Unit 10 Communication, Collaboration, and Safety.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Developed by Technology Services 1:1 Laptop Initiative
The Internet.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Netiquette Rules.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
AND SPAM BY OLUWATOBI BAKARE
ICT Essential Skills. (electronic mail) Snail Mail.
Security Issues: Phishing, Pharming, and Spam
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Slide 1 Electronic Communication 2.01: Recall components of electronic communication.
Unit 9 Communication Services
Information guide.
Lesson 27 Communications and Collaboration
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Communications 1.04b.  Interactive Communications ◦ Chat rooms ◦ ◦ FTP ◦ Newsgroups and Message Boards ◦ Instant Messaging ◦ Mailing List  Web.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Electronic Communication Is the process of sending and receiving messages. Text Message File Transfer Sending messages from one computer.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.
Social Networks Cyberbullying Techno Addiction Digital footprint Spam Internet shopping The positive side Netiquette.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
NETIQUETTE GUIDELINES FOR DISTANCE EDUCATION COURSES.
1 Lesson 26 Communications and Collaboration Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Telecommunications Communication over a long distance; Distant communication.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Preparing s Using Etiquette Lesson A4-3.
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
Electronic Communication Presentation. Attachments Files you attach and send with an message.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Library Technology Hub
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Digital Citizen Project By: Frances Murphey Technology and Education.
‘ NETIQUETTE MANNERS IN CYBERSPACE. Your Student Account: Is designed for to ensure your online safety Is created for instruction and learning Is.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
– Purposes & Uses 20 – Purposes & Uses 20.
Unit 9 Communication Services.  Describe the components for electronic communication  Explain the purpose of usernames, passwords, and credentials 
Digital Citizenship.
DIGITAL CITIZENSHIP What You Should Know!.
Unit 10 Communication, Collaboration, and Safety
Unit 10 Communication, Collaboration, and Safety
Unit 11 Communication & Collaboration
Protect Your Computer Against Harmful Attacks!
Huntington Beach Public Library
CBP Program – Business Etiquette
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Communication & Collaboration
ICT Communications Lesson 5: Communicating Using
ICT Communications Lesson 3: Internet Life and Privacy
Presentation transcript:

Unit 10 Communication, Collaboration, and Safety

 Define time-shifted & real-time communication methods  Describe the features & proper use of blogging, text messaging, and chatting  Describe the features & proper use of social media sites  Identify advantages & disadvantages of electronic communication  Identify guidelines for creating effective personal and professional electronic communication

 Delay between transmission & receipt of info  Blog, , Discussion Board  What’s the purpose of a blog?  Follow netiquette ◦ Good manners & behavior over Internet

 Need real-time? ◦ Use IM, chat room, webcam  Need a paper trail? ◦ Use , text ◦ Most widely used  Distance Learning? ◦ Video Conference  Other ◦ Blog, message board, social media

 Instant or no delay  Texting/IM ◦ Conversational ◦ SMS (short messaging service)  Up to 160 characters ◦ MMS (multimedia messaging service)  Added multimedia (pictures/video/etc.)  No limit on characters but could be split up ◦ iMessage  Chatting  VoIP  Podcast  Web/video conference/video chat

 Keep in touch with friends, find people with similar interests, build relationships online  Facebook, Twitter, Instagram, YouTube, Google+, LinkedIn

 Netiquette & rules for communication  Each group will list rules for their given communication method

 Connect to people worldwide  Speed  Low cost/free  Access from various devices, cell, or computer  Transmit text, graphics, video, audio  Forwarding of messages can be done  Collaborate & share documents  You can keep track of sites visited ◦ Stored on your computer  One to one popular:

 Attachments ◦ Size may be too big/too many ◦ Virus ◦ Blocked by program  Delivery Failure ◦ Bounced  Mistyped address  Virus detected/spam filter  You’ve been blocked by receiver  Their mailbox is full

 Written record or history ◦ Can be used in legal cases ◦ You may need proof ◦ can provide that  Phone/audio conferences can’t

 Say something you wish you could take back  You get an that makes you angry ◦ Discuss with someone/calm down ◦ Write & leave out To: address until sure ◦ Save as draft & wait a day  Reply, Reply All  Proper spelling & grammar

 Include a subject ◦ Brief yet descriptive enough  Try to keep to 1 subject  Keep message short  Avoid ALL CAPS!  Limit jokes, symbols :-o  Proofread before sending  Double check the addresses ◦ DON’T EMBARRASS YOURSELF!  sent through company is NOT private

 Face to face or letter may be better than electronic  Content, tone, format must be appropriate for the audience  Respond to message promptly  Statements can harm people ◦ Flaming ◦ Cyberbullying ◦ Slander ◦ Libel

 Spam ◦ Unsolicited ads ◦ Don’t reply to junk s  Typically, an message is sent to multiple recipients who did not ask to receive it.  messages are not considered spam if a user has signed up to receive them.

 Estimated 80% of is spam  An spam is sent to 600 addresses  First large-scale spam sent to 6000 newsgroups, reaching millions of people.  billion per day  billion per day  Spam is 92% of sent

 Be careful giving out your ◦ Do not publish it online  Check privacy statements ◦ They may share your address  DO NOT reply to junk mails ◦ They’ll know they have a valid address ◦ You’ll get more junk!  Use the junk filter

 Steals your personal info ◦ Spoofed sites & s  s that appear to come from original source  Asks you to change password  Link takes you to copied site  User collects your info

 How does it arrive?  Spam: Sneaks in the back door  Phishing: Walks in the front door  How does it make its offer?  Spam: Looks bad, seems far-fetched  Phishing: Looks plausible, seems credible  What is it trying to do?  Spam: Tries to sell you something  Phishing: Tries to steal something from you

 What’s worse, spam or phishing?  Let’s Play ◦ Phishing Scams- Avoid the Bait Phishing Scams- Avoid the Bait ◦ Spam Scam Slam Spam Scam Slam ◦ Follywood Squares Follywood Squares ◦ Phishing IQ Test Phishing IQ Test

 Program written to cause disruption ◦ Attached to a file or ◦ Spreads  Worm- copies itself across network & slows it down  Time Bomb- damage at certain time/date  Trojan Horse- looks like something good, but isn’t  Protect with Antivirus software ◦ Update regularly ◦ Be careful opening s ◦ Scan attachments first

 Virus program scan all s (in & out)  Virus program subscription ◦ Schedule scan  Review s & IMs before sending ◦ ISP can filter s as well  Understand netiquette & company rules  Encrypt s with private info  Save & backup your s ◦ Remember the “paper trail”  Follow laws

 T or F. paper trails cannot be used as legal documents.  Junk is also called _______.  ______ refers o good manners when communicating electronically.  ______ tries to get/steal your private info.  ______ is just annoying!

Unit 10 Communication, Collaboration, and Safety