Home > Computing and Information Technology > Information technology: general topics > Computer Literacy for IC3 Unit 3: Living Online
3%
Computer Literacy for IC3 Unit 3: Living Online

Computer Literacy for IC3 Unit 3: Living Online

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Written to provide all readers with an opportunity to learn and demonstrate computer and Internet literacy. Computer Literary for IC3 was written to align with a certification called “Internet and Computing Core Certification (IC3)”.  This certification is for users who want to demonstrate critical computer and Internet skills valued in today’s academic and professional environments.  The Computer Literacy for IC3 text is written to meet the certification standards and provide readers with a broad understanding of the key components of computer literacy in order to prepare for the exam. This certification has 3 units: •    Unit 1:  Computing Fundamentals (computer concepts) •    Unit 2:  Using Productivity Software •    Unit 3:  Living Online (the Internet) Each of these units is available as a separate Computer Literacy for IC3 text. This text contains: Unit 1: Computing Fundamentals and covers basic computer concepts including computer hardware, computer software, and using an operating system. The second edition of Computer Literacy for IC3 has been revised to keep up with the IC3 program’s evolution, which reflects the recent changes in computers and technology. Instead of publishing one large, comprehensive text, the three units are now available as separate, smaller texts.

Table of Contents:
Unit 3 Living Online Chapter 1: Understanding the Internet Lesson 1: Survivable Communications     Topic 1 How traditional phone systems work [network of connected networks] (1.1.4)     Topic 2 Need for a system that could survive a nuclear war     Topic 3 How packet switching works (TCP/IP) (     Topic 4 Birth of the Internet to connect military and university research centers (1.1.2) Lesson 2: Networks of Computers     Topic 1 Relationships between Computers (LAN, peer-to-peer, servers and clients) (1.1.3) (1.1.1, 1.1.2)     Topic 2 Connecting computers [node, Ethernet, fiber optic, wireless] (1.1.1,     Topic 4 Wide Area Networks (WAN) (1.1.2)     Topic 5 Connecting networks to networks [gateways, "super network?] (1.1.1, 1.1.4)     Topic 6 World-wide naming system, Universal Resource Locator (URL) (3.1.1, 3.1.2     Topic 6 Role of domain names, domain name servers (2.1.2)     Topic 7 Nodes-gateways (routers, through put) and hosts (end points)     Topic 8 Main connections between nodes [backbone, telephone companies, microwave, satellite, undersea fiber optic]     Topic 9 Benefits and risks (1.1.6, 1.1.7) Lesson 3: Birth of the World Wide Web     Topic 1 Researcher writes code that works on all computers-Hypertext Markup Language (HTML) [HyperText Transfer Protocol, HTTP] (3.1.1)     Topic 2 Web browsers - Mozilla, Netscape, and Internet Explorer make it popular [Web site, Web page, Home Page] (3.1.1)     Topic 3 Relationship between WWW and the Internet     Topic 1 Types of Web sites [commercial, academic, organizations, government, military] and country extensions (3.1.3) Lesson 4: Joining the World Wide Web     Topic 1 Gateway computers - onramp to the Internet [domains] (1.1.4)     Topic 2 Internet Service Providers (ISP) provide onramp service for individuals [host domains]     Topic 3 Connection speeds [bits, bytes, bits per second, bytes per second, prefixes kilo, mega, giga, tera, broadband] (1.1.1)     Topic 4 Connecting to an ISP via the telephone company [dial-up, DSL, modem, T1, Fiber Optic, cell phone cellular broadband, G3] (1.1.5)     Topic 5 Connecting to an ISP via the cable television company [co-axial cable, cable modem] (1.1.5)     Topic 6 Connecting to an ISP via Wireless radio [antenna, dead zones] (1.1.5)     Topic 7 Connecting to an ISP via satellite link (dish antenna) Lesson 5: Control and Financing of the Internet     Topic 1 Government turns over management to private industry     Topic 2 Role of telephone companies     Topic 3 How companies charge for service     Topic 4 Control of domain names     Topic 5 Taxation Lesson 6: Security, Privacy, and Ethics     Topic 1 Network admin code of ethics     Topic 2 Firewalls (1.1.1)     Topic 3 Encryption and Virtual Private Networks (VPN) [HTTPS] (3.1.1)     Topic 4 Network security [Login, authentication (1.1.1, 1.1.8)     Topic 5 Intranets (1.1.2) Chapter 2: Gathering Information Online Lesson 1: Using a Web Browser     Topic 1 Functions of a Web Browser, navigating the Web [URL or IP address, Forward and Back, Home page, (3.1.4)     Topic 2 Elements of a Web site [text, graphics, text links, graphic links, buttons/menus/check boxes] (3.1.2, 3.1.4, 3.2.2)     Topic 3 Domain names by country and function (3.1.4)     Topic 4 Storing Web pages for quick access [cache, refresh] (3.1.1, 3.1.5)     Topic 5 History of pages visited (3.1.6)     Topic 6 Modifying browser settings [Plug-ins, home page (3.1.11)     Topic 7 Typical problems [page not found, slow loading, parts don't work because plug-in doesn't work or is too old, garbled page content] (3.1.12) Lesson 2: Searching for Information     Topic 1 Web crawlers and search engines (3.2.2)     Topic 2 Classification strategies [indexes, link lists, blogrolls] (3.2.2,     Topic 3 Keyword searches (3.2.3)     Topic 4 Using advanced search options [Boolean, refining a search] (3.2.4)     Topic 5 Finding words on a Web page [Ctrl+F] (3.1.7) Lesson 3: Managing Information from a Web Site     Topic 1 Bookmark favorite sites and manage bookmarks (3.1.8)     Topic 2 Copy information from a Web site (3.1.9)     Topic 3 Download a file (3.1.10) Lesson 4: Creating and Hosting a Web Page     Topic 1 Popular software suites save documents, spreadsheets, and presentations as Web Pages (3.2.1)     Topic 2 Viewing source code     Topic 3 Web page design software (3.2.1)     Topic 4 Hosting Web pages on a server Lesson 5: Safety, Privacy, and Ethics     Topic 1 Citing sources (3.2.7); Intellectual property rights [copyright, trademark, fair use, patent, (3.2.7)     Topic 2 Identifying issues affecting quality of information [relevance, reliability, validity, bias, sufficiency] (3.2.5); Methods of evaluating quality] [analyzing source, communicate with creator of site, analyze links within site, search engine rank, compare to "offline" sources (3.2.6)     Topic 3 Ethical Search Engine practices; Identifying sponsored sites; Increasing a page's search ranking [webring, link lists     Topic 4 Blocking Web sites by individuals and by governments and blocking Pop-Up ads     Topic 5 Respect others [privacy, opinions,] Avoid [libel, harassment, offensive content, inappropriate content for children,] Responsible [factual content, opinions supported by fact, informal content appropriate to audience] (3.2.7) Chapter 3: Buying, Selling, and Banking Online Lesson 1: Online Banking and Making Payments     Topic 1 Money as digits, and international currencies (4.1.3)     Topic 2 Transferring funds (4.1.2)     Topic 3 Banking at Automated Tellers (4.1.2)     Topic 4 Secure payments using public key encryption (3.1.1) (4.2.7)     Topic 5 Digital signatures, Secure vs. unsecure sites     Topic 6 Banking Online (4.1.2) Lesson 2: Buying from Businesses Online     Topic 1 Buying Unusual Items Online     Topic 2 Typical Online Store Web Site; Content of site - product description, simulations (3.1.3)     Topic 2 Identifying customers with cookies (3.1.1)     Topic 3 Taking an order online (4.1.2) (4.1.3) (4.1.4)     Topic 4 Paying (4.1.2)     Topic 5 Delivery (4.1.2)     Topic 6 Returns and customer service (4.1.2)     Topic 7 Evaluating quality (3.2.6) Lesson 3: Businesses Buying from Businesses Online     Topic 1 B2B using EDI     Topic 2 Extranets, VPN     Topic 3 Auctions and reverse auctions (3.1.3) (4.1.1)     Topic 4 Value-added services and disintermediation (3.1.3) (4.1.1) Lesson 4: Consumer to Consumer     Topic 1 Auctions - eBay (4.1.3) (4.1.4)     Topic 2 Classifieds - Craig's List (4.1.3)     Topic 3 Self Publishing and Print on Demand     Topic 4 Storefront software     Topic 5 Evaluating quality (3.2.6) Lesson 5: Security, Privacy, and Ethics     Topic 1 Fraud by sellers and buyers , phishing(4.2.5)     Topic 2 Avoiding unwanted e-mail and telephone calls     Topic 3 Customer profiling and cookies     Topic 4 Identify hazards of electronic commerce (4.2.7)     Topic 5 Set security levels (3.1.11) Chapter 4: Communicating Online Lesson 1: E-mail     Topic 1 Accessing e-mail          E-mail addresses (2.1.2), Web mail - Gmail, (2.1.4), Mail clients - Outlook, Lotus Notes (2.1.4), cell phones, wireless devices (Blackberry) (2.1.4)     Topic 2 Components of an e-mail [Address, subject line, body, attachments] (2.1.5)     Topic 3 Composing, viewing, reading, sending, forwarding, copying E-mail [Reply, Reply All, HTML vs text] (2.2.1, 2.2.7)     Topic 4 Supplementing e-mail [attachments, URLs, graphics, emoticons] (2.2.3)     Topic 5 Managing attachments [saving, opening, deleting] (2.2.4) Lesson 2: Synchronous Communications     Topic 1 Instant Messaging, Unique address     Topic 2 Typical features     Topic 3 Services - AOL, MSN, Yahoo, `    Topic 4 Texting (2.1.1), Identification by telephone number (2.1.3)     Topic 5 Voice over IP (2.1.1)     Topic 6 Video calls [Skype] Lesson 3: Advantages and Disadvantages     Topic 1 Advantages of electronic communication [speed, cost, routing, collaboration, multimedia, paper trail] (2.3.1)     Topic 2 Share resources - documents, printers, copiers (2.3.1)     Topic 3 Common problems with e-mail; blocked attachments (2.3.2) `    Topic 4 Common problems with direct communications; lack of paper trail (2.3.2) Lesson 4: Asynchronous Communications     Topic 1 e-mail lists     Topic 2 online college courses     Topic 3 message boards     Topic 4 Web logs [blogs] (3.2.1)     Topic 5 Video sharing [Utube]     Topic 6 Podcasts Lesson 5: Group Communications Read http://fwk.enpraxis.net/catalog/additional-book-5/chapter-4.     Topic 1 Wiki (3.2.1)     Topic 2 Open source software     Topic 3 Virtual communities [Second Life] (3.2.1) Lesson 6: Security, Privacy, and Ethics     Topic 1 Methods of identification - URL, phone number, User ID (2.1.3)     Topic 2 How dangerous programs enter a computer, Scanning e-mail attachments (2.3.7, 4.2.4)     Topic 3 Hoaxes, Junk mail, viruses, worms [anti-virus software], (4.2.4) Spoofing (4.2.5)     Topic 4 Filtering unsolicited mail by ISP, user (2.3.6)     Topic 5 Tactics to limit unsolicited mail, laws related to SPAM (2.3.6)     Topic 6 Avoid hasty messages or responses (2.3.7)     Topic 7 Company and school policies regarding e-mail (2.3.7)     Topic 8 E-mail encryption (2.3.7)     Topic 9 Ownership of content Chapter 5: Working Online Lesson 1: E-mail management     Topic 1 Managing e-mail [inbox, sorting, searching, folders, marking, saving, deleting, archiving, forwarding, blocking, out-of-office, signature] (2.2.2, 2.2.5, 2.2.7)     Topic 2 Managing addresses [address book, mailing lists] (2.2.6) Lesson 2: Proper Use of Communications     Topic 1 Confusion between professional and informal communications (2.3.2)     Topic 2 Match mode to method; IM for quick informal, e-mail for paper trail, non-electronic for legal documents with signatures (2.3.3)     Topic 3 Elements of professional electronic communications [quick response, brevity, directness, spelling and grammar, choice of recipients and replies, appropriate level of formality] (2.3.4)     Topic 4 Appropriate use of attachments [size, use URLs instead of copies, problems with some readers] (2.3.5)     Topic 5 Backup and archive regularly Lesson 3: Working in Teams     Topic 1 coordinating schedules     Topic 2 sharing documents     Topic 3 Video conferencing     Topic 4 Project management Lesson 4: Web Based Applications         Topic 1 Word processing, spreadsheets [Google Docs] (3.1.3)         Topic 2 Project management [Open Project]         Topic 3 Creating content using Web design software (3.2.1) Lesson 5: Security, Privacy, and Ethics     Topic 1 Safety in the workplace [electrical, air circulation, cables] (4.2.1)     Topic 2 Ergonomics [repetitive motion disorder, back, eye, seating, lighting, wrist support] (4.2.2)     Topic 3 Risks to data [theft, penetration by hackers, failure of storage media, backup practices] (4.2.3)     Topic 4 Anti-virus policies and procedures (4.2.4)     Topic 7 Principles for considering data personal (4.2.6) Chapter 6: Identifying Technology Convergence and Its Social Impact Lesson 1: Cell Phones, GPS, Cable TV, and the Internet     Topic 1 How cell phones work     Topic 2 Global positioning systems (GPS)     Topic 3 Internet connection, browsers     Topic 4 Cross-platform software - Hypertext eXtensible Markup Language (HXML)     Topic 5 Multi-function phones and Personal Digital Assistant (PDA)     Topic 6 Cable television, Internet Service, Voice Over IP (VOIP) Lesson 2: How Computers are Used in Work, School, and Home     Topic 1 Uses of computers (4.1.1)     Topic 2 Technology and processes "behind the scenes" (4.1.2)     Topic 3 Transformed traditional processes (4.1.3)     Topic 4 Help disabled and disadvantaged (4.1.4) Lesson 3: Risks     Topic 1 Risks to personal and organizational data (4.2.3, 4.2.5)     Topic 2 Software threats [viruses, worms] (4.3.4)     Topic 3 Reasons for restricting access [important data, children] (4.2.5)     Topic 4 Restricting access using technical and non-technical means [security and filtering software, parent/teacher supervision] (4.2.5) Lesson 4: Prudent Practices     Topic 1 Practices to protect against infections [anti-virus software, following procedures, updating] (4.2.4)     Topic 2 Keep anti-virus software up-to-date (4.2.4)     Topic 3 Following procedures for identifying, isolating, and removing infected files (4.2.4)     Topic 4 How to stay informed of virus threats and new developments (4.2.4, 4.2.10)     Topic 5 How to protect privacy [cookies, not sharing personal or family information, using aliases in public forums] (4.2.8)     Topic 6 Use technical and non-technical means to restrict inappropriate access [children, adult sites at work] (4.2.5)     Topic 7 Ergonomics [repetitive motion, back, eye, seating] (4.2.2) Lesson 5: Responsible Practices     Topic 1 How to find rules, laws, and policies at school and work (4.2.9)     Topic 2 Recycling [paper, ink and toner cartridges, hardware] and donations (4.2.11)     Topic 3 Share your knowledge and experience with others (4.2.11)


Best Sellers


Product Details
  • ISBN-13: 9780135064993
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson
  • Depth: 0.125
  • Height: 229 mm
  • No of Pages: 320
  • Series Title: English
  • Sub Title: Living Online
  • Width: 275 mm
  • ISBN-10: 0135064996
  • Publisher Date: 06 Aug 2009
  • Binding: Spiral bound
  • Edition: SPI
  • Language: English
  • Returnable: Y
  • Spine Width: 15 mm
  • Weight: 590 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Computer Literacy for IC3 Unit 3: Living Online
Pearson Education (US) -
Computer Literacy for IC3 Unit 3: Living Online
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Computer Literacy for IC3 Unit 3: Living Online

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA