chapter 18 technology in the workplace section 18.2 internet basics

Post on 02-Jan-2016

272 Views

Category:

Documents

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Chapter 18

Technology inthe Workplace

Section 18.2

Internet Basics

Read to Learn

Describe the Internet and its components.

Identify tools for managing threats when using the Internet.

The Main Idea

The Internet has changed the way business is done. However, it poses risks to the information that is stored on computers. Companies and people must protect their computers from threats.

Key Concepts

The Internet

Managing Technology Threats

Key Terms

Internet a global computer network

Key Terms

World WideWeb

a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet

Key Terms

Webbrowser

searchengine

a program used for displaying and viewing pages on the Web

a computer program that can produce a list of documents related to a given topic

Key Terms

intranet

extranet

a computer network used by an organization

an extension of the intranet of a company or organization

Key Terms

hacker

cookies

a person who illegally gains access to and sometimes tampers with information in a computer system

bits of information about a computer users that are stored on that computer’s hard drive

Key Terms

virusa program that can insert copies of itself into a computer without the user’s knowledge, often damaging stored data

The Internet

People access the Internet through their telephone lines, digital subscriber lines (DSL), or over cable or ethernet connections.

Interneta global computer network

The Internet

Modems are devices used to send data from one computer to another.

The World Wide Web

The World Wide Web is also known as “the Web.”

World Wide Weba system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet

The World Wide Web

The World Wide Web Consortium (W3C) is an international association in which member organizations, a full-time staff, and the public work together to develop Web standards.

The World Wide Web

To access the information on the Internet, a person can use a Web browser and a search engine.

Web browsera program used for displaying and viewing pages on the Web

search enginea computer program that can produce a list of documents related to a given topic

The World Wide Web

Web browsers include design, graphics, and sounds, which make it more enjoyable to surf, or search for information.

The World Wide Web

Users find information they need by typing a keyword in to the search engine.

The World Wide Web

Web browsers include Mozilla Firefox®, Netscape®, and Microsoft Internet Explorer®.

Search engines include Yahoo!® , MSN®, and Lycos®.

Intranets and Extranets

An intranet works like the Internet, but its access is restricted to authorized users.

intraneta computer network used by an organization

Intranets and Extranets

An extranet is a semi-private network that allows more than one company access to the same information.

extranetan extension of the intranet of a company or organization

Collaboration Software

Many businesspeople find they can communicate better with their customers and employees using collaboration software. WebEx™, Microsoft’s Live Meeting®, and IBM Lotus Sametime® are some types of this software.

Managing Technology Threats

A hacker is an example of the many privacy and security risks and threats to users of computer technology.

hackera person who illegally gains access to and sometimes tampers with information in a computer system

Managing Technology Threats

To avoid privacy and security threats, do not click on pop-up ads unless you know and trust the company.

Privacy Issues

Companies use software tools to track computer users online.

Some people see cookies as an invasion of privacy.

cookiesbits of information about a computer user that are stored on that computer’s hard drive

Privacy Issues

Users who visit online stores can have their personal information stored on the company’s server even if they do not buy anything.

Privacy Issues

Those who do not want companies to store and use their personal information must reject or delete cookies.

Privacy Issues

A worm is a special computer virus that invades a computer network and multiplies itself as it spreads throughout the network.

virusa program that can insert copies of itself into a computer without the user’s knowledge, often damaging stored data

Privacy Issues

Security programs such as anti-virus software protect against different types of viruses.

Anti-virus software must be updated regularly because new viruses are created every day.

Privacy Issues

Spyware is software that tracks what a user does on the Internet.

Some software packages can protect users from spyware.

Privacy Issues

A firewall is computer software that prevents unauthorized access to a system software or data on a user’s computer.

A firewall can reduce spam.

Privacy Issues

A security breach occurs when someone manages to obtain unauthorized access to your system.

1. How would you describe the Internet and the World Wide Web?

The Internet is a global computer network of interconnected documents and files. The World Wide Web is a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet.

2. How does a search engine work?

It looks through countless Web pages and creates a content index for each.

3. How can a computer user protect against spam, viruses, worms, and spyware?

install firewall software, anti-virus, and spyware-protection software

top related