1. Berger, Lee R.; et al. (10 September 2015). " Homo Naledi, a new species of the gun us Homo from Dinaledi Chamber, South Africa" eLife 4. doi: 10. 7554/eLife.09560.
2. EWN Online (2016). Who was Homo Naledi? Accessed 09 April 2016: http//wen.co.za /Features/Naledi/What-Makes-Naledi-Special.
3. Gui, M. & Argentin, G. (2011). Digital skills of internet natives: Different forms of digital litaracy in a random sample of Nothern Italian high school students & Society. Volume 13 Issued 6: http://sagepub.com/context/13/6/963.
4. Hargitta, E. (2002). Second-level digital divide: Differences in people's online skills. First Monday 7 (4).
5. van Deursen, A. & Van Dijk, J. (2009). Improving digital skills for the use of online public information and services. Government Information Quarterly (26): 333-340.
6. van Dijk, J (2005). The Seeping Divide. Inequality in The Information Society. London: Sage Publication.
Monday, 30 May 2016
Question 7 Digital Security (POE )
Along with the new technology and means of living comes new ways which people are able to abuse the system. "Digital Security refers to ensuring the ability to use digital information systems without interference, description, unauthorized access or data collection." ( Security in-a-Box, [sa]). Digital Security can involve protecting any personal information online and whoever commit cyber crime are generally known as hackers.
Hackers are able to exploit certain security flaws in the coding in order to benefit themselves or for personal satisfaction. Hackers create systems such as:
* Adware which creates an advert by using your previously viewed sites. This can also be linked with spyware which can memorize your password and a hacker can abuse this system.
* Bots is created by hackers to distribute malware or even crack passwords.
* Ransomware which is created to corrupt and encrypt your files so u can't access them unless certain procedures are followed.
* Viruses which is able to spread at an incredible rapid rate and corrupt your hardrive.
* Roottits which is able to remotely control your device and thus can prove an incredibly useful tool to hackers.
Users are able to avoid hackers by:
* Not downloading any unlicensed files
* Use antimalware software which reduces the risk of any malware being downloaded.
* Password inscriptions which will make it harder for hackers to acquire your password.
* Delete all browser cookies which will reduce the amount of information spyware is able to acquire if your device does not get infected.
* Don't give out personal information by giving out personal information hackers are able to work out passwords and other information.
Hackers are able to exploit certain security flaws in the coding in order to benefit themselves or for personal satisfaction. Hackers create systems such as:
* Adware which creates an advert by using your previously viewed sites. This can also be linked with spyware which can memorize your password and a hacker can abuse this system.
* Bots is created by hackers to distribute malware or even crack passwords.
* Ransomware which is created to corrupt and encrypt your files so u can't access them unless certain procedures are followed.
* Viruses which is able to spread at an incredible rapid rate and corrupt your hardrive.
* Roottits which is able to remotely control your device and thus can prove an incredibly useful tool to hackers.
Users are able to avoid hackers by:
* Not downloading any unlicensed files
* Use antimalware software which reduces the risk of any malware being downloaded.
* Password inscriptions which will make it harder for hackers to acquire your password.
* Delete all browser cookies which will reduce the amount of information spyware is able to acquire if your device does not get infected.
* Don't give out personal information by giving out personal information hackers are able to work out passwords and other information.
Question 5 Digital Rights and Responsibilities (POE)
Digital Rights and Responsibilities is having the right and freedom to use all types of digital technology while using this technology it has to be in an acceptable and appropriate manner.
Images
Images
Question 4 Digital Etiquette (POE)
Digital code of conduct
10 Points of Netiquette
When communicating online, only say things that you would say to a person’s face and things that you would allow people to say to you.
Adhere to the same real life behavioural standards online.
Being aware of whom you’re communicating with can be a guide as to which level of netiquette to use.
Respect the user’s bandwidth when sharing files. Do not waste a user’s time with unnecessary comments and questions.
Keep a good online image by portraying high intelligence through your personal posts.
Help others where you can.
Keep hostile interactions to a minimum.
Do not provide strangers with another user’s personal details without permission.
Do not abuse the power you have – use it correctly.
Do not criticize someone for having little online experience.
Penalties for Non-compliance
Anyone who communicates inappropriately through messaging will be given a verbal warning. If it happens again you will receive a written warning. If the action is seen as harassment, it could lead to a court case or termination.
If anyone fails to adhere to the amount of document sharing, especially if they are non-work related, connection to the internet will be terminated.
Anyone with an issue helping someone less experienced online will be suspended for non-compliance to teamwork.
If anyone’s personal information is shared without permission, that person will be labelled ‘un-trustworthy’ and may be expelled.
Enforce and Manage
Each individual will be given this Code of Conduct to read through, sign and return to the head of the institute.
If failure to meet the Code occurs, they will be given their signed Code of Conduct to read over again. Depending on the action, the necessary repercussions will be taken.
A system will be available on each computer where any individual may report unethical behavior.
10 Points of Netiquette
When communicating online, only say things that you would say to a person’s face and things that you would allow people to say to you.
Adhere to the same real life behavioural standards online.
Being aware of whom you’re communicating with can be a guide as to which level of netiquette to use.
Respect the user’s bandwidth when sharing files. Do not waste a user’s time with unnecessary comments and questions.
Keep a good online image by portraying high intelligence through your personal posts.
Help others where you can.
Keep hostile interactions to a minimum.
Do not provide strangers with another user’s personal details without permission.
Do not abuse the power you have – use it correctly.
Do not criticize someone for having little online experience.
Penalties for Non-compliance
Anyone who communicates inappropriately through messaging will be given a verbal warning. If it happens again you will receive a written warning. If the action is seen as harassment, it could lead to a court case or termination.
If anyone fails to adhere to the amount of document sharing, especially if they are non-work related, connection to the internet will be terminated.
Anyone with an issue helping someone less experienced online will be suspended for non-compliance to teamwork.
If anyone’s personal information is shared without permission, that person will be labelled ‘un-trustworthy’ and may be expelled.
Enforce and Manage
Each individual will be given this Code of Conduct to read through, sign and return to the head of the institute.
If failure to meet the Code occurs, they will be given their signed Code of Conduct to read over again. Depending on the action, the necessary repercussions will be taken.
A system will be available on each computer where any individual may report unethical behavior.
Question3 Digital Communication and fluencies (POE)
The social economy
- Social Technologies is defined as applying the used technologies for specific purposes especially social ones: to ease social procedures via social software and social hardware which might include the use of computers and information technology for governmental procedures.
Risk of social technologies for individuals, corparate and communities.
- The rism of social technologies for indivisuals corporate and communities is that South Africa will be faced with the increase in unemployment increased loneliness and also the world description weapons and will also faced conpetancy, risk of social technologies to communicate using Facebook people should be careful as to what they post online on their profiles. The risk of this is that when people get your personal information they might use it to stalk the person which may cause harm to the person.
Benefits of social technologies
- For individuals to benefit they will be able to send messages and by doing this they will be quickly connected. The individual will not lose out on any communication
- The space that they share allows cooperate to co-create content , coodinate joint projects and tasks. People work best and in full potential when they are in groups, sharing ideologies and allowing people build on each others ideas. The main idea is to make corporate communicate simultaneously to a large evidence and it is not expensive to communicate with customers.
- The benefit for communities is that communication has improved as modern technology has broadened the channels used in communication which can be video chat or electronic mail so this means th a SA communities are able to communicate with friends and family located far away and can even Skype which is easy and people wll communicate better.
- Social Technologies is defined as applying the used technologies for specific purposes especially social ones: to ease social procedures via social software and social hardware which might include the use of computers and information technology for governmental procedures.
Risk of social technologies for individuals, corparate and communities.
- The rism of social technologies for indivisuals corporate and communities is that South Africa will be faced with the increase in unemployment increased loneliness and also the world description weapons and will also faced conpetancy, risk of social technologies to communicate using Facebook people should be careful as to what they post online on their profiles. The risk of this is that when people get your personal information they might use it to stalk the person which may cause harm to the person.
Benefits of social technologies
- For individuals to benefit they will be able to send messages and by doing this they will be quickly connected. The individual will not lose out on any communication
- The space that they share allows cooperate to co-create content , coodinate joint projects and tasks. People work best and in full potential when they are in groups, sharing ideologies and allowing people build on each others ideas. The main idea is to make corporate communicate simultaneously to a large evidence and it is not expensive to communicate with customers.
- The benefit for communities is that communication has improved as modern technology has broadened the channels used in communication which can be video chat or electronic mail so this means th a SA communities are able to communicate with friends and family located far away and can even Skype which is easy and people wll communicate better.
Question2 Digital litaracy and information fluency (POE)
Homo Naledi is an extict species of him one, first described in 2015 and assigned by the anthropologist to the genus Homo.
Information fluency
Ask
- Who was Homo Naledi?
- What is so important about this discovery?
Acquire
-Information was acquired at d following wbsite:
http://wen.co.za/Features /Naledi.
Analyze
A team of anthropologists led by Professor Lee Berger undertook the Rising Star Expedition and they had made history by discovering and salvaging fossils of at least 15 individuals from the Dinaledi Chamber. This was an evolutionary discovery since a new species of hominines called Homo Naledi was found in the dark remote chamber. Homo Naledi have distinct physical features similar to that of human being such as:
* Curved Fingers
* Small Skulls
* Slender bodies
* Ape-like shoulders
Apply
-According to the findings highlighted in the analysis Homo Naledi could be our common ancestor therefore this suggests that it could have had human characteristics both physical and mental as well as similar behavioural traits. The Dinaledi Chamber could have been used as a burial ground where the newfound species could have performed burial rituals since none of the fossils had marks not did they attend the Chamber at the same time.
Assess
- Research was conducted thoroughly and the information was taken from a very good source.
Information fluency
Ask
- Who was Homo Naledi?
- What is so important about this discovery?
Acquire
-Information was acquired at d following wbsite:
http://wen.co.za/Features /Naledi.
Analyze
A team of anthropologists led by Professor Lee Berger undertook the Rising Star Expedition and they had made history by discovering and salvaging fossils of at least 15 individuals from the Dinaledi Chamber. This was an evolutionary discovery since a new species of hominines called Homo Naledi was found in the dark remote chamber. Homo Naledi have distinct physical features similar to that of human being such as:
* Curved Fingers
* Small Skulls
* Slender bodies
* Ape-like shoulders
Apply
-According to the findings highlighted in the analysis Homo Naledi could be our common ancestor therefore this suggests that it could have had human characteristics both physical and mental as well as similar behavioural traits. The Dinaledi Chamber could have been used as a burial ground where the newfound species could have performed burial rituals since none of the fossils had marks not did they attend the Chamber at the same time.
Assess
- Research was conducted thoroughly and the information was taken from a very good source.
Q 1.3 Electronic Poster (POE)
BE AWARE WHEN YOU SHARE ALWAYS KNOW WHO YOU TALKING TO......!!!!!!!!!!
THE NINE ELENTS OF DIGITAL CITIZENSHIP!!!!!!!!!!!!!!!!!
DIGITAL ACCESS.... DIGITAL COMMUNICATION....
ALERT..............ALERT................ALERT...........ALERT...........ALERT...........ALERT......ALERT...
Subscribe to:
Posts (Atom)