Tuesday, March 31, 2015

Learning Journal Entry #4

What did I learn?-


In this learning module I learned a lot more about social media and what it can be used for. For example I did my social media project on Skype and I learned about how Skype can be used in the work place and in an educational setting. I also learned a lot about wireless network security from the reading and what a digital footprint is and different ways on how to post safely. I also learned what the 6 types of social media are:

1. Social Networks
2. Bookmarking Sites
3. Social News
4. Media Sharing
5. Microblogging
6. Blog comments and Forums

I put a lot of time and effort into this learning module. I worked very hard on my web labs and my project. I also took many helpful notes during this module.






New Terminology-


  • Video conferencing- An expanded virtual meeting sometimes involving hundreds or thousands of participants, involves the real-time transmission of video and audio between two locations.
  • Spoofing- When a hacker accesses a network in order to set up a fake Web site or send mail that looks like it is coming from an internal server.
  • Content sharing sites- Allows users to recommend their favorite news story or other Web content by clicking a link on a web page.
  • Multimedia messaging service (MMS)- messages containing audio and video.











Wednesday, March 18, 2015

Learning Journal Entry #3

What did I learn?-


 In learning module 3 I learned a lot about information fluency and new search tools/ search engines. I also learned about the deep/invisible web and the search process that goes along with it. I also learned what boolean search operations were, which help make searching the web more efficient. Many of these advanced search techniques aren't known so it was interesting to be able to acquire this new information.

In learning module 3 I think I put a lot of effort into all the web labs that were given. I learned a lot and I hope to continue to learn more helpful tools as the class continues.




















New Terminology-


  •  Meta tags- Keywords within tags.
  • Information fluency- The ability to gather, evaluate and use information in ethical and legal ways.
  • Meta search engine- Submits a search query to multiple search tools and compiles the search results in one list.
  • Boolean search methods- An advanced search technique that is based on classical boolean operators for mathematics and science.









Life/Career and Media/Technology skills required for the 21st century-




In order to have the skills required for the 21st century you must have a digital citizenship. Which means using technology appropriately. There are nine elements involved in this including:


1) Digital Etiquette- Core rules of netiquette
2) Digital Communications
3) Digital Literacy
4) Digital Access
5) Digital Commerce
6) Digital Law
7) Digital Rights and Responsibilites
8) Digital Health and Wellness
9) Digital Security


Also following the steps in the search process and choosing the right search tool will be of help. Some advanced search techniques include; boolean search methods, using meta tags, using meta search engines, etc.  







Wednesday, March 4, 2015

Learning Journal Entry #2

What did I learn?-




In learning module 2 I have learned many new skills. I learned how to make a screencast using Jing. I also learned a lot about the domain name registration process and how to find out what a specific websites IP address is.


I also learned about web threats and security attacks. Some of the things I learned about include security holes, hackers, malware which includes viruses, worms and Trojan horses.It's scary to think about your information being at risk for identity theft but I learned there are ways you can take precaution against that.

For learning module 2 I feel like I put in even more work into it then learning module 1. All the information taught was very insightful. I'm also very happy about how my web labs turned out.











New Terminology-


  • Adware- Refers to any free program that comes with advertisement on it. An adware in itself is not intended to be malicious.
  • Phishing- Attempting to acquire sensitive information.
  • Trojan Horse- A malicious program that silently self-installs on a computer. After being executed, a hacker uses the Trojan horse as a backdoor in order to take control and attack the computer with a virus. It can substitute itself for a legitimate program.
  • Personal Firewall- Filter information, block open ports, and stop suspicious programs.
  • Spam- A form of mail flooding. Spam is unsolicited email messages that are usually trying to sell a product, and are sent in bulk. Spam can quickly fill your mailbox. 



Word Cloud-