Difference between revisions of "AY Honors/Internet/Answer Key"

From Pathfinder Wiki
< AY Honors‎ | InternetAY Honors/Internet/Answer Key
m (Delete Honor_Master template from answer key)
m (fixing a brief sentence)
 
(14 intermediate revisions by 5 users not shown)
Line 1: Line 1:
<languages /><br />
+
{{HonorSubpage}}
<noinclude><translate><!--T:42-->
 
</noinclude>
 
{{honor_desc
 
|stage=100
 
|honorname=Internet
 
|skill=2
 
|year=2006
 
|category=Vocational
 
|authority=General Conference
 
|insignia=Internet_Honor.png
 
}}
 
 
<!--{{Honor Master|honor={{#titleparts:{{PAGENAME}}|1|3}}|master=Modern Technology}}-->
 
<!--{{Honor Master|honor={{#titleparts:{{PAGENAME}}|1|3}}|master=Modern Technology}}-->
 
+
<section begin="Body" />  
<!--T:2-->
 
{{IAConnection|[[Investiture_Achievement/Ranger/Spiritual Discovery|RANGER Spiritual Discovery]]|a discussion of the World Wide Web in line with Requirements #5 and #8 of this Honor|
 
}}
 
 
 
 
 
<noinclude></translate></noinclude>
 
<section begin="Body" />
 
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:44-->
 +
</noinclude>
 
<!-- 1. Define the following terms: -->
 
<!-- 1. Define the following terms: -->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1a}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1a}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:45-->
 +
</noinclude>
 
A vast collection of many independent, inter-connected computer networks that use the TCP/IP protocols and that developed from ARPANet of the late '60s and early '70s. "The Net," is a worldwide system of computer networks providing reliable and redundant connectivity between disparate computers and systems by using common transport and data protocols.
 
A vast collection of many independent, inter-connected computer networks that use the TCP/IP protocols and that developed from ARPANet of the late '60s and early '70s. "The Net," is a worldwide system of computer networks providing reliable and redundant connectivity between disparate computers and systems by using common transport and data protocols.
  
 +
<!--T:46-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 1a -->
 
{{CloseReq}} <!-- 1a -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1b}} <!--T:4-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1b}} <!--T:4-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:47-->
 +
</noinclude>
 
Though ''World Wide Web'' (or simply Web for short) is a term frequently used (incorrectly) when referring to "The Internet", it has two major meanings: First, loosely used: the whole constellation of resources that can be accessed using Gopher, FTP, HTTP, telnet, USENET, WAIS and some other tools. Second, the universe of hypertext servers (HTTP servers), more commonly called "web servers", which are the servers that serve web pages to web browsers.
 
Though ''World Wide Web'' (or simply Web for short) is a term frequently used (incorrectly) when referring to "The Internet", it has two major meanings: First, loosely used: the whole constellation of resources that can be accessed using Gopher, FTP, HTTP, telnet, USENET, WAIS and some other tools. Second, the universe of hypertext servers (HTTP servers), more commonly called "web servers", which are the servers that serve web pages to web browsers.
  
 +
<!--T:48-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 1b -->
 
{{CloseReq}} <!-- 1b -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1c}} <!--T:5-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1c}} <!--T:5-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:49-->
A site on the World Wide Web where any number of computer users can type in messages to each other (chat) in real time, creating an online conversation. These messages usually appear on an area of the screen next to the user’s nickname or handle (your online nickname or the name you go by in a chat room). Most chat rooms have a particular topic (which you are expected to discuss) but there are some that are purely for meeting other people.
+
</noinclude>
Beginning in the 2003, chat rooms began to give way to social media platforms such as MySpace, then later Facebook, Twitter Instagram, Snapchat, and Tiktok.
+
A site on the World Wide Web where any number of computer users can type messages to each other (chat) in real time, creating an online conversation. These messages usually appear on an area of the screen next to the user’s nickname or handle (your online nickname or the name you go by in a chat room). Most chat rooms have a particular topic (which you are expected to discuss) but there are some that are purely for meeting other people. The first Internet chat rooms were only text based, however as the technology developed, the ability to send pictures, effects, and emoji was developed and incorporated.
 +
The first chat systems were developed by the US government in the 1970s with limited connected devices. CompuServe made the first public available online chat service in 1980. The development of Internet Chat Relay (IRC) by Jarkko Oikarinen in 1988 allowed the development of many more chat room capability like AOL.<ref>[https://en.wikipedia.org/wiki/Chat_room Wikipedia: "Chat Room"], a secondary source.</ref> In 2003, chat rooms started being replaced by social media platforms with more and various features. Some examples: MySpace (2003), Facebook (2004), X (formerly) Twitter (2006), Instagram (2010), Snapchat (2011), and TikTok (2016).
  
 +
<!--T:50-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 1c -->
 
{{CloseReq}} <!-- 1c -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1d}} <!--T:6-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1d}} <!--T:6-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:51-->
To copy a file from a remote computer to your computer. There are a few methods of doing this on the Internet. HTTP, FTP and e-mail attachments are the most common.  This term is also used when referring to moving pictures from a camera or other image device to a local computer.
+
</noinclude>
 +
"To Download" is the process of transferring a copy of a file from a remote computer to your computer. There are a few methods of doing this on the Internet: HTTP, FTP and e-mail attachments are the most common.  
  
 +
A user may also "download" images from an external device (digital/video camera, USB, SD Card, etc.) via a direct connection (cable/adapter or computer port) rather than through online network connectivity (remote connection).
 +
 +
The term "download" comes from early satellite communication where information was received "down" from satellites in low-earth orbit.
 +
 +
<!--T:52-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 1d -->
 
{{CloseReq}} <!-- 1d -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1e}} <!--T:7-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1e}} <!--T:7-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:53-->
To move a digital file (such as a media file) from a local system to a server where it is stored for others to access or later retrieval. For example, web pages must be "uploaded" to a web server for them to be viewed on the World Wide Web.
+
</noinclude>
The terminology for "upload" and "download" comes from the days of satellite communications.  When an earth-bound terminal send data to the remote computer (the satellite), it was uploaded, as the direction of data travel was up. When the terminal received data from the satellite, it was downloaded, as the directin of data travel was down.
+
"Uploading" a computer file is the process of transferring that file (document, picture, program, etc.) from the local device to a remote server computer to be accessed and downloaded by other devices and users remotely. All websites and webpages are actually computer file codes "uploaded" to a dedicated network-connected server computer to store that webpage information to be retrieved by every device worldwide to connect to that server computer and navigate the code information uploaded in that webpage file. Your local computer accesses and temporarily downloads the information to display the webpage for you.
  
 +
Cloud (remote) storage programs use dedicated computer farms known as "data servers" to store all of the data uploaded to "the cloud". Each digital piece of information requires storage in a physical location that is often secret for privacy reasons. Some examples of cloud services are: Google Drive, Dropbox, iCloud, Microsoft Cloud, Amazon Web Services.
 +
 +
The term "upload" derives from early satellite communication where information was transmitted "up" to satellites in low-earth orbit.
 +
 +
<!--T:54-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 1e -->
 
{{CloseReq}} <!-- 1e -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1f}} <!--T:8-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1f}} <!--T:8-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:55-->
One or more files (pages) stored on a computer (a "server") that can be accessed via the Internet. Every website has a "home page", which is generally designed as the file visitors first see when coming to the site and which gives an idea of the site's contents. All files on a website usually contain textual or graphical "links" that can be clicked using an input device such as a mouse to move to other files, either within the site or on another one.
+
</noinclude>
 +
One or more files (pages) stored on a remote computer (called a "server") that can be accessed via the Internet. Every website has a "home page", which is generally designed as the file visitors first see when visiting the site to help the user navigate the website pages (remote files). All files on a website usually contain textual or graphical "links" that can be clicked using an input device such as a mouse to move to other files, either inter- or intra-site (within the same website file system or between different website file systems).
  
 +
<!--T:56-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 1f -->
 
{{CloseReq}} <!-- 1f -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1g}} <!--T:9-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1g}} <!--T:9-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:57-->
Email is similar to personal letters, only a lot faster. Email is used to send messages via your computer to friends and acquaintances around the world. Requires a computer, email software, an email account through an Internet Service Provider (ISP) and a modem.  Technically, email (electronic mail) is the exchange of computer-stored messages by telecommunication.  
+
</noinclude>
Most email messages usually contain text, but you can also send non-text files, such as graphic images and sound files as attachments. Email accounts for a large percentage of the total traffic over the Internet. An email address is easily identified by the '@' symbol, for instance webmaster@pathfindersonline.org, making identification of the domain it's attached to much easier - in this case pathfindersonline.org
+
Electronic Mail or e-mail (culturally written as "email") is the process of sending computer code directly to another user in telecommunication. A concept derived from hand-written messages on paper and delivered by a messenger service, email is the digital delivery of a specific message directly to another person.
 +
 
 +
Standard email requires a network-connected device (computer/mobile phone), access to email software (either an application or webpage on a web browser), an account with an email client through an Internet Service Provider (ISP), and a network modem to connect to the Internet (and a wireless router to remotely connect to a modem).  
 +
 
 +
Most email is primarily text-based, however development of this technology has allowed for other files such as graphic images, web links, and GIFs within the email and other computer files (images, documents, programs, audio, etc) as attachments.
  
 +
The composition of an email address is the account name connected to a specific domain. In "webmaster@pathfindersonline.org", a email file is sent to the website domain (www.pathfindersonline.org) and then distributed to the account holder within that domain (webmaster). The email address can be imagined similar to a physical address for the Amazon delivery driver to find your house to properly deliver your package (or USPS your mail!). The computer interprets "webmaster@pathfindersonline.org" to route the data written in an email using specific protocols to reach the intended recipient in a semi-secure manner. All data sent over the Internet can be monitored and viewed, however the average user is unable to track this data. Some companies have developed services that make the data traffic in email and other web browsing more secure by disguising the transfer of information to be less visible to others.
 +
 +
<!--T:58-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 1g -->
 
{{CloseReq}} <!-- 1g -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1h}} <!--T:10-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1h}} <!--T:10-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:59-->
Throughout this honor, the term “virus” represents the traditional virus, as well as trojans, worms, and other malicious code.
+
</noinclude>
 +
Throughout this honor, the term “virus” represents the traditional virus, as well as trojans, worms, and other malicious code. Viruses most often are obtained ("downloaded") to a device from the Internet (intentionally or unintentionally). Viruses could also be placed directly by introducing malicious code through one of the computer's data ports, though this typically only happens in action movies.
  
 
<!--T:11-->
 
<!--T:11-->
;Traditional virus: In computer security technology, a virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. Extending the analogy, the insertion of the virus into a program is termed infection, and the infected file (or executable code that is not part of a file) is called a host.
+
;Traditional virus: In computer security technology, a virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. Extending the analogy, the insertion of the virus into a program is termed infection, and the infected file (or executable code that is not part of a file) is called a host. Special programs are required to delete copies of the host to locate the malicious code for deletion. Unlike a biological virus where an immune system will seek to eliminate the virus, a computer virus will remain until deleted.
  
 
<!--T:12-->
 
<!--T:12-->
;Trojan: named after the Trojan horse used by the rescuers of Helen of Troy. A Trojan is a computer program that disguises itself as a useful software application that is actually used to gain access to your computer.
+
;Trojan: A Trojan is a malicious computer program that is disguised as a harmless software application that is used to gain access to the information on the local computer. Information gathered is often transmitted to the author of the software and sold to other companies or held at ransom.
 +
 
 +
: This is named from a story in Greek mythology where a Greek army was unable to enter the Greek city of Troy in the Trojan war. The opposing army constructed a large wooden horse with hidden warriors inside. With the opposing army gone, the people and army of Troy brought the wooden horse inside the city gates. During the night, the warriors snuck out of the horse inside the city walls and conquered the city with little resistance. The wooden horse has since been called the "Trojan Horse".
  
 
<!--T:13-->
 
<!--T:13-->
;Worm: A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to the poor security the computers infected have. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
+
;Worm: A computer worm is a self-replicating computer program. The worm uses a network to send copies of itself to other nodes (computers on the network) and it may do so with or without any user intervention. The worm is introduced to a network when computers have poor or outdated security code. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause some harm to the network system, even if only by consuming bandwidth (network data packets, using the capacity making less room for desired information), whereas viruses almost always corrupt or modify files on a targeted computer.
  
 +
<!--T:60-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 1h -->
 
{{CloseReq}} <!-- 1h -->
 
{{CloseReq}} <!-- 1 -->
 
{{CloseReq}} <!-- 1 -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:61-->
 +
</noinclude>
 
<!-- 2. Define the following terms and give examples of each: -->
 
<!-- 2. Define the following terms and give examples of each: -->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:62-->
All are methods / techniques for reading email.
+
</noinclude>
;Webmail: Webmail is a web application that allows users to read and write e-mail using a web browser. Examples: Gmail is the most common webmail in use today.  Hotmail.com, yahoo.com and many other online services offer you the option to view your email from their website.  This is "webmail."
+
All are methods / techniques for sending, receiving, and reading email. Different email servers (accounts) will use different email protocols. Some email providers might use multiple protocols to access your email based on the device, program, situation, and preferences.<ref>[https://en.wikipedia.org/wiki/Email#Types Wikipedia, Email Types]</ref>
 +
;Webmail: Webmail is a web application that allows users to read and write e-mail only using a web browser. Mail data is not usually downloaded and requires an active internet connection.
 +
 
 +
:Examples: Gmail, Hotmail, Yahoo Mail, Webmail from a domain host (DreamHost, GoDaddy, Hover, etc) when accessed from a web browser.
  
 
<!--T:15-->
 
<!--T:15-->
;POP3 mail: Post Office Protocol 3. A protocol that provides a simple, standardized way for users to access mailboxes and download messages to their computers. Examples: Outlook Express, Outlook, Eudora, Mozilla Thunderbird*
+
;POP3 mail: Post Office Protocol 3 is a simple protocol that provides a standardized way for users to access a message on a server, the download email messages to their computers, and delete the message from the server. This was developed and utilized when users had temporary internet connectivity (dial-up, using the hardwired phone line) and did not have constant network connectivity. This allowed users to still view the messages when no longer "online".
 +
 
 +
:In an "always-connected" era, most applications of this protocol are no longer necessary as most email is webmail or IMAP. However, an email provider could allow users to utilize this protocol, though access and "updating" will only happen on one device, and regularly deleting incoming emails from the server and storing those files on the local computer. Sometimes POP3 and IMAP are integrated together for a better experience and updating messages. This is used typically as a program installed on your device.
 +
 
 +
:Examples: Outlook, Eudora, Mozilla Thunderbird, Apple Mail or an email provided by an ISP (Internet Service Provider; AOL, Spectrum, X-Finity, AT&T, etc.) that stores the messages on your computer.
  
 
<!--T:16-->
 
<!--T:16-->
;IMAP: Internet Message Access Protocol'. IMAP is a method of distributing e-mail. It is different from the standard POP3 method in that with IMAP, e-mail messages are stored on the server, while in POP3, the messages are transferred to the client's computer when they are read. Thus, using IMAP allows you to access your e-mail from more than one machine, while POP3 does not. This is important because some email servers only work with some protocols. Example: AOL is an IMAP mail provider, though they also offer webmail services.*
+
;IMAP: "Internet Message Access Protocol" is a method of distributing email data by storing email message data on a server that you access through a network data connection. If you have linked your email to a email client program or application like Mail, Apple Mail on your phone or computer, you have most likely incorporated IMAP to access your email. These messages are not stored locally on the device but are always connected to the server to receive message information (though if there was a network outage, some message data like the sender, title, and/or summary may be saved using POP3 but not the entire message).
 +
 
 +
:The main advantage of IMAP is that you are able to access your email from multiple devices and have the most current information available on your email. Nearly all common email services utilize IMAP for displaying email in connected mail applications.
 +
 
 +
:Examples: Gmail, Yahoo Mail, Hotmail, Outlook, AOL
 
   
 
   
These examples are accurate as of 10/2005.  Please check Google.com or other search service to verify the accuracy of these examples currently.
+
<b>NOTE:</b> Sometimes multiple protocols are used with the same email account. Search online some email services you can think of to see which email protocol they use for you on your phone, on your computer, or on the web!
  
 +
<!--T:63-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2a -->
 
{{CloseReq}} <!-- 2a -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}} <!--T:17-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}} <!--T:17-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:64-->
A program used to view, download, upload, surf or otherwise access documents (pages) on the World Wide Web. Browsers can be text-based meaning they do not show graphics or images but most however are text and graphical based. Browsers read "marked up" or coded pages (usually HTML but not always) that reside on servers and interpret the coding into what we see "rendered" as a Web page.  Examples:  Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, and Apple Safari are examples of Web browsers.
+
</noinclude>
 +
A Web Browser is a computer program or application used to view, download, upload, "surf", or otherwise access documents (pages) on the World Wide Web. Browsers can be text-based, meaning they do not show graphics or images, but most however are text and graphical based. Browsers read or coded or "marked up" pages (usually HTML but not always) that reside on servers, interprets the coding, and displays or "renders" the webpage for the user to view.  
  
 +
Examples: Microsoft Edge, Mozilla Firefox, Google Chrome, Apple Safari
 +
 +
<!--T:65-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2b -->
 
{{CloseReq}} <!-- 2b -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}} <!--T:18-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}} <!--T:18-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:66-->
Internet Relay Chat. A live chat area of the Internet in which real-time conversations among two or more people take place via special software. Each specific IRC channel begins with a # and is dedicated to a different area of interest. IRC is considered another part of the technology of the Internet the same way FTP, Telnet and the Web are.  
+
</noinclude>
 +
"Internet Relay Chat" (IRC) is a "live chat" (fast refresh/auto updating) coding protocol using internet connectivity to allow real-time conversations among two or more people. Each specific IRC channel begins with a # and is dedicated to a different area of interest. IRC is considered another part of the technology of the Internet the same way FTP, Telnet and the Web are.  
  
 
<!--T:19-->
 
<!--T:19-->
An instant messenger is a client which allows instant text communication between two or more people through a network such as the Internet.  
+
"Instant messenger" is a web based or application based client which allows instant text and picture communication between two or more people through the global digital network "the Internet".  
  
 
<!--T:20-->
 
<!--T:20-->
Examples include Windows Messenger, AOL Instant Messenger, ICQ client, Yahoo Messenger, and Jabber, as well as software programs that allow you to talk to friends on multiple “messenger” platforms simultaneously.
+
Early-internet popular instant messenger clients include: Windows Messenger, AOL Instant Messenger, ICQ client, Yahoo Messenger, Jabber, and Skype. Nearly all Messanger programs in the 2020s work cross-platform between websites and applications (desktop or mobile) regardless of the device or operating system (Windows, MacOS, Android, iOS, etc.) Some examples of popular messaging applications/websites in 2024: Discord, Facebook Messenger, WhatsApp, Telegram, iMessage (iPhone/Mac only), Snapchat. Most social media applications also include IRC or "Direct Message" feature: Facebook, Instagram, X (formerly Twitter), Snapchat, TikTok, etc.
  
 +
<!--T:67-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2c -->
 
{{CloseReq}} <!-- 2c -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}} <!--T:21-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}} <!--T:21-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:68-->
Video or audio transmitted over a network that users can begin to play immediately instead of waiting for the entire file to download. Typically a few seconds of data is sent ahead and buffered in case of network transmission delays. (Although some data is buffered to the hard drive, it is written to temporary storage and is gone once viewing is complete.) RealMedia, QuickTime and Windows Media are the most common streaming formats.
+
</noinclude>
 +
Streaming means a continual display of a media without interruption. Video and/or audio transmitted is over a network for users to play the media without downloading the file. In streaming, some data may be initially downloaded to allow the user to begin viewing the material without delays. A streaming website will pre-load a portion of the media before playing (buffer) to allow a seamless experience without pausing while more media loads. In some situations when data speeds are low, the media may pause to load enough data to continue playing. Any downloaded data while streaming is used in temporary storage and deleted when complete.  
  
 +
<!--T:69-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2d -->
 
{{CloseReq}} <!-- 2d -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}} <!--T:22-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}} <!--T:22-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:70-->
Internet search engines (e.g. Google, Bing) help users find web pages on a given subject. The search engines maintain databases of web sites and use programs (often referred to as "spiders" or "bots") to collect information, which is then indexed by the search engine. Similar services are provided by "directories," which maintain ordered lists of websites, e.g. Yahoo!
+
</noinclude>
 +
Internet search engines (e.g. Google, Bing, DuckDuckGo) help users find web pages based on a search query. The search engines maintain databases of web sites and use programs (often referred to as "spiders" or "bots") to collect information, which is then indexed by the search engine and displayed when keywords are used. Some websites organize a directory of websites organized into a list that can be searched (E.g. Yahoo!).
 +
 
 +
Search data can be used by search engines to sell information to advertisers for "targeted ads" based on a user's search history and website usage (Website cookies).
  
 +
<!--T:71-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2e -->
 
{{CloseReq}} <!-- 2e -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}} <!--T:23-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}} <!--T:23-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:72-->
A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected. Such tools should be included as part of the computing systems environment that the web services are delivered from. Examples include Norton Antivirus, McAfee Antivirus, Trendmicro Antivirus. Online FREE antivirus tools includes Trendmicro's Housecall, and freea-v.com {{ref|antivirus}}.
+
</noinclude>
 +
A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected. Such tools should be included as part of the computing systems environment that the web services are delivered from. Examples include Norton Antivirus, McAfee Antivirus, Trendmicro Antivirus. Online FREE antivirus tools includes Trendmicro's Housecall, and freea-v.com. Use caution when using antivirus software as not every software is 100% effective or trusted. Do research for using any antivirus software.
 +
 
 +
Also, having Antivirus Software is not perfect protection, still use safe internet habits when browsing the web.
  
 
<!--T:24-->
 
<!--T:24-->
 
;Note: Many of these companies also offer "Internet Security Suites" that assist the user in also blocking and removing trojans, worms, malware, and other malicious code.
 
;Note: Many of these companies also offer "Internet Security Suites" that assist the user in also blocking and removing trojans, worms, malware, and other malicious code.
       
 
1. {{note|antivirus}} These software programs are leaders in antivirus technology as of 10/2005.  Please check with online resources or local computer/office supply stores for the latest versions and programs available.
 
  
 +
<!--T:73-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2f -->
 
{{CloseReq}} <!-- 2f -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}} <!--T:25-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}} <!--T:25-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:74-->
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
+
</noinclude>
 +
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the Internet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
  
 
<!--T:26-->
 
<!--T:26-->
Examples include: ZoneAlarm, Microsoft Firewall, Norton Firewall, and many other  free and for-pay packages.
+
Examples include: ZoneAlarm, Microsoft Firewall and Norton Firewall among others
  
 +
<!--T:75-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2g -->
 
{{CloseReq}} <!-- 2g -->
 
{{CloseReq}} <!-- 2 -->
 
{{CloseReq}} <!-- 2 -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:76-->
 +
</noinclude>
 
<!-- 3. Complete one of the following: -->
 
<!-- 3. Complete one of the following: -->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:77-->
Include date/events surrounding its origin, the major landmark events, the birth and growth of web browsers (such as Mosaic, Netscape, Internet Explorer), and what it is doing today. Remember, this is not a history of computers, but rather a brief history of the Internet. You should list at least 2 online resources from which you found information relevant to your report.
+
</noinclude>
 +
Practice using a search engine and find key date/events surrounding the origin, major landmark events, the birth and growth of web browsers (such as Mosaic, Netscape, Internet Explorer), development of internet security, and types of code used for webpages. Remember, this is not a history of computers, but rather a brief history of the Internet. List at least 2 online resources from which you found information relevant to your report.
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 3a -->
 
{{CloseReq}} <!-- 3a -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:78-->
If you choose this option, you will need to present the same information as in option a. It's OK to use notecards during the oral presentation so that you can follow your outline and not have to memorize dates and other facts.  
+
</noinclude>
 +
Research will still be required to give an oral report. If it is helpful, use note cards to remember your information for facts and dates, and to follow an outline.
  
 +
<!--T:79-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 3b -->
 
{{CloseReq}} <!-- 3b -->
 
{{CloseReq}} <!-- 3 -->
 
{{CloseReq}} <!-- 3 -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:80-->
 +
</noinclude>
 
<!-- 4. Why is antivirus software important? Include in your answer: -->
 
<!-- 4. Why is antivirus software important? Include in your answer: -->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4a}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4a}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:81-->
 +
</noinclude>
 
*Opening an email attachment which was sent by an unknown contact.
 
*Opening an email attachment which was sent by an unknown contact.
*Clicking on a "pop-up" ad in a web page.
+
*Clicking on a ad in a web page to visit a malicious website.
*Downloading from the Internet any file that contains a virus.
+
*Downloading from the Internet any file that contains a virus (whether intentional or unintentional).
  
 +
<!--T:82-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 4a -->
 
{{CloseReq}} <!-- 4a -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4b}} <!--T:29-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4b}} <!--T:29-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:83-->
The authors of virus and anti-virus programs are in a continual game of cat-and-mouse.  Virus authors are constantly figuring out new ways to get around anti-virus programs, and anti-virus programs are continually updated to thwart the new viruses.  The most successful virus programs are the ones most recently developed.  If you do not keep your anti-virus software program up-to-date, your computer is vulnerable to the newest viruses.
+
</noinclude>
 +
Malicious codes for viruses are constantly being created and developed to steal user's information. Authors of anti-virus programs are continually are continually trying to develop ways to detect malicious code and prevent users from being infected. Since there is a constant supply of new viruses, not keeping an antivirus software up-to-date will make the computer susceptible to new viruses. Having the latest operating system installed is also important to help protect against viruses.  
  
 +
<!--T:84-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 4b -->
 
{{CloseReq}} <!-- 4b -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4c}} <!--T:30-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4c}} <!--T:30-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:85-->
We might share a file to our friends or family through an email or device without knowing that the file contains virus. The virus might damage our friend's or family's computer or even thumb drive that we use to share files that might contain virus.
+
</noinclude>
 +
Sharing files (email or via USB) can easily spread a virus betweeen devices. Access to an email account may also cause a phishing email to your contact list with malicious code that will infect their account if they open the file or link with the virus.
  
 +
<!--T:86-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 4c -->
 
{{CloseReq}} <!-- 4c -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4d}} <!--T:31-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4d}} <!--T:31-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:87-->
Viruses can damage your files in the computer including software. The damaged software contains a copy of the virus, and can then spread to other computers.  Many viruses will consume computing power on the host, bogging it down and making it unresponsive.  They can attempt to infect other machines over the network, consuming the network's bandwidth and slowing down the Internet connection for all other users in the building (even computers that are not infected).
+
</noinclude>
 
+
*Damage computer files and programs from functioning properly
<!--T:32-->
+
*Steal information and data
Many viruses completely take over the computer they infect and can be remotely controlled by the attacker. These attackers can then use the computer to send spam, or mount a Distributed Denial of Service (DDoS) attack against their target's web server or computer network.  Sometimes these viruses record keystrokes on the infected computer so that they can capture usernames, passwords, and bank account numbers.  This information can then be forwarded to the attacker who can either use the information or sell it to someone else.
+
*Spread to other devices
 +
*Slow down a computer by consuming memory
 +
*Slow down a computer's network speed by uploading and downloading copies of itself to other devices
 +
*Allow remote access to a computer to steal data or sensitive information (usernames, passwords, bank account information)
  
 +
<!--T:88-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 4d -->
 
{{CloseReq}} <!-- 4d -->
 
{{CloseReq}} <!-- 4 -->
 
{{CloseReq}} <!-- 4 -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:89-->
<!-- 5. In what ways do content filters(programs like Net Nanny™ or AOL Parental Control) protect your family? With your family, develop & sign a Covenant of Family Internet Usage including the following elements: -->
+
</noinclude>
*'''a. Never reveal personal information'''
+
<!-- 5. In what ways do content filters(programs like Net Nanny™ or AOL Parental Control) protect your family? With your family, develop & sign a Covenant of Family Internet Usage -->
*'''b. Remember that people may not be who they say they are.'''
 
*'''c. Never meet an online friend in the flesh for the first time without a parent present.'''
 
*'''d. Never respond to flames'''
 
*'''e. Stop immediately if you see or read anything that upsets you.'''
 
*'''f.Time each member of the family may spend on the internet per week. Set boundaries that encourage time for family, homework, and other necessary family activities.'''
 
*'''g. Types of websites that are acceptable/unacceptable to view.  What are the principles that your family will use to determine what are acceptable? Base these principles on the Bible.'''
 
  
 
<!--T:34-->
 
<!--T:34-->
An agreement ready to sign has been prepared for you on the third page of the pdf of the Internet Honor requirements on the Pathfinders website:
+
A sample document is coming soon . . .  
http://www.pathfindersonline.org/pdf/ayhonors/internet_a.pdf
 
  
 +
<!--T:90-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 5 -->
 
{{CloseReq}} <!-- 5 -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:91-->
 +
</noinclude>
 
<!-- 6. Show your ability to navigate your way around the internet by demonstrating the following: -->
 
<!-- 6. Show your ability to navigate your way around the internet by demonstrating the following: -->
 +
Instead of printing, have the Pathfinder do the tasks in front of the instructor or open the websites in different browser tabs (right click a link and select "open page in another tab").
 +
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6a}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6a}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:92-->
To save paper, it is recommended that rather than printing hard-copies of web pages, that the Pathfinder open the three web pages in separate tabs in the browser.  A tab can be opened usually by right-clicking on the link and selecting the "Open page in another tab" option.  In Firefox, clicking the link with the center mouse button (or using both the left and right buttons at the same time) will open the page in a new tab.  Once three tabs have been opened, the instructor can check that the requirement has been met on-screen, without printing anything.
+
</noinclude>
 +
;Suggestions
 +
* Church Homepage
 +
* Search Engine (not the browser default page!)
 +
* A sports website
 +
* A news website
 +
* Club Ministries Homepage
 +
* YouTube
 +
* School Website
  
 +
<!--T:93-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 6a -->
 
{{CloseReq}} <!-- 6a -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6b}} <!--T:36-->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6b}} <!--T:36-->
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:94-->
*i. http://www.biblegateway.com is a great online bible resources, as is http://www.blueletterbible.org .
+
</noinclude>
*ii. http://www.bible.com is another great Bible site with many versions in multiple languages.
+
* [http://www.biblegateway.com Bible Gateway]
*iii. There are thousands of quality Adventist websites, many of them referenced at  http://www.plusline.org.  Quality sites of interest to young adventists include: 
+
* [http://www.bible.com Bible.com] (YouVersion)
** http://www.pathfindersonline.org
+
* [http://www.bluletterbible.org Blue Letter Bible]
** http://www.adventist.org
+
* [http://www.biblearc.com Bible Arc]
** http://www.guidemagazine.org
 
** http://www.kidsbibleinfo.com .
 
  
 +
<!--T:95-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 6b -->
 
{{CloseReq}} <!-- 6b -->
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6c}} <!--T:37-->
 
<noinclude><translate></noinclude>
 
*i. Please use safe sites to download from, such as [http://download.com CNET’s download.com]
 
[http://pcmagazine.com pcmagazine.com] church websites such as http://plusline.org, http://iiw.org, and http://adventist.org
 
  
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6c}}
 +
<noinclude><translate><!--T:106-->
 +
</noinclude>
 +
 +
<!--T:107-->
 +
* [http://www.adventist.org Adventist.org]
 +
* [http://www.clubministries.org Club Ministries]
 +
* [http://www.guidemagazine.org Guide Magazine]
 +
* [http://www.kidsbibleinfo.com Kids Bible Info]
 +
* [http://www.egwwritings.org EGW Writings]
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 6c -->
 
{{CloseReq}} <!-- 6c -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6d}}
 +
<noinclude><translate><!--T:108-->
 +
</noinclude>
 +
<b>Important!</b> ONLY download from safe and trusted websites like [http://download.com CNET’s download.com]. Here are some ideas:
 +
* A web browser (Google Chrome, Mozilla Firefox, Opera)
 +
* VLC Media Player (on CNET)
 +
* GIMP Photo software (on CNET)
 +
* A parent-approved game
 +
* Folder from Google Drive
 +
* A image from Facebook
 +
 +
<!--T:97-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 6d -->
 
{{CloseReq}} <!-- 6 -->
 
{{CloseReq}} <!-- 6 -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:98-->
 +
</noinclude>
 
<!-- 7. Demonstrate your ability to use email by demonstrating the following (If necessary, create an email account, with a distinct username and password): -->
 
<!-- 7. Demonstrate your ability to use email by demonstrating the following (If necessary, create an email account, with a distinct username and password): -->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7a}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7a}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:99-->
 +
</noinclude>
 +
Send your pathfinder director an email telling him/her how much you are enjoying earning the honor!
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 7a -->
 
{{CloseReq}} <!-- 7a -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7b}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7b}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:100-->
 +
</noinclude>
 +
Or open an email to read as your email is likely a webmail or IMAP, not POP3.
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 7b -->
 
{{CloseReq}} <!-- 7b -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7c}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7c}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:101-->
 +
</noinclude>
 +
Only open safe documents!! Have the instructor/leader/parent send an email with a picture for the Pathfinder to download and open.
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 7c -->
 
{{CloseReq}} <!-- 7c -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7d}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7d}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:102-->
#Do not reply to unknown emails or Spam. You’re simply verifying that yours is a “real” email address and you will immediately receive even more junk email.
+
</noinclude>
#Do not open emails with attachments unless you are SURE that they’re okay, and that your antivirus program is fully updated (most are auto-updated these days).  
+
#Do not reply to unknown emails or Spam. Doing so verifies a “real” email address and will receive even more junk email.
#Report any material sent to you in email that is unsafe or that you feel breaks God’s laws.
+
#Do not open emails with attachments unless you are SURE that they’re safe and that your antivirus program is fully updated (most are auto-updated).  
#Never respond to "unsubscribe" directions in a spam or UCE (unwanted commercial email) message.
+
#Report to a trustworthy and safe adult any material sent to you in email that is mean, harmful to you or someone else, or contains inappropriate images or materials and let your parent delete or remove that email message.
#Keep your computers operating system patches up to date. If you're using Windows, do this from the MS Windows Update site using the Windows Update function.
+
#Never follow to "unsubscribe" directions in a spam or UCE (unwanted commercial email) message.
 +
#Keep your computer's operating system current.
 +
#Do not open links from untrusted senders.
 +
#Never give out your username and password to any website over email.
 +
#Beware of Phishing attempts. (Messages that sound like it could be true but ask you to give money, log into an account to check information, or respond about information.) Do not give personal information or click any links.
 +
#NEVER click a link to log into a website from an email unless you CAREFULLY check the URL of the website and the email address of the sender for anything suspicious before entering your log-in information (sometimes they can look very similar, sometimes it is better to not use a link to log in if you aren't sure).
 +
#If possible, turn on two-factor authentication to secure your email login (may require a mobile phone).
  
 +
<!--T:103-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 7d -->
 
{{CloseReq}} <!-- 7d -->
 
{{CloseReq}} <!-- 7 -->
 
{{CloseReq}} <!-- 7 -->
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:104-->
<!-- 8. Memorize Philippians 4:8. How does this Bible text guide a Christian’s use of the internet? -->
+
</noinclude>
 +
<!-- 8. Memorize Philippians 4:8. How does this Bible text guide a Christian’s use of the internet? -->
 
:“Finally, brothers, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable——if anything is excellent or praiseworthy——think about such things.” Philippians 4:8
 
:“Finally, brothers, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable——if anything is excellent or praiseworthy——think about such things.” Philippians 4:8
  
 
<!--T:40-->
 
<!--T:40-->
Some questions to guide a small group discussion on this text:
+
Some questions to guide a small group discussion on this text:
 
#What do you think the writer, the apostle Paul, would say this text meant for internet users today?
 
#What do you think the writer, the apostle Paul, would say this text meant for internet users today?
#What do you think God had in mind when he asked Paul to write down this text?
+
#What do you think God had in mind when he asked Paul to write down this text?
 
#What are some things on the internet that you make use of that match (are consistent with) this Bible text?
 
#What are some things on the internet that you make use of that match (are consistent with) this Bible text?
 
#What are some of the things that are on the internet that do not match (are inconsistent) with this Bible message?
 
#What are some of the things that are on the internet that do not match (are inconsistent) with this Bible message?
Line 293: Line 390:
 
#What are some ways that we as a club can help each other apply this text to our daily lives?
 
#What are some ways that we as a club can help each other apply this text to our daily lives?
 
#What do you think are some ways we can live lives that match (are consistent) with this text?
 
#What do you think are some ways we can live lives that match (are consistent) with this text?
 
[[Category:Adventist Youth Honors Answer Book|{{SUBPAGENAME}}]]
 
[[Category:Adventist Youth Honors Answer Book/Do at home|{{SUBPAGENAME}}]]
 
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 8 -->
 
{{CloseReq}} <!-- 8 -->
<section end="Body" />
+
=='''Other helpful information:'''==
 +
===Learn how to protect your data online.===
 +
* Do not attempt to log into websites that don't look quite right (designed to be similar to steal data).
 +
* Avoid over-sharing about yourself in online chats or forums. Do not share your full name, your address, or family information (despite how trusting someone might seem, your data will ALWAYS be accessible).
 +
* Be mindful of what pictures of yourself and others that you share online or in text (turn off location data before sending pictures). That person may do anything with that picture.
 +
* Practice good password habits.
 +
* Put a passcode on your phone and computer, require a password for all online purchases.
 +
* Do not leave anything logged in unattended, especially on a public computer.
 +
* Regularly clear our unwanted website data trackers (cookies) from your web browser.
 +
* Use "safe" or "private" mode on a web browser to not save any login information or website data (cookies, history).
 +
* Do not download or share copyrighted materials like movies, books, pictures (often include viruses).
 +
* Be careful about messages/emails from people you know but sounds a little off, it might be someone trying to impersonate them to get your information or money.
 +
 
 +
===Learn about good password habits:===
 +
* Invest in a secure way to store your passwords (book kept in a safe or password manager like Apple Keychain, OnePass,
 +
* Never use the same password on two different websites.
 +
* Change your password periodically, especially for important accounts like banks and email providers.
 +
* Always use a strong password (avoid using words or guessable information about yourself like birthday or address)
 +
* Do not share your passwords with anyone except trusted family/parents (and make sure they are keeping it safe!).
 +
* A person with access to your computer/phone has access to your passwords, remember that!
 +
* Where possible, turn on two-factor authentication for additional protection of someone trying to log into your account.
 +
 
 +
===Dealing with pornography and sensitive materials online:===
 +
With just a few clicks, pornographic materials (either images or text) can be found by anyone online. The average of first exposure to pornography is age 8 to 11, often introduced by a friend or classmate "hey, check this out". Border-line pornographic and sensual material is found across all media and is impossible to avoid near-nude sexualized pictures of men or women. It is not possible to protect children from ever seeing something semi- or full-pornogrpahic material, but adults can have an age-appropriate conversations (YES, plural!) about sexuality, harmful material like pornography, and what to do when the child encounters something pornographic. (Remember, it's not ''if'' but ''when''.) God made the human body beautiful and to be observed and enjoyed in specific contexts of a monogamous heterosexual marriage relationship. Great harm can come from regularly consuming pornography psychologically (low self-esteem, self confidence, shame, guilt, idealizing, addiction, objectification of others), relationally (negative view of self, violent view of sex, submissive to a partner the point of pain, wrong idea about purpose of sex and fulfillment, unable to be aroused or climax with a live partner, difficulty communicating, objectification of self or partner), and spiritually (outside of God's ideal for those in relationship with Him).
 +
 
 +
With all of these harmful aspects of consuming pornography, it is '''''our responsibility''''' as parents and Pathfinder leaders to help teach positive interactions regarding sexuality and safety regarding pornography. It is more important to have an open dialogue to teach healthy discussion about sexuality with a child than for you to feel comfortable not talking about sexuality. Philippians 4:8 is helpful when talking in a general sense, but children and younger teens are not developed enough cognitively to be able to decipher what to do if he/she sees pornographic material.
 +
 
 +
A simple, easy tactic is for the child to turn off the screen (close the laptop, minimize the page, lock the phone) and immediately go to a trusted adult and explain what they saw. Then the parent/adult can appreciate the child's trust, assess the situation, and instruct about the situation or questions they have, and praise the child for coming to the adult.
 +
 
 +
Internet/Router filters are one option to help aid against accidental exposure, however this is only one aspect of the multi-faceted approach to healthy internet use in children.
 +
 
 +
Some helpful resources for learning about the harms of pornography, internet filters and notification systems for parents, and how to talk about pornography, visit [http://www.fightthenewdrug.org Fight the New Drug]. Consider reading ''Good Pictures Bad Pictures: Porn-proofing Today's Young Kids'' by Kristen A. Jenson and Gail Poyner with your child (or the junior edition for younger children).
 +
 
 +
'''PATHFINDER LEADERS:''' <u>Always</u> talk with each parent before having this discussion in a Pathfinder setting with a group or without permission in a public one-on-one conversation. If a parent does not approve, do not subvert the conversation with their child. Provide resources for that parent about the importance of teaching healthy biblical sexuality at an early age.
 +
 
 +
<references />
 +
[[Category:Adventist Youth Honors Answer Book/Do at home{{GetLangSuffix}}]]
 +
{{CloseHonorPage}}

Latest revision as of 06:33, 9 January 2024

Other languages:
English • ‎español • ‎français
Internet

Skill Level

2

Year

2006

Version

16.11.2024

Approval authority

General Conference

Internet AY Honor.png
Internet
Vocational
Skill Level
123
Approval authority
General Conference
Year of Introduction
2006
See also


1

Define the following terms:


1a

Internet


A vast collection of many independent, inter-connected computer networks that use the TCP/IP protocols and that developed from ARPANet of the late '60s and early '70s. "The Net," is a worldwide system of computer networks providing reliable and redundant connectivity between disparate computers and systems by using common transport and data protocols.


1b

World Wide Web (WWW)


Though World Wide Web (or simply Web for short) is a term frequently used (incorrectly) when referring to "The Internet", it has two major meanings: First, loosely used: the whole constellation of resources that can be accessed using Gopher, FTP, HTTP, telnet, USENET, WAIS and some other tools. Second, the universe of hypertext servers (HTTP servers), more commonly called "web servers", which are the servers that serve web pages to web browsers.


1c

Chat Room


A site on the World Wide Web where any number of computer users can type messages to each other (chat) in real time, creating an online conversation. These messages usually appear on an area of the screen next to the user’s nickname or handle (your online nickname or the name you go by in a chat room). Most chat rooms have a particular topic (which you are expected to discuss) but there are some that are purely for meeting other people. The first Internet chat rooms were only text based, however as the technology developed, the ability to send pictures, effects, and emoji was developed and incorporated. The first chat systems were developed by the US government in the 1970s with limited connected devices. CompuServe made the first public available online chat service in 1980. The development of Internet Chat Relay (IRC) by Jarkko Oikarinen in 1988 allowed the development of many more chat room capability like AOL.& In 2003, chat rooms started being replaced by social media platforms with more and various features. Some examples: MySpace (2003), Facebook (2004), X (formerly) Twitter (2006), Instagram (2010), Snapchat (2011), and TikTok (2016).


1d

Download


"To Download" is the process of transferring a copy of a file from a remote computer to your computer. There are a few methods of doing this on the Internet: HTTP, FTP and e-mail attachments are the most common.

A user may also "download" images from an external device (digital/video camera, USB, SD Card, etc.) via a direct connection (cable/adapter or computer port) rather than through online network connectivity (remote connection).

The term "download" comes from early satellite communication where information was received "down" from satellites in low-earth orbit.


1e

Upload


"Uploading" a computer file is the process of transferring that file (document, picture, program, etc.) from the local device to a remote server computer to be accessed and downloaded by other devices and users remotely. All websites and webpages are actually computer file codes "uploaded" to a dedicated network-connected server computer to store that webpage information to be retrieved by every device worldwide to connect to that server computer and navigate the code information uploaded in that webpage file. Your local computer accesses and temporarily downloads the information to display the webpage for you.

Cloud (remote) storage programs use dedicated computer farms known as "data servers" to store all of the data uploaded to "the cloud". Each digital piece of information requires storage in a physical location that is often secret for privacy reasons. Some examples of cloud services are: Google Drive, Dropbox, iCloud, Microsoft Cloud, Amazon Web Services.

The term "upload" derives from early satellite communication where information was transmitted "up" to satellites in low-earth orbit.


1f

Website


One or more files (pages) stored on a remote computer (called a "server") that can be accessed via the Internet. Every website has a "home page", which is generally designed as the file visitors first see when visiting the site to help the user navigate the website pages (remote files). All files on a website usually contain textual or graphical "links" that can be clicked using an input device such as a mouse to move to other files, either inter- or intra-site (within the same website file system or between different website file systems).


1g

Email


Electronic Mail or e-mail (culturally written as "email") is the process of sending computer code directly to another user in telecommunication. A concept derived from hand-written messages on paper and delivered by a messenger service, email is the digital delivery of a specific message directly to another person.

Standard email requires a network-connected device (computer/mobile phone), access to email software (either an application or webpage on a web browser), an account with an email client through an Internet Service Provider (ISP), and a network modem to connect to the Internet (and a wireless router to remotely connect to a modem).

Most email is primarily text-based, however development of this technology has allowed for other files such as graphic images, web links, and GIFs within the email and other computer files (images, documents, programs, audio, etc) as attachments.

The composition of an email address is the account name connected to a specific domain. In "webmaster@pathfindersonline.org", a email file is sent to the website domain (www.pathfindersonline.org) and then distributed to the account holder within that domain (webmaster). The email address can be imagined similar to a physical address for the Amazon delivery driver to find your house to properly deliver your package (or USPS your mail!). The computer interprets "webmaster@pathfindersonline.org" to route the data written in an email using specific protocols to reach the intended recipient in a semi-secure manner. All data sent over the Internet can be monitored and viewed, however the average user is unable to track this data. Some companies have developed services that make the data traffic in email and other web browsing more secure by disguising the transfer of information to be less visible to others.


1h

Virus


Throughout this honor, the term “virus” represents the traditional virus, as well as trojans, worms, and other malicious code. Viruses most often are obtained ("downloaded") to a device from the Internet (intentionally or unintentionally). Viruses could also be placed directly by introducing malicious code through one of the computer's data ports, though this typically only happens in action movies.

Traditional virus
In computer security technology, a virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. Extending the analogy, the insertion of the virus into a program is termed infection, and the infected file (or executable code that is not part of a file) is called a host. Special programs are required to delete copies of the host to locate the malicious code for deletion. Unlike a biological virus where an immune system will seek to eliminate the virus, a computer virus will remain until deleted.
Trojan
A Trojan is a malicious computer program that is disguised as a harmless software application that is used to gain access to the information on the local computer. Information gathered is often transmitted to the author of the software and sold to other companies or held at ransom.
This is named from a story in Greek mythology where a Greek army was unable to enter the Greek city of Troy in the Trojan war. The opposing army constructed a large wooden horse with hidden warriors inside. With the opposing army gone, the people and army of Troy brought the wooden horse inside the city gates. During the night, the warriors snuck out of the horse inside the city walls and conquered the city with little resistance. The wooden horse has since been called the "Trojan Horse".
Worm
A computer worm is a self-replicating computer program. The worm uses a network to send copies of itself to other nodes (computers on the network) and it may do so with or without any user intervention. The worm is introduced to a network when computers have poor or outdated security code. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause some harm to the network system, even if only by consuming bandwidth (network data packets, using the capacity making less room for desired information), whereas viruses almost always corrupt or modify files on a targeted computer.



2

Define the following terms and give examples of each:


2a

Webmail / POP3 / IMAP mail


All are methods / techniques for sending, receiving, and reading email. Different email servers (accounts) will use different email protocols. Some email providers might use multiple protocols to access your email based on the device, program, situation, and preferences.&

Webmail
Webmail is a web application that allows users to read and write e-mail only using a web browser. Mail data is not usually downloaded and requires an active internet connection.
Examples: Gmail, Hotmail, Yahoo Mail, Webmail from a domain host (DreamHost, GoDaddy, Hover, etc) when accessed from a web browser.
POP3 mail
Post Office Protocol 3 is a simple protocol that provides a standardized way for users to access a message on a server, the download email messages to their computers, and delete the message from the server. This was developed and utilized when users had temporary internet connectivity (dial-up, using the hardwired phone line) and did not have constant network connectivity. This allowed users to still view the messages when no longer "online".
In an "always-connected" era, most applications of this protocol are no longer necessary as most email is webmail or IMAP. However, an email provider could allow users to utilize this protocol, though access and "updating" will only happen on one device, and regularly deleting incoming emails from the server and storing those files on the local computer. Sometimes POP3 and IMAP are integrated together for a better experience and updating messages. This is used typically as a program installed on your device.
Examples: Outlook, Eudora, Mozilla Thunderbird, Apple Mail or an email provided by an ISP (Internet Service Provider; AOL, Spectrum, X-Finity, AT&T, etc.) that stores the messages on your computer.
IMAP
"Internet Message Access Protocol" is a method of distributing email data by storing email message data on a server that you access through a network data connection. If you have linked your email to a email client program or application like Mail, Apple Mail on your phone or computer, you have most likely incorporated IMAP to access your email. These messages are not stored locally on the device but are always connected to the server to receive message information (though if there was a network outage, some message data like the sender, title, and/or summary may be saved using POP3 but not the entire message).
The main advantage of IMAP is that you are able to access your email from multiple devices and have the most current information available on your email. Nearly all common email services utilize IMAP for displaying email in connected mail applications.
Examples: Gmail, Yahoo Mail, Hotmail, Outlook, AOL

NOTE: Sometimes multiple protocols are used with the same email account. Search online some email services you can think of to see which email protocol they use for you on your phone, on your computer, or on the web!


2b

Web browser


A Web Browser is a computer program or application used to view, download, upload, "surf", or otherwise access documents (pages) on the World Wide Web. Browsers can be text-based, meaning they do not show graphics or images, but most however are text and graphical based. Browsers read or coded or "marked up" pages (usually HTML but not always) that reside on servers, interprets the coding, and displays or "renders" the webpage for the user to view.

Examples: Microsoft Edge, Mozilla Firefox, Google Chrome, Apple Safari


2c

IRC/IM (Instant Messenger) client


"Internet Relay Chat" (IRC) is a "live chat" (fast refresh/auto updating) coding protocol using internet connectivity to allow real-time conversations among two or more people. Each specific IRC channel begins with a # and is dedicated to a different area of interest. IRC is considered another part of the technology of the Internet the same way FTP, Telnet and the Web are.

"Instant messenger" is a web based or application based client which allows instant text and picture communication between two or more people through the global digital network "the Internet".

Early-internet popular instant messenger clients include: Windows Messenger, AOL Instant Messenger, ICQ client, Yahoo Messenger, Jabber, and Skype. Nearly all Messanger programs in the 2020s work cross-platform between websites and applications (desktop or mobile) regardless of the device or operating system (Windows, MacOS, Android, iOS, etc.) Some examples of popular messaging applications/websites in 2024: Discord, Facebook Messenger, WhatsApp, Telegram, iMessage (iPhone/Mac only), Snapchat. Most social media applications also include IRC or "Direct Message" feature: Facebook, Instagram, X (formerly Twitter), Snapchat, TikTok, etc.


2d

Streaming Media


Streaming means a continual display of a media without interruption. Video and/or audio transmitted is over a network for users to play the media without downloading the file. In streaming, some data may be initially downloaded to allow the user to begin viewing the material without delays. A streaming website will pre-load a portion of the media before playing (buffer) to allow a seamless experience without pausing while more media loads. In some situations when data speeds are low, the media may pause to load enough data to continue playing. Any downloaded data while streaming is used in temporary storage and deleted when complete.


2e

Search Engine & Search Directories


Internet search engines (e.g. Google, Bing, DuckDuckGo) help users find web pages based on a search query. The search engines maintain databases of web sites and use programs (often referred to as "spiders" or "bots") to collect information, which is then indexed by the search engine and displayed when keywords are used. Some websites organize a directory of websites organized into a list that can be searched (E.g. Yahoo!).

Search data can be used by search engines to sell information to advertisers for "targeted ads" based on a user's search history and website usage (Website cookies).


2f

Antivirus software


A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected. Such tools should be included as part of the computing systems environment that the web services are delivered from. Examples include Norton Antivirus, McAfee Antivirus, Trendmicro Antivirus. Online FREE antivirus tools includes Trendmicro's Housecall, and freea-v.com. Use caution when using antivirus software as not every software is 100% effective or trusted. Do research for using any antivirus software.

Also, having Antivirus Software is not perfect protection, still use safe internet habits when browsing the web.

Note
Many of these companies also offer "Internet Security Suites" that assist the user in also blocking and removing trojans, worms, malware, and other malicious code.


2g

Firewall


A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the Internet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

Examples include: ZoneAlarm, Microsoft Firewall and Norton Firewall among others



3

Complete one of the following:


3a

Write a brief 250-300 word history of the Internet.


Practice using a search engine and find key date/events surrounding the origin, major landmark events, the birth and growth of web browsers (such as Mosaic, Netscape, Internet Explorer), development of internet security, and types of code used for webpages. Remember, this is not a history of computers, but rather a brief history of the Internet. List at least 2 online resources from which you found information relevant to your report.


3b

Present a 2-3 minute talk concerning the history of the internet. Regardless of the option chosen, include date/events surrounding its origin, the major landmark events, the birth and growth of web browsers (such as Mosaic, Netscape, Internet Explorer), and what it is doing today. Remember, this is not a history of computers, but rather a brief history of the Internet. You should list at least 2 online resources from which you found information relevant to your report.


Research will still be required to give an oral report. If it is helpful, use note cards to remember your information for facts and dates, and to follow an outline.



4

Why is antivirus software important? Include in your answer:


4a

What are some ways you can receive viruses via the Internet?


  • Opening an email attachment which was sent by an unknown contact.
  • Clicking on a ad in a web page to visit a malicious website.
  • Downloading from the Internet any file that contains a virus (whether intentional or unintentional).


4b

How is having up-to-date antivirus software important for keeping your computer files safe?


Malicious codes for viruses are constantly being created and developed to steal user's information. Authors of anti-virus programs are continually are continually trying to develop ways to detect malicious code and prevent users from being infected. Since there is a constant supply of new viruses, not keeping an antivirus software up-to-date will make the computer susceptible to new viruses. Having the latest operating system installed is also important to help protect against viruses.


4c

How can not being protected lead to sharing the virus with other family and friends?


Sharing files (email or via USB) can easily spread a virus betweeen devices. Access to an email account may also cause a phishing email to your contact list with malicious code that will infect their account if they open the file or link with the virus.


4d

What harm can a virus do to your computer or to other people’s computers?


  • Damage computer files and programs from functioning properly
  • Steal information and data
  • Spread to other devices
  • Slow down a computer by consuming memory
  • Slow down a computer's network speed by uploading and downloading copies of itself to other devices
  • Allow remote access to a computer to steal data or sensitive information (usernames, passwords, bank account information)



5

In what ways do content filters(programs like Net Nanny™ or AOL Parental Control) protect your family? With your family, develop & sign a Covenant of Family Internet Usage including the following elements:


A sample document is coming soon . . .


6

Show your ability to navigate your way around the internet by demonstrating the following:


Instead of printing, have the Pathfinder do the tasks in front of the instructor or open the websites in different browser tabs (right click a link and select "open page in another tab").


6a

Visit at least 3 different websites (distinct domain names). Print out the front page of each site for your instructor.


Suggestions
  • Church Homepage
  • Search Engine (not the browser default page!)
  • A sports website
  • A news website
  • Club Ministries Homepage
  • YouTube
  • School Website


6b

Demonstrate your ability to use a search engine to find an online Bible website. Go to the website, look up at least 3 different Bible memory texts in 3 different versions, and print your results for your instructor.


6c

Find 3 websites that talk about the Seventh-day Adventist Church. Print out the front page of each site for your instructor.

6d

Download a compressed file from the internet (tar, zip, etc.) to your hard drive and uncompress it and operate the program or file.


Important! ONLY download from safe and trusted websites like CNET’s download.com. Here are some ideas:

  • A web browser (Google Chrome, Mozilla Firefox, Opera)
  • VLC Media Player (on CNET)
  • GIMP Photo software (on CNET)
  • A parent-approved game
  • Folder from Google Drive
  • A image from Facebook



7

Demonstrate your ability to use email by demonstrating the following (If necessary, create an email account, with a distinct username and password):


7a

Create and send email


Send your pathfinder director an email telling him/her how much you are enjoying earning the honor!


7b

Receive and download email


Or open an email to read as your email is likely a webmail or IMAP, not POP3.


7c

Download/view an attachment


Only open safe documents!! Have the instructor/leader/parent send an email with a picture for the Pathfinder to download and open.


7d

Know 5 principles of operating email safely


  1. Do not reply to unknown emails or Spam. Doing so verifies a “real” email address and will receive even more junk email.
  2. Do not open emails with attachments unless you are SURE that they’re safe and that your antivirus program is fully updated (most are auto-updated).
  3. Report to a trustworthy and safe adult any material sent to you in email that is mean, harmful to you or someone else, or contains inappropriate images or materials and let your parent delete or remove that email message.
  4. Never follow to "unsubscribe" directions in a spam or UCE (unwanted commercial email) message.
  5. Keep your computer's operating system current.
  6. Do not open links from untrusted senders.
  7. Never give out your username and password to any website over email.
  8. Beware of Phishing attempts. (Messages that sound like it could be true but ask you to give money, log into an account to check information, or respond about information.) Do not give personal information or click any links.
  9. NEVER click a link to log into a website from an email unless you CAREFULLY check the URL of the website and the email address of the sender for anything suspicious before entering your log-in information (sometimes they can look very similar, sometimes it is better to not use a link to log in if you aren't sure).
  10. If possible, turn on two-factor authentication to secure your email login (may require a mobile phone).



8

Memorize Philippians 4:8. How does this Bible text guide a Christian’s use of the internet?


“Finally, brothers, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable——if anything is excellent or praiseworthy——think about such things.” Philippians 4:8

Some questions to guide a small group discussion on this text:

  1. What do you think the writer, the apostle Paul, would say this text meant for internet users today?
  2. What do you think God had in mind when he asked Paul to write down this text?
  3. What are some things on the internet that you make use of that match (are consistent with) this Bible text?
  4. What are some of the things that are on the internet that do not match (are inconsistent) with this Bible message?
  5. Why do you think this text is important to Christians today?
  6. What are some ways that we as a club can help each other apply this text to our daily lives?
  7. What do you think are some ways we can live lives that match (are consistent) with this text?


Other helpful information:

Learn how to protect your data online.

  • Do not attempt to log into websites that don't look quite right (designed to be similar to steal data).
  • Avoid over-sharing about yourself in online chats or forums. Do not share your full name, your address, or family information (despite how trusting someone might seem, your data will ALWAYS be accessible).
  • Be mindful of what pictures of yourself and others that you share online or in text (turn off location data before sending pictures). That person may do anything with that picture.
  • Practice good password habits.
  • Put a passcode on your phone and computer, require a password for all online purchases.
  • Do not leave anything logged in unattended, especially on a public computer.
  • Regularly clear our unwanted website data trackers (cookies) from your web browser.
  • Use "safe" or "private" mode on a web browser to not save any login information or website data (cookies, history).
  • Do not download or share copyrighted materials like movies, books, pictures (often include viruses).
  • Be careful about messages/emails from people you know but sounds a little off, it might be someone trying to impersonate them to get your information or money.

Learn about good password habits:

  • Invest in a secure way to store your passwords (book kept in a safe or password manager like Apple Keychain, OnePass,
  • Never use the same password on two different websites.
  • Change your password periodically, especially for important accounts like banks and email providers.
  • Always use a strong password (avoid using words or guessable information about yourself like birthday or address)
  • Do not share your passwords with anyone except trusted family/parents (and make sure they are keeping it safe!).
  • A person with access to your computer/phone has access to your passwords, remember that!
  • Where possible, turn on two-factor authentication for additional protection of someone trying to log into your account.

Dealing with pornography and sensitive materials online:

With just a few clicks, pornographic materials (either images or text) can be found by anyone online. The average of first exposure to pornography is age 8 to 11, often introduced by a friend or classmate "hey, check this out". Border-line pornographic and sensual material is found across all media and is impossible to avoid near-nude sexualized pictures of men or women. It is not possible to protect children from ever seeing something semi- or full-pornogrpahic material, but adults can have an age-appropriate conversations (YES, plural!) about sexuality, harmful material like pornography, and what to do when the child encounters something pornographic. (Remember, it's not if but when.) God made the human body beautiful and to be observed and enjoyed in specific contexts of a monogamous heterosexual marriage relationship. Great harm can come from regularly consuming pornography psychologically (low self-esteem, self confidence, shame, guilt, idealizing, addiction, objectification of others), relationally (negative view of self, violent view of sex, submissive to a partner the point of pain, wrong idea about purpose of sex and fulfillment, unable to be aroused or climax with a live partner, difficulty communicating, objectification of self or partner), and spiritually (outside of God's ideal for those in relationship with Him).

With all of these harmful aspects of consuming pornography, it is our responsibility as parents and Pathfinder leaders to help teach positive interactions regarding sexuality and safety regarding pornography. It is more important to have an open dialogue to teach healthy discussion about sexuality with a child than for you to feel comfortable not talking about sexuality. Philippians 4:8 is helpful when talking in a general sense, but children and younger teens are not developed enough cognitively to be able to decipher what to do if he/she sees pornographic material.

A simple, easy tactic is for the child to turn off the screen (close the laptop, minimize the page, lock the phone) and immediately go to a trusted adult and explain what they saw. Then the parent/adult can appreciate the child's trust, assess the situation, and instruct about the situation or questions they have, and praise the child for coming to the adult.

Internet/Router filters are one option to help aid against accidental exposure, however this is only one aspect of the multi-faceted approach to healthy internet use in children.

Some helpful resources for learning about the harms of pornography, internet filters and notification systems for parents, and how to talk about pornography, visit Fight the New Drug. Consider reading Good Pictures Bad Pictures: Porn-proofing Today's Young Kids by Kristen A. Jenson and Gail Poyner with your child (or the junior edition for younger children).

PATHFINDER LEADERS: Always talk with each parent before having this discussion in a Pathfinder setting with a group or without permission in a public one-on-one conversation. If a parent does not approve, do not subvert the conversation with their child. Provide resources for that parent about the importance of teaching healthy biblical sexuality at an early age.