Skip to main content

Home/ Digiteen/ Group items matching "languages" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Becca B

Top Five Netiquette Rules in an Online Course (or Anywhere) for Success - 0 views

  •  
    "1- Be friendly, positive and self-reflective. When people cannot see you, and also do not know you, feelings can be hurt if you are not careful in how you express yourself. The old saying, think before you speak is important here. Think before you write. One word of advice is do not respond when you feel angry. Wait. Write it down somewhere and come back to it. When you do, you may find that you no longer feel the same way as you did when you wrote it, because you have had time to reflect about the situation. Last, if you still feel the need to be heard, then edit before you post, and write it in terms that are easily embraced. This is also true when you feel a critique is necessary, say it in a positive tone. Reread what you have written to be sure it is positive. 2- Use proper language and titles. Do not use slang or even profane words in an online education environment, even if they are words you consider, "not so bad," as they will sound offensive to the reader. Do not refer to your professor as "Doc" or by his or her first name, unless it is acceptable with him or her to do so. Also, do not use caps lock when writing. It will insinuate yelling. That would hurt someone's feelings and possibly give him or her the wrong impression of you. 3- Use effective communication. This takes practice and thoughtful writing. Try to speak and write clearly at all times. Again, reread before you respond. Define and restate your words when necessary. Correct a misunderstanding right away. Chances are, if one person felt a certain way about what you said, then another may have as well. Likewise, be mindful of chosen words and joking. Let's say for example, I write, "get out!" This slang term can be interpreted in several ways, either positively or negatively. 4- Professionalism. Leave the characters like smiley faces, and instant message abbreviations out. Your friends may like it, but chances are, your professor will not. Save it for personal conversations or definitely ask
Susan Davis

UWC Online - Online Etiquette - 1 views

  • Given the absence of face-to-face clues, written text can easily be misinterpreted. Avoid the use of strong or offensive language and the excessive use of exclamation points. If you feel particularly strongly about a point, it may be best to write it first as a draft and then to review it, before posting it, in order to remove any strong language.
  • If someone states something that you find offensive, mention this directly to the instructor. Remember that the person contributing to the discussion is also new to this form of communication. What you find offensive may quite possibly have been unintended and can best be cleared up by the instructor.
  • Although electronic communication is still young, many conventions have already been established. DO NOT TYPE IN ALL CAPS. This is regarded as shouting and is out of place in a classroom. Acronyms and emoticons (arrangements of symbols to express emotions) are popular, but excessive use of them can make your message difficult to read. Some common ones include:
  • ...6 more annotations...
  • Messages may often appear perfectly clear to you as you compose them, but turn out to be perfectly obtuse to your reader. One way to test for clarity is to read your message aloud to see if it flows smoothly. If you can read it to another person before posting it, even better.
  • You may be familiar with many of the previous points if you have participated in other forms of electronic communication in the past. But Web-based courses have some added constraints not present in other arenas. Keep in mind these additional four points:
  • Be as concise as possible when contributing to a discussion. Web-based courses require a lot of reading, and your points might be missed if hidden in a flood of text. If you have several points that you want to make, it might be a good idea to post them individually, in several more focused messages, rather than as a single, lengthy, all-encompassing message.
  • Contributions to a discussion should have a clear subject header, and you need to stick to the subject. Don't waste others' time by going off on irrelevant tangents.
  • Don't add your comments to a discussion before reading the comments of other students unless the assignment specifically asks you to. Doing so is tantamount to ignoring your fellow students and is rude. Comments related to the content of previous messages should be posted under them to keep related topics organized, and you should specify the person and the particular point you are following up on.
  • A key distinguishing feature of an online course is that communication occurs solely via the written word.
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
brooke s

digiteen2008 - Digital Law - 0 views

  • This is the electronic responsibility for actions which says if something is ethical or unethical. The responsibility of the digital law deals with the ethics of technology as a whole. Digital Law deals with four main topics: copyright, privacy, ethical issues, and piracy. Unethical use of computers can form into theft or crime like piracy. People that are ethical in the use of their computers may actually be the ones being hurt by those who are not following these protective laws. A student should not be allowed to mess with other peoples work or identity with rules being applied. We have the digital Law to basically protect us; since most people don't follow it, the internet is becoming a very dangerous place.
    • brooke s
       
      this paragraph explains the four main topics dealing with the "Digital Law"
  • . There are so many new illegal ways to get what you want and not get caught that it is very hard to find the causes of viruses and other crimes. Some problems with Elementary students are that they can get on sites too mature for their age. The information on these sites may be inappropriate for their age group. Another problem may be that older people may harass them. There are also some problems with Middle/High school aged students. They may get on sites such as MySpace or Facebook and lie about their age, name, or any other aspects of their lives. This is not a very smart act considering that later they may be abused. They may use bad language on the internet or chat rooms. Predators can trick some teens that are unaware of such dangers into meeting up with them. Parents/guardians are unaware of what teens are looking at and/or doing and therefore cannot stop them from seeing and/or doing inappropriate things.
    • brooke s
       
      This paragraph explains the dangers on the internet.
  • Some teens download illegal music such as Limewire or Bearshare.This affects not only the artist, but record producing companies.
    • brooke s
       
      using internet wrongly could hurt other people financially, such as music artists and producers.
  • ...3 more annotations...
  • There are also some problems with adults. Using bad language, harassing and trapping youth, and the buying and selling of illegal merchandise are just some of the problems the adult generation faces today. Many adults are very sneaky and can use tricks to socialize with young adolescents. Some adults use Facebook, Myspace, or chatrooms to trick younger people into meeting up with them. These are just some of the main problems our generation of all different ages faces in this day and time.
    • brooke s
       
      More dangers of the internet.
  • Breaking the law: On the internet you will come upon websites that will be breaking the law and you can report this to "NETALERT" www.neralert.vic.a, they will contact the authorities and put a stop to the website. Another problem is copyright. There is an easy solution to this problem though, and this solution is creative commonscreative commons is a site that lets you easily make your own copyright laws for your work. There are rules like no one can make money off of your work, no one can change the appearence of your work, and many more. By making it a law that people have to use creative commons to put anything on the internet, you can reduce the amount of copyright laws broken. Making adults aware of the consequences of their actions should help the problem dramatically. Most adults break digital laws thinking, " Oh yeah, sure, I'm not going to get into any trouble." when in fact they are on the verge to getting very serious legal punishment.
    • brooke s
       
      more on breaking the internet law
  • There is a very interesting controversy brewing in Orange County, Florida. A 13-year-old girl Alisha Dean has a MySpace page that portrays herself as a 19-year-old divorced woman. She has been accused about lying to two men — Morris Williams, 22, and Darwin Mills, 24, about her age in two separate incidents. Both have been convicted and sent to jail for statutory rape. Digital Law for Middle School students not only has to deal with privacy but copyright and piracy.
    • brooke s
       
      controversy with young people lying about their age
Morgan S.

ProfHacker - The Chronicle of Higher Education - 0 views

  •  
    "Inevitably, though, they listen - and they learn." I've found that using popular music in lectures also increases my credibility among students. They see music as their territory, and are often surprised when a professor understands something they are familiar with - or think they are.-ProfHacker Personally, I think this is really cool that teachers are branching out this far just to reach us and help us learn. Some music might not be appropriate for listening to in the classroom for a subject, so that means you would have to take time and experiment. These 4 characteristics will help you realize how just how helpful doing this could really be: Vocabulary. Music can help start discussions about language use and get students thinking about the way we use words and phrases. Imagery. Music videos offer an entrée into such things as gender and social roles, fashion and sexuality, not only through sound but through the accompanying images. Cultural references. Popular songs allude to many elements of popular culture, providing a means to explore current events, celebrity culture, politics and the boundaries of taste. History. Today's music evolves from yesterday's music, which evolved from previous music in the past. Finding those connections can be eye-opening.
Morgan G

What Effects Happen When Different Cultures Come Into Contact? | eHow.com - 0 views

  •  
    Having friends with people from a different race than you, it a great thing. Not only are you learning to get along with different cultures, you are also learning different things about them and where they are from. "If a person comes from a different culture than you, they grew up understanding the world, its social norms, food, religion, language and numerous other everyday activities from both similar and different perspectives. While being in contact with people from different cultures can cause misunderstandings and conflict, it can also lead to increased opportunities for learning and new experiences. "
Blakelee H

Technology: Virtual vs. Real Life: You Choose | Psychology Today - 0 views

  • I see two fundamental differences between connected life, that is, life through the lens of technology, and real life, the one in which we live (I realize that it could be argued that tech life is the real one in which many of us live, but I see that as a problem). First, wired life is not real, meaning experiences are created by technology with the aim of approximating and simulating actual experience. The problem with this "low-resolution" life is that, though it shares similarities to real life, it lacks the high resolution and the granularity of real life. For example, email can be a wonderful means of communication, but it lacks visual input (so important to effective communication), the nuance of facial expressions and body language, and clear emotional content. Second, digital life is mediated by the technology that makes it possible. There is always something between us and our experiences, whether a text message or a Wii sports game, and, as I just noted, a great deal is lost in the translation.
  •  
    Virtual life is not real. It creates a gap in communication and takes away from actual experiences in life.
Paula Costas Alonso

Languages Online - Los meses del año - 0 views

  •  
    Crucigrama
Christine Davis

Global village slowly going digital - 1 views

  • In Africa the digital divide remains vast, despite the growing numbers of computers in schools, businesses and homes; according to the International Telecommunication Union, only 5 percent of Africa`s estimated 800 million people accessed the internet in 2007, and desktops and laptops still require a basic degree of computer literacy, even in indigenous languages.
Susan Davis

CTLT | Online Etiquette Guidelines - 0 views

  • Do Don't Be clear in your communications Use appropriate respectful language Be brief Make a good impression Be selective in what you write Be forginving of others mistakes (e.g. spelling, grammar, etc.) Ask permission before forwarding emails/discussion postings Obey copyright laws Cite others work if you use it in your communitations Remember you are not anonymous Be respectful of others Respect the privacy of others Read all postings first, write later Keep attachments small Be positive No SPAM DON'T TYPE IN ALL CAPS No flames or personal attacks Don't be rude with others No name calling Don't be arrogant Don't be disruptive to others communications No SPAM, chain letters, pornography No plagiarizing others work
  •  
    i think all of these apply to the rules of netiquette
Hayes G.

Privacy - Wikipedia, the free encyclopedia - 0 views

    • Hayes G.
       
      Privacy is something that everyone needs to have, especially on the internet.
  • Privacy (from Latin: privatus "separated from the rest, deprived of something, esp. office, participation in the government", from privo "to deprive") is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively
Brody C

Cyber-bullying - Wikipedia, the free encyclopedia - 0 views

  • The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[2] StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: "a situation when a child, tween or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child, tween or teen using text messaging, email, instant messaging or any other type of digital technology." Other researchers use similar language to describe the phenomenon.[3][4] Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation. Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target. Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators. [edit] Cyber-bullying vs. cyber-stalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition in adults, the distinction in age groups is referred to as cyberstalking or cyberharassment when perpetrated by adults toward adults. Common tactics used by cyberstalkers are to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. A pattern of repeated such actions against a target by and between adults constitutes cyberstalking.
  •  
    cyber-bullying and stalking
‹ Previous 21 - 33 of 33
Showing 20 items per page