Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2005 Prentice-Hall, Inc.1 Practical Computing by Lynn Hogan.

Similar presentations


Presentation on theme: "© 2005 Prentice-Hall, Inc.1 Practical Computing by Lynn Hogan."— Presentation transcript:

1 © 2005 Prentice-Hall, Inc.1 Practical Computing by Lynn Hogan

2 © 2005 Prentice-Hall, Inc.2 Practical Computing Chapter 7 Working with the Internet

3 © 2005 Prentice-Hall, Inc.3 Downloading Downloadable possibilities: Screen savers Backgrounds Games Clipart Virus protection Productivity software Share files

4 © 2005 Prentice-Hall, Inc.4 Two Types of Files to Download Program files Often trial versions are downloadable Must install after downloaded Data files For example: This file that goes with the textbook Pictures from friends A worksheet from a colleague Don’t need to install but often need the software the data file was created in

5 © 2005 Prentice-Hall, Inc.5 Suggestions for Downloading Create a folder for downloaded files Often difficult to locate Saving them to one folder makes it easier Pay attention to download prompts Save instead of open Scan for viruses Check the program or data file for problems Move file to more appropriate folder if it is something usable

6 © 2005 Prentice-Hall, Inc.6 Downloads Available Microsoft web page downloads ZDNet downloads Download.com

7 © 2005 Prentice-Hall, Inc.7 Careful When Downloading Antivirus software Can scan all incoming and outgoing files Needs regular updates since new viruses are continuously created Firewall Software that monitors requests to and from your computer while online Maintains privacy Software available

8 © 2005 Prentice-Hall, Inc.8 Uploading Process of sending a file from your computer to another computer or server For example: This file was uploaded to Prentice-Hall’s web site from the creator’s PC FTP File Transfer Protocol Easy to transfer files from a PC to an online server

9 © 2005 Prentice-Hall, Inc.9 Copying from the Internet Be mindful of copyright issues Same as for printed documents When copying Select exactly what you want to copy and possibly save Document goes to clipboard, ready to paste Copy Ctrl+C Cut Ctrl+X Paste Ctrl+V

10 © 2005 Prentice-Hall, Inc.10 Clipart from the Internet Clipart Can be copied and pasted Can be saved to disk for later use Copyright issues Many free clipart Web sites http://www.freeclipart.com/ http://www.free-graphics.com/ Right-click for pop-up menu and Save Suggestion: Create separate folder for clipart, possibly with subfolders Thumbnail view helpful to view graphics

11 © 2005 Prentice-Hall, Inc.11 Examples of Downloadable Clipart URL Search item: soccer Download area

12 © 2005 Prentice-Hall, Inc.12 Plug-Ins Special program designed to work with multimedia files Audio, visual, or animation RealPlayer QuickTime Acrobat Reader Access and download Plug-ins when you access a file on a web page that makes it necessary

13 © 2005 Prentice-Hall, Inc.13 Plug-Ins Access to these files requires a plug-ins - may already be installed on your computer or may need to download

14 © 2005 Prentice-Hall, Inc.14 Adobe Adobe products Adobe Acrobat download is free

15 © 2005 Prentice-Hall, Inc.15 Privacy and Security A concern? You bet!

16 © 2005 Prentice-Hall, Inc.16 Viruses Maliciously created to do damage to other computers or annoy the owner Usually infected through Sharing disks or CDs Downloads E-mail attachments

17 © 2005 Prentice-Hall, Inc.17 Types of Viruses Beware! Macro virus Most common virus Often contained as a macro in Word or Excel Worm Usually through e-mail attachment Locates address book and sends infected file to everyone Quickly replicated Trojan horse Appears harmless Hidden within an downloaded application Logic bombs Time bombs Web applet Newest type Triggered when infected web page is accessed

18 © 2005 Prentice-Hall, Inc.18 How to Stay Healthy (Don’t Contract a Virus) Buy or download a trial version of antivirus program Install and use it, too! Update regularly Often can update automatically Configure software to scan Floppies, CDs, and DVDs Downloads before installing E-mail attachments Configure to run at startup Run a full system scan weekly Make regular backups

19 © 2005 Prentice-Hall, Inc.19 How Does a Virus Act? Programs take longer to load Hard disk constantly runs out of free space Floppy and hard drives run when not in use Strange sounds or beeping noises New files suddenly appear Files with strange names Program sizes change and may act odd

20 © 2005 Prentice-Hall, Inc.20 How to Get Rid of a Virus Run the antivirus software Can clean it If not, will quarantine the file Can delete quarantined files Popular antivirus programs Norton Antivirus McAfee VirusScan

21 © 2005 Prentice-Hall, Inc.21 Norton and McAfee Norton’s downloads

22 © 2005 Prentice-Hall, Inc.22 Firewalls When online, computer is visible and vulnerable Firewall software to protect Gatekeeper controlling Internet travel Initial Internet activity must receive confirmation from the user Activity recorded in database for later reference Popular programs Norton and McAfee Zone Alarm

23 © 2005 Prentice-Hall, Inc.23 Firewall Software Examples of Norton’s firewall products

24 © 2005 Prentice-Hall, Inc.24 Adware and Spyware Adware Ads embedded in free downloaded software May redirect your home page Feeds advertising to your monitor Spyware Included in free downloads Reports online activity to an advertiser’s web site for storage and analysis as a “record” Your “record” can be sold to others Software available to eliminate adware and spyware: http://spybot.eon.net.au http://www.lavasoftusa.com

25 © 2005 Prentice-Hall, Inc.25 Cookies Small files written to hard drive by visited web site Can track consumer demographics Used by ad agencies Can be helpful But data can be sold Sites you visit, length of time, how often you return Have you noticed that pop-up ads are usually relevant to your activity? When you return to a site, your name pops up

26 © 2005 Prentice-Hall, Inc.26 Cookies Folder and Files Cookies folder - saved on C: in Documents and Settings Cookies files saved by web sites to the hard disk - a total of 376 files

27 © 2005 Prentice-Hall, Inc.27 Digital Signatures Used to authenticate your agreement with what is written or promised Signature for electronic documents Advancement for online business and transactions For example: Digital signatures can be used to verify financial aid papers from FAFSA – no paper necessary

28 © 2005 Prentice-Hall, Inc.28 Don’t Forget Downloads available of programs and data files Several steps Possibly most importantly is saving to an identifiable folder Can download and save or simply copy and paste (clipart, for example) Can print small portions instead of full pages

29 © 2005 Prentice-Hall, Inc.29 Don’t Forget Viruses are maliciously created to destroy computers, files, or drives, or just annoy users Antivirus software helps protect computer Firewalls prohibit unauthorized access Be concerned with threats to privacy and security Take precautions

30 © 2005 Prentice-Hall, Inc.30 Questions?


Download ppt "© 2005 Prentice-Hall, Inc.1 Practical Computing by Lynn Hogan."

Similar presentations


Ads by Google