Unit 3

Content notes

  • The internet is a source of information and a communication tool

  • Email

    • E-mail has quickly caught on as the primary method of electronic communication because it’s fast and convenient and reduces the costs of postage and long-distance phone calls.

    • Some e-mail accounts are client-based such as those used at the University and those specifically tied to a particular Internet Service Provider (ISP) that we use as personal emails. These programs require a computer with an e-mail client such as Microsoft Outlook or Thunderbird. 

    • Web-based e-mail, on the other hand, finds the messages at a host site received by and stored on a mail server and can be accessed from anywhere. A Web-based e-mail address can be accessed from anywhere that there is an active Internet connection. Free mail accounts such as Yahoo or Hotmail use Web-based e-mail clients.

    • Email IS NOT private. They can be forwarded, printed and even read by your employer.

  • Instant messaging

    • Uses real-time text-based conversations, similar to chat rooms.

    • Users set up a list of contacts, often called a buddy list.

    • Contacts must be online to participate.

    • IM software detects the presence of members who are online.

  • Podcasts

    • Podcasts are compressed audio and video files distributed on the Internet using RSS technology.

    • RSS (Really Simple Syndication) technology allows for constant, automatic updates of Web pages.

    • Podcasts are found all over the Web.

    • They require aggregator and media player software to listen to them.

    • Podcast creation is an easy process, including attaching the RSS files.

  • Wikis

    • A Wiki is a type of website that allows anyone visiting the site to change its content by adding, removing, or editing the content.

    • Wikis provide an excellent source for collaborative writing.

  • Blogs

    • Weblogs, or blogs, are a way for anyone to post their thoughts for public viewing. Of course, posting a blog doesn’t guarantee that anyone will read it.

    • Blogging is easy and free. Reading blogs can be very interesting, as they plug into the unsolicited viewpoints of people who believe they have something to say.

  • Voice over internet (VoIP)

    • VoIP turns the Internet into a means to place phone calls.

    • VoIP is low cost, portable and convenient but usually are of lower quality than normal voice services such as a hard wired phone.

    • VoIP uses a protocol similar to e-mail to send voice data. Voice is digitized as an alternative to the analog phone lines.

    • VoIP requires a microphone, an Internet connection, and VoIP provider.

  • Networks

    • Social networking sites like MySpace.com, Twitter and Facebook have become immensely popular.

    • These sites are easy places for members to hang out, meet new people, and share common interests.

  • Newsgroups and listservs

    • Newsgroups are sometimes called threaded discussions or discussion groups. Built around topics or interests, participants read entries from other participants and respond, each respondent adding something new to the discussion, creating a thread. A participant can also start a new thread. Unlike chat rooms, threaded discussions don't rely on instant response but on a more thought-out written response. In distance education classes, threaded discussions are often required, and serve as the class participation component of a course.

    • Listservs are similar except that the threads are sent out as e-mails, where each participant on the ListsServ mailing list receives each new posting. They are less public than news groups.

  • E-commerce

    • Three types

      • In business-to-consumer or B2C transactions, such as Amazon.com, the end buyer purchases goods or services over the Internet.

      • In business-to-business or B2B transactions, businesses sell to one another.

      • In consumer-to-consumer C2C transactions, like Ebay.com, consumers sell to one 

    • Businesses hire security companies such as VeriSign to certify that their online transactions are secure

      • If a website displays the VeriSign seal you can usually trust that the information you submit to the site is protected

      • The s in https:// stans for secure

  • Web browsers

    • A software installed on your computer system that allows you to locate, view and navigate the web

    • Web browsers are graphical; they can display pictures in addition to text, as well as other forms of multimedia (video and sound)

    • Eg. internet explorer, mozilla firefox, apple safari, google chrome

  • Web sites

    • A collection of related web pages, images, videos, or other digital assets that are addressed with a common domain name or IP address in a internet protocol based network

    • A website is hosted on at least one web server and is accessible via the Internet or a private local area network.

    • The first page in a website is called the home page

      • If you type the domain name into the browser window, the server will find the site and look for a file called index.htm, the standard name for the home page

    • Every web page has a unique URL and is an HTML document

    •  It may or may not have links or hyperlinks to other pages or other websites.

    • A URL is the address of a web page. It is composed of several parts that help identify the type and location of each web document.

    • The first part of the URL indicates the set of rules (or the protocol) used to retrieve the specified document.

      • HTTP is most common. Another popular protocol is FTP.

      • The protocol is generally followed by a colon, two forward slashes, www (indicating World Wide Web), and then the domain name

    • Domain names consist of two parts: the host and the top-level domain (TLD).

    • At times, a forward slash and additional text follow the domain name.

      •  The information after the slash indicates a particular file or path (or subdirectory) within the website.

  • Hyperlinks 

    • Once you’ve reached a website, you can jump from the Web page to another within the website or to another website altogether by clicking on specially coded text called hyperlinks

    • When programming HTML, the Web page author can code any word or image to be a hyperlink.

    • Generally, text that operates as a hyperlink appears in a different color (often blue) and/or is underlined. 

    • Sometimes images also act as hyperlinks. 

    • When you pass your cursor over a hyperlink, the pointer turns from an arrow to a hand.

    • To retrace your steps, some sites also provide a breadcrumb list — a list of pages within a website you’ve visited that usually appears at the top of a page.

  • Favourites and bookmarks

    • Using the Favorites or Bookmark feature, you store the site’s URL in a special folder

    •  Live bookmarks add the technology of RSS (Really Simple Syndication) feeds to deliver Web page updates to you as they become available

  • Search engines

    • A search engine is a set of programs that searches the Web for specific keywords you wish to query and then returns a list of the websites on which those keywords are found.

    • Parts of a search engine

      • The first part is a program called a spider, which collects data on the Web

      • An indexer program organizes the data into a large database. The search engine software searches the indexed data, pulling out relevant information according to your search.

      • Using search engines like Google, users can scan millions of websites in seconds, with the search page returning thousands of relevant Web pages

      • Revenue is generated by offering a side column of paid links that are ties to certain search requests

      • For instance, if you enter cat food in the search box, Google returns many related sites. Businesses who have their link appear when someone requests cat food pay a small amount every time their ad link appears.

  • Borrowing from the web rules

    • Avoid plagiarism which is described as representing someone else's work as your own;

    • Avoid using copyrighted information;

    • Properly credit information you quote or paraphrase;

    • Obtain written permission from copyright holders.

  • Internet: a huge client/server network

    • Internet acts a client (a computer that asks for data) or a server (a computer that receives the request and returns the data to the client)

  • The origin of the internet

    • The Internet was created to respond to two concerns: to establish a safe form of military communications and to create a means by which all computers could communicate.

    • Scientists were asked to come up with a solution to secure communications between large computer centers in case of a nuclear attack

      • They responded by inventing packet-switching and routers.

      • By taking data messages and breaking them into small packets, each packet could be addressed and sent individually to a destination through a series of routers

      • The routers would send each packet along the optimum path to the next router, depending on traffic and availability.

    • This development also gave birth to a network that could be scaled up infinitely.

    • It could be argued that the scientists who quietly built the first packet-switched network in 1969 were more important to the future than the NASA scientists who landed a man on the moon in the same year

  • Connecting to the internet

    • Originally, the only means to connect to the Internet was with a dial-up connection. 

      • With dial-up connections, you connect to the Internet using a standard telephone line.

    • Other connection options, collectively called broadband connections, offer faster means to connect to the Internet

      • Broadband connections include cable, satellite, Fibre optic and DSL

  • Web vs internet

    • The web uses special language (such as the Hypertext Markup Language, or HTML) and special links (called hyperlinks) enabling users to jump from one place to another on the Web

    • The Web was invented long after the Internet, in 1989 by Tim Berners-Lee at CERN in Switzerland

    • In 1993, the National Center for Supercomputing Applications (NCSA) released the Mosaic browser

    • Many of the developers from the original Mosaic project at the NCSA worked for a new company, which released the Netscape browser (Netscape Navigator 1.0) in December 1994.

      • Netscape heralded the beginning of the Web’s monumental growth.

Chapter 3 notes

  • Google Gemini 2.0 

    • Google introduced Gemini 2.0 Flash Thinking Experimental, an AI model for advanced reasoning tasks like problem-solving, coding, and complex math.

    • It uses feedback loops to fact-check and refine answers, prioritizing accuracy over speed.

    • Builds on Gemini 2.0 Flash and is available on the AI Studio platform.

    • Early tests show issues, such as miscounting letters in words, raising concerns about reliability.

    • Reasoning models address diminishing returns of traditional AI scaling but face high computational costs and mixed benchmark results.

    • Competitors like OpenAI and Alibaba are also developing reasoning AI.

    • Google sees Gemini 2.0 as a foundational step toward advancing reasoning AI.

  • The Internet was developed in the late 1950s during the Cold War to ensure secure communication for the US Department of Defense.

  • ARPANET, the precursor to the Internet, began in 1958 as a project by the Advanced Research Projects Agency (ARPA).

  • A network with multiple communication paths was designed in 1963 to remain functional even if parts were destroyed.

  • Key milestones

    • 1964: ASCII code enabled data exchange between different computer manufacturers.

    • 1969: First networked message sent between UCLA and Stanford, marking ARPANET's debut.

    • 1972: Email and the "@" convention introduced by Ray Tomlinson.

    • 1973: TCP/IP protocol developed by Vinton Cerf and Robert Kahn to standardize communication.

    • 1991: Tim Berners-Lee launched HTTP and the World Wide Web, enabling hypertext and web browsing.

  • The web is a subset of the Internet, relying on HTTP for hosting and navigating HTML pages.

  • Computers connected to the Internet function as either clients (requesting data) or servers (providing data) in a client-server model.

  • Data travels via Internet backbones and pathways, with unique IP addresses identifying devices and websites.

  • The Mosaic browser (1993) introduced graphical web browsing, fueling the Internet's exponential growth by the mid-1990s.

  • The web has evolved from passive browsing to active content creation and collaboration, often referred to as the "social web."

  • Social media encompasses tools like social networking, online collaboration, file-sharing platforms, blogs, podcasts, and webcasts.

  • Social networking enables communication and sharing among users, with professional platforms like LinkedIn supporting business opportunities and personal platforms like Facebook fostering connections.

  • Social media facilitates community-building around shared interests but can also spread hate speech and misinformation.

  • Privacy precautions on social networks include

    • Avoiding oversharing personal details.

    • Reviewing privacy settings regularly.

    • Being cautious about posting sensitive or security-related information.

    • Researching posts before sharing to avoid misinformation.

  • Employers and colleges may review social media activity; users should ensure their online presence reflects positively.

  • Online collaboration tools like Google Docs, Microsoft Office Online, and Trello promote real-time editing, organization, and teamwork across locations.

  • Project management tools like Trello and Slack streamline tasks, integrate communication, and enhance productivity for remote teams.

  • Screen-sharing and videoconferencing tools like Zoom, Microsoft Teams, and Google Meet support remote collaboration in real time.

  • Videoconference best practices:

    • Hosts should send invites to specific individuals and manage screen-sharing privileges.

    • Use polls to engage participants and maintain focus.

    • Participants should mute microphones by default and avoid multitasking during meetings.

    • Ensure files, links, backgrounds, and lighting are prepared before meetings.

  • Social media platforms like Instagram, YouTube, Flickr, and SoundCloud allow users to share multimedia content like photos, videos, and music.

  • Blogs are personal online journals, often text-based, and arranged chronologically. They foster interaction through comments and can focus on niche topics or storytelling.

  • Vlogs (video blogs) are video-centric blogs often hosted on platforms like YouTube.

  • Blogging tools like WordPress and Squarespace support content creation and customization for blogs and websites.

  • Microblogs like Twitter and Tumblr enable short, frequent posts, often combining text and multimedia.

  • Podcasts are audio content delivered in a series over the internet, available for download.

  • Subscribing to a podcast ensures new episodes are automatically delivered via RSS to an aggregator.

  • Aggregators like Amazon Music and Spotify integrate podcast subscription and automatic download features.

  • Podcast directories include Overcast, Pocket Casts, Stitcher, and Spotify, offering diverse podcast options.

  • Webcasts are live or archived broadcasts of streaming audio or video content over the internet.

  • Livestreaming can involve broadcasting directly through platforms like Facebook Live or Instagram Live.

  • Twitch TV offers webcasts and livestreams from gamers and creators, with channel subscriptions for specific interests.

  • Webcasts can include non-interactive content or allow interactive audience responses using polls or surveys.

  • Examples of webcast applications: Nugs.net for live music and concerts, BroadcastMed for surgical innovations, and corporate or educational broadcasts.

  • Email usage

    • E-mail remains the most widely used internet communication tool due to its speed, convenience, and asynchronous nature.

    • Allows file exchange via attachments.

  • Email privacy

    • Not entirely private; messages can be printed, forwarded, archived, or subpoenaed.

    • Avoid sending sensitive information, as most e-mails are not encrypted.

    • Employers can access workplace e-mails.

  • Email etiquette

    • Be concise and proofread before sending.

    • Avoid casual abbreviations like "u" or "LOL."

    • Use a meaningful subject line and add a signature with contact info.

    • Send e-mails only to those who need them.

  • Email systems

    • Web-based systems (e.g., Gmail) allow access from any internet-connected device.

    • Desktop clients (e.g., Outlook) download e-mails to a computer and often include calendar features.

    • Both systems can integrate multiple accounts.

  • Text messaging and instant messaging

    • Texting uses cellular networks (SMS for text, MMS for media).

    • IM uses the internet and allows real-time communication, including video chats (e.g., WhatsApp, Messenger).

    • Business IM tools include Cisco Jabber and Oracle Beehive.

  • Messaging security

    • Texts and IMs can be intercepted unless encrypted.

    • Apps like WhatsApp and Signal use end-to-end encryption.

  • Video calls

    • Platforms like Zoom, Microsoft Teams, FaceTime, and Google Duo support video communication.

    • Links allow users to join calls across different devices.

  • Cloud computing

    • Stores data, files, and applications on the internet, accessible from any internet-connected device.

    • Eliminates the need for local storage and enhances collaboration and communication.

    • Front End: User side with web browsers like Chrome, Edge, or Safari.

    • Back End: Data centers and server farms worldwide store and manage files and programs.

    • Google: Chromebooks, Google Drive, Workspace, Gmail, Chrome browser.

    • Microsoft: OneDrive and cloud-based Office.

    • Apple: iCloud.

    • Other Services: Dropbox and Box enable file storage and collaboration.

    • Access personalized setups (e.g., desktop configurations, files) from any device with cloud-enabled systems.

    • Facilitate file sharing and collaboration without generating multiple versions.

    • Security and Privacy: Use strong security measures like two-step authentication but recognize no system is completely secure.

    • Backup: Cloud systems have redundancy, but critical files should have offline backups.

    • Access Issues: Internet outages can disrupt access; some services (e.g., Dropbox, OneDrive) offer offline synced versions to mitigate this.

  • E-commerce

    • Conducting business online, classified by the parties involved

    • Business to consumer (B2C): transactions between businesses and consumers (eg. zappos, target)

    • Business-to-Business (B2B): Transactions between businesses (e.g., Omaha Paper Company supplying goods to other companies).

    • Consumer-to-Consumer (C2C): Transactions between consumers (e.g., Etsy, Reverb).

  • Social Commerce:

    • Uses social networks to market and sell products.

    • Consumers provide ratings and reviews on platforms like Yelp and TripAdvisor, influencing buying behavior.

    • Includes trends like group-buying (e.g., Groupon, LivingSocial) and customization (e.g., CafePress, Zazzle).

  • Mobile Commerce (M-commerce):

    • Conducting transactions through smartphones, tablets, or mobile devices.

    • Examples: Apple Pay, Venmo, mobile apps for payments (e.g., Starbucks).

  • Features:

    • Location-based coupons and offers.

    • Mobile ordering for pick-up or delivery at restaurants.

    • Online banking, bill payments, and investment management.

    • Digital tickets and boarding passes for convenience.

  • Mobile wallets

    • Apps like Apple Pay or Google Pay store payment card information for use on smartphones or smartwatches.

    • Safer than physical credit cards due to unique authentication codes generated for each transaction.

    • Prevents skimming scams and allows remote wiping if the device is lost (enable “Find Your Device”).

  • Safety of online transactions

    • Avoid public computers and unsecured public Wi-Fi for transactions to prevent spyware risks.

    • Check for secure website indicators:

      • URL should begin with “https://.”

      • Look for a closed padlock icon or green text/address bar.

    • Use well-known, reputable sites and verify unfamiliar ones with the Better Business Bureau or Bizrate.

  • Payment methods

    • Prefer credit cards over debit cards due to better consumer protections.

    • Use prepaid credit cards for online purchases or third-party services like PayPal for added security.

    • Look for credit card services offering extra authentication options (e.g., one-time-use numbers or extra passwords).

  • Precautions when ordering online

    • Review warranties, return policies, and privacy statements before buying.

    • Save order confirmations and check return policies.

    • Be cautious of deals that seem too good to be true, as they may involve scams or pirated products.

  • General tips

    • Use strong passwords for online accounts.

    • Enable firewalls and antivirus software for computer protection.

    • Understand the retailer’s terms and conditions to help with disputes if needed.

  • Bitcoin

    • A virtual currency (cryptocurrency) allowing direct, anonymous transactions without intermediaries or banks.

    • No transaction fees and no need to provide personal information, making it attractive for ransomware attacks.

    • Every transaction is recorded on a public ledger called the blockchain, which ensures transparency and security.

    • Bitcoin wallet

      • Required to hold and spend bitcoins.

      • Wallet security is evolving but is vulnerable to hacking, with the risk of stolen funds.

    • Volatility

      • Bitcoin's value is highly volatile, fluctuating significantly within short periods.

    • Legitimate use

      • Initially used for illicit activities, Bitcoin is now accepted by major retailers (e.g., Home Depot, Microsoft, Expedia, Overstock) and many small businesses.

    • Alternative cryptocurrencies

      • Other virtual currencies include Litecoin, Ethereum, Zcash, Ripple, and Monero.

  • Society is increasingly dependent on Internet-based devices and services generating large amounts of data, known as big data.

  • Cloud computing involves large server centers using the Internet to store, manage, and process big data.

  • As more data is stored in the cloud, businesses require advanced ways to organize and analyze it.

  • Artificial intelligence (AI), particularly deep learning and machine learning, is used to analyze this data and solve societal issues.

  • Cloud computing's expanding capacity enhances AI's ability to process vast amounts of data, enabling improved outcomes across industries.

  • AI is used in the aerospace industry to process satellite data for autonomous vehicles, in call centers for language translation, and in healthcare for predicting clinical outcomes.

  • AI and cloud computing helped analyze COVID-19 data to detect and diagnose virus carriers during the pandemic.

  • The potential applications of AI and cloud computing are vast, driven by the continuous generation of data from devices.

  • A web browser is software that allows users to find, view, and navigate the web, displaying graphics, text, sound, and video.

  • Common browsers include Google Chrome, Microsoft Edge, Firefox, and Safari.

  • Key browser features include:

    • Omnibox: A combined search and address bar.

    • Tabbed browsing: Multiple pages in one window.

    • Pinned tabs: Locking most-used tabs in place.

    • Tear-off tabs: Moving tabs to new windows.

    • Thumbnail previews: Small previews of open tabs.

    • Tab isolation: Preventing crashes from affecting other tabs.

    • SmartScreen filter: Protection against phishing and malware.

    • Privacy browsing: Options like Incognito or InPrivate Browsing.

    • Extensions: Small programs to add features like ad blockers or password managers.

    • Session Restore: Recovering web pages after a crash.

    • Multiple profiles: For different users on the same device.

  • Browsers have unique features, e.g., Edge’s collection tool and Safari’s Handoff for device syncing.

  • A URL (Uniform Resource Locator) is the web address used to access a website, consisting of:

    • Protocol (e.g., HTTP or HTTPS)

    • Domain name (e.g., www.example.com)

    • Path or subdirectory (e.g., /section/technology)

  • HTTP is the most common protocol for transferring files between servers and browsers, but other protocols like FTP also exist.

  • Domain names identify the host of a website, and the suffix after the dot (e.g., .com, .edu) indicates the type of organization.

  • Country-specific domains have two-letter codes like .za (South Africa) or .de (Germany).

  • Additional text in the URL after the domain name directs to specific files or sections within a website.

  • The web is navigated through hyperlinks, often represented in blue and underlined, that link to other pages or sites.

  • Hovering over a hyperlink changes the cursor to a hand with a pointing finger.

  • Browsers provide Back and Forward buttons for navigation through pages.

  • Breadcrumb trails show users the path to the current page and can be clicked to return to earlier pages.

  • Bookmarks (or Favorites) allow users to save websites for easy access later, with folders available for organization.

  • History lists show previously visited sites, organized by date and device, for easy retrieval.

  • Social bookmarking saves and shares website links with others on sites like Pocket, Reddit, and Pinterest.

  • Tags in social bookmarking help categorize content for easier search and sharing.

  • Social bookmarking sites like Reddit allow users to vote on popular links, while Pinterest focuses on image sharing.

  • The web is navigated through hyperlinks, often represented in blue and underlined, that link to other pages or sites.

  • Hovering over a hyperlink changes the cursor to a hand with a pointing finger.

  • Browsers provide Back and Forward buttons for navigation through pages.

  • Breadcrumb trails show users the path to the current page and can be clicked to return to earlier pages.

  • Bookmarks (or Favorites) allow users to save websites for easy access later, with folders available for organization.

  • History lists show previously visited sites, organized by date and device, for easy retrieval.

  • Social bookmarking saves and shares website links with others on sites like Pocket, Reddit, and Pinterest.

  • Tags in social bookmarking help categorize content for easier search and sharing.

  • Social bookmarking sites like Reddit allow users to vote on popular links, while Pinterest focuses on image sharing.

  • Before using a website for research, assess its authority by checking the author's credentials or the site's reputation.

  • Consider potential bias in the website’s content; sites aiming to sell products or persuade may present a biased perspective.

  • Ensure the information is current; older sources may be appropriate for historical research, but up-to-date information is crucial for evolving topics.

  • Check if the site's content, tone, and style match your audience's needs (e.g., avoid sites meant for teens if writing for adults).

  • Verify the links on the site are functional and appropriate for your research; cross-check information with multiple reputable sources.

  • Fact-check articles using sites like Factcheck.org, Snopes, and PolitiFact. Use Google’s reverse image search to verify images.

  • Wikipedia isn’t a reliable source due to its public-editing nature, which allows potential errors before they’re corrected. Other wikis like Citizendium have stricter controls to enhance reliability.

  • Structured data refers to data that can be categorized and defined (e.g., number, text, date), often stored in databases, and is easily entered, queried, and analyzed.

  • The web is not currently designed to manipulate structured data on web pages directly, and search engines can recognize keywords but not specific details like appointment times.

  • The Linking Open Data project aims to convert and link existing data into a usable format, ensuring consistent metadata across the web, starting with Wikipedia data.

  • The semantic web (Web 3.0) is an evolving extension of the web where data is defined to be more easily processed by computers, combining text, pictures, and metadata.

  • Linked data and digital assistants could help refine searches and make appointments by processing and coordinating data like schedules and preferences.

  • The semantic web is still developing, with challenges in converting existing data into metadata, but progress is being made with technologies like Siri and Google Assistant.

  • Deepfakes are digital videos or images manipulated using AI to create realistic but false representations of people, often to spread misinformation or defame public figures.

  • Deepfake technology can be used to alter videos of public figures to influence opinions or spread false endorsements, posing a threat to trust in media.

  • Major tech companies and the Department of Defense are working on detecting and preventing deepfakes, but technology is improving faster than detection methods.

  • Initially, deepfakes could be identified by odd blinking or discoloration, but now they are harder to detect, requiring careful consideration of the video's context and source.

  • The "In Event of Moon Disaster" project by MIT demonstrates a highly convincing deepfake created from Nixon's unused speech text.

  • Ethical debate around deepfakes includes whether they are a form of artistic expression or dangerous misinformation. Some argue they violate freedoms, while others stress the risks of deception.

  • Misinformation, including fake content, has caused violent events, raising the question of who is responsible for monitoring and removing fake content.

  • Section 230 of the Communications Decency Act currently protects platforms from liability for user-generated content, which some argue should change to ensure more responsibility for platform providers.

  • Ethical concerns arise around whether platforms should be held accountable for harmful or illegal content, such as misinformation or support for criminal activities.

  • You can post whatever you want online, but impulsive or harmful behavior can reflect poorly on you and affect your reputation.

  • Humor at others' expense shows immaturity and can escalate into hate speech, impacting future job prospects.

  • Organizations value diversity and seek employees with positive, respectful behavior, so consider the consequences of your online actions.

  • Ignorance of the law is no defense; you must comply with internet laws, including respecting copyrights and intellectual property.

  • Engaging in illegal activities like downloading pirated software or distributing exam solutions can lead to legal consequences and portray you as unprofessional.

  • Your online conduct represents your values; employers seek individuals who share their values.

  • A good rule: Sleep on it—if you're still convinced it's worth posting and can have a positive impact, then share it.

  • Implanted microchips

    • People willingly give up privacy through devices and apps, but implanting a data chip in the human body causes significant concern.

    • Human-implantable microchips, approved by the FDA in 2004, can transmit and receive information and are difficult to counterfeit.

    • Benefits include eliminating fraud in transactions, providing instant access to medical records, tracking lost individuals, and monitoring parolees.

    • Concerns include potential privacy infringement and misuse of data, such as unauthorized access to medical information or constant tracking.

    • Public resistance is strong, with some states enacting laws to prevent mandatory implants, despite no current proposals for such requirements.

    • The debate continues as technology evolves, raising questions about whether the public will accept implants in the future.

  • Cyber harassment refers to online behaviors intended to frighten, embarrass, or seek revenge on individuals.

  • Includes cyberbullying, cyberstalking, trolling, and catfishing.

  • Cyberbullying typically involves children and adolescents and includes harassing messages, spreading rumors, and posting embarrassing content.

  • Cyberstalking involves similar behaviors, but with adults as victims.

  • Effects can be devastating, with high-profile cases of suicide linked to cyberbullying, such as Hannah Smith and Tyler Clementi.

  • Trolling is posting inflammatory remarks online to provoke reactions, with no personal connection to the target.

  • Catfishing is creating fake profiles to deceive others into romantic relationships, like the Manti Te’o case.

  • No federal law against cyberbullying, but 49 states have criminal sanctions for electronic harassment or cyberbullying.

  • Anti-cyberbullying laws generally place responsibility on schools or workplaces to detect and address bullying.

The Internet and How It Works

Objective 3.1 Describe how the Internet got its start.

  • The Internet is the largest computer network in the world, connecting millions of computers.

  • Government and military officials developed the early Internet as a reliable way to communicate in the event of war. Eventually, scientists and educators used the Internet to exchange research.

  • Today, we use the Internet and the web (which is a part of the Internet) to shop, research, communicate, and entertain ourselves.

Objective 3.2 Explain how data travels on the Internet.

  • A computer (or other device) connected to the Internet acts as either a client (a computer that asks for information) or a server (a computer that receives the request and returns the information to the client).

  • Data travels between clients and servers along a system of communication lines or pathways. The largest and fastest of these pathways form the Internet backbone.

  • To ensure that data is sent to the correct computer along the pathways, IP addresses (unique ID numbers) are assigned to all computers connected to the Internet.

Collaborating and Communicating on the Web

Objective 3.3 Evaluate the tools and technologies used to communicate and collaborate with large groups of people on the web.

  • Collaboration on the web uses social me

Key Terms

  • aggregator

  • blog (weblog)

  • bookmarks

  • Boolean operators

  • breadcrumb trail

  • business-to-business (B2B)

  • business-to-consumer (B2C)

  • catfishing

  • client

  • client/server network

  • cloud computing

  • consumer-to-consumer (C2C)

  • cyber harassment

  • deepfake

  • desktop client

  • domain name

  • e-commerce (electronic commerce)

  • e-mail

  • Favorites

  • File Transfer Protocol (FTP)

  • host

  • hyperlink

  • Hypertext Transfer Protocol (HTTP)

  • instant messaging (IM)

  • Internet

  • Internet backbone

  • Internet Protocol (IP) address

  • keyword

  • linked data

  • metasearch engine

  • microblog


Search engines

Some search engines search the entire web. Metasearch engines search other search engines and generate results that are common to all or that have a high priority. 

Specialty search engines differ as to which sites they search. Specialty search engines exist for almost every industry or interest. For example, Andy could use the search engines provided by the Food and Nutrition Information Center of the National Agricultural Library for his research.

Search

Another way to refine a search is to use an exact phrase. To search for an exact phrase, place quotation marks around your keywords. The search engine will look for only those websites that contain the words in that exact order

For example, if Andy wants to search for articles only on weight loss and sodium retention, he could put those phrases in quotation marks.

Search

To search just a specific website, you can use the search keyword, then site: followed by the website’s URL. 

For example, searching with weight loss site: health.com returns results about weight loss from the Health website.

Google Search Tools

One way to refine your searches is by using the specialized search tools Google offers. By selecting Search tools in Google’s menu at the top of a Google search, you can restrict search results by time, location, and even reading level.

Google Search Tools

Google Scholar (https://scholar.google.com) searches scholarly literature such as peer-reviewed papers, theses, and publications from academic organizations.

Evaluating Websites

When you’re using the Internet, you shouldn’t assume that everything is accurate and appropriate to use. Before you use an Internet resource, consider the following: 

  1. Authority: Who is the author or the sponsor? If the author is well known or the site is published by a reputable news source (such as the New York Times), then you can feel more confident using it as a source than if you are unable to locate information about the author or the site’s sponsor. 

  2. Bias: Is the site biased? The purpose of many websites is to sell products or services or to persuade rather than inform. Look for sites that offer several sets of facts or consider opinions from several sources.

  3. Relevance: Is the information in the site current? Material can last a long time on the web. Some research projects (such as historical accounts) depend on older records. However, if you’re writing about cutting-edge technologies, you need to look for the most recent sources. Therefore, look for a date on information to make sure it is current. 

  4. Audience: For what audience is the site intended? Ensure that the content, tone, and style of the site match your needs. You probably wouldn’t want to use information from a site geared toward teens if you’re writing for adults, nor would you use a site that has a casual style and tone for serious research. 

  5. Links: Are the links available and appropriate? Check out the links provided on the site to determine whether they are still working and appropriate for your needs. Don’t assume that the links provided are the only additional sources of information. Investigate other sites on your topic as well. You should also be able to find the same information on at least three websites to help verify the information is accurate.

Metasearch engines search other search engines rather than individual websites and specialty search engines search sites only related to the particular topic or industry. Search tools such as Google Scholar can also help to narrow down results.

Before you use an Internet resource, consider the author of the site, whether the source is biased, whether the information is current, the intended audience, and the links it provides.

Cheat Sheet

A. Search Strategies

You can refine your searches for better, more relevant results by using some useful search strategies.

  • Search for a phrase: Place quotation marks around a search phrase. The search engine will only return websites that contain the words in the search phrase in that exact order.

  • Search within a specific website: To search within a specific website, use keywords, then site: followed by the website’s URL.

  • Use a wild card: The asterisk is an example of a wild card that acts like a placeholder. This is helpful when you need to search with unknown terms. 

B. Metasearch Engines, Specialty Search Engines, and Search Engine Tools 

When you conduct a web search, you may receive a list of hits that includes thousands—even millions—of web pages that have no relevance to the topic you’re trying to search. Some ways to refine your searches are to use a metasearch engine, a specialty search engine, or the specialized search products Google offers.

  • Metasearch engines: Search other search engines rather than websites. 

  • Specialty search engines: Search only sites that are relevant to the particular subject.

  • Google’s specialty search tools: By selecting on Search tools in Google’s menu at the top of a Google search, you can restrict search results by time, location, and even reading level. Google Scholar searches scholarly literature such as peer-reviewed papers, theses, and publications from academic organizations. Google’s Custom Search lets you create a customized search engine to search only a selected set of sites tailored to your needs. 

C. Evaluating Websites 

Always consider whether the site’s author or sponsor is reputable and whether the information is current. You should also consider whether the information presented is biased and who the intended audience is. Also check if the links are available and appropriate.

keywords: 

  • Specific words a user wishes to query (or look for) in an Internet search. 

  • The set of specific words that have predefined meanings for a particular programming language.

metasearch engine: A search engine that searches other search engines rather than individual websites.

search engine: A set of programs that searches the web for specific words (or keywords) you wish to query (or look for) and then returns a list of websites on which those keywords are found.

specialty search engine: A search engine that searches only sites that are relevant to the particular subject.

Visual indications of secured website

When shopping online, look for the following visual indications that the website is secure:

  • Check that the beginning of the URL changes from “http://” to “https://”—with the s standing for secure socket layer.

  • Look for a small icon of a closed padlock in the toolbar and a green-colored address bar, indications that the site may be secure.

However, note that even if a site has these indicators, it still might not be safe. Consider the validity of the site before making a purchase.

Visual indications of secured website

You can also look for third-party verification such as that from TrustArc or the Better Business Bureau. If the website displays the Better Business Bureau seal or a seal from another reputable web security company, the information you submit to the site is most likely protected.

However, if you’re in doubt about a site, make sure the other security indications are also in place because illegitimate sites can also use security symbols illegally.

Guidelines for safe online shopping

In addition, follow these guidelines to ensure that your online shopping experience is a safe one: 

  • Shop at well-known, reputable sites. If you aren’t familiar with a site, investigate it with the Better Business Bureau (bbb.org).

  • When you place an order, check the return policy, save a copy of the order, and make sure you receive a confirmation number.

  • Make sure the company has a phone number and street address in addition to a website.

  • Always pay by credit card, not debit card. The U.S. federal consumer credit card protection laws protect credit card purchases, but debit card users do not have the same level of protection.

Above all, let common sense prevail. Online deals that seem too good to be true are generally just that.

E-commerce Terms

E-commerce, or electronic commerce, is the process of conducting business online such as through advertising and selling products. There are different types of e-commerce businesses:

  • Consumer-to-consumer (C2C): Consumers selling to each other through online auction and exchange sites, such as eBay or Craigslist.

  • Business-to-consumer (B2C): Exchanges that take place between businesses and consumers—such as the purchases that consumers make at online stores. Businesses that have both a traditional store and an online presence, such as Barnes and Nobles, are called click-and-brick businesses.

  • Business-to-business (B2B): Businesses that buy and sell goods and services to other businesses—such as a paper company that distributes paper to other companies.

Social commerce

Social commerce is a subset of e-commerce that uses social networks to assist in marketing and purchasing products.

For example, if you’re on Facebook, you’ve no doubt noticed the many businesses that have Facebook pages asking you to “Like” them. These businesses are taking advantage of social commerce marketing.

When shopping online, look for visual indications—such as a closed padlock and http changing to https—that your transactions may be secure. Following other common sense guidelines and not shopping on public computers is also wise.

E-commerce, or electronic commerce, is the process of conducting business online, such as through advertising and selling products. The world of e-commerce includes business-to-business (B2B), consumer-to-consumer (C2C), and business-to-consumers (B2C) transactions. Social commerce is a subset of e-commerce that uses social networks to assist in marketing and purchasing products.

A. Secure Online Shopping

When shopping online, look for the following indications that your transactions may be secure:

  • The beginning of the URL changes from http:// to https://.

  • The site displays a seal from a reputable third-party web security company.

  • A small icon of a closed padlock appears on the toolbar.

  • In addition to these methods, use your common sense and shop at well-known, reputable sites. If you aren’t familiar with a site, investigate it with the Better Business Bureau (bbb.org) or at bizrate.com. Check the return policy, print a copy of all online orders, make sure you receive a confirmation number, check that the company has a phone number and street address, avoid making online transactions when using public computers, and pay by credit card and not debit card. 

B. E-commerce 

E-commerce, or electronic commerce, is the process of conducting business online, such as through advertising and selling products. 

  • C2C refers to transactions that take place between consumers themselves, such as on eBay and Craigslist.

  • B2C refers to transactions that take place between businesses and consumers, such as purchases made at online stores.

  • B2B is an e-commerce term that refers to transactions that take place between businesses and other businesses.

  • Social commerce is a subset of e-commerce that uses social networks to assist in marketing and purchasing products.

Business-to-Business (B2B): A portion of e-commerce that consists of businesses buying and selling goods and services to other businesses. 

Business-to-Consumer (B2C): A portion of e-commerce where exchanges take place between businesses and consumers—such as the purchases that consumers make at online stores.

Consumer-to-Consumer (C2C): A portion of e-commerce that consists of consumers selling to each other through online auction and exchanges sites.

E-commerce (or electronic commerce): Process of conducting business online, such as through advertising and selling products.

Social commerce: A subset of e-commerce that uses social networks to assist in marketing and purchasing products.

Types of Search Engines

  • Keyword search engines

    • Google or Bing

    • Not sorted—return list of websites

  • Metasearch engines

    • Dogpile or info.com

    • Use a search engine to search other search engines

Metasearch Engines

  • Search other search engines

  • Quickly combine and compare results from multiple search engines

  • Can make searching the web more efficient

  • To explore Dogpile, go to dogpile.com

Different Types of Search Engines

Using Effective Search Terms

  • Some search terms result in very large numbers of results 

  • Using multiple word searches can help narrow your results

  • To explore Bing, go to bing.com

Metasearch Engines

  • Use quotation marks and other punctuation

  • Try synonyms (~)

  • Find specific file types

    • Info:

    • Define:

    • Numrange

Advanced Search Strategies

  • Search options and tools

  • Advanced search form

Weblinks

Objective 1: Differentiate between keyword search engines and metasearch engines.

 

  • Keyword search engines use key terms to search the web. Search engines use different algorithms, so search results can vary. 

  • Metasearch engines search other search engines and provide combined results.

Objective 2: List types of search engines that can be used as alternatives to traditional keyword or metasearch engines.

 

  • Alternative search engines are used for specific search purposes such as finding jobs, multimedia, or blogs.

Objective 3: Describe various methods that can be used to refine search results. 

 

  • Use multiple words to narrow search results.

  • Use quotation marks to search for exact phrase and use ~ to find synonyms.

  • Use info: or define: to find specific file types or results.

  • Use a Numrange to narrow numeric searches. 

  • Use Advanced search tools and forms.

robot