0% found this document useful (0 votes)
42 views10 pages

Infot Reviewer 2

The document provides an overview of what the internet is and how it works. It discusses what the internet and web are, how to connect to the internet through services like dial-up, DSL, cable or satellite, and common online activities like email, social media, media streaming and everyday tasks.

Uploaded by

s2300897
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views10 pages

Infot Reviewer 2

The document provides an overview of what the internet is and how it works. It discusses what the internet and web are, how to connect to the internet through services like dial-up, DSL, cable or satellite, and common online activities like email, social media, media streaming and everyday tasks.

Uploaded by

s2300897
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

INTRODUCTION

Email
The Internet is an increasingly important part of everyday life for people Short for electronic mail, email is a way to send and receive messages across
around the world. the Internet. Almost everyone who uses the Internet has their own email
account, usually called an email address. This is because you'll need an email
What is the Internet? address to do just about anything online, from online banking to creating a
The Internet is a global network of billions of computers and other electronic Facebook account.
devices. With the Internet, it's possible to access almost any information,
communicate with anyone else in the world, and do much more. Social networking
You can do all of this by connecting a computer to the Internet, which is also Social networking websites are another way to connect and share with your
called going online. When someone says a computer is online, it's just another family and friends online. Rather than sharing with just a few people over
way of saying it's connected to the Internet. email, social networks make it easier to connect and share with many people
at the same time. Facebook is the world's largest social networking site, with
What is the Web? more than 1 billion users worldwide.
The World Wide Web—usually called the Web for short—is a collection of
different websites you can access through the Internet. A website is made up Chat and instant messaging
of related text, images, and other resources. Websites can resemble other Chat and instant messaging (IM) are short messages sent and read in real time,
forms of media—like newspaper articles or television programs—or they can allowing you to converse more quickly and easily than email. These are
be interactive in a way that's unique to computers. generally used when both (or all) people are online, so your message can be
The purpose of a website can be almost anything: a news platform, an read immediately. By comparison, emails won't be seen until recipients check
advertisement, an online library, a forum for sharing images, or an educational their inboxes.
site like us!
Screenshot of chat
How does the Internet work? Examples of instant messaging applications include Yahoo Messenger and
It's important to realize that the Internet is a global network of physical cables, Google Hangouts. Some sites, like Gmail and Facebook, even allow you to
which can include copper telephone wires, TV cables, and fiber optic cables. chat within your web browser.
Even wireless connections like Wi-Fi and 3G/4G rely on these physical cables
to access the Internet. Online media
There are many sites that allow you to watch videos and listen to music. For
When you visit a website, your computer sends a request over these wires to a example, you can watch millions of videos on YouTube or listen to Internet
server. A server is where websites are stored, and it works a lot like your radio on Pandora. Other services, like Netflix and Hulu, allow you to watch
computer's hard drive. Once the request arrives, the server retrieves the movies and TV shows. And if you have a set-top streaming box, you can even
website and sends the correct data back to your computer. watch them directly on your television instead of a computer screen.

Other things you can do on the Internet Everyday tasks


One of the best features of the Internet is the ability to communicate almost You can also use the Internet to complete many everyday tasks and errands.
instantly with anyone in the world. Email is one of the oldest and most For example, you can manage your bank account, pay your bills, and shop for
universal ways to communicate and share information on the Internet, and just about anything. The main advantage here is convenience. Rather than
billions of people use it. Social media allows people to connect in a variety of going from place to place, you can do all of these tasks at home!
ways and build communities online.
And a whole lot more!
There are many other things you can do on the Internet. There are thousands Remember, these are just a few of the things you'll be able to do online. Keep
of ways to keep up with news or shop for anything online. You can pay your working through this tutorial to learn more about connecting to the Internet
bills, manage your bank accounts, meet new people, watch TV, or learn new and using the Web!
skills. You can learn or do almost anything online.

HOW DO I CONNECT TO THE INTERNET?


WHAT CAN YOU DO ONLINE?
Once you've set up your computer, you may want to purchase home Internet
Introduction access so you can send and receive email, browse the Web, stream videos, and
There's almost no limit to what you can do online. The Internet makes it more. You may even want to set up a home wireless network, commonly
possible to quickly find information, communicate with people around the known as Wi-Fi, so you can connect multiple devices to the Internet at the
world, manage your finances, shop from home, listen to music, watch videos, same time.
and much, much more. Let's take a look at some of the ways the Internet is
most commonly used today. Types of Internet service
The type of Internet service you choose will largely depend on which Internet
Finding information online service providers (ISPs) serve your area, along with the types of service they
With billions of websites online today, there is a lot of information on the offer. Here are some common types of Internet service.
Internet. Search engines make this information easier to find. All you have to
do is type one or more keywords, and the search engine will look for relevant Dial-up: This is generally the slowest type of Internet connection, and you
websites. should probably avoid it unless it is the only service available in your area.
Dial-up Internet uses your phone line, so unless you have multiple phone
For example, let's say you're looking for a new pair of shoes. You could use a lines you will not be able to use your landline and the Internet at the same
search engine to learn about different types of shoes, get directions to a nearby time.
shoe store, or even find out where to buy them online!
DSL: DSL service uses a broadband connection, which makes it much faster
There are many different search engines you can use, but some of the most than dial-up. DSL connects to the Internet via a phone line but does not
popular include Google, Yahoo!, and Bing.
require you to have a landline at home. And unlike dial-up, you'll be able to Setting up your Internet connection
use the Internet and your phone line at the same time. Once you've chosen an ISP, most providers will send a technician to your
house to turn on the connection. If not, you should be able to use the
Cable: Cable service connects to the Internet via cable TV, although you do instructions provided by your ISP—or included with the modem—to set up
not necessarily need to have cable TV in order to get it. It uses a broadband your Internet connection.
connection and can be faster than both dial-up and DSL service; however, it is
only available where cable TV is available. After you have everything set up, you can open your web browser and begin
using the Internet. If you have any problems with your Internet connection,
Satellite: A satellite connection uses broadband but does not require cable or you can call your ISP's technical support number.
phone lines; it connects to the Internet through satellites orbiting the
Earth. As a result, it can be used almost anywhere in the world, but the Home networking
connection may be affected by weather patterns. Satellite connections are also If you have multiple computers at home and want to use all of them to access
usually slower than DSL or cable. the Internet, you may want to create a home network, also known as a Wi-Fi
network. In a home network, all of your devices connect to your router,
3G and 4G: 3G and 4G service is most commonly used with mobile phones, which is connected to the modem. This means everyone in your family can
and it connects wirelessly through your ISP's network. However, these types use the Internet at the same time.
of connections aren't always as fast as DSL or cable. They will also limit the
amount of data you can use each month, which isn't the case with most Your ISP technician may be able to set up a home Wi-Fi network when
broadband plans. installing your Internet service. If not, you can review our lesson on How to
Set Up a Wi-Fi Network to learn more.
Choosing an Internet service provider
Now that you know about the different types of Internet service, you can do If you want to connect a computer that does not have built-in Wi-Fi
some research to find out what ISPs are available in your area. If you're connectivity, you can purchase a Wi-Fi adapter that plugs into your computer's
having trouble getting started, we recommend talking to friends, family USB port.
members, and neighbors about the ISPs they use. This will usually give you a
good idea of the types of Internet service available in your area.
UNDERSTANDING THE CLOUD
Most ISPs offer several tiers of service with different Internet speeds, usually
measured in Mbps (short for megabits per second). If you mainly want to What is the cloud?
use the Internet for email and social networking, a slower connection (around You may have heard people using terms like the cloud, cloud computing, or
2 to 5 Mbps) might be all you need. However, if you want to download music cloud storage. But what exactly is the cloud?
or stream videos, you'll want a faster connection (at least 5 Mbps or higher).
Simply put, the cloud is the Internet—more specifically, it's all of the things
You'll also want to consider the cost of the service, including installation you can access remotely over the Internet. When something is in the cloud, it
charges and monthly fees. Generally speaking, the faster the connection, the means it's stored on Internet servers instead of your computer's hard drive.
more expensive it will be per month.
Why use the cloud?
*Although dial-up has traditionally been the least expensive option, many Some of the main reasons to use the cloud are convenience and reliability. For
ISPs have raised dial-up prices to be the same as broadband. This is intended example, if you've ever used a web-based email service, such as Gmail or
to encourage people to switch to broadband. We do not recommend dial-up Yahoo! Mail, you've already used the cloud. All of the emails in a web-based
Internet unless it's your only option. service are stored on servers rather than on your computer's hard drive. This
means you can access your email from any computer with an Internet
Hardware needed connection. It also means you'll be able to recover your emails if something
happens to your computer.
Modem
Once you have your computer, you really don't need much additional Let's look at some of the most common reasons to use the cloud.
hardware to connect to the Internet. The primary piece of hardware you need
is a modem. File storage: You can store all types of information in the cloud, including
files and email. This means you can access these things from any computer or
The type of Internet access you choose will determine the type of modem you mobile device with an Internet connection, not just your home computer.
need. Dial-up access uses a telephone modem, DSL service uses a DSL Dropbox and Google Drive are some of the most popular cloud-based
modem, cable access uses a cable modem, and satellite service uses a storage services.
satellite adapter. Your ISP may give you a modem—often for a fee—when
you sign a contract, which helps ensure that you have the right type of File sharing: The cloud makes it easy to share files with several people at the
modem. However, if you would prefer to shop for a better or less expensive same time. For example, you could upload several photos to a cloud-based
modem, you can choose to buy one separately. photo service like Flickr or iCloud Photos, then quickly share them with
friends and family.
Router
A router is a hardware device that allows you to connect several computers Backing up data: You can also use the cloud to protect your files. There are
and other devices to a single Internet connection, which is known as a home apps such as Carbonite that automatically backup your data to the cloud. This
network. Many routers are wireless, which allows you to create a home way, if your computer ever is lost, stolen, or damaged, you'll still be able to
wireless network, commonly known as a Wi-Fi network. recover these files from the cloud.

You don't necessarily need to buy a router to connect to the Internet. It's What is a web app?
possible to connect your computer directly to your modem using an Ethernet Web applications—or web apps—that run in the cloud and do not need to be
cable. Also, many modems include a built-in router, so you have the option installed on your computer. Many of the most popular sites on the Internet are
of creating a Wi-Fi network without buying extra hardware. actually web apps.
Facebook: Facebook lets you create an online profile and interact with your Avoid using words that can be found in the dictionary. For example,
friends. Profiles and conversations can be updated at any time, so Facebook swimming1 would be a weak password.
uses web app technologies to keep the information up to date. Random passwords are the strongest. If you're having trouble creating one,
you can use a password generator instead.
Pixlr: Pixlr is an image editing application that runs in your web browser.
Much like Adobe Photoshop, it includes many advanced features, like color Your browser's security features
correction and sharpening tools. Your computer faces different threats whenever you browse the Web,
including viruses, malware, and spyware. The good news is your web browser
Google Docs: Google Docs is an office suite that runs in your browser. Much has a lot of built-in security features to help protect your computer.
like Microsoft Office, you can use it to create documents, spreadsheets,
presentations, and more. And because the files are stored in the cloud, it's easy Check the web address
to share them with others. Malicious websites often use deceptive web addresses to trick users. For
example, www.wellfargo.com looks similar to www.wellsfargo.com, but it's
missing the s in the middle.
INTERNET SAFETY
Double-checking the domain name is a good way to ensure you're going to the
Introduction to Internet safety real, trusted site—not a phony site with a similar web address. Some web
There's almost no limit to what you can do online. Unfortunately, the Internet browsers will even try to make the domain name easier to read. In the example
is also home to certain risks, such as malware, spam, and phishing. If you below, you can see that wellsfargo.com uses a darker color in the address bar.
want to stay safe online, you'll need to understand these risks and learn how to
avoid them. Look at the security symbol
Some websites will display a lock symbol in the address bar. This is most
Adopting a safer mindset commonly seen with certain types of websites, like online stores and banking
Computers can often give us a false sense of security. After all, no one can sites. This means the website is using an HTTPS connection, which makes it
physically harm you through a computer screen. But to stay safe online, you'll safe to enter your personal information. You'll also see https at the beginning
want to take a more cautious approach. Here's one way to think about it: Treat of the URL.
the Internet as you would a shopping mall.
the HTTPS symbol
Most people don't consider a mall to be an especially dangerous place. You You won't see this symbol on all websites, and that's OK—not all websites
can go there to shop and meet up with friends. But there are also small things need this extra layer of security. However, you should avoid entering any
you may do to stay safe, even if you don't think about them very often. For sensitive information, such as your credit card number, if you don't see this
example, you probably wouldn't leave your car unlocked or give your credit symbol in the address bar.
card number to a stranger.
Update your browser regularly
Apply this same mindset whenever you're online. You shouldn't be afraid to New viruses and malware are created all the time, so it's important to update
use the Internet, but remember that it comes with many of the same risks your browser regularly. Your browser will usually notify you when it has an
you'd face in the real world. Throughout this tutorial, we'll show you how to update available, but you always have the option to update manually.
prepare for these risks so you can be online without putting yourself in danger.
Avoiding spam and phishing
Creating strong passwords To protect yourself from email scams, malicious software, and identity theft,
You'll need to create a password to do just about everything on the Web, from you'll need to understand how to identify and avoid potentially dangerous
checking your email to online banking. And while it's simpler to use a short, content in your inbox, including spam and phishing attempts.
easy-to-remember password, this can also pose serious risks to your online
security. To protect yourself and your information, you'll want to use Dealing with spam
passwords that are long, strong, and difficult for someone else to guess Spam messages can clutter your inbox and make it more difficult to find the
while still keeping them relatively easy for you to remember. emails you actually want to read. Even worse, spam often includes phishing
and malware, which can pose a serious risk to your computer. Fortunately,
Why do I need a strong password? most email services now include several features to help you protect your
Even though most websites are secure, there's always a small chance someone inbox from spam.
may try to access or steal your information. This is commonly known as
hacking. A strong password is one of the best ways to defend your accounts Spam filters
and private information from hackers. Whenever you receive an email, most email providers will check to see if it's a
real message or spam. Any likely spam messages will be placed in the spam
Tips for creating strong passwords folder so you don’t accidentally open them when checking your email.
A strong password is one that's easy for you to remember but difficult for
others to guess. Spam-blocking systems aren’t perfect, though, and there may be times when
legitimate emails end up in your spam folder. We recommend checking your
Never use personal information such as your name, birthday, user name, spam folder regularly to make sure you aren’t missing any important emails.
or email address. This type of information is often publicly available, which
makes it easier for someone to guess your password. Many email services also have a feature you can use to mark emails as spam.
In Gmail, for example, you can select the message and click the Mark as
Use a longer password. Your password should be at least six characters long, Spam button. This helps your email provider filter out these types of messages
although for extra security it should be even longer. in the future.
Don't use the same password for each account. If someone discovers your
password for one account, all of your other accounts will be vulnerable. Turning off email images
Try to include numbers, symbols, and both uppercase and lowercase Spam messages often contain images that the sender can track. When you
letters. open the email, the images will load and the spammer will be able to tell if
your email works, which could result in even more spam. You can avoid this
by turning off email images. Let's look at how to do this in Gmail, but - Ads can look like messages saying you have won a prize and
remember that the process will vary depending on your email service. instructing you to click to claim it.
- Pop-up windows frequently contain malware or attempt to lead
Phishing you to a less secure site. Most reputable sites don't use pop-up
Phishing scams are messages that try to trick you into providing sensitive windows. Many browsers block pop-up windows by default.
information. These often appear to come from a bank or another trusted - If you are prompted to download something you weren't
source, and they'll usually want you to re-enter a password, verify a birth date, expecting—or if it seems to be unrelated to the page you were
or confirm a credit card number. Phishing messages may look real enough at on—it's probably malware.
first glance, but it’s surprisingly easy for scammers to create convincing - Headlines that are ambiguous and sensational that encourage you
details. to click to read more are called clickbait. Sites that use lots of
clickbait headlines are more likely to contain links to malware.
Logo Fraud
It's easy to make a copy of any logo. Identify suspicious sites
If you're ever unsure whether a website or download is safe, close it and
Other common email scams investigate the site before returning to it. It's always a good idea to be cautious
Some will promise to give you a lot of money if you advance a small amount when browsing unfamiliar sites.
upfront. Others may pretend to be from people you know in real life, and
they'll often ask you to send money or download an attached file. - Ask your friends if the site is reputable or if they have any
experiences with the site.
As with spam and phishing scams, remember to trust your best judgment. You should - Search for information about the site. Use a search engine to find
never send someone money just because you've received an email request. You should news about the organization that runs the site, or look for posts on
also never download email attachments you weren't expecting because they might contain
forums about other people's experiences with that site.
malware that could damage your computer and steal your personal information.
- Check the address bar in your browser. Some malicious
websites are designed to look like other well-known sites, but your
Spam, scams, and phishing schemes will continue to evolve and change. But
address bar will tell you which site you're actually on. If you are no
now that you know what to look for—and what to avoid—you can keep your
longer on the site you expected to be, it's suspicious.
inbox and computer that much safer.
- Run a Google safe browsing diagnostic on the site. Copy and
paste the URL of a site into the search box on the diagnostic page,
then click the search button. This will display a site safety report.
INTERNET SAFETY: HOW TO AVOID MALWARE

How to avoid malware


LESSON 6: SAFE ONLINE SHOPPING
Malware is one of the most common hazards to your computer when you're
Safe online shopping
online, but it's easy to avoid. Developing safe and smart browsing habits can
Online shopping is a convenient way to buy almost anything from the comfort
protect you from malware and other threats, like viruses. Securing your
of your home. And while there are some risks with shopping online, there are
computer and learning how to identify and avoid suspicious links are the
also many ways to protect yourself and your financial information.
fundamentals of safe browsing habits.
Shop from home
Secure your computer
To protect sensitive information like credit card numbers, you'll want to shop
Limiting your computer's vulnerability to malware is a crucial safe browsing
from your home Internet connection if possible. Try to avoid shopping when
habit. You can protect your computer by running antivirus and antimalware
connected to a public Wi-Fi network or when using a public computer, such as
software like Bitdefender or Norton. These programs can block malware
a library computer. Public computers and Wi-Fi networks are at a slightly
from being installed and can remove it if it does get onto your computer. Even
greater risk for hacking, which could put your information at risk.
if you don't see signs of malware on your computer, running regular scans can
catch any malware that has escaped notice.
Look for HTTPS
Many websites will display a lock symbol in the address bar. This is most
Many malware programs take advantage of security flaws in Windows and
commonly seen on the payment page of an online store. This means the
other software. Keeping your OS, browser, and other programs updated is
website is using an HTTPS connection, which makes it safe to enter your
an important step in protecting your computer. The security patches in these
information. However, you should avoid entering your credit card number or
updates make your computer immune to many threats.
other financial information if you don't see this symbol.
Backup your files
Research the company or seller
Some malware can delete or corrupt data on your drives. Preparing for the
Anyone can set up a shop online, so it's important to research a company or
possibility of data loss is much easier and cheaper than attempting to recover
seller before buying from the site. Make sure the business has a physical
data after a malware attack. The two most common ways of doing this are
address and phone number you can contact if there's a problem. You can also
copying your data to an external drive and using an online backup service.
check for reviews on sites like Yelp and Google.

Use secure payment methods


Avoid suspicious links
Credit cards are generally the safest way to pay for items online. Avoid
Most malware requires you to click something to download and install it.
options like direct wire transfer, bank transfers, or sending cash or checks
These links are often disguised as something they are not. If you are aware of
through the mail. And if you don't like the idea of giving your credit card
what suspicious links can look like, you can avoid them. Here are some
information to different retailers, you could try an online payment service like
examples of misleading links concealing malware downloads.
PayPal or Google Wallet. Check out our What is PayPal? lesson to learn more.
- Ads on websites can look like system messages or diagnostics
Keep a record
warning you that something is wrong with your computer, like the
Always save records of your online transactions, which should include the
image below.
receipt, order number, product description, and price. You will also want to
save any emails you send or receive from a seller, which may come in handy you could use a private browsing mode whenever you go online. This will
if there's a problem later on. prevent any cookies from being saved to your web browser.

Trust your instincts using a private browsing tab


In the end, use your common sense and trust your instincts. If a deal seems too Private browsing mode won't protect against every kind of browser tracking.
good to be true, it probably is. And if anything seems suspicious, remember To learn more, check out our lesson on Browsing Privately.
that you don't have to make the purchase.
Account tracking
Even if you never allow websites to store cookies, there are other ways your
LESSON 7: UNDERSTANDING BROWSER TRACKING browsing habits can be tracked. For example, when you create an account
with a site like Facebook or Google, you're also giving them permission to
Understanding browser tracking track and save information on your activity. Instead of saving this information
Whenever you use the Internet, you leave a record of the websites you visit, in a cookie, it's stored by the company and associated with your account.
along with each and every thing you click. To track this information, many
websites save a small piece of data—known as a cookie—to your web In many cases, this information is then provided to third-party advertisers,
browser. In addition to cookies, many websites can use your user accounts to who can use this information to deliver personalized ads across the Internet.
track browsing activity. While this type of browser tracking doesn't pose a And while you can usually disable these tracking settings, they will be enabled
serious risk to your online security, it's important to understand how your by default.
online data is tracked and used.
changing Facebook ad settings
Why do websites track browsing activity? Check out our lessons on Adjusting Your Facebook Privacy Settings and
There are many reasons a website might track your browsing activity. In some Understanding Google Privacy to learn more about controlling the information
cases, it's simply to make your browsing experience faster and more you share with these service providers.
convenient. But this data can also be used to determine your browsing habits
and preferences—information that is frequently used by advertisers in LESSON 8: SOCIAL MEDIA PRIVACY BASICS
determining what ads to show you online. Here are a few common examples
of when a website might track your online activity. Understanding social media privacy
Social media sites like Facebook, Instagram, and Twitter have made it easier
- Video sites like YouTube and Netflix collect information on the than ever to share things online. But sharing something on social media is a bit
videos you watch, which helps them suggest more videos you different from other types of online communication. Unlike email or instant
might like. messaging, which are relatively private, the things you share on social media
- Online stores like Amazon and eBay keep a record of the different are more public, which means they'll usually be seen by lots of other people.
items you view and purchase, which helps them suggest other
products you may want to buy. Think before you share
- Search engines like Google keep a record of the things you search While social media sites offer privacy tools to help you limit who can see the
for. This can help them suggest more relevant searches, but it can things you share, it's important to realize that they are fundamentally more
also be used for advertising purposes. For example, if you search open and social than traditional communication tools. Whether or not you
for a coffee maker on Google, you might see ads for coffee makers realize it, the things you share online also can affect how you're perceived by
on other websites in the future. others. That's why you'll always want to think carefully about what you share
over social media.
How do cookies work?
Cookies can store specific information on the websites you visit and the things Review your privacy settings
you click on different sites. If you don't have an account on a particular site, As we mentioned above, all social networking sites have privacy settings that
this information is typically saved in a cookie to your web browser. For allow you to control who you share with. For example, whenever you share
example, a news website might use cookies to see if you've previously visited something on Facebook, you can choose to share with just a few people, all of
its site—and what articles you read on your last visit—so it can suggest more your Facebook friends, or publicly with everyone on Facebook. That's why it's
articles based on your previous choices. so important to understand how your privacy settings work and how to control
them.
Should I be worried about cookies?
Generally speaking, cookies don't pose a serious risk to your online EXTRAS:
security—you're unlikely to acquire malware or expose sensitive financial 9. What to do if your computer gets a virus.
information by using cookies. Still, if you don't like the idea of websites 10. Installing and updating browser plug in
collecting information about you this way, there are options for limiting 11. I Have to Provide My Phone Number? Using Phone Verification
cookie tracking on your computer. 12. Wi-Fi Security
13. Driving Safely with Mobile Devices
How to avoid cookie tracking 14. Should I Still Use Adobe Flash Player?
There are a few different ways to avoid cookie tracking. Some websites
actually give you the option to disable cookie tracking on their site, although
this may also disable certain site features.

If you want to opt out of cookies entirely, you could try enabling the Do Not What is IoT? The internet of things explained
Track setting in your browser. Most web browsers disable this feature by
default, but it can usually be activated from the privacy settings. The internet of things (IoT) is a network of connected smart devices providing
rich data, but it can also be a security nightmare.
turning on the Do Not Track feature in Google Chrome
Note that participation in the Do Not Track program is voluntary, so some The internet of things (IoT) is a catch-all term for the growing number of
sites may not honor this request. If you'd prefer to avoid cookies altogether, electronics that aren’t traditional computing devices, but are connected to the
internet to send data, receive instructions or both.
The final step, data processing and analytics, can take place in data centers or
There’s an incredibly broad range of ‘things’ that fall under the IoT umbrella: the cloud, but sometimes that’s not an option. In the case of critical devices
Internet-connected ‘smart’ versions of traditional appliances such as such as shutoffs in industrial settings, the delay of sending data from the
refrigerators and light bulbs; gadgets that could only exist in an device to a remote data center is too great. The round-trip time for sending
internet-enabled world such as Alexa-style digital assistants; and data, processing it, analyzing it and returning instructions (close that valve
internet-enabled sensors that are transforming factories, healthcare, before the pipes burst) can take too long.
transportation, distribution centers and farms.
In such cases edge computing can come into play, where a smart edge device
What is the internet of things? can aggregate data, analyze it and fashion responses if necessary, all within
The IoT brings internet connectivity, data processing and analytics to the relatively close physical distance, thereby reducing delay. Edge devices also
world of physical objects. For consumers, this means interacting with the have upstream connectivity for sending data to be further processed and
global information network without the intermediary of a keyboard and screen stored.
(Alexa, for example).
A growing number of edge computing use cases, such as autonomous vehicles
In enterprise settings, IoT can bring the same efficiencies to manufacturing that need to make split-second decisions, is accelerating the development of
processes and distribution systems that the internet has long delivered to edge technologies that can process and analyze data immediately without
knowledge work. Billions of embedded internet-enabled sensors worldwide going to the cloud.
provide an incredibly rich set of data that companies can use to improve the
safety of their operations, track assets and reduce manual processes. Network World How Internet of Things Works diagram
Network World / IDG
Data from machines can be used to predict whether equipment will break How the internet of things works.
down, giving manufacturers advance warning to prevent long stretches of
downtime. Researchers can also use IoT devices to gather data about customer Examples of IoT devices
preferences and behavior, though that can have serious implications for Essentially, any device that can gather and transmit information about the
privacy and security. physical world can participate in the IoT ecosystem. Smart home appliances,
RFID tags, and industrial sensors are a few examples. These sensors can
How big is the IoT? monitor a range of factors including temperature and pressure in industrial
In a word: enormous. Priceonomics breaks it down: There were more than 50 systems, status of critical parts in machinery, patient vital signs, the use of
billion IoT devices in 2020, and those devices generated 4.4 zettabytes of data. water and electricity, among many, many other possibilities.
(A zettabyte is a trillion gigabytes.) By comparison, in 2013 IoT devices
generated a mere 100 billion gigabytes. The amount of money to be made in Factory robots can be considered IoT devices, as well as autonomous vehicles
the IoT market is similarly staggering; estimates on the value of the market in and robots that move products around industrial settings and warehouses.
2025 range from $1.6 trillion to $14.4 trillion. Municipalities exploring smart city ecosystems are using IoT and
machine-to-machine (M2M) sensors to enable applications such as traffic
In its Global IoT Market Forecast, IoT Analytics Research predicts there will monitoring, street light management, and crime prevention through camera
be 27 billion active IoT connections (excluding computers, laptops, phones, feeds.
cellphones and tablets) by 2025. However, the company did lower its forecast
based on the ongoing chip shortage, which it expects to impact the number of Other examples include fitness wearables and home security systems. There
connected IoT devices beyond 2023. are also more generic devices, like the Raspberry Pi or Arduino, that let you
build your own IoT endpoints. Even though you might think of your
How does the IoT work? smartphone as a pocket-sized computer, it may well also be beaming data
The first element of an IoT system is the device that gathers data. Broadly about your location and behavior to back-end services in very IoT-like ways.
speaking, these are internet-connected devices, so they each have an IP
address. They range in complexity from autonomous mobile robots and IoT device management
forklifts that move products around factory floors and warehouses, to simple In order to work together, all those devices need to be authenticated,
sensors that monitor the temperature or scan for gas leaks in buildings. provisioned, configured, and monitored, as well as patched and updated as
necessary. Too often, all this happens within the context of a single vendor’s
They also include personal devices such as fitness trackers that monitor the proprietary systems – or, it doesn’t happen at all, which is even more risky.
number of steps individuals take each day. But the industry is starting to transition to a standards-based device
management model, which allows IoT devices to interoperate and will ensure
Explore related questions that devices aren’t orphaned.
How do IoT devices impact everyday consumer privacy?
Can IoT devices function in areas with poor internet connectivity? IoT communication standards and protocols
What are the potential health risks of widespread IoT usage? When IoT gadgets talk to other devices, they can use a wide variety of
How does IoT contribute to the advancement of smart cities? communication standards and protocols, many tailored to devices with limited
Are there international regulations governing IoT device interoperability? processing capabilities or low power consumption. Some of these you’ve
Ask a question definitely heard of — Wi-Fi or Bluetooth, for instance — but many more are
specialized for the world of IoT. ZigBee, for example, is a wireless protocol
Ask for low-power, short-distance communication, while message queuing
In the next step in the IoT process, collected data is transmitted from the telemetry transport (MQTT) is a publish/subscribe messaging protocol for
devices to a gathering point. Moving the data can be done wirelessly using a devices connected by unreliable or delay-prone networks. (See Network
range of technologies or over wired networks. Data can be sent over the World’s glossary of IoT standards and protocols.)
internet to a data center or the cloud. Or the transfer can be performed in
phases, with intermediary devices aggregating the data, formatting it, filtering The increased speeds and bandwidth of 5G cellular networks are expected to
it, discarding irrelevant or duplicative data, then sending the important data benefit IoT. In its Global IoT Market Forecast, IoT Analytics Research
along for further analysis. predicted a compounded annual growth rate (CAGR) of 159% for 5G-based
IoT devices from 2021 through 2025.
IoT, edge computing and the cloud
IoT and business applications
Business uses for IoT include keeping track of customers, inventory, and the
Network World / IDG status of important components. Here are four industries that have been
How edge computing enables IoT. transformed by IoT:

For many IoT systems, the stream of data is coming in fast and furious, which Oil and gas: Isolated drilling sites can be better monitored with IoT sensors
has given rise to a new technology category called edge computing, which than by human intervention.
consists of appliances placed relatively close to IoT devices, fielding the flow Agriculture: Granular data about crops growing in fields derived from IoT
of data from them. These machines process that data and send only relevant sensors can be used to increase yields.
material back to a more centralized system for analysis. For instance, imagine HVAC: Climate control systems across the country can be monitored by
a network of dozens of IoT security cameras. Instead of bombarding the manufacturers.
building’s security operations center (SoC) with simultaneous live-streams, Brick-and-mortar retail: Customers can be micro-targeted with offers on their
edge-computing systems can analyze the incoming video and only alert the phones as they linger in certain parts of a store.
SoC when one of the cameras detects movement. More generally, enterprises are looking for IoT solutions that can help in four
areas: energy use, asset tracking, security, and customer experience.
And where does that data go once it’s been processed? Well, it might go to
your centralized data center, but more often than not it will end up in the Industrial IoT
cloud. The elastic nature of cloud computing is great for IoT scenarios where The IIoT is a subset of the Internet of Things made up of connected sensors
data might come in intermittently or asynchronously. and instrumentation for machinery in the transport, energy, and industrial
sectors. The IIoT includes some of the most well-established sectors of the
Cloud vendors offer IoT platforms IoT market, including the descendants of some devices that predate the IoT
The cloud giants (Microsoft, Amazon, Google) are trying to sell more than moniker. IIoT devices are often longer-lived than most IoT endpoints – some
just a place to stash the data your sensors have collected. They’re offering full remain in service for a decade or more – and as a result may use legacy,
IoT platforms, which bundle together much of the functionality to coordinate proprietary protocols and standards that make it difficult to move to modern
the elements that make up IoT systems. In essence, an IoT platform serves as platforms.
middleware that connects the IoT devices and edge gateways with the
applications you use to deal with the IoT data. That said, every platform Consumer IoT
vendor seems to have a slightly different definition of what an IoT platform is, The move of IoT into consumer devices is more recent but much more visible
the better to distance themselves from the competition. to ordinary people. Connected devices range from fitness wearables that track
our movements to internet-enabled thermometers. Probably the most
IoT and Big Data analytics prominent IoT consumer product is the home assistant, such as Amazon Alexa
Imagine a scenario where people at a theme park are encouraged to download or Google Home.
an app that offers information about the park. At the same time, the app sends
GPS signals back to the park’s management to help predict wait times in lines. IoT security and vulnerabilities
With that information, the park can take action in the short term (by adding IoT devices have earned a bad reputation when it comes to security. PCs and
more staff to increase the capacity of some attractions, for instance) and the smartphones are “general use” computers designed to last for years, with
long term (by learning which rides are the most and least popular at the park). complex, user-friendly OSes that now have automated patching and security
features built in.
The theme park example is small potatoes compared to many real-world IoT
data-harvesting operations. Many big data operations use information IoT devices, by contrast, are often basic gadgets with stripped-down OSes.
harvested from IoT devices, correlated with other data points, to get insight They are designed for individual tasks and minimal human interaction, and
into human behavior. cannot be patched, monitored or updated. Because many IoT devices are
ultimately running a version of Linux under the hood with various network
For example, X-Mode released a map based on tracking location data of ports available, they make tempting targets for hackers.
people who partied at spring break in Ft. Lauderdale in March of 2020, even
as the coronavirus pandemic was gaining speed in the United States, showing Perhaps nothing demonstrated this more than the Mirai botnet, which was
where all those people ended up across the country. The map was shocking created by a teenager telnetting into home security cameras and baby monitors
not only because it showed the potential spread of the virus, but also because that had easy-to-guess default passwords, and which ended up launching one
it illustrated just how closely IoT devices can track us. (For more on IoT and of history’s largest DDoS attacks.
analytics, click here.)
While this situation is improving somewhat, the truth is that IoT transactions
IoT and AI are by and large still not secure. Enterprise IoT customers can work to
The volume of data IoT devices can gather is far larger than any human can improve their IoT security, but vendors need to make IoT devices more secure
deal with in a useful way, and certainly not in real time. We’ve already seen and easier to keep secure if they’re going to be in the field for any length of
that edge computing devices are needed just to make sense of the raw data time. (Related story: 7 steps to enhance IoT security)
coming in from the IoT endpoints. There’s also the need to detect and deal
with data that might be just plain wrong. Companies continue to expand on their security options for IoT devices. For
example, Microsoft recently announced its Edge Secured-core program for
Many IoT providers are offering machine learning and artificial intelligence Windows-based IoT devices. The program aims to address issues such as
capabilities to make sense of the collected data. IBM’s Watson platform, for device identity, secure boot, operating system hardening, device updates, data
instance, can be trained on IoT data sets to produce useful results in the field protection, and vulnerability disclosures.
of predictive maintenance — analyzing data from drones to distinguish
between trivial damage to a bridge and cracks that need attention, for instance. Privacy and IoT
Meanwhile, Arm has announced low-power chips that can provide AI No one wants a hacker snooping on private data. But what if it’s the company
capabilities on the IoT endpoints themselves. The company also launched new that sold the gadget that’s doing the spying? Take, for instance, home digital
IoT processors, such as the Cortex-M85 and Corstone-1000 that supports AI assistants. Recode has a pretty good breakdown on what Amazon and Google
at the edge. can learn about a person from connected devices. You’re probably not that
worried about Amazon learning when you turn your lights on and off, but
remember, every bit of information goes into a data lake that can help The Ribbon
companies produce a surprisingly complete picture of your life. The Ribbon contains all of the commands you will need to perform common
tasks in PowerPoint. It has multiple tabs, each with several groups of
The ability of IoT devices to track a user’s location is a particular privacy commands.
concern. Consider the map of spring breakers potentially carrying coronavirus
home, for instance. Location data is in theory anonymized, but The New York Tell Me
Times put together an extensive report showing how, for instance, the data The Tell me box works like a search bar to help you quickly find tools or
could be used to track the movements of individuals who could later be commands you want to use.
identified by name. Another incident crossed the line into a failure in
operational security: the Strava heat map, which shows popular running routes Microsoft Account
for Fitbit users around the world, accidentally revealed several secret From here, you can access your Microsoft account information, view your
American military bases. profile, and switch accounts.

History of IoT Ruler


A world of omnipresent connected devices and sensors is one of the oldest The Ruler is located at the top and to the left of your current slide. It makes it
tropes of science fiction. IoT lore has dubbed a vending machine at Carnegie easy to align text and objects on your slide.
Mellon University that was connected to ARPANET in 1970 as the first
Internet of Things device, and many technologies have been touted as Slide Pane
enabling “smart” IoT-style characteristics to give them a futuristic sheen. But Here, you can view and edit the selected slide.
the term Internet of Things was coined in 1999 by British technologist Kevin
Ashton. Slide Navigation Pane
The slide navigation pane allows you to view and organize the slides in your
At first, the technology lagged behind the vision. Every internet-connected presentation.
thing needed a processor and a means to communicate with other things,
preferably wirelessly, and those factors imposed costs and power requirements Vertical and Horizontal Scroll Bars
that made widespread IoT rollouts impractical, at least until Moore’s Law The scroll bars allow you to scroll up and down or side to side. To do this,
caught up in the mid-2000s. click and drag the vertical or horizontal scroll bar.

One important milestone was widespread adoption of RFID tags, cheap Slide Number Indicator
minimalist transponders that can stick to any object to connect it to the larger Here, you can quickly see the total number of slides in your presentation, as
internet world. Omnipresent Wi-Fi, 4G and 5G wireless networks make it well as which slide you are viewing.
possible for designers to simply assume wireless connectivity anywhere. And
the rollout of IPv6 means that connecting billions of gadgets to the internet Notes
won’t exhaust the store of IP addresses, which was a real concern. (Related Click Notes to add notes to your current slide. Often called speaker notes, they
story: Can IoT networking drive adoption of IPv6?) can help you deliver or prepare for your presentation.

What’s next for IoT? Comments


As the number of IoT devices continue to grow, companies will continue to Reviewers can leave comments on any slide. Click Comments to view
improve security features and look to faster connectivity options, such as 5G comments for the current slide.
and faster Wi-Fi, to enable more functionality for getting the data processed
and analyzed. Additional collaboration between IT and operational technology Slide View Options
(OT) is also expected. There are four ways to view a presentation. Simply click a command to select
the desired view.
IoT will continue to grow as smaller companies get in on the action, and larger
enterprises and industry giants such as Google and Amazon continue to Zoom Control
embrace IoT infrastructures. Perhaps IoT devices will become so omnipresent Click and drag the slider to use the zoom control. The number to the right of
that a wireless network can essentially be treated as a giant sensor. The the slider reflects the zoom percentage.
technology continues to be exciting to watch.
Working with the PowerPoint environment
PowerPoint: Getting Started with PowerPoint The Ribbon and Quick Access Toolbar are where you will find the commands
Introduction to perform common tasks in PowerPoint. Backstage view gives you various
PowerPoint is a presentation program that allows you to create dynamic slide options for saving, opening a file, printing, and sharing your document.
presentations. These presentations can include animation, narration, images,
videos, and much more. In this lesson, you'll learn your way around the The Ribbon
PowerPoint environment, including the Ribbon, Quick Access Toolbar, and PowerPoint uses a tabbed Ribbon system instead of traditional menus. The
Backstage view. Ribbon contains multiple tabs, each with several groups of commands. For
example, the Font group on the Home tab contains commands for formatting
The PowerPoint interface text in your document.
When you open PowerPoint for the first time, the Start Screen will appear.
From here, you'll be able to create a new presentation, choose a template, and Groups on the Ribbon
access your recently edited presentations. From the Start Screen, locate and Some groups also have a small arrow in the bottom-right corner that you can
select Blank Presentation to access the PowerPoint interface. click for even more options.

Quick Access Toolbar Showing and hiding the Ribbon


The Quick Access Toolbar lets you access common commands no matter The Ribbon is designed to respond to your current task, but you can choose to
which tab is selected. You can customize the commands depending on your minimize it if you find that it takes up too much screen space. Click the
preference.
Ribbon Display Options arrow in the upper-right corner of the Ribbon to Back to PowerPoint
display the drop-down menu. You can use the arrow to close Backstage view and return to PowerPoint.

Ribbon Display Options Info


● Auto-hide Ribbon: Auto-hide displays your workbook in The Info pane will appear whenever you access Backstage view. It contains
full-screen mode and completely hides the Ribbon. To show the information about the current presentation.
Ribbon, click the Expand Ribbon command at the top of screen.
● Show Tabs: This option hides all command groups when they're New
not in use, but tabs will remain visible. To show the Ribbon, From here, you can create a new blank presentation or choose from a large
simply click a tab. selection of templates.
● Show Tabs and Commands: This option maximizes the Ribbon.
All of the tabs and commands will be visible. This option is Open
selected by default when you open PowerPoint for the first time. From here, you can open recent presentations, as well as presentations saved
to your OneDrive or on your computer.
Using The Tell Me Feature
If you're having trouble finding a command you want, the Tell Me feature can Save and Save As
help. It works just like a regular search bar: Type what you're looking for, and Use Save and Save As to save your presentation to your computer or to your
a list of options will appear. You can then use the command directly from the OneDrive.
menu without having to find it on the Ribbon.
Print
Using the Tell me feature From the Print pane, you can change the print settings and print your
The Quick Access Toolbar presentation. You can also see a preview of your presentation.
Located just above the Ribbon, the Quick Access Toolbar lets you access
common commands no matter which tab is selected. By default, it includes the Share
Save, Undo, Redo, and Start From Beginning commands. You can add other From here, you can invite people to view and collaborate on your
commands depending on your preference. presentation. You can also share your presentation by emailing it as an
attachment.
To add commands to the Quick Access Toolbar:
Click the drop-down arrow to the right of the Quick Access Toolbar. Export
Locating the Customize Quick Access Toolbar dropdown arrow You can choose to export your workbook in another format, such as PDF/XPS
Select the command you want to add from the drop-down menu. To choose or PowerPoint 97-2003.
from more commands, select More Commands.
Adding a command to the Quick Access toolbar Close
The command will be added to the Quick Access Toolbar. Click here to close the current presentation.
The command added to the Quick Access toolbar
The Ruler, guides, and gridlines Account
PowerPoint includes several tools to help organize and arrange content on From the Account pane, you can access your Microsoft account information,
your slides, including the Ruler, guides, and gridlines. These tools make it modify your theme and background, and sign out of your account.
easier to align objects on your slides. Simply click the checkboxes in the
Show group on the View tab to show and hide these tools. Options
Here, you can change various PowerPoint options, settings, and language
The Ruler, Guidelines, and Grids preferences.
Zoom and other view options
PowerPoint has a variety of viewing options that change how your Lesson 2
presentation is displayed. You can choose to view your presentation in Normal
view, Slide Sorter view, Reading view, or Slide Show view. You can also Introduction
zoom in and out to make your presentation easier to read. Many of the features in Office are geared toward saving and sharing files
online. OneDrive is Microsoft’s online storage space that you can use to save,
Switching slide views edit, and share your presentations and other files. You can access OneDrive
Switching between slide views is easy. Just locate and select the desired slide from your computer, smartphone, or any of the devices you use.
view command in the bottom-right corner of the PowerPoint window.
To get started with OneDrive, all you need to do is set up a free Microsoft
Slide View commands account if you don’t already have one.
To learn more about slide views, review our lesson on Managing Slides.
If you don't already have a Microsoft account, you can go to the Creating a
Zooming in and out Microsoft Account lesson in our Microsoft Account tutorial.
To zoom in or out, click and drag the zoom control slider in the bottom-right
corner of the PowerPoint window. You can also select the + or - commands to Once you have a Microsoft account, you'll be able to sign in to Office. Just
zoom in or out by smaller increments. The number next to the slider displays click Sign in in the upper-right corner of the PowerPoint window.
the current zoom percentage, also called the zoom level.
signing in to OneDrive
The Zoom control slider Benefits of using OneDrive
Backstage view Once you’re signed in to your Microsoft account, there are a few of the things
Backstage view gives you various options for saving, opening, printing, and you’ll be able to do with OneDrive:
sharing your presentations. To access Backstage view, click the File tab on the
Ribbon. ● Access your files anywhere: When you save your files to
OneDrive, you’ll be able to access them from any computer, tablet,
Clicking the File tab
or smartphone that has an Internet connection. You'll also be able
to create new presentations from OneDrive.
● Back up your files: Saving files to OneDrive gives them an extra
layer of protection. Even if something happens to your computer,
OneDrive will keep your files safe and accessible.
● Share files: It’s easy to share your OneDrive files with friends and
coworkers. You can choose whether they can edit or simply read
files. This option is great for collaboration because multiple people
can edit a presentation at the same time (also known as
co-authoring).

Saving and opening files


When you’re signed in to your Microsoft account, OneDrive will appear as an
option whenever you save or open a file. You still have the option of saving
files to your computer. However, saving files to your OneDrive allows you to
access them from any other computer, and it also allows you to share files
with friends and coworkers.

For example, when you click Save As, you can select either OneDrive or This
PC as the save location.

Lesson 3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy