Skip to main content

Home/ Groups/ Digital Literacy at Full Sail University
Cameron Browne

Definition of a Copyright - Copyright - Guide - LegalZoom - 0 views

  • A copyright is a form of protection provided by the laws of the United States to authors of "original works of authorship." This includes literary, dramatic, musical, artistic and certain other creative works.
Cameron Browne

What is database? definition and meaning - 1 views

  • Systematically organized or structured repository of indexed information (usually as a group of linked data files) that allows easy retrieval, updating, analysis, and output of data.
  • this data could be in the form of graphics, reports, scripts, tables, text, etc., representing almost every kind of information.
Cameron Browne

Xavier University: Library: XU.TUTOR: Identifying Resources: Databases: Definition - 1 views

  • A database is a collection of information in electronic format organized in a logical fashion.
  • There is a record for each unique item in a database
Cameron Browne

What Is Malware? (with picture) - 1 views

  • Malware is a portmanteau, a term combining "malicious" and "software" to describe a type of program designed to steal information from or cause damage to a computer.
  • It includes things like spyware and adware programs, including pop-ups and even tracking cookies, which are used to monitor users' surfing habits without permission.
  • It also includes more sinister hazards, such as keyloggers, Trojan horses, worms, and viruses. In simpler terms, it is any software that is intended by the developer to cause harm or exploit people's computers or private records without consent.
  • ...1 more annotation...
  • The earliest well-known examples of malware, which appeared during the early to mid-1990s, were largely the result of experimentation and pranks by curious developers trying to expand their skills.
Cameron Browne

What is malware and how can we prevent it? | Security News - 1 views

  • Malware is an abbreviated term meaning “malicious software.” This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner.
  • There are various types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer.
  • The best protection from malware continues to be the usual advice: be careful about what email attachments you open, be cautious when surfing and stay away from suspicious websites, and install and maintain an updated, quality antivirus program.
Cameron Browne

What is Malware? Defined! - ChicaLogic - 0 views

  • Malware refers to a program on your computer that is malicious in nature.  It is designed to take control, annoy, and destroy!
Gabrielle Yoder

FAQ - Features- Geotechnology - Absolute Software - 4 views

  • Geotechnology allows you to determine the physical location of your device. You can see the location on an internet map within your Customer Center account. It's a great way to determine if your device is mislaid, lost, or on the move without your permission.
    • Gabrielle Yoder
       
      Good definition.
anthony chaney

CCCCCCC.CCC (ten Cs) for evaluating Internet resources: EBSCOhost - 0 views

  •  
    "Directions: Use your judgment in allotting points for the various categories. Total the points for score. Currency (0 to 15 Points) The site has the date of last revision posted. The site has been updated recently. Frequency of planned updates and revisions is stated. Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. This information is not available in any other format elsewhere in my library. The information on the topic is thorough. The information is accurate. The purpose of the page is obvious. The information is in good taste. The page uses correct spelling and grammar. Authority (0 to 10 Points) The authors are clearly identified. The authors and/or maintainers of the site are authorities in their field. There is a way to contact the author (s) via e-mail or traditional mail. You can easily tell from the domain name where the page originates. Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. The type styles and background make the page clear and readable. The links are easy to identify. The links are logically grouped. The layout is consistent from page to page. There is a link back to the home page on each supporting page. The links are relevant to the subject. The icons clearly represent what is intended. Experience (0 to 10 Points) The page fulfills its intended purpose. The page is worth the time. The page's presentation is eye-catching. The site engages the visitor to spend time there. Multimedia (0 to 10 Points) Sound, graphics or video enhance the site's message. Treatment (0 to 10 Points) Any biases towards the subject matter can be easily identified. The page is free from stereotyping. The page is age appropriate for content and vocabulary for its intended audience. Access (0 to 5 Points) You can connect quickly to the page. The page is available through search engines. The page loads quickly. You can choose whether to download small
Eugene Stewart

CCCCCCC.CCC (ten Cs) for evaluating Internet resources: EBSCOhost - 0 views

  • 1. ContentWhat is the intent of the content? Are the title and author identified? Is the content "juried"? Is the content "popular" or "scholarly", satiric or serious? What is the date of the document or article? Is the "edition" current? Do you have the latest version? (Is this important?) How do you know?
  • 2. CredibilityIs the author identifiable and reliable? Is the content credible? Authoritative? Should it be? What is the purpose of the information, that is, is it serious, satiric, humorous? Is the URL extension .edu, .com, .gov or .org? What does this tell you about the "publisher"?
  • 3. Critical ThinkingHow can you apply critical thinking skills, including previous knowledge and experience, to evaluate Internet resources? Can you identify the author, publisher, edition, etc. as you would with a "traditionally" published resource? What criteria do you use to evaluate Internet resources?
  • ...7 more annotations...
  • 4. CopyrightEven if the copyright notice does not appear prominently, someone wrote, or is responsible for, the creation of a document, graphic, sound or image, and the material falls under the copyright conventions. "Fair use" applies to short, cited excerpts, usually as an example for commentary or research. Materials are in the "public domain" if this is explicitly stated. Internet users, as users of print media, must respect copyright.
  • 5. CitationInternet resources should be cited to identify sources used, both to give credit to the author and to provide the reader with avenues for further research. Standard style manuals (print and online) provide some examples of how to cite Internet documents, although standards have not vet been formally established.
  • 6. ContinuityWill the Internet site be maintained and updated? Is it now and will it continue to be free? Can you rely on this source over time to provide up-to-date information? Some good .edu sites have moved to .com, with possible cost implications. Other sites offer partial use for free, and charge fees for continued or in-depth use
  • Is your discussion list "moderated"? What does this mean? Does your search engine or index look for all words or are some words excluded? Is this censorship? Does your institution, based on its mission, parent organization or space limitations, apply some restrictions to Internet use? Consider censorship and privacy issues when using the Internet.
  • If more than one user will need to access a site, consider each user's access and "functionality". How do users connect to the Internet and what kind of connection does the assigned resource require? Does access to the resource require a graphical user interface? If it is a popular (busy) resource, will it be accessible in the time frame needed? Is it accessible by more than one Internet tool? Do users have access to the same Internet tools and applications? Are users familiar with the tools and applications? Is the site "viewable" by all Web browsers?
  • Does the Internet resource have an identified comparable print or CD ROM data set or source? Does the Internet site contain comparable and complete information? (For example, some newspapers have partial but not full text information on the Internet.) Do you need to compare data or statistics over time? Can you identify sources for comparable earlier or later data? Comparability of data may or may not be important, depending on your project.
  • What is the context for your research? Can you find "anything" on your topic, that is, commentary, opinion, narrative, statistics and your quest will be satisfied? Are you looking for current or historical information? Definitions? Research studies or articles? How does Internet information fit in the overall information context of your subject? Before you start searching, define the research context and research needs and decide what sources might be best to use to successfully fill information needs without data overload.
  •  
    the 10 C's
Ryan Green

Digital-Citizenship-Hub - 0 views

    • Ryan Green
       
      Interest take on digital citizenship. Great educational video.
anthony chaney

Unlocking the Power of Internet Collaboration: Adjusting Concepts So More P...: EBSCOhost - 1 views

  • Spencer-Scarr, D. (2010). Unlocking the Power of Internet Collaboration: Adjusting Concepts So More People 'Get It'. International Journal Of Technology, Knowledge & Society, 6(2), 1-16.
Joey Martinez

Malware - 0 views

  • So what is Malware? Short for malicious software, malware is as old as software itself, and  programmers have been authoring it for as long as they have been authoring legitimate software.
  • Malware exists in many forms, most of which you’ve probably already heard of. The most common types of malware are viruses, trojans, worms, spyware and zombies.
  • In the early days of software, programmers wrote malware mostly to prank one another, or to show off their technical skills.
  • ...4 more annotations...
  • Some of these programmers learned that they can make thousands of dollars a day if they successfully exploit malware to their advantage.
  • These people went on to become cyber-crooks, defrauding individuals and organizations for financial gain.
  • A cyber-war between countries is raging. Some countries such as China, Syria, and America are rumored to be state-sponsoring cyber-gangs whose only purpose is to research and develop new malware techniques capable of infiltrating government agencies and infrastructures.
  • The malware problem is huge and is growing fast. By the end of 2010 the counter for unique malware programs stood at 14 million, with a staggering 60,000 pieces of new malicious code detected every day.
  •  
    Short for malicious software, malware is as old as software itself, and  programmers have been authoring it for as long as they have been authoring legitimate software.
Cameron Browne

IT: Working Definition of Privacy - 0 views

  • According to Professor Solove, we should understand privacy is an umbrella term for a group of related yet distinct things. Privacy is about respecting the desires of individuals where compatible with the aims of the larger community.
  • A privacy risk includes any potential problems involving the collection, use, or disclosure of personal data by the school or by others within the school community.
Cameron Browne

What is privacy? - Definition from WhatIs.com - 0 views

  • On the Internet, privacy, a major concern of users, can be divided into these concerns: What personal information can be shared with whom Whether messages can be exchanged without anyone else seeing them Whether and how one can send messages anonymously
  • An annual survey conducted by the Graphics, Visualization and Usability Center of the Georgia Institute of Technology showed that 70% of the Web users surveyed cited concerns about privacy as the main reason for not registering information with Web sites.
Cameron Browne

Database Definition - 0 views

  • A database is a data structure that stores organized information. Most databases contain multiple tables, which may each include several different fields.
  • Nearly all e-commerce sites uses databases to store product inventory and customer information.
  • By storing website data in a database, the data can be easily searched, sorted, and updated.
  • ...1 more annotation...
  • today's relational databases allow users to access, update, and search information based on the relationship of data stored in different tables.
Cameron Browne

Social Literacy - 1 views

  • The ability to make “socially productive decisions” (Arthur, et al) Successful interpersonal cooperation Collaboration and appropriate interactions Familiarity with cultural norms
‹ Previous 21 - 40 Next › Last »
Showing 20 items per page