SlideShare una empresa de Scribd logo
1 de 34
The Internet, The Web, and Electronic Commerce Chapter 2
Competencies  (1 of 2) ,[object Object],[object Object],[object Object],Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
[object Object],[object Object],[object Object],Competencies   (2 of 2) Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
[object Object],[object Object],[object Object],Introduction Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
[object Object],[object Object],[object Object],[object Object],[object Object],The Internet and the Web Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
Common Internet Uses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Internet Access Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Browsers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
URLs ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
More on Browsers ,[object Object],[object Object],[object Object],[object Object],Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communication Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
E-Mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
E-Mail Address Example Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
Spam  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
Instant Messaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
Social Networking ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Search Tools Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
Search Engines ,[object Object],[object Object],[object Object],[object Object],Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Metasearch Engines Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
Specialized Search Engines 1- Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
Content Evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1- Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Electronic Commerce Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
[object Object],[object Object],Business to Business Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
Business to Consumer ,[object Object],[object Object],[object Object],[object Object],[object Object],Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
Consumer to Consumer Web Auctions ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2- Return
Security  ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Web Utilities Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
Plug-Ins Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
Filters Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
Internet Security Suites ,[object Object],[object Object],[object Object],Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Careers In IT -  Webmasters ,[object Object],[object Object],[object Object],1- Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
[object Object],[object Object],[object Object],[object Object],A Look to the Future Homes of Tomorrow Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
[object Object],[object Object],[object Object],Discussion Questions  (Page 1 of 2) 1- Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-
[object Object],[object Object],Discussion Questions  (Page 2 of 2) Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. 2-

Más contenido relacionado

La actualidad más candente

La actualidad más candente (17)

The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 
Internet
InternetInternet
Internet
 
website, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommercewebsite, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommerce
 
Tg05
Tg05Tg05
Tg05
 
unit-5 (2).pdf
unit-5 (2).pdfunit-5 (2).pdf
unit-5 (2).pdf
 
Internet
InternetInternet
Internet
 
The internet
The internetThe internet
The internet
 
20 internet terms
20 internet terms20 internet terms
20 internet terms
 
Advantage And disadvantage of internet ! BATRA COMPUTER CENTRE
Advantage And disadvantage of internet ! BATRA COMPUTER CENTREAdvantage And disadvantage of internet ! BATRA COMPUTER CENTRE
Advantage And disadvantage of internet ! BATRA COMPUTER CENTRE
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
Internet.
Internet.Internet.
Internet.
 
O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2
 
Introduction to Internet By Anamika
Introduction to Internet By AnamikaIntroduction to Internet By Anamika
Introduction to Internet By Anamika
 
Intrenet and its uses
Intrenet and its usesIntrenet and its uses
Intrenet and its uses
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentials
 
Networking technology
Networking technologyNetworking technology
Networking technology
 

Destacado

Destacado (8)

Tecnologopercaso november 2012 novembre
Tecnologopercaso november 2012 novembreTecnologopercaso november 2012 novembre
Tecnologopercaso november 2012 novembre
 
Tecnologopercaso june 2012 giugno
Tecnologopercaso june 2012 giugnoTecnologopercaso june 2012 giugno
Tecnologopercaso june 2012 giugno
 
BCI Supply Chain Resilience 2012
BCI Supply Chain Resilience 2012BCI Supply Chain Resilience 2012
BCI Supply Chain Resilience 2012
 
Freenetlinks
FreenetlinksFreenetlinks
Freenetlinks
 
20161101 tpcmag november 2016
20161101 tpcmag november 201620161101 tpcmag november 2016
20161101 tpcmag november 2016
 
Man-Made Nuclear Holocaust
Man-Made Nuclear HolocaustMan-Made Nuclear Holocaust
Man-Made Nuclear Holocaust
 
Airframer cat38
Airframer cat38Airframer cat38
Airframer cat38
 
20170201 tpcmag feb2017
20170201 tpcmag feb201720170201 tpcmag feb2017
20170201 tpcmag feb2017
 

Similar a O Leary2010 Comp Ppt Ch02 Rev

Similar a O Leary2010 Comp Ppt Ch02 Rev (20)

Using Information Technology
Using Information TechnologyUsing Information Technology
Using Information Technology
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
13134001.ppt
13134001.ppt13134001.ppt
13134001.ppt
 
INTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETINTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNET
 
PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2
 
Using Information Technology Ch 1
Using Information Technology Ch 1Using Information Technology Ch 1
Using Information Technology Ch 1
 
Going Online
Going OnlineGoing Online
Going Online
 
Going Online
Going OnlineGoing Online
Going Online
 
Internet.ppt
Internet.pptInternet.ppt
Internet.ppt
 
E_commerce_chap_2.pptx
E_commerce_chap_2.pptxE_commerce_chap_2.pptx
E_commerce_chap_2.pptx
 
Why learn about the internet 7
Why learn about the internet 7Why learn about the internet 7
Why learn about the internet 7
 
PTI - Using Information Technology
PTI - Using Information TechnologyPTI - Using Information Technology
PTI - Using Information Technology
 
Common services of Internet .docx
Common services of Internet        .docxCommon services of Internet        .docx
Common services of Internet .docx
 
The global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docxThe global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docx
 
Internet Websites.pptx DR.J.KUMAR
Internet Websites.pptx DR.J.KUMARInternet Websites.pptx DR.J.KUMAR
Internet Websites.pptx DR.J.KUMAR
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
W 11 internet & www
W 11 internet & wwwW 11 internet & www
W 11 internet & www
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Internet
InternetInternet
Internet
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
 

Último

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Último (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

O Leary2010 Comp Ppt Ch02 Rev

Notas del editor

  1. At the end of this chapter you should be able to: 1 Discuss the origins of the Internet and the Web. 2 Describe how to access the Web using providers and browsers. 3 Discuss Internet communications, including email, instant messaging, and social networking. 4 Describe search tools, including search engines and metasearch engines. 5 Discuss electronic commerce, including B2C, C2C, B2B, and security issues. 6 Describe these Web utilities: Web-based application, FTP, plug-ins, and Filters.
  2. Most developed network system currently in use; connects people all over the world Originally started in 1969 when US funded a research project (ARPANET—Advanced Research Project Agency Network) CERN – Center for European Nuclear Research World Wide Web (Web) is a part of the Internet – not the Internet; introduced in 1992 by consortium in Switzerland. Originally started as research and text-based network to exchange research ideas from university to university Developed into a network of networks One of the most powerful tools of the 21 st century Internet & Web further clarified Internet is the actual physical network comprised of wires, cables (Key Term), & satellites Being connected to the network is often referred to as being online (Key Term) The Web is a multimedia interface to resources available on the internet
  3. Most common Internet applications Communicating - sending e-mail and discussion group participation You can chat live with others Ask students what chat software they use Shopping – fastest-growing applications Searching - using virtual libraries Entertainment – music downloads; integration of TV and PC Education or e-learning (Key Term) You can take classes on almost any subject (Key Term) Replace with new Figure 2-18. Replace with new Figure 2-23. New screen capture.
  4. The common way to access the Internet is through a provider or host computer Providers - already connected to the Internet -- furnish a pathway for other users Typical providers include: Colleges and universities – usually “free” Internet service providers ( ISP ) (Key Term)can be local (regional) or national Ask students to identify various ISPs used in their environment Types of providers National – like AOL Regional – smaller service area Wireless No telephone lines used Provide connection through wireless modems (Key Term) Client-server network is comprised of users that are connected to a ISP via a variety of connecting technologies (dial-up (Key Term), telephone connections, wireless modems, DSLs (Key Term), etc…) The users computer is the client that requests services from the provider’s computer or server
  5. Browsers allow you to search or surf (Key Term) the Web Navigate, search for information and communicate using the Web Use URL (uniform resource locator) (Key Term) to connect to other resources
  6. Two parts to URL: protocol (Key Term), rules for exchanging data between computers (usually http://); domain name (Key Term) also known as a top-level domain (Key Term) or server where the resource is located (www.mtv.com)
  7. Browser is software that allows users to navigate the Web and read the multimedia formatted pages Connect to Web sites using URL addresses (uniform resource locator) Document is sent to computer usually coded in HTML (Hypertext Markup Language) (Key Term) or some variation Interprets the HTML codes displaying page May contain Hyperlinks (Key Term) -- allow users to quickly connect to other pages or Web sites Graphics Text Web server– the computer that stores and shares graphics, test, audio & video clip files Web pages contain links (Key Term) to programs called applets (Key Term) These are special programs written in a programming language called Java (Key Term) These programs can be quickly downloaded and run by most browsers
  8. Communication is the most popular Internet activity Types of communications: Email (Key Term) Instant Messaging (Key Term) Social Networking (Key Term)
  9. E-mail or electronic mail (Key Term) Transmission of electronic messages over the Internet Has three basic parts: header (Key Term), message (Key Term), and signature line (Key Term) Header (Key Term) Address (Key Term) Subject (Key Term) – very important to include this in a message Attachments (Key Term)
  10. Internet uses the domain name system (DNS), which gives names and numbers to people and computers Address (Key Term) has two parts User name - identifies unique user or computer in the domain Domain name (Key Term) - references a specific organization Top-level domain code identification includes geographical location or organizational identification .com = commercial .edu = education and research .org = organizations (usually non-profit) .net = major network centers (usually easier to access than commercial) .gov = government
  11. Spam (Key Term) – unsolicited e-mail Distraction, Nuisance Computer viruses (Key Term) can also be attached to spam Spam blockers (Key Term) use a variety of different approaches to identify and eliminate spam CAN-SPAM Act requires that every marketing related email provide an opt-out option Tips to blocking spam: Choose a complex address Keep a low profile Don’t ever respond to spam Use ez-mail filter options Use anti-spam
  12. Instant Messaging (Key Term) Extension of email that allows two or more people to contact each other via direct, live communication To use instant message, specify list of friends (Key Term) and register with an instant messaging server Some services include video and file-sharing Different services do not always play well together. Universal instant messenger (Key Word) programs are being developed (i.e. Gaim, Odigo, Trilogy), to overcome this limitation. Direct students to p. 35 for table on Spam Blocker(s)
  13. Social Networking (Key Term) One of the fastest growing uses of the Internet Connecting individuals to one another Three basic categories Reunite – member databases used for finding long lost friends (Classmates Online and Facebook) Friend of a friend – connecting friends of friends via profile information (Friendster and MySpace) Common interest – connecting those with common interests or hobbies Consider carefully the information you are disclosing when joining social networking sites.
  14. Specialized programs that assist you in locating information on the Web and the Internet Search services (Key Term) help you locate information; they maintain the database that helps you get where you want Special programs called spiders (Key Term) continually look for information and updated services Search engines (Key Term) – assist you to locate information Use keyword search (Key Term); know “rules” i.e. use + or quotes to look for phrases rather than individual words Use directory search (Key Term) – list of categories or topics; also known as index search (Key Term) Examples AOL Ask Jeeves Google MSN Search Yahoo! Metasearch engines (Key Term) – programs that automatically submit your search request to several search engines simultaneously Specialized search engines (Key Term) - Programs that focus on subject specific Web sites
  15. Keyword search (Key Term) – enter a keyword or a phrase reflecting the information you want Returns a number of hits (Key Term) Each hit includes a hyperlink Directory search (Key Term) Known as an index search Select a category or topic that fits the information you want Note: a recent study by the NEC Research Institute found that any one search engine includes only a fraction of the informational sources on the Web. Therefore, it is good to use more than one search engine when researching important topics.
  16. Programs that automatically submit your search request to several engines simultaneously The engine receives the results, eliminates duplicates, orders hits, and then provides the edited list to you
  17. Programs that focus on subject specific Web sites Specialized sites can potentially save you time by narrowing your search
  18. Anyone can publish to the web Not all Web information has been subjected to peer review or submission guidelines Ways to evaluate accuracy of Web information: Authority – Is author an expert in the subject area? Is the site an official site for the information presented, or, is it an individual person’s Web site? Accuracy – Is the information subject to critical review prior to posting? Does the site provide a means to report errors to the author? Objectivity – Is the information factual, or does the author have a bias? Currency – Is the information current? Is there a “published on” date or “updated on” date indicated?
  19. Electronic commerce is buying and selling over the Internet Three basic types of electronic commerce: business to consumer; consumer to consumer; and business to business B2C (Key Term) Involves the sale of a product or service to the general public or end users C2C (Key Term) Involves individuals selling to individuals B2B (Key Term) Involves the sale of a product or service from one business to another
  20. B2C is fastest growing type of e-commerce Three types Online banking (Key Term) Becoming a standard feature of banking institutions Customers use standard browser to perform many banking operations Financial trading Online stock trading allows investors to research, buy, and sell stocks and bonds over the Internet Shopping Buying and selling of consumer goods via the Internet Sites exist that provide support for consumers looking to compare products and locate bargains
  21. Recent trend in C2C e-commerce is Web auctions (Key Term); similar to traditional auctions – no one sees each other Auction house sites (Key Term) – merchandise presented for auction Person-person auction sites (Key Term) – more like flea markets; forum for buyers and sellers to gather Similar to Web traditional auctions Buyers and sellers seldom meet face-to-face Ask the students if they have ever used E-bay Example auction sites include Amazon, Bidz, eBay, Sotheby’s, and Yahoo!
  22. A challenge is the payment for goods Should be reliable, secure, and fast Electronic payment -- easy, secure payment method Checks -- slowest and least convenient Credit cards -- easier to work with, somewhat vulnerable to theft Criminals known as carders (Key Term) specialize in stealing, trading, and using stolen credit cards over the internet Digital cash (Key Term) Purchased from third party (usually a special bank); more secure than credit cards Providers include Ecash, Google, Internet Cash, and PayPal
  23. Web-based applications (Key Term) are offered by Web-based services (Key Term) (often free) that provide Internet access to programs with capabilities similar to Microsoft Word, Excel, and PowerPoint. FTP transfers files; file transfer protocol (Key Term) ; Internet service for file transfer Downloading (Key Term) - transmitting files to your computer Uploading (Key Term) - transmitting files from your computer to another computer Plug-ins (Key Term) -- automatically loaded by and work with your browser; Acrobat Reader; Cosmos from Silicon Graphics (3-d displays); Media Player; QuickTime from Apple; RealPlayer; and Shockwave from Macromedia Filters (Key Term) – block access to specified sites; set time limits Internet Security Suites (Key Term) – collection of utility programs designed to maintain your security and privacy while you are on the Web
  24. Internet Security Suites (Key Term) control… Spam (Key Term) Protect against computer viruses (Key Term) Provide Filters (Key Term)
  25. Webmasters (Key Term) can expect to earn a salary of $48,000 to $73,000 Position is relatively new in many corporations and tends to have fluid responsibilities Experience in this field could lead to managerial opportunities
  26. Downsides example: Infiltration of Internet viruses and spyware may enable your every move at home to be broadcast over the Internet
  27. Have students turn to the end of Chapter 2 in their textbooks to view the same “Open-Ended” questions/statements
  28. Have students turn to the end of Chapter 2 in their textbooks to view the same “Open-Ended” questions/statements