Skip to main content

Home/ Groups/ Digiteen
Erin B

Commerce on the Internet - Personalization - 0 views

  •  
    What companies may think of when the begin to customize their pages for shoppers. "Benefits of Personalization * Form lasting and loyal relationships with customers by profiling individualized content, information, offerings and services. As it has been stated many times before, it is more profitable and easier to sell to existing customers. * Learn more about customers--learn and understand the why and how they prefer to do business with your organization. This type of customer information is key to success in business today and into the future. * Web personalization coupled with tracking provides you with a powerful tool to monitor the performance of your Web site--what works, what doesn't. Personalization can help your find out what makes your audience "click."
Erin B

Xbox Live - Wikipedia, the free encyclopedia - 0 views

shared by Erin B on 05 Oct 09 - Cached
  •  
    Xbox Live is a great example of internet commerce and freedom. "Xbox Live (trademarked as Xbox LIVE[1]) is an online multiplayer gaming and digital media delivery service created and operated by Microsoft Corporation. It is currently the only online gaming service (on consoles) that charges users a fee to play multiplayer gaming. It was first made available to the Xbox system in 2002. An updated version of the service became available for the Xbox 360 console at that system's launch in 2005. On the Windows platform, the service is named Games for Windows - Live, which makes most aspects of the system available on Windows computers. Microsoft has announced plans to extend Live to other platforms such as handhelds and mobile phones as part of the Live Anywhere initiative.[2]"
Woody H

The Digital Divide: Where We Are | Edutopia - 0 views

  • The digital divide is most commonly defined as the gap between those individuals and communities that have, and do not have, access to the information technologies that are transforming our lives.
    • Ashley M
       
      This is an excellent definition on what the digital divide is.
  •  
    shows a snapshot of our ideas about the digital divide
Joseph Edore

FEMA For Kids: Online Safety Rules For Kids - 0 views

  • Online Safety Rules For Kids I will not give out personal information such as my address, telephone number, parent's work address/telephone number, or the name and location of my school without my parents' permission. I will tell my parents right away if I come across any information that makes me feel uncomfortable. I will never agree to get together with someone I "meet" online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along. I will never send a person my picture or anything else without first checking with my parents. I will not respond to any messages that are mean or in any way makes me feel uncomfortable. It is not my fault if I get a message like that. If I do, I will tell my parents right away so that they can contact the online service. I will talk with my parents so that we can set up rules for going online. We will decide upon the time of the day that I can be online, the length of time I can be online and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
  •  
    kids safety online
Toni H.

Tips to Stop Cyberbullying | SafeTeens.com - 0 views

  •  
    stop cyberbullying
Toni H.

Microsoft Online Safety - 0 views

  •  
    protect your computer
Toni H.

Lesson Plans and Student Activity Sheets - 0 views

  •  
    safety and security\n
Toni H.

Welcome to Stay Safe Online | STAYSAFEONLINE.org - 0 views

  •  
    safety and security online
hannah h

Internet access - Wikipedia, the free encyclopedia - 0 views

    • hannah h
       
      This shows the many different ways of internet access.
  • Internet access refers to the means by which users connect to the Internet
  • Wireless connections
  • ...3 more annotations...
  • History and types of connections
  • Power line
  • Methods and venues of connection
  •  
    This page shows the many important internet access.
Ivy F.

Digital Access - Digi Teen - 0 views

  • Digital Access is the topic that talks about how many people in the world have access to technology and internet.
  • Technology needs to be aware and support electronic access for everyone to create a foundation for Digital Citizenship. Digital exclusion of any kind does not enhance the growth of human beings in an electronic society. One gender should not have preferential treatment over another.
  • about how steps should be taken to let the electronic society grow, because of the many benefits that come with internet such as education. Education is better/worse in separate parts of the world, but if every single person in the world was granted access to the internet, there would be a much higher level of educated people, which will lead to a better future. There are less economically developed countries who don't have access to technology like we do. We need to work towards a future where anyone and everyone has access to the internet.
  • ...1 more annotation...
    • Ivy F.
       
      this tells you the meaning of Digital Access
Riley F.

digiteen - Digital Health and Wellness - 0 views

  • Digital Health & Wellness is keeping teenagers away from danger of physical and psychological harm. Many problems can be contributed to electronic devices. Teenagers need to be aware of the risks of digital predators that they may meet online. It is crucial that teenagers are informed of the hazards of digital life and how to keep healthy and safe.
  •  
    what do the problems come from.
Erin B

Rent Movies Online - Free Shipping, No Late Fees - Review Price Plans, FAQs - 0 views

  • How does Netflix work? Rent what you want Simply point and click to add movies & TV episodes to your list. Get DVDs by mail plus instantly watch movies (some new releases) & TV episodes (including current season) online on your PC or Mac or streamed instantly from Netflix over the Internet right to your TV via a Netflix ready device.
  • $8.99 a month 1 DVD out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. $13.99 a month 2 DVDs out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. $16.99 a month 3 DVDs out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. Limited Plan $4.99 a month 1 DVD out at-a-time (Limit 2 per month)plus Instantly watch up to 2 hours of movies & TV episodes online on your PC or Mac.
  •  
    Netflix is another good example of internet commerce. "How does Netflix work? Rent what you want Simply point and click to add movies & TV episodes to your list. Get DVDs by mail plus instantly watch movies (some new releases) & TV episodes (including current season) online on your PC or Mac or streamed instantly from Netflix over the Internet right to your TV via a Netflix ready device. "
mitch g

Top 10 Ways to Communicate Powerfully! - 0 views

  •           Top 10 Ways to Communicate Powerfully!   Communication is more than the words we speak
  • . Be clear about what you want to express
  • ...9 more annotations...
  • Tact and good manners matter.
  • . Precision matters
  • 4. Perspective matters
  • . Diversity & Common Ground
  • Alignment & Congruency
  • Silence
  • The nature of conflict.
  • Communication contains context, text and subtext.
  • . Responsibility
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Riley F.

digiteen09-1 - Digital Health and Wellness - 0 views

  • 1. every 10-20 minutes turn your head away from the screen. 2. do not sit too close to the screen. 3. use enough light on the screen so that you can see everything more clear and make it easier for you eyes. yet too much light can lead to headaches.
  •  
    guidelines and rules,so to speak, that can help someone's health and wellness.
mitch g

Top 7 Ways to Communicate Effectively - 0 views

  • Have self-worth
  • Get interested in other people
  • Open up a person’s heart
  • ...5 more annotations...
  • Listen at least two times more than you talk
  • Diversify yourself
  • Understand that your worth never changes Follow along…In my hand I am holding a check for a million dollars. I crumble it up. It’s still worth a million dollars. I step on it, it’s still worth a million dollars, I start rubbing it on the floor with my shoe, and it’s till worth a million dollars. You are worth a lot more than a million dollars. In fact, your worth is immeasurable. Therefore, there is no such thing as ‘rejection’ as you’re always worth the same no matter what. Nobody can reject you because nobody can change your worth. Moreover, don’t be afraid of something (rejection) that doesn’t exist. Take risks, ask for what you want, and eventually you will get what you want.
  • Understand that your worth never change
  • Follow the step-ladder to success
Brandon P

Kids Rules for Online Safety (for pre-teens) | SafeKids.com - 0 views

  •  I will tell my parents right away if I come across any information that makes me feel uncomfortable.
  • 7.   I will not give out my Internet password to anyone (even my best friends) other than my parents.
  • 3.   I will never agree to get together with someone I “meet” online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along.
  • ...9 more annotations...
  • 4.   I will never send a person my picture or anything else without first checking with my parents.*  
  • 5.   I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I will tell my parents right away so that they can contact the service provider.
  • 6.   I will talk with my parents so that we can set up rules for going online. We will decide upon the time of day that I can be online, the length of time I can be online and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
  • 1.   I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission.*  
  • 8.   I will check with my parents before downloading or installing software or doing anything that could possibly hurt our computer or jeopardize my family’s privacy*
  • 9.   I will be a good online citizen and not do anything that hurts o
  • ther people or
  • is against the law.
  • 10. I will help my parents understand how to have fun and learn things online and teach them things about the Internet, computers and other technology.
  •  
    safety online
  •  
    "Kids Rules for Online Safety " This website shows kids rules that they should follow for online safety. This rules will help pre-teens learn about online safety
Riley F.

digiteen09-2 - Health & Wellness - 0 views

  • Using your computer improperly could lead to various health injuries, such as Carpal Tunnel Syndrome also known as ''computer back''. Being aware of digital health and wellness could prevent such injuries.When you make the wrong choices on the internet by bullying someone, you could get in trouble but you could also get that person you are bullying to start thinking about suicide etc.
  •  
    what might happen if you aren't careful.
  •  
    This is so true. You never know what the person is going through that you are bullying. They could be having a lot of trouble in their life, and them someone comes along and bullies them online. Then they have no safe haven because even online they are being bullied. There is know escape. It is very possible they would start having thoughts of suicide. You would sure hate to know that you are part of why somebody little kid died. I know I wouldn't be able to live with my self.
mitch g

Beyond the telephone: new ways to communicate. | Technology > Computing & Information T... - 0 views

  • will enable users to communicate in any combin
  • will enable users to communicate in any combin
  • will enable users to communicate in any combin
  • ...1 more annotation...
  • Telephone service will be customized for the individual user rather than for the location of the telephone.
d l

Mobile phone radiation and health - Wikipedia, the free encyclopedia - 0 views

  •  
    This talks about the worries about cell phone use.
« First ‹ Previous 301 - 320 Next › Last »
Showing 20 items per page