Presentation is loading. Please wait.

Presentation is loading. Please wait.

BMA-IBT-2 Apply technology as a tool to increase productivity to create, edit, and publish industry appropriate documents. 2.3 Execute efficient online.

Similar presentations


Presentation on theme: "BMA-IBT-2 Apply technology as a tool to increase productivity to create, edit, and publish industry appropriate documents. 2.3 Execute efficient online."— Presentation transcript:

1 BMA-IBT-2 Apply technology as a tool to increase productivity to create, edit, and publish industry appropriate documents. 2.3 Execute efficient online searches for specific and creditable resources. 1.02 Authenticating Content

2 What do you know about the Uniform Resource Locator (URL)?
Protocol Server/Host Name Country code Extension Page/Document/ Filename Directory/folder Domain Name 1.02 Understand how to validate, authenticate, and legally use information from the Internet. 1.02 URL's Anatomy

3 URL’s Anatomy Protocol determines how the file the file will be transferred (in whole or in part). Examples: http and ftp Domain name includes the name of the server where the information is stored and a suffix (also called an extension) which indicates the type and location of the server. The protocol determines how the information will be transferred. FTP is a two-way system in which entire files are copied from the sending server or device into the receiver’s computer. HTTP is used to transfer files from a Web server into a browser on a user’s computer in order to view files from the Internet. The domain name is sort of like your zip + 4 code. The domain name includes the host server, a suffix, and sometimes a country code. Examples of host servers and their extensions: Microsoft.com, ecu.edu, bls.gov, ncsecu.org, bidlink.net, and Examples of country extensions include .uk, .au, .ca The Internet is a huge global network of computer networks. The Web is a tool used to access information from the Internet. Browsers are used by the Web to transport data from the Internet to the user. FTP URLs link to files on other servers, but not on the Web. 1.02 Understand how to validate, authenticate, and legally use information from the Internet. 1.02 URL's Anatomy

4 Know your suffixes/extensions
What about these? .uk .au .ca .de Do you know what these suffixes indicate? .com .edu .gov .org .net .mil 1.02 Understand how to validate, authenticate, and legally use information from the Internet. 1.02 URL's Anatomy

5 URL’s Anatomy (Continued)
A directory tells the computer specifically where to look for the requested information on the file server. A filename tells which specific document or program should be retrieved from the directory. 1.02 Understand how to validate, authenticate, and legally use information from the Internet. 1.02 URL's Anatomy

6 URL’S Appendages Other parts of an URL may include
~ (tilde) indicates a personal web page .exe or .hqx indicates an executable program = (equals) indicates a specific document or program Question mark (?) indicates that the web server will perform some type of calculation before returning the results 1.02 Understand how to validate, authenticate, and legally use information from the Internet. 1.02 URL's Anatomy

7 For your activity webpage evaluation
1.02 Understand how to validate, authenticate, and legally use information from the Interent.

8 Authenticating Content
Information Literacy -The ability to evaluate information across a range of media; recognize when information is needed; locate, synthesize, and use information effectively; and accomplish these functions using technology, communication networks, and electronic resources. 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content

9 Content Criteria When validating information obtained from the Internet, we need to look at two major areas: the URL and the content. Since we already know about the URL, what do you think we need to know about the content? 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content

10 What does validate mean?
In layman’s terms: To validate means to verify or prove that something is what it says it is or that something does what it says it’s supposed to do. For example, the statement, “The sun rises in the East and sets in the West,” is valid because it has proven to be true. 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content

11 Validation Criteria - Content
Who created the page? Look for the author’s name and the name of the organization provides the registration information of the domain name owner. What’s the date of creation? Has the page been recently updated? Is the page copyrighted? 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content

12 Validation Criteria – Content (continued)
Does the page title match the content and do the images relate as well? (relevance) Does the page contain obvious spelling and grammatical errors? Are the images and color and font schemes constant? (consistency) 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content

13 Validation Criteria – Content (continued)
Is it believable and authentic? Can you back it up with research? What does authentic mean? Not counterfeit or copied Genuine, real, original, true Examples: Authentic: Gucci bag Inauthentic: Gucci bag knock-off 1.02 Authenticating Content

14 Validation Criteria – Content (continued)
Does the page appear to be useful for its stated purpose? What other sites are linked? Use link URL to find out who has linked to a particular web site. 1.02 Authenticating Content

15 Truth or Fiction? Visit these sites:
1.02 Authenticating Content

16 What does validate mean?
In layman’s terms: To validate means to verify or prove that something is what it says it is or that something does what it says it’s supposed to do. For example, the statement, “The sun rises in the East and sets in the West,” is valid because it has proven to be true. . 1.02 Authenticating Content

17 Validation Criteria - Content
Who created the page? Look for the author’s name and the name of the organization provides the registration information of the domain name owner. What’s the date of creation? Has the page been recently updated? Is the page copyrighted? 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content

18 Validation Criteria – Content (continued)
Does the page title match the content and do the images relate as well? (relevance) Does the page contain obvious spelling and grammatical errors? Are the images and color and font schemes constant? (consistency) 1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content

19 Validation Criteria – Content (continued)
Is it believable and authentic? Can you back it up with research? What does authentic mean? Not counterfeit or copied Genuine, real, original, true Examples: Authentic: Gucci bag Inauthentic: Gucci bag knock-off 1.02 Authenticating Content

20 Validation Criteria – Content (continued)
Does the page appear to be useful for its stated purpose? What other sites are linked? Use link URL to find out who has linked to a particular web site. . 1.02 Authenticating Content

21 Truth or Fiction? Visit these sites:
1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content

22 What’s next? We will validate some websites!
1.02 Understand how to validate, authenticate, and legally use information from the Interent. 1.02 Authenticating Content


Download ppt "BMA-IBT-2 Apply technology as a tool to increase productivity to create, edit, and publish industry appropriate documents. 2.3 Execute efficient online."

Similar presentations


Ads by Google