Computer Literacy for IC3 Unit 3: Living Online / Edition 2

Other Format (Print)
Rent from
(Save 75%)
Est. Return Date: 03/28/2015
Buy Used
Buy Used from
(Save 40%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Other Format)
  • All (30) from $1.99   
  • New (3) from $4.60   
  • Used (27) from $1.99   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2008

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

2009-04-06 Spiral-bound New U.S. Students softcover unit 3 edition light corner bump new condition no supplements ships today/tonight quicker shipper w. tracking # expedited ... shipping available. Read more Show Less

Ships from: Denham Springs, LA

Usually ships in 1-2 business days

  • Canadian
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Seller since 2010

Feedback rating:


Condition: New
U.S. Students softcover unit 3 edition light corner bump new condition no supplements ships today/tonight quicker shipper w. tracking # expedited shipping available

Ships from: Denham Springs, LA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Seller since 2015

Feedback rating:


Condition: New
0135064996 WE HAVE NUMEROUS COPIES - SPIRAL BOUND, light shelf wear and handling marks to cover/edges/corners

Ships from: tempe, AZ

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by


Written to provide all readers with an opportunity to learn and demonstrate computer and Internet literacy.

Computer Literary for IC3
was written to align with a certification called “Internet and Computing Core Certification (IC3)”. This certification is for users who want to demonstrate critical computer and Internet skills valued in today’s academic and professional environments. The Computer Literacy for IC3 text is written to meet the certification standards and provide readers with a broad understanding of the key components of computer literacy in order to prepare for the exam.

This certification has 3 units:
• Unit 1: Computing Fundamentals (computer concepts)
• Unit 2: Using Productivity Software
• Unit 3: Living Online (the Internet)

Each of these units is available as a separate Computer Literacy for IC3 text. This text contains: Unit 1: Computing Fundamentals and covers basic computer concepts including computer hardware, computer software, and using an operating system.

The second edition of Computer Literacy for IC3 has been revised to keep up with the IC3 program’s evolution, which reflects the recent changes in computers and technology. Instead of publishing one large, comprehensive text, the three units are now available as separate, smaller texts.

Read More Show Less

Product Details

Meet the Author

Robert L. Ferrett recently retired as Director of the Center for Instructional Computing at Eastern Michigan University, where he provided computer training and support to faculty. He has authored or co-authored more than 80 books on Access, PowerPoint, Excel, Publisher, Windows Vista, WordPerfect, and Word. He has been designing, developing, and delivering computer workshops for nearly two decades. Bob has written for the GO! Series, and was a series editor for the Learn 97, Learn 2000, and Learn XP books. He has a BA in Psychology, an MS in Geography, and an MS in Interdisciplinary Technology from Eastern Michigan University. His doctoral studies are in Instructional Technology at Wayne State University. As a sidelight, Bob teaches a four-week Computers and Genealogy class, and has written genealogy and local history books.

Sally Preston teaches computing in a variety of settings, which provides her with ample opportunity to observe how people learn, what works best, and what challenges are present when learning a new software program. The diverse experience provides a complementary set of skills and knowledge that is blended into her writing. Sally has been writing computer textbooks for nearly ten years and has authored books for the GO! Series, the Learn Series, and for the Essential Series. Sally has an MBA from Eastern Michigan University. When she is away from her computer she is often found planting flowers in her garden.

John Preston is an Associate Professor at Eastern Michigan University in the College of Technology in the Technology Management program. He has been teaching, writing, and designing computer courses since the advent of PCs, and has authored and co-authored more than sixty books on computer applications and the relationship between technology and society. He teaches courses in global technologies, managing information systems, project management, and quantitative reasoning. He served as program coordinator of the Energy Management program and has trained commercial energy auditors for all of the major utilities in Michigan. Prior to his tenure at EMU, he was a partner in an energy management consulting firm.

Read More Show Less

Table of Contents

Unit 3 Living Online
Chapter 1: Understanding the Internet
Lesson 1: Survivable Communications
Topic 1 How traditional phone systems work [network of connected networks] (1.1.4)
Topic 2 Need for a system that could survive a nuclear war
Topic 3 How packet switching works (TCP/IP) (
Topic 4 Birth of the Internet to connect military and university research centers (1.1.2)
Lesson 2: Networks of Computers
Topic 1 Relationships between Computers (LAN, peer-to-peer, servers and clients) (1.1.3) (1.1.1, 1.1.2)
Topic 2 Connecting computers [node, Ethernet, fiber optic, wireless] (1.1.1,
Topic 4 Wide Area Networks (WAN) (1.1.2)
Topic 5 Connecting networks to networks [gateways, "super network?] (1.1.1, 1.1.4)
Topic 6 World-wide naming system, Universal Resource Locator (URL) (3.1.1, 3.1.2
Topic 6 Role of domain names, domain name servers (2.1.2)
Topic 7 Nodes-gateways (routers, through put) and hosts (end points)
Topic 8 Main connections between nodes [backbone, telephone companies, microwave, satellite, undersea fiber optic]
Topic 9 Benefits and risks (1.1.6, 1.1.7)
Lesson 3: Birth of the World Wide Web
Topic 1 Researcher writes code that works on all computers-Hypertext Markup Language (HTML) [HyperText Transfer Protocol, HTTP] (3.1.1)
Topic 2 Web browsers - Mozilla, Netscape, and Internet Explorer make it popular [Web site, Web page, Home Page] (3.1.1)
Topic 3 Relationship between WWW and the Internet
Topic 1 Types of Web sites [commercial, academic, organizations, government, military] and country extensions (3.1.3)
Lesson 4: Joining the World Wide Web
Topic 1 Gateway computers - onramp to the Internet [domains] (1.1.4)
Topic 2 Internet Service Providers (ISP) provide onramp service for individuals [host domains]
Topic 3 Connection speeds [bits, bytes, bits per second, bytes per second, prefixes kilo, mega, giga, tera, broadband] (1.1.1)
Topic 4 Connecting to an ISP via the telephone company [dial-up, DSL, modem, T1, Fiber Optic, cell phone cellular broadband, G3] (1.1.5)
Topic 5 Connecting to an ISP via the cable television company [co-axial cable, cable modem] (1.1.5)
Topic 6 Connecting to an ISP via Wireless radio [antenna, dead zones] (1.1.5)
Topic 7 Connecting to an ISP via satellite link (dish antenna)
Lesson 5: Control and Financing of the Internet
Topic 1 Government turns over management to private industry
Topic 2 Role of telephone companies
Topic 3 How companies charge for service
Topic 4 Control of domain names
Topic 5 Taxation
Lesson 6: Security, Privacy, and Ethics
Topic 1 Network admin code of ethics
Topic 2 Firewalls (1.1.1)
Topic 3 Encryption and Virtual Private Networks (VPN) [HTTPS] (3.1.1)
Topic 4 Network security [Login, authentication (1.1.1, 1.1.8)
Topic 5 Intranets (1.1.2)
Chapter 2: Gathering Information Online
Lesson 1: Using a Web Browser
Topic 1 Functions of a Web Browser, navigating the Web [URL or IP address, Forward and Back, Home page, (3.1.4)
Topic 2 Elements of a Web site [text, graphics, text links, graphic links, buttons/menus/check boxes] (3.1.2, 3.1.4, 3.2.2)
Topic 3 Domain names by country and function (3.1.4)
Topic 4 Storing Web pages for quick access [cache, refresh] (3.1.1, 3.1.5)
Topic 5 History of pages visited (3.1.6)
Topic 6 Modifying browser settings [Plug-ins, home page (3.1.11)
Topic 7 Typical problems [page not found, slow loading, parts don't work because plug-in doesn't work or is too old, garbled page content] (3.1.12)
Lesson 2: Searching for Information
Topic 1 Web crawlers and search engines (3.2.2)
Topic 2 Classification strategies [indexes, link lists, blogrolls] (3.2.2,
Topic 3 Keyword searches (3.2.3)
Topic 4 Using advanced search options [Boolean, refining a search] (3.2.4)
Topic 5 Finding words on a Web page [Ctrl+F] (3.1.7)
Lesson 3: Managing Information from a Web Site
Topic 1 Bookmark favorite sites and manage bookmarks (3.1.8)
Topic 2 Copy information from a Web site (3.1.9)
Topic 3 Download a file (3.1.10)
Lesson 4: Creating and Hosting a Web Page
Topic 1 Popular software suites save documents, spreadsheets, and presentations as Web Pages (3.2.1)
Topic 2 Viewing source code
Topic 3 Web page design software (3.2.1)
Topic 4 Hosting Web pages on a server
Lesson 5: Safety, Privacy, and Ethics
Topic 1 Citing sources (3.2.7); Intellectual property rights [copyright, trademark, fair use, patent, (3.2.7)
Topic 2 Identifying issues affecting quality of information [relevance, reliability, validity, bias, sufficiency] (3.2.5); Methods of evaluating quality] [analyzing source, communicate with creator of site, analyze links within site, search engine rank, compare to "offline" sources (3.2.6)
Topic 3 Ethical Search Engine practices; Identifying sponsored sites; Increasing a page's search ranking [webring, link lists
Topic 4 Blocking Web sites by individuals and by governments and blocking Pop-Up ads
Topic 5 Respect others [privacy, opinions,] Avoid [libel, harassment, offensive content, inappropriate content for children,] Responsible [factual content, opinions supported by fact, informal content appropriate to audience] (3.2.7)
Chapter 3: Buying, Selling, and Banking Online
Lesson 1: Online Banking and Making Payments
Topic 1 Money as digits, and international currencies (4.1.3)
Topic 2 Transferring funds (4.1.2)
Topic 3 Banking at Automated Tellers (4.1.2)
Topic 4 Secure payments using public key encryption (3.1.1) (4.2.7)
Topic 5 Digital signatures, Secure vs. unsecure sites
Topic 6 Banking Online (4.1.2)
Lesson 2: Buying from Businesses Online
Topic 1 Buying Unusual Items Online
Topic 2 Typical Online Store Web Site; Content of site - product description, simulations (3.1.3)
Topic 2 Identifying customers with cookies (3.1.1)
Topic 3 Taking an order online (4.1.2) (4.1.3) (4.1.4)
Topic 4 Paying (4.1.2)
Topic 5 Delivery (4.1.2)
Topic 6 Returns and customer service (4.1.2)
Topic 7 Evaluating quality (3.2.6)
Lesson 3: Businesses Buying from Businesses Online
Topic 1 B2B using EDI
Topic 2 Extranets, VPN
Topic 3 Auctions and reverse auctions (3.1.3) (4.1.1)
Topic 4 Value-added services and disintermediation (3.1.3) (4.1.1)
Lesson 4: Consumer to Consumer
Topic 1 Auctions - eBay (4.1.3) (4.1.4)
Topic 2 Classifieds - Craig's List (4.1.3)
Topic 3 Self Publishing and Print on Demand
Topic 4 Storefront software
Topic 5 Evaluating quality (3.2.6)
Lesson 5: Security, Privacy, and Ethics
Topic 1 Fraud by sellers and buyers , phishing(4.2.5)
Topic 2 Avoiding unwanted e-mail and telephone calls
Topic 3 Customer profiling and cookies
Topic 4 Identify hazards of electronic commerce (4.2.7)
Topic 5 Set security levels (3.1.11)
Chapter 4: Communicating Online
Lesson 1: E-mail
Topic 1 Accessing e-mail
E-mail addresses (2.1.2), Web mail - Gmail, (2.1.4), Mail clients - Outlook, Lotus Notes (2.1.4), cell phones, wireless devices (Blackberry) (2.1.4)
Topic 2 Components of an e-mail [Address, subject line, body, attachments] (2.1.5)
Topic 3 Composing, viewing, reading, sending, forwarding, copying E-mail [Reply, Reply All, HTML vs text] (2.2.1, 2.2.7)
Topic 4 Supplementing e-mail [attachments, URLs, graphics, emoticons] (2.2.3)
Topic 5 Managing attachments [saving, opening, deleting] (2.2.4)
Lesson 2: Synchronous Communications
Topic 1 Instant Messaging, Unique address
Topic 2 Typical features
Topic 3 Services - AOL, MSN, Yahoo,
' Topic 4 Texting (2.1.1), Identification by telephone number (2.1.3)
Topic 5 Voice over IP (2.1.1)
Topic 6 Video calls [Skype]
Lesson 3: Advantages and Disadvantages
Topic 1 Advantages of electronic communication [speed, cost, routing, collaboration, multimedia, paper trail] (2.3.1)
Topic 2 Share resources - documents, printers, copiers (2.3.1)
Topic 3 Common problems with e-mail; blocked attachments (2.3.2)
' Topic 4 Common problems with direct communications; lack of paper trail (2.3.2)
Lesson 4: Asynchronous Communications
Topic 1 e-mail lists
Topic 2 online college courses
Topic 3 message boards
Topic 4 Web logs [blogs] (3.2.1)
Topic 5 Video sharing [Utube]
Topic 6 Podcasts
Lesson 5: Group Communications
Topic 1 Wiki (3.2.1)
Topic 2 Open source software
Topic 3 Virtual communities [Second Life] (3.2.1)
Lesson 6: Security, Privacy, and Ethics
Topic 1 Methods of identification - URL, phone number, User ID (2.1.3)
Topic 2 How dangerous programs enter a computer, Scanning e-mail attachments (2.3.7, 4.2.4)
Topic 3 Hoaxes, Junk mail, viruses, worms [anti-virus software], (4.2.4) Spoofing (4.2.5)
Topic 4 Filtering unsolicited mail by ISP, user (2.3.6)
Topic 5 Tactics to limit unsolicited mail, laws related to SPAM (2.3.6)
Topic 6 Avoid hasty messages or responses (2.3.7)
Topic 7 Company and school policies regarding e-mail (2.3.7)
Topic 8 E-mail encryption (2.3.7)
Topic 9 Ownership of content
Chapter 5: Working Online
Lesson 1: E-mail management
Topic 1 Managing e-mail [inbox, sorting, searching, folders, marking, saving, deleting, archiving, forwarding, blocking, out-of-office, signature] (2.2.2, 2.2.5, 2.2.7)
Topic 2 Managing addresses [address book, mailing lists] (2.2.6)
Lesson 2: Proper Use of Communications
Topic 1 Confusion between professional and informal communications (2.3.2)
Topic 2 Match mode to method; IM for quick informal, e-mail for paper trail, non-electronic for legal documents with signatures (2.3.3)
Topic 3 Elements of professional electronic communications [quick response, brevity, directness, spelling and grammar, choice of recipients and replies, appropriate level of formality] (2.3.4)
Topic 4 Appropriate use of attachments [size, use URLs instead of copies, problems with some readers] (2.3.5)
Topic 5 Backup and archive regularly
Lesson 3: Working in Teams
Topic 1 coordinating schedules
Topic 2 sharing documents
Topic 3 Video conferencing
Topic 4 Project management
Lesson 4: Web Based Applications
Topic 1 Word processing, spreadsheets [Google Docs] (3.1.3)
Topic 2 Project management [Open Project]
Topic 3 Creating content using Web design software (3.2.1)
Lesson 5: Security, Privacy, and Ethics
Topic 1 Safety in the workplace [electrical, air circulation, cables] (4.2.1)
Topic 2 Ergonomics [repetitive motion disorder, back, eye, seating, lighting, wrist support] (4.2.2)
Topic 3 Risks to data [theft, penetration by hackers, failure of storage media, backup practices] (4.2.3)
Topic 4 Anti-virus policies and procedures (4.2.4)
Topic 7 Principles for considering data personal (4.2.6)
Chapter 6: Identifying Technology Convergence and Its Social Impact
Lesson 1: Cell Phones, GPS, Cable TV, and the Internet
Topic 1 How cell phones work
Topic 2 Global positioning systems (GPS)
Topic 3 Internet connection, browsers
Topic 4 Cross-platform software - Hypertext eXtensible Markup Language (HXML)
Topic 5 Multi-function phones and Personal Digital Assistant (PDA)
Topic 6 Cable television, Internet Service, Voice Over IP (VOIP)
Lesson 2: How Computers are Used in Work, School, and Home
Topic 1 Uses of computers (4.1.1)
Topic 2 Technology and processes "behind the scenes" (4.1.2)
Topic 3 Transformed traditional processes (4.1.3)
Topic 4 Help disabled and disadvantaged (4.1.4)
Lesson 3: Risks
Topic 1 Risks to personal and organizational data (4.2.3, 4.2.5)
Topic 2 Software threats [viruses, worms] (4.3.4)
Topic 3 Reasons for restricting access [important data, children] (4.2.5)
Topic 4 Restricting access using technical and non-technical means [security and filtering software, parent/teacher supervision] (4.2.5)
Lesson 4: Prudent Practices
Topic 1 Practices to protect against infections [anti-virus software, following procedures, updating] (4.2.4)
Topic 2 Keep anti-virus software up-to-date (4.2.4)
Topic 3 Following procedures for identifying, isolating, and removing infected files (4.2.4)
Topic 4 How to stay informed of virus threats and new developments (4.2.4, 4.2.10)
Topic 5 How to protect privacy [cookies, not sharing personal or family information, using aliases in public forums] (4.2.8)
Topic 6 Use technical and non-technical means to restrict inappropriate access [children, adult sites at work] (4.2.5)
Topic 7 Ergonomics [repetitive motion, back, eye, seating] (4.2.2)
Lesson 5: Responsible Practices
Topic 1 How to find rules, laws, and policies at school and work (4.2.9)
Topic 2 Recycling [paper, ink and toner cartridges, hardware] and donations (4.2.11)
Topic 3 Share your knowledge and experience with others (4.2.11)
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)