ICT Theory

lewise11
Mind Map by , created over 5 years ago

Mind Map on ICT Theory, created by lewise11 on 06/26/2014.

24
1
1
Tags No tags specified
lewise11
Created by lewise11 over 5 years ago
How Villainy is Depicted in Macbeth
scarletsnow491
A-level Maths: Key Differention Formulae
Andrea Leyden
Of Mice & Men Themes - Key essay points
Lilac Potato
10 good study habits every student should have
Micheal Heffernan
Leaving Certificate Japanese Kanji
Sarah Egan
Diffusion and osmosis
eimearkelly3
Fractions and percentages
Bob Read
Spanish: Grammar 3.2
Selam H
Women in Nazi Germany - Flashcards
Louisa Wania
Was the Weimar Republic doomed from the start?
Louisa Wania
ICT Theory
1 Digital Literacy
1.1 Digital Media - electronic devices and media platforms that allow user to create, communicate, and interact with one another or with the device or application itself
1.1.1 Mobile phones
1.1.2 Computers
1.1.3 The Internet
1.1.4 Video
1.1.5 Video gmes
1.2 Digital citzenship - navigating the digital world, safely, responsiblity and ethically
1.3 Private today/who are you online
1.3.1 Reputation - the general impression of a person held by other and the public
1.3.2 Persist - to continue and endure
1.3.3 Context - different factors that surround a piece of information that help determine its meaning
1.3.4 Tag - to add a descriptive word, label, or phrase to a photo or video
1.3.5 Represent - to depict yourself to others as being a certain way or having particular characteristics
1.3.6 Avatar - a graphic image that represents a person online
1.3.7 Inhibited - careful or restrained about your actions or impulses
1.4 Online Code
1.5 Internet Data
1.5.1 Anonymous - someone who can't be identified based on the information at hand
1.5.2 Cookies - small computer text files placed in your computer by the sites you visit that collect information about your computer system and the webpages you view OR data files that are stored on your computer when you visit certain sites, which are often used by companies to identify repeat customers and personalize visitors' experiences
1.5.3 Target - when companies tailor content to you based on the information they have collected about you
1.5.4 Third party - a person or company other than you and the owner of the website you visit
1.5.5 Privacy options - choices a website might give you about what it does with your information
1.5.6 Track - when companies collect information about you based on your online behavior
1.5.7 Demographic - common categories of the population, such as age, gender, ad race
1.6 Risky Relationships
1.6.1 Online predator - a commonly used term for someone who uses the Internet to develop inappropriate relationships with kids or teens
1.6.2 Stereotype - a popular belief about a group of people, based on assumptions that are often false
1.6.3 Risky - potentially harmful to one's emotional or physical well-being
1.6.4 Manipulate - trying to influence somebody to do something they might not otherwise do, for one's own benefit
1.6.5 self-disclosure - sharing private, sensitive, or confidential information about oneself with others
1.6.6 Reciprocate - to give in return
1.6.7 Sexting - sending or recieving sexually explicit photos or videos by text message or other digital technologies
1.7 Taking perspectives
1.7.1 Perspective - the view or outlook of someone, based on their thoughts, feelings, experiences, and background
1.7.2 Offender - a person who has malicious intent to hurt or damage someone
1.7.3 Bystander - a person who does nothing when they witness something happening
1.7.4 Upstander - a person who supports and stands up for someone else
1.7.5 escalate - to increase or make more intense
1.7.6 De-escalate - to decrease or make less intense
1.8 Scams and schemes
1.8.1 Scam - an attempt to trick someone, usually with the intention of stealing money or private information
1.8.2 Identity theft - a type of crime in which your private information
1.8.3 Vulnerable - in a position that makes it easier for you to be harmed or attacked
1.8.4 Phishing - when people send you phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your peresonal and financial information
1.9 Copyright
1.9.1 Commericial purposes - a use in connection with a business, usually for profit
1.9.2 Creative Commons - a kind of copyright that makes it eas

Media attachments