top of page

ASSIGNMENT 2-1

Ergonomics

Summary: Ergonomics can roughly be defined as the study of people in their working environment. Ergonomic solutions can make students and everyone else more comfortable and efficient. It is important because when your stressed by an awkward position, extreme temperature, or just uncomfortable, you musculoskeletal system is affected. The goal is to eliminate discomfort and risk of injury due to work.

Question: How can you use ergonomics in the classroom?

Privacy

Summary: Privacy is the ability to disclose and hide any information you choose on the internet. Things such as your address and other personal information remain confidential unless purposefully put onto the internet. This allows to express yourself selectively. The whole domain of privacy overlaps with security. People may volunteer personal details. For example in business you may put your number on your business card, or add specific information for advertising; normally to receive some form of benefit. The concept of privacy is a modern concept, yet many recognize the ability that someone has to withhold information about ones self.

Question: If you were to get hacked or your privacy was invaded what actions might you take not only to prevent this, but to make sure whoever did it is punished.

FERPA

Summary: FERPA, stands for Family Educational Rights and Privacy Act. It's used to keep parents and students information safe. It protects all identifiable documents secret, and meant to have consent before transferring any documents to another school or for the documents to be shared. Parent do have the authority to look over these records to confirm they are correct. If parents disagree with the school documents, under FERPA they can take it to court. When the student becomes 18, they now are in control of their own documents, and now use FERPA.

Question: If your parents don't claim you as independent on their taxes do they still have access to your school records after you turn 18?

Acceptable Use Agreement (AUP)

Summary: The AUP is a set of rules that are created and enforced by the owner of a network. These rules restrict the website or network in ways which it can be used. They can set guidelines as to how and when it should be used. When creating social media guidelines be sure to explain whos aloud to speak for your company on social media. For example a base level employee shouldn't respond to hate comments or complaints. For there should be another team specifically for that job. You should also include guidelines about both business and personal conduct on social media. for example if an employee receives hate comments on their social media train them on what they need to say. If they say the wrong thing a little confusion can turn into a huge story. Lastly, protect your employees and sensitive business information. 

Question: If you don't protect your employee can they take action against you if something happens to them through social media?

Copy Right Laws

Summary: Copy right laws give people the exclusive right to sell and manage their material. So when artist and creators post their work online others can't copy it and it makes sure that the rightful owner is credited for her work. If marked all rights reserve, the user can message or try and contact the owner or creator to receive permission to be able to use the image. The user can now use the image in exchange for a license fee. Now the owner gets paid for her work, and the user can now use it in their own work. few things to always consider, when their is a copyright symbol, or no symbol at all, ask the creator for permission to use the image. If it has a creative commons sign then you are free to use and share as many times as you want to the public.

Question: When you search us images in your task bar on the web, are the images that pop up creative commons?

Computer Security

Summary: It is the protection of computer systems and networks from information disclosure, theft, getting hacked, damage to server, etc... It keeps all your information protected, it keeps all files and documents private, and it doesn't make anything public information with your consent. It also important for your computers health, so that it continues to work efficiently. 

Question: If you were to get hacked and your private information stolen what actions can you take to get that information back?

Cloud Storage

Summary: Cloud storage allows you to save data and files in an off-site location which you can then access through any public internet or private network connection. It sends files manually or in an automated fashion over the internet to the data server which then forwards it to multiple servers. This is good if your not always working at the same computer all the time, but that you can have access to your files 24-7.

Question: How much storage can the cloud actually hold?

Ethics

Summary: It is the basic laws and rules that everyone follows while in the internet. It governs a persons behavior and activity when on the web. You basically respect the rights and property of others on the internet. 

Question: If you are getting harassed via the internet, is that considered going against the ethics of the internet?

bottom of page