• No results found

Chapter2

N/A
N/A
Protected

Academic year: 2021

Share "Chapter2"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 2

The Internet, The Web, and

Electronic Commerce

2-2

Competencies

(1 of 2)

• Discuss the origins of the Internet and the Web • Describe how to access the Web using providers

and browsers

• Discuss Internet communications, including e-mail, instant messaging, and social networking

Page 28

2-3

Competencies

(2 of 2)

• Describe search tools, including search engines and metasearch engines

• Discuss electronic commerce, including B2C, C2C, B2B, and security

• Describe Web utilities: Web-based applications, FTP, plug-ins, and filters

Page 28

2-4

Introduction

• The Internet is often referred to as the Information Superhighway because it connects millions of people across the globe.

• Unlike a typical highway, the Internet moves idea and information.

• The Web provides an easy-to-use, intuitive interface to connect to the Internet and is used by millions of people every day.

Page 29

2-5

The Internet and the Web

• Large network that connects smaller

networks globally

• The Internet was Launched in 1969

– National computer network – US funded project called ARPANET

• World Wide Web or WWW was introduced

in 1992 at CERN

Page 30

2-6

Common Internet Uses

• Communicating

– Exchange e-mail – Discussion Groups

• Online shopping

• Searching

– Virtual Libraries

• Entertainment

• Education or e-learning

Page 30

(2)

2-7

Internet Access Providers

• Common way to access the Internet

• Commercial Internet Service Providers (ISP) – National Service Providers

– Regional Service Provider – Wireless service

providers

Page 31

2-8

Browsers

• Programs that provide access to Web

resources

• Allow you to surf the Internet

• Three well-known browsers

– Mozilla Firefox

– Netscape Communications – Microsoft Internet Explorer

• Address or location of the resource must be

specified

– URL

Page 31

2-9

URLs

• Uniform Resource Locators – All URLs have at least two parts

• Protocol • Domain name • Locates Web sites

Page 32

2-10

More on Browsers

• Browsers interpret HTML commands – Hypertext Markup Language

– Contained in a document

• Display document as a Web page

Page 33

2-11

Communication

• Most popular Internet activity

• Types of communication

– Electronic Mail (E-Mail) • E-Mail Address • Spam – Instant Messaging – Social Networking Page 33 2-12

E-Mail

• Transmission of electronic messages over the Internet • Basic parts – Header • Address • Subject • Attachment – Message – Signature Line Page 34 Return

(3)

2-13

E-Mail Address Example

Page 34

Return

2-14

Spam

Page 35

• Junk and/or unwanted Email

• Computer viruses or destructive programs are often attached to unsolicited email

– CAN-SPAM Act

• Spam blockers incorporate a myriad of approached to identify and control spam

• Spam blockers are also referred to as: – Junk mail filters

– Anti-spam programs

Return

2-15

Instant Messaging

Page 35

• Is an extension of email that provides direct, live communication between two or more people • Instant messaging programs also include:

– Video conferencing features – File sharing

– Remote assistance

• Most widely used instant messaging services: – AOL’s Instant Messenger

– Microsoft’s MSN Messenger – Yahoo Messenger

Return 2-16

Social Networking

Page 36

• One of the fastest growing uses of the Internet • Three basic categories:

– Reunite – Friend of a friend – Common interest 2-17

Search Tools

• Search engines

• Metasearch engines

• Specialized search engines

• Tips

– Start with the right approach – Be as precise as possible – Use multiple words – Use Boolean operators – Check your spelling – Keep moving

Page 37

2-18

Search Engines

• Specialized programs to assist in locating information • Types of searches – Keyword search – Directory search Page 40 Return

(4)

2-19

Metasearch Engines

Page 41

Return

www.webmetasearch.com

Web Meta Search

www.search.com Search www.metacrawler.com MetaCrawler www.ixquick.com Ixquick www.dogpile.com Dogpile Site Metasearch 2-20

Specialized Search Engines

Page 42 www.medsite.com Medicine www.lawcrawler.com Law www.historynet.com History www.infomat.com Fashion www.eco-web.com Environment

Site

Specialized Service

Return 2-21

Content Evaluation

• Not all information on the web is accurate • Ways to evaluate accuracy of Web information

include: – Authority – Accuracy – Objectivity – Currency Page 42 2-22

Electronic Commerce

• Also known as e-commerce

• Buying and selling of goods over the Internet

– Business-to-consumer (B2C) – Consumer-to-consumer (C2C) • Web auctions – Business-to-business (B2B) Page 42 2-23

Business to Business

• Involves the sale of a product or service from one business to another (B2B)

• Primarily a manufacturer supplier relationship

Page 43

2-24

Business to Consumer

• Fastest growing type of e-commerce • Three most widely used B2C applications:

– Online banking – Financial trading – Shopping

Page 43

(5)

2-25

Consumer to Consumer

Web Auctions

• Consumer-to-consumer e-commerce (C2C) • Similar to traditional auctions

• Types

– Auction house sites – Person-to-person

auction sites

Page 44

2-26

Security

• Payment methods must be fast, reliable, and secure

• Three basic options – Checks – Credit card – Digital cash Page 44 2-27

Web Utilities

• Specialized utility programs that make using

the internet & web safer and easier

– Web-based applications

– FTP – Plug-Ins – Filters

– Internet Security Suites

Page 46 2-28

Plug-Ins

www.adobe.com Shockwave www.service.real.com Real Player www.apple.com QuickTime www.microsoft.com Media Player www.adobe.com Acrobat Reader Page 48 Return 2-29

Filters

Page 47 Return www.safeeyes.com Safe Eyes Platinum

www.netnanny.com Net Nanny www.softforyou.com IProtectYou Pro Web Filter www.cybersitter.com Cybersitter www.cyberpartrol.com CyberPatrol 2-30

Internet Security Suites

• Collection of utility programs designed to maintain your security and privacy while on the web

– McAfee – Norton

(6)

2-31

Careers In IT - Webmasters

• Develop & maintain websites

• Back-up of the company website, updating

resources, and development of new

resources

• Work with the marketing department to

increase the site traffic flow

Page 49

2-32

A Look to the Future

Homes of Tomorrow

• “Smart” appliances in homes will have their

own Web page

• Refrigerators will be able to manage their

inventory and automatically order to

re-supply

• Internet cameras, wireless technologies, &

high-speed internet will allow you to virtually

monitor your home while on travel

• Downsides?

Page 50

2-33

• Discuss the uses of the Internet. Which

activities have you participated in? Which

one do you think is the most popular?

• Explain the differences between the three

types of providers.

• What are the basic elements of an e-mail

message?

Page 57

Discussion Questions

(Page 1 of 2)

2-34

• What is social networking? Describe the

three types of social networking sites.

• Describe the different types of search

engines. Give an example of the type of

search each engine is best for.

Page 57

References

Related documents

Most social network services are web based and provides means for users to interact over the internet, such as e-mail and instant messaging. •Features offered by these sites, such

Hosted Unified Communications Unified Unified Communications Communications Instant Instant Messaging Messaging Presence Presence Click to Dial Click to Dial Telephony Telephony

Systems engineering and data fusion principles were used to demonstrate an autonomous data-rich infrastructure maintenance scheduling system that integrates railways asset

Convergence, included with the Oracle Communications Messaging Exchange Server, provides access to e-mail, calendar, instant messaging, and address book functionality from a

The homologous and heterologous antibody response to monovalent vaccines containing swine, PR8, FM1, or Cuppett viruses show that the antibody-forming mechanisms

The medie val practice of cutting out the boring bits in translation (Amos 1920 :5), al - though again being a violation ofthe quality principle , might be a combination of politenes

Currently we are rolling out 970 iPads to district programs to support a curriculum called Unique Learning, an online classroom curriculum by N2Y that is aligned to Common Core

Patio table features a imaginarium sound and light railroad train sets, play toys contained and include customizable trains were not, this wooden dollhouses, stretches and