Documente Academic
Documente Profesional
Documente Cultură
the World
Wide Web:
Exploring
Cyberspace
Chapter
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Chapter 2 Topics
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2.1 Connecting to
the Internet
Narrowband, Broadband,
& Access Providers
5
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
7
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Telephone Modems
Can be either internal or external
Maximum speed of 56 Kbps
Most ISPs offer local access numbers
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Panel
Panel 2.3
2.3
Page
Page 55
55
10
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
T1 linevery expensive
Traditional trunk line, fiber optic or copper; carries 24 normal
telephone circuits
Transmission rate of 1.5 6 Mbps (T3 = 6 47 Mbps)
The last mile can still be a problem
Generally used by large organizations
11
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Cable modem
TV cable system with Internet connection; company usually
supplies cable modem
Is always on
Receives data at up to
100 Mbps; sends at
about 2-8 Mbps
12
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Panel
Panel 2.4
2.4
Page
Page 57
57
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
14
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
15
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
16
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
17
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Internet Backbone
High-speed, high-capacity data transmission lines, usually
fiber optic
Uses the newest technology
Providers include AT&T, Sprint, Verizon, CenturyLink, and
Deutsche Telekom
Internet 2
Cooperative university/business education and research project
Adds new toll lanes to older Internet to speed things up
Advances videoconferencing, research, collaboration
20
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Panel
Panel 2.5
2.5
Page
Page 59
59
21
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Protocols
The set of rules a computer follows to electronically transmit data.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the
Internet protocol
Developed in 1978 by ARPA; used for all Internet transactions
Packets
Fixed-length blocks of data for transmission, determined by TCP/IP
Data transmissions are broken up into packets and re-assembled at
destination (the IPInternet Protocol address)
22
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
23
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
24
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
25
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Website
The location on a particular computer (server) that has a
unique address; example = www.barnesandnoble.com,
www.mcgraw-hill.com
The website (server) could be anywhere not necessarily at
company headquarters
Web Page
A document on the web that can include text, pictures, sound,
and video
The first page on a website is the Home page
The Home page contains links to other pages on the website
(and often other websites)
27
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
The
The
The
The
28
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Hypertext
links connect
one web
document to another
Tim Berners-Lee
saw the possibility
of using
hypertext link
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
URL (address)bar
Menu bar
Toolbar
Workspace
Status bar
(displays current status of the
web age; 100% = fully loaded)
30
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Navigation
History List
A list of websites you visited since you opened up your browser for
this session
Allows you to easily return to a particular site
Bookmark
Allows you to store the URL from a site on your computer so you
can find it again in another browser session
To save the URL for a site, click on Favorites in Internet Explorer,
Bookmarks in Mozilla Firefox, or the star icon in the URL address
bar in Chrome
32
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
34
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Gigablast
Search services maintain search enginesprograms that users can
use to ask questions or use keywords to find information
Databases of search engines are compiled using software programs
called spiders (crawler, bots, agents)
Spiders crawl through the World Wide Web
Follow links from one page to another
Index the words on that site
A search never covers the entire web
Search engines differ in what they cover
35
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2. Subject Directories
Created and maintained by human editors, not electronic
spiders
Allow you to search for information by selecting lists of
categories or topics
Example sites are Beaucoup!, LookSmart, Open Directory
Project, and Yahoo! Directory
(continued)
36
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
3. Metasearch Engines
Allows you to search several search engines simultaneously
Examples are Yippy!, Dogpile, Mamma, MetaCrawler, and
Webcrawler
37
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
38
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
40
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Tagging
42
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
44
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Page
Page 77
77
45
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2. Web-Based Email
You send and receive messages by interacting via a browser with a website
Advantage: You can easily send and receive messages while traveling,
using any computer or equipped mobile device
Examples: Yahoo! Mail and Gmail (Google)
Disadvantages are ads and email hacking
46
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Using email
Get an email address from your ISP, following this format:
47
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
48
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Email Attachments
A copy of a file or document that you send attached to an
email to one or more people
Recipients must have compatible software to open the
attachment; for example, if they dont have Excel, they
probably cant read the spreadsheet you sent them.
Be careful about opening attachments:
Many viruses hide in them; scan them with antivirus software
Know who has sent the attachment before you open it
49
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Instant Messaging
by email with
specified other users (buddies) in real time.
Any user on a given email system can send a message
and have it pop up instantly on the screen of anyone
logged into that system.
To get IM: Download IM software from a supplier
Examples: AOL/AIM, Google Chat, Windows Messenger,
Yahoo! Messenger
Done on computers; is not the same as texting.
51
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Discussion Groups
Mailing Lists:
One-way (to make announcements) or two-way (for discussions) email
subscription lists
Email discussion groups on special-interest topics, in which all subscribers
receive email messages sent to the groups email address
Newsgroups:
Giant electronic bulletin board for written discussions about specific subjects
To participate you need a newsreader program
Message Boards:
Special-interest discussion groups without newsreaders
Accessed through a web browser
A collection of messages on a particular topic is called a thread
52
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Multimedia Applets
Small programs that can be quickly downloaded and run by
most browsers
Java is the most common Applet language
56
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Animation
The rapid sequencing of still images to create the appearance
of motion
Used in video games and web images that seem to move, such
as banners
57
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
61
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
62
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Snooping
Email is not private
Corporate management has the
right to view employees email.
Friends can send email anywhere.
Not all ISPs protect their customers privacy.
Deleted emails can be retrieved from a hard disk.
64
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
65
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Spoofing
Using fake email sender names so the message appears to be from a
different source, so you will trust it.
If you dont know the sender, dont open it.
Phishing
Sending forged email directing recipient to fake website.
Purpose: to entice people to share personal or financial data.
Fake website looks like real website, such as a banks.
Pharming
Implanting malicious software on a victims computer that redirects
the user to an impostor web page even when the individual types the
correct address into his or her browser.
Use websites with URLs that begin with https://
Some spyware removal programs can correct the corruption.
66
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Phishing Examples
Phishing examples
67
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Cookies
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
69
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Malware
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Passwords
Dont use passwords that can be easily guessed, such as 12345 or password.
Avoid any word that appears in a dictionary. Instead, mix letters, numbers, and
punctuation marks in an oddball sequence of no fewer than eight characters, such as
2b/orNOT2b% and Alfred!E!Newman7. Or choose a password that is memorable but shift
the position of your fingers on the keyboard, so that, for instance, TIMBERWOLVES
becomes YO,NRTEP;BRD when you move your fingers one position right. For sensitive
sites, such as financial accounts, create long passwords, such as 15-character passwords.
Dont use the same password for multiple sites, so that if someone obtains the password
to one account, that person wont have access to your entire online life.
Dont write passwords on sticky notes or in a notebook or tape them under your keyboard.
Dont carry the passwords in your wallet. If you have to write down all your passwords,
find a safe place to put the paper, or use a software password manager, such as
Kaspersky Password Manager, RoboForm Everywhere, or Last Pass Premium.
2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.