Sunday, March 30, 2014

Creating Multimedia Productions

This week in our technology class I learned that copyright laws require people to give credit to the owner of an image, website, information, book, etc,... These productions are called multimedia productions. Copy-right laws permit people to not allow others to steal their ideas and thoughts as well as productions for others to use and claim as there own. Furthermore, Copyright information includes the information or date the photo was created and the owners name. Copyright laws for movies can be extended for many years after the movie was made--even past the owners death. For instance, Star Wars was made in 1977 but has copy right laws that protect it for about 95 years after the movie was made (until 2072). Creators of materials like art, books, pictures, etc,... are granted the power to manage and sell their products. Permission is required for people to use copyrighted information. However, creative commons allow people to use their work as long as attribution and non-commercial measures are taken. The owner of the product secures some rights of the material; however, her product can be seen by anyone at any time. In order to use information that is copyrighted you can contact the owner and ask for permission and if they accept your request than you receive a license fee. This is part of the fair use system. Both people benefit from this system--you get the information/picture you wanted and the owner is better able to navigate the kind of career they wanted from their production.
Here is a video I partook in about the consequences of plagiarism and that if information is copyrighted and you steal it, then you can suffer serious repercussions:https://www.youtube.com/watch?v=QAWD_mZV6mc
Other videos that I got information from:http://www.commoncraft.com/video/copyright-and-creative-commons
http://www.youtube.com/watch?v=tk862BbjWx4&feature=youtu.be&scrlybrkr=48103120
Just cause other people commit the act of piracy, doesn't mean you should:https://www.youtube.com/watch?v=kTuOjKh_DDM

Sunday, March 16, 2014

Credible Sources

Nowadays, the internet has tried to sell us just about everything it says. After studying this week's topic, credible sources, I have come to obtain the knowledge of discerning whether or not a source is credible. There are three major ways of differentiating the realness to the falseness of a cite (however, you can also break it down to five currency, relevance, accuracy, authority, and purpose). First, you want to make sure that the information isn't biased. For example, if you have a website that is trying to sell you a topic and all they mention is how good the topic is, they are imparting partial and biased information to its readers. The danger of using a cite that isn't credible is that, you may be getting "blinded information" or information that isn't true and is narrow minded. When authors write in a biased form, they are writing based on opinions rather than on facts. Another step, should be that web users check the author's biography. By seeing how experienced the author of the article or website is on the subject, it can give you a glimpse into how accurate the information he/she wrote about is. An author who is inexperienced and makes a lot of typing and grammatical errors, may have lead you to a shaky and unreliable source. For instance, if you come a cross an author who graduated from a college, has held professional jobs in the field you are researching, and seems to know what they are talking about, then I would establish that cite as credible and reliable. Lastly, in discerning the realness of a source you want to see how recent the cite has been updated. If the source was updated 10 years ago it may not have such valid information on it, as a source that has been updated recently that day. Newly found information is changing at rapid paces everyday. Therefore, if you are going to do an assignment on a certain subject for an important class of yours, you are going to want to verify that all your information is up to date. In other words, having a source that is updated frequently means that the information derived from it will be more likely in being reliable. After all, everybody want's the best grade on their assignments so in order to receive the best grades, they need to have the best quality of information.
Wikipedia, may perhaps be the world's biggest controversial source--Can I trust it or can I not? The truth of Wikipedia is that most of the sources it derives the information from are credible; however, because of the many unprofessional people that transmit the information on to the website, the information becomes warped and contorted, no longer making it reliable. However, strides have been made by Wikipedia's authors and founders to ensure the reliability of its information. More experienced and intellectual college students are being licensed to edit Wikipedia; hence, making it a more reliable source. In the end, Wikipedia is a great source to use when you want quick and easily attainable information, but the quality of that information may not be totally reliable for important projects. The most important thing is to really analyze the information presented on the source.
http://www.youtube.com/watch?v=EyMT08mD7Ds
http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page346376

Sunday, March 9, 2014

Viruses, Identity Theft, and Strong Passwords

Just as humans can get sick, so can computers! When humans sneeze, the germs are transmitted by air; however, with computers, they contract viruses through computer programs.  Created by online criminals, viruses spread quickly and are designed to multiply. Once they are on a computer, viruses can erase files, send emails without the owners verification, or transport private information to criminals, like passwords and security numbers. There are three types of viruses: viruses, worms, or Trojans. First, viruses are transmitted as an attachment sent in an email or shared USB drive. As soon as the files with the viruses are opened, the mistake has been made, and the virus begins to multiply. Furthermore, they begin to search for other documents to attach to, and be transmitted to even more computers. In order to combat viruses, uploading and installing your computer with anti-virus software, which prevents the downloading of viruses and deletes them when they are found. Second, worms are even more dangerous because they spread to computers without the user doing anything. Worms are programmed to spread to computers that are connected in a network and spread immediately. The worms find "back doors" or "trick" the computer into letting them in and once they do it to one, they find similar "back doors" to other computers. By keeping computer software up to date at work and at home, you will prevent havoc and close "back doors". Last, Trojans are disguised as computer software or advertisements; however, hidden inside are viruses that can cause tremendous problems. They can open new "back doors" and send criminals private information like passwords and security numbers. Trojans can be avoided by only downloading software from credible cites. Finally, keeping your computer up to date, and getting anti-virus software will keep viruses out of computer. Only click on links and downloadable attachments and files that you know are safe.
Identity theft proves to be a big dilemma in our modern world. People who are hacked and receive illegal access of stranger's accounts. These criminals steal people's identity. With our modern day technology, retrieving people's passwords is not that complicated, especially since most people have a common password that they use for most of their accounts. Finding someone's password is quite simple, as long as that person know your personal information. To avoid being a victim of identity theft: watch out for skimmers, change your usernames and passwords frequently, don't respond to texts, emails, phone calls, etc... with personal information, monitor online account balances and transactions commonly, and obtain identity theft protection through insurance.
In conclusion, having strong passwords is one of the greatest precautions a person can take in order to decrease their chances of being impersonated. Knowing information about you can make finding passwords much easier for the criminal. In creating a strong password don't use easy to guess information like birthdays, pet names, or phone numbers. Moreover, your password should not include information about you. Taking the acronyms of a memorable phrase or expression is an easy way to start. By adding numbers, special characters, and capitalized letters the password gets even stronger. Never put your password in easily located areas or tell people your password via phone or by email. Remember to change your password often, and not have the same password for all your accounts. Finally, protect your computer from viruses using modern software, and have strong passwords so that you won't be susceptible to identity theft.
http://en.wikipedia.org/wiki/Computer_viruses

Thursday, February 27, 2014

Safety on Wireless Communication

Wireless communication may be one of the greatest inventions of all time. It incorporates the communication and transmission of information over long distances without the use of electronic conductors, like cables and wires. There are many modern day devices that carry out the functions of wireless communications, such as: smart phones, wireless computer parts, satellite televisions, GPS units, etc... . So why is wireless communication helpful? There are many benefits to this type of network. First, this advanced way of communication allows for immediate access to information-delivered in a matter of just a few minutes. Second, workers can receive information anywhere and at anytime without hauling big cable boxes or wires around them. Thirdly, urgent situations can be made aware of more quickly. Despite location or distance, people from near or far, can almost always connect with one another. Lastly, wireless devices are cheaper to set up and maintain.
With this new technology, there ensues tremendous responsibility. Many people have the misconception that what they post online is private and that no one will ever be admitted to see it. Unfortunately, this is not the case. Many teens and young people, especially, find themselves posting inappropriate comments, videos, and pictures. There are serious and even federal consequences that can be brought forth. Teens who text or send revealing photos, ask somebody else to send them inappropriate images or texts, or put themselves in a position of possible harassment over a revealing text, can all face serious repercussions. If anything like this should occur, it is important to act fast and get people to help and stop the spreading of this message. (One should consult a parent or teacher.)
Another important safety topic is texting while driving. This danger of this form of communication arises when people use it at an improper time and place. When one is driving they should be completely engaged on the road, and not have outside distractions, like their phone, occupying them. Thankfully, many teens choose not to text and drive because they are conscious of what may happen if they do. Severe, and sometimes, fatal events occur. In addition, 30 states have prohibited texting while driving and fine those who are caught. For instance, if your best friend is driving you home and they are texting on their phone, the best way to handle the problem is by calmly asking them to get off their phone. In the case where they refuse to give it up, it is important to inform them about the dangers of texting while driving. If you are the driver, it is important to consider the safety of those around the you and your own well being.
Furthermore, most people don't fully comprehend just how quickly viral messages can spread. The chance of people seeing what others post on the web is very likely. These people can be parents, siblings, friends, or even complete strangers. The dangers of living in a world where everyone is interconnected includes the idea that anyone at anytime can see information about you, without you realizing. This is why it is crucial to think twice before doing something on the web or sending something to someone else, because nowadays images, videos, and comments can go viral and spread quicker than ever before. Wireless communication is a great invention, but people should also know just how monitored worldwide communication can be. Depending on how one uses wireless communication, it can be a truly awesome way of communicating.
http://www.engineersgarage.com/articles/wireless_communication.

Saturday, February 22, 2014

022114 Choosing a Computer and Cloud Computing

Computers are taking the world by storm and are becoming a part of many people's lives. Many buyers nowadays must be informed about the parts and services of their computer in order to make a wise purchase. Although all computers come in different shapes and sizes their operating forces make them similar.  There are three major parts to the hardware of a computer. First, there is the hardrive. The hardrive stores all the photos, music, and software of a computer. Therefore, the bigger the hardrive, the more amount of storage in one's computer. However, some information in computers is difficult to operate rapidly, because of the limited amount of storage. (The hardrive "takes the long way" to access information.) Thus, RAM is needed. RAM, Random Access Memory, is an alternative, which makes information easy to administer-- "the short route" to accessing information. RAM makes computers run more swiftly and is cleaned every time the computer is reset. Lastly, the processor sends and receives information, executes duties, and sets the software operating. The faster the processor achieves its tasks, the faster the computer will be, overall. In choosing a computer it is crucial that the customer knows exactly what they are looking for, they need to have a set plan, and qualities for their future computer. For example, if a customer wanted to invest in a computer that was touch screen, had large amounts of storage, and a retina display, they are likely to find exactly what they are looking for. Compared to a person who is not educated in what kind of qualities their computer should have, a customer who knows what they want, will find what they are looking for quicker, and be more satisfied.
Modern computers no longer operate alone. Thanks to the wonders of internet, cloud computing has changed the way people operate their technology. Cloud computing is secure, accessible through the web, and upheld in a different location. There are many benefits of cloud computing. Some of advantages include: its cost efficiency, nearly limitless storage, back up and recovery programs, communication with all technological devices, easy access to information, and lastly, quick activity.  Cloud computing may be one of the most affordable and cost efficient forms of computing to use. Unlike traditional software companies, where users would have to licenses expensive fees, cloud computing allows and ensures users, one-time payments and therefore, can significantly lower expenses. Storage of information, music, pictures, and other software is practically unlimited. There is no worry on running out of storage space or having to upgrade. Also, the cloud is capable of restoring information and makes the process of backing up and restoring information much more simple. Software integration is something that occurs immediately in the cloud. Customers use their utilities with their personal preference and so, users simply choose which services and operations suit their needs best. Furthermore, cloud computing ensures easy access to information despite location. Geographical location and time zone issues are no longer a problem. Lastly, cloud computing  functions an entire system in a matter of just a few minutes. Although, there are many benefits of cloud computing there are disadvantages such as: technical issues, security, and like all software programs it can be prone to attack.
Just in the past few years there have been amazing advancements in technology and I feel as though the sky is the limit for future computers and software programs. I predict that in the near future, software programs will be able to reason like humans. They will be able to think, analyze, and possibly even communicate the way humans do. All modern day problems with computers will be solved, and although futuristic computers will not be perfect, they will operate more efficiently and quicker than the computers that we have nowadays. The software programs will be similar to cloud computing; however they will be free and all computers will be in sync with the program when first purchased. Perhaps one day there will be a computer that is built into to one's glasses--talk about portability! In conclusion, the future of computers and cloud computing is really endless. The possibilities go far beyond our wildest dreams.
http://www.bbc.com/future/story/20131119-computer-chips-that-think-like-us.

Thursday, February 13, 2014

First Blog Entry-Digital Literacy

Anna Dos Santos
Mrs. Weser
My Digital Life
Feb. 13, 2014
I abide by the Honor Code-ADS

Digital literacy is the skill of using technology efficiently, in terms of information, conversation (or communication), and understanding its importance on the everyday citizen. Throughout this week's learning session the class was asked to research the importance of digital literacy, acquire knowledge about it, and show how it impacts our lives.
Very few people know how to discern whether a website is true or false; however, digital literacy allows one to expand his/her knowledge about websites so that he/she can detect a fake website from a real one. In other words, being digitally literate entails that one can determine factual from counterfeit websites and create information by means of Internet and technology. Some examples of digital literacy include using social media accounts to post information about yourself, writing papers, creating presentations, and other routine activities on the web. Digital literacy began mainly because of plagiarism. Although many websites and articles are confidential and copyrighted, people still copy and paste, and use information as their own. Other problems include issues with social media. For example, text language has become an increasingly more problematic issue. Many people have begun abbreviating words and using numbers and letters to convey the same message quicker. "Lol" is an abbreviated term for "laugh out loud", for instance. The problem arises when this type of language begins to affect an individual's way of spelling. As a result, of all these dilemmas with technology, digital literacy was created to grant people knowledge how to navigate, and effectively as well as safely, use the internet. It is the duty of all persons to use the internet responsibly and productively. Being digitally literate will allow for people to know not to put private information on the web, use reputable sources, and educate the way people understand technology.
Although, I have acquired a plethora of information on the subject of digital literacy there is still much more that I hope to learn. Just as society has been growing. technology has been expanding as well. It is necessary for jobs and schools to now be obliged to use digital literacy in many aspects of every field. My question is: What can I do to become more safe and knowledgeable about digital literacy and the advancing technology around me? I also hope to learn how to appropriately use all of my tools on the computer, so as to receive a full understanding of utilizing what I have.
Digital literacy is an important skill set in a multiple of ways. One way that digital literacy is important in day-to-day activities is because it allows for one to use his/her technology in a smart way. By understanding the importance of privacy online, one will resist not putting private information (like cell phone numbers, home address, and other personal information). Furthermore, the more digitally literate a person is, the better he/she will be at using technology. Due to the fact that technology has become more important, becoming a better user of technology is equally as significant.
http://digitalliteracy.cornell.edu/welcome/dpl0000.html