Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 114

DISCOVERING COMPUTERS 2018

Digital Technology, Data, and Devices

Module 2
Connecting and
Communicating
Online:
The Internet,
Website, and Media
Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly
accessible website, in whole or in part.
Objectives Overview (1 of 2)

• Discuss the evolution of the Internet


• Briefly describe various broadband Internet
connections
• Describe the purpose of an IP address and its
relationship to a domain name
• Describe features of browsers and identify the
components of a web address
• Describe ways to compose effective search text

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-2
to a publicly accessible website, in whole or in part.
Objectives Overview (2 of 2)

• Explain benefits and risks of using online social


networks
• Describe uses of various types of websites
• Explain how the web uses graphics, animation,
audio, video, and virtual reality
• Explain how email, email lists, Internet messaging,
chat rooms, online discussions, VoIP, and FTP
work
• Identify the rules of netiquette(etika di jaringan
dunia maya)

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-3
to a publicly accessible website, in whole or in part.
The Internet (1 of 3)
• https://www.youtube.com/watch?v=Dxcc6ycZ73M
• The Internet is a worldwide collection of networks
that connects millions of businesses, government
agencies, educational institutions, and individuals

Figure 2-1 People around the world use the internet in daily activities, such as accessing
information, exchanging messages, and conversing with others from their computers and mobile
devices.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-4
to a publicly accessible website, in whole or in part.
The Internet (2 of 3)

• The Internet originated as ARPANET in September


1969 and had two main goals:
– Allow scientists at different physical locations to share
information and work together
– Function even if part of the network were disabled or
destroyed by a disaster

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-5
to a publicly accessible website, in whole or in part.
The Internet (3 of 3)

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-6
to a publicly accessible website, in whole or in part.
Connecting to the Internet (1 of 10)

• With wired connections, a computer or device


physically attaches via a cable or wire to a
communications device
• Computers without a communications device can
use a wireless modem or other communications
device that enables wireless connectivity

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-7
to a publicly accessible website, in whole or in part.
Connecting to the Internet (2 of 10)

Figure 2-2 Using a modem is one way to connect computers and mobile devices to the Internet.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-8
to a publicly accessible website, in whole or in part.
Connecting to the Internet (3 of 10)

• Wired
– Cable Internet service
– DSL (digital subscriber line)
– Fiber to the Premises (FTTP)
• Wireless
– Wi-Fi (wireless fidelity)
– Mobile broadband
– Fixed wireless
– Satellite Internet Service

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-9
to a publicly accessible website, in whole or in part.
Connecting to the Internet (4 of 10)
• A hot spot is a wireless network that provides
Internet connections to mobile computers and
devices

Figure 2-3 You can create a mobile hot spot using a communications device
or by tethering a smartphone.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-10
to a publicly accessible website, in whole or in part.
Connecting to the Internet (5 of 10)

• An Internet service provider (ISP) is a business


that provides individuals and organizations
access to the Internet free or for a fee
• Bandwidth is a measure of the capability of a
network to send and receive data
– Megabyte (MB)
– Gigabyte (GB)
• https://www.youtube.com/watch?v=hMX6dVa61t0

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-11
to a publicly accessible website, in whole or in part.
Connecting to the Internet (6 of 10)

Figure 2-4 This figure shows how a home user’s request for eBay’s webpage
might travel the internet using cable Internet service.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-12
to a publicly accessible website, in whole or in part.
Connecting to the Internet (7 of 10)

• An IP ADDRESS is a sequence of numbers that


uniquely identifies the location of each computer or
device connected to the Internet or any other
network
• A DOMAIN NAME is a text-based name that
corresponds(sepadan dengan) to the IP address of
a server
• A DNS SERVER translates the domain name into
its associated IP address
• https://www.youtube.com/watch?v=5o8CwafCxnU

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-13
to a publicly accessible website, in whole or in part.
Connecting to the Internet (8 of 10)

Figure 2-5 The IPv4 and IPv6 addresses, along with the domain name for
Google's website.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-14
to a publicly accessible website, in whole or in part.
Connecting to the Internet (9 of 10)
Table 2-3 Popular TLDs
TLD Intended Purpose
.biz Businesses
.com Commercial organizations, businesses, and companies
.edu Educational institutions
.gov Government agencies
.mil Military organizations
.museum Museums and individual museum professionals
.name Individuals
.net Network providers or commercial companies
.org Nonprofit organizations
.pro Licensed professionals
.technology Technology information
.travel Entities whose primary area of activity is in the travel industry

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-15
to a publicly accessible website, in whole or in part.
Connecting to the Internet (10 of 10)

Figure 2-6 This figure show how a user’s entered domain name (google.com)
uses a DNS server to display a webpage (Google, in this case).
https://www.youtube.com/watch?v=kBXQZMmiA4s&list=PLzdnOPI1iJNfMRZm5DDxco3UdsFegvuB7&index=6&t=3s

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-16
to a publicly accessible website, in whole or in part.
How a Network Operates
• A network is a system of two of
more devices linked by wires,
cables, or a telecommunications
system
o Requires a combination of
hardware and software
• Some networks provide
connections to the Internet, which
requires the services of an
Internet Service Provider (ISP)
o Enables the network to
communicate with other networks
that are also connected to the
Internet
Copyright © 2018 Cengage Learning®.New
Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-17
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Elements of a Connected Network
• Hub: transfers all data to all
devices(single)
• Switch: transfers data only to the
intended recipient(penerima)
• Router: device that connects two
or more networks
• Modem: communications device
that connects a communications
channel to a device
o Connects the network to the
Internet through an ISP
• Two main network types: home
and business
Copyright © 2018 Cengage Learning®.New
Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-18
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Devices Necessary to Create a Network

• Requires two or more devices that need to


communicate, a way to communicate, and the
infrastructure to facilitate the communication
– A network interface card (NIC) is required for a
computer to connect to a network
– Cable modem/DSL modem

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-19
to a publicly accessible website, in whole or in part.
Physical Connections Between Networks (1
of 3)
Table 10-1: Network Topologies
Topology Details

Bus network Wires on which All devices attach to a central cable, called a bus, which carries the data. If the bus fails,
data travels to and from the the devices on the network will no longer be able to communicate.
CPU.
Ring network Data travels from one device to the next in a sequential fashion. If one device on the
network fails, communication on the network could cease to function. Ring networks are
no longer common.
Star network Each device on the network is attached to a central device such as a server or switch. If
the central device fails, the other devices will be unable to communicate. If a connected
device fails, all other devices will still be able to communicate. Two or more star
networks may be joined together using a bus to form a tree topology. Tree topologies
often are used in schools and businesses.

Mesh network All devices interconnect with each other. If a single device on the network fails, the rest
of the network will continue to function by communicating via an alternate route. Two
types of mesh topologies are a full mesh topology (each device on the network is
connected to every other device on the network) and a partial mesh technology (each
device may or may not be connected to all other devices on the network).

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-20
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Physical Connections Between Networks (2
of 3)
Network Architecture
• Determines the logical
design of all devices on a
network
o Client/server network
o Peer-to-peer (P2P)
network
o Cloud computing

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-21
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Physical Connections Between
Networks (3 of 3)
Geographic Reach
• Local area network (LAN) connects computers and
devices in a limited area
• Wide area network (WAN) connects devices in a
large geographic region
• Metropolitan area network (MAN) is operated by a
city or county
• Personal area network (PAN) connects personal
digital devices within 30 feet via Bluetooth
• Body area network (BAN) small, lightweight
biosensors implanted in the body
Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-22
to a publicly accessible website, in whole or in part.
Differences Between Various Types of
Networks
Table 10-2: Additional Network Types
Network type Description
Wired network Sends signals and data through cables, which may have to travel through floors
and walls to connect to other network devices. Wired networks tend to be more
secure and transmit data faster than wireless networks.

Wireless network A type of printer or Sends signals through airwaves, and usually do not require cables. Wireless
other device that is connected to networks tend to be more convenient and easier to set up than wired networks, but
either a wired or wireless network to can be less secure. Wireless networks make it possible to connect devices in
which you have access. locations where physical wiring is not possible or is difficult.

Intranet An internal network site A private network for use by authorized individuals. Organizations use intranets to
used by a group of people who communicate internally and can allow users to use a web browser to access data
work together. posted on webpages. Intranets are preferable when data being transferred should
not necessarily reach the Internet.

Extranet Allows outsiders (such as customers, vendors, and suppliers) to access an


organization’s intranet. For example, an extranet might be used if a supplier needs
to check a customer’s inventory levels before deciding whether to ship additional
product.
Virtual private network (VPN) A private, secure path across a public network that allows authorized users secure
access to a company or other network. A VPN can allow an individual to access an
organization’s network by using encryption and other technologies to secure the
data transmitted along the path.

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-23
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Discuss Issues of Equity and Safety in a
Connected World
• Identify the risks and benefits associated with
using a connected network
• Explain how unauthorized network use threatens
communication technology
• Explain how to secure a network
• Secure data stored on a network
• Explain how to encrypt a network
• Explain the pros and cons of net neutrality

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-24
to a publicly accessible website, in whole or in part.
Risks and Benefits with Using a Connected
Network
• Benefits: sharing resources without regard to
geographic location; easier communication
• Risks
o Malware can install itself without permission
and damage or steal data from a computer or
device
o Hackers can gain access to personal data
o Phishing
o Social engineering
o Denial of service (DoS) attack
▪ Distributed denial of service (DDoS) attack
▪ Zombie

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-25
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
How Unauthorized Network Use Threatens
Communications
• When hackers can connect to the same network
as the computer they wish to target, it is easier
to obtain information
• Data also might be exposed by connecting to a
fraudulent(penipuan) network
– When connecting to a public Wi-Fi network, one
should not enter confidential information on websites
or send personal data in email
– Evil twin

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-26
to a publicly accessible website, in whole or in part.
How to Secure a Network
• Authentication
o User name and a strong
password
o Biometrics
• Firewall
o Hardware firewalls
o Software firewalls
• Encryption

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-27
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
How to Encrypt a Network

• Encryption is the process of converting data so that


it is unrecognizable when it is transmitted on a
network or stored on a storage device, except to
users who enter the correct password
• Ensure that wireless networks support encryption so
that data cannot be intercepted easily by others
– Encrypted wireless networks often use a wireless network
key to encrypt data sent between devices
– One common type of encryption on home routers is WPA2

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-28
to a publicly accessible website, in whole or in part.
Following Network Standards and
Protocols (1 of 3)
Table 10-4: Network Standards

Network standard Common use


Ethernet Most wired networks
Power over Ethernet (PoE) Devices requiring network
connectivity and power to be
supplied by the network
Phoneline/HomePNA and Networks using telephone lines to
Powerline connect computers and devices
Wi-Fi Home and small business networks
L TE Voice and data transmission on
cellular networks

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-29
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Following Network Standards and Protocols
(2 of 3)

• Computers communicating with each other on a


network must follow a common set of rules for
exchanging information, or protocols
– TCP/IP (Transmission Control Protocol/Internet
Protocol)
• Cellular Networks: millions of people use their
mobile phones to access the Internet
– Cellular networks can provide Internet services in most
locations where cellular service is offered
– 4G and 5G networks provide higher speed data
transmission

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-30
to a publicly accessible website, in whole or in part.
Following Network Standards and
Protocols (3 of 3)
Table 10-5: Close-Distance Network Protocols

Network protocol Common use


Bluetooth Devices communicating with each other
over a short range (usually less than 30
feet/9 meters)
RFID (radio frequency Radio signals transmitted through
identification) antennas, often found in tollbooth
transponders or embedded chips in
animals
NFC (near field Used in credit cards, smartphones, and
communication) tickets to facilitate close-range
communication
IrDA Remote controls or other data
transmission within close proximity

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-31
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
The World Wide Web (1 of 5)
• The World Wide Web (WWW), or web, consists of
a worldwide collection of electronic documents
(webpages)
• A website is a collection of related webpages and
associated items
• A web server is a computer that delivers requested
webpages to your computer or mobile device
• HTML (Hypertext Markup Language) is a set of
symbols that developers use to specify the
headings, paragraphs, images, links, and other
content elements that a webpage contains
Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-32
to a publicly accessible website, in whole or in part.
The World Wide Web (2 of 5)

• A browser is an application that enables users with


an Internet connection to access and view
webpages on a computer or mobile device
– Internet-capable mobile devices such as smartphones
use a special type of browser, called a mobile browser
• A home page is the first page that a website
displays
• Current browsers typically support tabbed
browsing

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-33
to a publicly accessible website, in whole or in part.
The World Wide Web (3 of 5)

Figure 2-7 Many websites, such as the Centers for Disease Control and
Prevention shown here, provide a mobile version that is designed specifically
for display on a mobile browser.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-34
to a publicly accessible website, in whole or in part.
The World Wide Web (4 of 5)
• A webpage has a unique address, called a web
address or URL

Figure 2-8 After entering http://www.nps.gov/history/preserve-places.htm


in the address bar and then pressing the ENTER key or clicking the
Search, Go, or similar button in a browser, the U.S. Department of the
Interior National Park Service home page shown here is displayed.
Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-35
to a publicly accessible website, in whole or in part.
Apply Information Literacy to Web Searches

• Define information literacy


• Explain how search engines work
• Use search tools and strategies
• Refine(perhalusi) web searches

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-36
to a publicly accessible website, in whole or in part.
Conduct Online Research
• Use specialty search engines
• Evaluate online information
Gather content from online sources(follow ethical guidelie)
• Apply information literacy standards(citation)

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-37
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Use Specialty Search Engines
Specialty Search Engines
• Let one search information sources that general search
engines do not always access
Search tool What it does
Wolfram Answers factual questions directly, without listing
Alpha webpages that might contain the answer
RhythmOne Finds videos or other multimedia; uses speech
recognition to match the audio part of a video with
your search term
Ask a Connects you to librarians at the Library of Congress
Librarian and other libraries; allows you to engage in an online
chat or submit your question in an online form
TinEye Does a reverse search for submitted images, rather
than keywords, to locate the original image and
match it with other indexed images
Copyright © 2018 Cengage Learning®.New
Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-38
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Evaluate Online Information

The CARS Checklist


• Credibility: identify the author and
check credentials
• Accuracy: verify facts and claims,
check for bias
• Reasonableness: examine whether the
claims are fair and sensible
• Support: look for reputable sources and
authorities

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-39
to a publicly accessible website, in whole or in part.
Gather Content from Online Sources
Follow Ethical Guidelines
• Copying photos might violate intellectual
property rights
• A copyright gives authors and artists the legal
right to sell, publish, or distribute an original work
• Some online resources are protected by digital
rights management (DRM), which limit access
to propriety rights
• Some material is in the public domain and can
be used without permission
• The fair use doctrine allows one to use a
sentence or paragraph of text without permission
with citation to the original source
• Creative Commons (CC): a nonprofit
organization that helps content creators keep
copyright to their materials while allowing others
to use, copy, or distribute their work
Copyright © 2018 Cengage Learning®.New
Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-40
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Apply Information Literacy Standards
Citing Sources
• A citation is a formal reference to a source
• Each type of information source uses a different citation
style
• Failure to cite sources, even if some of the words are
changed or paraphrased, is plagiarism

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-41
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
The World Wide Web (5 of 5)
• A web app is an application stored on a web server that
you access through a browser
– Web apps usually store users’ data and information on their
hosts’ servers

Figure 2-9 Web and mobile apps often work together, enabling you to
access your content from a variety of computers and devices.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-42
to a publicly accessible website, in whole or in part.
Types of Websites (1 of 8)

• A web search engine is software that finds


websites, webpages, images, videos, news, maps,
and other information related to a specific topic
• A subject directory classifies webpages in an
organized set of categories, such as sports or
shopping, and related subcategories
• https://www.youtube.com/watch?v=LVV_93mBfSU&t=0s&index=9&list=PLzdnOPI1iJNfMRZm5DDxco3UdsFegvuB7

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-43
to a publicly accessible website, in whole or in part.
Identify Types of Websites
Categories
Banking and Entertainment Portals
finance
Blogs Government or Retail and
organization auctions
Bookmarking Health and fitness Science
Business Information and Search sites
research
Careers and Mapping Travel and
employment tourism
Content Media sharing Website
aggregation creation and
management
E-commerce News, weather, Web apps
sports, and other and software
mass media as a service
(SaaS)
educational Online social Wikis and
networks collaboration
Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st 2-44
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Types of Websites (8 of 8)
• Web publishing is the creation and maintenance
of websites

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-45
to a publicly accessible website, in whole or in part.
Explain the Pros and Cons of Web Apps

Pros Cons
Access web apps from any You must be online to use web
device with a browser and apps.
Internet connection.
Collaborate with others no Your files are more
matter their location. vulnerable(terdedah) to security
and privacy violations.
Store your work on the app’s If the web app provider has
website so you can access it technical problems, you might
anytime and anywhere. not be able to access your
work.
Save storage space on your If the web app provider goes out
device of business, you can lose your
files.
Access the latest version of the Web apps often offer fewer
app without installing updates. features and may run more
slowly than installed apps.
Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-46
to a publicly accessible website, in whole or in part.
Identify Secure and Insecure Websites
Secure Websites
• Use encryption to safeguard
transmitted information
• Hypertext Transfer Protocol
Secure (HTTPS)
• Use digital certificates to
vouch for authenticity of the
website
• Lock icon
• Requires sign-in with
username/password before
entering sensitive information

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-47
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Use E-Commerce
• Explain the role of e-commerce in daily life
• Use e-commerce in business transactions
• Use e-commerce in personal transactions
• Explain how to find e-commerce deals

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-48
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Explain the Role of E-Commerce in
Daily Life (1 of 2)
Types of e-commerce
websites
Type of E- Description Example
commerce
Business-to- Involves the sale of Shopping websites
consumer (B2C) goods and services
to the general public
Consumer-to- Occurs when one Online auctions
consumer (C2C) consumer sells
directly to another
Business-to- Consists of business Market research
business (B2B) providing goods and websites
services to other
business

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-49
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Explain the Role of E-Commerce
in Daily Life (2 of 2)
Pros and cons of e-commerce for consumers
• Pros
– Variety
– Convenience
– Budget
• Cons
– Security
– Fraud(penipuan)
– Indirect experience

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-50
to a publicly accessible website, in whole or in part.
Use E-Commerce in Business Transactions
B2B E-Commerce
• Transferring goods, services, or information between
businesses
• Pricing can vary based upon the level of service provided,
negotiated terms, and other factors
• A team of people often review and make a purchasing decision

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-51
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Use E-Commerce in Personal Transactions
B2C/E-Retail
• Electronic storefront
• Tracks your selected items
using cookies
• Make secure e-commerce
payments
o 3D Secure
o Transport Layer Security (TL
S)
o Online payment services

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-52
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Explain How to Find E-Commerce Deals
Find Online Deals
• Comparison shopping
sites
• Using digital deals
o Gift certificates
o Gift cards
o Coupons

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-53
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Digital Media on the Web (1 of 7)
• Multimedia refers to any application that combines
text with media
– Graphics
– Animation
– Audio
– Video
– Virtual Reality

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-54
to a publicly accessible website, in whole or in part.
Define Digital Graphics
• Digital graphic: an image you
can see, store, and manipulate
on a computer or digital device
o Bitmap graphics: assign colors
to pixels
o Vector graphics: shapes,
curves, lines, and text created
by mathematical formulas
• Properties that affect quality
o Resolution
o Compression
▪ Lossy compression
▪ Lossless compression
Copyright © 2018 Cengage Learning®.New
Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-55
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Digital Media File Formats (1 of 5)
Table 7-1: Common Graphics File Formats
Graphic file File extension Best use / Notes
format
Bitmap
graphics
GIF .gif (Graphics Simple web graphics and short web animations
Interchange Format) Format is limited to 256 colors; supports transparency; small file size makes it
good for websites
J P EG .jpeg or .jpg (Joint Photos on the web
Photographic Experts Images have rich colors, but discard some data to reduce file size, which can
Group) affect quality
PN G .png (Portable Network Logos, icons, and illustrations
Graphics) Images have good quality even when highly compressed; supports 16 million
colors; better quality and smaller file size than GIF
TI F .tif or .tiff (Tagged Image High-quality photos and printed graphics
File Format) Large file size is better suited for print than web use
Vector
graphics
EP S .eps (Encapsulated Logos and other illustrations that are frequently resized
PostScript) A standard format for exporting vector graphics without data loss
SV G .svg (Scalable Vector Illustrations on the web
Graphics) Developed by the World Wide Web Consortium (W3C); allows interactivity and
animation

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-56
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Digital Media File Formats (2 of 5)
Table 7-2: Common Audio File Formats
File format File Compression Notes
extension
AAC and M4P .aac Lossy Apple uses these formats for
and .m4p iTunes downloads
AIFF (Audio .aiff or .aif None Files are large; good to excellent
Interchange File sound quality
Format)
MP3 .mp3 Lossy Common format for music and
audio books; most digital audio
devices can play MP3 files

WAVE or WAV .wav None Files are large; good to excellent


(Waveform Audio) sound quality
WMA (Windows .wma Lossless Played using Windows Media
Media Audio) Player; also copy-protected

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-57
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Digital Media File Formats (3 of 5)
Table 7-3: Common Video Codecs
Name Compatible with Best use / Notes
DivX AVI video container Commercial video production
Provides the highest video quality at
the expense of file size
H.264 MP4 video container Playing on playback devices or
streaming services
Common, efficient codec; preferred for
YouTube videos
H.265 MP4 video container Very high resolution videos
New video codec; also called HEVC
MPEG-2 MP4 and Quicktime DVDs, Blu-ray discs, professional-
containers grade cameras
Not used for streaming services
MPEG-4 Wide range of Online streaming services
compatibility Common codec providing good quality

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-58
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Digital Media File Formats (4 of 5)
Table 7-4: Common Graphics File Formats
Name File size and quality Best use / Notes
AVI (.avi) Files are often larger than Videos to store on a
others computer
One of the oldest and
most accepted formats
MP4 (.mp4) Relatively small files and Nearly universal
high quality Websites such as
YouTube and Vimeo prefer
MP4 files
Quicktime (.mov) Large files with high Playback on Apple devices
quality Developed by Apple

Windows Media (.wmv) Small file size with Sharing with others and
reduced quality posting on the web
Developed by Microsoft

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-59
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Digital Media File Formats (5 of 5)

Video File Resolutions


• Standard Definition (SD): 640 × 360 and 720 ×
480
• High Definition (HD): 1280 × 720 (720p) and
1920 × 1080 (1080p or Full HD)
• Ultra High Definition (UHD): 3840 × 2160
(2160p), 4K standard; 7840 × 4320 (4320p), 8K
standard
• In most cases, Full HD balance high-quality
playback with smaller file sizes that download
quickly
Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-60
to a publicly accessible website, in whole or in part.
Digital Media on the Web (3 of 8)

Figure 2-22 Many webpages use colorful graphics to convey messages. For
example, the variety of colors, images, shapes, and thumbnails on the San
Diego Zoo webpage visually separate and draw attention to areas of the
webpage, making the webpage more dynamic and enticing.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-61
to a publicly accessible website, in whole or in part.
Digital Media on the Web (4 of 8)
• An infographic is a visual representation of data
and information, designed to communicate
quickly, simplify complex concepts, or present
patterns or trends

Figure 2-23 An infographic presents complex concepts at a glance.


Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-62
to a publicly accessible website, in whole or in part.
Compare 2-D and 3-D Animation
• 2-D animation displays 2-D images
in rapid sequence to create the
illusion of lifelike motion
o In-betweening
• 3-D animation displays 3-D objects
or models in rapid sequence to
create the illusion of natural motion
o Have volume and can rotate 360
degrees
o Rendering: apply highlights and
shadows to a wireframe drawing
o Keyframe
o Stop motion animation

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-63
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Digital Media on the Web (9 of 11)

• Video consists of images displayed in motion


• Virtual reality (VR) is the use of computers to
simulate a real or imagined environment that
appears as a three-dimensional (3-D) space
• https://www.instantstreetview.com/@4.751984,100.946397,107.58h,-9.02p,0z
• https://www.youtube.com/watch?v=P3o0TgKG7kU

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-64
to a publicly accessible website, in whole or in part.
Digital Media on the Web (10 of 11)

Figure 2-25 Users can explore a VR world using a touch screen or their input
device. For example, users can explore the inside of the Gemini 7 space
capsule, located at the Smithsonian Air and Space Museum in Washington,
D.C., from their computer or mobile device.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-65
to a publicly accessible website, in whole or in part.
Digital Media on the Web (11 of 11)

• A plug-in, or add-on, is a program that extends the


capability of a browser

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-66
to a publicly accessible website, in whole or in part.
Using Varied Sources of Digital Media
• Use gaming systems
• Use animations across
digital media platforms
• Use graphics across
digital media platforms
• Use computer-aided
technology across digital
media platforms
• Stream digital media

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-67
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Use Gaming Systems (1 of 2)
Set Up a Gaming System
• Most games are played
on game consoles
o VR gaming system: run
on desktops and include
a headset, controllers,
and sensors to track
movements
▪ Mixed reality
▪ Holograms
• Motion-sensing game
consoles

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-68
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Use Gaming Systems (2 of 2)
Mobile Gaming
• Self-contained portable devices that fit in one hand
• The first to popularize augmented(ditambah) reality
• (AR) gaming

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-69
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Use Animations Across Digital Media
Platforms
• Simulations:
sophisticated(canggih)
computer animations that
are useful for training and
teaching
• PowerPoint transitions: a
simple use for animation
• Animations on the Web
o Animated GIF
o HTML 5: does not require
plug-in software (Flash)
• Animations in Entertainment
o Real-time animation
Copyright © 2018 Cengage Learning®.New
Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-70
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Use Graphics Across Digital Media
Platforms
• Use graphics to add
dramatic or informative
photos
• Logos on business
documents and websites
increase brand awareness
• Online stock photo
galleries provide graphics
that can be downloaded,
using for a fee
• Search engines provide a
license filter to find
images that can be used
legally
Copyright © 2018 Cengage Learning®.New
Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-71
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Computer-Aided Technology Across
Digital Media Platforms
• Uses computers to help design, analyze and manufacture
products
• Computer-aided design (CAD) software creates highly
detailed and technically accurate drawings
o 3-D CAD software creates wireframe drawings
o Uses artificial intelligence (AI) to help automate design tasks
▪ Machine learning: a branch of AI that trains machines to learn
from data, identify patterns, and make decisions to progressively
improve performance

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-72
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Streaming Digital Media
• Receiving audio or video content on
your computer from a server
o On-demand content
o Live video streaming
• Smart TVs and streaming devices
o Smart TVs: connect to a wi-fi network
to view Internet content
o TV stick/set-top box: allows the
streaming of T V shows and movies
from subscription services
• Stream digital audio
o Live audio feeds

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-73
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Record and Edit Digital Media
• Create graphics and
animation
• Record and play sounds
and music
• Develop original videos
• Edit digital media files

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-74
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Create Graphics and Animation (1 of 2)
Hardware devices
• Digital camera creates a digital
image of an object, person, or
scene
o Smartphone camera provide
geotagging
• Use a graphics tablet to create
drawings with a pressure-
sensitive pen
• Scanner converts a printed
document into a bitmap file by
diving the image into a grid of
tiny cells and assigned colors to
each cell
Copyright © 2018 Cengage Learning®.New
Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-75
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Create Graphics and Animation (2 of 2)
Graphics Software
• Image-editing software: modify existing
images
• Drawing programs create simple vector
images
• Photo-editing software: enhance and
retouch photographs
• Animation software
o Add animation to digital graphics and
videos
o Create animated content from scratch for
cartoons, movies, games
o Create and display animations for
webpages
Copyright © 2018 Cengage Learning®.New
Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-76
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Record and Play Sounds and Music (1 of 4)
• To record voice-overs and save recordings
for playback on a computer the following is
required:
o An audio input device, such as a microphone
or headset
o Sound recorder software
o Software that can digitize the captured sound
or convert it
• To play music files, the following is required:
o A sound card
o Speakers
o Audio software
o Some files require a stand-alone player
Copyright © 2018 Cengage Learning®.New
Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-77
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Record and Play Sounds and Music (2 of 4)
Use Synthesized Music
• Created as a digital file from
the start using electronic
instruments
• Musicians play synthesizers to
mimic sounds from acoustic or
electric instruments or to
produce unusual sounds that
other instruments cannot
generate
• MIDI (Musical Instrument
Digital Interface) converts
electric current to digital form

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-78
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Record and Play Sounds and Music (3 of 4)
Speech and Voice Recognition Software
• Speech recognition lets a device or software identify the
words one speaks and converts them to a format the device
can read
• Digital assistants combine AI with speech recognition
technology
• Voice recognition determines who is speaker rather than what
is being said; used as a security measure

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-79
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Record and Play Sounds and Music (4 of 4)
Use Synthesized Speech
• Text-to-speech software accepts text as input and
generates speech as output
o Creates synthesized speech

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-80
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Develop Original Videos (1 of 3)
Capture Video
• One can use a digital video camera, camcorder, or
smartphone to capture full-motion images and store them
in a file on the camera or phone
• Webcams capture video and send it directly to a
computer
• Digital video files are large (1 to 30 GB for each hour of
video)

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-81
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Develop Original Videos (2 of 3)

Play Video
• A screen, speakers, and a video card is
required to watch video
• Media player software is required
• Digital video files are large (1 to 30 G B for each
hour of video)

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-82
to a publicly accessible website, in whole or in part.
Develop Original Videos (3 of 3)

Access Video on the Web


• Fast Internet connections have made watching
videos on computers and mobile devices almost
as popular as watching television
• People use websites to share personal videos
• Video conferencing(persidangan) is
increasingly being used in business settings,
as well as by friends and families

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-83
to a publicly accessible website, in whole or in part.
Edit Digital Medias Files
• Video editing software allows
one to enhance and customize
video
o Most software shows the video
as a timeline with sperate tracks
for video and sound
• Audio capture and editing
software allows one to edit,
copy, and share digital audio
files
• Music production software
lets one record, compose, mix,
and edit music and sounds

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Perspectives copied
Collection, or ®duplicated,
Microsoft Office 365® &or posted
Office 2019, 1st 2-84
to a publicly
Edition. © 2020 Cengage. accessible
All Rights Reserved.website,
May not beinscanned,
whole or in part.
copied or duplicated, or posted to a publicly
Other Internet Services (1 of 11)

• Email is the transmission of messages and files via


a computer network
• An email program allows you to create, send,
receive, forward, store, print, and delete email
messages

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-85
to a publicly accessible website, in whole or in part.
Other Internet Services (2 of 11)

Figure 2-26 This figure shows how an email message may travel from a
sender to a receiver.
https://www.youtube.com/watch?v=YBzLPmx3xTU

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-86
to a publicly accessible website, in whole or in part.
Other Internet Services (3 of 11)
• An email list is a group of email addresses used
for mass distribution of a message

Figure 2-27 When you subscribe to a mailing list, you and all others in the list
receive messages from the website. Shown here is a user who receives
newsletters and alerts from FoxNews .com.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-87
to a publicly accessible website, in whole or in part.
Other Internet Services (4 of 11)

• Internet messaging services, which often occur in


real-time, are communications services that notify
you when one or more of your established contacts
are online and then allows you to exchange
messages or files or join a private chat room with
them

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-88
to a publicly accessible website, in whole or in part.
Other Internet Services (5 of 11)

Figure 2-28 With Internet messaging services, you and the person(s) with whom
you are conversing are online at the same time. The conversation appears on all
parties' screens at the same time. Shown here is Facebook messenger.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-89
to a publicly accessible website, in whole or in part.
Other Internet Services (6 of 11)

• A chat is a real-time typed conversation that takes


place on a computer or mobile device with many
other online users
• A chat room is a website or application that
permits users to chat with others who are online at
the same time

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-90
to a publicly accessible website, in whole or in part.
Other Internet Services (7 of 11)

Figure 2-29 As you type, others in the same chat room see what you have typed.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-91
to a publicly accessible website, in whole or in part.
Other Internet Services (8 of 11)

• An online discussion is an online area in which


users have written discussions about a particular
subject

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-92
to a publicly accessible website, in whole or in part.
Other Internet Services (9 of 11)

Figure 2-30 Users in an line discussion read and reply to other user’s
messages.

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-93
to a publicly accessible website, in whole or in part.
Other Internet Services (10 of 11)
VoIP (Voice over IP) Enables Users To Speak To
Other Users Via Their Internet Connection

Source: Microsoft

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-94
to a publicly accessible website, in whole or in part.
Other Internet Services (11 of 11)

• FTP (File Transfer Protocol) is an Internet standard


that permits file uploading and downloading to and
from other computers on the Internet
• Many operating systems include FTP capabilities
• An FTP server is a computer that allows users to
upload and/or download files using FTP

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-95
to a publicly accessible website, in whole or in part.
Netiquette
• Netiquette is the code of acceptable Internet
behavior users should follow while on the
Internet
• https://www.youtube.com/watch?v=FWMk_Zv7nB8

Figure 2-31 Some of the rules of netiquette, with respect to online communications.
Source: Microsoft
Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-96
to a publicly accessible website, in whole or in part.
Describe Legal and Ethical Responsibilities
of a Digital Citizen (1 of 3)
• How digital technology has
revolutionized society
• Characteristics of digital citizenship
• Describe the legal, ethical, and moral
issues caused by technology
• Describe digital inclusion and the
importance of digital access
• Describe how to create online content
without infringing on copyright
protections

Copyright © 2018 Cengage Learning®. May not be scanned,Technology


Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-97
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible
Describe Legal and Ethical Responsibilities
of a Digital Citizen (2 of 3)
• Digital ethics is the set of legal and
moral guidelines that govern the use of
technology
– A digital citizen is anyone who uses or
interacts with technology at work or in daily
life for productivity or entertainment
• Many laws are being debated, revised,
and passed to deal with how
technology complicates problems
– Distracted driving means driving a vehicle
while focusing on other activities, typically
involving an electronic device such as a
cell phone
Copyright © 2018 Cengage Learning®. May not be scanned,Technology
Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-98
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible
Describe Legal and Ethical
Responsibilities of a Digital Citizen (3 of 3)

Figure 14-2: Tips for avoiding


distracted driving
Copyright © 2018 Cengage Learning®.New
Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West,
Perspectives copied
Technology
Collection, or
for®duplicated,
Microsoft Success: ® or posted
Computer
Office 365 Concepts,
& Office 2019, 11st
st
2-99
Edition. ©
Edition. © 2020
2020Cengage. AllAll
Rights
to a publicly
Cengage. Reserved.
accessible
Rights Maywebsite,
Reserved. not
Maybenot
scanned, copiedor
beinscanned,
whole or in
duplicated,
copiedpart. or postedortoposted
or duplicated, a publicly
to aaccessible
publicly
How Digital Technology Has Revolutionized
Society
• You are likely to live a digital lifestyle,
using a variety of technologies for work
and play
– Smartphones
– Tablets
– Laptops
– Smart devices

Copyright © 2018 Cengage Learning®. May not be scanned,Technology


Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-100
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible
Characteristics of Digital Citizenship

• Digital literacy: having a current knowledge and


understanding of technology and an ability to use it,
combined with an awareness of commonly used
technologies
– Digital citizenship: ethical, legal, and productive use of
technology
• Acceptable use policy (AUP): document that lists
guidelines and repercussions(kesan) of use of the
Internet and other digital company resources,
including network storage, and email servers
– Distributed in part to reduce an organization’s liability and to
clarify what is and isn’t a fire-able offense
– Includes code of conduct
Copyright © 2018 Cengage Learning®. May not be scanned,Technology
Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-101
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible
Describe the Legal, Ethical, and Moral
Issues Caused by Technology
• Technology use can have legal, ethical, and moral
consequences

Figure 14-6: There are many


gray areas when determining
how to use technology

Copyright © 2018 Cengage Learning®. May not be scanned,Technology


Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-102
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible
Describe Digital Inclusion and the
Importance of Digital Access
• The Internet of Things (IoT) is the network of all
products and equipment that contain processors and
can communicate with one another via the Internet
– IoT-enabled devices can be controlled or programmed by
apps, voice, or motion
• Some people cannot afford IoT technologies, or lack
the necessary access to high-speed, uncensored
Internet connections, putting them at a disadvantage
– The digital divide is the gap between those who have
access to technology and its resources and information and
those who do not

Copyright © 2018 Cengage Learning®. May not be scanned,Technology


Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-103
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible
Describe How to Create Online
Content without Infringing(melanggar)
Area on Copyright Protections
Examples
Intellectual property Legal rights protecting those who create works such as photos, art,
rights writing, inventions, and music
Copyright An originator’s exclusive legal right to reproduce, publish, or sell
intellectual property
Digital rights A collection of technologies used by software publishers and trade
management groups to fight software piracy and prevent unauthorized copying of
(DRM) digital content; includes authentication, certificates of authenticity,
encryption, and digital watermarks
Public domain An item available to the public without requiring permission to use, and
therefore not subject to copyright
Fair use doctrine A section of U.S. copyright law that permits the limited use of a part of a
work without permission for non-commercial or educational purposes, as
long as you include a citation to the original source; limits on fair use
have to do with the overall impact of reuse on the value of the work, the
nature of the work (for example, song lyrics have different limitations than
research papers), and the amount of the work cited
Creative Commons A non-profit organization that makes it easy for content creators to
license andTable share14-2: their Content
work by supplying easy-to-understand copyright
licenses that allow the creator
protection terms to choose the conditions under which the
work
CopyrightEdition.
© 2018
can
© 2020
be
Cengage
used
Carey/Pinard/Shaffer/Shellman/Vodnik,
Learning®.
Cengage.
New Perspectives Collection, Microsoft Office 365 & Office 2019, 1
May notMay
All Rights Reserved. be scanned, copied
not be scanned,
®

or duplicated,
copied
®

or duplicated,or
or posted
st

posted to a publicly
2-104
accessible website, in whole or
to a publicly in part.
accessible website, in whole or in part.
How to be a Responsible Digital Citizen (1 of
2)

• Recognize how to cultivate a polite online presence


• Describe what makes an online source reliable
• Describe how to develop accessible online content
• Identify best practices for avoiding risks related
to digital technology
• Explain how to create a digital wellness plan
• Identify best practices for responsible tech disposal

Copyright © 2018 Cengage Learning®. May not be scanned, copied or duplicated, or posted 2-105
to a publicly accessible website, in whole or in part.
How to be a Responsible Digital Citizen (2 of 2)

• Technology changes so quickly that it


often raises issues not covered by
current law
– Responsible digital citizens must
sometimes make their own decisions about
what’s right and what’s wrong
▪ The first step in evaluating a situation
involving digital ethics is to consider
whether an action would be acceptable if it
were done without using technology

Copyright © 2018 Cengage Learning®. May not be scanned,Technology


Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-106
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible
Describe What Makes an Online Source Reliable (1 of 2)

• The Internet makes vast amounts of information


easily available, but a great deal of it is inaccurate
and biased
– Content published by libraries, universities, professional
organizations, and governmental agencies tends to be
reliable
– If the responsible organization or author of content is
unknown to you, research the source by name to see if
others view it as a respected authority
– It’s important to be especially careful when using a wiki,
which is a collaborative website that allows users to publish
and modify content on a webpage

Copyright © 2018 Cengage Learning®. May not be scanned,Technology


Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-107
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible
Describe What Makes an Online Source
Reliable (2 of 2)

Figure 14-10: Wikipedia is a collaborative website that allows users to


publish and modify content

Copyright © 2018 Cengage Learning®.New


Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West,
Perspectives copied
Technology
Collection, or
for®duplicated,
Microsoft Success: ® or posted
Computer
Office 365 Concepts,
& Office 2019, 11st
st
2-108
Edition. ©
Edition. © 2020
2020Cengage. AllAll
Rights
to a publicly
Cengage. Reserved.
accessible
Rights Maywebsite,
Reserved. not
Maybenot
scanned, copiedor
beinscanned,
whole or in
duplicated,
copiedpart. or postedortoposted
or duplicated, a publicly
to aaccessible
publicly
Describe How to Develop Accessible Online
Content (1 of 2)
• The Americans with Disabilities Act requires online
content, including websites, to be accessible to people
with disabilities
o Accessibility refers to content that is adaptable or available
to users who require assistance

Figure 14-11: Good alt text


provides visual descriptions

Copyright © 2018 Cengage Learning®. May not be scanned,Technology


Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-109
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible
Describe How to Develop Accessible
Online Content (2 of 2)

Figure 14-12: Technology raises many ethical and


legal questions
Copyright © 2018 Cengage Learning®.New
Carey/Pinard/Shaffer/Shellman/Vodnik, May not be scanned,
Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West,
Perspectives copied
Technology
Collection, or
for®duplicated,
Microsoft Success: ® or posted
Computer
Office 365 Concepts,
& Office 2019, 11st
st
2-110
Edition. ©
Edition. © 2020
2020Cengage. AllAll
Rights
to a publicly
Cengage. Reserved.
accessible
Rights Maywebsite,
Reserved. not
Maybenot
scanned, copiedor
beinscanned,
whole or in
duplicated,
copiedpart. or postedortoposted
or duplicated, a publicly
to aaccessible
publicly
Identify Best Practices for Avoiding Risks
Related to Digital Technology
• Experts recommend taking occasional
breaks from digital devices
– A digital detox is a period of time during
which an individual refrains(menahan diri)
from using technology
▪ Has behavioral health benefits, including
better sleep, less anxiety, and more
productive thought
▪ Can help alleviate(mengurangkan) physical
problems such as eye strain and repetitive
stress injuries

Copyright © 2018 Cengage Learning®. May not be scanned,Technology


Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-111
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible
Explain How to Create a Digital Wellness
Plan (1 of 2)
• To prevent or reduce the physical
effects of long-term technology use,
follow these practices:
– Take hourly breaks
– Correct your posture
– Don’t text and walk
– Stand up while you work at your desk
– Resist succumbing to a sedentary lifestyle

Copyright © 2018 Cengage Learning®. May not be scanned,Technology


Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-112
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible
Explain How to Create a Digital Wellness
Plan (2 of 2)
• To prevent or reduce the behavioral
health effects of long-term technology
use, follow these practices:
– Take frequent breaks and consider a digital
detox
– Turn off devices at least an hour before
bedtime
– Use social media moderately
– Restrict use of devices during social
interactions
– Safeguard your identity and privacy to
avoid identity theft or invasions of privacy
Copyright © 2018 Cengage Learning®. May not be scanned,Technology
Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-113
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible
Identify Best Practices for Responsible Tech
Disposal
• Before you dispose of or recycle a
device, store or back up data
– Encrypt the device’s contents and reset the
device to its factory settings
• Three responsible methods for
disposing of devices:
– Take or send it to a recycling facility or
designated drop-off center
– Donate it to a charity, senior organization,
homeless or domestic violence shelter, or
other non-profit
– Bring it to a technology store or firm
Copyright © 2018 Cengage Learning®. May not be scanned,Technology
Campbell/Ciampa/Clemens/Freund/Frydenberg/Hooper/Ruffolo/West, copied or forduplicated, or posted
Success: Computer Concepts, 1st 2-114
Edition. © 2020 Cengage. All Rights Reserved.
to a publicly accessibleMaywebsite,
not be scanned, copiedor
in whole or in
duplicated,
part. or posted to a publicly accessible

You might also like