Lecture 3

Chapter 3: Using the Internet: Making the Most of the Web’s Resources

 

After reading this chapter, you should be able to answer the following questions:

TIA: 7: Data Communications

 

After reading this chapter, you should be able to answer the following questions:

Discussion Questions

Chapter 3
  1. The Internet was initially created in part to enable scientists and educators to share information quickly and efficiently. The advantages the Internet brings to our lives are evident, but does Internet access also cause problems?
    1. What advantages and disadvantages does the Internet bring to your life?
    2. What positive and negative effects has the Internet had on our society as a whole?
    3. Some people argue that conducting searches on the Internet provides answers but does not inspire thoughtful research. What do you think?
    4. Should use of the Internet be banned, or at least limited, for research projects in schools? Why or why not?
  2. Downloading free music, movies, and other electronic media from the Internet, although illegal, sitll occurs by using sites such as Limewire and Bit Torrents.
    1. What's your opinion on having the ability to download free music files of your choice? Do you think the musicians who oppose online music sharing make valid points?
    2. Discuss the differences you see between sharing music files online and sharing CDs with your friends.
    3. The current price to buy a song online is about $1. Is this a fair price? If not, what price would you consider to be fair?
  3. Google is the largest and most popular search engine on the Internet today. Because of its size and popularity, some people claim that Google has enormous power to influence a Web user's search experience solely by its Web site ranking processes. What do you think about this potential power? How could it be used in negative or harmful ways?
    1. Some Web sites pay search engines to list them near the top of the results pages. These sponsors therefore get priority placement. What do you think of this policy?
    2. What effect (if any) do you think that Google has on Web site development? For example, do you think Web site developers intentionally include frequently searched words in their pages so that they will appear in more hits lists?
    3. When you "google" someone, you type their name in the Google search box to see what comes up. What privacy concerns do you think such "googling" could present? Have you ever "googled" yourself or your friends?
  4. Should there be a charge placed on sending e-mail or on having IM conversations? What would be an appropriate charge? If a charge was placed on e-mail and IM conversations, what would happen to their use?
  5. What role has and will the Internet play in political campaigns? Do you see the day when voting will happen through the Internet? Why or why not?
Chapter 7
  1. You have just finished purchasing and installing a new wireless network in your home. A new wireless standard of networking will be launched next month that is 10 times as fast as the wireless network you installed.
    1. What types of applications would you need to be using heavily to make it worth upgrading to the new standard?
    2. Suppose your neighbor upgraded to the new standard and he does not have his network secured. Is tapping into your neighbor's wireless connection ethical? Is it illegal where you live?
  2. Hackers and virus authors cause millions of dollars worth of damage to PCs and networks annually. But hacking is a very controversial subject. Many hackers believe they are actually working for the "good of the people" or "exercising their freedom" when they engage in hacking activities. However, in most jurisdictions in the United States, hacking is punishable by stiff fines and jail terms.
    1. Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. Do you agree with this? Why or why not?
    2. What should the punishment be for convicted hackers and why?
    3. Who should be held accountable at a corporation whose network security is breached by a hacker?
  3. Do you have a firewall, anti-spyware, and antivirus software installed on the computer you use most often? If not, why not? What types of problems can you experience from not having this software installed? Have you ever been a victim of a hacker or a virus?