Posts

Showing posts from May, 2017

Q9 e-commerce

Digital commerce  the four e-commerce modules represented below in the given graphic are namely business to business, consumer to business  , consumer to consumer and business to consumer.   the business to business model   : is where a business sells supplies to another business consumer to business : is the most recent e-commerce model and relates to individuals who offer to sell products or services to companies who are willing to purchase them consumer to consumer : is a business model that facilitates the transaction of goods or services between  consumers  business to consumer : involves all business transactions conducted directly between a company and its consumers with the customers being the end users of the product or services 

Q8 health and well-being

pinetrest board

Q7 guidelines to online safety

 guidelines to online safety  To  protect yourself from online hazards such as infringement ,indentity theft or hackers you need to take steps in protecting yourself against threats such as malware . by following these guidelines to online safety it will ensure that your online presence will be secure from anyone who wishes to it harm. protection of devices from malware and hackers by using antivirus software like spybot or avast  protect your information,back up your data regurlarly in case of an emergency creating and maintaining secure passwords to protect your data . use alphas ,numeric and symbols to make your password 'unhackable' protecting sensitive information files on your device by encrypting your data . having multiple layers to your defense system can help fend off hackers keeping your internet communication private this to keep your communication from being stolen protecting yourself and your data on social media platforms by monitoring who...

Q6 digital law

6.1 online , socialization refers to the ways in which individuals communicate with each other and the methods in which they do so. socialization describes the behaviour , customs, language and habits unique to a specific culture . evolving technology means that there are new ways to communicate constantly. thus changing the ways of socialization according to the new norm. 6.2 copyright access and fraud privacy and security  freedoms and accountability  cultural perceptions and values  cross cultural communication pornography

Q5. digital bill of rights

Image
according to congressman Darrell Issa the digital bill of rights are as follows The Digital Bill of Rights 46 1. Freedom - digital citizens have a right to a free, uncensored internet 20 2. Openness - digital citizens have a right to an open, unobstructed internet 22 3. Equality - all digital citizens are created equal on the internet  23 4. Participation - digital citizens have a right to peaceably participate where and how they choose on the internet 25 5. Creativity - digital citizens have a right to create, grow and collaborate on the internet, and be held accountable for what they create 25 6. Sharing - digital citizens have a right to freely share their ideas, lawful discoveries and opinions on the internet 31 7. Accessibility - digital citizens have a right to access the internet equally, regardless of who they are or where they are 17 8. Association - digital citizens have a right to freely associate on the internet 50 9. Privacy - digital cit...

Q4 inappropriate behaviour

the internet has become a daily contributor to our everyday lives . consequently as we become more dependent on the internet there are some people who seek to take advantage of this,making us increasingly vulnerable to cyber violations or cyber crime. Some of these cyber crimes can be caused by the data left behind or our digital footprint , everything we do on theinternet leaves a trail   somewhere in the  vast seas of online data .some people learn to navigate this seas of online data and can gain access to our data by hacking our internet lines and gathering details , this could lead to misuse of our data such as identity theft,or a hacker might even be able to gain access to your online banking details and transfer your money to themselves without any obstacle. The intruders could also access your data on your personal or work desktops this could lead to a leak of sensitive information that you do not want . Furthermore all of our online activity contributes to our digit...

Q3 .Napalm girl

Image
media fluency consists of two parts listening and leveraging ,listening is being able to verbalize the message and leveraging is finding the applicable medium for your message using audience,ability and criteria as guidelines. The napalm girl is seen running away from a commotion going on during the Vietnamise war .the little child is so distraught and fearful for her life she flees the scene in nothing but the skin on her body . In terms of inappropriate communication this picture could be seen as a violation of privacy but within the context of this picture it sets the tone of trying to send a more serious and true image of some  of the events that occured during the war. in my opinion the picture was meant to expose the world to the horrors going on in the world around them and not to expose the napalm girl.

Q2 . information fluency

Image
Homo naledi after professor lee berger from wits university made the ground breaking discovery of a new species of human he named the finding homo naledi . the name is derived from the chamber with in a cave where the remains were found . the species raised a lot of questions on where the homo naledi stood among other human kind . does the fact that their remains were buried in such a remote and secure part of the cave mean that they were seen as exceptional to our primitive ancestors? why were they buried in a manner that scientists describe as 'ritualized behaviour'? the profound special traits make this discovery particularly worth the fuss. the homo naledi also share features with a number of other previously discovered species of the homo genus such as neandartharls and humans. this discovery also gives researchers a broader look on what species inhabited earth before our time and on what levels we have evolved on since then. furthermore the unexpected features ...

Q1.4 create a linkedln account and subscribe to at least 2 groups that are relevant to your field of study . add a link of your profile to your blog

https://www.linkedin.com/groups/discover

Q5 Develop an acceptable use policy concerning the use of smartphones for the Independent Institute of Education to be implemented at various campuses

THE INDEPENDENT INSTITUTE OF EDUCATION ACCEPTABLE USE POLICY (AUP) FOR MOBILE DEVICES ON CAMPUS students are responsible for their own mobile devices. the school will not be held liable for any devices lost,stolen or broken on campus grounds  use of smart phones during tests and examinations are  strictly PROHIBITED . devices are required to be switched off and either handed in to the lecturer or put away with your other personal belongings. any student caught using their mobile phones to cheat on assignment or any other school evaluation will be dealt with accordingly

Q4 use your cellphone to create a short video for tertiary education students on the importance of netiquette and why it is important.discuss the role it plays in all aspects of our lives.

Q3 discuss the internet of things and how it will affect business in South Africa. identify a sector in the industry and detail how it will be impacted

The internet of things  the internet of things is the inter network of physical devices such as from cars on the road to your kitchen appliances,anything technology wise is connected in some way or the other. the internet of things will greatly benefit industry business in South Africa .  according to an online source "  Businesses can also get  many benefits from the Internet of Things.    can be useful in many different categories including asset tracking and inventory control, shipping and location, security, individual tracking, and energy conservation.     As mentioned before, IoT allows for the communication between devices, commonly referred to as Machine-to-Machine (M2M) communication.    With this being possible, physical devices are able to communicate to people letting them know their condition and where it is located.    Devices such as trucks or ships allow for the maximum capacity to be filled by". the...

Q2.3 provide a few tips on how one can manage their digital footprint ?

ensure that all content you put online is ethical  think twice before adding a picture or writing a comment that could potentially put your livelihood in jeopardy  make sure that you are aware of netiquette at all times .

Q 2.2 digital footprints can be construed as trails that digital citizens leave online . Do you think that digital foorprints can become a problem? Discuss

Digital footprints. No I do not think that digital footprints could become a problem. as a good digital citizen knowing the proper way of using digital technology should be priority. incriminating text or images should not be put on the internet in the first place . if one conducts themselves in the correct manner following netiquette  then there is nothing to hide . also when posting online one should first be aware of the consequences as nothing is ever really deleted once posted to the public furthermore the thought of a  digital footprint in the minds of the public  could help reduce unlawful and improper actions being done online because it can be traced through their digital footprint back to them ,in my opinion it maintains a measure of order throughout the internet.

Q2.1 unemployment between the ages of 15 and 24 has reached a staggering 71 million (ILO,2016). solution fluency is a guided problem solving framework that consists of six D'S .use the solution fluency process to solve unemployment problems in your area. provide a brief background of your area and how yo intend to tackle this problem.

define defining is the most crucial part to this process. if defined incorrectly your solutions will become redundant if defined to big or small you might eliminate too much information or have too much unnecessary information that will hinder and confuse your solution process   defining the problem : unemployment problems in the Athlone area 2. discover  this is the exploration phase,understanding the problem. look at the past and find out how we got here ,could something be done differently? discover :  20 years ago the job market wasn't as competitive as it is today. to qualify for a job one needs at least 3 years of of tertiary education and experience .due to socioeconomic factors a lot of people in my area aren't able financially to obtain a tertiary education and therefore may struggle to find a job. 3. dream once you have established where we are and how we got here the next step is envisioning possible solutions and foward thinking. creative...