Lecture 3
Chapter 3: Using the Internet: Making the Most of the Web’s Resources
After reading this chapter, you should be able to answer the following questions:
- How can I communicate through the Internet with IM, Weblogs, podcasts, VoIP, Webcasts, wikis, e-mail, chat, newsgroups, and listservs? (pp. 94–101)
- What are the various kinds of multimedia files found on the Web, and what software do I need to use them? (pp. 101–104)
- What is e-commerce, and what e-commerce safeguards protect me when I’m online? (pp. 104–106)
- How do I manage online annoyances like spam, cookies, adware, spyware, malware, phishing, and Internet hoaxes? (pp. 106–111)
- What is a Web browser? (pp. 111–112)
- What is a URL, and what are its parts? (pp. 112–113)
- How can I use hyperlinks and other tools to get around the Web? (p. 113–115)
- How do I search the Internet using search engines and subject directories? (pp. 115–119)
- What are Boolean operators, and how do they help me search the Web more effectively? (pp. 120–121)
- How do I evaluate a Web site? (pp. 119, 122)
- How does data travel on the Internet? (p. 122)
- What are my options for connecting to the Internet? (p. 122–126)
- How do I choose an Internet service provider? (pp. 127)
- What is the origin of the Internet? (pp. 127–128)
- What will the Internet of the future look like? (pp. 128–129)
TIA: 7: Data Communications
After reading this chapter, you should be able to answer the following questions:
- What is a network, and what are the advantages of setting up one?
- What is the difference between a client/server network and a peer-to-peer network?
- What are the main components of every network?
- What are the most common home networks?
- What are wired Ethernet networks, and how are they created?
- What are wireless Ethernet networks, and how are they created?
- How are power-line networks created, and are they a viable alternative to Ethernet networks?
- How can hackers attack a network, and what harm can they cause?
- What is a firewall, and how does it keep my computer safe from hackers?
- Why are wireless networks more vulnerable than wired networks, and what special precautions are required to ensure my wireless network is secure?
- From which types of viruses do I need to protect my computer?
- What can I do to protect my computer from viruses?
Discussion Questions
Chapter 3
- The Internet was initially created in part to enable scientists and educators to share information quickly and efficiently. The advantages the Internet brings to our lives are evident, but does Internet access also cause problems?
- What advantages and disadvantages does the Internet bring to your life?
- What positive and negative effects has the Internet had on our society as a whole?
- Some people argue that conducting searches on the Internet provides answers but does not inspire thoughtful research. What do you think?
- Should use of the Internet be banned, or at least limited, for research projects in schools? Why or why not?
- Downloading free music, movies, and other electronic media from the Internet, although illegal, sitll occurs by using sites such as Limewire and Bit Torrents.
- What's your opinion on having the ability to download free music files of your choice? Do you think the musicians who oppose online music sharing make valid points?
- Discuss the differences you see between sharing music files online and sharing CDs with your friends.
- The current price to buy a song online is about $1. Is this a fair price? If not, what price would you consider to be fair?
- Google is the largest and most popular search engine on the Internet today. Because of its size and popularity, some people claim that Google has enormous power to influence a Web user's search experience solely by its Web site ranking processes. What do you think about this potential power? How could it be used in negative or harmful ways?
- Some Web sites pay search engines to list them near the top of the results pages. These sponsors therefore get priority placement. What do you think of this policy?
- What effect (if any) do you think that Google has on Web site development? For example, do you think Web site developers intentionally include frequently searched words in their pages so that they will appear in more hits lists?
- When you "google" someone, you type their name in the Google search box to see what comes up. What privacy concerns do you think such "googling" could present? Have you ever "googled" yourself or your friends?
- Should there be a charge placed on sending e-mail or on having IM conversations? What would be an appropriate charge? If a charge was placed on e-mail and IM conversations, what would happen to their use?
- What role has and will the Internet play in political campaigns? Do you see the day when voting will happen through the Internet? Why or why not?
Chapter 7
- You have just finished purchasing and installing a new wireless network in your home. A new wireless standard of networking will be launched next month that is 10 times as fast as the wireless network you installed.
- What types of applications would you need to be using heavily to make it worth upgrading to the new standard?
- Suppose your neighbor upgraded to the new standard and he does not have his network secured. Is tapping into your neighbor's wireless connection ethical? Is it illegal where you live?
- Hackers and virus authors cause millions of dollars worth of damage to PCs and networks annually. But hacking is a very controversial subject. Many hackers believe they are actually working for the "good of the people" or "exercising their freedom" when they engage in hacking activities. However, in most jurisdictions in the United States, hacking is punishable by stiff fines and jail terms.
- Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. Do you agree with this? Why or why not?
- What should the punishment be for convicted hackers and why?
- Who should be held accountable at a corporation whose network security is breached by a hacker?
- Do you have a firewall, anti-spyware, and antivirus software installed on the computer you use most often? If not, why not? What types of problems can you experience from not having this software installed? Have you ever been a victim of a hacker or a virus?