Question

Question 5 120 pts 1)How does e-learning affect society? 2) Cite 1 important rule of Netiquette computers be considered artists? 3) According to the presentation on Art and Technology, can 4) What is a Copyright 5) What is an ethical use of Darkcomnet? 6) What is a white hat hacker?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. E-Learning Affect Society: The most affected impacts of education on society is improved health, the post-primary education has shown to have include reducing poverty, delaying marriage of girls, and increasing decision making power. Secondary education plays a crucial role in preparing for a life-long learning perspective. The education provided by these secondary schools however, may not be accessible to all segments of society or all regions of a country. Access to e-learning has been found to reflect this access to education and to ICT generally in the wider society. Research has shown that a gap in access to ICT exists between countries, and an even larger gap exists within countries between urban and rural areas, between men and women, and between rich and poor. This has been termed the digital divide, defined as the gaps between those with regular, effective access to digital technologies, in particular the internet, and those without.

In the developing countries expanding e-learning may lead to two opposing outcomes, it can either widen these existing inequalities in access to ICT and education, or it can reduce inequalities by providing information and educational opportunities that would otherwise not be available. The second outcome ensuring requires of understanding the current distribution of access to education, ICT and other technologies, and the reasons for the inequitable distribution.

[Reference: An Analysis of e-Learning Impacts & Best Practices in Developing Countries]

2. Core Rules of Netiquette: Netiquette, the network etiquette is concerned the proper way to communicate in online environment and consider the following rules, adapted from Virginia Shea's The Core Rules of Netiquette, when communicating in the virtual world.

Rule 1: Remember the Human

Rule 2: Adhere to the same standards of behavior online that you follow in real life

Rule 3: Know where you are in cyberspace

Rule 4: Respect other people's time and bandwidth

Rule 5: Make yourself look good online

Rule 6: Share expert knowledge

Rule 7: Help keep flame wars under control

Rule 8: Respect other people's privacy

Rule 9: Don't abuse your power

Rule 10: Be forgiving of other people's mistakes

[Reference: The Core Rules of Netiquette Shea, V. (1994). Core rules of netiquette.]

3. Can Computers be Considered as Artist: The computer is simply a tool that offers artists new resources and opportunities for reaching the public, it is human creativity that makes art and still one can only imagine how the critics would have responded to the idea that something as playful, unpretentious and widely popular as a computer game might be considered art.

4. Copyright: A branch of law grants authors (writers, musicians, artists and other creators) protection over their works and such protection consists in providing authors with ownership or property rights (or exploitation rights), which take into account their material interests. Under copyright, authors are entitled to protection against unauthorized use of their works as well as to a possible share in any earnings from its use by the public.

However, copyright laws may also provide protection for another set of interests, of a more personal nature, which are commonly called the ‘moral rights’ of authors. These rights allow the authors to claim authorship in their works as well as respect for their integrity.

[Reference: The ABC of Copyright]

5. DarkComet: it is a Remote Administration Tool (RAT), developed by Jean-Pierre Lesueur, it is also known as DarkCoderSc, an independent programmer and computer security coder.

The DarkComet allows the user to control the system with Graphical User Interface (GUI) and it has many features that allow to use it as administrative remote help tool, however the DarkComet has many features it can be used maliciously and the DarkComet is commonly used to spy on the victims by taking screen captures, key-logging, or password cracking.

6. White Hat Hacker: The white hat hacker is a computer security specialist which breaks into protected systems and networks to test and asses their security and it use the skills to improve security by exposing vulnerabilities before malicious hackers can detect and exploit them. The methods used are similar to those employed by malicious hackers. The white hat hackers have permission to employ them against the organization that has hired them.

Add a comment
Know the answer?
Add Answer to:
How does e-learning affect society? Cite 1 important rule of "Netiquette" According to the presentation on...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • i need summery of this Using Apple Technology to Support Learning for Students with Sensory and...

    i need summery of this Using Apple Technology to Support Learning for Students with Sensory and Learning Disabilities The science of learning seeks to understand the relationship between brain development, social interaction, and learning by drawing on the fields of psychology, neuroscience, machine learning, and education.1 This research holds great promise for improving our teaching practices for all students and helping us develop more effective approaches to teaching children with sensory and learning disabilities. Many of the universal design features...

  • 1.Write 2 pages on the history of Kevin Mitnick, what he was accused of doing, how...

    1.Write 2 pages on the history of Kevin Mitnick, what he was accused of doing, how he was caught, and his punishment. 2.How did this case affect the legal system and hacking? (at least a paragraph) 3.Do you think that Kevin Mitnick acted ethically? 4.Do you think that his punishment was severe enough? 5.How do you feel about his current occupation? Below is the whole answer. Help me to answer the answer to each question, then please give me a...

  • 1. identify four possible consequences of inadequate training or training hat does not meet an organisation's...

    1. identify four possible consequences of inadequate training or training hat does not meet an organisation's needs or requirements . 2. carry out your own TNA identifying the learning and development needs you could use to be able to do your current job more successfully. if you are not currently employed, carry out a TNA that relates to the skills and knowledge you will need in a job that you hope to secure in the future 3.Training needs should be...

  • 1.i) What is meant by “business ethics”? a) How do business ethics relate to a business?...

    1.i) What is meant by “business ethics”? a) How do business ethics relate to a business? b) What are some of the benefits of a business acting ethically? c) Give an example of an ethical business and explain your point of view. d) How do business ethics fit in with ASX Corporate Governance Principles & Recommendations? e) What does business ethics have to do with external stakeholders? f) What is a Code of Ethics/Code of Conduct? g) What is the...

  • Create a lesson plan from the following: CHAPTER 3 Learning and HRD 67 Learning is a...

    Create a lesson plan from the following: CHAPTER 3 Learning and HRD 67 Learning is a vital aspect of all HRD efforts. Whether you are training a carpenter's apprentice to use a specialized power tool, conducting a workshop o teach managers how to use discipline more effectively, trying to get meat- packers to understand and follow new safety procedures, or promoting career levelopment among your employees, your goal is to change behavion, knowl- es throwgh eaming. Supervisors and HRD professionals...

  • Item 1 In the case below, the original source material is given along with a sample...

    Item 1 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version When instructors are creating discussion board activities for online courses, at least two questions must be answered. First, what is the objective of the discussions? Different objectives might be to create a "social presence" among students so that they do not feel isolated, to ask...

  • 01.According to rights Theory, how are property rights created? Rights Theory says that property rights come...

    01.According to rights Theory, how are property rights created? Rights Theory says that property rights come into existence when an individual mixes his labor with an existing, previously unowned resource.. Rights Theory says property rights come into existence when the most powerful people in a society decide who is going to have exclusive use of what resource so that that use of that resource redounds to the benefit of those powerful people. Rights Theory says that property rights come into...

  • BEYOND THE NUMBERS 3.10 | LEARNING OUTCOMES 1 TO 3 BEYOND THE NUMBERS 3.10 LEARNING OUTCOMES...

    BEYOND THE NUMBERS 3.10 | LEARNING OUTCOMES 1 TO 3 BEYOND THE NUMBERS 3.10 LEARNING OUTCOMES 1 TO 3 Bayes' Rule EXTEND Name Section Number To be graded, all assignments must be completed and submitted on the original book page Background The notation P(A|B) is read as "the probability of A, given B, has occurred." So the "I" symbol is read as "given." Formally, A and B are called events and P(AIB) is a conditional probability Bayes rule is a...

  • quize 1. A nurse educator is conducting a learning needs assessment prior to teaching a group....

    quize 1. A nurse educator is conducting a learning needs assessment prior to teaching a group. To collect information quickly while safeguarding individual privacy, the nurse educator should use which method? a. Structured interviews b. Questionnaires c. Focus groups d. Observations 2. A child needs to learn about self-care related to a recent diagnosis of rheumatoid arthritis. Which assessment question, based on Gardner’s eight types of intelligence, should the nurse ask the child’s parents to determine the child’s preferred learning...

  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT