Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 2 Lesson 2 The Internet.

Similar presentations

Presentation on theme: "Chapter 2 Lesson 2 The Internet."— Presentation transcript:

1 Chapter 2 Lesson 2 The Internet

2 The Internet network computers controlled communicate information
The largest and most widely accessed is the Internet, a worldwide network of that is not by any one organization. It allows users to and access in a matter of seconds. network computers controlled communicate information

3 Searching the Web World Wide Web search engine Internet Browser spider
The is used to search and access information on the and requires a Web application, such as Microsoft Internet to view the Web site pages. A is used to locate information on the Web. A search engine usually works by sending out an agent, such as a . They search a of Web pages for specific words or phrases and then list the to the pages containing the text. Internet Browser spider database Explorer hyperlinks

4 Searching the Web search criteria keywords minus sign (-)
The words or phrases used in a search are called the Search criteria should be carefully specified by using related to the topic of interest. Ways to specify search criteria are: Surrounding phrases with finds Web pages that contain the entire phrase exactly. The can be used to find pages that contain specified words. Separating the words with a has the same effect. The can be used to exclude unwanted Web pages. The AND, OR, and NOT can also be used. The operator has the same effect as the + and space. The operator is used to find Web pages that contain one word or another or both. The operator has the same effect as - . When operators are used in search criteria, a expression is formed, which evaluates to either true or false. search criteria logical operators keywords AND OR quotation marks NOT plus sign (+) Boolean space

5 Citing Web Sources citation credit
If information from a Web site is to be referenced or quoted in a report, essay, or other document, a must be used to give to the original author and allow the reader to locate the cited information. All sources of information used to support research must be cited. This includes: citation credit messages, graphics, sounds, video clips, and news-groups postings

6 Citations for Online Sources
A widely accepted form for citation is published by the Modern Language Association often referred to as . General citation for material located at a Web site: MLA Style Author’s Last Name, First Name MI. "Article Name." Name of Site. Version Number. Name of institution/organization affiliated with the site, date of resource creation (if available). Web. Date of access. <URL>.

7 Example Citations Citing an entire website:
The Purdue OWL Family of Sites. The Writing Lab and OWL at Purdue and Purdue U, Web. 23 Apr A Page on a Web Site "How to Make Vegetarian Chili." eHow, n.d. Web. 24 Feb An Article in a Web Magazine Bernstein, Mark. "10 Tips on Writing the Living Web." A List Apart: For People Who Make Websites. A List Apart Mag., 16 Aug Web. 4 May 2009.

8 Multitasking 0perating system application taskbar
Multitasking is an feature that allows more than one to run at a time. The Windows displays buttons for each open file or application. 0perating system application taskbar

9 Part 2 and Help

10 LAN (Local Area Network)
What is ? electronic mail means and is the sending and receiving of and files over a communications network such as a or the Internet. With Microsoft Office, documents can be ed directly from within the used to create the document or sent as an . messages LAN (Local Area Network) application attachment

11 ISP (Internet Service Provider
address An is required in order to send and receive messages. addresses are provided when you sign up with an or a Webmail service. A typical address is similar to: The domain name includes the domain after the dot, which indicates the domain type. For example, .com, .edu, .gov, .net, etc. ISP (Internet Service Provider top level

12 Outlook, Eudora, Yahoo! Mail, Gmail
Clients An client is software that is used to read messages, create and send messages, list and organize messages, and manage addresses in an address book. Some popular clients are: Outlook, Eudora, Yahoo! Mail, Gmail

13 E-Mail Etiquette and Ethics
etiquette for composing messages includes: Be . Use . Include “please” and “thank you” and properly address people you do not know as Mr., Ms., Mrs., Dr., etc. Use proper Do not use all letters to type a message—this is the equivalent of SCREAMING! a message it is sent. Always fill in the box and the box. concise manners Spelling, grammar, capitalization capital Re-read before To: Subject:

14 Crime Spoofing is the unethical and illegal practice of providing a Subject that lures an individual into opening an about an entirely different topic.

15 Email Ethics account subject subject language beliefs opinions Respond
Using requires following a code of ethics: Send messages through your only. Keep the in the message header short and truly representative of the message. Use appropriate matter and Be considerate of other people’s and . to in a timely manner. Do not attempt to access from someone else’s account without . Do not give out someone’s address without their . account subject subject language beliefs opinions Respond permission permission

16 school administrators
Messages messages are not ! and have the right to read any messages sent over the corporate or school network, as well as the right to track activity. private Employers school administrators online

17 Using Outlook personal information Outlook Today Messages Inbox
The Microsoft Outlook client is a manager with tools for managing messages. is displayed when Outlook is started. Click the link or the folder to display the Mail Window. personal information Outlook Today Messages Inbox

18 Creating/Sending Email
To create a new message, click on the toolbar or select To retrieve messages from the server, click New File-New-Mail Message Send/Receive

19 The Address Book contact File-New Entry To: Cc… distribution
The Address Book stores names and addresses. To add a new contact, select An address can also be selected by clicking or A list consists of a group of related contacts and is used to send messages to a group of people. File-New Entry To: Cc… distribution

20 E-Mail Attachments Insert – Attach File Attachment save open
In a new message window, click to attach a file. The name of the attached file is displayed in the box in the header. The recipient can choose to the attachment or it directly. Insert – Attach File Attachment save open

21 Attachments application WinZip PDF .zip Adobe Reader extract
To open an attachment, the recipient will need to have the appropriate The best solution to keep all document formatting is to export the file to format before attaching it to . To view a PDF, recipients use , a free application from Adobe Systems. When a folder of files is to be attached to an , a compression utility, such as , is needed to maintain the folder structure and compress the files into one file. The recipient must then use the same utility to the files. application WinZip PDF .zip Adobe Reader extract

22 Organizing E-mail Messages
Deleted Items Related messages should be organized into click the folder name and then select New Folder to display the Create New Folder dialog box. These folders are displayed in the Navigation Pane: stores received messages. stores messages that have been sent. folders stores messages that have been deleted until they are permanently deleted or retrieved. stores unfinished messages that have been automatically saved. stores messages that be been created and not yet sent. stores received messages that have a subject line or address which has been flagged by antivirus software or another filtering system. Right Drafts Outbox Inbox Junk Sent Items

23 E-mail Security spam Junk E-mail
Junk mail is often referred to as . Outlook has a folder, which catches obvious messages. spam Junk

24 Crime Cybercrime Viruses Trojan Horse worm
includes the delivery of malicious code in an message. have varying effects, such as displaying annoying messages, causing programs to run incorrectly, and erasing the contents of the hard drive. A appears like a useful computer program, but actually causes damage to data and can download stronger threats. A is a malicious program that can replicate itself, use up a system’s memory, and bring the system down. Viruses Trojan Horse worm

25 Crime antivirus phishing pharming update fraud attachment
A growing security threat is and s. Both involve online and are forms of cybercrime. The crime is also known as Precautions that should be taken to minimize the possibility of malicious code are: phishing Invest in software. the antivirus software frequently. Always save an file and then virus-check the file opening it. Protect your information and review and statements regularly. pharming update fraud attachment identity theft before personal bank credit card

26 Using Microsoft Office Help
The Microsoft Office Help window is displayed by clicking or by pressing the key. The Help window functions much like a Help also supports search for finding Help topics below the toolbar in the box. Help? F1 Web browser keyword search

Download ppt "Chapter 2 Lesson 2 The Internet."

Similar presentations

Ads by Google