1. Trang chủ
  2. » Công Nghệ Thông Tin

module 2 using a web browser

20 411 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 20
Dung lượng 866,52 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

It also explains how to configure Internet Explorer 5 by setting Security and Connections options.. Configure Internet Explorer 5 by setting Security and Connections options!. Configure

Trang 1

Contents

Overview 1

Demonstration: Downloading Files

Review 16

Module 2: Using a Web Browser

Trang 2

to represent any real individual, company, product, or event, unless otherwise noted Complying with all applicable copyright laws is the responsibility of the user No part of this document may

be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Microsoft Corporation If, however, your only means of access is electronic, permission to print one copy is hereby granted

Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property

 2000 Microsoft Corporation All rights reserved

Microsoft, ActiveX, BackOffice, Internet Explorer 5, MS-DOS, WebTV, Windows, Windows NT, and Windows 2000/98/95 are either registered trademarks or trademarks of Microsoft Corporation

in the U.S.A and/or other countries

The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real individual, company, product, or event, unless otherwise noted

Other product and company names mentioned herein may be the trademarks of their respective owners

Program Manager: Steve Merrill

Development Lead: Basabjit Chakrabarty (NIIT)

Instructional Designers: Sangeeta Nair, Vijayalakshmi Narayanaswamy (NIIT); Veena Nambier,

Yatinder Walia (NIIT)

Technical Contributors: Scott Swigart (3 Leaf Solutions); Gary Gumbiner (Great Barrier

Technologies, Inc.)

Graphic Artist: Scott Serna (Creative Assets)

Editing Manager: Jennifer Linn

Editor: Reid Bannecker

Production Manager: Miracle Davis

Production Coordinator: Linda Lu Cannon (The Write Stuff)

Build Coordinator: Eric Wagoner

Testing Lead: Eric Meyers

Testing: Bryan Urakawa, Chris and Edward

Lead Product Manager, Internet Services: Hilary Vandal

Manufacturing Manager: Rick Terek

Operations Coordinator: John Williams

Manufacturing Support: Laura King; Kathy Hershey

Lead Product Manager, Release Management: Bo Galford

Group Manager, Courseware Infrastructure: David Bramble

General Manager: Robert Stewart

Trang 3

Instructor Notes

This module introduces students to the developer features of Microsoft Internet Explorer 5 It also explains how to configure Internet Explorer 5 by setting Security and Connections options Students will also learn how to download files using File Transfer Protocol (FTP) Finally, this module describes and contrasts the features of the Web browsers currently available

After completing this module, students will be able to:

! Identify the developer features of Internet Explorer 5

! Configure Internet Explorer 5 by setting Security and Connections options

! Download files using FTP

! Identify the contrasting features of available Web browsers

Materials and Preparation

This section provides you with the required materials and preparation tasks to teach this module

Required Materials

To teach this module, you need the following materials:

! Microsoft PowerPoint file 1912A_02.ppt

! Module 2, “Using a Web Browser”

Preparation Tasks

To prepare for this module, you should:

! Read all of the materials for this module

! Complete all the demonstrations in the module

Presentation:

30 Minutes

Lab:

00 Minutes

Trang 4

Module Strategy

Use the following strategy to present this module:

! Features for Developers This topic provides an overview of the features that Internet Explorer 5 provides for developers First, explain the dynamic HTML (DHTML) support built-in to Internet Explorer 5 Then, explain the XML support

! Configuring Internet Explorer 5 This section explains how to configure Internet Explorer 5 First, explain the Security options Then, explain the Connections options Finally, explain how to set Security and Connections options

! Downloading Files Using FTP

In this topic, students will learn how to download files using FTP

! Comparing Available Web Browsers

In this topic, students will learn about the technologies that available Web browsers support

Trang 5

# Overview

! Features for Developers

! Configuring Internet Explorer 5

! Downloading Files Using FTP

! Demonstration: Downloading Files Using FTP

! Comparing Available Web Browsers

! Review

Microsoft® Internet Explorer 5 provides a rich platform for building Web-based applications

Internet Explorer 5 is the ideal platform for developers building applications for the Web because Internet Explorer 5:

! Delivers a fast, stable, and rich development environment for creating applications that employ dynamic HTML (DHTML)

! Provides improved support for key standards, including Extensible Markup Language (XML)

! Makes the power of DHTML available for everyone through a new feature called DHTML behaviors

After completing this module, you will be able to:

! Identify the developer features built into Internet Explorer 5

! Configure Internet Explorer 5 by setting the Security and Connections options

! Download files using FTP

! Identify the contrasting features of available Web browsers

Slide Objective

To provide an overview of

the module topics and

objectives

Lead-in

Microsoft Internet Explorer 5

provides a rich platform for

building Web-based

applications

Trang 6

Features for Developers

! Dynamic HTML (DHTML) support

$ Provides interactivity in Web pages

! DHTML behaviors

$ Store Web page information and style

! XML support

$ Enables developers to build Web-based applications

$ Allows you to separate data from presentation

Dynamic HTML (DHTML) allows you to transform a static Web page into something that behaves more like a complete application You can use DHTML

to create rich, interactive pages that require less bandwidth to be displayed in a browser window Internet Explorer 5 provides the benefits of encapsulation and code reusability to DHTML users DHTML behaviors, user data persistence, and data transfer enable interaction of client Web pages without the client having to make numerous requests to the Web server

For more information about DHTML, and to see some example DHTML scripts, go to http://www.dynamicdrive.com/

Dynamic HTML behaviors

Internet Explorer 5 supports DHTML behaviors DHTML behaviors allow you

to store Web page style information

Behaviors are components that separate the HTML code from the script Behaviors store the script in a separate file and allow code reusability

XML support

Internet Explorer 5 is the first commercially available browser that supports XML version 1.0 XML support allows developers to focus on building Web-based applications Internet Explorer 5 also supports other XML-Web-based technologies, such as Extensible Stylesheet Language (XSL) and XML Document Object Model (DOM) XML allows you to separate data from display so that the data retains its semantic meaning XML also allows a given document to be rendered in many different ways through XSL style sheets For more information about XML, go to http://www.xml.com/pub

Slide Objective

To provide an overview of

dynamic HTML and XML

Lead-in

Internet Explorer 5 supports

dynamic HTML and XML

Note

Trang 7

# Configuring Internet Explorer 5

! Exploring Security Options

! Setting Security Options

! Setting Connections Options

! Demonstration: Setting a Proxy Server

Internet Explorer 5 offers a variety of options to control its appearance and operation Let’s look at how to configure two of the key options: Security and Connections

The need for security is an unfortunate side effect of connecting to the Internet and browsing Web pages To help protect you from dangers such as computer viruses, Internet Explorer 5 supports security zones, which allow you to set different levels of security depending on the site that you browse For example, you can configure Internet Explorer 5 to trust a Microsoft ActiveX® object that

is on your company intranet, but restrict the use of ActiveX controls from the Internet

You must set the Connections options before you can access the Internet These options allow you to specify additional information that may be needed to communicate on the Internet For example, if your company uses a proxy server

to connect to the Internet, you may need to configure Internet Explorer 5 so that

it can route page requests through the proxy server

In this section, you will look at how to set the Security and Connections options

in order to configure Internet Explorer

Slide Objective

To provide an overview of

the topics in this section

Lead-in

Internet Explorer 5 offers a

variety of options that

control its appearance and

operations Let’s look at how

to configure two of the key

options: Security and

Connections

Trang 8

Exploring Security Options

! Web Content Zones

$ Internet zone

$ Local intranet zone

$ Trusted sites zone

$ Restricted sites zone

! Security Levels

$ Medium

$ Medium-low

4

Internet Explorer 5 defines security zones for the information that you access on the Internet This allows you to set a different level of security for each zone Determining the level to set depends on where the information comes from and how much trust you have in the source When you attempt to open or download content from the Web, Internet Explorer 5 checks the security settings for the zone of that particular Web site

For example, some pages that you request will contain ActiveX controls An ActiveX control works much like a stand-alone application and has complete access to all the files and registry settings on your computer If a page contains

an ActiveX control, Internet Explorer 5 will download this control, inspect it, and compare the results to the security settings that you have defined For an intranet, you may specify that controls should simply be installed and executed For the Internet, you will probably want to be notified that an ActiveX control has been downloaded, and be given the option of canceling the installation

For an intranet, you typically set the security level to medium-low or low; for the Internet, you set the security level to medium

Slide Objective

To introduce the various

options in the Security tab of

the Internet Options dialog

box

Lead-in

Security is an essential

feature when you have

access to the Internet

Note

Trang 9

Setting Security Options

Let’s look at how to set the security levels for the various security zones in Internet Explorer 5

! Set the Security options

1 Open Internet Explorer

2 On the Tools menu, click Internet Options

3 The Internet Options dialog box appears On the Security tab, select a zone from the Select a Web content zone to specify its security settings

section

Slide Objective

To explain how to set the

Security options

Lead-in

Let’s now look at how to set

the Security options

Delivery Tip

Explain the steps for setting

the Security options

Trang 10

You can set the security level for each zone listed in the Select a Web content zone to specify its security settings section The setting determines how Internet Explorer 5 handles the files that you attempt to load

The four security zones are:

• Internet zone The Internet zone contains addresses of sites that are not present on your computer or assigned to other zones The default security level for the Internet zone is medium

• Local intranet zone The Local intranet zone contains addresses that do not require a proxy

server These include the Web sites specified on the Connections tab,

network paths, and local intranet sites You can add sites to this zone The default security level for the Local intranet zone is medium

• Trusted sites zone The Trusted sites zone contains the sites that can be downloaded without damaging your computer or data You can add sites to this zone The default security level for the Trusted sites zone is low

• Restricted sites zone The Restricted sites zone contains addresses of sites that could potentially damage your computer or data You can add sites to this zone The default security level for the Restricted sites zone is high

Delivery Tip

Explain the security zones

by pointing to the options in

the Security tab of the

Internet Options dialog box

Trang 11

You can check the zone of your current Web page on the right side of the Internet Explorer status bar

4 Set the level for each of the zones listed in the Select a Web content zone

to specify its security settings section to one of the following options in the Security level for this zone:

• High You are notified of any potential security problems The active content that may pose a security problem is not downloaded

• Medium You are warned of potential security problems and then given a choice

to download or view the active content

• Medium-low Similar to the Medium option, except that most of the content will be run without prompts, and unsigned ActiveX controls will not be downloaded

• Low You are not warned of any potential security problem All the active content with a valid security certificate is downloaded

Tip

Delivery Tip

Explain the security levels

by pointing to the options in

the Security tab of the

Internet Options dialog box

Trang 12

Setting Connection Options

! Internet Connection Wizard

! Proxy Server

Before you use Internet Explorer 5 to browse the Internet, you must specify the type of Internet connection that you are using Internet Explorer allows you to connect to the Internet through a local area network (LAN) or a modem

Slide Objective

To describe the sections in

the Connections tab of the

Internet Options dialog box

Lead-in

You need to set specific

connection options before

you can access the Internet

Delivery Tip

Explain the LAN settings

with the help of the screen

shot provided on the slide

Trang 13

To connect to the Internet, click the Connections tab on the Internet Options

dialog box

The LAN settings on the Connections tab are grouped under Proxy server and

Automatic configuration

Internet Connection Wizard

To automatically set up a new connection to the Internet, you can use the Internet Connection Wizard

To use the Internet Connection Wizard, click Setup on the Connections tab

You can also manually configure the modem or LAN settings after you use the Internet Connection Wizard to set up a new connection to the Internet

Proxy server

If you access the Internet through a LAN, you need to connect to a proxy server A proxy server acts as a security barrier between your internal network, which is the intranet, and the Internet A proxy server prevents people on the Internet from gaining access to confidential information on your internal network or your computer

Ngày đăng: 06/07/2014, 09:25

w