Internet Search Engines
Individual and Meta-serarch Engines

Individual search Engine
Uses computer programs called "spiders", "crawlers", or "robots" to match key search words with web pages

Meta-Search Engine
Compiles results to eliminate duplications yielding fewer results

Internet Search Tools
Search Engines, Subject Directories

Subject Directories
Searchable databases that are developed and maintained by human selection of sites

Internet Search Methods
Keywork, Field, Boolean Logic, Miscellaneous

Keyword
"Search String" Keying a main idea, phrase, or concept in a search box

Field
Search conducted for a specific title, domain, URL. or host

Boolean Logic
Uses operators such as, AND, OR, and quotation marks

AND
Narrows results by searching for pages that contain both keywords

OR
Expands results by searching for pages that contain either of the keywords

Miscellaneous Search Methods
Different language support, Spell Checker, Phonebook, Math/equivalents

Different language Support
searches for words in different languages

Spell Checker
gives suggestions if the word keyed for the search is mispelled

Phonebook
Uses phone numbers to search for locations and addresses

Math/equivalents
solves basic math problems and converts equivalents

Google
Individual Search Engine

Surfwax
Meta-search engine

http://scholar.google.com/
Suject Directory

URL
Uniform Resource Locator

Components of a URL
Protocol, Domain name, Directory/folder

Protocol
are rules that determine how the Internet handles message packets flowing on it.

Domain Name
Used to identify the details of the information's source in an URL

Server/host name
The origin of the information

Suffix/extension
Used to indicate the type of server, such as org.edu.,mil

Directory/folder
Instructs the URL to drill down into specific directories of folder for requested information

Page/document/filename
used to indicate a specific document or program

Tilde (~)
Indicates a personal web page

.exe
Indicates an executable program

Equals (=)
Indicates a specific document or program

Question Mark (?)
Indicates a query

Creator
Information that confirms the author is who he/she claims to be

Fair Use
when people use other peoples work freely

Copyrighted
Published work that has been protected to keep others from freely using it

Validate
To verify or prove that something is what it says it is or does what it says it's supposed to do

Authentic
Genuine, real, original, true

Electronic Communications
Chatting, Blogs, Podcasting, Discussion Boards, Text Messaging, Email

Chatting
talking in real-time to other network users from all parts of the world

Blogs
web-based journal

Podcasting
Publishing files to the internet, allowing users to subscribe to a feed and receive new files automatically

Discussion Boards
On-line bulletin boards that provide a forum for users to post and respond to messages

Moderated Discussion Board
An administrator and/or Moderator monitor discussion threads for content and netiquette

Un-moderated Discussion Board
Discussions are at free will

Text Messaging
Keyed messages relayed via a pager or cell phone

Email
Electronic exchange of messages and files that are connected to the internet

Components of an email
Header, Body, Signature, Attachment

Sections of an email Header
Addressee (TO), Author (FROM), Date, Subject

Body
The message of the memo

Signature
The name and contact information of the sender

Attachment
Files that are sent along with the email

Subject
The topic of the message

CC
Notation for additional recipient names and addresses

BCC
Notation for recipient(s) that are hidden from view

E-mail Netiquette
Do not key in all caps or in all lower case! Using all caps symbolizes yelling

Virus
Software that attaches to programs that are installed on a user's pc

Spam
unwanted and unsolicited email advertisements or messages

Spyware
malicious software designed to take partial control of a computer's operations without the consent of the user

Internet Safety Guidelines/Precautions
Avoid yelling, Bullying, Explicit material,

Website is Secure
https, interactive lock, verisign, Seal

SMTP
handles outgoing email messages, determining the paths an email message takes on the Internet.

electronic mail
"Email" is short for

user name
usually identifies one person's email account on a mail server.

mail client software
The software that requests mail delivery from the mail server to an Internet device is known as

a single mail server to manage the email they send and receive
Most organizations have

message header
contains information about the message.

signature
might appear at the bottom of an email message and contain standard information about the sender.

category or group
A single email address that can represent several email addresses is called

attachment
When you send along a complex document or graphic as part of your email, you send it along as a(n)

read-only
file is a file you can view but cannot change.

The email address [email protected] is the same as the email address

Email Acronyms

WE WILL WRITE A CUSTOM ESSAY SAMPLE ON
THE INTERNET SPECIFICALLY FOR YOU
FOR ONLY $13.90/PAGE