2B article

pdf

School

Florida Atlantic University *

*We aren’t endorsed by this school

Course

661353

Subject

Communications

Date

Apr 3, 2024

Type

pdf

Pages

6

Uploaded by MateTreeStork12

Report
Chapter 2B Article and Objective Review Combined Directions: 1. Read the Chapter 2B article and highlight important definitions and notes in Kami. Important definitions: Blog, Netiquette, Ethical Issues, Plagiarism, SFW, Presencing, Unified Communication 2. Highlight answer to objective review questions that appear in blue. 3. Turn in when done. Blog A Web log, or blog , is a collection of personal thoughts posted on a public Website. A blog is essentially an electronic journal or public diary. Blogs are an example of a Web 2.0 methodology that emphasizes user interaction. The act of adding to a blog is known as blogging. Following are attributes of a common blog entry: It consists of brief, informal thoughts focused on a specific topic . It reflects the personality of the author in a unique way. It can contain links to other authors or sites. It is written in chronological order and commonly displayed in reverse chronological order. Some individuals add to their blogs daily, whereas others add to blogs only when moved by a particular event or issue. Blog postings are mainly textual but can include images, photos, links, video, and audio. Objective Review Questions on Blogs 1. Which term is used to describe a collection of personal thoughts posted on a public Web site? A. Blog B. Internet journal C. Anonymous FTP D. Newsgroup Blogging 2. You have created your own blog site and have posted and received numerous entries. You have noticed that blog entries: A. consist of brief, informal thoughts focused on a specific topic. B. can contain only text. C. display in chronological order and are written in reverse chronological order. D. cannot contain links to other authors or sites.
3. Samantha is a senior in high school applying to colleges. She decides to document her experiences online so future high school seniors can learn from her experience. The best method Samantha could use to document her experiences is: A. Blog B. Mashup C. Folksonomy D. Wiki Communicating Effectively over the Internet Netiquette The term netiquette has been coined to encourage common sense and politeness, and to establish general rules for Internet etiquette. These guidelines include the following: Use business language in all work-related messages. Keep messages brief and pertinent (important) Remember that messages or posts have permanence and may be printed or forwarded to other people. Check your spelling and proofread your message before sending or posting it. Consider that typing in all capital letters connotes shouting or anger. Respond immediately to messages and posts sent to you, and think clearly about what you write. Remember that using emoticons in e-mail messages or newsgroup postings is not considered a professional practice. Consider that common Internet acronyms and abbreviations, such as LOL (Laughing Out Loud) or BRB (Be Right Back), may be unfamiliar to some people. Objective Review Questions on Communicating Effectively over the Internet 4. Why should you avoid typing e-mail messages in all capital letters? A. Because messages containing all capital letters require more bandwidth to transmit B. Because all capital letters may be ignored by some e-mail clients C. Because using all capital letters connotes shouting or anger D. Because visually impaired readers have trouble reading all capital letters Internet Communication - Ethical Issues Internet technology allows us to communicate on a personal level with people we may not know. The ethical issues (Ethical refers to following accepted rules of behavior. It is considered ethical if you follow the rules. It is considered unethical if you do not follow the rules.) that apply to face-to-face communication also apply to Internet-based communications. Consider the following:
Online chat and instant messaging sessions are not secure. Never send credit card or password information to another user. Instant messaging and chat rooms make communication easy and anonymous. Remember that when you are in an online chat room with other users whom you do not know personally, you only know what they choose to tell you (which may be true or false). Do not provide personal information, such as your Social Security number or your address, to unknown users. You should not ask other users to divulge personal information via these sessions. Never agree to meet someone you meet online. It may be a predator. This is the most personal risk associated with using social media. Parents and older siblings should warn children carefully about the dangers of online chat. Predators lurk on the Internet. Children should never disclose their full names, ages, addresses or school names to people they do not know personally. Objective Review Questions on Internet Communication 5. Which of the following behaviors is considered to have the most personal risk associated with it when using social media? A. Engaging in a chat room conversation with someone you have recently met online B. Expressing a strong opinion in a blog post C. Agreeing to meet someone in person after getting acquainted on Facebook D. Agreeing to write status updates for a popular celebrity 6. You and other parents are attending Back To School Night at your son's school. During his presentation about this year's curriculum and goals, your son's teacher talks about the dangers of the Internet. Which of the following should he include in his recommendations to the parents? A. Direct the parents to visit their children's chat rooms and ask the other users to provide identification. B. Urge the parents to warn their children to never provide personal information over the Internet. C. Remind the parents that the anonymity of chat rooms provides security for their children. D. To minimize the parents' fear, tell the parents that the threat of predators has been reduced in recent times. Plagiarism and Shareware Using information that you find on the Web in research papers is permissible if you cite the work properly, just as you must do with material you find in a printed publication. However, plagiarizing online content (Plagiarism means copying someone else's written work
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
and presenting it as your own) is illegal and unethical, just as it is with printed books. Instant messaging and chat rooms make communication easy and anonymous, but you should not ask other users to divulge personal information via these sessions. Shareware is not free ; you can download it for free and try it, but if you like it and intend to keep using it, you are expected to forward the indicated fee. Downloading songs and movies from the Internet or a peer-to-peer network without obtaining permission or paying a fee is an illegal use of copyrighted information; copyright laws protect original works of authorship online as well as in print. Objective Review Questions on Plagiarism and Shareware 7. Some Internet practices are illegal (they violate laws and are punishable), whereas other practices may be legal but are still unethical and should be avoided. Which of the following practices is both legal and ethical? A. Trying shareware for free and paying for it only after you decide to keep using it. B. Downloading copyrighted artwork and using it as a background on your Web site. C. Copying someone else's written work from the Internet and presenting it as your own, as long as it is for schoolwork. D. Downloading music and motion pictures, as long as they are from a peer-to-peer network. 8. Which of the following is an example of ethical Internet behavior? A. Citing information you find on the Internet that you use in your own work B. Downloading any songs and movies from the Internet C. Requesting personal information about others during an Internet chat session D. Downloading and using shareware, which is free Avoiding Harassment Sending threatening e-mail messages, text messages or instant messages is illegal, just as if the threats were made via telephone. Use good judgment when composing a message. E-mail is permanent, and the text of an instant message or text message can be retrieved. Keep in mind that any messages you send, especially while at work or at school, should always be "safe for work" (SFW). SFW means that the content of your message can safely be viewed by anyone and does not contain any controversial, sexually explicit, profane or otherwise inappropriate content. It is unethical to use your personal Facebook or social media page to make disparaging remarks about people. Depending on what is posted, it may also be illegal to post derogatory remarks about a boss, a co-worker or another company -- for example, if the remarks are untrue and damaging, you could be prosecuted for libel. Although sending jokes via e-mail is generally an accepted practice, remember that not everyone wants to receive multiple forwarded jokes a day from you. Ask your intended
recipients whether they want to receive such communications regularly. If not, be courteous and respect requests that you do not send such messages. Objective Review Questions on Avoiding Harassment 9. You make it a point to send e-mail messages, text messages and instant messages that are considered ""safe for work."" This is a good way to ensure that your messages : A. will not be construed as sexual harassment. B. abide by the rules of netiquette. C. will not be deleted by anti-virus software. D. are compatible with unified communications technologies. 10. Which of the following Internet communication practices is unethical but not illegal? A. Posting false and hurtful claims about another person on your Facebook page B. Asking another user in a chatroom for personal information C. Posting artwork you copied from the Internet on your Web site and claiming it is your own D. Copying the code for a specialized application from another site and using it on your site without permission 11. Which of the following behaviors would be considered unethical? A. Using your personal Twitter account to recommend your company's newest product to your friends B. Using your personal Facebook page to make disparaging remarks about your boss C. Using your company's Facebook page to market your company's newest product D. Using your company's Twitter account to solicit and discuss opinions from your company's customers Presencing Presence information is a status indicator that conveys a person's willingness and ability to engage in communications. For example, when a user signs in to a social networking or instant messaging (IM) service, his status (e.g., online) is advertised (or published) to the people on his contacts list. A user's presence information, or presence state, is provided to a presence service via a network connection. Objective Review Questions on Presencing 12. When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent? A. Presencing B. Mobile computing C. Convergence D. Unified communications (UC)
Unified Communication Today's communication networks need robust and compatible platforms to meet our global society's changing needs. Unified communications (UC) is a business trend that seeks to simplify and integrate all forms of communication. UC enables a user to send a message on one medium and receive it on another. For example, a user can receive a voice mail message, then use a UC program to read it in his or her e-mail Inbox . Objective Review Questions on Unified Communication 13. Unified communications (UC) is a business trend that seeks to: A. process a large volume of requests by phone. B. convert voice into data packets for transmission over a packet-switched IP network. C. integrate telephony and data technologies. D. simplify and integrate all forms of communication. Mobile computing Mobile computing refers to a person's ability to use technology while "on the go." Devices that enable a user to engage in mobile computing include:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help