Text
Final Project: Importance of Staying Safe on the Web
Blog 1: Your Online Identity - https://digital-skills-musings.tumblr.com/post/658011594788306944/your-online-identity
Blog 2: Cookies (Not the baked kind) - https://digital-skills-musings.tumblr.com/post/658011714103787520/cookies-not-the-baked-kind
Blog 3: Cyberbullying - https://digital-skills-musings.tumblr.com/post/658011826909544448/cyberbullying
Blog 4: Your Online Privacy - https://digital-skills-musings.tumblr.com/post/658011979834867712/your-online-privacy
Blog 5: Tips and Tricks to Protect Yourself - https://digital-skills-musings.tumblr.com/post/658012009010495488/tips-and-tricks-to-protect-yourself
0 notes
Text
Tips and Tricks to Protect Yourself
https://www.flickr.com/photos/71195909@N03/32891617344
After all these posts you must be wondering why even use the web because of its many dangers? Well, the online world is an interesting and beneficial place which you should take advantage of but with some measures and precautions to ensure your safety.
The 3 E’s of Deleting Cyberbullying
Encourage a safe environment
This includes online, in schools, and at home so teenagers feel safer to share with an adult
Report to an adult when you or someone you know is experiencing cyberbullying
Post kind comments
Explain the consequences of cyberbullying
Bullying stops when everyone is aware of the harms to both sides
Educate each other on browsing online cautiously
Don’t put yourself in harm’s way and post something you may regret later
Keep passwords and personal information to yourself
Other tips to keep you safe:
Think twice and sometimes three times before posting something on social media. Is it something that could harm you or someone else? If yes, it does not belong on the web or anywhere else.
Don’t put your personal information on websites because you don’t know who will have access to them and what they will do with it.
Ensure your privacy is protected on every social media platform by using their provided functions and opting out.
Add extensions to block trackers from websites
0 notes
Text
Your Online Privacy
https://www.flickr.com/photos/68830805@N04/30657808828
We live in a world where a lot of our interactions are done online and these interactions help connect us with our family and friends, hop on the latest trends, share interests with each other, and more. However, doing something such as putting your personal information on the web where anyone can have access to it can be putting yourself in danger. Although Canada has many relevant laws which protects the privacy of users, but there are many instances that it is overlooked.
By putting your information online, you may be more vulnerable to attacks of malware, phishing, spoofing, and identity theft. Malware is when a website may upload a harmful code int your computer which not only becomes an annoyance to you, but also makes it easier to access your personal data such as banking or credit card information, social insurance number, and your home address.
This article talks about some of the most infamous viruses that were put into computers: https://uk.norton.com/norton-blog/2016/02/the_8_most_famousco.html
Now, what is phishing and spoofing? Phishers may send out emails or messages which ask you for your information such as passwords and this then allows them to install a malware into your computer. Spoofing is when dummy websites impersonate official and existing websites which can also allow them to install malware into your computer. These websites look almost the same as the real ones, but there is almost something off about them, so look closely!
0 notes
Text
Cyberbullying
https://www.flickr.com/photos/136770128@N07/39260742450
Bullying is not limited to physical fist fights and old milk dumped on heads, there is more to it than that and its scary. Cyberbullying is the harassment of someone digitally and it is common among teenagers who are on social media platforms which makes them the most vulnerable. There are too many cases of teenagers and even adults committing suicide because they were victims of cyberbullying.
Cyberstalking is another form of online harassment where individuals are targeted by their information made available on social media. There are many examples of cyberstalking, but I will name some of the most common ones:
Spamming of messages
Usage of inappropriate language
False accusations against you
Sending of viruses or hacking into accounts
Posting inappropriate comments while posing as you
Gathering or attempting to gather your personal information such as your home address or phone number
Victims of Cyberbullying
If you or someone you know are a victim of cyberbullying, it is crucial you reach out to an adult you trust and share with them as soon as possible. This may not always be possible however, and that is why there are many helplines available that you can call for help or more information. You can find them in some of these websites:
www.cybersmile.org
www.bullyingcanada.ca
www.antibullyingsoftware.com
www.kidshelpline.com
0 notes
Text
Cookies (Not the baked kind)
https://www.flickr.com/photos/70757891@N00/7133349441
There are cookies that you find on your counter with a glass of milk, and then there are cookies that are codes in your computer. These have been put by websites you visited. An example of this is when you are already logged into a website. You feel as if time has been saved and you don’t need to go through the effort of putting in your username and password, but your data has also been saved.
Oftentimes cookies are not dangerous and are sometimes very important for a website to run to its full capacity, but there are also evil cookies. These cookies have to do with “tracking” and “third party” cookies. Ever search up something on google out of pure curiosity and suddenly you’re getting advertisements on it for months? Well, these cookies are to blame. They are putting these into your computer or device by advertising networks when you visit a website. Creepily enough, they track your activity on the web, but as they claim, “It’s to deliver the most effective advertisements.” Umm... I pass.
Third party data stores specific information such as your IP address, income, marital status, gender, and much more. This is very concerning as these unique numbers within the data just need another piece of the puzzle and then you will be personally identifiable.
0 notes
Text
Your Online Identity
https://itmunch.com/wp-content/uploads/2019/08/The-Truth-About-Your-Digital-Identity.jpg
We all get excited because of the online world and the many opportunities it brings us, and there is absolutely nothing wrong with that! However, this can be done safely so everyone is happy and safe. Online identity is an important part of being an individual on the web, and there are many aspects to it. Just because it is so important, everyone should take the initiative to educate themselves on it and the best practices in order to better protect themselves.
Because there are so many websites and social media platforms that require you to share personal information, you should ask yourself is the platform really necessary to use and share your information on? For example, yes, having a Facebook account is great because it lets you share your Thanksgiving pictures with your uncle from Switzerland, but do you really need a Facebook account, Twitter, Instagram and etc. as a teenager? If yes, then that is also absolutely fine, but there are some places you should draw the line because there is such a thing as sharing too much.
Now, how would you know which online community to use to its full capacity while still being safe? Well, the answer is in the different identities that platforms and their communities require from you. On every social media site, you should be your authentic self and be truthful about your profile. But, staying balanced and keeping a filter is also important.
0 notes
Text
Module 10: An-al-y-sis
Using the information regarding data presentation from an entry on the Occam's Razor blog by Avinash Kaushik, I created the following infographic.

Original link to Occam’s Razor blog post : https://www.kaushik.net/avinash/data-presentation-tips-focus-think-simplify-visualize/#lines
0 notes
Text
Module 9: Code
Above are the 6 badges I earned in the JavaScript course on Codecademy. Following a few lessons, I realized how important it is to learn at least one code language, and I intend to continue my lessons.
0 notes
Text
Module 7: Thinking Design
Step 2: YourHealth’s Story
We have all experienced many doubts due to these intense months of the ongoing Covid-19 virus and the lockdown, especially with the many doubts the media may have stirred. However, with may medical clinics and hospitals only accepting emergencies, I myself had many instances where I turned to google to look for answers for my health questions. I had a searing pain in my side one day and google diagnosed me with cancer and undoubtedly, this made me question every ache I felt even more.
Step 3: YourHealth Value Proposition
People have a lot of questions and that is not the problem. Searching on sites for information about something as serious as health and wellbeing is the problem, and one should turn to a professional. Now, professionals may not always be available and that becomes a problem. That’s why YourHealth is an application run by professionals, that allows users to research and track symptoms they have, and it alerts them when they should seek medical help urgently. The difference between YourHealth and other symptom tracking apps is that it also provides recommendations for over-the-counter medicine, which is definitely a need!
Step 4: YourHealth Understands The Pain
YourHealth knows the pains of not understanding why you may feel a certain way or what an ache may mean and not having an accessible professional to help. We should all be aware of our body and understand it to its fullest, and this app strives to allow users to do just that. Everyone has the right to professional care; however, some may be hesitant to go because they are unsure of the extent of their pain or other reasons. One of the purposes of this app is for users to figure out when they need to seek professional help, because it may just be the common cold and not a tumor as google suggests.
Step 7: YourHealth Product
YourHealth allows users to create an account which will keep all their information in one organized place, making it easier for them to come back to. Users will be able to not only search symptoms they may have, but also browse through common symptoms and age groups relating to them. In addition, they will also be able to have a one-to-one live conversation with professionals and inquire about their doubts efficiently.
0 notes
Text
Module 6: Pitch Perfect!
“Hi! My name is Khadija and I’m a third year student going to Ryerson University. As a student myself I understand the feeling of being overwhelmed while having the need to maintain a high Grade Point Average. It took some time, but I eventually figured it out while still taking advantage of every opportunity and maintaining a healthy life style. Having gone through it myself, I believe other students also feel the same overwhelming feeling with different websites, applications, and obligations to keep track of and this often promotes unhealthy habits. MeZone is an all-in-one app which helps students increase productivity by tackling procrastination, managing tasks in calendars and to-do lists, and offering daily workouts and healthy eating. An app like this will be integral in the success students strive for and I believe this aligns with the goals of your company.”
An effective elevator pitch could be a great start to one’s career, or even a step forward as an entrepreneur. Keeping this in mind, I ensured that my introduction was brief but also illustrated what I could bring to the table. With the intention of keeping my proposal interesting and informative, I also ensured it was concise as the average elevator ride time is 30 seconds. My initial step was to create a sentence that summarized the goals of my value proposition and ensured it left an impression on the listener. Through this step, I stated the problem and I also presented my solution. In addition, I presented it in such a way that made it personal as it related to my experience and this would be effective as my listener would trust me more.
0 notes
Video
tumblr
Tutorial Assignment #3: Project Proposal
0 notes
Text
Module 2: Google Search
1. How would you search for an exact word or phrase?
Use quotation marks to search for an exact word or phrase and type it into the search bar.
2. How would you search for something on a specific site?
In order to search for something on a specific site, type search: and the site domain into the search bar. In addition, the “ctrl + f” on PCs or the “command + f” on apple computers could be clicked while on the specific site. Following this, a search bar will open which allows the user to type in a word or phrase and show the number of matches to that exact word or phrase on the open page once they click enter.
3. How would you correctly search for a definition?
In the search bar, the word “define” will be used before the word that one wants to find and the dictionary definition of that specific word will be shown as a result.
4. How would you search for a specific product available within a specific price range?
In order to search for a specific product available within a specific price range, one would need to type in the name of the product into the search bar and write the price range as “$x... $x”. An example of this would be “Samsung TV $400… $800”. Another method would be to type the name of the product into the search bar, and click the “shopping” option on the results page. They can then manually adjust the price range and filter the options.
5. How would you search for a specific filetype?
In order to search for a specific filetype, one would need to type the specific word or phrase into the search bar followed by “filetype:”, and after the colon they could narrow the file type they are looking for. For example, “dogs filetype: jpg.”
6. How would you include or ignore words in your search?
In order to include words in one’s search, they will have to use the symbol “+” and type it in the search bar followed by the word they want to include. For example, if they want to include the word “library” they will need to type it as “+library.”
In order to ignore words from the search, a similar method as above will be used, however the “-“ symbol will be used instead.
7. How would you find sites/pages similar to an existing one?
To find sites or pages similar to an existing one, one will need to type “related:” into the search bar followed by the URL of the site.
8. How would you confirm the exact form of a quote even if you were missing some of the words?
When some of the words are missing and one wants to confirm the exact quotation, the “*” symbol will be used in the places that contain missing words. For example, “to be, or * to be, that is the *” will be searched using the search bar and this will result in the exact quotation with the missing words in place of the asterisks.
9. How would search for pages containing two connected words?
In order to search for pages containing two connected words, the word “AND” will be used between both words.
10. How would you search for social media content containing a specific tag?
When searching for social media content containing a specific tag, the “#” symbol will be used followed by the name of the hashtag.
1 note
·
View note