SlideShare a Scribd company logo
1 of 32
INTRODUCTION
TOPICS
1. Information and Data Literacy:
- Finding information on the web (browsing)
- Evaluate information found
- Downloading and storing information
2. Communication and Collaboration
- Emails and instant messaging
- Collaboration sites
3. Content Creation and Copyright
- Creation of own digital content
- Copyright
4. Digital Safety
- Data and device protection
- Identifying threats (spam, phishing, etc.)
5. Conclusion and Assessment
The module prepares you to search and select
digital information and tools (devices and apps)
which could help the person being cared for
improve the quality of life, well-being and safety
living and maintain health. You will be able to
develop your own personal digital strategy,
including applying digital tools for your work, keep
contact and communicate with the care recipients,
the families and other caregivers and will be able to
apply and suggest practical digital tools and
applications and teach the recipients to use them in
order to stay mentally and physically healthy. In
this module, the importance of privacy, personal
data and internet safety are focused on as well. At
the end of the module, the levels of knowledge, skill
and attitudes of the participants will reach at least
Intermediate 4” level according to the European
framework of DigComp 2.2
INFORMATION
AND DATA
LITERACY Unit 2
FINDING INFORMATION
Your device (PC, smartphone,
tablet, laptop, notebook has
been sold with having one or
some internet browser
downloaded.) The only thing
you should do is to customize
and set the one you prefer to
use further.
Browsers default to use the
same language as your
operating system but this
setting can be changed by the
user. Listen to the steps you
should take to do it in MS Edge:
How to download Google Chrome?
How to translate a web page
with your browser?
Google Chrome
Firefox
Google Chrome Web
Browser
https://www.mozilla.org/en-
US/firefox/new/
https://www.microsoft.com/en-
us/edge?form=MA13FJ&exp=e00
Secure download sites of the highest rated browsers
Searching on
the web
You might come across
an unforeseeable
situation and need help
when there’s no other
person around. Detecting
a symptom never seen or
finding information on a
topic not known may
happen if you’re using
the internet.
If a web page is in a
different language,
do not worry: you
can set automatic
translation function
in the browser, like
you can see it in
Google Chrome.
How to find credible information?
The browser you’re using
applies a search engine to find
the information you’re
searching for in the jungle of
millions of web pages on the
Internet.
In Google Search (for
Chrome) you can either
write, say out loud or show
pictures for your request
Browser Default
search
engine
Properties
Google
Chrome
Opera
Firefox
Google
Search
Ranks fresh
information
first,
Collects
data of
users
MS Edge Bing Favours
older web
pages,
Shows the
results
without
dates
When searching for
information, it is
recommended to:
•instead of general
phrases, use the
terms which
describe the concept
more precisely (e.g.
instead of the term
“cat”, use the term
“Siamese cat”).
•use synonyms or
alternative
expressions
•the expressions
should be short,
clear and precise –
use less words to
express more
•use quotation
marks “ ” – the
search results will
be of web pages
containing the exact
phrase within the
quotation marks
Tips
1.A secure website’s name
always starts with https,
not with http only.
Besides, there is a paddock
sign in the address
bar/status bar clicking on
which you can get a report
on the security status.
2.Use a browser that is among the
highest ranking browsers in 2023.
They have inbuilt safety functions
to protect you while browsing or
opening or downloading a file from
the internet.
3.Avoid websites that seemingly have too long or
unusual names or visibly they are of poor quality.
Some fake sites that try to deceive visitors seems
alike the original ones but there is always something
strange in the url to arise suspicion.
Synchronizing your
phone and
computer:
How to store your downloaded
or own files?
(Source: TICbeat)
Instead of having all
files created or
downloaded on your
own computer or
sending emails with
large attachments,
you’d rather store
them in the “cloud”.
Thus you can access
your files from
different devices,
share them with
others and even work
on them in
collaboration.
Downloading an application
There are millions of different web
applications that you might want to use
ranging from the good old online games,
video and music streaming apps to those
that help monitoring physical activity
(e.g.step counters) or health (e.g. heart-
rate monitors). Apps downloaded might
require registration and will run on your
device like your other software.
Google Play
The Play Store app
comes pre-installed on
Android devices that
support Google Play, and
can be downloaded for
some Chromebook
devices.
How to open the Play
Store app:
• On your device, go to
Apps.
• Tap Google Play
Store/Google Play.
• This will open the
store where you can
search for apps to
download.
Apple Store
For IOS users
COMMUNICATION
AND
COLLABORATION Unit 3
Emails
Internet browsers provide emailing
services just like they operate their
own search engines.
Outlook is an
email service
offered by
Microsoft. You can
create a free
account with the
ending:
@outlook.com
A Gmail account is
a free Google
account with an
email address with
the ending:
@gmail.com
In case you want to chose another mail
host, you can find many options for free…
Though related to
Mozzilla,
Thunderbird can
be used
separately for
email services.
Download from
here.
Listen how to sign up for
gmail
Real-time Communication Apps
● WhatsApp
● Viber
● FB Messenger
● Skype
● Zoom
● MsTeams
● Google Meet
While you need to download the
app and sign up for Viber,
WhatsApp and Zoom, as these
are individual applications, the
others can be run attached to
your existing account in Google,
Facebook or Edge and you can
use them when you’re logged
in.
These, as well as
Skype, can
directly be
accessed by your
account.
Collaboration Sites
Collaboration means
not only constant
communication
between people
working together but a
harmonized delivery of
definite acivities, in
order to achieve a
common objective.
The list of the most
popular collaboration sites
according to Techradar is
available here.
CONTENT
CREATION AND
COPYRIGHT Unit 4
What is a digital content?
Digital content is the term used for any content in digital
form, including audio, video, images, websites as well as
articles, books, dictionaries and educational courses that
are published online. Digital content is available to read
and for download over the Internet or via distribution on
optical media such (CD or DVD).
With the easy accessible Canva
application you’ll also be able to create
different kind of digital content.
You can create your own digital content easily for
example to make an invitation more appealing to
the recipients.
.
Watch this video to
learn how to prepare
eg. a greeting card
with Canva (Click on
the image).
Copyright, Creative
Commons
When creating digital content, you
must regard if the elements you
want to use are protected by
copyright. How can you be sure of
it?
 Creation apps like Canva have
their own repositories of
images for free
 Check what Creative
Commons symbol is added to
the image or video, etc. you
want to use.
You’ll find the descriptions clicking
here.
Before using a private photo or
video which is not for public, always
ask for the owner’s consent to it!
A TIP to find copyright free objects
with Google Chrome
FREE STOCK PHOTOS AND IMAGES
Unsplash
These offer a limited number of
photos/videos/images or even
graphic elements to users without
registration, free of charge.
Others are available to
subscribers on a commercial
basis. These pages indicate the
conditions for the legal use of
each content.
Pixabay
„Bird, Common redstart, Songbird image. Free for use.” (Pixabay)
Freeimages
iStock
Pexels
You can protect your piece of
work published with adding either
of these Creative Commons
symbols.
DIGITAL
SAFETY Unit 5
Protecting your device and personal data
Most of the infections, attacks, security
breaches etc. are usually only possible
because of the connection between the
digital device and the internet.
What can we do against?
• Keep your Operating System updated
• In the configuration menu of your
browser, you have the possibility to
reinforce security with the use of the
offered security “Extensions”
• Download and install applications from
trusted websites assuring that they
are the safest download
• Use firewalls to protect your computer
• Set your fingerprint or pattern
identification to access to your
smartphone
• Download and subscribe for an
antivirus software
Passwords, authentification
When we think about accessing a service or our data, we
think about secure access. Usually, this access concession
comes with an authentication process. Anyone who
manages or uses passwords must take into account
certain good practices when generating passwords.
● We should not use default passwords. (widely used in
electronic devices)
● Passwords must be robust, impersonal safe and we do
not have to reuse them.
● Passwords must be changed periodically.
● Do not use the same password for different service.
● Do not use a password reminder.
● Hints for secure password creation:
- Include numbers.
- Use a combination of uppercase and lowercase letters.
Include special characters. What are special characters? See
Examples: - * ? ! @ # $ / ( ) { } = . , ; :
Other ways of authentification by a website
• Verification in two steps: it is not a complete
alternative to the password, but a reinforcement that
increases your security. It is based on a double
verification: "something we know" (the password)
together with "something we are" or "something we
have". Most of the time, this second factor is usually
a code sent by text (SMS) or mail.
• The fingerprint as an alternative to the password
has advanced dramatically in recent years thanks to
smartphone development.
• Other biometric data such as iris recognition, facial
recognition, heart rate...
• Use of unique and temporary password. The
system would generate a random and temporary
code that is sent to us by text (SMS) every time we
try to log in.
GDPR, an EU regulation, aims to protect data by obliging
organisations operating on the internet to declare whether they store
users' data and what they use it for.
Protect your email
account
against spams
Malware, spams, etc.
Malware are
- Viruses: malicious executable code that is attached to other executable files and normally replaces
them.
- Worms: replicate themselves without human intervention by exploiting vulnerabilities. They
are quickly replicated from one computer to another slowing down the network and the connected
device
- Trojans: carry out malicious action disguised as legitimate software to give an attacker remote
access to the infected computer.
- Ransomware: program that blocks the access to a computer until a ransom is paid. It usually
propagates as a worm (exploiting a vulnerability) or a Trojan horse (a downloaded file).
- Rootkits: Software that modify the operating system to create a backdoor to allow access with
admin privileges to the device continuously hiding its presence to the user.
- Bots: software that automatically perform repetitive actions and it can be used to execute malicious
actions, for example, denial-of-service attacks
Phishing, vishing and
smishing – frauds
using technics
● phishing - deception
absolutely specialised in
emails,
● vishing refers to phishing
over the phone
● smishing refers to phishing
in the form of SMS.
Phishing: an umbrella term for fraudulent data
harvesting (mainly referring to email and fake
websites, but can include all types of data
harvesting). E.g.: phishing bank emails.
Remember: no bank inquires about your account
number or passwords!
How to defend yourself?
• never open the bank's website by clicking on a link in an email!
• Always type in the link or use the link saved in your "Favourites"!
• Use a browser that allows you to block pop-ups!
• Get suspicious if you are sure of not having an ongoing business,
transaction, or any other affairs related to the sender
„Messages from utility service
providers or delivery companies
can also be used as a basis for
frauds. These typically refer to
data reconciliation or a request
to provide bank account details
or to pay money in arrears. In
messages that appear to be
official, attackers may also hide
links to install malicious software
on the device.” Do not open
these! (Source:
https://kiberpajzs.hu/)
CONCLUSION Unit 6
In this module you’ve learnt how start browsing on the Internet for credible information,
how to download or store digital content, how to share them with others.
You’ve found the most popular and high rated tools for emailing and exchanging instant
messages or communication and collaboration.
In case you’ve gained enough self-confidence, you may try to create your own digital
content and share it with others. To do so you need to regard copyright issues that have
been mentioned here, too.
And above all, regardless of your level of digital skills, being aware of the threats on the
Internet and ways of defending yourself against them is a must – that’ what we’ve
emphasized the most in each topic.
Module 1 is an optional one that means we are not intended to assess the knowledge
and skills you’ve obtained. In case you want to have a clear picture of your personal
development, please, test your digital skills on the EU platform and find the level of your
digital competences categorised similarly to this module.
To get a prompt overview on what you’ve memorized here, please, answer the
questions!
Quiz
1. Where can you set your browser to translate a webpage?
a. In my user profile
b. During registration
c. Clicking on the dots in the up-right corner
2. Credible websites’ names start with…
a. www
b. http/
c. https
3. True or false?
a. Every browser has its own coud storage
b. Skype can be used with a Google account
c. Copyright means that everyone is allowed to copy anything found on the Internet
d. The simplier password you create is the easier to memorize thus it’s the most useful
e. Malware are viruses and worms that attack your device.

More Related Content

Similar to Module 1 content EN.pptx

REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
Different Platform Social Media
Different Platform Social Media Different Platform Social Media
Different Platform Social Media karenongcol1
 
what is IT ? small collage project
what is IT ? small collage projectwhat is IT ? small collage project
what is IT ? small collage projectashokmer007
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Setareh Gerashi 9 B
Setareh Gerashi 9 BSetareh Gerashi 9 B
Setareh Gerashi 9 Bjboulanger
 
Apps to increase efficiency
Apps to increase efficiencyApps to increase efficiency
Apps to increase efficiencyTrending Us
 
Expanding Library Services & Content With New Technologies
Expanding Library Services & Content With New TechnologiesExpanding Library Services & Content With New Technologies
Expanding Library Services & Content With New Technologiesbibliotecaria
 
Routine Maintenance of Computer Systems and Basic Internet Search Skills
Routine Maintenance of Computer Systems and Basic Internet Search SkillsRoutine Maintenance of Computer Systems and Basic Internet Search Skills
Routine Maintenance of Computer Systems and Basic Internet Search SkillsIdowu Adegbilero-Iwari
 
An Extensive Guide on Making a Modern-day Messaging App in 2021!
An Extensive Guide on Making a Modern-day Messaging App in 2021!An Extensive Guide on Making a Modern-day Messaging App in 2021!
An Extensive Guide on Making a Modern-day Messaging App in 2021!Shelly Megan
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
Kempenfelt 2014 overdrive
Kempenfelt 2014 overdriveKempenfelt 2014 overdrive
Kempenfelt 2014 overdriveaimeesparzynski
 
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtensiondkp205
 
Windows IE8 Brand Activation
Windows IE8 Brand ActivationWindows IE8 Brand Activation
Windows IE8 Brand ActivationJagran Solutions
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
E-Mediat: Workshop 2
E-Mediat:  Workshop 2E-Mediat:  Workshop 2
E-Mediat: Workshop 2Beth Kanter
 

Similar to Module 1 content EN.pptx (20)

REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Different Platform Social Media
Different Platform Social Media Different Platform Social Media
Different Platform Social Media
 
what is IT ? small collage project
what is IT ? small collage projectwhat is IT ? small collage project
what is IT ? small collage project
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Setareh Gerashi 9 B
Setareh Gerashi 9 BSetareh Gerashi 9 B
Setareh Gerashi 9 B
 
Apps to increase efficiency
Apps to increase efficiencyApps to increase efficiency
Apps to increase efficiency
 
Expanding Library Services & Content With New Technologies
Expanding Library Services & Content With New TechnologiesExpanding Library Services & Content With New Technologies
Expanding Library Services & Content With New Technologies
 
Routine Maintenance of Computer Systems and Basic Internet Search Skills
Routine Maintenance of Computer Systems and Basic Internet Search SkillsRoutine Maintenance of Computer Systems and Basic Internet Search Skills
Routine Maintenance of Computer Systems and Basic Internet Search Skills
 
Cyber security
Cyber securityCyber security
Cyber security
 
An Extensive Guide on Making a Modern-day Messaging App in 2021!
An Extensive Guide on Making a Modern-day Messaging App in 2021!An Extensive Guide on Making a Modern-day Messaging App in 2021!
An Extensive Guide on Making a Modern-day Messaging App in 2021!
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
Kempenfelt 2014 overdrive
Kempenfelt 2014 overdriveKempenfelt 2014 overdrive
Kempenfelt 2014 overdrive
 
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension
 
Windows IE8 Brand Activation
Windows IE8 Brand ActivationWindows IE8 Brand Activation
Windows IE8 Brand Activation
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
E-Mediat: Workshop 2
E-Mediat:  Workshop 2E-Mediat:  Workshop 2
E-Mediat: Workshop 2
 

More from ITStudy Ltd.

Ls4 vet newsletter_en 3
Ls4 vet newsletter_en 3Ls4 vet newsletter_en 3
Ls4 vet newsletter_en 3ITStudy Ltd.
 
Hu ls4 vet_newsletter_211116
Hu ls4 vet_newsletter_211116Hu ls4 vet_newsletter_211116
Hu ls4 vet_newsletter_211116ITStudy Ltd.
 
Newsletter no 6 laser safety.docx
Newsletter no 6 laser safety.docxNewsletter no 6 laser safety.docx
Newsletter no 6 laser safety.docxITStudy Ltd.
 
Laser safety 5th newsletter hun
Laser safety 5th newsletter hunLaser safety 5th newsletter hun
Laser safety 5th newsletter hunITStudy Ltd.
 
Ls4 vet flyer_de_v6
Ls4 vet flyer_de_v6Ls4 vet flyer_de_v6
Ls4 vet flyer_de_v6ITStudy Ltd.
 
Be@cyber pro newsletter_4_hu
Be@cyber pro newsletter_4_huBe@cyber pro newsletter_4_hu
Be@cyber pro newsletter_4_huITStudy Ltd.
 
Be@cyber pro 3. hirlevel hu
Be@cyber pro 3. hirlevel huBe@cyber pro 3. hirlevel hu
Be@cyber pro 3. hirlevel huITStudy Ltd.
 
Reacti vet newsletter 3_hu-v2_formazott
Reacti vet newsletter 3_hu-v2_formazottReacti vet newsletter 3_hu-v2_formazott
Reacti vet newsletter 3_hu-v2_formazottITStudy Ltd.
 
Be@cyber pro newsletter_2_hu (2)
Be@cyber pro newsletter_2_hu (2)Be@cyber pro newsletter_2_hu (2)
Be@cyber pro newsletter_2_hu (2)ITStudy Ltd.
 
Reacti-VET képzési ismertető
Reacti-VET képzési ismertetőReacti-VET képzési ismertető
Reacti-VET képzési ismertetőITStudy Ltd.
 
Innovatív tanár képzési ismertető
Innovatív tanár képzési ismertetőInnovatív tanár képzési ismertető
Innovatív tanár képzési ismertetőITStudy Ltd.
 
Intezményi minőségmenedzser képzési ismertető
Intezményi minőségmenedzser képzési ismertetőIntezményi minőségmenedzser képzési ismertető
Intezményi minőségmenedzser képzési ismertetőITStudy Ltd.
 
Laser Safety Newsletter 2.
Laser Safety Newsletter 2.Laser Safety Newsletter 2.
Laser Safety Newsletter 2.ITStudy Ltd.
 
Lézerbiztonság Erasmus + projekt hírlevele - 2. szám - 2019.3.1.
Lézerbiztonság Erasmus + projekt hírlevele -  2. szám - 2019.3.1.Lézerbiztonság Erasmus + projekt hírlevele -  2. szám - 2019.3.1.
Lézerbiztonság Erasmus + projekt hírlevele - 2. szám - 2019.3.1.ITStudy Ltd.
 
Lézerbiztonság Erasmus+ projekt hírlevele - 1.szám, 2019.2.28
Lézerbiztonság Erasmus+ projekt  hírlevele - 1.szám, 2019.2.28Lézerbiztonság Erasmus+ projekt  hírlevele - 1.szám, 2019.2.28
Lézerbiztonság Erasmus+ projekt hírlevele - 1.szám, 2019.2.28ITStudy Ltd.
 
Green Construction - Erasmus+ project 2017-2019
Green Construction - Erasmus+ project 2017-2019Green Construction - Erasmus+ project 2017-2019
Green Construction - Erasmus+ project 2017-2019ITStudy Ltd.
 

More from ITStudy Ltd. (20)

Ls4 vet newsletter_en 3
Ls4 vet newsletter_en 3Ls4 vet newsletter_en 3
Ls4 vet newsletter_en 3
 
Hu ls4 vet_newsletter_211116
Hu ls4 vet_newsletter_211116Hu ls4 vet_newsletter_211116
Hu ls4 vet_newsletter_211116
 
Newsletter 1 hu
Newsletter 1 huNewsletter 1 hu
Newsletter 1 hu
 
Big poster last
Big poster lastBig poster last
Big poster last
 
Newsletter no 6 laser safety.docx
Newsletter no 6 laser safety.docxNewsletter no 6 laser safety.docx
Newsletter no 6 laser safety.docx
 
Laser safety 5th newsletter hun
Laser safety 5th newsletter hunLaser safety 5th newsletter hun
Laser safety 5th newsletter hun
 
Ls4 vet flyer_nl
Ls4 vet flyer_nlLs4 vet flyer_nl
Ls4 vet flyer_nl
 
Ls4 vet flyer_de_v6
Ls4 vet flyer_de_v6Ls4 vet flyer_de_v6
Ls4 vet flyer_de_v6
 
Ls4 vet flyer_hu
Ls4 vet flyer_huLs4 vet flyer_hu
Ls4 vet flyer_hu
 
Be@cyber pro newsletter_4_hu
Be@cyber pro newsletter_4_huBe@cyber pro newsletter_4_hu
Be@cyber pro newsletter_4_hu
 
Be@cyber pro 3. hirlevel hu
Be@cyber pro 3. hirlevel huBe@cyber pro 3. hirlevel hu
Be@cyber pro 3. hirlevel hu
 
Reacti vet newsletter 3_hu-v2_formazott
Reacti vet newsletter 3_hu-v2_formazottReacti vet newsletter 3_hu-v2_formazott
Reacti vet newsletter 3_hu-v2_formazott
 
Be@cyber pro newsletter_2_hu (2)
Be@cyber pro newsletter_2_hu (2)Be@cyber pro newsletter_2_hu (2)
Be@cyber pro newsletter_2_hu (2)
 
Reacti-VET képzési ismertető
Reacti-VET képzési ismertetőReacti-VET képzési ismertető
Reacti-VET képzési ismertető
 
Innovatív tanár képzési ismertető
Innovatív tanár képzési ismertetőInnovatív tanár képzési ismertető
Innovatív tanár képzési ismertető
 
Intezményi minőségmenedzser képzési ismertető
Intezményi minőségmenedzser képzési ismertetőIntezményi minőségmenedzser képzési ismertető
Intezményi minőségmenedzser képzési ismertető
 
Laser Safety Newsletter 2.
Laser Safety Newsletter 2.Laser Safety Newsletter 2.
Laser Safety Newsletter 2.
 
Lézerbiztonság Erasmus + projekt hírlevele - 2. szám - 2019.3.1.
Lézerbiztonság Erasmus + projekt hírlevele -  2. szám - 2019.3.1.Lézerbiztonság Erasmus + projekt hírlevele -  2. szám - 2019.3.1.
Lézerbiztonság Erasmus + projekt hírlevele - 2. szám - 2019.3.1.
 
Lézerbiztonság Erasmus+ projekt hírlevele - 1.szám, 2019.2.28
Lézerbiztonság Erasmus+ projekt  hírlevele - 1.szám, 2019.2.28Lézerbiztonság Erasmus+ projekt  hírlevele - 1.szám, 2019.2.28
Lézerbiztonság Erasmus+ projekt hírlevele - 1.szám, 2019.2.28
 
Green Construction - Erasmus+ project 2017-2019
Green Construction - Erasmus+ project 2017-2019Green Construction - Erasmus+ project 2017-2019
Green Construction - Erasmus+ project 2017-2019
 

Recently uploaded

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 

Module 1 content EN.pptx

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. INTRODUCTION TOPICS 1. Information and Data Literacy: - Finding information on the web (browsing) - Evaluate information found - Downloading and storing information 2. Communication and Collaboration - Emails and instant messaging - Collaboration sites 3. Content Creation and Copyright - Creation of own digital content - Copyright 4. Digital Safety - Data and device protection - Identifying threats (spam, phishing, etc.) 5. Conclusion and Assessment The module prepares you to search and select digital information and tools (devices and apps) which could help the person being cared for improve the quality of life, well-being and safety living and maintain health. You will be able to develop your own personal digital strategy, including applying digital tools for your work, keep contact and communicate with the care recipients, the families and other caregivers and will be able to apply and suggest practical digital tools and applications and teach the recipients to use them in order to stay mentally and physically healthy. In this module, the importance of privacy, personal data and internet safety are focused on as well. At the end of the module, the levels of knowledge, skill and attitudes of the participants will reach at least Intermediate 4” level according to the European framework of DigComp 2.2
  • 9. FINDING INFORMATION Your device (PC, smartphone, tablet, laptop, notebook has been sold with having one or some internet browser downloaded.) The only thing you should do is to customize and set the one you prefer to use further. Browsers default to use the same language as your operating system but this setting can be changed by the user. Listen to the steps you should take to do it in MS Edge: How to download Google Chrome?
  • 10. How to translate a web page with your browser? Google Chrome Firefox Google Chrome Web Browser https://www.mozilla.org/en- US/firefox/new/ https://www.microsoft.com/en- us/edge?form=MA13FJ&exp=e00 Secure download sites of the highest rated browsers
  • 11. Searching on the web You might come across an unforeseeable situation and need help when there’s no other person around. Detecting a symptom never seen or finding information on a topic not known may happen if you’re using the internet. If a web page is in a different language, do not worry: you can set automatic translation function in the browser, like you can see it in Google Chrome.
  • 12. How to find credible information? The browser you’re using applies a search engine to find the information you’re searching for in the jungle of millions of web pages on the Internet. In Google Search (for Chrome) you can either write, say out loud or show pictures for your request Browser Default search engine Properties Google Chrome Opera Firefox Google Search Ranks fresh information first, Collects data of users MS Edge Bing Favours older web pages, Shows the results without dates When searching for information, it is recommended to: •instead of general phrases, use the terms which describe the concept more precisely (e.g. instead of the term “cat”, use the term “Siamese cat”). •use synonyms or alternative expressions •the expressions should be short, clear and precise – use less words to express more •use quotation marks “ ” – the search results will be of web pages containing the exact phrase within the quotation marks
  • 13. Tips 1.A secure website’s name always starts with https, not with http only. Besides, there is a paddock sign in the address bar/status bar clicking on which you can get a report on the security status. 2.Use a browser that is among the highest ranking browsers in 2023. They have inbuilt safety functions to protect you while browsing or opening or downloading a file from the internet. 3.Avoid websites that seemingly have too long or unusual names or visibly they are of poor quality. Some fake sites that try to deceive visitors seems alike the original ones but there is always something strange in the url to arise suspicion. Synchronizing your phone and computer:
  • 14. How to store your downloaded or own files? (Source: TICbeat) Instead of having all files created or downloaded on your own computer or sending emails with large attachments, you’d rather store them in the “cloud”. Thus you can access your files from different devices, share them with others and even work on them in collaboration.
  • 15. Downloading an application There are millions of different web applications that you might want to use ranging from the good old online games, video and music streaming apps to those that help monitoring physical activity (e.g.step counters) or health (e.g. heart- rate monitors). Apps downloaded might require registration and will run on your device like your other software. Google Play The Play Store app comes pre-installed on Android devices that support Google Play, and can be downloaded for some Chromebook devices. How to open the Play Store app: • On your device, go to Apps. • Tap Google Play Store/Google Play. • This will open the store where you can search for apps to download. Apple Store For IOS users
  • 17. Emails Internet browsers provide emailing services just like they operate their own search engines. Outlook is an email service offered by Microsoft. You can create a free account with the ending: @outlook.com A Gmail account is a free Google account with an email address with the ending: @gmail.com In case you want to chose another mail host, you can find many options for free… Though related to Mozzilla, Thunderbird can be used separately for email services. Download from here. Listen how to sign up for gmail
  • 18. Real-time Communication Apps ● WhatsApp ● Viber ● FB Messenger ● Skype ● Zoom ● MsTeams ● Google Meet While you need to download the app and sign up for Viber, WhatsApp and Zoom, as these are individual applications, the others can be run attached to your existing account in Google, Facebook or Edge and you can use them when you’re logged in. These, as well as Skype, can directly be accessed by your account.
  • 19. Collaboration Sites Collaboration means not only constant communication between people working together but a harmonized delivery of definite acivities, in order to achieve a common objective. The list of the most popular collaboration sites according to Techradar is available here.
  • 21. What is a digital content? Digital content is the term used for any content in digital form, including audio, video, images, websites as well as articles, books, dictionaries and educational courses that are published online. Digital content is available to read and for download over the Internet or via distribution on optical media such (CD or DVD). With the easy accessible Canva application you’ll also be able to create different kind of digital content.
  • 22. You can create your own digital content easily for example to make an invitation more appealing to the recipients. . Watch this video to learn how to prepare eg. a greeting card with Canva (Click on the image).
  • 23. Copyright, Creative Commons When creating digital content, you must regard if the elements you want to use are protected by copyright. How can you be sure of it?  Creation apps like Canva have their own repositories of images for free  Check what Creative Commons symbol is added to the image or video, etc. you want to use. You’ll find the descriptions clicking here. Before using a private photo or video which is not for public, always ask for the owner’s consent to it! A TIP to find copyright free objects with Google Chrome
  • 24. FREE STOCK PHOTOS AND IMAGES Unsplash These offer a limited number of photos/videos/images or even graphic elements to users without registration, free of charge. Others are available to subscribers on a commercial basis. These pages indicate the conditions for the legal use of each content. Pixabay „Bird, Common redstart, Songbird image. Free for use.” (Pixabay) Freeimages iStock Pexels You can protect your piece of work published with adding either of these Creative Commons symbols.
  • 26. Protecting your device and personal data Most of the infections, attacks, security breaches etc. are usually only possible because of the connection between the digital device and the internet. What can we do against? • Keep your Operating System updated • In the configuration menu of your browser, you have the possibility to reinforce security with the use of the offered security “Extensions” • Download and install applications from trusted websites assuring that they are the safest download • Use firewalls to protect your computer • Set your fingerprint or pattern identification to access to your smartphone • Download and subscribe for an antivirus software
  • 27. Passwords, authentification When we think about accessing a service or our data, we think about secure access. Usually, this access concession comes with an authentication process. Anyone who manages or uses passwords must take into account certain good practices when generating passwords. ● We should not use default passwords. (widely used in electronic devices) ● Passwords must be robust, impersonal safe and we do not have to reuse them. ● Passwords must be changed periodically. ● Do not use the same password for different service. ● Do not use a password reminder. ● Hints for secure password creation: - Include numbers. - Use a combination of uppercase and lowercase letters. Include special characters. What are special characters? See Examples: - * ? ! @ # $ / ( ) { } = . , ; : Other ways of authentification by a website • Verification in two steps: it is not a complete alternative to the password, but a reinforcement that increases your security. It is based on a double verification: "something we know" (the password) together with "something we are" or "something we have". Most of the time, this second factor is usually a code sent by text (SMS) or mail. • The fingerprint as an alternative to the password has advanced dramatically in recent years thanks to smartphone development. • Other biometric data such as iris recognition, facial recognition, heart rate... • Use of unique and temporary password. The system would generate a random and temporary code that is sent to us by text (SMS) every time we try to log in. GDPR, an EU regulation, aims to protect data by obliging organisations operating on the internet to declare whether they store users' data and what they use it for.
  • 28. Protect your email account against spams Malware, spams, etc. Malware are - Viruses: malicious executable code that is attached to other executable files and normally replaces them. - Worms: replicate themselves without human intervention by exploiting vulnerabilities. They are quickly replicated from one computer to another slowing down the network and the connected device - Trojans: carry out malicious action disguised as legitimate software to give an attacker remote access to the infected computer. - Ransomware: program that blocks the access to a computer until a ransom is paid. It usually propagates as a worm (exploiting a vulnerability) or a Trojan horse (a downloaded file). - Rootkits: Software that modify the operating system to create a backdoor to allow access with admin privileges to the device continuously hiding its presence to the user. - Bots: software that automatically perform repetitive actions and it can be used to execute malicious actions, for example, denial-of-service attacks
  • 29. Phishing, vishing and smishing – frauds using technics ● phishing - deception absolutely specialised in emails, ● vishing refers to phishing over the phone ● smishing refers to phishing in the form of SMS. Phishing: an umbrella term for fraudulent data harvesting (mainly referring to email and fake websites, but can include all types of data harvesting). E.g.: phishing bank emails. Remember: no bank inquires about your account number or passwords! How to defend yourself? • never open the bank's website by clicking on a link in an email! • Always type in the link or use the link saved in your "Favourites"! • Use a browser that allows you to block pop-ups! • Get suspicious if you are sure of not having an ongoing business, transaction, or any other affairs related to the sender „Messages from utility service providers or delivery companies can also be used as a basis for frauds. These typically refer to data reconciliation or a request to provide bank account details or to pay money in arrears. In messages that appear to be official, attackers may also hide links to install malicious software on the device.” Do not open these! (Source: https://kiberpajzs.hu/)
  • 31. In this module you’ve learnt how start browsing on the Internet for credible information, how to download or store digital content, how to share them with others. You’ve found the most popular and high rated tools for emailing and exchanging instant messages or communication and collaboration. In case you’ve gained enough self-confidence, you may try to create your own digital content and share it with others. To do so you need to regard copyright issues that have been mentioned here, too. And above all, regardless of your level of digital skills, being aware of the threats on the Internet and ways of defending yourself against them is a must – that’ what we’ve emphasized the most in each topic. Module 1 is an optional one that means we are not intended to assess the knowledge and skills you’ve obtained. In case you want to have a clear picture of your personal development, please, test your digital skills on the EU platform and find the level of your digital competences categorised similarly to this module. To get a prompt overview on what you’ve memorized here, please, answer the questions!
  • 32. Quiz 1. Where can you set your browser to translate a webpage? a. In my user profile b. During registration c. Clicking on the dots in the up-right corner 2. Credible websites’ names start with… a. www b. http/ c. https 3. True or false? a. Every browser has its own coud storage b. Skype can be used with a Google account c. Copyright means that everyone is allowed to copy anything found on the Internet d. The simplier password you create is the easier to memorize thus it’s the most useful e. Malware are viruses and worms that attack your device.

Editor's Notes

  1. In this Module you’ll revise the skills an advanced-average user must have for searching, finding, downloading, storing and sharing information on the Internet as well as how to create own digital content. There are also basic understanding of safety issues to be touched here in order to keep your devices and your personal data and privacy safe. If you want to assess your existing digital competences at the beginning of the course, visit here to find the test DigComp 2.2 accessible after a simple registration process.
  2. Data literacy describes the ability to read, work with, analyze, and argue with data, according to Raul Bhargava and Catherine D’ignazio from MIT and Emerson College.
  3. By clicking to start the video you can access the official tutorial from Google on how to install Google Chrome, one of the most popular and widespread Internet browsers. More details about Chrome are here. (Article published April 26. 2021. by Simon Blatt on MUO, last visited on 17th May, 2023. PUBLISHED APR 26, 2021
  4. The links in the images directly lead you to the place of download these browsers. Listen to the audio guides to learn what steps you should take to translate a website with your browser, if it has no versions on the languages you speak.
  5. Click on the loudspeaker symbol to listen to the definition and functions of a web browser.
  6. The tablet shows the default search engines applied by each browser. You can change for another one if you are not satisfied with that by opening Settings in your browser and follow the steps in the tutorial. Source: The Best Search Engines of 2023 By Paul Gil, Updated on January 3, 2023, published on lifeware.com, last visited on 18 May 2023.
  7. Best security browsers’ source is Sead Fadilpašić ‘s article published on Techradar. Last visited 18 May 2023. When you want to open the site the search engine has offered you, usually you need to accept the cookies to proceed. Don’ worry to do that, they are harmless: „Cookies are pieces of data from the website that stored within a web browser that the website can retrieve at a later time. Cookies are used to tell the server that users have returned to a particular website.” (Source: https://www.trendmicro.com, last visited 25 May 2023.
  8. The video tutorials embedded here from YouTube will assist you in learning more about how to use cloud repositories. Make note that many applications where you need to register provide an internal repository for your files and you can share them or publish them directly online.
  9. Definition: A web application (or web app) is application software that is accessed using a web browser. Web applications are delivered on the World Wide Web to users with an active network connection ("What Is A Web Application?". stackpath.com. Stack Path. Retrieved 2022-08-15. A web application is a computer program that utilizes web browsers and web technology to perform tasks over the Internet.) The video tiutorial shows you how to use Apple Store.
  10. Data literacy describes the ability to read, work with, analyze, and argue with data, according to Raul Bhargava and Catherine D’ignazio from MIT and Emerson College.
  11. However you can exchange instant messages or can transmit voice and video, these applications operate on the Internet so using them don’t require extra costs and not counted in your phone bill. When using either of the abovementioned apps you are enabled to share your screen with the others, continue audio chats, video chats and text messages as well as sending files attached. Free versions are limited by time.
  12. Ref.: Best online collaboration tools of 2023 By Steve McCaskill last updated March 07, 2023 published on Techradar. Last visited on 19th June 2023.
  13. Data literacy describes the ability to read, work with, analyze, and argue with data, according to Raul Bhargava and Catherine D’ignazio from MIT and Emerson College. Source: https://www.dataversity.net/what-is-data-literacy/
  14. You can either register as a user or use the application without it. Login is available with having existing Google or Facebook accounts as well.
  15. You can edit your own photos, create spectacular social media posts, cover images and do a lot more with Canva. Registration process is very simple and free for not professional users. Your pieces of work are stored in your account and can be shared or published directly in social media or many other ways. You can download them in different formats for further usage or to print them out.
  16. A copyright is a type of intellectual property that gives its owner the exclusive right – over a text, photo, image, video, audio, design, etc. - to copy, distribute, adapt, display, and perform a creative work.
  17. There are a lot more of free stock photo sites that allow downloading for free to a preset limit. Remember to make sure that you are allowed to use the downloaded material freely, subject to copyright and legal regulations. When publishing your own productions, you can give the options of reusing them according to your wish. Creative Commons will help you a lot with this process. „Creative Commons is an American non-profit organization and international network devoted to educational access and expanding the range of creative works available for others to build upon legally and to share.” (Wikipedia)
  18. Data literacy describes the ability to read, work with, analyze, and argue with data, according to Raul Bhargava and Catherine D’ignazio from MIT and Emerson College.
  19. Operating Systems download updates automatically, you only need to give your contribution by accepting it.
  20. A website you’ve visited must ask for your consent to processing, saving and re-using your data. Always think carefully about what you are contributing actually!
  21. „Spam” is a term for unwanted mass of emails from unknown or not real senders.
  22. Pop-ups usually ask for confidential information about you. Do not click on them and do not enter personal data on such pages. The video in this slide shows you what really phishing means and what you can do against. References: kiberpajzs.hu (last visited on 25 May 2023)
  23. Data literacy describes the ability to read, work with, analyze, and argue with data, according to Raul Bhargava and Catherine D’ignazio from MIT and Emerson College.