Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 1: Module 1 Objective 10 identify tools used in the entry, retrieval, processing, storage, presentation, transmission and dissemination of information;

Similar presentations


Presentation on theme: "Unit 1: Module 1 Objective 10 identify tools used in the entry, retrieval, processing, storage, presentation, transmission and dissemination of information;"— Presentation transcript:

1 Unit 1: Module 1 Objective 10 identify tools used in the entry, retrieval, processing, storage, presentation, transmission and dissemination of information;

2  Usenet is a collection of user-submitted notes or messages on various subjects that are posted to servers on a worldwide network.  Usenet – A collection of newsgroups  Each subject collection of posted notes is known as a newsgroup.  On the Web, Google and other sites provide a subject- oriented directory as well as a search approach to newsgroups and help you register to participate in them.

3  Traditionally: part of the usenet news system  Newsgroup – An on-line forum that allows users from the Internet to join the discussion on a specific topic.  A topic-based discussion forum & repository  Accessed/received via email, website (often requiring login), or a newsreader  Topics can be almost anything

4  Goggle Groups search: http://groups- beta.google.com/http://groups- beta.google.com/  Newzbot: http://www.newzbot.com/http://www.newzbot.com/  Brief intro to newsgroups with a selection of newsgroups: http://www.geocities.com/findnewsgroup http://www.geocities.com/findnewsgroup

5

6  Search engines are programs which searches documents for specified keywords and returns a list of the documents where the keywords were found. Some examples of search engines are: Yahoo.com Google.com Ask.com Dogpile.com

7  Internet Relay Chat is a protocol for real-time internet text messaging (chat) or synchronous (existing or occurring at the same time) conferencing. Some examples of IRC are:  Windows live  Msn messenger  Yahoo messenger

8  File Transfer Protocol is a standard network protocol used to transfer files from one host to another host over a transmission control protocol based network, such as the internet. Examples of FTP are:  Filezilla  Cute FTP

9  Message board is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are at least temporarily archived. Also, depending on the access level of a user or the forum set-up, a posted message might need to be approved by a moderator before it becomes visible.  An example of message board is an online bulletin board.

10  Internet telephony is a communication service that allows persons to make real-time voice, fax and video calls over the internet.  An example of internet telephony is:  Skype.  Google Talk

11  Internet tools providing remote login capabilities to computers on the Internet  One computer can connect to another to use its services  Connecting Privileges: guest - usually logins are not required full - requires username and password.

12  Internet allows you to use the resources of a distant computer somewhere else in the world.  Telnet is a client/server model.  The distant computer (host) allows multiple users to access its resources at the same time.  Telnet clients are available in different Operating system: Linux, Unix, Macintosh, Windows.

13  These program allows you to log on to much powerful computers and perform tasks like you are actually working on the remote machine.  Telnet usually needs username/password, but not always (e.g. library.cuhk.edu.hk).  Some good telnet client  NetTerm – one of the best telnet client NetTerm  SimpTerm – Another one. SimpTerm  SSH – using encrypted channel. SSH

14  “Crackers” send fraudulent emails “from” a trustworthy source to lure victims to give up sensitive info (such as passwords, account numbers, credit card numbers, and the such), often require people to log in at fake sites and in the process giving the info to the phishers, often use scare tactics to get people “hooked”  Examples: emails from a bank asking for account info, email from ebay wanting info  Started on AOL  Tips: ▪ DO NOT follow the email ▪ DO NOT use the url in the email ▪ If unsure go to the real website type in the URL yourself or call the company ▪ Most companies want you to send any phishing email your received “from” them to them


Download ppt "Unit 1: Module 1 Objective 10 identify tools used in the entry, retrieval, processing, storage, presentation, transmission and dissemination of information;"

Similar presentations


Ads by Google