Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 1 Let’s Get Online, Already! Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-2 Online Activity - Many activities involve “Seeking.

Similar presentations


Presentation on theme: "Chapter 1 Let’s Get Online, Already! Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-2 Online Activity - Many activities involve “Seeking."— Presentation transcript:

1

2 Chapter 1 Let’s Get Online, Already!

3 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-2 Online Activity - Many activities involve “Seeking Information”

4 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-3 Connecting to the Internet Methods – Internet Service Provider (ISP) – Local Area Network (LAN) – Wide Area Network (WAN) – Telecommunications and Fiber Optic Lines A company that provides a home or business access to the internet A collection of computers and resources, such as printers and shared network drives, spread out over a localized area. A collection of computers and resources, such as printers and shared network drives to store files, spread out over a wide area.

5 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-4 Connecting to the Internet Materials – To Update need Random Access Memory Hard drive upgrade – Modem (Modulator/ demodulator) Fast computer memory that provides temporary storage required for programs to run. A device connecting a computer to a communications network by translating a signal such that it is suitable for a channel through which it must pass.

6 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-5 Connecting to the Internet ( Cont’d) What does Internet Service Include? – Email address – Ability to surf the web – Storage space – 24/7 Technical Support – Spam filter Unsolicited email or newsgroup postings

7 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-6 Data Travels In two directions – Downloading – Uploading Bandwidth is measured in – Kbps – Mbps – Gbps Data transmission from another computer over the Internet received by your computer Sending data transmissions from your computer to another computer on the Internet (Kilobits per Second) one-thousand bits per second, roughly 125 characters per second (Megabits per Second) one million bits per second, roughly 1250 characters per second (Gigabits per Second) one-billion bits per second, roughly 12,500 characters per second The data transmission rate over a network or the Internet

8 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-7 Dial-up Services 1.Traditional Dial-up Services 2.Broadband Services – Telephone DSL – Cable – Satellite 3. Wi-fi – Hotspots – Wardriving (Digital Subscriber Line) a high-speed telephone Internet connection (Wireless Fidelity) high-frequency wireless LAN Technique of driving around a city in a vehicle, with a notebook computer and antenna, detecting open WLANs Location where a wireless signal can be detected

9 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-8 Wireless at Home

10 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-9 ISPs for Travelers ISP resource http://www.thelist.comhttp://www.thelist.com Look for national dial-up service Hotels Cyber cafes

11 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-10 Connecting to Work Local Area Networks (LAN) – Gateway – Ethernet – Protocol Intranets VPN – VPN Dial-up Network (VPDN) – Desktop client software – Network Access Server (NAS) – Tunneling A special-purpose computer used by ISPs, which connects to a powerful leased Internet line, such as T3 or OC48 A method of networking computers using copper cabling A system of communicating data from one location to another Connects user and VPN (Vitrual Private Network) A LAN or series of of LANS that are secured behind a firewall or gateway, and have restrictions for user connections Way to connect to VPN at work Software to connect to NAS An internal Internet for employees to access information about a company; not meant for public consumption Employing a protocol to connect to a VPN

12 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-11 Acceptable Use Policies and Privacy Policies Transmited information- Who is responsible? Acceptable Use Policy (AUP) Right to suspend service Privacy Policy A legal document, written to protect ISPs, corporations and educational institutions from unlawful use of its service, and in doing so, outlines prohibited and acceptable uses of the service, and possible consequences of misuse. Document that outlines an Internet Service Provider’s policy for protecting your personal information

13 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-12 Hand-Held and Other Devices Internet without a computer? Cell phones PDAs ex: Blackberry

14 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-13 Internet Software In order to Surf the Web… – Web Browser – URL’s Protocol HTML http https mailto: ftp:// Figure of speech: describes browsing the Web Software used to download and view Web pages (Uniform or Universal Resource Locator) Web page address System of communicating data from one location to another (HyperText Markup Language) language used to construct Web pages (HyperText Transfer Protocol) protocol governing exchange of files on the Web (HyperText Transfer Protocol Secure) specific protocol set employed when a page of a Web site must be encrypted for secure transfer Protocol for sending mail (File Transfer Protocol) protocol for sending files

15 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-14 Web Browser Basics http://www.aw.com http://www.yahoo.com Learn more…

16 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-15 Other Web Browser Basics Temporary Files (Cache) Clearing the Cache – Temporary Files Missing Page Errors (“404 Error”) Bookmarks and Favorites History and Clearing the History Temporary files stored on the hard drive Term used by Internet Explorer to describe the files in the cache

17 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-16 More Browser Basics Browser Options and Features

18 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-17 More Browser Basics Setting the Home Page Advertisements on the Web click-through rates, pop-ups, pop-unders, pop-up blocker Email Clients Client software that works in conjunction with a server

19 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-18 Security Risks Virus Trojan Horse Worm Adware Spyware Browser Hijacker Web Bug mDDos Small program that can that causes destruction ranging from simple annoyances to rendering the computer inoperable Small program designed to gather information such as passwords to send to the person who wrote it Program designed to copy itself and send itself to other computers on the network (worms may contain viruses) Advertising-supported software Any computer program that takes advantage of your Internet connection and tracks your internet use A program that is designed to change the settings on your Web browser: home page hijacker, browser helper objects A small invisible image on a Web page that is designed to track the Web pages you view as you surf other pages that also contain Web bugs Mini Distributed Denial of Service Attacks

20 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-19 Security Measures 1.Choose a good ISP 2.Keep your computer up to date 3.Anti-virus software 4.Spyware removal software 5.Install fireware software or use in a router Providing Credit Card and Other Sensitive Information Encryption: Encryption Symbol

21 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-20 Downloading Software (http://www.download.com) (http://www.tucows.com)http://www.download.comhttp://www.tucows.com Commercial Software Shareware Freeware Open Source Software that is purchased, either online or from a retail outlet Software that may be freely distributed and is essentially on a trial basis Software that is completely free and may be freely distributed The source code, or original program, is made available and others are invited to help with the development and submit improvements, becoming part of the group who is developing it. Open source can also mean that the software use requires a paid license, and the source code is available.

22 Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-21 What Happens When You Connect? Internet Protocol (IP) Address Domain Name System (DNS) – Host Troubleshooting 1.Pay attention to each character 2.Click stop then reload 3.Try loading a different page A numeric identifier for a computer or peripheral device connected to a network Computer connected directly to the internet


Download ppt "Chapter 1 Let’s Get Online, Already! Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 1-2 Online Activity - Many activities involve “Seeking."

Similar presentations


Ads by Google