Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lesson 2 The Internet. The largest and most widely accessed is the Internet, a worldwide network of that is not by any one organization. It allows users.

Similar presentations


Presentation on theme: "Lesson 2 The Internet. The largest and most widely accessed is the Internet, a worldwide network of that is not by any one organization. It allows users."— Presentation transcript:

1 Lesson 2 The Internet

2 The largest and most widely accessed is the Internet, a worldwide network of that is not by any one organization. It allows users to and access in a matter of seconds. network computers controlled communicate information

3 Searching the Web The is used to search and access information on the and requires a Web application, such as Microsoft Internet to view the Web site pages. A is used to locate information on the Web. A search engine usually works by sending out an agent, such as a. They search a of Web pages for specific words or phrases and then list the to the pages containing the text. World Wide Web Internet Browser Explorer search engine spider database hyperlinks

4 Searching the Web The words or phrases used in a search are called the. Search criteria should be carefully specified by using related to the topic of interest. Ways to specify search criteria are: 1. Surrounding phrases with finds Web pages that contain the entire phrase exactly. 2. The can be used to find pages that contain specified words. Separating the words with a has the same effect. 3. The can be used to exclude unwanted Web pages. 4. The AND, OR, and NOT can also be used. The operator has the same effect as the + and space. The operator is used to find Web pages that contain one word or another or both. The operator has the same effect as -. When operators are used in search criteria, a expression is formed, which evaluates to either true or false. search criteria keywords quotation marks plus sign (+) space minus sign (-) logical operators AND OR NOT Boolean

5 Citing Web Sources If information from a Web site is to be referenced or quoted in a report, essay, or other document, a must be used to give to the original author and allow the reader to locate the cited information. All sources of information used to support research must be cited. This includes: citationcredit messages, graphics, sounds, video clips, and news-groups postings

6 Citations for Online Sources A widely accepted form for citation is published by the Modern Language Association often referred to as. General citation for material located at a Web site: MLA Style Author’s Last Name, First Name MI. "Article Name." Name of Site. Version Number. Name of institution/organization affiliated with the site, date of resource creation (if available). Web. Date of access..

7 Example Citations Citing an entire website: The Purdue OWL Family of Sites. The Writing Lab and OWL at Purdue and Purdue U, Web. 23 Apr A Page on a Web Site "How to Make Vegetarian Chili." eHow.com. eHow, n.d. Web. 24 Feb An Article in a Web Magazine Bernstein, Mark. "10 Tips on Writing the Living Web." A List Apart: For People Who Make Websites. A List Apart Mag., 16 Aug Web. 4 May 2009.

8 Multitasking Multitasking is an feature that allows more than one to run at a time. The Windows displays buttons for each open file or application. 0perating system application taskbar

9 and Help

10 What is ? means and is the sending and receiving of and files over a communications network such as a or the Internet. With Microsoft Office, documents can be ed directly from within the used to create the document or sent as an. electronic mail messages LAN (Local Area Network) application attachment

11 An is required in order to send and receive messages. addresses are provided when you sign up with an or a Webmail service. A typical address is similar to: The domain name includes the domain after the dot, which indicates the domain type. For example,.com,.edu,.gov,.net, etc. address ISP (Internet Service Provider top level

12 Clients An client is software that is used to read messages, create and send messages, list and organize messages, and manage addresses in an address book. Some popular clients are:. Outlook, Eudora, Yahoo! Mail, Gmail

13 Etiquette and Ethics etiquette for composing messages includes: Be. Use. Include “please” and “thank you” and properly address people you do not know as Mr., Ms., Mrs., Dr., etc. Use proper Do not use all letters to type a message— this is the equivalent of SCREAMING! a message it is sent. Always fill in the box and the box. concise manners Spelling, grammar, capitalization capital Re-readbefore To:Subject:

14 Crime is the unethical and illegal practice of providing a Subject that lures an individual into opening an about an entirely different topic. Spoofing

15 Ethics Using requires following a code of ethics: Send messages through your only. Keep the in the message header short and truly representative of the message. Use appropriate matter and. Be considerate of other people’s and. to in a timely manner. Do not attempt to access from someone else’s account without. Do not give out someone’s address without their. account subject subjectlanguage beliefs opinions Respond permission permission

16 Messages messages are not ! and have the right to read any messages sent over the corporate or school network, as well as the right to track activity. private Employers school administrators online

17 Using Outlook The Microsoft Outlook e- mail client is a manager with tools for managing messages. is displayed when Outlook is started. Click the link or the folder to display the Mail Window. personal information Outlook Today Messages Inbox

18 Creating/Sending To create a new message, click on the toolbar or select. To retrieve messages from the server, click. New File-New-Mail Message Send/Receive

19 The Address Book The Address Book stores names and addresses. To add a new contact, select. An address can also be selected by clicking or A list consists of a group of related contacts and is used to send messages to a group of people. contact File-New Entry To:Cc… distribution

20 Attachments In a new message window, click to attach a file. The name of the attached file is displayed in the box in the header. The recipient can choose to the attachment or it directly. Insert – Attach File Attachment saveopen

21 Attachments To open an attachment, the recipient will need to have the appropriate. The best solution to keep all document formatting is to export the file to format before attaching it to . To view a PDF, recipients use, a free application from Adobe Systems. When a folder of files is to be attached to an , a compression utility, such as, is needed to maintain the folder structure and compress the files into one file. The recipient must then use the same utility to the files. application PDF Adobe Reader WinZip.zip extract

22 Organizing Messages Related messages should be organized into. -click the folder name and then select New Folder to display the Create New Folder dialog box. These folders are displayed in the Navigation Pane: stores received messages. stores messages that have been sent. stores messages that have been deleted until they are permanently deleted or retrieved. stores unfinished messages that have been automatically saved. stores messages that be been created and not yet sent. stores received messages that have a subject line or address which has been flagged by antivirus software or another filtering system. folders Right Inbox Sent Items Deleted Items Drafts Outbox Junk

23 Security Junk mail is often referred to as. Outlook has a folder, which catches obvious messages. spam Junk

24 Crime includes the delivery of malicious code in an message. have varying effects, such as displaying annoying messages, causing programs to run incorrectly, and erasing the contents of the hard drive. A appears like a useful computer program, but actually causes damage to data and can download stronger threats. A is a malicious program that can replicate itself, use up a system’s memory, and bring the system down. Cybercrime Viruses Trojan Horse worm

25 Crime A growing security threat is and s. Both involve online and are forms of cybercrime. The crime is also known as Precautions that should be taken to minimize the possibility of malicious code are: Invest in software. the antivirus software frequently. Always save an file and then virus- check the file opening it. Protect your information and review and statements regularly. phishing pharming fraud identity theft antivirus update attachment before personal bankcredit card

26 Using Microsoft Office Help The Microsoft Office Help window is displayed by clicking or by pressing the key. The Help window functions much like a. Help also supports search for finding Help topics below the toolbar in the box. Help? F1 Web browser keyword search


Download ppt "Lesson 2 The Internet. The largest and most widely accessed is the Internet, a worldwide network of that is not by any one organization. It allows users."

Similar presentations


Ads by Google