This Document Contains Chapters 9 to 10 Technology Now Chapter 9: Communication Chapter Review DIGITAL COMMUNICATION 1. Name four types of digital communication. Answer: Types of digital communication include email, instant messages, text messages, podcasts, blogs, wikis, and online social networks. 2. What is a communications system? Answer: If you want to send a message to someone, you use a communications system, which sends electronic data from a source to a destination. 3. What are the two types of communications software you need to communicate with another computer user? Answer: You can use email software to send and receive email messages, use messaging software on your smartphone, or use Web-based software for a Webinar. The software varies depending on your task. ELECTRONIC MAIL 4. Describe the five steps involved in sending an email message. Answer: 1. Your email program uses your Internet or network connection to send the message to your email server. 2. Depending on the destination, the email server determines the best route for the message, which often involves sending the message to a series of network devices called routers. 3. The last router in the series sends the message to your friend’s email server. 4. That email server stores the message in your friend’s mailbox. 5. When your friend checks for messages, the email server transfers the message to an email program so it can display the message on your friend’s computer. 5. What is the main difference between the two types of email accounts you can use? Answer: If you sign up with an ISP, your employer, or your school, you can use a local email client, which is installed on your computer or mobile device, to send and receive email. You can also set up an account through an online service such as Gmail, and then access your email using a Web browser, a system known as Webmail. 6. Explain the three parts of an email address. Answer: 1. User ID: Typically, this is your name or nickname. Every email address must be unique, however, or email servers couldn’t route messages correctly. That’s why you see user IDs such as BobJohnson738. 2. “At” symbol: The @ divides the user ID from the name of the email provider, also called the domain name. 3. Domain name: Although you can often select the user ID, you can’t select the domain name because it identifies the email server. MESSAGING 7. What is a real-time messaging system? Give an example of such a system. Answer: A system that lets people exchange short messages while they’re online is called a real-time messaging system. One-on-one real-time messaging is called instant messaging (IM) for short. Real-time messaging among group members is called chat. 8. What is presence technology and how is it used in electronic messaging? Answer: IM uses presence technology, which lets one computing device identify the status of another. As a result, you can see when people on your contact list are online. 9. What is the purpose of the Multimedia Messaging Service (MMS)? How is it different from the Short Message Service (SMS)? Answer: Text messaging, also called texting or SMS (Short Message Service), is an asynchronous service, which delivers and stores messages until participants decide to view them. Most messaging services let you send pictures and short video clips along with text messages. When you do, you are using the Multimedia Messaging Service (MMS), which also allows for longer messages than SMS. PODCASTS AND ONLINE CONFERENCES. 10. Describe how you might use a podcast and feed. Answer: A podcast is an audio or video file stored online and distributed by downloads or through feeds. A feed is basically a service that you subscribe to so you can receive frequently updated Web content. If you subscribe to a feed, you automatically receive downloads of new podcast episodes as they are produced. If you don’t subscribe, you can still download podcast episodes, which are usually MP3 files, to your device. Examples of podcasts include music, radio shows, news stories, classroom lectures, political messages, and comedy routines. 11. What is the difference between a Web conference and a Webinar? Answer: A Web conference is a meeting that takes place on the Web. Web conferences typically are held on computers or mobile phones. A Webinar, short for Web-based seminar, is a type of online conference in which a presenter gives a lecture, demonstration, workshop, or other type of instructional activity. 12. Explain how to subscribe to an RSS feed. Answer: To subscribe to the feed, click the Feeds button, and then click the Subscribe link on the Web page. When you subscribe to a feed, Internet Explorer lists the feed in the Favorites Center. When a Web site updates the feed, the Favorites Center displays the name in bold. You click the name to read the updated content. BLOGS AND WIKIS 13. What is a blog and what kind of content does it provide? Answer: A blog, short for Web log, is a Web page listing journal entries with commentary and information, usually about a particular interest. Blogs can contain text, photos, video clips, and links to additional information. 14. What is a wiki and what kind of content does it provide? Answer: A wiki is a collaborative Web site that members of a group can access and edit using a Web browser. If you’ve ever used a search engine to look up a definition of a term or the meaning of a phrase, you’ve probably visited Wikipedia, one of the largest wikis on the Web. Students and teachers often use private educational wikis to collaborate on projects. Researchers use wikis to share findings, offer and receive suggestions, and test their work. Businesses also use wikis, especially when employees are not all in the same physical location. 15. How is a blog different from a wiki? Answer: People use blogs to read the opinions of others and to comment on topics of interest to them. To collaborate with other people online, you can use a wiki. SOCIAL NETWORKS 16. What is important about your profile on a social network? Answer: To join a social network, you provide a name and password and complete an online form to create a virtual identity, or profile, which includes information you choose to describe yourself. You can expand your profile to describe your interests and activities and invite friends to visit your pages. 17. Describe four types of tools a social network typically provides. Answer: The Edit Profile tools let you personalize your posts and comments, such as by adding a photo to your profile. The Find Friends tool lets you search for members who share your interests and compile a list of contacts from other sources such as your email address book. The Create Group tool lets you form a group, which is a collection of people who share a particular background or interest. Groups can be public (open to anyone), or private (restricted viewing and access, where you have to accept a request to join). The Timeline displays personalized content from your profile and posts. In Facebook, the Timeline (originally known as the Wall) lists posts with the most recent content at the top of the list. Friends or Contacts: On Facebook, contacts are called friends; you can display a list of friends by selecting the Search box, and then selecting My Friends. You can also designate some friends specifically as family or as close friends—these are the contacts you keep in touch with the most. The News Feed or Network tool lets you read about the activities of your contacts. On Facebook, this feature is called News Feed; on LinkedIn, it’s called Network. 18. Describe two ways social network members can exchange messages with each other. Answer: Most social networking sites let members post messages on the pages, timelines, or walls of other members, which is ideal when they are not online at the same time. If you are online at the same time as another member, you can use a chat feature to exchange text messages or a video chat to see and speak to another member. INTERNET ETIQUETTE 19. What are three rules for Internet etiquette? Answer: •Treat others as you want them to treat you. For example, don’t use all capital letters in an email message or other communication, because it can seem like rude shouting. •Be polite in your online communications. Avoid wording that might seem offensive or argumentative. Take care when using humor or sarcasm, which can be misinterpreted easily. •Read your messages before sending them and correct errors in spelling, grammar, and tone. •Consider email as public communication, because people might forward your message to others without your knowledge. 20. Name three actions to avoid when participating in a social network for business. Answer: Don't invite visitors to play games or join other activities that could waste their time. Don't post anything that you don’t want a future or current boss, colleague, client, or other professional contact to read. Don't publish posts or comments when you are not yourself, such as when you are tired or angry. Don't publish posts or comments about controversial subjects that others might find offensive. Test Your Knowledge Now 1. A(n) ___________ sends electronic data from a source to a destination. a. communications system b. protocol c. netiquette d. email address 2. To make sure that devices can communicate with each other, they follow ___________. a. timelines b. real-time message systems c. protocols d. presence technology 3. Computers and devices that communicate using radio waves across a medium distance of 100 to 900 feet use ___________. a. Wi-Fi b. TCP/IP c. WiMAX d. radar 4. In an email system, the ___________routes messages through the Internet or a private network. a. email account b. email client c. email server d. email network 5. A service that uses the _____________ protocol leaves email messages on the server and stores them only temporarily on your computer. a. Post Office Protocol (POP) b. Internet Message Access Protocol (IMAP) c. Simple Mail Transfer Protocol (SMTP) d. Temporary Mail Storage Protocol (TMSP) 6. ___________ is the protocol for sending all types of email messages. a. Post Office Protocol (POP) b. Internet Message Access Protocol (IMAP) c. Simple Mail Transfer Protocol (SMTP) d. Sending Email Protocol (SEP) 7. Instant messaging uses _____________, which lets you see when people on your contact list are online. a. presence technology b. asynchronous communication c. profile technology d. Post Office Protocol (POP) 8. Real-time messaging among group members is called ___________. a. an Internet forum b. a wiki c. instant messaging d. chat 9. _______________ communication involves one person posting a message that someone reads later, as with a text message or forum. a. Synchronous b. Asynchronous c. Atypical d. Instant 10. A __________ is an audio or video file stored online and distributed by downloads or through feeds. a. podcast b. blog post c. Webinar d. protocol 11. A ____________ allows participants to see and hear each other through the Internet, while a Web conference does not. a. Webinar b. video conference c. wiki d. video podcast 12. With __________ audio, you starting listening to the content right away without having to wait for the entire file or broadcast to download to your computer. a. synchronous b. streaming c. syndicated d. flowing 13. A ____________ allows users to post short messages, usually between 100 and 200 characters, for others to read. a. vlog b. microblog c. short blog d. wiki 14. You use blogware to publish blogs with time-stamped articles, which are called __________. a. feeds b. comments c. posts d. blognews 15. All group members can make changes to a(n) ________, while readers of a blog can comment on, but not modify, a blogger's posts. a. microblog b. RSS feed c. wiki d. profile 16. A _________ network is a Web site that links people via the Internet to form an online community. a. real-time b. messaging c. social d. blogosphere 17. On a social network, you can change your _____________ to limit who can see your posts. a. profile b. Timeline c. privacy settings d. friends 18. “Treat others online as you want them to treat you” is an example of ___________. a. cyberbullying b. flaming c. online reputation d. netiquette 19. Using a social network to monitor or keep track of a member’s activities or whereabouts is called _____________. a. social monitoring b. posting c. phishing d. cyberstalking 20. ___________ are very informal ways of expressing a short sentiment or phrase, so you should use them only in casual messages. a. Emoticons b. Flames c. Vlogs d. Social network tools 21. The term for a user’s personal space on a social network where they can post updates and interact with others is: a. Webmail b. chat c. blog d. profile e. feed Try This Now 1: Top 100 Blogs Blogs connect us with current news and personal viewpoints. When you read a blog, keep track of what is opinion and what is fact. a. Open a browser and then go to technorati.com. Select the Top 100 link to view the most popular blogs. Answer: At the end of May 2014 technorati.com underwent a complete site redesign and change of emphasis, which included discontinuing the blog index. Alternative listings of popular blogs that were active at the time this document was created include: New York Times, Blogs 101: http://www.nytimes.com/ref/technology/blogs_101.html Top 15 most popular blogs: http://www.ebizmba.com/articles/blogs b. Scroll through the top 100 blogs on Technorati and open a blog that interests you. After reading the description about the blog topic, open the site that contains your blog of choice. Answer: Answers will vary based on blog selected. To complete the assignment, follow these steps: 1. Visit Technorati: • Open your web browser and go to [Technorati's Top 100 Blogs](http://technorati.com). 2. Browse Top Blogs: • Scroll through the list of top 100 blogs to find one that interests you based on the description provided. 3. Open the Blog: • Click on the blog title or description to open the blog's site. 4. Review the Blog: • Read through the blog to understand its content and focus. Take note of the topics covered and the style of writing. c. Read several articles or postings in the blog that you selected. In a document of at least 150 words, summarize the articles that you read on the blog. Answer: Answers will vary based on blog selected, but should include a document of at least 150 words providing summarizing articles discovered and read on the selected blog. To write a summary of articles from a blog, follow these steps: 1. Select the Blog: Choose a blog that is relevant to your interests or research topic. 2. Read Several Articles: Go through multiple articles or postings to get a well-rounded view of the content and the author’s perspective. 3. Identify Key Points: Take notes on the main ideas, arguments, and any recurring themes in the articles. Distinguish between factual information and opinion-based content. 4. Summarize the Content: Write a brief summary that covers the following points: • Introduction: Mention the blog’s name and its general focus or theme. • Main Points: Highlight the key topics or discussions from the articles you read. • Author’s Perspective: Note any notable opinions or viewpoints expressed. • Overall Impression: Briefly comment on the overall tone and purpose of the blog. Here’s an example summary based on a hypothetical blog: Summary of Articles from "Tech Innovations Blog" "Tech Innovations Blog" provides insights into the latest developments in technology and their implications. Recent articles cover a range of topics including advancements in artificial intelligence, trends in wearable tech, and the impact of 5G networks. One article discusses the potential of AI in revolutionizing healthcare by improving diagnostic accuracy and personalizing treatment. Another article explores the growing popularity of smartwatches, noting their role in health monitoring and fitness tracking. Additionally, the blog highlights the anticipated changes brought by 5G technology, such as faster internet speeds and enhanced connectivity. The blog presents a mix of factual reporting and opinion, with authors expressing both optimism about technological advancements and caution about potential privacy concerns. Overall, "Tech Innovations Blog" aims to inform and engage readers with current tech trends and their broader implications. Ensure your summary is concise, capturing the essence of the blog and its recent content. d. Save the document and submit it to your instructor. 2: Educational Video Site YouTube has hundreds of thousands of free educational videos at youtube.com/education. As you research a topic for a class project, you can focus your search within the educational portion of YouTube to make sure you are using an academic source. a. Open a browser and then visit youtube.com/education. b. Watch three featured videos on the youtube.com/education site. Write one or two sentences summarizing each of the three video topics. Answer: Answers will vary based on specific videos selected, but should be comprised of one or two sentences summarizing the topic of each of three videos To summarize the topics of three featured educational videos from YouTube’s education section, follow these steps: 1. Navigate to YouTube Education: Go to [youtube.com/education](https://www.youtube.com/education) and browse through the featured videos. 2. Watch the Videos: Select three videos that interest you. Take notes on their content while watching. 3. Summarize Each Video: Write one or two sentences for each video, capturing the main topic or key points discussed. Here’s a hypothetical example of how to summarize three educational videos: Summary of Featured Videos from YouTube Education 1. "The Wonders of Quantum Physics": This video explains the fundamental principles of quantum physics, including concepts like superposition and entanglement, and their implications for modern technology and our understanding of the universe. 2. "The History of the Renaissance": The video provides an overview of the Renaissance period, highlighting key figures such as Leonardo da Vinci and Michelangelo, and discusses how their contributions shaped art, science, and culture in Europe. 3. "Introduction to Machine Learning": This video introduces the basics of machine learning, covering topics like supervised and unsupervised learning, and illustrates how algorithms can be used to analyze data and make predictions. c. Locate the search tool for the education page of YouTube. Search for the term “social media.” Examine the sources of the social media videos. In a document of at least 100 words, explain how the sources of the education videos differ from those of traditional YouTube videos. Answer: Answers may vary as search results change over time, but the main difference between the sources of videos on youtube.com/education and traditional YouTube videos is that the education videos are manually curated by people and come primarily from colleges, museums, public schools, and other educational institutions. Traditional YoutTube videos can be created and posted by any person or group worldwide. To compare the sources of educational videos on YouTube with those of traditional YouTube videos, follow these steps: 1. Access YouTube Education: Go to [youtube.com/education](https://www.youtube.com/education) and locate the search tool. 2. Search for “Social Media”: Enter "social media" into the search bar to find relevant educational videos. 3. Examine the Sources: Look at the channels or creators behind the videos. Note if they are educational institutions, experts in the field, or organizations specializing in educational content. 4. Compare with Traditional YouTube Sources: Search for the same term on regular YouTube (outside the educational section) and examine the sources there as well. Look for differences in the type of creators or channels, such as personal vloggers, general content creators, or media companies. 5. Write Your Document: Summarize your findings in a document. Here’s an example of how you might write it: Comparison of Sources: Educational Videos vs. Traditional YouTube Videos When searching for "social media" on YouTube’s educational section, the sources of the videos typically include academic institutions, professional educators, and credible organizations focused on providing accurate and well-researched content. For example, you might find videos from universities or specialized educational channels offering in-depth analyses and expert insights. In contrast, traditional YouTube videos on the same topic often come from a wider range of creators, including personal vloggers, influencers, and general content creators. These sources may prioritize entertainment or personal opinion over academic rigor and may lack the same level of expertise or peer-reviewed content. This distinction highlights the educational section's focus on authoritative and reliable sources compared to the more varied and less regulated content found elsewhere on YouTube. d. Save the document and submit it to your instructor. 3: Marketing Plan for Facebook Marketing a local business on Facebook could make the difference between success and failure. Instead of posting random Facebook comments, your employer has requested that you create a digital Facebook marketing plan. a. Research the creation of a marketing plan for Facebook. Create a one-page, double- spaced document written in your own words that serves as a Facebook marketing plan for any small business. Answer: Answers will vary, but common factors included in a Facebook marketing plan for a small business include: 1. Set up your page: A Facebook page makes a business discoverable, connected, timely, and insightful 2. Identify your audience: invite friends, share your page, invite business contacts 3. Create compelling content: be authentic, be responsive, be consistent, make successful posts into successful promotions 4. Advertise: create ads, use fine-tuned targeting 5. Measure and adjust: find out what’s working well, so you can maximize the impact of every post and ad (Source URL: https://www.facebook.com/business/overview) Here’s a basic structure for your one-page Facebook marketing plan: Facebook Marketing Plan for [Your Small Business Name] Objective: Our goal is to enhance brand awareness and drive local customer engagement through Facebook. We aim to increase our follower count by 20% and generate a 15% rise in customer interactions within the next six months. Target Audience: Our primary audience includes local residents aged 25-45 who are interested in [your business's products or services]. We will focus on targeting individuals who live within a 10-mile radius of our business location and have shown interest in similar businesses or activities on Facebook. Content Strategy: 1. Content Types: • Educational Posts: Share tips, how-tos, and industry-related information that adds value to our audience. • Promotional Posts: Announce special offers, discounts, and events to drive sales. • Engaging Content: Post polls, questions, and user-generated content to foster community interaction. • Behind-the-Scenes: Provide glimpses of daily operations, staff highlights, and customer testimonials. 2. Posting Frequency: • Post 3-4 times per week to maintain consistency and keep our audience engaged. 3. Visuals and Branding: • Use high-quality images and videos that align with our brand’s visual identity. Maintain a consistent color scheme and logo usage. Advertising Strategy: 1. Facebook Ads: • Utilize targeted ads to reach specific demographics and geographic locations. • Run promotions during peak shopping periods and special events to maximize visibility. 2. Budget: • Allocate a monthly budget of $200 for Facebook ads. Monitor ad performance and adjust spending based on effectiveness. Engagement Plan: 1. Community Management: • Respond to comments, messages, and reviews promptly to build relationships and address customer inquiries. 2. Contests and Giveaways: • Organize monthly contests and giveaways to increase engagement and attract new followers. Measurement and Evaluation: 1. Key Metrics: • Track metrics such as page likes, post reach, engagement rates, and conversion rates from Facebook ads. 2. Reporting: • Generate monthly reports to evaluate performance and adjust the strategy as needed. Conclusion: By implementing this Facebook marketing plan, [Your Small Business Name] aims to effectively engage with our local community, boost our online presence, and drive business growth. Make sure to tailor the plan to the specific needs and goals of the business you're working with, and adjust any details as necessary. b. Save the document and submit it to your instructor. Critical Thinking Now 1: Product Support Blogs Companies want to foster the two-way communication between customers and company representatives. Using product support blogs, customers can find product information quickly on their own or they can ask a direct question. Microsoft has a product support blog for Office 365 located at the site blogs.office.com. Open the site in any browser and navigate through the pages. In a document of at least 150 words, write an overview of what this product support site offers to customers. Answer: Answers will vary as site content changes over time. However, prominent features present at blogs.office.com at the time this document was created include: -overviews of Office 365 feature updates -tutorials on specific Office 365 apps and features -case studies of individuals and businesses using Office 365 successfully and effectively -Webcasts and webinars offering support or training on Office 365 topics Here’s how you might write an overview of the Office 365 product support blog: Overview of the Office 365 Product Support Blog The Office 365 product support blog, accessible at [blogs.office.com](https://blogs.office.com), serves as a comprehensive resource for users seeking information and assistance with Microsoft Office 365. The site offers a range of content designed to support both new and experienced users. Content and Features: • Product Updates: The blog provides regular updates on new features, enhancements, and changes to Office 365. This includes detailed posts about software updates and upcoming releases. • How-To Guides: Users can find step-by-step tutorials and tips for using various Office 365 applications, including Word, Excel, PowerPoint, and Outlook. These guides aim to help users maximize their productivity and troubleshoot common issues. • Troubleshooting Support: The blog features articles addressing common technical problems and offering solutions, helping users resolve issues independently. • Customer Engagement: The blog encourages interaction by allowing users to leave comments and ask questions directly. This two-way communication helps users get personalized support and share their feedback. • Educational Resources: The site also includes resources for learning and professional development, such as webinars, training videos, and best practices for utilizing Office 365 effectively. Overall, the Office 365 product support blog is a valuable resource for users looking to stay informed about their software, find practical guidance, and engage with the support community. 2: Massive Open Online Courses (MOOCs) The term “MOOC” can be defined as an online course aimed at an unlimited audience with open access via the Internet. Some MOOCs provide a social platform that provides the class with a way to communicate and ask the professor questions. Research the topic of MOOCs. In a document of at least 150 of your own words, describe MOOC communications. Answer: Answers will vary, but the core features of MOOC communications are courses designed to provide free academic knowledge online, using popular platforms such as Coursera and Udacity, allowing anyone with Internet access to participate in a free and academically rigorous course on one of a wide variety of subjects. Courses may be self-paced, synchronous, or asynchronous. (Source: http://moocnewsandreviews.com/what-is-a-massive-open-online-course-anyway-attempting-definition/) Here’s a brief overview of MOOC communications: MOOC Communications Massive Open Online Courses (MOOCs) are designed to offer education to a broad and diverse audience via the Internet. One of the key features of MOOCs is their communication infrastructure, which facilitates interaction among participants and between students and instructors. Discussion Forums: MOOCs typically include discussion forums where students can post questions, share insights, and discuss course content. These forums allow learners to engage with one another, collaborate on problems, and exchange ideas, fostering a sense of community despite the online format. Direct Messaging: Some MOOCs provide a direct messaging system that enables students to communicate privately with instructors or peers. This feature helps address specific questions or concerns that may not be suitable for public discussion. Live Q&A Sessions: Many MOOC platforms offer live Q&A sessions or webinars where students can interact with instructors in real-time. These sessions provide opportunities for students to ask questions, seek clarification on complex topics, and receive immediate feedback. Peer Review: MOOCs often include peer review mechanisms where students evaluate each other’s assignments. This process not only helps students receive constructive feedback but also encourages engagement with course material from different perspectives. Announcements and Updates: Instructors use announcement tools to communicate important updates, deadlines, and course information. This ensures that all students are kept informed about changes and key aspects of the course. Overall, MOOC communications are designed to support a dynamic and interactive learning environment, helping students stay engaged and connected throughout their educational experience. This description highlights the various ways MOOCs facilitate communication and interaction, providing a comprehensive view of how these platforms support learning. 3: Business Communication Rules As you communicate to customers in a business setting through email messages, chat, and formal letters, you should follow protocols of formal communication. Research how formal and informal communication are different in the business setting. Write a list of five dos and five don’ts regarding to how to digitally communicate in a formal business setting. Answer: Answers will vary over time and based on personal opinion and experience. Sample dos and dont's provided on a business Web site at the time this document was created include: DO be conscious of the tone your emails convey. DO make life easy for your email readers. Use numbers, lists, and bullet points. DO ask your manager or a trusted coworker about who else should be receiving your emails if you’re unsure. DO think twice before sending attachments. DO know the rules of your workplace when it comes to email. Many offices have strict policies about sending personal (i.e., non-work-related email) from work, and also have guidelines about email content itself. DON’T make an email longer than it has to be. DON’T use weird fonts, elaborate graphics, inspirational quotes, funky colors, or anything else that makes your communication tough to read, hard to open, or just plain annoying. DON’T email when you’re feeling anything less than an eight on a sanity scale of 1-10 at work. If you’re angry, frustrated, short-changed, underappreciated, devalued, or just want to have a meltdown and scream, stop. DON’T send your email to everyone with a heartbeat, and use the ''Reply All'' button with care. DON’T forward the harmless jokes, the political cartoons, or anything else that isn’t work-related. (List source: http://www.employmentcrossing.com/article/230257/Sending-Emails-the-Workplace-Way-Dos-and-Don-ts-for-Communication/) Ethical Issues Now You just landed your first position dealing with an international company. Each day you will communicate with international clients using email and video conferences. Your boss has requested that you research international netiquette so you do not offend your colleagues or customers. a. With the realization that your client may not be fluent in your own language, list five netiquette guidelines to follow when emailing an international client. Answer: Answers will vary, but common netiquette guidelines to follow when emailing an international client include: -When originating e-mail, say where you obtained the e-mail address of the person to whom you are writing. -Short, plain sentences are easier for someone reading in a language other than their mother tongue. -Regarding age and rank, outside America, people in authority and older people expect a certain deference from people who approach them. -When replying, be guided by your correspondent's signature. If they have signed a single name (probably their given name), you may address them accordingly. If both given and family names are used, it is safest to reply formally. -For international e-mail, err on the side of caution and write formally. (Source: http://www.bspage.com/1netiq/Netiq.html) Here are five netiquette guidelines for emailing international clients: 1. Use Clear and Simple Language: • Avoid complex vocabulary and idiomatic expressions that may be difficult for non-native speakers to understand. 2. Be Polite and Formal: • Use formal greetings and closings, and show respect in your tone to accommodate different cultural norms. 3. Avoid Ambiguity: • Be specific and clear in your messages to prevent misunderstandings. 4. Consider Time Zones: • Be mindful of time zone differences when sending emails and scheduling follow-ups. 5. Proofread Carefully: • Check your email for clarity and errors, as mistakes can lead to confusion and misinterpretation. b. Considering that most international communication is formal, list five general netiquette rules to follow when creating formal email communications. Answer: Answers will vary, but common general netiquette rules to follow when creating formal email communications include: -Keep it concise. Keep messages brief and to the point, but not so brief that it causes the problem outlined in the previous point. -Reply within 24 hours. Try to reply within 24 hours, less if possible -Allow time for a reply. E-mail messages are not usually required to be answered immediately, though it is good practice if you do. Before sending a reminder, allow some time for a response, sometimes even a few days. -Layout message for readability. Use spaces and breaks between paragraphs and long sentences to make it easier on the reader. -Edit the superfluous text out of emails that have been forwarded multiple times. -Don't be over-familiar with the recipient. (Source: http://www.ict.griffith.edu.au/~davidt/email_etiquette.htm) 1. Use Professional Language: Maintain a formal tone and avoid slang. 2. Address Recipients Properly: Use correct titles and formal salutations. 3. Be Concise and Clear: Get to the point and avoid unnecessary details. 4. Proofread for Errors: Check spelling, grammar, and punctuation. 5. Include a Clear Subject Line: Ensure it accurately reflects the email's content. c. Write a paragraph about the netiquette guidelines you should follow when video conferencing with an international customer. Answer: Answers will vary, but common netiquette guidelines you should follow when video conferencing with an international customer include: -Check your sound in advance. -Use mute when you need it. -Be considerate of international standards for dress and physical presentation. -Remain alert and be respectful of other participants throughout video conference. -Schedule conference with consideration for local time zone differences. When video conferencing with an international customer, it is essential to adhere to specific netiquette guidelines to ensure effective and respectful communication. First, ensure you are punctual, as time zones may vary and punctuality reflects professionalism. Maintain a clean and neutral background to avoid distractions and ensure that your environment is conducive to a professional setting. Speak clearly and at a moderate pace, and be mindful of accents or language barriers by avoiding jargon and complex terms. Additionally, be attentive to non-verbal cues and cultural differences in communication styles, such as eye contact and gestures. Finally, dress appropriately and present yourself in a manner that aligns with the professional standards of your industry and the cultural expectations of your international clients. Team Up Now – Sharing your Desktop with your Team Discuss a date and time that you can connect with your team online using join.me, a free technology for teams of up to 10 people. The join.me site provides desktop sharing, voice communication, and online chat on a Windows or Mac platform. Establish one person as the team leader, the person who will share a desktop with the other team members and will begin the session at join.me. Open a browser and then go to join.me. The team leader must first start the free trial meeting and send out an email or text message to the team sharing a nine-digit number. The other team members should type the nine-digit number into the “join meeting” text box to begin viewing their team leaders desktop. a. When everyone on the team has arrived in join.me, the team member should search google.com or bing.com for other screen-sharing Web sites and applications. Take a screenshot with all the team members’ names listed and display of the search results being shown to the team. Answer: Answers will vary based on specific team members present, Web site interface changes over time, and specific search results obtained. However, each solution should be comprised of a screenshot image containing an active join.me meeting displaying user names for each student in the group, along with a browser window open and showing search results for a search on "screen-sharing Web sites" or a similar search term. To complete this task, follow these steps: 1. Set Up the Meeting: • Team Leader: Open [join.me](https://www.join.me) in your browser. • Start a new meeting and obtain the nine-digit meeting number. • Send the meeting number to your team via email or text message. 2. Join the Meeting: • Other Team Members: Open [join.me](https://www.join.me) in your browsers. • Enter the nine-digit number in the "join meeting" text box to access the shared desktop. 3. Search for Screen-Sharing Alternatives: • While everyone is connected on join.me, search Google or Bing for other screen-sharing websites and applications. 4. Take a Screenshot: • Use a screenshot tool (like Snipping Tool on Windows, Screenshot on Mac, or a browser extension) to capture: • The screen-sharing search results. • All team members' names listed in the join.me meeting. 5. Display the Screenshot: • Ensure that the screenshot includes the search results and a list of team members' names to demonstrate that everyone is present and the search was conducted. If you need further assistance with taking or handling screenshots, feel free to ask! b. Collaborate to research how screen-sharing tools could be productive in the business place. Create a list of 10 business activities or features of business screen-sharing tools that your team locates during your research using join.me. Answer: Answers will vary based on specific findings, but sample relevant business activities or features include: -human resources orientation -marketing activities -telecommuting meeting support -meetings across states or countries -product support -job training -IT tech support -project collaboration -distance performance evaluation Here’s a list of 10 business activities or features of screen-sharing tools that can enhance productivity in the workplace: 1. Remote Collaboration: • Allows team members to work together on documents and projects in real-time, regardless of their physical location. 2. Virtual Meetings: • Facilitates face-to-face meetings through video conferencing, enabling discussions and decision-making without the need for travel. 3. Live Demonstrations: • Enables presenters to showcase software, products, or processes live to an audience, improving training and customer engagement. 4. Technical Support: • Provides IT support teams with the ability to troubleshoot and resolve issues by viewing and controlling a user’s desktop remotely. 5. Sales Presentations: • Allows sales teams to deliver presentations and pitches to potential clients in a professional and interactive manner. 6. Project Management: • Facilitates project planning and updates by allowing team members to share progress, review tasks, and provide feedback. 7. Document Review: • Enables multiple stakeholders to review and edit documents simultaneously, streamlining the review and approval process. 8. Training and Onboarding: • Supports training sessions and onboarding by demonstrating processes and procedures directly on participants' screens. 9. Team Brainstorming: • Encourages collaborative brainstorming sessions where team members can share ideas and work on a digital whiteboard or similar tools. 10. Client Consultations: • Enhances client consultations by providing a platform for visual explanations, sharing documents, and discussing specific client needs interactively. These features make screen-sharing tools valuable for improving communication, efficiency, and collaboration in the business environment. c. Submit the combined screenshot and list to your instructor. Technology Now Chapter 10: Information Literacy Chapter Review ONLINE INFORMATION 1. What are the four major types of Web sites? Answer: Open sites, Restricted sites, News sites and Scholarly sites 2. What do you call a collection of information, such as a library catalog? Why can’t general search engines access them? Answer: Databases Search engines can’t access some pages on these restricted sites because they’re part of databases (collections of information) such as library catalogs or article collections that require passwords or subscriptions for searching. The number of restricted sites is estimated to be many times larger than the number of sites on the Open Web. 3. Name one benefit and one disadvantage of the Deep Web. Answer: Benefits of the Deep Web are that identified experts develop most of the resources, so they are fairly reliable, and that most resources are part of permanent collections. Publishers and libraries are making agreements with search engines so the public can access their restricted sites, which include many times the number of pages of the Open Web. However, a part of the Deep Web is used for illegal activities. 4. How do scholarly sites differ from news sites? Answer: A few weeks after a major event such as an election, news sites stop covering the event because it’s no longer new. Instead, scholarly sites provide access to articles and books that analyze the event and place it in historical perspective. SEARCHING FOR INFORMATION 5. What do search operators allow you to do? Name three search operators and explain how you would use each one in a search. Answer: Search operators refine your search term. Common search operators are listed below: 6. Name two ways you can customize your search results. Answer: Change the preferences in your search tool to customize the results, turn on SafeSearch filter, and/or identify your location for local results are all possible answers covered in the chapter. 7. What can you find at the bottom of a search results page, and how can they help you? Answer: The bottom of a search results page lists suggested search terms related to the one you entered. 8. What is public domain material? Give one example. Answer: The public domain means the copyright has expired or otherwise doesn’t apply. An example of a public domain book is Alice in Wonderland by Lewis Carroll (http://authorama.com/alice-in-wonderland-1.html) EVALUATING ONLINE INFORMATION 9. Briefly describe the CARS checklist and how you would use it in searching the Internet. Answer: To evaluate online information, apply the CARS checklist to ensure that the information is credible, accurate, reasonable, and supported. All four of these items should be used to explain searching the Internet in student examples. 10. How might you establish that a Web source is credible? Answer: Refer to the CARS checklist. Look at potential online sources critically—a site with errors, a bad design, or an unclear navigational structure may be unprofessional and therefore unreliable. 11. Name two tools you might use to look for a Web site author’s credentials. Answer: Answers will vary but should include the following: Look for a link such as About us or Background, and then click it to learn about the person organization responsible for the Web page. Look for a title, such as President or Senior Editor. If you find biographical information, read it to learn whether the author has a degree in a field related to the topic. You also can use a search engine such as Google or the professional networking site LinkedIn to search for the author’s name and see whether the information qualifies the author as an expert on the subject. 1. Whois Lookup: Use tools like [Whois.net](https://www.whois.net) or [ICANN Whois](https://whois.icann.org) to find domain registration information, which often includes the contact details of the website owner or organization. 2. Google Search: Perform a Google search using the author’s name or their bio details to find additional information about their credentials, such as their professional background, other published works, or affiliated institutions. 12. Name three types of support that a Web site might provide. Answer: • Links or citations to reputable sources or authorities. Test the links to make sure they work. • Other pages and print material on the topic, to see if they cite the same sources. • Quotations from experts. • For photos or other reproduced content, a credit line should appear somewhere on the page that states the source and any necessary copyright information. SEARCH TOOLS 13. How does a general search engine locate information? Answer: When you perform a search, a general search engine does not search the entire Internet. Instead, it compiles a database of information about Web pages. It uses programs called spiders or crawlers, software that combs the Web to find Web pages and add new data about them to the database. These programs build an index of terms and their locations. 14. What does a Web spider do? Answer: A Web spider is software that combs the Web to find Web pages and add new data about them to the database. 15. What is an advantage of a metasearch engine? Give an example of a metasearch site. Answer: Metasearch engines let you enter a search term once and then sends that query to many search engines at the same time. Dogpile and Mamma are examples given in the chapter. 16. What is an advantage of a specialty search engine? Answer: Specialty search engines let you search databases, news providers, podcasts, and other online information sources that general search engines do not always access. 17. Describe a subject directory and give one example. Answer: Like a catalog in the library, a subject directory is the work of people (usually subject-matter experts) who can evaluate the content of a Web site and classify it. Subject directories offer a limited number of Web pages and help you discover new topics and content. The Open Directory Project is the example given in the chapter. ETHICAL USE OF INFORMATION 18. Define “ethics,” and explain how ethical principles can guide you in your use of Internet material. Answer: Ethics is the set of moral principles that govern people’s behavior. Cite sources, avoiding plagiarism, and respect a content creator’s intellectual property rights are all proper ethical decisions in using Internet material. Student answers will vary. 19. What is a public domain work? Answer: Public domain work applies to material for which the copyright has expired and to work that has been explicitly released to the public domain by its owner. 20. Briefly describe the United States fair use doctrine. Answer: The United States fair use doctrine allows you to use a sentence or paragraph of text without permission if you include a citation to the original source. Test Your Knowledge Now 1. A Web site that requires a subscription or membership is called a(n): a. Open site b. New site c. Scholarly site d. Restricted site 2. Which search operator would you use to locate pages with an exact phrase, in the same order? a. + b. - c. " " d. ~ 3. When you perform a Web search, what do you call the most relevant results? a. Hits b. Citations c. Filters d. Queries 4. Which of the following would you use to broaden a search? a. A word stem b. " " c. site: d. - 5. Checking a site author’s credentials is one way to establish a site’s: a. Reasonableness b. Credibility c. Accuracy d. Support 6. Which of the following is not part of the CARS checklist? a. Copyright b. Accurate c. Reasonable d. Support 7. Which of the following is one way to establish a site’s accuracy? a. Check the site's date. b. Identify the author. c. Look for just one point of view. d. Look for the author's credentials. 8. What part of the Web is used for illegal activities? a. News sites b. The public domain c. The Deep Web d. Subject directories 9. Which of the following is a metasearch engine? a. Google b. Mamma c. Open Directory Project d. Wolfram Alpha 10. Which of the following operators lets you search for pages that include synonyms for your search term? a. - b. + c. " " d. ~ 11. Which of the following sites specializes in supplying differing viewpoints on a topic? a. Wolfram Alpha b. Glean Comparison Search c. Alltop c. Yahoo! 12. A specialty search engine lets you search: a. Multimedia sites b. Blogs, microblogs, comments, and conversations on social media sites c. Databases, news providers, and podcasts d. A catalog of Web pages organized by subject 13. What do you call a collection of information, such as a library catalog or article collection, that requires passwords or subscriptions for searching? a. Database b. The Deep Web c. The public domain d. A subject directory 14. Text that is not subject to copyright is found in: a. Wikipedia b. Citations c. Ethics d. The public domain 15: Which of the following searches lets you find sites that mention either onions or radishes? a. onions + radishes b. onions ~ radishes c. onions | radishes d. "onions + radishes" 16. MLA, APA, and Chicago are examples of: a. The Fair Use Doctrine b. Intellectual property rights c. Copyrights d. Citation styles 17. Plagiarism is best defined as: a. Using another’s work and claiming it as your own b. A citation style c. Moral principles that govern our behavior d. The act of citing sources 18. Which of the following helps you find certain types of search results, such as images or news? a. Web page filter b. Search engine alert c. The CARS checklist d. A citation 19. Which of the following are Web sites that are reliable sources for in-depth, complete information? a. Open sites b. News sites c. Scholarly sites d. Search engine sites 20. Which of the following is not a way to customize search results? a. Identify your location b. Turn on a Safe Search filter c. Limit results to personalized content d. Use a spider 21. In the space next to each image below, write the letter of the phrase that describes it: a. Setting alerts b. Citation c. A method to help ensure source accuracy d. Setting filters e. Helps ensure site accuracy
__c___ ___a__
__d___ ___b__
___e__
Try This Now 1: Power Googling To become a Google power user, practice the following special searches at Google.com. For each search, take a screenshot of the results page. Place the screenshots in a single Word document, and then submit the document to your instructor. (For instructions on taking screenshots, see the “Getting Started” chapter.) Open a browser, open the site google.com, and then use the following search terms: a. Type weather and the name of your town or city (example: weather Phoenix). Answer: b. Type the stock ticker symbol of a company you know (example: MSFT). Answer: c. Type time Tokyo. Answer: d. Type the name of any major sports team in season now (example: Miami Dolphins). Answer: e. Type sunrise and the name of any city (example: sunrise Boston). Answer: f. Type any math problem (example: 4*7 +(sqrt 8)). Answer: g. Type earthquake. Answer: h. Type population and the name of any state or province (example: population New Jersey). Answer: i. Type define followed by any word (example: define antiestablishment). Answer: 2: Your Career Social Media Newspaper Note: To complete this assignment, you must have an account with a social media site such as Facebook or Twitter. You can create an online paper in minutes by selecting custom topics from millions of social media posts and Web articles published each day. Open a browser and then open the site paper.li. a. Create a free account at paper.li. When you create a paper.li account, you authorize the Web site to access content in your Twitter, Facebook, or other social media account. Paper.li publishes content from these accounts to create an online newspaper. If you do not agree to these terms, return to the paper.li home page, click the Learn more button on the navigation bar, and then read about how paper.li works. Complete steps b and e to take a screenshot of a completed newspaper and paste the image in a Word document. Below the screenshot, write at least 100 words describing how paper.li works. b. Tap or click Newsstand to gather ideas for your online newspaper. c. Tap or click Create a paper. Create an online paper based on a career field that interests you. Give your paper a unique name and choose to create a weekly edition. d. Search for topics within the career field you selected. Use the plus icon to add several sources to your newspaper. e. Take a screenshot of your online newspaper. Paste the screenshot in a Word document, and then submit the document to your instructor. (For instructions on taking screenshots, see the “Getting Started” chapter.) Answer: Answers will vary, below is a screen shot of an example of a paper.li site. The paragraph about paper.li should touch on the following from (http://support.paper.li/entries/20023257-What-is-Paper-li-): Paper.li is a content curation service that enables you to monitor content and topics across the web, turning content into beautiful online newspapers and newsletters. Once you tell us what type of content you would like to monitor, we'll scout the web and present the content you want, when you want, automatically. Our mission is to help ease the pain of manually scouring the web and multiple sources daily, by filtering, sorting and presenting the content you are looking for automatically, daily. Paper.li can save you time by surfacing the blogs, sites, and people sharing the same interests on a regular basis. 3: Learn for Free at Khan Academy Learn for free at Khan Academy in subjects such as math, art, computer programming, chemistry, biology, history, and medicine. Open a browser, and then open the site khanacademy.org. a. Sign in with your Facebook user name or your email address. b. Locate a subject area of your choice and select a level appropriate for you. c. Select Activity in the left pane, and then watch three complete Khan Academy videos. Each video provides a box for a Tips & Thanks comment. In this comment box, type a comment describing your impression of each of the three videos. d. Take a screenshot of each video with your comments. Paste the three screenshots in a single Word document. (For instructions on taking screenshots, see the “Getting Started” chapter.) e. Save the document and submit it to your instructor. Answer: Student answers will vary, but should look similar to the following screen shot: Critical Thinking Now 1: Infographics Infographics represent complex data or knowledge in a clear graphical display. Open the site infographic.com, and then select the Portfolio link on the navigation bar. Select an infographic, review it, and then click the Next link to view another infographic. Select one interesting infographic, and then take a screenshot of it. Paste the screenshot in a Word document and write a paragraph containing at least 100 of your own words describing the information displayed in the infographic. Answer: Student answers will vary. Their infographics should look similar to the figure below. 2: Search Engine Showdown Using the right search engine can ultimately save you time and increase your productivity. First determine your search term. Search for information about a famous person of your choice using google.com, scholar.google.com, bing.com, and dogpile.com (a metasearch engine). Take a screenshot of each of the four results pages and paste the screenshots in a Word document. Write at least 150 words explaining how each search engine performed during your search engine showdown. Answer: The following is an example of a solution using the term “network security”. Student results will vary. Google: Scholar.google.com: Bing.com: Dogpile.com: 3: Plagiarism Because anyone with an Internet connection has unlimited access to online information, schools, publishers, and other organizations must discourage plagiarism by setting clear standards for original work. Check on your school’s Web site, read your student handbook, or interview an instructor or administrator at your school to learn about its plagiarism policy. Write a paragraph about your school’s plagiarism consequences and submit it to your instructor. Answer: Student answers will vary, but should be similar to the UMass Boston policy (http://www.umb.edu/academics/vpass/undergraduate_studies/writing_proficiency/advice_students). Plagiarism & Academic Honesty Important Information on Plagiarism and Academic Honesty Please see the UMass Boston policies on academic honesty and plagiarism. These policies apply to all papers submitted in a Writing Proficiency Evaluation. Violating this policy has serious consequences, which may include suspension or expulsion. If faculty graders question whether a portfolio paper is the student’s own work, then additional evidence may be requested as part of an investigation. Students should retain copies of drafts for the new portfolio essay until after the grades have been received. If you have any questions, please visit the Online Writing Resources on our website to help you to avoid plagiarism. Occasionally, faculty graders question whether a particular portfolio represents the student's own work. In such cases, additional evidence may be requested as part of an investigation. In such cases, graders give a grade of Void. Therefore, students should retain copies of their drafts and/or working notes for the new portfolio essay until after the grading has been completed. Discussing the readings in a workshop or with friends is an appropriate way to help prepare to write the essay. However, it is not permissible to engage the assistance of another person, whether for payment or not, in writing, revising, or editing the final essay. Students composing essays on a word-processor may use spell-checkers for light editorial assistance. To write a paragraph about your school's plagiarism policy and its consequences, follow these steps: 1. Research the Policy: • Visit your school’s website and look for the academic integrity or plagiarism policy section. • Read through the student handbook or academic guidelines provided by your institution. • If necessary, consult with an instructor or administrator to get detailed information. 2. Write the Paragraph: • Summarize the key points of the plagiarism policy, including the definition of plagiarism, the process for reporting and investigating allegations, and the consequences for students who commit plagiarism. Here’s an example of how you might write the paragraph: At [Your School’s Name], the consequences for plagiarism are outlined clearly in the academic integrity policy. Plagiarism is defined as the use of someone else's work or ideas without proper attribution, and it is considered a serious violation of academic standards. The policy includes a step-by-step process for reporting suspected cases of plagiarism, which involves an initial review by the instructor and a formal investigation if necessary. Penalties for confirmed instances of plagiarism can vary depending on the severity of the offense but may include a failing grade on the assignment, a failing grade for the course, and possible disciplinary actions such as academic probation or suspension. The school emphasizes the importance of original work and upholding academic integrity to maintain a fair and honest learning environment. Ethical Issues Now You were employed at a publishing company that designed a cutting-edge system for delivering e-books online. You contributed ideas that were critical to the development of the project idea. Research the topic of intellectual property. Can you take the design idea with you and use it at another company when you leave the publishing company? Write at least 100 words to substantiate your answer. Answer: No. Student answers will vary with reasons, refer to USLegal.com (http://definitions.uslegal.com/i/intellectual-property/) and Wikipedia’s Intellectual property page (http://en.wikipedia.org/wiki/Intellectual_property) for reasons to substantiate the student’s answer. When considering whether you can take a design idea with you to another company, it's crucial to understand the principles of intellectual property (IP). Intellectual property laws protect creations of the mind, including design ideas and innovations. If you were employed at a publishing company and contributed critical ideas to an e-book system, those ideas might be protected by IP laws, such as patents or trade secrets, depending on how they were documented and the agreements in place. Generally, if you were hired under a contract that includes an IP clause, the rights to the design ideas you contributed may belong to your employer. This means you cannot legally use those ideas at another company without permission. However, if the design idea was not patented or otherwise legally protected and you developed it independently, it may be possible to use similar concepts elsewhere, provided you do not breach any confidentiality agreements or non-compete clauses. It is essential to review your employment contract and seek legal advice to understand the specific IP rights and restrictions applicable to your situation. Team Up Now – Your Digital Footprint Before you can cite a source, you must determine if a Web site is credible, accurate, reasonable, and has the proper support. Using the search engine scholar.google.com, each member of the team should research the topic of “flipping the classroom.” Each team member should select a different site that explains the concept of flipping the classroom. Using the CARS checklist, each member must document the Web site URL and answer the following questions: The website (http://cft.vanderbilt.edu/guides-sub-pages/flipping-the-classroom/) was used as an example solution. a. Credible: What evidence was provided to make the argument persuasive? Are there enough details for a reasonable conclusion about the argument? Answer: The author is identified with credentials. b. Accurate: What date was the information published? Would any of the content be considered vague? Answer: 2013, the content is thorough. c. Reasonableness: Based on the author’s statements, what was the tone of the article? Would you consider any portion to be slanted or biased? Answer: The statements seem reasonable and fair. It shows multiple points of view with balance. d. Support: What are the sources of the site? Does the author provide contact information so that you can ask questions? Answer: Berrett D (2012). How ‘flipping’ the classroom can improve the traditional lecture. The Chronicle of Higher Education, Feb. 19, 2012. Anderson LW and Krathwohl D (2001). A taxonomy for learning, teaching, and assessing: a revision of Bloom’s taxonomy of educational objectives. New York: Longman. Bransford JD, Brown AL, and Cocking RR (2000). How people learn: Brain, mind, experience, and school. Washington, D.C.: National Academy Press. Crouch CH and Mazur E (2001). Peer instruction: Ten years of experience and results. American Journal of Physics 69: 970-977. Contact information is provided. Share your results with your team and submit the combined information to your instructor. Solution Manual for Technology Now: Your Companion to SAM Computer Concepts Corinne Hoisington 9781305110144
Close