Transcript
  • Living OnlineIC3

  • Networks & TelecommunicationIC3- Living Online

  • What is a Network?2 or more devices connected together

  • Client-ServerClient-ServerSchool or Large BusinessServer(s) as dedicated resources to client PCsPrint, Web, File Storage

  • Peer-to-Peer

    No Server

    All PCs share resourcesHome network

  • LAN & WANLANLocal area networkCommon location

    WANWide area networkNetworks connected in distant locations

  • Network BenefitsShare information

    Share hardware devicesPrinters, scanners

    Communication/ collaboration

    Centralized servicesStorage of files, web, mail

  • Network DisadvantagesCan you think of any disadvantages?DependencyExpensiveSecurity riskLoss of privacyViruses

  • Communications MediaWhat does data transmit on?

    Twisted-Pair CableCoaxial CableFiber-Optic CableWirelessSatellite

  • Network HardwareModemBits per second56kbps

    NIC (Ethernet Card)

    Cable/DSL Modem1.5Mbps 16Mbps

    Router

  • Network DevicesRouterConnects networksRoutes traffic to/from networks or InternetSwitchConnects devices within networkFaster & smarter than hubHubSimple deviceSlow

  • NetworksNeed Network OS tooRuns on serverAdmin, security, file & print servicesNovell

  • ReviewTrue or FalseCoax cable is the most expensive.

    Fiber optic cable is made from flexible glass tubing.

    Sharing software is a benefit of networking.

  • ReviewThe least expensive type of cable isTwisted pairWhat device changes analog signals to digital & reverse?ModemWhich networking device connects many computers to share one Internet connection?Router

  • The InternetMany connected networks

    WANs connected together

    Designed from DoD

    No one owns the Internet

  • Accessing the InternetISPComcast, Verizon DSLOnline ServiceAOL

  • How to ConnectNeed an ISP or Online ServiceConnection to themTelephone linesCableSatelliteModemBrowser or Software

  • Connecting to the InternetModemChanges analog to digital & reverseCan be internal or external

    Dial-UpOccasional connectBroadbandAlways on connectWi-FiWireless

  • Dial-UpTelephone lines

    Slow

    56kbps (56k)

  • BroadbandCable, ADSL, SatelliteFast, 1.5Mbps 16Mbps or more!DedicatedDownload/Upload speeds are different Networked computers use it

  • Speed Differences

  • Online CurriculumC1.1 C1.10C1.2 RS Topics 2, 6-8Skip C1.4, C1.5, C1.9

  • ReviewA _____ is a network over a small area.LANAsynchronous means the speeds areDifferent download and upload8Mbps download/ 1.5Mbps uploadWhich connection is the slowest?Dial-up, 56kbpsDescribe a network.Two or more devices connected together

  • ReviewWho owns the Internet?No oneWhat does an ISP do?Connects you to the Internetfor a price!

  • Intranet & ExtranetIntranetUsed within a businessHas internal documents, forms, HR info, etcUses a browserCant be accessed outside of networkExtranetAllows outside user to access internal infoUses browserNeeds username/password

  • Online & HomeworkOnline C1.11- C1.12Take the Quiz on C1.13 until you score a 100

    Look up and describe what a computer firewall isWrite 2-3 sentences about what it doesName 2-3 pieces of firewall software

  • Email & Effective CommunicationIC3- Living Online

  • Email & CommunicationName some email programs

    Email advantages?Speed, Cost, Easy Access, Share Info/Collaborate

    Web Access (Gmail) or Program (Outlook)

    Standard featuresRead, send, attach files

  • How Email Works

  • Understanding an Email AddressMailbox NameDomain NameDomain Category

  • Whats the Email Address?Samantha Murray works for IBMIBMs web site is www.ibm.comSams username is smurray

    What would be her email [email protected]

  • Whats the Web Site?You know a guy named Bills email [email protected] cant remember where he works

    What would be the web site to find out the companys name?www.gcsssd.org

  • Which is Correct?Raquel works at MTVMTVs web site is www.mtv.comWhich could be her email [email protected]@[email protected]@musictv.net

  • Outlook

  • AddressingCC:

    BC:

  • Accessing EmailEmail Program on PC

    Web Based Email like Comcast or Google

    Cell or PDA

  • TeknimediaC2.1- C2.7C2.2 RS (Only read Advantages & Accessing)

    Review Handout

  • Receiving Email

  • Sending EmailTo, From, Subject, CC, Body, BC

    Use Address Book

    SubjectBrief & Descriptive

    Add Attachment or add in a web link (URL)

    Spell Check & check email address

  • Handling Emails

  • Other Messaging

  • OnlineDue Date:

    Teknimedia C2.8 - C2.24

    Take the quiz on C2.13 & C2.24 until you score a 100.

  • Your MessageWeb pagesIf page updates frequently, just give the link to site

    A reply shows original message, indicated by >> marks

  • More on EmailOptions after reading: Reply, Forward, Save, Delete

  • More on EmailIf you get a can not be delivered message, what should you try first?

    Attachment size may be limited on either end

    Document may not be legal without a handwritten signature

  • Special Email FeaturesAdding formatting of text (Bold, etc)May not work if they are using diff email programAutomatic message responsesOut of officeForwards to another emailBlock senders listJunk folder

  • Professional Email EtiquetteInclude a subjectBrief yet descriptive enoughTry to keep to 1 subjectKeep message shortAvoid ALL CAPS!Limit jokes, symbols :-oProofread before sendingDouble check the addressesDONT EMBARRASS YOURSELF!Email sent through company is NOT private

  • Choose One

  • ReviewWhat is cc?What is bcc?Which is faster, Email or IM?

    Due Date: 02/04/2008 Teknimedia C2.25 - C2.38 is due to be completed. Take the quiz on C2.38 until you score a 100.

  • Unwanted EmailIC3- Living Online

  • Whats This?

  • SpamUnwanted e-mail, specifically unsolicited bulk e-mail.

    Typically, an e-mail message is sent to multiple recipients who did not ask to receive it.

    E-mail messagesare not considered spam if a user has signed up to receive them.

  • Spam FactsEstimated 80% of email is spam1978 - An e-mail spam is sent to 600 addresses1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people. 2005 - 30 billion per day 2006 - 55 billion per day

  • Circle of Spam

  • Prevent SpamKeep anti-virus up to dateDont forward suspect emailsIgnore the virus warning emailReport spam to admin to be blockedDont open attachment from people you dont know

  • HoaxesEmail that tried to convince you to delete a file (it was needed)Also told you to warn everyoneGet money from youPhishing- steals your personal infoSpoofed sites & emailsEmails that appear to come from original sourceAsks you to change passwordLink takes you to copied siteUser collects your info

  • Phishing

  • Differences between Spam & PhishingHow does it arrive?Spam: Sneaks in the back door Phishing: Walks in the front door How does it make its offer?Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible What is it trying to do?Spam: Tries to sell you something Phishing: Tries to steal something from you

  • ReviewWhats worse, spam or phishing?

  • Internet EssentialsIC3- Living Online

  • Background of Internet1962, Cold WarUS wanted to connect labsWanted it reliable; not easily destroyedJCR Licklider of MIT wrote the conceptsARPANET (Advanced Research Project Agency)Breaks into small packetsPackets sent using any available connectionArrive at destination; reassembled; put in order; request resend if necessaryTCP/IP

  • BackboneMajor telecommunication companies handle the high-speed backbone

    ISPs connect to backbone

    You connect to ISP

  • Verizon Map- Global

  • Verizon Map- IP NA

  • Browsing the WebIC3- Living Online

  • TermsHTTPRules of how info is packed & transmitted between web serversURL HTMLLang. that makes up a web pageFTPUsed to transfer/download files from a file serverUpload, DownloadHyperlink

  • URL

  • Which are from the same [email protected]@[email protected]@[email protected]@qvc.gov

  • HTML Example

  • CookiesSmall text fileStored on your HDContains customer id infoPersonalizes your web visitWhen you visit the site, the ID# in cookie is sent to web site to look up history of your past visitsProfiles are formed from your activitiesMany sites require cookies

  • Cookies for AdsHosting the banner images on its servers and using third-party cookies, the advertising company is able to track the browsing of users across these two sites.

  • Browser & Cookies

  • Plug-Ins & Pop-UpsPlug-InProgram downloaded to allow viewing of an item on web siteAdobe ReaderMacromedia FlashPop-Up AdsAppear in separate or same windowAnnoying; not dangerousUpdate IE/browser or Windows XP SP2 or add in blocking software

  • Secure & Unsecure SitesPassword DOES NOT mean secure

    Secure Socket Layer (SSL)Encrypts the data (credit card #s, etc.)URL will begin with https://

    Log Off after leaving siteWhy?

  • Online CurriculumC1.14-C1.22 including quizGet 100 on the quiz

  • Evaluating a SiteAuthorityCredentials; who is responsible for site?Way to contact themAccuracyCite sources?Relevant linksSpelling/grammarBiasTowards one point of viewCurrencyIs it up to date, currentDesignWell organized or cluttered?

  • Internet SearchesIC3- Living Online

  • Search EnginesHave databases of sites & keywordsEach generates a list of resultsWeb spider or crawlerResults may vary between enginesGo to yahoo.com & search for great wall of chinaNotice 1st resultHow many total hits?Go to google.com & do same searchDifferent result for #1How many total hits?

  • Searching all enginesGo to mamma.comSearch for merry melodies cartoonsResults show which engines they are registered withGo to dogpile.comLow carb dietsTells where it searched & found on

  • Narrowing your searchQuotation MarksYellow tuna would find matches w/ either word or both

    Yellow Tuna would look for that phrase

  • Yellow tuna- no quotes

  • Yellow tuna- with quotes

  • Narrowing your searchPlus & Minus Signs+ include keywords- exclude keywordsUse the advanced search functionBooleanAND, OR, NOT, NEARRecipes AND Chicken AND SpaghettiNBA OR BasketballNEAR- within 10 wordsNOT- Tennis AND NOT Wimbledon

  • + Sign

  • - Sign

  • Advanced Search

  • Security & Privacy OnlineIC3- Living Online

  • SafeguardingElectrical Failure/DisasterSecure power cords so they cant be accidentally unpluggedUPSSurge ProtectorSave files oftenBack up files regularlyMaybe off site too

  • Computer CrimeA criminal act committed through use of a computerAccessing someone elses system & changing infoCreating a virus & causing damageUsing a program improperly to obtain private infoHarassment/stalkingCopyright violations

  • Computer Fraud & HackingFraud- Manipulation of data to obtain money, property or value dishonestly or to cause lossStealing money from bank accountsObtaining false infoPhishingHackingInvading someone elses computerFor personal gain or fun

  • Top Scams

  • Fraud Statistics

  • Fraud Statistics

  • VirusesProgram that causes corruption of dataExecutable file (runs like a program)Spreads from file to fileCan be major or minorWormMake many copies of itself & uses system resources to slow system downTime BombA virus that causes damage at a certain date, time, or after a # of boots

  • VirusesTrojan HorseA virus that does something different than it looks like its doingAn example of a Trojan horse would be a program named "waterfalls.scr" claiming to be a free waterfall screensaver which, when run, instead would allow access to the user's computer remotely.

  • Protect Your ComputerAntivirus softwareUp to dateCareful opening attachmentsScan disks firstSet AV to scan email & attachments

  • Security & Privacy Online- Part 2IC3- Living Online

  • Security IssuesUse passwords to protect accessMix casesUse numbers & lettersAdd punctuationNo shared passwordsNo sheet of passwordsWeb Secret Credit CardBiometric readerFingerprint, retina, voice pattern

  • Biometric

  • Software PiracyIllegal copying or use of programsLicense # or key

    SharewareTrial periodFreewareWatch out for tracking!!!

  • Web Bugs & Protecting PrivacyWeb BugHidden image in banner ads (1 pixel)Browser displays the ad & hidden imageImage places a cookie on HDTracks visits from sites w/ their banner adsBlock 3rd party cookiesDelete cookiesRead sites privacy policy

  • Block 3rd Party Cookies

  • Protecting PrivacyAdwareRead license agreement of softwareSome allow other programs to install to track browsing & transmit to a serverSpywareBeyond adwareRuns in backgroundGathers info about computerAd-aware, SpyBot, etc.

  • EULA

  • Living OnlineIC3

    TWP- least expensive, has one for data and another for ground and interference; Coax from cable companies with shielding for interference; fiber is most expensive, little bend but the fastest; wireless is line of sight


Top Related