Data Management and Digital Literacy
Data Management and Digital Literacy
MODULE 2
1.1 Data
Data is a raw and unorganized fact that is required to be processed to make it meaningful. It can be
considered as facts and statistics collected together for reference or analysis.
Structured data is organized and stored in a predefined format, typically within databases. It follows a
specific schema, making it easy to search, retrieve, and analyze. Examples include:
5
Customer information (Name, Age, Address)
b) Unstructured Data
Unstructured data lacks a specific format and does not fit neatly into traditional databases. It includes
various types of content that require advanced processing techniques like Natural Language
Processing (NLP) and Machine Learning (ML) to derive insights. Examples include:
Understand the difference between Structured and Unstructured Data and how they impact data
management, analysis, and decision-making.
c) Semi-Structured Data
Semi-structured data falls between structured and unstructured data. It has some organizational properties
but does not conform to a rigid structure. Examples include:
Log files
Sensor data
d) Big Data
Big data refers to massive volumes of data that are complex and challenging to process using traditional
methods. It is characterized by the 3Vs:
6
Open Data: Freely available data for public use (e.g., government reports, research datasets)
Closed Data: Restricted data with access controls (e.g., private business records, confidential
customer details)
1.2 Information
Information is defined as structured, organized, and processed data, presented within a context that makes
it relevant and useful to the person who needs it. Data are raw facts and figures regarding individuals,
places, or the other issue, that is expressed within the type of numbers, letters or symbols.
Information is the knowledge that is remodeled and classified into an intelligible type, which may be
utilized in the method of deciding. In short, once knowledge ends up being purposeful when conversing,
it’s referred to as info. It’s one thing that informs, in essence, it provides a solution to a specific question.
It may be obtained from numerous sources like newspapers, the internet, television, people, books, etc.
Nature Data are text and numerical values. Information is refined form of actual
7
[Link] DATA INFORMATION
data.
Bits and Bytes are the measuring unit Information is measured in meaningful
Measurement of data. units like time, quantity, etc.
As tabular data, graphs, and data trees Information can also be structured as
Structure can be easily structured. language, ideas, and thoughts.
Data does not have any specific Information carries a meaning that has
Purposefulness purpose been assigned by interpreting data.
Knowledge
It is low-level knowledge. It is the second level of knowledge.
Level
Decision Data does not directly help in decision Information directly helps in decision
Making making. making.
Data is a collection of facts, which itself Information puts those facts into
Meaning has no meaning. context.
8
[Link] DATA INFORMATION
dat
Student Grades: A list of numerical scores obtained by students on a test, like "85", "92", "78".
Stock Prices: Daily closing prices of a company's stock, such as "$50.25", "$48.90", "$52.10".
Information Example
Weather Report: Based on the temperature reading a weather report can be generated.
Grade Average: Based on the student grades, the average grade of class can be derived.
Market Analysis: The stock market showed a slight increase today derived from stock prices.
In each case, the raw data (temperature readings, student grades, stock prices) becomes meaningful
information after being processed, analyzed, and presented in a relevant context.
9
Companies use data analytics to understand market trends, customer behavior, and competitor strategies.
Insights from data allow businesses to develop targeted marketing campaigns and increase revenue.
1
0
2.0 INTERNET AND NETWORK SERVICES
To access/exchange a large amount of data such as software, audio clips, video clips, text files, other
documents, etc., we need network and internet services.
Internet or network applications are software programs that utilize a network/internet to carry out tasks.
They encompass many different tools and services that facilitate various business functions.
Modern employees use these tools every day. Whenever a staff member joins a video conference, sends
an email, or uses a web browser, they use internet and network applications.
You must use an Internet service to connect to the Internet. Data can be sent from Internet servers to your
machine via Internet service. Some of the commonly used internet services are:
Social media: Social media acts as a communication service by providing online platforms
for individuals and organizations to interact, share content, and build communities.
It facilitates instant, two-way communication across geographical boundaries for both personal and
professional use, enabling real-time discussions, relationship building, and direct engagement with
audiences.
Examples of these services include platforms like Whatsapp, Facebook, Twitter, and LinkedIn,
which are used for everything from personal updates to marketing campaigns and customer
service..
2.2 VoIP
It stands for Voice over Internet Protocol, which is a technology that allows one to make and receive
1
1
phone calls over the internet. VoIP (Voice over Internet Protocol) is a technique that helps us make voice
calls via the Internet rather than over a traditional (or analog) phone line.
2.4 E-Mail
Used to send electronic mail via the internet. It is a paperless method for sending text, images, documents,
videos, etc from one person to another via the internet.
It hosts newsgroups and message boards on certain topics, and it is mostly run by volunteers.
2.6 Telnet
Video conferencing systems allow two or more people who are generally in different locations to connect
live and visually. Live video conferencing services are necessary for simulating face-to-face talks over the
internet.
It allows numerous people to connect and collaborate face to face over large distances. Tools
available for this purpose are WhatsApp Video, Zoom, Google Meet, Teams, etc.
Surfing or browsing is the process of discovering and obtaining information from the Internet. When your
computer is linked to the Internet.
The exchange of data files across computer systems is referred to as file transfer.
1
2
Using the network or internet connection to transfer or shift a file from one computer to another is
known as file transfer. To share, transfer, or send a file or logical data item across several users
and/or machines, both locally and remotely, we use file transfer. To retrieve information from the
internet, there are various services available such as:
Gopher: A file retrieval application based on hierarchical, distributed menus that is simple
to use.
FTP (File Transfer Protocol): Used to share, transfer, or send a file or logical data item
across several users and/or machines, both locally and remotely.
Web services are web applications that uses defined messaging protocols and are made accessible for
usage by a client or other web-based programs through an application service provider's web server. Web
services allow information to be exchanged across web-based applications. Using Utility Computing, web
services can be provided.
The internet is a vast network of interconnected computers. Using this network, you can connect to the
world wide web (abbreviated as 'www' or 'web') is a collection of web pages.
A directory service is a set of software that keeps track of information about a company, customers, or
both.
Automatic Network Addressing assigns a unique IP address to every system in a network. A DHCP
Server is a network server that is used to assign IP addresses, gateways, and other network information to
client devices. It uses Dynamic Host Configuration Protocol as a common protocol to reply to broadcast
inquiries from clients.
1
3
Network management services aid in the prevention, analysis, diagnosis, and resolution of connection
problems.
ping: The ping command is a Command Prompt command that is used to see if a source can
communicate with a specific destination.
traceroute: To find the path between two connections, use the traceroute command.
Using facilities included in the operating system, you may set your computer clock via the Internet. Some
services are:
Network Time Protocol (NTP): It is a widely used internet time service that allows you
to accurately synchronize and adjust your computer clock.
The Simple Network Time Protocol (SNTP): It is a time-keeping protocol that is used
to synchronize network hardware. When a full implementation of NTP is not required,
then this simplified form of NTP is typically utilized.
It is a lively Online Discussion Forum that is easily accessible via Usenet. Each newsgroup contains
conversations on a certain topic, as indicated by the newsgroup name. Users can use newsreader software
to browse and follow the newsgroup as well as comment on the posts. A newsgroup is a debate about a
certain topic made up of notes posted to a central Internet site and distributed over Usenet, a global
network of news discussion groups. It uses Network News Transfer Protocol (NNTP).
2.14 E-commerce
Electronic commerce, also known as e-commerce or e-Commerce, is a business concept that allows
businesses and individuals to buy and sell goods through the internet. Example: Amazon, Flipkart, etc.
websites/apps.
A conferencing tool allows a user to collaborate with people on different networks in many ways.
1
4
Users can initiate a video or group call, join text chats, and share documents with teammates.
Messaging software is another example of how network applications enable easy communication.
Users can send instant messages to users on other networks at the click of a button. Some messaging
software also includes video call and file-sharing functionality.
Remote desktop solutions allow a user to connect directly to another user’s device, making them
valuable tools for IT departments and technical support.
A support team can “jump in” when a user encounters an issue. They can identify the problem and
help a user’s device operate as it should.
Online gaming systems help millions of gamers play online together. Users can connect from their
home networks to online servers, transmit messages to other players, and join group chats.
Web Browsers: Applications like the Google Play Internet Browser access the web by
using HTTP and HTTPS to retrieve web pages.
Email Clients: Programs for email, such as those using POP3 or IMAP to access and read emails
on mailboxes, and SMTP to send emails.
File Transfer: Applications like FTP are used to transfer files between computers.
Streaming Services: Apps that provide audio and video content like Netflix, Spotify, and
YouTube rely on internet access to stream content.
1
5
3.0 WEB BROWSER
A web browser is a software program that enables a user to access information on the Internet via the
World Wide Web.
Hence, web browsers act as gateways, allowing people to interact with businesses and others through
the World Wide Web. A web browser gives you access to all platforms available on the internet,
enabling you to view texts, images, and videos worldwide.
By entering a URL into the search engine, you guide your web browser towards a specific web
server. The browser will access that server, fetch the requested information, and display it as a web
page.
Hence, the main functions of a web browser are to fetch and display web pages and provide an
interface for user interaction. It allows people to access information online in a user-friendly
experience.
1
6
3.1.1 User Interface (UI): You interact with it directly. It includes the address bar, where you enter
website addresses, the back and forward buttons for navigation, and the tabs that allow you to open
multiple websites simultaneously.
3.1.2 Rendering Engine: As discussed, the architect is responsible for building the visual representation
of the webpage.
3.1.3 Networking Component: It fetches website files (code, images, videos) from web servers
worldwide, ensuring all the necessary pieces are delivered to the rendering engine to build the web
page.
3.1.4 JavaScript Engine: It interprets and executes JavaScript code, allowing webpages to respond to
user actions and create dynamic experiences.
3.1.5 Security Components: They handle tasks like encrypting data transmissions (HTTPS) and
protecting you from malicious websites.
Some popular web browsers suited for the desktop include Google Chrome, Mozilla Firefox, Microsoft
Edge, and Safari. While Chrome is lauded for its popular Google services like Gmail and Docs, Firefox
provides exceptional security and add-ons. Meanwhile, Edge is fast, and Safari provides a clean browsing
experience.
1
7
Safari for iOS is Apple’s built-in mobile browser integrated with Apple services. It is optimized for
performance on iPhones and iPads. As for its Android counterpart, Chrome for Android works on
Android devices. Like its web browser, its mobile version is synced with Google’s features.
These mobile browsers often come pre-installed on mobile devices, but alternatives are available based on
users' preferences.
These refer to miniature versions of web browsers embedded into other applications. They enable users to
access the web browser without opening a separate window. Hence, they have limited features compared
to a complete web browser.
Email Clients: Many email clients have built-in web browsers for displaying web content within
emails, such as interactive buttons or online surveys.
Social Media Apps: Social media platforms often embed web browsers so users can view shared
links or articles without leaving the app.
Gaming Consoles: Modern gaming consoles frequently have built-in web browsers,
which allow users to access online features game guides, and connect with other
players.
3.3.2 Bookmarks
1
8
It enables the user to save websites for easy access later, revisiting them in the future without
remembering the complete URL.
It handles all the downloads initiated through the browser, keeping track of their progress. It
even allows the user to pause or resume the downloads as convenient.
3.3.9 Synchronization
It allows the user to synchronize their browsing data across multiple devices. It ensures an enhanced user
experience if the browser is accessed on a desktop, mobile, or any other device.
1
9
It lets the user browse the internet without saving any browsing history or cookies. Hence, it offers further
privacy for certain browsing sessions. This is a list of some of the most common features of modern web
browsers.
As web browsers develop, new features and advanced functionalities are expected to become part of them.
3.4.3 Sandboxing
It isolates websites from a user’s operating system and other programs. If a website tries to run malicious
code, it remains within the sandbox environment, protecting the user’s device and data.
While these are some important features used to maintain the security of web browsers, the security
patches are constantly updated to address gaps and fix bugs. Hence, it is crucial to keep the browsers
updated.
Plus, modern browsers allow users to manage their privacy settings. Users can block third-party cookies,
manage website permissions, and clear browsing data and cache.
Thus, users can minimize online risks and protect valuable information by understanding how web
browsers approach security and privacy and practicing safe browsing habits.
2
0
3.5.1 Browsing Processes
The process of browsing the web follows a client-server model:
1. Request:
When you type a URL into the address bar or click a hyperlink, the browser sends a request for the page
to a remote server.
2. Translate:
The browser first contacts a Domain Name System (DNS) server to translate the website's address (like
[Link]) into an IP address (like [Link]).
3. Retrieve:
The browser sends the request to the correct web server, which then sends the necessary webpage data
back to your device.
Render: The browser's rendering engine translates the data into the visual page you see and interact with.
Step 1: The process begins with Domain Name System (DNS) resolution, where the browser translates
the domain name into an IP address to locate the server where the web page is stored.
2
1
Step 2: The browser then sends an HTTP request to the server, specifying the path and parameters of the
requested resource.
Step 3: Once the server receives the request, it sends an HTTP response to the browser containing the
requested resource in HTML, CSS, and JavaScript code.
Step 4: The browser’s rendering engine interprets and renders the code to display the web page on the
user’s device.
Step 5: The CSS stylesheets are applied to format the web page’s content, including fonts, colors, and
layout.
Step 6: The browser may also execute JavaScript code on the web page to add interactivity and dynamic
behavior.
Step 7: As new content is loaded or changes are made to the web page, the browser updates the display
accordingly.
2
2
4.0 Copy Right & Data Protection
4.1 Copyright
Copyright refers to the legal right a data creator has over the control on how their work/data/idea is used
and reproduced. For data/work to be protected by copyright law it needs to be original and tangible.
Protection: Gives the creator the exclusive right to control how their work is used and
reproduced.
a) Ownership: The creator of a document typically holds the copyright unless it is transferred or created
under a work-for-hire agreement. This means that the author has exclusive rights to their work, which
can be transferred or licensed to others.5
b) Rights: Copyright grants the owner exclusive rights to reproduce, distribute, and display the work.
These rights are intended to protect the creator's investment in their work and to encourage the
creation of new works.5
c) Fair Use: Limited use of copyrighted material may be allowed without permission under the fair use
doctrine, depending on factors like purpose and amount used. This allows for certain uses such as
criticism, comment, news reporting, teaching, scholarship, or research.6
d) Duration: Copyright protection lasts for the life of the author plus a certain number of years (e.g., 70
years in many jurisdictions), ensuring that the creator and their heirs can benefit from the work for a
significant period.
2
3
4.2 Data Protection
Data protection is the process of safeguarding important leakage, data from corruption,abuse, compromise
or loss.
It applies to Personal data, which is any information that can identify an individual and is governed by
data protection laws, such as the EU's General Data Protection Regulation (GDPR).
a) Consent: Obtain explicit consent from individuals before collecting or processing their personal data.
This consent must be freely given, specific, informed, and unambiguous, and individuals should be
able to withdraw it easily at any time.
b) Data Minimization: Only collect data that is necessary for the intended purpose, ensuring that
personal data is adequate, relevant, and limited to what is necessary.
c) Purpose Limitation: Use personal data only for the specific purpose for which it was collected and
ensure that it is not processed in a manner incompatible with those purposes.
d) Security: Implement appropriate technical and organizational measures to protect personal data from
unauthorized access or breaches. This includes encrypting data, using secure storage solutions, and
ensuring that only authorized personnel have access to sensitive information.
e) Transparency: Inform individuals about how their data will be used, stored, and shared, providing
clear privacy notices and ensuring that data subjects are aware of their rights under the legislation.
a) Patents: Protect inventions and processes for a limited time, typically 20 years, requiring public
2
4
disclosure of the invention. This encourages innovation by allowing inventors to benefit from their
inventions while eventually contributing to public knowledge.
b) Trademarks: Protect symbols, names, and slogans used to identify goods or services, requiring
registration for legal protection. This helps consumers identify the source of goods and services
and protects the brand identity of businesses.
c) Trade Secrets: Protect confidential business information that provides a competitive edge, with no
formal registration required. This includes formulas, practices, processes, designs, instruments, or
patterns that are not generally known or reasonably ascertainable.
Rights Data subject rights Exclusive rights to use Exclusive rights to inventions,
Granted brands, etc.
2
5
5.0 Digital Data backup
Data backup is the practice of copying data from a primary to a secondary storage/location, to protect it in
case of a data loss through disaster, accident or malicious action.
Not only does it make sense in case your laptop is stolen, or your hard disk fails, but it also means that
you have more options for recovery should your computing device become corrupted or infected with a
virus.
Pros:
Extremely portable
Very cheap
Cons:
Pros:
Relatively cheap
2
6
Plenty of storage space for larger files
Cons:
Potentially open to problems which lost files in the first place (a power surge or malware)
Pros:
Cons:
Pros:
2
7
Cons:
Can be expensive
Pros:
Device agnostic
Cons:
Pros:
2
8
Cons:
Awkward to manage
2
9
6.0 Immerging Issues and Trends on the Internet
Emerging issues is a term that is used to describe an issue that has not been influential or important in the
A trend is a pattern of gradual change in an area of growing interest. For instance, information
technology
The Information Age is also known as the Computer Age, Digital Age or New Media Age. This is a
period in human history that is characterized by the shift from traditional industry to an economy that is
based on information computerization. The Information Age is associated with digital revolution that has
created a knowledge-based society fueled by a high-tech global economy.
Machines with the ability to learn and perform tasks that typically require human intelligence.
6.1.2 Internet of Things (IoT): A network of everyday devices embedded with sensors that collect and
exchange data.
6.1.3 Blockchain: A secure digital ledger system for recording transactions anonymously.
6.1.4 Virtual Reality (VR) and Augmented Reality (AR): Technologies that create immersive
experiences that can be either entirely virtual or blend the virtual with the real world.
6.1.5 Robotics: Machines designed to perform tasks autonomously or with human assistance.
6.1.6 Biotechnology: The use of living organisms or their byproducts to develop new products and
technologies.
6.1.7 Nanotechnology: The manipulation of matter at the atomic and molecular level.
3
0
6.2 Emerging Technology Opportunities/Advantages
Emerging technologies offer a wide range of exciting opportunities across many sectors. Here are some of
the key areas where they’re making a big impact:
3
1
6.2.7 Greater accessibility
Assistive technologies like prosthetics and speech recognition software can improve the lives of people
with disabilities. Emerging technologies also have the potential to bridge the digital divide and provide
greater access to information and communication for everyone.
3
2
culture, leaving little room for rest and reflection.
3
3
6.3.11 Vulnerability of critical infrastructure:
Technologies like the IoT can introduce new attack vectors for critical infrastructure like power grids and
communication networks. These interconnected systems, once compromised, could cause widespread
disruption and even physical damage.
3
4
7.0 ONLINE COLLABORATION AND COMMUNICATION
Communication and collaboration is one of the key aspects of digital literacy. It refers to the ability to
express yourself, communicate information and exchange ideas in the digital environment in an effective
and responsible manner.
As we interact with others online, it is important to note that the same social etiquette rules should apply
online as they do offline. For example, to be courteous and friendly to others, to respect individuals’
differences and be considerate. In short, we should treat others in the same way we want to be treated.
Sender (Source): The person who initiates the message and encodes their thoughts or ideas into a
form that can be understood, such as words, symbols, or gestures.
Encoding: The process of converting the message into a specific format (e.g., spoken language,
written text, body language) that can be transmitted.
Channel (Medium): The means or method used to transmit the message from the sender to the
receiver (e.g., face-to-face conversation, email, telephone, radio waves).
Receiver (Decoder): The person or group for whom the message is intended. The receiver must be
able to get the message and interpret its meaning.
Decoding: The process by which the receiver interprets the encoded message to understand the
sender's intended meaning, drawing on their own experiences, knowledge, and cultural
background.
Feedback: The response or reaction from the receiver to the sender's message. Feedback is crucial
for the sender to confirm the message was understood correctly and allows for adjustments in
subsequent communication.
3
5
Noise (Interference): Any physical (e.g., loud sounds), psychological (e.g., biases, stress), or
semantic (e.g., jargon) factor that interferes with the message and distorts the intended meaning.
Verbal Communication: The use of spoken or written words to exchange information. It includes
language, tone, pitch, and speed.
Non-Verbal Communication: The exchange of information through wordless cues such as body
language, facial expressions, gestures, eye contact, posture, and touch. This type often reinforces
verbal messages and accounts for a significant portion of human interaction.
Written Communication: Messages conveyed through text, such as emails, letters, reports, and
instant messages. This allows for a permanent record of the information.
Visual Communication: The use of images, diagrams, charts, signs, and other visual aids to
convey information effectively.
1. Clear (Clarity)
Clarity is the foundation of effective email communication to make your recipient understand what you mean.
Use simple language: Instead of complicated words, use those that everyone will understand.
Structure your message: short paragraphs, bullet points, and numbering are your friends.
Highlight the most important information: Bold text is a great way to emphasize key points.
Example: Instead of writing: ‘Please provide the technical documentation that will be indispensable for the
project’s completion.’ Write: Please send the technical documents needed to complete the project.’
[Link]
3
6
No one likes to read long emails. Conciseness is the key to success. How to achieve it?
Focus on the main goal: Remove anything that is not directly related to the topic.
3. Concrete (Concreteness)
Concreteness is precise information without room for guesswork. How to achieve it?
Provide specific data: Dates, numbers, times – all of these are important.
Example: Instead of writing: ‘Please send the documents quickly.’ Write: Please send the documents by Friday,
July 20, by 3:00 PM.’
4. Correctness
Correctness includes both grammar and facts. Errors can cause confusion. What to do?
Verify facts: Ensure that the information provided is true and up-to-date.
Example: Instead of writing: “I am sending the file for analysis, the attachment contains data from the year 2023.”
Write: “I am sending the file for analysis. The attachment contains data from the year 2023.”
5. Coherent (Coherence)
Use logical connectors: They help in smooth transitions between parts of the message.
Avoid unnecessary information: Each paragraph should relate to the main topic.
Example: Instead of writing: “Please deliver the report. Last week, a meeting took place. Could you also check the
sales data?” Write: “Please provide the report from the last meeting and check the sales data from last week.”
6. Complete (Completeness)
Completeness means having all necessary information in one place. How to achieve this?
3
7
Provide all details: The recipient should not need to ask for additional information.
Example: Instead of writing: “Please send the report.” Write: “Please send the sales data report for June, in PDF
format, by the end of the day.”
7. Courteous
Avoid a negative tone: Even if you need to convey negative information, do it constructively.
It describes the proper manners for communicating on the internet, including various means such as e-
mail, social media, discussion forums, video conferencing and other online platforms.
7.1.2 Adhere to the same standards of behavior online as you would in real life.
In real life, most people are fairly law-abiding, either by disposition or because we're afraid of getting caught. In
cyberspace, the chances of getting caught sometimes seem slim. And perhaps because people sometimes forget that
there's a human being on the other side of the computer, some people think that a lower standard of ethics or
personal behavior is acceptable in cyberspace.
The confusion may be understandable, but these people are mistaken. Standards of behavior may be different in
3
8
some areas of cyberspace, but they are not lower than in real life.
3
9
7.1.9 Don’t abuse your power
If you are the administrator of a website, online forum or any online platforms, you will have some privileges over
the others. It is important that you exercise the rights with responsibilities.
Communication concepts refer to the fundamental principles, elements, and theories that describe how
information, thoughts, and feelings are exchanged between individuals or groups.
An online community is designed for people to interact and communicate with each other. You can use it
for a variety of things such as sharing knowledge, finding solutions to common problems, finding
solutions to specific issues, engaging in discussions, forming teams, collaborating on projects, sharing
work, achieving common goals - and the list goes on.
Collaborating on projects
Networking
4
0
Gaining customer feedback and insights
Interpersonal Interaction: This is the core of any community. Online, interactions occur through
text-based communication (posts, comments, DMs), voice calls, and video conferencing.
Knowledge Sharing and Collaboration: A primary use of many online communities, where
members exchange information, solve problems collaboratively, and contribute to a collective
knowledge base.
Relationship Development: Theories like Social Information Processing (SIP) explain that while
online relationships may lack nonverbal cues and take longer to form, they can become as strong
as offline relationships through extended interaction.
Community Identity and Culture: Online communities develop their own unique language,
insider jokes, and norms (netiquette). Communication is the process by which this shared culture is
produced and reproduced.
Information Flow: Communication can be formal or informal, and its flow can be vertical (e.g.,
admin to member), horizontal (member to member), or diagonal across different levels.
Moderation and Guidelines: Active moderation and clear guidelines are essential to ensure
respectful and constructive discourse and maintain a positive environment.
Better Engagement
4
1
Online communities are an effective way for brands, businesses and organisations to connect with their
customers, prospects, audiences and many other different types of stakeholders - including employees,
partners, advisors, volunteers etc
Increased trust
People are more likely to trust an organisation, business, brand, product, or service that has a more open relationship
and is happy to engage with its customers, prospects, audiences and other types of stakeholders.
Virtual community can also be a essential component of a feeling of belonging to those working remotely and for
teams spread out across a country, region or the world.
Enhanced innovation
Brands that use online communities can foster an environment for creativity and innovation among employees,
customers, advisors, investors, partners and other stakeholders.
Ownership of data
Unlike social media platforms, communities can provide a wealth of first-party data, which can be used to enhance
marketing strategies.
SEO is is the process of improving the quality and quantity of website traffic to a website or a web page from search
engines. This in turn impacts the visibility of your website, brand, business or organisation on searches in Google
and other search engines.
4
2
Direct access to customers
In online communities, conversations are contained within a single location, eliminating the noise and ads
customers experience on social media platforms, while providing them with direct access to your brand.
Social Media Groups Groups within large Multimedia sharing, Facebook Groups
platforms centered instant messaging, (e.g., local community
on shared interests informal groups), LinkedIn
or goals. communication, viral Groups (professional
content dynamics. networking).
4
3
offer emotional tone/text), emotional
support and advice. awareness.
4
4
Electronic Mail Concepts
Electronic mail, commonly known as email, is a method of exchanging messages over the internet
It is one of most widely used services of Internet. This service allows an Internet user to send a message in
formatted manner (mail) to the other Internet user in any part of world. Message in mail not only contain text, but it
also contains images, audio and videos data.
The person who is sending mail is called Sender and person who receives mail is called Recipient. It is just like
postal mail service.
The UA is normally a program which is used to send and receive mail. Sometimes, it is called mail reader.
It accepts variety of commands for composing, receiving and replying to messages as well as for
manipulation of the mailboxes.
MTA is actually responsible for transfer of mail from one system to another. To send mail, a system must
have client MTA and system MTA. It transfers mail to mailboxes of recipients if they are connected in the
same machine. It delivers mail to peer MTA if destination mailbox is in another machine. The delivery
from one MTA to another MTA is done by Simple Mail Transfer Protocol.
4
5
3. Mailbox:
It is a file on local hard drive to collect mails. Delivered mails are present in this file. The user can read it
delete it according to his/her requirement. To use e-mail system each user must have a mailbox . Access to
mailbox is only to owner of mailbox.
4. Spool file/Outbox
This file contains mails that are to be sent. User agent appends outgoing mails in this file using SMTP.
MTA extracts pending mail from spool file for their delivery. E-mail allows one name, an alias, to represent
several different e-mail addresses. It is known as mailing list, Whenever user have to sent a message,
system checks recipient's name against alias database. If mailing list is present for defined alias, separate
messages, one for each entry in the list, must be prepared and handed to MTA. If for defined alias, there is
no such mailing list is present, name itself becomes naming address and a single message is delivered to
mail transfer entity.
5. Email Address
An email address: This is a unique identifier for each user, typically in the format of name@[Link].
6. Email Client
This is a software program used to send, receive and manage emails, such as Gmail, Outlook, or Apple
Mail.
This is a computer system responsible for storing and forwarding emails to their intended recipients.
To use email, you must first have an email account. Once you're set up, the main functions
include composing and sending new messages, receiving and reading mail in your inbox, and managing your
conversations.
Getting Started
1. Create an account: Sign up with an email service provider like Gmail, Outlook, or Yahoo to get a unique
email address (e.g., yourname@[Link]).
2. Access your email: Log in to your account through a web browser or an email app on your computer or
4
6
smartphone.
3. Understand your inbox: Your inbox is where incoming messages are displayed. New emails are usually
indicated by a number next to the "Inbox" folder.
Sending an Email
1. Click "Compose": Look for a button labeled "Compose," "New Email," or a pencil icon, usually in the
top-left corner.
2. Add recipients: Enter the recipient's email address(es) in the "To" field.
Use "Cc" (carbon copy) to send a copy to someone else while all recipients see each other's
addresses.
Use "Bcc" (blind carbon copy) to send a copy to someone secretly; other recipients won't see their
address.
3. Add a subject: Type a brief, clear summary of the email's content in the "Subject" line. This helps the
recipient understand the email's purpose quickly.
4. Write your message: In the main body text area, type your message. Use appropriate formatting (bold,
italics, bullet points) if needed.
5. Attach files (optional): To send documents, photos, or other files, click the paperclip icon, select the
file(s) from your computer, and click "Open" or "Choose".
6. Click "Send": Once you are happy with your message, click the "Send" button.
Read emails: Click on the email's subject line in your inbox to open and read the full message.
Reply: To respond to the sender, click the "Reply" button (often a left-facing arrow). The sender's address
is automatically entered.
Reply All: To respond to everyone included in the "To" and "Cc" fields, click "Reply All".
Forward: To send the email to a new recipient, click "Forward" and enter their email address.
Organize: Use folders and labels to sort and manage your messages, or set up automatic rules to filter
4
7
incoming emails.
Composition - The composition refer to process that creates messages and answers. For composition any
kind of text editor can be used.
Transfer - Transfer means sending procedure of mail i.e. from the sender to recipient.
Reporting - Reporting refers to confirmation for delivery of mail. It help user to check whether their mail is
delivered, lost or rejected.
Disposition - This step concern with recipient that what will recipient do after receiving mail i.e save mail,
delete before reading or delete after reading.
Advantages of email:
3. Ability to send and receive attachments such as documents, images, and videos.
5. Available 24/7.
Disadvantages of email:
4. Potential for miscommunication due to lack of tone and body language in written messages.
4
8
6. It is important to use email responsibly and effectively, for example, by keeping the subject line clear and
concise, using proper etiquette, and protecting against security threats.
4
9
DO follow these rules and guidelines for proper email netiquette:
• Writing in capital letters that MAKE IT SEEM LIKE YOU ARE SHOUTING
• Sending or forwarding personal or private information without the original sender's consent
• Using emoticons or abbreviations i.e. :) or "lol" unless writing informally to friends or family
5
0
Digital content has the same protections under the Copyright Act as non-digital, traditional or analog
works. Digital content consist of electronic versions of books, graphics, video, audio, music, web sites and
online databases, etc. Using digital content requires permission that is beyond the scope of fair use or
the TEACH Act.
Electronic Books
Digital Video
Digital Audio
Graphics
Web Sites
In your online classes, you may be asked to participate in online discussions. These discussions take the place of a
normal discussion that you might have in class – where you can ask questions, share ideas, and collaboratively get a
better understanding of a topic with your classmates. Discussion boards and discussion posts have their own rules
of online etiquette.
This list of rules is adapted from “Netiquette: Ground Rules for Online Discussions” by Peter Connor, used under
CC BY-NC-SA 4.0 International License.
Report issues: If you are having challenges participating in a discussion, talk to your instructor right away.
Participate: Discussion boards are a shared learning environment where everyone needs to contribute. If
you can, try to post earlier in the week to give your classmates time to read and respond to you. You should
also take the time to contribute to the conversation and thoughtfully respond to your classmates’ posts.
5
1
Help others: Discussion boards are a space where you can share and learn from each other.
Respect diversity: Remember that your classmates may have different life experiences and perspectives
from your own. Take the time to understand your classmates’ thoughts and perspectives.
Take your time: Read a post carefully before replying. Your posts and replies should be thoughtful and
add something to the discussion.
Limit your use of emojis and texting slang: Discussion boards may feel like a casual conversation, but
your posts should still be treated as academic writing.
Don’t YELL: Avoid using all caps. Using bold upper-case letters can feel like you’re yelling at somebody.
Be polite: Always use a professional and polite tone in your posts and replies. Use proper writing style:
Proofread your posts. Make sure you’re using correct spelling and proper sentence structure.
Cite your sources: If your discussion post includes quotes or ideas from others, always remember to cite
your sources.
Pause before posting: Review your post before hitting send. Double-check and make sure that you are
clearly expressing exactly what you want to say.
Bow Valley College uses Microsoft Teams for online meetings and classes. In a Teams meeting, you can see and
hear your instructor, and view any PowerPoints or learning materials they are sharing with the class. You can also
use your microphone and web camera to interact in class – you can ask questions and communicate with your
classmates, just like in a regular, face-to-face class.
Online meetings and chats may feel more casual, but you should behave and act the same as you would in an in-
person class.
Be ready to learn
5
2
Join your class meeting at the scheduled time
If you're attending online class in a public space (coffee shop, library) make sure that your headphones are
plugged in and working.
Don’t be afraid to ask questions. Use the “Raise Hand” feature or the chat to ask a question during class.
Eliminate distractions
Multi-tasking is a myth. Put your phone away and close other browser windows while you are attending
online class.
Follow your instructor’s guidance on whether you should have your camera on/off during class
Code of conduct
Remember that the Learner Code of Conduct is in effect for both online and in-person classes
Be respectful and polite in all class communications, including meetings and chat
Teams chat may feel like text messaging – but it is important to remember that chat is still a form of
College communication.
Remember that people have other responsibilities. They may not be able to respond to your
message right away.
Ask your instructor how they prefer to communicate. Some instructors welcome Teams messages.
Other instructors may only want to connect through email.
Do not share or forward any information that is shared during meetings or chats.
Class recordings are for your own personal study and review
5
3
Violations of Netiquette
Just like the real world, cyberspace contains people who commit flagrant acts of misbehavior. Fortunately, these
people are in the minority. Unfortunately, we have to watch out for them anyway. Here are a few egregious
violations of Netiquette to be on the alert for as you travel through cyberspace.
Cyberspace predators
Perhaps the worst Netiquette violators are people who use their cyberspace connections to gain the trust of others
and then take advantage of them in real life. Some of the most unpleasant stories involve pedophiles who get to
know kids online, engage in sexual discussions with them, and in some cases, arrange to meet them live.
Children aren't the only ones who are vulnerable to this kind of abuse. The story of the "Net Lothario" (page 117) is
an example of how adults can also be fooled by someone who lacks morals and writes persuasively.
This doesn't mean that you can't trust anyone you meet online. It does mean that you need to exercise at least as
much caution with your cyberspace acquaintances as you would with a friendly person you met at the grocery
store. In fact, because it's so easy for predators to misrepresent themselves online, a little
more caution is in order.
5
4
Children, in particular, should be warned never to give out personal information -- their addresses, their phone
numbers, their passwords, or the times they're home alone -- online. And unfortunately, every cybernaut needs to
remember that fellow net travelers may not be who or what they claim to be.
Alternate personae
Many people who create false identities online aren't predators -- they're just fooling around. In many areas of
cyberspace -- particularly MUDs (multi-user dungeons) and their close cousins, MOOs (object-oriented MUDs) --
it's normal and expected behavior. MUDs and MOOs exist specifically for the purpose of exploring fantasy worlds
and fantasy identities. Men often represent themselves as women. (For some reason, it's less common for women to
appear as men.) All that is just fine.
Other cases are closer to the borderline of acceptable behavior. For instance, male journalists have created feminine
handles to investigate sexual harassment on the net. While that isn't particularly nice, neither is sexual harassment.
Netiquette permits it as long as the journalist refrains from getting deeply involved with anyone under false
pretenses. The story of "Joan" (page 118) is an example of a man whose "experiment" in cyberspace cross-dressing
got out of control.
Long-term misrepresentation of oneself in romance discussion groups or chat areas, where the purpose of the
interaction is to form a serious relationship, is definitely not acceptable
Electronic forgery
Every piece of email and every posting to a discussion group carries an electronic signature. And, just as it's
possible to forge a handwritten signature, it is sometimes possible to send email from someone else's ID. A recent
example occurred when five college freshmen decided it
would be funny to send a false letter of resignation for a new university official. They also circulated demands for
tuition to other students and letters implying that the official was gay. Administrators had begun acting on the
resignation before they found out it was a fake.
In another bizarre incident, readers of [Link]-adams, the USENET fan club for Hitchhiker's Guide to the
Galaxy author Douglas Adams, started circulating rumors that genuine postings from Adams -- who occasionally
reads the newsgroup -- were fake. Then an actual fake Douglas Adams started sending abusive notes to readers. The
real Douglas Adams had a terrible time straightening out the mess.
Forging email is just as wrong as forging a paper letter. Forged email is also fairly easy to trace. Bad idea.
Chain letters
5
5
Have you ever gotten one of those letters promising you millions of dollars if you just send a few dollars to a list of
people, but threatening you with hideous death within a year if you don't? Those things circulate in cyberspace as
well. The best-known is a long, rambling letter signed by "Dave Rhodes." It appears periodically in random
discussion groups and mailboxes.
Chain letters are forbidden on BITNET and on most commercial network services. If you receive a copy of the
"Dave Rhodes" letter, or any other chain letter, don't follow the instructions! Forward a copy to your system
administrator or postmaster and request that action be taken against the sender. You can also reply to the sender
yourself and tell him or her that sending chain letters is not acceptable network behavior.
Electronic hoaxes
Some people don't stop with forging email from real people. Some people construct entire fictional companies and
publicize them on the net.
A recent example that received a lot of publicity was the Sexonix hoax. A fellow named Joey Skaggs announced to
the media that he had set up
the world's first virtual reality sex provider, called "Sexonix." He actually rented a booth at a Canadian trade show
to show off his wares. Then he claimed that the Canadian government had seized all of his hardware and software
on his way to the show. He posted a press release to The WELL claiming that the seizure had destroyed his
business. The trouble was, he had no hardware, no software, and no business except that of fooling people.
In this case, the worst thing that happened was probably that the people who were fooled felt -- well, foolish. But
it's not hard to imagine stories that could have far more dangerous consequences. Hoaxes are bad Netiquette.
Rumors
A close cousin to the hoax is the rumor. Two rumors that weren't invented maliciously have gained special
prominence on the net. The first is the Craig Shergold story. Here's the true part: A number of years ago, Craig
Shergold, a young English boy, was diagnosed with an inoperable brain tumor. He decided that before he died, he
wanted to make it into the Guinness Book of World Records for receiving the most get-well cards ever. He
succeeded. Better yet, a wealthy American had the idea that maybe Craig's cancer wasn't inoperable. He paid for
Craig to see specialists in America. It turned out that the type of cancer had been misdiagnosed, the tumor was
removed, and when last heard from, Craig was fine.
Well, almost fine. Somewhere along the way, Craig's request for get-well cards mutated into a request for business
cards. And the news that Craig was fine didn't spread as fast as the requests. Craig's mailbox has been piled full of
unwanted business cards for three or four years now. It's driving his mother crazy! If you see this story, please tell
5
6
the well-intentioned person who passed it on that the cards are no longer wanted and Craig is well.
The other rumor that resurfaces periodically is the modem tax story. Several years ago, the U.S. Congress did
discuss imposing a special "telecommunications tax" on modems. A call to action was posted and
the world's first virtual reality sex provider, called "Sexonix." He actually rented a booth at a Canadian trade show
to show off his wares. Then he claimed that the Canadian government had seized all of his hardware and software
on his way to the show. He posted a press release to The WELL claiming that the seizure had destroyed his
business. The trouble was, he had no hardware, no software, and no business except that of fooling people.
In this case, the worst thing that happened was probably that the people who were fooled felt -- well, foolish. But
it's not hard to imagine stories that could have far more dangerous consequences. Hoaxes are bad Netiquette.
Rumors
A close cousin to the hoax is the rumor. Two rumors that weren't invented maliciously have gained special
prominence on the net. The first is the Craig Shergold story. Here's the true part: A number of years ago, Craig
Shergold, a young English boy, was diagnosed with an inoperable brain tumor. He decided that before he died, he
wanted to make it into the Guinness Book of World Records for receiving the most get-well cards ever. He
succeeded. Better yet, a wealthy American had the idea that maybe Craig's cancer wasn't inoperable. He paid for
Craig to see specialists in America. It turned out that the type of cancer had been misdiagnosed, the tumor was
removed, and when last heard from, Craig was fine.
Well, almost fine. Somewhere along the way, Craig's request for get-well cards mutated into a request for business
cards. And the news that Craig was fine didn't spread as fast as the requests. Craig's mailbox has been piled full of
unwanted business cards for three or four years now. It's driving his mother crazy! If you see this story, please tell
the well-intentioned person who passed it on that the cards are no longer wanted and Craig is well.
The other rumor that resurfaces periodically is the modem tax story. Several years ago, the U.S. Congress did
discuss imposing a special "telecommunications tax" on modems. A call to action was posted and
Morris actually intended this stunt as a harmless experiment; he had no intention of shutting down the Internet. He
saw that there was a "back door" in the Internet email system and wanted to see how far he could go with it. He
found out -- and paid for it with a federal conviction for "computer fraud."
Snooping
5
7
Various types of networks can make it more or less easy to get into another person's personal files. On Macintosh
networks, it's possible to publish your entire hard disk as a server, making all your files accessible to anyone on the
network.
Even if you should happen by a machine that -- essentially -- has its front door wide open, don't snoop. You're not
in the habit of walking up to people's houses and trying their front doors, are you? (I hope not!)
If, because of your position or your superior knowledge, you have the power to snoop in other people's mail or files,
it's even more important that you don't do it. It can be very tempting. But their mail is really none of your business.
Netiquette forbids the abuse of power (see "Rule 9: Don't abuse your power" on page 44).
Keep in mind that Netiquette alone does not protect the privacy of your email. See "Email Privacy -- A Grand
Illusion?" on page 125.
Mailbombing
Sometimes, annoyed discussion group readers will try to take vengeance on a particularly obnoxious flamer by
flooding his mailbox. This is called mailbombing, and it's a bad idea. Yes, it annoys the miscreant. But it also eats
up hard disk space and wastes system administrator time for other users of that person's server. Don't do it.
5
8