Unit 12

30
Unit 12 The Internet

description

Unit 12. The Internet. Introduction. Introduction. The Internet (commonly called the Net) is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. Internet Services. - PowerPoint PPT Presentation

Transcript of Unit 12

Unit 12

The Internet

1

Introduction

2

Introduction

The Internet (commonly called the Net) is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.

Internet ServicesInternet Services

Different services are made available on the Internet including:

1.Email (electronic mail): for sending and receiving messages.

2. Usenet (User Network) : accessing newsgroups.

Groups of users who send and read messages on a particular topic.

Internet ServicesInternet Services

3. IRC (Internet relay chat):Chatting to other users using text messages in

real-time (immediately, while users are logged on to the system)

4. FTP (file transfer protocol):Copying files between computers on a network.

• Downloading

• Uploading

Copying files from a server computer to a client computerCopying files from a client computer to a server computer

Internet ServicesInternet Services

5. Telnet (teletype network):Logging on to your local server across a

network communications system at a distance e.g. from another country.

Connecting to a network system account, normally using a

password

6. MOOs (Multi-user domain that is Object-oriented):

▫ MOOs are network accessible, multi-user, programmable , interactive systems well-suited to the construction of text-based adventure games, conferencing systems, and other collaborative software.

▫ Is a text-based online virtual reality system to which multiple users (players) are connected at the same time.

▫ Taking part in simulations in a shared environment. Each person assumes a persona and communicates using text messages.

7. WWW (the World Wide Web):

▫Commonly referred to as the Web.▫Contains interlinked documents called webpages.

▫ A website is a set of related webpages stored together on a server computer.

▫Browsing means moving from one webpage to another.

8. Social Networks:

▫ A social network service is an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities. E.g. Facebook, MySpace and Twitter,

▫ A social network service essentially consists of a representation of each user (often a profile), his/her social links, and a variety of additional services.

▫ Social network services make it possible to connect people who share interests and activities across political, economic, and geographic borders.

▫ Facebook launched in 2004, has since become the largest social networking site in the world.

▫ Twitter set the trend for "real time" services, where users can broadcast to the world what they are doing, or what is on their minds within a 140 character limit.

Computer-mediated communication (CMC)

• A term used to describe systems that allow users to communicate using a computer network.

Asynchronous

Synchronous

Participants are not on-line at the same time and there are delays between messages.

Participants are on-line at the same time. There may be a few seconds delay but the communication is closer to face-to-face interaction.

Computer-mediated Computer-mediated communication (CMC)communication (CMC)

•Examples of asynchronous communication:▫Mobile phone text messages.▫Emails.▫newsgroups/discussion lists.

•Examples of synchronous communication:• IRC▫MOOs.▫Audio and videoconferencing.

Computer-mediated Computer-mediated communication (CMC)communication (CMC)

•Videoconferencing:a form of communication over a network that uses video cameras so that the people taking part can see and hear each other.

Computer-mediated Computer-mediated communication (CMC)communication (CMC)

•With the exception of videoconferencing, there is no way to show facial expressions and emotions in text-based CMC systems.

•To compensate, users have developed a number of strategies including: ▫Abbreviations and acronyms. E.g. LOL▫Symbols and exclamation marks. E.g

Yeeeees!!▫Emoticons: symbols indicating emotions.

E.g. :

Computer-mediated Computer-mediated communication (CMC)communication (CMC)

• Most users connect to the internet using a modem.

• Modem (modulator-demodulator) is an electronic device that converts signals to enable a computer to be connected to an ordinary telephone line thru a server and a router owned by an ISP (Internet service provider).

• ISP is a company that offers its customers access to the Internet.

• ISPs employ a range of data transmission technologies to enable customers to connect to the internet, such as dial-up, DSL, cable modem, satellite Internet access, fiber to the home (FTTH).

• ISP also provide help and support services to its customers.

Internet Service Provider (ISP)Internet Service Provider (ISP)

To attract users to connect through their system, ISPs offer various options including:

1.Unlimited number of email addresses with filtering of email to remove Junk email (unwanted email normally advertising or trying to sell something).

2. Web-based mail allows users to access their email form any computer with Internet access.

3.POP3 email requires a special email program. It is faster and more efficient.

Internet Service Provider (ISP)Internet Service Provider (ISP)

4. Unlimited Web space for setting up your own website and viruses checking facilities for checking your computer files to detect programs written with the purpose of causing damage or causing a computer to behave in an unusual way.

Internet Service Provider (ISP)Internet Service Provider (ISP)

Web space file storage space for storing webpage files

Website a set of related pages stored on a server on the world wide web.

[1 ]Starter

•D•G•B•C•F•A•E

Reading ]2[EXTRACTABC

Type of CMCMOOsWeb chat (bulletin board)

newsgroup

No. of participants

4( excluding Tony)2 although you could argue 3 if pink panther is included

Message is addressed here to any group member

topicsVirtual reality game, navigation within the MOO

MoviesTop ten albums

Sync or Asyncsynchronousasynchronousasynchronous

Special featuresFalse identities, emoticons, characters can express themselves by groans, etc. as well as words, asterisks can be used for emphasis, informal punctuation

False identities, very informal, some use of abbreviations, e.g. lol, no opening or closing phrases

Extract from earlier message quoted and then comment or addition made, no opening or closing phrases although this one is signed, very informal

Language Work: Warnings

Warnings are used to:•ensure safety.•prevent damage to equipment and

breaches of security•ensure the law is not broken.

Language Work: Warnings1. The simplest warning are basic

instructions NOT to do something:1. Don’t do X2. Never do X3. Avoid Xing4. No Xing

For example:Never give out your home address or phone

number.

Warnings

2. Sometime the warning is twinned with matching good practice:

1. Always do Y; never do X.2. Do Y rather than doing X.

For example:Use an IC extraction tool rather than a

screwdriver.

Warnings:

3. Warning may be made stronger by using 1. must/must not 2. should/ should not.

For example:You must not drink coffee in this lab. If you spill

it you may damage the keyboard.

Warnings

4. If there is any reason to fear the warning may not be understood, a reason for the warning may be added.

For example:Never remove ICs with a screwdriver. The

pins are very fragile.

Where might you see these warning

1. Advice on taking part in IRC.2. Chassis of computer.3. Computer handbook.4. Data protection Act.5. Computer lab notice.6. Technician’s handbook.

[4 ]1. Avoid giving open access to PCs because

you may get viruses.2. Never use your own programs on these

machines. You may introduce viruses.3. You must not drink coffee in this lab. If you

spill it you may damage the keyboard.4. Don’t give financial information in a chat

rom. Some one may try to cheat you.5. Always keep your password a secret.

Someone may hack in to your system.6. Use up to date antivirus software. New

viruses appear all the time.

[.…4]7. Always wait until a computer has reached

normal room temperature before using it or you may damage the hard disk.

8.Never remove cards from there antistatic packing until required. Otherwise you may damage them.

9. Use an IC extraction tool rather than a screwdriver. The pins are fragile.

10. You must not work on a computer with the power on because you may be electrocuted.

[6 ]problem-solving

1. 24 seven.2. Broadband 23. Broadband 14. Pay As You Go

Specialist reading:

]A[ find the answers to these questions in the following text:

1.Line 92.Line 123.Line 134.One5.Line 286.Line 357.Line 458.Line 52

Specialist reading:

B. [1]B.[2]

A- ivA- T

B- iB- T

C- vC- T

D- viD- F

E- iiE- F

F- iiiF-F