Skip to main content

Home/ Digiteen/ Group items tagged will

Rss Feed Group items tagged

mitch g

Technology reshapes the ways we communicate. - Free Online Library - 0 views

  • We will continue to see, for example, incredible breakthroughs in miniaturization min·i·a·tur·ize  tr.v. min·i·a·tur·ized, min·i·a·tur·iz·ing, min·i·a·tur·iz·esTo plan or make on a greatly reduced scale.min ..... Click the link for more information. and chip memory. Chip memory is evolving from about 20 million transistors on a 16-megabit
  • New telecommunications technologies are revolutionizing the ways we share information
  • Other forms of memory also are constantly expanding. A 5.5-inch CD-ROM CD-ROM: see compact disc. CD-ROM in full compact disc read-only memoryType of computer storage medium that is read optically (e.g., by a laser). ..... Click the link for more information. can already store up to 65,000 pages of documents - about 30 yards of books.
  • ...7 more annotations...
  • six of the key technological components of
  • this revolution are digital systems, fibre optics fibre opticsThin transparent fibres of glass or plastic that transmit light through their length by internal reflections, used for transmitting data, voice, and images. ..... Click the link for more information., new wireless technologies, satellite
  • technologies, new levels of network intelligence and multi-media networking.
  • The ongoing push toward all-digital networks is making it possible to send any type of
  • information - sound, image, data and full-motion video Video transmission that changes the image 30 frames per second (30 fps). Motion pictures are run at 24 fps, which is the minimum frequency required to eliminate the perception of moving frames and make the images appear visually fluid to the eye. ..... Click the link for more information. -
  • Video conferencing See videoconferencing. (communications) video conferencing - A discussion between two or more groups of people who are in different places but can see and hear each other using electronic communications. ..... Click the link for more information., one of the burgeoning areas in the industry, is expected to grow by more than 25 per cent annually in Canada in the next four years.
  • New wireless technologies are also providing new levels of reachability and mobility when and wherever the communication of information is desired or neede
mitch g

Top 7 Ways to Communicate Effectively - 0 views

  • Have self-worth
  • Get interested in other people
  • Open up a person’s heart
  • ...5 more annotations...
  • Listen at least two times more than you talk
  • Diversify yourself
  • Understand that your worth never changes Follow along…In my hand I am holding a check for a million dollars. I crumble it up. It’s still worth a million dollars. I step on it, it’s still worth a million dollars, I start rubbing it on the floor with my shoe, and it’s till worth a million dollars. You are worth a lot more than a million dollars. In fact, your worth is immeasurable. Therefore, there is no such thing as ‘rejection’ as you’re always worth the same no matter what. Nobody can reject you because nobody can change your worth. Moreover, don’t be afraid of something (rejection) that doesn’t exist. Take risks, ask for what you want, and eventually you will get what you want.
  • Understand that your worth never change
  • Follow the step-ladder to success
Ivy F.

Digital Access - Digi Teen - 0 views

  • Digital Access is the topic that talks about how many people in the world have access to technology and internet.
  • Technology needs to be aware and support electronic access for everyone to create a foundation for Digital Citizenship. Digital exclusion of any kind does not enhance the growth of human beings in an electronic society. One gender should not have preferential treatment over another.
  • about how steps should be taken to let the electronic society grow, because of the many benefits that come with internet such as education. Education is better/worse in separate parts of the world, but if every single person in the world was granted access to the internet, there would be a much higher level of educated people, which will lead to a better future. There are less economically developed countries who don't have access to technology like we do. We need to work towards a future where anyone and everyone has access to the internet.
  • ...1 more annotation...
    • Ivy F.
       
      this tells you the meaning of Digital Access
alex c

Internet Slang, Netiquette, Lingo, Acronyms - 1 views

  • Ironically, the origin of the smiley face is a highly controversial debate. The most accepted belief is that graphic artist Howard Ball of Worcester, MA, created the smiley when asked to design a morale boosting campaign. He started with just the smile, but soon realized disgruntled employees might turn it upside down to a frown, so he added eyes.  Other Emoticons:   :) The classic smile. "I'm happy" or "my meaning is positive." Some Word programs will automatically turn this into a graphic after hitting return.   ;)   The wink. "Just kidding," sarcasm, etc.    :-)  Smiley with a nose.   :-D     Laughing. A slightly goofier version of the smiley, this one signifies a particularly happy mood or a laughing response.   8)       Glasses or sunglasses. The cool smiley.  :p       Tongue hanging out. Self-explanatory.    :(  The frown. Disappointed or sad.    >:  Angry face.  :x        Sick face.  :O       Embarassed or shocked.  0:-)     Angel with halo. "Who, me?"  >:-)  Evil grin.    2.  Chat Acronyms.  Verdan
  • Glasses or sunglasses. The cool smiley.  :p       Tongue hanging out. Self-explanatory.    :(  The frown. Disappointed or sad.    >:  Angry face.  :x        Sick face.  :O       Embarassed or shocked.  0:-)     Angel with halo. "Who, me?"  >:-)  Evil grin. 
  • These abbreviations of commonly used chat phrases are often used in e-mail too. Although they can be great timesavers, it's easy to lose people if you overuse them.  ASAP As Soon As Possible BFN Bye For Now BTW By The Way DIY Do It Yourself FAQ Frequently Asked Questions FYA For Your Amusement FYI For Your Information K Okay KISS Keep It Simple, Stupid LMHO Laughing My Head Off LOL Laughing Out Loud OBO Or Best Offer OTL Out To Lunch OTFL On The Floor Laughing THX Thanks TIA Thanks In Advance TTFN Ta Ta For Now
  •  
    This teaches you what abbreviations mean and what emoticons are.
Taylor B

The Core Rules of Netiquette -- Excerpted from Netiquette by Virginia Shea -- Albion.com - 2 views

  • Rule 1: Remember the Human Rule 2: Adhere to the same standards of behavior online that you follow in real life Rule 3: Know where you are in cyberspace Rule 4: Respect other people's time and bandwidth Rule 5: Make yourself look good online Rule 6: Share expert knowledge Rule 7: Help keep flame wars under control Rule 8: Respect other people's privacy Rule 9: Don't abuse your power Rule 10: Be forgiving of other people's mistakes
  •  
    " * Rule 1: Remember the Human * Rule 2: Adhere to the same standards of behavior online that you follow in real life * Rule 3: Know where you are in cyberspace * Rule 4: Respect other people's time and bandwidth * Rule 5: Make yourself look good online * Rule 6: Share expert knowledge * Rule 7: Help keep flame wars under control * Rule 8: Respect other people's privacy * Rule 9: Don't abuse your power * Rule 10: Be forgiving of other people's mistakes"
  •  
    Being on the Internet is fun, when you are respected as a person, and an individual. There are many people that dont feel safe on the internet, and these ruls will help make the internet a better place.
  •  
    These are some good topics to help us research.
Brody C

Internet Safety - 0 views

  • WDIG'S Internet Safety Tips Keep your passwords private, even from your best friend! Your online service will never ask for them, so neither should anyone else. Use only your log-in name and/or e-mail address when chatting or sending e-mail. Never give out personal information like your name, address, or phone number. Don't share photos of yourself, your family, or your home with people you meet online. Always delete unknown e-mail attachments without opening them. They can contain destructive viruses. If a person writes something that is mean or makes you feel uncomfortable, don't respond. Just log off and tell your parents, who can report it to your online service provider. Remember that nothing you write on the Web is completely private -- including e-mail. So be careful and think about what you type and who you tell. Not everyone is as nice, cute, and funny as they may sound online. Never make plans to meet an online "friend" in person. WHEN IN DOUBT -- always ask your parents for help -- and just LOG OFF if you're not sure! You can always go back online later.
Brody C

Internet Safety - 0 views

  • A basic understanding of how Internet risks occur helps to place any Internet safety advice in context. Once you identify which factors have a greater impact on you and your family, you can adapt recommendations to your specific needs. Take a moment to consider each of the six factors that contribute to the current online environment:Lack of knowledge. Consumers of every age and at every level of technical expertise lack broad online safety education. This lack of knowledge is not limited to young people, but extends to the general population, including computer specialists who may not know any more than others about online predatory behavior.Carelessness. Even when we ‘know better,’ we make mistakes. Usually those mistakes occur when we’re tired, rushed, or don’t have a complete understanding of the risks involved. This is especially true when there is no obvious cause and effect to help us correct our behavior. When you post information that is used a month later to rob your home, you are not likely to recognize a connection between the two events. In fact, the vast majority of victims of online crime will not recognize that an action they or someone else took online made them vulnerable to a criminal act.Unintentional exposure of (or by) others. It may be a teacher, school, parent, child, friend, employer, or after-school program that provides publicly accessible information that exposes you. Perhaps your own computer (or mobile phone, or other connected device) has been compromised with spyware that enables criminals to collect your personal information. Maybe when a friend’s computer or other Internet-enabled device was lost or stolen, your information fell into the wrong hands.Technology Flaws. Online products and services can expose consumers – either because the companies who offer them fail to secure their customers’ data and are hacked, or because a company fails to build in adequate safeguards and safety messaging into their product to protect consumers.Holes in consumer protection standards. We cannot place the full burden of online safety on consumers.
Ridge C

Download Details - Microsoft Download Center - Social Interaction and Xbox LIVE Party - 0 views

  • The new Xbox LIVE Party feature extends the concept of social interaction on Xbox LIVE with 8-person voice chat. It also provides simple mechanisms for the Xbox LIVE Party group to play multiplayer games together. This session reviews the Xbox LIVE Party feature and discusses how to integrate your game to create cutting-edge social experiences. Come find out how to make your title interact seamlessly with Xbox LIVE Party, and how doing so will improve your user experience. If you are currently enabling your title for Xbox LIVE, or are just interested in learning more about the latest features, this talk is for you.
Margaret O.

If We Can Change The Way We Communicate, We Can Change The Way We Educate | Fox News - 0 views

  • Many American classrooms are almost indistinguishable from those that students' grandparents attended.  Twenty-something students still sit in desks facing the front of the classroom, with textbooks, listening to a generalist teacher.
  • A new perspective is needed.  Americans need to consider the fundamental question:  How can we most effectively teach kids the skills they need? 
  • Traditional schools may be best for some students, while others will thrive in moire high-tech learning centers. 
  • ...3 more annotations...
  • Parents can augment or even replace their children's traditional school experience with programs from companies like K-12.  This service allows parents to enroll children in virtual schools or purchase specific curriculum.  Traditional materials—worksheets, books, and other physical materials—are combined with online resources, including multimedia presentations. 
  • If We Can Change the Way We Communicate, We Can Change the Way We Educate
  • Steve Jobs' passing last week encouraged Americans to consider how technology has transformed our lives.  Fueled by the creative genius of men like Jobs, new technology has emerged allowing us to better keep in touch with friends and family, access entertainment and information, and perform work from home or wherever we happen to be at that moment.  While we've successfully integrated technology into our workplaces and personal lives, we've been comparatively slow to apply technology's power to other areas of life, like education.  That needs to change.
  •  
    This changes parents' perspectives about letting their child use technology.
  •  
    This article is about changing our environment to meet modern needs
  •  
    Riya & Margaret, Why do you think education is so slow to change the traditional education paradigm?
Kerrie D

Cyber-Bullying: Detection and Prevention - 0 views

  • “Dr. Caudle advises that, in addition to interacting more with their children, parents should also take the necessary preventive measures to create safe places for their children to get away from cyber-bullying. “The home should be a safe place where open discussion is not only allowed, but invited,” says Dr. Caudle. Parental supervision and involvement in a child’s social interactions allows for a sense of comfort and protection from bullying. ”
  • “Dr. Caudle also notes that one must not forget about the bullies themselves. Often, bullying is a cry for help and can usually be traced to a time when the bully was in fact a victim of this type of behavior. Thus, creating a safe environment where one’s child feels comfortable enough to talk about being bullied can help put a stop to bullying before it ever starts.”
  • “According to Dr. Caudle, in order to prevent cyber-bullying, parents must be actively involved in their children’s cyber lives. “Communication with one’s children is the key to bully prevention,” says Dr. Caudle. So send them a friend request on Facebook. Play some XBOX Live—or another system with online gaming—with them. Parents who are proactively involved with their children’s interactions online are subsequently able to monitor these interactions more closely. Therefore, such parents will be exponentially more informed with regard to what bullies, if any, exist in their children’s lives, both online and off. ”
  •  
    Tells you how to create a safe place at home and how to get involved if you know someone that is being bullied online. Be able to prevent cyberbullying by creating a safe environment at home.
Meghan S

Consider technology in the future of education | The Jamestown Sun | Jamestown, North D... - 0 views

  • That also brings up how we use the Internet and social media in school. In the future, the true creative leader will be a contributor to the Internet, not a consumer
  •  
    helping technology in the future
Ashlee B

Apple closing some stores during Wednesday memorial service - CNN.com - 0 views

  •  
    Apple is closing stores for at least an hour for a memorial service. This is so that the apple workers will be able to watch at least an hour of the service.
  •  
    The article is saying that they are closing apple for a couple hours while they are celebrating Steve Jobs.
Brandon B

Teen Safety on the Internet - 0 views

  • Teen Safety on the Internet More and more teenagers are logging on to the Internet every day. Although the Internet is a great source for research projects and other information, there are also dangers involved with surfing the Web. For example, a study conducted in 2000 found that 25 percent of kids 10 to 17 years of age received unwanted pornographic material.The Web allows you to be completely anonymous. Someone who says that he is a 15-year-old boy may actually be a 50-year-old man pretending to be a teen for inappropriate reasons. As a result, agreeing to meet in person with someone you met over the Internet is extremely dangerous, as this can result in sexual assault or even murder. How to Stay Safe on the Internet E-mail Safety Chat Rooms Assessing a Web Site Blogging How to Stay Safe on the Internet Never give out personal information, such as your name, home address or phone number, the name of your school, pictures, credit card numbers or the names of your parents without permission from your parents.Do not meet in person with someone you met online. Do not give out your password to anyone.In chat rooms, use a name that is not gender-specific so you are less likely to receive pornographic material or other forms of harassment. If you do receive pornographic material, report it to your local police department. Back to top E-mail Safety
  • Do not open links or files from people you do not know.Never respond to e-mails with pornographic or other inappropriate material.Do not respond to advertisements -- this confirms that you have a working e-mail account, and you will only receive more junk e-mail.
  •  
    This page talks to teens about how to be safe on the internet. On e man pretended to be a 15 year when he was really 50. Some people are out there that are actually trying to talk and harm teens so be careful. Quote:"The Web allows you to be completely anonymous. Someone who says that he is a 15-year-old boy may actually be a 50-year-old man pretending to be a teen for inappropriate reasons. "
« First ‹ Previous 161 - 174 of 174
Showing 20 items per page