INTERNET
Internet:
The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite to serve billions of users worldwide interconnected. It is also where you can connect with people around the world.
http://searchwindevelopment.techtarget.com/definition/Internet
Modem:
A modem is a communications device that can be either internal or external to your computer. It allows one computer to connect another computer and transfer data over telephone lines.
http://en.wikipedia.org/wiki/Modem
Broadband:
Broadband refers to telecommunication in which a wide band of frequencies is available to transmit information.
http://www.dleg.state.mi.us/mpsc/comm/broadband/broadband/broadband.htm
Dial Up:
Dial-up refers to an Internet connection that is established using a modem.
http://searchnetworking.techtarget.com/definition/dial-up
Wireless:
In the computing world, the term "wireless" can be rather ambiguous, since it may refer to several different wireless technologies. The two most common types of wireless capabilities computers have are Wi-Fi and Bluetooth.
http://searchmobilecomputing.techtarget.com/definition/wireless
SMS:
SMS means Systems Management Sever, SMS enables a network administrator to create an inventory of all the hardware and software on the network and to store it in an SMS database.
http://www.internetslang.com/SMS.asp
MMS:
The MMS specification allows for the creation of messages sent from one mobile phone to another that can contain text, pictures, audio, and video that can be optionally organized into slides in a presentation.
http://www.pcmag.com/encyclopedia_term/0,2542,t=MMS&i=47123,00.asp
Cyberbullying:
Cyberbully is when a child is tormented, threatened, harassed, humiliated, embarrassed or targeted by another child using the Internet, mobile phone, or other type of digital technology.
http://en.wikipedia.org/wiki/Cyber-bullying
Masquerading:
In general, a masquerade is a disguise. In terms of communications security issues, a masquerade is a type of attack where the attacker pretends to be an authorized user of a system in order to gain access to it or to gain greater privileges than they are authorized for.
http://dictionary.reference.com/browse/masquerade
Spam:
Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.
http://en.wikipedia.org/wiki/Spam_(electronic)
Virus:
A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
http://dictionary.reference.com/browse/virus
E-Safety
e-safety is electronic saftey for children and it can be ossociated with websites such as facebook,bebo,twitter,msn and any outher social network make sure you know what your children/child is talking to online and it's not just on computers/laptops its on, its on mobile phones.
Read more: http://wiki.answers.com/Q/What_is_e-safety#ixzz1LtivJcwV
Spyware:
spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.
http://www.webopedia.com/TERM/S/spyware.html
Pop-Up:
Pop-Up Window A pop-up window is a type of window that opens without the user selecting "New Window" from a program's File menu.
http://www.thefreedictionary.com/pop+up
2)Social Networking
A)FACEBOOK
BEBO
TWITTER
MSN
TUMBLR
B)FACEBOOK- 23
BEBO- 2
TWITTER- 2
MSN- 14
TUMBLR- 2
C)
The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite to serve billions of users worldwide interconnected. It is also where you can connect with people around the world.
http://searchwindevelopment.techtarget.com/definition/Internet
Modem:
A modem is a communications device that can be either internal or external to your computer. It allows one computer to connect another computer and transfer data over telephone lines.
http://en.wikipedia.org/wiki/Modem
Broadband:
Broadband refers to telecommunication in which a wide band of frequencies is available to transmit information.
http://www.dleg.state.mi.us/mpsc/comm/broadband/broadband/broadband.htm
Dial Up:
Dial-up refers to an Internet connection that is established using a modem.
http://searchnetworking.techtarget.com/definition/dial-up
Wireless:
In the computing world, the term "wireless" can be rather ambiguous, since it may refer to several different wireless technologies. The two most common types of wireless capabilities computers have are Wi-Fi and Bluetooth.
http://searchmobilecomputing.techtarget.com/definition/wireless
SMS:
SMS means Systems Management Sever, SMS enables a network administrator to create an inventory of all the hardware and software on the network and to store it in an SMS database.
http://www.internetslang.com/SMS.asp
MMS:
The MMS specification allows for the creation of messages sent from one mobile phone to another that can contain text, pictures, audio, and video that can be optionally organized into slides in a presentation.
http://www.pcmag.com/encyclopedia_term/0,2542,t=MMS&i=47123,00.asp
Cyberbullying:
Cyberbully is when a child is tormented, threatened, harassed, humiliated, embarrassed or targeted by another child using the Internet, mobile phone, or other type of digital technology.
http://en.wikipedia.org/wiki/Cyber-bullying
Masquerading:
In general, a masquerade is a disguise. In terms of communications security issues, a masquerade is a type of attack where the attacker pretends to be an authorized user of a system in order to gain access to it or to gain greater privileges than they are authorized for.
http://dictionary.reference.com/browse/masquerade
Spam:
Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.
http://en.wikipedia.org/wiki/Spam_(electronic)
Virus:
A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
http://dictionary.reference.com/browse/virus
E-Safety
e-safety is electronic saftey for children and it can be ossociated with websites such as facebook,bebo,twitter,msn and any outher social network make sure you know what your children/child is talking to online and it's not just on computers/laptops its on, its on mobile phones.
Read more: http://wiki.answers.com/Q/What_is_e-safety#ixzz1LtivJcwV
Spyware:
spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.
http://www.webopedia.com/TERM/S/spyware.html
Pop-Up:
Pop-Up Window A pop-up window is a type of window that opens without the user selecting "New Window" from a program's File menu.
http://www.thefreedictionary.com/pop+up
2)Social Networking
A)FACEBOOK
BEBO
MSN
TUMBLR
B)FACEBOOK- 23
BEBO- 2
TWITTER- 2
MSN- 14
TUMBLR- 2
C)
Please Rob Me website reveals dangers of social networks | ||
A website called PleaseRobMe claims to reveal the location of empty homes based on what people post online. The Dutch developers told BBC News the site was designed to prove a point about the dangers of sharing precise location information on the internet. The site scrutinises players of online game Foursquare, which is based on a person's location in the real world. PleaseRobMe extracts information from players who have chosen to post their whereabouts automatically onto Twitter. "It started with me and a friend looking at our Twitter feeds and seeing more and more Foursquare posts," said Boy Van Amstel, one of PleaseRobMe's developers. "People were checking in at their house, or their girlfriend's or friend's house, and sharing the address - I don't think they were aware of how much they were sharing." Mr Van Amstel, Frank Groeneveld and Barry Borsboom realised that not only were people sharing detailed location information about themselves and their friends, they were also by default broadcasting when they were away from their own home. Simple search The website took just four hours to create. "It's basically a Twitter search - nothing new," said Mr Van Amstel. "Anyone who can do HTML and Javascript can do this. You could almost laugh at how easy it is." He said that the site would remain live but stressed it was not created to encourage crime. "The website is not a tool for burglary," he said. "The point we're getting at is that not long ago it was questionable to share your full name on the internet. We've gone past that point by 1,000 miles." Mr Van Amstel added that in practice it would be "very difficult" to use the information on the website to carry out a burglary. Charity Crimestoppers advises people to think carefully about the information they choose to share on the internet. "We urge users of Twitter, Facebook or other social networks to stop and think before posting personal details online that could leave them vulnerable to crimes including burglary and identity theft," said a spokesperson. "Details posted online are available for the world to see; you wouldn't hang a sign on your door saying you're out, so why would you post it online?"
D)
Answers:
4) Using the Internet to Search Effectively 1. List 5 different search engines you could use to search the internet 2. Put your full name into google: a) how many pages came up in the search? b) how many of the pages in the search ACTUALLY have anything to do with you? 4. Choose an animal, and do a google search : a) how many web pages does google find for you? b) look at all of the first 20 pages listed. For each one have a look at the web page, put the link into your answers, and say how good it was. c)For those websites listed above, say if you think they were a reliable source or not. 5. Wikipedia. a. What is wikipedia?b. Who launched the site, and when? c. Search for Glenfield College in Wikipedia. Find the sentance that relates to YOU in iTec.... I just added this into Wikipedia last week! Copy it into your page in your blog. d. Why do you think that information on Wikipedia may not be reliable? Answers: 4) 1. google.com wikipedia.com yahoo.com yahoo/answers.com wordweb.com 2. a. 12 pages b. none 4. a.10 pages | ||
