-
Living OnlineIC3
-
Networks & TelecommunicationIC3- Living Online
-
What is a Network?2 or more devices connected together
-
Client-ServerClient-ServerSchool or Large BusinessServer(s) as dedicated resources to client PCsPrint, Web, File Storage
-
Peer-to-Peer
No Server
All PCs share resourcesHome network
-
LAN & WANLANLocal area networkCommon location
WANWide area networkNetworks connected in distant locations
-
Network BenefitsShare information
Share hardware devicesPrinters, scanners
Communication/ collaboration
Centralized servicesStorage of files, web, mail
-
Network DisadvantagesCan you think of any disadvantages?DependencyExpensiveSecurity riskLoss of privacyViruses
-
Communications MediaWhat does data transmit on?
Twisted-Pair CableCoaxial CableFiber-Optic CableWirelessSatellite
-
Network HardwareModemBits per second56kbps
NIC (Ethernet Card)
Cable/DSL Modem1.5Mbps 16Mbps
Router
-
Network DevicesRouterConnects networksRoutes traffic to/from networks or InternetSwitchConnects devices within networkFaster & smarter than hubHubSimple deviceSlow
-
NetworksNeed Network OS tooRuns on serverAdmin, security, file & print servicesNovell
-
ReviewTrue or FalseCoax cable is the most expensive.
Fiber optic cable is made from flexible glass tubing.
Sharing software is a benefit of networking.
-
ReviewThe least expensive type of cable isTwisted pairWhat device changes analog signals to digital & reverse?ModemWhich networking device connects many computers to share one Internet connection?Router
-
The InternetMany connected networks
WANs connected together
Designed from DoD
No one owns the Internet
-
Accessing the InternetISPComcast, Verizon DSLOnline ServiceAOL
-
How to ConnectNeed an ISP or Online ServiceConnection to themTelephone linesCableSatelliteModemBrowser or Software
-
Connecting to the InternetModemChanges analog to digital & reverseCan be internal or external
Dial-UpOccasional connectBroadbandAlways on connectWi-FiWireless
-
Dial-UpTelephone lines
Slow
56kbps (56k)
-
BroadbandCable, ADSL, SatelliteFast, 1.5Mbps 16Mbps or more!DedicatedDownload/Upload speeds are different Networked computers use it
-
Speed Differences
-
Online CurriculumC1.1 C1.10C1.2 RS Topics 2, 6-8Skip C1.4, C1.5, C1.9
-
ReviewA _____ is a network over a small area.LANAsynchronous means the speeds areDifferent download and upload8Mbps download/ 1.5Mbps uploadWhich connection is the slowest?Dial-up, 56kbpsDescribe a network.Two or more devices connected together
-
ReviewWho owns the Internet?No oneWhat does an ISP do?Connects you to the Internetfor a price!
-
Intranet & ExtranetIntranetUsed within a businessHas internal documents, forms, HR info, etcUses a browserCant be accessed outside of networkExtranetAllows outside user to access internal infoUses browserNeeds username/password
-
Online & HomeworkOnline C1.11- C1.12Take the Quiz on C1.13 until you score a 100
Look up and describe what a computer firewall isWrite 2-3 sentences about what it doesName 2-3 pieces of firewall software
-
Email & Effective CommunicationIC3- Living Online
-
Email & CommunicationName some email programs
Email advantages?Speed, Cost, Easy Access, Share Info/Collaborate
Web Access (Gmail) or Program (Outlook)
Standard featuresRead, send, attach files
-
How Email Works
-
Understanding an Email AddressMailbox NameDomain NameDomain Category
-
Whats the Email Address?Samantha Murray works for IBMIBMs web site is www.ibm.comSams username is smurray
What would be her email [email protected]
-
Whats the Web Site?You know a guy named Bills email [email protected] cant remember where he works
What would be the web site to find out the companys name?www.gcsssd.org
-
Which is Correct?Raquel works at MTVMTVs web site is www.mtv.comWhich could be her email [email protected]@[email protected]@musictv.net
-
Outlook
-
AddressingCC:
BC:
-
Accessing EmailEmail Program on PC
Web Based Email like Comcast or Google
Cell or PDA
-
TeknimediaC2.1- C2.7C2.2 RS (Only read Advantages & Accessing)
Review Handout
-
Receiving Email
-
Sending EmailTo, From, Subject, CC, Body, BC
Use Address Book
SubjectBrief & Descriptive
Add Attachment or add in a web link (URL)
Spell Check & check email address
-
Handling Emails
-
Other Messaging
-
OnlineDue Date:
Teknimedia C2.8 - C2.24
Take the quiz on C2.13 & C2.24 until you score a 100.
-
Your MessageWeb pagesIf page updates frequently, just give the link to site
A reply shows original message, indicated by >> marks
-
More on EmailOptions after reading: Reply, Forward, Save, Delete
-
More on EmailIf you get a can not be delivered message, what should you try first?
Attachment size may be limited on either end
Document may not be legal without a handwritten signature
-
Special Email FeaturesAdding formatting of text (Bold, etc)May not work if they are using diff email programAutomatic message responsesOut of officeForwards to another emailBlock senders listJunk folder
-
Professional Email EtiquetteInclude a subjectBrief yet descriptive enoughTry to keep to 1 subjectKeep message shortAvoid ALL CAPS!Limit jokes, symbols :-oProofread before sendingDouble check the addressesDONT EMBARRASS YOURSELF!Email sent through company is NOT private
-
Choose One
-
ReviewWhat is cc?What is bcc?Which is faster, Email or IM?
Due Date: 02/04/2008 Teknimedia C2.25 - C2.38 is due to be completed. Take the quiz on C2.38 until you score a 100.
-
Unwanted EmailIC3- Living Online
-
Whats This?
-
SpamUnwanted e-mail, specifically unsolicited bulk e-mail.
Typically, an e-mail message is sent to multiple recipients who did not ask to receive it.
E-mail messagesare not considered spam if a user has signed up to receive them.
-
Spam FactsEstimated 80% of email is spam1978 - An e-mail spam is sent to 600 addresses1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people. 2005 - 30 billion per day 2006 - 55 billion per day
-
Circle of Spam
-
Prevent SpamKeep anti-virus up to dateDont forward suspect emailsIgnore the virus warning emailReport spam to admin to be blockedDont open attachment from people you dont know
-
HoaxesEmail that tried to convince you to delete a file (it was needed)Also told you to warn everyoneGet money from youPhishing- steals your personal infoSpoofed sites & emailsEmails that appear to come from original sourceAsks you to change passwordLink takes you to copied siteUser collects your info
-
Phishing
-
Differences between Spam & PhishingHow does it arrive?Spam: Sneaks in the back door Phishing: Walks in the front door How does it make its offer?Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible What is it trying to do?Spam: Tries to sell you something Phishing: Tries to steal something from you
-
ReviewWhats worse, spam or phishing?
-
Internet EssentialsIC3- Living Online
-
Background of Internet1962, Cold WarUS wanted to connect labsWanted it reliable; not easily destroyedJCR Licklider of MIT wrote the conceptsARPANET (Advanced Research Project Agency)Breaks into small packetsPackets sent using any available connectionArrive at destination; reassembled; put in order; request resend if necessaryTCP/IP
-
BackboneMajor telecommunication companies handle the high-speed backbone
ISPs connect to backbone
You connect to ISP
-
Verizon Map- Global
-
Verizon Map- IP NA
-
Browsing the WebIC3- Living Online
-
TermsHTTPRules of how info is packed & transmitted between web serversURL HTMLLang. that makes up a web pageFTPUsed to transfer/download files from a file serverUpload, DownloadHyperlink
-
URL
-
Which are from the same [email protected]@[email protected]@[email protected]@qvc.gov
-
HTML Example
-
CookiesSmall text fileStored on your HDContains customer id infoPersonalizes your web visitWhen you visit the site, the ID# in cookie is sent to web site to look up history of your past visitsProfiles are formed from your activitiesMany sites require cookies
-
Cookies for AdsHosting the banner images on its servers and using third-party cookies, the advertising company is able to track the browsing of users across these two sites.
-
Browser & Cookies
-
Plug-Ins & Pop-UpsPlug-InProgram downloaded to allow viewing of an item on web siteAdobe ReaderMacromedia FlashPop-Up AdsAppear in separate or same windowAnnoying; not dangerousUpdate IE/browser or Windows XP SP2 or add in blocking software
-
Secure & Unsecure SitesPassword DOES NOT mean secure
Secure Socket Layer (SSL)Encrypts the data (credit card #s, etc.)URL will begin with https://
Log Off after leaving siteWhy?
-
Online CurriculumC1.14-C1.22 including quizGet 100 on the quiz
-
Evaluating a SiteAuthorityCredentials; who is responsible for site?Way to contact themAccuracyCite sources?Relevant linksSpelling/grammarBiasTowards one point of viewCurrencyIs it up to date, currentDesignWell organized or cluttered?
-
Internet SearchesIC3- Living Online
-
Search EnginesHave databases of sites & keywordsEach generates a list of resultsWeb spider or crawlerResults may vary between enginesGo to yahoo.com & search for great wall of chinaNotice 1st resultHow many total hits?Go to google.com & do same searchDifferent result for #1How many total hits?
-
Searching all enginesGo to mamma.comSearch for merry melodies cartoonsResults show which engines they are registered withGo to dogpile.comLow carb dietsTells where it searched & found on
-
Narrowing your searchQuotation MarksYellow tuna would find matches w/ either word or both
Yellow Tuna would look for that phrase
-
Yellow tuna- no quotes
-
Yellow tuna- with quotes
-
Narrowing your searchPlus & Minus Signs+ include keywords- exclude keywordsUse the advanced search functionBooleanAND, OR, NOT, NEARRecipes AND Chicken AND SpaghettiNBA OR BasketballNEAR- within 10 wordsNOT- Tennis AND NOT Wimbledon
-
+ Sign
-
- Sign
-
Advanced Search
-
Security & Privacy OnlineIC3- Living Online
-
SafeguardingElectrical Failure/DisasterSecure power cords so they cant be accidentally unpluggedUPSSurge ProtectorSave files oftenBack up files regularlyMaybe off site too
-
Computer CrimeA criminal act committed through use of a computerAccessing someone elses system & changing infoCreating a virus & causing damageUsing a program improperly to obtain private infoHarassment/stalkingCopyright violations
-
Computer Fraud & HackingFraud- Manipulation of data to obtain money, property or value dishonestly or to cause lossStealing money from bank accountsObtaining false infoPhishingHackingInvading someone elses computerFor personal gain or fun
-
Top Scams
-
Fraud Statistics
-
Fraud Statistics
-
VirusesProgram that causes corruption of dataExecutable file (runs like a program)Spreads from file to fileCan be major or minorWormMake many copies of itself & uses system resources to slow system downTime BombA virus that causes damage at a certain date, time, or after a # of boots
-
VirusesTrojan HorseA virus that does something different than it looks like its doingAn example of a Trojan horse would be a program named "waterfalls.scr" claiming to be a free waterfall screensaver which, when run, instead would allow access to the user's computer remotely.
-
Protect Your ComputerAntivirus softwareUp to dateCareful opening attachmentsScan disks firstSet AV to scan email & attachments
-
Security & Privacy Online- Part 2IC3- Living Online
-
Security IssuesUse passwords to protect accessMix casesUse numbers & lettersAdd punctuationNo shared passwordsNo sheet of passwordsWeb Secret Credit CardBiometric readerFingerprint, retina, voice pattern
-
Biometric
-
Software PiracyIllegal copying or use of programsLicense # or key
SharewareTrial periodFreewareWatch out for tracking!!!
-
Web Bugs & Protecting PrivacyWeb BugHidden image in banner ads (1 pixel)Browser displays the ad & hidden imageImage places a cookie on HDTracks visits from sites w/ their banner adsBlock 3rd party cookiesDelete cookiesRead sites privacy policy
-
Block 3rd Party Cookies
-
Protecting PrivacyAdwareRead license agreement of softwareSome allow other programs to install to track browsing & transmit to a serverSpywareBeyond adwareRuns in backgroundGathers info about computerAd-aware, SpyBot, etc.
-
EULA
-
Living OnlineIC3
TWP- least expensive, has one for data and another for ground and interference; Coax from cable companies with shielding for interference; fiber is most expensive, little bend but the fastest; wireless is line of sight