We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Modified over 4 years ago
The Internet, The Web, and Electronic CommerceChapter 2 The Internet, The Web, and Electronic Commerce
Competencies (1 of 2) Discuss the origins of the Internet and the WebDescribe how to access the Web using providers and browsers Discuss Internet communications, including , instant messaging, and social networking At the end of this chapter you should be able to: 1 Discuss the origins of the Internet and the Web. 2 Describe how to access the Web using providers and browsers. 3 Discuss Internet communications, including , instant messaging, and social networking. 4 Describe search tools, including search engines and metasearch engines. 5 Discuss electronic commerce, including B2C, C2C, B2B, and security issues. 6 Describe these Web utilities: Web-based application, FTP, plug-ins, and Filters. Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
2-3 Competencies (2 of 2) Describe search tools, including search engines and metasearch engines Discuss electronic commerce, including B2C, C2C, B2B, and security Describe Web utilities: Web-based applications, FTP, plug-ins, and filters Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
2-4 Introduction The Internet is often referred to as the Information Superhighway because it connects millions of people across the globe. Unlike a typical highway, the Internet moves idea and information. The Web provides an easy-to-use, intuitive interface to connect to the Internet and is used by millions of people every day. Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
The Internet and the Web2-5 The Internet and the Web Large network that connects smaller networks globally The Internet was Launched in 1969 National computer network US funded project called ARPANET World Wide Web or WWW was intro- duced in 1991 at CERN Most developed network system currently in use; connects people all over the world Originally started in 1969 when US funded a research project (ARPANET—Advanced Research Project Agency Network) CERN – Center for European Nuclear Research World Wide Web (Web) is a part of the Internet – not the Internet; introduced in 1992 by consortium in Switzerland. Originally started as research and text-based network to exchange research ideas from university to university Developed into a network of networks One of the most powerful tools of the 21st century Internet & Web further clarified Internet is the actual physical network comprised of wires, cables (Key Term), & satellites Being connected to the network is often referred to as being online (Key Term) The Web is a multimedia interface to resources available on the internet Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Common Internet Uses Communicating Online shopping SearchingExchange Discussion Groups Online shopping Searching Virtual Libraries Entertainment Education or e-learning Most common Internet applications Communicating - sending and discussion group participation You can chat live with others Ask students what chat software they use Shopping – fastest-growing applications Searching - using virtual libraries Entertainment – music downloads; integration of TV and PC Education or e-learning (Key Term) You can take classes on almost any subject (Key Term) Replace with new Figure 2-18. Replace with new Figure 2-23. New screen capture. Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Internet Access ProvidersCommon way to access the Internet Commercial Internet Service Providers (ISP) National Service Providers Regional Service Provider Wireless service providers The common way to access the Internet is through a provider or host computer Providers - already connected to the Internet -- furnish a pathway for other users Typical providers include: Colleges and universities – usually “free” Internet service providers (ISP) (Key Term)can be local (regional) or national Ask students to identify various ISPs used in their environment Types of providers National – like AOL Regional – smaller service area Wireless No telephone lines used Provide connection through wireless modems (Key Term) Client-server network is comprised of users that are connected to a ISP via a variety of connecting technologies (dial-up (Key Term), telephone connections, wireless modems, DSLs (Key Term), etc…) The users computer is the client that requests services from the provider’s computer or server Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Browsers Programs that provide access to Web resourcesAllow you to surf the Internet Three well-known browsers Mozilla Firefox Netscape Communications Microsoft Internet Explorer Address or location of the resource must be specified URL Browsers allow you to search or surf (Key Term) the Web Navigate, search for information and communicate using the Web Use URL (uniform resource locator) (Key Term) to connect to other resources Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
URLs Uniform Resource Locators Locates Web sitesAll URLs have at least two parts Protocol Domain name Locates Web sites Two parts to URL: protocol (Key Term), rules for exchanging data between computers (usually domain name (Key Term) also known as a top-level domain (Key Term) or server where the resource is located ( Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
More on Browsers Browsers interpret HTML commandsHypertext Markup Language Contained in a document Display document as a Web page Browser is software that allows users to navigate the Web and read the multimedia formatted pages Connect to Web sites using URL addresses (uniform resource locator) Document is sent to computer usually coded in HTML (Hypertext Markup Language) (Key Term) or some variation Interprets the HTML codes displaying page May contain Hyperlinks (Key Term) -- allow users to quickly connect to other pages or Web sites Graphics Text Web server– the computer that stores and shares graphics, test, audio & video clip files Web pages contain links (Key Term) to programs called applets (Key Term) These are special programs written in a programming language called Java (Key Term) These programs can be quickly downloaded and run by most browsers Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Communication Most popular Internet activity Types of communication2-11 Communication Most popular Internet activity Types of communication Electronic Mail ( ) Address Spam Instant Messaging Social Networking Communication is the most popular Internet activity Types of communications: (Key Term) Instant Messaging (Key Term) Social Networking (Key Term) Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
E-Mail Transmission of electronic messages over the InternetBasic parts Header Address Subject Attachment Message Signature Line or electronic mail (Key Term) Transmission of electronic messages over the Internet Has three basic parts: header (Key Term), message (Key Term), and signature line (Key Term) Header (Key Term) Address (Key Term) Subject (Key Term) – very important to include this in a message Attachments (Key Term) Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
E-Mail Address Example2-13 Address Example Internet uses the domain name system (DNS), which gives names and numbers to people and computers Address (Key Term) has two parts User name - identifies unique user or computer in the domain Domain name (Key Term) - references a specific organization Top-level domain code identification includes geographical location or organizational identification .com = commercial .edu = education and research .org = organizations (usually non-profit) .net = major network centers (usually easier to access than commercial) .gov = government Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Spam Junk and/or unwanted Email2-14 Spam Junk and/or unwanted Computer viruses or destructive programs are often attached to unsolicited CAN-SPAM Act Spam blockers incorporate a myriad of approached to identify and control spam Spam blockers are also referred to as: Junk mail filters Anti-spam programs Spam (Key Term) – unsolicited Distraction, Nuisance Computer viruses (Key Term) can also be attached to spam Spam blockers (Key Term) use a variety of different approaches to identify and eliminate spam CAN-SPAM Act requires that every marketing related provide an opt-out option Tips to blocking spam: Choose a complex address Keep a low profile Don’t ever respond to spam Use ez-mail filter options Use anti-spam Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
2-15 Instant Messaging Is an extension of that provides direct, live communication between two or more people Instant messaging programs also include: Video conferencing features File sharing Remote assistance Most widely used instant messaging services: AOL’s Instant Messenger Microsoft’s MSN Messenger Yahoo Messenger Instant Messaging (Key Term) Extension of that allows two or more people to contact each other via direct, live communication To use instant message, specify list of friends (Key Term) and register with an instant messaging server Some services include video and file-sharing Different services do not always play well together. Universal instant messenger (Key Word) programs are being developed (i.e. Gaim, Odigo, Trilogy), to overcome this limitation. Direct students to p. 35 for table on Spam Blocker(s) Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Social Networking One of the fastest growing uses of the Internet2-16 Social Networking One of the fastest growing uses of the Internet Three basic categories: Reunite Friend of a friend Common interest Social Networking (Key Term) One of the fastest growing uses of the Internet Connecting individuals to one another Three basic categories Reunite – member databases used for finding long lost friends (Classmates Online and Facebook) Friend of a friend – connecting friends of friends via profile information (Friendster and MySpace) Common interest – connecting those with common interests or hobbies Consider carefully the information you are disclosing when joining social networking sites. Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Search Tools Search engines Metasearch engines2-17 Search Tools Search engines Metasearch engines Specialized search engines Tips Start with the right approach Be as precise as possible Use multiple words Use Boolean operators Check your spelling Keep moving Specialized programs that assist you in locating information on the Web and the Internet Search services (Key Term) help you locate information; they maintain the database that helps you get where you want Special programs called spiders (Key Term) continually look for information and updated services Search engines (Key Term) – assist you to locate information Use keyword search (Key Term); know “rules” i.e. use + or quotes to look for phrases rather than individual words Use directory search (Key Term) – list of categories or topics; also known as index search (Key Term) Examples AOL Ask Jeeves Google MSN Search Yahoo! Metasearch engines (Key Term) – programs that automatically submit your search request to several search engines simultaneously Specialized search engines (Key Term) - Programs that focus on subject specific Web sites Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Search Engines Specialized programs to assist in locating informationTypes of searches Keyword search Directory search Keyword search (Key Term) – enter a keyword or a phrase reflecting the information you want Returns a number of hits (Key Term) Each hit includes a hyperlink Directory search (Key Term) Known as an index search Select a category or topic that fits the information you want Note: a recent study by the NEC Research Institute found that any one search engine includes only a fraction of the informational sources on the Web. Therefore, it is good to use more than one search engine when researching important topics. Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Metasearch Engines Return 2-19Programs that automatically submit your search request to several engines simultaneously The engine receives the results, eliminates duplicates, orders hits, and then provides the edited list to you Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Specialized Search Engines2-20 Specialized Search Engines Programs that focus on subject specific Web sites Specialized sites can potentially save you time by narrowing your search Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Content Evaluation Not all information on the web is accurateWays to evaluate accuracy of Web information include: Authority Accuracy Objectivity Currency Anyone can publish to the web Not all Web information has been subjected to peer review or submission guidelines Ways to evaluate accuracy of Web information: Authority – Is author an expert in the subject area? Is the site an official site for the information presented, or, is it an individual person’s Web site? Accuracy – Is the information subject to critical review prior to posting? Does the site provide a means to report errors to the author? Objectivity – Is the information factual, or does the author have a bias? Currency – Is the information current? Is there a “published on” date or “updated on” date indicated? Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Electronic Commerce Also known as e-commerce2-22 Electronic Commerce Also known as e-commerce Buying and selling of goods over the Internet Business-to-consumer (B2C) Consumer-to-consumer (C2C) Web auctions Business-to-business (B2B) Electronic commerce is buying and selling over the Internet Three basic types of electronic commerce: business to consumer; consumer to consumer; and business to business B2C (Key Term) Involves the sale of a product or service to the general public or end users C2C (Key Term) Involves individuals selling to individuals B2B (Key Term) Involves the sale of a product or service from one business to another Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
2-23 Business to Business Involves the sale of a product or service from one business to another (B2B) Primarily a manufacturer supplier relationship Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Business to Consumer Fastest growing type of e-commerce2-24 Business to Consumer Fastest growing type of e-commerce Three most widely used B2C applications: Online banking Financial trading Shopping B2C is fastest growing type of e-commerce Three types Online banking (Key Term) Becoming a standard feature of banking institutions Customers use standard browser to perform many banking operations Financial trading Online stock trading allows investors to research, buy, and sell stocks and bonds over the Internet Shopping Buying and selling of consumer goods via the Internet Sites exist that provide support for consumers looking to compare products and locate bargains Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Consumer to Consumer Web Auctions2-25 Consumer to Consumer Web Auctions Consumer-to-consumer e-commerce (C2C) Similar to traditional auctions Types Auction house sites Person-to-person auction sites Recent trend in C2C e-commerce is Web auctions (Key Term); similar to traditional auctions – no one sees each other Auction house sites (Key Term) – merchandise presented for auction Person-person auction sites (Key Term) – more like flea markets; forum for buyers and sellers to gather Similar to Web traditional auctions Buyers and sellers seldom meet face-to-face Ask the students if they have ever used E-bay Example auction sites include Amazon, Bidz, eBay, Sotheby’s, and Yahoo! Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Security Payment methods must be fast, reliable, and secure2-26 Security Payment methods must be fast, reliable, and secure Three basic options Checks Credit card Digital cash A challenge is the payment for goods Should be reliable, secure, and fast Electronic payment -- easy, secure payment method Checks -- slowest and least convenient Credit cards -- easier to work with, somewhat vulnerable to theft Criminals known as carders (Key Term) specialize in stealing, trading, and using stolen credit cards over the internet Digital cash (Key Term) Purchased from third party (usually a special bank); more secure than credit cards Providers include Ecash, Google, Internet Cash, and PayPal Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
2-27 Web Utilities Specialized utility programs that make using the internet & web safer and easier Web-based applications FTP Plug-Ins Filters Internet Security Suites Web-based applications (Key Term) are offered by Web-based services (Key Term) (often free) that provide Internet access to programs with capabilities similar to Microsoft Word, Excel, and PowerPoint. FTP transfers files; file transfer protocol (Key Term); Internet service for file transfer Downloading (Key Term) - transmitting files to your computer Uploading (Key Term) - transmitting files from your computer to another computer Plug-ins (Key Term) -- automatically loaded by and work with your browser; Acrobat Reader; Cosmos from Silicon Graphics (3-d displays); Media Player; QuickTime from Apple; RealPlayer; and Shockwave from Macromedia Filters (Key Term) – block access to specified sites; set time limits Internet Security Suites (Key Term) – collection of utility programs designed to maintain your security and privacy while you are on the Web Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
2-28 Plug-Ins Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
2-29 Filters Return Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Internet Security SuitesCollection of utility programs designed to maintain your security and privacy while on the web McAfee Norton Internet Security Suites (Key Term) control… Spam (Key Term) Protect against computer viruses (Key Term) Provide Filters (Key Term) Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Careers In IT - WebmastersDevelop & maintain websites Back-up of the company website, updating resources, and development of new resources Work with the marketing department to increase the site traffic flow Webmasters (Key Term) can expect to earn a salary of $48,000 to $73,000 Position is relatively new in many corporations and tends to have fluid responsibilities Experience in this field could lead to managerial opportunities Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
A Look to the Future Homes of Tomorrow2-32 A Look to the Future Homes of Tomorrow “Smart” appliances in homes will have their own Web page Refrigerators will be able to manage their inventory and automatically order to re-supply Internet cameras, wireless techno- logies, & high-speed internet will allow you to virtually monitor your home while on travel Downsides? Downsides example: Infiltration of Internet viruses and spyware may enable your every move at home to be broadcast over the Internet Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Discussion Questions (Page 1 of 2)2-33 Discussion Questions (Page 1 of 2) Discuss the uses of the Internet. Which activities have you participated in? Which one do you think is the most popular? Explain the differences between the three types of providers. What are the basic elements of an message? Have students turn to the end of Chapter 2 in their textbooks to view the same “Open-Ended” questions/statements Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Discussion Questions (Page 2 of 2)2-34 Discussion Questions (Page 2 of 2) What is social networking? Describe the three types of social networking sites. Describe the different types of search engines. Give an example of the type of search each engine is best for. Have students turn to the end of Chapter 2 in their textbooks to view the same “Open-Ended” questions/statements Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
INTERNET A collection of networks. History ARPANet – developed for security of sending in case of a nuclear attack IDEA – the system would not go down.
Chapter 7: The Web and 1 The Web and Chapter 7.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems The Internet, the Web, and Electronic Commerce Chapter 2.
The internet, the Web, and E-Commerce By: Lucia Herrera Communications 168 Dr. Cagle By: Lucia Herrera Communications 168 Dr. Cagle.
Professor Michael J. Losacco CIS 1110 – Using Computers Internet & World Wide Web Chapter 2.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 2 The Internet, The Web, and Electronic Commerce.
Searching and Researching the World Wide: Emphasis on Christian Websites Developed from the book: Searching and Researching on the Internet and World Wide.
CHAPTER THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE 2.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 02: The Internet, the Web, and Electronic Commerce.
What Is A Web Page? An Introduction to the Internet.
SMALL BUSINESS MANAGEMENT Chapter 9 Small Business and Electronic Commerce.
The Internet, the Web, and Electronic Commerce
CHAPTER THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE 22.
MODULE 6 THE INTERNET. Introduction to the Internet and World Wide Web A computer network is a communication system that connects two or more computers.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
© 2019 SlidePlayer.com Inc. All rights reserved.