Escolar Documentos
Profissional Documentos
Cultura Documentos
The World Wide Web is just a small part of the Internet. The World
Wide Web is basically the text and pictures that you can view using
your browser such as Microsoft Internet Explorer.
7.1.1.3 Define and understand the terms: Internet Service Provider (ISP),
Uniform Resource Locator (URL), and hyperlink.
-
URL stands for Uniform Resource Locator (another name for web
address / website address) The URL consists of the name of the
protocol (usually HTTP); followed by the name of the website you want
to connect to.
TCTC
Page 1
site),
.edu
(educational
institution),
.gov
TCTC
Page 3
RSS (Really
Really Simple Syndication)
Syndication is a family of web feed formats
used to
o publish frequently updated workssuch
works
as blog entries, news
headlines, audio, and video.
RSS feeds can be read using software called an "RSS reader", "feed
reader", or "aggregator
aggregator", which can be web-based, desktop-based
based, or
mobile-device-based.
based.
The RSS reader checks the user's subscribed feeds regularly for new
work, downloads any updates that it finds, and provides a user
interface to monitor and read the feeds.
RSS formats are specified using XML,, a generic specification for the
creation of data formats. Although RSS formats
formats have evolved since
March 1999, the RSS icon ("
2005 and 2006.
Like the term broadcast, podcast can refer either to the content itself
or to the method by which the content is syndicated; the latter is also
called podcasting. A podcaster is the person who creates the content.
scripts
were
developed,
allowing
podcasts
to
be
TCTC
Page 5
Note that the URL automatically changes to add https at the front of the web
address, and you will also see the padlock. This means that this website is
safe to use.
Why https?
Hypertext Transfer Protocol Secure (HTTPS) is a combination of the
Hypertext Transfer Protocol and a cryptographic protocol (also referred to as
a security / encryption protocol). HTTPS connections are often used for
payment transactions on the World Wide Web and for sensitive transactions
in corporate information systems.
The problem, however, is that anyone can create a website and key pair using
a name that doesn't belong to them. This is where digital certificates come
in. Digital certificates are trusted ID cards in electronic form that bind a
website's public encryption key to their identity for purposes of public trust.
Digital certificates are issued by an independent, recognized and mutually
trusted third party that guarantees that the website operating is who it claims
to be. This third party is known as a Certification Authority (CA). Without
digital certificates, the public has little assurance as to the legitimacy of any
particular website.
A digital certificate contains an entity's name, address, serial number, public
key, expiration date and digital signature, among other information. When a
Web browser like Firefox or Internet Explorer makes a secure connection, the
anyway,
not
understanding
the
difference.
Digital certificates play an integral role in keeping online commerce
safe. If your browser alerts you to a problem with a digital certificate, you are
well-advised not to click through. Instead, call the business using a telephone
number from your statements or phone book, and inquire as to the problem.
Not all Certificate Authorities are equal. Some CAs are newer and less well
known. Two examples of highly trusted CAs are VeriSign and Thawte. If your
browser does not recognize a Certificate Authority, it will alert you.
7.1.2.4 Know about security threats from websites like: viruses, worms, Trojan
horses, spyware. Understand the term malware.
Over the last 10 years, our world has become interconnected in ways not
previously imaginable. Today, for instance, people in Spain, the US, and
Brazil can find out simultaneously that soccer-star David Beckham has
switched teams. Small companies can now affordably be spread across the
globe, and big companies can now have inter-office collaboration on a daily
basis. But all of that interconnectedness relies in large part on our ability to
protect the networks that create those connections.
Unfortunately, and despite the best efforts of network security managers, the
last five years have seen hackers and criminals become increasingly
effective at compromising these networks, as they have quickly developed
new and ever more malicious threats to network security.
Bullying / harassment
Fraud
Supervision
Click Tools.
Click Enable.
From the Ratings tab choose the level of rating you wish to set.
From the Approved Sites tab you can set which websites can be
allowed (regardless of their rating) and which websites you wish to
block.
To close the web browser you just have to click on the close
icon in the title bar.
Right click on the link that opens the webpage and click Open in New
Window.
Right click on the link that opens the webpage and click Open in New
Tab.
Click on Help.
Then, you can either choose a topic from the contents tab, or click on
the Index tab to type a keyword e.g. History
Help will automatically display any topics that have to do with the
keyword you type.
Click on the topic of your choice and hit the display icon.
7.2.2 Settings
7.2.2.1 Set the web browser Home Page/Start page.
What is a Home Page?
The Home Page is the website that appears every time you click on the
internet explorer icon. You can set the homepage to any website you wish. To
change the home page you have to:
Click on Tools.
If you wish to use the currently displayed page as your home page click
on Use current.
If you wish to use the default the website you had before click on Use
default.
If you wish that you will have a blank page click on Use blank.
If you wish to use another home page enter the full URL into the
address box.
2. When the "Delete Browsing History" dialog box appear, click "Delete
history".
3. Confirm your decision by clicking "OK" on the dialog box that follows.
4. Click "OK" to close the "Delete Browsing History" dialog box.
Clear part of the browsing history
You may wish to clear a single item from your browsing history. To do so:
1. Click on the star to the left of your browser.
2. Right click on the item you wish to remove from the history.
3. Then click Delete.
4. Click Yes to confirm deletion.
Such
pop-ups
may
be
pornographic,
games-related
and
unnecessary. Many pop-ups are dangerous to your computer; others are not
harmful at all.
What is a pop-up blocker?
Pop-up Blocker is a feature in Internet Explorer that lets you limit or block
most pop-ups. You can choose the level of blocking you prefer, from blocking
all pop-up windows to allowing the pop-ups that you want to see. When Popup Blocker is turned on, the Information bar displays a message saying "Popup blocked. To see this pop-up or additional options click here."
To allow pop-ups:
Click Tools, Pop-up Blocker, Turn On
Pop-up Blocker.
To block pop-ups:
Click Tools, Pop-up Blocker, Turn Off
Pop-up Blocker.
You can delete all cookies in the temporary internet files folder by
selecting Tools, Internet Options.
Then click the Delete Cookies button and finally click OK.
TCTC
Page 27
2. On the General tab, in the Browsing history section, click the Delete...
button. This will bring up the Delete Browsing History Box.
Select the Delete files... button to delete Temporary Internet Files
Select the Delete cookies... button to delete Cookies
Select the Delete history... button to delete your browsing history
After you select delete, a box will appear asking you to confirm you would like
to delete the files. Select Yes for each one.
7.2.3 Navigation
7.2.3.1 Activate a hyperlink.
Activate a hyperlink:
To activate a hyperlink simply click once on the link.
back
forward
7.2.4 Bookmarks
7.2.4.1 Bookmark a web page. Delete a bookmark.
Have you ever gone to a site and liked it so much you wanted to keep going
back? You can bookmark it, which means that you save it, so next time all
you have to do is choose it from a menu.
Add a bookmark:
Go to the website that you wish to set as a bookmark.
1. Click the Add to Favourites button
Favourites.
2. Give a name to your bookmark, and then click Add.
Delete a bookmark:
1. Click on the Star at the left hand side of your Internet Explorer browser.
2. Click on Favourites.
3. Right click on the bookmark that you wish to delete and click delete
from the menu that appears.
Normally you need to use the Tab key (not the Enter key) to move from one
field to the next field within the form.
7.3.1.2 Submit; reset a web-based form.
Many times, in a web-based form you will find the Submit and Reset buttons.
Use the Submit button when you are ready to submit your form
(transmit the form across the internet).
Use the Reset button if you wish to empty your form to start afresh.
7.3.2 Searching
7.3.2.1 Select a specific search engine.
A search engine searches the Internet for keywords.
To use any Search engine first enter its URL address
in the address bar of your browser and then hit the
Enter key.
7.3.2.2 Carry out a search for specific information using a keyword, phrase
Many people think that when you use a search engine such as Google, it will
magically search the entire Web and find information that you require. The
first thing to understand is that a search engine like Google will only search
through a list that it maintains of sites that have been registered with that
particular search engine. This accounts in part for widely differing results you
sometimes get when you search using different search engines. Also, each
Try to use unique words that directly relate to what you are searching
for.
Use the + logical operator if you want to narrow your search to retrieve
only websites containing ALL your keywords.
Using + and symbols to narrow your search
If you search using two words such as computer training, then often a
search engine will go off and find all the pages that it knows about
relating to computer, training and computer training. This could
include all types of training, not just computer training.
To get round this problem most search engines allow you to insert a +
symbol between your words, this means that you only want to find
pages containing all your words.
TCTC
Page 36
Exact phrase
By excluding words
By file format, etc
Type the word that you wish to search for, in the Find box. Then, hit the Enter
key on your keyboard.
www.encyclopedia.com
www.britannica.com
www.wikipedia.org
www.yourdictionary.com
www.alphadictionary.com
TIP:
To force a search engine to give you definitions from web based dictionaries,
type define: before your actual keyword.
Example:
Choose the location where you wish to save your web page, then click the
Save button.
Note:
You can save your web page in different formats by clicking on the arrow next
to Save as type: before hitting the Save button.
Open the document where you wish to paste your text. Right-click and
choose Paste.
Click Copy.
You can then paste your picture on a document, by clicking Edit, Paste
or right-click and Paste.
Click Copy.
Click on the arrow next to the printer icon in your web browser.
Click OK.
In the Paper section, below Size: click on the drop-down arrow and
choose the size of your output paper.
Click OK.
Click OK.
Click on the arrow next to the printer icon in your web browser.
Click Print.
You can use this dialog box to change several settings before giving
the actual print command.
You can also set the number of copies for a specific print page.
When you have made all the necessary changes click the Print button.
In
some
cases
you
may
use
an
address
such
as
Internet
originally
Protocol
designed
(IP)
for
was
data
Flexibility
You're able to take your VoIP adapters anywhere and use your number
anywhere there's an Internet connection. This includes travelling
overseas, staying in hotels and even camping. This is suitable for those
with active lifestyles and those whose jobs require much travel.
7.5.1.5 Understand the main benefits of instant messaging (IM) like: real-time
communication, knowing whether contacts are online, low cost, ability to
transfer files.
IM short for instant messaging is a type of real-time communication
service. It is somewhat like email, but much more like a chat room. Both
parties are online at the same time, and they "talk" to each other by typing text
and sending small pictures in instantaneous time.
TCTC
Page 49
Transmits
Once you get the hang of it, you can easily hold simultaneous IM sessions
with multiple people!
Ability
to transfer files.
Eliminates
companies rely on IM to stay in contact with each other. And with the
presence indicator, you can quickly and easily tell if a co-worker is at their
desk or computer.
Ability
OF
O N L I N E (V I R T U AL ) C O M M U N IT I E S
examples
of
Social
Networking
websites
are
2. Internet Forums
An Internet forum is a discussion area on a website. Website members can
post discussions and read and respond to posts
by other forum members. An Internet forum can
be focused on nearly any subject and a sense of
an online community, or virtual community,
tends to develop among forum members.
An Internet forum is also called a message board,
discussion group, bulletin board or web forum.
However, it differs from a blog, the name for a web log,
as a blog is usually written by one user and usually
only allows for the responses of others to the blog
material.
An
Internet
forum
usually
allows
all
usually
agree
to
called
netiquette, such as to
respect
other
members
approved
by
the
administrator or moderator
of the Internet forum, the
member usually chooses
his or her own user name
and password. Sometimes, a password is supplied. An avatar, or photograph
or picture, supplied by the member can appear under the member's user
name in each post.
The separate conversations in an Internet forum are called threads. Threads
are made up of member-written posts. Internet forum members can start new
topics, post in their choice of threads and edit their profile. A profile usually
lists optional information about each forum member such as the city they are
located in and their interests.
3. Chat Rooms
A chat room is a virtual place on the Internet where people from all walks of
life from around the world can get
together in one place and textually
chat with one another. The only two
things a person needs to connect to
a chat room are a computer and an
internet connection of any speed.
Chat room etiquette
Because Chat Rooms are place where so many different types of people
come together to communicate with one another, certain rules need to be in
If you are not sure about the authenticity of the attachment, ask the
sender what it contains and why they sent it. Many viruses send email
to all recipients in the victim's address book without them knowing
about it.
TCTC
Page 55
digital
signature
software then
n encrypts the
message digest. On the
other
end,
decryption
ion
an
"unhashed"
document.
The person who creates the digital signature uses a private data "key" to do
the hashing. His or her other "key,"
"
a public one, is known to the intended
recipient. When the sender transmits data using the digital signature, the
recipient enters the sender's public key and is able to decrypt the document.
Speed of delivery
Low cost
you
can
ensure
that
your
1. DON'T YELL!
Using caps online, is perceived as "yelling", as the caps indicate a
raised voice. Punctuation and proper capitalization might not always be
necessary, but avoid using all caps.
2. Snip your messages!
When replying to an email thread, clip or "snip" your messages. When
you reply to an email, your emailing client will usually by default quote
the entire body of the message you're replying to. It is generally
considered courteous to truncate or cut this message down to just the
part that you're specifically replying to.
7.5.3.3 Be aware of possible problems when sending file attachments like: file
size limits, file type restrictions (for example, executable files).
One might encounter problems when sending e-mail attachments. Such
problems include:
Click Start
All Programs
Microsoft Office
Microsoft Outlook 2007
Below is a screen shot of how the Microsoft Outlook 2007 Screen looks like.
By default, Outlook displays the Inbox using the Messages view. The
messages are listed one per line down the screen. Message flags, senders
email address and the date the message was received are displayed for each
message. The Preview pane occupies the lower half of the screen; this
displays the text of the selected message.
Outlook displays icons to the left of the message to indicate the message
status:
The message has not been read
The message has an attachment
The message has been read
The message has high importance
The message has been replied to
The message contains information about a meeting
The message is a delivery confirmation
The message contains information about a task
The message has been flagged
From: The name or email address of the person who sent the
message.
To print a message
Click the Print icon on the Message dialog box toolbar to print an email
To delete a message
Press the Delete key or click on the Delete icon, located on the
Standard toolbar.
Click on New
Mail Message
Enter your message into the message text area in the lower half of the
dialog box.
Type the email address of the person you wish to send the message to
into the To text box.
The Message dialog box will open and the text of the original
message appears in the message window. Type your reply
The Message dialog box will open and the text of the original message
appears in the message window. Type your reply above the text of the original
message and then click the Send icon on the Message dialog box toolbar.
7.6.2.2 Forward an e-mail.
Type the email address of the person(s) you wish to forward the
message to into the To text box.
You may enter any comments about the message above the original
message in the message text area of the Message dialog box.
Send the message by clicking the Send icon on the Message dialog
box toolbar.
7.6.2.3 Save a file attachment to a location on a drive and open the file.
Lets say you have received an important file via e-mail and you wish to save
in to your documents.
Click Save As
To reply to an e-mail message, first open the e-mail message by doubleclicking on it. Then click on the Reply button.
Note that by default Outlook will include text from the original message in your
replies. You can of course delete this text if you wish. However if you dont
want it to be included automatically in the first place you can select
1.
Tools
2.
3.
Preferences tab
4.
E-Mail Options
5.
To remove the flag repeat the same steps but choose Clear Flag
If you want to mark it again as read, repeat the same step choosing Mark as
Read.
Click View
Click Toolbars
Select one of the available help topics, or click on the Search Box to search
for a topic by entering a keyword.
Click on Search box under the Heading Inbox and write what you need
to find
OR
Click on Tools
Instant Search
Advanced Find
Note that a triangle appears near the Subject. When the triangle is pointing
upwards, it means that the e-mails are sorted by Subject in ascending order.
But if you wish to sort by descending order click again on the field heading.
The triangle will then be pointing downwards.
Inbox
Outbox
Sent Items
Deleted Items
Drafts
Junk Mail
The Create Folder window will appear. From here you can give a name to
your folder and you can also decide whether this folder should be an
independent folder, or a sub-folder of an existing folder, such as Inbox.
In the illustration below, a new folder called Computer Training has been
created as a sub-folder in TCTC
To delete a folder that you have created, right click on the folder and click on
Delete.
Once you delete an e-mail message it will move to the Deleted Items folder.
The below window will be displayed, from where you can choose the
destination for the e-mail in question.
Outlook will ask you whether you are sure that you wish to permanently delete
all items contained in the e-mail bin. Click Yes if you want to confirm the
operation.
Tools
Address Book
File
New Entry
New Contact
OK
Fill in the contact details as appropriate and click Save and Close.
Delete a contact
Click Delete
OR
Go to File
Click delete
You can set up Outlook so that when you reply to a message, the people you
reply to are automatically added to your Address Book. In addition, any time
you send or receive a message in Outlook, you can add the recipient's or
sender's name to your Address Book.
Click OK
In the Address Book list, double-click the group you want. The group's
Properties dialog box opens.
You can add people to the group in several ways and in some cases
you can add them to your Address Book as well.
To add a person from your Address Book list, click Select Members,
and then double click a name from the Address Book list and then click
OK.
To add a person directly to the group without adding the name to your
Address Book, Click on Add New type the person's name and e-mail
address in the boxes provided in the open window and then click OK
TCTC
Page 76
Click on To:
Double Click on the name of the person to whom you wish to send the
e-mail.
Click OK.
Web
HTML
HTTP
Website
Webpage
Web Browsers
URL
Hyperlink
ISP
Search Engine
Cookie
Cache
Protected Websites
Digital Certificates
Encryption
Viruses
Firewall
(www.ecdl.co.uk) but only test centres can look at the Test Centre
Forum part of the site. To enter this part you have to provide a user
name and password.
If goods are bought on the Internet the customer needs reassurance
that the company they are dealing with is legitimate. This is
provided by digital certificates (see also Credit Card Fraud below)
Encryption of files is putting them into code so that they can only be
read by those who know the code. This is always used to protect
credit card numbers etc.
To pay for goods we are often asked for credit card numbers. If you
are asked to provide such details over the Internet make sure that a
digital certificate is displayed on the screen. This reassures you that
the company is using a file encryption system. If you cant see a
digital certificate you are effectively making these details publicly
available.
Viruses are unsolicited programs that transfer themselves across
the Internet and install themselves on computers. They can
regenerate themselves and pass themselves on to other users.
Invitations to download free software should be treated with caution.
Downloading from a company with a digital certificate is reasonably
safe.
A piece of software (sometimes a combination of software and
E-mail
E-mail address
TCTC
Page 80