Presentation on theme: "The Internet, the Web, and Electronic Commerce"— Presentation transcript:
1 The Internet, the Web, and Electronic Commerce 2The Internet, the Web, and Electronic Commerce
2 Learning Objectives Explain the origins of the Internet and the web. Explain how to access the web using providers and browsers.Compare different web utilities including plug-ins, filters, file transfer utilities, and Internet security suites.Compare different Internet communications, including , text messaging, instant messaging, social networking, blogs, microblogs, Webcasts, podcasts, and wikis.Describe search tools, including search engines and specialized search engines.Evaluate the accuracy of information on the web.Identify electronic commerce, including B2C, C2C, B2B, and security issues.Describe cloud computing, including the three-way interaction of clients, Internet, and service providers.
3 IntroductionThe Internet is an interconnected mesh of computers and data lines that connects millions of people and organizationsIt is the foundation of the digital revolutionThe Web provides an easy-to-use interface to Internet resources that has become an everyday toolTo be effective and efficient, end users need to be aware of the resources available on the Internet and the Web and how to access them
4 The Internet and the Web The Internet is a large global network, connecting smaller networks all over the globeThe Internet was launched in 1969The United States funded project to develop a national computer networkARPANET (Advanced Research Project Agency Network)The World Wide Web or WWW was introduced in 1991 at CERN (Center for European Nuclear Research)The Internet and the Web are NOT the sameThe Internet is the physical networkThe Web is a multimedia interface to the resources available on the InternetThe Internet (key term) is the most developed network system currently in use; connects people all over the worldOriginally started in 1969 when US funded a research project (ARPANET—Advanced Research Project Agency Network) (key term)CERN – Center for European Nuclear Research (key term)World Wide Web (Web) is a part of the Internet – not the Internet; introduced in by consortium in SwitzerlandOriginally started as research and text-based network to exchange research ideas from university to universityWeb 1.0 (key term) – linking existing informationWeb 2.0 (key term) – more dynamic content creation and social interaction (Facebook)Web 3.0 (key term) – computer-generated information requiring less human interactionInternet is the actual physical network comprised of wires, cables, satellites, and rulesBeing connected to the network is often referred to as being online (Key Term)The Web is a multimedia interface to resources available on the internet
5 Common Internet Uses Communicating Shopping Searching , photos, videosDiscussionsShoppingSearchingVirtual librariesEducation or e-learningEntertainmentMost common Internet applicationsCommunicating – most popular Internet activity. Exchange , photos, videosShopping – fastest-growing applicationsSearching - using virtual libraries.Education or e-learning (Key Term) – take classes remotely from almost any location and any subjectEntertainment – music, movies, magazines, computer gamesSee the Making IT work for you for Online Entertainment (Page 30 – 31)
6 Making IT Work for You ~ Online Entertainment Use the Internet to locate and play movies and television showsNetflix, Hulu, Amazon PrimeMany users are no longer subscribing to cable or satellite services. Instead they are using pay-as-you-go services such as Netflix and Amazon Prime to watch movies and their favorite TV episodes.Hulu Plus is used for TV ProgramNBA League Pass is used for NBA gamesAnd there is also Pay-as-you-go programs available
7 AccessCommon way to access the Internet is through an Internet Service Provider (ISP)Provide a connection for individuals to access the InternetUse telephone lines, cable, and/or wireless connectionsThe common way to access the Internet is through a provider or host computerInternet Service Providers (ISPs) (key term) - already connected to the Internet -- furnish a pathway for other usersMost commonly used ISPs use telephone lines, cable (key term) and / or wireless connectionsTypical providers include:Verizon, Comcast, Sprint, T-Mobile and AT&T
8 Browsers Programs that provide access to Web resources Allow you to explore the WebPopular Web browsers include:Google ChromeMozilla FirefoxMicrosoft Internet ExplorerApple SafariAddress or location of the resource must be specifiedURL (Uniform Resource Locator)Browsers (key term) allow you to explore the webNavigate, search for information and communicate using the webUse URL (uniform resource locator) (Key Term) to connect to other resources. URL is the address (key term) and contains two parts.
9 Uniform Resource Locator Protocol Domain Name Top-level domain URLsUniform Resource LocatorProtocolDomain NameTop-level domainTop-level domain (TLD) or Web SuffixIdentifies the type of organizationTwo parts to URL:protocol (Key Term), rules for exchanging data between computers (usuallydomain name (Key Term) – specific address where the resource is locatedTLD or Top-level domain (key term), also known as the web suffix identifies the type of organizationMany URLs have additional parts specifying directory paths and file names.
10 HTML and Hyperlinks Browsers interpret HTML commands Hypertext Markup LanguageDisplay Web page documentHyperlinks or linksTextGraphic imagesAudio and Video ClipsBrowsers Interpret the HTML (key term) codes and formatting instructions and displays the pageMay containHyperlinks (Key Term) or links (key term) -- allow users to quickly connect to other pages or web sitesGraphicsTextMultimedia elementspages contain links (Key Term) to programs called applets (Key Term)
12 Web UtilitiesSpecialized utility programs that make using the Internet and Web safer and easierPlug-InsFiltersFile Transfer UtilitiesInternet Security SuitesWeb utilities (key term) are specialized utility programs that make using the Internet and web easier and saferThe utilities we will discuss are:Plug-ins – The graphic on this slide is from Apple. It is QuickTime for playing audio and video files.FiltersFile Transfer UtilitiesInternet Security SuitesReturn
13 Plug-InsPrograms that automatically start and operate as part of you browserProvide an enhanced browsing experience by enabling special file formats and multimedia elementsAcrobat ReaderFlashQuickTimeWindows Media PlayerPlug-ins (key term) – programs that start automatically and operate as part of your BrowserAdobe Reader from Adobe – pdf – viewing and printing a variety of standard forms and other documentsFlash Player from Adobe – viewing videos, animations and other mediaQuickTime from Apple – playing audio and video filesWindows Media Player – playing audio files, video files and much moreReturn
14 FiltersPrograms that block access to selected sites and can set time limitsMonitor total time spent on the Internet and at individual Web sitesCyberPatrolPearl EchoNorton Online FamilyNet NannySymantec Web GatewayFilters (key term) – block access to selected sites.Filters can also monitor use and generate reports detailing the total time spent on the Internet and specific sites.Return
15 File Transfer Utilities Programs that help you upload and download files to and from the InternetDownloadingUploadingThree popular types of programsFile transfer protocol (FTP) and secure file transfer protocol (SFTP)Web-based file transfer servicesBit-TorrentFile Transfer Protocol (key term) and Secure File Transfer Protocol (key term) (FTP & SFTP)Also referred to as downloading (key term) – receiving a file from the Internet and uploading (key term) copying a file to the Internetcopy files from your computer to the internetused for uploading changes to a websiteWeb-based file transfer services (key term)uses web browser to upload and download filesDropbox.com is a widely used serviceBitTorrent (key term)distributes file transfers across many computers for more efficient downloadsgood for transferring large filesReturn
16 Internet Security Suites Designed to maintain your security and privacy while on the WebInternet Security Suites (Key Term) – collection of utility programs designed to maintain your security and privacy while you are on the WebSuites Are the most cost efficient way to go instead of buying each component separately.McAfee Internet SecuritySymantec Norton Internet Security
17 Communication Communication is the most popular Internet activity Transmission of electronic messages over the InternetAddressSubjectAttachmentsMessageSignatureCommunication – most popular Internet activity: , messaging, social networking, blogs, microblogs, webcasts, podcasts, and wikisor electronic mail (Key Term)Transmission of electronic messages over the InternetHas three basic elements: header (key term), message and signatureAddress (key term) – who the is going to.Address (Key Term) has two partsUser name - identifies unique user or computer in the domainDomain name (Key Term) - references a specific organizationSubject (key term) – topic of the messageAttachments: (key term) – documents and / or images you attach to the messageMessage: (key term) – letterSignature: (key term) – information about the sender
18 Communication (continued) Client-based systemclientWeb-based systemWebmailClient-based system (key term) – requires installation of an client (key term) on your computer. Examples are Microsoft Outlook and Apple Mail.Web-based system (key term) – no program on your computer, access from any computer through a Browser. Examples are Google Gmail, Microsoft Hotmail, Yahoo!Mail
19 Junk and/or unwanted e-mail SpamJunk and/or unwantedComputer viruses or destructive programs are often attached to unsolicitedSpam blockers / spam filters use a variety of approaches to identify and control spamSpam (Key Term) – unsolicited / unwelcomeDistraction, NuisanceComputer viruses (Key Term) can also be attached to spamSpam blockers (Key Term)/ Spam filters (key term) use a variety of different approaches to identify and eliminate spamCAN-SPAM Act requires that every marketing related provide an opt-out optionTips to blocking spam:Keep a low profileDon’t ever respond to spam and be cautious when giving out your addressUse filter optionsUse antispam and filter options
20 Text messaging / texting Instant messaging SMS (short message service)Instant messagingExtension of that provides direct, live communication between two or more peopleMost programs include video conferencing features, file sharing and remote assistanceFacebook ChatGoogle TalkText Messaging (key term) – also know as texting (key term) is sending short electronic messages between mobile devices.SMS (short Message Service (key term)Has become one of the most widely used ways to send short messagesMany states have passed laws prohibiting texting while driving due to the negative impact on driver safety according to a study conducted by Car and DriverInstant Messaging (Key Term)Extension of that allows two or more people to contact each other via direct, live communicationTo use instant message, specify list of friends (Key Term) and register with an instant messaging serverSome services include video and file-sharingFor more information, visit and click on Student Edition – Explore -- IM
21 Social NetworkingConnecting people and organizations that share a common interest or activityThree most popular:FacebookGoogle+LinkedInBusiness-orientedSocial Networking (Key Term)One of the fastest growing uses of the InternetConnecting individuals to one anotherFacebook (Key term)– individuals, businesses, communities – launched in 2004Facebook – instant messaging, photo, video sharing, games, etc.Facebook Profiles (key term) – personal information. Available to friends, familyFacebook Pages (key term)– created by businesses and public figuresFacebook Groups (key term)– created by individuals who share a common interestGoogle+ (key term) or Google Plus (key term) – includes circles (key term) for grouping individuals according to common interests – launched in 2011Hangouts (key term) – to communicate with up to 10 people at one timeSparks (key term) – news feedsLinkedIN (key term) – Business/professionally oriented social networking -- launched in 2003Consider carefully the information you are disclosing when joining social networking sites.
22 Blogs, MicroblogsWeb logs or blogs – personal news pages that are date/time-stamped and arranged with the most recent items shown firstMicroblogs – short status updates that answer the question:What are you doing now?Popular web logs (key term) or blogs (key term) include Blogger and WordPressTwitter (key term) is the most popular microblog (key term)
23 Webcasts, Podcasts, Wikis Webcast – streaming technology for live broadcast of audio and videoPodcast-audio and video files that can be downloaded to your computer or media playerWiki – a specially designed Web site that allows visitors to edit the contents; supports collaborative writingWebcasts (key term) streaming technology (key term) using audio and video continuously downloaded to your computerYouTube is a popular exampleAfter webcast is complete, no files remain on your computerPodcasts (key term) available on iTunes and do not use streaming technologyWiki (key term) – website which is editable by users. Built on a community of interested people that build knowledge over time.Wikipedia (key term) is an example of using a wiki as an online encyclopediaFor more information, go to and then click on Student Edition – Explore -- Blog
24 Search Tools Search Services Specialized Search Engines Search Engines SpidersSearch EnginesContent EvaluationAuthorityAccuracyObjectivityCurrencySpecialized programs that assist you in locating information on the Web and the InternetSearch services (Key Term) operate web sites that help you locate information; they maintain the database that helps you get where you wantSpecial programs called spiders (Key Term) continually look for information and updated servicesSearch engines (Key Term) – assist you to locate specific informationUse keyword or phrase search; know “rules” i.e. use + or quotes to look for phrases rather than individual wordsHit (key term) – return of sites that contain keyword or phrasesSpecialized search engines (Key Term) - Programs that focus on subject specific Web sitesContent Evaluation – be sure to check the authority, accuracy, objectivity and currency
25 Also known as e-commerce Buying and selling of goods over the Internet Electronic CommerceAlso known as e-commerceBuying and selling of goods over the InternetBusiness-to-consumer (B2C)Consumer-to consumer (C2C)Business-to-business (B2B)Electronic commerce (key term) or E-Commerce (key term) is buying and selling over the InternetThree basic types of electronic commerce: business to consumer; consumer to consumer; and business to businessB2CC2CB2BReturn
26 Business to Consumer (B2C) Fastest growing type of e-commerceThree most widely used B2C applications:Online bankingFinancial tradingShoppingB2C (key term) is fastest growing type of e-commerce. Involves the sale of a product or service to the general public or end user.Three typesOnline bankingFinancial tradingShoppingAmazon.com is one of the most widely used B2C sites.Return
27 Consumer to Consumer C2C Consumer-to-consumer e-commerce (C2C)Web auctionsSimilar to traditional auctionsPerson-to-person auction sitesRecent trend in C2C e-commerce (key term) involves individuals selling to individuals and is Web auctions (Key Term); similar to traditional auctions – no one sees each otherBuyers and sellers seldom meet face-to-faceAsk the students if they have ever used E-bayExample auction sites include eBay, QuiBids, eBay, eBid.Return
28 Business to Business B2B Involves the sale of a product or service from one business to anotherPrimarily a manufacturer to supplier relationshipBusiness to Business (B2B) (key term) involves the sale of a product or service from one business to another.Example: A furniture manufacturer requires raw materials such as wood, paint, and varnish.
29 Payment methods must be fast, reliable, and secure Two options SecurityPayment methods must be fast, reliable, and secureTwo optionsCredit cardDigital cashA challenge is the payment for goodsShould be reliable, secure, and fastConvenienceElectronic payment -- easy, secure payment methodCredit cards -- easier to work with, somewhat vulnerable to theftDigital cash (Key Term)Purchased from third party (usually a special bank); more secure than credit cardsProviders include Amazon, Google, Serve, and PayPal
30 Cloud ComputingShifts computing activities from users’ desktops to computers on the InternetFrees end-users from owning, maintaining, and storing software programs and dataThree basic components:Clients (end-users)Service providersThe InternetCloud computer (key term) Basic components include:Clients: corporations and end-users who want access to data, programs, and storage anywhere and anytime a connection to the Internet is availableService providers: organizations that are willing to provide (sometimes for a fee) access to software and storageInternet connectivityTwo critical factors that determine the efficiency of cloud computingThe speed and reliability of the user’s access to the InternetInternet’s capability to provide safe and reliable transmission of data and programs
31 Careers In IT - Webmasters Develop and maintain websites and resourcesBackup of company websiteUpdate and develop new resourcesWork with the marketing department to increase site traffic and monitor the flow of customer interactionsWebmastersEmployers look for:Bachelor’s or associate’s degree in computer science or information systemsKnowledge of common programmingWeb development software knowledgeHTML and CSS are importantGood communication and organizational skills are essentialSalary in the range of $56,000 to $80,000
32 Car’s dashboard as a powerful, Internet-connected computing device A Look to the FutureCar’s dashboard as a powerful, Internet-connected computing deviceSafety and diagnostic features are already therePotential distractions?Your car today is already governed by computer technology located within your vehicle.Benefits involve quick access to vital information such as traffic, weather, directions in real time.Potential distractions could also come into play. Technology would need to be cautious and prevent the driver from ever having to touch the dashboard by using voice recognition.
34 Open-Ended Questions (Page 2 of 3) Discuss Internet communications, including client-based and web-based , instant and text messaging, social networking, blogs, microblogs, webcasts, podcasts, and wikis.Define search tools including search services. Discuss search engines and specialized search engines. Describe how to evaluate the content of a web site.Have students turn to the end of Chapter 2 in their textbooks to view the same “Open-Ended” questions/statements
35 Open-Ended Questions (Page 3 of 3) Describe electronic commerce, including business-to-consumer, consumer-to-consumer, and business-to-business e-commerce, and security.What is cloud computing? Describe the three basic components of cloud computing.