Week 2 | Introduction to Digital Literacy and Basic Computer Skills
Topic 1 | Introduction to Digital Literacy
Digital Literacy – involves the ability to effectively and critically navigate, evaluate, and create information using a range of digital technologies.
Different ways to engage with technology:
Ø Basic Computer Skills – the ability to use computers and other digital devices for everyday tasks.
Ø Information Literacy – the skill to find, evaluate, and use information effectively.
Ø Communication Skills – understanding how to use digital tools for communication.
Ø Media Literacy – the ability to understand, evaluate, and create media in a variety of forms.
Digital Literacy is critical in many areas of life:
Ø Academic Success – being digitally literate allows you to use educational resources and research tools are available online.
Ø Career Advancement – most jobs today require some level of digital literacy.
Ø Personal Growth – digital literacy empowers you to stay informed, make decisions and communicate with others in an increasingly connected world.
Topic 2 | Basic Computer Concepts
Hardware – tangible and/or physical technologically related components.
1. Central Processing Unit (CPU) – the brain of the computer that performs instructions defined by software.
2. Memory (RAM) – temporary storage that holds data and instructions currently being used by the CPU.
3. Motherboard – the main circuit board that connects all components including CPU, memory, and peripherals.
4. Power Supply Unit (PSU) – provides power to the computer’s components.
5. Display Screen – shows the visual output from the computer.
6. Storage – Hard Disk Drive (HDD), Solid State Drive (SSD), or flash storage.
7. Hard Disk Drive (HDD) – can store, access, and retain data permanently.
8. Solid State Drive (SSD) – can access data faster than HDD in runtime.
9. Flash Storage – a type of storage that uses non-volatile memory to store data electronically, commonly used in USB drives and SSDs.
10. Input Devices – allow users to interact with the computer.
11. Output Devices – output information from the computer.
Non-volatile – retaining data even when there is a break in the power supply.
Software – intangible and/or virtual components like software applications and operating systems.
2 types of software:
System Software – These are type of software designed to control and manage the computer's hardware and provide a foundation for running application software.
Application Software – these are programs designed to perform specific tasks.
Device Drivers – allow the operating system to communicate with hardware devices.
Utility Software – provides maintenance and optimization tools (e.g., Antivirus Software, Backup Software, Disk Cleanup Tools).
Firmware – low level software embedded in hardware to control specific functions (e.g., BIOS/UEFI, Embedded Systems).
Application Software Examples:
Productivity Software - helps users create, edit, and manage documents and data.
Web Browsers - allows users to access and interact with contents on the web.
Media Players - plays audio and video files.
Graphic and Design Software - used for creating and editing images and designs.
Communication Software - facilitates communication and collaboration.
Games and Entertainment Software - provides entertainment through interactive experiences.
Development Tools - helps developers write, debug, manage code, create games, software and applications.
Week 3 | Introduction to Digital Literacy and Basic Computer Skills
Desktop - is the first screen you see when your computer starts up.
Taskbar - Located at the bottom of the screen, it allows you to see which programs are running and access them quickly.
Start Menu - This is where you can access all the programs installed on your computer, as well as system settings and power options.
System Tray - Located on the far right of the taskbar, it contains icons for system notifications, network status, and other quick settings.
File Management - is crucial for staying organized, finding documents quickly, and ensuring that your data is safe.
Regular Maintenance - is vital for keeping your computer running smoothly, protecting your data, and extending the lifespan of your hardware.
Driver Updates - are special programs that allow your operating system to communicate with hardware components like your printer or graphics card.
Antivirus Protection - protecting your computer from malware, viruses, and other threats is essential for safeguarding your data and ensuring system stability.
Week 3 | Understanding the Internet
Internet Service Provider – is a company that provides access to the internet.
Domain Name Server - acts as a directory to find the server hosting the website.
Hypertext Transfer Protocol Secure - is the primary protocol used to send data between a web browser and a website.
Uniform Resource Locator - is a unique identifier used to locate a resource on the internet.
Phishing - Fake emails or messages that trick you into revealing sensitive information.
Malware - Software designed to harm your computer or steal data.
Ransomware - A type of malware that locks your files and demands payment for access.
Two-Factor Authentication - adds an extra layer of security by requiring two forms of verification before granting access to your account.
Week 3 | Navigating Digital Spaces: Understanding Cyberbullying, Online Harassment, and Digital Footprints
Cyberbullying - refers to the use of digital platforms to deliberately harm, intimidate, or harass someone.
Public Humiliation - involves sharing embarrassing or degrading content about someone online with the intent to shame or ridicule them in front of a large audience.
Trolling - is the act of deliberately posting provocative, inflammatory, or offensive comments online to upset or provoke a reaction from others.
Impersonation - involves creating a fake online profile or using someone else’s identity without their consent to cause harm, spread misinformation, or damage their reputation.
Outing - is the act of publicly revealing someone's private, sensitive, or embarrassing information without their consent, often related to their sexual orientation, health, or personal life.
Cyberstalking - involves the use of the internet or other digital means to stalk, harass, or intimidate someone persistently.
Flaming - is a form of online abuse where someone posts hostile, aggressive, or abusive comments in online discussions or forums, often intended to incite anger or conflict.
Exclusion - is a form of cyberbullying where a person is deliberately excluded from online groups, conversations, or activities, often leading them to feel isolated or rejected.
Catfishing - involves creating a fake online persona to deceive or exploit someone, often for romantic relationships or financial gain.
Spamming - is the act of sending large volumes of unsolicited, irrelevant, or inappropriate messages to someone, often overwhelming their inbox or social media accounts.
Doxxing - involves publicly exposing someone’s private personal information, such as home addresses, phone numbers, or workplace details, with the intent to harass or incite others to do so.
Hacking - involves unauthorized access to someone’s digital accounts or systems, often to steal, manipulate, or destroy their data, or to use their account maliciously.
Impersonation in Online Games - this involves creating a fake account or misusing someone else’s identity in an online game, leading to confusion, unfair treatment, or harm to the impersonated person.
Creating Hate Pages - are social media pages or websites dedicated to spreading false, derogatory, or harmful content about an individual or group.
False Reporting - involves the deliberate misuse of reporting tools on social media or other online platforms to falsely accuse someone of violating community guidelines or policies, leading to their account being suspended or banned.
Manipulative Messaging - involves sending deceitful, misleading, or emotionally manipulative messages designed to control or influence someone’s actions, often to the detriment of the victim.
Vicious Online Reviews - involve posting fake or exaggeratedly negative reviews about a person’s business, work, or character to harm their reputation.
Fabricated Stories - involve creating and spreading false rumors or lies about someone, often with the intent to damage their reputation or relationships.
Social Media Tagging - involves tagging someone in posts, photos, or videos that are embarrassing, inappropriate, or damaging to their reputation, often without their consent.
Emotional Manipulation - involves using digital communication to exploit someone’s emotions, often to control their behavior or decisions, causing psychological harm.
Revenge Porn - involves sharing or threatening to share intimate images or videos of someone without their consent, typically as an act of revenge or to humiliate them.
Exposing Private Photos - involves sharing someone’s private images without their consent, often to humiliate or blackmail them.
Mimicking or Parody Accounts - involve creating a fake account that closely resembles someone else’s with the intent to post harmful, misleading, or defamatory content.
Social Engineering Scams - involve deceiving individuals into revealing personal or financial information by pretending to be a trusted source, often resulting in identity theft or financial loss.
Revenge Attacks Through Digital Platforms - involve using digital platforms to harm someone, often by spreading false information, sharing private details, or coordinating harassment as an act of revenge.
Phishing Scams - involve tricking individuals into providing personal information, such as passwords or credit card numbers, by pretending to be a trusted entity, usually through emails or fake websites.
Disseminating False Information - involves spreading untrue or misleading information online with the intent to cause harm, panic, or confusion.
Sexual Harassment in Digital Spaces – involves sending unsolicited sexual messages, images, or comments online, making the victim uncomfortable or threatened.
Deceptive Advertising - involves creating or spreading misleading advertisements online, tricking consumers into purchasing products or services under false pretenses.
Stalking through Social Media - involves obsessively monitoring someone’s online activity, often to gather information about their personal life, or to intimidate or control them.
Online Group Harassment - also known as mobbing, involves a group of individuals coordinating efforts to harass or bully someone online, often through mass reporting, spamming, or coordinated attacks.
Digital Blackmail - involves threatening to release private or damaging information, photos, or videos unless the victim complies with specific demands, often involving money or personal favors.
Unwanted Pornographic Material - involves sending or exposing someone to pornographic content without their consent, often in an attempt to shock, harass, or intimidate them.
Online Grooming - involves an adult using digital communication to build a relationship with a minor with the intent of exploiting them, often sexually.
Intellectual Property Theft - involves stealing or using someone’s creative work, ideas, or content without permission, often for personal gain or to damage the original creator’s reputation.
Digital Footprint - is the trail of data that you leave behind when you use the internet.