General Concept of Social Networking - Study Notes
General Concept of Social Networking - Study Notes
of Social
Networking
COMPUTER
Copyright © 2014-2021 Testbook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App
Social networking
It is the process of connecting with friends, family, coworkers, and businesses online through social media
platforms. People can use social networking to share and talk about their interests and concerns with others
who might share them and interact with them in other ways.
Digital Technologies
• The employment of "Digital Technologies" has caused a lot of changes in the world around us recently.
• Our lives have been significantly impacted by these changes. making things more practical, quick, and
manageable.
• A letter used to take days to arrive, and each receiver would receive a copy and reply on their own.
Digital Footprint
• The digital shadows reflect the activity of any person on the internet and their behaviors towards the
information on the internet.
• The digital footprint is generated and used with or without user knowledge. It includes websites we
visited, emails sent by users, any information submitted by users on the online platform, and the
computer’s address, location, and other device-specific details.
Etiquettes: It is the set of conventional rules of personal behavior in polite society, usually in the form of an
ethical code that delineates the expected and accepted social behaviors that accord with the conventions and
norms observed by a society, a social class, or a social group.
Net Etiquettes:
Net etiquette consists of ethical, respectful, and responsible behavior of users.
• Ethical: Users should not use copyrighted materials without the permission of the creator or owner. Prior
to sharing information, the users also need to be sure that user has sufficient knowledge on that topic. The
information shared should be true and unambiguous.
• Respectful: As good digital citizens users have the right to privacy and the freedom of personal expression.
At the same time, users have to understand that other digital citizens also have the same rights and
freedoms.
• Responsible: Any insulting, degrading, or intimidating online behavior to publicly ridicule a particular user
is termed as cyberbullying. Even do not feed the troll by posting inflammatory or off-topic messages in an
online community, just for amusement.
Communication Etiquettes:
• Digital communication includes email, texting, instant messaging, talking on the cell phone, audio or video
conferencing, posting on forums, social networking sites, etc.
Be Precise:
• Respect time we should not waste precious time in responding to unnecessary emails or comments unless
they have some relevance to us.
• Respect data limits: Rather send compressed files or links to the files through cloud-shared storage like
Google Drive, Microsoft OneDrive, Yahoo Dropbox, etc.
• Be Credible: When leaving a comment, responding, or posting to a forum or email, we should exercise
caution because these actions affect our trustworthiness over time.
In social media too, there are certain etiquettes users need to follow and they are:
• Choose a password wisely: it is vital for social network users. there is a possibility that social networks can
be the reason for data leakage. Never share personal credentials like username and password with others.
• Know who you befriend: social networks usually encourage connecting with users (making friends),
sometimes even those whom the user doesn’t know or has not met. However, users need to be careful
while befriending unknown people as their intentions possibly could be malicious and unsafe.
• Beware of fake information: fake news, messages, and posts are common on social networks. As a user,
we should be aware of them. With experience, the user should be able to figure out whether news,
message, or post is genuine or fake.
Data Protection
Intellectual Property is legally protected through copyrights, patents, trademarks, etc.
It gives the patent holder an exclusive right to commercially exploit the invention for a certain
period of time (typically 20 years from the date of filing an application for patent).
• Copyright is given for creative and artistic works (e.g. books, movies, music, paintings, software etc).
It gives a copyright holder the exclusive right to control the reproduction or adaptation of such
works for a certain period of time.
• Trademarks is a distinctive graphic sign which is used to distinguish the products or services of different
businesses.
These are presently administered under the Trade Marks Act, 1999 and the rules are made
thereunder.
• Industrial design right protects the form of appearance, style or design of an industrial object (e.g. spare
parts, furniture, or textiles).
Plagiarism:
• Plagiarism is presenting someone else's work or ideas as your own, with or without their consent, by
incorporating it into your work without full acknowledgement.
• Plagiarism is both an illegal and punishable act and is considered to be on the same level as stealing from
the author who originally created it.
Phishing:
• The act of sending an email that falsely represents itself as coming from a reputable company, especially
banks.
• The email will request private data, including bank account information, PINs, or passwords, from the
receiver.
Skimming:
• This entails installing a skimmer device on an ATM machine so that it may read and save credit card
information. It leads to credit card fraud and misuse.
Cyberbullying
• Cyberbullying is the deliberate use of social media to persistently hurt or harass other individuals.
• It primarily involves bullying of schoolchildren online.
Cyber Crime
• Cybercrime is the use of a computer as an instrument to further illegal ends, such as committing fraud,
trafficking in child pornography and intellectual property, stealing identities, or violating privacy.
• The Cybercrime occurs primarily because of the skill of the offender who is called the Hacker.
• Cybercrime becomes easier for the offender to commit when the victim has a lack of knowledge towards
computer technology.
• Union Home Minister Amit Shah inaugurated the Indian Cyber Crime Coordination Centre (I4C) and also
dedicated the National Cyber Crime Reporting Portal to the nation on 11 Jan 2020.
• The scheme to set up I4C was approved in October 2018 at an estimated cost of around 416 crore rupees
to deal with all types of cyber-crimes in a comprehensive and coordinated manner.
• National Cyber Crime Reporting Portal (www.cybercrime.gov.in) is a citizen-centric initiative that will
enable citizens to report cybercrimes online through the portal.
Indian IT Act
The IT Act 2000 is the first cyber law in India.
• IT Act 2008 introduced Section 66A which penalized sending "offensive messages".
Social networking sites are usually made up of other individuals; they might also include profiles of events,
companies, and even political parties. Facebook, Instagram, Twitter, and LinkedIn are examples of social
networking sites.
Facebook
• It is a social networking site that makes it easy for you to connect and share with family and friends online.
• Originally designed for college students, Facebook was created in 2004 by Mark Zuckerberg while he was
enrolled at Harvard University.
LinkedIn
• It is the most popular social networking site when it comes to online “business networking”.
• It is a platform that allows business people and professionals all over the world, regardless of their
industry, to connect with other professionals.
Twitter
• It is a social network that allows users to send and receive short messages, called tweets.
• Tweets can be up to 140 characters long. You can send tweets from your computer or even from your
mobile phone. Twitter users can follow what other people post.
Notebook
• An extremely lightweight personal computer. Notebook computers typically weigh less than 6 pounds
and are small enough to fit easily in a briefcase.
• Aside from size and portability, the principal difference between a notebook computer and a personal
computer is the display screen.