP— Internet Protocol— address) 22 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. IP (Internet Protocol) Addresses Every device connected to the Internet has an address Each IP address uniquely identifies that device The address is four sets of numbers separated by periods (e.g., 1.160.10.240) Using Information Technology, 11e Each number is between 0 and 255 Dynamic IP addresses change with every use; individual computer users are assigned static IP addresses when they log on Static IP addresses don’t change (established organizations – including ISPs – and companies have static IP addresses, which they pay for) 23 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Who Runs the Internet? Basically, no one owns the Internet The board of trustees of the Internet Society (ISOC) oversees the standards Using Information Technology, 11e Internet Corporation for Assigned Names and Numbers (ICANN) regulates domain names (such as.com, edu.,.net) that overlie IP addresses; ICANN does not control content 24 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Using Information Technology, 11e 2.3 The World Wide Web 25 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. The Face of the Web: Browsers, Websites, & Web Pages The World Wide Web brought multimedia to the Internet. The web and the Internet are not the same; the web is multimedia-based, and the Internet is not. The Internet is the infrastructure that supports the web. A browser is software that gets you to websites and their individual web Using Information Technology, 11e pages and displays the content in such a way that the content appears mostly the same regardless of the computer, operating system, and display monitor. Examples = Internet Explorer Mozilla FireFox Apple Macintosh’s Safari Google’s Chrome Microsoft’s Bing 26 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Website The location on a particular computer (server) that has a unique address; example = www.barnesandnoble.com, www.mcgraw-hill.com The website (server) could be anywhere — not necessarily at company Using Information Technology, 11e headquarters Web Page A document on the web that can include text, pictures, sound, and video The first page on a website is the Home page The Home page contains links to other pages on the website (and often other websites) 27 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. How the Browser Finds Thing: URLs Uniform Resource Locator (URL): address for a web page A character string that points to a specific piece of information anywhere on the web A website’s unique address Using Information Technology, 11e It consists of The web protocol, http:// The domain name of the web server The directory name or folder on that server The file within the directory, including optional extension 28 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. The Nuts & Bolts of the Web: HTML & Hyperlinks TCP/IP— As explained (p. 60), general Internet Protocol HTTP—Protocol Used to Access World Wide Web Hypertext Markup Language (HTML) Using Information Technology, 11e The “markup” language used in writing and publishing web pages Set of instructions used to specify document structure, formatting, and links to other documents on the web Hypertext links connect one web document to another hypertext link Tim Berners-Lee saw the possibility of using hyperlinks to link any information to any other information over the Internet. 29 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Search Services & Search Engines Organizations that maintain databases accessible through websites to help you find information on the internet Examples: portals like Yahoo! and Bing, plus Google, Ask.com, Gigablast Search services maintain search engines—programs that users can use to ask questions or use keywords to find information Using Information Technology, 11e Databases of search engines are compiled using software programs called spiders (crawler, bots, agents) Spiders crawl through the World Wide Web Follow links from one page to another Index the words on that site A search never covers the entire web Search engines differ in what they cover 30 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Four Web Search Tools 1. Individual Search Engines Compile their own searchable databases on the web You search by typing keywords and receiving “hits” Examples are Ask, Bing, Google, and Yahoo! Using Information Technology, 11e 2. Subject Directories Created and maintained by human editors, not electronic spiders Allow you to search for information by selecting lists of categories or topics Example sites are Beaucoup!, LookSmart, Open Directory Project, and Yahoo! Directory (continued) 31 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 3. Metasearch Engines  Allows you to search several search engines simultaneously  Examples are Yippy!, Dogpile, Mamma, MetaCrawler, and Webcrawler Using Information Technology, 11e 4. Specialized Search Engines  Help locate specialized subject matter, such as info on movies, health, jobs  Examples are Career.com. WebMD, Expedia, U.S. Census Bureau 32 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Smart Searching: Three General Strategies If you’re just browsing... Try a subject directory Next try a metasearch engine Using Information Technology, 11e If you’re looking for specific information... Try a Answers.com “one-click” search Or go to a general search engine, then a specialized one If you’re looking for everything on a subject... Try the same search on several search engines 33 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 2.4 Email, Instant Using Information Technology, 11e Messaging, & Other Ways of Communicating over the Net 34 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Email Outgoing mail: sent from your computer to a Simple Mail Transfer Protocol (SMTP) server run by your ISP Incoming mail: Email sent to your computer: uses Post Office Using Information Technology, 11e Protocol version 3 (POP3) 35 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Difference between SMTP and POP3 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Using Information Technology, 11e Page 77 37 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Two ways to send & receive email: 1. Email Program Enables you to send email by running email software on your computer that interacts with an email server at your Internet access provider Using Information Technology, 11e Incoming mail is stored on the server in an electronic mailbox Upon access (your ID and password), mail is sent to your software’s inbox Examples: Microsoft Outlook, Apple Mail 2. Web-Based Email You send and receive messages by interacting via a browser with a website Advantage: You can easily send and receive messages while traveling, using any computer or equipped mobile device Examples: Yahoo! Mail and Gmail (Google) Disadvantages are ads and email hacking 38 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Using email Get an email address from your ISP, following this format: Using Information Technology, 11e 39 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Email Attachments A copy of a file or document that you send attached to an email to one or more people Recipients must have compatible software to open the attachment; Using Information Technology, 11e for example, if they don’t have Excel, they probably can’t read the spreadsheet you sent them. Be careful about opening attachments: Many viruses hide in them; scan them with antivirus software Know who has sent the attachment before you open it 40 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Instant Messaging Instant messaging enables you to communicate by email with specified other users (“buddies”) in real time. Any user on a given email system can send a message and have Using Information Technology, 11e it pop up instantly on the screen of anyone logged into that system. To get IM: Download IM software from a supplier Examples: AOL/AIM, Google Chat, Windows Messenger, Yahoo! Messenger Done on computers; is not the same as texting. 41 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. FTP (File Transfer Protocol) Software standard for transferring large files between computers, including those with different operating systems You can also transfer files from an FTP site on Using Information Technology, 11e the Internet to your PC FTP sites offer many free files FTP sites may be either public or proprietary You can download using your web browser or FTP client programs, such as Fetch, Cute, FileZilla, and SmartFTP 42 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 2.5 The Online Using Information Technology, 11e Gold Mine © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Telephony: The Internet Telephone Uses the Internet to make phone calls via VoIP (Voice over Internet Protocol) Long-distance calls are either very inexpensive or free Using Information Technology, 11e With no PC, dial a special phone number to packetize your call for a standard telephone Use with a PC that has a sound card, microphone, Internet connection with modem & ISP, and internet telephone software such as Skype and Vonage Also allows videoconferencing 44 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Multimedia on the Web Allows you to get images, sound, video, and animation May require a plug-in, player, or viewer A downloadable program that adds a specific feature to a browser so it can view certain files Using Information Technology, 11e Examples: Flash, RealPlayer, QuickTime Multimedia Applets Small programs that can be quickly downloaded and run by most browsers Java is the most common Applet language Text & Images: great variety available Example: Google Earth (continued) 45 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. The Web Automatically Comes to You Push technology: Software that automatically downloads information to personal computers. Webcasting: Sending users customized text, video, audio on regular basis. Using Information Technology, 11e RSS newsreaders (RSS aggregators): Programs that scour the web, sometimes hourly, sometimes more frequently, and pull together in one place “feeds” from several websites. RSS is based on XML, or extensible markup language, a web-document tagging and formatting language that is an advance over HTML and that two computers can use to exchange information. 46 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. XML and RSS have led to blogs and blogosphere. Blogs (weblogs) are frequently updated sites on the web Using Information Technology, 11e intended for public consumption that contain a writer’s observations, opinions, images, and links to other websites. Podcasting: Internet radio or similar Internet audio program delivered via RSS feed to a subscriber to be played back on computer or digital audio device. 47 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. E-Commerce: B2B, B2C, & C2C E-Commerce (electronic commerce): conducting business activities online E-commerce has led to showrooming, the phenomenon in which shoppers browse for products in stores, only to buy them from an online rival, frequently at a lower price. Using Information Technology, 11e B2B is business-to-business e-commerce. Business-to-consumer commerce, or B2C, is the electronic sale or exchange of goods and services from the companies directly to the public, or end users (e.g., online banking, online shopping, online stock trading). Consumer-to-consumer commerce, or C2C, is the electronic sale or exchange of goods and services between individuals (e.g., auctions). Discussion Question: Have you every sold anything on eBay? Used PayPal? Did you have any problems? What would you warn people about? 48 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Web 2.0: The Social Web Web 2.0 refers to the web viewed as a medium in which interactive experience, in the form of blogs, wikis, forums, social networking, and so on, plays a more important role than simply accessing information. The move toward a more social, collaborative, interactive, and responsive web; Using Information Technology, 11e has led to the “social web,” giving rise to: Social networking sites: Online communities that allow members to keep track of friends and share photos, videos, music, stories, and ideas (e.g., Facebook, LinkedIn). Media-sharing sites: Online social networks in which members share media such as photos, videos, music, ideas (e.g., YouTube, Flicker, Shutterfly). Social-network aggregators: Collect content from all of a user’s various social network profiles into one place, then allow him or her to track friends and share other social network activities (e.g., Mugshot, Readr). 49 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Web 3.0: Computer-Generated Information In Web 3.0, information will be computer-generated with less human interaction required to discover and integrate that information. Two ideas might form the basis for Web 3.0— semantic markup and Using Information Technology, 11e a personal browser. Semantic markup: Data interchange formats that will allow machines to understand the meaning—or “semantics”—of information on the web. The Web 3.0 browser will probably act as a personal assistant because every user will have a unique Internet profile based on his or her browsing history. The more you use the Web, the more your browser learns about you and the less specific you'll need to be with your questions. 50 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Using Information Technology, 11e 2.6 The Intrusive Internet © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Snooping Email is not private Corporate management has the Using Information Technology, 11e right to view employees’ email. Friends can send email anywhere. Not all ISPs protect their customers’ privacy. Deleted emails can be retrieved from a hard disk. 53 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Spam: Electronic Junk Mail Unsolicited email that takes up your time. Delete it without opening the message. Using Information Technology, 11e Never reply to a spam message. Do not click on “unsubscribe” at the bottom of an email. When you sign up for something, don’t give your email address. Use spam filters. Fight back by reporting new spammers to www.abuse.net or www.spamhaus.org. 54 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Spoofing Using fake email sender names so the message appears to be from a different source, so you will trust it. If you don’t know the sender, don’t open it. Phishing Sending forged email directing recipient to fake website. Using Information Technology, 11e Purpose: to entice people to share personal or financial data. Fake website looks like real website, such as a bank’s. Pharming Implanting malicious software on a victim’s computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser. Use websites with URLs that begin with “https:// Some spyware removal programs can correct the corruption. 55 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Phishing Examples Phishing examples Using Information Technology, 11e "YOUR NET ID ACCOUNT" Phishing Scam (3/31/2013) https://wiki.library.ucsb.edu/display/SYSPUB/Latest+Phishing+Attempts 56 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Cookies Little text files left on your hard disk by some websites you visit. Can include your log-in name, password, browser preferences, and credit card information. Using Information Technology, 11e Every time you load a particular website, the browser sends the cookie back to the server to notify the website of your previous activity. Can make visiting these websites next time more convenient and faster. But cookies can be used to gather information about you and your browsing habits and history; this information can be used without your consent. A first-party cookie is a cookie from a website that you have visited. Third-party cookies are placed by trusted partners of the websites you visit. (Third-party cookies are frequently placed by ad networks.) 57 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Spyware : Adware, Browser & Search Hijackers, & Key Loggers Spyware is software surreptitiously installed on your computer via the web. Spyware hides on your PC/device and captures information Using Information Technology, 11e about what is on the it, such as keystrokes and passwords 58 © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Adware, or pop-up generator, is a kind of spyware that tracks web surfing or online buying so that Using Information Technology, 11e marketers can send you targeted and unsolicited pop-up and other ads. Browser hijackers change settings in your browser without your knowledge, often changing your browser’s home page and replacing it with another web page. © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Search hijackers intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run. Using Information Technology, 11e Key loggers, or keystroke loggers, can record each character you type and transmit that information to someone else on the Internet, making it possible for strangers to learn your passwords and other information. © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Malware There are many forms of malicious software—so-called malware—that can harm a computer system, a common danger being viruses. A virus is a rogue program that migrates through the Internet or via operating systems and attaches itself to different programs that spread Using Information Technology, 11e from one computer to another, leaving infections. The principal defense is to install antivirus software, which scans a computer to detect viruses and, sometimes, to destroy them. © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. How to Reduce Malware Risks Install a virus protection software, such as McAfee VirusScan ( www.mcafee.com ) or Norton AntiVirus ( www.symantec.com/nav ). (Don’t use antivirus software from companies you know nothing about.) Scan your entire system with antivirus software the first time it’s installed; then scan it regularly after that. Also scan any new CDs and drives before using them. Using Information Technology, 11e Don’t open, download, or execute any files, email messages, or email attachments if the source is unknown or if the subject line of an email is questionable or unexpected. Delete spam and email messages from strangers. Don’t open, forward, or reply to such messages. Use webmail sparingly, since viruses can hide in the HTML coding of the email. Even the simple act of previewing the message in your email program can activate the virus and infect your computer. Don’t start your computer with a flash drive, USB thumb drive, or CD/DVD in place. Back up your data files regularly, and keep at least one backup device in a location separate from your computer or use an online (cloud) backup service. If you discover you have a virus, ask McAfee or Norton to scan your computer online; then follow its directions for cleaning or deleting the virus. (A computer tech person can do this, too.) © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Passwords Never choose a real word or variations of your or your family’s name, address, phone number, Social Security number, license plate, or birth date. Don’t use passwords that can be easily guessed, such as “12345” or “password.” Avoid any word that appears in a dictionary. Instead, mix letters, numbers, and Using Information Technology, 11e punctuation marks in an oddball sequence of no fewer than eight characters, such as 2b/orNOT2b% and Alfred!E!Newman7. Or choose a password that is memorable but shift the position of your fingers on the keyboard, so that, for instance, TIMBERWOLVES becomes YO,NRTEP;BRD when you move your fingers one position right. For sensitive sites, such as financial accounts, create long passwords, such as 15-character passwords. Don’t use the same password for multiple sites, so that if someone obtains the password to one account, that person won’t have access to your entire online life. Don’t write passwords on sticky notes or in a notebook or tape them under your keyboard. Don’t carry the passwords in your wallet. If you have to write down all your passwords, find a safe place to put the paper, or use a software password manager, such as Kaspersky Password Manager, RoboForm Everywhere, or Last Pass Premium. © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Use Quizgecko on...
Browser
Browser