CYBER BULLING

What is Cyber bullying?

 

Cyber bullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites.

Examples of cyber bullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.

 Effects of Cyber bullying:

Illustration of two teens texting. Cell phones and computers themselves are not to blame for cyber bullying. Social media sites can be used for positive activities, like connecting kids with friends and family, helping students with school, and for entertainment. But these tools can also be used to hurt other people. Whether done in person or through technology, the effects of bullying are similar.

Kids who are cyber bullied are more likely to:

  • Skip school
  • Experience in-person bullying
  • Be unwilling to attend school
  • Receive poor grades
  • Have lower self-esteem
  • Have more health problems

         Image result for images of cyberbullying

What can we do to prevent cyber bullying?
Don’t respond.
  • Don’t respond. If someone bullies you, remember that your reaction is usually exactly what the bully wants. …
  • Don’t retaliate. …
  • Save the evidence. …
  • Talk to a trusted adult. …
  • Block the bully. …
  • Be civil. …
  • Don’t be a bully. …
  • Be a friend, not a bystander.

INFORMATION TECHNOLOGY IS A DEVELOPING TECHNOLOGY

Information Technology is a developing technology that aims at obtaining the maximum information with minimum of resources, labour or time.  According to the dictionary, Information Technology is “the study or use of electronic equipment especially computers, for storing, analysing and distribution of information of all kinds, including words, numbers and pictures.”

Ever since the appearance of Man on the earth, information has been the major cause of his progress and development.  But information alone is not enough.  Information has to be processed, put to use by logic and reason before it becomes useful knowledge.

Information Technology includes and encompasses within itself the whole technological, social and cultural phenomena that promise an excellent future for mankind.  The 21st century is a century of Information Technology.   Just as steam engine emerged to be the technology of the 19th century and computer technology enhanced the capacity of human brain in the 20th century, Information Technology is the in-thing in the 21 century.

Need and Importance of Information Technology in Education

Need

  • Education is a life long process therefore anytime anywhere access to it is the need.
  • Information explosion is an ever increasing phenomena therefore there is need to get access to this information.
  • Education should meet the needs of variety of learners and therefore IT is important in meeting this need.
  • It is a requirement of the society that the individuals should posses technological literacy.
  • We need to increase access and bring down the cost of education to meet the challenges of illiteracy and poverty-IT is the answer.
    Importance

    • access to variety of learning resources
    • immediacy to information
    • anytime learning
    • anywhere learning
    • collaborative learning
    • multimedia approach to education
    • authentic and up to date information
    • access to online libraries
    • teaching of different subjects made interesting
    • educational data storage
    • distance education
    • access to the source of information
    • multiple communication channels-e-mail,chat,forum,blogs,etc.
    • access to open courseware
    • better accesses to children with disabilities

Information Technology in Education

INTRODUCTION Information Technology in Education, effects of the continuing developments in information technology (IT) on education.

The pace of change brought about by new technologies has had a significant effect on the way people live, work, and play worldwide. New and emerging technologies challenge the traditional process of teaching and learning, and the way education is managed. Information technology, while an important area of study in its own right, is having a major impact across all curriculum areas. Easy worldwide communication provides instant access to a vast array of data, challenging assimilation and assessment skills. Rapid communication, plus increased access to IT in the home, at work, and in educational establishments, could mean that learning becomes a truly lifelong activity—an activity in which the pace of technological change forces constant evaluation of the learning process itself.

Significance of IT in education:

  • Access to variety of learning resources
  • Immediacy to information
  • Any time learning
  • Collaborative learning
  • Multimedia approach to education
  • Authentic and up to date information
  • Online library
  • Distance learning
  • Better accesses to children with disabilities

Image result for .Information Technology is a developing technology

Image result for .Information Technology is a developing technology

Image result for .Information Technology is a developing technology

E SAFETY

Web safety, or online safety or Internet Safety, is the knowledge of maximizing the user’s personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general. … Most social networking and chat sites have a page about safety.

RULES OF E SAFETY:

1)      Don’t post any personal information online – like your address, email address or mobile number.

2)      Think carefully before posting pictures or videos of yourself.  Once you’ve put  a picture of yourself online most people can see it and may be able to download it, it’s not just yours anymore.

3)      Keep your privacy settings as high as possible

4)      Never give out your passwords

5)      Don’t befriend people you don’t know

6)      Don’t meet up with people you’ve met online.  Speak to your parent or carer about people suggesting you do

7)      Remember that not everyone online is who they say they are

8)      Think carefully about what you say before you post something online

9)      Respect other people’s views, even if you don’t agree with someone else’s views doesn’t mean you need to be rude

10)   If you see something online that makes you feel uncomfortable, unsafe or worried: leave the website, turn off your computer if you want to and tell a trusted adult immediately.

CELLULAR COMMUNICATION

A cellular network or mobile network is a communication network where the last link is wireless. The network is distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station. This base station provides the cell with the network coverage which can be used for transmission of voice, data and others. A cell might use a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed service quality within each cell.

Cellular networks offer a number of desirable features:

  • More capacity than a single large transmitter, since the same frequency can be used for multiple links as long as they are in different cells
  • Mobile devices use less power than with a single transmitter or satellite since the cell towers are closer
  • Larger coverage area than a single terrestrial transmitter, since additional cell towers can be added indefinitely and are not limited by the horizon
  • Cellular networks offer a number of desirable features:
    • More capacity than a single large transmitter, since the same frequency can be used for multiple links as long as they are in different cells
    • Mobile devices use less power than with a single transmitter or satellite since the cell towers are closer
    • Larger coverage area than a single terrestrial transmitter, since additional cell towers can be added indefinitely and are not limited by the horizon
    • Coverage comparison of different frequencies

      The following table shows the dependency of the coverage area of one cell on the frequency of a CDMA2000 network:[12]

      Frequency (MHz) Cell radius (km) Cell area (km2) Relative Cell Count
      450 48.9 7521 1
      950 26.9 2269 3.3
      1800 14.0 618 12.2
      2100 12.0 449 16.2

BLUETOOTH FEVER

Bluetooth is an industrial specification for personal area networks (PANS).Blue tooth provides a way to exchange information using devices such as mobiles, laptops, PCs, digital cameras, printers and video game consoles over a secure globally unlicensed short range radio frequency.

WHAT ARE THE USES OF BLUETOOTH?
Bluetooth is a standard and communications protocol primarily designed for low power consumption, with a short range (power-class-dependent: 1 meter, 10 meters, 100 meters)based on low-cost transceiver microchips in each device.
Bluetooth enables these devices to communicate with each other when they are in range. The devices use a radio communications system, so they do not have to be in line of sight of each other, and can even be in other rooms, as long as the received transmission is powerful enough.
Class 1100 mW (20 dBm)100 metersClass 22.5 mW (4 dBm)10 metersClass 31 mW (0 dBm)1 meter
It has to be noted that in most cases the effective range of class 2 devices is extended if they connect to a class 1 transceiver, compared to pure class 2 network. This is accomplished by higher sensitivity and transmitter power of the Class 1 device. The higher transmitter power of Class 1 device allows higher power to be received by the Class 2 device. Furthermore, higher sensitivity of Class 1 device allows reception of much lower transmitted power of the Class 2 devices. Thus, allowing operation of Class 2 devices at much higher distances. Devices that use a power amplifier on the transmit, have improved receive sensitivity, and highly optimized antennas are available that routinely achieve ranges of 1km within the Bluetooth Class 1 standard.

WHAT IS HIGH SPEED BLUETOOTH?On 28 March 2006, the Bluetooth Special Interest Group announced its selection of the WiMedia Alliance Multi-Band Orthogonal Frequency Division Multiplexing (MB-OFDM) version of UWB for integration with current Bluetooth wireless technology.UWB integration will create a version of Bluetooth wireless technology with a high-speed/high-data-rate option. This new version of Bluetooth technology will meet the high-speed demands of synchronizing and transferring large amounts of data, as well as enabling high-quality video and audio applications for portable devices, multi-media projectors and television sets, and wireless VOIP.At the same time, Bluetooth technology will continue catering to the needs of very low power applications such as mice, keyboards, and mono headsets, enabling devices to select the most appropriate physical radio for the application requirements, thereby offering the best of both worlds.

WHAT IS THE SECURITY OF BLUETOOTH? Bluetooth implements confidentiality, authentication and key derivation with custom algorithms based on the SAFER block cipher. In Bluetooth, key generation is generally based on a Bluetooth PIN, which has to be entered into both devices. This procedure might get modified slightly, if one of the devices has a fixed PIN, which is the case e.g. for headsets or similar devices with a restricted user interface. Foremost, an initialization key or master key is generated, using the E22 algorithm.The E0 stream cipher is used for encrypting packets, granting confidentiality and is based on a shared cryptographic secret, namely a previously generated link key or master key. Those keys, used for subsequent encryption of data sent via the air interface, hardly rely on the Bluetooth PIN, which has been entered into one or both devices.A demonstration of this reduction has been put effort in by Y. Shaked and A. Wool in. An overview of the most important vulnerabilities and the most common exploits to those vulnerabilities is presented in.

WHAT IS CONECTION AND COMUNICATION OF BLUETOOTH?A master Bluetooth device can communicate with up to seven devices. This network group of up to eight devices is called a piconet.A piconet is an ad-hoc computer network, using Bluetooth technology protocols to allow one master device to interconnect with up to seven active devices. Up to 255 further devices can be inactive, or parked, which the master device can bring into active status at any time.At any given time, data can be transferred between the master and one other device, however, the devices can switch roles and the slave can become the master at any time. The master switches rapidly from one device to another in a round-robin fashion. (Simultaneous transmission from the master to multiple other devices is possible, but not used much.)Bluetooth specification allows connecting two or more piconets together to form a scatternet, with some devices acting as a bridge by simultaneously playing the master role and the slave role in one piconet. These devices are planned for 2007.Many USB Bluetooth adapters are available, some of which also include an IrDA adapter. Older (pre-2003) Bluetooth adapters, however, have limited services, offering only the Bluetooth Enumerator and a less-powerful Bluetooth Radio incarnation. Such devices can link computers with Bluetooth, but they do not offer much in the way of services that modern adapters do.

WHAT IS FUTURE OF BLUETOOTH? Broadcast Channel: enables Bluetooth information points. This will drive the adoption of Bluetooth into cell phones, and enable advertising models based around users pulling information from the information points, and not based around the object push model that is used in a limited way today.Topology Management: enables the automatic configuration of the piconet topologies especially in scatternet situations that are becoming more common today. This should all be invisible to the users of the technology, while also making the technology just work.Alternate MAC PHY: enables the use of alternative MAC and PHY’s for transporting Bluetooth profile data. The Bluetooth Radio will still be used for device discovery, initial connection and profile configuration, however when lots of data needs to be sent, the high speed alternate MAC PHY’s will be used to transport the data. This means that the proven low power connection models of Bluetooth are used when the system is idle, and the low power per bit radios are used when lots of data needs to be sent.QoS improvements: enable audio and video data to be transmitted at a higher quality, especially when best effort traffic is being transmitted in the same piconet.Bluetooth technology already plays a part in the rising Voice over IP (VOIP) scene, with Bluetooth headsets being used as wireless extensions to the PC audio system. As VOIP becomes more popular, and more suitable for general home or office users than wired phone lines, Bluetooth may be used in cordless handsets with a base station connected to the Internet link.hyperolds-bluetooth-marketing.jpg

 

difference between android vs IOS

Smart phones are ingrained in today’s society, and the two biggest players in the smartphone market are the Android operating system by Google, and iOS by Apple. Neither operating system was originally as user friendly as it is today. Android originally came with no virtual keyboard, a lack of app store, and no multitouch capability. Android was originally introduced in 2008 on the T-Mobile G 1 smartphone, and is on its eighth iteration since its inception. The original Apple iOS was comparable to Android in that, when it was introduced in 2007, it too was inferior to the current version. The few features in the first version of iOS included Google Maps, a home button, an on-screen keyboard, and the first popular touchscreen on a smartphone. Apple includes iOS only with the iPhone, iPod Touch, and the iPad, while Google allows Android on any number of different devices. Both operating systems have come a long way since their introductions, but deciding which of the two mobile operating systems is the best can prove to be difficult. The guide below maps out each operating systems, the features of each, and how to buy a high quality device featuring Android or iOS at a price that won’t break the buyer’s budget.

Apple iOS

Apple has enjoyed much success with its devices, as each one seems to outsell the previous version. Since the introduction of its first touchscreen device in 2007, Apple devices have revolutionized the mobile phone industry and set the bar high for other devices. The iOS introduced with the first iPhone now operates on iPods and iPads as well. It is known for its ease of use and elegant design.

Features of iOS

Apple’s mobile operating system, iOS, contains a number of different features developed over its many versions and iterations since 2007. Many such features were, when first developed and introduced by Apple, lauded as innovative, even groundbreaking advances. The following sections detail the features introduced with the various iOS versions.

Android OS

The Android OS by Google is the most widely used platform for smartphones and tablets on the market. It was introduced as a collaborative effort from the Open Handset Alliance (OHA), a unit that comprises companies such as Google, HTC, Sony, Dell, Samsung, LG, T-Mobile, Motorola, and many others. This is one of the reasons smartphones from these companies are released with the Android OS. As a result, the consumer has a wide variety of smartphones to choose from. Compared to the iOS from Apple, Android devices are far less expensive.

Among the popular devices that utilize the Android OS are the Motorola Droid series, Samsung Galaxy phones and tablets, and HTC’s ThunderBolt LTE smartphone.

Jelly Bean, or Android 4.1, replaced the Ice Cream Sandwich OS (4.0). It allows users more ability to swipe their finger over the screen to perform actions. It also performs faster than the earlier release. Jelly Bean also makes it easier to share photos on social media sites.

Features of Android

Android does not include as many major updates, but rather smaller increments adding fewer updates each time. Most of the updates come in the form of “.X” updates that are actually additions rather than changes to the whole system.

Technical Specifications

The following table details some of the technical specifications of the Android and Apple iOS devices.

Technical Specification

Android

iOS

Latest Version

4.1

5.0

OS Type

Linux

Mac OS/Unix

License

Free and Open Source

Proprietary

CPU Architecture

ARM, MIPS, Power, x86

ARM

Programming Languages

C, C++, Java

C, C++, Objective-C