45
Chapter 7 Chapter 7 The Web and E-mail The Web and E-mail

Chapter 7 The Web and E-mail 2 Contents Web technology Search engines E-commerce E-mail Web and E-mail security

Embed Size (px)

Citation preview

Page 1: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

Chapter 7 Chapter 7

The Web and E-mailThe Web and E-mail

Page 2: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

22The Web and E-mail

ContentsContents

Web technologyWeb technology

Search enginesSearch engines

E-commerceE-commerce

E-mailE-mail

Web and E-mail securityWeb and E-mail security

Page 3: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

33The Web and E-mail

CHAPTER OVERVIEWCHAPTER OVERVIEW

Describe the roles that HTML, XHTML, HTTP, Describe the roles that HTML, XHTML, HTTP, URLs, browsers, and Web servers play in URLs, browsers, and Web servers play in bringing Web pages to your desktopbringing Web pages to your desktop

List the names of at least four Web browsersList the names of at least four Web browsersDescribe the purpose of helper applications, Describe the purpose of helper applications,

plug-ins, and playersplug-ins, and playersDescribe the significance of a browser cacheDescribe the significance of a browser cache

Page 4: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

44The Web and E-mail

Explain why cookie are useful in an environment Explain why cookie are useful in an environment that is based on a stateless protocol, and provide that is based on a stateless protocol, and provide some concrete examples of their use some concrete examples of their use

Identify the elements that typically form a Web Identify the elements that typically form a Web pagepage

Explain how to test and post Web pagesExplain how to test and post Web pagesList some advantages and disadvantages of List some advantages and disadvantages of

HTML scriptsHTML scriptsList and describe the elements of a search engineList and describe the elements of a search engine

CHAPTER OBJECTIVESCHAPTER OBJECTIVES

Page 5: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

55The Web and E-mail

CHAPTER OBJECTIVESCHAPTER OBJECTIVES

Demonstrate that you can use a search engine to Demonstrate that you can use a search engine to locate information on the Weblocate information on the WebCreate advanced search queries and correctly Create advanced search queries and correctly format citations for Web-based materials format citations for Web-based materials Discuss why e-commerce has become so popular Discuss why e-commerce has become so popular with consumers and merchantswith consumers and merchantsList some threats to the security of credit card List some threats to the security of credit card numbers and other sensitive data during e-numbers and other sensitive data during e-commerce transactionscommerce transactions

Page 6: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

66The Web and E-mail

CHAPTER OBJECTIVESCHAPTER OBJECTIVES

Describe how the following e-commerce technoloDescribe how the following e-commerce technologies work: shopping carts, SSL, one-time-use credit gies work: shopping carts, SSL, one-time-use credit cards, electronic wallets, and person-to-person paycards, electronic wallets, and person-to-person payment systemsment systems

List the features that you would expect to find in a List the features that you would expect to find in a typical e-mail software packagetypical e-mail software package

Explain how an e-mail system works and describe Explain how an e-mail system works and describe the difference between POP and Web-based e-mailthe difference between POP and Web-based e-mail

List security precautions you can take to avoid coList security precautions you can take to avoid cookie exploits, pharming, spam, and phishingokie exploits, pharming, spam, and phishing

Page 7: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

77The Web and E-mail

Web TechnologyWeb Technology P288P288

Section A

In Section A, you’ll peel back the layers of Web technologies to take a look at what happens behind your browser window.

What is the Web

WebWeb(short for World Wide Web) is a collection of (short for World Wide Web) is a collection of document, image, video, and sound files that can be linked document, image, video, and sound files that can be linked and accessed over the Internet using a protocol called and accessed over the Internet using a protocol called HTTP.HTTP.

Page 8: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

88The Web and E-mail

WEB BASICWEB BASIC P288-289P288-289

What is a Web site

A A Web siteWeb site typically contains a collection of related typically contains a collection of related information organized and formatted so it can be accessed information organized and formatted so it can be accessed using software called a browser.using software called a browser.

What is a Web pageA A Web pageWeb page is the product or output of one or more Web- is the product or output of one or more Web-based files displayed in a format similar to a page in a book.based files displayed in a format similar to a page in a book.When using aWhen using a browser browser, you can access a Web page by click, you can access a Web page by clicking a hypertext link or by typing a URL.ing a hypertext link or by typing a URL.A URL is a type of URI(Uniform Resource Identifier), sucA URL is a type of URI(Uniform Resource Identifier), such as h as http://www.jxstnu.cnhttp://www.jxstnu.cn..

Section A

Page 9: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

99The Web and E-mail

HTML HTML P290-291 P290-291

What is HTMLHTMLHTML(Hypertext Markup Language) is a set of specificat(Hypertext Markup Language) is a set of specifications for creating documents that a browser can display as a ions for creating documents that a browser can display as a Web page.Web page.HTML tagsHTML tags, such as <hr> and <b>, are incorporated into , such as <hr> and <b>, are incorporated into an HTML document, which is similar to a word processing fan HTML document, which is similar to a word processing file, but has an .htm or .html extension.ile, but has an .htm or .html extension.An HTML document contains text and HTML tags. FormAn HTML document contains text and HTML tags. Formatting tags are used to change font size, separate paragraphs,atting tags are used to change font size, separate paragraphs, and add rules. Other tags add graphics and links to a page. and add rules. Other tags add graphics and links to a page. The HTML document produces a Web page.The HTML document produces a Web page.

Section A

Page 10: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

1010The Web and E-mail

HTTP HTTP P292 P292

How does HTTP work

HTTPHTTP is a protocol that works with TCP/IP to get Web is a protocol that works with TCP/IP to get Web resources to your desktop.resources to your desktop.

HTTP messages flow between a browser and a Web server.HTTP messages flow between a browser and a Web server.

Section A

Page 11: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

1111The Web and E-mail

HTTP HTTP P293 P293

Is each Web page element retrieved separately

Yes. Yes. HTTPHTTP is classified as a stateless protocol, and it is classified as a stateless protocol, and it generally allows only one request and response per session.generally allows only one request and response per session.

What if an element cannot be found

When a broken link points to a nonexistent HTML When a broken link points to a nonexistent HTML document, your browser typically produces a 404 Not document, your browser typically produces a 404 Not Found error.Found error.

When a broken link points to a nonexistent graphic or other When a broken link points to a nonexistent graphic or other non-HTML file, your browser usually displays one of the non-HTML file, your browser usually displays one of the broken link icons.broken link icons.

Section A

Page 12: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

1212The Web and E-mail

WEB BROWSERSWEB BROWSERS P293-294 P293-294

What are some of today’s most popular browsersToday’s most popular Today’s most popular browserbrowsers include Microsoft Internet Explos include Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Netscape Navigator, and Operrer, Mozilla Firefox, Apple Safari, Netscape Navigator, and Opera.a.

Should I upgrade my browser when new versions become available

It is a good idea to upgrade when a new version of your browser It is a good idea to upgrade when a new version of your browser appears.appears.

Why do I have to download software to view some Web page

Today, browsers work with additional file formats. Some Today, browsers work with additional file formats. Some browsers do not have built-in support for proprietary file formats browsers do not have built-in support for proprietary file formats commonly used on the Web to display video, animation, and other commonly used on the Web to display video, animation, and other media.media.

Section A

Page 13: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

1313The Web and E-mail

WEB BROWSERSWEB BROWSERS P295 P295

What is a helper applicationA helper application is a program that extends a browser’s ability A helper application is a program that extends a browser’s ability to work with file formats.to work with file formats.

Is a plug-in the same as a helper applicationA plug-in is a type of helper application, pioneered by Netscape A plug-in is a type of helper application, pioneered by Netscape developers, that can be activated form an <embed> tag inserted in developers, that can be activated form an <embed> tag inserted in an HTML document.an HTML document.

What is a browser cacheWhen your browser fetches pages and graphics to from a Web When your browser fetches pages and graphics to from a Web page, it stores that material on your computer in temporary files page, it stores that material on your computer in temporary files sometimes referred to as a Web cache or browser catch.sometimes referred to as a Web cache or browser catch.

Section A

Page 14: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

1414The Web and E-mail

COOKIES COOKIES P296 P296

Section A

What is a cookieA A cookiecookie is a small chunk of data generated by a Web server and is a small chunk of data generated by a Web server and stored in a text file on your computer’s hard disk.stored in a text file on your computer’s hard disk.

Page 15: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

1515The Web and E-mail

WEB PAGE AUTHORINGWEB PAGE AUTHORING P297-299 P297-299

What tools can I use to create Web pagesYou can create Web pages by tools such as Microsoft FrontPage,You can create Web pages by tools such as Microsoft FrontPage,

Dreamweaver, Firework etc. Dreamweaver, Firework etc.

Creating a Web page is not the end of the publishing process. YCreating a Web page is not the end of the publishing process. Y

ou also must test your pages, transfer them to a Web server, and tou also must test your pages, transfer them to a Web server, and t

est all your links.est all your links.

HTML scripts(脚本 )A series of program instructions called an A series of program instructions called an HTML scriptHTML script can be can be

embedded directly into the text of an HTML document. Scripts embedded directly into the text of an HTML document. Scripts

instruct the browser to perform specific actions or respond to instruct the browser to perform specific actions or respond to

specific user actions.specific user actions.

Section A

Page 16: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

1616The Web and E-mail

HTML SCRIPTSHTML SCRIPTS P299-301 P299-301

HTML scripts(脚本 )HTML formsHTML forms(( 表单表单 ) are typically used to collect payment and s) are typically used to collect payment and shipping information at the checkout counter of e-commerce Web shipping information at the checkout counter of e-commerce Web sites.ites.Scripts can run on a client or a server. Scripts can run on a client or a server. A Java applet is an application written in the Java programminA Java applet is an application written in the Java programming language.g language.An ActiveX control is a compiled computer program that can be An ActiveX control is a compiled computer program that can be referenced from within an HTML document, downloaded, installereferenced from within an HTML document, downloaded, installed on your computer, and executed within the browser.d on your computer, and executed within the browser.Scripts are somewhat more difficult to write and test than HTMScripts are somewhat more difficult to write and test than HTML documents.L documents.

Section A

Page 17: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

1717The Web and E-mail

Search EnginesSearch Engines P302-303 P302-303

Section B

In Section B, you’ll find out how Web search engines work, so that you can use them more efficiently.

What is a Web search engineA Web search engineA Web search engine is a program designed to help people is a program designed to help people locate information on the Web by formulating simple keywolocate information on the Web by formulating simple keyword queries.rd queries.Search engine sites often contain a variety of tools and serSearch engine sites often contain a variety of tools and services in addition to search engine access.vices in addition to search engine access.A search engine contains four componentsA search engine contains four components: a : a Web crawlerWeb crawler (( 网络蜘蛛网络蜘蛛 ), an ), an indexing utilityindexing utility(( 索引器索引器 ), a database, and a qu), a database, and a query processor.ery processor.

Page 18: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

1818The Web and E-mail

SEARCH ENGINE BASICSSEARCH ENGINE BASICS p303-304 p303-304

A Web crawlerA Web crawler is a computer program that is automated t is a computer program that is automated to o methodicallymethodically(( 有系统地有系统地 ) visit Web sites.) visit Web sites.

A Web crawler begins with a list of URLs to visit. After coA Web crawler begins with a list of URLs to visit. After copying the material at a specified URL, the Web crawler lookpying the material at a specified URL, the Web crawler looks for hypertext links and adds them to the list of URLs to viss for hypertext links and adds them to the list of URLs to visit.it.

The number of times a search engine’s crawler visits a WeThe number of times a search engine’s crawler visits a Web page varies, depending on several factors such as how ofteb page varies, depending on several factors such as how often the page tends to change and its popularity.n the page tends to change and its popularity.

A A search engine indexersearch engine indexer is software that pulls keywords fr is software that pulls keywords from a Web page and stores them in a database. The purpose om a Web page and stores them in a database. The purpose of it is to make pages easy to find based on their contents.of it is to make pages easy to find based on their contents.

Section B

Page 19: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

1919The Web and E-mail

FORMULATING SEARCHESFORMULATING SEARCHES p306-307 p306-307

Section B

How can I formulate a basic search

When When formulatingformulating(( 明确叙述明确叙述 ) ) queriequeries(s( 查询查询 ), keep the followi), keep the following guidelines:ng guidelines:

Page 20: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

2020The Web and E-mail

FORMULATING SEARCHESFORMULATING SEARCHES p307-308 p307-308

What are Boolean operators(逻辑算子 )

A A Boolean operatorBoolean operator is a word or symbol that describes a rel is a word or symbol that describes a relationship between keywords and thereby helps you create a ationship between keywords and thereby helps you create a more more focusefocused(d( 聚焦聚焦 ) query.) query.

Section B

Page 21: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

2121The Web and E-mail

FORMULATING SEARCHESFORMULATING SEARCHES p308-309 p308-309

What is an advanced search(高级搜索 )

In an advanced search, you might provide more than one In an advanced search, you might provide more than one queries to make your searches more precise and obtain queries to make your searches more precise and obtain more useful results.more useful results.

What kind of information does a search engine store

In addition to storing an ID number, search engines store In addition to storing an ID number, search engines store the IP address from which the query was initiated, the data the IP address from which the query was initiated, the data and time of the query, the search terms, and the URL for and time of the query, the search terms, and the URL for the Web site linked to from the results list.the Web site linked to from the results list.

Section B

Page 22: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

2222The Web and E-mail

CITING WEB-BASED SOURCE MATERIALCITING WEB-BASED SOURCE MATERIAL p310-311 p310-311

You can copy text and graphics that you find on Web pageYou can copy text and graphics that you find on Web pages.s.When compiling the When compiling the citationcitation(( 引用引用 ) for online sources, ma) for online sources, make sure you provide ke sure you provide sufficientsufficient(( 足够足够 ) information to allow re) information to allow readers to locate your source.aders to locate your source.When you use When you use materialmaterial(( 材料材料 ), sometimes you need ), sometimes you need permispermissionsion(( 许可许可 ).).To To obtainobtain(( 获得获得 ) permission to use text, photos, music, vid) permission to use text, photos, music, videos, and other elements you find on the Web, contact the copeos, and other elements you find on the Web, contact the copyright holder by e-mail, explain what you want to use and hyright holder by e-mail, explain what you want to use and how you plan to use it.ow you plan to use it.

Section B

Page 23: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

2323The Web and E-mail

E-commerce E-commerce P312P312

Section C

Section C focuses on e-commerce and the technologies a typical shopper might encounter on the Web.

What is e-commerceE-commerceE-commerce refers to business refers to business transactiontransactions(s( 交易交易 ) that are ) that are conducted electronically over a computer network.conducted electronically over a computer network.It It encompassencompasses(es( 包括包括 ) all ) all aspectaspects(s( 方面方面 ) of business and ma) of business and marketing processes enabled by Internet and Web technologies.rketing processes enabled by Internet and Web technologies.

Page 24: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

2424The Web and E-mail

E-COMMERCE BASICS E-COMMERCE BASICS P312P312

Many e-commerce activities are classified as B2C (businesMany e-commerce activities are classified as B2C (business-to-consumer) in which individual consumers s-to-consumer) in which individual consumers purchasepurchase(( 购购买买 ) goods and services from online merchants.) goods and services from online merchants.C2C(consumer-to-consumer) is another popular e-commeC2C(consumer-to-consumer) is another popular e-commerce model, in which consumers sell to each other at popular rce model, in which consumers sell to each other at popular online auctions.online auctions.E-commerce enhances traditional business models by offerE-commerce enhances traditional business models by offering efficiency and opportunities for ing efficiency and opportunities for automationautomation(( 自动操作自动操作 ), ), ccomputerizationomputerization(( 计算机化计算机化 ), and ), and digitizationdigitization(( 数字化数字化 ). ). Both merchants and consumers benefit from e-commerce Both merchants and consumers benefit from e-commerce because because niche goodsniche goods(( 利基产品利基产品 ) and small merchants can rea) and small merchants can reach a global customer base. ch a global customer base.

Section C

Page 25: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

2525The Web and E-mail

ONLINE SHOPPING ONLINE SHOPPING P314-315P314-315

E-commerce offers some unique advantages over brick-and-E-commerce offers some unique advantages over brick-and-

mortar stores and mail-order catalogs. Customers can easily smortar stores and mail-order catalogs. Customers can easily s

earch for specific merchandise, and can easily compare prices earch for specific merchandise, and can easily compare prices

between multiple between multiple vendorvendors(s( 卖主卖主 ) using Web sites. ) using Web sites.

Online shopping cart is a cyberspace version of the Online shopping cart is a cyberspace version of the metalmetal(( 金金属属 ) cart you wheel around a store and ) cart you wheel around a store and fill upfill up(( 装满装满 ) with ) with mercmerc

handisehandise(( 商品商品 ).).

Most shopping carts work because they use cookies to store Most shopping carts work because they use cookies to store

information about your activities on a Web site. information about your activities on a Web site.

Section C

Page 26: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

2626The Web and E-mail

ONLINE AUCYIONSONLINE AUCYIONS P316P316

Section C

An An online auctiononline auction(( 在线拍卖在线拍卖 ) is the electronic equivalent to g) is the electronic equivalent to g

ood old-fashioned yard sales, ood old-fashioned yard sales, rummage salesrummage sales(( 清仓拍卖清仓拍卖 ), and a), and a

uctions . uctions .

You can expect to You can expect to bidbid(( 叫牌叫牌 ) on new, used, ) on new, used, closeoutcloseout(( 出清存出清存货货 ), ), overstockoverstock(( 库存过剩库存过剩 ), or ), or refurbishrefurbished(ed( 刷新刷新 ) items at an onli) items at an onli

ne auction.ne auction.

eBay is by far the largest and most popular auction site .eBay is by far the largest and most popular auction site .

Page 27: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

2727The Web and E-mail

ONLINE PAYMENTONLINE PAYMENT P317-318 P317-318

Section C

The most popular ways to make online payments include The most popular ways to make online payments include susu

bmitbmitting(ting( 提交提交 ) your credit card number directly to a merchan) your credit card number directly to a merchan

t and using a third-party payment service.t and using a third-party payment service.

To protect your credit card from packet sniffers, you should To protect your credit card from packet sniffers, you should

engage in electronic transactions only over a secure connectioengage in electronic transactions only over a secure connectio

n.n.

SSL(Secure Sockets Layer) and its SSL(Secure Sockets Layer) and its successorsuccessor(( 后续的事物后续的事物 ) TL) TL

S(Transport Layer Security) are protocols that encrypt data tS(Transport Layer Security) are protocols that encrypt data t

raveling between a client computer and an HTTP server.raveling between a client computer and an HTTP server.

S-HTTP(Secure HTTP) is an extension of HTTP that simply S-HTTP(Secure HTTP) is an extension of HTTP that simply

encryptencrypts(s( 加密加密 ) the text of an HTTP message before it is sent.) the text of an HTTP message before it is sent.

Page 28: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

2828The Web and E-mail

ONLINE PAYMENTONLINE PAYMENT P318-319 P318-319

Section C

A person-to-person payment(P2P payment) offers an alternA person-to-person payment(P2P payment) offers an altern

ative to credit cards. ative to credit cards.

Can’t misuse it or store it on an unsecured computer.Can’t misuse it or store it on an unsecured computer.

A one-time-use credit card allows consumers to make purchA one-time-use credit card allows consumers to make purch

ases while keeping their actual card numbers hidden. ases while keeping their actual card numbers hidden.

An An electronic walletelectronic wallet(( 电子钱夹电子钱夹 ) is software that stores billing ) is software that stores billing

and shipping information, which can be submitted when finaliand shipping information, which can be submitted when finali

zing an e-commerce purchase.zing an e-commerce purchase.

Page 29: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

2929The Web and E-mail

EE-- mailmail P320 P320

Section D

In this section, you get some background information about how e-mail works, the difference between Web-based e-mail and traditional client-based e-mail.

Who can use e-mailAny person with an e-mail account can send and receive e-Any person with an e-mail account can send and receive e-mail.mail.

An e-mail account provides access to a storage area, or An e-mail account provides access to a storage area, or mailbox, supplied by an e-mail provider.mailbox, supplied by an e-mail provider.

Page 30: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

3030The Web and E-mail

E-MAIL OVERVIEWE-MAIL OVERVIEW P320-321 P320-321

Exactly what is an e-mail messageAn e-mail message is a document that is composed on a An e-mail message is a document that is composed on a computer and remains in digital, or electronic, from so that computer and remains in digital, or electronic, from so that it can be transmitted to another computer.it can be transmitted to another computer.

A message header includes the recipient’s e-mail address A message header includes the recipient’s e-mail address and message subject.and message subject.

What can I do with basic e-mailBasic e-mail activities consist of writing, reading, replying Basic e-mail activities consist of writing, reading, replying to, and forwarding messages.to, and forwarding messages.

Section D

Page 31: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

3131The Web and E-mail

E-MAIL OVERVIEWE-MAIL OVERVIEW P321-323 P321-323

Section D

How does forwarding workAfter you receive an e-mail message, you can use the After you receive an e-mail message, you can use the ForwarForwardd(( 转寄转寄 ) feature to pass it in to other people.) feature to pass it in to other people.

What’s an e-mail attachmentAny file that travels with an e-mail message is called an e-mAny file that travels with an e-mail message is called an e-mail ail attachmentattachment(( 附件附件 ).).

How does HTML relate to e-mailAn e-mail message in HTML format can include graphics in An e-mail message in HTML format can include graphics in addition to a variety of fonts and font colors.addition to a variety of fonts and font colors.

Page 32: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

3232The Web and E-mail

E-MAIL OVERVIEWE-MAIL OVERVIEW P323 P323

Section D

What other e-mail features are available

Page 33: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

3333The Web and E-mail

NETIQUETTENETIQUETTE P324P324

Is e-mail different from other types of communicationBy understanding By understanding netiquettenetiquette(( 网络礼节网络礼节 ), you can avoid some ), you can avoid some of the of the pitfallspitfalls(( 缺陷缺陷 ) and problems of e-mail communications.) and problems of e-mail communications.

Netiquette is online Netiquette is online jargonjargon(( 行话行话 ) for Internet ) for Internet etiquetteetiquette(( 礼礼节节 ).).

Section D

Page 34: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

3434The Web and E-mail

E-MAIL TECHNOLOGYE-MAIL TECHNOLOGY p325 p325

What is an e-mail system

An An e-mail systeme-mail system is the equipment and software that carries is the equipment and software that carries

and manipulates e-mail messages.and manipulates e-mail messages.

It includes It includes computers computers and and software called e-mail serverssoftware called e-mail servers tha tha

t t sortsort(( 分类分类 ), store, and ), store, and routeroute(( 发送发送 ) mail.) mail.

E-mail is based on E-mail is based on store-and-forward technologystore-and-forward technology----a comm----a comm

unications method in which data that cannot be sent directly unications method in which data that cannot be sent directly

to its destination is temporarily stored until transmission is to its destination is temporarily stored until transmission is

possible.possible.

Section D

Page 35: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

3535The Web and E-mail

E-MAIL TECHNOLOGYE-MAIL TECHNOLOGY p325 p325

Section D

What is an e-mail systemThree types of e-mail systems are widely used today:Three types of e-mail systems are widely used today: POP POP, , IMAPIMAP, and , and Web-based mailWeb-based mail..POP(Post Office Protocol)POP(Post Office Protocol) temporarily stores new temporarily stores new messages on an e-mail serve. When you connect to your ISP messages on an e-mail serve. When you connect to your ISP and request your mail, it s downloaded from the e-mail and request your mail, it s downloaded from the e-mail server and stored on your computer.server and stored on your computer.IMAP(Internet Messaging Access Protocol)IMAP(Internet Messaging Access Protocol) is similar to is similar to POP, except that you have the option of downloading your POP, except that you have the option of downloading your mail or leaving it on the server.mail or leaving it on the server.Web-based e-mailWeb-based e-mail keeps your mail at a Web site, where it keeps your mail at a Web site, where it can be accessed using a standard Web browser.can be accessed using a standard Web browser.

Page 36: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

3636The Web and E-mail

E-MAIL TECHNOLOGYE-MAIL TECHNOLOGY p326 p326

How do I use Web-based e-mailFirst you need an e-mail account with a Web-based e-mail First you need an e-mail account with a Web-based e-mail provider. Then at the Web site, you can write, read, reply to, provider. Then at the Web site, you can write, read, reply to, and delete e-mail messages.and delete e-mail messages.

How do POP and IMAP work

Section D

Page 37: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

3737The Web and E-mail

E-MAIL TECHNOLOGYE-MAIL TECHNOLOGY p327 p327

Does e-mail client software work only for offline e-mail tasks

No.No.

How does POP mail compare to Web-based e-mailSimilar: allowing you to read, compose, reply to, delete, and Similar: allowing you to read, compose, reply to, delete, and forward e-mail messages; maintain an address book; and send forward e-mail messages; maintain an address book; and send attachments.attachments.DissimilarDissimilarPOP mail requires you to install and use e-mail client software, POP mail requires you to install and use e-mail client software, whereas Web-based e-mail allows you to use a browser to work whereas Web-based e-mail allows you to use a browser to work with your mail.with your mail.POP transfers messages to your computer’s hard disk, whereas POP transfers messages to your computer’s hard disk, whereas a Web-based e-mail system retains your messages on its server.a Web-based e-mail system retains your messages on its server.

Section D

Page 38: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

3838The Web and E-mail

Web and E-mail SecurityWeb and E-mail Security P328 P328

In this section, you’ll learn about specific spam and spyware exploits and find out how to minimize the risk they pose to computer security and your privacy.

Can cookies be a security riskYes. Yes.

Section E

What is an ad-serving cookieAn ad-serving cookie is created by a third party ad, and is An ad-serving cookie is created by a third party ad, and is used to track your Internet activities across sites. used to track your Internet activities across sites.

Page 39: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

3939The Web and E-mail

COOKIE EXPLOITSCOOKIE EXPLOITS P329 P329

Section E

Can I turn off cookies to foil ad-serving exploits

Most browsers offer a way to turn off third-party cookies. Most browsers offer a way to turn off third-party cookies.

Does deleting cookies reduce risk

By deleting cookies, you can still interact with online By deleting cookies, you can still interact with online shopping carts and take part in other activities that require shopping carts and take part in other activities that require cookies, but deleted third-party cookies won’t be able to cookies, but deleted third-party cookies won’t be able to communicate with their handlers. communicate with their handlers.

Page 40: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

4040The Web and E-mail

COOKIE EXPLOITSCOOKIE EXPLOITS P330 P330 -- 331331

A Flash CookieA A Flash cookieFlash cookie(local shared object) is the Flash equivalent of a (local shared object) is the Flash equivalent of a conventional Web cookie.conventional Web cookie.

You can manually delete Flash cookies from your computer, or You can manually delete Flash cookies from your computer, or visit the Adobe Flash Player Web site to adjust your computer’s visit the Adobe Flash Player Web site to adjust your computer’s settings for Flash cookies. settings for Flash cookies.

A Web bugA A Web bugWeb bug or clear GIF is typically a 1x1 pixel graphic embedde or clear GIF is typically a 1x1 pixel graphic embedded in a Web page or e-mail message.d in a Web page or e-mail message.

AntispywareAntispyware can avoid responding to or downloading spyware fr can avoid responding to or downloading spyware from pop-up ads. om pop-up ads.

Individuals who prefer not to leave a Individuals who prefer not to leave a trailtrail(( 踪迹踪迹 ) of their Internet ) of their Internet activities activities surfsurf(( 冲浪冲浪 ) through an ) through an anonymousanonymous((匿名的匿名的 ) ) proxy servproxy serverer((代理服务器代理服务器 ) which relays your Web page requests after ) which relays your Web page requests after stripstripping offping off(( 剥离剥离 ) your IP address.) your IP address.

Section E

Page 41: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

4141The Web and E-mail

FAKE SITESFAKE SITES P331 P331 -- 332332

Section E

A fake site

A A fake Web site fake Web site looks looks legitimatelegitimate((合法合法 ), but has been create), but has been created by a third party to be a very clever d by a third party to be a very clever replicareplica((复制品复制品 ) of a le) of a legitimate Web site. gitimate Web site.

PharmingPharming is an exploit that is an exploit that redirectredirects(s( 使改变方向使改变方向 ) users to ) users to fake site by “poisoning” a domain name server with a false Ifake site by “poisoning” a domain name server with a false IP address.P address.

To detect a possible pharming attack, you can use anti-pharTo detect a possible pharming attack, you can use anti-pharming tools. ming tools.

参考网页参考网页:: http://www.anti-spam.org.cn/AID/742http://www.anti-spam.org.cn/AID/742

Page 42: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

4242The Web and E-mail

SPAMSPAM P333 P333

Section E

spamSpamSpam(( 兜售信息兜售信息 ) is unwanted ) is unwanted electronic junk mailelectronic junk mail(( 电子邮寄宣电子邮寄宣传品传品 ) about medical products, low-cost loans, and fake softw) about medical products, low-cost loans, and fake software upgrades that arrives in your online mailbox. are upgrades that arrives in your online mailbox.

In the past, spam In the past, spam floodingflooding(( 泛滥泛滥 ) your Inbox with ) your Inbox with unsoliciteunsolicitedd(( 主动提供主动提供 ) and often ) and often pornographicpornographic(( 色情色情 ) messages was me) messages was merely an rely an annoyanceannoyance(( 烦恼烦恼 ).).

These days, spam has turned into another major hacking toThese days, spam has turned into another major hacking tool for ol for cyber criminalscyber criminals(( 网络犯罪网络犯罪 ).).

A spam A spam filterfilter(( 过滤器过滤器 ) is a type of utility software that captu) is a type of utility software that captures unsolicited e-mail messages before they reach your Inbores unsolicited e-mail messages before they reach your Inbox.x.

Page 43: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

4343The Web and E-mail

SPAMSPAM P334 P334

Section E

Guidelines for Avoiding Spam.Guidelines for Avoiding Spam.

To To combatcombat(( 抗击抗击 ) spam sent by ) spam sent by hijackedhijacked(( 抢劫抢劫 ) botnet comp) botnet computers, e-mail uters, e-mail authenticationauthentication(( 鉴定鉴定 ) techniques ) techniques verifyverify(( 核实核实 ) t) that e-mail messages originate form the Internet domain frohat e-mail messages originate form the Internet domain from which they claim to have been sent.m which they claim to have been sent.

Page 44: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

4444The Web and E-mail

PHISHINGPHISHING P334-335 P334-335

What is phishingPhishingPhishing((钓鱼攻击钓鱼攻击 ) is an e-mail based scam that’s designed to pe) is an e-mail based scam that’s designed to persuade you to rsuade you to revealreveal((暴露暴露 ) confidential information.) confidential information.

Be suspicious of e-mail messages that supposedly come from bankBe suspicious of e-mail messages that supposedly come from banks, ISPs, online payment services, OS publishers, and online merchs, ISPs, online payment services, OS publishers, and online merchants.ants.

The best defense against all the bad stuff on the Web and in e-maiThe best defense against all the bad stuff on the Web and in e-mail:l:

Section E

Page 45: Chapter 7 The Web and E-mail 2 Contents  Web technology  Search engines  E-commerce  E-mail  Web and E-mail security

4545The Web and E-mail

Do you have made a progress today ?