Thursday, May 29, 2008

THE FINAL ENTRY

Lecture:




Today in the lecture we learn't about social and ethical issues with the web. The issues with the security of the web is that anyone can be watching you through cyber space. Anyone can put information on the web, you can get smart educated people putting valued information on the net and you can get dumb no brained people that have no idea what there talking about putting up information on sites. when sending your information from your computer to another computer it goes through several other computers which they can gather your private details.



Tuturial:


Activity 1:


The first copyright page i opened was on assigning and licencing rights. the page is about the owners of pasific licence giving the right to another person to apply for the licence to print and copy books for exclusive licence. For Non-exclusive licence are for someone to allow another person to work and for that person to let another non-licence person to work also.


The second page was on Governments ( Commonwealth, State and Territory). Reading this I found out the Government gets licence were others wouldn't,
Governments are entitled to rely on very wide-ranging exceptions to copyright infringement, compared to other copyright users,
Local governments are not entitled to rely on the special provisions for governments, and
It can be difficult to work out whether a statutory body or government corporation is entitled to rely on the speacil provisons for governments.


The third page was on logos. I found that Logos are generally protected by copyright.
• Unless there is an agreement to the contrary, copyright in a logo is generally owned by its creator.
• Unauthorised use of a logo may not only infringe copyright but may also raise issues under other areas of law
such as trade mark rights, passing off laws and consumer protection laws.


The forth page was on music.


Copyright protection is free and applies automatically when material is created.
• A song normally comprises of both a musical work and a literary work, each of which may have different
copyright owners.
• Sound recordings are also protected by copyright. This copyright is separate and additional to any copyrights
in the music and lyrics.
• Creators of musical or literary works also have moral rights in relation to their work.


The fifth was on videos and Dvd's (copying and downloading)


It is now legal for a person to copy a videotape he or she owns onto a DVD for private and domestic use.
• The new provision does not apply an infringing videotape.
• If you download a movie from the Internet for free, it may be a pirate copy, which means you infringe copyright by downloading it.

Activity 2:

The APRA website talks about what you need to know about music and the web.

Downloading music from the web on site for free may be a good convenice for you but its putting the artist that wrote that song out of pocket.

There are two rights due to the copyright of music;
1. The action to reproduce musical work, and

2. To be the portal of communication between an artists and the public.


Activity 3:

To protect yourself from internet attacks you never give out your personal details to anyone because that can lead to identity theift. Don't reply to mail that ask you to confirm your bank details, this is called spam mail.


Readings:

Readings:

This reading provides 12 ways to protect your online privacy, and they are as follows;
Do not reveal personal information about yourself on a webpage that has many visitors,
Use cookie notices on your Web browser,
Have a “clean” email address,
Do not give personal details to people you do not know,
Beware of who you are sending an email to,
Sites that offer a prize want your personal details in exchange,
Do not reply to spammers,
Be conscious of Web security.
Be conscious of home computer security.
Examine privacy policies and seals.
Only you decide what information to reveal to whom, when and why.
Use encryption.




Thursday, May 22, 2008

week 11 Building Knowledge


Lecture:


Today’s lecture was on data, information and knowledge. We defined each of these topics, datum-A fact or proposition, information-A collection of facts or data that relate to each other, knowledge-The sum or range of what has been perceived, discovered, or learned. Sum of the characteristics of data is that it’s Factual, Non-judgmental, Non-inferential. Characteristics of information are Summative, Relational and Dimensional. And sum characteristics of knowledge are Inferential, Experiential and Judgmental.
The importance of data, information and knowledge are to have a collection of valid unbiased data, must inform and it should be clear.
We then learnt that data is raw and it simply exists and has no significance beyond its existence, that information is data that has been given meaning by way of relational connection and knowledge is the appropriate collection of information, its intent is to be useful.

Tutorial

Activity 1:
Internet definitions from http://dictionary.reference.com/browse

DATA: Individual facts, statistics, or items of information: These data represent the results of our analyses. Data are entered by terminal for immediate processing by the computer.

INFORMATION: Knowledge gained through study, communication, research, instruction, etc.; factual data.

KNOWLEDGE: Acquaintance with facts, truths, or principles, as from study or investigation; general erudition.

WISDOM: The quality or state of being wise; knowledge of what is true or right coupled with just judgment as to action; sagacity, discernment, or insight.







Activity 2:

Data, information and knowledge are important in my university studies because throughout my whole degree I will be collecting data from books, the web and internet journal for subject. With the data collected it will be turned into information for people to read. After people reading it, it will be know be knowledge to the reader and has further informed them on the subject.

Activity 3:

5 organisations that collect information:
1. Banks collect information to set up a bank account.
2. Finance companies collect information to see if you qualify for a loan.
3. Survey organisations collect information for a certain topic that they need the public’s information on.
4. The hospital gathers information for you to give you the correct drugs or gather information from you to see if you can donate an organ.
5. Phone companies gather your information to set up an account and they use that information for your security.
Readings:
The first reading is on data, information, knowledge and wisdom. The author gives a brief description on knowledge management and then has definitions from 'Russell Ackoff' on data, info, knowlegde and wisdom. The page has a drawing of the four and has a axsis of connectedness and understanding.
The second reading is a information literacy toturial. The page is set up for the Spring College students master and to assist them in information literacy skills. The page has a quiz to help your skills and links to other helpfull sites.

Thursday, May 15, 2008

week 10 Information Management

Lecture:


Today in the lecture we learnt how to manage our information that is a quick and easy way. We make use of the computer proccessing power to manage information, we manage information in such text, documents, images, WebPages, bookmarks, presentations, assignments, citations & references.
We then learnt about atom-based information and some pros and cons about it.
Some pros are:
· Exists in space … we can see it
· We can know where it is
· Easily concealed … we can hide it
· Easy to protect
· Difficult to change
· Difficult to copy.

Some cons are:
· Bulky – Encyclopedia Britannica
· Costly – Resource implications
· Difficult to edit
· Difficult to distribute
· Inflexible … not interchangeable

After that we were told about bit-based information, (Digital reproductions, electronic content), and some of the pros and cons of it.
Pros:
· Very Flexible – easily move between formats
· Very Cheap – Resource implications much less
· Easy to Edit
· Easy to mass produce and broadcast

Cons:
· Privacy – easy to copy and steal
· Authenticity – easy to fake, alter and edit information
· Unsolicited broadcast – SPAM

We learnt about the face of goods and services and they have changed and are changing. Some goods and services that have changed are internet banking, email and music-mp3. Good and services that are changing are TV, music-store bought and shopping.
In summing up the way we organise our information, through to our lives are changing every day.




Tutural:




Activity 1:












Activity 2:










Above is my screen shoot of my three folders in my favorites. The folders are named under and contain:





Activity 3:

I went to http://archives.obs-us.com/obs/english/books/nn/bdcont.htm and clicked on the DNA link. this link was on the difference between bits and atoms. The person writing this talked about how he visited the headquarters of one of America's top five integrated circuit manufacturers. while he was there they asked for his laptops details including the price. the reason for this is that while the atoms were not worth that much, the bits were almost priceless. He then goes onto say how he can transfer his bits back and forth over the internet and unlike ploy-gram atoms his bits wern't caught in customs.

Activity 4:

I find this information still helpful because the facts he state are still valid today. shopping has always been stressful whether it is for food, clothing or furniture. Now you can shop online and it has made it so much easier to do. With shopping online you can find exactly what you want, in the colour you want, the size and if they don't have it they can find it and order it for you.


pros for using atoms and bits:

When sending they are not visible and can't be traced back to you. You can send them back and forth from computers.

Readings:

This week’s reading is grazing the internet. The page displays how the internet is great tool for students and that there is an endless amount of information to learn. There is a problem with reliability because the internet can carry viruses and attack the computer which then can delete work the student has done.

Thursday, May 8, 2008

week 9 communications

Lecture
Today we learn't about communication and how to cummunicate through different methods.




communicating can be between indivisuals, indivisuals and organisations, within a business and between a business and a external organisation. There are different devices that help you communicate between people these are:



  • mobile telephones

  • video and tele-conferencing

  • pods, mps, lap-tops
  • multi-media communications

There are ways to communicate so that you get your veiw accross. complainning through email is not a good thing to do becuase u can't get your emotional side accross, emails can seem informal and you might send the wrong message and confuse the reader. Emails can also be easily intercepted and read by the wrong people and the emails could contain private information which can be fowarded on easily to other people.



when construting a letter or any formal writing you have to use proper words such as:




  • dear/hello

  • write correct and clear message

  • thanks/regards

  • and make sure to have all your details on the page.


There are many benefits of using ICT, you can use it for online chat, online articles social and academic, web conferencing, internet phone, blogs, wiki webs and podcasts.

The internet is a great way to communicate and can only get better in the years to come.



Tuturial


Activity 1:

We were asked to search a subject in google on group, I entered basketball and it came up with different groups on basketball. One link was called championcard.com and a couple of links were the same and they were on what star sign basketball players are.










Activity 2:

I went to this site that was about general enquiries on collage basketball in united states. Some of the questions were on recruiting violations and has a player saing how he felt after they lost reginal semi finals.









Activity 3:



I was asked to visit a pod cast site to listern to some. I entered basketball and it came up with some recent basketball games. I had no audio so i couldn't listern to any.



Activity 4:

Pod cast are a good idea for students. the student can listern to valuble information on the net and stop it when ever they please to make some extra notes. Hopefully lectures can be recorded on podcast so that if the studuent is absent for the lecture they can listern to it later in there own time.

Reference:

http://audio.search.yahoo.com/search/audio;_ylt=A9G_Xd3VvyNIPYkAnSmppcoF?ei=UTF-8&fr=sfp&p=basketball

www.google.com/group

Readings:

1. This weeks reading was a guide to using email, and there a couple of sites to look at. The first site was on the email do’s and don’ts. It tells you how to send an email in the most efficient way to get your message across. When you send an email make sure it’s the correct way of communication for the message, use correct words and tone so that the wrong message isn’t sent. If you would like a response make sure you tell what the receiver should respond to.
2. The second site was on essential email etiquette. The page tells you about when sending emails make sure your title reflects what the email is about. The recipient should be clear and full have the full name attached. Make sure to avoid irony and sarcasm because it is hard to tell for the receiver if you are joking or telling the truth.

2nd reading
This reading was on spam and the problem it brings to your email. The correct term for spam is Unsolicited Bulk Email (UBE). The problem with spam is that for the cost of one message being sent they can send a million messages and this means that there is no control over how many are sent. The bad thing about spam is that it cost the receiver money without even noticing it.

Thursday, May 1, 2008

week 8 'Power Points'



Power Points:


We had the day of to remember our diggers at Gallipoli, so we had no lecture. In week 9 Helen gave a brief description of power points at the beginning of the lecture.


We watched a small movie on you tube at the beginning on ''death by power points'' it was a stand up comic explaining what not to do in a power point presentation. You can't clutter the page with words otherwise the audience will get lost and confused when trying to read the slide, and people at the back will not be able to see the slides.
e lecture covered what to include in the power points,
such as:
  • make sure it contains compelling data
  • the presenter makes an impression congruent with that data
  • provides the emotional connection that's crucial to the messages success
  • generate energy
  • And give the audience the certainty that what your saying is real.
We then went onto to learn on how to structure a PowerPoint so that it it has a intro, body and conclusion same as any other report or essay you do.You have to keep the audience involved otherwise there attention will wonder, so there a few tips to do so that it doesn't happens.
  • have hand outs so that the class can follow.
  • have little clips or songs.Ask questions-in courage audience to think for themselves
  • eye contact, don't bury your head
  • And speak clearly.
summing up the lecture there are four steps to follow for a good presentation.

  • Structure your presentation correctly
  • Prepare for the presentation
  • use audio/video tools
  • and include strategies for audience involvement.

Workshop:

the top 5 ways to make a top-notch presentation:
  1. Generate energy, if you look interest and passionate about the subject the audience are more likely to be interested and pay attention.
  2. Don't just present you topic, use props and presentation to keep the audience's attention.
  3. Use short video's and songs in the presentation so that's its not boring.
  4. Keep eye contact with the audience and stand tall so the audience knows that your telling them valuable information.
  5. Don't use to much animation on slides, it distracts the audience from what your talking about.
Activity 2:


Tips to making a bad power point:






Readings:


This week’s resource is on power point in the classroom. This page has links that will guide through the steps of presenting a good power point. Some of the steps covered are; meeting power point, creating slides, adding images, adding motion and sound and timing and rehearsing. It has a teachers guide if you get stuck.

Thursday, April 10, 2008

week 7 EndNote

LECTURES:






Today Helen talked to us about endnote the magical referencing data base.
EndNote is a tool that you can use to make feferencing easier. You can be intergrated into mircrosoft to be used as a bibliography manager and as an standalone program as a reference manager.


We then learn't how to access endnote through our library and download it to our hard drive.
EndNote being such a short program to talk about left me little to write about.



WORKSHOP:






Activity 1:



  1. Gal, B. (2007). "THE NEW ARAB CONVERSATION." Columbia Journalism Review 45(5): 17.
  2. Couper-Johnston , R. (2000). "El Nino." Hodder and Stoughton: 32.
  3. Brain, M. (2008). "How Blogs Work ", from http://computer.howstuffworks.com/blog.htm.
  4. Read, M. B. (1991). Chopper 1 From the Inside, Floradale Press.
  5. Simkin, M. (2008, 25/03/2008). "USA - Death on Trial." from http://www.abc.net.au/foreign/content/2008/s2201092.htm.

This is a screen shot of activity 2:







































This is a screen shot of activity 3:




Photobucket





Readings:


This week’s resource is on endnote technical support and services. This site has links to frequently asked questions; the answer to your question could be in that link. It has software to download to upgrade your endnote, it has information on compatibility and system requirements, and guide and tip sheets to read.

Thursday, April 3, 2008

Week 6 Evaluating and Authentication

Lecture:



Today in the lec we learn't about evaluating and authentication of web pages.

We were asked to ask some true or false questions on web pages and if there monitered and who controls them.

We aslo were showed a little diagram of how the host computers in the USA have gone from 4 in 1969 to over 2000 in 1984.We then went on to learn that sites arn't crated equal and that information in one site can be completly different in another.

We were then shown a couple slides on evaluating IQ on www and some quick tips on a URL. We then learn't about scanning the perimeter of the page and if we can tell who wrote it, credentials for subject matter like a abouts link, if the information is recent or not and if we couldn't find any of these look at the URL for info.

when looking at a site we must think to ourselves does it all add up; like does the information make sence or is it a load of lies .


Workshop:



exercise 1:

This page was pretty helpful with it tips on how to evaluate a web page. when looking at web page look at the author, ahve you heard of him and does what he say'snd argue's hold up with up to date information. Is the web page current, if not the information could be write but only for its time.Try and see if the page was worth visiting and if you got a anything from it.



exercise 2:

When visiting the http://www.taftcollege.edu/ site it didn't give me much more information just tips on the domain types and what the meanings of them are.

when doing the reliving the sixties web page i found it pretty cool. I opened the student rights movement page, some there pictures on that were pretty bloody when the students and the police clashed injuring students. It has a picture of a bank that was bombed by students protesting the vietam war and it also said that there were more bombing sites accross america.

I opened a second page in the site on the illicit drugs used in the 60's. Some of these drugs include marijuana, LSD and hallucinogens. These drugs have taken some of our greatest rock stars such as Jimmi Hendrix. Lsd was only outlawed in 1966 because it was unknown to the police and politions.



















exercise 3:


After visiting these site i actually found them useful .The first page had the author on
the bottom of the page along with the dated it was released. It had useful information on it and i found i could trust it.


The second site i found was the same, it was full of useful info and had the author and dates on the page. the sixties page looked cool, the background was set back in the sixties and gave that allusion, the pictures were current for the time they were taken, the detail photos of the student went through and gave back to government.