Building and Enhancing New Literacies Across The Curriculum
Building and Enhancing New Literacies Across The Curriculum
3. What are netiquette and the process of safe use of digital media? Give examples.
Netiquette is short for "Internet etiquette," and it is a rule of good behavior on the Internet, similar to how
etiquette is a code of polite behavior in life. These are some examples:
Avoid posting inflammatory or offensive comments online (a.k.a flaming).
Respect others' privacy by not sharing personal information, photos, or videos that another person may not
want published online.
Never spam others by sending large amounts of unsolicited email.
Show good sportsmanship when playing online games, whether you win or lose.
Don't troll people in web forums or website comments by repeatedly nagging or annoying them.
Stick to the topic when posting in online forums or when commenting on photos or videos, such
as YouTube or Facebook comments.
Don't swear or use offensive language.
Avoid replying to negative comments with more negative comments. Instead, break the cycle with a positive
post.
If someone asks a question and you know the answer, offer to help.
Thank others who help you online.
4. What are the common computer threats, and how can these be fixed?
In the context of computer security, a threat is something that has the potential to inflict significant harm. It is
something that may or may not happen, but has the potential to inflict major damage and lead to computer system and
network assaults. Cybercrime is increasingly becoming frightening in the lives of every individual and company to steal
data they may sell or trade, such as financial information, credit card information, and personal information or any other
information obtained through the use of computer networks.
The common threats are:
1. Install anti-virus software. Ensure that reputable anti-virus software is installed on all computers, including
all servers, PCs and laptops.
2. Ensure that the anti-virus software is up-to-date. New computer viruses are being released daily and so it
is essential that computers are protected by keeping the anti-virus software-up to-date.
3. Employ a firewall to protect networks. As computer viruses can spread by means other than email, it is
important that unwanted traffic is blocked from entering the network by using a firewall.
4. Filter all email traffic. Example of emails with certain file attachments commonly used by computer
viruses to spread themselves, such as .EXE, .COM and SCR files. These should be prevented from entering the
network.
5. Educate all users to be careful of suspicious emails. Ensure that all users know to never open an
attachment or to click on a link in an email they are not expecting.
6. Scan Internet downloads. Ensure that all files downloaded from the Internet are scanned against computer
viruses from one central point on the network.
7. Do not run programs of unknown origin. It is important to use a trusted source for software requirements
to be installed and ensure it can be accounted for.
8. Implement a vulnerability management system. It is important to regularly review network and the
applications running on it for new vulnerabilities and a plan on how to manage them, either by patching or
upgrading them using tools, such as firewalls or Intrusion Detection Systems that should be put in place.
9. Make regular backups of critical data. There is a need to keep important files on removable media, such
as portable drives or tape for back-up in the event that the network is infected with a computer virus.
10. Develop an Information Security Policy. The creation and publication of an Information Security Policy
is key to ensuring that information security receives the profile it requires in order to secure the systems and
data.
11. Monitor logs and systems. Regular monitoring of network and system logs can assist in the early
identification of a computer virus infecting the network or other attacks by criminals.
12. Develop an Incident Response Plan. The incident response plan outlines the roles and responsibilities of
people in the event of a computer virus infecting the network or any other type of security breach.
13. Restrict end-user access to the systems. Where possible, end users are prohibited from access to the
system so that the virus will also be restricted.
It is very important to integrate cyber/digital literacy into the teaching-learning process because digital literacy it
mezn dapitmeans being able to understand and use technology. It is the ability to comprehend and use technology they can utilize
their digital literacy abilities to access, consume, and create information online in a productive and beneficial way. Understanding
digital literacy allows us to utilize technology securely and avoid its risks. Effective and appropriate
Teommunication. In order to fully learn digitally, students must possess the skills. Allowing pupils to be creative and include their
particular interests and styles into their work empowers them and prepares them for the future. Allowing pupils to be creative and include
their specific interests and styles into their work empowers them and prepares them for the future.