working with the internet 2 information technology working with the internet this presentation will...

25
Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities Internet security e-commerce ClassAct SRS enabled.

Upload: emerson-biddle

Post on 01-Apr-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

Working with the Internet

This presentation will explore: Internet workings & uses e-mail facilities Internet security e-commerce

ClassAct SRS enabled.

Page 2: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

But how does it work, what does it do and why is it so popular?

The Internet is a continually evolving, fast-growing environment that is changing the face of communication.

This presentation explores working with the Internet, providing an overview of:

how to use the Internet e-mail facilities

e-commerce

Internet security

Next >

Introduction

Page 3: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

Internet Basics

It has changed how people interact, through:

The Internet is used for a growing number of applications, both business and leisure-related.

It provides the opportunity to shop confidently and securely online, through encryption and passwords.

As a huge information resource, it has revolutionized the way academic research is conducted.

e-mail webcams videoconferencing

Next >

Page 4: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

1

A) Fax

B) E-mail

C) Videoconferencing

D) Academic research

Which of the following has NOT been improved by the Internet?

Question

Page 5: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

Customizing Browsers

How you do this depends on the software you use. Using Microsoft Internet Explorer, you must alter the Internet options on the browser menu bar.

You can make your Internet use more efficient and effective by customizing your web browser.

restrict the sites that can be visited

There are various adjustments that can be made. For example, it is possible to:

optimize the web site browsing settings

speed up the loading of web pages by choosing not to view images

Next >

Page 6: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

2

A) Edit

B) Options

C) Internet Options

D) Customize

Which Microsoft Internet Explorer menu selection do you use to customize your web browser?

Question

Page 7: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

E-mail

E-mail was developed as an early function of the Internet. It has become a popular communications tool, through being:

Beyond the function of sending single e-mails, it offers more advanced features such as:

quick

inexpensive

effective

distribution lists

mail forwarding

Next >

Page 8: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

3

A) Mail forwarding

B) Distribution lists

C) Internet Options

D) Text editing

What feature of e-mails allows a message to be sent to multiple addresses at the same time?

Question

Page 9: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

Protocols

A web address is also known as a Uniform Resource Locator (URL).

When an address is typed into a web browser, it is read in sections as the browser attempts to locate the pages.

The first part of the URL is the called the protocol.

The protocol allows a server and browser to introduce themselves to each other.

http - for delivery of web pages

This is an agreed-upon format for data transfer between devices. There are various protocol types such as:

ftp - for file transfersNext >

Page 10: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

Domain Names

The final parts of the URL locate the computer and the specific page requested. These include the:

path

domain name

file name

Next >

Page 11: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

4

A) /default.html

B) www

C) www.no_name.com

D) http://

Look at this web address:

http://www.no_name.com/default.html

Which part is the protocol?

Question

Page 12: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

5

A) http://

B) www.no_name.com

C) default.html

D) www.

Question

Look at this web address.

http://www.no_name.com/default.html

Which part is the domain name?

Page 13: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

Net Phones

To be able to do this, both the parties communicating must be on the Internet at the time of the call.

The Internet can be used to make international telephone calls, for the cost of a local Internet connection.

When a net telephone call is made, the sound information is:

converted into segments of data

reassembled as speech

sent to the recipient

Next >

Page 14: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

Videoconferencing

Videoconferencing enables people in different places to communicate across a computer network using:

Each participant has a webcam, microphone, and speakers connected to his or her computer.

point-to-point link

multi-point link

video audio data

There are two main types of videoconferencing:

Next >

Page 15: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

6

A) Telephone

B) Printer

C) Darkroom

D) Computer

Which of the following would be needed for videoconferencing?

Question

Page 16: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

Internet Security

To ensure that data stored in computers or on the web cannot be intercepted, Internet security involves using:

This danger applies to credit card numbers used for on-line shopping, as well as to companies' confidential information.

This security is necessary to help prevent files or details being:

encryption

passwords

deleted or changed

stolen or infected

Next >

Page 17: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

7

Encryption is used to protect data being intercepted and stolen. Is this true or false?

Question

Answer True or False.

Page 18: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

Security Certification

Functions of browsers include:

A secure site will normally display an internationally-recognized icon in the browser status bar:

authenticating the web site’ssecurity certification

raising concerns regarding any certification anomaly

Web sites, such as those of banks, deal in sensitive or personal information which they secure to protect their customers’ interests.

padlock key

checking the safety of its secure connection to any web site being visited

Next >

Page 19: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

8

A) A barred door

B) A padlock

C) A security certificate

D) A cross

What symbol could be shown in the browser status bar for a secure site?

Question

Page 20: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

Firewalls

Firewalls control access to and from a computer network or system.

A firewall resides between the network browser and the Internet.

A firewall blocks unauthorized users’ attempts to access a network, while allowing certain other users in.

It examines all messages moving in both directions.

Next >

Page 21: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

9

A firewall is located between the user's computer and the user. Is this true or false?

Question

Answer True or False.

Page 22: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

E-Commerce

E-commerce is the process of purchasing goods or services via the Internet, perhaps by using a credit or debit card.

Online shopping offers significant benefits, compared with traditional shopping:

purchases can be made without leaving home

goods are often less expensive than from traditional high street outlets a wider range of products can often be

accessed via overseas web sites

Unfortunately, fear over online security can discourage online shopping.

Next >

Page 23: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

Shopping Carts

There are normally facilities available for assisting the customer to:

The customer enjoys the shopping process by navigating the pages and selecting merchandise to purchase by clicking on it.

A shopping cart is a piece of software that allows an online store to display and sell its goods online.

review what they have selected from the catalog pages

make necessary modifications or additions to their order

purchase the merchandise by credit card in a secure environment

Next >

Page 24: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

10

A) Date of birth

B) Credit card number

C) Credit card expiry date

D) Delivery address

When conducting online shopping, purchasers need to provide some information to the selling company. Which of the following would NOT be essential information?

Question

Page 25: Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities

Working with the Internet 2In

form

ati

on

Tech

nolo

gy

The transmission of information across computer networks has become a vital form of communication, relied upon the world over.

The Internet is now an integral part of the everyday lives of people around the world.

This presentation explored working with the Internet, investigating:

Internet workings & uses e-mail facilities Internet security e-commerce

Summary

End >