Glencoe Digital Communication Tools
Using the Internet Using the Internet
Chapter Contents
Lesson 3.1 Browse the Internet (pg. 60)
Lesson 3.2 Customize Your Browser and Search Online (pg. 63)
Lesson 3.3 Security and Viruses (pg. 70)
Lesson 3.4 Copyright, Fair Use, and Plagiarism (pg. 73)
Lesson 3.5 Computer Crimes (pg. 75)
Chapter Assessment
33pg. 58-82
Copyright © by The McGraw-Hill Companies, Inc. All rights reserved.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet
You Will Learn To 33
Explore the Internet by using a browser and hyperlinks
Save Web sites as Favorites
Recognize a Web site by its Web address
Apply advanced search techniques
Choose a home page for your browser
Print Web pages
Describe anti-virus software
Describe security for the Internet
Explain the importance of copyright, fair use, and avoiding plagiarism
Describe computer crimes and fraud
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 60-623.1 Browse the Internet
BrowsersYou need a special software program called a browser to visit Web sites.
HyperlinksClicking hyperlinks allows you to navigate from page to page on the Internet.
browser An application that reads the contents of Web pages and displays them on your computer screen.
hyperlink Any text or graphic on a Web page that will take you to a new location when clicked.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 60-623.1 Browse the Internet
The uniform resource locator (URL) identifies a Web page. The parts of a URL include: Hypertext transfer protocol, or http
www, which stands for World Wide Web
The domain name
The domain extension, which identifies the category of a Web site
uniform resource locator (URL) A unique Web address that directs a browser to a Web page.
domain name The part of a URL that usually identifies the owner or the subject of a Web site.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 60-623.1 Browse the Internet
Following are examples and descriptions of some common domain extensions:
Creating folders in Favorites is similar to the steps used for creating folders in My Computer. Folders are created to help you organize data and make it easier to find information.
Extension Description of Site Example
.com Originally intended for commercial or for-profit businesses; now anyone can use .com
www.glencoe.com
.edu Educational institution www.ucla.edu
.gov U.S. government organization www.senate.gov
.mil U.S. military organization www.usmc.mil
.org Professional or nonprofit organization
www.fbla-pbl.org
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 60-623.1 Browse the Internet
What can you tell about a Web site by looking at the URL?
digicom.glencoe.com Lesson 3.1, Rubric
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 63-683.2 Customize Your Browser and Search Online
Home PagesYou can customize your browser to open your favorite Web site as your home page each time you access the Internet.
Search EnginesSearch engines help you find specific information on the Internet; some examples include: Google at www.google.com
AltaVista at www.altavista.com
Ask Jeeves at www.ask.com
search engine A Web site that finds Web pages that contain words you tell it to search for.
Microsoft Office has an online search feature built into the Help menu of all their programs. You can quickly access Help resources online when you choose this option.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 63-683.2 Customize Your Browser and Search Online
Boolean SearchNarrow your search field with Boolean operators such as: AND
OR
NOT
Boolean operator A word that can make an Internet search more specific and effective.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 63-683.2 Customize Your Browser and Search Online
What is an advantage to setting a home page in your browser?
digicom.glencoe.com Lesson 3.2, Rubric
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 70-713.3 Security and Viruses
Internet SecuritySecurity on the Internet is important to the following: Schools
Businesses
Home users
FirewallsHome and work computers can be protected against unauthorized access by installing a firewall.
Anti-Virus SoftwareUse regularly updated anti-virus software to: Alert you if an e-mail or file you are trying to open
contains a virus
Clean an infected file
Quarantine or get rid of a virus
virus A small computer program that can copy itself repeatedly into a computer system and cause a variety of problems.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 70-713.3 Security and Viruses
Why is it important to have anti-virus software on all business and personal computer systems?
digicom.glencoe.com Lesson 3.3, Rubric
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 7221st CENTURY CONNECTION
Cyberbullies
Hurtful MessagesCyberbullies can be found in almost any communication medium, including: Cell phones
Instant message programs
Chat rooms
Web sites allowing users to post photos and comments
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 7221st CENTURY CONNECTION
Cyberbullies
What Should You Do?It is best to ignore mild harassment. If the harassment becomes severe or you receive threatening messages, inform an authority figure such as your: Teacher
Coach
Counselor
Parent
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 7221st CENTURY CONNECTION
Cyberbullies
Giving the Wrong MessageIn order to avoid becoming a cyberbully yourself, take some of the following precautions: Think before sending messages
Take a break from the computer and do something relaxing before re-reading messages you have written while angry or upset
Remember that messages may not be private and may be sent to the wrong person
Consider how your family or friends would respond to your message
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 7221st CENTURY CONNECTION
Cyberbullies
Technology LifelineToday’s technology affects all areas of life, leading to increased exposure to all types of harassment and the need to know how to protect yourself from it.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 7221st CENTURY CONNECTION
Question 1
If you have ever been a victim of a cyberbully, describe how you handled the situation or how you should have responded.
Possible answers include: Ignore or delete mildly harassing messages
Block harassing e-mails or instant messenger buddies
Show severely harassing messages to an authority figure
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 7221st CENTURY CONNECTION
Question 2
If you have ever unintentionally become a cyberbully, describe how you might have been able to prevent the misunderstanding.
Possible answers include: Avoiding potentially heated topics of discussion
Thinking before responding angrily to others
Setting aside the cell phone or computer until your thoughts clear
Treating others as though you were talking to them in person
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 73-743.4 Copyright, Fair Use, and Plagiarism
Computer EthicsYour sense of ethics determines how you use the information available online.
CopyrightThe law requires you to ask permission before using any copyrighted work that you find online. Possible copyrighted materials include: Songs
Novels
Plays
Software programs
Inventions
copyright A type of legal protection for works that are created or owned by a person or company.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 73-743.4 Copyright, Fair Use, and Plagiarism
Fair UseBorrowing from a copyrighted work is not always illegal. Fair use applies when the material is used for purposes of: Criticism—quoting briefly from a novel in a book review
News reporting—using excerpts or quotes from copyrighted material in an article or news broadcast
Education—a teacher copying part of a book to hand out to students
Research—using copyrighted material in a school report or presentation
fair use Describes when you may use a copyrighted work without permission.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 73-743.4 Copyright, Fair Use, and Plagiarism
PlagiarismYou must always acknowledge the author’s work when using someone else’s material; teachers can now use software to scan student papers for plagiarism.
plagiarism Using other people’s ideas and words without acknowledging that the information came from them.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 73-743.4 Copyright, Fair Use, and Plagiarism
Give reasons why you think authors and composers are careful to copyright their work.
digicom.glencoe.com Lesson 3.4, Rubric
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 75-773.5 Computer Crimes
CybercrimeCriminal activity on the Internet includes: Fraud Embezzlement Unauthorized use of computers Creating and releasing viruses Harassment Stalking
InvestigationThe FBI’s special computer crimes branch, the National Computer Crime Squad (NCCS), has the power to investigate: Computer crimes Suspects in other countries
All software programs have a copyright license that states how many computers you can install the software on. If you install the software on more computers than allowed, you could be fined by the software developer.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 75-773.5 Computer Crimes
Computers can also help to solve crimes through Web sites such as the National Center for Missing and Exploited Children’s www.missingkids.com, which uses the Web to track down: Runaway children
Kidnapping victims
Protecting Your ComputerTaking precautions to secure your computer against unauthorized access will help prevent criminal activity from affecting you.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 75-773.5 Computer Crimes
Why do you think some people choose the Internet as a place to commit crimes?
digicom.glencoe.com Lesson 3.5, Rubric
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 7821st CENTURY CONNECTION
Treasure Hunting with Technology
About the Global Positioning SystemA Global Positioning System, or GPS, device uses satellite signals to calculate its exact position on the planet. The GPS also: Uses 24 satellites, launched between 1978 and 1994
Receives its signals from satellites at an altitude of 12,600 miles above the Earth’s surface
Costs $400 million per year to maintain
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 7821st CENTURY CONNECTION
Treasure Hunting with Technology
A New SportSome people use handheld GPS devices to embark on a new sport known as geocaching, a type of treasure hunt which involves: Using the Internet to find the latitudes and longitudes of
hidden caches
Entering the location of a cache into a GPS device
Reaching the coordinates of the site and finding the treasure itself
Signing the logbook and replacing the treasure with a new find for the next treasure hunter
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
pg. 7821st CENTURY CONNECTION
Question
What are some advantages of GPS devices?
Possible answers include: The introduction of new sports
The decreased chance of getting lost while hiking or exploring
Allows emergency response teams to more quickly find someone using a GPS device
Can locate stationary objects such as motor vehicles which contain a GPS tracking device; this can help if a car is stolen or needs roadside assistance
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
Chapter AssessmentChapter Assessment
Question 1
Do you have a favorite search engine that you use? What are the advantages of this search engine? (Lesson 3.2)
Answer:Some popular search engines include Google at www.google.com, AltaVista at www.altavista.com, and Ask Jeeves at www.ask.com. You can research online to find reviews of your favorite search engine and to compare the different search engines using keywords such as compare search engines. Each will have its strengths. For example, one advantage of using Google is that it currently has the largest database of Web pages.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
Chapter AssessmentChapter Assessment
Question 2
What is plagiarism? When you write a report, what can you do to avoid plagiarizing others’ work? (Lesson 3.4)
Answer:Plagiarism is using other people’s ideas and words without acknowledging that the information came from them. In other words, it is taking credit for work that is not yours. To avoid plagiarizing when writing a report, always give credit when you use another person’s words or ideas. If you are doing research, take only brief notes from your source and then write your report from those notes. Always use your own words to explain the point you are trying to make.
Glencoe Digital Communication Tools
Using the InternetUsing the Internet33
Chapter AssessmentChapter Assessment
Question 3
As an off-site salesperson, what steps could you take to ensure the security of your computer? Also, what precautions might you need to take to safely share important project information with coworkers over the Internet?
Answers may include:Installing a firewall to protect against unauthorized access to your computer and installing anti-virus software to protect against viruses from e-mail or the Internet. Using password protection would be an important precaution to keep your project files from being accessed or changed by unauthorized people as you share them with others.
Glencoe Digital Communication Tools
Impact of Digital Communication ToolsImpact of Digital Communication Tools
Unit Resources
For more resources on this unit, go to the Online Learning Center at http://www.digicom.glencoe.com.
11