Skip to main content

Home/ Digiteen/ Group items tagged will

Rss Feed Group items tagged

Blakelee H

Top 4 Health Problems Caused By Computer Use | Healthy Health List (heheli.com) - 0 views

  • I am frequent computer user. Of course it’s interesting to know how danger for my health computer can be. Working with computer for whole day is not rare nowadays. If it’s an aspect of our work or if we use computers just for fun, there are certain risks involved with prolonged computer use. 1. Eye Disease It’s the first what occur to us, when we talk about computer harm (right?). Prolonged computer use could be linked to glaucoma, especially among those who are short-sighted. Our eyes are very badly affected by how long you stare at that bright screen. We stop blinking and start staring which makes our eyes strain and dry out. Make sure you look away from the screen and close them for a few seconds every few minutes. We can find many information about eyes health, as Snuz made. And it’s very important not to forget about our eyes while working on computer. 2. Bad Posture Bad posture is enemy number one. Check your posture now! You should be able to reach the keyboard and mouse whilst bending your elbows at 90 degrees, with your shoulders relaxed. If you are stretching, this could cause problems. Your back should be straight and the top of the monitor should be just below eye level. If your monitor is to the left or right of your keyboard you are putting strain on your neck. Long periods of time at the computer while blogging, working or reading often leads to pain in the lumbar region of the back. Neck and shoulder problems also result from poor seating and the poor organization of equipment on the desk (stretching for the telephone or files etc). 3. Hurting Hands Your hand and wrist ache after working at the computer all day, and they sometimes start feeling numb. Research in recent years has found that things like typing and sewing rarely cause carpal tunnel. Wear splints while you work to keep your wrists from bending too high or low, and use a keyboard tray or adjust your chair so the keyboard and mouse are below your elbows and your wrists are level. It is really important to give your fingers, wrists and hands a break from resting on the keyboard all day. A tennis ball is a great way to do this. Every time you need to think you should grab the ball and give it a few quick squeezes. This will do wonders for your joints and muscles. 4. Computer Stress Injuries Many people suffer from structural problems related to the physical stress of sitting incorrectly, or for too long in front of their computers. So there are chances you’ve experienced a fair amount of computer stress, from minor frustrations here and there to a virtual visit to computer hell. High levels of stress can kill you, don’t make mistakes! Highly stressful workers have a higher risk of developing heart diseases and even cancer. So make sure that you can manage your stress. Start making something to reduce it, don’t wait till computer stress will be the main problem in your life. Taking frequent breaks is an important step in preventing repetitive computer stress injuries. Thus, it shows up that there are several problems that occur with prolonged computer use. It is also clear, however, that if certain rules of using computer are observed the risk of any of these problems can be minimized and computer users affected with computer related disorders can avoid or treat them. I consider that persons should have active lifestyle and an ergonomic computer work station, thereby even hardly computer working can’t affect their health. What do you think?
  •  
    The top 4 health risks are Eye Disease, Bad Posture, Computer Stress Injuries, and Hurting Hands
Kelby W

Online Privacy: Using the Internet Safely | Privacy Rights Clearinghouse - 0 views

  •  
    Knowing how to use the internet will help us be a little more private and keep our identity a little more safety.  "The Internet enables us to improve communication, erase physical barriers, and expand our education. Its absorption into our society has been extraordinary.  It touches nearly every part of our lives from how we apply for jobs and where we get our news, to how we find friends.  A few Web sites have virtually replaced some things, like the encyclopedia and the phone book.  But with acceptance comes a decrease in skepticism.  You may assume that the same laws or societal rules that protect your privacy in the physical world apply to the digital world as well.  But the Internet remains largely unregulated and the policies governing it underdeveloped.  Laws concerning online privacy are still being developed. To date, the U.S. Supreme Court largely has taken a hands-off approach to regulating the Internet and online privacy in favor of free speech.  However, the federal government is increasingly interested in regulating the Internet, for example through child pornography and gambling laws.  One important thing to keep in mind when relying on the law to protect you is that if U.S. law is broken in another country, prosecuting the criminal may prove difficult or impossible. "
Kelby W

Digital Literacy Resource - Privacy and the Internet - 0 views

  •  
    You should always think about what you are going to post before you do it.  "It's your profile, you can include what you want to include-right? Before you post, think. Are you prepared to have those words and images represent you for months, and even years to come? Your postings on profiles and to chats and blogs may have cyberlives much longer than what you might have imagined or intended, and may reach a much wider audience than you could have anticipated. This simple fact is illustrated in the following examples from around the country: Students who posted party photos online later found that those photos were used by their university's administration when it needed to make a case regarding alcohol abuse among minors. A student's application for a position as a resident advisor was rejected by university staff who reviewed the applicant's Facebook page and found the material there to be inappropriate. A graduate's job application was rejected when the hiring organization deemed objectionable some of the content he had posted online. Students were reprimanded for extreme and possibly libelous statements they made about a professor in Facebook postings. Are your online postings private? No, not at all. Many postings can and will be viewed by hiring committees, admissions personnel, marketing agencies, and other unintended audiences. Privacy is a complicated matter in American law, evoking everything from Fourth Amendment rights to civil rights. Explore the following topics to learn more about the ins and outs of privacy in the online environment."
Caitlin Roberts

Social Media Etiquette and Awareness | Moving Today - 2 views

  •  
    This website explains etiquette on different social networks. Each social network is different so the etiquette for each site will be different. This site explains how to use the different social networks, blogs and new sites and be respectful and responsible while doing so.
Vicki Davis

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Leve... - 3 views

  •  
    I always tell my students when they travel with me never to joke in airports about anything. I have to admit that the new NSA center with the best decryption capabilities in the world and a seemingly blank check will have me add this article to our reading list as we talk about privacy. We thought the Internet was about freedom but have put so much of our private lives out there we may have just been giving it away. Don't freak out, just be aware. This particular issue is a black box so the article may be filled with conjecture. I thought it was worth the read,
Michelle L

10 Things That Will Make Or Break Your Website - 0 views

  •  
    10 things to make a website
Vicki Davis

ACLU Sues School For Punishing 12-Year-Old Over Facebook Comment - 2 views

  •  
    You'll want to read this lawsuit as it lies on the cusp of what we will experience in schools in the future. In this case, a 12 year old girl (on Facebook, despite the fact she is technically too young to be) is suing a school district (via the ACLU) for punishment because of her use of Facebook. I think the school went too far when it required her to hand over her Facebook and email login to the school, but we'll see what the courts decide. The ACLU says this is a violation of free speech. Stay tuned and realize that students have a right to hate you, say unkind things about you, etc. There is a fine line in what is allowed and what isn't. Just because we CAN deal with issues relating to bullying of other children - that doesn't mean we can wear our own chips on our shoulders and require that kids pretend to like us. It is hurtful when children say unkind things and many don't realize everyone is watching. If students are not understanding the consequences of their actions, then I partially blame any school that doesn't step up and teach digital citizenship.
Julie Lindsay

Born This Way Foundation - 0 views

  •  
    "Want to learn more about how to combat youth bullying, meanness, and cruelty? Our friends and partners, danah boyd and John Palfrey, have done research to provide a list of 20 elements that you must know in order to make a difference. Be informed so you can be brave when you seek to create cultural change. danah and John's Kinder & Braver World Project: Research Series will provide you with research-based recommendations to help you on the way to making a braver, kinder society."
Julie Lindsay

Where Will Social Media Users Go In 2016? (Infographic) - 1 views

  •  
    Interesting set of infographics from the USA showing trends demographically of social media use and users.
Summer T

Digital Citizenship - 2 views

  • Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately.
  •  
    This sight will help to be able to give better ideas for the safety and it also tells you books you can get that will help you to learn more about it.
  • ...2 more comments...
  •  
    Digital Citizenship description
  •  
    Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology.
  •  
    "The topic of digital citizenship is certainly gaining momentum"
  •  
    digital citizenship for parents
Susan Davis

10 Best Rules of Netiquette - Associated Content from Yahoo! - associatedcontent.com - 3 views

  • 2. No "Flaming": Flaming is a form of verbal abuse when you intentionally attack or disrespect somebody for whatever reason.
  • Good internet etiquette (netiquette) is all about being courteous to others online to make the internet a fun experience for everyone.
  •  
    "1.The Golden Rule: Treat others as you would like to be treated. This rule is an oldie but a goodie and can get you through just about any situation, online or off! 2. No "Flaming": Flaming is a form of verbal abuse when you intentionally attack or disrespect somebody for whatever reason. Maybe you didn't agree with something they said, but there's a nice way to share a different point of view without name calling or attacking someone. Harassing or insulting someone will not likely help you gain many online friends! 3. Respect Others' Copyrights: There are wonderful things online, information for everyone on just about any topic! However, these things have copyrights and licenses. Copying the works of someone else without permission or saying it is your own will not only ruin your online reputation, but could land you with hefty fines and lawsuits! 4. DON'T TYPE IN ALL CAPS: It hurts our eyes. It makes people think you are shouting at them. It's okay to type in caps to accentuate a word or two, but please don't do it all the time everywhere you go. 5. Don't Spam: As a blog owner, I get hundreds of spam messages each day. Most of them aren't even legible, with things like "kjhgsawu" typed in the comments and links to sites with adult or inappropriate content. I don't appreciate it! Some spammers are getting really sneaky, as they use the same generic post over and over again like "I really like your blog" - if you own multiple blogs like I do though you can quickly identify these types of spammers! There's a fine line between spam and self-promotion, do it very carefully! "
Julie Lindsay

CyberSmart! Student Curriculum - 5 views

  •  
    "Common Sense Media is pleased to announce that the free CyberSmart! curriculum is now part of Common Sense Media's education programs. Over the next year, Common Sense will be updating the CyberSmart! lesson plans and adding video, interactive components, and a rich complement of parent resources to create an integrated K-12 Digital Literacy and Citizenship curriculum."
Vicki Davis

Internet Crime Complaint Center (IC3) | Prevention Tips - 1 views

  •  
    Internet crime prevention tips. Will be used with digiteen this year.
Vicki Davis

Cyber Bullying Alert | CyberBullying Prevention Software | Internet Harassment - 1 views

  • The CyberBully Alert software is a tool for parents to equip their children with the ability to immediately communicate and document any threats or cyberbullying their children experience when online. Th
  • Experts agree that the best way to address cyberbullying and online threats is to immediately communicate the incident with an adult, as well as document what the threat is.
    • Vicki Davis
       
      I think that every internet browser should have an easy, built in way to take a screen shot and send it to someone. We need this for many safety reasons. It is to protect those who need it most and are often the most technically challenged.
  • A text and email message immediately notifies pre-specified recipients of the online threat - assuring rapid communication between adults and children.
  • ...1 more annotation...
  • CyberBully Alert gives parents the security of immediately being there for their kids when a threat occurs—whether they are at work, in a meeting, on the road, or simply in another room.
  •  
    Software program to mention in cyberbullying section of the wiki.
  •  
    New software that allows children to document and report harmful harrassment online. I would love to test this tool, I find it very interesting. I think this kind of thing is good, but never replaces a parent talking to a child. However, if there is nothing that "can be done" because local laws and others have no method of dealing with it, then I don't know if it will breed frustration. I think every computer should have an easy way to grab screenshots like my fireshot program in firefox. I think this should be part of every web browser.
Miller S.

Digital Etiquette - 0 views

  •  
    Digital Etiquette: electronic standards of conduct or procedure. Technology leaders will recognize this area as one of the most pressing problems when dealing with digital citizenship.
Steve Madsen

ACCC drops eBay probe after payment changes | The Australian - 0 views

  •  
    "TWO years ago, eBay Australia tried to force sellers to use PayPal as the only available payment option on the online auction giant's local site. That attempt went horribly wrong and, apart from the bad press, eBay found itself in trouble with the Australian Competition & Consumer Commission and the Reserve Bank." From July 14, eBay will require sellers to offer at least one of three safe payment methods -- PayPal, Paymate and merchant credit cards.
  •  
    Why would consumers object to being forced to make online payments through only one service, that being PayPal?
Steve Madsen

Google, wifi, street view, privacy - 0 views

  •  
    "Google Australia will today be sent a "please explain" letter from two local privacy organisations demanding to know why the company has been collecting personal Wi-Fi network data from Australian homes alongside the images it takes with its Street View cameras."
  •  
    Does Google collect data about wireless Printers, computers, mobile phones and other devices found in a street? Why would people be concerned about their privacy?
Steve Madsen

How to delete your Facebook account - Telegraph - 0 views

  •  
    "This is a time-consuming process, particularly if you are insanely popular, with hundreds of "friends", but will make every aspect of controlling your privacy that much easier. Friend lists allow you to group your contacts in to groups, so that you're only sharing certain information with certain people. For example, you might create four lists: "Close friends", "Acquaintances", "Family", and "Work""
  •  
    Do teenagers configure their privacy settings properly in Facebook?
Becca B

Top 26 Most Important Rules of Email Etiquette - About Email - 0 views

  •  
    "2. Do Not Default to "Reply All" - Email Etiquette Tip "Reply" is good. "Reply to All" is better. Right? 3. Keep Emails Short - Email Etiquette Tip Do not intimidate recipients with too much text. 4. Properly Format Your Email Replies, and Be Lazy - Email Etiquette Tip Do you think quoting original text in your email replies perfectly is a lot of work? Don't let the '>' intimidate you! Here's a very comfortable, relaxed, quick and still clean and compatible way to reply properly. 5. Write Perfect Subject Lines - Email Etiquette Tip Do you make these mistakes in your email subjects? (The key to getting your messages read is not to be clever.) 6. Clean Up Emails Before Forwarding Them - Email Etiquette Tip Forwarding emails is a great way of sharing ideas, but make sure the original idea is not hidden in obfuscation. 7. When in Doubt, Send Plain Text Email, Not HTML - Email Etiquette Tip Not everybody can receive your fancily formatted emails. Some may even react furious. To be safe rather than sorry, send plain text emails only when in doubt. 8. Don't Forward Hoaxes - Email Etiquette Tip Email hoaxes often contain stories that are intriguing, and sure to irritate. Here's how to spot and stop urban legends. Sponsored Links Business EtiquetteWorkshop materials to teach proper busines etiquete.CorporateTrainingMaterials.com Virus and Trojan RemoverDownload Free Trojan & Virus Scan Recommended and Used By The Expertswww.pctools.com 9. Use Current Antivirus Software, Keep it Up to Date, Scan for Free Make sure you're not spreading worms and viruses via email or act as a vehicle for spreading spam. All this can be caused by malicious emails. Fortunately, there's protection. 10. Say Why You Think What You Forward Will Interest the Recipient More and better communication makes better relationships. Here's a way to spot and share relevant information and foster ties by forwarding emails and links."
Jerilyn J

5DT Virtual Reality Information - 0 views

  • What is Virtual Reality (VR)? Virtual Reality is generally a Computer Generated (CG) environment that makes the user think that he/she is in the real environment. One may also experience a virtual reality by simply imagining it, like Alice in Wonderland, but we will focus on computer generated virtual realities for this discussion.
  • Applications of Virtual Reality (VR) Virtual Reality is an ideal training and visualization medium.
  • What is Virtual Reality (VR)? Virtual Reality is generally a Computer Generated (CG) environment that makes the user think that he/she is in the real environment. One may also experience a virtual reality by simply imagining it, like Alice in Wonderland, but we will focus on computer generated virtual realities for this discussion.
« First ‹ Previous 61 - 80 of 174 Next › Last »
Showing 20 items per page