Monday, April 24, 2017

Module seven was a little bit of a rough one for me, but the more that I studied it and tried to thoroughly understand it, I started to understand.
Some of the topics and assignments that I found the most successful for me were: Web Design Principles and what makes a good/ bad website, and the introduction to basic HTML.
When doing research, whether it be for a job or for a paper, it is important to know what exactly makes a good and reliable website:

  • Good Navigation.
  • Loads easily.
  • perfect mixture of contrast for easy reading.
  • Browser accessible.
As far as my participation goes for the discussion through Facebook, I thought it was reasonable. I read everyone's comments and clicked on the websites they provided.

Four new terminology I learned was:

  • HTML- Hyper Text Markup Language
  • XHTML editor-  computer program for editing HTML, the markup of a webpage.
  • Translator-Automatic language translation is the use of a computer program to translate input text from one national language to another while maintaining the original
  • WYSIWYG program- What you see is what you get program.

Wednesday, March 29, 2017

Throughout learning module five, I have learned quit a few tools that could immensely help me within the work place. Everything from document sharing,to the web 2.0 tools, and even the social media project.
Going into the business world, their are going to be a lot of different accounts that we may have to make and use throughout the course of our career.
Personally, I think the most interesting project we have worked on this module was where we could choose between a Glog and a Infographic. These are some really proactive ways to get someone to clearly understand something without it looking overwhelming.
Module 5 has got me to do things that I would never probably take the initiative to learn on my own. Not only that, but the vocab I learned helped me understand a lot better, than using the everyday vocabulary we all use.

4 new terminology:

  • asynchronous- of or requiring a form of computer control timing protocol in which a specific operation begins upon receipt of an indication (signal) that the preceding operation has been completed.
  • synchronous- Data is sent in a continuous stream at a constant rate
  • chat- Usually occurs within a chat room, with people from all over the world tat talk or are interested in a certain topic.
  • IM- Usually includes your contact list and/or information. Generally called a buddy list or a friend list.
I originally knew what chat and IM were, but I didnt know their were that much of a difference.

As far as my participation through out our private Facebook discussion I think I put in the time and the effort for understanding peoples different points of view and tried to relate to them on a level I normally would not.

Sunday, March 12, 2017

In learning module 4 I feel like I learned a lot of necessary techniques that could help my technology use easier. The ways that I used to search on Google, was not always efficient and I hardly never found exactly what I was looking for, but with the search tutorials and learning different ways to maximize my search was great. I never thought that adding "", or - meant to either minus or put emphasize on a certain phrase.
As far as the social bookmarking assignment went, I thought the extension with the account was a lot more efficient in bookmarking for anyone who wants to access them from a different desktop. My personal opinion though, I don't think it is something I will use in the near future, but it is nice to know just incase.

Four new terminology:
  • Invisible web- Also known as the deep web, is not searched automatically by different search engines.
  • Process Addiction- Compulsive behavior such as gambling, food, sex etc.
  • Digital Citizenship- Someone who uses the internet regularly and effectively.
  • Information Fluency- Skills used to search the internet better and more quick.
Skills required for the 21st century
  • Collaboration
  • Communication
  • Creativity
  • Critical thinking
  • Innovation
  • Social networking
  • Problem solving

I think that my participation and time spent within the discussion and within my assignments was good. I think I really put the time and the effort into making sure I thoroughly understood what I was learning and/or reading.

Tuesday, February 21, 2017


Throughout module three I found it interesting on how there are different ways people can hack and you and your personal information. I have made a thorough security plan that I plan to follow to protect me and my family/friends. The plan that I have mapped out and set to use protects not just one aspect but a few.
The first section of my plan is to protect my personal information while also using safe web browsing. How I plan to do this is when using any of my information (SS, credit cards, zips) I am going to use a private browser. Not only does this hide things from immediate people, but also hackers trying to find my cookies, cache, etc.

I am not always at home when I use Wi-Fi, this includes my mobile device and computer which I use a lot of different places for my homework. I never knew that using public Wi-Fi can increase your chances of getting hacked. Ways I plan to decrease my chances are as follows:
  • Using two factor authentications
  • Protecting my passwords
  • Avoid automatically connecting to Wi-Fi hotspots
  • Turning on my firewall
When facing a malware, it’s important to know that there are different types and they can happen very quickly. Different forms are spyware, which transfer personal information such as credit card numbers. Another kind is computer viruses. To protect myself, I have found a few ways:

·        Protecting my computer by using a strong security software such as “McAfee Internet Security.”

·        Enable automatic updates

·        Using caution when opening attachments

·        Backing up my files regularly.
To be honest, I never heard of phishing. Phishing to me just never seemed real, but since it has come to my attention that it is out there, I was put able to do some research and figure out ways to stop these hackers from getting my information. Phishing is an attempt of sending out emails to people to try and obtain different information. Ways to protect yourself are as follows:

·        Thoroughly reading through each email that asks for me to update my information.

·        Checking the sources

·        Entering my secure information on only secure websites.

Online tracking is exactly what it sounds like. It is hackers tracking your interactions that you do on the web, such as: browsing histories, email and website interactions, and website visitors. These things are tracked, collected, and stored for marketing and advertising purposes. Just like any other way of hacking, there are also ways to protect yourself. With some research, I found some of the simplest and most effective ways:

·        Install ad block plus

·        Change cookie settings and uncheck third party cookies.

·        Turn off referrers

·        Install HTTPS everywhere
People everywhere get hacked through their passwords every day. It is not uncommon for someone to get hacked through their social media accounts or their emails. I personally have had my Facebook account hacked before and figuring out how to unhack it is a long process if they change your password on you. A few ways to protect yourself include the following:

·        Do not pick a weak password.

·        Use multifactor authentication

·        Biometrics (fingerprints.)

·        Use a different password for each account.

·        Consider a password manager.
Things such as your laptop, and mobile phone have become increasingly popular and easy to use. They’re portable, and quick. Even though these things may be easy and accessible when needed, they are also very easy to hack into if the right precautions are not taken.

·        Password protect/ auto lock on.

·        Follow security protocols.

·        Wipe data before disposing it.

·        Report to the police if stolen or lost, immediately.

·        Disconnect wireless access, such as Bluetooth or Wi-Fi.

Protecting your laptop and/or desktop is almost the same as protecting your mobile devices. Both electronics are used every day all day, and people are constantly typing in all types of personal information.

·        Download security software that updates automatically

·        Treat your information like you would cash

·        Check out companies before visiting them and giving them your information

·        Only give your personal information out over encrypted websites only.

·        Protect passwords

·        Back up files.

File sharing can be risky, especially if you are someone to share music files or other types with your peers. With regular file sharing, you would use your web browser. In peer-to-peer sharing though, you use a software program. This software program helps you locate computers that have the file you may be looking for.
Protecting yourself is simple. With each risk, there is also a way to protect yourself.
The first kind of risk is malicious code.

·        Install fire wall and anti-virus

Second type of risk is Privacy Risk.

·        Know what you’re sharing and with who.
Online shopping is something we are all guilty of, including me. I never take the time to go about shopping safely, which I am so thankful nothing has happened. Their are a few protocols you can take to ensure the safety of your personal information.
  • Skip attachments and hyperlinks
  • Don't use public Wi-Fi
  • Protect your device
  • Upgrade Passwords
  • Review statements
Home appliances or other devices are usually hooked up to wifis, which could make it easier for people to hack you. Protecting not only your smart phone and/ or laptop but also things like your fridge, wireless music players etc.
  • Secure your network
  • Know what is connected
  • Keep up to date
With each device and action that you may need to protect, some of them have similarities on what to do and how to do it. Protecting personal information not only saves you in the long run, but also saves your spouse and/or kids from the outcomes. It is important to make sure everything you use the internet with has its own protection.
This assignment not only helped me to realize that their are people out their that want what you have, and will do almost anything to take it, but also on how to protect yourself. I enjoyed learning and reading, while also making my own security plan for my protection.


Monday, February 6, 2017

Module two

In module two, I have done a lot of things I never did before. I learned how to make a domain name as well as looking one up on the http://network-tools.com/ website. I honestly never even heard of a domain name and I took a lot of interest in thoroughly learning about this.

As well as the Facebook discussion. When responding to my fellow class mates and making my own discussion, I quickly realized that net neutrality is a big topic that everyone is starting to comment on. Paying for the internet to run faster and for different add ons, seems like such a far stretch when I don't see these providers making an effort to keep their promises for their customers.

Participation in module two, I believe was engaging. I tried to keep up and read what everyone's opinions were and what they thought about net neutrality. I find it interesting when participating in the online discussions to get a better understanding for different sides.

As far as new terminology goes, I learned quite a bit.
Four words that I learned through out this module along with the definitions are:
  • Domain name: Part of a network address that someone has, that identifies it as belonging to a particular domain.
  • Cache: Same type of items in a collected area stored in a hidden or non accessible place.
  • Cookies: Small files that are used to store data for a certain website or client.
  • Servers: provide data and services to users and those that enable Internet Communication.
Their is one article that helped me understand this information thoroughly. Below it is posted.
I really enjoyed this learning module, especially the word cloud.

Monday, January 30, 2017

In Module one, I learned a lot about the internet, the history and how it works. I have always been curious as to how the internt began to work and what kept it a float. I found it interesting that the internet itself does in fact have different protocols they have to follow. I had a feeling that everything in this world has its own "language" and have a set of rules, but to think that the internet is being treated as some type of species is interesting on its own.

Their are a couple links that really helped me understand and realize how big the internet is.:
Internet usage around the world in 2016
In this link, not only is their a pie graph to show the usage, but below is a chart on these different areas usage and their populations. I tend to forget that everyone around the world has access to the internet, with being stuck in my busy life. It blows my mind how something we can not see, connects us all.
Owners of the internet and who is in charge.
When I personally think about something, whether it be a business or something like the internet, I always think everything has a specific owner. In this module and from this link, I learned that the internet does not have one owner, but is ran and owned by corporations and institutions.

As far as my participation goes, I believe that I put in the time and the effort in this course so far. I engaged in the private Facebook group and thoroughly searched what I was reading in order to understand what I was learning and reading.

Not only did I learn about the history, but I also learned new terminology. The terminology wasn't just new words, but the language of the internet.
1.) Collaboration: Two or more people/organizations working together.
2.) Commerce: A person or thing that is progressing/promising.
3.) TCI/IP: Internet protocol suite (1974)
4.) ATT Monopoly: Communication over the phone lines for domesticated data.