Presentation is loading. Please wait.

Presentation is loading. Please wait.

Glencoe Digital Communication Tools Using the Internet Chapter Contents Lesson 3.1Lesson 3.1 Browse the Internet (pg. 60) Lesson 3.2Lesson 3.2 Customize.

Similar presentations


Presentation on theme: "Glencoe Digital Communication Tools Using the Internet Chapter Contents Lesson 3.1Lesson 3.1 Browse the Internet (pg. 60) Lesson 3.2Lesson 3.2 Customize."— Presentation transcript:

1 Glencoe Digital Communication Tools Using the Internet Chapter Contents Lesson 3.1Lesson 3.1 Browse the Internet (pg. 60) Lesson 3.2Lesson 3.2 Customize Your Browser and Search Online (pg. 63) Lesson 3.3Lesson 3.3 Security and Viruses (pg. 70) Lesson 3.4Lesson 3.4 Copyright, Fair Use, and Plagiarism (pg. 73) Lesson 3.5Lesson 3.5 Computer Crimes (pg. 75) Chapter Assessment 3 3 pg. 58-82 Copyright © by The McGraw-Hill Companies, Inc. All rights reserved.

2 Glencoe Digital Communication Tools Using the Internet You Will Learn To 3 3  Explore the Internet by using a browser and hyperlinks  Save Web sites as Favorites  Recognize a Web site by its Web address  Apply advanced search techniques  Choose a home page for your browser  Print Web pages  Describe anti-virus software  Describe security for the Internet  Explain the importance of copyright, fair use, and avoiding plagiarism  Describe computer crimes and fraud

3 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 60-62 3.1 Browse the Internet Browsers You need a special software program called a browser to visit Web sites. Hyperlinks Clicking hyperlinks allows you to navigate from page to page on the Internet. browser An application that reads the contents of Web pages and displays them on your computer screen. hyperlink Any text or graphic on a Web page that will take you to a new location when clicked.

4 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 60-62 3.1 Browse the Internet The uniform resource locator (URL) identifies a Web page. The parts of a URL include:  Hypertext transfer protocol, or http  www, which stands for World Wide Web  The domain name  The domain extension, which identifies the category of a Web site uniform resource locator (URL) A unique Web address that directs a browser to a Web page. domain name The part of a URL that usually identifies the owner or the subject of a Web site.

5 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 60-62 3.1 Browse the Internet Following are examples and descriptions of some common domain extensions: Creating folders in Favorites is similar to the steps used for creating folders in My Computer. Folders are created to help you organize data and make it easier to find information. ExtensionDescription of SiteExample.comOriginally intended for commercial or for-profit businesses; now anyone can use.com www.glencoe.com.eduEducational institutionwww.ucla.edu.govU.S. government organizationwww.senate.gov.milU.S. military organizationwww.usmc.mil.orgProfessional or nonprofit organization www.fbla-pbl.org

6 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 60-62 3.1 Browse the Internet What can you tell about a Web site by looking at the URL? digicom.glencoe.com digicom.glencoe.com Lesson 3.1, Rubric

7 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 63-68 3.2 Customize Your Browser and Search Online Home Pages You can customize your browser to open your favorite Web site as your home page each time you access the Internet. Search Engines Search engines help you find specific information on the Internet; some examples include:  Google at www.google.com  AltaVista at www.altavista.com  Ask Jeeves at www.ask.comwww.ask.com search engine A Web site that finds Web pages that contain words you tell it to search for. Microsoft Office has an online search feature built into the Help menu of all their programs. You can quickly access Help resources online when you choose this option.

8 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 63-68 3.2 Customize Your Browser and Search Online Boolean Search Narrow your search field with Boolean operators such as:  AND  OR  NOT Boolean operator A word that can make an Internet search more specific and effective.

9 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 63-68 3.2 Customize Your Browser and Search Online What is an advantage to setting a home page in your browser? digicom.glencoe.com digicom.glencoe.com Lesson 3.2, Rubric

10 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 70-71 3.3 Security and Viruses Internet Security Security on the Internet is important to the following:  Schools  Businesses  Home users Firewalls Home and work computers can be protected against unauthorized access by installing a firewall. Anti-Virus Software Use regularly updated anti-virus software to:  Alert you if an e-mail or file you are trying to open contains a virus  Clean an infected file  Quarantine or get rid of a virus virus A small computer program that can copy itself repeatedly into a computer system and cause a variety of problems.

11 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 70-71 3.3 Security and Viruses Why is it important to have anti-virus software on all business and personal computer systems? digicom.glencoe.com digicom.glencoe.com Lesson 3.3, Rubric

12 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 72 21st CENTURY CONNECTION Cyberbullies Hurtful Messages Cyberbullies can be found in almost any communication medium, including:  Cell phones  Instant message programs  Chat rooms  E-mail  Web sites allowing users to post photos and comments

13 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 72 21st CENTURY CONNECTION Cyberbullies What Should You Do? It is best to ignore mild harassment. If the harassment becomes severe or you receive threatening messages, inform an authority figure such as your:  Teacher  Coach  Counselor  Parent

14 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 72 21st CENTURY CONNECTION Cyberbullies Giving the Wrong Message In order to avoid becoming a cyberbully yourself, take some of the following precautions:  Think before sending messages  Take a break from the computer and do something relaxing before re-reading messages you have written while angry or upset  Remember that messages may not be private and may be sent to the wrong person  Consider how your family or friends would respond to your message

15 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 72 21st CENTURY CONNECTION Cyberbullies Technology Lifeline Today’s technology affects all areas of life, leading to increased exposure to all types of harassment and the need to know how to protect yourself from it.

16 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 72 21st CENTURY CONNECTION Question 1 If you have ever been a victim of a cyberbully, describe how you handled the situation or how you should have responded. Possible answers include:  Ignore or delete mildly harassing messages  Block harassing e-mails or instant messenger buddies  Show severely harassing messages to an authority figure

17 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 72 21st CENTURY CONNECTION Question 2 If you have ever unintentionally become a cyberbully, describe how you might have been able to prevent the misunderstanding. Possible answers include:  Avoiding potentially heated topics of discussion  Thinking before responding angrily to others  Setting aside the cell phone or computer until your thoughts clear  Treating others as though you were talking to them in person

18 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 73-74 3.4 Copyright, Fair Use, and Plagiarism Computer Ethics Your sense of ethics determines how you use the information available online. Copyright The law requires you to ask permission before using any copyrighted work that you find online. Possible copyrighted materials include:  Songs  Novels  Plays  Software programs  Inventions copyright A type of legal protection for works that are created or owned by a person or company.

19 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 73-74 3.4 Copyright, Fair Use, and Plagiarism Fair Use Borrowing from a copyrighted work is not always illegal. Fair use applies when the material is used for purposes of:  Criticism—quoting briefly from a novel in a book review  News reporting—using excerpts or quotes from copyrighted material in an article or news broadcast  Education—a teacher copying part of a book to hand out to students  Research—using copyrighted material in a school report or presentation fair use Describes when you may use a copyrighted work without permission.

20 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 73-74 3.4 Copyright, Fair Use, and Plagiarism Plagiarism You must always acknowledge the author’s work when using someone else’s material; teachers can now use software to scan student papers for plagiarism. plagiarism Using other people’s ideas and words without acknowledging that the information came from them.

21 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 73-74 3.4 Copyright, Fair Use, and Plagiarism Give reasons why you think authors and composers are careful to copyright their work. digicom.glencoe.com digicom.glencoe.com Lesson 3.4, Rubric

22 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 75-77 3.5 Computer Crimes Cybercrime Criminal activity on the Internet includes:  Fraud  Embezzlement  Unauthorized use of computers  Creating and releasing viruses  Harassment  Stalking Investigation The FBI’s special computer crimes branch, the National Computer Crime Squad (NCCS), has the power to investigate:  Computer crimes  Suspects in other countries All software programs have a copyright license that states how many computers you can install the software on. If you install the software on more computers than allowed, you could be fined by the software developer.

23 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 75-77 3.5 Computer Crimes Computers can also help to solve crimes through Web sites such as the National Center for Missing and Exploited Children’s www.missingkids.com, which uses the Web to track down:  Runaway children  Kidnapping victims Protecting Your Computer Taking precautions to secure your computer against unauthorized access will help prevent criminal activity from affecting you.

24 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 75-77 3.5 Computer Crimes Why do you think some people choose the Internet as a place to commit crimes? digicom.glencoe.com digicom.glencoe.com Lesson 3.5, Rubric

25 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 78 21st CENTURY CONNECTION Treasure Hunting with Technology About the Global Positioning System A Global Positioning System, or GPS, device uses satellite signals to calculate its exact position on the planet. The GPS also:  Uses 24 satellites, launched between 1978 and 1994  Receives its signals from satellites at an altitude of 12,600 miles above the Earth’s surface  Costs $400 million per year to maintain

26 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 78 21st CENTURY CONNECTION Treasure Hunting with Technology A New Sport Some people use handheld GPS devices to embark on a new sport known as geocaching, a type of treasure hunt which involves:  Using the Internet to find the latitudes and longitudes of hidden caches  Entering the location of a cache into a GPS device  Reaching the coordinates of the site and finding the treasure itself  Signing the logbook and replacing the treasure with a new find for the next treasure hunter

27 Glencoe Digital Communication Tools Using the Internet 3 3 pg. 78 21st CENTURY CONNECTION Question What are some advantages of GPS devices? Possible answers include:  The introduction of new sports  The decreased chance of getting lost while hiking or exploring  Allows emergency response teams to more quickly find someone using a GPS device  Can locate stationary objects such as motor vehicles which contain a GPS tracking device; this can help if a car is stolen or needs roadside assistance

28 Glencoe Digital Communication Tools Using the Internet 3 3 Chapter Assessment Question 1 Do you have a favorite search engine that you use? What are the advantages of this search engine? (Lesson 3.2) Answer: Some popular search engines include Google at www.google.com, AltaVista at www.altavista.com, and Ask Jeeves at www.ask.com. You can research online to find reviews of your favorite search engine and to compare the different search engines using keywords such as compare search engines. Each will have its strengths. For example, one advantage of using Google is that it currently has the largest database of Web pages. www.google.comwww.altavista.comwww.ask.com

29 Glencoe Digital Communication Tools Using the Internet 3 3 Chapter Assessment Question 2 What is plagiarism? When you write a report, what can you do to avoid plagiarizing others’ work? (Lesson 3.4) Answer: Plagiarism is using other people’s ideas and words without acknowledging that the information came from them. In other words, it is taking credit for work that is not yours. To avoid plagiarizing when writing a report, always give credit when you use another person’s words or ideas. If you are doing research, take only brief notes from your source and then write your report from those notes. Always use your own words to explain the point you are trying to make.

30 Glencoe Digital Communication Tools Using the Internet 3 3 Chapter Assessment Question 3 As an off-site salesperson, what steps could you take to ensure the security of your computer? Also, what precautions might you need to take to safely share important project information with coworkers over the Internet? Answers may include: Installing a firewall to protect against unauthorized access to your computer and installing anti-virus software to protect against viruses from e-mail or the Internet. Using password protection would be an important precaution to keep your project files from being accessed or changed by unauthorized people as you share them with others.

31 Glencoe Digital Communication Tools Impact of Digital Communication Tools Unit Resources For more resources on this unit, go to the Online Learning Center at http://www.digicom.glencoe.com.http://www.digicom.glencoe.com 1 1


Download ppt "Glencoe Digital Communication Tools Using the Internet Chapter Contents Lesson 3.1Lesson 3.1 Browse the Internet (pg. 60) Lesson 3.2Lesson 3.2 Customize."

Similar presentations


Ads by Google