Module 2 Icld
Module 2 Icld
Many LAN networks connected→ wider networks (WAN) connected to even bigger networks
(backbones),
which are high speed lines.
1
fi
fi
HYPERLINK (LINK): hypertext link→ reference from a unit to another on a digital support. It is
characterised
by graphic signals (underlines). The link gets activated by a mouseclick, then gets visualized.
WORLD WIDE WEB (WWW): the whole of all the hypertextual and multimedial pages that you can surf
through speci c applications. Allows sharing.
UNIFORM RESOURCE LOCATOR (URL): sequence of characters that univocally identi es the
address of a resource on the internet. You nd it on a hot server.
WEB SITES: hosted on servers, when they have an IP address (internet protocol, a sequence of four
numbers between 0 and 225 separated by a dot) you can reach them by the internet. The IP address
identi es univocally any device connected to the internet.
DOMAIN NAME SYSTEM (DNS): service which associates an URL to any IP
WEBSITE ADDRESS:
made up by two parts: FIRST LEVEL DOMAIN (the website's kind of domain) + SECOND LEVEL
DOMAIN (company, institution or topic of the site).
→ Examples of rst level domains:
- it, fr, de, uk, es: state indicators
- com, biz: commercial organization
- gov: government institutions
- org: no pro t organization
- info: information companies
BROWSER: application able to browse the hypertext pages on the web. Examples: internet explorer,
mozilla refox, google chrome, apple safari.
The web gives informations and provides services, for example:
o e-commerce
o home banking
o e- government
o distance learning
ONLINE PROTECTION TOOLS:
When you visit a secure site, you usually must login, by identifying yourself with a user name and
a password. This procedure, called authentication, is essential for the security of computer
systems.
The term encryption refers to a process that transforms a message or a le into a sequence of
symbols that are incomprehensible to those who do not possess the "key" to decipher the
message. The code is known only by sender and recipient, in order to prevent messages or les
being read by unauthorized people. Make communication more secure
HTTPS PROTOCOLS: safe version of the http protocol→ before transmitting data to one device to
another, it crypts them so that only the receiving website can read them.
When purchasing online, you must be sure that the website is safe; you can do that by reading
other clients’ feedbacks, and if there are none you must do a screening.
When you are done with a website you must log o .
The image of a closed padlock in the address bar con rms the presence of a secure server and
protected connection. By clicking on the lock, you can display additional information
DIGITAL CERTIFICATE: document that proves that the sender of an e-mail or a website owner
really is who he claims to be. It is used together with the https protocol. When speaking of
economic transactions, for example, it is compulsory.
You can view the digital certi cate by clicking on https (website address bar)→security→view
certi cate.
The access to contents online may not be full→ minors cannot see certain websites (parental
control: techniques that lter webpages contents); Operating systems have speci c software
(Parental Controls in Windows 7) that allow parents to apply some restrictions and to have a
report to see which sites have been visited. There are also dedicated browsers that can be
installed, providing a friendly interface and a set of allowed sites. Finally, ISP provides some
protection systems to protect children from risks and dangers of the Internet.
All these tools allow parents to restrict access to:
• sites at risk (Web browsing restrictions - blacklist or case by case),
• hours when the computer may be used (Time restrictions),
• the use of some applications (programs or games restrictions).
• It is also possible to set a limit to downloading data, in order to receive
2
fi
fi
fi
fi
fi
fi
fi
fi
fi
ff
fi
fi
fi
fi
fi
inside companies or institutions, if the network tra c is excessive it could make the whole system
slower.
WEB NAVIGATION
To view a web page: access to a browser→ type the wanted webpage's address in the multitask bar.
To edit the home page (starting page of the browser): three dots icon in the top right corner→settings
menu→ under appearance select change
ADVANCED SETTINGS: three dots icon in the top right corner→ settings menu→ show advanced
settings→privacy→ content settings:
cookie (website settings, managing exceptions): le where navigating preferences are stored
pop up (website settings, managing exceptions): windows that show up when opening websites, ads
Window on the left, settings: browser informations→ “get assistance” button→ online assistance
layout: to choose the settings to show in the multifunction bar
privacy: delete browsing history, downloads, cookies, pictures and cache les, permissions, data
CACHE: folder which temporarily stores les connected to the navigation. This allows for a faster
navigation experience, but saturates the device's memory.
BOOKMARKS, FAVOURITES: bookmarks manager. On Google Chrome: three dot bar, bookmark and
click bookmark this page / multifunction task bar: “add to favourites button” (star)
three dot icon on the top right corner: favourites→ favourites settings
To delete a bookmark select bookmarks manager
folders menu→ new folder
new folder→manage
TO DOWNLOAD FILES AND TEXTS ON THE DEVICE: transfer it from network to local pc to save it in
the unit my computer
FILE: save→ download/ right click→ save as
PICTURES AND TEXTS: copy and paste/ save (in a folder or on desktop)
PRINT= click on the print using system dialog, selection to print only the selected part
SEARCH ENGINES (for example Google, Bing or Yahoo): allow you to reach websites without knowing
their address.
The search engine can receive informations either in a passive way (by simply receiving data from
websites developers) or actively (softwares called spiders: search for new pages to add to the
database).
The algorithm that selects the informations, also organizes the sites. Each search engine has its own
algorithm.
TOOLS BUTTON: language, date.
CANCEL BUTTON: takes every research lter off
TO RESEARCH A QUOTE: write it under quotation marks
Advanced search= click on settings and then on advanced search
CRITICAL EVALUATION
Since on the internet it is possible to write whatever comes to your mind, it is also easy to manipulate
informations, so anything must be read with a critical mind.
Factors which allow for so many informations to be on the internet:
informations (newspapers)
entertainment
propaganda
commerce: companies websites, ad websites
TO VERIFY INFORMATIONS:
checking the author's authority
checking the sources
confronting informations on different websites
contents must be up to date
COPYRIGHT: laws that guarantee an author's rights→ an author has exclusive faculty of spreading
what he did produce.
COPYLEFT (1984): free software.On the internet, it is easy to download les→ this doesn't mean it
always is licit. You always need to know the license. It is a right protected by the law. In Italy: law 633,
3
fi
fi
fi
ffi
fi
fi
1941: it's about intellectual products such as literature, music, gurative arts, architecture, theatre,
cinematography, photogaphy, software, database, technical drawing products.
The only way to be sure something is free is for it to be stated in the license. In order to be subjected to
copyright, it is not necessary for a piece to be registered or to show the © symbol.
ONLINE/VIRTUAL COMMUNITIES
groups of people interacting thanks to services provided by the internet (for example forums, chats,
games, social networks). Everyone can use his own identity or fake another.
- forum: board, message board, bulletin board, discussion groups→ informatic structure based on
webpages that allow for interactions. They need a database and are accessible via browser or
speci c apps.
- online games
- chats: to communicate in real time
- social networks
- videoconferences
TO SHARE CONTENTS ONLINE:
- blog (web+log: online diary) → text, pictures, videos
- microblog: short text messages→ twitter: 140 characters
- podcasts (pod+ broadcast: personal on demand broadcast) → thanks to a subscription (RSS feed),
and thanks to a program able to receive them (aggregator), authomatically downloads contents
available online.
- pictures: social networks such as ickr
- audio clips
- video clips (Youtube)
PRIVACY
in virtual communities you don't know the other user's real identity. You must:
set your privacy settings so that only contacts/friends can see your data
using private messaging
never share your position or personal data
block and report unknown users
INSTANT MESSAGING: sharing in real time short sentences, les and audio (IM system). Synchronic
exchange. It is different from forums, e-mails and private chats. IM systems are free
You need an account and a client program who is able to interact with the server.
SMS: short message service→ characteristics: cheap, you can read again messages even after a long
time, mobile phone based
Technological development of SMS is the MMS (multimedia message service)→ characteristics: les,
expensive, mobile phone based
VOIP: voice over internet protocol→ transmitting the voice through the internet= calling other
computers or phones through servers and internet connection instead of using telephone lines. With
the VOIP the phone call is converted in digital data and passes through data networks. Pros: cheaper.
To have a VolP communication, the sender and the recipient must have a PC or a smartphone with a
VolP application
NETIQUETTE: series of rules when communicating online:
short messages, in order to not waste time
accurately ling the object of a message, so it is easier to recognize its content
not sharing irrelevant details which could lead to the user's personal data
no inappropriate contents
checking the body of a message to avoid mistakes
check attachments not sending CC messages to more than one person, so to not reveal other users e-
mail addresses.
E-MAIL
Electronic mail. It allows you to communicate, and comparing to traditional mail it is faster, free, it
allows you to attach ne, you can check it by simply connecting to the internet from any browser.
E-mail address: username@address (domain name of the organization which provides the e-mail
service; a server is connected to the domain).
There are speci c applications to manage e-mails (Windows Live Mail, Outlook, Mozilla Thunderbird,
etc.) but it is also possible to use it by connecting to the Web. A Webmail service allows to access the
4
fi
fi
fi
fi
fl
fi
fi
fi
mailbox from any computer connected to the Internet in order to view received messages, send new
ones, or manage the mailbox
Attached les: they not always get to the receiver because of e type limitations (spam folder)/ size
limitations→ to bypass this problem there are web spaces such as jumbo and you send it.
Ways to specify the receiver:
to (only one receiver)
CC (no main receiver, the message is copied)
CCN/BBC (hidden copied/ blind carbon copy, the receiver gets the message without the others'
knowledge)
E-MAIL CONNECTED RISKS:
Spamming: unwanted ads; anti spam lters: may think legitimate messages are spam. Spam
messages must be immediately deleted, without opening or answer.
Malwares: can be hidden in attachments
The same companies that made the mail box try to lter the messages that you receive, blocking or
reporting possible spam messages.
In addition, there are several defense services, that allow to block messages coming from spammer
servers and to lter the messages by content.
There are also several software packages, that can be integrated with the e-mail client, which provide
services in the form of boxes called spam, junk mail or similar.
PHISHING: attempt to gain sensitive data from a user, faking a message from an institution with the
user’s credentials→ the user doesn't know it is a stranger.
How to recognize phishing:
no institution asks for data con rmation via email
often the language is not the same as the user's (or the translation is not good)
usually it contains a link identical to that of the institution, the server, however, has a different domain
name.
The phisher doesn't know who is sending messages to, so a part of them gets to actual clients of that
institution.
SENDING/ RECEIVING AN E-MAIL:
Settings button: online guide
settings menu→ signature settings, add signature text and at the bottom of the page click safe
changes
Settings menu-> out of of ce/ auto reply, select the option auto reply on. Sets an automatic response to
messages
settings menu→ to personalize labels
Settings menu-> forwarding, I can add a forwarding message
Tick sign on the message→ other: mark as unread/read/important
Settings button: settings→language, number of mail visualized on each page, show pictures, phone
number.
On Gmail you can not order messages for name or date, you can only create labels→ folders, you add
e-mails via drag&drop, you can change the color of the label or create underlabels)
Spam: doesn't open pictures.
GOOGLE CALENDAR:
create→new event. You can add invitations or be invited; you can choose whether you want to
participate or not→ by saying yes the event is shown normally, by saying no it disappears
5
fi
fi
fi
fi
fi
fi
fi