BMA-IBT-2 Apply technology as a tool to increase productivity to create, edit, and publish industry appropriate documents. 2.3 Execute efficient online searches for specific and creditable resources. 1.02 Authenticating Content
What do you know about the Uniform Resource Locator (URL)? Protocol Server/Host Name Country code Extension Page/Document/ Filename Directory/folder Domain Name http://www.dpi.state.nc.us/directory/staff.html 1.02 Understand how to validate, authenticate, and legally use information from the Internet. 1.02 URL's Anatomy
URL’s Anatomy Protocol determines how the file the file will be transferred (in whole or in part). Examples: http and ftp Domain name includes the name of the server where the information is stored and a suffix (also called an extension) which indicates the type and location of the server. The protocol determines how the information will be transferred. FTP is a two-way system in which entire files are copied from the sending server or device into the receiver’s computer. HTTP is used to transfer files from a Web server into a browser on a user’s computer in order to view files from the Internet. The domain name is sort of like your zip + 4 code. The domain name includes the host server, a suffix, and sometimes a country code. Examples of host servers and their extensions: Microsoft.com, ecu.edu, bls.gov, ncsecu.org, bidlink.net, and http://www.nic.mil/ Examples of country extensions include .uk, .au, .ca The Internet is a huge global network of computer networks. The Web is a tool used to access information from the Internet. Browsers are used by the Web to transport data from the Internet to the user. FTP URLs link to files on other servers, but not on the Web. 1.02 Understand how to validate, authenticate, and legally use information from the Internet. 1.02 URL's Anatomy
Know your suffixes/extensions What about these? .uk .au .ca .de Do you know what these suffixes indicate? .com .edu .gov .org .net .mil 1.02 Understand how to validate, authenticate, and legally use information from the Internet. 1.02 URL's Anatomy
URL’s Anatomy (Continued) A directory tells the computer specifically where to look for the requested information on the file server. A filename tells which specific document or program should be retrieved from the directory. 1.02 Understand how to validate, authenticate, and legally use information from the Internet. 1.02 URL's Anatomy
URL’S Appendages Other parts of an URL may include ~ (tilde) indicates a personal web page .exe or .hqx indicates an executable program = (equals) indicates a specific document or program Question mark (?) indicates that the web server will perform some type of calculation before returning the results 1.02 Understand how to validate, authenticate, and legally use information from the Internet. 1.02 URL's Anatomy
For your activity webpage evaluation http://zapatopi.net/treeoctopus/ 1.02 Understand how to validate, authenticate, and legally use information from the Interent.
Authenticating Content Information Literacy -The ability to evaluate information across a range of media; recognize when information is needed; locate, synthesize, and use information effectively; and accomplish these functions using technology, communication networks, and electronic resources. 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content
Content Criteria When validating information obtained from the Internet, we need to look at two major areas: the URL and the content. Since we already know about the URL, what do you think we need to know about the content? 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content
What does validate mean? In layman’s terms: To validate means to verify or prove that something is what it says it is or that something does what it says it’s supposed to do. For example, the statement, “The sun rises in the East and sets in the West,” is valid because it has proven to be true. 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content
Validation Criteria - Content Who created the page? Look for the author’s name and the name of the organization http://www.easywhois.com/ provides the registration information of the domain name owner. What’s the date of creation? Has the page been recently updated? Is the page copyrighted? 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content
Validation Criteria – Content (continued) Does the page title match the content and do the images relate as well? (relevance) Does the page contain obvious spelling and grammatical errors? Are the images and color and font schemes constant? (consistency) 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content
Validation Criteria – Content (continued) Is it believable and authentic? Can you back it up with research? What does authentic mean? Not counterfeit or copied Genuine, real, original, true Examples: Authentic: Gucci bag Inauthentic: Gucci bag knock-off 1.02 Authenticating Content
Validation Criteria – Content (continued) Does the page appear to be useful for its stated purpose? What other sites are linked? Use link URL to find out who has linked to a particular web site. 1.02 Authenticating Content
Truth or Fiction? Visit these sites: http://home.inreach.com/kumbach/velcro.html http://zapatopi.net/treeoctopus/ http://www.thedogisland.com/ 1.02 Authenticating Content
What does validate mean? In layman’s terms: To validate means to verify or prove that something is what it says it is or that something does what it says it’s supposed to do. For example, the statement, “The sun rises in the East and sets in the West,” is valid because it has proven to be true. . 1.02 Authenticating Content
Validation Criteria - Content Who created the page? Look for the author’s name and the name of the organization http://www.easywhois.com/ provides the registration information of the domain name owner. What’s the date of creation? Has the page been recently updated? Is the page copyrighted? 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content
Validation Criteria – Content (continued) Does the page title match the content and do the images relate as well? (relevance) Does the page contain obvious spelling and grammatical errors? Are the images and color and font schemes constant? (consistency) 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content
Validation Criteria – Content (continued) Is it believable and authentic? Can you back it up with research? What does authentic mean? Not counterfeit or copied Genuine, real, original, true Examples: Authentic: Gucci bag Inauthentic: Gucci bag knock-off 1.02 Authenticating Content
Validation Criteria – Content (continued) Does the page appear to be useful for its stated purpose? What other sites are linked? Use link URL to find out who has linked to a particular web site. . 1.02 Authenticating Content
Truth or Fiction? Visit these sites: http://home.inreach.com/kumbach/velcro.html http://zapatopi.net/treeoctopus/ http://www.thedogisland.com/ 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content
What’s next? We will validate some websites! 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content