Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
-
Upload
esmond-riley -
Category
Documents
-
view
272 -
download
3
Transcript of Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Chapter 18
Technology inthe Workplace
Section 18.2
Internet Basics
Read to Learn
Describe the Internet and its components.
Identify tools for managing threats when using the Internet.
The Main Idea
The Internet has changed the way business is done. However, it poses risks to the information that is stored on computers. Companies and people must protect their computers from threats.
Key Concepts
The Internet
Managing Technology Threats
Key Terms
Internet a global computer network
Key Terms
World WideWeb
a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet
Key Terms
Webbrowser
searchengine
a program used for displaying and viewing pages on the Web
a computer program that can produce a list of documents related to a given topic
Key Terms
intranet
extranet
a computer network used by an organization
an extension of the intranet of a company or organization
Key Terms
hacker
cookies
a person who illegally gains access to and sometimes tampers with information in a computer system
bits of information about a computer users that are stored on that computer’s hard drive
Key Terms
virusa program that can insert copies of itself into a computer without the user’s knowledge, often damaging stored data
The Internet
People access the Internet through their telephone lines, digital subscriber lines (DSL), or over cable or ethernet connections.
Interneta global computer network
The Internet
Modems are devices used to send data from one computer to another.
The World Wide Web
The World Wide Web is also known as “the Web.”
World Wide Weba system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet
The World Wide Web
The World Wide Web Consortium (W3C) is an international association in which member organizations, a full-time staff, and the public work together to develop Web standards.
The World Wide Web
To access the information on the Internet, a person can use a Web browser and a search engine.
Web browsera program used for displaying and viewing pages on the Web
search enginea computer program that can produce a list of documents related to a given topic
The World Wide Web
Web browsers include design, graphics, and sounds, which make it more enjoyable to surf, or search for information.
The World Wide Web
Users find information they need by typing a keyword in to the search engine.
The World Wide Web
Web browsers include Mozilla Firefox®, Netscape®, and Microsoft Internet Explorer®.
Search engines include Yahoo!® , MSN®, and Lycos®.
Intranets and Extranets
An intranet works like the Internet, but its access is restricted to authorized users.
intraneta computer network used by an organization
Intranets and Extranets
An extranet is a semi-private network that allows more than one company access to the same information.
extranetan extension of the intranet of a company or organization
Collaboration Software
Many businesspeople find they can communicate better with their customers and employees using collaboration software. WebEx™, Microsoft’s Live Meeting®, and IBM Lotus Sametime® are some types of this software.
Managing Technology Threats
A hacker is an example of the many privacy and security risks and threats to users of computer technology.
hackera person who illegally gains access to and sometimes tampers with information in a computer system
Managing Technology Threats
To avoid privacy and security threats, do not click on pop-up ads unless you know and trust the company.
Privacy Issues
Companies use software tools to track computer users online.
Some people see cookies as an invasion of privacy.
cookiesbits of information about a computer user that are stored on that computer’s hard drive
Privacy Issues
Users who visit online stores can have their personal information stored on the company’s server even if they do not buy anything.
Privacy Issues
Those who do not want companies to store and use their personal information must reject or delete cookies.
Privacy Issues
A worm is a special computer virus that invades a computer network and multiplies itself as it spreads throughout the network.
virusa program that can insert copies of itself into a computer without the user’s knowledge, often damaging stored data
Privacy Issues
Security programs such as anti-virus software protect against different types of viruses.
Anti-virus software must be updated regularly because new viruses are created every day.
Privacy Issues
Spyware is software that tracks what a user does on the Internet.
Some software packages can protect users from spyware.
Privacy Issues
A firewall is computer software that prevents unauthorized access to a system software or data on a user’s computer.
A firewall can reduce spam.
Privacy Issues
A security breach occurs when someone manages to obtain unauthorized access to your system.
1. How would you describe the Internet and the World Wide Web?
The Internet is a global computer network of interconnected documents and files. The World Wide Web is a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet.
2. How does a search engine work?
It looks through countless Web pages and creates a content index for each.
3. How can a computer user protect against spam, viruses, worms, and spyware?
install firewall software, anti-virus, and spyware-protection software