SlideShare una empresa de Scribd logo
1 de 34
Chapter 2 The Internet, The Web, and Electronic Commerce
Competencies  (1 of 2) ,[object Object],[object Object],[object Object],Page 28
Competencies   (2 of 2) ,[object Object],[object Object],[object Object],Page 28
Introduction ,[object Object],[object Object],[object Object],Page 29
The Internet and the Web ,[object Object],[object Object],[object Object],[object Object],[object Object],Page 30
Common Internet Uses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page 30
Internet Access Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],Page 31
Browsers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page 31
URLs ,[object Object],[object Object],[object Object],[object Object],[object Object],Page 32
More on Browsers ,[object Object],[object Object],[object Object],[object Object],Page 33
Communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page 33
E-Mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page 34 Return
E-Mail Address Example Page 34 Return
Spam  Page 35 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Return
Instant Messaging Page 35 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Return
Social Networking Page 36 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Search Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page 37
Search Engines ,[object Object],[object Object],[object Object],[object Object],Page 40 Return
Metasearch Engines Page 41 Return www.webmetasearch.com Web Meta Search www.search.com Search   www.metacrawler.com   MetaCrawler   www.ixquick.com   Ixquick   www.dogpile.com   Dogpile   Site   Metasearch
Specialized Search Engines Page 42 Return www.medsite.com Medicine www.lawcrawler.com Law www.historynet.com History www.infomat.com Fashion www.eco-web.com Environment Site Specialized Service
Content Evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page 42
Electronic Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page 42
Business to Business ,[object Object],[object Object],Page 43
Business to Consumer ,[object Object],[object Object],[object Object],[object Object],[object Object],Page 43 Return
Consumer to Consumer Web Auctions ,[object Object],[object Object],[object Object],[object Object],[object Object],Page 44
Security  ,[object Object],[object Object],[object Object],[object Object],[object Object],Page 44
Web Utilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page 46
Plug-Ins Page 48 Return www.adobe.com Shockwave www.service.real.com Real Player www.apple.com QuickTime www.microsoft.com Media Player www.adobe.com Acrobat Reader
Filters Page 47 Return www.safeeyes.com Safe Eyes Platinum www.netnanny.com Net Nanny www.softforyou.com IProtectYou Pro Web Filter  www.cybersitter.com Cybersitter www.cyberpartrol.com CyberPatrol
Internet Security Suites ,[object Object],[object Object],[object Object],Page 48
Careers In IT -  Webmasters ,[object Object],[object Object],[object Object],Page 49
A Look to the Future Homes of Tomorrow ,[object Object],[object Object],[object Object],[object Object],Page 50
[object Object],[object Object],[object Object],Discussion Questions  (Page 1 of 2) Page 57
[object Object],[object Object],Discussion Questions  (Page 2 of 2) Page 57

Más contenido relacionado

Destacado

Exp2003 exl ppt_02-continued
Exp2003 exl ppt_02-continuedExp2003 exl ppt_02-continued
Exp2003 exl ppt_02-continuedlonetree
 
Power Point Project 1 Continued
Power Point Project 1 ContinuedPower Point Project 1 Continued
Power Point Project 1 Continuedlonetree
 
Exp2003 exl ppt_03
Exp2003 exl ppt_03Exp2003 exl ppt_03
Exp2003 exl ppt_03lonetree
 
Exp2003 exl ppt_01
Exp2003 exl ppt_01Exp2003 exl ppt_01
Exp2003 exl ppt_01lonetree
 
Elevadores
ElevadoresElevadores
ElevadoresOdontt
 
Instrumental y material para realizar exodoncias
Instrumental y material para realizar exodonciasInstrumental y material para realizar exodoncias
Instrumental y material para realizar exodonciasFernando Santos
 
APA style guide powerpoint
APA style guide powerpointAPA style guide powerpoint
APA style guide powerpointGisele McDaniel
 

Destacado (7)

Exp2003 exl ppt_02-continued
Exp2003 exl ppt_02-continuedExp2003 exl ppt_02-continued
Exp2003 exl ppt_02-continued
 
Power Point Project 1 Continued
Power Point Project 1 ContinuedPower Point Project 1 Continued
Power Point Project 1 Continued
 
Exp2003 exl ppt_03
Exp2003 exl ppt_03Exp2003 exl ppt_03
Exp2003 exl ppt_03
 
Exp2003 exl ppt_01
Exp2003 exl ppt_01Exp2003 exl ppt_01
Exp2003 exl ppt_01
 
Elevadores
ElevadoresElevadores
Elevadores
 
Instrumental y material para realizar exodoncias
Instrumental y material para realizar exodonciasInstrumental y material para realizar exodoncias
Instrumental y material para realizar exodoncias
 
APA style guide powerpoint
APA style guide powerpointAPA style guide powerpoint
APA style guide powerpoint
 

Similar a O Leary2008 Ce Complete Chapter2

الوحدة الثانية :: مادة مهارات حاسوب
الوحدة الثانية :: مادة مهارات حاسوبالوحدة الثانية :: مادة مهارات حاسوب
الوحدة الثانية :: مادة مهارات حاسوبHossam Ashi
 
INTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETINTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETArvin Dey
 
Going Online
Going OnlineGoing Online
Going Onlinecocon5
 
internet concepts all
internet concepts allinternet concepts all
internet concepts allMSc CST
 
Internet and computer are your future
Internet and computer are your futureInternet and computer are your future
Internet and computer are your futureTallat Satti
 
Internet
InternetInternet
Internetjando19
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5惠子 李
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5惠子 李
 
Chapter 3 E Business
Chapter 3 E BusinessChapter 3 E Business
Chapter 3 E BusinessUMaine
 

Similar a O Leary2008 Ce Complete Chapter2 (20)

الوحدة الثانية :: مادة مهارات حاسوب
الوحدة الثانية :: مادة مهارات حاسوبالوحدة الثانية :: مادة مهارات حاسوب
الوحدة الثانية :: مادة مهارات حاسوب
 
INTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETINTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNET
 
TAMUC LO 2
TAMUC LO 2TAMUC LO 2
TAMUC LO 2
 
Uta005 lecture1
Uta005 lecture1Uta005 lecture1
Uta005 lecture1
 
Going Online
Going OnlineGoing Online
Going Online
 
Going Online
Going OnlineGoing Online
Going Online
 
Fa13 7718-ch3-kim
Fa13 7718-ch3-kimFa13 7718-ch3-kim
Fa13 7718-ch3-kim
 
Lesson 28
Lesson 28Lesson 28
Lesson 28
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
internet concepts all
internet concepts allinternet concepts all
internet concepts all
 
Internet and computer are your future
Internet and computer are your futureInternet and computer are your future
Internet and computer are your future
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
Internet research for HRD Profession
Internet research for HRD ProfessionInternet research for HRD Profession
Internet research for HRD Profession
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5
 
Internet research
Internet researchInternet research
Internet research
 
Chapter 3 E Business
Chapter 3 E BusinessChapter 3 E Business
Chapter 3 E Business
 

Más de lonetree

Exp2003 exl ppt_02
Exp2003 exl ppt_02Exp2003 exl ppt_02
Exp2003 exl ppt_02lonetree
 
Exp2003 exl ppt_04
Exp2003 exl ppt_04Exp2003 exl ppt_04
Exp2003 exl ppt_04lonetree
 
Concept Map Wert M
Concept Map Wert MConcept Map Wert M
Concept Map Wert Mlonetree
 
Power Point Project 4
Power Point Project 4Power Point Project 4
Power Point Project 4lonetree
 
Power Point Project 3
Power Point Project 3Power Point Project 3
Power Point Project 3lonetree
 
Power Point Project 2
Power Point Project 2Power Point Project 2
Power Point Project 2lonetree
 
Power Point Project 1
Power Point Project 1Power Point Project 1
Power Point Project 1lonetree
 
Power Point Project 4 Part2
Power Point Project 4 Part2Power Point Project 4 Part2
Power Point Project 4 Part2lonetree
 
Power Point Project 2 Continued
Power Point Project 2 ContinuedPower Point Project 2 Continued
Power Point Project 2 Continuedlonetree
 
Power Point Project 5
Power Point Project 5Power Point Project 5
Power Point Project 5lonetree
 
O Leary2008 Ce Complete Chapter8
O Leary2008 Ce Complete Chapter8O Leary2008 Ce Complete Chapter8
O Leary2008 Ce Complete Chapter8lonetree
 
O Leary2008 Ce Complete Chapter7
O Leary2008 Ce Complete Chapter7O Leary2008 Ce Complete Chapter7
O Leary2008 Ce Complete Chapter7lonetree
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01lonetree
 
Mutli Media Project
Mutli Media ProjectMutli Media Project
Mutli Media Projectlonetree
 
Innovation
InnovationInnovation
Innovationlonetree
 

Más de lonetree (15)

Exp2003 exl ppt_02
Exp2003 exl ppt_02Exp2003 exl ppt_02
Exp2003 exl ppt_02
 
Exp2003 exl ppt_04
Exp2003 exl ppt_04Exp2003 exl ppt_04
Exp2003 exl ppt_04
 
Concept Map Wert M
Concept Map Wert MConcept Map Wert M
Concept Map Wert M
 
Power Point Project 4
Power Point Project 4Power Point Project 4
Power Point Project 4
 
Power Point Project 3
Power Point Project 3Power Point Project 3
Power Point Project 3
 
Power Point Project 2
Power Point Project 2Power Point Project 2
Power Point Project 2
 
Power Point Project 1
Power Point Project 1Power Point Project 1
Power Point Project 1
 
Power Point Project 4 Part2
Power Point Project 4 Part2Power Point Project 4 Part2
Power Point Project 4 Part2
 
Power Point Project 2 Continued
Power Point Project 2 ContinuedPower Point Project 2 Continued
Power Point Project 2 Continued
 
Power Point Project 5
Power Point Project 5Power Point Project 5
Power Point Project 5
 
O Leary2008 Ce Complete Chapter8
O Leary2008 Ce Complete Chapter8O Leary2008 Ce Complete Chapter8
O Leary2008 Ce Complete Chapter8
 
O Leary2008 Ce Complete Chapter7
O Leary2008 Ce Complete Chapter7O Leary2008 Ce Complete Chapter7
O Leary2008 Ce Complete Chapter7
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01
 
Mutli Media Project
Mutli Media ProjectMutli Media Project
Mutli Media Project
 
Innovation
InnovationInnovation
Innovation
 

Último

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

O Leary2008 Ce Complete Chapter2

  • 1. Chapter 2 The Internet, The Web, and Electronic Commerce
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. E-Mail Address Example Page 34 Return
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Metasearch Engines Page 41 Return www.webmetasearch.com Web Meta Search www.search.com Search www.metacrawler.com MetaCrawler www.ixquick.com Ixquick www.dogpile.com Dogpile Site Metasearch
  • 20. Specialized Search Engines Page 42 Return www.medsite.com Medicine www.lawcrawler.com Law www.historynet.com History www.infomat.com Fashion www.eco-web.com Environment Site Specialized Service
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Plug-Ins Page 48 Return www.adobe.com Shockwave www.service.real.com Real Player www.apple.com QuickTime www.microsoft.com Media Player www.adobe.com Acrobat Reader
  • 29. Filters Page 47 Return www.safeeyes.com Safe Eyes Platinum www.netnanny.com Net Nanny www.softforyou.com IProtectYou Pro Web Filter www.cybersitter.com Cybersitter www.cyberpartrol.com CyberPatrol
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.

Notas del editor

  1. At the end of this chapter you should be able to: 1 Discuss the origins of the Internet and the Web. 2 Describe how to access the Web using providers and browsers. 3 Discuss Internet communications, including email, instant messaging, and social networking. 4 Describe search tools, including search engines and metasearch engines. 5 Discuss electronic commerce, including B2C, C2C, B2B, and security issues. 6 Describe these Web utilities: Web-based application, FTP, plug-ins, and filters.
  2. Most developed network system currently in use; connects people all over the world Originally started in 1969 when US funded a research project (ARPANET—Advanced Research Project Agency Network) CERN – Center for European Nuclear Research World Wide Web (Web) is a part of the Internet – not the Internet; introduced in 1992 by consortium in Switzerland. Originally started as research and text-based network to exchange research ideas from university to university Developed into a network of networks One of the most powerful tools of the 21 st century Internet & Web further clarified Internet is the actual physical network comprised of wires, cables (Key Term), & satellites Being connected to the network is often referred to as being online (Key Term) The Web is a multimedia interface to resources available on the internet
  3. Most common Internet applications Communicating - sending e-mail and discussion group participation You can chat live with others Ask students what chat software they use Shopping – fastest-growing applications Searching - using virtual libraries Entertainment – music downloads; integration of TV and PC Education or e-learning (Key Term) You can take classes on almost any subject (Key Term)
  4. The common way to access the Internet is through a provider or host computer Providers - already connected to the Internet -- furnish a pathway for other users Typical providers include: Colleges and universities – usually “free” Internet service providers ( ISP ) (Key Term)can be local (regional) or national Ask students to identify various ISPs used in their environment Types of providers National – like AOL Regional – smaller service area Wireless No telephone lines used Provide connection through wireless modems (Key Term) Client-server network is comprised of users that are connected to a ISP via a variety of connecting technologies (dial-up (Key Term), telephone connections, wireless modems, DSLs (Key Term), etc…) The users computer is the client that requests services from the provider’s computer or server
  5. Browsers allow you to search or surf (Key Term) the Web Navigate, search for information and communicate using the Web Use URL (uniform resource locator) (Key Term) to connect to other resources
  6. Two parts to URL: protocol (Key Term), rules for exchanging data between computers (usually http://); domain name (Key Term) also known as a top-level domain (Key Term) or server where the resource is located (www.mtv.com)
  7. Browser is software that allows users to navigate the Web and read the multimedia formatted pages Connect to Web sites using URL addresses (uniform resource locator) Document is sent to computer usually coded in HTML (Hypertext Markup Language) (Key Term) or some variation Interprets the HTML codes displaying page May contain Hyperlinks (Key Term) -- allow users to quickly connect to other pages or Web sites Graphics Text Web server– the computer that stores and shares graphics, test, audio & video clip files Web pages contain links (Key Term) to programs called applets (Key Term) These are special programs written in a programming language called Java (Key Term) These programs can be quickly downloaded and run by most browsers
  8. Communication is the most popular Internet activity Types of communications: Email (Key Term) Instant Messaging (Key Term) Social Networking (Key Term)
  9. E-mail or electronic mail (Key Term) Transmission of electronic messages over the Internet Has three basic parts: header (Key Term), message (Key Term), and signature line (Key Term) Header (Key Term) Address (Key Term) Subject (Key Term) – very important to include this in a message Attachments (Key Term)
  10. Internet uses the domain name system (DNS), which gives names and numbers to people and computers Address (Key Term) has two parts User name - identifies unique user or computer in the domain Domain name (Key Term) - references a specific organization Top-level domain code identification includes geographical location or organizational identification .com = commercial .edu = education and research .org = organizations (usually non-profit) .net = major network centers (usually easier to access than commercial) .gov = government
  11. Spam (Key Term) – unsolicited e-mail Distraction, Nuisance Computer viruses (Key Term) can also be attached to spam Spam blockers (Key Term) use a variety of different approaches to identify and eliminate spam CAN-SPAM Act requires that every marketing related email provide an opt-out option Tips to blocking spam: Choose a complex address Keep a low profile Don’t ever respond to spam Use ez-mail filter options Use anti-spam To learn how to block spam from your inbox, reference Making IT Work For You: Blocking Spam on pages 38 & 39
  12. Instant Messaging (Key Term) Extension of email that allows two or more people to contact each other via direct, live communication To use instant message, specify list of friends (Key Term) and register with an instant messaging server Some services include video and file-sharing Different services do not always play well together. Universal instant messenger (Key Word) programs are being developed (i.e. Gaim, Odigo, Trilogy), to overcome this limitation. Direct students to p. 36 for table on Spam Blocker(s)
  13. Social Networking (Key Term) One of the fastest growing uses of the Internet Connecting individuals to one another Three basic categories Reunite – member databases used for finding long lost friends (Classmates Online and Facebook) Friend of a friend – connecting friends of friends via profile information (Friendster and MySpace) Common interest – connecting those with common interests or hobbies Consider carefully the information you are disclosing when joining social networking sites.
  14. Specialized programs that assist you in locating information on the Web and the Internet Search services (Key Term) help you locate information; they maintain the database that helps you get where you want Special programs called spiders (Key Term) continually look for information and updated services Search engines (Key Term) – assist you to locate information Use keyword search (Key Term); know “rules” i.e. use + or quotes to look for phrases rather than individual words Use directory search (Key Term) – list of categories or topics; also known as index search (Key Term) Examples AOL Ask Jeeves Google MSN Search Yahoo! Metasearch engines (Key Term) – programs that automatically submit your search request to several search engines simultaneously Specialized search engines (Key Term) - Programs that focus on subject specific Web sites
  15. Keyword search (Key Term) – enter a keyword or a phrase reflecting the information you want Returns a number of hits (Key Term) Each hit includes a hyperlink Directory search (Key Term) Known as an index search Select a category or topic that fits the information you want Note: a recent study by the NEC Research Institute found that any one search engine includes only a fraction of the informational sources on the Web. Therefore, it is good to use more than one search engine when researching important topics.
  16. Programs that automatically submit your search request to several engines simultaneously The engine receives the results, eliminates duplicates, orders hits, and then provides the edited list to you
  17. Programs that focus on subject specific Web sites Specialized sites can potentially save you time by narrowing your search
  18. Anyone can publish to the web Not all Web information has been subjected to peer review or submission guidelines Ways to evaluate accuracy of Web information: Authority – Is author an expert in the subject area? Is the site an official site for the information presented, or, is it an individual person’s Web site? Accuracy – Is the information subject to critical review prior to posting? Does the site provide a means to report errors to the author? Objectivity – Is the information factual, or does the author have a bias? Currency – Is the information current? Is there a “published on” date or “updated on” date indicated?
  19. Electronic commerce is buying and selling over the Internet Three basic types of electronic commerce: business to consumer; consumer to consumer; and business to business B2C (Key Term) Involves the sale of a product or service to the general public or end users C2C (Key Term) Involves individuals selling to individuals B2B (Key Term) Involves the sale of a product or service from one business to another
  20. B2C is fastest growing type of e-commerce Three types Online banking (Key Term) Becoming a standard feature of banking institutions Customers use standard browser to perform many banking operations Financial trading Online stock trading allows investors to research, buy, and sell stocks and bonds over the Internet Shopping Buying and selling of consumer goods via the Internet Sites exist that provide support for consumers looking to compare products and locate bargains
  21. Recent trend in C2C e-commerce is Web auctions (Key Term); similar to traditional auctions – no one sees each other Auction house sites (Key Term) – merchandise presented for auction Person-person auction sites (Key Term) – more like flea markets; forum for buyers and sellers to gather Similar to Web traditional auctions Buyers and sellers seldom meet face-to-face Ask the students if they have ever used E-bay Example auction sites include Amazon, Bidz, eBay, Sotheby’s, and Yahoo!
  22. A challenge is the payment for goods Should be reliable, secure, and fast Electronic payment -- easy, secure payment method Checks -- slowest and least convenient Credit cards -- easier to work with, somewhat vulnerable to theft Criminals known as carders (Key Term) specialize in stealing, trading, and using stolen credit cards over the internet Digital cash (Key Term) Purchased from third party (usually a special bank); more secure than credit cards Providers include Ecash, Google, Internet Cash, and PayPal
  23. Web-based applications (Key Term) are offered by Web-based services (Key Term) (often free) that provide Internet access to programs with capabilities similar to Microsoft Word, Excel, and PowerPoint. FTP transfers files; file transfer protocol (Key Term) ; Internet service for file transfer Downloading (Key Term) - transmitting files to your computer Uploading (Key Term) - transmitting files from your computer to another computer Plug-ins (Key Term) -- automatically loaded by and work with your browser; Acrobat Reader; Cosmos from Silicon Graphics (3-d displays); Media Player; QuickTime from Apple; RealPlayer; and Shockwave from Macromedia Filters (Key Term) – block access to specified sites; set time limits Internet Security Suites (Key Term) – collection of utility programs designed to maintain your security and privacy while you are on the Web
  24. Internet Security Suites (Key Term) control… Spam (Key Term) Protect against computer viruses (Key Term) Provide Filters (Key Term)
  25. Webmasters (Key Term) can expect to earn a salary of $48,000 to $73,000 Position is relatively new in many corporations and tends to have fluid responsibilities Experience in this field could lead to managerial opportunities
  26. Downsides example: Infiltration of Internet viruses and spyware may enable your every move at home to be broadcast over the Internet
  27. Have students turn to the end of Chapter 2 in their textbooks to view the same “Open-Ended” questions/statements
  28. Have students turn to the end of Chapter 2 in their textbooks to view the same “Open-Ended” questions/statements