Computer Literacy for IC3 Unit 3 - John Preston, Sally Preston, Robert Ferrett

Computer Literacy for IC3 Unit 3

Living Online
Buch | Spiralbindung
320 Seiten
2009
Pearson (Verlag)
978-0-13-506499-3 (ISBN)
54,45 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Written to provide all readers with an opportunity to learn and demonstrate computer and Internet literacy.

Computer Literary for IC3 was written to align with a certification called “Internet and Computing Core Certification (IC3)”.  This certification is for users who want to demonstrate critical computer and Internet skills valued in today’s academic and professional environments.  The Computer Literacy for IC3 text is written to meet the certification standards and provide readers with a broad understanding of the key components of computer literacy in order to prepare for the exam.

This certification has 3 units:
•    Unit 1:  Computing Fundamentals (computer concepts)
•    Unit 2:  Using Productivity Software
•    Unit 3:  Living Online (the Internet)

Each of these units is available as a separate Computer Literacy for IC3 text. This text contains: Unit 1: Computing Fundamentals and covers basic computer concepts including computer hardware, computer software, and using an operating system.

The second edition of Computer Literacy for IC3 has been revised to keep up with the IC3 program’s evolution, which reflects the recent changes in computers and technology. Instead of publishing one large, comprehensive text, the three units are now available as separate, smaller texts.

Robert L. Ferrett recently retired as Director of the Center for Instructional Computing at Eastern Michigan University, where he provided computer training and support to faculty.  He has authored or co-authored more than 80 books on Access, PowerPoint, Excel, Publisher, Windows Vista, WordPerfect, and Word.  He has been designing, developing, and delivering computer workshops for nearly two decades.  Bob has written for the GO! Series, and was a series editor for the Learn 97, Learn 2000, and Learn XP books.  He has a BA in Psychology, an MS in Geography, and an MS in Interdisciplinary Technology from Eastern Michigan University.  His doctoral studies are in Instructional Technology at Wayne State University.  As a sidelight, Bob teaches a four-week Computers and Genealogy class, and has written genealogy and local history books.   Sally Preston teaches computing in a variety of settings, which provides her with ample opportunity to observe how people learn, what works best, and what challenges are present when learning a new software program.  The diverse experience provides a complementary set of skills and knowledge that is blended into her writing.  Sally has been writing computer textbooks for nearly ten years and has authored books for the GO! Series, the Learn Series, and for theEssential Series.  Sally has an MBA from Eastern Michigan University.  When she is away from her computer she is often found planting flowers in her garden.   John Preston is an Associate Professor at Eastern Michigan University in the College of Technology in the Technology Management program. He has been teaching, writing, and designing computer courses since the advent of PCs, and has authored and co-authored more than sixty books on computer applications and the relationship between technology and society. He teaches courses in global technologies, managing information systems, project management, and quantitative reasoning. He served as program coordinator of the Energy Management program and has trained commercial energy auditors for all of the major utilities in Michigan. Prior to his tenure at EMU, he was a partner in an energy management consulting firm.

Unit 3 Living Online
Chapter 1: Understanding the Internet
Lesson 1: Survivable Communications
    Topic 1 How traditional phone systems work [network of connected networks] (1.1.4)
    Topic 2 Need for a system that could survive a nuclear war
    Topic 3 How packet switching works (TCP/IP) (
    Topic 4 Birth of the Internet to connect military and university research centers (1.1.2)
Lesson 2: Networks of Computers
    Topic 1 Relationships between Computers (LAN, peer-to-peer, servers and clients) (1.1.3) (1.1.1, 1.1.2)
    Topic 2 Connecting computers [node, Ethernet, fiber optic, wireless] (1.1.1,
    Topic 4 Wide Area Networks (WAN) (1.1.2)
    Topic 5 Connecting networks to networks [gateways, "super network?] (1.1.1, 1.1.4)
    Topic 6 World-wide naming system, Universal Resource Locator (URL) (3.1.1, 3.1.2
    Topic 6 Role of domain names, domain name servers (2.1.2)
    Topic 7 Nodes-gateways (routers, through put) and hosts (end points)
    Topic 8 Main connections between nodes [backbone, telephone companies, microwave, satellite, undersea fiber optic]
    Topic 9 Benefits and risks (1.1.6, 1.1.7)
Lesson 3: Birth of the World Wide Web
    Topic 1 Researcher writes code that works on all computers-Hypertext Markup Language (HTML) [HyperText Transfer Protocol, HTTP] (3.1.1)
    Topic 2 Web browsers - Mozilla, Netscape, and Internet Explorer make it popular [Web site, Web page, Home Page] (3.1.1)
    Topic 3 Relationship between WWW and the Internet
    Topic 1 Types of Web sites [commercial, academic, organizations, government, military] and country extensions (3.1.3)
Lesson 4: Joining the World Wide Web
    Topic 1 Gateway computers - onramp to the Internet [domains] (1.1.4)
    Topic 2 Internet Service Providers (ISP) provide onramp service for individuals [host domains]
    Topic 3 Connection speeds [bits, bytes, bits per second, bytes per second, prefixes kilo, mega, giga, tera, broadband] (1.1.1)
    Topic 4 Connecting to an ISP via the telephone company [dial-up, DSL, modem, T1, Fiber Optic, cell phone cellular broadband, G3] (1.1.5)
    Topic 5 Connecting to an ISP via the cable television company [co-axial cable, cable modem] (1.1.5)
    Topic 6 Connecting to an ISP via Wireless radio [antenna, dead zones] (1.1.5)
    Topic 7 Connecting to an ISP via satellite link (dish antenna)
Lesson 5: Control and Financing of the Internet
    Topic 1 Government turns over management to private industry
    Topic 2 Role of telephone companies
    Topic 3 How companies charge for service
    Topic 4 Control of domain names
    Topic 5 Taxation
Lesson 6: Security, Privacy, and Ethics
    Topic 1 Network admin code of ethics
    Topic 2 Firewalls (1.1.1)
    Topic 3 Encryption and Virtual Private Networks (VPN) [HTTPS] (3.1.1)
    Topic 4 Network security [Login, authentication (1.1.1, 1.1.8)
    Topic 5 Intranets (1.1.2)
Chapter 2: Gathering Information Online
Lesson 1: Using a Web Browser
    Topic 1 Functions of a Web Browser, navigating the Web [URL or IP address, Forward and Back, Home page, (3.1.4)
    Topic 2 Elements of a Web site [text, graphics, text links, graphic links, buttons/menus/check boxes] (3.1.2, 3.1.4, 3.2.2)
    Topic 3 Domain names by country and function (3.1.4)
    Topic 4 Storing Web pages for quick access [cache, refresh] (3.1.1, 3.1.5)
    Topic 5 History of pages visited (3.1.6)
    Topic 6 Modifying browser settings [Plug-ins, home page (3.1.11)
    Topic 7 Typical problems [page not found, slow loading, parts don't work because plug-in doesn't work or is too old, garbled page content] (3.1.12)
Lesson 2: Searching for Information
    Topic 1 Web crawlers and search engines (3.2.2)
    Topic 2 Classification strategies [indexes, link lists, blogrolls] (3.2.2,
    Topic 3 Keyword searches (3.2.3)
    Topic 4 Using advanced search options [Boolean, refining a search] (3.2.4)
    Topic 5 Finding words on a Web page [Ctrl+F] (3.1.7)
Lesson 3: Managing Information from a Web Site
    Topic 1 Bookmark favorite sites and manage bookmarks (3.1.8)
    Topic 2 Copy information from a Web site (3.1.9)
    Topic 3 Download a file (3.1.10)
Lesson 4: Creating and Hosting a Web Page
    Topic 1 Popular software suites save documents, spreadsheets, and presentations as Web Pages (3.2.1)
    Topic 2 Viewing source code
    Topic 3 Web page design software (3.2.1)
    Topic 4 Hosting Web pages on a server
Lesson 5: Safety, Privacy, and Ethics
    Topic 1 Citing sources (3.2.7); Intellectual property rights [copyright, trademark, fair use, patent, (3.2.7)
    Topic 2 Identifying issues affecting quality of information [relevance, reliability, validity, bias, sufficiency] (3.2.5); Methods of evaluating quality] [analyzing source, communicate with creator of site, analyze links within site, search engine rank, compare to "offline" sources (3.2.6)
    Topic 3 Ethical Search Engine practices; Identifying sponsored sites; Increasing a page's search ranking [webring, link lists
    Topic 4 Blocking Web sites by individuals and by governments and blocking Pop-Up ads
    Topic 5 Respect others [privacy, opinions,] Avoid [libel, harassment, offensive content, inappropriate content for children,] Responsible [factual content, opinions supported by fact, informal content appropriate to audience] (3.2.7)
Chapter 3: Buying, Selling, and Banking Online
Lesson 1: Online Banking and Making Payments
    Topic 1 Money as digits, and international currencies (4.1.3)
    Topic 2 Transferring funds (4.1.2)
    Topic 3 Banking at Automated Tellers (4.1.2)
    Topic 4 Secure payments using public key encryption (3.1.1) (4.2.7)
    Topic 5 Digital signatures, Secure vs. unsecure sites
    Topic 6 Banking Online (4.1.2)
Lesson 2: Buying from Businesses Online
    Topic 1 Buying Unusual Items Online
    Topic 2 Typical Online Store Web Site; Content of site - product description, simulations (3.1.3)
    Topic 2 Identifying customers with cookies (3.1.1)
    Topic 3 Taking an order online (4.1.2) (4.1.3) (4.1.4)
    Topic 4 Paying (4.1.2)
    Topic 5 Delivery (4.1.2)
    Topic 6 Returns and customer service (4.1.2)
    Topic 7 Evaluating quality (3.2.6)
Lesson 3: Businesses Buying from Businesses Online
    Topic 1 B2B using EDI
    Topic 2 Extranets, VPN
    Topic 3 Auctions and reverse auctions (3.1.3) (4.1.1)
    Topic 4 Value-added services and disintermediation (3.1.3) (4.1.1)
Lesson 4: Consumer to Consumer
    Topic 1 Auctions - eBay (4.1.3) (4.1.4)
    Topic 2 Classifieds - Craig's List (4.1.3)
    Topic 3 Self Publishing and Print on Demand
    Topic 4 Storefront software
    Topic 5 Evaluating quality (3.2.6)
Lesson 5: Security, Privacy, and Ethics
    Topic 1 Fraud by sellers and buyers , phishing(4.2.5)
    Topic 2 Avoiding unwanted e-mail and telephone calls
    Topic 3 Customer profiling and cookies
    Topic 4 Identify hazards of electronic commerce (4.2.7)
    Topic 5 Set security levels (3.1.11)
Chapter 4: Communicating Online
Lesson 1: E-mail
    Topic 1 Accessing e-mail
         E-mail addresses (2.1.2), Web mail - Gmail, (2.1.4), Mail clients - Outlook, Lotus Notes (2.1.4), cell phones, wireless devices (Blackberry) (2.1.4)
    Topic 2 Components of an e-mail [Address, subject line, body, attachments] (2.1.5)
    Topic 3 Composing, viewing, reading, sending, forwarding, copying E-mail [Reply, Reply All, HTML vs text] (2.2.1, 2.2.7)
    Topic 4 Supplementing e-mail [attachments, URLs, graphics, emoticons] (2.2.3)
    Topic 5 Managing attachments [saving, opening, deleting] (2.2.4)
Lesson 2: Synchronous Communications
    Topic 1 Instant Messaging, Unique address
    Topic 2 Typical features
    Topic 3 Services - AOL, MSN, Yahoo,
`    Topic 4 Texting (2.1.1), Identification by telephone number (2.1.3)
    Topic 5 Voice over IP (2.1.1)
    Topic 6 Video calls [Skype]
Lesson 3: Advantages and Disadvantages
    Topic 1 Advantages of electronic communication [speed, cost, routing, collaboration, multimedia, paper trail] (2.3.1)
    Topic 2 Share resources - documents, printers, copiers (2.3.1)
    Topic 3 Common problems with e-mail; blocked attachments (2.3.2)
`    Topic 4 Common problems with direct communications; lack of paper trail (2.3.2)
Lesson 4: Asynchronous Communications
    Topic 1 e-mail lists
    Topic 2 online college courses
    Topic 3 message boards
    Topic 4 Web logs [blogs] (3.2.1)
    Topic 5 Video sharing [Utube]
    Topic 6 Podcasts
Lesson 5: Group Communications
Read http://fwk.enpraxis.net/catalog/additional-book-5/chapter-4.
    Topic 1 Wiki (3.2.1)
    Topic 2 Open source software
    Topic 3 Virtual communities [Second Life] (3.2.1)
Lesson 6: Security, Privacy, and Ethics
    Topic 1 Methods of identification - URL, phone number, User ID (2.1.3)
    Topic 2 How dangerous programs enter a computer, Scanning e-mail attachments (2.3.7, 4.2.4)
    Topic 3 Hoaxes, Junk mail, viruses, worms [anti-virus software], (4.2.4) Spoofing (4.2.5)
    Topic 4 Filtering unsolicited mail by ISP, user (2.3.6)
    Topic 5 Tactics to limit unsolicited mail, laws related to SPAM (2.3.6)
    Topic 6 Avoid hasty messages or responses (2.3.7)
    Topic 7 Company and school policies regarding e-mail (2.3.7)
    Topic 8 E-mail encryption (2.3.7)
    Topic 9 Ownership of content
Chapter 5: Working Online
Lesson 1: E-mail management
    Topic 1 Managing e-mail [inbox, sorting, searching, folders, marking, saving, deleting, archiving, forwarding, blocking, out-of-office, signature] (2.2.2, 2.2.5, 2.2.7)
    Topic 2 Managing addresses [address book, mailing lists] (2.2.6)
Lesson 2: Proper Use of Communications
    Topic 1 Confusion between professional and informal communications (2.3.2)
    Topic 2 Match mode to method; IM for quick informal, e-mail for paper trail, non-electronic for legal documents with signatures (2.3.3)
    Topic 3 Elements of professional electronic communications [quick response, brevity, directness, spelling and grammar, choice of recipients and replies, appropriate level of formality] (2.3.4)
    Topic 4 Appropriate use of attachments [size, use URLs instead of copies, problems with some readers] (2.3.5)
    Topic 5 Backup and archive regularly
Lesson 3: Working in Teams
    Topic 1 coordinating schedules
    Topic 2 sharing documents
    Topic 3 Video conferencing
    Topic 4 Project management
Lesson 4: Web Based Applications
        Topic 1 Word processing, spreadsheets [Google Docs] (3.1.3)
        Topic 2 Project management [Open Project]
        Topic 3 Creating content using Web design software (3.2.1)
Lesson 5: Security, Privacy, and Ethics
    Topic 1 Safety in the workplace [electrical, air circulation, cables] (4.2.1)
    Topic 2 Ergonomics [repetitive motion disorder, back, eye, seating, lighting, wrist support] (4.2.2)
    Topic 3 Risks to data [theft, penetration by hackers, failure of storage media, backup practices] (4.2.3)
    Topic 4 Anti-virus policies and procedures (4.2.4)
    Topic 7 Principles for considering data personal (4.2.6)
Chapter 6: Identifying Technology Convergence and Its Social Impact
Lesson 1: Cell Phones, GPS, Cable TV, and the Internet
    Topic 1 How cell phones work
    Topic 2 Global positioning systems (GPS)
    Topic 3 Internet connection, browsers
    Topic 4 Cross-platform software - Hypertext eXtensible Markup Language (HXML)
    Topic 5 Multi-function phones and Personal Digital Assistant (PDA)
    Topic 6 Cable television, Internet Service, Voice Over IP (VOIP)
Lesson 2: How Computers are Used in Work, School, and Home
    Topic 1 Uses of computers (4.1.1)
    Topic 2 Technology and processes "behind the scenes" (4.1.2)
    Topic 3 Transformed traditional processes (4.1.3)
    Topic 4 Help disabled and disadvantaged (4.1.4)
Lesson 3: Risks
    Topic 1 Risks to personal and organizational data (4.2.3, 4.2.5)
    Topic 2 Software threats [viruses, worms] (4.3.4)
    Topic 3 Reasons for restricting access [important data, children] (4.2.5)
    Topic 4 Restricting access using technical and non-technical means [security and filtering software, parent/teacher supervision] (4.2.5)
Lesson 4: Prudent Practices
    Topic 1 Practices to protect against infections [anti-virus software, following procedures, updating] (4.2.4)
    Topic 2 Keep anti-virus software up-to-date (4.2.4)
    Topic 3 Following procedures for identifying, isolating, and removing infected files (4.2.4)
    Topic 4 How to stay informed of virus threats and new developments (4.2.4, 4.2.10)
    Topic 5 How to protect privacy [cookies, not sharing personal or family information, using aliases in public forums] (4.2.8)
    Topic 6 Use technical and non-technical means to restrict inappropriate access [children, adult sites at work] (4.2.5)
    Topic 7 Ergonomics [repetitive motion, back, eye, seating] (4.2.2)
Lesson 5: Responsible Practices
    Topic 1 How to find rules, laws, and policies at school and work (4.2.9)
    Topic 2 Recycling [paper, ink and toner cartridges, hardware] and donations (4.2.11)
    Topic 3 Share your knowledge and experience with others (4.2.11)

Erscheint lt. Verlag 6.8.2009
Sprache englisch
Maße 275 x 229 mm
Gewicht 590 g
Themenwelt Mathematik / Informatik Informatik
ISBN-10 0-13-506499-6 / 0135064996
ISBN-13 978-0-13-506499-3 / 9780135064993
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
leichter Einstieg für Senioren

von Philip Kiefer

Buch | Softcover (2024)
Markt + Technik Verlag
9,95