Skip to main content

Home/ Digiteen/ Group items tagged history

Rss Feed Group items tagged

wildcat wildcat

digiteen2008 - Digital Etiquette - 3 views

  • Good etiquette is shown by having a proper education, manners and a sense of tact.
  • Etiquette mainly appears when someone has guests, meets with other people, or during meals.
  • Etiquette: Key terms Etiquette: rules governing socially acceptable behavior. Propriety: correct or appropriate behavior. Manners: a polite or well bred social behavior or habits Proper: marked by suitability or rightness or appropriateness. Education: the activities of educating or instructing; activities that impart knowledge or skill. Respect: an attitude of admiration or esteem. Civilized: having a high state of culture and development both social and technological. Social: living together or enjoying life in communities or organized groups. Tact: the ability to speak without offending others. Polite: showing regard for others in manners, speech, behavior. Impression: mental picture: a clear and telling mental image. Cleanliness: the habit of keeping free of superficial imperfections, diligence in keeping clean. Sophisticated: having or appealing to those having worldly knowledge and refinement. Society: an extended social group having a distinctive cultural and economic organization.
  • ...14 more annotations...
  • Digital Etiquette 1. Here is some tips that you should follow when talking online, texting, or emailing: 2. Say Hello before you start talking. It’s polite and it can make somebody happy knowing that somebody is nice enough to say hello. 3. Try to avoid replying “Sure”. A person will go crazy trying to figure out “Sure” what? Also, depending on who you are talking to online, the person may know little of your language and might not understand what you are saying, so be patient. 4. Avoid trailing off. If you stop responding to somebody all of the sudden they might think you’re ignoring them. If you have to go and do something say “BRB” or “one sec”. It will calm any worries, which the person has, who you are communicating to. 5. Don’t post people’s photos without their permission. Somebody might have a religion where they're not allowed to have they're pictures online. 6. Accept differences. Everybody has different beliefs. Don’t make fun of somebody’s religion or country because people can really get offended about what you say. 7. Talk about things that are appropriate. Chat rooms are for anyone who wants to talk to new people. One inappropriate comment can ruin it for everyone. You should always be aware to whom you are talking to and if they ask you to do anything which you feel uncomfortable about then tell an adult immediately so then the problem won't get out of hands. 8. Say bye before you leave the person whether its in person or online. You could seriously hurt somebody’s feelings if you just stop talking to them. 9. Be careful the way you type something. What you write can sound very different than what you mean. Read your writing before you press send. It could save you from an embarrassing situation. 10. Avoid writing in all capital letters. It looks like you're shouting. Wouldn't you think I was shouting if you saw this, DON'T WRITE IN ALL CAPITAL LETTERS.
  • Access Communication Literacy Student Environment Security and Safety Etiquette Rights and Responsibilities Student Life Outside Commerce Law Health and Wellness Class Actions American School of Madrid Spain Anand Vidya Vihar India Aspengrove School Canada Badshah Faisal Islami Institute Bangladesh La Grange USA Pahartali Girls High School Bangladesh Rani Bilashmoni Govt. Boys High School Bangladesh Troy Middle School USA Qatar Academy Qatar Wedderburn College Australia Westwood Schools USA Information Social & Ethical Issues Rubrics Teachers Template sj32 · My Wikis · · My Account · Help · Sign Out · Digital Etiquette page Details and TagsPrint PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion (39) history notify me Details last edit Friday, 12:46 pm by kcaise - 124 revisions Tags none Type a tag name. Press comma or enter to add another. Cancel Table of ContentsDigital Etiquette 1. Overview/Description of the various aspects of the topic. Elementary Aged Students Middle/ High School Aged Students Email Etiquette: BE A SPORT, AND KEEP IT SHORT: NON MIND READERS FRIENDLY, PLEASE!: graTipos and.grammar! can caus cauz ishueezz? (typos and grammar... can cause issues!) BUISNESS FOR BUSYNESS!!! BE PLASTIC-ON-THE-SCREEN-CLEAR!!! A
  • Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself.
  • When you instant message, chat, or email someone over the internet, that person can't tell if your just joking because they can't see your face. Don't say stuff over the internet that can be taken the wrong way or can hurt someones feelings
  • The internet takes over some peoples lives and people can get brain washed so easily when on the computer. Hacking other computers, using bad language, downloading illegally, and plagiarism are examples of having bad or no etiquette when it comes to the internet.
  • Etiquette is a set of rules dealing with exterior form
  • Middle/ High School Aged Students Teenagers these days are only on the internet to chat with their friends they know, or to look at cool videos or pictures.Myspace and Facebook are easy ways for teenagers to get access to the internet. These two websites have caused a lot of controversies over the internet because some teenagers will put bad pictures on the internet of themselves or other people. Every once in a while fights will occur between people who are trying to make each other look bad. It gives them a bad reputation and it ruins friendships all over the world. I just think that if teenagers would act mature then a lot of these things would not happen.
  • Online plagiarism is where internet users copy or use part of your or someone else's work. It is definitely not acceptable and is becoming a major issue. People need to have the right to place information on the internet knowing that it will not be copied for other people's work. Plagiarism is illegal but people still don't get the message. Plagiarism really could start major problems like people not writing the truth on the internet or making up information just to teach people a lesson. If someone is going to copy other people's work really they are better off handing the work in late or not at all. Using people's ideas is okay if you give them recognition or asked them. Plagiarism is equal to lying, if not worse. People are being generous by putting their knowledge on the internet to help people not to do it for people. Have courtesy and respect- don't copy peoples work use it as a guide and acknowledge them for their work and help. Plagerism- it's illegal so do the right thing.
  • ownloading illegally is one of the things not do in digital etiquette. Using file sharing programs such as KaZaA, Bit Torrent, iMesh, and Lime Wire to share or obtain copyrighted music, movies, games, and other software without the permission of the copyright holder is illegal. Stealing music has lots of effects once done. Some of the effects are listed below. Stealing music is against the law. Stealing music betrays the songwriters and recording artists who create it. Stealing music stifles the careers of new artists and up-and-coming bands. Stealing music threatens the livelihood of the thousands of working people—from recording engineers to Christian music retailers and their staffs —who are employed in this ministry.
  • Downloading Illegally
  • Some ways on avoiding stealing music are: Read user agreements carefully. Check the Web sites of the musicians, record companies, or movie studios to see if they allow distribution of their materials on the Internet. When purchasing music, movies, games, software, or other materials, read the license carefully to learn if you have permission to convert materials to other formats for personal use. Don't share or distribute materials unless you have permission. Of course, there are consequences to this kind of action. For one you can be fined of at least $500 dollars. The online infringement of copyrighted music can be punished by up to 3 years in prison and $250,000 in fines," the website said. "Repeat offenders can be imprisoned up to 6 years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright. " To avoid these kinds of consequences you must avoid downloading illegally. I suggest that you follow the ways on avoiding these sort of consequences.
  • Some people have had both positively and negatively affected by internet etiquette. An example of negative etiquette on the internet is like if a person copies somebody's work without their permission and then the person who got copied goes and deletes that person's work
  • Don't type in all caps it looks like you're shouting which can offend some people which are on the other end of the computer because when you are talking to a person in face its easier to get your point across than talking online. Also if you try to do humor on the computer someone might not know that it is humor, and might take it as personal and you can get in trouble in all sorts of ways. Another thing is don't send rude messages or offensive e-mails to one another. It bad manners and it can get way out of hand in no time. Although you might be a pro at cyberspace be nice to the new comers. For a new comer on computers it is like learning a different language for them. Computers take a lot of practice and it is also called for mistakes. So be nice to everyone you meet and also try to help them if you can.
  • Another example is if you do something very funny and one of your friends got you on video tape and he goes and posts it on YouTube
  •  
    What etiquettet is
  •  
    "Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself"
Suzie Nestico

Your Digital Presence - 3 views

  • To get a sense of your digital presence, search yourself: A first place to start is to Google yourself and see the results. Use pipl.com or peekyou.com to find out what comes up about you. Try spezify.com for a look at your digital history. For an entirely different view, try the MIT Personas interface for a visual display of your digital presence.
  •  
    Digital Citizenship and digital footprint resources. Various tools to use with students to show what your digital history really looks like.
Morgan G

Cultural literacy - Wikipedia, the free encyclopedia - 0 views

  •  
    Cultural literacy is important because you need to know the importance of getting along with different cultures. Anyone can join social networks, so you need to learn how you can get along with everyone. "Cultural literacy is familiarity with and ability to understand the idioms, allusions, and informal content that create and constitute a dominant culture. From being familiar with street signs to knowing historical references to understanding the most recent slang, literacy demands interaction with the culture and reflection of it. Knowledge of a canonical set of literature is not sufficient in and of itself when engaging with others in a society, as life is interwoven with art, expression, history, and experience. Cultural literacy requires familiarity with a broad range of general knowledge and implies the use of that knowledge in the creation of a communal language and collective knowledge. Cultural literacy stresses the knowledge of those pieces of information that content creators will assume the audience already possesses."
Matthew T

Therapists Use Virtual Worlds to Address Real Problems: Scientific American - 0 views

  •  
    article about how virtual worlds were used to help this child. "When a troubled 13-year-old named Joe first entered the Kids in Transition program in 2007 in Camden, N.J., he hardly spoke to his therapist. Like many teens at this residential mental health treatment facility, he was admitted because he had trouble controlling his anger, had run away from home several times, and had a history of run-ins with the law, according to Heather Foley, a social worker with the program. Therapists typically encourage patients like Joe to get at the core of their problems via face-to-face role-playing-pretending to be in a situation and having the patient practice how to handle it. But Foley says this approach was a nonstarter for Joe, whose confrontational behavior and attention deficit hyperactivity disorder (ADHD) impair his ability to engage and focus in this way."
Kelby W

Private Internet Browsing - Activating Private Internet Browsing Mode in Your Favorite ... - 0 views

  •  
    Many ways to help you be safe on the internet.   "he term private Internet browsing encompasses a wide array of precautions that Web surfers can take to ensure that their activity on the Web cannot be traced. Motives for private Internet browsing are plenty, with both privacy and safety at the forefront of many Internet users' minds. Whatever the inspiration for browsing anonymously may be, the bottom line is that many people want to avoid leaving tracks behind. Proxy Servers for Private Internet Browsing Private Internet browsing can involve utilizing firewalls and proxy servers to prevent those in the outside world from viewing Web surfing activity, including rogue individuals as well as Internet Service Providers and even the government. These types of private Internet browsing measures are commonly used in countries where access is limited as well as at the workplace or on campus. Private Internet Browsing Within the Web Browser For many Web surfers, however, private Internet browsing involves clearing their tracks from others who may have access to the same computer or mobile device that they're currently using. Most popular Web browsers offer ways to browse anonymously, with no history or other private data such as cache or cookies left behind at the end of your browsing session. How to Activate Private Internet Browsing The methods for activating this type of private Internet browsing differ across browsers, operating systems, and device types. The following step-by-step tutorials teach you how to browse anonymously in the browser of your choice."
Savana R

Miles J. Feldman: Is Privacy Dead? - 0 views

  •  
    Whatever you look up or plan on the internet people can see it. If the government pays for it they can see what you are looking at. People can stalk you on the internet. "Are you planning a trip? A wedding? Have you been searching your medical symptoms on WebMD, or Google stalking your high school crush? Did all of your friends wish you a Happy Birthday on your Facebook page? If so, your financial status, religious beliefs, medical history, birth date and hometown have all been exposed, recorded and compiled into a virtual database that functions as your digital alter ego, a sort of online avatar. That critical mass of information may be accessible to the government or to anyone else who asks (or pays) for it."
Kellie C

A Clash of Cultures on the Internet - 0 views

  • In these cultural clashes, advertisers compare the Internet to magazines and newspapers (where most people expect ads) while Internet diehards compare the Internet to telephones and interpersonal conversations (where ads would be considered intrusive). In fact, Internet areas such as Usenet are areas of two-way communication where, unlike newspapers and magazines, anyone can post messages and contribute equally to the content. Yet, unlike telephone conversations, these areas are disseminated widely, which is what attracts those interested in advertising
  •  
    This website tells you the history and what has happened with culture clashes on the internet.
Jeremy B

Virtual Worlds Timeline: Origins & Evolution of Social Virtual Worlds - 1 views

shared by Jeremy B on 19 Mar 12 - Cached
  •  
    short history of virtual worlds
Vicki Davis

New ID theft targets kids' Social Security numbers | Washington Examiner - 3 views

  • The latest form of identity theft doesn't depend on stealing your Social Security number. Now thieves are targeting your kid's number long before the little one even has a bank account.
    • Jillian N
       
      People are stealing not adults social security numbers but kids even before they have bank accounts
  • "If people are obtaining enough credit by fraud, we're back to another financial collapse," said Linda Marshall, an assistant U.S. attorney in Kansas City. "We tend to talk about it as the next wave."
  • Online companies use computers and publicly available information to find random Social Security numbers. The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars.Because the numbers often come from young children who have no money of their own, they carry no spending history and offer a chance to open a new, unblemished line of credit. People who buy the numbers can then quickly build their credit rating in a process called "piggybacking," which involves linking to someone else's credit file.Many of the business selling the numbers promise to raise customers' credit scores to 700 or 800 within six months.If they default on their payments, and the credit is withdrawn, the same people can simply buy another number and start the process again, causing a steep spiral of debt that could conceivably go on for years before creditors discover the fraud
  • ...2 more annotations...
  • A "clean" CPN is a number that has been validated as an active Social Security number and is not on file with the credit bureaus. The most likely source of such numbers are children and longtime prison inmates, experts said.
  • "Those are the numbers criminals want. They can use them several years without being detected," Damosi said. "There are not enough services that look at protecting the Social Security numbers or credit history of minors."
  •  
    The new Identity theft steals children's social security numbers before they have bank accounts.
  •  
    This article is very interesting and I didn't know why people try to take little kid's social security numbers before i read this article.( this may be caused by the recent econimical failure in the past years.) Isn't it illegal for businesses to sell card numbers though?
Kayden F

Social consciousness - Wikipedia, the free encyclopedia - 3 views

  •  
    This website explains social awareness and its history.
Kerrie D

Virtual Worlds - Wikipedia - 0 views

  • A virtual world is a genre of online community that often takes the form of a computer-based simulated environment, through which users can interact with one another and use and create objects[1].
    • stephanie j
       
      definition of a virtual world
  • Virtual worlds are intended for its users to inhabit and interact, and the term today has become largely synonymous with interactive 3D virtual environments, where the users take the form of avatars visible to others graphically
  • One perception of virtual worlds requires an online persistent world, active and available 24 hours a day and seven days a week, to qualify as a true virtual world
  • ...6 more annotations...
  • According to K Zero, a virtual world consultancy service, there are nearly 1 billion (1,009,000,000) people worldwide registered in virtual worlds today.[33]
  • I envision virtual worlds evolving for business and cultural development as the medium becomes more ubiquitous."
  • "synthetic worlds" is a better term for these cyberspaces
  • can encompass computer conferencing and text based chatrooms.
  • Such modeled worlds and their rules may draw from the reality or fantasy worlds.
  • Massively multiplayer online games depict a wide range of worlds, including those based on fantasy, science fiction, the real world, super heroes, sports, horror, and historical milieus.
  •  
    Virtual Worlds summary. Virtual Worlds; better term for cyberspaces "synthetic worlds". Help people learn about Virtual Worlds and how they are used.
Morgan S.

ProfHacker - The Chronicle of Higher Education - 0 views

  •  
    "Inevitably, though, they listen - and they learn." I've found that using popular music in lectures also increases my credibility among students. They see music as their territory, and are often surprised when a professor understands something they are familiar with - or think they are.-ProfHacker Personally, I think this is really cool that teachers are branching out this far just to reach us and help us learn. Some music might not be appropriate for listening to in the classroom for a subject, so that means you would have to take time and experiment. These 4 characteristics will help you realize how just how helpful doing this could really be: Vocabulary. Music can help start discussions about language use and get students thinking about the way we use words and phrases. Imagery. Music videos offer an entrée into such things as gender and social roles, fashion and sexuality, not only through sound but through the accompanying images. Cultural references. Popular songs allude to many elements of popular culture, providing a means to explore current events, celebrity culture, politics and the boundaries of taste. History. Today's music evolves from yesterday's music, which evolved from previous music in the past. Finding those connections can be eye-opening.
Matt B

Gale World History In Context - Document - 0 views

  •  
    Never has this fact been starker than in alarming statistics on Internet security breaches released by Incidents.org which tracks system incursions around the world.
Ben B

Gale World History In Context - Document - 0 views

  •  
    This article discusses the different way to communicate online.
Ben B

Gale World History In Context - Document - 0 views

  •  
    This article talks about how bullying has changed from being a face-to-face act to being someone that can be done online.
1 - 20 of 35 Next ›
Showing 20 items per page