Q.2.1 INFORMATION FLUENCY
Information fluency can be described as skills one needs to not only to search for information , but to create useful knowledge that will help to solve problems (Global digital citizenship foundation.2016). The five As of the information fluency process are : ask, acquire, analyze, apply and assess. The information fluency process may be used to analyze this groundbreaking archeological.
STEP 1: ASK
Relevant questions must be asked in order to receive relevant information. One you should ask about it is what does species fossils belongs to and how this new information could contribute to knowledge already acquired that relates to this species. Relevant questions must be asked about the fossil.
STEP 2:ACQUIRE
Information is acquired by scientists leading the expectations. This is done by studying the fossil remains in a professional manner in order to acquire information such as how old the fossil is.
STEP 3:ANALYZE
One must analyze the information which has been acquired in order to organize and arrange it. One must make the decision whether the information acquired about the fossil is trustworthy and if it can be used to make assumptions about the theory of evaluation.
STEP 4:APPLY
One must apply the information acquired. If the information can be used by scientists to further their studies in their human species.
STEP 5:ASSESS
One must assess whether the process of analyzing the groundbreaking archeological findings could have been carried out effectively, for example by using more advanced technology to study the remains.
(Paul Young.2016)
digital divide
Tuesday, 31 May 2016
Question 5 POE
Picture one.https://www.google.co.za/search?q=digital+rights+and+responsibilities&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwiA77GOh4TNAhWLvhQKHQltAVAQsAQILg&biw=1280&bih=879#imgrc=9oty4hYc9E9nOM%3A
Every citizen has got the rights to choose.
picture two.https://www.google.co.za/search?q=digital+rights+and+responsibilities&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwiA77GOh4TNAhWLvhQKHQltAVAQsAQILg&biw=1280&bih=879#imgrc=xdRAM8HK4wWmKM%3A
https://www.google.co.za/search?q=digital+rights+and+responsibilities&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwiA77GOh4TNAhWLvhQKHQltAVAQsAQILg&biw=1280&bih=879#imgrc=doQBgYqT7bkRLM%3A
https://www.google.co.za/search?q=digital+rights+and+responsibilities&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwiA77GOh4TNAhWLvhQKHQltAVAQsAQILg&biw=1280&bih=879#imgrc=RFEqh0Ldq6yGpM%3A
https://www.google.co.za/search?q=digital+rights+and+responsibilities&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwiA77GOh4TNAhWLvhQKHQltAVAQsAQILg&biw=1280&bih=879#imgdii=RFEqh0Ldq6yGpM%3A%3BRFEqh0Ldq6yGpM%3A%3Bj-vzDI7b0RAiLM%3A&imgrc=RFEqh0Ldq6yGpM%3A
POE:QUESTION 3 THE SOCIAL ECONOMY:UNLOCKING VALUE THROUGH SOCIAL TECHNOLOGIES.
Almost every citizen that lives in any country uses social media for their own reasons.There are so many benefits as well as risks associated for individuals, corporates and communities. Risks individuals: simple things like not setting not one another privacy settings properly or liking his or her photo on social media such as Facebook or any other sorts of social media, can have a negative impact .For individuals, cyberbullying are able to exercice power over their victims as the bullying is done behind a screen instead of in person. people are also exposed to the risk of failing for online scams which may result in data or identity theft.
Communities: Social technologies can also cause a division between the community members who may be spending so much time on a cellphone instead of engaging in communication with the people around them. Corporate: social technologies can damage a business image. It can happen if ever a customer displays a bad image of the business on social media which can re result in the less of current and future customers of the business. Social technologies also present the opportunities for hackers to commit fraud as well as launch virus attacks.
Benefits
Individuals are able to connect with loved ones who mat be far away in another country through the use of social technologies.
Communities:have been able to come togr using social technologies such as Facebook. An example of this can be illustrated by the NYDA which has taken to social media to lead by example.
Corporate:businessess are able to increase their brand awareness and alsi share new market. Businesses that are portrayed in a positive way on social media are able to have many customers and their profit also increases. (Shrm.org.2016).
Bbc.co.uk (2016)
References
Shrm.org (2016).social media (online) Available at:
https://www.shrm.org/templatetools/hrga/pages/socialnetworksitepolicy.aspx (accessed 30 may 2016).
Bbc.co.uk (2016).the positives and negatives of using social network-BBC school report. (Online) Available at http://www.bbc.co.uk/schoolreport/22065333 (accessed 30 May 2016).
Communities: Social technologies can also cause a division between the community members who may be spending so much time on a cellphone instead of engaging in communication with the people around them. Corporate: social technologies can damage a business image. It can happen if ever a customer displays a bad image of the business on social media which can re result in the less of current and future customers of the business. Social technologies also present the opportunities for hackers to commit fraud as well as launch virus attacks.
Benefits
Individuals are able to connect with loved ones who mat be far away in another country through the use of social technologies.
Communities:have been able to come togr using social technologies such as Facebook. An example of this can be illustrated by the NYDA which has taken to social media to lead by example.
Corporate:businessess are able to increase their brand awareness and alsi share new market. Businesses that are portrayed in a positive way on social media are able to have many customers and their profit also increases. (Shrm.org.2016).
Bbc.co.uk (2016)
References
Shrm.org (2016).social media (online) Available at:
https://www.shrm.org/templatetools/hrga/pages/socialnetworksitepolicy.aspx (accessed 30 may 2016).
Bbc.co.uk (2016).the positives and negatives of using social network-BBC school report. (Online) Available at http://www.bbc.co.uk/schoolreport/22065333 (accessed 30 May 2016).
POE:QUESTION 8
https://www.google.co.za/search?tbs=simg:CAESlwEJdCUSr3I40UUaiwELEKjU2AQaBAgBCAkMCxCwjKcIGmIKYAgDEiivDLcOlheJHskB7hX7DqcEtg6wDOM2piG1N7woojeKNLEqtS2_1N_1kzGjAhmkaM21BUC-slJuuChN71uyTFZ_1HrwcCbMRes9USVLKPZQhGNmZNG7kjiP8OqcLwgAwwLEI6u_1ggaCgoICAESBJ22DUIM&q=digital+health+and+wellbeing&tbm=isch&sa=X&ved=0ahUKEwjup_KrhITNAhVKDsAKHdd5CscQsw4ILQ&biw=1280&bih=879#imgrc=L8oqRkhBZrQqeM%3A
https://www.google.co.za/search?tbs=simg:CAESlwEJdCUSr3I40UUaiwELEKjU2AQaBAgBCAkMCxCwjKcIGmIKYAgDEiivDLcOlheJHskB7hX7DqcEtg6wDOM2piG1N7woojeKNLEqtS2_1N_1kzGjAhmkaM21BUC-slJuuChN71uyTFZ_1HrwcCbMRes9USVLKPZQhGNmZNG7kjiP8OqcLwgAwwLEI6u_1ggaCgoICAESBJ22DUIM&q=digital+health+and+wellbeing&tbm=isch&sa=X&ved=0ahUKEwjup_KrhITNAhVKDsAKHdd5CscQsw4ILQ&biw=1280&bih=879#imgdii=L8oqRkhBZrQqeM%3A%3BL8oqRkhBZrQqeM%3A%3Bz7w4BVl4dL3bfM%3A&imgrc=L8oqRkhBZrQqeM%3A
Question 4 POE
TEN POINTS OF NETIQUETTE
1 When typing never type in all calital letters, this is shouting and rude.
2 Do not plagiarise
3 Do not talk about someone behind his or her back and keep that personal information to yourself.
4 Do not steal photographs that are not yours without the permission or acknowledging it.
5 Watch your language and do not swear
6 Be patient with others
7 Use proper quotes and always use the whole quote
8 No spamming
9 If you are using a header make sure your content matches with the header
10 Avoid the overuse of emotions
(Robert Siyallani.2016).
https://www.google.co.za/search?q=digital+etiquette&espv=2&biw=1280&bih=879&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwjHhMW9hYTNAhXqLMAKHTK6CI8QsAQIGQ#imgrc=XGoMLp7YBUnK1M%3A
https://www.google.co.za/search?q=digital+etiquette&espv=2&biw=1280&bih=879&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwjHhMW9hYTNAhXqLMAKHTK6CI8QsAQIGQ#imgrc=oKUiJL6hTxlyOM%3A
Penalties
1 If this rules are not followed, the first step would be to send the user an email stating that they are breaking rules. The next step would be to limit their access to the internet.
How to enforce and manage netiquette
- record all transactions and make surw you get a receipt for that.
- Use professional signature on documents to provide legitimacy.
- Use references
REFERENCE
About Canava.(2016) Free online poster maker.design custom posters eith canava.(online) Available at :https//www.canava.com/posters/ Accessed 30 May 2016
Go.vsb.bc.ca.2016-Digital code of conduct. (Online) available at https//go.vsb.bc.ca/schools/johndiver/about pages/Digital code of conduct. Aspx (accessed 30 May 2016).
Wikipedia. (2016) Etiquette in technology. (Online) available at :https://en.wikipedia. org/wiki/etiquette_in_technology#Netiquette (accessed 30 May 2016).
Uticaod.2016.Internet Netiquette-10 rules of nethiquitte. (Online) Available at http://www.uticnethiquette.(online) Available at:http://www.uticaod.com/article/20120907/BLOGS/309079938 (accessed 30 May 2016).
1 When typing never type in all calital letters, this is shouting and rude.
2 Do not plagiarise
3 Do not talk about someone behind his or her back and keep that personal information to yourself.
4 Do not steal photographs that are not yours without the permission or acknowledging it.
5 Watch your language and do not swear
6 Be patient with others
7 Use proper quotes and always use the whole quote
8 No spamming
9 If you are using a header make sure your content matches with the header
10 Avoid the overuse of emotions
(Robert Siyallani.2016).
https://www.google.co.za/search?q=digital+etiquette&espv=2&biw=1280&bih=879&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwjHhMW9hYTNAhXqLMAKHTK6CI8QsAQIGQ#imgrc=XGoMLp7YBUnK1M%3A
https://www.google.co.za/search?q=digital+etiquette&espv=2&biw=1280&bih=879&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwjHhMW9hYTNAhXqLMAKHTK6CI8QsAQIGQ#imgrc=oKUiJL6hTxlyOM%3A
Penalties
1 If this rules are not followed, the first step would be to send the user an email stating that they are breaking rules. The next step would be to limit their access to the internet.
How to enforce and manage netiquette
- record all transactions and make surw you get a receipt for that.
- Use professional signature on documents to provide legitimacy.
- Use references
REFERENCE
About Canava.(2016) Free online poster maker.design custom posters eith canava.(online) Available at :https//www.canava.com/posters/ Accessed 30 May 2016
Go.vsb.bc.ca.2016-Digital code of conduct. (Online) available at https//go.vsb.bc.ca/schools/johndiver/about pages/Digital code of conduct. Aspx (accessed 30 May 2016).
Wikipedia. (2016) Etiquette in technology. (Online) available at :https://en.wikipedia. org/wiki/etiquette_in_technology#Netiquette (accessed 30 May 2016).
Uticaod.2016.Internet Netiquette-10 rules of nethiquitte. (Online) Available at http://www.uticnethiquette.(online) Available at:http://www.uticaod.com/article/20120907/BLOGS/309079938 (accessed 30 May 2016).
POE:QUESTION 7
Five cyber security in South Africa.
1 Phishing scams
Email phishing is a common web hacking technique. Hackers send mass emails which legitimately appear to be from bank or an payment , which requires one to very their account information.
2 Buffer overflow
Hackers use techniques to gain access to customers information using online forms. Modern subscription-based cloud security services have been put to help identity and avoid such attacks.
3 Password hacking
One the easiest ways to fall into a trap of being hacked is when simply fails to change their password. It can be avoided by hanging all default passwords every 30-60 days.
4 Downloading free software's
By downloading free soft wares ,you are potentially putting your business at risks to malicious viruses or malware.
5 Fault injection
This technique involves hackers who searcher ways to infiltrate ones source and code to try inputting different code in an attempt to crash the system. They can be avoided by putting a strong threat immediately.
Reference
My Digital shield.(2015).5 ways hackers gain access to your data.(online)Available at: http:\\www. mydigitalshield,com Accessed 30 May 2016
http://www.timeslive.co.za/incoming/2015/04/16/hacker-thinkstock.jpg/ALTERNATES/crop_630x400/hacker+Thinkstock.JPG
https://www.google.co.za/search?q=five+cybersecurity+in+SA&espv=2&biw=1034&bih=831&source=lnms&tbm=isch&sa=X&ved=0ahUKEwia69_xgYTNAhXBIMAKHQHSCY0Q_AUIBygC&dpr=1#imgdii=cueT-DDHndJNCM%3A%3BcueT-DDHndJNCM%3A%3BcxRZnW2ow3aFVM%3A&imgrc=cueT-DDHndJNCM%3A
1 Phishing scams
Email phishing is a common web hacking technique. Hackers send mass emails which legitimately appear to be from bank or an payment , which requires one to very their account information.
2 Buffer overflow
Hackers use techniques to gain access to customers information using online forms. Modern subscription-based cloud security services have been put to help identity and avoid such attacks.
3 Password hacking
One the easiest ways to fall into a trap of being hacked is when simply fails to change their password. It can be avoided by hanging all default passwords every 30-60 days.
4 Downloading free software's
By downloading free soft wares ,you are potentially putting your business at risks to malicious viruses or malware.
5 Fault injection
This technique involves hackers who searcher ways to infiltrate ones source and code to try inputting different code in an attempt to crash the system. They can be avoided by putting a strong threat immediately.
Reference
My Digital shield.(2015).5 ways hackers gain access to your data.(online)Available at: http:\\www. mydigitalshield,com Accessed 30 May 2016
http://www.timeslive.co.za/incoming/2015/04/16/hacker-thinkstock.jpg/ALTERNATES/crop_630x400/hacker+Thinkstock.JPG
https://www.google.co.za/search?q=five+cybersecurity+in+SA&espv=2&biw=1034&bih=831&source=lnms&tbm=isch&sa=X&ved=0ahUKEwia69_xgYTNAhXBIMAKHQHSCY0Q_AUIBygC&dpr=1#imgdii=cueT-DDHndJNCM%3A%3BcueT-DDHndJNCM%3A%3BcxRZnW2ow3aFVM%3A&imgrc=cueT-DDHndJNCM%3A
POE:QUESTION 6
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4JPcVG4HCgUOooa-4QEDXaZmbpHs2u25ahYAnI2bEOT2yhnjqULiYo2N3_BQASHpeZiG2gaVYIAx1u7jYyOT4UMnHc-eyzzu8XL2S3NWK0jmoRfHKCFkcPbvo2CCLK66gaU6QMz_nxsk/s1600/digitalcitizenship.jpg
Subscribe to:
Posts (Atom)