Topic 5: Online Behaviour

3

Your online presence consists of all the information about you on the internet – this usually comes from your social network profiles (like Facebook, Twitter, LinkedIn and Google+), photographs that you, your friends or family have posted online (and tagged), anything you have written or that has been written about you on blogs, wikis or forums.

Having social networking profiles and regularly engaging with others through social media is generally seen by employers as a good thing. It shows you can use new web technologies and also gives employers an idea of what you are like beyond your CV, and it can be an invaluable tool for making contacts.

  • Perfect Your Profile On LinkedIn: Take time to create a complete and robust profile. Include all of the major components of your resume, taking time to highlight the skills that set you apart from other individuals. If you’re still in school, discuss your awards, research, and major personal and academic accomplishments where appropriate. Simply including your contact information and professional field of interest is not enough to help you stand out among the 100 million people on LinkedIn.
  • Publish Your Work: If you have created presentations, written blog articles, or posted work online make certain to post that information on your profile. LinkedIn has several features that will allow you to exhibit your areas of expertise, and allow your connections to get to know you.
  • Join A Group: Search for LinkedIn groups you identify with. These can be directly related to your profession, companies you’ve worked for, schools you’ve attended, and areas of interest. Keep in mind you can request to join many groups just in order to learn more about those fields, or to connect with people related to the groups’ main purpose

2

Make your online presence positive

 

Once you have everything in order you can start to build a good online portfolio – highlighting your achievements, success stories and good qualities. When employers put your name into Google, ensure they see you at your best.

Show you know what you are doing with social media, write an interesting blog or get recommended on LinkedIn. Be confident, use the right terminology and get to know all the applications, sites and trends that social networkers are using.

Be Relevant

Have you ever Googled yourself? If so, did the results surprise you? Maybe there are others who share your name or, maybe, you don’t even appear at all. Either way, if you are not easily recognizable on the web, you are virtually invisible.

One way to make sure your name is not lost in the sea of search engine results is to create your own website, with your own name in the URL. When optimized effectively, your site should be the first to appear. That way, you can control what the viewer sees when they search for you online.

Brand Yourself

So, you’ve now established your online presence. What’s special about you? Let the world know. Is it your awesome ability to manage high-profile projects? Your creative problem-solving techniques? Your fascination with foreign films? Whatever it is that makes you unique and marketable to potential employers, make sure that it is prevalent across all your online profiles.

Be Professional

You’ve probably heard it before, but it can’t be stressed enough: Keep your online profiles professional. Although you may have a sense of anonymity behind your computer screen, everything that you post online is public. Even with privacy settings, some of your information can be cached and read by prying eyes down the road. So, when in doubt, ask yourself if you would feel comfortable saying (or showing) what you post to a potential employer face-to-face.

You may want to consider creating alternate profiles to keep your personal and professional social networks separate. Just remember to be cautious about what you post online.

Clean up your online profile

Everything you do online is permanent, direct and immediate, often the information becomes public by default, you don’t own much of the content and simply removing something from the web doesn’t always mean that people won’t find it.  Below are some tips for ensuring people only see what you want them to see.

  • Set up privacy settings: Unless you set appropriate privacy settings and limit who has access to your accounts/information your social network page will come up on a web search.
  • Don’t assume that your comments won’t be seen by people outside your network – social media sites are designed for sharing, you just never know when a friend-of-a-friend may also be a friend-of-the-boss. You can’t control what other people will do with your information.
  • Make sure any negative information (a compromising photo or comments from a night out for example) is not available to the general public.
  • Remove anything that is no longer true of you.
  • Leave any Facebook groups/fan pages, remove followers that might undermine your image
  • Consider having separate accounts for ‘business’ and ‘personal’ use, or using different sites for different functions. Use LinkedIn as your professional profile and Facebook for your personal networking for example
  • Don’t talk negatively about your current or previous employers using social media. If in doubt, don’t mention your job at all.
  • Always avoid inappropriate language, ill-advised comments or jokes.
  • Un-tag yourself from photos
  • Be aware of your own privacy and the need to protect your identity. Don’t give out information that can be used against you.  Always check you are logged out after use.

1

References:

http://www.aerotek.com/employment-agency/careertipsdetails-162.aspx

http://voices.yahoo.com/5-shortcuts-creating-positive-online-presence-8594421.html?cat=31

http://www.brighton.ac.uk/careers/cvs-and-interviews/your-online-presence/

http://careers.rac.ac.uk/units/unit-rutim008.shtml

http://articles.timesofindia.indiatimes.com/2012-11-08/work/31054791_1_online-reputation-social-network-business-website

Topic 4: E-Commerce

b2b

E commerce is a online shopping process. It is safe,secure and convenient. It can be done anywhere at any time and in the comfort of your own home. This process involves the user/ purchaser to log in to a website online via a computer,the user/purchaser the selects the item he/she would like to purchase. The goods are then added to the credit card of the purchaser via a secure method. Once the transaction has taken place the credit card is then debited and the goods are then ready to be delivered to the buyer/purchaser within the correct time frame. E commerce is the way to go, many people use it for convenience as this is time saving and allows then to do many others things.

Topic 3: Managing Digital information on a Computer

Data is very important therefore the backing up of it is crucial. backing up data protects against accidental loss of data, database corruption and hardware failures. 

Your hard drive might crash. Thieves might steal your laptop at a café. You might realize on Friday that you desperately need the now-departed Wednesday version of an important document that you significantly altered on Thursday.

 

At times like these, having a secure, up-to-date backup of your hard drive can be a lifesaver. Here are seven practical strategies, including using USB storage, backing up via the Internet or through your local network, backing up Windows itself, and preserving huge media files like songs and videos and crucial documents on your computer–to protect yourself against catastrophic hard drive failure, your only real choice is to constantly back up everything important that you do. As with any other form of backup, it’s important to regularly check what you’ve been backing up to ensure that everything’s always where it should be. Good backup habits are a very important part of computer repair-and can leave you with some much-deserved peace of mind.

Options for backing up data at home:

  • External hard drives: Typically backup software is used in conjunction with a separate hard drive that is not the same drive which holds your operating system. This can be an attached USB drive, Networked Attached Storage (NAS), or even a separate hard drive inside your computer. External hard drives are my choice for the most reliable, simplest, and most affordable method of backup for home users. They’re gradually increasing in size and reliability, and many now come with software that can be used to back up your data regularly and perfectly.
  • Flash drives: If you don’t have a massive amount of data to back up, a portable flash drive is a great backup method. Flash media is extremely hard to break, very reliable, and modern thumb drives can hold upwards of three or four gigabytes of information. Plus, the portability means that you’re never without your crucial files.
  • Remote data storage via the Internet: For example Cloud Solutions: Dropbox, Amazon s3 and mozy from EMC. Files are uploaded to a remote backup server either automatically as the files are changed or periodically based on a schedule. You transfer all of the files you want to back up to a cloud based service, then download the files as needed. The advantages to these services are pretty awesome; your data is encrypted, so it’s kept very safe. Since it’s not in your physical location, if there’s a natural disaster, your files are still fine; no matter what happens, you’re never more than a click away from your data.
  • CD/DVD-ROMs 
    It may seem obvious, but these days, nearly every computer has a DVD-ROM drive that can write large amounts of information relatively quickly to either a DVD-R or CD-R disc. The discs themselves are relatively inexpensive, and they’re a great form of data backup, as long as they’re kept properly labeled and checked for consistency.

 

References:

http://voices.yahoo.com/top-five-data-backup-methods-home-computer-users-158815.html?cat=15

http://www.itworld.com/consumerization-it/330939/best-home-backup-plan-options-part-5-complete-backup-strategy

http://www.pcworld.com/article/170688/7_backup_strategies.html

 

Topic 2: Using References

In the case of electronic information it refers to:

•  Author (person or organization), editor or compiler.

•  Year of the most recent version. If date of origin is not given, write ‘n.d’ (no date).

•  Title (should be on the first page of the document)

•  Version number (if applicable)

•  Description of document (if applicable)

• Name and place of the sponsor of the source

•  Viewed Day Month Year

•  <URL either full location details or just the main site details>.

Note: not all of these details will necessarily be applicable

Topic 1: Learning Possibilities supported by the Internet.

Unknown

“Virtual schooling’s greatest power is that it ‘creates the opportunity to reconsider what’s feasible.“

1) Advances in information technology have opened doors for collecting, storing, and disseminating information. We are now at a stage of flexible learning you are able to access educational matter anywhere and anytime, anyone having access to internet has access a global resource pool and collaborate globally. Examples of online learning include:

1) Asynchronous e-Learning

This is encompasses self-paced learning and discussion groups. People has access to the learning material at anytime. Self-paced courses have the following features and benefits:

  • Simulation (providing mocks of real system)
  • Online experts

2) Syncronous e-Learning, examples include:

  • Virtual Classrooms: Simulates what you see in a real classroom, its a place to meet virtually, and learners can be via taught by using Slide presentations in conjunction with the live lecture.
  • Audio and video conferencing: Some technologies used; Webex/Skype/Lync.
  • Shared whiteboards lets groups of people communicate by typing comments drawing, highlighting and pointing on a shared space – much like a mind map where the contributors and collaborators are all located in different places on the globe.
  • Instant messaging to discuss class topics and ask questions.

References:

e-learningconsulting.com

http://www.americanexperiment.org/sites/default/files/article_pdf/Online%20Learning.pdf

DESIDOC Journal of Library & Information Technology, Vol. 31, No. 3, May 2011, pp. 179-188

 

Unknownd

2)  Suggestions for improving the Microsoft Learning Website:

  • Make it more user-friendly
  • Visuals and Design:  Make it more appealing: The visuals of a course will shape the users’ impressions and attitudes when approaching it, and if the course looks boring, outdated, and unprofessional.
  • Interactivity: Not possible to actively engaged with the content
  • Content: Provide a more detailed catalogue and more informative help guide.
  • Poll/Survey: We learners can provide feedback on the courses and the website itself, so that Microsoft can take their inputs and make changes if necessary.

1.4 Internet infrastructure allowing connectivity

There are numerous ways of connecting to the internet,the most common types I choose are ADSL and Wi-Fi.

What is a wifi connection?
Its a wireless networking technology that allows computers and other devices to communicate over a wireless signal. It describes all network components that are based on one of the 802.11 standards, including 802.11a, 802.11b, 802.11g, and 802.11n. These standards were developed by the IEEE and adopted by the Wi-Fi Alliance, which trademarked the name “Wi-Fi”.

Wi-Fi is the standard way computers connect to wireless networks. Nearly all computers have built-in Wi-Fi cards that allows users to search for and connect to wireless routers. Many mobile devices, video game systems, and other standalone devices also include Wi-Fi capability, enabling them to connect to wireless networks as well.

These devices may be able to connect to the Internet using a Wi-Fi signal.Wi-Fi connections only exists between the device and the router. Most routers are connected to a DSL or cable modem, which provides Internet access to all connected devices.

Diagram of a wifi connection.

20130919-213430.jpg

Reference:
http://www.techterms.com/definition/wifi

What is an ADSL connection?

ADSL (Asymmetric Digital Subscriber Line).

ADSL is a high-speed transmission technology. It runs as an asynchronous system meaning the data rate allowed is not equal in both directions.

How ADSL Works?

ADSL works by isolating the bandwidth of copper telephone lines into diverse frequency ranges, known as carriers. This enables the accommodation and transmission of several different signals on the same wire. To accomplish this, ADSL uses a process called Frequency Division Multiplexing (FDM), the carriers carry each of a different parts of the same data transmitted simultaneously, This helps to create more available bandwidth and higher speeds for the end user. In this way, ADSL can accommodate simultaneous high-speed data and voice transmission, such as surfing the web, watching streaming video, fax and voice call, all on the same line.

Reference:
http://www.orbit-computer-solutions.com/ADSL-Broadband.php#sthash.6TASTbHp.dpuf

Diagram of ADSL connection.

20130919-214309.jpg

1.7 What does facebook say it will do in order to protect minors?

Facebook takes safety very serious especially when it involves minors,they have created/installed extra security precautions such as restricting certain access facilities to minors. They have also set the onus on parents to teach their children about safety practices on the Internet.

Some of the safeguards put in place by Facebook include; banning convicted sex offenders from the site, limiting older users’ ability to search online for subscribers under 18 and joining an existing task force seeking ways to better verify users’ ages and identities.

Facebook has also partnered with various organisations (centered on security) for advice, such as: Childnet International  and Family Safety Online Institute; in addition to this,

Facebook provides access to tools and materials for parents /guardians or families to use to protect minors (amongst others).

Screen Shot 2013-09-17 at 9.11.05 PM

Screen Shot 2013-09-17 at 9.17.43 PM

Screen Shot 2013-09-17 at 9.14.56 PM

References:

  1. http://www.cbsnews.com/2100-205_162-4081280.html
  2. https://www.facebook.com/safety/
  3. http://www.atelier.net/en/trends/articles/facebook-upgrades-security-protect-minors
  4. https://www.facebook.com/safety/tools/
  5. http://www.facebook.com/help/473865172623776
  6. http://www.telegraph.co.uk/technology/facebook/7882277/Facebook-adds-child-protection-application.html

1.8 Is Twitter considered credible info?

Is Twitter considered as a credible source?

In my opinion no it is not as most of the information has no proof therefore we do not know if the person we chatting to really is the person we think it is or if its a fake profile/alias.
Yes,twitter has applications such CNN news ect… Which seems to be real,but it also has lots of fictitious people as well and in my opinion its used more as a social site for hot gossip stories than credible information. Twitter is mainly used as an easy accessible chatting site allowing you to follow one another.

I am generally more skeptical of the information that’s tweeted (distributed on twitter) and do not see it as providing more credible information than any other blogging or social media site., reasons for this:

– Twitter is an open-platform where a large percentage of the twits (users) can tweet, self-opinionated and biased, distortions of events.

– Twitter It is more difficult to validate information, when the source and author cannot be verified.

That said, I would like to end off by saying that twitter as well as other social media platforms can be very powerful tool for sharing information globally to millions of users at the click of a button. (Look at feeds/posts/tweets from Arab Spring)

A-Bahraini-protester--008

from the Examples of credible sources I would use;

For News:

Mail and Guardian – News

The Guardian

For research:

Encyclopaedia Britannica Online

World Book Encyclopedia

20130917-180321.jpg

References:

http://homeworktips.about.com/od/researchandreference/a/internet.htm

http://newstrust.net/sources

http://www.poynter.org/latest-news/mediawire/181553/study-people-view-information-on-twitter-as-less-credible-than-on-news-websites/

Think fast: Is that tweet true or false? How we use credibility cues to make decisions

http://www.simplyzesty.com/Blog/Article/February-2012/Some-Perspective-On-Twitter-As-A-Breaking-News-Source

Screen Shot 2013-09-17 at 11.21.38 PM

http://www.theguardian.com/world/2011/feb/25/twitter-facebook-uprisings-arab-libya

1.6 Five (5) key trends predicted for 2013

Top 5 Trends:

Twitter
Facebook
Tumblr
Google+
Pinterest
Linked in

Video:

Presentation:

http://bcove.me/vk5k127b

References:

20130920-085030.jpg

20130920-085445.jpg

20130920-085506.jpg

1.3 Smartphone Media Types on Blackberry Bold 9790

20130917-181119.jpg

Desktop: viewing of emails,if an email account is linked to the phone.
Applications: allows the storage of documents and files,password keeper and calculator.
Contacts: list on contacts saved in the phones phone book/memory
SMS: allows one to create,send and save important text/sms messages
Calender : displays dates,days and months of the year.
Photos : allows the storage of all captured & downloaded photo’s and videos
Camera : ability to capture photo’s/pictures
Clock: ability to view the time and set the alarm
Maps: GPS navigation system
Media: allows storage and viewing of music,videos,pictures,ringtones,voice notes,video camera
Browser: ability to view the Internet
Games: ability to play the games loaded on the phone.
Instant messaging: Bbm-blackberry chat site,used for socializing.

20130918-205849.jpg

20130918-210559.jpg

20130918-210616.jpg

20130918-210826.jpg

MELONIE_ASSIGNMENT2