180 likes | 307 Vues
This chapter delves into the evolution and functionality of the Internet and the World Wide Web, tracing their origins back to ARPANET in 1969. It explores common Internet uses such as email, online shopping, and virtual libraries, while highlighting key access providers and web browsers. Additionally, it covers crucial e-commerce concepts, including business models like B2C and C2C, online banking, and the significance of security in digital transactions. Learn how to navigate search tools and discuss the measures against spam.
E N D
Chapter 2 The Internet, The Web, and Electronic Commerce
The Internet and the Web • Large network that connects smaller networks globally • The Internet, or Net, was Launched in 1969 • National computer network • US funded project called ARPANET • World Wide Web or WWW was introducedin 1992 at CERN Page 30
Common Internet Uses • Communicating • Exchange e-mail • Discussion Groups • Online shopping or e-retailing or e-tailing • Cybermall • Searching • Virtual Libraries • Entertainment • Education or e-learning Page 30
Providers • Common way to access the Internet • Commercial Internet Service Providers (ISP) • National Service Providers • Regional Service Providers • Wireless serviceproviders Page 31
Browsers • Programs that provide access to Web resources • Allow you to surfthe Internet • Three well-known browsers • Mozilla Firefox • Netscape Communications • Microsoft Internet Explorer Address or location of the resource must be specified • URL Page 32
URLs • Uniform Resource Locators • All URLs have at least two parts • Protocol • Domain name • Locates Web sites Page 33
More on Browsers • Browsers interpret HTML commands • Hypertext Markup Language • Contained in a document • Display document as a Web page Page 33
Communication • Most popular Internet activity • Types of communication • E-Mail • E-Mail Address • Spam • Discussion Groups • Instant Messaging Page 34
Spam • Junk and/or unwanted Email • Computer viruses or destructive programs are often attached to unsolicited email • CAN-SPAM Act • Spam blockers incorporate a myriad of approached to identify and control spam • Spam blockers are also referred to as: • Junk mailfilters • Anti-spam programs • To learn more about anti-spam programs, visit our website at www.ce2007.com and enter in the key word spam Page 35
Discussion Group Terms Return Page 37
Search Tools • Search engines • Metasearch engines • Specialized search engines • Tips • Start with the right approach • Be as precise as possible • Use multiple words • Use boolean operators • Check your spelling • Keep Moving Page 40
Electronic Commerce • Also known as e-commerce • Buying and selling of goods over the Internet • Business-to-consumer (B2C) • Online banking or e-banking • Online stock trading or e-trading • Online shopping • Web storefronts • Web auctions • Consumer-to-consumer (C2C) • Auction house sites • Person-to-person auction sites • Business-to-business (B2B) Page 42
Web Storefronts • Business-to-consumer e-commerce (B2C) • Virtual stores • Web storefront creation packages • Also called commerce servers • Help businesses create virtual stores • Allow visitors to register, browse, and make purchase Return Page 44
Web Auctions • Consumer-to-consumer e-commerce (C2C) • Similar to traditional auctions • Types • Auction house sites • Person-to-person auction sites Page 45
Security • Payment methods must be fast, reliable, and secure • Three basic options • Checks • Credit card • Electronic cash • E-cash • Cybercash • Digital cash Page 45
Web Utilities • Specialized utility programs that make using the internet & web safer and easier • Telnet • FTP • Plug-ins • Filters Page 46
Internet Security Suites • Collection of utility programs designed to maintain your security and privacy while on the web • McAfee • Norton Page 48
Filters Page 48