working with the internet 2 information technology working with the internet this presentation will...
TRANSCRIPT
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
Working with the Internet
This presentation will explore: Internet workings & uses e-mail facilities Internet security e-commerce
ClassAct SRS enabled.
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
But how does it work, what does it do and why is it so popular?
The Internet is a continually evolving, fast-growing environment that is changing the face of communication.
This presentation explores working with the Internet, providing an overview of:
how to use the Internet e-mail facilities
e-commerce
Internet security
Next >
Introduction
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
Internet Basics
It has changed how people interact, through:
The Internet is used for a growing number of applications, both business and leisure-related.
It provides the opportunity to shop confidently and securely online, through encryption and passwords.
As a huge information resource, it has revolutionized the way academic research is conducted.
e-mail webcams videoconferencing
Next >
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
1
A) Fax
B) E-mail
C) Videoconferencing
D) Academic research
Which of the following has NOT been improved by the Internet?
Question
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
Customizing Browsers
How you do this depends on the software you use. Using Microsoft Internet Explorer, you must alter the Internet options on the browser menu bar.
You can make your Internet use more efficient and effective by customizing your web browser.
restrict the sites that can be visited
There are various adjustments that can be made. For example, it is possible to:
optimize the web site browsing settings
speed up the loading of web pages by choosing not to view images
Next >
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
2
A) Edit
B) Options
C) Internet Options
D) Customize
Which Microsoft Internet Explorer menu selection do you use to customize your web browser?
Question
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
E-mail was developed as an early function of the Internet. It has become a popular communications tool, through being:
Beyond the function of sending single e-mails, it offers more advanced features such as:
quick
inexpensive
effective
distribution lists
mail forwarding
Next >
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
3
A) Mail forwarding
B) Distribution lists
C) Internet Options
D) Text editing
What feature of e-mails allows a message to be sent to multiple addresses at the same time?
Question
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
Protocols
A web address is also known as a Uniform Resource Locator (URL).
When an address is typed into a web browser, it is read in sections as the browser attempts to locate the pages.
The first part of the URL is the called the protocol.
The protocol allows a server and browser to introduce themselves to each other.
http - for delivery of web pages
This is an agreed-upon format for data transfer between devices. There are various protocol types such as:
ftp - for file transfersNext >
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
Domain Names
The final parts of the URL locate the computer and the specific page requested. These include the:
path
domain name
file name
Next >
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
4
A) /default.html
B) www
C) www.no_name.com
D) http://
Look at this web address:
http://www.no_name.com/default.html
Which part is the protocol?
Question
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
5
A) http://
B) www.no_name.com
C) default.html
D) www.
Question
Look at this web address.
http://www.no_name.com/default.html
Which part is the domain name?
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
Net Phones
To be able to do this, both the parties communicating must be on the Internet at the time of the call.
The Internet can be used to make international telephone calls, for the cost of a local Internet connection.
When a net telephone call is made, the sound information is:
converted into segments of data
reassembled as speech
sent to the recipient
Next >
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
Videoconferencing
Videoconferencing enables people in different places to communicate across a computer network using:
Each participant has a webcam, microphone, and speakers connected to his or her computer.
point-to-point link
multi-point link
video audio data
There are two main types of videoconferencing:
Next >
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
6
A) Telephone
B) Printer
C) Darkroom
D) Computer
Which of the following would be needed for videoconferencing?
Question
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
Internet Security
To ensure that data stored in computers or on the web cannot be intercepted, Internet security involves using:
This danger applies to credit card numbers used for on-line shopping, as well as to companies' confidential information.
This security is necessary to help prevent files or details being:
encryption
passwords
deleted or changed
stolen or infected
Next >
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
7
Encryption is used to protect data being intercepted and stolen. Is this true or false?
Question
Answer True or False.
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
Security Certification
Functions of browsers include:
A secure site will normally display an internationally-recognized icon in the browser status bar:
authenticating the web site’ssecurity certification
raising concerns regarding any certification anomaly
Web sites, such as those of banks, deal in sensitive or personal information which they secure to protect their customers’ interests.
padlock key
checking the safety of its secure connection to any web site being visited
Next >
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
8
A) A barred door
B) A padlock
C) A security certificate
D) A cross
What symbol could be shown in the browser status bar for a secure site?
Question
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
Firewalls
Firewalls control access to and from a computer network or system.
A firewall resides between the network browser and the Internet.
A firewall blocks unauthorized users’ attempts to access a network, while allowing certain other users in.
It examines all messages moving in both directions.
Next >
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
9
A firewall is located between the user's computer and the user. Is this true or false?
Question
Answer True or False.
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
E-Commerce
E-commerce is the process of purchasing goods or services via the Internet, perhaps by using a credit or debit card.
Online shopping offers significant benefits, compared with traditional shopping:
purchases can be made without leaving home
goods are often less expensive than from traditional high street outlets a wider range of products can often be
accessed via overseas web sites
Unfortunately, fear over online security can discourage online shopping.
Next >
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
Shopping Carts
There are normally facilities available for assisting the customer to:
The customer enjoys the shopping process by navigating the pages and selecting merchandise to purchase by clicking on it.
A shopping cart is a piece of software that allows an online store to display and sell its goods online.
review what they have selected from the catalog pages
make necessary modifications or additions to their order
purchase the merchandise by credit card in a secure environment
Next >
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
10
A) Date of birth
B) Credit card number
C) Credit card expiry date
D) Delivery address
When conducting online shopping, purchasers need to provide some information to the selling company. Which of the following would NOT be essential information?
Question
Working with the Internet 2In
form
ati
on
Tech
nolo
gy
The transmission of information across computer networks has become a vital form of communication, relied upon the world over.
The Internet is now an integral part of the everyday lives of people around the world.
This presentation explored working with the Internet, investigating:
Internet workings & uses e-mail facilities Internet security e-commerce
Summary
End >