0% found this document useful (0 votes)
45 views

Comp 101 PPT 3

The document provides information about performing web searches, using web browsers and bookmarks, search engines, and email. It discusses how to perform searches using search engines like Google, add and find bookmarks in browsers like Chrome and Internet Explorer. It also covers email basics like email addresses, creating an email account with Gmail, and how to send and receive emails. Security issues on the internet like hackers, malware, viruses, and phishing are defined. Steps to prevent cyber threats and some free antivirus software options are also mentioned.

Uploaded by

Regie Macaya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

Comp 101 PPT 3

The document provides information about performing web searches, using web browsers and bookmarks, search engines, and email. It discusses how to perform searches using search engines like Google, add and find bookmarks in browsers like Chrome and Internet Explorer. It also covers email basics like email addresses, creating an email account with Gmail, and how to send and receive emails. Security issues on the internet like hackers, malware, viruses, and phishing are defined. Steps to prevent cyber threats and some free antivirus software options are also mentioned.

Uploaded by

Regie Macaya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 55

Web search 01

02
Perform a search using a web search engine

Web browsers and bookmarks


engines 03 Google Chrome

04 Internet Explorer
Search engine
Search engine
a web-based tool that is designed to search the
content of web pages and find particular
information on the Internet.
• Google
• Bing
• Baidu
• Yahoo!
• Yandex
• Ask.com
• DuckDuckGo
Search the Internet using a web search engine
1. Open a search engine in a web browser (such as Google Chrome).
2. Type a few specific keywords or phrases in the search box to describe
whatever you wish to search. Search engines look for the keywords in your
query.
3. Press Enter. The search engine will display a list of websites (page after page)
that include information related to your query.
4. Repeat above steps (type different keywords or phrases) if necessary.
Web Browsers and Bookmarks
Browsers
• a software program that allows users to access and display websites or web
pages (documents, images, videos, music, etc.) on the Internet.

Some popular web browsers:

Google Chrome Safari

Mozilla Firefox Opera

Internet Explorer
Bookmarks
•a collection of links (saved shortcuts) to web pages that is stored in a web
browser.
•Saving bookmarks allows users to quickly navigate back to the websites they
visit the most.
•Bookmark bar: A toolbar that contains all bookmarks and is displayed at the
top of a browser window (under the address bar).
Find a bookmark in Chrome
Method 1
1. Open Chrome.
2. Click three dots (More options) in the upper-right corner.

1. Click Bookmarks (in the pop-up menu that appears).


2. Find and click a bookmark to open it.
Method 2
1.Open Chrome.
2.Find and click a bookmark on the bookmarks bar to open it.
Show or hide the bookmarks bar in
Chrome
1.Open Chrome.
2.Click three dots icon to the upper-right corner.
3.Click Bookmarks.
4.Click Show Bookmarks Bar to turn the bookmarks bar on and off.
(A check mark means the bookmarks bar is showing. No check mark means it’s hidden.)
Internet Explorer
Add bookmarks to Internet Explorer

1. Open Internet Explorer double-click on Internet Explorer to open it.


2. Go to the website you would like to bookmark.
3. Right-click on an empty space of the page.
4. Select Add to Favorites from the pop-up menu that appears.
5. Click Add.

You may also click on the star icon in the upper-right corner to add the bookmark.
Find a bookmark in Internet
Explorer
1.Open Internet Explorer.
2.Click on the star icon in the upper-right corner.
3.Find and click a bookmark to open it.

Show or hide the bookmark bar in Internet


Explorer
1. Open Internet Explorer.
2. Right-click on the top side (empty space) of the
Window.
3. Click the Favorites bar on the pop-up menu.
Search the Internet using a web search engine
Steps to Efficient Searching

1.Open a web browser (e.g., Chrome).


2.Go to a search engine like Google.
3.Type keywords related to your topic.
4.Press "Enter" or click "Search."
5.Review the search results.
6.Click on a result to view the webpage.
Tips for Success
1.Use specific keywords.
2.Put phrases in quotation marks for exact matches (e.g., "climate
change").
3.Utilize site-specific searches (e.g., site: wikipedia.org space
exploration).
4.Explore advanced search options for more control.
PDF
(Portable Document Format)
•A PDF is a file format that looks like a printed document. It displays files in a format
that is ready for the web.
•A PDF file allows for incorporation of electronic text, images, graphs, hyperlinks, etc.
•A PDF file can be viewed, printed, or forwarded to someone else. To view the PDF
files, you need the Acrobat Reader, which is available for free download.
Steps to fill in a fillable PDF
form
1.Save the PDF form on your computer.
2.Open the form in Acrobat Reader.
3.Click on an empty text field in the form
to start filling in the PDF form.
4.Save the form. When done, you can
email, print or fax the filled out form.
Electronic communication
Security issues on the
Internet
Although Internet led to many benefits, it also poses a greater potential for security
threats. Below are a number of common Internet security issues.

Hacker
Malware
Computer virus
Trojan horse
Worm
Phishing
Spyware
Hacker
refers to a person who can gain unauthorized access to (break into) a
computer or a network to commit crimes.
Some things a skilled hacker can do to your computer:

•Hijack your usernames and passwords;


•Gain access to the personal information (credit card numbers, bank account,
Social Insurance Number, etc.);
•Steal, change, exploit, sell, or destroy data;
•Damage or bring down the system;
•Hold the system hostage to collect ransom;
Malware
(short for malicious software) – a software that is designed to damage,
disrupt, or infect computers.
• Malware is a single term that refers to all the different types of threats to
your computer safety such as virus, Trojan horse, worm, spyware, etc.

• Malware can gain unauthorized access to a computer and continuously run


in the background without the owner’s knowledge.
Computer virus
a specific type of malware that is designed to replicate (copy) and spread
from one computer to another.
• A virus can make a copy of itself over and over again.

• A virus can spread from one computer to another through email


attachments, removable storage devices, networks (Internet messaging
services, download infected files …), etc.

• A virus can damage your computer by corrupting system files, sending


spam, stealing data and personal information from your computer,
destroying data, deleting everything on your hard drive, etc.
Trojan horse
(or Trojan) – a type of malware that looks harmless but can cause harm to a
computer system.
• A Trojan misleads users of its true intent.

• A Trojan may claim to get rid of your computer viruses but instead
introduce viruses onto your computer.

• A Trojan can take the form of innocent-looking email attachments,


downloads, etc.
Worm
it is similar to a virus (a sub-class of a virus). It is designed to quickly self-
replicate and spread copies of itself from one computer to another.
• The key difference between a worm and a virus is that a worm does not
require any human action to replicate while a virus does. A virus only
spreads when a user opens an affected file whereas a worm spreads
without the use of a host file.
Phishing
a scammer uses deceptive emails or websites and tries to obtain valuable
personal information (i.e., username, password, account number, etc.).
• Phishing is a common online scam used by cyber criminals.

• A scammer may use a deceptive email or website appearing to represent a


legitimate firm.
Spyware
a software that secretly monitors (spies) user’s online behavior and gets
sensitive information about a person or organization without the user’s
knowledge.
• A spyware can record a user’s Web browsing habits,
email messages, keystrokes on online advertisements,
personal information, etc., and forward it to a third
party.
• Advertisers can use spyware to target specific
advertisements to your tastes.
• Criminal organizations can use spyware to collect
financial information (banking accounts, credit card
information, password, etc.).
Prevent Cyber Threats
Tips on how to prevent malware from infecting your
computer
• Backup files and store in different locations.
• Don’t open any suspicious/unknown emails or the websites.
• The second part (the part after the @) of an email should represent the company that owns
the email (domain).
• Don’t download an unknown or suspicious attachment (document, picture, music, game,
video, etc.).
• Do not call fake tech support numbers (tech support scams).
• If you get pop-up window from fake companies offering to help you with a malware
infection, don’t call the number.
• Use a secure and strong password (unique, hard to guess, etc.).
• Install anti-malware/virus software (keep it up to date).
• Scan with antivirus software on a regular basis.
Some free antivirus software

•AVAST Free Antivirus


•Comodo Antivirus
•AVG Antivirus Free
•Avira Antivirus
•Bitdefender Antivirus
•Sophos Home Free
•Kaspersky Free
Email
Email Address
An email address consists of three parts:

•Username of the recipient.


•@ sign (pronounced “at” sign) – every email
address consists of an @ sign.
•Domain (the email service provider – an
organization/company, or a website name).
Some popular free email service providers include

•Gmail ([email protected])
•Outlook ([email protected])
•Yahoo! Mail ([email protected])
•ProtonMail ([email protected])
•Zoho ([email protected])
•AOL ([email protected])
Create an Email Account
This is how you can create a Gmail account.

1.On your computer, open a browser window and go to Gmail.

2. Click Create an account (top right of screen).

3. Enter your first name, late


name, username, and password
(twice). Click Next.
4. Provide the additional information, including your birthday and gender. Click Next.
5. Scroll down and click I agree

Your account will be created and


ready to send and receive emails.
Send and Receive Email
How to send an email

1.Log into your personal email account (such as Gmail, Outlook, Yahoo! Mail, etc.) or log
into your institutional email (many colleges and universities give students an email address).
2.Click Compose (if using Gmail) or something similar. (For example, in Outlook,
click New.)
3.Enter a recipient’s email address in
the To field. You can also add recipients
in the Cc and Bcc fields.
4.Enter a subject (the topic or heading of
your email).
5.Type your message in the main body
field.
6.Click Send.
Cc and Bcc
• (carbon or courtesy copy) – Entering a person’s email address in the “Cc” field means
that person will receive a copy of the email (for their information).

• (blind carbon copy) – Bcc is similar to that of Cc except that the email address is
invisible to the people in the “To” or “Cc” fields. Use Bcc if you don’t want the other
people to see who else has received a copy of the email.
Send Emails with
Attachments
You can attach different types of files to send through email, including PDFs, images, and
more. This is how you attach a file to an email:

1.Log in to your email account.


2.Click Compose (Gmail) or something similar (e.g., New in Outlook).
3.Enter a recipient’s email address in the To field.
4.Enter a subject.
5.Type your message in the main body field.
6.Click Attach or something similar. (Note that the Attach option is often represented as a
paperclip icon).
7.Select the file you want to attach from your computer’s folder.
8.Click the Choose or Select button (or another similar button) to attach the file to your
email.
9.Click Send.
Mail System
Folders
• Inbox folder – the place where incoming emails are received and stored (incoming emails
arrive in “Inbox” folder).
• Sent Items (or Sent) folder – the email you’ve sent will be saved in the “Sent Items” (or
“Sent Mail”) folder.
• Draft folder – an unfinished email will be automatically saved to your “Drafts” folder.
• Deleted Items folder: every email that you deleted will be moved to the “Deleted Items”
folder.
•It’s a good idea to empty your “Deleted Items” folder from time to time in order to save
space.
•To empty the Deleted Items folder: Right-click the Deleted Items folder and
click Empty folder, then Ok.
Prepare ½ piece of
paper
Self-test True or false

1.A web browser is a collection of links to web pages that is stored


in a web browser.
2.Saving bookmarks allows users to quickly navigate back to
the websites they visit the most.
3.You can click on the star icon to the upper-right corner (in
Chrome) to add a bookmark.
4.Clicking the “Favorites bar” on the pop-up menu cannot show or
hide the bookmark bar in Internet Explorer.
Fill in the blank

5.A [blank] is a software program that allows users to access and


display websites or web pages on the Internet.
6.The bookmark [blank] contains all bookmarks that shows on the top
of the window.
7.A [blank] is a file format that looks like a printed document.
Multiple
choice
8.Some common web browsers include:
a. Mozilla Firefox
b. Google Chrome
c. Opera
d. all of the above

9.An Internet [blank] is a web-based tool that is designed to search the content
of web pages and to find particular information on the Internet.
a. bar
b. RAM
c. search engine
d. all of the above
Multiple
choice
10. Some popular search engines include:
a. Baidu
b. Google
c. Yandex
d. all of the above
True or false

11. A malware cannot gain unauthorized access to a computer


and continuously run in the background without owner’s knowledge.
12.A virus can make a copy of itself over and over again.
13.A Trojan may claim to get rid your computer of viruses but instead
introduces viruses onto your computer.
14.The key difference between a virus and a worm is that a worm needs
human action to replicate, whereas, a virus doesn’t.
15.Enter a person’s email address to the ‘Cc’ field means that person will
receive a copy of the email.
Fill in the blank
16. A [blank] refers to a person who can gain unauthorized access to a
computer or a network to commit crimes.
17.A [blank] can spread from one computer to another through email
attachments, removable storage devices, networks, etc.
18.A [blank] is similar to a virus. It is designed to quickly self-replicate and
spread copies of themselves from one computer to another.
19.A [blank] can record a user’s Web browsing habits, email messages,
keystrokes on online advertisements, personal information, etc., and forward
it to a third party.
20.Bcc is similar to that of Cc except that the email addresses are [blank] to
the people in the “To” or “Cc” fields.
21.The [blank] folder is the place where incoming emails are received and
stored.
22.Every email that you delete will be moved to the “[blank] Items” folder.
Multiple choice
23. [Blank] is a software that is designed to infiltrate, damage, disrupt, or infect computers.
a. Malware
b. Firefox
c. Yandex
d. RAM
24.Malware is a single term that refers to all the different types of threats to your computer safety
such as:
a. Trojan horse
b. worm
c. virus
d. all of the above
25.[Blank] is a software that secretly monitors (spies) user’s online behaviour and gets sensitive
information about a person or organization without the user’s knowledge.
a. Trojan horse
b. spyware
c. virus
d. worm
26. An unfinished email will be automatically saved to your [blank] folder.
a. Sent
b. Junk
c. Drafts
d. Deleted items
1. F
2. T
3. T
4. F
5. web browser
6. bar
7. PDF
8. d.
9. c.
10. d.
11. F 19. spyware
12.T 20. invisible
13.T 21. Inbox
14.F 22. Deleted
15.T 23. a.
16. hacker 24. d.
17. virus 25. b.
18. worm 26. c.

You might also like