Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged computer

Rss Feed Group items tagged

4More

Database Definition - 1 views

  • A database is a set of data that has a regular structure and that is organized in such a way that a computer can easily find the desired information.
    • Brittni Roddin
       
      Definition for Database
  • A database can generally be looked at as being a collection of records, each of which contains one or more fields (i.e., pieces of data) about some entity (i.e., object), such as a person, organization, city, product, work of art, recipe, chemical, or sequence of DNA.
  • Typically, a database has a schema, which is a description of the model, including the types of entities that are in it and the relationships among them.
2More

digital identity definition of digital identity in the Free Online Encyclopedia. - 0 views

  • Refers to identity systems used online. The term is used to contrast computer-based systems with manual systems.
    • Dre Adams
       
      Digital identity definition (2)
2More

Digital Literacy - definition of Digital Literacy in the Medical dictionary - by the Fr... - 0 views

  • The ability to understand computer-based information
    • Dre Adams
       
      Digital literacy definition (3)
4More

Media Literacy, Managing Television - 0 views

    • Danelle Desire
       
      how to encourage media literacy
  • Turn off violent programming.
  • Set limits on the use of media in your home
  • ...1 more annotation...
  • Talk with your children about stereotypes and hidden messages in television programs, video and computer games, commercials and music. Take time to talk and listen.
5More

Malware Definition - 1 views

    • Malcolm Jackson
       
      Interesting!
  • Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system.
    • Nathan Pharris
       
      Malware refers to internet viruses in general.
    • Nathan Pharris
       
      Here are some examples of Malware.
  •  
    Note my definition of "Malware," is highlighted in green.
34More

Privacy - Wikipedia, the free encyclopedia - 0 views

shared by ino moreno on 10 Feb 13 - Cached
    • ino moreno
       
      wow wiki did an amazing job on this one!!! i could hilite the whole page!
  • As technology has advanced, the way in which privacy is protected and violated has changed with it.
  • New technologies can also create new ways to gather private information.
  • ...31 more annotations...
  • 2001 in Kyllo v. United States (533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy
  • Main article: Internet privacy
  • Privacy and the Internet
  • The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen
  • has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[
  • s created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.
  • Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.
    • ino moreno
       
      VERY TRUE!
  • Right to privacy
  • Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals.
  • Privacy rights are inherently intertwined with information technology.
  • Definitions
  • In recent years there have been only few attempts to clearly and precisely define a "right to privacy."
  • Some experts assert that in fact the right to privacy "should not be defined as a separate legal right" at all. By their reasoning, existing laws relating to privacy in general should be sufficient.[
  • ] Other experts, such as Dean Prosser, have attempted, but failed, to find a "common ground" between the leading kinds of privacy cases in the court system, at least to formulate a definition.[16]
  • "privacy in the digital environment," suggests that the "right to privacy should be seen as an independent right that deserves legal protection in itself." It has therefore proposed a working definition for a "right to privacy":
  • individual right
  • new technologies alter the balance between privacy and disclosure, and that privacy rights may limit government surveillance to protect democratic processes. Westin defines privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others".
  • Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives
  • Privacy protection
  • Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries.
  • article 12, states:
  • arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against
  • such interference or attacks.
  • No one shall be subjected to
  • United States
  • There are many means to protect one's privacy on the internet. For example e-mails can be encrypted[35] and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates.
  • Covert collection of personally identifiable information has been identified as a primary concern by the U.S. Federal Trade Commission
  • Privacy and location-based services
  • As location tracking capabilities of mobile devices are increasing, problems related to user privacy arise, since user's position and preferences constitute personal information and improper use of them violates user's privacy. Several methods to protect user's privacy when using location based services have been proposed, including the use of anonymizing servers, blurring of information e.a. Methods to quantify privacy have also been proposed, to be able to calculate the equilibrium between the benefit of providing accurate location information and the drawbacks of risking personal privacy.
    • ino moreno
       
      crazy stuff!
3More

digiteen - Digital Security and Safety - 0 views

  • Protect hardware and network security Protect personal security Protect school security: hackers, viruses Protect community security
  • Digital Safety and Security (self-protection): this issue relates to a person's well-being and safety online, technically meaning on the computer and on the internet
  • one protects themselves by remembering to not share all their personal information such as their whereabouts and phone numbers.
1More

Digital security - Wikipedia, the free encyclopedia - 0 views

  • is a type of information security affecting all aspects of digital communication, including computers and the internet, telecommunications, financial transactions, transportation, healthcare, and secure access.
5More

My Networked Life: Internet Connections and Social Connections | KBZ - 0 views

    • ino moreno
       
      with a bit of reading, the article is not bad!
  • While she is on the road, Alisa is able to keep up with her assignments online. Her laptop is always on hand so she can quickly see what work she needs to do. Her computer also lets her stay connected to friends and her host families, who have become more like real family.
  • Internet is so important to Alisa because it allows her to stay in touch with people from her travels.
  • ...2 more annotations...
  • Social media in China is different than in other countries due to the special political situation and economic environment. China has social networks that are the equivalent of Facebook and Twitter, but in this country they are used in slightly different ways. “People in the U.S. use Twitter more like casual talking,” says Hanwen. “In China people use social media more to share formal news.”
    • ino moreno
       
      interesting to see how different in the world we really are. hmmmm what is going on america???
2More

U.S. Copyright Office - Copyright in General (FAQ) - 0 views

  • Copyright is a form of protection grounded in the U.S. Constitution and granted by law for original works of authorship fixed in a tangible medium of expression. Copyright covers both published and unpublished works.
  • protects original works of authorship including literary, dramatic, musical, and artistic works, such as poetry, novels, movies, songs, computer software, and architecture.
9More

World Development book case study: the role of social networking in the Arab Spring -- ... - 0 views

  • internet is useful for information dissemination and news gathering, social media for connecting and co-ordinating groups and individuals, mobile phones for taking photographs of what is happening and making it available to a wide global audience and satellite television for instant global reporting of events.
  • all of these digital tools allow them to bring together remote and often disparate groups and give them channels to bypass the conventional media, which is usually state controlled and unwilling to broadcast any news of civil unrest and opposition to the government.
  • Rapid internet interaction through Twitter and Facebook gave information to the protesters about how to counteract the security forces as they tried to disperse the protesters, maps showing locations for protest meetings and practical advice about such things as what to do when teargas is used against groups of protesters.
  • ...5 more annotations...
  • Egyptian protest sympathizers were unable to watch events on their computers and televisions and joined the demonstrators in Tahrir Square instead.
  • The Egyptian government’s decision to cut all communication systems, including the internet and mobile phones,
  • echnology can be used by threatened regimes to suppress civil unrest
  • Human rights organizations will claim that the freedom and independence of the internet is vital to the successful spread of democracy
  • Technology can provide solutions to many problems but its use can also vary from one culture to another.
  •  
    More facts on how tec helped them
30More

Shibboleth Authentication Request - 5 views

    • Jackie Davidson
       
      Twitter shares up-this article gave more content and information.
    • Joshua Whitley
       
      10 Currency-Not current, no updates, can be used in classroom setting 7 Content is credible. the story can be useful to students to educate. The information is valid.  8 Authority- Authors' names are at the top of article, no links to contact author, Authors' Occupation is visible 7 Navigation-No links relevant to topic. everything clear and readable,  10 Experience-Fulfills it's intended purpose.  very engaging to me.  0 Multimedia-no multimedia  7 Treatment- Bias toward Democrats,   6 Access-Easy to access page, no relevant links to help further investigate,    7 Miscellaneous-no per-use cost, no inquiring of private info, can be printed with no issues 
    • troy seaton
       
      WiTricity Corporation make devices that allows wireless charging.
  • WiTricity is also developing technology for wireless charging of electric vehicles and, later, for use in implanted medical devices like heart pumps, said Katie Hall, its chief technology officer.
  • ...6 more annotations...
  • The technology is based on magnetic induction -- the process used to recharge electric toothbrushes. In the toothbrush, the base has a magnetic coil that generates a magnetic field. A second coil in the toothbrush captures some of that field, inducing an electric current.But electric toothbrushes transfer power only from the primary coil to the secondary one at very close range. Move the brush a short distance from the base, and it won't charge.
  • WiTricity has signed a technology transfer and licensing agreement with MediaTek, a semiconductor company in Taiwan, to collaborate on systems for wireless charging of mobile handsets, tablet computers, game controllers and other devices, Mr. Giler said.
    • troy seaton
       
      Other devices that are development
    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. Yes, very much so. It paints a positive image on the tragedy. b. Does it answer your questions about the topic i. Yes, it focuses on information about the plane and the information surrounding its disappearance. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. This Article was updated 03/16/2014. There is no record of it being altered or revised since upload. b. Is there information that could be updated? i. No. Because this article was uploaded and published today the information is current. 3) Authority and Credibility a. Is the author identified? i. Yes, Larry McShane b. Can we see their job title or description? i. No. But it is assumed that he is a reporter for the New York Daily News c. Can you see where the article originates? i. Yes. New York Daily News, Page 5 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. Yes. This site is updated often to maintain the most accurate information. b. Can you rely on this source over time to provide up-to-date information? i. Yes. It may not be bleeding edge down to the second up to date, but it is at best only a few hours old. c. Does the internet site contain complete information as found in the comparable article? i. No. Not in the article itself. It does provide options to search for additional articles and provides a way to narrow your search 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. Yes, but not in a bad way. It was about how hope hasn't been lost in the search for the plane. b. Is there information included or not included that is found in the comparable article? i. Not currently. Because of how new the article is there isn't really any more information on it. If it included all the information available it would be come hard to read.
    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. This article seems to be accurate and thorough. It's well written. b. Does it answer your questions about the topic i. This article answered basic questions on my topic but to the exact information I was looking for. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. September 26th, 2013 b. Is there information that could be updated? i. Yes there was, this article focused on more on Russian oil running low and how the Kremlin was looking towards Siberian shale to replenish it and not at all about the interactions of the US in that regard. 3) Authority and Credibility a. Is the author identified? i. Yes. His name is Guy Chazan. b. Can we see their job title or description? i. No. c. Can you see where the article originates? i. Yes. It originated in the Financial Times (London, England) 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. For the most part yes. It seems that it is often update but not current. b. Can you rely on this source over time to provide up-to-date information? i. No. It does update but not often enough to provide up-to-date information. c. Does the internet site contain complete information as found in the comparable article? i. Yes it does at least about the value of Russian oil. It doesn't contain anything about how people are reacting to the current foreign policy from President Obama. 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. No. It seems unbiased and direct in its point of view. It doesn't take either side, but still relates all the information properly. b. Is there information included or not included that is found in the comparable article? i. It didn't have any information on the actions or reaction of the US or the world.
    • chris mackie
       
      1) Content and Credibility a. Is the article accurate & thorough i. Yes, very much so. It paints a positive image on the tragedy. b. Does it answer your questions about the topic i. Yes, it focuses on information about the plane and the information surrounding its disappearance. 2) Currency a. What is the date or timestamp of the article? Has it been revised? i. This Article was updated 03/16/2014. There is no record of it being altered or revised since upload. b. Is there information that could be updated? i. No. Because this article was uploaded and published today the information is current. 3) Authority and Credibility a. Is the author identified? i. Yes, Larry McShane b. Can we see their job title or description? i. No. But it is assumed that he is a reporter for the New York Daily News c. Can you see where the article originates? i. Yes. New York Daily News, Page 5 4) Continuity and Comparability a. Will the internet site be maintained and updated? i. Yes. This site is updated often to maintain the most accurate information. b. Can you rely on this source over time to provide up-to-date information? i. Yes. It may not be bleeding edge down to the second up to date, but it is at best only a few hours old. c. Does the internet site contain complete information as found in the comparable article? i. No. Not in the article itself. It does provide options to search for additional articles and provides a way to narrow your search 5) Biases and Censorship a. Does that article seem biased in any way in its point of view? i. Yes, but not in a bad way. It was about how hope hasn't been lost in the search for the plane. b. Is there information included or not included that is found in the comparable article? i. Not currently. Because of how new the article is there isn't really any more information on it. If it included all the information available it would be come hard to read.
  •  
    AFP - RELAXNEWS (English International Version) Two film stars, Michael Douglas and Paul Rudd, are to share the title role in the next film from "The World's End" director Edgar Wright, due 2015. After Robert Redford's stint in "Captain America: The Winter Soldier," Marvel has recruited another legendary actor for an upcoming blockbuster in Michael Douglas. The 69-year-old will become the face of Henry Pym and hand over the Ant-Man moniker to Scott Lang, the new hero played by Paul Rudd. Ant-Man first appeared in print in 1962 and has become the alter ego for a number of Marvel characters; the film sees Lang succeed Pym as the electronics whizz in charge of wearing the Ant-Man mantle, able to shrink, grow, and communicate with insects. Dated for July 31, 2015, "Ant-Man" should also result in the character's addition to the supporting cast of the next Avengers film, set for mid-2018.
  •  
    Adknowledge is a leading digital marketing company working with some of the worldâs top brands. Adknowledge designs, manages and measures campaigns for companies including Audi, Starbucks, LG, Disney and LâOréal to unlock digital audiences using multiple channels: social media, mobile, apps, email, display ads and audience engagement. A proprietary database of more than 600 million internet and mobile users steers Adknowledgeâs targeting; user preferences, online behavior and unsurpassed optimization ensure surgical message precision. In addition, Adknowledge helps publishers monetize their sites and lists effectively, with great attention to contextual relevance. Since it was founded 2004, Adknowledge has grown organically and through acquisitions. This includes a 2011 purchase of Toronto-based AdParlor, one of the first Facebook Strategic Preferred Marketing Developers (sPMD). Adknowledge is based in Kansas City, Missouri; it also has North American offices in San Francisco, New York Fort Myers and Toronto. It has overseas locations in London, Paris, Munich and Shanghai with sales presence in Australia and Brazil. Today, there are approximately 300 Adknowledge employees located around the world.
2More

EBSCOhost: Confidence IN THE CLOUD. - 3 views

    • Lucas Pergler
       
      1,2)PDF from EBSCOhost containing content of a serious nature, created by a published author in a leading computer magazine. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)Author is printed at the start of the article for copyright purposes. 5)Citations used when needed throughout article. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Overview of benefits of storing data in the cloud.
2More

EBSCOhost: Security Architecture of Cloud Computing. - 1 views

    • Lucas Pergler
       
      1,2)PDF from EBSCOhost containing content of a serious nature, authored by a PhD. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)Author is printed under the title and has a doctorate in the related field. 5)Citation printed at the end of the article. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Overview of how cloud services try to maintain security.
12More

Full Sail University Online - 0 views

    • CELESTINA RAMOS
       
      The points listed below are exactly how I feel towards the internet and technology. Yes, we spend lots of time on the computer, hand held devices, and video games which are not helping in the way we speak, read, or write.  I feel it is actually making it harder on us humans that operate these systems. 
  • literacy experts pointed out that texting isn’t increasing literacy but instead shorthand vocabulary and improper spelling (O'Brien, May).
  • Garry Sharp: https://www.diigo.com/list/gsharp21/Team+B+Debate/2uskb0pxg
  • ...8 more annotations...
  • Martin, A. (May, 2013 30). The 4 negative side effects of technology. Retrieved from http://www.edudemic.com/the-4-negative-side-effects-of-technology/
  • Igbokwe, J. C. (n.d.). Influence of electronic media on reading ability of school children. Retrieved from http://www.webpages.uidaho.edu/~mbolin/igbokwe-obodike-ezeji.htm
  • Declining literacy: Do the textbooks contribute to the problem?. (n.d.). Retrieved from http://www.bjupress.com/resources/articles/t2t/declining-literacy.php
  • Kyle Bolum: https://www.diigo.com/list/kylebolum/Week+2+Group+Project/2utmlzew4
  • O'Brien, T. (May, 2007 1). Text messaging stunts writing skills. Retrieved from http://www.switched.com/2007/05/01/text-messaging-stunts-writing-skills/
  • West, B. (January, 2013 16). Technology: Declining literacy or changing it?. Retrieved from http://prezi.com/vokzpwaeohry/technology-declining-literacy-or-changing-it/
  • atest pew stats show teen texting exploding. (March, 2012 22). Retrieved from http://waterfallmobile.com/blog/2012/03/22/latest-pew-stats-show-teen-texting-exploding/
  • Drouin, M. C. D. (n.d.). R u txting? is the use of text speak hurting your literacy?. Retrieved from http://jlr.sagepub.com/content/41/1/46.full.pdf html
  •  
    Facts, Resources and citations from Team B
1More

What is blog? - A Word Definition From the Webopedia Computer Dictionary - 0 views

  • Short for Web log, a blog is a Web page that serves as a publicly accessible personal journal for an individual. Typically updated daily, blogs often reflect the personality of the author.
1More

What is Malware? Defined! - ChicaLogic - 0 views

  • Malware refers to a program on your computer that is malicious in nature.  It is designed to take control, annoy, and destroy!
‹ Previous 21 - 40 of 60 Next ›
Showing 20 items per page