Download presentation
Presentation is loading. Please wait.
Published byJulian McCarthy Modified over 9 years ago
1
© 2005 Prentice-Hall, Inc.1 Practical Computing by Lynn Hogan
2
© 2005 Prentice-Hall, Inc.2 Practical Computing Chapter 7 Working with the Internet
3
© 2005 Prentice-Hall, Inc.3 Downloading Downloadable possibilities: Screen savers Backgrounds Games Clipart Virus protection Productivity software Share files
4
© 2005 Prentice-Hall, Inc.4 Two Types of Files to Download Program files Often trial versions are downloadable Must install after downloaded Data files For example: This file that goes with the textbook Pictures from friends A worksheet from a colleague Don’t need to install but often need the software the data file was created in
5
© 2005 Prentice-Hall, Inc.5 Suggestions for Downloading Create a folder for downloaded files Often difficult to locate Saving them to one folder makes it easier Pay attention to download prompts Save instead of open Scan for viruses Check the program or data file for problems Move file to more appropriate folder if it is something usable
6
© 2005 Prentice-Hall, Inc.6 Downloads Available Microsoft web page downloads ZDNet downloads Download.com
7
© 2005 Prentice-Hall, Inc.7 Careful When Downloading Antivirus software Can scan all incoming and outgoing files Needs regular updates since new viruses are continuously created Firewall Software that monitors requests to and from your computer while online Maintains privacy Software available
8
© 2005 Prentice-Hall, Inc.8 Uploading Process of sending a file from your computer to another computer or server For example: This file was uploaded to Prentice-Hall’s web site from the creator’s PC FTP File Transfer Protocol Easy to transfer files from a PC to an online server
9
© 2005 Prentice-Hall, Inc.9 Copying from the Internet Be mindful of copyright issues Same as for printed documents When copying Select exactly what you want to copy and possibly save Document goes to clipboard, ready to paste Copy Ctrl+C Cut Ctrl+X Paste Ctrl+V
10
© 2005 Prentice-Hall, Inc.10 Clipart from the Internet Clipart Can be copied and pasted Can be saved to disk for later use Copyright issues Many free clipart Web sites http://www.freeclipart.com/ http://www.free-graphics.com/ Right-click for pop-up menu and Save Suggestion: Create separate folder for clipart, possibly with subfolders Thumbnail view helpful to view graphics
11
© 2005 Prentice-Hall, Inc.11 Examples of Downloadable Clipart URL Search item: soccer Download area
12
© 2005 Prentice-Hall, Inc.12 Plug-Ins Special program designed to work with multimedia files Audio, visual, or animation RealPlayer QuickTime Acrobat Reader Access and download Plug-ins when you access a file on a web page that makes it necessary
13
© 2005 Prentice-Hall, Inc.13 Plug-Ins Access to these files requires a plug-ins - may already be installed on your computer or may need to download
14
© 2005 Prentice-Hall, Inc.14 Adobe Adobe products Adobe Acrobat download is free
15
© 2005 Prentice-Hall, Inc.15 Privacy and Security A concern? You bet!
16
© 2005 Prentice-Hall, Inc.16 Viruses Maliciously created to do damage to other computers or annoy the owner Usually infected through Sharing disks or CDs Downloads E-mail attachments
17
© 2005 Prentice-Hall, Inc.17 Types of Viruses Beware! Macro virus Most common virus Often contained as a macro in Word or Excel Worm Usually through e-mail attachment Locates address book and sends infected file to everyone Quickly replicated Trojan horse Appears harmless Hidden within an downloaded application Logic bombs Time bombs Web applet Newest type Triggered when infected web page is accessed
18
© 2005 Prentice-Hall, Inc.18 How to Stay Healthy (Don’t Contract a Virus) Buy or download a trial version of antivirus program Install and use it, too! Update regularly Often can update automatically Configure software to scan Floppies, CDs, and DVDs Downloads before installing E-mail attachments Configure to run at startup Run a full system scan weekly Make regular backups
19
© 2005 Prentice-Hall, Inc.19 How Does a Virus Act? Programs take longer to load Hard disk constantly runs out of free space Floppy and hard drives run when not in use Strange sounds or beeping noises New files suddenly appear Files with strange names Program sizes change and may act odd
20
© 2005 Prentice-Hall, Inc.20 How to Get Rid of a Virus Run the antivirus software Can clean it If not, will quarantine the file Can delete quarantined files Popular antivirus programs Norton Antivirus McAfee VirusScan
21
© 2005 Prentice-Hall, Inc.21 Norton and McAfee Norton’s downloads
22
© 2005 Prentice-Hall, Inc.22 Firewalls When online, computer is visible and vulnerable Firewall software to protect Gatekeeper controlling Internet travel Initial Internet activity must receive confirmation from the user Activity recorded in database for later reference Popular programs Norton and McAfee Zone Alarm
23
© 2005 Prentice-Hall, Inc.23 Firewall Software Examples of Norton’s firewall products
24
© 2005 Prentice-Hall, Inc.24 Adware and Spyware Adware Ads embedded in free downloaded software May redirect your home page Feeds advertising to your monitor Spyware Included in free downloads Reports online activity to an advertiser’s web site for storage and analysis as a “record” Your “record” can be sold to others Software available to eliminate adware and spyware: http://spybot.eon.net.au http://www.lavasoftusa.com
25
© 2005 Prentice-Hall, Inc.25 Cookies Small files written to hard drive by visited web site Can track consumer demographics Used by ad agencies Can be helpful But data can be sold Sites you visit, length of time, how often you return Have you noticed that pop-up ads are usually relevant to your activity? When you return to a site, your name pops up
26
© 2005 Prentice-Hall, Inc.26 Cookies Folder and Files Cookies folder - saved on C: in Documents and Settings Cookies files saved by web sites to the hard disk - a total of 376 files
27
© 2005 Prentice-Hall, Inc.27 Digital Signatures Used to authenticate your agreement with what is written or promised Signature for electronic documents Advancement for online business and transactions For example: Digital signatures can be used to verify financial aid papers from FAFSA – no paper necessary
28
© 2005 Prentice-Hall, Inc.28 Don’t Forget Downloads available of programs and data files Several steps Possibly most importantly is saving to an identifiable folder Can download and save or simply copy and paste (clipart, for example) Can print small portions instead of full pages
29
© 2005 Prentice-Hall, Inc.29 Don’t Forget Viruses are maliciously created to destroy computers, files, or drives, or just annoy users Antivirus software helps protect computer Firewalls prohibit unauthorized access Be concerned with threats to privacy and security Take precautions
30
© 2005 Prentice-Hall, Inc.30 Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.