THE DIGITAL AGE

Get Started. It's Free
or sign up with your email address
THE DIGITAL AGE by Mind Map: THE DIGITAL AGE

1. 1.1.Technologies of information and commution.

1.1. Organized of processed data.

1.1.1. Examples: radio , television,etc...

2. 1.2.Digital interconnection between every objets and the internet

2.1. Examples : appliances , smartTV

3. 2.Computer networks

3.1. set of interconnected computer that share resources, information and services.

3.1.1. EXAMPLES: printers,internet connection

4. 2.1.services from internet

4.1. WWW

4.2. Electronic Mail

4.3. Social networks

4.4. Messenger services

4.5. Storagee

5. 2.2.Protocol TCP / IP

5.1. Set of rules that regulate communication between machines on the internet

5.2. IS organized in layers or modules, it is a way to divide a complex problem into smaller problems to facilitate its implementation.

5.2.1. Divide and conquer

5.3. The most used:

5.3.1. HTTP

5.3.2. SMTP

5.3.3. POP3

5.3.4. FTP

5.3.5. SSH

5.3.6. IP

5.3.7. Ethernet, PPP , ATM

6. 2.3.1.Layered model

6.1. Each device on the network has these layers

6.1.1. Application

6.1.2. Transport

6.1.3. Internet

6.1.4. Network interface

7. 2.3.2.Datagrams

7.1. the data at the time of transmision is encapsulated in packets or datagrams. 2 parts:

7.1.1. header:information about the package itself

7.1.2. data: the data that the application should be sent.

8. 2.3.4.1.Systems binary.

8.1. B^n

8.1.1. B= Base of the number system

8.1.2. n = width of digits

9. 2.3.4.3Version of the IP protocol

9.1. IPv4

9.2. IPv6

10. 2.3.4.4.Addresses Public and private IP

10.1. Public : are unique

10.2. Private are used in private networks

11. 3.Work collaborative on web 2.0

11.1. 3.1.Evolution from the web

11.1.1. Web 1.0 or static web

11.1.2. Web 2.0 or social web

11.1.3. Web 3.0 or semantic web

11.1.4. web 4.0 or total web

11.2. 3.2. Work collaborative

11.2.1. Web 2.0

11.2.1.1. Blogs , wikipedia, office Online,

11.3. 3.3.Applications web

11.3.1. Tools that can be used throught a web browser.

12. 4.Selection of information

12.1. Is necessary: excessive volume of information , low quality information , from unreliabe or unqualified sources.

12.2. 4.1.Trustworthy information sources

12.2.1. type of publication

12.2.2. author of the text

12.2.3. origin of the information

12.2.4. the content

12.2.5. update

12.2.6. purpose

12.2.7. the audiencie

12.3. 4.2.Tools to search and filter information

12.3.1. Search engine

12.3.2. Metasearch

12.3.3. Directories

12.4. 4.3.Content curation

12.4.1. Gathering

12.4.2. Filter the content

12.4.3. Add value

12.4.4. Organize

12.4.5. Publish

12.5. 4.4.Big Data

12.5.1. Management and analysis of a large volume of data

12.5.2. It is carried out in infraestructures prepared to manage a huge volume of data

13. 5.Organization of the information

13.1. SEO or Search Engine Optimization

13.2. Recommendations to improve positions: choose keywords well, original texts, quality content, post new content periodically, tag content, combine multiple google services, responsive contents, using them sandars correctly.

13.3. 5.1.Scoail Labeling

13.3.1. Use of labels for the identification and location of the information. (images, texts, links, videos, markers)

13.3.2. Usually organized in menus and in clouds

13.3.3. Eg Labeling for this presentation

13.4. 5.2.Classification

13.4.1. Taxonomy: hierarchical classification with nested categories

13.4.2. Follksonomy: contents are tagged with one or more tags. No hierarchies

13.5. 5.3. Content Syndication

13.5.1. Content Subscription: when subscribing, a user automatically receives the content updates to wich he has subscribed.

13.5.2. new content can be received through notifications or content aggregators.

13.6. 5.4.Social Bookmarks

13.6.1. Websites that allow organized storage of links or bookmarks.

13.6.2. Users can share their bookmarks

13.6.3. Example; Pocket

13.7. 5.5Codes Qr

13.7.1. Evolution of the barcode, consists of a matrix of points that when scanned with a reader, the user it is redirected to an Internet address.

14. 6.Production of contents

14.1. Blogs, forums, social networks.

14.2. Participation in wikis: Wikipedia, wikispaces

14.3. Creation of web forms: Google forms, Excel Online forms.

14.4. Collaborative editing of online documents: Word, Excel, Powerpoint Online, Google Docs

15. 7.Media Communication

15.1. Email

15.2. Instant messaging

15.3. Videoconference

15.4. Call Voip

15.5. Newsgroups

16. 8.Soial Networks

16.1. Spaces created to put users in contact. Types of social networks: personal, professionals, thematic.

16.2. 8.1.Managers social network

16.2.1. Specific applications to manage social networks. They are capabl of managing several profiles.

16.3. 8.2.Strengths and weaknesses of social networks

16.3.1. STRENGTHS

16.3.1.1. Ease of connecting and communicating with other people, bring cultures together, eliminate geographic barriers, knowledge acquisition, labor advantages.

16.3.2. WEAKNESSES

16.3.2.1. Public exposure of users, loss of privacy and security risks, waste of time, unreal virtual identities, fake news

16.4. 8.3.Privacy on social media

16.4.1. it is susceptible to being published.

16.4.2. Configure privacy options in social networks to limit access to our content

16.4.3. users lose the intellectual property rights of the published content

16.5. 8.4.Security on social media

16.5.1. configure security and privacy options

16.5.2. do not reveal private information

16.5.3. choose a username other than the real one.

16.5.4. do not post personal photos or videos

16.5.5. do not share contacts

16.5.6. preferably not use social networks to register or log in

17. 9.Accommodation and cloud file distribution

17.1. File hosting services

17.1.1. Dropbox, Google Drive , OneDrive , Icloud

17.2. Platforms for sharing large files.

17.3. Backups

17.3.1. A true backup must be versioned , that is , different backups at different times.

18. 10. Trade electronic

18.1. Agents

18.1.1. Public administrations: regulate commerce and manage consumer and business procedures

18.1.2. Companies (B): sell and buy products and services

18.1.3. Consumers: they buy products and services from companies

18.2. 10.1 Purchases online: security measures

18.2.1. Check secure connection

18.2.2. Buy in well-known online stores and preferably that have a physical store.

18.2.3. Consult comments, opinions, doubts about the products to be purchased

18.2.4. Be wary of bargains or exaggerated offers

18.2.5. Use secure payment services such as PayPal

18.3. 10.2 Methods payment

18.3.1. Credit or debit card

18.3.2. Secure payment service

18.3.3. Cash on delivery

18.3.4. Bank account

18.3.5. Mobile payment

18.4. 10.3 Banking electronics

18.4.1. Banking procedures through the Internet

18.4.2. Should be done with caution

18.4.3. Do not reveal passwords to third parties

19. 11. Factors risk in the digital age

19.1. Digital divide:

19.1.1. bad areas connected, skill to use ICT

19.2. Digital literacy

19.3. Technoaddictions

19.4. Crimes against intellectual property: piracy and plagiarism

19.5. Dangers and threats in the network

19.5.1. Cyberbullying

19.5.2. Grooming: adult gains the trust of a minor

19.5.3. Sexting