1/30
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Verbal Communication:
uses spoken words to communicate a message
Written Communication:
communicating complicated information, like data, that could not be easily communicated through speech alone.
clear and concise
conveys necessary info using precise, grammatically correct language, w/o using more words than are needed
Non-Verbal Communication:
body language, gestures, facial expressions, and even posture sets tone of conversation
Blogs
websites where people share content or posts for other people to read.
Vlogs:
video logs" that are visual versions of blogs.
Podcasts:
audio-based forms of communication.
Livestream:
like vlogging but happens in real time
Online chat
web chat offers users a form of instant communication.
Web conferencing:
conferencing technology involves both audio & video feeds of attendees
Texting:
Short Message Services (SMS) allows individuals to send brief messages or images through smartphones.
Shared calendars:
users invite coworkers or clients to see calendars, helping teams coordinate their work schedules and plan tasks
Forums:
online platform where people can post and respond to questions.
Wikis:
websites for crowdsourcing info
Collaborative documents:
allow multiple people to work on the same document
Wearable technology:
various types of wearable technology on body to make communication quick, easy and hands-free.
Smart speakers:
speakers act as voice-activated personal assistants
Intellectual property:
any work that is creative and includes inventions, literary works, images, and symbols.
Electronic Surveillance:
monitoring people with technology without their knowledge.
Identity Theft:
someone steals individual's information to commit a crime
Cookies:
small data files that websites use to track users visiting the site.
Spy Ware:
small computer program that gets stored on a user's hard drive. Program collects user's habits and transmits that information to third party without the user's consent.
Employee Internet Management Software
ensure employees are not using their work computers for non-work activities
CIA triad
information security model made up of the three main components: confidentiality, integrity and availability.
Confidentiality:
secrecy and the use of encryption. data is only available to authorized parties.
Integrity:
certainty that the data is not tampered with or degraded during or after submission.
Availability:
information is available to authorized users when it is needed.
social media:
“websites and computer programs that allow people to communicate and share information on the internet using a computer or mobile phone”.
Social Media Characteristics.
Easily accessible: ease of access it provides to its user. Anyone with mobile device or a computer along with an internet connection can easily become a user.
Create and share visuals and content: Users can create content using visuals, audio, or text.
Communication to a large group at the same time: instantaneous in its widespread use and extreme popularity
Everyone is an active participant: social media platforms, all the users are participants.
Flexible and dynamic: users active participants; contents and tools are continuously updated and improved.
Cost-effective: these platforms does not require any cost. Easily accessible: ease of access it provides to its user. Anyone with mobile device or a computer along with an internet connection can easily become a user.
digital footprint:
data left behind when users have been online.
passive footprint
when information is collected from user without the person knowing this is happening.
active digital footprint
user has deliberately shared information about themselves by using social media sites or by using websites.