Sunday, January 16, 2022

computernotes part 3

 computernotes part 3


11.3.2 Communication Etiquettes Digital communication includes email, texting, instant messaging, talking on the cell phone, audio or video Remember!! While surfing the Internet, we should be cautious about our personal and confidential data. √ Think before sharing credentials with others on an online platform. √ Keep personal information safe and protected through passwords. Activity 11.2 Find out how to report about an abusive or inappropriate post or about a sender in a social network? Ch 11.indd 232 08-Apr-19 12:32:00 PM 2020-21 Societal Impact 233 conferencing, posting on forums, social networking sites, etc. All these are great ways to connect with people in order to exchange ideas, share data and knowledge. Good communication over email, chat room and other such forums require a digital citizen to abide by the communication etiquettes as shown in Figure 11.3. (A) Be Precise • Respect time: we should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us. Also, we should not always expect an instant response as the recipient may have other priorities. • Respect data limits: For concerns related to data and bandwidth, very large attachments may be avoided. Rather send compressed files or link of the files through cloud shared storage like Google Drive, Microsoft OneDrive, Yahoo Dropbox, etc. (B) Be Polite Whether the communication is synchronous (happening in real time like chat, audio/video calls) or asynchronous (like email, forum post or comments), we should be polite and non-aggressive in our communication. We should avoid being abusive even if we don’t agree with others’ point of view. (C) Be Credible We should be cautious while making a comment, replying or writing an email or forum post as such acts decide our credibility over a period of time. That is how we decide to follow some particular person’s forum posts while ignoring posts of other members of the forum. On various discussion forums, we usually try to go through the previous comments of a person and judge their credibility before relying on that person’s comments. 11.3.3 Social Media Etiquettes In the current digital era, we are familiar with different kinds social media and we may have an account on Facebook, Google+, Twitter, Instagram, Pinterest, or the YouTube channel. Social media are websites or Avoid Spam!! On receiving junk email (called Spam), neither reply nor open any attachment in such email. No Permanent Deletion!! We can post or comment anything on Internet, and delete it later. √ But remember, it cannot be permanently deleted. It is recorded in our Digital Footprint. √ This is how many culprits who spread hate, bully others or engage in criminal activities are traced and apprehended. Figure 11.3: Communication etiquettes Be Precise Respect Time Respect Data Limits Be Polite Be Credible Communication Etiquettes Ch 11.indd 233 08-Apr-19 12:32:00 PM 2020-21 234 Computer Science – Class xi applications that enable their users to participate in social networking by creating and sharing content with others in the community. These platforms encourage users to share their thoughts and experiences through posts or pictures. In this way users can interact with other online users of those social media apps or channels. This is why the impact and outreach of social media has grown exponentially. It has begun to shape the outcome of politics, business, culture, education and more. In social media too, there are certain etiquettes we need to follow as shown in Figure 11.4. (A) Be Secure • Choose password wisely: it is vital for social network users. News of breaching or leakage of user data from social network often attracts headlines. Users should be wary of such possibilities and must know how to safeguard themselves and their accounts. The minimum one can do is to have strong and frequently changed password. Never share personal credentials like username and password with others. • Know who you befriend: social networks usually encourage connecting with users (making friends), sometime even those whom we don’t know or have not met. However, we need to be careful while befriending unknown people as their intentions possibly could be malicious and unsafe. • Beware of fake information: fake news, messages and posts are common in social networks. As a user, we should be aware of them. With experience, we should be able to figure out whether a news, message or post is genuine or fake. Thus, we should not blindly believe in everything that we come across on such platforms, we should apply our knowledge and experience to validate such news, message or post. (B) Be Reliable • Think before uploading: we can upload almost anything on social network. However, remember that once uploaded, it is always there in the remote server even if we delete the files. Hence we Don’t Meet Up!! √ Never arrange to meet an online friend because it may not be safe. √ No matter how genuine someone is appearing online, they might be pretending and hiding their real identity. Play Safe!! Think carefully before sharing personal photos. Is having the same password for all your accounts on different websites safe? Think and Reflect Figure 11.4: Social media etiquettes Choose password wisely Know who you befriend Beware of fake information Think before you upload Ch 11.indd 234 07-May-19 9:45:46 AM 2020-21 Societal Impact 235 need to be cautious while uploading or sending sensitive or confidential files which have a bearing on our privacy


No comments:

Post a Comment