Workplace Core Computing Course

CCRI, PACE Program
Workplace Core
Computing Course
Living Online Study Guide
Study Materials for the IC3
The Study Guides, class handouts and the Workplace Core Computing Course itself were created
to help individuals study for the IC3 Digital Literacy Certification, IC3. The IC3 is “an internationally
recognized credential that reflects the most relevant skills needed in today’s academic and
business environment.”
For this course, we chose not to use textbooks to minimize the cost to our participants. We also
reviewed textbooks designed to teach IC3 skills and found they didn’t provide enough information,
especially for the Living Online section of the exam. We relied primarily on Internet sources to
create this guide. Citations are included.
Students are encouraged to use this study material and the materials on our class website to
prepare for the IC3 exams. In addition to these resources, we will offer practice tests throughout
the program so participants will be comfortable with the exam structure.
We encourage everyone to write down questions they have during this course. You should try to
research the answers to these questions on your own using the Internet. One of the advantages
to being in a class is to help one another. We have created a section in the class website where
you can post your questions and the answers so your classmates can also benefit from the new
knowledge.
The PACE program at the Community College of RI offered two sessions of the Workplace Core
Computing Course (WC3). Some students from these sessions reviewed the material and offered
advice and edits. I would like to thank these students for the invaluable assistance to make these
study materials more complete and ready for distribution. Thank you so much – Donna Millette,
Betty Jacques, Julie Good and Karen Letellier.
Disclaimer:
This product was funded by a grant awarded by the U.S. Department of Labor’s Employment and Training
Administration. The product was created by the grantee and does not necessarily reflect the official position
of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances
of any kind, express or implied, with respect to such information, including any information on linked sites
and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness,
adequacy, continued availability, or ownership.
1|Page
Table of Contents
Technology and Society ................................................................................................ 4
Notes page ....................................................................................................................... 9
Computer Related Issues .............................................................................................. 10
Notes page ....................................................................................................................... 12
Communication and Collaboration on the Web ............................................................. 14
Notes page ....................................................................................................................... 26
Using the Internet and the World Wide Web................................................................. 28
Notes page ....................................................................................................................... 42
Network Fundamentals ................................................................................................ 44
Notes page ....................................................................................................................... 51
Internet Explorer and Internet Safety ............................................................................ 52
Notes page ....................................................................................................................... 55
Using the Internet for Research .................................................................................... 56
Notes page ....................................................................................................................... 63
Using Microsoft Live ..................................................................................................... 64
Notes page ....................................................................................................................... 68
Internet Ethics .............................................................................................................. 70
Notes page....................................................................................................................... 74
2|Page
This page left blank intentionally.
3|Page
Technology and Society
Vocabulary
Business to Business (B2B)
Business to Consumer (B2C)
Business to Government
(B2G)
digital cash
E-commerce transactions between businesses, such as between a
company and a supplier.
Online transactions between businesses and consumers
Transactions between businesses and governmental agencies
electronic commerce
a system that allows you to pay by transmitting a number from one
computer to another
Also called e-commerce. Conducting business on the Internet
online learning
delivering learning programs via the Internet
telecommuting
working from home and staying connected to the office via the
Internet
Objectives:



Describe ways computers and technology have changed society
Identify ways people use computers and the Internet
Discuss how technology has transformed traditional processes
The changes in technology over the last 50 years have been amazing. For example, TV went from
black and white to color, phones went mobile, computers shrank from needing an air conditioned
room to laptops, post became email, microwave ovens appeared for cooking….. Technology is the
fastest growing industry as of right now and it has no signs of slowing down anytime soon. In fact
everything will be run by technology in the near future.
http://prezi.com/bvd0m8xgqz4i/how-has-technology-changed-in-the last-50-years/
4|Page
Using Computers at Work, School and Home
It is becoming increasingly difficult to find employment that does not require some knowledge of
computers. Technology today is integrated into almost every facet of life and influences how you
work, use computers at home and learn about the world outside your doors.
Computers facilitate and enhance your everyday activities in many ways. Some of the ways are
described below.
Collecting Information
The Internet and the Web are major forms of technology that probably affect your daily life. Using
the Internet is a fast and easy way to find the information you need.
Organizing Information
Computers can help you organize information.
Evaluating Information
Computer software can help you evaluate information. Companies sometimes use Applicant
Tracking software (ATS) to evaluate resumes based on key words or other criteria.
Communicating Information
Computers connected through a network or the Internet can exchange information
simultaneously. Technology provides many communication options such as email, instant
messaging, blogs, wikis and social websites such as Facebook, Twitter and Pinterest.
Increasing Productivity
Our productivity can be increased by using computers and applications, online access to resources,
including communication with experts and specialists.
Collaborating with Others and Solving Problems
The Internet has given us the capability to collaborate with people all over the world. In class
Kathy told us how she collaborates with business partners each week using Skype. This gives her
greater access to experts and colleagues around the World and increases her effectiveness and
productivity, too.
Because of this capability, people have more opportunity to work from home, or telecommute.
5|Page
Creating Communities
Online communities and social networking sites provide opportunities to socialize with others who
have common interests. Linked in is a great example of a social network site that can help job
seekers search for jobs as well as network with others to find job openings or to get information
about industries.
Facilitate Learning
We can use the Internet as a resource for learning and discovering new facts and information.
Recently major universities, such as MIT, have offered courses online for free. These Massive
Open Online Courses (MOOCs) are changing the way individuals connect to higher education and
study.
Promoting Creativity
Modern technology provides tools you can use to create a range of artistic work that can be
published for a real audience anywhere in the world.
Supporting Critical Thinking
When searching for information on the Internet, you need to use critical thinking. When reading
information online, particularly pages that are designed to persuade you to buy or do something,
you must evaluate the information critically, analyze the point of view and motivations, and wait
to act until you have gathered and considered all the information.
Facilitating Daily Life
Conducting business on the Internet is easy. Commercial web sites let us buy and sell items. You
can access electronic catalogs, select goods, store selections in a digital cart, and then check out by
paying with a credit card or online account.
Local, state, and national government Web sites provide access to many services. For example,
many local government agencies provide Web sites where you can pay your water bill, renew your
license, and sign up for municipal services.
Using Computer Technology in Everyday Life
Computers also affect your day to day activities more than you realize. Using desktop and laptop
computers represents only a fraction of your interactions with computer technology. Some
examples of technology we use every day are: ATMs (Automatic Teller Machines), Credit Card and
other commerce systems, Computerized robots, POS (Point of Sale) Systems, Weather Predicting
6|Page
and Reporting Systems, GPS (Global Positioning systems), and as was discussed in today’s lesson –
Embedded computers in items such as household electronics and our automobiles.
Using Technology to Transform Traditional Processes
Many of the traditional procedures and practices in business, education and government have
been transformed by the integration of personal computers and use of the Internet. Here are just
a few examples:
E-Commerce
E-commerce is changing the way the world does business. According to Internet World Stats
(www.internetworldstats.com/stats.htm) more than two billion people are connected to the
Internet. Internet speed will continue to increase as more people add fiber optics, cable modems,
or digital subscriber lines (DSL). All this activity and high-speed connection indicate more online
businesses.
Using e-commerce, you can buy and sell just about any product through the Internet. Many
people hesitate before making online purchases because they fear someone will steal their credit
card numbers. However, digital cash is a technology designed to ease those fears. The digital cash
system allows you to pay by transmitting a number from one computer to another. The digital
cash numbers are issued by a bank and represent a specified sum of real money; each number is
unique. When you use digital cash, no one can obtain information about you. As an alternate,
some credit card companies provide a virtual account option.
Business Connections
Business to Business (B2B) describes e-commerce transactions between businesses, such as
between a company and a supplier. This includes the online exchange of products, services, and
information. Business to Consumer (B2C) describes online transactions between businesses and
consumers. A third category is Business to Government (B2G), which includes transactions
between businesses and governmental agencies.
Retail businesses often use radio-frequency identification (RFID) tags, which are small electronic
devices that identify and track goods from the point of delivery or manufacturing to the point of
sale, similar to a bar code. Unlike bar codes, however, scanners can read information from RFID
tags from several feet away. Businesses use RFID to improve the efficiency of inventory tracking
7|Page
and management. Governments are using them in passports and in transportation, such as
electronic toll collection on highways and in mass transit passes.
Media
In the past, the distribution of media was primarily through newspapers, magazines, television or
radio. The Internet opened a new category of communications media. Media can be distributed
by anyone who has an Internet connection. Music, video, audio, pictures, text – all can be
distributed online through email, blogs, Web sites, and other types of Internet distribution
channels.
Online Learning
For some time, people have been able to obtain their education via distance learning methods.
Earlier nontraditional methods include television and correspondence courses that were
completed through the mail. In the last few years, the Internet has become a way to deliver online
learning.
Imagine being able to complete college without leaving your home, take enrichment classes, or
complete a job training program. Online learning Web sites, such as Ed2Go and CSM, make virtual
learning possible.
Learning Management system (LMS) programs help teachers deliver online courses. These
programs are an integrated set of Web-based teaching tools that provide guidance and testing for
the student. Three of the more popular of these learning management systems are Blackboard,
Moodle, and Angel. The LMS that we are using for this course is Coursesites, which is a free
version of Blackboard that teachers can use.
8|Page
Notes on Technology and Society
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9|Page
Computer Related Issues
Objectives:


Identify ways to prevent health related disorders and injuries
Discuss considerations when purchasing computers
Health Concerns - Computer Use
Users are a key component in any information system. Therefore, protecting users from harm is
just as important as protecting hardware, software and data. The widespread use of computer has
led to some important user health concerns. Users can take some precautions to reduce the
health risks.
Computers and Health Risks
A repetitive strain injury (RSI) is an injury or disorder of the muscles, nerves, tendons, ligaments
and joints. Computer-related RSIs include tendonitis and carpal tunnel syndrome. RSIs are the
largest job related injury and illness problem in the US today.
Long-term computer use can lead to tendonitis and Carpel Tunnel Syndrome (CTS). Factors that
cause these disorders include prolonged typing, prolonged mouse usage, or continual shifting
between the mouse and keyboard. If untreated, these disorders can lead to permanent physical
damage.
A user can take many precautions to prevent these types of injuries. Take frequent breaks during
the computer session to exercise your hands and arms. To prevent injury due to typing, place a
wrist rest between the keyboard and the edge of your desk. To prevent injury while using the
mouse, place the mouse at least six inches from the edge of the desk. In this position, your wrist is
flat on the desk. Finally, minimize the number of times you switch between the mouse and
keyboard, and avoid using the heel of your hand as a pivot point when typing or using the mouse.
Another type of health-related condition due to computer use is computer vision syndrome (CVS).
A user may have CVS if he experiences sore, tired, burning, itching or dry eyes; blurred or double
vision, distance blurred vision after prolonged staring at a display device and documents, difficulty
focusing on the screen image, color fringes or after-images when looking away from the display,
and increased sensitivity to light. Eyestrain associated with CVS is not thought to have serious or
10 | P a g e
long-term consequences. There are some techniques you can follow to ease eyestrain when
working with computers.
Techniques to ease Eye Strain






Every 10 to 15 minutes, take an eye break
Blink your eyes every five seconds
Place your display device about an arm’s length away from your eyes with the top
of the screen at eye level with the top of the screen at eye level or below
Use large fonts
If you wear glasses, ask your doctor about computer glasses
Adjust the lighting
People who spend their workday using the computer sometimes have other ailments. Some of
these include back or neck pain, muscle fatigue and emotional fatigue. Many problems like these
associated with computer use can be alleviated by taking short breaks (10-15 minutes for every 2
hours at the computer) and ensuring that the workplace is designed ergonomically.
Ergonomics and workplace design
Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the
design of items in the workplace. Ergonomic studies have shown that using the correct type and
configuration of chair, keyboard, display device, and work surface helps users work comfortably
and efficiently and helps protect health.
For more information on ergonomics and using computers safely, please read “How to make your
computer workstation fit you”
Oregon OSHA Standards and Technical Resources Publication
http://www.cbs.state.or.us/osha/pdf/pubs/1863.pdf
11 | P a g e
Notes on Computer Related Issues
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
12 | P a g e
Notes on Computer Related Issues
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
13 | P a g e
Communication and Collaboration on the Web
Vocabulary
Asynchronous
Not at the same time;
blog
a journal maintained by an individual or a group and posted on a
Web site for public viewing and comment
A service provided by certain ISPs that allows a group of people to
communicate with each other by typing at their keyboards.
Mail you can send to other people on a network at an organization
or you can use an Internet service provider to send email to any
computer in the world
a service that sends messages in real time while you and someone
else are both connected to the Internet
an Internet discussion forum
chat rooms
Electronic Mail (email)
Instant Messaging (IM)
message boards
MMS
Newsgroups
SMS
Social Networking site
Synchronous
text messaging
VoIP
Web 2.0
web application
Multi-media Service; text, audio and video messages are sent
using this
An area on a computer network, especially the Internet, devoted
to the discussion of a specified topic
Short Message Service; "text messages" are transmitted by this
an online community that provides interaction for groups of
people who share a similar interest or activity
At the same time;
using a cell phone or other mobile device to send and receive
written messages
Voice over Internet Protocol; Using the Internet to send
synchronous audio communication
Web sites where users can modify the content
Webinar
software that has no installation requirements; can be used on all
Operating Systems and is accessed through a Web browser over a
network such as Intranet or Internet
a seminar or presentation that takes place on the Internet
Wiki
a collaborative web site that can be edited by anyone with access
14 | P a g e
Objectives:





Identify most popular forms of electronic communication
Discuss the advantages and disadvantages of electronic communications
Netiquette
Cloud storage and cloud computing
Discuss collaboration and various web based collaboration tools
15 | P a g e
Categorizing Electronic Communication
As a worldwide electronic system, the Internet provides many communication services, which can
be organized into the following categories:









Electronic mail: Electronic mail or email is similar to regular mail. You have a message, an
address, and a carrier that figures out how to transfer the message from one location to
another. You can send email to other people on a network at an organization, or you can
use the Internet service provider to send email to any computer in the world.
Instant Messaging (IM): You use instant messaging services to send messages in real time.
In other words, you can send and receive messages while you and someone else are both
connected to the Internet.
Text Messaging: With text messaging you use a cell phone, mobile device or computer to
send and receive written messages.
Voice over IP (VoIP): Sometimes called audio over IP, you use this service to make phone
calls with an Internet connection instead of a regular phone line. Your voice is converted to
a digital signal that travels over the Internet
Online Conferencing: Also referred to as video conferencing, you can conduct a conference
with yourself and one or more other participants at different sites by using computer
networks to transmit audio and video data.
Chat rooms: Chat rooms are Websites that allow real-time communication so you can
exchange messages with others through the computer.
Social networking sites: These Websites provide a way to build online communities of
people who share common interests or activities.
Blog postings/comments: A blog (short for Web log) is a type of personal journal created by
one person or by a group; entries are published in reverse chronological order.
Message boards and newsgroups: Both of these services provide bulletin board systems
that serve as discussion sites; users can post messages asking for assistance.
Shelly, G., (2009). Discovering Computers and Microsoft Office 2010: A Fundamental Combined
Approach.
16 | P a g e
Advantages and Disadvantages of Email
Technology and Human Communication
Email is just one of the types of electronic communication available to us.
12 Advantages and 6 disadvantages of email and other types of electronic communication.
In a work place, communication is extremely important. Employees are now luckily able to make
use of the many advantages of email.
• It is very easy to communicate effectively with anybody within the office or anywhere in the
world regardless of where they are situated.
• Another advantage of having business email communication at work is that you can respond to
clients quickly and easily. This means that you no longer need to spend hours on the
phone, trying to get through and leaving messages with receptionists.
• Messages can be sent quickly, in an instant.
• The cost of sending an email is very low, unlike postage and other methods of communication.
• It is easy to use, simply type the name of the recipient, a subject line and your message and click
the send button.
• You can copy others on correspondence. You can even blind copy someone (BCC) if you don't
want the recipient of the email to know that you are sending it to another person. A large
number of people can be copied and communicated with at once.
• You can send attachments, such as photographs, files and spreadsheets.
• You can book appointments in other people's diaries. They can then accept or decline the
appointment.
• Email saves time. No need to spend valuable time going to someone else's office.
• Emails can be responded to in your own time, when it is convenient for you. It is not invasive like
a visitor or phone call which requires immediate attention.
• It speeds up the workflow process, documents can be sent for comment, corrections can be
made quickly.
• Emailing saves paper and printing costs.
17 | P a g e
Disadvantages of email
Although there are a variety of advantages and disadvantages of email, the advantages outweigh
the disadvantages by far.
Unfortunately the good always comes with the bad. Some of the disadvantages of email may be
that your staff spends too much time on personal messages as opposed to work related stuff. This
is the fundamental disadvantage to allowing employees email access.
However if a positive and trusting relationship is able to be maintained, between management
and staff, then this could contribute to a more productive working environment, where employees
can enjoy the many advantages of using email.
1. Spam emails can be sent which can clutter your inbox.
2. Email hoaxes.
3. Viruses can be sent by email.
4. Misunderstandings can occur if messages are not constructed properly.
5. Not everyone has internet connectivity.
6. Confidential information can be easily forwarded and disseminated and if done in error could
easily end up in the wrong hands.
www.workplace-communication.com/advantages-disadvantages-email.html
18 | P a g e
Netiquette
Netiquette refers to Internet etiquette. This simply means the use of good manners in online
communication such as e-mail, forums, blogs, and social networking sites to name a few. It is
important to use netiquette because communication online is non-verbal. Most often online
communication consists of reading something someone else has typed. This type of
communication does not allow each person to see facial expressions, body language, or hear
intonation. Because of this, messages can often be misinterpreted. By following netiquette, online
communication becomes clearer. Especially in business and career related online communications
netiquette should be used to ensure that correct spelling, grammar, and punctuation are put in
place to project professionalism. Netiquette also includes the use of emoticons (such as :) :( ;) and
others) to explain an emotion. In e-mail, netiquette means not flooding someone’s inbox with
forwarded messages or spam mail. Following netiquette will help you to maintain and establish
positive online relationships as well as develop a positive online reputation.
Helpful websites:

Why Do People Use Netiquette?
http://www.ehow.com/about_4609432_why-do-people-use-netiquette.html
This website gives a succinct explanation of what Netiquette is, how it can be
implemented, and the benefits of using Netiquette. It also provides links to EHow.com
articles on netiquette.

Netiquette Home Page
http://www.albion.com/netiquette/
This is a very comprehensive website that includes a link to the online edition of Netiquette
by Virginia Shea. It also includes a netiquette quiz and mailing list subscription.

Netiquette (Internet Etiquette)
http://www.livinginternet.com/i/ia_nq.htm RFC 1855
This website breaks netiquette down into four categories and provides links to more
information on each. Those categories are: Netiquette Basics, Netiquette of Sending,
Netiquette of Replying, and Netiquette of Confidentiality

Internet Etiquette
http://www.dtcc.edu/cs/rfc1855.html
This is a very lengthy website that details various types of netiquette. It breaks things into
categories such as communication to one and communication to many.

Learn the Net Netiquette
http://www.learnthenet.com/learn-about/netiquette/
19 | P a g e
This website includes many articles on navigating the internet. It includes a video on
netiquette, Internet lingo, and links to a list of emoticons. The website also discusses social
networking, e-mail, and surfing the web among others
http://www.auburn.edu/citizenship/netiquette.html
Cloud Storage and Cloud Computing
Nowadays all business operations make use of cloud storage and cloud computing to manage and
store their data. Even though widely popular, many are still unaware of the difference between
these two. Following are the points which differentiate a cloud storage from a cloud computing
system.
Cloud storage
Cloud storage is a model network of online data storage, where data is stored and hosted by a
third party server. Here the data is held in a large data center which is spread around the
globe. This technology consists of both the service end and the user end. The cloud will be made
up of many servers which are configured so as to work in unison.
With cloud storage, instead of saving your data in your PC, you can save it in a remote data base.
The computer will then provide the ultimate connection between the PC and the database. When
you obtain a cloud storage service from a provider, you only need to pay for the amount of storage
space that your data is actually consuming.
The types
Keeping your photographs in a social networking website, storing files in a drop box folder are the
common examples of cloud storage. This can be either public or private. Companies which want
to create a private cloud can grant the accessibility solely to its members. When the user and
service provider are different, and when the service provider has access to the user’s data base,
then it is called a public cloud storage system. Hybrid cloud storage models are also becoming
popular nowadays.
20 | P a g e
Cloud computing
The traditional cloud storage doesn’t make use of any specialized equipment for its functions. But
when the new offerings of technology are integrated into the traditional cloud storage, then it is
known as cloud computing. While some cloud applications will help you gain access through the
servers, some other applications will require the help of custom software to access the cloud.
Cloud computing is a technology which offers the remote access to the stored data, without much
interaction with the service provider. Cloud computing also helps in bringing about increased
resource utilization which is proven to be beneficial to the customers. Cloud computing helps in
cost reduction and will also enable the easy availability of services on demand. Here the customer
pays not only for the storage space, but also for the software that is being used. There are many
new software applications which are used in Cloud computing.
Server virtualization software
Using a server virtualization software allows many instances of a single operating system, and the
applications associated with it to run on a single machine. This is then delivered on the cloud
computing network by a process which is termed as Infrastructure as a Service (IaaS).
The requirements
If your internet connection is weak your cloud computing services are also affected. The network
infrastructure of the cloud provider should be able to withstand the large amount of traffic that is
generated by its users. Cloud computing should also be able to deliver the resources in a rapid
manner so as to accommodate its users.
About the author
Grace is a content strategy expert associated with Godot Media. She has worked closely with
online businesses, as a website content writer. Her other interests – besides online content
strategy, internet marketing and search engine optimization – are technology, sports and fashion.
http://www.organicmarketingservices.com/the-differences-between-cloud-computing-andcloud-storage/
21 | P a g e
10 top tools for business brainstorming and collaboration
Scott Gerber
14 July '12, 08:00pm
As more startups migrate their companies to the cloud, it can be difficult to gather the entire team
for a productive collaboration session. Not only does everyone need to be in the same place at the
same time, but they’ve got to come prepared with their creative juices, focused mindsets and
positive attitudes.
However, with endless digital distractions that thrive in browser tabs and fit into the palms of our
hands, keeping everyone on the same “page” isn’t easy. But regardless of whether your team
members are working remotely or in the cubicles around you, a handful of online tools can ensure
that your next brainstorming meeting will be full of fresh ideas and effective communication
among your employees.
I asked a panel of successful young entrepreneurs the following question:
What’s your favorite new digital tool for collaboration or brainstorming and why?
Here are 10 business-changing tools for joining mental forces with your team members and
putting your skills together for projects:
1. Producteev for Productive Collaboration
“I highly recommend cross-platform tool Producteev for collaboration. It’s easy to
set up, easy to use, and fantastic for team members who are working on many projects at the
same time with others. There is space to comment on projects to maximize productive
collaboration, and it’s all about getting tasks done.”
-Doreen Bloch, Poshly Inc.
22 | P a g e
2. Try the New Basecamp
“The revamped Basecamp from 37signals has taken collaboration to a new level. It’s
completely redesigned and rethought, and I can see the impact on our team already. It’s no
Google Wave, but I’ll recommend it to anyone.”
-John Meyer, 9 Clouds
3. Facebook Member Pages Work
“Closed Facebook groups are nothing new, but I love how many mastermind
communities are shifting into the platform to meet users where they already spend hours each
day. In one such group, requests are posted around the clock, and it’s not unusual to see
colleagues giving feedback and collaborating across time zones and over weeks and months.”
-Kelly Azevedo, She’s Got Systems
4. Trust the Team With Teambox
“We switched over to Teambox as our main project management system a few
months ago. I have been pleasantly surprised by the unique functionalities it offers teams. Every
week, I post conversations in a “New Idea” project that is then discussed in real time. The platform
really allows everyone to piggyback on other ideas in order to come with something truly
collaborative.”
-Logan Lenz, Endagon
23 | P a g e
5. Stick With What Works, Google Docs
“It’s not new but it’s solid. We use Google Docs for everything. In my opinion, it’s the
simplest way to have multiple people work on one document and keep things organized.”
-John Hall, Digital Talent Agents
6. Join.me All the Way!
“Check out Join.me. It’s a super simple screen-sharing tool that I’ve been using
recently, ever since I realized that Skype screen-sharing is terrible, especially when you’re working
with someone on the other side of the country. It takes three minutes to install, and you’ve able to
give or take away control from your collaborator. It’s also great for sales presentations.”
-Matthew Ackerson, PetoVera
7. Go Zoho for Online Editing
“Zoho allows you to collaborate with its online Wiki, edit Word and Excel documents,
and have live discussions. Brainstorming through email or any static site is incredibly difficult, as
you lose the dynamic interaction of all participants. Sometimes, the energy created from a
response is as important as the content of the comment. Zoho allows you to collaborate in real
time.”
-Aaron Schwartz, Modify Watches
8. Asana Is Online Zen
24 | P a g e
“I’ve been using Asana a lot recently for collaboration and deadlines, and it’s got a
simplicity and ease of use that’s hard to find elsewhere. It’s also free if you’ve got a small team,
which helps keep your overhead low.”
-Colin Wright, Exile Lifestyle
9. Hammer Away on Yammer
“Yammer is much more than a company social network. Our Yammer feed has a
constant stream of new ideas, articles and more. It’s a safe zone where we encourage employees
to think differently without worrying about the minutiae. Yammer has facilitated crossdepartmental collaboration and made our company more innovative.”
-Bhavin Parikh, Magoosh, Inc.
10. Work and Play With Skype
“Although it’s been around for a while, I still use Skype on a daily basis for
collaboration. It’s great for brainstorming with my team, checking in with clients, and even a little
“watercooler” chat — which can be challenging to spark with a completely virtual company.”
-Heather Huhman, Come Recommended
http://thenextweb.com/apps/2012/07/14/14/10-top-tools-for-business-brainstorming-andcollaboration/
25 | P a g e
Notes on Communication and Collaboration on the Web
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
26 | P a g e
Notes on Communication and Collaboration on the Web
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
27 | P a g e
Using the Internet and the World Wide Web
Vocabulary
Access provider
A business that provides access to the Internet
Browser
application software that allows users to access and view web
pages
cable internet service
high speed access through cable television network via cable
modem
DSL
digital subscriber line; an internet connection technology that
provides for the transfer of information to a computer at a highspeed bandwidth over ordinary copper telephone lines
FiOS
Fiber Optic Service; high speed Internet access over fiber-optic
cables
Internet
Worldwide system composed of thousands of smaller networks
IP
Internet Protocol; a numerical addressing system that uniquely
identifies computers and networks linked to the Internet
ISP
Internet Service Provider; regional access provider
OSP
Online Service Provider; provides Internet access and member
only features such as instant messaging
URL
Uniform Resource Locator; the address of a Web page, FTP site,
audio stream or other Internet resource
web server
computer that delivers requested web pages to your computer
Web site
a collection of related web pages
WiFi
Wireless Fidelity; uses radio signals to provide high-speed
connection to wireless computers and devices
28 | P a g e
Wireless ISP
Wireless Internet service providers; provides connection speeds
more than 30 times faster than dial-up connections
World Wide Web (www)
service available on the Internet that consists of a worldwide
collection of electronic documents
Objectives:





Define the Internet and World Wide Web
Discuss ways to connect to the Internet
Identify common access providers
Identify parts of a domain name and define IP address
Identify common web browsers
29 | P a g e
What is The Internet?
The Internet is a massive network of networks, a networking infrastructure. It connects millions of
computers together globally, forming a network in which any computer can communicate with any
other computer as long as they are both connected to the Internet. Information that travels over
the Internet does so via a variety of languages known as protocols.
What is The Web (World Wide Web)?
The World Wide Web, or simply Web, is a way of accessing information over the medium of the
Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the
HTTP protocol, only one of the languages spoken over the Internet, to transmit data. Web services,
which use HTTP to allow applications to communicate in order to exchange business logic, use the
the Web to share information. The Web also utilizes browsers, such as Internet Explorer or Firefox,
to access Web documents called Web pages that are linked to each other via hyperlinks. Web
documents also contain graphics, sounds, text and video.
The Web is just one of the ways that information can be disseminated over the Internet. The
Internet, not the Web, is also used for e-mail, which relies on SMTP, Usenet news groups, instant
messaging and FTP. So the Web is just a portion of the Internet, albeit a large portion, but the two
terms are not synonymous and should not be confused.
http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp
30 | P a g e
Ways to connect to the Internet
Types of internet connections
There are lots of ways to connect devices like mobile phones and computers to the internet.
For some of us, our options depend on where we live, what devices we have, and if we want to
use the internet when we're away from home.
Dial-up connections
To get a dial-up connection, your computer will dial a phone number using your telephone line.
Dial-up connections need a modem to connect to the internet and you pay for a call each time you
dial-up. Dial-up connections are really slow compared to broadband, and are usually too slow for
streaming video and making voice or video calls on the internet.
If you want to do more than read web pages and send emails, you'll probably need a broadband
connection.
Broadband connections
Broadband is a high-speed internet connection.
Unlike dial-up, with broadband your phone line is not tied up. You can make a phone call and be
on the internet at the same time. With broadband, you can watch live news and sport, download
and share large files quickly and shop or bank online more easily.
There are different ways to get broadband which means it doesn't matter where you live in
Australia—everyone can get access to a fast internet connection.
Fixed broadband connections
A 'fixed broadband connection' is a permanent connection to the internet.
If you've got fixed broadband at home, you'll have a broadband modem that you can plug a cable
into. If your modem's also a wireless modem, you'll be able to connect wireless internet devices to
your modem without using a cable.
Wireless connections can be good if you have more than one person and more than one device all
wanting to use the same fixed connection. Most wireless connections let you use the internet in
different rooms and even if you're outside.
31 | P a g e
With a fixed broadband connection, you might also look into getting an internet phone rather than
keeping your traditional phone line.
This is called VoIP—which stands for 'voice over internet protocol'.
Fixed wireless and satellite connections
If you live in a remote part of Australia, you can get a broadband internet connection by using
either a fixed wireless connection or a satellite connection.
Once you have a broadband connection to your home, you might like to set up a wireless router so
you can connect several wireless devices and use them in and around the home.
Mobile broadband connections
You could also get the internet on a mobile broadband connection where you plug a USB modem
into your device and use mobile phone towers to access the internet.
This can be useful if you need the internet when you're out and about, or if you live in an area with
good mobile phone coverage.
Internet on your mobile phone
Many mobile phones let you access the internet if you've signed up for internet in your mobile
phone plan.
'Smartphones' are mobile phones that are like small computers. They have software on them to
make it easier for you to surf the internet, check your email and use social networking sites.
Wireless hotspots
If you're out and about with an internet device like a laptop, tablet or smartphone, you might want
to connect at a wireless hotspot.
Wireless 'hotspots' are places like libraries and cafés, which offer you free access to their
broadband connection. You may need to be a member of the library or a customer at a café to get
the password for the wireless connection.
http://www.internetbasics.gov.au/connecting_to_the_internet_and_the_nbn/types_of_interne
t_connections
32 | P a g e
Top 10 Internet tips and tricks
You don't need the http:// portion of a web page
When entering an Internet address you do not need to type http:// or even www. in the
address. For example, if you wanted to visit Computer Hope you could just type
computerhope.com and press enter. To make things even quicker, if you are visiting a .com
address you can type computerhope and then press Ctrl + Enter to type out the full
http://www.computerhope.com address.
Quickly move between the fields of a web page
If you are filling out an online form, e-mail, or other text field you can quickly move between
each of the fields by pressing the Tab key or Shift + Tab to move back a field. For example, in
the example form below you can click in the "First Name" field type anything and press tab
to switch to the next field.
Example Form
First Name:
Last Name:
E-mail:
Tip: This tip also applies to the buttons, if you press tab and the web developer has designed
correctly the button should be selected and allows you to press the space bar or enter to
push the button.
Tip: With a drop-down box that lists dozens of options you can press the first letter to scroll
down to that letter. For example, click the drop down box below and then press "u" to
quickly scroll to Utah.
State...
Know your Internet browser shortcuts
33 | P a g e
There are dozens of different shortcut keys that can be used with
Internet browsers. Below are a few of our top suggested Internet browser shortcuts.

Press Alt + D to move the cursor into the address bar.

Hold down the Ctrl key and press the + or - to increase and decrease the size of text. Ctrl +
0 will reset the text.

Press the backspace key or press Alt key + left arrow to go back a page.

Press F5 to refresh or reload a web page.

Press F11 to make the Internet browser screen full screen. Press F11 again to return to the
normal view.

Press Ctrl + B to open your Internet bookmarks.

Press Ctrl + F to open the find box to search for text within the web page you are reading.
Related pages

Full listing of Internet Explorer shortcut keys.

Full listing of Mozilla Firefox shortcut keys.
Protect yourself and avoid bad websites

How can I protect myself while online?

Avoid Internet phishing.

Protecting children from harmful material and people on the Internet.
Take advantage of tabbed browsing
Take full advantage of tabbed browsing on all Internet browsers. While reading any web
page if you come across a link that interests you open the link in a new tab so it does not
interrupt your reading. A new tab can be opened by holding down the Ctrl key and clicking
34 | P a g e
the link or if you have a mouse with a wheel press down on the wheel to use it as a middle
mouse button to open the link in a new tab.
Use Internet search engines to their full potential
Get the most out of every search result. If you are not finding what you want try
surrounding the text in quotes. For example, searching for 'computer help' without quotes
returns results with "computer" and "help" anywhere on the page. However, if you search
for "computer help" with the quotes it only return pages with "computer" and "help" next to
each other.
Tip: In every search box you can press enter instead of using the mouse to click the Search
button.

Top 10 unknown Google tricks
Try alternative browsers
Most computer users use the default browser that comes included with the computer, with
Microsoft Windows this is Internet Explorer. There are many great alternative browsers that
are all free to download and use and may have features your current browser does not
include. Below are a few of our favorites, try one or try them all.

Google Chrome

Mozilla Firefox

Opera
Install plugins and add-ons
All of the above alternative browsers also have a large community of volunteers who
develop add-ons and plugins that can be added into the browser. Each of these browsers
has hundreds of thousands of these add-ons that can do such things like the current
weather in your browser window, changing its color, and adding additional functionality.

Top 10 Firefox add-ons
35 | P a g e
Make sure your browser and its plugins are up-to-date
An Internet browser can have many plugins that give it additional functionality. For example,
Adobe Flash is a great way to bring movies and other animated content to the Internet.
Keeping these plugins up-to-date is vital for your computer stability and also security. Using
the below tool you can quickly verify if your plugins are up-to-date and get links to where to
download the latest updates.

Computer Hope system information tool
Use online services
There are hundreds of free online services that can help make using your computer easier,
more productive, and more enjoyable. See our top 10 online services for a listing of our
favorites.
36 | P a g e
Internet Access Providers
The Internet service provider (ISP) is the gatekeeper to online commerce. However, consumers now can
choose from several ISPs, each offering multiple levels of speed and price.
Here is a list of large domestic ISPs. There are cable, DSL and dial-up providers. Most of the ISPs offer
multiple ways to access the Internet. The larger ISPs are at the top.
Common ISP Providers
Comcast. The largest cable provider in the U.S., Comcast provides services to over 17 million internet
customers at speeds of up to 105 Mbps. Comcast also provides additional features such as internet security
and parental controls. Accounts come with 7 email accounts, but storage is limited to 10 MB/ea. Plans start
at $29.99/month for 6 months.
AT&T. AT&T provides DSL and dial-up services, as well as fiber optic connections with its U-Verse service, to
over 17 million subscribers. DSL delivers speeds up to 6.0 Mbps. U-Verse fiber optic delivers speeds up to
24 Mpbs and includes 10 email accounts with unlimited email storage. Dial-up is $22.95/month. DSL starts
at $14.95/month. U-Verse starts at $19.95/month.
Time Warner Cable. Time Warner Cable serves 14 million customers in 39 states. Through its cable
network, it delivers speeds up to 50 Mbps. Its Road Runner service delivers speeds from 768 Kbps to 30
Mbps. Plans start at $19.99/month.
CenturyLink. With its recent acquisition of Qwest Communications, CenturyLink has become the third
largest telecommunications company in the U.S. and has 6.4 million Internet subscribers. It offers DSL and
fiber optic services with speeds up to 40 Mbps. Plans start at $14.95/month.
Charter. In 2009, Charter declared bankruptcy and sold off assets to clear $8 billion worth of debt. Now it
has over 5 million customers in 25 states with cable speeds up to 60 Mbps. Accounts include Internet
security, parental controls, and ten 1GB email accounts. Charter does not offer services in the western
mountain states. Plans start at $19.99/month.
Verizon. Verizon provides fiber optic, DSL, and dial-up. Its fiber optic service, which is called FiOS, is
available in California, Texas, Florida, and a group of northeastern states. DSL plans starts at 0.5 to 1 Mbps
and include nine email accounts and 10 MB of storage. FiOS offers speeds of 15 to 50 Mbps. Dial-up is
$14.99/month. DSL starts at $29.99/month. FiOS starts at $49.99/month.
Cox. Cox provide cable Internet services to approximately 4 million customers in 16 states. It provides
speeds of 3 to 50 Mbps. Accounts also feature 10 email addresses, security software, and responsive
customer support. Plans start at $15.99/month for 3 months.
37 | P a g e
Web browsers
Top 5 web browsers
Browsers, Chrome, Firefox, Internet Explorer, Safari
Thousands of users surf the web every day, and most of them use it for browsing.
Browsers are the easiest way of finding the information you need, but is the browser
you are using the best option? Here you can find a list of the main browsers found
today and their characteristics.
Browser Statistics
W3Schools lists the most popular browsers as follow in terms of market share:
Internet Explorer (18.1%)
Mozilla Firefox (35.2 %)
Google Chrome (39.3 %)
Safari (4.3 %)
Opera (2.2 %)
These were the data known as of May 2012, with Google Chrome as the main
browser today, and it shows how statistics have changed throughout the years.
38 | P a g e
Although these statistics may not be accurate, they give you an idea of what are the
preferred browsers, but here is a more detailed list of the browsers and their
characteristics.
Internet Explorer
For years the most popular browser, Microsoft’s Internet Explorer’s rate of use has
increasingly decreased through the years. However, its newest version, Internet
Explorer 9, features some interesting things, and make it worthy of consideration
again: It is faster, has a cleaner interface, smaller notifications, security is upgraded,
and features tab isolation (so that not all your tabs crash when one does), a feature
first seen in Google’s Chrome. It also features one box for both addresses and web
search, again something Chrome started doing, and a download manager. It
supports HTML5, CSS3 and SVG. The downside is that it only works for Windows
Vista and Windows 7.
Firefox
In 2003 Mozilla’s browser, Firefox, started competing with
Internet Explorer, becoming more popular than it quickly. A cross-platform browser,
it works on Windows, Mac OS X and Linux, and it is one of the most standardcompliant browsers. Among its most appealing characteristics are a better rendering
of the web pages compared to Internet Explorer, add-ons and extensions to
personalize your searches, session restoration, a download manager and pop-up
39 | P a g e
blocking. It also features the all-in-one address and search bar, although it also has a
separate search bar that you can personalize to browse in Google, Yahoo, Bing, or
even other websites, like dictionaries, Wikipedia, etc. It supports HTML5, CSS3 and it
enables developers to create full-screen video content and apps.
Chrome
Launched by Google in 2008, Chrome was meant to rethink browsing completely. It
is the most used browser today, and its popularity continues to grow, as it has lived
up to the users’ expectations. Chrome was the first browser to introduce tab
isolation and one box for both addresses and searches, and it started as a faster and
cleaner browser. Aside from all of this, it also includes some useful features, like a
quick calculation system included in the address bar, or drag and drop downloads
and searches, as well as developer resources. It also enables multiple profiles in one
window, and allows you to access your printer from any enabled web app through
Google Cloud Print.
Safari
Apple’s Safari was initially developed for Mac OS, but it was later introduced to
Windows (XP, Vista or 7). It is the default browser for Mac, but it doesn’t rank very
high in number of users. Standards-compliant, browsing with it is fast and secure,
and supports HTML5, CSS3 and SVG. An interesting feature of this browser is that it
40 | P a g e
removes advertisements and pop-ups and leaves just the text, to allow you to read
any given article without being bothered by these. Like all browsers now, it enables
DNS prefetching to allow users to make searches using the address bar.
Opera
The least popular of the browsers listed, Opera initially required a user fee, but is
now free. It supports all major web standards, including HTML5, CSS3 and SVG, and
it works on Mac OS X, Windows and Linux. It is the only computer browser that has a
phone version (see a complete review of mobile browsers here), and although it
may not offer as many features as other browsers, it has the sleekest interface and
is fast, secure and very easy to use.
http://www.onbile.com/info/top-5-web-browsers/
41 | P a g e
Notes on Using the Internet and the World Wide Web
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
42 | P a g e
Notes on using the Internet and the World Wide Web
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
43 | P a g e
Network Fundamentals
Vocabulary
cable modem
uses coaxial cable to send and receive data
Client
a software program such as Internet Explorer
Client/server network
a network design model
communications channels
include telephone systems, fiber optics, satellites,
microwaves, and any combination of these
DSL; Internet connection technology that provides for
the transfer of information to a computer at a highspeed bandwidth over ordinary copper telephone
lines
similar to an intranet, but it allows specific users
outside of an organization to access internal
information systems
small, simple, inexpensive device that joins multiple
computers together
network designed for the exclusive use of people
within an organization
network that connects personal computers,
workstations, and other devices such as printers and
scanners in a limited geographical area
device that enables a computer to transmit data over
telephone lines
device on a network; generally shares resources such
as a printer, programs, and other hardware
acts like a switchboard through a firewall
digital subscriber line
Extranet
Hub
Intranet
Local Area Network (LAN)
Modem
Node
proxy server
Public Switched Telephone Network
(PSTN)
Router
T-1 line
Wide Area Network (WAN)
digital, mobile, and standard telephones are
supported through this network
directs traffic on the internet or on multiple
connected networks
type of fiber optic telephone line that can transmit
up to 1.544 megabits per second
network that covers a large geographical area and
can contain communication links across
metropolitan, regional, or national boundaries
44 | P a g e
Wireless Internet Service Provider
provides connection speeds more than 30 times
faster than dial-up connections
Objectives:






Define network
Identify benefits
Evaluate risks of network
Network configurations
Relationships between computers (LAN and WAN)
Troubleshooting network problems
45 | P a g e
Computer and Wireless Networking Basics
By Bradley Mitchell, About.com Guide
Fundamental Computer Networks Concepts
In the world of computers, networking is the practice of linking two or more computing devices
together for the purpose of sharing data. Networks are built with a combination of computer
hardware and computer software. Some explanations of networking found in books and tutorials
are highly technical, designed for students and professionals, while others are geared more to
home and business uses of computer networks.
Internet Servers and Clients
Internet servers make the Internet possible. All of the machines on the Internet are either servers
or clients. The machines that provide services to other machines are servers. And the machines
that are used to connect to those services are clients. There are Web servers, e-mail servers, FTP
servers and so on serving the needs of Internet users all over the world.
When you connect to www.howstuffworks.com to read a page, you are a user sitting at a client's
machine. You are accessing the HowStuffWorks Web server. The server machine finds the page
you requested and sends it to you. Clients that come to a server machine do so with a specific
intent, so clients direct their requests to a specific software server running on the server machine.
For example, if you are running a Web browser on your machine, it will want to talk to the Web
server on the server machine, not the e-mail server.
A server has a static IP address that does not change very often. A home machine that is dialing up
through a modem, on the other hand, typically has an IP address assigned by the ISP every time
you dial in. That IP address is unique for your session -- it may be different the next time you dial
in. This way, an ISP only needs one IP address for each modem it supports, rather than one for
each customer.
Ports and HTTP
Any server machine makes its services available using numbered ports -- one for each service that
is available on the server. For example, if a server machine is running a Web server and a file
transfer protocol (FTP) server, the Web server would typically be available on port 80, and the FTP
46 | P a g e
server would be available on port 21. Clients connect to a service at a specific IP address and on a
specific port number.
Once a client has connected to a service on a particular port, it accesses the service using a specific
protocol. Protocols are often text and simply describe how the client and server will have their
conversation. Every Web server on the Internet conforms to the hypertext transfer protocol
(HTTP). You can learn more about Internet servers, ports and protocols by reading How Web
Servers Work.
Networks, routers, NAPs, ISPs, DNS and powerful servers all make the Internet possible. It is truly
amazing when you realize that all this information is sent around the world in a matter of
milliseconds! The components are extremely important in modern life -- without them, there
would be no Internet. And without the Internet, life would be very different indeed for many of us.
Types of Computer Networks
Networks can be categorized in several different ways. One method defines the type of a network
according to the geographic area it spans. Alternatively, networks can also be classified based on
topology or on the types of protocols they support.
Networks categorized by Geographical Area
Networks can be categorized by size as local area networks (LANs) or wide area networks
(WANs).
Most LANs connect personal computers, workstations and other devices such as printers
and scanners in a limited geographical area, such as an office building, school,
variation
of the LAN that uses few if any physical wires to connect devices. To communicate on a
WLAN, the computer and other devices access the network must each contain a wireless
device such as a network card, flash card, PC card, USB network adapter, or other type of
built-in wireless capacity or a wireless network card.
A WAN covers a large geographical area and can contain communication links across
metropolitan, regional, or national boundaries. The communication area might be as large
as a state, or even the world. The largest WAN is the Internet. Most WANs consist of two
or more LANs and are connected by routers
What is a network topology? In communication networks, a topology is a usually
schematic description of the arrangement of a network, including its nodes and connecting
47 | P a g e
lines. There are two ways of defining network geometry: the physical topology and the
logical (or signal) topology.
The physical topology of a network is the actual geometric layout of workstations. There
are several common physical topologies, as described below and as shown in the
illustration.
In the bus network topology, every workstation is connected to a main cable called the bus.
Therefore, in effect, each workstation is directly connected to every other workstation in
the network.
In the star network topology, there is a central computer or server to which all the
workstations are directly connected. Every workstation is indirectly connected to every
other through the central computer.
In the ring network topology, the workstations are connected in a closed loop
configuration. Adjacent pairs of workstations are directly connected. Other pairs of
workstations are indirectly connected, the data passing through one or more intermediate
nodes.
If a Token Ring protocol is used in a star or ring topology, the signal travels in only one
direction, carried by a so-called token from node to node.
The mesh network topology employs either of two schemes, called full mesh and partial
mesh. In the full mesh topology, each workstation is connected directly to each of the
others. In the partial mesh topology, some workstations are connected to all the others,
and some are connected only to those other nodes with which they exchange the most
data.
The tree network topology uses two or more star networks connected together. The
central computers of the star networks are connected to a main bus. Thus, a tree network
is a bus network of star networks.
Logical (or signal) topology refers to the nature of the paths the signals follow from node to
node. In many instances, the logical topology is the same as the physical topology. But this
is not always the case. For example, some networks are physically laid out in a star
configuration, but they operate logically as bus or ring networks.
48 | P a g e
http://whatis.techtarget.com/WhatIs/images/topology.gif
Types of Network Equipment
The building blocks of a home computer network include adapters, routers and/or access points.
Wired (and hybrid wired/wireless) networking also involves cables of varying types. Finally, largescale enterprise networks in particular often employ other advanced equipment for specialized
communication purposes.
Ethernet - Cables and Switch
Ethernet is a physical and data link layer technology for local area networks. Homes, schools and
offices around the world all commonly use Ethernet standard cables and adapters to network
personal computers.
Wireless Local Area Networking
Wi-Fi is the most popular wireless communication protocol for local area networks. Private home
and business networks, and public hotspots, use Wi-Fi to network computers and other wireless
devices to each other and the Internet. Bluetooth is another wireless protocol commonly used in
cellular phones and computer peripherals for short range network communication.
49 | P a g e
Internet Service
The technologies used to connect to the Internet are different than those used for connecting
devices on local area network. DSL, cable modem and fiber provide fixed broadband Internet
service, while WiMax and LTE additionally support mobile connectivity. In geographic areas where
these high-speed options are unavailable, subscribers are forced to use older cellular services,
satellite or even dial-up Internet instead.
TCP/IP and Other Internet Protocols
TCP/IP is the primary network protocol of the Internet. A related family of protocols built on top of
TCP/IP allows Web browsers, email and many other applications to communicate across networks
globally. Applications and computers using TCP/IP identify each other with assigned IP addresses.
Network Routing, Switching and Bridging
Most computer networks direct messages from source to destination devices using any of three
techniques called routing, switching and bridging. Routers use certain network address
information contained inside messages to send them ahead to their destination (often via other
routers). Switches use much of the same technology as routers but typically support local area
networks only. Bridging allows messages to flow between two different types of physical
networks.
For more information about networking, read the first chapter of Mike Meyer’s COMPTIA
Network+ Certification Passport
www.mhprofessional.com/downloads/products/0071789057/0071789057
50 | P a g e
Notes on Network Fundamentals
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
51 | P a g e
Internet Explorer and Internet Safety
Vocabulary
Cookie
Small text file that a Web site uses to identify a specific computer
Home page
The introductory page for a web site
HTML
Hypertext Markup Language, a standardized system for tagging text
files to achieve font, color, graphic, and hyperlink effects on Web pages
An element in a document that links to another place in the same
document or to an entirely different document or a web site
A web browser
Hyperlink
Internet explorer
Phishing
Spam
Spoofing
Web browser
Personal information scam where an email message appears to come
from a legitimate source and then uses the information gained to
commit identity theft
Junk email
Email spoofing is the forgery of an email header so that the message
appears to have originated from someone or somewhere other than
the actual source
A software application for retrieving, presenting, and traversing
information resources on the Web
Objectives:










Identify risks and safeguards associated with internet use and wireless communications
Review definition of hyperlink, web address and HTML
Describe Internet Explorer features
Use history lists and favorites
Use buttons on the toolbar
Add or remove a favorite
Change Home page
Save and print information from Web page
Set security and privacy parameters
Use Internet Explorer Help
52 | P a g e
Risks and Safeguards associated with wireless Communications

Identify risks and safeguards associated with wireless communications.
by Alexandra Phillips on 17 January 2012 888
http://prezi.com/opnw10qah37s/risks-and-safeguards-associated-with-wirelesscommunications-ao/
Top 10 User Wi-Fi Safeguards
Your users are your first line of defense. They need to play an active role in helping to protect information
systems. Listed below are the Top 10 steps they can take when using wireless networks.
1.
Signal strength. In general, the closer the user is to the access point, the stronger the signal and the faster the
transfer rate. Rogue (unauthorized) access points may or may not be in the same facility as authorized
devices. Users should know that signal strength alone, is not sufficient to determine authorized networks.
2. Manual connection. Portable devices such as laptops and handhelds should be configured so that they do not
automatically connect to wireless networks. A manual process helps ensure that the device connects to the
appropriate wireless network.
3. Legitimate network. Since Wi-Fi signals can travel a long distance, users should check with the management of
the facility that provides the connectivity to ensure they are connecting to the appropriate
network. Unauthorized "evil twin" networks can capture logon credentials and other sensitive information.
4. Encryption. There are many different types of encryption methods used to secure wireless networks. Wired
Equivalent Privacy (WEP) is the oldest and least preferred. Wi-Fi Protected Access (WPA) is newer and offers
better protection. WPA2 is the newest and should be used if possible. Users should use Virtual Private
Network (VPN) when connecting to corporate systems.
5. Shoulder surfing. Ensure that others cannot obtain the user's ID and password as it is typed. In addition,
sensitive information should not be able to be read on the screen by unauthorized personnel.
6. Screen aware Users should look at the address bar URL. This will help protect against phishing
attacks. Secure pages typically have a URL starting with https and include a secure page notification such as a
lock.
7. Firewalls. Firewalls help restrict traffic to and from the device. Users should ensure the firewall is turned on so it
can actively protect the device.
8. Patch management. Users should ensure that operating system and security protection software is patched
and up-to-date. Ensure browsers and updates to third party software packages are applied in a timely
manner. Critical updates should be tested and applied as soon as possible.
9. Battery saver. Portable devices constantly search for available networks. Users can increase battery life by
turning off Wi-Fi when it isn't needed. This also helps ensure that an intruder can't connect to the device.
10. Incident management. Users should inform the appropriate personnel if they believe they logged into the wrong
network, sensitive information such as their ID/password was compromised, their device was lost or stolen, etc.
Risk assessments help organizations identify, manage, and reduce their risks related to mobile computing devices and
communicating with wireless networks.
53 | P a g e
http://www.altiusit.com/files/blog/Top10UserWiFiSafeguards.htm
For more information on Internet Explorer: www.scribd.com/doc/3116372
54 | P a g e
Notes on Internet Explorer and Internet Safety
___________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
55 | P a g e
Using the Internet for Research
Vocabulary
Boolean Logic
a way to search databases using NOT, AND, OR operators
Directory
Web site organized by category
Index
Web site organized by category
Keyword
Used to search for information in a search engine
Link List
Collections of links on a particular topic
Math symbol
An option to make keywords more specific and narrow your search
results
finding information in a search engine using words that appear next to
each other
preprogrammed queries or questions suggested by the search engine that
often lead to other Web pages containing similar information
automated index tool used to find information online
Phrase searching
Related search
Search engine
Shared bookmark
Wildcard character
form of collaborative information sharing that lets users organize and
share favorites, or bookmarks
The * symbol, or asterisk, used in place of letters when searching a search
Objectives:





Understand what a search engine is and how it works
Identify the most popular search engines
Understand and use methods to make Web searches more effective
Understand methods to refine search results
Evaluating web content
56 | P a g e
Web Search Made Simple
How to Search The Web Faster, Easier, and More Efficiently
By Wendy Boswell
If you've ever been frustrated with your Web search results, today is your lucky day. Keep reading for a few
simple methods that will make your Web search efforts faster, easier, and more efficient.
1. Use more than one search engine
Every search engine is different, and will give you different results. If you can't find what you're looking for
quickly with the first search engine that you try, there's plenty more out there that can give you more
information.
Web Search Engines:

The Ultimate Search Engine List: All-purpose search engines, visual search engines, people search
engines...you'll find all these and more in this list of search engines, a comprehensive guide to the
best search engines on the Web.

Top Ten Niche Search Engines: There are literally hundreds of really great niche search engines on
the Internet that focus on specific topics: images, jobs, blogs, etc.
2. Know your search engine inside and out
It's easy to skim the surface of your favorite search engine and only use the most prominent features;
however, most search engines have a wide variety of advanced search options, tools, and services that are
only available to those dedicated searchers that take the time to search 'em out. All of these options are for
your benefit - and can help make your searches more productive.
Get to Know Your Search Engine:

General Search Tips: These general search tips will work on almost every search engine on the
Web.

The Best Search Engines: Pick the best search engines for your searching needs with Search Engines
101, a great way to explore more of your search topic.
3. Get to know common search terms
Knowing the basics of common Web search terms can help you make your Web search time a bit more
productive - and thankfully, they're really not that difficult to learn.
Common Search Terms:

Web Search Glossary: A basic dictionary of Web search terms.
57 | P a g e

Boolean Search: Boolean search techniques can be used to carry out effective searches, cutting out
many unrelated documents.

Basic Web Search-Add and Subtract: One of the most basic techniques is using the add and
subtract symbols in your search string.

Look for a Specific Phrase: When you use quotation marks around a phrase, you are telling the
search engine to only bring back pages that include these search terms exactly how you typed them
in-order, proximity, etc.
4. Go off the beaten path
You can certainly find a ton of useful information with your friendly neighborhood search engine, but
there's lots of material out there that they don't cover. That's where the Invisible Web comes in.
Using the Invisible Web:

What is the Invisible Web?: The term "invisible web" mainly refers to the vast repository of
information that search engines and directories don't have direct access to, like databases.

Invisible Web Directory: Many individuals and institutions have put together invisible Web
directories, which you can use as a jumping off point to surf the Invisible Web.

Complete Planet: CompletePlanet is a great Invisible Web research tool.
5. Frame your query differently
If at first you don't succeed, try, try, again - but try again just a little bit differently. For instance, if you're
not getting anything good for "pogo stick championships", try "winners pogo", or "pogo stick first place",
etc.
Web Search: A Different View:

Seven Habits of Highly Effective Web Searchers: Over the years I've developed a few search habits
that have made me a more effective searcher, and with just a little practice, you can too.

Find a Synonym: Find a synonym with Ask.com.

Are You Feeling Lucky?: If you've ever visited the Google home page, then you'll have seen a
button right under the search bar titled "I'm Feeling Lucky."
6. Spell it Right, Spell it Wrong
Most search engines these days, if you misspell a word, will politely ask you "Did you mean...." and correct
your spelling for you. Definitely take advantage of this feature - however, you can also get some pretty
interesting results by deliberately misspelling the term that you might be searching for.
58 | P a g e
It's Okay to Misspell?

Find a Web Dictionary with Dictionary.com: Dictionary.com is one of those sites that anyone who
searches on the Web on a regular basis should have bookmarked.

Does Google Worry About Spelling and Capitalization?: What happens if you accidentally hit the
Caps Lock on your computer when searching on Google? Are all your search efforts in vain?
7. Metasearch the Web
One search engine is great, but a dozen search engines - at one time - is even better.
Metasearch Engines

Search.com: Search.com retrieves results from Google, Ask Jeeves, LookSmart, AltaVista, MSN
Search, and more.

Mamma Metasearch: Mamma.com is a good, solid meta search engine that provides fast and
relevant results and excellent advanced search options.

Metasearch with Clusty: Learn about Clusty, a meta search engine with lots of interesting features,
including a blogosphere meta search option, customization tabs, and of course, clustering.

Dogpile: Dogpile, a meta search engine, is a great way to compare and compile results from many
different search engines and directories at the same time.
8. Web Search Around the World
Don't limit your Web search to just your home country - go international.
Global Web Search

International Search Engines: Search all over the world through the eyes of international search
engines.

Free Language Translation: Free language translation sites on the Web have made it possible for
Web searchers to read documents and sites from all over the world, in any language.
9. Ask an Expert for Help
There are PLENTY of places on the Web where you can find expert help in a variety of subjects.
How to Find an Expert

Question and Answer Search Engines: If you're looking for a specific topic with a relatively narrow
focus, question and answer search engines might just be what you're looking for. These search
engines aggregate the vast resources of the Web into strictly defined categories; in other words,
they make it extremely easy to find something.
59 | P a g e

Ask an Expert: Sometimes we forget in this age of Internet research that we can actually ask an
expert for help. There are plenty of places both on and off the Web that you can tap into to find
expert help for any kind of research topic that you can think of.
10. Piggyback on Other People's Searches
One of my favorite things about Web search right now is the ability to harvest other people's Web searches
all over the Web with the power of social bookmarking and social networking.
What are Other People Searching For?

Social Bookmarking Sites: These are sites that allow users to post their favorite sites, using tags (or
keywords) to categorize and organize them; then other users can take these bookmarks and add
them to their own collection or share them.

What is Social Networking?: You might have heard the term "social networking" in your travels on
the Web. What does this mean?

How to Use del.icio.us: del.icio.us is a social bookmarks manager. It allows you to easily add sites
you like to your personal collection of links.
http://websearch.about.com/od/searchingtheweb/tp/web_search_simple.htm
60 | P a g e
Boolean Search: Make Your Searches Smarter
By Wendy Boswell
If you've been trying to find a way to make your Web searches more sophisticated, effective, and
streamlined, then Boolean searching is the way to go. In this article, we'll talk about the origins of
Boolean terminology, how Boolean search really works, and look at specific examples of this incredibly
easy to use search system.
Where does the term Boolean originate from?
Boolean searching is built on a method of symbolic logic developed by George Boole, a 19th century
English mathematician. Most online databases and search engines support Boolean searches. Boolean
search techniques can be used to carry out effective searches, cutting out many unrelated documents.
Is Boolean Search Complicated?
Using Boolean Logic to broaden and/or narrow your search is not as complicated as it sounds; in fact,
you might already be doing it. Boolean logic is just the term used to describe certain logical operations
that are used to combine search terms in many search engine databases and directories on the Net. It's
not rocket science, but it sure sounds fancy (try throwing this phrase out in common conversation!).
Basic Boolean Search Operators - AND
Using AND narrows a search by combining terms; it will retrieve documents that use both the search
terms you specify, as in this example:

Portland AND Oregon
Basic Boolean Search Operators - OR
Using OR broadens a search to include results that contain either of the words you type in. OR is a good
tool to use when there are several common spellings or synonyms of a word, as in this example:

liberal OR democrat
Basic Boolean Search Operators - NOT
Using NOT will narrow a search by excluding certain search terms. NOT retrieves documents that
contain one, but not the other, of the search terms you enter, as in this example:

Oregon NOT travel.
Keep in mind that not all search engines and directories support Boolean terms. However, most do, and
you can easily find out if the one you want to use supports this technique by consulting the FAQ's
(Frequently Asked Questions) on a search engine or directory's home page.
http://websearch.about.com/od/searchingtheweb/tp/web_search_simple.htm
Web Search-Add and Subtract
Use Basic Math to Enhance Your Web Search
By Wendy Boswell
There are a few basic principles that you can successfully use in nearly all the search engines out there
to find exactly what it is that you are looking for, and one of the most basic techniques is using the add
and subtract symbols in your Web search string.
Basic Math Can Help With Your Web Search
Basic math can really help you in your Web search quest. Here's how it works:

The minus symbol:
Use the "-" symbol when you want a search engine to find pages that have one search word on them,
but you need the search engine to exclude other words commonly associated with that search word. For
example:

Superman -Krypton
You are telling the search engines that you would like to find pages that only have the words
"Superman", but exclude the listings that include information about "Krypton". This is a fast and easy
way to eliminate extra information and narrow your search down; plus you can do a string of excluded
words, like this: superman -krypton -"lex luthor".

The plus symbol:
Now that you know how to eliminate search terms, here's how you can add them in, using the "+"
symbol. For example, if you have terms that must be returned in all your search results, you can place
the plus symbol in front of the terms that you need included, such as:

football+nfl
Your search results would now have both these terms included.
Search Engine Math - Just Part of a Web Search Strategy
Using the plus and minus symbols is just a small part of a successful Web search strategy. Be as specific
as humanly possible. Search engines are not intuitive and will not be able to figure out that when you
type in "jewelry", you actually are looking for "handmade freshwater pearl watches". Don't be timid
about telling a search engine specifically what it is that you are looking for, and using different
techniques (in different ways) to get better results.
http://websearch.about.com/od/internetresearch/a/addandsubtract.htm
Notes on Using the Internet for Research
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
63 | P a g e
Using Microsoft Live.com (or Microsoft Account)
Vocabulary
Address book
A directory of personal and professional contact information
Appointment
An Outlook activity that the user will attend at a set date and time
Archive
An electronic repository that organizes stores, and saves old files.
Bcc
Including someone in an e-mail message without their name being
visible to the other recipients.
A person, organization, or business in the Outlook Address Book.
Contact
Distribution list
Email
Meeting
Signature
Spam
Task
Collection of contact e-mail addresses that can be used to send a
message to a group.
An electronic message sent using a computer network
An Outlook activity that it has a scheduled date and time and
includes other people and a place
An electronic identifier inserted in e-mail messages that can
contain text, hyperlinks, pictures, or and Electronic Business Card
Unsolicited or junk e-mail
An Outlook activity involving the user that can be monitored to
completion
Objectives:




Identify various tools in Live or Microsoft account
Use Outlook to send, receive, delete and manage email
Create and share Word, Excel or PowerPoint files
Understand the use of Live to communicate instantly with others
64 | P a g e
Simple Questions: What is a Windows Live ID or a Microsoft account?
By Ciprian Adrian Rusen on 03/10/2012
Have you been using devices, tools or services from Microsoft? Then, at some point
you might have been asked to provide a Windows Live ID. In Windows 8 you have been asked
for a Microsoft Account. Never understood what they are and why you need them, let alone the
benefits of having them? If that’s the case, then you should read this article, as it will explain
everything you need to know about the Windows Live ID, also called Microsoft Account.
What is Windows Live ID/Microsoft Account?
The question is relatively simple to answer - Windows Live ID or Microsoft Account is an ID
composed from an e-mail address and password, which you can use to login to most Microsoft
websites, services and properties such as: Hotmail, Xbox Live, all Windows Live services
(including SkyDrive and Messenger). It can be used also on your Windows computer, to
enhance parental controls for the user accounts used by your children. In Windows 8 it is used
to get access to all its features, including integration with Skydrive or to use the application
Store. Windows 8, at least so far, is the only place where you will encounter the naming
Microsoft Account instead of Windows Live ID. They are the same thing though.
Do I Have a Windows Live ID/Microsoft Account?
How do you know if you have a Windows Live ID? Easy - are you using any of these services:
Hotmail, Windows Live Messenger or Xbox Live? If you are, then you already have a Windows
65 | P a g e
Live ID. Use the same e-mail and password to log in to any other websites or services requesting
a Windows Live ID.
How to Create a Windows Live ID/Microsoft Account (With or Without a Microsoft E-mail
Address)?
If you don’t have a Windows Live ID, you can easily create one by completing all the required
forms on the Windows Live Signup Page. When you complete the form, Microsoft proposes
that you create an ID using one of their e-mail services (Hotmail or Live.com).
If you already have an e-mail address from another provider and you don’t want to create a
new one with Microsoft, you CAN use that one instead. On the signup page, look for a link
saying: "Or use your own email address". Click on it and wait for a slightly different form to load.
Complete your existing e-mail address, a password and all the other requested details, and you
will have your Windows Live ID created in no time.
Watchout: If you create a Windows Live ID using an existing email address, it is best not to use
the same password. Create a different password for your Windows Live ID. In this case, if the
password for any of these two accounts gets stolen, the "hacker" won’t have access to both
services.
What’s In It For Me?
66 | P a g e
I guess by now you are asking yourself: Why should I create a Windows Live ID/Microsoft
Account? What do I get by having it?
The simple answer is - easy access to almost all Microsoft products, services, properties and
websites. Create an ID if you are using or planning to use:




Any of the tools in the Windows Live Essentials suite.
Devices such as: your Xbox console and the Xbox Live service, your Zune media player or your
Windows Phone 7.
Get a free e-mail account from Microsoft (Hotmail or Live.com).
Use all the features included with Windows 8.
http://www.7tutorials.com/simple-questions-what-windows-live-id
67 | P a g e
Notes on Using Microsoft Live Account
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
68 | P a g e
Notes on Using Microsoft Live Account
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
69 | P a g e
Internet Ethics
Vocabulary
Intellectual rights
Copyright
Ethics
term sometimes used to refer to the legal protection afforded to
owners of intellectual capital. This notion is more commonly referred
to as "intellectual property"
legal concept, enacted by most governments, giving the creator of an
original work exclusive rights to it, usually for a limited time
branch of philosophy that involves systematizing, defending and
recommending concepts of right and wrong conduct
Objective:



Intellectual property
Unethical search engine practices
Ethical behavior on the Web
70 | P a g e
Business Ethics on the Internet: Understanding Copyright Laws
written by: Arun Kumar (PowercutIN)•edited by: Rebecca Scudder•updated: 3/20/2011
Downloading a song from the Internet is easy. Before downloading, pause and reflect whether
it is any different than stealing from a physical store? This article discusses some Internet ethics
and copyright laws that may land you in difficulty if you break them.
Due Diligence
This discussion of Internet ethics and copyright laws covers both written
and unwritten rules and regulations. Unwritten Internet ethics and disregard for copyright laws
may not bother you but breaking them does harm the people who created and own certain
material. Copyright laws protect any work created for use on the Internet or anywhere - any
type of intellectual property – monograms, written material, drawing, paintings, research
papers, etc. Most Internet copyright infringements are related to music and website designs.
Imagine the effort that went into creating an album, which is then posted to the Internet so the
people who worked on the album can make some money while earning fame. However, some
"intelligent person" uploaded the same album to a site from where you can download the
album without paying a cent. You may be thrilled, but consider this – are you not denying the
effort and motivation that went into creating that album? Will that band ever use the Internet
to sell their future albums or even bother to create another album? From my point of view, you
just walked into a shop, picked up the album, and walked away without paying for it. This is not
ethical. Can you consider the same action on the Internet to be ethical?
Partnership Agreement
71 | P a g e
IMPORTANT: Works of literary, musical, dramatic, and certain other intellectual nature carry
copyrights as soon as you create them. You need not specifically register the copyright. Federal
laws assign copyright to your creation as soon as you create it.
The following paragraphs on Internet ethics and copyright laws cover the copyright laws, ethics,
and associated penalties.
Penalties Associated With Copyright Infringement
This section about Internet ethics and copyright laws explains the penalties you can incur when
you infringe copyright. The federal government can penalize you financially. It can also send
you for a jail term (two years maximum). In some cases, it can be both – depending upon the
severity of copyright infringement.
Next time you feel like downloading your favorite song without paying any fee from an
unauthorized website, pause and think about the Internet ethics and copyright laws as well as
possible penalties. You may find that paying a nominal fee is better than paying for a copyright
infringement suit.
Dealing with Important Internet Ethics and Copyright Laws Issues
On the Internet you will find some people cheating others in any way possible (including "fake"
money making schemes). Here are some cases of copyright infringement using Internet ethics,
and methods to avoid them:

Copying material from another website to your website
Create your own material instead of copy-pasting others' material. You can make substantial
changes to the original work and get a copyright for the derivative work. You need to use
citations wherever you use the original work.

Creating an ebook or a webpage by just compiling information from different websites and
printed material
People often forget to cite references to print media while posting it on the Internet. This is also
unethical. If you have used material from any Internet or printed source, give it attribution.
72 | P a g e

Using other pieces of any form of correspondence in your website or ebook without
obtaining explicit consent from the owner(s)
While asking the original creators for permission before using emails or any other form of
correspondence, make sure you keep a copy showing that the creator/owner agreed to let you
use the material. There have been some cases where the owners later accused the user of
violation for using the material, especially correspondence.

Using monograms, images, etc. from the Internet without attributing the ownership to the
real owner
You can always ask the owner of the material for permission to use the material. Most owners
may be happy to let you use such material as it offers free advertising or gives them exposure.
If the owner says no, you should not use it. If you are already using it, you should remove it
immediately if the owner asks you to remove his/her work from your site.
http://www.brighthub.com/office/entrepreneurs/articles/74018.aspx
73 | P a g e
Notes on Internet Ethics
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
74 | P a g e