Search Header Logo
Lesson 2 - What is the Internet

Lesson 2 - What is the Internet

Assessment

Presentation

Computers

6th - 8th Grade

Practice Problem

Easy

Created by

William Jernigan

Used 50+ times

FREE Resource

29 Slides • 21 Questions

1

media

​Lesson 2 - What is the Internet

2

The Internet is the biggest world-wide communication network of computers. One thing to always keep in mind is balancing your life on and off line. There is so much that can be done on and learned from the Internet, but what is the Internet exactly? The Internet has millions of smaller domestic, academic, business, and government networks, which together carry many different kinds of information. The Internet is made up of a large number of independently operated networks. The Internet uses protocols and data packets to communicate. There is end to end connectivity, so that any device can communicate with any other device. People share information across the Internet and that makes it a powerful tool to gain knowledge. There is a great opportunity for creativity on the Internet as well, like designing apps for mobile phones.

3

4

Knowing how to effectively find what you are looking for on the Internet is so important. You can waste a lot of time if you don't understand how to efficiently search for something so that you can get accurate results quickly. Understanding how to use Boolean Operators will allow you to search the Internet like a pro! Boolean logic defines relationships between words and a search.

​Searching the Internet

5

​Boolean Search Operators

The Boolean search operators are and, or and not. You can use these operators to create a general or very specific search.

  • And combines search terms so that each search result contains all of the terms. For example, travel and Spain finds articles that contain both travel and Spain.

  • Or combines search terms so that each search result contains at least one of the terms. For example, football or soccer finds results that contain either football or soccer.

  • Not excludes terms so that each search result does not contain any of the terms that follow it. For example, television not movies finds results that contain television but not movies.

6

media

7

Here are a few more tips for effective Internet searching:

  • Think before your search. Describe the topic and choose 3 or 4 keywords.

  • Keep it simple. Use as few words as possible.

  • Be specific. Use specific words avoid general terms

  • Narrow your search results. There are several ways to help you narrow your search results to find exactly what you're looking for.

  • Use quotation marks to find exact phrases or names, especially if searching for two words together.

  • Use the asterisk (*) Use at the end of your root word if there may be different endings, for example *teen would give you teens, teenage, teenager or teenagers

  • Capitalization, punctuation and spelling don't really matter. Search engines will ignore capitalization and punctuation in a search and will generally auto-correct spelling mistakes.

8

​Tips for Effective Search Strategies

9

media

10

Multiple Choice

Biggest worldwide communication

network of computers.

1

Producer

2

Internet

3

Consumer

4

Operator

11

Multiple Choice

One who uses their abilities on the

Internet to get something. It can be

knowledge, products or services.

1

Producer

2

Internet

3

Consumer

4

Operator

12

Multiple Choice

One who uses their creativity to make

something, for example a PowerPoint that

involves research, videos and images.

1

Producer

2

Internet

3

Consumer

4

Operator

13

Digital storage uses the binary system where everything saves as 1's and 0's. A bit is the smallest unit of data stored in a computer. Bit stands for "Binary Digit, they store text, images and sounds. The number of bits we have determines how much data we can store. Eight bits put together is called a byte. A thousand bytes equals a kilobyte. A thousand kilobytes is a megabyte. A thousand megabytes is a gigabyte. A thousand gigabytes is called a terabyte. This image shows the 1's and 0's of the binary system.

​Data Sizes & Data Loss

14

media

​Units of Data

15

16

10 Common Causes of Data Loss

media

17

Employees may accidentally overwrite or delete information that is essential to a business.

Human error may also cause other types of data loss, including hard drive damage or formatting issues, liquid spills, or software corruption.

​Human Error

18

What most people think of when you ask them what causes data loss. Viruses can steal and delete large amounts of information or slow down operations.

In a business, this would cause the company to be non-functional.

Emails are common sources of viruses and malware. Some of these emails contain links to fake log-in pages for websites like Facebook or Instagram. Clicking on this link and using the log-in page allows the virus or malware to enter the system and damage or steal files.

​Virus & Malware

19

Preventing Virus and Malware Damage

Use an anti-virus software and keep it up to date.

Run system scans regularly to catch viruses early.

Create regular system backups. Often times, a back-up is the only way to recover data destroyed by malware
or viruses.

20

Most data losses are caused by hardware malfunctions.

The most common part to be damaged is the hard drive. Hard drives are the most fragile part of the computer.

140 thousand hard drives crash each week! About 60% of these are crashes are caused by mechanical issues and 40% are caused by mishandling or accidents such as dropping the computer.

Hard drives can also be damaged by overheating. This is usually caused by using the computer too much or dust building up inside the computer.

​Hard Drive Damage

21

The hard drive has issues while booting up

The computer crashes or freezes often or runs slowly

The computer is unusually hot

The computer makes clicking or grinding noises

Files will not open or they become corrupted randomly

​Signs of Hard Drive Damage

22

Power outages can interrupt business operations by causing software systems to shut down without warning.

This can cause unsaved data to be lost or cause files to be corrupted because the computer wasn’t shut down properly. Sometimes entire programs may even stop working.

If a computer shuts down while it is updating or making other changes to the hard drive system, it may never start up again.

​Power Outages

23

In the modern workplace, more and more people are becoming mobile and working from laptops or smartphones rather than desktop PCs.

Laptop theft is a serious cause for concern and can happen anywhere a laptop is left unattended.

According to a study by Kensington:

25 percent of IT theft occurs in cars or other transportation vehicles

23 percent takes place in the office

15 percent happens in airports or hotels

12 percent occurs in restaurants

​Theft

24

Spilling a liquid such as coffee or water on your computer can cause it to short circuit. This makes it difficult to recover your computer and the files inside of it. This situation is even more serious if the computer has been completely submerged.

Acidic liquids such as coffee can actually corrode the inside of the computer if the spill is not cleaned up properly.

Sometimes a computer may seem to work fine after a spill but the damage makes it short-circuit in the future.

​Liquid Damage

25

Natural disasters such as tornadoes, fires, and hurricanes can happen when you least expect them and they can have devastating impacts on a business. They can destroy computers, data, and even entire businesses.

To minimize the risk of data loss, back up your data on a weekly basis and store files in a safe place.

​Natural Disasters

26

Sudden or improper software shut-down may not seem like a big deal, but they can cause serious issues with your data.

Improper shutdowns can:

Corrupt data

Delete your unsaved progress and other valuable data

Waste your time

They can also cause software to become corrupted. Sometimes when software is corrupted, it may not be able to run again and you won’t be able to access data stored in that software.

​Software Corruption

27

Accidentally formatting of your hard drive can cause you to lose data instantly.

Employees can format a hard drive by accident if they misunderstand system
prompts or error messages.

Reformatting can also occur during system updates and result in data loss.

Even though files and documents can no longer be accessed after formatting, you can often recover lost data from hard drive formatting by running a data recovery software.

​Hard Drive Formatting

28

Hackers can look at or steal your data in a variety of ways.

Here are some things you should avoid doing to keep your system from being vulnerable to hackers:

Using servers with poor security

Not having appropriate firewalls

Using passwords that are easy to guess

​Hackers & Insiders

29

Laptops and phones can be connected to the Internet through Wi-Fi.

The Wi-Fi connects to an Internet Service Provider (ISP) that connects you to millions of devices that are all interconnected. Protocols are a well-known set of rules and standards that allow successful communication. All the different devices on the Internet have unique addresses, it is similar to a mailing address. Internet protocol is an IP and the addressing system is part of that. A computer's address is called its IP address. The numbers in an IP address are organized in a hierarchy, just like a home address has different parts and IP address does too. IP addresses are usually 32 bits long. Domain Name Svstem (DNS) associates names with the IP addresses. This is how vou get connected on the Internet. DNS servers are divided into zones for example .org,.com, .net.

​Internet Address & DNS

30

31

In this section you will learn about one element of Digital Citizenship, digital literacy.

Digital literacy or fluency about teaching and learning technology and its use. It is the ability to use technology to create, navigate and evaluate information.

Being able to navigate and understand digital media is part of digital literacy.

​Digital Literacy

media

32

33

Multiple Choice

Henry's Internet connection is slower than normal. Henry's mom says she is going to call the ISP and ask about bandwidth. Who is she referring to?

1

Internet School People

2

Internet Service Provider

3

Interested Service Position

4

Invalid Service Protocol

34

Multiple Choice

A computer's address is called an IP address. Which of the following is an example of an IP address?

1

77.872.67.54

2

1213:0

3

40 Oak Drive

4

77

35

Multiple Choice

Which student will locate the information they want for their project on albino alligators in Florida?

1

Sam enters: "alligators or white ones"

2

Claudia enters: "Florida alligators"

3

Jan enters: "white Florida reptiles"

4

Bernice enters: "albino alligators and Florida"

36

Multiple Choice

Which of the following students is being a producer on the Internet?

1

Rhonda is looking at Pinterest to find ideas for her sister's birthday party.

2

Dave is creating a blog about throwing a curve ball.

3

John is reading an article about China.

4

Li Jing is watching a video on how to make Chinese food.

37

Multiple Choice

How many bytes are in 2 kilobytes?

1

1,000

2

200

3

20,000

4

2,000

38

Multiple Choice

Each week, Kayla posts a blog entry describing her latest handmade soaps, and offering a coupon. What is she using the blog media for?

1

Buying things

2

Reviewing other people's products

3

Selling her products.

4

Researching her products.

39

Multiple Choice

Isaac was looking on the Internet for what the phrase "snap out of it" means and he was sure to put the phrase in quotation marks. Why would he do that?

1

He was typing a quote from a famous author.

2

He new quotes would get him only the word snap in the results.

3

Quotes indicate that the search is meant to find the opposite of a word,

4

The result will be for the exact phrase.

40

Multiple Choice

Which one of these people is being a consumer on the Internet?

1

Maria is creating a graphic logo to put on her new Website.

2

Melissa is ordering her groceries online and having them delivered.

3

Juan is reading online how-to articles to learn how to fix his bike.

4

Oscar is using PowerPoint to make a slide show about his new puppy.

41

Multiple Choice

Once something is posted online, it cannot be taken back. Which person is showing they don't understand that?

1

Mary is considering her posts for accuracy.

2

Larry posts rude comments about his friend's sister, thinking she won't know.

3

Roger is searching for a new car on Websites.

4

Jen is posting craft ideas on Pinterest.

42

Multiple Choice

Samantha is writing an essay for her class that starts with "A computer stores information using numbers 1 and 0." What system is she writing about?

1

Metric

2

Binary

3

Notation

4

Unitary

43

Multiple Choice

You are checking your personal email, and you find a message from an address you do not recognize. It contains a short message, and a link to a web page.

What should vou do?

1

Reply to the email asking for more information

2

Immediately delete the email and report it.

3

Click on the link to see what the Webpage says

4

Ignore it, but keep it in you inbox

44

Multiple Choice

Sam and Hayden are looking for a park that has a batting cage. They perform a successful Boolean search. Which of the following did they enter in their

batting cage.

browser to search?

1

Park NOT Batting cage

2

Park OR Batting cage

3

Park THEN Batting cage

4

Park AND Batting cage

45

Multiple Choice

If you wanted to search for information on the Dolphins football team, why would you enter the following in the browser search field? "Dolphins +football - animals"?

1

To exclude information about all football teams

2

To include information about the Dolphins football team only

3

To include information about baseball teams named "Dolphins"

4

To include information about whales and porpoises

46

Multiple Choice

In which of the following network types would you find Bluetooth and USB for your wireless headsets?

1

PAN

2

LAN

3

WAN

4

VPN

47

Multiple Choice

If there are several logical operators with the same precedence, they are read:

1

Left to Right

2

Top to Bottom

3

Bottom to Top

4

Right to Left

48

Multiple Choice

Which of these is a set of rules that allows electronic devices to communicate with each other?

1

OSI layer

2

Network

3

Protocol

4

Procedures

49

Multiple Choice

You are doing a research proiect on pollution. You have an overview of what all the research results were in the last paragraph. This is called a:

1

Summary

2

Ending

3

Beginning

4

Introduction

50

Multiple Choice

Julia is writing an essay for her class that starts with "A computer stores information using numbers 1 and 0." What system is she writing about?

1

Notation

2

Binary

3

Unitary

4

Metric

media

​Lesson 2 - What is the Internet

Show answer

Auto Play

Slide 1 / 50

SLIDE