
Lesson 2 - What is the Internet
Presentation
•
Computers
•
6th - 8th Grade
•
Practice Problem
•
Easy
William Jernigan
Used 50+ times
FREE Resource
29 Slides • 21 Questions
1
Lesson 2 - What is the Internet
2
The Internet is the biggest world-wide communication network of computers. One thing to always keep in mind is balancing your life on and off line. There is so much that can be done on and learned from the Internet, but what is the Internet exactly? The Internet has millions of smaller domestic, academic, business, and government networks, which together carry many different kinds of information. The Internet is made up of a large number of independently operated networks. The Internet uses protocols and data packets to communicate. There is end to end connectivity, so that any device can communicate with any other device. People share information across the Internet and that makes it a powerful tool to gain knowledge. There is a great opportunity for creativity on the Internet as well, like designing apps for mobile phones.
3
4
Knowing how to effectively find what you are looking for on the Internet is so important. You can waste a lot of time if you don't understand how to efficiently search for something so that you can get accurate results quickly. Understanding how to use Boolean Operators will allow you to search the Internet like a pro! Boolean logic defines relationships between words and a search.
Searching the Internet
5
Boolean Search Operators
The Boolean search operators are and, or and not. You can use these operators to create a general or very specific search.
And combines search terms so that each search result contains all of the terms. For example, travel and Spain finds articles that contain both travel and Spain.
Or combines search terms so that each search result contains at least one of the terms. For example, football or soccer finds results that contain either football or soccer.
Not excludes terms so that each search result does not contain any of the terms that follow it. For example, television not movies finds results that contain television but not movies.
6
7
Here are a few more tips for effective Internet searching:
Think before your search. Describe the topic and choose 3 or 4 keywords.
Keep it simple. Use as few words as possible.
Be specific. Use specific words avoid general terms
Narrow your search results. There are several ways to help you narrow your search results to find exactly what you're looking for.
Use quotation marks to find exact phrases or names, especially if searching for two words together.
Use the asterisk (*) Use at the end of your root word if there may be different endings, for example *teen would give you teens, teenage, teenager or teenagers
Capitalization, punctuation and spelling don't really matter. Search engines will ignore capitalization and punctuation in a search and will generally auto-correct spelling mistakes.
8
Tips for Effective Search Strategies
9
10
Multiple Choice
Biggest worldwide communication
network of computers.
Producer
Internet
Consumer
Operator
11
Multiple Choice
One who uses their abilities on the
Internet to get something. It can be
knowledge, products or services.
Producer
Internet
Consumer
Operator
12
Multiple Choice
One who uses their creativity to make
something, for example a PowerPoint that
involves research, videos and images.
Producer
Internet
Consumer
Operator
13
Digital storage uses the binary system where everything saves as 1's and 0's. A bit is the smallest unit of data stored in a computer. Bit stands for "Binary Digit, they store text, images and sounds. The number of bits we have determines how much data we can store. Eight bits put together is called a byte. A thousand bytes equals a kilobyte. A thousand kilobytes is a megabyte. A thousand megabytes is a gigabyte. A thousand gigabytes is called a terabyte. This image shows the 1's and 0's of the binary system.
Data Sizes & Data Loss
14
Units of Data
15
16
10 Common Causes of Data Loss
17
•Employees may accidentally overwrite or delete information that is essential to a business.
•Human error may also cause other types of data loss, including hard drive damage or formatting issues, liquid spills, or software corruption.
Human Error
18
• What most people think of when you ask them what causes data loss. Viruses can steal and delete large amounts of information or slow down operations.
• In a business, this would cause the company to be non-functional.
• Emails are common sources of viruses and malware. Some of these emails contain links to fake log-in pages for websites like Facebook or Instagram. Clicking on this link and using the log-in page allows the virus or malware to enter the system and damage or steal files.
Virus & Malware
19
Preventing Virus and Malware Damage
• Use an anti-virus software and keep it up to date.
• Run system scans regularly to catch viruses early.
• Create regular system backups. Often times, a back-up is the only way to recover data destroyed by malware
or viruses.
20
• Most data losses are caused by hardware malfunctions.
• The most common part to be damaged is the hard drive. Hard drives are the most fragile part of the computer.
• 140 thousand hard drives crash each week! About 60% of these are crashes are caused by mechanical issues and 40% are caused by mishandling or accidents such as dropping the computer.
• Hard drives can also be damaged by overheating. This is usually caused by using the computer too much or dust building up inside the computer.
Hard Drive Damage
21
•The hard drive has issues while booting up
•The computer crashes or freezes often or runs slowly
•The computer is unusually hot
•The computer makes clicking or grinding noises
•Files will not open or they become corrupted randomly
Signs of Hard Drive Damage
22
•Power outages can interrupt business operations by causing software systems to shut down without warning.
•This can cause unsaved data to be lost or cause files to be corrupted because the computer wasn’t shut down properly. Sometimes entire programs may even stop working.
•If a computer shuts down while it is updating or making other changes to the hard drive system, it may never start up again.
Power Outages
23
• In the modern workplace, more and more people are becoming mobile and working from laptops or smartphones rather than desktop PCs.
• Laptop theft is a serious cause for concern and can happen anywhere a laptop is left unattended.
• According to a study by Kensington:
• 25 percent of IT theft occurs in cars or other transportation vehicles
• 23 percent takes place in the office
• 15 percent happens in airports or hotels
• 12 percent occurs in restaurants
Theft
24
• Spilling a liquid such as coffee or water on your computer can cause it to short circuit. This makes it difficult to recover your computer and the files inside of it. This situation is even more serious if the computer has been completely submerged.
• Acidic liquids such as coffee can actually corrode the inside of the computer if the spill is not cleaned up properly.
• Sometimes a computer may seem to work fine after a spill but the damage makes it short-circuit in the future.
Liquid Damage
25
• Natural disasters such as tornadoes, fires, and hurricanes can happen when you least expect them and they can have devastating impacts on a business. They can destroy computers, data, and even entire businesses.
• To minimize the risk of data loss, back up your data on a weekly basis and store files in a safe place.
Natural Disasters
26
• Sudden or improper software shut-down may not seem like a big deal, but they can cause serious issues with your data.
• Improper shutdowns can:
• Corrupt data
• Delete your unsaved progress and other valuable data
• Waste your time
They can also cause software to become corrupted. Sometimes when software is corrupted, it may not be able to run again and you won’t be able to access data stored in that software.
Software Corruption
27
• Accidentally formatting of your hard drive can cause you to lose data instantly.
• Employees can format a hard drive by accident if they misunderstand system
prompts or error messages.
• Reformatting can also occur during system updates and result in data loss.
• Even though files and documents can no longer be accessed after formatting, you can often recover lost data from hard drive formatting by running a data recovery software.
Hard Drive Formatting
28
• Hackers can look at or steal your data in a variety of ways.
• Here are some things you should avoid doing to keep your system from being vulnerable to hackers:
• Using servers with poor security
• Not having appropriate firewalls
• Using passwords that are easy to guess
Hackers & Insiders
29
Laptops and phones can be connected to the Internet through Wi-Fi.
The Wi-Fi connects to an Internet Service Provider (ISP) that connects you to millions of devices that are all interconnected. Protocols are a well-known set of rules and standards that allow successful communication. All the different devices on the Internet have unique addresses, it is similar to a mailing address. Internet protocol is an IP and the addressing system is part of that. A computer's address is called its IP address. The numbers in an IP address are organized in a hierarchy, just like a home address has different parts and IP address does too. IP addresses are usually 32 bits long. Domain Name Svstem (DNS) associates names with the IP addresses. This is how vou get connected on the Internet. DNS servers are divided into zones for example .org,.com, .net.
Internet Address & DNS
30
31
In this section you will learn about one element of Digital Citizenship, digital literacy.
Digital literacy or fluency about teaching and learning technology and its use. It is the ability to use technology to create, navigate and evaluate information.
Being able to navigate and understand digital media is part of digital literacy.
Digital Literacy
32
33
Multiple Choice
Henry's Internet connection is slower than normal. Henry's mom says she is going to call the ISP and ask about bandwidth. Who is she referring to?
Internet School People
Internet Service Provider
Interested Service Position
Invalid Service Protocol
34
Multiple Choice
A computer's address is called an IP address. Which of the following is an example of an IP address?
77.872.67.54
1213:0
40 Oak Drive
77
35
Multiple Choice
Which student will locate the information they want for their project on albino alligators in Florida?
Sam enters: "alligators or white ones"
Claudia enters: "Florida alligators"
Jan enters: "white Florida reptiles"
Bernice enters: "albino alligators and Florida"
36
Multiple Choice
Which of the following students is being a producer on the Internet?
Rhonda is looking at Pinterest to find ideas for her sister's birthday party.
Dave is creating a blog about throwing a curve ball.
John is reading an article about China.
Li Jing is watching a video on how to make Chinese food.
37
Multiple Choice
How many bytes are in 2 kilobytes?
1,000
200
20,000
2,000
38
Multiple Choice
Each week, Kayla posts a blog entry describing her latest handmade soaps, and offering a coupon. What is she using the blog media for?
Buying things
Reviewing other people's products
Selling her products.
Researching her products.
39
Multiple Choice
Isaac was looking on the Internet for what the phrase "snap out of it" means and he was sure to put the phrase in quotation marks. Why would he do that?
He was typing a quote from a famous author.
He new quotes would get him only the word snap in the results.
Quotes indicate that the search is meant to find the opposite of a word,
The result will be for the exact phrase.
40
Multiple Choice
Which one of these people is being a consumer on the Internet?
Maria is creating a graphic logo to put on her new Website.
Melissa is ordering her groceries online and having them delivered.
Juan is reading online how-to articles to learn how to fix his bike.
Oscar is using PowerPoint to make a slide show about his new puppy.
41
Multiple Choice
Once something is posted online, it cannot be taken back. Which person is showing they don't understand that?
Mary is considering her posts for accuracy.
Larry posts rude comments about his friend's sister, thinking she won't know.
Roger is searching for a new car on Websites.
Jen is posting craft ideas on Pinterest.
42
Multiple Choice
Samantha is writing an essay for her class that starts with "A computer stores information using numbers 1 and 0." What system is she writing about?
Metric
Binary
Notation
Unitary
43
Multiple Choice
You are checking your personal email, and you find a message from an address you do not recognize. It contains a short message, and a link to a web page.
What should vou do?
Reply to the email asking for more information
Immediately delete the email and report it.
Click on the link to see what the Webpage says
Ignore it, but keep it in you inbox
44
Multiple Choice
Sam and Hayden are looking for a park that has a batting cage. They perform a successful Boolean search. Which of the following did they enter in their
batting cage.
browser to search?
Park NOT Batting cage
Park OR Batting cage
Park THEN Batting cage
Park AND Batting cage
45
Multiple Choice
If you wanted to search for information on the Dolphins football team, why would you enter the following in the browser search field? "Dolphins +football - animals"?
To exclude information about all football teams
To include information about the Dolphins football team only
To include information about baseball teams named "Dolphins"
To include information about whales and porpoises
46
Multiple Choice
In which of the following network types would you find Bluetooth and USB for your wireless headsets?
PAN
LAN
WAN
VPN
47
Multiple Choice
If there are several logical operators with the same precedence, they are read:
Left to Right
Top to Bottom
Bottom to Top
Right to Left
48
Multiple Choice
Which of these is a set of rules that allows electronic devices to communicate with each other?
OSI layer
Network
Protocol
Procedures
49
Multiple Choice
You are doing a research proiect on pollution. You have an overview of what all the research results were in the last paragraph. This is called a:
Summary
Ending
Beginning
Introduction
50
Multiple Choice
Julia is writing an essay for her class that starts with "A computer stores information using numbers 1 and 0." What system is she writing about?
Notation
Binary
Unitary
Metric
Lesson 2 - What is the Internet
Show answer
Auto Play
Slide 1 / 50
SLIDE
Similar Resources on Wayground
46 questions
Prokaryotic and Eukaryotic Cells
Lesson
•
6th - 8th Grade
47 questions
Factors of Economic Growth
Lesson
•
6th - 8th Grade
47 questions
Vector Animation (Project Stem, Lesson 2.4)
Lesson
•
6th - 8th Grade
42 questions
Spheres of the Earth
Lesson
•
6th - 8th Grade
46 questions
Health and Skill Related Fitness Components
Lesson
•
5th - 8th Grade
50 questions
Lesson 7 - So Many Ways to Communicate Online!
Lesson
•
6th - 8th Grade
48 questions
Lesson 2 - Digital Footprint
Lesson
•
6th - 8th Grade
48 questions
POPULAR MEMBER SERVICES DIAGNOSTICS, HOSPITILIZATION AND SURGERY
Lesson
•
KG
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade