SlideShare uma empresa Scribd logo
1 de 15
• Digital Literacy is the ability to use modern day technologies
to find, evaluate, select and use information.
• It is also the ability to manipulate this kind of information
and data digitally.
• Schools all around the world are embracing this subject.
• It is necessary to have digital competence if you want to
make a good use of these technologies.
Video:
http://www.youtube.com/watch?v=FdEXijFXfD8
350000
300000
250000
200000
150000
100000
50000

0
123456

12345

123456789

Password
•By using such simple and obvious passwords you’re
putting in jeopardy your account(s).
• If you have a big digital footprint the danger is much
higher since there are more people aware of the existence
of your account.
•The act of not logging out also influences your e-safety. If
you forget to do this while using a public computer the
chances are that your account is going to be hacked.
•Digital footprint: all the traces a person leaves behind
about herself in a digital environment.
•Your digital footprint, no matter how small, is always very
hard to erase.
•The more accounts you have the bigger your digital
footprint is.
To use digital tools and technologies properly it is necessary to
know how to be safe while using them. This is e-safety. Most
sites on the Internet have security methods to protect your
privacy as well as modern anti-virus systems. But sometimes
this isn’t enough. Most people think a relatively simple
password will stop every hacker or malware out there. But they
soon find out that is not the case. According to recent studies
the number of accounts hacked that used Adobe encryption
were approximately 150 million!
Video: https://www.youtube.com/watch?v=bh20w33ptg0
• A digital citizen can be defined in only a few words, it´s
basically a person that uses the internet regularly and in
an effective way.
• A digital citizen makes use, very often, of information
technology, which is the application of computers to
manipulate, store, transmit and retrieve data, to engage
in politics government participation society among other
subjects.
• Bibliography
• http://christchurchprimaryschool.org/e-safety. (s.d.).
• http://cleach.wordpress.com/digital-literacy-in-yourclassroom/. (s.d.).
• http://writing.colostate.edu/help/account/logout.cfm. (s.d.).
• http://writingforelectronicmedia.wikispaces.com/Digital+Lite
racy. (s.d.).
• http://www.bubblews.com/news/349432-save-yourself-offacejacking. (s.d.).
• http://www.digitalcitizenship.net/. (s.d.).
• http://www.digitalfamilysummit.com/2012/safety-protectingyour-digital-footprint/. (s.d.).
• http://www.library.illinois.edu/diglit/definition.html. (s.d.).
• http://www.teachthought.com/technology/the-definition-ofdigital-citzenship/. (s.d.).
• http://www.youtube.com/watch?v=d5kW4pI_VQw. (s.d.).
• http://www.youtube.com/watch?v=X5ySocUyI7I. (s.d.).
• http://www.zdnet.com/blog/security/25-most-usedpasswords-revealed-is-yours-one-of-them/12427. (s.d.).
Work by:
Ali El-Zein No. 2
Eduardo Silva No. 13
João Pedro No. 17
Pedro Machado No. 23

Mais conteúdo relacionado

Mais procurados

Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awarenessTerranovatraining
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Digital citizenship andayah & rachel & emily
Digital citizenship  andayah & rachel & emilyDigital citizenship  andayah & rachel & emily
Digital citizenship andayah & rachel & emilyemily_ca
 
Technology[Advantages&Disadvantages]-ICT-Valderrama
Technology[Advantages&Disadvantages]-ICT-ValderramaTechnology[Advantages&Disadvantages]-ICT-Valderrama
Technology[Advantages&Disadvantages]-ICT-ValderramaNorvi Grace Valderrama
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.CAS
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile worldBrian Katz
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Nicholas Davis
 
Biz miz io2 content for module 5
Biz miz io2 content for module 5Biz miz io2 content for module 5
Biz miz io2 content for module 5EmanuelePristera
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyoneYasir Nafees
 
NHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaNHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaBijay Acharya
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 

Mais procurados (20)

Help Desk Signage
Help Desk SignageHelp Desk Signage
Help Desk Signage
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Digital citizenship andayah & rachel & emily
Digital citizenship  andayah & rachel & emilyDigital citizenship  andayah & rachel & emily
Digital citizenship andayah & rachel & emily
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Technology[Advantages&Disadvantages]-ICT-Valderrama
Technology[Advantages&Disadvantages]-ICT-ValderramaTechnology[Advantages&Disadvantages]-ICT-Valderrama
Technology[Advantages&Disadvantages]-ICT-Valderrama
 
Protect
ProtectProtect
Protect
 
Internet security
Internet securityInternet security
Internet security
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile world
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
E-Safety
E-SafetyE-Safety
E-Safety
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
 
Biz miz io2 content for module 5
Biz miz io2 content for module 5Biz miz io2 content for module 5
Biz miz io2 content for module 5
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
NHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaNHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay Acharya
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 

Destaque

Talking turkeys2
Talking turkeys2Talking turkeys2
Talking turkeys2Luísa Lima
 
Plagiarism and copyright
Plagiarism and copyrightPlagiarism and copyright
Plagiarism and copyrightLuísa Lima
 
Internet safety eTwinning Multilateral seminar S. João da Madeira
Internet safety eTwinning Multilateral seminar S. João da MadeiraInternet safety eTwinning Multilateral seminar S. João da Madeira
Internet safety eTwinning Multilateral seminar S. João da MadeiraLuísa Lima
 
Ler, escrever e contar
Ler, escrever e contarLer, escrever e contar
Ler, escrever e contarLuísa Lima
 

Destaque (8)

Talking turkeys2
Talking turkeys2Talking turkeys2
Talking turkeys2
 
Internet segura
Internet seguraInternet segura
Internet segura
 
Plagiarism and copyright
Plagiarism and copyrightPlagiarism and copyright
Plagiarism and copyright
 
A Cor
A Cor A Cor
A Cor
 
Internet safety eTwinning Multilateral seminar S. João da Madeira
Internet safety eTwinning Multilateral seminar S. João da MadeiraInternet safety eTwinning Multilateral seminar S. João da Madeira
Internet safety eTwinning Multilateral seminar S. João da Madeira
 
Sexting
SextingSexting
Sexting
 
Social Media - Netiquette
Social Media - NetiquetteSocial Media - Netiquette
Social Media - Netiquette
 
Ler, escrever e contar
Ler, escrever e contarLer, escrever e contar
Ler, escrever e contar
 

Semelhante a Digital literacy

itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01TechSoup
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
IAll 2013 Conference
IAll 2013 ConferenceIAll 2013 Conference
IAll 2013 ConferenceJoAnn Corley
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Enhancing the User Experience with ​Smart Technologies
Enhancing the User Experience with ​Smart TechnologiesEnhancing the User Experience with ​Smart Technologies
Enhancing the User Experience with ​Smart TechnologiesJustin Denton
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongbryns
 

Semelhante a Digital literacy (20)

Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
Internal social networks
Internal social networksInternal social networks
Internal social networks
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
IAll 2013 Conference
IAll 2013 ConferenceIAll 2013 Conference
IAll 2013 Conference
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Enhancing the User Experience with ​Smart Technologies
Enhancing the User Experience with ​Smart TechnologiesEnhancing the User Experience with ​Smart Technologies
Enhancing the User Experience with ​Smart Technologies
 
Team black
Team blackTeam black
Team black
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
 

Mais de Luísa Lima

Kahoot socrative plickers
Kahoot socrative plickersKahoot socrative plickers
Kahoot socrative plickersLuísa Lima
 
Your online habits
Your online habitsYour online habits
Your online habitsLuísa Lima
 
Information overload and search techniques
Information overload and search techniquesInformation overload and search techniques
Information overload and search techniquesLuísa Lima
 
Segurança na internet
Segurança na internetSegurança na internet
Segurança na internetLuísa Lima
 

Mais de Luísa Lima (11)

Projeto besafe
Projeto  besafeProjeto  besafe
Projeto besafe
 
Kahoot socrative plickers
Kahoot socrative plickersKahoot socrative plickers
Kahoot socrative plickers
 
Your online habits
Your online habitsYour online habits
Your online habits
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Information overload and search techniques
Information overload and search techniquesInformation overload and search techniques
Information overload and search techniques
 
Segurança na internet
Segurança na internetSegurança na internet
Segurança na internet
 
Talking turkeys
Talking turkeysTalking turkeys
Talking turkeys
 
Cube creator
Cube creatorCube creator
Cube creator
 
Slampenzu
SlampenzuSlampenzu
Slampenzu
 
Madness
MadnessMadness
Madness
 
The daily hay
The daily hayThe daily hay
The daily hay
 

Último

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Último (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Digital literacy

  • 1.
  • 2.
  • 3. • Digital Literacy is the ability to use modern day technologies to find, evaluate, select and use information. • It is also the ability to manipulate this kind of information and data digitally. • Schools all around the world are embracing this subject. • It is necessary to have digital competence if you want to make a good use of these technologies.
  • 5.
  • 7. •By using such simple and obvious passwords you’re putting in jeopardy your account(s). • If you have a big digital footprint the danger is much higher since there are more people aware of the existence of your account. •The act of not logging out also influences your e-safety. If you forget to do this while using a public computer the chances are that your account is going to be hacked.
  • 8. •Digital footprint: all the traces a person leaves behind about herself in a digital environment. •Your digital footprint, no matter how small, is always very hard to erase. •The more accounts you have the bigger your digital footprint is.
  • 9.
  • 10. To use digital tools and technologies properly it is necessary to know how to be safe while using them. This is e-safety. Most sites on the Internet have security methods to protect your privacy as well as modern anti-virus systems. But sometimes this isn’t enough. Most people think a relatively simple password will stop every hacker or malware out there. But they soon find out that is not the case. According to recent studies the number of accounts hacked that used Adobe encryption were approximately 150 million!
  • 12.
  • 13. • A digital citizen can be defined in only a few words, it´s basically a person that uses the internet regularly and in an effective way. • A digital citizen makes use, very often, of information technology, which is the application of computers to manipulate, store, transmit and retrieve data, to engage in politics government participation society among other subjects.
  • 14. • Bibliography • http://christchurchprimaryschool.org/e-safety. (s.d.). • http://cleach.wordpress.com/digital-literacy-in-yourclassroom/. (s.d.). • http://writing.colostate.edu/help/account/logout.cfm. (s.d.). • http://writingforelectronicmedia.wikispaces.com/Digital+Lite racy. (s.d.). • http://www.bubblews.com/news/349432-save-yourself-offacejacking. (s.d.). • http://www.digitalcitizenship.net/. (s.d.). • http://www.digitalfamilysummit.com/2012/safety-protectingyour-digital-footprint/. (s.d.). • http://www.library.illinois.edu/diglit/definition.html. (s.d.). • http://www.teachthought.com/technology/the-definition-ofdigital-citzenship/. (s.d.). • http://www.youtube.com/watch?v=d5kW4pI_VQw. (s.d.). • http://www.youtube.com/watch?v=X5ySocUyI7I. (s.d.). • http://www.zdnet.com/blog/security/25-most-usedpasswords-revealed-is-yours-one-of-them/12427. (s.d.).
  • 15. Work by: Ali El-Zein No. 2 Eduardo Silva No. 13 João Pedro No. 17 Pedro Machado No. 23