Presentation is loading. Please wait.

Presentation is loading. Please wait.

Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities.

Similar presentations


Presentation on theme: "Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities."— Presentation transcript:

1 Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses facilities Internet security e-commerce ClassAct SRS enabled.

2 Working with the Internet 2 Information Technology But how does it work, what does it do and why is it so popular? The Internet is a continually evolving, fast-growing environment that is changing the face of communication. This presentation explores working with the Internet, providing an overview of: how to use the Internet facilities e-commerce Internet security Next > Introduction

3 Working with the Internet 2 Information Technology Internet Basics It has changed how people interact, through: The Internet is used for a growing number of applications, both business and leisure-related. It provides the opportunity to shop confidently and securely online, through encryption and passwords. As a huge information resource, it has revolutionized the way academic research is conducted. webcams videoconferencing Next >

4 Working with the Internet 2 Information Technology 1 A) Fax B) C) Videoconferencing D) Academic research Which of the following has NOT been improved by the Internet? Question

5 Working with the Internet 2 Information Technology Customizing Browsers How you do this depends on the software you use. Using Microsoft Internet Explorer, you must alter the Internet options on the browser menu bar. You can make your Internet use more efficient and effective by customizing your web browser. restrict the sites that can be visited There are various adjustments that can be made. For example, it is possible to: optimize the web site browsing settings speed up the loading of web pages by choosing not to view images Next >

6 Working with the Internet 2 Information Technology 2 A) Edit B) Options C) Internet Options D) Customize Which Microsoft Internet Explorer menu selection do you use to customize your web browser? Question

7 Working with the Internet 2 Information Technology was developed as an early function of the Internet. It has become a popular communications tool, through being: Beyond the function of sending single s, it offers more advanced features such as: quick inexpensive effective distribution lists mail forwarding Next >

8 Working with the Internet 2 Information Technology 3 A) Mail forwarding B) Distribution lists C) Internet Options D) Text editing What feature of s allows a message to be sent to multiple addresses at the same time? Question

9 Working with the Internet 2 Information Technology Protocols A web address is also known as a Uniform Resource Locator (URL). When an address is typed into a web browser, it is read in sections as the browser attempts to locate the pages. The first part of the URL is the called the protocol. The protocol allows a server and browser to introduce themselves to each other. http - for delivery of web pages This is an agreed-upon format for data transfer between devices. There are various protocol types such as: ftp - for file transfers Next >

10 Working with the Internet 2 Information Technology Domain Names The final parts of the URL locate the computer and the specific page requested. These include the: path domain name file name Next >

11 Working with the Internet 2 Information Technology 4 A) /default.html B) www C) D) Look at this web address: Which part is the protocol? Question

12 Working with the Internet 2 Information Technology 5 A) B) C) default.html D) www. Question Look at this web address. Which part is the domain name?

13 Working with the Internet 2 Information Technology Net Phones To be able to do this, both the parties communicating must be on the Internet at the time of the call. The Internet can be used to make international telephone calls, for the cost of a local Internet connection. When a net telephone call is made, the sound information is: converted into segments of data reassembled as speech sent to the recipient Next >

14 Working with the Internet 2 Information Technology Videoconferencing Videoconferencing enables people in different places to communicate across a computer network using: Each participant has a webcam, microphone, and speakers connected to his or her computer. point-to-point link multi-point link video audio data There are two main types of videoconferencing: Next >

15 Working with the Internet 2 Information Technology 6 A) Telephone B) Printer C) Darkroom D) Computer Which of the following would be needed for videoconferencing? Question

16 Working with the Internet 2 Information Technology Internet Security To ensure that data stored in computers or on the web cannot be intercepted, Internet security involves using: This danger applies to credit card numbers used for on-line shopping, as well as to companies' confidential information. This security is necessary to help prevent files or details being: encryption passwords deleted or changed stolen or infected Next >

17 Working with the Internet 2 Information Technology 7 Encryption is used to protect data being intercepted and stolen. Is this true or false? Question Answer True or False.

18 Working with the Internet 2 Information Technology Security Certification Functions of browsers include: A secure site will normally display an internationally-recognized icon in the browser status bar: authenticating the web site’s security certification raising concerns regarding any certification anomaly Web sites, such as those of banks, deal in sensitive or personal information which they secure to protect their customers’ interests. padlock key checking the safety of its secure connection to any web site being visited Next >

19 Working with the Internet 2 Information Technology 8 A) A barred door B) A padlock C) A security certificate D) A cross What symbol could be shown in the browser status bar for a secure site? Question

20 Working with the Internet 2 Information Technology Firewalls Firewalls control access to and from a computer network or system. A firewall resides between the network browser and the Internet. A firewall blocks unauthorized users’ attempts to access a network, while allowing certain other users in. It examines all messages moving in both directions. Next >

21 Working with the Internet 2 Information Technology 9 A firewall is located between the user's computer and the user. Is this true or false? Question Answer True or False.

22 Working with the Internet 2 Information Technology E-Commerce E-commerce is the process of purchasing goods or services via the Internet, perhaps by using a credit or debit card. Online shopping offers significant benefits, compared with traditional shopping: purchases can be made without leaving home goods are often less expensive than from traditional high street outlets a wider range of products can often be accessed via overseas web sites Unfortunately, fear over online security can discourage online shopping. Next >

23 Working with the Internet 2 Information Technology Shopping Carts There are normally facilities available for assisting the customer to: The customer enjoys the shopping process by navigating the pages and selecting merchandise to purchase by clicking on it. A shopping cart is a piece of software that allows an online store to display and sell its goods online. review what they have selected from the catalog pages make necessary modifications or additions to their order purchase the merchandise by credit card in a secure environment Next >

24 Working with the Internet 2 Information Technology 10 A) Date of birth B) Credit card number C) Credit card expiry date D) Delivery address When conducting online shopping, purchasers need to provide some information to the selling company. Which of the following would NOT be essential information? Question

25 Working with the Internet 2 Information Technology The transmission of information across computer networks has become a vital form of communication, relied upon the world over. The Internet is now an integral part of the everyday lives of people around the world. This presentation explored working with the Internet, investigating: Internet workings & uses facilities Internet security e-commerce Summary End >


Download ppt "Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses e-mail facilities."

Similar presentations


Ads by Google