Skip to main contentdfsdf

Carvel Gray's List: New Digital Literacy Vocabulary

    • 1. Definition of a Copyright  

         A copyright is a form of protection provided by the laws of the United States to authors of "original works of authorship." This includes literary, dramatic, musical, artistic and certain other creative works. Material not protected by copyright (or otherwise protected) is available for use by anyone without the author's consent. A copyright holder can prevent others from copying, performing or otherwise using the work without his or her consent.
    • 8. Databases: Definition

       

      A database is a collection of information in electronic format organized in a logical fashion. Some examples of databases you may encounter in your daily life are a telephone book, an airline reservation system, and files on your computer.

       

      Some examples of databases you may encounter when using the library are the EJC, the library's collection of full-text journals; ERIC, a database of education materials; and the World Wide Web, a collection of resources on the Internet.

    • A database is an application that manages data and allows fast storage and retrieval of that data.
    • A relational database stores data in tables where each row in the table holds the same sort of information. In the early 1970s, Ted Codd, an IBM researcher devised 12 laws of normalization. These apply to how the data is stored and relations between different tables.
  • Jul 14, 13

    Couldn't find that much on Moral Literacy, thought the first two sentences on Ethics captured "M L" meaning.

    • Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.
  • Jul 14, 13


    STANDARDS OF MORAL LITERACY

    For the project of teaching moral literacy to be successful, an
    instructor in ethics must overcome certain obstinate prejudices on the
    part of students. Among these are the convictions that ethics cannot be
    taught, that it is a personal matter,
    and, most pernicious, that there are no
    objective standards by which to adjudicate between conflicting moral
    claims. All these prejudices boil down to a lack of faith in the objectivity
    of ethics, the suspicion that moral claims can never be proven true or
    false in the way that scientific claims can

  • Jul 14, 13

    This explanation of moral literacy is presented in the context of education by Brad Zdenek and Daniel Schochor.

    Becoming literate is not an organic process, like physical, nor is it, like speech, the natural outcome of social life. It is a culture-dependent intentional process. To be literate in a domain is to have the capacity to recognize and perform at some specified level of competency.

      •    

        What is Academic Integrity?

           

        Academic Integrity is honest and responsible scholarship.  As a student, you are expected to submit original work and give credit to other peoples' ideas.  Maintaining your academic integrity involves:

         
           
        • Creating and expressing your own ideas in course work;
        •  
        • Acknowledging all sources of information;
        •  
        • Completing assignments independently or acknowledging collaboration;
        •  
        • Accurately reporting results when conducting your own research or with respect to labs;
        •  
        • Honesty during examinations.
        •  
         

        Academic integrity is the foundation of university success.  Learning how to express original ideas, cite sources, work independently, and report results accurately and honestly are skills that carry students beyond their academic career.  Academic dishonesty not only cheats the student of valuable learning experiences, but can result in a failing grade on assignments, a failing grade in a course, or even expulsion from the university for the student.

    • What is Academic Integrity?

       

      Academic Integrity is one of the four Penn State Principles. As stated in Policy 49-20:

       

      “Academic integrity is the pursuit of scholarly activity in an open, honest and responsible manner. Academic integrity is a basic guiding principle for all academic activity at The Pennsylvania State University, and all members of the University community are expected to act in accordance with this principle. Consistent with this expectation, the University’s Code of Conduct states that all students should act with personal integrity, respect other students’ dignity, rights and property, and help create and maintain an environment in which all can succeed through the fruits of their efforts.”

    • Definition of academic integrity

       
       

      Academic integrity means honesty and responsibility in scholarship. Students and faculty alike must obey rules of honest scholarship, which means that all academic work should result from an individual's own efforts. Intellectual contributions from others must be consistently and responsibly acknowledged. Academic work completed in any other way is fraudulent.  

    • Overview

           
       
       
       
       

      Modern science is increasingly collaborative, as signaled by rising numbers of coauthored papers, papers with international coauthors, and multi-investigator grants. Historically, scientific collaborations were carried out by scientists in the same physical location—the Manhattan Project of the 1940s, for example, involved thousands of scientists gathered on a remote plateau in Los Alamos, New Mexico. Today, information and communication technologies allow cooperation among scientists from far-flung institutions and different disciplines. Scientific Collaboration on the Internet provides both broad and in-depth views of how new technology is enabling novel kinds of science and engineering collaboration. The book offers commentary from notable experts in the field along with case studies of large-scale collaborative projects, past and ongoing.

    •  

      It’s also an example of the Internet of Everything – the convergence of people, processes, data, and things. And collaboration is a key enabler in connecting people with devices, turning data into information that people can use to improve processes and generate more value.

      • What is Collaboration?

         

          Collaboration is a working practice whereby individuals work together to a common purpose to achieve business benefit. Key features of collaboration tools are:

         
           
        • Synchronous collaboration such as online meetings and instant messaging
        •  
        • Asynchronous collaboration such as shared workspaces and annotations
        •  
         

        Many organizations are also looking at Free-form Collaboration tools to improve collaboration and reduce the number of emails used for collaboration.

    • Personal Information Privacy

        

      Most Web users want to understand that personal information they share will not be shared with anyone else without their permission. An annual survey conducted by the Graphics, Visualization and Usability Center of the Georgia Institute of Technology showed that 70% of the Web users surveyed cited concerns about privacy as the main reason for not registering information with Web sites. 86% indicated that they wanted to be able to control their personal information. A study by TRUSTe revealed that 78% of users surveyed would be more likely to provide information to sites that offered privacy assurance.

  • Jul 14, 13



    Privacy and the Internet


    The use of the Internet can affect the privacy rights a person has in his or her identity or personal data. Internet use and transactions generate a large amount of personal information which provide insights into your personality and interests.

    Privacy issues relating to identity include the possible appropriation of a person’s email identity and address.


    Ease of access to and the appropriation of email addresses has led to the practice of sending vast amounts of unsolicited e-mails (spam).



    Identification through email and website transactions and the ability to locate people’s physical addresses easily through national and international directories have raised new privacy concerns.

    •  
         
             
       

      Internet Privacy is the ability of individuals to control the flow of information and have reasonable access to data generated during a browsing session.

       

      Privacy is a major concern for all Internet users, but it is becoming more difficult to expect a reasonable expectation of privacy online. One of the problems with Internet privacy is that many users assume that they have control over their information. This is often not the case, particularly when they engage in activities such as online social networking, which is essentially based upon sharing of personal information.

       

      Reputation management firms often advise their clients about the adequate amount of information they should make public as part of projecting a positive image.

    • Malware is any software that is developed for the purpose of doing harm to computers or via computers. 

        

       Malware can be classified in several ways, including on the basis of how it is spread, how it is executed and/or what it does. The main types of malware include worms, viruses, trojans, backdoors, spyware, rootkits and spam.  

        

       Worms and viruses are computer programs that replicate themselves without human intervention. The difference is that a virus attaches itself to, and becomes part of, another executable (i.e., runnable) program, whereas a worm is self-contained and does not need to be part of another program to replicate itself. Also, while viruses are designed to cause problems on a local system and are passed through boot sectors of disks and through e-mail attachments and other files, worms are designed to thrive in a network environment. Once a worm is executed, it actively seeks other computers, rather than just parts of systems, into which to make copies of itself. 

    • Definition: Malware, a shortened combination of the words malicious and software, is a catch-all term for all sorts of software designed with malicious intent.  

      The term malware is generally understood to include viruses, worms, spyware, Trojan horses, many kinds of adware, and other malicious programs.

        

      You can learn more about malware at the About.com Antivirus Software site.

      Examples:
      "Some computer problems that look like Windows errors or hardware problems are actually cause by malware! A malware/virus scan is always an important step when troubleshooting nearly any problem."
      • Definition of geodata in English 


        geodata

        Syllabification: (ge·o·da·ta)
        <!-- End of DIV syllabification--><!-- End of DIV entryPronunciation headpron-->

        noun

        • computerized geographical data: the use of geodata greatly depends on the ease and speed of acquisition
1 - 20 of 47 Next › Last »
20 items/page
List Comments (0)