Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.

Similar presentations


Presentation on theme: "Chapter 18 Technology in the Workplace Section 18.2 Internet Basics."— Presentation transcript:

1 Chapter 18 Technology in the Workplace Section 18.2 Internet Basics

2 Read to Learn Describe the Internet and its components. Identify tools for managing threats when using the Internet.

3 The Main Idea The Internet has changed the way business is done. However, it poses risks to the information that is stored on computers. Companies and people must protect their computers from threats.

4 Key Concepts The Internet Managing Technology Threats

5 Key Terms Internet a global computer network

6 Key Terms World Wide Web a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet

7 Key Terms Web browser search engine a program used for displaying and viewing pages on the Web a computer program that can produce a list of documents related to a given topic

8 Key Terms intranet extranet a computer network used by an organization an extension of the intranet of a company or organization

9 Key Terms hacker cookies a person who illegally gains access to and sometimes tampers with information in a computer system bits of information about a computer users that are stored on that computer’s hard drive

10 Key Terms virus a program that can insert copies of itself into a computer without the user’s knowledge, often damaging stored data

11 The Internet People access the Internet through their telephone lines, digital subscriber lines (DSL), or over cable or ethernet connections. Internet a global computer network

12 The Internet Modems are devices used to send data from one computer to another.

13 The World Wide Web The World Wide Web is also known as “the Web.” World Wide Web a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet

14 The World Wide Web The World Wide Web Consortium (W3C) is an international association in which member organizations, a full-time staff, and the public work together to develop Web standards.

15 The World Wide Web To access the information on the Internet, a person can use a Web browser and a search engine. Web browser a program used for displaying and viewing pages on the Web search engine a computer program that can produce a list of documents related to a given topic

16 The World Wide Web Web browsers include design, graphics, and sounds, which make it more enjoyable to surf, or search for information.

17 The World Wide Web Users find information they need by typing a keyword in to the search engine.

18 The World Wide Web Web browsers include Mozilla Firefox ®, Netscape ®, and Microsoft Internet Explorer ®. Search engines include Yahoo! ®, MSN ®, and Lycos ®.

19 Intranets and Extranets An intranet works like the Internet, but its access is restricted to authorized users. intranet a computer network used by an organization

20 Intranets and Extranets An extranet is a semi-private network that allows more than one company access to the same information. extranet an extension of the intranet of a company or organization

21 Collaboration Software Many businesspeople find they can communicate better with their customers and employees using collaboration software. WebEx ™, Microsoft’s Live Meeting ®, and IBM Lotus Sametime ® are some types of this software.

22 Managing Technology Threats A hacker is an example of the many privacy and security risks and threats to users of computer technology. hacker a person who illegally gains access to and sometimes tampers with information in a computer system

23 Managing Technology Threats To avoid privacy and security threats, do not click on pop-up ads unless you know and trust the company.

24 Privacy Issues Companies use software tools to track computer users online. Some people see cookies as an invasion of privacy. cookies bits of information about a computer user that are stored on that computer’s hard drive

25 Privacy Issues Users who visit online stores can have their personal information stored on the company’s server even if they do not buy anything.

26 Privacy Issues Those who do not want companies to store and use their personal information must reject or delete cookies.

27 Privacy Issues A worm is a special computer virus that invades a computer network and multiplies itself as it spreads throughout the network. virus a program that can insert copies of itself into a computer without the user’s knowledge, often damaging stored data

28 Privacy Issues Security programs such as anti-virus software protect against different types of viruses. Anti-virus software must be updated regularly because new viruses are created every day.

29 Privacy Issues Spyware is software that tracks what a user does on the Internet. Some software packages can protect users from spyware.

30 Privacy Issues A firewall is computer software that prevents unauthorized access to a system software or data on a user’s computer. A firewall can reduce spam.

31 Privacy Issues A security breach occurs when someone manages to obtain unauthorized access to your system.

32 1.How would you describe the Internet and the World Wide Web? The Internet is a global computer network of interconnected documents and files. The World Wide Web is a system for accessing, changing, and downloading a large set of hypertext-linked documents and other files located on computers connected through the Internet.

33 2.How does a search engine work? It looks through countless Web pages and creates a content index for each.

34 3.How can a computer user protect against spam, viruses, worms, and spyware? install firewall software, anti-virus, and spyware-protection software


Download ppt "Chapter 18 Technology in the Workplace Section 18.2 Internet Basics."

Similar presentations


Ads by Google