Sunday, December 7, 2008

Tutorial 10

Tutorial 10 was about electronic commerce, doing business on the internet. This tutorial had to do with being able to have and sell a product through the internet. Also these chapters talked about dealing with customers and have a business model that would sell your product and bring in positive revenue. Another topic talked about was advertising on the internet and being able to market to different customers. If you wanted to target your product to younger kids, myspace or facebook would be a great place to market or advertise a product.

Sunday, November 30, 2008

Tutorial 9

Tutorial 9 is about security on the internet and the web. The tutorial starts off by talking about different types of security like physical and logical, and the different measures you can take to secure not only your computer but also your identity. Crackers are usually programmers that use their skills to obtain unauthorized entry into computers and networks. They are usually out to obtain information like credit card numbers, addresses, and others forms of people’s identities. Identity theft occurs when someone like a hacker obtains your social security number, credit card numbers, passwords, or date of birth with out permission and then use the information to purchase items, open bank accounts, or get new credit cards.

Sunday, November 16, 2008

Tutorial 8

In the beginning of Tutorial 8, it talks a great deal about markup languages and the most common of those markup languages known as HTML. HTML is the language a browser uses to interpret and display content of a website. The book also talks a little bit about planning and creating an HTML document so you will be able to publish it online. Also once you create it, how you can add certain images and designs to make your document unique. I recently discovered what the difference between raster and vector graphics was when my team tried to have some jerseys made. We took a raster type image and the t-shirt maker was unable to use our design unless we had a vector style graphic.

Sunday, October 26, 2008

Tutorial 7

In tutorial seven, the book starts off by talking about the unique way of sharing information known as a mailing list. A mailing list is a list of names and email addresses for a group of people who share a common interest in a subject of topic and exchange information by subscribing to the list. Mailing lists are not like the list of contacts you have with your email, but a way to ask a question or suggestion that gets forwarded by a server to subscribers of the list. Another popular user subscribed feature is a podcast. A podcast is a subscription audio broadcast that is created and stored in a digital format on the internet. Podcast became widely popular with the creation of the iPod.

Sunday, October 19, 2008

Tutorial 6

Chatting over the internet, helped revolutionize the internet to what is today. It allowed you to have a conversation with somebody in real time with out having to actually communicate verbally with them. It also made it easier for you to talk to somebody far away with out having to pay for long distance. Chat rooms are usually on websites that allow you to talk with people and allow you to have discussions on specific topics. They are usually easier to use because they do not require you to download software in order to use it. You usually just need an account with the site. Another site that helped reshape the internet and communication over it, was myspace. It allows you to connect with old friends and class mates and offers all the essential communication tools in one place.

Sunday, October 5, 2008

Tutorial 5

Tutorial 5, a tutorial I believe most people know about and are experts about it. I think every single person who owns a computer and has an internet connection has downloaded a file more than once in their life. Downloading is major piece to why people begin surfing the web and using computers. Be it downloading pictures, games, or music, many many people know how to do it. When downloading and storing on your computer a good anti virus is key. It can protect you from harmful downloads and let you know when a download could potentially hurt your computer.

Sunday, September 28, 2008

Tutorial 4

This tutorial begins with the discussion about finding information with in a specific time line and being able to use advanced search engines as well as using specific search engines. For example they talk about if you are going on a trip and need directions, well knowing the advanced features of certain search engines then you would be able to locate where you are going and how long it will take you. One example is Google maps. Later in the tutorial the book talks about the service known as turnitin.com, and how it can detect plagiarism from the millions of papers it has in its data base. The book also talks about how to cite a website and use web pages that make it easier to cite.