Unformatted text preview:

Page 1 of 14MMC2000ProffittSummer 2011Exam 3 Study GuideTextbookChapter 10: The Internet and the World Wide WebExplain the history of the Internet, including the versions of the origin of the Internet and the military applications.- The internet was initially “built to protect national security in the face of a nuclear attack”- Joseph C. R. Licklider: joined the rush towards the development ofo Internet: a global network of interconnected computers that communicate freely and share and exchange information- Colossus: was the first electronic digital computer.o Reduced binary code: code made up of the digits 1 and 0.- ENIAC (Electronic Numerical Integrator and Calculator) was the first “full-service” electronic computer.o Introduced by John Mauchly and John Presper Eckert - UNIVAC (Universal Automatic Computer): used by Census Bureau and became the first successful commercial computer. - ARPA (Advanced Research Projects Agency): established to sponsor and coordinate sophisticated defense-related research. o Paul Baran: “packet switched network” Common communication rules (protocols) Destination or delivery instructions embedded in all information send on the system. Purpose: To optimize use of available link capacity, minimize response times and increase the toughness of communication.- Personal computer: (laptop) leaders were Bill Gates, Steve Jobs, and Stephen Wozniako Bill gates & Paul Allen: founded the Microsoft Corporation. (Operating system): the software that tells the computer how to work. o Jobs & Wozniak: Apple II, computer designed for personal use. 9What is the definition and significance of the term, the global village? - The idea that the new communication technologies will permit people to become increasingly involved in one other’s lives. - A village coming together by means of the different media types, most especially the World Wide Web, making it easy to pass across messages (like the news), thereby making the world become like a single village where people can easily contact each other quicker. (across seas)What are the concerns raised in the sections, The Internet and Freedom of Expression, Freedom ofthe Press for Whom?, Controlling Internet Expression, Pornography on the WWW?- There is no central location, no on-and-off button for the internet, making it difficult for those whowant to control it.- People express themselves by radical, profane and vulgar thoughts. This gives voice to those who would otherwise be silenced. - Internet control is a breeding ground for abuse- Issues of freedom-of-expression:Page 2 of 14o The first amendment’s freedom-of-the-press guarantee a reality for greater numbers of peopleo Setting boundaries of control - Internet can distribute secret or confidential contents with total assurance of secrecy. - Blogs are more of a threat than people realize. - The internet does not distinguish between true and false, biased, and objective, trivial and important. - Protecting children from things such as porn. - Can’t prohibit them because it violates the first amendment. What is copyright? What does the Digital Millennium Copyright Act do?- Copyright: protection is designed to ensure that those who create content are financially compensated for their work.- The Digital Millennium Copyright Acto 9Makes it a crime to circumvent anti-piracy measures built into most commercial software.o Outlaws the manufacture, sale, or distribution of code-cracking devices used to illegally copy software.o 9Permit breaking of copyright protection devices to conduct encryption research and test computer security systems.o 9Provides copyright exemptions for nonprofit libraries, archives, and educational institutions under certain circumstances.o Limits the copyright infringement liability of Internet service providers for simply transmitting information over the Internet, but ISPs are required to remove material from users’ Web sites that appears to constitute copyright infringement. o Requires Webcasters to pay licensing fees to record companies o States explicitly that fair use- instances in which copyrighted material may be used without permission or payment, such as taking brief quotes from a book applies to the Internet 6 What are the concerns raised in the section, Privacy?- Privacy in mass communications is concerned with individuals’ rights to protect their privacy from invasive, intrusive media. - “Authorized” interception of media messageso Employer reading employees emails. - How the information we give to one entity is easily and cheaply given to countless, unknown others.- Radio frequency identification (RFID) chip: a microchip and antenna embedded in consumer products that transmit a radio signal. o Can eventually monitor things you buy. For example it can let your insurance company know that you bought sugared snacks. - Smart phones have applications that allow you to show your real-world location - Cloud computing: storing computer data, including personal information and system-operating software on third-party environmentso Anyone can access this as long as they have a password, bad guys can hack. - Online merchandizing, can lead to identity theft and people cloning your credit cards etc. What is meant by virtual democracy? The technology gap? Digital divide? The information gap? - Virtual democracy: when computer technology is often trumpeted as the newest and best tool for increased democratic involvement and participationo Internet political action in forms of flash mobs, and online groupsPage 3 of 14o 2008, presidential election made extensive use of the internet. - Technology Gap: Today mostly everything has been moved to online, welfare applications, votingetc. it is not fair for those who do not have access to computers. 75% of people in the US have internet, what about that 25%? They don’t get access. - Information Gap: if computer technology gap creates an even wider gap then democracy will suffer from Knowledge gap: growing differences in knowledge, civic activity, and literacy between better-informed and less informed Americans. What are the concerns raised in the sub-section, Information, Knowledge, and Understanding under the section, Virtual Democracy?- Cyberworld may not be the best place to practice democracy.- Until there is no more technology gap, certain voices will have less access to their leaders that those who are connected. - Cyberdemocracy by its very virtual nature, is


View Full Document

FSU MMC 2000 - Exam 3 Study Guide

Documents in this Course
People

People

9 pages

Chapter 3

Chapter 3

17 pages

Test 3

Test 3

4 pages

Exam 1

Exam 1

17 pages

Film

Film

11 pages

EXAM 2

EXAM 2

17 pages

TEST 3

TEST 3

17 pages

QUIZ 8

QUIZ 8

48 pages

Video

Video

4 pages

Internet

Internet

10 pages

Exam 3

Exam 3

4 pages

Chapter 7

Chapter 7

23 pages

Unit	3

Unit 3

21 pages

Test 2

Test 2

14 pages

Writing

Writing

41 pages

Exam #1

Exam #1

20 pages

Exam 2

Exam 2

17 pages

Load more
Download Exam 3 Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Exam 3 Study Guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Exam 3 Study Guide 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?