Skip to main content

Home/ Digiteen/ Group items matching "computer" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Internet Safety - 0 views

  • A basic understanding of how Internet risks occur helps to place any Internet safety advice in context. Once you identify which factors have a greater impact on you and your family, you can adapt recommendations to your specific needs. Take a moment to consider each of the six factors that contribute to the current online environment:Lack of knowledge. Consumers of every age and at every level of technical expertise lack broad online safety education. This lack of knowledge is not limited to young people, but extends to the general population, including computer specialists who may not know any more than others about online predatory behavior.Carelessness. Even when we ‘know better,’ we make mistakes. Usually those mistakes occur when we’re tired, rushed, or don’t have a complete understanding of the risks involved. This is especially true when there is no obvious cause and effect to help us correct our behavior. When you post information that is used a month later to rob your home, you are not likely to recognize a connection between the two events. In fact, the vast majority of victims of online crime will not recognize that an action they or someone else took online made them vulnerable to a criminal act.Unintentional exposure of (or by) others. It may be a teacher, school, parent, child, friend, employer, or after-school program that provides publicly accessible information that exposes you. Perhaps your own computer (or mobile phone, or other connected device) has been compromised with spyware that enables criminals to collect your personal information. Maybe when a friend’s computer or other Internet-enabled device was lost or stolen, your information fell into the wrong hands.Technology Flaws. Online products and services can expose consumers – either because the companies who offer them fail to secure their customers’ data and are hacked, or because a company fails to build in adequate safeguards and safety messaging into their product to protect consumers.Holes in consumer protection standards. We cannot place the full burden of online safety on consumers.
3More

BPL Kids Page- Netiquette - 0 views

  • Some tips about netiquette for kids: 1. Avoid hurting someone's feelings with e-mail. Sometimes, online, people can't tell that you are joking. When you write an e-mail message, make sure the person you're sending it to will know whether you are happy, sad, angry, joking, etc. You can do this by using smileys, such as :). 2. Respect other people's online rights. People on the Internet have rights just as they do in everyday life. If someone sends you a threatening letter, or makes crank phone calls to your house, it can be annoying and sometimes very scary. The same is true on the Internet. If someone sends you e-mail which threatens you or makes you feel uncomfortable, talk to a parent or other adult right away. 3. Avoid insulting someone unless you want to start a flame war. A flame war is when angry people try to punish each other with e-mail. Sometimes this can be done by sending so many messages that a mailbox gets jammed, and sometimes this is done by sending a few very nasty messages meant to hurt someone's feelings. If you insult someone with e-mail, they will probably get angry just as they would if you insulted them face to face. 4. If someone insults you, be calm. Starting a flame war is serious business on the Net. Even if you are angry with someone, you don't need to take things any further. Try being calm, ignoring the message, or sending a polite message asking for them to explain what they meant. It may have been a misunderstanding
  • 5. Avoid "crashing" discussion groups or forums. People on the Net frequently get together online to talk about things they may have in common. This can be done on a listserv, a bulletin board, a chat group, etc. If you join the discussion just for the fun of "crashing" it, or ruining it, people will definitely get angry. 6. Respect the privacy of other people. If someone tells you something secret, it should be kept secret. This includes passwords, full names, addresses, or interests. Sharing your own password with someone else, even someone you like, is never a good idea. Passwords and personal information are private, and are never safe to share with others. 7. Be responsible online. When you are at the computer, you are in control. Avoid using the computer to harm other people. Taking things which are not yours (such as files, passwords, or credit card numbers), spreading rumors about other people online, and infecting other computers with viruses (on purpose) are examples of harming other people online. 8. Help other people learn more about the Net. Chances are someone else taught you a lot of what you know about the Internet. The Net is growing quickly, and it's difficult to keep up. Other kids, or even your parents and teachers, may need help understanding what it's all about. Try to help them if you can. Who knows? They might show you a thing or two someday!
  •  
    This is a a summary for kids for on netiquette when they are using the internet
1More

Need Mac help? Ask a technician and get answers ASAP - 0 views

  •  
    If you have a mac computer this website page will let you ask questions about your problems.
5More

Technology Concerns - 0 views

  • World Wide Web enables one to access volumes of information, earn graduate degrees on-line, submit mortgage applications, procure countless goods and services, and communicate instantaneously on a global basis. The increased use of technology in education is accompanied by concerns about technology's role in education.
  • One study by the Center for Applied Special Technology has shown that students with on-line access scored higher in the areas of information management, communication, and the presentation of ideas. According to one article the use of instructional technology offers great promise in helping "students become independent, critical thinkers, able to find information, organize and evaluate it, and then effectively express their new knowledge and ideas in compelling ways" (CAST, 2000).
  • In the CAST study the results revealed that students using on-line communication became more confident carrying out and presenting a research project over the course of the study.
  • ...1 more annotation...
  • The use of technology has also been beneficial for individuals with disabilities. I have personal knowledge of a young man with A.L.S. who slowly lost his ability to communicate verbally and used the computer as a communication tool. Later as the disease progressed he utilized additional technology which allowed him to use his eye movement as a type of input device.
  •  
    study showing that students with access scored higher in areas of information management, communication, and the presentation of ideas. "students become independent, critical thinkers, able to find information, organize and evaluate it, express knowledge and ideas in compelling ways" confidence young man with ALS and technology allowed him to communicate using the computer; later, used eye movement as a type of input device
1More

Computer Online Help - 0 views

  •  
    This website will help you with your basic computer problems.
2More

10 Ways Google Recommends You Stay Safe Online | Edudemic - 0 views

  • Passwords are the first line of defense against cyber criminals. It’s important to pick strong passwords that are different for each of your important accounts and to change them regularly. Here are some ideas to help create strong passwords. Use a unique password for all your important accounts. Use unique passwords for your accounts, especially important accounts like email and online banking. You are likely to have dozens of accounts across the web, and you cannot guarantee the security of all of them. Criminals target sites that lack strong security, in order to harvest usernames and passwords that they test against other popular sites. When you use the same password across the web, a cyber criminal can learn the password from a less secure site and then use that password to compromise your important accounts. Use a long password The longer your password is, the harder it is to guess. There are almost one quintillion possible 10-character passwords (that’s 4,000 times as many possibilities as if your password only has eight characters) … and that’s if you only use numbers and letters. Use a password with a mix of letters, numbers, and symbols Using numbers, symbols and mixed-case letters in your password increases the difficulty of guessing or cracking your password. For example, there are more than 6 quadrillion possible variations for an eight-character password with numbers, symbols, and mixed-case letters – 30,000 times more variations than an eight-character password with only lowercase letters. Try using a line from a song, film or play Some passwords are easy to guess or crack: Simple words or phrases like “password” or “letmein,” keyboard patterns such as “qwerty” or “qazwsx,” patterns such as “abcd1234” or personal information like your birthday or street name.So choose a combination of letters, numbers, or symbols to create a unique password that’s unrelated to your personal information.One idea you can try is to choose a line from your favorite song, film or play, like “To be or not to be: That is the question.” Then use numbers, symbols and mixed-case letters to recreate it: “2bon2bT1tq” is a password with quadrillions of variations. The more unusual the phrase you choose the better!Or you could pick a random word or phrase, and insert letters and numbers into the beginning, middle, and end, such as “sPo0kyh@ll0w3En.” Make sure your password recovery options are up-to-date and secure Make sure your recovery email address is up to date so that you can receive emails in case you need to reset your password. Sometimes you can also add a phone number to receive password reset codes via text message. Additionally, many websites (including Google Accounts) will ask you to choose a question to verify your identity if you ever forget your password. If you’re able to create your own question, try to come up with a question that has an answer only you would know. Try to find a way to make your answer unique – you can do this by using some of the tips above – so that even if someone guesses the answer, they won’t know how to enter it properly. Keep your password reminders in a secret place that isn’t easily visible Don’t leave notes with your passwords in plain site, on your computer or desk. If you do decide to save your passwords in a file on your computer, create a unique name for the file so people don’t know what’s inside. Avoid giving the file an obvious name, such as “my passwords.” If you have a difficult time remembering multiple passwords, a trusted password manager may be a good solution. Spend a few minutes checking out the reviews and reputations of these services.
  •  
    To stay safe you need a good password. If you follow these rules when making your password you will have a far less chance of cyber crimes.
4More

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
4More

Cyber Bullying Statistics - Bullying Statistics - 0 views

  • Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs.
  • Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Mean, hurtful comments and spreading rumors are the most common type of cyber bullying Girls are at least as likely as boys to be cyber bullies or their victims Boys are more likely to be threatened by cyber bullies than girls Cyber bullying affects all races Cyber bullying victims are more likely to have low self esteem and to consider suicide
  • Talks to teens about cyber bullying, explaining that it is wrong and can have serious consequences. Make a rule that teens may not send mean or damaging messages, even if someone else started it, or suggestive pictures or messages or they will lose their cell phone and computer privileges for a time. Encourage teens to tell an adult if cyber bullying is occurring. Tell them if they are the victims they will not be punished, and reassure them that being bullied is not their fault. Teens should keep cyber bullying messages as proof that the cyber bullying is occurring. The teens' parents may want to talk to the parents of the cyber bully, to the bully's Internet or cell phone provider, and/or to the police about the messages, especially if they are threatening or sexual in nature. Try blocking the person sending the messages. It may be necessary to get a new phone number or email address and to be more cautious about giving out the new number or address. Teens should never tell their password to anyone except a parent, and should not write it down in a place where it could be found by others. Teens should not share anything through text or instant messaging on their cell phone or the Internet that they would not want to be made public - remind teens that the person they are talking to in messages or online may not be who they think they are, and that things posted electronically may not be secure. Encourage teens never to share personal information online or to meet someone they only know online. Keep the computer in a shared space like the family room, and do not allow teens to have Internet access in their own rooms. Encourage teens to have times when they turn off the technology, such as at family meals or after a certain time at night. Parents may want to wait until high school to allow their teens to have their own email and cell phone accounts, and even then parents should still have access to the accounts.
  •  
    Many people get Cyber Bulling over online activities. People need to make their websites and pages private and know how to use it. "Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs."
1More

Private Internet Browsing - Activating Private Internet Browsing Mode in Your Favorite ... - 0 views

  •  
    Many ways to help you be safe on the internet.   "he term private Internet browsing encompasses a wide array of precautions that Web surfers can take to ensure that their activity on the Web cannot be traced. Motives for private Internet browsing are plenty, with both privacy and safety at the forefront of many Internet users' minds. Whatever the inspiration for browsing anonymously may be, the bottom line is that many people want to avoid leaving tracks behind. Proxy Servers for Private Internet Browsing Private Internet browsing can involve utilizing firewalls and proxy servers to prevent those in the outside world from viewing Web surfing activity, including rogue individuals as well as Internet Service Providers and even the government. These types of private Internet browsing measures are commonly used in countries where access is limited as well as at the workplace or on campus. Private Internet Browsing Within the Web Browser For many Web surfers, however, private Internet browsing involves clearing their tracks from others who may have access to the same computer or mobile device that they're currently using. Most popular Web browsers offer ways to browse anonymously, with no history or other private data such as cache or cookies left behind at the end of your browsing session. How to Activate Private Internet Browsing The methods for activating this type of private Internet browsing differ across browsers, operating systems, and device types. The following step-by-step tutorials teach you how to browse anonymously in the browser of your choice."
1More

Internet Use Raises Privacy Concerns - 0 views

  •  
    We need to be more alert about who we chat with how we use the internet.  "The Internet brings us great websites full of information and entertainment, and email and chat have revolutionized communication. But there's a dark side, too, as Internet users are increasingly concerned about how much of their personal information they're giving up in exchange. VOA's Art Chimes reports on the debate over Internet privacy. As more and more people are realizing, we often reveal a lot of information about ourselves when we go online, information we may not realize we're disclosing, but which advertisers and commercial websites can use to sell us goods and services. Sometimes the information is openly requested: you register on a website and you fill out a form. Next time you log into the site, you find ads for sporting equipment if you registered as a young man, or maybe cosmetics if you're a woman. Other times, websites and advertisers seem to magically know our interests. They can do this because of cookies, little text files created on your computer that contain information left there by the websites you visit"
2More

My Struggle with Internet Addiction and How I Will Overcome It - 0 views

  • Awful things Internet addiction has done to me:- Internet addiction has made me a very lazy and unwilling fellow who would usually take 2-3 hours to start the day off.- Internet addiction has caused me great amounts of stress and anxiety. (For example, I have lots of pornographic material scattered around my two laptops and I start getting paranoid when people ask me if they can use my computer to check something.) The death of a loved one 2 years ago only made my situation worse.- Internet addiction has prevented me from exercising and staying fit.- Internet addiction has put lots of strain into my eyes, from constantly staring at the monitor for about 6+ hours a day. (Not natural.)- Internet addiction has made me less social with my friends and made me feel more impatient (like when I would wait longer than 5-10 minutes for a friend on an instant messenger program to respond to me and I'd start wondering if I said something that could have offended them or if I am bugging them too much).- Internet addiction has turned me away from playing some of my favorite video game consoles (I grew up with the Super Nintendo and still have it). Thankfully, at least I never got into MMORPGs or any other online game services. I mainly emulated.- Internet addiction has made me very obsessed with atheism and religion. Of course I am glad to no longer subscribe to any organized religion (I hold no grudges against those who do, just the ones that try to shove their beliefs down others' throats because I find it very inhumane), but I don't want to continue obsessing over it; it makes me feel very depressed. I don't want this.- Internet addiction has made me very untidy. Currently I have 4 stacks of plates, 2 stacks of cereal bowls, 3 stacks of 8 oz glass cups, and 2-3 forks and knives and 7 spoons. I have bits of shed hair (I have long, frizzy hair) here and there on the carpet and it is quite embarrassing!- Internet addiction has made me procrastinate on class assignments and fail school indubitably. - Internet addiction has wasted so much of my precious, precious time that could have been used for other things that are more worthwhile and productive. In fact, my one-year-and-a-half Facebook addiction has worsened me to the point where I just had to delete my account once and for all.- Internet addiction has made me forget about the usefulness and convenience of doing real-life alternatives, such as mailing out letters/post cards to friends instead of just refreshing my e-mail inbox every 1 hour when I am awake, or listening to my massive cassette/CD/record collection instead of just sitting around my computer listening to MP3s.So you see, I am in a SERIOUS need of a change! I am sick and tired of living this sad and pathetic lifestyle. The stupidity of sites like 4chan inspired me to leave the Internet behind.
  •  
    A list of negative effects the internet has played on one person's life. This ranges from physical pain to mental disorder.
2More

Culture Clash on the Changing Internet - 0 views

  • An old attitude that makes it difficult to create harmony between the old generations and the new is the behavior of more experienced users towards `newbies' on the net. In the past, one could expect other users to be somewhat familiar with computing environment. People who asked too many `stupid' questions were ostracized and `flamed.' Now the net must handle a gigantic influx of users with less computer experience, who will ask thousands of questions in their exploration of the obscure operations of the Internet.
  •  
    This tells about how different attitudes can effect whether there is conflict or not.
2More

The Facts on Literacy - 0 views

  •  
    "The National Literacy Act of 1991 defines literacy as "an individual's ability to read, write, and speak in English and compute and solve problems at levels of proficiency necessary to function on the job and in society, to achieve one's goals, and to develop one's knowledge and potential." Research indicates that 17-20% of our nation's children experience substantial difficulties in learning to read, and that more than a third of students in fourth grade (and nearly 70% in some low-income urban schools) read below the basic level. Children who are not fluent readers by fourth grade are likely to continue struggling with reading into adulthood, making early identification and intervention of reading problems essential to a child's success in both school and society."
  •  
    This stresses the importance of childrens literacy & fluency.
2More

MySecureCyberspace: File Sharing - 0 views

  •  
    File sharing is when you share computer data or space with others on a network. File sharing allows multiple users to read, modify, copy or print the same file. Different users may have different levels of access to files on the network.
  •  
    Parents need to watch what they put on the internet and what they share with other people.
2More

download - 0 views

  •  
    "The second wave industrial revolution was associated with broad effects to expand the literacy in schools, libraries, so as to incorporate people in to work and life. Policymakers, scholars, public institutions and grassroots movements are striving for broad computer literacy. "
  •  
    This is about the literacy throughout technology, schools, and the public.
1More

About The Licenses - Creative Commons - 0 views

  •  
    Creative commons are a form of licences that allow for many things to happen with 6 separate licenses. Many for only reproducing and redistributing the product non-commercially, though some can be used for commercial purposes. These license allow for anybody to share reproduce and redistribute the product as long as credit is given to the owner/creator of the copyright. There is three ways they can be read by lawyers and lawmakers the everyday person and machines like computers. This allows for programs to recognize them.
1More

Privacy News Articles - 1 views

  •  
    These articles are about how the government can track what your doing online and what your doing on your cell phones. They can see whats on your computer and whats on your cell phone.
1More

Online Safety Tips | Protect Kids and Family Online | Microsoft Security - 2 views

  •  
    This website has tips to stay safe online and protect your privacy. Tips include defending your computer, protecting sensitive personal information, creating strong passwords and keeping them secret, taking charge of your online safety and reputation, use social networks more safely, and talking to kids about staying safer online.
2More

Internet and Computer Addiction: Signs, Symptoms, and Treatment - 1 views

  • Each person’s Internet use is different. You might need to use the Internet extensively for your work, for example, or you might rely heavily on social networking sites to keep in touch with faraway family and friends. Spending a lot of time online only becomes a problem when it absorbs too much of your time, causing you to neglect your relationships, your work, school, or other important things in your life. If you keep repeating compulsive Internet behavior despite the negative consequences in your offline life, then it’s time to strike a new balance
  •  
    social awareness health -habbits of managing online activity
1More

Oregon Pioneers iPads as Vote-Recording Machines | Gadget Lab | Wired.com - 0 views

  •  
    This talks about ipad and how an old man said this is a lot simpler for me then a big compute. 
« First ‹ Previous 61 - 80 of 160 Next › Last »
Showing 20 items per page