chapter 18 technology in the workplace section 18.2 internet basics

34
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Upload: esmond-riley

Post on 02-Jan-2016

271 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Chapter 18

Technology inthe Workplace

Section 18.2

Internet Basics

Page 2: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Read to Learn

Describe the Internet and its components.

Identify tools for managing threats when using the Internet.

Page 3: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

The Main Idea

The Internet has changed the way business is done. However, it poses risks to the information that is stored on computers. Companies and people must protect their computers from threats.

Page 4: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Key Concepts

The Internet

Managing Technology Threats

Page 5: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Key Terms

Internet a global computer network

Page 6: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Key Terms

World WideWeb

a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet

Page 7: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Key Terms

Webbrowser

searchengine

a program used for displaying and viewing pages on the Web

a computer program that can produce a list of documents related to a given topic

Page 8: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Key Terms

intranet

extranet

a computer network used by an organization

an extension of the intranet of a company or organization

Page 9: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Key Terms

hacker

cookies

a person who illegally gains access to and sometimes tampers with information in a computer system

bits of information about a computer users that are stored on that computer’s hard drive

Page 10: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Key Terms

virusa program that can insert copies of itself into a computer without the user’s knowledge, often damaging stored data

Page 11: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

The Internet

People access the Internet through their telephone lines, digital subscriber lines (DSL), or over cable or ethernet connections.

Interneta global computer network

Page 12: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

The Internet

Modems are devices used to send data from one computer to another.

Page 13: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

The World Wide Web

The World Wide Web is also known as “the Web.”

World Wide Weba system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet

Page 14: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

The World Wide Web

The World Wide Web Consortium (W3C) is an international association in which member organizations, a full-time staff, and the public work together to develop Web standards.

Page 15: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

The World Wide Web

To access the information on the Internet, a person can use a Web browser and a search engine.

Web browsera program used for displaying and viewing pages on the Web

search enginea computer program that can produce a list of documents related to a given topic

Page 16: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

The World Wide Web

Web browsers include design, graphics, and sounds, which make it more enjoyable to surf, or search for information.

Page 17: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

The World Wide Web

Users find information they need by typing a keyword in to the search engine.

Page 18: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

The World Wide Web

Web browsers include Mozilla Firefox®, Netscape®, and Microsoft Internet Explorer®.

Search engines include Yahoo!® , MSN®, and Lycos®.

Page 19: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Intranets and Extranets

An intranet works like the Internet, but its access is restricted to authorized users.

intraneta computer network used by an organization

Page 20: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Intranets and Extranets

An extranet is a semi-private network that allows more than one company access to the same information.

extranetan extension of the intranet of a company or organization

Page 21: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Collaboration Software

Many businesspeople find they can communicate better with their customers and employees using collaboration software. WebEx™, Microsoft’s Live Meeting®, and IBM Lotus Sametime® are some types of this software.

Page 22: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Managing Technology Threats

A hacker is an example of the many privacy and security risks and threats to users of computer technology.

hackera person who illegally gains access to and sometimes tampers with information in a computer system

Page 23: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Managing Technology Threats

To avoid privacy and security threats, do not click on pop-up ads unless you know and trust the company.

Page 24: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Privacy Issues

Companies use software tools to track computer users online.

Some people see cookies as an invasion of privacy.

cookiesbits of information about a computer user that are stored on that computer’s hard drive

Page 25: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Privacy Issues

Users who visit online stores can have their personal information stored on the company’s server even if they do not buy anything.

Page 26: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Privacy Issues

Those who do not want companies to store and use their personal information must reject or delete cookies.

Page 27: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Privacy Issues

A worm is a special computer virus that invades a computer network and multiplies itself as it spreads throughout the network.

virusa program that can insert copies of itself into a computer without the user’s knowledge, often damaging stored data

Page 28: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Privacy Issues

Security programs such as anti-virus software protect against different types of viruses.

Anti-virus software must be updated regularly because new viruses are created every day.

Page 29: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Privacy Issues

Spyware is software that tracks what a user does on the Internet.

Some software packages can protect users from spyware.

Page 30: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Privacy Issues

A firewall is computer software that prevents unauthorized access to a system software or data on a user’s computer.

A firewall can reduce spam.

Page 31: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

Privacy Issues

A security breach occurs when someone manages to obtain unauthorized access to your system.

Page 32: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

1. How would you describe the Internet and the World Wide Web?

The Internet is a global computer network of interconnected documents and files. The World Wide Web is a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet.

Page 33: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

2. How does a search engine work?

It looks through countless Web pages and creates a content index for each.

Page 34: Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

3. How can a computer user protect against spam, viruses, worms, and spyware?

install firewall software, anti-virus, and spyware-protection software