Presentation is loading. Please wait.

Presentation is loading. Please wait.

Electronic Communication and the Internet

Similar presentations


Presentation on theme: "Electronic Communication and the Internet"— Presentation transcript:

1 Electronic Communication and the Internet
Chapter 4 Electronic Communication and the Internet

2 Electronic communication
Electronic communication: exchanging info using through network connections or modems Modem: device that transmits data over telephones or cable lines from computer to another

3 Internet (Net) Worldwide network that connects millions of computers
Started as a government project for researchers to communicate, ARPANET No one organization or government “controls” the Internet, although some governments censor what their citizens can access 3

4 Key Internet Organizations
Internet Corporation for Assigned Names and Numbers (ICANN) Allocates domain names, settles domain disputes Assigns Internet protocol numbers needed by each computer to be “seen” by the network 4

5 Internet Service Providers (ISPs)
Companies that provide access for a fee Levels of service Dial-up High-speed Digital subscriber line (DSL) over telephone wires Cable or fiber optic Satellite Wireless 5

6 Internet Service Providers (ISPs)
E.G. AOL, MSN, EarthLink, Comcast 6

7 Internet Services and Resources
Instant messaging (IM) Chat software File transfer Database searches Online libraries Remote log-on Discussion and news groups weblog

8 E-mail (Electronic Mail)
Use of computers to transmit text messages to one or more persons with almost instant delivery May transport other file types to the (attachment files) Can be sent anywhere in the world as long as the person has an address

9 Address Based on user name and “domain name” (organization or company that provides the individual with an account) Suggests at least 23 individuals with the same first initial and last name (J. Doe) at this facility “edu” is a domain name indicating an educational facility

10 E-mail Header Email application Viruses
Lists who sent the message, when, to whom, and the address to which a reply should be directed application Computer program that assists the users to send/receive messages Viruses Not through itself but through attachments

11 Email Encryption: uses mathematical formulas to code the message.
Message recipient decode the message with an encryption key Public key infrastructure: methods to validate author identity Unique code for each user embedded into a storage device Digital Signature: unique identifier issued to the sender

12 Instant Messaging (IM)
Interactive, real-time, text discussion that may occur via computers, cell phones, or other mobile devices Relies on many abbreviations for expeditious communication Popular among adolescents and young adults Sometimes used in work settings

13 File Transfer A means to move files from one location to another over a network that is separate from File transfer protocol controls transfer of data Useful for files that exceed allowable size limits imposed by providers

14 Database Searches These allow users access to databases, such as literature databases, through libraries or other organizations or via private subscription. Searches can be done in a fraction of the time required to manually search through paper resources.

15 Remote Log-on Allows users to access computer facilities from a separate location May be used to view files at work or access remote databases at libraries Require users to establish an account that permits access

16 Discussion and News Groups
Similar in content and diversity Differ in method of access Discussion (Listserv or Mailing) groups Individuals subscribe. Mass s are sent to all subscribers. News (Usenet) groups Users “read” and contribute to discussion selectively; no mass s.

17 E-mail Concerns HIPAA compliance
Improper use—no etiquette (netiquette) Forwards, inappropriate or lengthy messages Potential to carry viruses, worms, spyware

18 E-mail Concerns Commercial uses, overwhelming volume
Spam—unsolicited sales messages Phishing—dubious requests for private information

19 Questions?


Download ppt "Electronic Communication and the Internet"

Similar presentations


Ads by Google