Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Computer Literacy for IC3 Unit 3: Living Online / Edition 2

Computer Literacy for IC3 Unit 3: Living Online / Edition 2

by John Preston, Robert Ferrett, Sally Preston

See All Formats & Editions

ISBN-10: 0135064996

ISBN-13: 9780135064993

Pub. Date: 04/10/2009

Publisher: Prentice Hall

Written to provide all readers with an opportunity to learn and demonstrate computer and Internet literacy.

Computer Literary for IC3
was written to align with a certification called “Internet and Computing Core Certification (IC3)”. This certification is for users who want to demonstrate critical computer and Internet skills valued in


Written to provide all readers with an opportunity to learn and demonstrate computer and Internet literacy.

Computer Literary for IC3
was written to align with a certification called “Internet and Computing Core Certification (IC3)”. This certification is for users who want to demonstrate critical computer and Internet skills valued in today’s academic and professional environments. The Computer Literacy for IC3 text is written to meet the certification standards and provide readers with a broad understanding of the key components of computer literacy in order to prepare for the exam.

This certification has 3 units:
• Unit 1: Computing Fundamentals (computer concepts)
• Unit 2: Using Productivity Software
• Unit 3: Living Online (the Internet)

Each of these units is available as a separate Computer Literacy for IC3 text. This text contains: Unit 1: Computing Fundamentals and covers basic computer concepts including computer hardware, computer software, and using an operating system.

The second edition of Computer Literacy for IC3 has been revised to keep up with the IC3 program’s evolution, which reflects the recent changes in computers and technology. Instead of publishing one large, comprehensive text, the three units are now available as separate, smaller texts.

Product Details

Prentice Hall
Publication date:
Custom PHIT: the Pearson Custom Program for CIS Series
Edition description:
Older Edition
Product dimensions:
8.40(w) x 10.70(h) x 0.50(d)

Related Subjects

Table of Contents

Unit 3 Living Online
Chapter 1: Understanding the Internet
Lesson 1: Survivable Communications
Topic 1 How traditional phone systems work [network of connected networks] (1.1.4)
Topic 2 Need for a system that could survive a nuclear war
Topic 3 How packet switching works (TCP/IP) (
Topic 4 Birth of the Internet to connect military and university research centers (1.1.2)
Lesson 2: Networks of Computers
Topic 1 Relationships between Computers (LAN, peer-to-peer, servers and clients) (1.1.3) (1.1.1, 1.1.2)
Topic 2 Connecting computers [node, Ethernet, fiber optic, wireless] (1.1.1,
Topic 4 Wide Area Networks (WAN) (1.1.2)
Topic 5 Connecting networks to networks [gateways, "super network?] (1.1.1, 1.1.4)
Topic 6 World-wide naming system, Universal Resource Locator (URL) (3.1.1, 3.1.2
Topic 6 Role of domain names, domain name servers (2.1.2)
Topic 7 Nodes-gateways (routers, through put) and hosts (end points)
Topic 8 Main connections between nodes [backbone, telephone companies, microwave, satellite, undersea fiber optic]
Topic 9 Benefits and risks (1.1.6, 1.1.7)
Lesson 3: Birth of the World Wide Web
Topic 1 Researcher writes code that works on all computers-Hypertext Markup Language (HTML) [HyperText Transfer Protocol, HTTP] (3.1.1)
Topic 2 Web browsers - Mozilla, Netscape, and Internet Explorer make it popular [Web site, Web page, Home Page] (3.1.1)
Topic 3 Relationship between WWW and the Internet
Topic 1 Types of Web sites [commercial, academic, organizations, government, military] and country extensions (3.1.3)
Lesson 4: Joining the World Wide Web
Topic 1 Gateway computers - onramp to the Internet [domains] (1.1.4)
Topic 2 Internet Service Providers (ISP) provide onramp service for individuals [host domains]
Topic 3 Connection speeds [bits, bytes, bits per second, bytes per second, prefixes kilo, mega, giga, tera, broadband] (1.1.1)
Topic 4 Connecting to an ISP via the telephone company [dial-up, DSL, modem, T1, Fiber Optic, cell phone cellular broadband, G3] (1.1.5)
Topic 5 Connecting to an ISP via the cable television company [co-axial cable, cable modem] (1.1.5)
Topic 6 Connecting to an ISP via Wireless radio [antenna, dead zones] (1.1.5)
Topic 7 Connecting to an ISP via satellite link (dish antenna)
Lesson 5: Control and Financing of the Internet
Topic 1 Government turns over management to private industry
Topic 2 Role of telephone companies
Topic 3 How companies charge for service
Topic 4 Control of domain names
Topic 5 Taxation
Lesson 6: Security, Privacy, and Ethics
Topic 1 Network admin code of ethics
Topic 2 Firewalls (1.1.1)
Topic 3 Encryption and Virtual Private Networks (VPN) [HTTPS] (3.1.1)
Topic 4 Network security [Login, authentication (1.1.1, 1.1.8)
Topic 5 Intranets (1.1.2)
Chapter 2: Gathering Information Online
Lesson 1: Using a Web Browser
Topic 1 Functions of a Web Browser, navigating the Web [URL or IP address, Forward and Back, Home page, (3.1.4)
Topic 2 Elements of a Web site [text, graphics, text links, graphic links, buttons/menus/check boxes] (3.1.2, 3.1.4, 3.2.2)
Topic 3 Domain names by country and function (3.1.4)
Topic 4 Storing Web pages for quick access [cache, refresh] (3.1.1, 3.1.5)
Topic 5 History of pages visited (3.1.6)
Topic 6 Modifying browser settings [Plug-ins, home page (3.1.11)
Topic 7 Typical problems [page not found, slow loading, parts don't work because plug-in doesn't work or is too old, garbled page content] (3.1.12)
Lesson 2: Searching for Information
Topic 1 Web crawlers and search engines (3.2.2)
Topic 2 Classification strategies [indexes, link lists, blogrolls] (3.2.2,
Topic 3 Keyword searches (3.2.3)
Topic 4 Using advanced search options [Boolean, refining a search] (3.2.4)
Topic 5 Finding words on a Web page [Ctrl+F] (3.1.7)
Lesson 3: Managing Information from a Web Site
Topic 1 Bookmark favorite sites and manage bookmarks (3.1.8)
Topic 2 Copy information from a Web site (3.1.9)
Topic 3 Download a file (3.1.10)
Lesson 4: Creating and Hosting a Web Page
Topic 1 Popular software suites save documents, spreadsheets, and presentations as Web Pages (3.2.1)
Topic 2 Viewing source code
Topic 3 Web page design software (3.2.1)
Topic 4 Hosting Web pages on a server
Lesson 5: Safety, Privacy, and Ethics
Topic 1 Citing sources (3.2.7); Intellectual property rights [copyright, trademark, fair use, patent, (3.2.7)
Topic 2 Identifying issues affecting quality of information [relevance, reliability, validity, bias, sufficiency] (3.2.5); Methods of evaluating quality] [analyzing source, communicate with creator of site, analyze links within site, search engine rank, compare to "offline" sources (3.2.6)
Topic 3 Ethical Search Engine practices; Identifying sponsored sites; Increasing a page's search ranking [webring, link lists
Topic 4 Blocking Web sites by individuals and by governments and blocking Pop-Up ads
Topic 5 Respect others [privacy, opinions,] Avoid [libel, harassment, offensive content, inappropriate content for children,] Responsible [factual content, opinions supported by fact, informal content appropriate to audience] (3.2.7)
Chapter 3: Buying, Selling, and Banking Online
Lesson 1: Online Banking and Making Payments
Topic 1 Money as digits, and international currencies (4.1.3)
Topic 2 Transferring funds (4.1.2)
Topic 3 Banking at Automated Tellers (4.1.2)
Topic 4 Secure payments using public key encryption (3.1.1) (4.2.7)
Topic 5 Digital signatures, Secure vs. unsecure sites
Topic 6 Banking Online (4.1.2)
Lesson 2: Buying from Businesses Online
Topic 1 Buying Unusual Items Online
Topic 2 Typical Online Store Web Site; Content of site - product description, simulations (3.1.3)
Topic 2 Identifying customers with cookies (3.1.1)
Topic 3 Taking an order online (4.1.2) (4.1.3) (4.1.4)
Topic 4 Paying (4.1.2)
Topic 5 Delivery (4.1.2)
Topic 6 Returns and customer service (4.1.2)
Topic 7 Evaluating quality (3.2.6)
Lesson 3: Businesses Buying from Businesses Online
Topic 1 B2B using EDI
Topic 2 Extranets, VPN
Topic 3 Auctions and reverse auctions (3.1.3) (4.1.1)
Topic 4 Value-added services and disintermediation (3.1.3) (4.1.1)
Lesson 4: Consumer to Consumer
Topic 1 Auctions - eBay (4.1.3) (4.1.4)
Topic 2 Classifieds - Craig's List (4.1.3)
Topic 3 Self Publishing and Print on Demand
Topic 4 Storefront software
Topic 5 Evaluating quality (3.2.6)
Lesson 5: Security, Privacy, and Ethics
Topic 1 Fraud by sellers and buyers , phishing(4.2.5)
Topic 2 Avoiding unwanted e-mail and telephone calls
Topic 3 Customer profiling and cookies
Topic 4 Identify hazards of electronic commerce (4.2.7)
Topic 5 Set security levels (3.1.11)
Chapter 4: Communicating Online
Lesson 1: E-mail
Topic 1 Accessing e-mail
E-mail addresses (2.1.2), Web mail - Gmail, (2.1.4), Mail clients - Outlook, Lotus Notes (2.1.4), cell phones, wireless devices (Blackberry) (2.1.4)
Topic 2 Components of an e-mail [Address, subject line, body, attachments] (2.1.5)
Topic 3 Composing, viewing, reading, sending, forwarding, copying E-mail [Reply, Reply All, HTML vs text] (2.2.1, 2.2.7)
Topic 4 Supplementing e-mail [attachments, URLs, graphics, emoticons] (2.2.3)
Topic 5 Managing attachments [saving, opening, deleting] (2.2.4)
Lesson 2: Synchronous Communications
Topic 1 Instant Messaging, Unique address
Topic 2 Typical features
Topic 3 Services - AOL, MSN, Yahoo,
' Topic 4 Texting (2.1.1), Identification by telephone number (2.1.3)
Topic 5 Voice over IP (2.1.1)
Topic 6 Video calls [Skype]
Lesson 3: Advantages and Disadvantages
Topic 1 Advantages of electronic communication [speed, cost, routing, collaboration, multimedia, paper trail] (2.3.1)
Topic 2 Share resources - documents, printers, copiers (2.3.1)
Topic 3 Common problems with e-mail; blocked attachments (2.3.2)
' Topic 4 Common problems with direct communications; lack of paper trail (2.3.2)
Lesson 4: Asynchronous Communications
Topic 1 e-mail lists
Topic 2 online college courses
Topic 3 message boards
Topic 4 Web logs [blogs] (3.2.1)
Topic 5 Video sharing [Utube]
Topic 6 Podcasts
Lesson 5: Group Communications
Read http://fwk.enpraxis.net/catalog/additional-book-5/chapter-4.
Topic 1 Wiki (3.2.1)
Topic 2 Open source software
Topic 3 Virtual communities [Second Life] (3.2.1)
Lesson 6: Security, Privacy, and Ethics
Topic 1 Methods of identification - URL, phone number, User ID (2.1.3)
Topic 2 How dangerous programs enter a computer, Scanning e-mail attachments (2.3.7, 4.2.4)
Topic 3 Hoaxes, Junk mail, viruses, worms [anti-virus software], (4.2.4) Spoofing (4.2.5)
Topic 4 Filtering unsolicited mail by ISP, user (2.3.6)
Topic 5 Tactics to limit unsolicited mail, laws related to SPAM (2.3.6)
Topic 6 Avoid hasty messages or responses (2.3.7)
Topic 7 Company and school policies regarding e-mail (2.3.7)
Topic 8 E-mail encryption (2.3.7)
Topic 9 Ownership of content
Chapter 5: Working Online
Lesson 1: E-mail management
Topic 1 Managing e-mail [inbox, sorting, searching, folders, marking, saving, deleting, archiving, forwarding, blocking, out-of-office, signature] (2.2.2, 2.2.5, 2.2.7)
Topic 2 Managing addresses [address book, mailing lists] (2.2.6)
Lesson 2: Proper Use of Communications
Topic 1 Confusion between professional and informal communications (2.3.2)
Topic 2 Match mode to method; IM for quick informal, e-mail for paper trail, non-electronic for legal documents with signatures (2.3.3)
Topic 3 Elements of professional electronic communications [quick response, brevity, directness, spelling and grammar, choice of recipients and replies, appropriate level of formality] (2.3.4)
Topic 4 Appropriate use of attachments [size, use URLs instead of copies, problems with some readers] (2.3.5)
Topic 5 Backup and archive regularly
Lesson 3: Working in Teams
Topic 1 coordinating schedules
Topic 2 sharing documents
Topic 3 Video conferencing
Topic 4 Project management
Lesson 4: Web Based Applications
Topic 1 Word processing, spreadsheets [Google Docs] (3.1.3)
Topic 2 Project management [Open Project]
Topic 3 Creating content using Web design software (3.2.1)
Lesson 5: Security, Privacy, and Ethics
Topic 1 Safety in the workplace [electrical, air circulation, cables] (4.2.1)
Topic 2 Ergonomics [repetitive motion disorder, back, eye, seating, lighting, wrist support] (4.2.2)
Topic 3 Risks to data [theft, penetration by hackers, failure of storage media, backup practices] (4.2.3)
Topic 4 Anti-virus policies and procedures (4.2.4)
Topic 7 Principles for considering data personal (4.2.6)
Chapter 6: Identifying Technology Convergence and Its Social Impact
Lesson 1: Cell Phones, GPS, Cable TV, and the Internet
Topic 1 How cell phones work
Topic 2 Global positioning systems (GPS)
Topic 3 Internet connection, browsers
Topic 4 Cross-platform software - Hypertext eXtensible Markup Language (HXML)
Topic 5 Multi-function phones and Personal Digital Assistant (PDA)
Topic 6 Cable television, Internet Service, Voice Over IP (VOIP)
Lesson 2: How Computers are Used in Work, School, and Home
Topic 1 Uses of computers (4.1.1)
Topic 2 Technology and processes "behind the scenes" (4.1.2)
Topic 3 Transformed traditional processes (4.1.3)
Topic 4 Help disabled and disadvantaged (4.1.4)
Lesson 3: Risks
Topic 1 Risks to personal and organizational data (4.2.3, 4.2.5)
Topic 2 Software threats [viruses, worms] (4.3.4)
Topic 3 Reasons for restricting access [important data, children] (4.2.5)
Topic 4 Restricting access using technical and non-technical means [security and filtering software, parent/teacher supervision] (4.2.5)
Lesson 4: Prudent Practices
Topic 1 Practices to protect against infections [anti-virus software, following procedures, updating] (4.2.4)
Topic 2 Keep anti-virus software up-to-date (4.2.4)
Topic 3 Following procedures for identifying, isolating, and removing infected files (4.2.4)
Topic 4 How to stay informed of virus threats and new developments (4.2.4, 4.2.10)
Topic 5 How to protect privacy [cookies, not sharing personal or family information, using aliases in public forums] (4.2.8)
Topic 6 Use technical and non-technical means to restrict inappropriate access [children, adult sites at work] (4.2.5)
Topic 7 Ergonomics [repetitive motion, back, eye, seating] (4.2.2)
Lesson 5: Responsible Practices
Topic 1 How to find rules, laws, and policies at school and work (4.2.9)
Topic 2 Recycling [paper, ink and toner cartridges, hardware] and donations (4.2.11)
Topic 3 Share your knowledge and experience with others (4.2.11)

Customer Reviews

Average Review:

Post to your social network


Most Helpful Customer Reviews

See all customer reviews