7 Chapter Contents Section A: Web Technology Section B: Search Engines Section C: E-commerce Section D: E-mail Section E: Web and E-mail Security... 7 Web Basics A Web page is
Trang 1The Web and E-mail
Chapter 7
Trang 27 Chapter Contents
Section A: Web Technology
Section B: Search Engines
Section C: E-commerce
Section D: E-mail
Section E: Web and E-mail Security
Trang 47 Web Basics
The Web is an interlinked collection of
document, image, video, and sound files
A Web site contains a collection of related
information
Podcasts, Videocasts
Trang 57 Web Basics
A Web page is the product or output of one or more Web-based files displayed in a format similar to a page in a book
A Web browser is client software that displays Web page elements and handles links between pages
Every Web page has a unique address called a
URL
Trang 77 HTML
Trang 87 HTTP
HTTP messages flow between a browser and a Web server.
Trang 97 Web Browsers
Help you access Web pages
Popular browsers:
– Internet Explorer– Mozilla Firefox– Apple Safari– Opera
Trang 107 Web Browsers
Helper applications extend browser’s ability
to work with file formats
– A plug-in is a type of helper application– A player is any helper
application or plug-in that helps a browser display a particular file
Trang 117 Cookies
Small chunk of data generated by a Web
server and stored on computer’s hard disk
– Fix problems caused by HTTP’s stateless
protocol
– Relatively safe
Your computer does not have to accept
cookies
Trang 127 Web Page Authoring
Trang 137 HTML Scripts
HTML scripts can perform complicated tasks and respond to user actions
– HTML forms– Server-side script– Client-side script– Java applet
– ActiveX control
Digital Certificate
Trang 147 SECTION B
Search Engines
Search Engine Basics
Formulating Searches
Trang 157 Search Engine Basics
A Web search engine is a program designed
to help people locate information on the Web
by formulating simple keyword queries
Trang 167 Search Engine Basics
A Web crawler is a computer program that is automated to methodically visit Web sites
A search engine indexer is software that culls keywords from
a Web page and stores them in a database
A search engine’s query processor looks for your search
terms in search engine’s indexed database and returns list of relevant Web sites
Link popularity is measured by quantity and quality of links from one Web page to others
A meta keyword is entered into a header section of a Web
Trang 177 Formulating Searches
Most search engines
work with keyword
queries in which you
enter one or more
words, called search
terms
Trang 187 Formulating Searches
A Boolean operator is a word or symbol that describes a relationship between keywords, helping you create a more focused query
Trang 207 E-commerce Basics
Business transactions conducted
electronically over a computer
network
– B2C (business-to-consumer)– C2C (consumer-to-consumer)– B2B (business-to-business)– B2G (business-to-government)
Trang 217 E-commerce Basics
Enhances traditional business models
Styles of online advertisements
– Banner ad
– Hover ad– Pop-up ad
• Click-through rate
Ad-blocking software
prevents ads from
appearing on screens
Trang 227 Online Shopping
In a typical shopping session, you connect to
an online storefront and use navigation controls
to browse through the merchant’s catalog As you browse, you can drop items into your electronic shopping cart.
At the checkout counter, you enter the information
Trang 237 Online Shopping
Trang 247 Shopping Carts
Trang 257 Online Auctions
An online auction is the
electronic equivalent to
good old-fashioned yard
sales, rummage sales, and
auctions
You can expect to bid on
new, used, closeout,
overstock, or refurbished
items at an online auction
Computer software takes
Trang 267 Online Payment
The most popular ways to make online
payments include submitting your credit card number directly to a merchant and using a
third-party payment service such as PayPal
Online shoppers are justifiably worried that
personal information and credit card numbers supplied in the course of an e-commerce
Trang 277 Online Payment
A secure connection encrypts the data
transmitted between your computer and a
Web site
• SSL (Secure Sockets Layer)
• S-HTTP (secure HTTP)
Trang 287 Online Payment
Person-to-person payments
are an alternative to credit
cards
– The payment service is the
only entity that sees your credit card number
– Service is in its infancy
An electronic wallet is
software that stores billing
Trang 297 Online Payment
An electronic wallet can transfer your billing and shipping information to a participating site’s e-commerce Web server when you check out.
Trang 317 E-Mail Overview
Any person with an e-mail account can send and receive e-mail messages
Trang 327 E-Mail Overview
Basic e-mail activities
– Writing– Reading– Replying– Forwarding
Trang 33 HTML-compliant e-mail software
Additional e-mail features
Trang 347 E-Mail Overview
Trang 357 Netiquette
Internet etiquette
– Meaningful subject– Use uppercase and lowercase letters– Check spelling
– Be careful what you send– Be polite
– Be cautious with sarcasm and humor
Trang 367 Netiquette
– Use smileys and text
messaging shorthand cautiously
– Use the Bcc function for
Trang 377 E-mail Technology
E-mail systems carry and manipulate e-mail messages
– E-mail servers
– Based on store-and-forward technology
Three types of e-mail systems widely used
today:
– POP– IMAP
Trang 38your hard disk
– E-mail client software– SMTP server
Trang 397 E-mail Technology
Web-based e-mail accounts allow you to use
a browser to access your e-mail messages
Trang 417 Cookie Exploits
An ad-serving cookie can track your activities
at any site containing banner ads from a third party
Trang 427 Cookie Exploits
A Flash cookie, also called a local shared object, is the Flash equivalent of a conventional Web cookie
A Web bug or clear GIF is typically a 1x1 pixel
graphic embedded in a Web page or e-mail
message It is almost invisible due to its size, and is designed to track who’s reading the Web page or e-mail message
Trang 437 Cookie Exploits
Individuals who prefer
not to leave a trail of
their Internet activities
surf through an
anonymous proxy
service, which uses an
intermediary, or proxy,
server to relay Web
page requests after
masking the originating
Trang 447 Fake Sites
looks legitimate, but
has been created by
a third party to be a
very clever replica of
a legitimate Web site
exploit that redirects
users to fake sites
by “poisoning” a
Trang 457 Spam
Spam is unwanted electronic junk mail about
medical products, low-cost loans, and fake software upgrades that arrives in your online mailbox
A spam filter is a type of utility software that
captures unsolicited e-mail messages before they reach your inbox
To combat spam sent by hijacked botnet
computers, e-mail authentication techniques, such
as Sender ID and DomainKeys, verify that e-mail
messages originate from the Internet domain from
Trang 467 Spam
Trang 477 Phishing
Phishing is an e-mail based scam designed
to persuade you to reveal confidential
information, such as your bank account
number or Social Security number
If you don’t want to become a phishing victim,
be suspicious of e-mail messages that
supposedly come from banks, ISPs, online
payment services, operating system
Trang 487 Example: Phishing
Trang 497 Phishing
Trang 50Chapter 7 Complete
The Web and E-mail