0% found this document useful (0 votes)
8 views

Chapter 10

The document discusses communication using email and the internet. It covers laws related to email use, acceptable email content and language, copyright, privacy and security. It also discusses internet concepts like intranet, browsers, URLs, search engines and evaluating online information reliability.

Uploaded by

Khizer Aziz
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Chapter 10

The document discusses communication using email and the internet. It covers laws related to email use, acceptable email content and language, copyright, privacy and security. It also discusses internet concepts like intranet, browsers, URLs, search engines and evaluating online information reliability.

Uploaded by

Khizer Aziz
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Chapter-10

Communication
Communicate with other ICT users using email
Email is very popular form of communication between people.
However many countries have laws to protect people from the
misuse of emails.
Below are some laws which companies and individuals have to
follow when using email:
1. Emails must not have false or misleading subject lines.
2. Organizations must include valid postal address.
3. Organizations are not allowed to capture and store lists of
email addresses.
4. There should be a clear way for recipients to unsubscribe
from receiving email.
5. Organizations are required to ask for permission before
they can send emails to individuals.

Acceptable Language:
1. The Language of the email must be appropriate.
2. It must not include abusive, threatening and racist
language.
3. The email sent within the organization must be formal.
Communication

Copyright:
The content of an email can be protected by the copyright law.
If the sender of an email states the message is confidential then
it is important that the email is not forwarded to a third party.
Sometimes organizations send the email with a copyright
statement at the bottom of the email. Security and protection
of email account: It can be ensured by using
1. Strong password.
2. Changing password on a regular basis.
3. Spam filter/Junk filter.
4. Do not share your computer will multiple users.

Netiquette: It is the short form of internet etiquettes. There are


as follows
1. Don’t be abusive.
2. Don’t send spam.
3. Always check the spelling and grammar.
4. Respect privacy of others
5. Don’t plagiarize.
6. Don’t use too many emotions as they might annoy your
reader.
7. Don’t capitalize everything.
Spam Email: It is basically an unwanted email. It is sent to the
recipient from a mailing list. It can be a part of phishing scam.
Communication

Effects of spam email:


1. It can make the network slower through flooding of traffic.
2. If part of phishing scam it can obtain recipient’s personal
details and data.
How to prevent spam email?
1. Use junk email filter.
2. Do not sign up for commercial email list.
3. Do not reply the spam email.

Email Groups: These are used for a number of purposes:


1. Companies and organization can group people together for
marketing purposes.
2. Companies use email groups to set up meetings.
3. It is easy for a person to maintain a list such as family,
coworkers and friends etc.

Internet: It a worldwide collection of network. It is used to:


• Send email.
• Chat online
• Transfer files from computer to computer
• Browse the web.
Communication

World Wide Web (www): It is that part of the internet which


users can access by way of a web browser. It consists of massive
collection of web pages.
Intranet: It is a computer network designed to meet the internal
need for sharing information within a single organization or
company. Its access is not to the general public. Only
members/employees of the organization can only use the
network.
Advantages:
• Less chance of getting hacked.
• Companies can ensure specific information can be seen by
their employees.
• It offers better speed of data transmission.

Internet Intranet
International Network Internal Restricted Access Network.

1- Connects different public 1- It is a part of internet which


network of computers. is privately owned by a
particular firm.
2- Anyone can access the 2- Can only be accessd by the
network. members of the firm having
their own login.
Communication

3- It does not provide enough 3- It is behind a strong firewall,


security against hackers. which gives enough security
against hackers
4- It is not possible to block all 5- Only the particular content
the websites/unwanted is available for the employees.
browsing.

Hyper Text Transfer Protocol (HTTP): These are the rules which
must be obeyed while transferring data between webserver and
the web browser.
HTTPS: It is an extension of http. It is used for secure
communication over a computer network.
Web Browser: It is a software which is used to display a web
page on the computer screen. It translates HTML from websites
and show the result of the translation.
Features of web browser:
It has home page.
It stores the user’s favorite website.
It keeps a history of all the websites visited by the user.
It has hyperlinks, so that user can navigate between web pages.
Uniform Resource Locator (URL): Web browser uses URL to
access websites. URLs are represented by numbers
(http://100.100.100.1) however it is not very user friendly. So
Communication

therefore an alphanumeric format (http://www.cie.org.uk) is


used. A URL contain the following information.
http://www.cie.org.uk/igcse-ict-paper.pdf

Protocol Webserver name File name


An error will occur if any part of the URL is incorrect. (HTTP
404).

File Transfer Protocol (FTP): It is protocol used for the transfer


of computer files between a client and a server on a computer
network.

Internet Service Provider (ISP): These are the companies which


provide user access to the internet, usually by charging a fee.

Cloud Storage: Online storage medium used to backup files.


Files can be accessed from any device with an internet
connection. Data is saved on more than one server so in case of
maintenance or repair data is always accessible.
Public Cloud: The storage environment where client and storage
provider are different companies.
Communication

Private Cloud: The storage environment where client and


storage provider are single entity
Advantages:
• Files can be accessed from any location using an internet
connection.
• Users don’t have to carry storage devices around with
them.
• Offer backup solutions.
• Unlimited storage capacity.

Disadvantages:
• Files could be hacked.
• Dependent on a good quality internet connection to
download and upload files.
• Storage Company can charge the client.

Blogs and Blogging:


• A blog is based on personal experiences and usually
updated by one author.
• Blog entries are in order (most recent entries are shown
first).
• Blogs cannot be changed by other users of the internet.
• Bloggers can be prosecuted for posting offensive material.
Communication

Microblogs: These are similar to blogs but are most often used
on social networking sites to make short, frequent posts.
B-Blog: It is short for business blog- which is used by businesses
to promote themselves on the internet.

Wikis: These are the websites that allows users to create and
edit web pages using any web browser.
• A wiki is a collaboration from users (many authors) to create
content.
• Wikis can be edited by anyone (content can be edited,
deleted or modified).
• Wikipedia is an example use of Wikis.

Social Networking Sites: These websites allow user to interact


and communicate with each other.
• People having same interest and activities can connect with
each other.
• Users are able to share content such as photos, video and
status updates.
• It is possible to upload content such as text message,
photos and videos.
Communication

• Members are given free instant messaging and video


chatting service.
Search Engines: A web search engine or Internet search
engine is a software system that is designed to carry out web
search (Internet search) for a particular content.
The more detailed or specific your search is, the more accurate
the results will be.

Internet:
Advantages Disadvantages
1- Vast amount of information 1- It is not regulated.
2- User can find information 2- Online threats such as
using search engines. hacking/virus/cyber bullying.
3- Web content can include 3- Sharing of illegal content.
text, images, video, sounds etc
4- Online shopping can be 4- Information may not be
done. reliable.

Why the internet is so popular?


The internet has evolved over the years with the introduction of
social networks, media streaming sites, online
shopping/banking.
Communication

• The internet is very accessible over various platforms.


• Relatively cheap to use and sometimes free.
• Increase in bandwidth allows faster browsing and download
speeds.

Why an internet search to find relevant information is not


always fast?
• Due to huge amount of information available on the
internet it is difficult to find specific information quickly.
• Search engines may have to look through different websites
to find your information.
Why it is not always easy to find reliable information on the
internet?
• Content on the internet is not regulated.
• Anybody can make a website and post any content which is
not factually correct.
• Wikis can be edited to contain false information.
• Information may be biased depending on who was the
author.
How to evaluate the reliability of information found on the
internet?
• Checking the websites URL address (URL must start from
https:\\).
Communication

• Check if the responsible bodies have endorsed the


websites.
• Check the last time the website was updated.

You might also like