Sunday, December 7, 2008

Tutorial 10

Tutorial 10 was about electronic commerce, doing business on the internet. This tutorial had to do with being able to have and sell a product through the internet. Also these chapters talked about dealing with customers and have a business model that would sell your product and bring in positive revenue. Another topic talked about was advertising on the internet and being able to market to different customers. If you wanted to target your product to younger kids, myspace or facebook would be a great place to market or advertise a product.

Sunday, November 30, 2008

Tutorial 9

Tutorial 9 is about security on the internet and the web. The tutorial starts off by talking about different types of security like physical and logical, and the different measures you can take to secure not only your computer but also your identity. Crackers are usually programmers that use their skills to obtain unauthorized entry into computers and networks. They are usually out to obtain information like credit card numbers, addresses, and others forms of people’s identities. Identity theft occurs when someone like a hacker obtains your social security number, credit card numbers, passwords, or date of birth with out permission and then use the information to purchase items, open bank accounts, or get new credit cards.

Sunday, November 16, 2008

Tutorial 8

In the beginning of Tutorial 8, it talks a great deal about markup languages and the most common of those markup languages known as HTML. HTML is the language a browser uses to interpret and display content of a website. The book also talks a little bit about planning and creating an HTML document so you will be able to publish it online. Also once you create it, how you can add certain images and designs to make your document unique. I recently discovered what the difference between raster and vector graphics was when my team tried to have some jerseys made. We took a raster type image and the t-shirt maker was unable to use our design unless we had a vector style graphic.

Sunday, October 26, 2008

Tutorial 7

In tutorial seven, the book starts off by talking about the unique way of sharing information known as a mailing list. A mailing list is a list of names and email addresses for a group of people who share a common interest in a subject of topic and exchange information by subscribing to the list. Mailing lists are not like the list of contacts you have with your email, but a way to ask a question or suggestion that gets forwarded by a server to subscribers of the list. Another popular user subscribed feature is a podcast. A podcast is a subscription audio broadcast that is created and stored in a digital format on the internet. Podcast became widely popular with the creation of the iPod.

Sunday, October 19, 2008

Tutorial 6

Chatting over the internet, helped revolutionize the internet to what is today. It allowed you to have a conversation with somebody in real time with out having to actually communicate verbally with them. It also made it easier for you to talk to somebody far away with out having to pay for long distance. Chat rooms are usually on websites that allow you to talk with people and allow you to have discussions on specific topics. They are usually easier to use because they do not require you to download software in order to use it. You usually just need an account with the site. Another site that helped reshape the internet and communication over it, was myspace. It allows you to connect with old friends and class mates and offers all the essential communication tools in one place.

Sunday, October 5, 2008

Tutorial 5

Tutorial 5, a tutorial I believe most people know about and are experts about it. I think every single person who owns a computer and has an internet connection has downloaded a file more than once in their life. Downloading is major piece to why people begin surfing the web and using computers. Be it downloading pictures, games, or music, many many people know how to do it. When downloading and storing on your computer a good anti virus is key. It can protect you from harmful downloads and let you know when a download could potentially hurt your computer.

Sunday, September 28, 2008

Tutorial 4

This tutorial begins with the discussion about finding information with in a specific time line and being able to use advanced search engines as well as using specific search engines. For example they talk about if you are going on a trip and need directions, well knowing the advanced features of certain search engines then you would be able to locate where you are going and how long it will take you. One example is Google maps. Later in the tutorial the book talks about the service known as turnitin.com, and how it can detect plagiarism from the millions of papers it has in its data base. The book also talks about how to cite a website and use web pages that make it easier to cite.

Sunday, September 14, 2008

Tutorial 2 and 3

Tutorial two and tutorial three continue on with learning about the internet and how to communicate with it. Email is the topic for tutorial two. It breaks the whole process down so you are able to grasp the concept and know exactly what to do. An interesting thing that I learned about was the whole “Netiquette” phrase. I had no idea that there were accepted rules for proper behavior on the internet. Tutorial 3 is about using search engines and how to properly enter a search term that will bring you back the maximum result. Another thing that was learned in this tutorial was the wildcard character. I had never heard of that before but thought that was pretty cool that you can perform multiple searches with the same word.

Sunday, September 7, 2008

Tutorial 1

In our assignment for tutorial one, we had to do some research on different internet browsers and try to figure out which one was the best out there. It is hard to differentiate and choose between all the internet browsers out there. Another big thing I learned was the extent that cookies use on your computer. I never knew that they could research you and find out what your email is and other personal information. But cookies also have their benefits for your own home use. They can store info on your favorite sites and make searching the web a lot easier.

Sunday, August 31, 2008

Appendix A

In appendix A, we first learned about how and why the internet got started.From the internet’s first days to dial up to now the more frequent broadband.How the military used this unique method to stay connected with other military outposts and also to communicate.Appendix A also talked much about the hardware one needs to be able to connect to the internet, such as the cables, modems.Also about the different networks that can be setup in an office or even your own home, allowing you to easily communicate with employees or other family members.What I found interesting about the appendix a is the use of the internet first by the military.