web & email. additional video clip on “filter bubbles” from the dylan ratigan show (msnbc)...
TRANSCRIPT
Additional video clip on “Filter Bubbles” from The Dylan Ratigan
Show (MSNBC) aired on 7/12/2011
http://www.msnbc.msn.com/id/37560195/#43731589
InformationWeek July 11, 2011
Some snippets from the article “The OS MESS” by Michael Healeyhttp://www.informationweek.com/news/global-cio/interviews/231000728?
queryText=the+os+mess
“Two-thirds of companies let employees connect their personal gadgets to the
network with little or no guidance as to what devices and operating systems they can use
or whether IT’s supposed to help them”
InformationWeek July 11, 2011
Some snippets from the article “The OS MESS” by Michael Healeyhttp://www.informationweek.com/news/global-cio/interviews/231000728?
queryText=the+os+mess
“85% of IT organizations officially support more than one OS; the average company
supports 3 different ones”
InformationWeek July 11, 2011
Some snippets from the article “The OS MESS” by Michael Healeyhttp://www.informationweek.com/news/global-cio/interviews/231000728?
queryText=the+os+mess
“While more than two-thirds of the IT organizations we surveyed let employees connect to the company network with their personal devices, most don’t enforce standards
around antivirus, patches, and device selection. It’s no wonder 78% of the IT pros who responded to our survey
are worried about this trend, citing security, management, and support as the main problems”
InformationWeek July 11, 2011
Some snippets from the article “The OS MESS” by Michael Healeyhttp://www.informationweek.com/news/global-cio/interviews/231000728?
queryText=the+os+mess
InformationWeek July 11, 2011
Some snippets from the article “The OS MESS” by Michael Healeyhttp://www.informationweek.com/news/global-cio/interviews/231000728?
queryText=the+os+mess
InformationWeek July 11, 2011
Some snippets from the article “The OS MESS” by Michael Healeyhttp://www.informationweek.com/news/global-cio/interviews/231000728?
queryText=the+os+mess
InformationWeek July 11, 2011
Some snippets from the article “The OS MESS” by Michael Healeyhttp://www.informationweek.com/news/global-cio/interviews/231000728?
queryText=the+os+mess
Wi-Fi Hacker Article
http://news.yahoo.com/minnesota-wi-fi-hacker-gets-18-
years-prison-032803295.html
7
Chapter 7: The Web and E-mail 13
Web Basics The Web is a collection of document, image, video, and
sound files A Web site contains a collection of related information
Internet & The Web
• Internet: a vast network designed to transfer data from one computer to another
• The Web: a collection of document, image, video, and sound files
7
Chapter 7: The Web and E-mail 15
Web Basics A Web server accepts requests from browsers
A Web page is the product or output of one or more Web-based files displayed in a format similar to a page in a book
A Web browser is client software that displays Web page elements and handles links between pages
Every Web page has a unique address called a URL
7
Chapter 7: The Web and E-mail 16
HTML Set of specifications for creating documents that a browser
can display as a Web page
HTTP
• Stands for Hypertext Transfer Protocol– networking protocol for distributed, collaborative,
hypermedia information systems– it is the foundation of data communication for the
World Wide Web
7
Chapter 7: The Web and E-mail 19
Web Browsers Help you access Web pages
Upgrade to new browser versions as they become available
Popular browsers:– Internet Explorer– Mozilla Firefox– Apple Safari– Netscape Navigator– Opera
7
Chapter 7: The Web and E-mail 21
Web Browsers Helper applications extend browser’s ability to work with file
formats– A plug-in is a type of helper application (ex. QuickTime,
Flash)– A player is any helper
application or plug-in that helps a browser display a particular file format
7
Chapter 7: The Web and E-mail 22
Cookies Small chunk of data generated by a Web server and stored
in a text file on computer’s hard disk– can be used for authentication, storing site preferences, shopping
cart contents, etc.
Your computer does not have to accept cookies
7
Chapter 7: The Web and E-mail 23
Web Page Authoring Online Web authoring tools
Web authoring software– Adobe Dreamweaver– Microsoft Expression
Web
Text editor
7
Chapter 7: The Web and E-mail 25
HTML Scripts HTML scripts can perform complicated tasks and respond to
user actions– HTML forms– Server-side script– Client-side script– Java applet– ActiveX control
7
Chapter 7: The Web and E-mail 26
Search Engine Basics A Web search engine is a program designed to help people
locate information on the Web by formulating simple keyword queries
7
Chapter 7: The Web and E-mail 27
Search Engine Basics A Web crawler is a computer program that is automated to methodically
visit Web sites
A search engine indexer is software that pulls keywords from a Web page and stores them in a database
A search engine’s query processor looks for your search terms in search engine’s indexed database and returns a list of relevant Web sites
Link popularity is measured by quantity and quality of links from one Web page to others
A meta keyword is entered into a header section of a Web page when it is created and is supposed to describe the page contents
7
Chapter 7: The Web and E-mail 28
Citing Web-Based Source Material
To copy a passage of textfrom a Web page, highlightthe text, click the Editmenu, then select Copy.Next, switch to your owndocument and use thePaste option.
For APA formatting I recommend using Purdue Owl to help with citing sources
http://owl.english.purdue.edu/owl/resource/560/01/
7
Chapter 7: The Web and E-mail 31
E-commerce Basics Business transactions conducted
electronically over a computer network– B2C (business-to-consumer)– C2C (consumer-to-consumer)– B2B (business-to-business)– B2G (business-to-government)
7
Chapter 7: The Web and E-mail 32
E-commerce Basics Enhances traditional business models
Styles of online advertisements– Banner ad– Hover ad– Pop-up ad
• Click-through rate
Ad-blocking software prevents ads from appearing on screens
7
Chapter 7: The Web and E-mail 33
Online Shopping
In a typical shoppingsession, you connect toan online storefront anduse navigation controlsto browse through themerchant’s catalog. Asyou browse, you candrop items into yourelectronic shopping cart.At the checkout counter,you enter the informationnecessary to pay for theitems you selected.
7
Chapter 7: The Web and E-mail 34
Online Auctions An online auction is the
electronic equivalent to good old-fashioned yard sales, rummage sales, and auctions
You can expect to bid on new, used, closeout, overstock, or refurbished items at an online auction
Computer software takes the place of an auctioneer
7
Chapter 7: The Web and E-mail 35
Online Payment The most popular ways to make online payments include
submitting your credit card number directly to a merchant and using a third-party payment service such as PayPal
Online shoppers are justifiably worried that personal information and credit card numbers supplied in the course of an e-commerce transaction might be hijacked and used inappropriately
Social Networking & Professional Networking
• Social Networks– Facebook– MySpace– Twitter
• Professional Networks– LinkedIn
7
Chapter 7: The Web and E-mail 38
E-Mail Overview Any person with an e-mail account can send and receive e-
mail messages
7
Chapter 7: The Web and E-mail 39
E-Mail Overview Basic e-mail activities
– Writing– Reading– Replying to– Forwarding
7
Chapter 7: The Web and E-mail 40
E-Mail Overview E-mail attachments are files that travel with an e-mail
message
7
Chapter 7: The Web and E-mail 42
Netiquette Internet etiquette
– Meaningful subject– Use uppercase and lowercase letters– Check spelling– Be careful what you send– Be polite– Be cautious with sarcasm and humor
7
Chapter 7: The Web and E-mail 43
Netiquette– Use smileys and text messaging shorthand
cautiously
– Use the Bcc function for group mailings
– Don’t send replies to all recipients
– Don’t send huge attachments
– Explain attachments
– Stay alert for viruses
– Notify recipients of viruses
7
Chapter 7: The Web and E-mail 44
E-mail Technology E-mail systems carry and manipulate e-mail messages
Three types of e-mail systems widely used today:– POP (Post Office Protocol)– IMAP (Internet Message Access Protocol)– Web-based e-mail
7
Chapter 7: The Web and E-mail 45
E-mail Technology Web-based e-mail accounts allow you to use a browser to
access your e-mail messages
7
Chapter 7: The Web and E-mail 46
Spam Spam is unwanted electronic junk mail about medical
products, low-cost loans, and fake software upgrades that arrives in your online mailbox
A spam filter is a type of utility software that captures unsolicited e-mail messages before they reach your inbox
7
Chapter 7: The Web and E-mail 47
Phishing Phishing is an e-mail based scam designed to persuade you
to reveal confidential information, such as your bank account number or Social Security number
If you don’t want to become a phishing victim, be suspicious of e-mail messages that supposedly come from banks, ISPs, online payment services, operating system publishers, and online merchants
7 Fake Sites A fake Web site looks
legitimate, but has been created by a third party to be a very clever replica of a legitimate Web site
Pharming is an exploit that redirects users to fake sites by poisoning a domain name server with a false IP address
Chapter 7: The Web and E-mail 48