Lesson 2: Internet Skills Internet skills are essential in order for you to be successful in school or career. Think about the many ways you may use the Internet weekly in education or on the job force. For example, in a course like this one, you may register on the school’s website. You may then receive an email confirmation with the details of the course. You then can log into the learning management system (LMS) to view course materials and communicate with other students. Lastly, you may take your exam online or submit graded material using email or the LMS. At your job you may be required to take care of many tasks online, especially if you work in an office setting. In this section, we will discuss the following topics: Search engines for research Email Online communication Online security and safety Lesson Objectives After completing this lesson, you will be able to: Describe necessary precautions to remain safe and secure online. Explain the “cloud” and describe the ways it can be used. List resources for online collaboration. Using Search Engines for Research With the Internet, you can search right from your computer, tablet, or smartphone, to find information that you need. Whereas people once had to go to the library to search for information, much of that information is now available online. But how do you find the information you need for a paper, work presentation, or for personal needs? It is important to know how to efficiently use search engines to find the data you need. A search engine is a software application that allows you to search the web. When you enter keywords or phrases, the search engine analyzes its index to find results that best match your query. The search engine accomplishes this using an automated browser (called a web crawler or spider) to analyze web content and note how they should be indexed. One of the most popular search engines out there is Google. Google has become so well known that the brand itself has become a synonym for searching for information. Has someone ever told you they “Googled it” or told you to “google” something? Google is such a powerful search engine that online marketers concentrate on getting their products or services highly ranked by Google so that they appear higher in search engine results—because users are more likely to follow results that appear in the first page or two of results. Although you can simply enter terms or phrases into a search engine like Google, you can also use more advanced searches to target more specific information. For instance, in Google you can restrict your search results to images by clicking the Image link in the top of the Google search engine page. You can search only news pages by clicking News at the top of the page. You can also use the Advanced Search feature to further refine your search results by date, language, region, or a number of other parameters, such as domain. However, Google is not the only search engine out there. Many other search engines exist, and people choose to use them for a variety of reasons. Here is a list of currently popular search engines: Bing Google Yahoo Ask Aol If you find you prefer another search engine, access the main page of the search engine to find tips on the best ways to use the tool. As you search, if you find a page you would like to return to, you can use your browser’s bookmarking feature. When you add a bookmark, you add a link to your bookmarks list so you can quickly find the page again. Here are a few tips to keep in mind when using search engines. Think about the terms and/or phrases that you enter. Use unique terms if possible. Use simple and advanced search to help locate your results. Enclose terms or a phrase in quotation marks if you need a specific phrase. Once you access your results, use the Find feature in your browser (pressing Ctrl+F keys or Command+F keys) to locate the term or phrase on the page. Use the Boolean search terms AND, OR, or NOT, in between keywords to further refine your results. (Boolean terms specify the search type to search engines.) If you want to learn how to search more effectively on Google, follow this link. Other Resources Other tools are available to help you track and organize your data. One such tool is Evernote. You can store notes, websites, images, to-do lists, and more in Evernote and access it from your devices, such as your laptop, tablet, or smartphone. For more information on Evernote, visit the Evernote site. To read an article on how you to use Evernote in education, visit this site. Using Email Email is a way of exchanging digital messages with other people. “Email” is short for electronic messages, and email is typically sent over the Internet or a local computer network. One person sends an email to another person and the message stays on the recipient’s email server until that person logs in to retrieve it. The recipient can then reply, forward, save, or delete these messages from their account. Emails typically include the following parts: A header showing the email address of both sender and recipient as well as the date and time of the message A subject line, which shows what the message is about The message body, where the content of the message can be read Web-based email services, such as Gmail or Yahoo, can be accessed anywhere you can reach the Internet via a web browser. You can access web-based email services on an Internet-connected computer, smartphone, or tablet device. Some web-based email providers are listed below. Your school or employer may also give you an email account associated with that institution. However, if you use their service, be sure to follow their guidelines for using email. Many employers in particular have specific rules about sending and receiving personal email at your work account. Gmail (Google) Hotmail Yahoo Email Etiquette To use email effectively, keep the following tips in mind: Do not type in ALL CAPS; this is the electronic equivalent of “shouting.” Keep messages brief. Stick to one subject per email. Be professional and courteous. Check your spelling and grammar before sending. Understand the differences between To (main recipient), CC (also copied), and BCC (blindly copied; other recipients cannot see BCC recipients) and use them appropriately. Use group emails courteously; nobody wants their Inbox filled with numerous unnecessary emails. Remember that what you write is not secure or private; what you write could be accidentally sent to others or forwarded to others, so be careful before you send. Use the subject to clearly indicate the purpose of your email. Avoid forwarding junk mail, jokes, chain letters, and similar messages. Review your message to make sure your tone will not be misread; it can be difficult to understand a person’s tone in emails. Include your contact information in a signature if you want the reader to have that information. One of the game-changing advantages of the online world is the ability to communicate with just about anyone, anywhere, at any time. Think about the progression of communication over the last century or two. First, voyages over land or by boat could take days, weeks, or months; people communicated by letter and had to wait for the letter to be received and a return letter to be sent. These times were shortened with the advent of the railroad, cars, and airplanes. Then came the telephone, which gave people the ability to talk and listen to each other practically instantly. Now people can log on to a computing device and easily communicate people all over You can find more resources on email etiquette at the following sites: • Purdue Writing Lab’s page on email etiquette Communicating Online with Web Resources the world. Unlike telephones, Internet communication allows for the use of video, too! Video Conferencing Video conferencing allows two people to both see and hear each other from a distant location. To use video conferencing, you need a camera, microphone, and speaker, as well as Internet access. One of the most popular video conferencing tools is called Skype. Skype is conferencing software that allows users to talk over the phone or through video. To learn more about Skype, visit their homepage. • Microsoft’s page on 12 Tips for Better Email Etiquette • About.com’s Email Etiquette: 26 Rules to Follow Web-based Courses Distance learning has grown so rapidly in recent years that many students (like you!) have chosen to pursue their education online or take online courses to supplement traditional classroom work. Think about the course you are taking now. Distance learning appealed to you for one reason or another, such as flexibility, convenience, or the ability to pursue schoolwork around other aspects of your life. Web-based courses can take many forms, depending on the school and format of the learning management system. Some instructors may post videos for students to view. Others may include links to online information that applies to the learning. Most schools offer ways for the community to have online discussions. Others may use the online course component for course management, such as posting the syllabus and course assignments and allowing students to take exams and submit assignments online. Instructors will use whatever combination of tools works for a particular course. Online Meetings With online meetings, you no longer have to travel across the country to have a meeting with another person. You simply can create a meeting online. You can even share your desktop with the other person so you can communicate on a particular project or assignment in real time. Say you are working with a distant colleague on a spreadsheet. One of you could open up the spreadsheet on your screen and invite the other person to view the screen. You could also post slides or a presentation that you want to present to others. For more resources on setting up meetings online, see Lifehacker’s guide to the five best tools for online meetings. The five best resources listed include: Google+ Hangouts GoToMeeting Join.me TeamViewer WebEx Security and Safety Online Although technology has provided a number of advantages to us in today’s world, they also present some concerns we did not have in the past. One of these concerns is how to stay safe and secure online. You may have heard stories about someone having their social media accounts or email “hacked” to send out spam. You may have heard how others have had their computers illegally accessed and their personal data compromised. You may have heard of data being destroyed through a virus or some other type of malware. You may have heard other stories about bank accounts being or credit card information being stolen. You may have even been a victim of one of these acts yourself. So you know the importance of aiming for security and safety online. What can you do to prevent this, you may be wondering, when even large corporations can have their databases breached for thieves to find credit cards? Well, there are a number of ways you can try to protect yourself online and not make it easy for thieves to access your information. Most importantly, be extra careful when you are using a public computer, such as at the library, or when you access a “free” wireless network, such as at a coffee shop or airport. You should avoid accessing sensitive information, such as your bank, at such places. Additionally, if you access your personal email, make sure you log out when you are done. Anti-Bullying/AntiCyberbullying Policy Our school does not tolerate bullying or cyberbullying behavior on the part of students. To show our support for anti-bullying efforts, we have adopted Georgia’s statewide antibullying policy, as developed by the Georgia Department of Education. You can access this policy, as well as additional resources, from the Learning Resource Center (LRC). Follow the Learning Resources tab in the Student Portal, or use this link: http://community.ashworthc ollege.edu/community/learni ng_resource_center/high_sc hool_center/high_school_gui dance/antibullying_resources If you are the victim of cyberbullying behavior, access the Learning Resource Center to find out what to do. Protecting Your System One of the first things you need to do on any system, whether a laptop, smartphone, or some other tool, is to download a strong antivirus program. A virus is a type of computer code that infiltrates your system. It may be designed to gain access to information or destroy your files. A virus can replicate itself and spread quickly from one computer to another. CNet lists a number of free and paid antivirus software options on their download security center. If your antivirus program includes an anti-malware feature, make sure you install that as well. Malware is hostile software designed to damage, disrupt, or gain access to your system. CNet recommends an antimalware program such as Malware Bytes, which you can download at their site. You also want to install or enable a firewall program. A firewall is a security measure designed to block intrusions. It can be a piece of hardware you connect to your system, or it can be software. If you have a Windows operating system, a firewall is installed and you just need to activate it. To read more about firewalls or how to turn on a Windows firewall, visit this page. Passwords Another guideline you should keep in mind is to always create a strong password. When creating passwords, do not use your name or words that are easy for hackers to guess, such as “password.” Create a strong password by using a combination of letters, numbers, and symbols, as well as upper and lower case. How are you going to remember something like that, you may be wondering. One technique is to think of a song title or a phrase and take the first letter of each word. Put these letters together. If one of the letters is an S, you might use the $ symbol instead. If one of the letters is an E, you might use the 3 instead, and so on. You can add random capitalization. Another technique is to take the same approach above, but tailor your password differently for each site. For instance, for a LinkedIn account, you might add the letters L and I to your password. Whatever you do, do not share your passwords. It is too easy for passwords to get into the wrong hands. Also, do not write then down as that makes it very easy for someone to find and use your information. Phishing Another Internet problem is called phishing. Phishing means someone tries to access your personal information in a variety of ways. Many phishing attempts are made via email. They are written to look like they come from a legitimate organization, such as your bank. They may warn you about problems with your account and provide a link to log in and look at the issue. Whatever you do, do NOT follow such links! These are almost always fake emails created to gain access to accounts. If the email says it is from your bank or another institution you are doing business with, close out of your email system. Open a NEW browser window and connect to that institution the way you normally would. Whatever you do, do not follow the link from your email. Another option would be to call your bank directly and ask about the email. Protecting Yourself and Your Family When you are online, you want to make sure you are not sharing information with the wrong people. Who are you communicating with? Do they have a legitimate need for any personal information they are requesting? Is a site safe? Keep these questions in mind before giving information to the wrong people. To protect yourself from visiting sites known to have malware on them, see if your antivirus program has a safe search toolbar. If not, you may want to download one. Safe search toolbars scan sites for malware and note their appearance when your search results are displayed. If you have children, you want to make sure they are safe online. Make sure they do not download from sites that could be illegitimate. They could, in fact, be downloading some sort of virus. Make sure they know not to share their passwords with anyone, not even friends, and make sure they use strong passwords. Keep a number of other factors in mind as you safeguard yourself and your family. Although the Internet is a tremendous resource, it can also be used to harm others. Some of the things you want to be aware of include the following: Sexually explicit or violent content Inappropriate language Strangers posing as “friends” Cyberbullying Sites promoting inappropriate content Viruses or malware Google offers a version of its search engine for kids, called Safe Search Engine. It aims to remove harmful content from kids. You may want to look into it if your family needs it. Web Exercise and Resources Cloud-based Computing In this part of your course, we will focus on the following topics: Backing up data Communication Social media Twenty-first century skills Cloud-based and Other Data Backup If you have ever lost computer data, you already know how important it is to “back up” your files regularly. Backing up means creating a copy of data so that you can access it if anything happens to the data on the original device. Backing up can be accomplished in several ways, making it easier and less expensive than ever before. Unfortunately, this is a task that many of us put off until it is too late! Try to be proactive, especially as you will want to keep copies of your schoolwork in a safe location. Additionally, think about how much time you would have to spend to create or update an entirely new set of documents. If you download music digitally from iTunes or another service, think of how much money you would have to spend to replace your collection. If you upload your photos from your phone or camera to your computer, you may only have those photos in one place. What if something happened to your hard drive? Poof! They are gone. And it might be difficult and expensive—if not impossible—to get them back. Take steps to protect yourself! Visit this website to watch a short video on creating strong passwords. To keep your family members safe online, visit Google’s page on family safety. It contains more information on having a safe Internet experience. Another excellent resource for staying safe online is Get Safe Online. So what are your options? If you have enough space and few files, you can save your files to a flash drive. Most people have enough files to fit onto one or two flash drives. Another option is save copies of your files to an external hard drive. An external hard drive can be plugged into your computer or other device and be used quite easily. Some people go so far as to use two external hard drives; they keep one with their computer and the other in a different location in case of theft or disaster, such as fire. Another option that has been growing in popularity is to store files in an online service called a “cloud” service. For more information on cloud-based services, read this article from PC Magazine. So, what do you need to back up your files? Think of all the technology you use to store your data. You should back up that data on a regular basis. Consider backing up the following: Desktop computer Laptop Tablet Smartphone Music on iPod/MP3 or other music player Photos and videos shared with your social networks Other electronic or online devices Cloud Communication You read about cloud services above as a resource for backing up your data. Another useful feature of cloud-based systems is for communication. You can use these services to share files with others. You can even share them so you can collaborate with others on the same file. For instance, say you are working on a presentation with another student or co-worker. Perhaps you have drafted an outline and you want to send it to your partner for input. You can use a cloud service that stores the file online where your partner can access the file. He or she can make edits and upload it Web Resources back for you to review. See how easy it is to communicate with others on a joint project using cloud-based systems? Another benefit to using this system is that you have backups of your files online as well. Some examples of cloud-based systems include the following: Google Drive Dropbox iCloud SkyDrive However, you are not restricted to the services mentioned here—or even to using just one service. Some people use more than one system, depending on their needs. Many other options are available if you are interested in a cloud-based system. Social Media Social media is one of the advances in technology that has exploded in recent years. Social media includes websites that allow and encourage people, businesses, and organizations to connect, communicate, and interact. Social media is being used in education much more frequently as a way to encourage research opportunities and communication and collaboration among groups. Some of the most well-known social media sites include social networking sites like Facebook and Twitter, where people connect and share content with each other. However, other types of social media exist as well. For instance, a “wiki” website such as Wikipedia encourages According to experts, you should back up your files every day. To remind people to back up their data, World Backup Day is now “celebrated” on March 31 each year. Read the short article on USA Today about World Backup Day. You should also check out the World Backup Day site to read more about why you should back up and how to do so. For a comparison of three main cloud services— Dropbox, SkyDrive, and Google Drive—review this article from GeekInsider. ZDNet also has an article: Dropbox, SkyDrive, Google Drive: which one is right for you? For a comparison of the cloud-based systems mentioned above by cost, review this article on TechRadar. Lifehacker also has a chart outlining the costs of each service. Go to PCMag for information on using more than one service for an added layer of security. people to share information on individual topics. A content community such as YouTube allows people to share videos. Those are just two examples of social media sites. Types of Social Media Social media can take many forms, as outlined below. Blogger, WordPress, and other blogging tools – used to create a weblog, or blog, which allows users to create an interactive journal online Facebook/Google+/MySpace – social networking sites Foursquare – a location-based social networking site Instagram – a photo-sharing and social networking site Twitter – a microblog where users share updates in 140 characters or less LinkedIn – a social networking site for professionals Pinterest – a social networking site focused on sharing images and inspiration Wikipedia – a web encyclopedia; Wikipedia is a type of wiki, or website that allows users to add, edit, or delete content Second Life – a virtual social world YouTube – a video-sharing site Internet forums –online discussion sites Podcasts – a digital episode broadcast through audio, video, slides, or other type of media. Vlogs – video logs Web Resources Virtual games – users can play games together, such as World of Warcraft Here are some sites you should check out before you jump into the world of social media. If you are already using social media, you should still read these tips and guidelines to make sure you are protected. Guidelines for Effective Use Microsoft’s Tips for Using Social Networking Wisely jobs for something they have posted online. If you are going to use Social Media Gone Awry: Tips for Teens to Stay Safe, from Huffington Post social media, you need to do so appropriately and responsibly. Although social media offers a wealth of information and a means of communication, you must think about the proper ways to use it. You may have heard stories of students being expelled or people losing There are many things to consider when sharing information online, such as privacy and security. Do you know the person who has sent you a friend request on Facebook? If not, you might not want to accept the request, because the stranger would access personal details about you. Before you post a photo online, think about whether you want it out there for the public to see. Anything you post online could be out there permanently. Here are a few quick tips, but be sure to check out the web resources below for more ways to protect yourself online. After completing this self-activity, complete your lesson examination. Use caution when clicking links or downloading apps. Use strong passwords. For instance, use a combination of upper and lowercase letters, numbers, and symbols. Accept requests to connect only from people you know. Think about whether you should use social media at work or in school. Your employer or school may have guidelines to follow. Review the privacy settings for each program. Learn how to limit who can see your profile, posts, and more. Complete the examination for Lesson 2 before moving on.
© Copyright 2026 Paperzz