Individual Search Engines: An individual search engine compiles its own searchable database on the web. You search for information by typing one or more keywords, and the search engine then displays a list of web pages, or hits, that contain these keywords, ordered from the most likely to least likely to contain the information you want.
Hits are defined as sites that a search engine returns after running a keyword search. Examples of this kind of search engine are: Ask, Bing, and Yahoo!. Subject Directories: A subject directory is created and maintained by human editors, not electronic spiders. A subject directory allows the user to search by selecting lists of categories or topics.
Examples of subject directories are Beaucoup! Subject directories are best for browsing and for searches of a more general nature. Metasearch Engines: A metasearch engine allows users to search using several search engines simultaneously. Specialized Search Engines: Users can also use specialized search engines, which help locate specialized subject matter such as material about movies, health, and jobs.
What do these terms mean: glurge gallery, inboxer rebellion, wooden spoons, rumors of war? To find out, go to: www. To save time, you should have a strategy when doing a search. Some tips are as follows: 1. In the text, the Practical Action box on page 77 gives some guidelines for online research. The Chicago Manual of Style, 16th edition, also provides information on this topic.
Most web searches involve text, but there other kinds of resources as well. Still Images: Some search indexes deal with images. Examples: Yahoo! Scholarly: Search engines such as Google Scholar search scholarly abstracts, books, white papers, and so on.
Users sometimes have so much stuff or unorganized stuff on their hard disks that they lose track of it. Desktop search engines help them find things. Desktop search allows users to quickly and easily find words and concepts stored on the hard-disk drive, using technology similar to that in web search engines.
Free desktop search tools can be downloaded from one of the principal search engine services, often as part of a toolbar. A toolbar is a bar across the top of the display window on your computer screen, offering frequently executed options or commands.
Unlike bookmarks or favorites, these tags can be easily shared with other people, which allows people to share similar interests and ideas. Tags are available through social-bookmarking sites such as delicious. The email software interacts with an email server at your Internet access provider to send and receive email. Your incoming mail is stored on the server in an electronic mailbox. One advantage of standard email programs is that you can easily integrate your email with other applications, such as calendar, task list, and contact list.
The main advantage of webbased email is that you can easily send and receive messages while traveling anywhere in the world. Examples of webmail carriers are Yahoo! Note that webmail is not generally as secure as proprietary email programs through paid ISPs. All such addresses follow the same approach: username domain. Example: Joe. Black earthlink.
Located after the symbol, it tells the location of the address earthlink. This three-letter extension to the domain name indicates the type of domain e. Some email addresses also include a two-letter country designation e. Web Exercise: Detailed Tutorial on How Email Works Ask students to browse the following website for a detailed tutorial on how email works:. Type Addresses Carefully: no typos.
Addresses must be typed exactly, including capitalization and all underscores and periods. The address book allows you to organize addresses into various groups, such as your friends, relatives, club members, so you can easily send all members of a group the same message with a single command. Deal with Each Email Only Once: When a message comes in, delete it, respond to it, or file it away in a folder. Keep emails simple. They will take too long to send and for others to download receive.
Sorting Your Email Email programs usually offer filters for automatically organizing email according to the name of the sender or the mailing list. Examples of email folders are shown on the right side of PowerPoint slide slide Attachments [PowerPoint here]. An email attachment is a copy of a file or a document that you send attached an email to one or more people. Viruses are covered in Chapter 6. Remind students that email is company property.
Employees should send only email that is acceptable to the work environment. With instant messaging IM , users on a given email system can send a message and have it pop up instantly in real-time on the screen of anyone else logged onto that system. Messages appear on the display screen in a small window, a rectangular area containing a document or activity, so that users can exchange messages almost instantaneously while operating other programs.
IM users have virtually no privacy. Email and instant messaging are often used in a similar manner, but email is not realtime. Like email attachments, IM systems generally allow for file transfers.
Also like email, some systems let you send messages even if the recipient is not currently online. When they log off, you are also notified. Each system has its own method for blocking incoming and outgoing messages. Messenger are the major services. Have a person online during the class period, preferably someone from another state or country, and demonstrate instant messaging by sending messages to the person. If there are several computers in the classroom, have the students instant message one another.
File Transfer Protocol FTP is a software standard that allows file transfer between computers, including those with different operating systems such as Microsoft Windows and Linux. Proprietary FTP Sites.
Other FTP sites require registration and passwords. Attachments can be used to transfer other types of tiles, but FTP can be used for large files. For a list of FTP clients, go to www. A newsgroup or forum is a giant electronic bulletin board on which users conduct written discussions about a specific subject. Additional Information: More about Newsgroups For detailed information on newsgroups, go to www.
Listservs: Email-Based Discussion Groups A listserve is an automatic mailing-list server that sends email to subscribers who regularly participate in discussion topics. Additional Information: The Term Listserv Is Trademarked The word Listserv has come to be used loosely as a generic term for any mailing list application.
However, it is a registered trademark licensed to L-Soft International, Inc. For this reason, it is not legal to use the term commercially, except in reference to this product. See www. Some specific rules of netiquette: [PowerPoint here]. Flaming is a form of public humiliation inflicted on people who have failed to read FAQs or otherwise not observe netiquette. Something that can smoothe communication online is the use of emoticons, keyboard-produced pictorial representations of expressions.
You should avoid using all-capital letters, except for occasional emphasis. Instead, edit the original text down to the relevant paragraphs, then add your response. Additional Information: More about Internet Telephony Internet telephony servers link telephone lines to the Internet. See: www. Many websites employ complicated multimedia effects, using a combination of text, images, sound, video, and animation. A plug-in is a computer program that adds a specific feature to a browser, allowing it to play or view certain files.
To view a high-quality video, you may need to download RealPlayer. Quicktime is a media player for the Apple Macintosh. Additional Information: More about Plug-Ins Plug-ins are slightly different from extensions, which modify or add to existing functionality.
For more on plug-ins, go to: www. NET: How to website developers get all those nifty special multimedia effects? Often web pages contain links to applets, small programs that can be quickly downloaded and run by most browsers.
Applets are written in Java, a complex programming language that enables programmers to create animated and interactive web pages. Java applets enhance web pages by playing music, displaying graphics and animation, and providing interactive games.
Microsoft offers Visual Studio. NET to compete with Java. All kinds of text documents and graphic images are available on the web. Most web pages combine both text and images.
One interesting innovation is aerial maps, such as Google Earth, a satellite imaging program that allows you to zoom in for a close-up of your house, for example. It is used in videogames, as well as in moving banners displaying sports scores or stock prices. More usually, however, a file is displayed as streaming video and viewed while it is still being downloaded. Streaming video is the process of transferring data in a continuous flow so that you can begin viewing a file even before the end of the file is sent.
Examples are music services, such as eMusic and iTunes Music Store. An example is RealAudio. Now the web will come to you. Three technologies are webcasting, blogging, and podcasting. Push technology is software that automatically downloads information to personal computers. This is opposed to pull technology, in which you go out and search on the Internet.
Thus, information is targeted very specifically. Blogs are being written on all kinds of subject areas. Some people have turned blogs into successful businesses, but most are usually abandoned. Additional Information: More about Blogs The XML-based format for publishing headlines of the latest updates posted to a blog or website for use by other websites and direct retrieval by end users is called a syndication format.
For a master list of syndication feeds, visit www. A syndication format enables websites that share a common interest to expand their content by publishing news headlines from other websites and blogs.
In fact, a large news site can be entirely made up of syndication feeds. By subscribing to several feeds, users can quickly review the latest news on those sites from a consolidated index rather than browsing from site to site.
Viewer plug-ins for Web browsers are available. In addition, there are websites that search for and aggregate feeds that are displayed entirely in the browser. Subscribing to a site such as BlogLines www. A source for finding feeds is www. What are people saying about this topic? Ask students to research online short reports on the reliability and significance of blogs.
Ask them to give pros and cons. Among areas covered by e-commerce are B2B commerce, online finance, auctions, and job hunting. There are generally two types: —Person-to-person auctions: These types, such as eBay, connect buyers and sellers for a listing fee and a commission on sold items. Some are specialized, such as Priceline, which offers airline tickets and hotel bookings.
Web 2. The common theme of all these is human interaction. More on Web 3. A social-networking website is an online community that allows members to keep track of their friends and share photos, videos, music, stories, and ideas with other registered members.
Note: Chapter 9 covers the drawbacks of social networking sites. Messages are limited to characters or less, owing to length restrictions on text messaging. Examples are the services Twitter and Tumblr. Tumblr lets you express yourself using multiple media. Key Question: How can I protect myself against the various kinds of Internet dangers: snoopers, spam, spoofing, phishing, pharming, cookies, and spyware—adware, browser and search hijackers, and key loggers?
Email is not private. When sending email, you need to pretend every electronic message is a postcard that can be read by anyone. Spam is unsolicited email, or electronic junk mail, in the form of advertising or chain letters. Additional Information: Origin of the Term Spam. The sketch goes as follows Mr. Bun: Morning. Waitress: Morning. Bun: Well, what you got? There are several kinds of pretenses that involve the use of phony email and websites that students should be alert for.
They go under the names spoofing, phishing, and pharming. Spoofing is one of the main tactics used by spammers to trick email recipients into opening and perhaps responding to their solicitations. Additional Information: More about Email Authentication For a detailed discussion of email authentication, go to: www. Users are automatically redirected to the bogus site, at least for some period of time until the DNS records can be restored.
The bogus site could just collect usernames and passwords, or it could, using some pretense, request financial information. Unlike phishing schemes that use email to make people go to the phony site, pharming is more natural. Users are going to the site on their own and are certainly not suspicious because the pages look familiar.
Cookies: Convenience or Hindrance? The text files could be your log-in name, password, and browser preferences. The websites retrieve the data when you visit them again. Also, you might not have to type in all your info every time you visit the site.
Additional Information: More about Cookies. First-party cookies are ones that are created by the website you are visiting. Third-party cookies are created by a website other than the one you are currently visiting; for example, by a third-party advertiser on that site. The purpose of such cookies is usually to track your surfing habits, which is why third-party cookies are considered an invasion of privacy and riskier than first-party cookies.
Users can prevent all cookies from being stored in their computers, but that severely limits the web surfing experience.
Proprietary software programs such as Norton Internet Security and Webroot also allow users to individualize cookie settings. What happens if you refuse cookies? Spyware is deceptive software that is surreptitiously installed on your computer via the web.
Adware can be developed by legitimate companies but also by criminals purveyors of pornography, gambling overseas.
The Practical Action box on page of the txt gives some tips for avoiding spyware. Additional Information: More about Spyware Spyware can come bundled with an otherwise apparently useful program. The makers of such packages usually make them available for download free of charge, so as to encourage wide uptake of the spyware component. For a very good coverage of plagiarism and the Internet— and plagiarism in general— see Craft and Voice, 2nd edition, McGraw-Hill , Chapter 5. Also: www. ISP Internet service provider 5.
Short-Answer Questions 1. To log on means to make a connection to a remote computer. Users must be familiar with log-on procedures to go online. Bandwidth refers to how much data—text, voice, video, and so on—can be sent through a communications channel in a given amount of time. Different communications systems use different bandwidths for different purposes. The wider the bandwidth, the faster data can be transmitted. Whereas with email you can connect only with specific addresses you know about, with the Web you have hypertext, a system in which documents scattered across many Internet sites are directly linked, so that a word or phrase in one document becomes a connection to a document in a different place.
Information Technology For Management 8th. View Housing and Interior Design, 10th Edition's products, description, College Success Information Technology.
Information Technology Project Management, 5th Edition. The eighth edition continues to Below we explore various careers and some of the ways in which project management knowledge Information Technology For Management. Which of the following data management technologies store data that are Operational intelligence refers to Upload a Thing! Customize a Thing. Download All Files. Select a Collection.
Save to Collection.
0コメント