Q.2.1 INFORMATION FLUENCY
Information fluency can be described as skills one needs to not only to search for information , but to create useful knowledge that will help to solve problems (Global digital citizenship foundation.2016). The five As of the information fluency process are : ask, acquire, analyze, apply and assess. The information fluency process may be used to analyze this groundbreaking archeological.
STEP 1: ASK
Relevant questions must be asked in order to receive relevant information. One you should ask about it is what does species fossils belongs to and how this new information could contribute to knowledge already acquired that relates to this species. Relevant questions must be asked about the fossil.
STEP 2:ACQUIRE
Information is acquired by scientists leading the expectations. This is done by studying the fossil remains in a professional manner in order to acquire information such as how old the fossil is.
STEP 3:ANALYZE
One must analyze the information which has been acquired in order to organize and arrange it. One must make the decision whether the information acquired about the fossil is trustworthy and if it can be used to make assumptions about the theory of evaluation.
STEP 4:APPLY
One must apply the information acquired. If the information can be used by scientists to further their studies in their human species.
STEP 5:ASSESS
One must assess whether the process of analyzing the groundbreaking archeological findings could have been carried out effectively, for example by using more advanced technology to study the remains.
(Paul Young.2016)
Tuesday, 31 May 2016
Question 5 POE
Picture one.https://www.google.co.za/search?q=digital+rights+and+responsibilities&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwiA77GOh4TNAhWLvhQKHQltAVAQsAQILg&biw=1280&bih=879#imgrc=9oty4hYc9E9nOM%3A
Every citizen has got the rights to choose.
picture two.https://www.google.co.za/search?q=digital+rights+and+responsibilities&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwiA77GOh4TNAhWLvhQKHQltAVAQsAQILg&biw=1280&bih=879#imgrc=xdRAM8HK4wWmKM%3A
https://www.google.co.za/search?q=digital+rights+and+responsibilities&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwiA77GOh4TNAhWLvhQKHQltAVAQsAQILg&biw=1280&bih=879#imgrc=doQBgYqT7bkRLM%3A
https://www.google.co.za/search?q=digital+rights+and+responsibilities&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwiA77GOh4TNAhWLvhQKHQltAVAQsAQILg&biw=1280&bih=879#imgrc=RFEqh0Ldq6yGpM%3A
https://www.google.co.za/search?q=digital+rights+and+responsibilities&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwiA77GOh4TNAhWLvhQKHQltAVAQsAQILg&biw=1280&bih=879#imgdii=RFEqh0Ldq6yGpM%3A%3BRFEqh0Ldq6yGpM%3A%3Bj-vzDI7b0RAiLM%3A&imgrc=RFEqh0Ldq6yGpM%3A
POE:QUESTION 3 THE SOCIAL ECONOMY:UNLOCKING VALUE THROUGH SOCIAL TECHNOLOGIES.
Almost every citizen that lives in any country uses social media for their own reasons.There are so many benefits as well as risks associated for individuals, corporates and communities. Risks individuals: simple things like not setting not one another privacy settings properly or liking his or her photo on social media such as Facebook or any other sorts of social media, can have a negative impact .For individuals, cyberbullying are able to exercice power over their victims as the bullying is done behind a screen instead of in person. people are also exposed to the risk of failing for online scams which may result in data or identity theft.
Communities: Social technologies can also cause a division between the community members who may be spending so much time on a cellphone instead of engaging in communication with the people around them. Corporate: social technologies can damage a business image. It can happen if ever a customer displays a bad image of the business on social media which can re result in the less of current and future customers of the business. Social technologies also present the opportunities for hackers to commit fraud as well as launch virus attacks.
Benefits
Individuals are able to connect with loved ones who mat be far away in another country through the use of social technologies.
Communities:have been able to come togr using social technologies such as Facebook. An example of this can be illustrated by the NYDA which has taken to social media to lead by example.
Corporate:businessess are able to increase their brand awareness and alsi share new market. Businesses that are portrayed in a positive way on social media are able to have many customers and their profit also increases. (Shrm.org.2016).
Bbc.co.uk (2016)
References
Shrm.org (2016).social media (online) Available at:
https://www.shrm.org/templatetools/hrga/pages/socialnetworksitepolicy.aspx (accessed 30 may 2016).
Bbc.co.uk (2016).the positives and negatives of using social network-BBC school report. (Online) Available at http://www.bbc.co.uk/schoolreport/22065333 (accessed 30 May 2016).
Communities: Social technologies can also cause a division between the community members who may be spending so much time on a cellphone instead of engaging in communication with the people around them. Corporate: social technologies can damage a business image. It can happen if ever a customer displays a bad image of the business on social media which can re result in the less of current and future customers of the business. Social technologies also present the opportunities for hackers to commit fraud as well as launch virus attacks.
Benefits
Individuals are able to connect with loved ones who mat be far away in another country through the use of social technologies.
Communities:have been able to come togr using social technologies such as Facebook. An example of this can be illustrated by the NYDA which has taken to social media to lead by example.
Corporate:businessess are able to increase their brand awareness and alsi share new market. Businesses that are portrayed in a positive way on social media are able to have many customers and their profit also increases. (Shrm.org.2016).
Bbc.co.uk (2016)
References
Shrm.org (2016).social media (online) Available at:
https://www.shrm.org/templatetools/hrga/pages/socialnetworksitepolicy.aspx (accessed 30 may 2016).
Bbc.co.uk (2016).the positives and negatives of using social network-BBC school report. (Online) Available at http://www.bbc.co.uk/schoolreport/22065333 (accessed 30 May 2016).
POE:QUESTION 8
https://www.google.co.za/search?tbs=simg:CAESlwEJdCUSr3I40UUaiwELEKjU2AQaBAgBCAkMCxCwjKcIGmIKYAgDEiivDLcOlheJHskB7hX7DqcEtg6wDOM2piG1N7woojeKNLEqtS2_1N_1kzGjAhmkaM21BUC-slJuuChN71uyTFZ_1HrwcCbMRes9USVLKPZQhGNmZNG7kjiP8OqcLwgAwwLEI6u_1ggaCgoICAESBJ22DUIM&q=digital+health+and+wellbeing&tbm=isch&sa=X&ved=0ahUKEwjup_KrhITNAhVKDsAKHdd5CscQsw4ILQ&biw=1280&bih=879#imgrc=L8oqRkhBZrQqeM%3A
https://www.google.co.za/search?tbs=simg:CAESlwEJdCUSr3I40UUaiwELEKjU2AQaBAgBCAkMCxCwjKcIGmIKYAgDEiivDLcOlheJHskB7hX7DqcEtg6wDOM2piG1N7woojeKNLEqtS2_1N_1kzGjAhmkaM21BUC-slJuuChN71uyTFZ_1HrwcCbMRes9USVLKPZQhGNmZNG7kjiP8OqcLwgAwwLEI6u_1ggaCgoICAESBJ22DUIM&q=digital+health+and+wellbeing&tbm=isch&sa=X&ved=0ahUKEwjup_KrhITNAhVKDsAKHdd5CscQsw4ILQ&biw=1280&bih=879#imgdii=L8oqRkhBZrQqeM%3A%3BL8oqRkhBZrQqeM%3A%3Bz7w4BVl4dL3bfM%3A&imgrc=L8oqRkhBZrQqeM%3A
Question 4 POE
TEN POINTS OF NETIQUETTE
1 When typing never type in all calital letters, this is shouting and rude.
2 Do not plagiarise
3 Do not talk about someone behind his or her back and keep that personal information to yourself.
4 Do not steal photographs that are not yours without the permission or acknowledging it.
5 Watch your language and do not swear
6 Be patient with others
7 Use proper quotes and always use the whole quote
8 No spamming
9 If you are using a header make sure your content matches with the header
10 Avoid the overuse of emotions
(Robert Siyallani.2016).
https://www.google.co.za/search?q=digital+etiquette&espv=2&biw=1280&bih=879&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwjHhMW9hYTNAhXqLMAKHTK6CI8QsAQIGQ#imgrc=XGoMLp7YBUnK1M%3A
https://www.google.co.za/search?q=digital+etiquette&espv=2&biw=1280&bih=879&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwjHhMW9hYTNAhXqLMAKHTK6CI8QsAQIGQ#imgrc=oKUiJL6hTxlyOM%3A
Penalties
1 If this rules are not followed, the first step would be to send the user an email stating that they are breaking rules. The next step would be to limit their access to the internet.
How to enforce and manage netiquette
- record all transactions and make surw you get a receipt for that.
- Use professional signature on documents to provide legitimacy.
- Use references
REFERENCE
About Canava.(2016) Free online poster maker.design custom posters eith canava.(online) Available at :https//www.canava.com/posters/ Accessed 30 May 2016
Go.vsb.bc.ca.2016-Digital code of conduct. (Online) available at https//go.vsb.bc.ca/schools/johndiver/about pages/Digital code of conduct. Aspx (accessed 30 May 2016).
Wikipedia. (2016) Etiquette in technology. (Online) available at :https://en.wikipedia. org/wiki/etiquette_in_technology#Netiquette (accessed 30 May 2016).
Uticaod.2016.Internet Netiquette-10 rules of nethiquitte. (Online) Available at http://www.uticnethiquette.(online) Available at:http://www.uticaod.com/article/20120907/BLOGS/309079938 (accessed 30 May 2016).
1 When typing never type in all calital letters, this is shouting and rude.
2 Do not plagiarise
3 Do not talk about someone behind his or her back and keep that personal information to yourself.
4 Do not steal photographs that are not yours without the permission or acknowledging it.
5 Watch your language and do not swear
6 Be patient with others
7 Use proper quotes and always use the whole quote
8 No spamming
9 If you are using a header make sure your content matches with the header
10 Avoid the overuse of emotions
(Robert Siyallani.2016).
https://www.google.co.za/search?q=digital+etiquette&espv=2&biw=1280&bih=879&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwjHhMW9hYTNAhXqLMAKHTK6CI8QsAQIGQ#imgrc=XGoMLp7YBUnK1M%3A
https://www.google.co.za/search?q=digital+etiquette&espv=2&biw=1280&bih=879&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwjHhMW9hYTNAhXqLMAKHTK6CI8QsAQIGQ#imgrc=oKUiJL6hTxlyOM%3A
Penalties
1 If this rules are not followed, the first step would be to send the user an email stating that they are breaking rules. The next step would be to limit their access to the internet.
How to enforce and manage netiquette
- record all transactions and make surw you get a receipt for that.
- Use professional signature on documents to provide legitimacy.
- Use references
REFERENCE
About Canava.(2016) Free online poster maker.design custom posters eith canava.(online) Available at :https//www.canava.com/posters/ Accessed 30 May 2016
Go.vsb.bc.ca.2016-Digital code of conduct. (Online) available at https//go.vsb.bc.ca/schools/johndiver/about pages/Digital code of conduct. Aspx (accessed 30 May 2016).
Wikipedia. (2016) Etiquette in technology. (Online) available at :https://en.wikipedia. org/wiki/etiquette_in_technology#Netiquette (accessed 30 May 2016).
Uticaod.2016.Internet Netiquette-10 rules of nethiquitte. (Online) Available at http://www.uticnethiquette.(online) Available at:http://www.uticaod.com/article/20120907/BLOGS/309079938 (accessed 30 May 2016).
POE:QUESTION 7
Five cyber security in South Africa.
1 Phishing scams
Email phishing is a common web hacking technique. Hackers send mass emails which legitimately appear to be from bank or an payment , which requires one to very their account information.
2 Buffer overflow
Hackers use techniques to gain access to customers information using online forms. Modern subscription-based cloud security services have been put to help identity and avoid such attacks.
3 Password hacking
One the easiest ways to fall into a trap of being hacked is when simply fails to change their password. It can be avoided by hanging all default passwords every 30-60 days.
4 Downloading free software's
By downloading free soft wares ,you are potentially putting your business at risks to malicious viruses or malware.
5 Fault injection
This technique involves hackers who searcher ways to infiltrate ones source and code to try inputting different code in an attempt to crash the system. They can be avoided by putting a strong threat immediately.
Reference
My Digital shield.(2015).5 ways hackers gain access to your data.(online)Available at: http:\\www. mydigitalshield,com Accessed 30 May 2016
http://www.timeslive.co.za/incoming/2015/04/16/hacker-thinkstock.jpg/ALTERNATES/crop_630x400/hacker+Thinkstock.JPG
https://www.google.co.za/search?q=five+cybersecurity+in+SA&espv=2&biw=1034&bih=831&source=lnms&tbm=isch&sa=X&ved=0ahUKEwia69_xgYTNAhXBIMAKHQHSCY0Q_AUIBygC&dpr=1#imgdii=cueT-DDHndJNCM%3A%3BcueT-DDHndJNCM%3A%3BcxRZnW2ow3aFVM%3A&imgrc=cueT-DDHndJNCM%3A
1 Phishing scams
Email phishing is a common web hacking technique. Hackers send mass emails which legitimately appear to be from bank or an payment , which requires one to very their account information.
2 Buffer overflow
Hackers use techniques to gain access to customers information using online forms. Modern subscription-based cloud security services have been put to help identity and avoid such attacks.
3 Password hacking
One the easiest ways to fall into a trap of being hacked is when simply fails to change their password. It can be avoided by hanging all default passwords every 30-60 days.
4 Downloading free software's
By downloading free soft wares ,you are potentially putting your business at risks to malicious viruses or malware.
5 Fault injection
This technique involves hackers who searcher ways to infiltrate ones source and code to try inputting different code in an attempt to crash the system. They can be avoided by putting a strong threat immediately.
Reference
My Digital shield.(2015).5 ways hackers gain access to your data.(online)Available at: http:\\www. mydigitalshield,com Accessed 30 May 2016
http://www.timeslive.co.za/incoming/2015/04/16/hacker-thinkstock.jpg/ALTERNATES/crop_630x400/hacker+Thinkstock.JPG
https://www.google.co.za/search?q=five+cybersecurity+in+SA&espv=2&biw=1034&bih=831&source=lnms&tbm=isch&sa=X&ved=0ahUKEwia69_xgYTNAhXBIMAKHQHSCY0Q_AUIBygC&dpr=1#imgdii=cueT-DDHndJNCM%3A%3BcueT-DDHndJNCM%3A%3BcxRZnW2ow3aFVM%3A&imgrc=cueT-DDHndJNCM%3A
POE:QUESTION 6
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4JPcVG4HCgUOooa-4QEDXaZmbpHs2u25ahYAnI2bEOT2yhnjqULiYo2N3_BQASHpeZiG2gaVYIAx1u7jYyOT4UMnHc-eyzzu8XL2S3NWK0jmoRfHKCFkcPbvo2CCLK66gaU6QMz_nxsk/s1600/digitalcitizenship.jpg
POE:QUESTION 1
Q.1.1 https:\\www.scribd\doc\3143397
Q.1.2 Techno-economic paradigm presents a series of essays discussing one of the most interesting and talked about(Anthem press.2016). Everyone can develop an innovation on this one.
Q.1.3 POSTER
Q.1.2 Techno-economic paradigm presents a series of essays discussing one of the most interesting and talked about(Anthem press.2016). Everyone can develop an innovation on this one.
Q.1.3 POSTER
Tuesday, 24 May 2016
DIGITAL FOOTPRINT VIDEO Q 2.1
https//youtube.com/watch?v=cPLX9EwU
REF:ROBERT SIYILANNI.2016.{BLOG} 7 MAY 2016
REF:ROBERT SIYILANNI.2016.{BLOG} 7 MAY 2016
QUESTION 5.1:PETITION
QUESTION 5
Q.5.1 WHAT IS A PETITION
Petition it is a request made for something desired , it can be a special request for example a lot of people have signed the petition have written comments about how this affects them personally. Dictionary(2016).
Countries such as Vietnam, China ,North korea an Cuba are countries that have digital rights which are extended to them. citizens of this mentioned countries do not have any digital rights at all. These citizens need digital rights so that they can have a better digital experience . And have the access to the internet without violating any rights , with a freedom to that ( Gopetition . 2016 ).
The term digital rights simply describes thee human rights that allows individuals to have an access , use , create ,and publish digital media and also to have access to the internet by using a mobile device or a computer. Countries such as China , Vietnam , North korea and Cuba citizens living in this countries ,their human basic rights are being violated because they can't have an access to the use of technology while the internet is the global public good that should be available to all of them. They are being restricted to the use of the internet to access information that they don't know in a purpose of having a knowledge of how to use internet communication. Access to the internet should be considered as a human basic rights, why is that is because people be guaranteed to have access to the internet as the opportunity to become part of the internet,as the world revolves around the use of technology and global communication.
People won't be able to know how the world of technology works because they do not have an access and the knowledge of how the internet. It is vital that this petition be put to affect immediately as it is one of our basic rights to have an access to information provided in the internet.( Robertt Siliyannis.2016.Digital rights petitipon.).{blog} 6 May 2016.
Q.5.1 WHAT IS A PETITION
Petition it is a request made for something desired , it can be a special request for example a lot of people have signed the petition have written comments about how this affects them personally. Dictionary(2016).
Countries such as Vietnam, China ,North korea an Cuba are countries that have digital rights which are extended to them. citizens of this mentioned countries do not have any digital rights at all. These citizens need digital rights so that they can have a better digital experience . And have the access to the internet without violating any rights , with a freedom to that ( Gopetition . 2016 ).
The term digital rights simply describes thee human rights that allows individuals to have an access , use , create ,and publish digital media and also to have access to the internet by using a mobile device or a computer. Countries such as China , Vietnam , North korea and Cuba citizens living in this countries ,their human basic rights are being violated because they can't have an access to the use of technology while the internet is the global public good that should be available to all of them. They are being restricted to the use of the internet to access information that they don't know in a purpose of having a knowledge of how to use internet communication. Access to the internet should be considered as a human basic rights, why is that is because people be guaranteed to have access to the internet as the opportunity to become part of the internet,as the world revolves around the use of technology and global communication.
People won't be able to know how the world of technology works because they do not have an access and the knowledge of how the internet. It is vital that this petition be put to affect immediately as it is one of our basic rights to have an access to information provided in the internet.( Robertt Siliyannis.2016.Digital rights petitipon.).{blog} 6 May 2016.
QUESTION 5.2 DIGITAL BILL OF RIGHTS FOR THE INTERNET
DIGITAL BILL OF RIGHTS FOR THE INTERNET
- Right to freedom- digital citizens have the right to free uninterrupted or violated internet.
- Right to openness-digital citizens have the right to an open and unobstrsucted internet.
- Equality-all digital citizens have are created equal on the internet no one has a special internet mean't for him or her.
- Participation-all digital citizens have the right to participate where and how they can choose on the internet.
- Creativity-all digital citizens have the right to be creative and work together on the internet so that they can be able to responsible for what they have created.
- Association-all digital citizens have the right to associate with anyone they want to associate with on the internet.
- Privacy-all digital citizens have the right to privacy on the internet, such as keeping their password as their safety and their priority.
- Sharing-all digital citizens have the right to share freely without no interference and share what they have in mind which can benefit them positively, they can share ideas using the internet by creating blogs and write those ideas.( Robertt Siliyannis.2016.digital bill of rights for internet.{blog}06 May 2016.
Monday, 23 May 2016
INAPPROPRIATE DIGITAL CONDUCT AND THE EFFECTS ON SOCIETY QUESTION 4
QUESTION 4
INAPPROPRIATE DIGITAL CONDUCT
Zamaswazi Nkosi(2016) proposes that express their feelings on the internet whenever they are angry and they say things bad things to other people. it is becoming inappropriate because it ruins other people's reputation ,in the future it might count without being aware of it. Things such as bullying and sex harassment.Zamaswazi Nkosi .2016.inappropriate digital conduct and effect on society . Angry, aggressive communication verbal of written,[blog]25 June 2016.
Case study
Article 1
Teens taunted by bullies are more likely consider, attempt suicide.
March 10/Karren Kaplan
Victims of bullying were more than twice as likely as other kids to contemplate suicide and about 2.5 Times as likely to try to kill themselves, according to a new study that quantifies the emotional effects up up or otherwise harmed by one's peers.Children and teens who were taunted by cyberbullies were especially vulnerable-they were about three times as likely than other kids to have suicidal thoughts, the study found.
The findings published online:Monday by the journal JAMA Pediatrics, puts the lie to the old adage about sticks and stones.
Article 2
Online conduct can have far-reaching effects:Think, Type, Post
March 25,2016
If people are still unsure of bad behaviour looks like online, the Army clarified it for them in an.All Army Activities"message. Online misconduct, it says, is the use of electronic communication to inflict harm.Examples include, but are not limited to:harassment, bullying, hazing, stalking, discrimination retaliation, or any other types of misconduct that undermine dignity and respect.
Photo by Todd Lopez.
INAPPROPRIATE DIGITAL CONDUCT
- chatting on the cellphone while driving it is inappropriate.
- Texting while having a conversation
- Using technology to hurt other people's feelings.
- Using communication for things that are not school related in class(Heartland AEA, Googlesites ,2011).
Zamaswazi Nkosi(2016) proposes that express their feelings on the internet whenever they are angry and they say things bad things to other people. it is becoming inappropriate because it ruins other people's reputation ,in the future it might count without being aware of it. Things such as bullying and sex harassment.Zamaswazi Nkosi .2016.inappropriate digital conduct and effect on society . Angry, aggressive communication verbal of written,[blog]25 June 2016.
Case study
Article 1
Teens taunted by bullies are more likely consider, attempt suicide.
March 10/Karren Kaplan
Victims of bullying were more than twice as likely as other kids to contemplate suicide and about 2.5 Times as likely to try to kill themselves, according to a new study that quantifies the emotional effects up up or otherwise harmed by one's peers.Children and teens who were taunted by cyberbullies were especially vulnerable-they were about three times as likely than other kids to have suicidal thoughts, the study found.
The findings published online:Monday by the journal JAMA Pediatrics, puts the lie to the old adage about sticks and stones.
Article 2
Online conduct can have far-reaching effects:Think, Type, Post
March 25,2016
If people are still unsure of bad behaviour looks like online, the Army clarified it for them in an.All Army Activities"message. Online misconduct, it says, is the use of electronic communication to inflict harm.Examples include, but are not limited to:harassment, bullying, hazing, stalking, discrimination retaliation, or any other types of misconduct that undermine dignity and respect.
Photo by Todd Lopez.
Digital etiquette QUESTION 4
QUESTION 4
Inappropriate digital conduct
Inappropriate digital conduct
- Chatting on the cellphone while driving is inappropriate.
- Texting while having a conversation.
- Using technology to hurt other people's feelings.
- Using school time to communicate things that are not school related (googlesites, Heartland AEA 11,2011).
Effects on society
Zamaswazi Nkosi (2016) proposes that people express their feelings on the internet whenever they are angry and they say bad and inappropriate things to other people. It is inappropriate because it ruins other people's reputation in the future without being aware of it.Things such as bullying and sex harassment.
Case study
Thursday, 19 May 2016
INTERNET OF THINGS QUESTION 3
QUESTION 3
Internet of things refers toj any devices or things that can be used to connect to the internet such as mobile devices(Kevin Ashton, a British tech pioneer).Q.3.1 INTERNET OF THINGS
Impact on the business
-the internet of things basically impact the business positively because businesses that deals with fashion designing, when it comes to this it has an opportunity to promote their designed clothes online using social media.
-It has become a greater platform of advertising their targeted market.
Impact on the society
-Although things have become much easier in our households because of the availability of electricity, we can use a kettle to warm water as a home appliance to warm water and also watch television.
-People use cellphones to communicate with people who are not close to them by sending messages.
-They use an alarm on their cellphones to set a reminder for an appointment or to wake them up (Anon (a)2013, p).
3.2 a musical rhythmic intelligence
The importance
- In a business context-There are shops that are selling musical instrument and instrument players buys them to make a musical sound. It is said that people who are musically literate such as singers and instrument players are considered to have a highly developed musical intelligence.
- It has a positive impact towards the technology because people can upload their music videos online as part of promoting it.
- VISUAL-SPATIAL INTELLIGENCE
- It concerns people who are at visualizing ideas which is very important in a business when it comes to team work and strategizing.
- In this type of intelligence people tend to be more active in the usage of of ttechnology, the will of technology as on opportunity.
- VERBAL-LINGUISTIC INTELLIGENCE
- In this type of intelligence it is where people are associated with all sorts ofc verbal communications. It is very good for a business that a person can be a Secretary to write down the memos and agendas of the business daily. Other people prefers using verbal communication to communicate.
- Impact on the technology it is highly positive because a person who likes presenting him or her self in front of people about what he or she has in mind, can use a projector to present a new targeting market.
- BODILY KINESTHETIC INTELLIGENCE
- It concerns people with impressive control over their physical movements.it also concerns people such as athletes (Britany Mcsorley(2014).
Tuesday, 26 April 2016
RAPE-THE COLD HARD FACTS QUESTION 2
QUESTION 2
Q2.2 RAPE-THE COLD HARD FACTS
Define-at first the problem need to be identified and have enough information to plan how and where to start to do the research . Discover how did we get at that stage that we at, have clear understanding of the problem before it can be presented to them and also discover all the stages and the angles of the problem . Ask question like how did we get here and what was done in the past and what could have been done differently . Dream differently with a clear understanding of where we are standing and how can we can we generate solutions and move forward . Design , deliver to people and debrief them on how did you put together the information and the solution of the problem. Put a word out there , produce and publish to the world to see . ( churches , crockett and jukes, (2011),(p52-53).The solution fluency process
DIGITAL DIVIDE IMPACT ON SOCIAL CAPITAL QUESTION 1
QUESTION 1
Q1.2
THE DIGITAL DIVIDE IMPACT ON SOCIAL CAPITAL ;
Social capital ''can be defined as a collective value of all social networks that arises from all these kinds of networks to do things for each other'' ( BetterTogether Initiative,[s. a.],(P.30).
''Digital divide has a positive impact on people because they have the ability to leverage their social capital , as they also have the ability to access data and information for their own good reasons to uplift their knowledge so that can be economically and professionally active'',(Duke University , [s.a.], (P.30).
There is very huge gap between people who are very much literate and those who do not, in that it is impacting the way the society operates. Internet promotes global communication and it also reduces the interest in local communities and politics. With digital divide there are consequences which impacts the lives of the people in the community. People who do not have access to the internet ,they also do not have any information , communication an entertainment which is becoming disadvantage to them and very poor in education. People who are able to use the internet are also do have an access to the internet and they become educated to the information available on the internet. People who do not have a knowledge of how the internet works and computer illiterate,it is becoming very much difficult for them to be employed.(ROBERTT SILIYANNIS.2016.impact of digital divide.{blog}06 May 2016.
There is very huge gap between people who are very much literate and those who do not, in that it is impacting the way the society operates. Internet promotes global communication and it also reduces the interest in local communities and politics. With digital divide there are consequences which impacts the lives of the people in the community. People who do not have access to the internet ,they also do not have any information , communication an entertainment which is becoming disadvantage to them and very poor in education. People who are able to use the internet are also do have an access to the internet and they become educated to the information available on the internet. People who do not have a knowledge of how the internet works and computer illiterate,it is becoming very much difficult for them to be employed.(ROBERTT SILIYANNIS.2016.impact of digital divide.{blog}06 May 2016.
Subscribe to:
Posts (Atom)