Skip to main content

Home/ Groups/ Digiteen
Riley F.

digiteen09-1 - Digital Health and Wellness - 0 views

  • 1. every 10-20 minutes turn your head away from the screen. 2. do not sit too close to the screen. 3. use enough light on the screen so that you can see everything more clear and make it easier for you eyes. yet too much light can lead to headaches.
  •  
    guidelines and rules,so to speak, that can help someone's health and wellness.
mitch g

Top 10 Ways to Communicate Powerfully! - 0 views

  •           Top 10 Ways to Communicate Powerfully!   Communication is more than the words we speak
  • . Be clear about what you want to express
  • ...9 more annotations...
  • Tact and good manners matter.
  • . Precision matters
  • 4. Perspective matters
  • . Diversity & Common Ground
  • Alignment & Congruency
  • Silence
  • The nature of conflict.
  • Communication contains context, text and subtext.
  • . Responsibility
Ivy F.

Digital Access - Digi Teen - 0 views

  • Digital Access is the topic that talks about how many people in the world have access to technology and internet.
  • Technology needs to be aware and support electronic access for everyone to create a foundation for Digital Citizenship. Digital exclusion of any kind does not enhance the growth of human beings in an electronic society. One gender should not have preferential treatment over another.
  • about how steps should be taken to let the electronic society grow, because of the many benefits that come with internet such as education. Education is better/worse in separate parts of the world, but if every single person in the world was granted access to the internet, there would be a much higher level of educated people, which will lead to a better future. There are less economically developed countries who don't have access to technology like we do. We need to work towards a future where anyone and everyone has access to the internet.
  • ...1 more annotation...
    • Ivy F.
       
      this tells you the meaning of Digital Access
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Erin B

Rent Movies Online - Free Shipping, No Late Fees - Review Price Plans, FAQs - 0 views

  • How does Netflix work? Rent what you want Simply point and click to add movies & TV episodes to your list. Get DVDs by mail plus instantly watch movies (some new releases) & TV episodes (including current season) online on your PC or Mac or streamed instantly from Netflix over the Internet right to your TV via a Netflix ready device.
  • $8.99 a month 1 DVD out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. $13.99 a month 2 DVDs out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. $16.99 a month 3 DVDs out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. Limited Plan $4.99 a month 1 DVD out at-a-time (Limit 2 per month)plus Instantly watch up to 2 hours of movies & TV episodes online on your PC or Mac.
  •  
    Netflix is another good example of internet commerce. "How does Netflix work? Rent what you want Simply point and click to add movies & TV episodes to your list. Get DVDs by mail plus instantly watch movies (some new releases) & TV episodes (including current season) online on your PC or Mac or streamed instantly from Netflix over the Internet right to your TV via a Netflix ready device. "
Riley F.

digiteen - Digital Health and Wellness - 0 views

  • Digital Health & Wellness is keeping teenagers away from danger of physical and psychological harm. Many problems can be contributed to electronic devices. Teenagers need to be aware of the risks of digital predators that they may meet online. It is crucial that teenagers are informed of the hazards of digital life and how to keep healthy and safe.
  •  
    what do the problems come from.
hannah h

Internet access - Wikipedia, the free encyclopedia - 0 views

    • hannah h
       
      This shows the many different ways of internet access.
  • Internet access refers to the means by which users connect to the Internet
  • Wireless connections
  • ...3 more annotations...
  • History and types of connections
  • Power line
  • Methods and venues of connection
  •  
    This page shows the many important internet access.
Riley F.

123digitalcitizenship - Digital Health and Wellness - 1 views

  • Digital Citizenship is a term used to describe the proper use of the internet by different people or groups. It sets guidelines for appropriate utilization of web tools and websites to ensure a safe online-environment. One of the nine vital branches of Digital Citizenship. It is a word used to describe the mental and physical well-being when using the internet. This may include: ergonomics, the physical well-being and the posture of the body while using the internet and safety of important body parts, such as the eyes. This branch of Digital Citizenship also emphasizes the potential risks and dangers when using online websites, such as hackers and pedophiles.
  •  
    This web site gives me at of good info.... along with a good and proper definition.
  •  
    this is an overview of what digital health and wellness is.
d l

Proper Posture and Spine Health for Computer Users | Health | Geniusbeauty.com - Blog f... - 0 views

  • Itโ€™s very important for your health to keep the right posture when youโ€™re in front of a computer.
  • Incorrect posture contributes to spine syndrome and lots of other problems, which many PC users have.
  • adjust your chair properly.
  • ...9 more annotations...
  • backrest of the chair should support your lower back, but at the same time it shouldnโ€™t be fastened firmly to let you move easily.
  • A headrest would help to release the tension in your neck muscles.
  • Hold your head erect with a slight slope forward.
  • When you are typing
  • When you are typing, make sure that your shoulders are relaxed and your elbows are bent at right angle.
  • Ideally a chair or an arm-chair should have a soft seat, your knees should be bent at right angle and your feet should be flat on the floor. If children use your computer, you should put a small stool under your table.
  • , place the monitor at a distance of your armโ€™s length.
  • , donโ€™t let yourself sit in front of your pc for hours.
  • Find time to stand up from time to time and make some simple exercises: bending, squatting โ€“ stretch your muscles.
  •  
    This tells you what the proper posture while on the computer.
Erin B

Xbox Live - Wikipedia, the free encyclopedia - 0 views

shared by Erin B on 05 Oct 09 - Cached
  •  
    Xbox Live is a great example of internet commerce and freedom. "Xbox Live (trademarked as Xbox LIVE[1]) is an online multiplayer gaming and digital media delivery service created and operated by Microsoft Corporation. It is currently the only online gaming service (on consoles) that charges users a fee to play multiplayer gaming. It was first made available to the Xbox system in 2002. An updated version of the service became available for the Xbox 360 console at that system's launch in 2005. On the Windows platform, the service is named Games for Windows - Live, which makes most aspects of the system available on Windows computers. Microsoft has announced plans to extend Live to other platforms such as handhelds and mobile phones as part of the Live Anywhere initiative.[2]"
mitch g

Technology reshapes the ways we communicate. - Free Online Library - 0 views

  • We will continue to see, for example, incredible breakthroughs in miniaturization minยทiยทaยทturยทize  tr.v. minยทiยทaยทturยทized, minยทiยทaยทturยทizยทing, minยทiยทaยทturยทizยทesTo plan or make on a greatly reduced scale.min ..... Click the link for more information. and chip memory. Chip memory is evolving from about 20 million transistors on a 16-megabit
  • New telecommunications technologies are revolutionizing the ways we share information
  • Other forms of memory also are constantly expanding. A 5.5-inch CD-ROM CD-ROM: see compact disc. CD-ROM in full compact disc read-only memoryType of computer storage medium that is read optically (e.g., by a laser). ..... Click the link for more information. can already store up to 65,000 pages of documents - about 30 yards of books.
  • ...7 more annotations...
  • six of the key technological components of
  • this revolution are digital systems, fibre optics fibre opticsThin transparent fibres of glass or plastic that transmit light through their length by internal reflections, used for transmitting data, voice, and images. ..... Click the link for more information., new wireless technologies, satellite
  • technologies, new levels of network intelligence and multi-media networking.
  • The ongoing push toward all-digital networks is making it possible to send any type of
  • information - sound, image, data and full-motion video Video transmission that changes the image 30 frames per second (30 fps). Motion pictures are run at 24 fps, which is the minimum frequency required to eliminate the perception of moving frames and make the images appear visually fluid to the eye. ..... Click the link for more information. -
  • Video conferencing See videoconferencing. (communications) video conferencing - A discussion between two or more groups of people who are in different places but can see and hear each other using electronic communications. ..... Click the link for more information., one of the burgeoning areas in the industry, is expected to grow by more than 25 per cent annually in Canada in the next four years.
  • New wireless technologies are also providing new levels of reachability and mobility when and wherever the communication of information is desired or neede
alex c

Internet Slang, Netiquette, Lingo, Acronyms - 1 views

  • Ironically, the origin of the smiley face is a highly controversial debate. The most accepted belief is that graphic artist Howard Ball of Worcester, MA, created the smiley when asked to design a morale boosting campaign. He started with just the smile, but soon realized disgruntled employees might turn it upside down to a frown, so he added eyes.  Other Emoticons:   :) The classic smile. "I'm happy" or "my meaning is positive." Some Word programs will automatically turn this into a graphic after hitting return.   ;)   The wink. "Just kidding," sarcasm, etc.    :-)  Smiley with a nose.   :-D     Laughing. A slightly goofier version of the smiley, this one signifies a particularly happy mood or a laughing response.   8)       Glasses or sunglasses. The cool smiley.  :p       Tongue hanging out. Self-explanatory.    :(  The frown. Disappointed or sad.    >:  Angry face.  :x        Sick face.  :O       Embarassed or shocked.  0:-)     Angel with halo. "Who, me?"  >:-)  Evil grin.    2.  Chat Acronyms.  Verdan
  • Glasses or sunglasses. The cool smiley.  :p       Tongue hanging out. Self-explanatory.    :(  The frown. Disappointed or sad.    >:  Angry face.  :x        Sick face.  :O       Embarassed or shocked.  0:-)     Angel with halo. "Who, me?"  >:-)  Evil grin. 
  • These abbreviations of commonly used chat phrases are often used in e-mail too. Although they can be great timesavers, it's easy to lose people if you overuse them.  ASAP As Soon As Possible BFN Bye For Now BTW By The Way DIY Do It Yourself FAQ Frequently Asked Questions FYA For Your Amusement FYI For Your Information K Okay KISS Keep It Simple, Stupid LMHO Laughing My Head Off LOL Laughing Out Loud OBO Or Best Offer OTL Out To Lunch OTFL On The Floor Laughing THX Thanks TIA Thanks In Advance TTFN Ta Ta For Now
  •  
    This teaches you what abbreviations mean and what emoticons are.
brooke s

digiteen2008 - Digital Law - 0 views

  • This is the electronic responsibility for actions which says if something is ethical or unethical. The responsibility of the digital law deals with the ethics of technology as a whole. Digital Law deals with four main topics: copyright, privacy, ethical issues, and piracy. Unethical use of computers can form into theft or crime like piracy. People that are ethical in the use of their computers may actually be the ones being hurt by those who are not following these protective laws. A student should not be allowed to mess with other peoples work or identity with rules being applied. We have the digital Law to basically protect us; since most people don't follow it, the internet is becoming a very dangerous place.
    • brooke s
       
      this paragraph explains the four main topics dealing with the "Digital Law"
  • . There are so many new illegal ways to get what you want and not get caught that it is very hard to find the causes of viruses and other crimes. Some problems with Elementary students are that they can get on sites too mature for their age. The information on these sites may be inappropriate for their age group. Another problem may be that older people may harass them. There are also some problems with Middle/High school aged students. They may get on sites such as MySpace or Facebook and lie about their age, name, or any other aspects of their lives. This is not a very smart act considering that later they may be abused. They may use bad language on the internet or chat rooms. Predators can trick some teens that are unaware of such dangers into meeting up with them. Parents/guardians are unaware of what teens are looking at and/or doing and therefore cannot stop them from seeing and/or doing inappropriate things.
    • brooke s
       
      This paragraph explains the dangers on the internet.
  • Some teens download illegal music such as Limewire or Bearshare.This affects not only the artist, but record producing companies.
    • brooke s
       
      using internet wrongly could hurt other people financially, such as music artists and producers.
  • ...3 more annotations...
  • There are also some problems with adults. Using bad language, harassing and trapping youth, and the buying and selling of illegal merchandise are just some of the problems the adult generation faces today. Many adults are very sneaky and can use tricks to socialize with young adolescents. Some adults use Facebook, Myspace, or chatrooms to trick younger people into meeting up with them. These are just some of the main problems our generation of all different ages faces in this day and time.
    • brooke s
       
      More dangers of the internet.
  • Breaking the law: On the internet you will come upon websites that will be breaking the law and you can report this to "NETALERT" www.neralert.vic.a, they will contact the authorities and put a stop to the website. Another problem is copyright. There is an easy solution to this problem though, and this solution is creative commonscreative commons is a site that lets you easily make your own copyright laws for your work. There are rules like no one can make money off of your work, no one can change the appearence of your work, and many more. By making it a law that people have to use creative commons to put anything on the internet, you can reduce the amount of copyright laws broken. Making adults aware of the consequences of their actions should help the problem dramatically. Most adults break digital laws thinking, " Oh yeah, sure, I'm not going to get into any trouble." when in fact they are on the verge to getting very serious legal punishment.
    • brooke s
       
      more on breaking the internet law
  • There is a very interesting controversy brewing in Orange County, Florida. A 13-year-old girl Alisha Dean has a MySpace page that portrays herself as a 19-year-old divorced woman. She has been accused about lying to two men โ€” Morris Williams, 22, and Darwin Mills, 24, about her age in two separate incidents. Both have been convicted and sent to jail for statutory rape. Digital Law for Middle School students not only has to deal with privacy but copyright and piracy.
    • brooke s
       
      controversy with young people lying about their age
Erin B

Commerce on the Internet - Personalization - 0 views

  •  
    What companies may think of when the begin to customize their pages for shoppers. "Benefits of Personalization * Form lasting and loyal relationships with customers by profiling individualized content, information, offerings and services. As it has been stated many times before, it is more profitable and easier to sell to existing customers. * Learn more about customers--learn and understand the why and how they prefer to do business with your organization. This type of customer information is key to success in business today and into the future. * Web personalization coupled with tracking provides you with a powerful tool to monitor the performance of your Web site--what works, what doesn't. Personalization can help your find out what makes your audience "click."
Ashley M

Plagiarism.org : Learning Center : Plagiarism Definitions, Tips on avoiding Plagiarism,... - 0 views

  • According to the Merriam-Webster Online Dictionary, to "plagiarize" means to steal and pass off (the ideas or words of another) as one's own to use (another's production) without crediting the source to commit literary theft to present as new and original an idea or product derived from an existing source.
    • Ashley M
       
      This information helps us learn what plagiarism is and how it can be a problem in schools.
Ivy F.

Shaping Youth ยป Grown Up Digital: Don Tapscott's Latest On 'Generation Net' - 0 views

  • hat digital premise opens up the debate for the 21st century tug-o-war of perception between what Wikinomics author Don Tapscott of Grown Up Digital calls the โ€˜smartest generationโ€™ and what his nemesis, Mark Bauerlein of Emery College calls โ€œThe Dumbest Generationโ€ in his recent book by the same name.
Riley F.

digiteen2008 - Digital Health and Wellness - 2 views

  • Digital Health and Wellness is how to stay physically fit.
  • . A few months ago a train wrecked because the driver was texting and not paying attention to how fast he was going
  • I think that alot of middle aged students would be interested in playing the nintendo wii fit.
  • ...14 more annotations...
  • Just a bit of advice for the middle and high school students, put the phone on silent and leave it alone while you are driving because you can really get hurt!
  • Also you can still teach kids to sit correctly when your on a computer
  • So they are just naturally harder to teach than anyone else
  • one of the teachers said that walking into a room without computers was like walking into a desert.
  • This video is all about minor cases of what can and will happen if you text and drive.
  • Here are some pictures of some of the worse things that can happen.
  • Middle school and high school students are more likely to text and drive because they don't know all about the dangers of texting and driving
    • d l
       
      This is true. Texting and driveng is very dangerous.
  • A good saying for this is," I hear and I forget, I see and I remember, I do and I understand." Confucious.
    • d l
       
      I agree.
  • One is that they are more affected by predators
  • The second is WE have to keep them from getting too much computer consumption
  • Doctors say kids should only get 1 or 2 hours of "screen time" a day.
  • People of all ages are becoming more and more dependent on computers and mobile phones.
  • Digital health and wellness is about staying fit and healthy I think. People that spend to much on computers or use there mobile phones to much should cut down heaps.
  • A. Elementary Aged Students Don't let them stay on the computer for extended amounts of time, don't let them get on Myspace or Facebook, and when they are on the computer the parents should always be watching them no matter what. B. Middle / High School Aged Students The middle school students should be allowed a little more freedom but by the same token i don't think that they should be allowed to get on Myspace or Facebook. Those things will bring a lot more trouble than anything else. Do you think that the people on Myspace are looking for a good christian page or a page that has a lot of bad pictures on it? I don't have a Myspace or Facebook and truly I don't want one. C. Adults Adults should be allowed to do what they want. I mean really what can we do to stop them? Nothing!! We can try all that we want to but adults get more addicted and are harder to get out of that habit. Then again I think that the adults will be the best influence for the young kids and if they will try and spread the word for the kids they can do anything for them that they want to
  •  
    This is last years info about my topic.
  •  
    This is the page from last year.
  •  
    this states what digital health and wellness is and it gives an example of what the author means.
Ivy F.

The Great Beyond: Data integrity in the digital age - 0 views

  • With the emergence of web-based lab notebooks, digital image โ€œenhancementโ€, and the quick and easy (and possibly dirty) generation and dissemination of colossal amounts of data, itโ€™s becoming increasingly clear that technology provides new challenges to maintaining scientific integrity
Brody C

Cyber-bullying - Wikipedia, the free encyclopedia - 0 views

  • The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[2] StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: "a situation when a child, tween or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child, tween or teen using text messaging, email, instant messaging or any other type of digital technology." Other researchers use similar language to describe the phenomenon.[3][4] Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation. Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target. Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators. [edit] Cyber-bullying vs. cyber-stalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition in adults, the distinction in age groups is referred to as cyberstalking or cyberharassment when perpetrated by adults toward adults. Common tactics used by cyberstalkers are to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. A pattern of repeated such actions against a target by and between adults constitutes cyberstalking.
  •  
    cyber-bullying and stalking
d l

Computer Health Hazards: Eyestrain, Carpal Tunnel Syndrome, and Neck/Back Pain - 0 views

  •  
    This website tells you of some of the problems from the computer and how to help with them.
« First ‹ Previous 1181 - 1200 of 1444 Next › Last »
Showing 20 items per page