Digital Communication and Networks. Go to this website www.democraticmedia.org 10 minutes looking Pick an article Prepare a 5 slide pp Take into account.

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

Chapter 1. Type in URL to browse a web page A search engine is a software program you can use to find web sites, web pages and files stored on the internet.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Amount of daily searches on Google 150 million searches per day from 100 different countries 150 million searches per day from 100 different countries.
Your Website Chat & Live Customer Support Solution "Instant Customer GratificationSM" Brought to you by: Affordable Business Productivity and Communications.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
By: Mr Hashem Alaidaros MKT 445 Lecture 3 Title: Affiliate Marketing.
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Networking Can you find it? Apps.
CHAPTER 2 Communications, Networks, the Internet, and the World Wide Web.
INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.
Social Networking Vocabulary Cycle 2. Blog Vocabulary  blog – a personal or professional website which is updated on a regular basis with an individual’s.
What Is the Internet? Living Online Lesson 2 IC 3 Basics Ambrose, Bergerud, Busche, et. Al.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Aggregator a website or program that collects related items of content and displays them or links to them.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
The Internet and World Wide Web By: Shilpa Phanse 10/8/2008.
Computer Technology The Importance Of Technology To Your Business.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Parent Guide for staying connected. To Begin using Skyward Family Access you will need:  A computer connected to the internet  A web browser (Windows.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
-Electronic mail which allows individuals with an account to send messages to another person with an e- mail account. IRC- internet relay chat was.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Vocabulary by keidrick reeves. An aggregator; A website or program that collects related items of content and display them or links to them.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Aggregator A business organization that collates the details of an individual's financial affairs so that the information can be presented on a single.
9-1 Chapter 9 The Internet.
Online Advertising Distribution System 1. Why Digital Marketing? 2.
Create speaking avatars and use them as an effective learning tool.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
 The meaning of multimedia is the use of a variety of artistic or communicative media.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
MODULE 3 Internet Basics © Paradigm Publishing, Inc.1.
3.4 Internet Strand 3 Sara Liquori. 3.4 Internet  A global computer network providing a variety of information and communication facilities, consisting.
XP Browser and Basics COM111 Introduction to Computer Applications.
Online Safety 2.02 Remember the rules of online safety.
CYBER INTERACTION & COLLABORATION MODULE 4. LEARNING OUTCOMES By the end of this module, you should be able to: 1.Identify current digital tools for communication.
Privacy and Data Mining What Do “They” Know About You?
Chapter6: E-Commerce Web Sites HNDIT11062 – Web Development 1.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
WHAT IS INTERNET?.  Today the internet offers the opportunity to access to any information, to correspond with someone who has an account, or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Digital Communication and Networks. When people visit web sites their ◦IP address, ◦browser software, ◦operating system ◦viewing.
EDEXCEL BTEC INFORMATION & CREATIVE TECHNOLOGY Unit 1 – The online world.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Learn In Your Own Language Learn in a Few Hours Learn Without User Manuals Learn With No Computer Classes Start Working With No Installation.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Best practices for E-Commerce websites in 2017
Marking the Most of the Web’s Resources
Hotspot Shield Protect Your Online Identity
Using Apps to Get and Share Information
Internet and security.
Latest Updates on BlackHawk Mines Music : Privacy Policy
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Information Security Footprint.
Unit 27 Web Server Scripting Extended Diploma in ICT
Adult business digital marketing. What to Expect from adult digital marketing.
Privacy and Data Mining
Privacy and Data Mining
Presentation transcript:

Digital Communication and Networks

Go to this website 10 minutes looking Pick an article Prepare a 5 slide pp Take into account areas of impact (2-3) And social and ethical issues

When people visit web sites their ◦IP address, ◦browser software, ◦operating system ◦viewing habits ◦Are tracked and recorded ◦Along with their wish lists and purchase history. These details are collected and shared among advertisers without the user’s consent.

The CDD fought this along the lines of an invasion of privacy. How are the CDD (Center for Digital Democracy) and other organizations working to protect the consumers from digital advertisers? What steps can web users take to avoid sharing personnel data with web marketers?

Browse the web site (10 minutes) Find an article you like What are the areas of impact (2-3) What are the social impacts and ethical considerations Prepare a 5 page power point to be presented the next day.

Key Words , Instant messaging, Blogging, Teleconferencing Online communication Avatars Web Forum E commerce Skype P2P Bit-Torrent Processor sharing Grid computing Volunteer Computing Utility Computing Cloud computing VPN Lurkers/Monitors Wi-Fi

4 minute questions What is the difference between and instant messaging systems? When do you need a modem? What are the potential health hazards in spending hours online playing computer games? Do you think Wi-fi and other wireless communications are putting us on the edge of a computer revolution?

10 mark Questions Recording artists are divided on the issue of P2P file sharing. Discuss this issue in relation to leisure and entertainment?

What steps can web users take to avoid sharing personnel data with web marketers? Read all privacy and terms of all websites you submit data to. Avoid putting personnel information on any website. Ifs its optional leave it blank.