CCRI, PACE Program Workplace Core Computing Course Living Online Study Guide Study Materials for the IC3 The Study Guides, class handouts and the Workplace Core Computing Course itself were created to help individuals study for the IC3 Digital Literacy Certification, IC3. The IC3 is “an internationally recognized credential that reflects the most relevant skills needed in today’s academic and business environment.” For this course, we chose not to use textbooks to minimize the cost to our participants. We also reviewed textbooks designed to teach IC3 skills and found they didn’t provide enough information, especially for the Living Online section of the exam. We relied primarily on Internet sources to create this guide. Citations are included. Students are encouraged to use this study material and the materials on our class website to prepare for the IC3 exams. In addition to these resources, we will offer practice tests throughout the program so participants will be comfortable with the exam structure. We encourage everyone to write down questions they have during this course. You should try to research the answers to these questions on your own using the Internet. One of the advantages to being in a class is to help one another. We have created a section in the class website where you can post your questions and the answers so your classmates can also benefit from the new knowledge. The PACE program at the Community College of RI offered two sessions of the Workplace Core Computing Course (WC3). Some students from these sessions reviewed the material and offered advice and edits. I would like to thank these students for the invaluable assistance to make these study materials more complete and ready for distribution. Thank you so much – Donna Millette, Betty Jacques, Julie Good and Karen Letellier. Disclaimer: This product was funded by a grant awarded by the U.S. Department of Labor’s Employment and Training Administration. The product was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability, or ownership. 1|Page Table of Contents Technology and Society ................................................................................................ 4 Notes page ....................................................................................................................... 9 Computer Related Issues .............................................................................................. 10 Notes page ....................................................................................................................... 12 Communication and Collaboration on the Web ............................................................. 14 Notes page ....................................................................................................................... 26 Using the Internet and the World Wide Web................................................................. 28 Notes page ....................................................................................................................... 42 Network Fundamentals ................................................................................................ 44 Notes page ....................................................................................................................... 51 Internet Explorer and Internet Safety ............................................................................ 52 Notes page ....................................................................................................................... 55 Using the Internet for Research .................................................................................... 56 Notes page ....................................................................................................................... 63 Using Microsoft Live ..................................................................................................... 64 Notes page ....................................................................................................................... 68 Internet Ethics .............................................................................................................. 70 Notes page....................................................................................................................... 74 2|Page This page left blank intentionally. 3|Page Technology and Society Vocabulary Business to Business (B2B) Business to Consumer (B2C) Business to Government (B2G) digital cash E-commerce transactions between businesses, such as between a company and a supplier. Online transactions between businesses and consumers Transactions between businesses and governmental agencies electronic commerce a system that allows you to pay by transmitting a number from one computer to another Also called e-commerce. Conducting business on the Internet online learning delivering learning programs via the Internet telecommuting working from home and staying connected to the office via the Internet Objectives: Describe ways computers and technology have changed society Identify ways people use computers and the Internet Discuss how technology has transformed traditional processes The changes in technology over the last 50 years have been amazing. For example, TV went from black and white to color, phones went mobile, computers shrank from needing an air conditioned room to laptops, post became email, microwave ovens appeared for cooking….. Technology is the fastest growing industry as of right now and it has no signs of slowing down anytime soon. In fact everything will be run by technology in the near future. http://prezi.com/bvd0m8xgqz4i/how-has-technology-changed-in-the last-50-years/ 4|Page Using Computers at Work, School and Home It is becoming increasingly difficult to find employment that does not require some knowledge of computers. Technology today is integrated into almost every facet of life and influences how you work, use computers at home and learn about the world outside your doors. Computers facilitate and enhance your everyday activities in many ways. Some of the ways are described below. Collecting Information The Internet and the Web are major forms of technology that probably affect your daily life. Using the Internet is a fast and easy way to find the information you need. Organizing Information Computers can help you organize information. Evaluating Information Computer software can help you evaluate information. Companies sometimes use Applicant Tracking software (ATS) to evaluate resumes based on key words or other criteria. Communicating Information Computers connected through a network or the Internet can exchange information simultaneously. Technology provides many communication options such as email, instant messaging, blogs, wikis and social websites such as Facebook, Twitter and Pinterest. Increasing Productivity Our productivity can be increased by using computers and applications, online access to resources, including communication with experts and specialists. Collaborating with Others and Solving Problems The Internet has given us the capability to collaborate with people all over the world. In class Kathy told us how she collaborates with business partners each week using Skype. This gives her greater access to experts and colleagues around the World and increases her effectiveness and productivity, too. Because of this capability, people have more opportunity to work from home, or telecommute. 5|Page Creating Communities Online communities and social networking sites provide opportunities to socialize with others who have common interests. Linked in is a great example of a social network site that can help job seekers search for jobs as well as network with others to find job openings or to get information about industries. Facilitate Learning We can use the Internet as a resource for learning and discovering new facts and information. Recently major universities, such as MIT, have offered courses online for free. These Massive Open Online Courses (MOOCs) are changing the way individuals connect to higher education and study. Promoting Creativity Modern technology provides tools you can use to create a range of artistic work that can be published for a real audience anywhere in the world. Supporting Critical Thinking When searching for information on the Internet, you need to use critical thinking. When reading information online, particularly pages that are designed to persuade you to buy or do something, you must evaluate the information critically, analyze the point of view and motivations, and wait to act until you have gathered and considered all the information. Facilitating Daily Life Conducting business on the Internet is easy. Commercial web sites let us buy and sell items. You can access electronic catalogs, select goods, store selections in a digital cart, and then check out by paying with a credit card or online account. Local, state, and national government Web sites provide access to many services. For example, many local government agencies provide Web sites where you can pay your water bill, renew your license, and sign up for municipal services. Using Computer Technology in Everyday Life Computers also affect your day to day activities more than you realize. Using desktop and laptop computers represents only a fraction of your interactions with computer technology. Some examples of technology we use every day are: ATMs (Automatic Teller Machines), Credit Card and other commerce systems, Computerized robots, POS (Point of Sale) Systems, Weather Predicting 6|Page and Reporting Systems, GPS (Global Positioning systems), and as was discussed in today’s lesson – Embedded computers in items such as household electronics and our automobiles. Using Technology to Transform Traditional Processes Many of the traditional procedures and practices in business, education and government have been transformed by the integration of personal computers and use of the Internet. Here are just a few examples: E-Commerce E-commerce is changing the way the world does business. According to Internet World Stats (www.internetworldstats.com/stats.htm) more than two billion people are connected to the Internet. Internet speed will continue to increase as more people add fiber optics, cable modems, or digital subscriber lines (DSL). All this activity and high-speed connection indicate more online businesses. Using e-commerce, you can buy and sell just about any product through the Internet. Many people hesitate before making online purchases because they fear someone will steal their credit card numbers. However, digital cash is a technology designed to ease those fears. The digital cash system allows you to pay by transmitting a number from one computer to another. The digital cash numbers are issued by a bank and represent a specified sum of real money; each number is unique. When you use digital cash, no one can obtain information about you. As an alternate, some credit card companies provide a virtual account option. Business Connections Business to Business (B2B) describes e-commerce transactions between businesses, such as between a company and a supplier. This includes the online exchange of products, services, and information. Business to Consumer (B2C) describes online transactions between businesses and consumers. A third category is Business to Government (B2G), which includes transactions between businesses and governmental agencies. Retail businesses often use radio-frequency identification (RFID) tags, which are small electronic devices that identify and track goods from the point of delivery or manufacturing to the point of sale, similar to a bar code. Unlike bar codes, however, scanners can read information from RFID tags from several feet away. Businesses use RFID to improve the efficiency of inventory tracking 7|Page and management. Governments are using them in passports and in transportation, such as electronic toll collection on highways and in mass transit passes. Media In the past, the distribution of media was primarily through newspapers, magazines, television or radio. The Internet opened a new category of communications media. Media can be distributed by anyone who has an Internet connection. Music, video, audio, pictures, text – all can be distributed online through email, blogs, Web sites, and other types of Internet distribution channels. Online Learning For some time, people have been able to obtain their education via distance learning methods. Earlier nontraditional methods include television and correspondence courses that were completed through the mail. In the last few years, the Internet has become a way to deliver online learning. Imagine being able to complete college without leaving your home, take enrichment classes, or complete a job training program. Online learning Web sites, such as Ed2Go and CSM, make virtual learning possible. Learning Management system (LMS) programs help teachers deliver online courses. These programs are an integrated set of Web-based teaching tools that provide guidance and testing for the student. Three of the more popular of these learning management systems are Blackboard, Moodle, and Angel. The LMS that we are using for this course is Coursesites, which is a free version of Blackboard that teachers can use. 8|Page Notes on Technology and Society ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ 9|Page Computer Related Issues Objectives: Identify ways to prevent health related disorders and injuries Discuss considerations when purchasing computers Health Concerns - Computer Use Users are a key component in any information system. Therefore, protecting users from harm is just as important as protecting hardware, software and data. The widespread use of computer has led to some important user health concerns. Users can take some precautions to reduce the health risks. Computers and Health Risks A repetitive strain injury (RSI) is an injury or disorder of the muscles, nerves, tendons, ligaments and joints. Computer-related RSIs include tendonitis and carpal tunnel syndrome. RSIs are the largest job related injury and illness problem in the US today. Long-term computer use can lead to tendonitis and Carpel Tunnel Syndrome (CTS). Factors that cause these disorders include prolonged typing, prolonged mouse usage, or continual shifting between the mouse and keyboard. If untreated, these disorders can lead to permanent physical damage. A user can take many precautions to prevent these types of injuries. Take frequent breaks during the computer session to exercise your hands and arms. To prevent injury due to typing, place a wrist rest between the keyboard and the edge of your desk. To prevent injury while using the mouse, place the mouse at least six inches from the edge of the desk. In this position, your wrist is flat on the desk. Finally, minimize the number of times you switch between the mouse and keyboard, and avoid using the heel of your hand as a pivot point when typing or using the mouse. Another type of health-related condition due to computer use is computer vision syndrome (CVS). A user may have CVS if he experiences sore, tired, burning, itching or dry eyes; blurred or double vision, distance blurred vision after prolonged staring at a display device and documents, difficulty focusing on the screen image, color fringes or after-images when looking away from the display, and increased sensitivity to light. Eyestrain associated with CVS is not thought to have serious or 10 | P a g e long-term consequences. There are some techniques you can follow to ease eyestrain when working with computers. Techniques to ease Eye Strain Every 10 to 15 minutes, take an eye break Blink your eyes every five seconds Place your display device about an arm’s length away from your eyes with the top of the screen at eye level with the top of the screen at eye level or below Use large fonts If you wear glasses, ask your doctor about computer glasses Adjust the lighting People who spend their workday using the computer sometimes have other ailments. Some of these include back or neck pain, muscle fatigue and emotional fatigue. Many problems like these associated with computer use can be alleviated by taking short breaks (10-15 minutes for every 2 hours at the computer) and ensuring that the workplace is designed ergonomically. Ergonomics and workplace design Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. Ergonomic studies have shown that using the correct type and configuration of chair, keyboard, display device, and work surface helps users work comfortably and efficiently and helps protect health. For more information on ergonomics and using computers safely, please read “How to make your computer workstation fit you” Oregon OSHA Standards and Technical Resources Publication http://www.cbs.state.or.us/osha/pdf/pubs/1863.pdf 11 | P a g e Notes on Computer Related Issues ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ 12 | P a g e Notes on Computer Related Issues ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ 13 | P a g e Communication and Collaboration on the Web Vocabulary Asynchronous Not at the same time; blog a journal maintained by an individual or a group and posted on a Web site for public viewing and comment A service provided by certain ISPs that allows a group of people to communicate with each other by typing at their keyboards. Mail you can send to other people on a network at an organization or you can use an Internet service provider to send email to any computer in the world a service that sends messages in real time while you and someone else are both connected to the Internet an Internet discussion forum chat rooms Electronic Mail (email) Instant Messaging (IM) message boards MMS Newsgroups SMS Social Networking site Synchronous text messaging VoIP Web 2.0 web application Multi-media Service; text, audio and video messages are sent using this An area on a computer network, especially the Internet, devoted to the discussion of a specified topic Short Message Service; "text messages" are transmitted by this an online community that provides interaction for groups of people who share a similar interest or activity At the same time; using a cell phone or other mobile device to send and receive written messages Voice over Internet Protocol; Using the Internet to send synchronous audio communication Web sites where users can modify the content Webinar software that has no installation requirements; can be used on all Operating Systems and is accessed through a Web browser over a network such as Intranet or Internet a seminar or presentation that takes place on the Internet Wiki a collaborative web site that can be edited by anyone with access 14 | P a g e Objectives: Identify most popular forms of electronic communication Discuss the advantages and disadvantages of electronic communications Netiquette Cloud storage and cloud computing Discuss collaboration and various web based collaboration tools 15 | P a g e Categorizing Electronic Communication As a worldwide electronic system, the Internet provides many communication services, which can be organized into the following categories: Electronic mail: Electronic mail or email is similar to regular mail. You have a message, an address, and a carrier that figures out how to transfer the message from one location to another. You can send email to other people on a network at an organization, or you can use the Internet service provider to send email to any computer in the world. Instant Messaging (IM): You use instant messaging services to send messages in real time. In other words, you can send and receive messages while you and someone else are both connected to the Internet. Text Messaging: With text messaging you use a cell phone, mobile device or computer to send and receive written messages. Voice over IP (VoIP): Sometimes called audio over IP, you use this service to make phone calls with an Internet connection instead of a regular phone line. Your voice is converted to a digital signal that travels over the Internet Online Conferencing: Also referred to as video conferencing, you can conduct a conference with yourself and one or more other participants at different sites by using computer networks to transmit audio and video data. Chat rooms: Chat rooms are Websites that allow real-time communication so you can exchange messages with others through the computer. Social networking sites: These Websites provide a way to build online communities of people who share common interests or activities. Blog postings/comments: A blog (short for Web log) is a type of personal journal created by one person or by a group; entries are published in reverse chronological order. Message boards and newsgroups: Both of these services provide bulletin board systems that serve as discussion sites; users can post messages asking for assistance. Shelly, G., (2009). Discovering Computers and Microsoft Office 2010: A Fundamental Combined Approach. 16 | P a g e Advantages and Disadvantages of Email Technology and Human Communication Email is just one of the types of electronic communication available to us. 12 Advantages and 6 disadvantages of email and other types of electronic communication. In a work place, communication is extremely important. Employees are now luckily able to make use of the many advantages of email. • It is very easy to communicate effectively with anybody within the office or anywhere in the world regardless of where they are situated. • Another advantage of having business email communication at work is that you can respond to clients quickly and easily. This means that you no longer need to spend hours on the phone, trying to get through and leaving messages with receptionists. • Messages can be sent quickly, in an instant. • The cost of sending an email is very low, unlike postage and other methods of communication. • It is easy to use, simply type the name of the recipient, a subject line and your message and click the send button. • You can copy others on correspondence. You can even blind copy someone (BCC) if you don't want the recipient of the email to know that you are sending it to another person. A large number of people can be copied and communicated with at once. • You can send attachments, such as photographs, files and spreadsheets. • You can book appointments in other people's diaries. They can then accept or decline the appointment. • Email saves time. No need to spend valuable time going to someone else's office. • Emails can be responded to in your own time, when it is convenient for you. It is not invasive like a visitor or phone call which requires immediate attention. • It speeds up the workflow process, documents can be sent for comment, corrections can be made quickly. • Emailing saves paper and printing costs. 17 | P a g e Disadvantages of email Although there are a variety of advantages and disadvantages of email, the advantages outweigh the disadvantages by far. Unfortunately the good always comes with the bad. Some of the disadvantages of email may be that your staff spends too much time on personal messages as opposed to work related stuff. This is the fundamental disadvantage to allowing employees email access. However if a positive and trusting relationship is able to be maintained, between management and staff, then this could contribute to a more productive working environment, where employees can enjoy the many advantages of using email. 1. Spam emails can be sent which can clutter your inbox. 2. Email hoaxes. 3. Viruses can be sent by email. 4. Misunderstandings can occur if messages are not constructed properly. 5. Not everyone has internet connectivity. 6. Confidential information can be easily forwarded and disseminated and if done in error could easily end up in the wrong hands. www.workplace-communication.com/advantages-disadvantages-email.html 18 | P a g e Netiquette Netiquette refers to Internet etiquette. This simply means the use of good manners in online communication such as e-mail, forums, blogs, and social networking sites to name a few. It is important to use netiquette because communication online is non-verbal. Most often online communication consists of reading something someone else has typed. This type of communication does not allow each person to see facial expressions, body language, or hear intonation. Because of this, messages can often be misinterpreted. By following netiquette, online communication becomes clearer. Especially in business and career related online communications netiquette should be used to ensure that correct spelling, grammar, and punctuation are put in place to project professionalism. Netiquette also includes the use of emoticons (such as :) :( ;) and others) to explain an emotion. In e-mail, netiquette means not flooding someone’s inbox with forwarded messages or spam mail. Following netiquette will help you to maintain and establish positive online relationships as well as develop a positive online reputation. Helpful websites: Why Do People Use Netiquette? http://www.ehow.com/about_4609432_why-do-people-use-netiquette.html This website gives a succinct explanation of what Netiquette is, how it can be implemented, and the benefits of using Netiquette. It also provides links to EHow.com articles on netiquette. Netiquette Home Page http://www.albion.com/netiquette/ This is a very comprehensive website that includes a link to the online edition of Netiquette by Virginia Shea. It also includes a netiquette quiz and mailing list subscription. Netiquette (Internet Etiquette) http://www.livinginternet.com/i/ia_nq.htm RFC 1855 This website breaks netiquette down into four categories and provides links to more information on each. Those categories are: Netiquette Basics, Netiquette of Sending, Netiquette of Replying, and Netiquette of Confidentiality Internet Etiquette http://www.dtcc.edu/cs/rfc1855.html This is a very lengthy website that details various types of netiquette. It breaks things into categories such as communication to one and communication to many. Learn the Net Netiquette http://www.learnthenet.com/learn-about/netiquette/ 19 | P a g e This website includes many articles on navigating the internet. It includes a video on netiquette, Internet lingo, and links to a list of emoticons. The website also discusses social networking, e-mail, and surfing the web among others http://www.auburn.edu/citizenship/netiquette.html Cloud Storage and Cloud Computing Nowadays all business operations make use of cloud storage and cloud computing to manage and store their data. Even though widely popular, many are still unaware of the difference between these two. Following are the points which differentiate a cloud storage from a cloud computing system. Cloud storage Cloud storage is a model network of online data storage, where data is stored and hosted by a third party server. Here the data is held in a large data center which is spread around the globe. This technology consists of both the service end and the user end. The cloud will be made up of many servers which are configured so as to work in unison. With cloud storage, instead of saving your data in your PC, you can save it in a remote data base. The computer will then provide the ultimate connection between the PC and the database. When you obtain a cloud storage service from a provider, you only need to pay for the amount of storage space that your data is actually consuming. The types Keeping your photographs in a social networking website, storing files in a drop box folder are the common examples of cloud storage. This can be either public or private. Companies which want to create a private cloud can grant the accessibility solely to its members. When the user and service provider are different, and when the service provider has access to the user’s data base, then it is called a public cloud storage system. Hybrid cloud storage models are also becoming popular nowadays. 20 | P a g e Cloud computing The traditional cloud storage doesn’t make use of any specialized equipment for its functions. But when the new offerings of technology are integrated into the traditional cloud storage, then it is known as cloud computing. While some cloud applications will help you gain access through the servers, some other applications will require the help of custom software to access the cloud. Cloud computing is a technology which offers the remote access to the stored data, without much interaction with the service provider. Cloud computing also helps in bringing about increased resource utilization which is proven to be beneficial to the customers. Cloud computing helps in cost reduction and will also enable the easy availability of services on demand. Here the customer pays not only for the storage space, but also for the software that is being used. There are many new software applications which are used in Cloud computing. Server virtualization software Using a server virtualization software allows many instances of a single operating system, and the applications associated with it to run on a single machine. This is then delivered on the cloud computing network by a process which is termed as Infrastructure as a Service (IaaS). The requirements If your internet connection is weak your cloud computing services are also affected. The network infrastructure of the cloud provider should be able to withstand the large amount of traffic that is generated by its users. Cloud computing should also be able to deliver the resources in a rapid manner so as to accommodate its users. About the author Grace is a content strategy expert associated with Godot Media. She has worked closely with online businesses, as a website content writer. Her other interests – besides online content strategy, internet marketing and search engine optimization – are technology, sports and fashion. http://www.organicmarketingservices.com/the-differences-between-cloud-computing-andcloud-storage/ 21 | P a g e 10 top tools for business brainstorming and collaboration Scott Gerber 14 July '12, 08:00pm As more startups migrate their companies to the cloud, it can be difficult to gather the entire team for a productive collaboration session. Not only does everyone need to be in the same place at the same time, but they’ve got to come prepared with their creative juices, focused mindsets and positive attitudes. However, with endless digital distractions that thrive in browser tabs and fit into the palms of our hands, keeping everyone on the same “page” isn’t easy. But regardless of whether your team members are working remotely or in the cubicles around you, a handful of online tools can ensure that your next brainstorming meeting will be full of fresh ideas and effective communication among your employees. I asked a panel of successful young entrepreneurs the following question: What’s your favorite new digital tool for collaboration or brainstorming and why? Here are 10 business-changing tools for joining mental forces with your team members and putting your skills together for projects: 1. Producteev for Productive Collaboration “I highly recommend cross-platform tool Producteev for collaboration. It’s easy to set up, easy to use, and fantastic for team members who are working on many projects at the same time with others. There is space to comment on projects to maximize productive collaboration, and it’s all about getting tasks done.” -Doreen Bloch, Poshly Inc. 22 | P a g e 2. Try the New Basecamp “The revamped Basecamp from 37signals has taken collaboration to a new level. It’s completely redesigned and rethought, and I can see the impact on our team already. It’s no Google Wave, but I’ll recommend it to anyone.” -John Meyer, 9 Clouds 3. Facebook Member Pages Work “Closed Facebook groups are nothing new, but I love how many mastermind communities are shifting into the platform to meet users where they already spend hours each day. In one such group, requests are posted around the clock, and it’s not unusual to see colleagues giving feedback and collaborating across time zones and over weeks and months.” -Kelly Azevedo, She’s Got Systems 4. Trust the Team With Teambox “We switched over to Teambox as our main project management system a few months ago. I have been pleasantly surprised by the unique functionalities it offers teams. Every week, I post conversations in a “New Idea” project that is then discussed in real time. The platform really allows everyone to piggyback on other ideas in order to come with something truly collaborative.” -Logan Lenz, Endagon 23 | P a g e 5. Stick With What Works, Google Docs “It’s not new but it’s solid. We use Google Docs for everything. In my opinion, it’s the simplest way to have multiple people work on one document and keep things organized.” -John Hall, Digital Talent Agents 6. Join.me All the Way! “Check out Join.me. It’s a super simple screen-sharing tool that I’ve been using recently, ever since I realized that Skype screen-sharing is terrible, especially when you’re working with someone on the other side of the country. It takes three minutes to install, and you’ve able to give or take away control from your collaborator. It’s also great for sales presentations.” -Matthew Ackerson, PetoVera 7. Go Zoho for Online Editing “Zoho allows you to collaborate with its online Wiki, edit Word and Excel documents, and have live discussions. Brainstorming through email or any static site is incredibly difficult, as you lose the dynamic interaction of all participants. Sometimes, the energy created from a response is as important as the content of the comment. Zoho allows you to collaborate in real time.” -Aaron Schwartz, Modify Watches 8. Asana Is Online Zen 24 | P a g e “I’ve been using Asana a lot recently for collaboration and deadlines, and it’s got a simplicity and ease of use that’s hard to find elsewhere. It’s also free if you’ve got a small team, which helps keep your overhead low.” -Colin Wright, Exile Lifestyle 9. Hammer Away on Yammer “Yammer is much more than a company social network. Our Yammer feed has a constant stream of new ideas, articles and more. It’s a safe zone where we encourage employees to think differently without worrying about the minutiae. Yammer has facilitated crossdepartmental collaboration and made our company more innovative.” -Bhavin Parikh, Magoosh, Inc. 10. Work and Play With Skype “Although it’s been around for a while, I still use Skype on a daily basis for collaboration. It’s great for brainstorming with my team, checking in with clients, and even a little “watercooler” chat — which can be challenging to spark with a completely virtual company.” -Heather Huhman, Come Recommended http://thenextweb.com/apps/2012/07/14/14/10-top-tools-for-business-brainstorming-andcollaboration/ 25 | P a g e Notes on Communication and Collaboration on the Web ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ 26 | P a g e Notes on Communication and Collaboration on the Web ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ 27 | P a g e Using the Internet and the World Wide Web Vocabulary Access provider A business that provides access to the Internet Browser application software that allows users to access and view web pages cable internet service high speed access through cable television network via cable modem DSL digital subscriber line; an internet connection technology that provides for the transfer of information to a computer at a highspeed bandwidth over ordinary copper telephone lines FiOS Fiber Optic Service; high speed Internet access over fiber-optic cables Internet Worldwide system composed of thousands of smaller networks IP Internet Protocol; a numerical addressing system that uniquely identifies computers and networks linked to the Internet ISP Internet Service Provider; regional access provider OSP Online Service Provider; provides Internet access and member only features such as instant messaging URL Uniform Resource Locator; the address of a Web page, FTP site, audio stream or other Internet resource web server computer that delivers requested web pages to your computer Web site a collection of related web pages WiFi Wireless Fidelity; uses radio signals to provide high-speed connection to wireless computers and devices 28 | P a g e Wireless ISP Wireless Internet service providers; provides connection speeds more than 30 times faster than dial-up connections World Wide Web (www) service available on the Internet that consists of a worldwide collection of electronic documents Objectives: Define the Internet and World Wide Web Discuss ways to connect to the Internet Identify common access providers Identify parts of a domain name and define IP address Identify common web browsers 29 | P a g e What is The Internet? The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of languages known as protocols. What is The Web (World Wide Web)? The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the HTTP protocol, only one of the languages spoken over the Internet, to transmit data. Web services, which use HTTP to allow applications to communicate in order to exchange business logic, use the the Web to share information. The Web also utilizes browsers, such as Internet Explorer or Firefox, to access Web documents called Web pages that are linked to each other via hyperlinks. Web documents also contain graphics, sounds, text and video. The Web is just one of the ways that information can be disseminated over the Internet. The Internet, not the Web, is also used for e-mail, which relies on SMTP, Usenet news groups, instant messaging and FTP. So the Web is just a portion of the Internet, albeit a large portion, but the two terms are not synonymous and should not be confused. http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp 30 | P a g e Ways to connect to the Internet Types of internet connections There are lots of ways to connect devices like mobile phones and computers to the internet. For some of us, our options depend on where we live, what devices we have, and if we want to use the internet when we're away from home. Dial-up connections To get a dial-up connection, your computer will dial a phone number using your telephone line. Dial-up connections need a modem to connect to the internet and you pay for a call each time you dial-up. Dial-up connections are really slow compared to broadband, and are usually too slow for streaming video and making voice or video calls on the internet. If you want to do more than read web pages and send emails, you'll probably need a broadband connection. Broadband connections Broadband is a high-speed internet connection. Unlike dial-up, with broadband your phone line is not tied up. You can make a phone call and be on the internet at the same time. With broadband, you can watch live news and sport, download and share large files quickly and shop or bank online more easily. There are different ways to get broadband which means it doesn't matter where you live in Australia—everyone can get access to a fast internet connection. Fixed broadband connections A 'fixed broadband connection' is a permanent connection to the internet. If you've got fixed broadband at home, you'll have a broadband modem that you can plug a cable into. If your modem's also a wireless modem, you'll be able to connect wireless internet devices to your modem without using a cable. Wireless connections can be good if you have more than one person and more than one device all wanting to use the same fixed connection. Most wireless connections let you use the internet in different rooms and even if you're outside. 31 | P a g e With a fixed broadband connection, you might also look into getting an internet phone rather than keeping your traditional phone line. This is called VoIP—which stands for 'voice over internet protocol'. Fixed wireless and satellite connections If you live in a remote part of Australia, you can get a broadband internet connection by using either a fixed wireless connection or a satellite connection. Once you have a broadband connection to your home, you might like to set up a wireless router so you can connect several wireless devices and use them in and around the home. Mobile broadband connections You could also get the internet on a mobile broadband connection where you plug a USB modem into your device and use mobile phone towers to access the internet. This can be useful if you need the internet when you're out and about, or if you live in an area with good mobile phone coverage. Internet on your mobile phone Many mobile phones let you access the internet if you've signed up for internet in your mobile phone plan. 'Smartphones' are mobile phones that are like small computers. They have software on them to make it easier for you to surf the internet, check your email and use social networking sites. Wireless hotspots If you're out and about with an internet device like a laptop, tablet or smartphone, you might want to connect at a wireless hotspot. Wireless 'hotspots' are places like libraries and cafés, which offer you free access to their broadband connection. You may need to be a member of the library or a customer at a café to get the password for the wireless connection. http://www.internetbasics.gov.au/connecting_to_the_internet_and_the_nbn/types_of_interne t_connections 32 | P a g e Top 10 Internet tips and tricks You don't need the http:// portion of a web page When entering an Internet address you do not need to type http:// or even www. in the address. For example, if you wanted to visit Computer Hope you could just type computerhope.com and press enter. To make things even quicker, if you are visiting a .com address you can type computerhope and then press Ctrl + Enter to type out the full http://www.computerhope.com address. Quickly move between the fields of a web page If you are filling out an online form, e-mail, or other text field you can quickly move between each of the fields by pressing the Tab key or Shift + Tab to move back a field. For example, in the example form below you can click in the "First Name" field type anything and press tab to switch to the next field. Example Form First Name: Last Name: E-mail: Tip: This tip also applies to the buttons, if you press tab and the web developer has designed correctly the button should be selected and allows you to press the space bar or enter to push the button. Tip: With a drop-down box that lists dozens of options you can press the first letter to scroll down to that letter. For example, click the drop down box below and then press "u" to quickly scroll to Utah. State... Know your Internet browser shortcuts 33 | P a g e There are dozens of different shortcut keys that can be used with Internet browsers. Below are a few of our top suggested Internet browser shortcuts. Press Alt + D to move the cursor into the address bar. Hold down the Ctrl key and press the + or - to increase and decrease the size of text. Ctrl + 0 will reset the text. Press the backspace key or press Alt key + left arrow to go back a page. Press F5 to refresh or reload a web page. Press F11 to make the Internet browser screen full screen. Press F11 again to return to the normal view. Press Ctrl + B to open your Internet bookmarks. Press Ctrl + F to open the find box to search for text within the web page you are reading. Related pages Full listing of Internet Explorer shortcut keys. Full listing of Mozilla Firefox shortcut keys. Protect yourself and avoid bad websites How can I protect myself while online? Avoid Internet phishing. Protecting children from harmful material and people on the Internet. Take advantage of tabbed browsing Take full advantage of tabbed browsing on all Internet browsers. While reading any web page if you come across a link that interests you open the link in a new tab so it does not interrupt your reading. A new tab can be opened by holding down the Ctrl key and clicking 34 | P a g e the link or if you have a mouse with a wheel press down on the wheel to use it as a middle mouse button to open the link in a new tab. Use Internet search engines to their full potential Get the most out of every search result. If you are not finding what you want try surrounding the text in quotes. For example, searching for 'computer help' without quotes returns results with "computer" and "help" anywhere on the page. However, if you search for "computer help" with the quotes it only return pages with "computer" and "help" next to each other. Tip: In every search box you can press enter instead of using the mouse to click the Search button. Top 10 unknown Google tricks Try alternative browsers Most computer users use the default browser that comes included with the computer, with Microsoft Windows this is Internet Explorer. There are many great alternative browsers that are all free to download and use and may have features your current browser does not include. Below are a few of our favorites, try one or try them all. Google Chrome Mozilla Firefox Opera Install plugins and add-ons All of the above alternative browsers also have a large community of volunteers who develop add-ons and plugins that can be added into the browser. Each of these browsers has hundreds of thousands of these add-ons that can do such things like the current weather in your browser window, changing its color, and adding additional functionality. Top 10 Firefox add-ons 35 | P a g e Make sure your browser and its plugins are up-to-date An Internet browser can have many plugins that give it additional functionality. For example, Adobe Flash is a great way to bring movies and other animated content to the Internet. Keeping these plugins up-to-date is vital for your computer stability and also security. Using the below tool you can quickly verify if your plugins are up-to-date and get links to where to download the latest updates. Computer Hope system information tool Use online services There are hundreds of free online services that can help make using your computer easier, more productive, and more enjoyable. See our top 10 online services for a listing of our favorites. 36 | P a g e Internet Access Providers The Internet service provider (ISP) is the gatekeeper to online commerce. However, consumers now can choose from several ISPs, each offering multiple levels of speed and price. Here is a list of large domestic ISPs. There are cable, DSL and dial-up providers. Most of the ISPs offer multiple ways to access the Internet. The larger ISPs are at the top. Common ISP Providers Comcast. The largest cable provider in the U.S., Comcast provides services to over 17 million internet customers at speeds of up to 105 Mbps. Comcast also provides additional features such as internet security and parental controls. Accounts come with 7 email accounts, but storage is limited to 10 MB/ea. Plans start at $29.99/month for 6 months. AT&T. AT&T provides DSL and dial-up services, as well as fiber optic connections with its U-Verse service, to over 17 million subscribers. DSL delivers speeds up to 6.0 Mbps. U-Verse fiber optic delivers speeds up to 24 Mpbs and includes 10 email accounts with unlimited email storage. Dial-up is $22.95/month. DSL starts at $14.95/month. U-Verse starts at $19.95/month. Time Warner Cable. Time Warner Cable serves 14 million customers in 39 states. Through its cable network, it delivers speeds up to 50 Mbps. Its Road Runner service delivers speeds from 768 Kbps to 30 Mbps. Plans start at $19.99/month. CenturyLink. With its recent acquisition of Qwest Communications, CenturyLink has become the third largest telecommunications company in the U.S. and has 6.4 million Internet subscribers. It offers DSL and fiber optic services with speeds up to 40 Mbps. Plans start at $14.95/month. Charter. In 2009, Charter declared bankruptcy and sold off assets to clear $8 billion worth of debt. Now it has over 5 million customers in 25 states with cable speeds up to 60 Mbps. Accounts include Internet security, parental controls, and ten 1GB email accounts. Charter does not offer services in the western mountain states. Plans start at $19.99/month. Verizon. Verizon provides fiber optic, DSL, and dial-up. Its fiber optic service, which is called FiOS, is available in California, Texas, Florida, and a group of northeastern states. DSL plans starts at 0.5 to 1 Mbps and include nine email accounts and 10 MB of storage. FiOS offers speeds of 15 to 50 Mbps. Dial-up is $14.99/month. DSL starts at $29.99/month. FiOS starts at $49.99/month. Cox. Cox provide cable Internet services to approximately 4 million customers in 16 states. It provides speeds of 3 to 50 Mbps. Accounts also feature 10 email addresses, security software, and responsive customer support. Plans start at $15.99/month for 3 months. 37 | P a g e Web browsers Top 5 web browsers Browsers, Chrome, Firefox, Internet Explorer, Safari Thousands of users surf the web every day, and most of them use it for browsing. Browsers are the easiest way of finding the information you need, but is the browser you are using the best option? Here you can find a list of the main browsers found today and their characteristics. Browser Statistics W3Schools lists the most popular browsers as follow in terms of market share: Internet Explorer (18.1%) Mozilla Firefox (35.2 %) Google Chrome (39.3 %) Safari (4.3 %) Opera (2.2 %) These were the data known as of May 2012, with Google Chrome as the main browser today, and it shows how statistics have changed throughout the years. 38 | P a g e Although these statistics may not be accurate, they give you an idea of what are the preferred browsers, but here is a more detailed list of the browsers and their characteristics. Internet Explorer For years the most popular browser, Microsoft’s Internet Explorer’s rate of use has increasingly decreased through the years. However, its newest version, Internet Explorer 9, features some interesting things, and make it worthy of consideration again: It is faster, has a cleaner interface, smaller notifications, security is upgraded, and features tab isolation (so that not all your tabs crash when one does), a feature first seen in Google’s Chrome. It also features one box for both addresses and web search, again something Chrome started doing, and a download manager. It supports HTML5, CSS3 and SVG. The downside is that it only works for Windows Vista and Windows 7. Firefox In 2003 Mozilla’s browser, Firefox, started competing with Internet Explorer, becoming more popular than it quickly. A cross-platform browser, it works on Windows, Mac OS X and Linux, and it is one of the most standardcompliant browsers. Among its most appealing characteristics are a better rendering of the web pages compared to Internet Explorer, add-ons and extensions to personalize your searches, session restoration, a download manager and pop-up 39 | P a g e blocking. It also features the all-in-one address and search bar, although it also has a separate search bar that you can personalize to browse in Google, Yahoo, Bing, or even other websites, like dictionaries, Wikipedia, etc. It supports HTML5, CSS3 and it enables developers to create full-screen video content and apps. Chrome Launched by Google in 2008, Chrome was meant to rethink browsing completely. It is the most used browser today, and its popularity continues to grow, as it has lived up to the users’ expectations. Chrome was the first browser to introduce tab isolation and one box for both addresses and searches, and it started as a faster and cleaner browser. Aside from all of this, it also includes some useful features, like a quick calculation system included in the address bar, or drag and drop downloads and searches, as well as developer resources. It also enables multiple profiles in one window, and allows you to access your printer from any enabled web app through Google Cloud Print. Safari Apple’s Safari was initially developed for Mac OS, but it was later introduced to Windows (XP, Vista or 7). It is the default browser for Mac, but it doesn’t rank very high in number of users. Standards-compliant, browsing with it is fast and secure, and supports HTML5, CSS3 and SVG. An interesting feature of this browser is that it 40 | P a g e removes advertisements and pop-ups and leaves just the text, to allow you to read any given article without being bothered by these. Like all browsers now, it enables DNS prefetching to allow users to make searches using the address bar. Opera The least popular of the browsers listed, Opera initially required a user fee, but is now free. It supports all major web standards, including HTML5, CSS3 and SVG, and it works on Mac OS X, Windows and Linux. It is the only computer browser that has a phone version (see a complete review of mobile browsers here), and although it may not offer as many features as other browsers, it has the sleekest interface and is fast, secure and very easy to use. http://www.onbile.com/info/top-5-web-browsers/ 41 | P a g e Notes on Using the Internet and the World Wide Web ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ 42 | P a g e Notes on using the Internet and the World Wide Web ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ 43 | P a g e Network Fundamentals Vocabulary cable modem uses coaxial cable to send and receive data Client a software program such as Internet Explorer Client/server network a network design model communications channels include telephone systems, fiber optics, satellites, microwaves, and any combination of these DSL; Internet connection technology that provides for the transfer of information to a computer at a highspeed bandwidth over ordinary copper telephone lines similar to an intranet, but it allows specific users outside of an organization to access internal information systems small, simple, inexpensive device that joins multiple computers together network designed for the exclusive use of people within an organization network that connects personal computers, workstations, and other devices such as printers and scanners in a limited geographical area device that enables a computer to transmit data over telephone lines device on a network; generally shares resources such as a printer, programs, and other hardware acts like a switchboard through a firewall digital subscriber line Extranet Hub Intranet Local Area Network (LAN) Modem Node proxy server Public Switched Telephone Network (PSTN) Router T-1 line Wide Area Network (WAN) digital, mobile, and standard telephones are supported through this network directs traffic on the internet or on multiple connected networks type of fiber optic telephone line that can transmit up to 1.544 megabits per second network that covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries 44 | P a g e Wireless Internet Service Provider provides connection speeds more than 30 times faster than dial-up connections Objectives: Define network Identify benefits Evaluate risks of network Network configurations Relationships between computers (LAN and WAN) Troubleshooting network problems 45 | P a g e Computer and Wireless Networking Basics By Bradley Mitchell, About.com Guide Fundamental Computer Networks Concepts In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a combination of computer hardware and computer software. Some explanations of networking found in books and tutorials are highly technical, designed for students and professionals, while others are geared more to home and business uses of computer networks. Internet Servers and Clients Internet servers make the Internet possible. All of the machines on the Internet are either servers or clients. The machines that provide services to other machines are servers. And the machines that are used to connect to those services are clients. There are Web servers, e-mail servers, FTP servers and so on serving the needs of Internet users all over the world. When you connect to www.howstuffworks.com to read a page, you are a user sitting at a client's machine. You are accessing the HowStuffWorks Web server. The server machine finds the page you requested and sends it to you. Clients that come to a server machine do so with a specific intent, so clients direct their requests to a specific software server running on the server machine. For example, if you are running a Web browser on your machine, it will want to talk to the Web server on the server machine, not the e-mail server. A server has a static IP address that does not change very often. A home machine that is dialing up through a modem, on the other hand, typically has an IP address assigned by the ISP every time you dial in. That IP address is unique for your session -- it may be different the next time you dial in. This way, an ISP only needs one IP address for each modem it supports, rather than one for each customer. Ports and HTTP Any server machine makes its services available using numbered ports -- one for each service that is available on the server. For example, if a server machine is running a Web server and a file transfer protocol (FTP) server, the Web server would typically be available on port 80, and the FTP 46 | P a g e server would be available on port 21. Clients connect to a service at a specific IP address and on a specific port number. Once a client has connected to a service on a particular port, it accesses the service using a specific protocol. Protocols are often text and simply describe how the client and server will have their conversation. Every Web server on the Internet conforms to the hypertext transfer protocol (HTTP). You can learn more about Internet servers, ports and protocols by reading How Web Servers Work. Networks, routers, NAPs, ISPs, DNS and powerful servers all make the Internet possible. It is truly amazing when you realize that all this information is sent around the world in a matter of milliseconds! The components are extremely important in modern life -- without them, there would be no Internet. And without the Internet, life would be very different indeed for many of us. Types of Computer Networks Networks can be categorized in several different ways. One method defines the type of a network according to the geographic area it spans. Alternatively, networks can also be classified based on topology or on the types of protocols they support. Networks categorized by Geographical Area Networks can be categorized by size as local area networks (LANs) or wide area networks (WANs). Most LANs connect personal computers, workstations and other devices such as printers and scanners in a limited geographical area, such as an office building, school, variation of the LAN that uses few if any physical wires to connect devices. To communicate on a WLAN, the computer and other devices access the network must each contain a wireless device such as a network card, flash card, PC card, USB network adapter, or other type of built-in wireless capacity or a wireless network card. A WAN covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries. The communication area might be as large as a state, or even the world. The largest WAN is the Internet. Most WANs consist of two or more LANs and are connected by routers What is a network topology? In communication networks, a topology is a usually schematic description of the arrangement of a network, including its nodes and connecting 47 | P a g e lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology. The physical topology of a network is the actual geometric layout of workstations. There are several common physical topologies, as described below and as shown in the illustration. In the bus network topology, every workstation is connected to a main cable called the bus. Therefore, in effect, each workstation is directly connected to every other workstation in the network. In the star network topology, there is a central computer or server to which all the workstations are directly connected. Every workstation is indirectly connected to every other through the central computer. In the ring network topology, the workstations are connected in a closed loop configuration. Adjacent pairs of workstations are directly connected. Other pairs of workstations are indirectly connected, the data passing through one or more intermediate nodes. If a Token Ring protocol is used in a star or ring topology, the signal travels in only one direction, carried by a so-called token from node to node. The mesh network topology employs either of two schemes, called full mesh and partial mesh. In the full mesh topology, each workstation is connected directly to each of the others. In the partial mesh topology, some workstations are connected to all the others, and some are connected only to those other nodes with which they exchange the most data. The tree network topology uses two or more star networks connected together. The central computers of the star networks are connected to a main bus. Thus, a tree network is a bus network of star networks. Logical (or signal) topology refers to the nature of the paths the signals follow from node to node. In many instances, the logical topology is the same as the physical topology. But this is not always the case. For example, some networks are physically laid out in a star configuration, but they operate logically as bus or ring networks. 48 | P a g e http://whatis.techtarget.com/WhatIs/images/topology.gif Types of Network Equipment The building blocks of a home computer network include adapters, routers and/or access points. Wired (and hybrid wired/wireless) networking also involves cables of varying types. Finally, largescale enterprise networks in particular often employ other advanced equipment for specialized communication purposes. Ethernet - Cables and Switch Ethernet is a physical and data link layer technology for local area networks. Homes, schools and offices around the world all commonly use Ethernet standard cables and adapters to network personal computers. Wireless Local Area Networking Wi-Fi is the most popular wireless communication protocol for local area networks. Private home and business networks, and public hotspots, use Wi-Fi to network computers and other wireless devices to each other and the Internet. Bluetooth is another wireless protocol commonly used in cellular phones and computer peripherals for short range network communication. 49 | P a g e Internet Service The technologies used to connect to the Internet are different than those used for connecting devices on local area network. DSL, cable modem and fiber provide fixed broadband Internet service, while WiMax and LTE additionally support mobile connectivity. In geographic areas where these high-speed options are unavailable, subscribers are forced to use older cellular services, satellite or even dial-up Internet instead. TCP/IP and Other Internet Protocols TCP/IP is the primary network protocol of the Internet. A related family of protocols built on top of TCP/IP allows Web browsers, email and many other applications to communicate across networks globally. Applications and computers using TCP/IP identify each other with assigned IP addresses. Network Routing, Switching and Bridging Most computer networks direct messages from source to destination devices using any of three techniques called routing, switching and bridging. Routers use certain network address information contained inside messages to send them ahead to their destination (often via other routers). Switches use much of the same technology as routers but typically support local area networks only. Bridging allows messages to flow between two different types of physical networks. For more information about networking, read the first chapter of Mike Meyer’s COMPTIA Network+ Certification Passport www.mhprofessional.com/downloads/products/0071789057/0071789057 50 | P a g e Notes on Network Fundamentals ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ 51 | P a g e Internet Explorer and Internet Safety Vocabulary Cookie Small text file that a Web site uses to identify a specific computer Home page The introductory page for a web site HTML Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on Web pages An element in a document that links to another place in the same document or to an entirely different document or a web site A web browser Hyperlink Internet explorer Phishing Spam Spoofing Web browser Personal information scam where an email message appears to come from a legitimate source and then uses the information gained to commit identity theft Junk email Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source A software application for retrieving, presenting, and traversing information resources on the Web Objectives: Identify risks and safeguards associated with internet use and wireless communications Review definition of hyperlink, web address and HTML Describe Internet Explorer features Use history lists and favorites Use buttons on the toolbar Add or remove a favorite Change Home page Save and print information from Web page Set security and privacy parameters Use Internet Explorer Help 52 | P a g e Risks and Safeguards associated with wireless Communications Identify risks and safeguards associated with wireless communications. by Alexandra Phillips on 17 January 2012 888 http://prezi.com/opnw10qah37s/risks-and-safeguards-associated-with-wirelesscommunications-ao/ Top 10 User Wi-Fi Safeguards Your users are your first line of defense. They need to play an active role in helping to protect information systems. Listed below are the Top 10 steps they can take when using wireless networks. 1. Signal strength. In general, the closer the user is to the access point, the stronger the signal and the faster the transfer rate. Rogue (unauthorized) access points may or may not be in the same facility as authorized devices. Users should know that signal strength alone, is not sufficient to determine authorized networks. 2. Manual connection. Portable devices such as laptops and handhelds should be configured so that they do not automatically connect to wireless networks. A manual process helps ensure that the device connects to the appropriate wireless network. 3. Legitimate network. Since Wi-Fi signals can travel a long distance, users should check with the management of the facility that provides the connectivity to ensure they are connecting to the appropriate network. Unauthorized "evil twin" networks can capture logon credentials and other sensitive information. 4. Encryption. There are many different types of encryption methods used to secure wireless networks. Wired Equivalent Privacy (WEP) is the oldest and least preferred. Wi-Fi Protected Access (WPA) is newer and offers better protection. WPA2 is the newest and should be used if possible. Users should use Virtual Private Network (VPN) when connecting to corporate systems. 5. Shoulder surfing. Ensure that others cannot obtain the user's ID and password as it is typed. In addition, sensitive information should not be able to be read on the screen by unauthorized personnel. 6. Screen aware Users should look at the address bar URL. This will help protect against phishing attacks. Secure pages typically have a URL starting with https and include a secure page notification such as a lock. 7. Firewalls. Firewalls help restrict traffic to and from the device. Users should ensure the firewall is turned on so it can actively protect the device. 8. Patch management. Users should ensure that operating system and security protection software is patched and up-to-date. Ensure browsers and updates to third party software packages are applied in a timely manner. Critical updates should be tested and applied as soon as possible. 9. Battery saver. Portable devices constantly search for available networks. Users can increase battery life by turning off Wi-Fi when it isn't needed. This also helps ensure that an intruder can't connect to the device. 10. Incident management. Users should inform the appropriate personnel if they believe they logged into the wrong network, sensitive information such as their ID/password was compromised, their device was lost or stolen, etc. Risk assessments help organizations identify, manage, and reduce their risks related to mobile computing devices and communicating with wireless networks. 53 | P a g e http://www.altiusit.com/files/blog/Top10UserWiFiSafeguards.htm For more information on Internet Explorer: www.scribd.com/doc/3116372 54 | P a g e Notes on Internet Explorer and Internet Safety ___________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ 55 | P a g e Using the Internet for Research Vocabulary Boolean Logic a way to search databases using NOT, AND, OR operators Directory Web site organized by category Index Web site organized by category Keyword Used to search for information in a search engine Link List Collections of links on a particular topic Math symbol An option to make keywords more specific and narrow your search results finding information in a search engine using words that appear next to each other preprogrammed queries or questions suggested by the search engine that often lead to other Web pages containing similar information automated index tool used to find information online Phrase searching Related search Search engine Shared bookmark Wildcard character form of collaborative information sharing that lets users organize and share favorites, or bookmarks The * symbol, or asterisk, used in place of letters when searching a search Objectives: Understand what a search engine is and how it works Identify the most popular search engines Understand and use methods to make Web searches more effective Understand methods to refine search results Evaluating web content 56 | P a g e Web Search Made Simple How to Search The Web Faster, Easier, and More Efficiently By Wendy Boswell If you've ever been frustrated with your Web search results, today is your lucky day. Keep reading for a few simple methods that will make your Web search efforts faster, easier, and more efficient. 1. Use more than one search engine Every search engine is different, and will give you different results. If you can't find what you're looking for quickly with the first search engine that you try, there's plenty more out there that can give you more information. Web Search Engines: The Ultimate Search Engine List: All-purpose search engines, visual search engines, people search engines...you'll find all these and more in this list of search engines, a comprehensive guide to the best search engines on the Web. Top Ten Niche Search Engines: There are literally hundreds of really great niche search engines on the Internet that focus on specific topics: images, jobs, blogs, etc. 2. Know your search engine inside and out It's easy to skim the surface of your favorite search engine and only use the most prominent features; however, most search engines have a wide variety of advanced search options, tools, and services that are only available to those dedicated searchers that take the time to search 'em out. All of these options are for your benefit - and can help make your searches more productive. Get to Know Your Search Engine: General Search Tips: These general search tips will work on almost every search engine on the Web. The Best Search Engines: Pick the best search engines for your searching needs with Search Engines 101, a great way to explore more of your search topic. 3. Get to know common search terms Knowing the basics of common Web search terms can help you make your Web search time a bit more productive - and thankfully, they're really not that difficult to learn. Common Search Terms: Web Search Glossary: A basic dictionary of Web search terms. 57 | P a g e Boolean Search: Boolean search techniques can be used to carry out effective searches, cutting out many unrelated documents. Basic Web Search-Add and Subtract: One of the most basic techniques is using the add and subtract symbols in your search string. Look for a Specific Phrase: When you use quotation marks around a phrase, you are telling the search engine to only bring back pages that include these search terms exactly how you typed them in-order, proximity, etc. 4. Go off the beaten path You can certainly find a ton of useful information with your friendly neighborhood search engine, but there's lots of material out there that they don't cover. That's where the Invisible Web comes in. Using the Invisible Web: What is the Invisible Web?: The term "invisible web" mainly refers to the vast repository of information that search engines and directories don't have direct access to, like databases. Invisible Web Directory: Many individuals and institutions have put together invisible Web directories, which you can use as a jumping off point to surf the Invisible Web. Complete Planet: CompletePlanet is a great Invisible Web research tool. 5. Frame your query differently If at first you don't succeed, try, try, again - but try again just a little bit differently. For instance, if you're not getting anything good for "pogo stick championships", try "winners pogo", or "pogo stick first place", etc. Web Search: A Different View: Seven Habits of Highly Effective Web Searchers: Over the years I've developed a few search habits that have made me a more effective searcher, and with just a little practice, you can too. Find a Synonym: Find a synonym with Ask.com. Are You Feeling Lucky?: If you've ever visited the Google home page, then you'll have seen a button right under the search bar titled "I'm Feeling Lucky." 6. Spell it Right, Spell it Wrong Most search engines these days, if you misspell a word, will politely ask you "Did you mean...." and correct your spelling for you. Definitely take advantage of this feature - however, you can also get some pretty interesting results by deliberately misspelling the term that you might be searching for. 58 | P a g e It's Okay to Misspell? Find a Web Dictionary with Dictionary.com: Dictionary.com is one of those sites that anyone who searches on the Web on a regular basis should have bookmarked. Does Google Worry About Spelling and Capitalization?: What happens if you accidentally hit the Caps Lock on your computer when searching on Google? Are all your search efforts in vain? 7. Metasearch the Web One search engine is great, but a dozen search engines - at one time - is even better. Metasearch Engines Search.com: Search.com retrieves results from Google, Ask Jeeves, LookSmart, AltaVista, MSN Search, and more. Mamma Metasearch: Mamma.com is a good, solid meta search engine that provides fast and relevant results and excellent advanced search options. Metasearch with Clusty: Learn about Clusty, a meta search engine with lots of interesting features, including a blogosphere meta search option, customization tabs, and of course, clustering. Dogpile: Dogpile, a meta search engine, is a great way to compare and compile results from many different search engines and directories at the same time. 8. Web Search Around the World Don't limit your Web search to just your home country - go international. Global Web Search International Search Engines: Search all over the world through the eyes of international search engines. Free Language Translation: Free language translation sites on the Web have made it possible for Web searchers to read documents and sites from all over the world, in any language. 9. Ask an Expert for Help There are PLENTY of places on the Web where you can find expert help in a variety of subjects. How to Find an Expert Question and Answer Search Engines: If you're looking for a specific topic with a relatively narrow focus, question and answer search engines might just be what you're looking for. These search engines aggregate the vast resources of the Web into strictly defined categories; in other words, they make it extremely easy to find something. 59 | P a g e Ask an Expert: Sometimes we forget in this age of Internet research that we can actually ask an expert for help. There are plenty of places both on and off the Web that you can tap into to find expert help for any kind of research topic that you can think of. 10. Piggyback on Other People's Searches One of my favorite things about Web search right now is the ability to harvest other people's Web searches all over the Web with the power of social bookmarking and social networking. What are Other People Searching For? Social Bookmarking Sites: These are sites that allow users to post their favorite sites, using tags (or keywords) to categorize and organize them; then other users can take these bookmarks and add them to their own collection or share them. What is Social Networking?: You might have heard the term "social networking" in your travels on the Web. What does this mean? How to Use del.icio.us: del.icio.us is a social bookmarks manager. It allows you to easily add sites you like to your personal collection of links. http://websearch.about.com/od/searchingtheweb/tp/web_search_simple.htm 60 | P a g e Boolean Search: Make Your Searches Smarter By Wendy Boswell If you've been trying to find a way to make your Web searches more sophisticated, effective, and streamlined, then Boolean searching is the way to go. In this article, we'll talk about the origins of Boolean terminology, how Boolean search really works, and look at specific examples of this incredibly easy to use search system. Where does the term Boolean originate from? Boolean searching is built on a method of symbolic logic developed by George Boole, a 19th century English mathematician. Most online databases and search engines support Boolean searches. Boolean search techniques can be used to carry out effective searches, cutting out many unrelated documents. Is Boolean Search Complicated? Using Boolean Logic to broaden and/or narrow your search is not as complicated as it sounds; in fact, you might already be doing it. Boolean logic is just the term used to describe certain logical operations that are used to combine search terms in many search engine databases and directories on the Net. It's not rocket science, but it sure sounds fancy (try throwing this phrase out in common conversation!). Basic Boolean Search Operators - AND Using AND narrows a search by combining terms; it will retrieve documents that use both the search terms you specify, as in this example: Portland AND Oregon Basic Boolean Search Operators - OR Using OR broadens a search to include results that contain either of the words you type in. OR is a good tool to use when there are several common spellings or synonyms of a word, as in this example: liberal OR democrat Basic Boolean Search Operators - NOT Using NOT will narrow a search by excluding certain search terms. NOT retrieves documents that contain one, but not the other, of the search terms you enter, as in this example: Oregon NOT travel. Keep in mind that not all search engines and directories support Boolean terms. However, most do, and you can easily find out if the one you want to use supports this technique by consulting the FAQ's (Frequently Asked Questions) on a search engine or directory's home page. http://websearch.about.com/od/searchingtheweb/tp/web_search_simple.htm Web Search-Add and Subtract Use Basic Math to Enhance Your Web Search By Wendy Boswell There are a few basic principles that you can successfully use in nearly all the search engines out there to find exactly what it is that you are looking for, and one of the most basic techniques is using the add and subtract symbols in your Web search string. Basic Math Can Help With Your Web Search Basic math can really help you in your Web search quest. Here's how it works: The minus symbol: Use the "-" symbol when you want a search engine to find pages that have one search word on them, but you need the search engine to exclude other words commonly associated with that search word. For example: Superman -Krypton You are telling the search engines that you would like to find pages that only have the words "Superman", but exclude the listings that include information about "Krypton". This is a fast and easy way to eliminate extra information and narrow your search down; plus you can do a string of excluded words, like this: superman -krypton -"lex luthor". The plus symbol: Now that you know how to eliminate search terms, here's how you can add them in, using the "+" symbol. For example, if you have terms that must be returned in all your search results, you can place the plus symbol in front of the terms that you need included, such as: football+nfl Your search results would now have both these terms included. Search Engine Math - Just Part of a Web Search Strategy Using the plus and minus symbols is just a small part of a successful Web search strategy. Be as specific as humanly possible. Search engines are not intuitive and will not be able to figure out that when you type in "jewelry", you actually are looking for "handmade freshwater pearl watches". Don't be timid about telling a search engine specifically what it is that you are looking for, and using different techniques (in different ways) to get better results. http://websearch.about.com/od/internetresearch/a/addandsubtract.htm Notes on Using the Internet for Research ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ 63 | P a g e Using Microsoft Live.com (or Microsoft Account) Vocabulary Address book A directory of personal and professional contact information Appointment An Outlook activity that the user will attend at a set date and time Archive An electronic repository that organizes stores, and saves old files. Bcc Including someone in an e-mail message without their name being visible to the other recipients. A person, organization, or business in the Outlook Address Book. Contact Distribution list Email Meeting Signature Spam Task Collection of contact e-mail addresses that can be used to send a message to a group. An electronic message sent using a computer network An Outlook activity that it has a scheduled date and time and includes other people and a place An electronic identifier inserted in e-mail messages that can contain text, hyperlinks, pictures, or and Electronic Business Card Unsolicited or junk e-mail An Outlook activity involving the user that can be monitored to completion Objectives: Identify various tools in Live or Microsoft account Use Outlook to send, receive, delete and manage email Create and share Word, Excel or PowerPoint files Understand the use of Live to communicate instantly with others 64 | P a g e Simple Questions: What is a Windows Live ID or a Microsoft account? By Ciprian Adrian Rusen on 03/10/2012 Have you been using devices, tools or services from Microsoft? Then, at some point you might have been asked to provide a Windows Live ID. In Windows 8 you have been asked for a Microsoft Account. Never understood what they are and why you need them, let alone the benefits of having them? If that’s the case, then you should read this article, as it will explain everything you need to know about the Windows Live ID, also called Microsoft Account. What is Windows Live ID/Microsoft Account? The question is relatively simple to answer - Windows Live ID or Microsoft Account is an ID composed from an e-mail address and password, which you can use to login to most Microsoft websites, services and properties such as: Hotmail, Xbox Live, all Windows Live services (including SkyDrive and Messenger). It can be used also on your Windows computer, to enhance parental controls for the user accounts used by your children. In Windows 8 it is used to get access to all its features, including integration with Skydrive or to use the application Store. Windows 8, at least so far, is the only place where you will encounter the naming Microsoft Account instead of Windows Live ID. They are the same thing though. Do I Have a Windows Live ID/Microsoft Account? How do you know if you have a Windows Live ID? Easy - are you using any of these services: Hotmail, Windows Live Messenger or Xbox Live? If you are, then you already have a Windows 65 | P a g e Live ID. Use the same e-mail and password to log in to any other websites or services requesting a Windows Live ID. How to Create a Windows Live ID/Microsoft Account (With or Without a Microsoft E-mail Address)? If you don’t have a Windows Live ID, you can easily create one by completing all the required forms on the Windows Live Signup Page. When you complete the form, Microsoft proposes that you create an ID using one of their e-mail services (Hotmail or Live.com). If you already have an e-mail address from another provider and you don’t want to create a new one with Microsoft, you CAN use that one instead. On the signup page, look for a link saying: "Or use your own email address". Click on it and wait for a slightly different form to load. Complete your existing e-mail address, a password and all the other requested details, and you will have your Windows Live ID created in no time. Watchout: If you create a Windows Live ID using an existing email address, it is best not to use the same password. Create a different password for your Windows Live ID. In this case, if the password for any of these two accounts gets stolen, the "hacker" won’t have access to both services. What’s In It For Me? 66 | P a g e I guess by now you are asking yourself: Why should I create a Windows Live ID/Microsoft Account? What do I get by having it? The simple answer is - easy access to almost all Microsoft products, services, properties and websites. Create an ID if you are using or planning to use: Any of the tools in the Windows Live Essentials suite. Devices such as: your Xbox console and the Xbox Live service, your Zune media player or your Windows Phone 7. Get a free e-mail account from Microsoft (Hotmail or Live.com). Use all the features included with Windows 8. http://www.7tutorials.com/simple-questions-what-windows-live-id 67 | P a g e Notes on Using Microsoft Live Account ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ 68 | P a g e Notes on Using Microsoft Live Account ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ 69 | P a g e Internet Ethics Vocabulary Intellectual rights Copyright Ethics term sometimes used to refer to the legal protection afforded to owners of intellectual capital. This notion is more commonly referred to as "intellectual property" legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time branch of philosophy that involves systematizing, defending and recommending concepts of right and wrong conduct Objective: Intellectual property Unethical search engine practices Ethical behavior on the Web 70 | P a g e Business Ethics on the Internet: Understanding Copyright Laws written by: Arun Kumar (PowercutIN)•edited by: Rebecca Scudder•updated: 3/20/2011 Downloading a song from the Internet is easy. Before downloading, pause and reflect whether it is any different than stealing from a physical store? This article discusses some Internet ethics and copyright laws that may land you in difficulty if you break them. Due Diligence This discussion of Internet ethics and copyright laws covers both written and unwritten rules and regulations. Unwritten Internet ethics and disregard for copyright laws may not bother you but breaking them does harm the people who created and own certain material. Copyright laws protect any work created for use on the Internet or anywhere - any type of intellectual property – monograms, written material, drawing, paintings, research papers, etc. Most Internet copyright infringements are related to music and website designs. Imagine the effort that went into creating an album, which is then posted to the Internet so the people who worked on the album can make some money while earning fame. However, some "intelligent person" uploaded the same album to a site from where you can download the album without paying a cent. You may be thrilled, but consider this – are you not denying the effort and motivation that went into creating that album? Will that band ever use the Internet to sell their future albums or even bother to create another album? From my point of view, you just walked into a shop, picked up the album, and walked away without paying for it. This is not ethical. Can you consider the same action on the Internet to be ethical? Partnership Agreement 71 | P a g e IMPORTANT: Works of literary, musical, dramatic, and certain other intellectual nature carry copyrights as soon as you create them. You need not specifically register the copyright. Federal laws assign copyright to your creation as soon as you create it. The following paragraphs on Internet ethics and copyright laws cover the copyright laws, ethics, and associated penalties. Penalties Associated With Copyright Infringement This section about Internet ethics and copyright laws explains the penalties you can incur when you infringe copyright. The federal government can penalize you financially. It can also send you for a jail term (two years maximum). In some cases, it can be both – depending upon the severity of copyright infringement. Next time you feel like downloading your favorite song without paying any fee from an unauthorized website, pause and think about the Internet ethics and copyright laws as well as possible penalties. You may find that paying a nominal fee is better than paying for a copyright infringement suit. Dealing with Important Internet Ethics and Copyright Laws Issues On the Internet you will find some people cheating others in any way possible (including "fake" money making schemes). Here are some cases of copyright infringement using Internet ethics, and methods to avoid them: Copying material from another website to your website Create your own material instead of copy-pasting others' material. You can make substantial changes to the original work and get a copyright for the derivative work. You need to use citations wherever you use the original work. Creating an ebook or a webpage by just compiling information from different websites and printed material People often forget to cite references to print media while posting it on the Internet. This is also unethical. If you have used material from any Internet or printed source, give it attribution. 72 | P a g e Using other pieces of any form of correspondence in your website or ebook without obtaining explicit consent from the owner(s) While asking the original creators for permission before using emails or any other form of correspondence, make sure you keep a copy showing that the creator/owner agreed to let you use the material. There have been some cases where the owners later accused the user of violation for using the material, especially correspondence. Using monograms, images, etc. from the Internet without attributing the ownership to the real owner You can always ask the owner of the material for permission to use the material. Most owners may be happy to let you use such material as it offers free advertising or gives them exposure. If the owner says no, you should not use it. If you are already using it, you should remove it immediately if the owner asks you to remove his/her work from your site. http://www.brighthub.com/office/entrepreneurs/articles/74018.aspx 73 | P a g e Notes on Internet Ethics ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ 74 | P a g e
© Copyright 2026 Paperzz