< p=""> < b=""> <> < i=""> Computer Literacy for Io <> was written to provide readers the opportunity to learn and demonstrate computer and Internet literacy through a worldwide industry standard. < b=""> <> Covering each of the Io objectives, this book provides a broad understanding of the key components to computer literacy. < b=""> <> For any business owner or department manager needing to assess employee computer literacy.<>
Unit 3 Living Online
Chapter 1: Understanding the Internet
Lesson 1: Survivable Communications
Topic 1 How traditional phone systems work [network of connected networks] (1.1.4)
Topic 2 Need for a system that could survive a nuclear war
Topic 3 How packet switching works (TCP/IP) (
Topic 4 Birth of the Internet to connect military and university research centers (1.1.2)
Lesson 2: Networks of Computers
Topic 1 Relationships between Computers (LAN, peer-to-peer, servers and clients) (1.1.3) (1.1.1, 1.1.2)
Topic 2 Connecting computers [node, Ethernet, fiber optic, wireless] (1.1.1,
Topic 4 Wide Area Networks (WAN) (1.1.2)
Topic 5 Connecting networks to networks [gateways, "super network?] (1.1.1, 1.1.4)
Topic 6 World-wide naming system, Universal Resource Locator (URL) (3.1.1, 3.1.2
Topic 6 Role of domain names, domain name servers (2.1.2)
Topic 7 Nodes-gateways (routers, through put) and hosts (end points)
Topic 8 Main connections between nodes [backbone, telephone companies, microwave, satellite, undersea fiber optic]
Topic 9 Benefits and risks (1.1.6, 1.1.7)
Lesson 3: Birth of the World Wide Web
Topic 1 Researcher writes code that works on all computers-Hypertext Markup Language (HTML) [HyperText Transfer Protocol, HTTP] (3.1.1)
Topic 2 Web browsers - Mozilla, Netscape, and Internet Explorer make it popular [Web site, Web page, Home Page] (3.1.1)
Topic 3 Relationship between WWW and the Internet
Topic 1 Types of Web sites [commercial, academic, organizations, government, military] and country extensions (3.1.3)
Lesson 4: Joining the World Wide Web
Topic 1 Gateway computers - onramp to the Internet [domains] (1.1.4)
Topic 2 Internet Service Providers (ISP) provide onramp service for individuals [host domains]
Topic 3 Connection speeds [bits, bytes, bits per second, bytes per second, prefixes kilo, mega, giga, tera, broadband] (1.1.1)
Topic 4 Connecting to an ISP via the telephone company [dial-up, DSL, modem, T1, Fiber Optic, cell phone cellular broadband, G3] (1.1.5)
Topic 5 Connecting to an ISP via the cable television company [co-axial cable, cable modem] (1.1.5)
Topic 6 Connecting to an ISP via Wireless radio [antenna, dead zones] (1.1.5)
Topic 7 Connecting to an ISP via satellite link (dish antenna)
Lesson 5: Control and Financing of the Internet
Topic 1 Government turns over management to private industry
Topic 2 Role of telephone companies
Topic 3 How companies charge for service
Topic 4 Control of domain names
Topic 5 Taxation
Lesson 6: Security, Privacy, and Ethics
Topic 1 Network admin code of ethics
Topic 2 Firewalls (1.1.1)
Topic 3 Encryption and Virtual Private Networks (VPN) [HTTPS] (3.1.1)
Topic 4 Network security [Login, authentication (1.1.1, 1.1.8)
Topic 5 Intranets (1.1.2)
Chapter 2: Gathering Information Online
Lesson 1: Using a Web Browser
Topic 1 Functions of a Web Browser, navigating the Web [URL or IP address, Forward and Back, Home page, (3.1.4)
Topic 2 Elements of a Web site [text, graphics, text links, graphic links, buttons/menus/check boxes] (3.1.2, 3.1.4, 3.2.2)
Topic 3 Domain names by country and function (3.1.4)
Topic 4 Storing Web pages for quick access [cache, refresh] (3.1.1, 3.1.5)
Topic 5 History of pages visited (3.1.6)
Topic 6 Modifying browser settings [Plug-ins, home page (3.1.11)
Topic 7 Typical problems [page not found, slow loading, parts don't work because plug-in doesn't work or is too old, garbled page content] (3.1.12)
Lesson 2: Searching for Information
Topic 1 Web crawlers and search engines (3.2.2)
Topic 2 Classification strategies [indexes, link lists, blogrolls] (3.2.2,
Topic 3 Keyword searches (3.2.3)
Topic 4 Using advanced search options [Boolean, refining a search] (3.2.4)
Topic 5 Finding words on a Web page [Ctrl+F] (3.1.7)
Lesson 3: Managing Information from a Web Site
Topic 1 Bookmark favorite sites and manage bookmarks (3.1.8)
Topic 2 Copy information from a Web site (3.1.9)
Topic 3 Download a file (3.1.10)
Lesson 4: Creating and Hosting a Web Page
Topic 1 Popular software suites save documents, spreadsheets, and presentations as Web Pages (3.2.1)
Topic 2 Viewing source code
Topic 3 Web page design software (3.2.1)
Topic 4 Hosting Web pages on a server
Lesson 5: Safety, Privacy, and Ethics
Topic 1 Citing sources (3.2.7); Intellectual property rights [copyright, trademark, fair use, patent, (3.2.7)
Topic 2 Identifying issues affecting quality of information [relevance, reliability, validity, bias, sufficiency] (3.2.5); Methods of evaluating quality] [analyzing source, communicate with creator of site, analyze links within site, search engine rank, compare to "offline" sources (3.2.6)
Topic 3 Ethical Search Engine practices; Identifying sponsored sites; Increasing a page's search ranking [webring, link lists
Topic 4 Blocking Web sites by individuals and by governments and blocking Pop-Up ads
Topic 5 Respect others [privacy, opinions,] Avoid [libel, harassment, offensive content, inappropriate content for children,] Responsible [factual content, opinions supported by fact, informal content appropriate to audience] (3.2.7)
Chapter 3: Buying, Selling, and Banking Online
Lesson 1: Online Banking and Making Payments
Topic 1 Money as digits, and international currencies (4.1.3)
Topic 2 Transferring funds (4.1.2)
Topic 3 Banking at Automated Tellers (4.1.2)
Topic 4 Secure payments using public key encryption (3.1.1) (4.2.7)
Topic 5 Digital signatures, Secure vs. unsecure sites
Topic 6 Banking Online (4.1.2)
Lesson 2: Buying from Businesses Online
Topic 1 Buying Unusual Items Online
Topic 2 Typical Online Store Web Site; Content of site - product description, simulations (3.1.3)
Topic 2 Identifying customers with cookies (3.1.1)
Topic 3 Taking an order online (4.1.2) (4.1.3) (4.1.4)
Topic 4 Paying (4.1.2)
Topic 5 Delivery (4.1.2)
Topic 6 Returns and customer service (4.1.2)
Topic 7 Evaluating quality (3.2.6)
Lesson 3: Businesses Buying from Businesses Online
Topic 1 B2B using EDI
Topic 2 Extranets, VPN
Topic 3 Auctions and reverse auctions (3.1.3) (4.1.1)
Topic 4 Value-added services and disintermediation (3.1.3) (4.1.1)
Lesson 4: Consumer to Consumer
Topic 1 Auctions - eBay (4.1.3) (4.1.4)
Topic 2 Classifieds - Craig's List (4.1.3)
Topic 3 Self Publishing and Print on Demand
Topic 4 Storefront software
Topic 5 Evaluating quality (3.2.6)
Lesson 5: Security, Privacy, and Ethics
Topic 1 Fraud by sellers and buyers , phishing(4.2.5)
Topic 2 Avoiding unwanted e-mail and telephone calls
Topic 3 Customer profiling and cookies
Topic 4 Identify hazards of electronic commerce (4.2.7)
Topic 5 Set security levels (3.1.11)
Chapter 4: Communicating Online
Lesson 1: E-mail
Topic 1 Accessing e-mail
E-mail addresses (2.1.2), Web mail - Gmail, (2.1.4), Mail clients - Outlook, Lotus Notes (2.1.4), cell phones, wireless devices (Blackberry) (2.1.4)
Topic 2 Components of an e-mail [Address, subject line, body, attachments] (2.1.5)
Topic 3 Composing, viewing, reading, sending, forwarding, copying E-mail [Reply, Reply All, HTML vs text] (2.2.1, 2.2.7)
Topic 4 Supplementing e-mail [attachments, URLs, graphics, emoticons] (2.2.3)
Topic 5 Managing attachments [saving, opening, deleting] (2.2.4)
Lesson 2: Synchronous Communications
Topic 1 Instant Messaging, Unique address
Topic 2 Typical features
Topic 3 Services - AOL, MSN, Yahoo,
` Topic 4 Texting (2.1.1), Identification by telephone number (2.1.3)
Topic 5 Voice over IP (2.1.1)
Topic 6 Video calls [Skype]
Lesson 3: Advantages and Disadvantages
Topic 1 Advantages of electronic communication [speed, cost, routing, collaboration, multimedia, paper trail] (2.3.1)
Topic 2 Share resources - documents, printers, copiers (2.3.1)
Topic 3 Common problems with e-mail; blocked attachments (2.3.2)
` Topic 4 Common problems with direct communications; lack of paper trail (2.3.2)
Lesson 4: Asynchronous Communications
Topic 1 e-mail lists
Topic 2 online college courses
Topic 3 message boards
Topic 4 Web logs [blogs] (3.2.1)
Topic 5 Video sharing [Utube]
Topic 6 Podcasts
Lesson 5: Group Communications
Read http://fwk.enpraxis.net/catalog/additional-book-5/chapter-4.
Topic 1 Wiki (3.2.1)
Topic 2 Open source software
Topic 3 Virtual communities [Second Life] (3.2.1)
Lesson 6: Security, Privacy, and Ethics
Topic 1 Methods of identification - URL, phone number, User ID (2.1.3)
Topic 2 How dangerous programs enter a computer, Scanning e-mail attachments (2.3.7, 4.2.4)
Topic 3 Hoaxes, Junk mail, viruses, worms [anti-virus software], (4.2.4) Spoofing (4.2.5)
Topic 4 Filtering unsolicited mail by ISP, user (2.3.6)
Topic 5 Tactics to limit unsolicited mail, laws related to SPAM (2.3.6)
Topic 6 Avoid hasty messages or responses (2.3.7)
Topic 7 Company and school policies regarding e-mail (2.3.7)
Topic 8 E-mail encryption (2.3.7)
Topic 9 Ownership of content
Chapter 5: Working Online
Lesson 1: E-mail management
Topic 1 Managing e-mail [inbox, sorting, searching, folders, marking, saving, deleting, archiving, forwarding, blocking, out-of-office, signature] (2.2.2, 2.2.5, 2.2.7)
Topic 2 Managing addresses [address book, mailing lists] (2.2.6)
Lesson 2: Proper Use of Communications
Topic 1 Confusion between professional and informal communications (2.3.2)
Topic 2 Match mode to method; IM for quick informal, e-mail for paper trail, non-electronic for legal documents with signatures (2.3.3)
Topic 3 Elements of professional electronic communications [quick response, brevity, directness, spelling and grammar, choice of recipients and replies, appropriate level of formality] (2.3.4)
Topic 4 Appropriate use of attachments [size, use URLs instead of copies, problems with some readers] (2.3.5)
Topic 5 Backup and archive regularly
Lesson 3: Working in Teams
Topic 1 coordinating schedules
Topic 2 sharing documents
Topic 3 Video conferencing
Topic 4 Project management
Lesson 4: Web Based Applications
Topic 1 Word processing, spreadsheets [Google Docs] (3.1.3)
Topic 2 Project management [Open Project]
Topic 3 Creating content using Web design software (3.2.1)
Lesson 5: Security, Privacy, and Ethics
Topic 1 Safety in the workplace [electrical, air circulation, cables] (4.2.1)
Topic 2 Ergonomics [repetitive motion disorder, back, eye, seating, lighting, wrist support] (4.2.2)
Topic 3 Risks to data [theft, penetration by hackers, failure of storage media, backup practices] (4.2.3)
Topic 4 Anti-virus policies and procedures (4.2.4)
Topic 7 Principles for considering data personal (4.2.6)
Chapter 6: Identifying Technology Convergence and Its Social Impact
Lesson 1: Cell Phones, GPS, Cable TV, and the Internet
Topic 1 How cell phones work
Topic 2 Global positioning systems (GPS)
Topic 3 Internet connection, browsers
Topic 4 Cross-platform software - Hypertext eXtensible Markup Language (HXML)
Topic 5 Multi-function phones and Personal Digital Assistant (PDA)
Topic 6 Cable television, Internet Service, Voice Over IP (VOIP)
Lesson 2: How Computers are Used in Work, School, and Home
Topic 1 Uses of computers (4.1.1)
Topic 2 Technology and processes "behind the scenes" (4.1.2)
Topic 3 Transformed traditional processes (4.1.3)
Topic 4 Help disabled and disadvantaged (4.1.4)
Lesson 3: Risks
Topic 1 Risks to personal and organizational data (4.2.3, 4.2.5)
Topic 2 Software threats [viruses, worms] (4.3.4)
Topic 3 Reasons for restricting access [important data, children] (4.2.5)
Topic 4 Restricting access using technical and non-technical means [security and filtering software, parent/teacher supervision] (4.2.5)
Lesson 4: Prudent Practices
Topic 1 Practices to protect against infections [anti-virus software, following procedures, updating] (4.2.4)
Topic 2 Keep anti-virus software up-to-date (4.2.4)
Topic 3 Following procedures for identifying, isolating, and removing infected files (4.2.4)
Topic 4 How to stay informed of virus threats and new developments (4.2.4, 4.2.10)
Topic 5 How to protect privacy [cookies, not sharing personal or family information, using aliases in public forums] (4.2.8)
Topic 6 Use technical and non-technical means to restrict inappropriate access [children, adult sites at work] (4.2.5)
Topic 7 Ergonomics [repetitive motion, back, eye, seating] (4.2.2)
Lesson 5: Responsible Practices
Topic 1 How to find rules, laws, and policies at school and work (4.2.9)
Topic 2 Recycling [paper, ink and toner cartridges, hardware] and donations (4.2.11)
Topic 3 Share your knowledge and experience with others (4.2.11)