Posts

Q9 e-commerce

Digital commerce  the four e-commerce modules represented below in the given graphic are namely business to business, consumer to business  , consumer to consumer and business to consumer.   the business to business model   : is where a business sells supplies to another business consumer to business : is the most recent e-commerce model and relates to individuals who offer to sell products or services to companies who are willing to purchase them consumer to consumer : is a business model that facilitates the transaction of goods or services between  consumers  business to consumer : involves all business transactions conducted directly between a company and its consumers with the customers being the end users of the product or services 

Q8 health and well-being

pinetrest board

Q7 guidelines to online safety

 guidelines to online safety  To  protect yourself from online hazards such as infringement ,indentity theft or hackers you need to take steps in protecting yourself against threats such as malware . by following these guidelines to online safety it will ensure that your online presence will be secure from anyone who wishes to it harm. protection of devices from malware and hackers by using antivirus software like spybot or avast  protect your information,back up your data regurlarly in case of an emergency creating and maintaining secure passwords to protect your data . use alphas ,numeric and symbols to make your password 'unhackable' protecting sensitive information files on your device by encrypting your data . having multiple layers to your defense system can help fend off hackers keeping your internet communication private this to keep your communication from being stolen protecting yourself and your data on social media platforms by monitoring who...

Q6 digital law

6.1 online , socialization refers to the ways in which individuals communicate with each other and the methods in which they do so. socialization describes the behaviour , customs, language and habits unique to a specific culture . evolving technology means that there are new ways to communicate constantly. thus changing the ways of socialization according to the new norm. 6.2 copyright access and fraud privacy and security  freedoms and accountability  cultural perceptions and values  cross cultural communication pornography

Q5. digital bill of rights

Image
according to congressman Darrell Issa the digital bill of rights are as follows The Digital Bill of Rights 46 1. Freedom - digital citizens have a right to a free, uncensored internet 20 2. Openness - digital citizens have a right to an open, unobstructed internet 22 3. Equality - all digital citizens are created equal on the internet  23 4. Participation - digital citizens have a right to peaceably participate where and how they choose on the internet 25 5. Creativity - digital citizens have a right to create, grow and collaborate on the internet, and be held accountable for what they create 25 6. Sharing - digital citizens have a right to freely share their ideas, lawful discoveries and opinions on the internet 31 7. Accessibility - digital citizens have a right to access the internet equally, regardless of who they are or where they are 17 8. Association - digital citizens have a right to freely associate on the internet 50 9. Privacy - digital cit...

Q4 inappropriate behaviour

the internet has become a daily contributor to our everyday lives . consequently as we become more dependent on the internet there are some people who seek to take advantage of this,making us increasingly vulnerable to cyber violations or cyber crime. Some of these cyber crimes can be caused by the data left behind or our digital footprint , everything we do on theinternet leaves a trail   somewhere in the  vast seas of online data .some people learn to navigate this seas of online data and can gain access to our data by hacking our internet lines and gathering details , this could lead to misuse of our data such as identity theft,or a hacker might even be able to gain access to your online banking details and transfer your money to themselves without any obstacle. The intruders could also access your data on your personal or work desktops this could lead to a leak of sensitive information that you do not want . Furthermore all of our online activity contributes to our digit...

Q3 .Napalm girl

Image
media fluency consists of two parts listening and leveraging ,listening is being able to verbalize the message and leveraging is finding the applicable medium for your message using audience,ability and criteria as guidelines. The napalm girl is seen running away from a commotion going on during the Vietnamise war .the little child is so distraught and fearful for her life she flees the scene in nothing but the skin on her body . In terms of inappropriate communication this picture could be seen as a violation of privacy but within the context of this picture it sets the tone of trying to send a more serious and true image of some  of the events that occured during the war. in my opinion the picture was meant to expose the world to the horrors going on in the world around them and not to expose the napalm girl.