1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Using information technology (11/e): Chapter 2 - Brian K. Williams, Stacey C. Sawyer

74 76 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 74
Dung lượng 3,76 MB

Nội dung

Chapter 2 - The internet & the world wide web: Exploring cyberspace. This chapter includes contents: connecting to the internet: narrowband, broadband, & access providers; how does the internet work? The world wide web; email & other ways of communicating over the net; the online gold mine: telephony, multimedia, webcasting, blogs, e-commerce, & social networking; the intrusive internet: snooping, spamming, spoofing, phishing, pharming, cookies, & spyware.

The Internet & the World Wide Web: Using Information Technology, 11e Exploring Cyberspace Chapter © © 2015 2015 by by McGraw-Hill McGraw-Hill Education Education This This proprietary proprietary material material solely solely for for authorized authorized instructor instructor use use Not Not authorized authorized for for sale sale or or distribution distribution in in any any manner manner This This document document may may not not be be copied, copied, scanned, scanned, duplicated, duplicated, forwarded, forwarded, distributed, distributed, or or posted posted on on a a website, website, in in whole whole or or part part Chapter Topics Using Information Technology, 11e UNIT 2A: The Internet & the Web 2.1 Connecting to the Internet: Narrowband, Broadband, & Access Providers 2.2 How Does the Internet Work? 2.3 The World Wide Web © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Using Information Technology, 11e UNIT 2A: The Internet & the Web • The Internet began in 1969 as ARPANET • The Internet was text-only In the early 1990s, multimedia became available on the Internet, and the World Wide Web (web) was born This is the first image uploaded to the web, in 1992 © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part • To connect to the Internet you need Using Information Technology, 11e An access device (computer with modem) A means of connection (phone line, cable hookup, or wireless) An Internet access provider © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Using Information Technology, 11e 2.1 Connecting to the Internet • Narrowband, Broadband, & Access Providers â 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Using Information Technology, 11e However you connect to the Internet, the bandwidth will determine the speed of your connection • Bandwidth: Expresses how much data can be sent through a communications channel in a given amount of time • Baseband: Slow type of connection that allows only one signal to be transmitted at a time Broadband: High-speed connections â 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part • Physical connection to Internet—wired or wireless? Using Information Technology, 11e • Telephone [dial-up] modem • High-speed phone line—DSL, T1/T3 • Cable modem • Wireless—satellite and other through-the-air links © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part • Data Transmission Speeds Using Information Technology, 11e • Originally measured in bits per second (bps) • bits are needed to send one character, such as A or a • Kbps connections send thousand bits per second • Mbps connections send million bits per second • Gbps connections send billion bits per second •Uploading & Downloading • Upload—transmit data from local to remote computer • Download—transmit data from remote to local computer © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part • Narrowband (Dial-Up Modem): Low speed but inexpensive Using Information Technology, 11e • Telephone line = narrowband, or low bandwidth, low speed • Dial-up connection—use of telephone modem to connect to Internet (used mostly in rural areas on POTS, or plain old telephone system) • Telephone Modems • Can be either internal or external • Maximum speed of 56 Kbps Most ISPs offer local access numbers â 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Using Information Technology, 11e Telephone (Dial-Up) Modem Panel 2.3 Page 55 10 © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part E-Commerce: B2B, B2C, & C2C • E-Commerce (electronic commerce): conducting business Using Information Technology, 11e activities online • E-commerce has led to showrooming, the phenomenon in which shoppers browse for products in stores, only to buy them from an online rival, frequently at a lower price • B2B is business-to-business e-commerce • Business-to-consumer commerce, or B2C, is the electronic sale or exchange of goods and services from the companies directly to the public, or end users (e.g., online banking, online Discussion Question: Have you every sold anything on eBay? Used shopping, trading) PayPal? Did online you havestock any problems? What would you warn people about? 60 © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Web 2.0: The Social Web • Web 2.0 refers to the web viewed as a medium in which interactive Using Information Technology, 11e experience, in the form of blogs, wikis, forums, social networking, and so on, plays a more important role than simply accessing information • The move toward a more social, collaborative, interactive, and responsive web; has led to the “social web,” giving rise to: • Social networking sites: Online communities that allow members to keep track of friends and share photos, videos, music, stories, and ideas (e.g., Facebook, LinkedIn) • Media-sharing sites: Online social networks in which members share media such as photos, videos, music, ideas (e.g., YouTube, Flicker, Shutterfly) • Social-network aggregators: Collect content from all of a user’s61 © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Web 3.0: Computer-Generated Information Using Information Technology, 11e • In Web 3.0, information will be computer-generated with less human interaction required to discover and integrate that information • Two ideas might form the basis for Web 3.0— semantic markup and a personal browser • Semantic markup: Data interchange formats that will allow machines to understand the meaning—or “semantics”—of information on the web • The Web 3.0 browser will probably act as a personal assistant because every user will have a unique Internet profile based on his 62 or her browsing history The more you use the Web, the more your © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Using Information Technology, 11e 2.6 The Intrusive Internet • Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, & Malware © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part • Snooping Using Information Technology, 11e • Email is not private • Corporate management has the right to view employees’ email • Friends can send email anywhere • Not all ISPs protect their customers’ privacy • Deleted emails can be retrieved from a hard disk 64 © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part • Spam: Electronic Junk Mail Using Information Technology, 11e • Unsolicited email that takes up your time • Delete it without opening the message • Never reply to a spam message • Do not click on “unsubscribe” at the bottom of an email • When you sign up for something, don’t give your email address • Use spam filters • Fight back by reporting new spammers to www.abuse.net or www.spamhaus.org 65 © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part • Spoofing • Using fake email sender names so the message appears to be from Using Information Technology, 11e a different source, so you will trust it • If you don’t know the sender, don’t open it • Phishing • Sending forged email directing recipient to fake website • Purpose: to entice people to share personal or financial data • Fake website looks like real website, such as a bank’s • Pharming • Implanting malicious software on a victim’s computer that redirects66 the user to an impostor web page even when the individual types the © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Phishing Examples Using Information Technology, 11e Phishing examples "YOUR NET ID ACCOUNT" Phishing Scam (3/31/2013) https://wiki.library.ucsb.edu/display/SYSPUB/Latest+Phishing+Attemp 67 ts © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Cookies • Little text files left on your hard disk by some Using Information Technology, 11e websites you visit • Can include your log-in name, password, browser preferences, and credit card information • Every time you load a particular website, the browser sends the cookie back to the server to notify the website of your previous activity • Can make visiting these websites next time more convenient and faster • But cookies can be used to gather information about you and 68 © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Spyware : Adware, Browser & Search Hijackers, & Key Loggers • Spyware is software surreptitiously installed on your Using Information Technology, 11e computer via the web • Spyware hides on your PC/device and captures information about what is on the it, such as keystrokes and passwords 69 © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Using Information Technology, 11e • Adware, or pop-up generator, is a kind of spyware that tracks web surfing or online buying so that marketers can send you targeted and unsolicited pop-up and other ads • Browser hijackers change settings in your browser without your knowledge, often changing your browser’s home page and © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Using Information Technology, 11e • Search hijackers intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run • Key loggers, or keystroke loggers, can record each character you type and transmit that information to someone else on the Internet, making it possible for strangers to learn your passwords and other information © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Malware • There are many forms of malicious software—so-called malware—that Using Information Technology, 11e can harm a computer system, a common danger being viruses • A virus is a rogue program that migrates through the Internet or via operating systems and attaches itself to different programs that spread from one computer to another, leaving infections • The principal defense is to install antivirus software, which scans a computer to detect viruses and, sometimes, to destroy them © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part How to Reduce Malware Risks Using Information Technology, 11e • Download virus protection software, such as McAfee VirusScan ( www.mcafee.com ) or Norton AntiVirus ( www.symantec.com/nav ); then follow instructions for installing it on your machine (Don’t use antivirus software from companies you know nothing about.) • Scan your entire system with antivirus software the first time it’s installed; then scan it regularly after that Also scan any new CDs and drives before using them • Don’t open, download, or execute any files, email messages, or email attachments if the source is unknown or if the subject line of an email is questionable or unexpected © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part Passwords Using Information Technology, 11e • Never choose a real word or variations of your or your family’s name, address, phone number, Social Security number, license plate, or birth date • Don’t use passwords that can be easily guessed, such as “12345” or “password.” • Avoid any word that appears in a dictionary Instead, mix letters, numbers, and punctuation marks in an oddball sequence of no fewer than eight characters, such as 2b/orNOT2b% and Alfred!E!Newman7 Or choose a password that is memorable but shift the position of your © 2015 by McGraw-Hill Education This proprietary material solely for authorized instructor use Not authorized for sale or distribution in any manner This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part .. .Chapter Topics Using Information Technology, 11e UNIT 2A: The Internet & the Web 2. 1 Connecting to the Internet: Narrowband, Broadband, & Access Providers 2. 2 How Does the Internet Work? 2. 3... wireless? Using Information Technology, 11e • Telephone [dial-up] modem • High-speed phone line—DSL, T1/T3 • Cable modem • Wireless—satellite and other through-the-air links © 20 15 by McGraw-Hill... distributed, or posted on a website, in whole or part Using Information Technology, 11e Telephone (Dial-Up) Modem Panel 2. 3 Page 55 10 © 20 15 by McGraw-Hill Education This proprietary material solely

Ngày đăng: 30/01/2020, 04:49

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN