2 The Internet network computers controlled communicate information The largest and most widely accessed is the Internet, a worldwide network of that is not by any one organization. It allows users to and access in a matter of seconds.networkcomputerscontrolledcommunicateinformation
3 Searching the Web World Wide Web search engine Internet Browser spider The is used to search and access information on the and requires a Web application, such as Microsoft Internet to view the Web site pages.A is used to locate information on the Web. A search engine usually works by sending out an agent, such as a . They search a of Web pages for specific words or phrases and then list the to the pages containing the text.InternetBrowserspiderdatabaseExplorerhyperlinks
4 Searching the Web search criteria keywords minus sign (-) The words or phrases used in a search are called the Search criteria should be carefully specified by using related to the topic of interest. Ways to specify search criteria are:Surrounding phrases with finds Web pages that contain the entire phrase exactly.The can be used to find pages that contain specified words. Separating the words with a has the same effect.The can be used to exclude unwanted Web pages.The AND, OR, and NOT can also be used. The operator has the same effect as the + and space. The operator is used to find Web pages that contain one word or another or both. The operator has the same effect as - . When operators are used in search criteria, a expression is formed, which evaluates to either true or false.searchcriterialogical operatorskeywordsANDORquotation marksNOTplus sign (+)Booleanspace
5 Citing Web Sources citation credit If information from a Web site is to be referenced or quoted in a report, essay, or other document, a must be used to give to the original author and allow the reader to locate the cited information. All sources of information used to support research must be cited. This includes:citationcreditmessages, graphics, sounds, video clips, and news-groups postings
6 Citations for Online Sources A widely accepted form for citation is published by the Modern Language Association often referred to as . General citation for material located at a Web site:MLA StyleAuthor’s Last Name, First Name MI. "Article Name." Name of Site. Version Number. Name of institution/organization affiliated with the site, date of resource creation (if available). Web. Date of access. <URL>.
7 Example Citations Citing an entire website: The Purdue OWL Family of Sites. The Writing Lab and OWL at Purdue and Purdue U, Web. 23 AprA Page on a Web Site"How to Make Vegetarian Chili." eHow.com. eHow, n.d. Web. 24 FebAn Article in a Web MagazineBernstein, Mark. "10 Tips on Writing the Living Web." A List Apart: For People Who Make Websites. A List Apart Mag., 16 Aug Web. 4 May 2009.
8 Multitasking 0perating system application taskbar Multitasking is an feature that allows more than one to run at a time. The Windows displays buttons for each open file or application.0perating systemapplicationtaskbar
10 LAN (Local Area Network) What is ?electronic mailmeans and is the sending and receiving of and files over a communications network such as a or the Internet. With Microsoft Office, documents can be ed directly from within the used to create the document or sent as an .messagesLAN (Local Area Network)applicationattachment
11 ISP (Internet Service Provider addressAn is required in order to send and receive messages. addresses are provided when you sign up with an or a Webmail service. A typical address is similar to:The domain name includes the domain after the dot, which indicates the domain type. For example, .com, .edu, .gov, .net, etc.ISP (Internet Service Providertop level
12 Outlook, Eudora, Yahoo! Mail, Gmail ClientsAn client is software that is used to read messages, create and send messages, list and organize messages, and manage addresses in an address book. Some popular clients are:Outlook, Eudora, Yahoo! Mail, Gmail
13 E-Mail Etiquette and Ethics etiquette for composing messages includes:Be .Use . Include “please” and “thank you” and properly address people you do not know as Mr., Ms., Mrs., Dr., etc.Use proper Do not use all letters to type a message—this is the equivalent of SCREAMING!a message it is sent.Always fill in the box and the box.concisemannersSpelling, grammar, capitalizationcapitalRe-readbeforeTo:Subject:
14 CrimeSpoofingis the unethical and illegal practice of providing a Subject that lures an individual into opening an about an entirely different topic.
15 Email Ethics account subject subject language beliefs opinions Respond Using requires following a code of ethics:Send messages through your only.Keep the in the message header short and truly representative of the message.Use appropriate matter andBe considerate of other people’s and .to in a timely manner.Do not attempt to access from someone else’s account without .Do not give out someone’s address without their .accountsubjectsubjectlanguagebeliefsopinionsRespondpermissionpermission
16 school administrators Messagesmessages are not !and have the right to read any messages sent over the corporate or school network, as well as the right to track activity.privateEmployersschool administratorsonline
17 Using Outlook personal information Outlook Today Messages Inbox The Microsoft Outlook client is a manager with tools for managing messages.is displayed when Outlook is started. Click the link or the folder to display the Mail Window.personal informationOutlook TodayMessagesInbox
18 Creating/Sending Email To create a new message, click on the toolbar or selectTo retrieve messages from the server, clickNewFile-New-Mail MessageSend/Receive
19 The Address Book contact File-New Entry To: Cc… distribution The Address Book stores names and addresses. To add a new contact, select An address can also be selected by clicking orA list consists of a group of related contacts and is used to send messages to a group of people.File-New EntryTo:Cc…distribution
20 E-Mail Attachments Insert – Attach File Attachment save open In a new message window, click to attach a file. The name of the attached file is displayed in the box in the header. The recipient can choose to the attachment or it directly.Insert – Attach FileAttachmentsaveopen
21 Attachments application WinZip PDF .zip Adobe Reader extract To open an attachment, the recipient will need to have the appropriate The best solution to keep all document formatting is to export the file to format before attaching it to . To view a PDF, recipients use , a free application from Adobe Systems.When a folder of files is to be attached to an , a compression utility, such as , is needed to maintain the folder structure and compress the files into one file. The recipient must then use the same utility to the files.applicationWinZipPDF.zipAdobe Readerextract
22 Organizing E-mail Messages Deleted ItemsRelated messages should be organized into click the folder name and then select New Folder to display the Create New Folder dialog box. These folders are displayed in the Navigation Pane:stores received messages.stores messages that have been sent.foldersstores messages that have been deleted until they are permanently deleted or retrieved.stores unfinished messages that have been automatically saved.stores messages that be been created and not yet sent.stores received messages that have a subject line or address which has been flagged by antivirus software or another filtering system.RightDraftsOutboxInboxJunkSent Items
23 E-mail Security spam Junk E-mail Junk mail is often referred to as . Outlook has a folder, which catches obvious messages.spamJunk
24 Crime Cybercrime Viruses Trojan Horse worm includes the delivery of malicious code in an message. have varying effects, such as displaying annoying messages, causing programs to run incorrectly, and erasing the contents of the hard drive. A appears like a useful computer program, but actually causes damage to data and can download stronger threats. A is a malicious program that can replicate itself, use up a system’s memory, and bring the system down.VirusesTrojan Horseworm
25 Crime antivirus phishing pharming update fraud attachment A growing security threat is and s. Both involve online and are forms of cybercrime. The crime is also known asPrecautions that should be taken to minimize the possibility of malicious code are:phishingInvest in software.the antivirus software frequently.Always save an file and then virus-check the file opening it.Protect your information and review and statements regularly.pharmingupdatefraudattachmentidentity theftbeforepersonalbankcredit card
26 Using Microsoft Office Help The Microsoft Office Help window is displayed by clicking or by pressing the key. The Help window functions much like aHelp also supports search for finding Help topics below the toolbar in the box.Help?F1Web browserkeywordsearch