Computing Essentials Ch2
Computing Essentials Ch2
Computing Essentials Ch2
The Internet has changed the world, and will continue to have an amazing impact on our
day-to-day lives. For example, Internet-connected homes of the future hold the promise of
sorting our recycling, adjusting our thermostats, and even monitoring our health.
This chapter covers the things you need to know to be prepared for this ever-changing
digital world, including
• Impact—how Internet technology is changing your world.
• Hardware—how to connect your life to the Internet, including Wi-Fi, cell phones, and
tablets.
• Applications—how to get ahead using social networking, streaming technology, and
cloud computing.
Learning Objectives
After you have read this chapter, you should be able to:
Introduction
“Hi, I’m Henry, and I’m a webmaster. I’d like to talk with you about the Internet,
the web, and electronic commerce, things that touch our lives every day. I’d also like
to talk with you about the role the Internet plays with Facebook, Linkedln, Twitter,
and cloud computing.”
G-Stock Studio/Shutterstock
It is almost impossible to go a day without being on the Internet in one form or another.
Our cell phones, tablets, and computers connect us to the Internet, and there are even
Internet-connected TVs, cars, and refrigerators. but what is the Internet? What are the
different ways we use the Internet? And how can we tap into the power of the Internet to
improve our lives?
The Internet is an interconnected mesh of computers and data lines that connects
millions of people and organizations. It is the foundation of the digital revolution and
allows people around the world to share words, images, and any digital file almost
instantaneously. The web provides an easy-to-use interface to Internet resources. It has
become an everyday tool for all of us to use.
To efficiently and effectively use computers, you need to be aware of the resources
available on the Internet and the web. Additionally, you need to know how to access these
resources, to effectively communicate electronically, to efficiently locate information, to
understand electronic commerce, and to use web utilities.
• Web 1.0 focused on linking existing information. Google Search and other search
engines made it possible for users to search the web to locate web pages of interest.
However, to create a web page required a background in computers and programming.
Many users could view web content, but few users could create web content.
• Web 2.0 evolved to support more dynamic content creation and social interaction.
Facebook and other social media sites made it so that nontechnical people could be
seen and heard on the web. These sites allow almost anyone to post videos, images, and
text about their lives. However, the massive amount of social media posts made it
difficult to find truly valuable information. Many users could view and create web
content, but few could readily locate valuable, timely information on the web.
• Web 3.0 identifies relationships between data. Siri and Google Assistant are examples
of Web 3.0 applications. One of their many capabilities includes maintaining a user’s
calendar of events and automatically reminding the user when an event is imminent,
such as an upcoming flight (see Figure 2-1). As this web technology grows out of its
infancy, we can expect to get more personalized, helpful information from our devices.
The future of the World Wide Web beyond Web 3.0 has yet to be determined. Futurists
suggest that Web 4.0 will focus on connecting data and devices into a seamless integration
into your physical life. However, there is not universal agreement regarding the specifics of
Web 4.0.
It is easy to get the Internet and the web confused, but they are not the same thing. The
Internet is the physical network. It is made up of wires, cables, satellites, and rules for
exchanging information between computers connected to the network. Being connected to
this network is often described as being online. The Internet connects millions of computers
and resources throughout the world. The web is a multimedia interface to the resources
available on the Internet. Every day over a billion users from nearly every country in the
world use the Internet and the web. What are they doing? The most common uses are the
following:
ethics
Twitter and other social media organizations ban users who post hateful or violent
content. Some people feel that Twitter has an ethical responsibility to monitor and
remove offensive or inaccurate content. Others say that censorship is a violation of an
individual’s right to free speech and that Twitter should never censor content. What do
you think? Who should decide what information is shared on Twitter: the company or
the users?
• Communicating is by far the most popular Internet activity. You can exchange texts, e-
mails, photos, and videos with your family and friends from almost anywhere in the
world. You can reconnect with old friends, meet new people with similar interests, and
engage with special-interest communities around the world.
• Shopping is one of the fastest-growing Internet applications. You can look for the latest
fashions, search for bargains, and make purchases.
• Searching for information has never been more convenient. You can access some of the
world’s largest libraries directly from your home computer.
• Education or e-learning is another rapidly evolving web application. You can take
classes on almost any subject. There are courses just for fun, and there are courses for
high school, college, and graduate school credit. Some cost nothing to take and others
cost a lot.
• Online entertainment options are nearly endless. You can find the latest movies and
news, listen your favorite songs, and play video games with friends around the world.
To learn more about online entertainment, see Making IT Work for You: Online
Entertainment on pages 28 and 29.
The first step to using the Internet and the web is to get connected, or to gain access to the
Internet.
concept check
What is the difference between the Internet and the web?
Describe how the Internet and the web started. What are the four web generations?
List and describe five of the most common uses of the Internet and the web.
Paid subscription services, like Netflix, offer popular film and TV shows, as
well as original content.
Jesse33/Shutterstock
Digital books allow you to read several books at a time on different digital
devices without having to carry around tons of books.
Annette Shaff/Shutterstock
News feed services, like feedly.com, allow you to search for news sources by
publisher or topic, creating a more “newspaper”-like reading experience.
Roman Pyshchyk/Shutterstock
Internet Access
Your computer is a very powerful tool. However, it needs to be connected to the Internet to
truly unleash its power. Once on the Internet, your computer becomes an extension of what
seems like a giant computer—a computer that branches all over the world. When provided
with a connection to the Internet, you can use a browser program to search the web.
tips
Are you getting the most out of your web browser? Here are a few suggestions to
make you faster and more efficient.
Bookmarks/Favorites Bar: Most browsers have a bookmarks or favorites bar just
below the address bar. Add your top 5 or 10 most-often-visited websites here. The
next time you want to visit one of these sites, select it from the bookmarks/favorites
list rather than entering the site’s URL.
Shortcuts: Keyboard shortcuts are often faster than using a mouse. Use the following:
F5 (refresh); Alt + left arrow (back); Ctrl + T (new tab); Ctrl + W (close tab); Ctrl +
Enter (adds “www” and “.com” to any domain name you type in the address bar).
Extensions/Add-Ons: Many browsers, such as Chrome and Firefox, allow users to
install small, third-party programs that extend, or add to, the capabilities of the
browser. These programs can perform a variety of tasks, from providing easy access to
your cloud services to making it easier to capture information on a web page.
Configure Settings: All browsers have a settings or options page that provides ways
to improve the security and privacy of your Internet browsing. For example, you can
deny websites from automatically opening up another browser window, called pop-ups
(these annoying windows often contain advertisements).
Providers
The most common way to access the Internet is through an Internet service provider (ISP).
The providers are already connected to the Internet and provide a path or connection for
individuals to access the Internet.
The most widely used commercial Internet service providers use telephone lines, cable,
and/or wireless connections. Some of the best-known providers in the United States are
AT&T, Comcast, Sprint, T-Mobile, and Verizon.
As we will discuss in Chapter 8, users connect to ISPs using one of a variety of connection
technologies including DSL, cable, and wireless modems.
Browsers
Today it is common to access the Internet from a variety of devices like cell phones, tablets,
and laptops. These devices use programs called browsers to provide access to web resources.
These programs connect you to remote computers; open and transfer files; display text,
images, and multimedia; and provide in one tool an uncomplicated interface to the Internet
and web documents. Four well-known browsers are Apple Safari, Google Chrome, Microsoft
Edge, and Mozilla Firefox. (See Figure 2-2.)
Browsers differ not only by designer, but also by what device they work on. For example,
Chrome is a web browser designed by Google that has a mobile version for cell phones and
tablets and a desktop version for laptops and desktops. Mobile browsers are designed for the
smaller touchscreens of mobile devices. They typically have larger buttons to select options
and provide multitouch support for actions such as “pinch” or “stretch” to zoom in on web
content. (See Figure 2-3.) Desktop browsers are designed for laptop and desktop computers,
with smaller buttons and more on-screen options designed to take advantage of larger
monitors and the precision of mouse input.
• The first part presents the protocol used to connect to the resource. As we will discuss
in Chapter 8, protocols are rules for exchanging data between computers. The protocol
https is used for web traffic and is one of the most widely used Internet protocols.
• The second part presents the domain name. It indicates the specific address where the
resource is located. In Figure 2-4 the domain is identified as www.mtv.com. The last
part of the domain name following the dot (.) is the top-level domain (TLD). Also
known as the web suffix, it typically identifies the type of organization. For example,
.com indicates a commercial site. (See Figure 2-5.)
concept check
What is the function of an ISP, a browser, a mobile browser, and a desktop browser?
What are HTML, a web page, a hyperlink, JavaScript, PHP, and CSS?
Web Utilities
Utilities are programs that make computing easier. Web utilities are specialized utility
programs that make the Internet and the web easier and safer to use. Some of these utilities
are browser-related programs that either become part of your browser or are executed from
your browser, while others work as separate stand-alone applications. Common uses for web
utilities include filtering content and transferring files.
Filters
Filters block access to selected sites. The Internet is an interesting and multifaceted arena.
But not all aspects of the Internet are appropriate for all audiences. Parents, in particular, are
concerned about children roaming unrestricted across the Internet. Filter programs allow
parents as well as organizations to block out selected sites and set time limits. (See Figure 2-
6.) Additionally, these programs can monitor use and generate reports detailing the total time
spent on the Internet and the time spent at individual websites. For a list of some of the best-
known filters, see Figure 2-7.
• Web-based file transfer services make use of a web browser to upload and download
files. This eliminates the need for any custom software to be installed. A popular web-
based file transfer service is Dropbox.com.
• BitTorrent distributes file transfers across many different computers for more efficient
downloads, unlike other transfer technologies whereby a file is copied from one
computer on the Internet to another. A single file might be located on dozens of
individual computers. When you download the file, each computer sends you a tiny
piece of the larger file, making BitTorrent well suited for transferring very large files.
Unfortunately, BitTorrent technology often has been used for distributing unauthorized
copies of copyrighted music and video.
• File transfer protocol (FTP) and secure file transfer protocol (SFTP) allow you to
efficiently copy files to and from your computer across the Internet and are frequently
used for uploading changes to a website hosted by an Internet service provider. FTP has
been used for decades and still remains one of the most popular methods of file transfer.
What are file transfer utilities? Downloading? Uploading? Web-based file transfer
services? FTP? SFPT?
Communication
As previously mentioned, communication is the most popular Internet activity, and its impact
cannot be overestimated. At a personal level, friends and family can stay in contact with one
another even when separated by thousands of miles. At a business level, electronic
communication has become a standard way to stay in touch with suppliers, employees, and
customers. Some popular types of Internet communication are social networking, blogs,
microblogs, podcasts, wikis, e-mail, and messaging.
environment
Daily newspapers are an important part of the free press; however, the traditional
printed newspaper comes at a cost of millions of trees. Many national and local news
organizations offer a digital version of their papers. Using the digital version instead of
the paper version can deliver the news quickly, cheaply, and sustainably. If you want to
save a tree, use the digital version of your favorite newspaper or magazine.
Social Networking
Social networking is one of the fastest-growing and most significant Web 2.0 applications.
Social networking sites focus on connecting people and organizations that share a common
interest or activity. These sites typically provide a wide array of tools that facilitate meeting,
communicating, and sharing. There are hundreds of social networking sites, but they share
some common features:
• Profiles are created by individuals to share information about them. These profiles
often include photos, personal details, and contact information. (See Figure 2-10.)
• Pages are created by companies to promote their business. These pages often include
hours of operations, upcoming sales, and information about their products.
• Groups are communities of individuals who share a common interest and come
together online to share information and discuss specific topics. Groups are typically
organized around topics, events, or ideas. They are popular among clubs and
organizations to coordinate activities or share information.
• Friends are a list of other members on a social media site that you want to
communicate with.
• News feed is the first page you see after logging into a social networking site. It
typically consists of a collection of recent posts from friends, trending topics on the
site, people’s responses to your posts, and advertisements.
• Share settings on your social media account determine who can see your posts. The
most common options include sharing with everyone, just your friends, or just a subset
of your friends.
privacy
Have you ever seen one of those funny or not-so-funny embarrassing personal videos on
the Internet? Unless you are careful, you could be starring in one of those videos.
Without privacy settings, images and videos posted to these sites can be viewed and
potentially reposted for all to see. If a social networking friend were to post an
embarrassing video of you to Facebook, would all your friends be able to see it? What
about parents, teachers, or potential employers? To check your Facebook privacy
settings, go to Facebook and click on the security lock icon.
A social network often has an overall focus. For example, LinkedIn is a popular business-
oriented social networking site. The profiles on LinkedIn share professional information, like
resumes and job successes, and the corporate pages concentrate on sharing their corporate
culture and promoting job openings. By contrast, the largest social networking site,
Facebook, originally had a focus of connecting friends and family. As Facebook’s audience
has expanded, so has its focus. For many, Facebook is much more than a way to keep
connected with friends and family. It has expanded to include news sites, entertainment sites,
and a powerful way for businesses and organizations to connect with their audience.
There are many social networking sites, each with its own unique features and interactions.
For a list of some of the most popular sites, see Figure 2-11.
Microblogging has become a significant media tool, used by politicians and celebrities to
share moment-to-moment thoughts with their audience. For example, Taylor Swift has over
83 million followers on Twitter.
Podcasts are audio programs delivered over the Internet. Typically, a podcast is one audio
program in a series of related podcasts. For example, The Science of Happiness podcast
offers a series of episodes presenting tips for a happier life. (See Figure 2-13.) Podcasts vary
widely, from daily news to arts and comedy shows. For a list of popular podcasts, see Figure
2-14.
Figure 2-13 A podcast
Apple
concept check
What is social networking? Profiles? Pages? Groups? Friends? News feeds? Share
settings?
Messaging
Electronic messaging is a popular way to communicate quickly and efficiently with friends,
family, and co-workers. This form of communication is particularly common on cell phones,
where messages are short and informal, and instantaneous responses are the standard. The
two most widely used forms of electronic messaging are text and instant messaging.
• Text messaging, also known as texting or SMS (short message service), is the process
of sending a short electronic message, typically fewer than 160 characters, using a
wireless network to another person, who views the message on a mobile device such as
a cell phone. Today, billions of people send text messages every day. It has become one
of the most widely used ways to send very short messages from one individual to
another. Text messaging was originally limited to characters, but you can now send
images, video, and sound using a variation of SMS known as MMS (Multimedia
Messaging Service). Although popular and convenient, there are downsides to using
this technology in the wrong context. A great deal of attention has been directed toward
texting while driving. A study by Car and Driver concluded that texting while driving
had a greater negative impact on driver safety than being drunk. Several states have
passed laws prohibiting texting while driving.
• Instant messaging (IM) allows two or more people to contact each other via direct,
live communication. (See Figure 2-15.) To use instant messaging, you register with an
instant messaging service, such as Facebook and then specify a list of friends.
Whenever you connect to the Internet, your IM service is notified. It then notifies your
friends who are available to chat and notifies your friends who are online that you are
available. You can then send messages directly back and forth. Most instant messaging
programs also include video conferencing features, file sharing, and remote assistance.
Many businesses routinely use these instant messaging features. Three of the most
popular instant messaging services are Facebook Messenger, WhatsApp, and Google
Hangouts.
Figure 2-15 Instant messaging
Denys Prykhodov/Shutterstock
E-mail
Unlike electronic messaging, e-mail or electronic mail is used to communicate longer and
more formal text. E-mail exchanges tend to take longer to write and are more carefully
crafted than text message exchanges, which make them ideal for business communications
and newsletters. A typical e-mail message has four basic elements: header, message,
signature, and attachment. (See Figure 2-16.) The header appears first and typically includes
the following information:
• Addresses: E-mail messages typically display the addresses of the intended recipient of
the e-mail, anyone else who is to receive a copy of the e-mail, and the sender of the e-
mail. The e-mail message in Figure 2-16 is to [email protected], copied to
[email protected], and sent from [email protected]. E-mail addresses have two basic
parts. (See Figure 2-17.) The first part is the user’s name and the second part is the
domain name, which includes the top-level domain. In our example e-mail, dcoats is
the recipient’s user name. The server providing e-mail service for the recipient is
usc.edu. The top-level domain indicates that the provider is an educational institution.
• Subject: A one-line description, used to present the topic of the message. Subject lines
typically are displayed when a person checks his or her mailbox.
For individual use, webmail is more widely used because it frees the user from installing
and maintaining an e-mail client on every computer used to access e-mail. With webmail,
you can access your e-mail from any computer anywhere that has Internet access.
tips
Are you tired of sorting through an inbox full of spam? Here are a few spam-
reducing suggestions:
Keep a low profile. Many spammers collect e-mail addresses from personal web
pages, social networking sites, and message boards. Be cautious when posting your
address.
Use caution when giving out your address. Many companies collect and sell e-mail
addresses to spammers. Be sure to read the privacy policy of a site before providing
your address.
Don’t ever respond to spam. Many are a trick to validate active e-mail addresses.
These addresses are worth more to spammers, who then sell the addresses to other
spammers.
Use antispam and filter options. Most e-mail programs and web-based e-mail
services have antispam and filter options that can be configured. Use them.
E-mail can be a valuable asset in your personal and professional life. However, like many
other valuable technologies, there are drawbacks too. Americans receive billions of unwanted
and unsolicited e-mails every year. This unwelcome mail is called spam. Although spam is
indeed a distraction and nuisance, it also can be dangerous. For example, computer viruses
or destructive programs are often attached to unsolicited e-mail. Computer viruses will be
discussed in Chapter4.
In an attempt to control spam, antispam laws have been added to our legal system. For
example, CAN-SPAM requires that every marketing-related e-mail provide an opt-out option.
When the option is selected, the recipient’s e-mail address is to be removed from future
mailing lists. Failure to do so results in heavy fines. This approach, however, has had
minimal impact since over 80 percent of all spam originates from servers outside the United
States. A more effective approach to controlling spam has been the development and use of
spam blockers, also known as spam filters. Most e-mail programs provide spam-blocking
capabilities.
concept check
What is text messaging? Texting? SMS? MMS? IM? Friends?
What are the two types of e-mail systems? What are viruses, spam, spam blockers, and
spam filters?
Search Tools
The web can be an incredible resource, providing information on nearly any topic
imaginable. Are you interested in music? Writing a paper on the environment? Looking for a
movie review? Trying to locate a long-lost friend? Information sources related to these
questions, and much, much more, are available on the web.
With over 20 billion pages and more being added daily, the web is a massive collection of
interrelated pages. With so much available information, locating the precise information you
need can be difficult. Fortunately, a number of organizations called search services operate
websites that can help you locate the information you need.
Search services maintain huge databases relating to information provided on the web and
the Internet. The information stored at these databases includes addresses, content
descriptions or classifications, and keywords appearing on web pages and other Internet
informational resources. Special programs called spiders continually look for new
information and update the search services’ databases. Additionally, search services provide
special programs called search engines that you can use to locate specific information on the
web.
Search Engines
Search engines are specialized programs that assist you in locating information on the web
and the Internet. To find information, you go to a search service’s website and use its search
engine. See Figure 2-18 for a list of commonly used search engines.
• Authority. Is the author an expert in the subject area? Is the site an official site for the
information presented, or is the site an individual’s personal website?
• Accuracy. Read beyond the headlines and consult other reputable sources on any
surprising claims to separate the real news from the fake. Headlines can be misleading
and fake news articles often make their statements seem accurate by referencing other
fake news articles.
• Objectivity. Is the information factually reported, or does the author have a bias? Does
the author appear to have a personal agenda aimed at convincing or changing the
reader’s opinion?
• Currency. Is the information up to date? Does the site specify the date when the site
was updated? Are the site’s links operational? If not, the site is most likely not being
actively maintained.
concept check
What are search services, spiders, and search engines?
Electronic Commerce
Electronic commerce, also known as e-commerce, is the buying and selling of goods over
the Internet. Electronic commerce is fast-growing and widely used in part because it provides
incentives for both buyers and sellers. From the buyer’s perspective, goods and services can
be purchased at any time of day or night from any location that has an Internet connection.
From the seller’s perspective, the costs associated with owning and operating a retail outlet
can be eliminated. Another advantage is reduced inventory. Traditional stores maintain an
inventory of goods in their stores and periodically replenish this inventory from warehouses.
With e-commerce, there is no in-store inventory and products are shipped directly from
warehouses.
While there are numerous advantages to e-commerce, there are disadvantages as well.
Some of these disadvantages include the inability to provide immediate delivery of goods,
the inability to “try on” prospective purchases, and questions relating to the security of online
payments. Although these issues are being addressed, very few observers suggest that e-
commerce will replace bricks-and-mortar businesses entirely. It is clear that both will coexist
and that e-commerce will continue to grow.
Just like any other type of commerce, electronic commerce involves two parties:
businesses and consumers. There are three basic types of electronic commerce:
• Business-to-consumer (B2C) commerce involves the sale of a product or service to the
general public or end users. It is the fastest-growing type of e-commerce. Whether large
or small, nearly every existing corporation in the United States provides some type of
B2C support as another means to connect to customers. Because extensive investments
are not required to create traditional retail outlets and to maintain large marketing and
sales staffs, e-commerce allows start-up companies to compete with larger established
firms. The three most widely used B2C applications are for online banking, financial
trading, and shopping. Amazon.com is one of the most widely used B2C sites.
• Consumer-to-consumer (C2C) commerce involves individuals selling to individuals.
C2C often takes the form of an electronic version of the classified ads or an auction.
Web auctions are similar to traditional auctions except that buyers and sellers seldom,
if ever, meet face to face. Sellers post descriptions of products at a website, and buyers
submit bids electronically. Like traditional auctions, sometimes the bidding becomes
highly competitive and enthusiastic. One of the most widely used auction sites is
eBay.com. For a list of some of the most popular web auction sites, see Figure 2-19.
• Business-to-business (B2B) commerce involves the sale of a product or service from
one business to another. This is typically a manufacturer–supplier relationship. For
example, a furniture manufacturer requires raw materials such as wood, paint, and
varnish.
concept check
What is electronic commerce?
What are some of the differences among B2C, C2C, and B2B?
Security
The two greatest challenges for e-commerce are (1) developing fast, secure, and reliable
payment methods for purchased goods and (2) providing convenient ways to submit required
information such as mailing addresses and credit card information.
The two basic payment options are by credit card and by digital cash:
• Credit card purchases are faster and more convenient than check purchases. Credit card
fraud, however, is a major concern for both buyers and sellers. We will discuss this and
other privacy and security issues related to the Internet in Chapter 9.
• Digital cash is the Internet’s equivalent to traditional cash. Buyers purchase digital cash
from a third party (a bank that specializes in electronic currency) and use it to purchase
goods. (See Figure 2-20.) Most digital cash is a digital version of traditional currency,
such that a digital U.S. dollar has the same purchasing power as a traditional U.S.
dollar. For example, Facebook’s digital cash, Libra, is backed by a reserve of several
currencies, including the U.S. dollar and the Japanese yen. By associating Libra with
multiple currencies, Facebook hopes to keep Libra’s value stable, even if one of the
reserve currencies is suddenly unstable. However, some digital cash, like bitcoin, have
no traditional cash equivalent and exist only on the Internet. Sellers convert the digital
cash to traditional currency through the third party. Although not as convenient as credit
card purchases, digital cash is more secure. For a list of digital cash providers, see
Figure 2-21.
• Clients are corporations and end users who want access to data, programs, and storage.
This access is to be available anywhere and anytime that a connection to the Internet is
available. End users do not need to buy, install, and maintain application programs and
data.
• The Internet provides the connection between the clients and the providers. Two of the
most critical factors determining the efficiency of cloud computing are (1) the speed
and reliability of the user’s access to the Internet and (2) the Internet’s capability to
provide safe and reliable transmission of data and programs.
• Service providers are organizations with computers connected to the Internet that are
willing to provide access to software, data, and storage. These providers may charge a
fee or the services may be free. For example, Google Drive Apps provide free access to
programs with capabilities similar to Microsoft’s Word, Excel, and PowerPoint. (See
Figure 2-23.)
environment
Studies have already shown that using a smart thermostat can shave as much as 30
percent off of energy bills. However, expect that going forward, there will be even more
emphasis on making homes “green” and energy efficient. For example, researchers are
currently experimenting with sensor-equipped clothing that works with smart
thermostats to automatically adjust room conditions to individuals. Other technologies
in development include more devices connected to motion sensors, which can reduce
electricity usage considerably. No one can predict the future with 100 percent accuracy,
but based on current trends and user demand, it’s easy to assume that these smart
developments will be common within the next few years—plus more that we can’t even
imagine yet.
In the following chapters, you will learn more about the services provided through cloud
computing. You will also learn about security and privacy challenges associated with cloud
computing.
concept check
What is cloud computing?
What are the three basic components of cloud computing?
What are the two most critical factors that determine the efficiency of cloud
computing?
A Web 3.0 application can access the Fitbit data, combine that data with other data on the
web, process the data, and send information back to another device. For example, Apple’s
Health App, a Web 3.0 application, can access your Fitbit data, combine it with other related
health data, analyze the data, and report back to you through your cell phone. These reports
provide information about your health, including your heart rate, steps taken each day, and an
estimate of daily calories burned. (See Figure 2-25.)
Figure 2-25 Apple’s Health App
Denys Prykhodov/Shutterstock
concept check
What is the Internet of Things?
What are Fitbit and Apple’s Health App? How do they work together?
Discuss how Fitbit and Apple’s Health App are examples of using IoT.
Careers in IT
Now that you’ve learned about the Internet, the web, and electronic commerce, I’d
like to tell you about my career as a webmaster.”
G-Stock Studio/Shutterstock
Webmasters develop and maintain websites and resources. The job may include backup
of the company website, updating of resources, or development of new resources.
Webmasters are often involved in the design and development of the website. Some
webmasters monitor traffic on the site and take steps to encourage users to visit the site.
Webmasters also may work with marketing personnel to increase site traffic and may be
involved in the development of web promotions.
Employers look for candidates with a bachelor’s or associate’s degree in computer
science or information systems and knowledge of common programming languages and
web development software. Knowledge of HTML and CSS is considered essential. Those
with experience using web authoring software and programs like Adobe Illustrator and
Adobe Dreamweaver are often preferred. Good communication and organizational skills
are vital in this position.
Webmasters can expect to earn an annual salary of $40,000 to $87,000. This position is
relatively new in many corporations and tends to have fluid responsibilities. With
technological advances and increasing corporate emphasis on a web presence, experience
in this field could lead to managerial opportunities.
The smart home of the future will do more than clean up and recycle. It will
monitor and adjust energy use based on your needs and the energy sources available.
Interconnected IOT devices will work together to maximize their efficiency to make
for a lower energy home. Devices monitor inside and outside temperature, news and
weather reports, and fluctuating power availability from home solar panels and
community wind turbines. These homes will also use sensors in the home to predict
energy needs, such as increased hot water in the mornings when people shower and
reduced air conditioning when you go away for a weekend.
Your smart home in the future will not just use less energy. It will use less space as
well. Researchers at Samsung envision a home of smart walls that use adjustable
surfaces and actuators to change the size of a room effectively, making empty rooms
smaller and occupied rooms larger. When you are entertaining guests, the walls will
reposition to create extra seating directly out of the wall. When the guests leave, the
extra seating disappears back into the wall.
While these advances sound great, perhaps the greatest advantages of a smart home
will be the ability to improve health and longevity. Currently, researchers are
investigating the ways that IoT devices can help people make healthier choices. The
Fitbit and other monitoring IoT wearables have been shown to increase people’s
activity level and improve health. The smart home of the future will monitor your
health and adjust your home to make healthier choices, from furniture that reads your
posture and guides you to improve how you sit, to refrigerators that monitor your food
intake and promote healthier dining choices. IoT and Web 4.0 will allow smart homes
to work seamlessly in the background to help you achieve your best you.
Of course, these advances include an increase in potential risks. A home that
records every movement and activity could be used to spy on you. Companies that
store and analyze your smart home data could use that data in ways you haven’t
agreed to, such as to sell products or to design and test new ideas. Finally, by putting
your security and privacy in the hands of a smart home, you risk that smart home
being hacked and opening your home to criminals.
What do you think? Are the conveniences of the smart home of the future worth the
risks to your privacy and security? What smart home features exist right now that you
would like to have? What smart home features that researchers are working on would
be most valuable to you?
Piotr Swat/Shutterstock
Internet
Launched in 1969 with ARPANET, the Internet consists of the actual physical network.
Web
Introduced in 1991, the web (World Wide Web, WWW) provides a multimedia
interface to Internet resources. Four generations: Web 1.0 (links existing information,
search engines), Web 2.0 (creates dynamic content and social interaction, social media
sites) Web 3.0 (identifies relationships between data), and Web 4.0 (futurists predict
connecting data and devices to physical life.
Common Uses
The most common uses of the Internet and the web include
INTERNET ACCESS
indiaforte/Alamy Stock Photo
WEB UTILITIES
Circle Media Labs, Inc.
Web utilities are specialized utility programs that make using the Internet and the web
easier and safer.
Filters
Filters are used by parents and organizations to block certain sites and to monitor use of
the Internet and the web.
File Transfer Utilities
File transfer utilities copy files to (downloading) and from (uploading) your computer.
There are three types
• File transfer protocol (FTP) and secure file transfer protocol (SFTP) allow you
to efficiently copy files across the Internet.
• BitTorrent distributes file transfers across many different computers.
• Web-based file transfer services make use of a web browser to upload and
download files.
COMMUNICATION
ImageBROKER/Mara Brandl/Newscom
Social Networking
Social networking sites connect people and organizations that share a common interest
or activity. Common features include profiles, pages, groups, friends, news feeds, and
share settings. Two well-known sites are LinkedIn and Facebook.
Blogs, Microblogs, Podcasts, and Wikis
Other sites that help individuals communicate across the web are blogs, microblogs,
podcasts, and wikis.
• Blogs are typically personal websites to keep in touch with friends and family.
Some are like online diaries. Businesses, newspapers, and others also use blogs as a
quick publishing method.
• Microblogs use short sentences. Twitter allows 280 characters per tweet.
Instagram is primarily used to share images and videos.
• Podcasts are audio programs delivered over the Internet. Typically, a podcast is one
audio program in a series of related podcasts.
• A wiki is a website designed to allow visitors to use their browsers to add, edit, or
delete the site’s content. Wikipedia is one of the most popular wikis.
COMMUNICATION
Microsoft Corporation
Messaging
Although e-mail is the most widely used, there are two other messaging systems:
• Text messaging, also known as texting and SMS (short message service), is a
process of sending short electronic messages, typically fewer than 160 characters.
Texting while driving is very dangerous and illegal in several states.
• Instant messaging (IM)—supports live communication between friends. Most
instant messaging programs also include videoconferencing features, file sharing,
and remote assistance.
E-mail
E-mail (electronic mail) is the transmission of electronic messages. There are two basic
types of e-mail systems:
A typical e-mail has three basic elements: header (including address, subject, and
perhaps attachment), message, and signature.
Spam is unwanted and unsolicited e-mail that may include a computer virus or
destructive programs often attached to unsolicited e-mail. Spam blockers, also known as
spam filters, are programs that identify and eliminate spam.
SEARCH TOOLS
Search services maintain huge databases relating to website content. The information
stored at these databases includes addresses, content descriptions or classifications, and
keywords appearing on web pages and other Internet informational resources. Spiders
are programs that update these databases.
Search Engines
Search engines are specialized programs to help locate information. To use, enter a
keyword or phrase, and a list of search results is displayed.
Content Evaluation
Not all information you find on the web has been subjected to strict guidelines to ensure
accuracy. Many sites allow anyone to post new material, sometimes anonymously and
without critical evaluation. Some sites promote fake news (inaccurate or biased
information) and/or deep fake videos. Many fake news sites are designed to look like
legitimate news sites.
To evaluate the accuracy of information found on the web, consider the following:
• Authority. Is the author an expert? Is the site official or does it present one
individual’s or organization’s opinion?
• Accuracy. Consult other reputable sources to verify surprising claims. Fake news
articles often reference other fake news articles.
• Objectivity. Is the information factual or does the author have a bias? Does the
author appear to have a personal agenda to convince or form a reader’s opinion?
• Currency. Is the information up to date? Does the site specify when information is
updated? Are the site’s links operational?
ELECTRONIC COMMERCE
dennizn/Shutterstock
Electronic commerce, or e-commerce, is the buying and selling of goods over the
Internet. Three basic types are
Security
The two greatest challenges for e-commerce are the development of
• Safe, secure payment methods. Two types are credit cards and digital cash.
Bitcoins exist only on the Internet.
• Convenient ways to provide required information.
CLOUD COMPUTING
Cloud computing shifts many computer activities from the user’s computer to other
computers on the Internet. The three basic components to cloud computing are:
Internet of Things
Myriam B/Shutterstock
• The Fitbit is an IoT device (bracelet) that monitors health data and sends that data to
a cell phone or personal web page.
• Apple’s Health App is a Web 3.0 application that can access Fitbit data, combine it
with other related health data, analyze the data, and report back to you through a
cell phone.
The Apple Health App reports provide information about users’ health, including heart
rate, steps taken each day, and an estimate of daily calories burned.
G-Stock Studio/Shutterstock
CAREERS in IT
Webmasters develop and maintain websites and web resources. A bachelor’s or
associate’s degree in computer science or information systems and knowledge of
common programming languages and web development software are required. Expected
salary range is $40,000 to $87,000.
KEY TERMS
address (37)
Advanced Research Project Agency Network (ARPANET) (26)
attachment (38)
bitcoin (41)
BitTorrent (31)
blog (35)
browser (30)
business-to-business (B2B) (41)
business-to-consumer (B2C) (40)
cable (30)
cascading style sheets (CSS) (31)
client-based e-mail system (38)
cloud computing (42)
consumer-to-consumer (C2C) (40)
deep fake (39)
desktop browser (31)
digital cash (41)
domain name (31)
downloading (32)
DSL (30)
e-commerce (40)
e-learning (27)
electronic commerce (40)
electronic mail (37)
e-mail (37)
e-mail client (38)
Facebook (35)
fake news (39)
file transfer protocol (FTP) (33)
filter (32)
friend (34)
groups (34)
header (37)
hyperlink (31)
Hypertext Markup Language (HTML) (31)
Instagram (35)
instant messaging (IM) (36)
Internet (26)
Internet of Things (IoT) (43)
Internet security suite (33)
Internet service provider (ISP) (30)
JavaScript (31)
link (31)
LinkedIn (35)
location (37)
message (38)
microblog (35)
MMS (multimedia messaging service) (36)
mobile browser (31)
news feed (34)
online (27)
pages (34)
podcast (35)
PHP (31)
profiles (34)
protocol (31)
search engine (39)
search service (39)
secure file transfer protocol (SFTP) (33)
share settings (34)
signature (38)
SMS (short messaging service) (36)
social networking (34)
spam (38)
spam blocker (38)
spam filter (38)
spider (39)
subject (37)
texting (36)
text messaging (36)
top-level domain (TLD) (31)
tweet (35)
Twitter (35)
uniform resource locator (URL) (31)
uploading (32)
virus (38)
web (26)
Web 1.0 (26)
Web 2.0 (26)
Web 3.0 (26)
Web 4.0 (26)
web auction (40)
web-based e-mail system (38)
web-based file transfer services (31)
webmail (38)
webmail client (38)
webmaster (44)
web page (31)
web suffix (31)
web utility (34)
wiki (36)
Wikipedia (36)
wireless modem (30)
World Wide Web (26)
WWW (26)
MULTIPLE CHOICE
Circle the correct answer.
MATCHING
Match each numbered item with the most closely related lettered item. Write your
answers in the spaces provided.
a. chat
b. C2C
____ 1. The most popular Internet activity.
c. communicating
____ 2. The most common way to access the Internet is through a(n) _____.
d. e-mail ____ 3. Transmission of electronic messages over the Internet.
e. Internet ____ 4. Two popular instant messaging services are Google Talk and Facebook _____.
____ 5. A business-oriented social networking site.
f. ISP
____ 6. Individual website to keep in touch with friends and family.
g. LinkedIn ____ 7. Publishes short sentences.
h. microblog ____ 8. Maintain huge databases relating to information provided on the web and the
Internet.
i. search services
____ 9. Electronic commerce involving individuals selling to individuals.
j. blog ____ 10. The basic components of cloud computing are clients, service providers, and the
_____.
OPEN-ENDED
On a separate sheet of paper, respond to each question or statement.
1. Discuss the Internet and web, including their origins, the four generations of the
web, and the most common uses.
2. Describe how to access the Internet. What are providers? Define desktop and
mobile browsers, and discuss URLs, HTML, CSS, JavaScript, PHP, and mobile
browsers.
3. What are web utilities? Discuss filters, file transfer utilities, and Internet security
suites.
4. Discuss Internet communications, including social networking, blogs, microblogs,
podcasts, wikis, client-based and web-based e-mail, and text and instant messaging.
5. Define search tools, including search services. Discuss search engines and fake
news. Describe how to evaluate the content of a website.
6. Describe electronic commerce, including business-to-consumer, consumer-to-
consumer, and business-to-business e-commerce, and security.
7. Discuss the Internet of Things (IoT). Describe how Fitbit and Apple’s Health App
are examples of how an IoT device can interact with a Web 3.0 application.
8. What is cloud computing? Describe three basic components of cloud computing.
DISCUSSION
Respond to each of the following questions.
Making IT Work for You: ONLINE ENTERTAINMENT
Review the Making IT Work for You: Online Entertainment on pages 28–29 and then
respond to the following: (a) Do you currently use online entertainment? If so, which
ones? If not, do you plan on using one in the future? Why or why not? (b) What are the
advantages and disadvantages of online entertainment options compared to traditional
sources? Be specific. (c) Compare news feeds to traditional newspapers. Which would
be better for exposing you to new ideas? Which one would be better at challenging your
point of view? Be specific and defend your position.