Skip to main contentdfsdf

Jenarae's List: DGL Vocabulary

  • Viral Videos

    Usually short clips of information composed in video format that spreads quickly in the digital world ie: viewed by appox. a million viewers in less than a week

    • Contrary to what you might think, the term "viral" has nothing to do with computer viruses. Instead it refers to a digital video, image, or article that has spiked in popularity and has reached a large number of users in a short period of time. While there is no exact number of views that makes something "go viral," most viral media is viewed by more than a million people in less than a week.
    • A BLOG: is an abbreviation for “weblog”, a personal journal online that can be frequently updated and intended for public view, consumption, and interaction. Topics can include commentary on social issues, current events, hobbies, the tech arena, political views and events, business promotion, self development, etc. Blogs generally reflect the purpose of a website and can include some of the personality of the writer. An author or writer of a blog is known as a “blogger”. A blog can also be syndicated also, therefore feeding their content to subscribers via RSS.
    • 1)   It’s a dialogue, not a monologue. The purpose of a blog is to create interaction with your reader in the form of comments, shares and likes.

       

      2)   It’s writing for others, not yourself. Provide solutions to your target audience’s problems. Provide a remedy for their pain or need.

       

      3)   It’s more than just writing. It encompasses media like videos, photos, links to other relevant sites. Use all the tools at your disposal to peak interest.

    1 more annotation...

    • video that spreads quickly via the Internet. It is often a short clip on a video sharing site such as YouTube or Vimeo that people reference in blogs, e-mails and instant messages.
       
       In 2012, a half-hour documentary was produced by Invisible Children, Inc. about Joseph Kony, head of the Lord's Resistance Army (LRA) in Uganda, who was indicted for war crimes in 2005 by the International Criminal Court. Uploaded to the YouTube and Vimeo sharing sites, within a week, the video was viewed by more than 80 million people. See viral marketing.
      •  
          <!--Encyclopedia Logo -->    <!--Encyclopedia Top Search --> 
          <form method="post" name="formTop" id="encycform_top"> 
             
          </form> 
          <!--Encyclopedia Top Navigation --> 
           
         
          <!-- Encyclopedia Index --> 
          Definition of:viral video   
         
        viral video

         A video that spreads quickly via the Internet. It is often a short clip on a video sharing site such as YouTube or Vimeo that people reference in blogs, e-mails and instant messages.
         
         In 2012, a half-hour documentary was produced by Invisible Children, Inc. about Joseph Kony, head of the Lord's Resistance Army (LRA) in Uganda, who was indicted for war crimes in 2005 by the International Criminal Court. Uploaded to the YouTube and Vimeo sharing sites, within a week, the video was viewed by more than 80 million people. See viral marketing.
         

    1 more annotation...

    •              
      Freeservers Web Hosting

      Reliab

    • What Is Blogging?

       
      A web log, often shortened to "blog," is a web page that contains dated posts, by one or multiple users, often pertaining to a particular topic. "Blogging" is the act of writing in a blog.

    2 more annotations...

  • Blogging

    The ability to share information with a digital audience on a wide variety of topics through a wide variety of digital mediums.

  • Databases

    A standard and comprehensive collection of information that can be used for a multitude of reasons by sorting, filtering, comparing, and graphing the information to produce, support, or discredit your purpose.

    • atabases offer a convienient and powerful way to organize your information. In Database Basics, you'll learn how to get started in the world of databases, normalize your database according to commonly accepted design principles, add security to your database and use database keys and transactions.
    • database  (ˈdeɪtəˌbeɪs) [Click for IPA pronunciation guide] n 1. a systematized collection of data that can be accessed immediately and manipulated by a data-processing system for a specific purpose 2. informal  any large store of information: a database of knowledge

    3 more annotations...

  • Moral Literacy

    This involves the consistent practice of sharing knowledge and the wisdom to apply that knowledge in all of the situations that will arise in our lifetimes.

    • Living an ethical life is an achievement, one that must be cultivated. None of us believe that our children's moral development is something we can take for granted. We share our values with them and teach them right from wrong. We encourage our children to develop good character each time we talk with them about why dishonesty is wrong, or try to instill compassion toward people in need. But moral literacy requires training and practice throughout our lives. All of us as individuals, as professionals, and as citizens will need to make numerous moral decisions. The ethical situations we face frequently will be complex and often will be unique. What stronger argument is there for making moral literacy a component of our formal educational experience?
    • One of the basic components of moral literacy is ensuring that one is knowledgeable.

       

      Just as a scientist can conduct successful research only by being well-informed about all relevant facts and theories, so too the moral person must be well-informed. Too often, moral debates are fueled by ignorance. The recent arguments about stem-cell research provide such an example. It is often the case that those who debate the ethics of cloning are unaware of the fact that not all stem-cell research involves the use of a fertilized egg—a fact that bears significantly on the moral context of the debate.

    5 more annotations...

  • Academic Integrity

    The intentional dedication to always doing the moral, ethical, right things concerning academic papers, processes, etc. This goes beyond just not copying another person's work; it is much more inclusive of striving to achieve and uphold the highest standards concerning academic materials.

    • Academic integrity stands at the heart of intellectual life. The academic community is bound by a fundamental trust that professors and students alike undertake and present their work honestly. As a community of the mind, we respect the work of others, paying our intellectual debts as we craft our own work.
    • Violations Adjudicated under the Academic Integrity Code

    10 more annotations...

    • Intentional Plagiarism occurs when writers or researchers are aware that they are using someone else’s words or ideas as their own.

        

      Some specific examples of intentional plagiarism include but are not limited to the following:

        

      <!--[if !supportLists]-->·         <!--[endif]-->Using pre-written papers from the Internet or other sources and claiming them as your own.

    • Unintentional Plagiarism occurs when writers or researchers unwittingly use the words or ideas of others by failing to give credit to the source.  When in doubt, students must check with their teacher or writing lab monitor.

        

      Some specific examples of unintentional plagiarism include but are not limited to the following:

        

      <!--[if !supportLists]-->·         <!--[endif]-->Paraphrasing poorly: changing a few words rather than taking notes and rewriting the material.

    3 more annotations...

    • Academic integrity is the core set of values and principles that underwrites the very mission of the University itself: integrity, honesty, hard work, and the determination to translate personal and professional principles into behavior.
    • Academic Integrity can be defined by honest academic work where (1) the ideas and the writing of others are properly cited; (2) students submit their own work for tests and assignments without unauthorized assistance; (3) students do not provide unauthorized assistance to others; and (4) students report their research or accomplishments accurately.
    •  

        

      An Academic Integrity Committee (AIC) has the responsibility to administer and advance strategies in support of academic integrity. The AIC can sustain its

  • Collaboration

    The ability to come together and share best practices, ideas, goals, strengths,etc has grown from a group in the same room to collaborating throughout the digital world to accomplish a much bigger pool of thought than ever before.

    • Collaboration is central to social learning.
    • Being in the same room to collaborate on a project is no longer necessary thanks to the many different applications that are available over the web. There are free tools for online conferencing, collaborative writing and editing, file sharing, private communication, and desktop sharing.
    • Why is mass online collaboration useful in solving mathematical problems? Part of the answer is that even the best mathematicians can learn a great deal from people with complementary knowledge, and be stimulated to consider ideas in directions they wouldn’t have considered on their own. Online tools create a shared space where this can happen, a short-term collective working memory where ideas can be rapidly improved by many minds. These tools enable us to scale up creative conversation, so connections that would ordinarily require fortuitous serendipity instead happen as a matter of course. This speeds up the problem-solving process, and expands the range of problems that can be solved by the human mind.
      • I chose this article because Forbes is credible and has influence in the business world. It gives us the work side of internet collaboration. It gives a detailed definition that is easy to read and understand.
        Evaluation
        Currency 12/15 Multimedia 7/10
        Content 13/15 Treatment 9/10
        Authority 9/10 Access 5/5
        Navigation 10/10 Miscellaneous 13/15
        Experience 7/10 Total 85% Credibility

  • Privacy (Internet)

    The ongoing battle for the right to your privacy in the digital world. The ability to only release and share the online information that you want to share, when you want to share it compared to the stealing and sharing of any and all of your private information today.

    • How it works

        

       Instead of connecting directly to a webserver, users take a detour, connecting with encryption through several intermediaries, so-called Mixes.  JAP uses a predetermined sequence for the mixes. Such a sequence of linked mixes is called a Mix Cascade. Users can choose between different mix cascades. 

        

       Since many users use these intermediaries at the same time, the internet connection of any one single user is hidden among the connections of all the other users. No one, not anyone from outside, not any of the other users, not even the provider of the intermediary service can determine which connection belongs to which user.  A relationship between a connection and its user could only be determined if all intermediaries worked together to sabotage the anonymization. more...

        

       The intermediaries (mix providers) are generally provided by independent institutions which officially declare, that they do not keep connection log files or exchange such data with other mix providers. JAP shows the identity and number of organisations in each Mix cascade in detail, and verifies this information by cryptographic means. The users are thus able to selectively choose trustable mix cascades.

  • Malware

    An unwanted intrusion into your digital privacy which also includes the unwanted gathering and sharing of your personal digital information, habits, location, etc with other parties.

    • What is malware?

       

      "Malware" is a term for any software that gets installed on your machine and performs unwanted tasks, often for some third party's benefit. Malware programs can range from being simple annoyances (pop-up advertising) to causing serious computer invasion and damage (e.g., stealing passwords and data or infecting other machines on the network). Additionally, some malware programs are designed to transmit information about your Web-browsing habits to advertisers or other third party interests, unbeknownst to you.

      • Virus - Software that can replicate itself and spread to other computers or are programmed to damage a computer by deleting files, reformatting the hard disk, or using up computer memory.
      •  
      •   Adware - Software that is financially supported (or financially supports another program) by displaying ads when you're connected to the Internet.
      •  
      •   Spyware - Software that surreptitiously gathers information and transmits it to interested parties. Types of information that is gathered includes the Websites visited, browser and system information, and your computer IP address

    1 more annotation...

    • The Microsoft Malicious Software Removal Tool is an anti-malware utility that checks computers running Windows 8, Windows 7, Windows Vista, Windows XP, Windows 2000, Windows Server 2012, Windows Server 2008, and Windows Server 2003 for infections by specific, prevalent malicious software—including Blaster, Sasser, and Mydoom—and helps remove malware and any other infections found.

      When the detection and malware removal process is complete, the tool displays a report describing the outcome, including which, if any, malware was detected and removed.

  • Geo-technology (Geo-data)

    This has grown immensely in the last several years as a partner in the driving of history, it is considered a partner along with other powers in the shaping of countries, politics, etc.

1 - 20 of 72 Next › Last »
20 items/page
List Comments (0)