Anda di halaman 1dari 20

MODULE 7 WEB BROWSING USING IE7 & COMMUNICATION USING OUTLOOK 2007

SECTION

CONTENTS

1 2 3 4 5 6 7 8

GETTING STARTED

NAVIGATION
BROWSING THE WEB

SAVING AND PRINTING


OUTLOOK

MESSAGE EDITING
SEND AND RECEIVE

MESSAGE MANAGEMENT

LESSON1 INTERNET THEORY1


Internet
A BIG COMPUTER NETWORK WHICH ALLOW USERS ALL OVER THE WORLD TO COMMUNICATE WITH EACH OTHER.

WWW(WORLD COLLECTION OF INFORMATION THAT CAN BE WIDE WEB) Home Page

ACCESSED ON THE INTERNET, EACH ONE HAVE UNIQUE ADDRESS(URL) HOME PAGE OF THE WEB SITE USUALY CONSIST OF INTRODUCTION TO THE SITE AND CONSIST HYPERLINK TO OTHER PAGES IS AN ELECTRONIC CONNECTION BETWEEN TWO OR MORE WEB PAGES ON A DIFFERENT OR THE SAME SITE.

Hyperlink

LESSON1 INTERNET THEORY11


HTML (Hypertext Markup Language)

LANGUAGE THAT WEB PAGES ARE WRITTEN IN

EMail(ELECTRON YOU MUST HAVE E-MAILE ADDRESS TO SEND OR IC MAIL )


RECIVE EMAIL

E-mail address UNIQ ADDRESSES USED TO SEND AND RECIVE


EMAIL LIKE SITE ADDRESSES AS ..@HOTMAIL.COM

Internet Explorer ISP

Application allows the user to access information on the www Internet service provider

INTERNET THEORY 1-2


Communicate SMS ( Short Message Service) Virtual Communities

TEXT MESSAGE BETWEEN MOBILE PHONE People with similar interests and hobbies can share their views on specifically Virtual Communities web sites. Internet forum also known as a message board or discussion board is a web application that provides for

INTERNET THEORY 1-2 Used to communicate with Social Networking other people and share information about yourself Sites
IM(Instant Messaging )

online. As MySpace , Facebook , Is a system where two or more users type text and it appears on screen . (Chat rooms) example MESSENGER , Chat Rooms

Chat Rooms

INTERNET THEORY 1-3


Communicate

Voice over Internet Protocol (Skype , Google talk) use microphone and headphone and website Share content as text, photos, Share video and audio clip online. Web log (Blog) website entries are posted in chronological order like online diary typical blog will contain text, pictures, links ,music ,.. Multimedia

VoIP

INTERNET THEORY 1-3 Media files (Audio and Podcast video ) are broadcasted over the internet as (music files , radio, TV ) RSS (Really Frequently updated contents such ( news Simple headlines , football scores , syndication) notes about updated sited)

INTERNET THEORY 1-4


Be Cautions
Not every member of communities are genuine

There are identity theft

precautions
Create private profile Limit the amount of personal information you post because everything you do post is public available be very wary of strangers , communicate with them as strangers

LESSON2 INTERNET EXPLORER


Software application design to allow the user to explore the full potential on internet
SEARCHING WEB SITES KEEP A RECORD OF SITES VISITED ALLOWS FAVOURITE SITES TO BA ADDEDD

lESSON3 SECURITY ON THE INTERNET


COLLECTING INFORMATION

The sites you are visited obtain information about you and can place files on your computer called (cookies) You can block all or some cookies from internet options privacy Temporary internet files (Cash): stored on your computer see them from internet options general
You can delete cookies or temporary internet files to increase free space on your hard disk

Protected sites : sites cannot be visited without username and password

lESSON3 SECURITY ON THE INTERNET-2


Encryption Encoding of data to prevent unauthorized access to data digital certification: are electronic files that act like a kind of online passport

Malware ( Viruses )
Worms : self replication program Trojan horse : appear to do one thing , but it reality does another Spyware : software installed without your knowledge

Unti-virus software Keep it updated Install firewall )A security software designed to protect networks against external threats such as hackers)
Secure shopping
Secure server : pages identify by small padlock symbol on the status bar and https:// instead of http://,

https://ebanking.ithmaarbank.com/RetailBank/

Parental control
Physical supervising
Restrict time spend on the net Restrict their browsing

Commercial software
Restrict access to sites Restrict chat room access

PHSHING SOME ONE TRYING TO KNOW YOURE USER NAME AND PASSWORD OR YOURE CARD ID NUMBER IN THE NET.

CONNETING TO INTERNET
DIAL UP NEED MODEM THROW PHONE LINE NEED USERNAME AND PASSWORD NORMAL CALLS NOT POSSIBLE WHILE THE INTERNET IS BEGIN USED BROADBAND ALWAYS CONNECTION WE CAN USE CALLS WITH INTERNET IN THE SAME TIME

HELP
SEARCH ABOUT VIRUS

Service Or Protocol : The first part of the URL such as HTTP or FTP. Host: The second part of the URL is the server internet address Folder and file structure: The last part of the URL details

FAIVARATE

ADRESS BAR

REFRESH

STOP

LIVE SEARCH

Section 5
Understanding Electronic Messaging and Related Issues Using online help Changing the Screen Display Close Out look

Netiquette (Network Etiquette)


Always use accurate and brief Subject When replying, Make sure the subject is still relevant to your reply Keep messages brief and relevant Ask before sending large attachments Dont send heated messages Dont use UPPERCASE

Netiquette (Network Etiquette)


Consider the implications very carefully, before sending any sensitive information. Familiarize yourself with the email policy. Check spelling before sending