WEB 2.0: Making the Web Work for You (Hosie-Bounar/Waxer)-Part 2 | Class Assignment/Project

Web 2.0

Unit C: Collaborating and Sharing Information

  1. Name 2 of the major uses of Web 2.0 technologies by business.  Web 2.0 technologies have helped businesses by cutting costs and improving customer support and innovation. Some businesses use company-based blogs, live chat, and social networking.
  2. Name 2 of the major uses of Web 2.0 technologies by governments.  Governments use Web 2.0 technologies not only to convey information to the public and provide online services, but also to gather information, which then they use to share resources, build consensus, improve services, and make policy decisions.
  3. What is the purpose of a blog? The purpose of a blog is to convey and share information; it is a “public relations” tool.
  4. Why would you subscribe to an RSS feed? An RSS feed provides a subscriber with information from frequently updated Web content, such as blogs. The benefit of RSS feeds is that you don’t have to constantly check whether a site has been updated. When an update occurs, you are notified immediately.
  5. Why would a business use a conversational search engine? In order to monitor what is being said about a company online, a business can use a conversational search engine, which sends updates whenever a person with standing in the industry or area of interest comments about a company or other topic online.
  6. How could offering a product or service for free make money in the long run?.  Because in order to get the free product, potential customers fill out a form with their information. Businesses use this information for customer profiling and data mining, the process of gathering consumer information and then analyzing it in order to get potential clients.
  7. Why is it a good idea to have an agenda for any meeting?. An agenda is a list of items you plan to discuss at a meeting. It is a good idea to have an agenda because groups can easily get off track, and also to avoid missing an important idea or subject to discuss.
  8. What might be the result of a polling question that shows the questioner’s bias? It will probably result in a “push poll”, where the pollster asks questions to push a respondent toward one idea and away from another.
  9. Name 2 situations that would indicate that your poll does not represent an effective sampling of opinion. For example, if the poll allows for an individual person to vote more than once. Another example, if polling the student body, cannot poll only freshmen or only seniors, or exclude some majors. The sample of respondents must be random and broad.
  10. Name 3 benefits of collaborative software.  Flexibility, cost savings, access to documents from anywhere at any time.

Unit D: Perfecting Your Online Persona

  1. List 2 elements that make up your e-persona. Your e-mail address, your profile picture.
  2. Why should you carefully consider each friend request before you accept it?. Because, as people you are linked to, are at the same time linked to other people, you lose control of the distribution of your words or images.
  3. How can you control your visibility on a site like Facebook? By modifying the privacy settings on your account.
  4. What is the purpose of a background check?. To find out who you are.
  5. Why might it be damaging to your reputation if someone sets up an imposter account?. Because the imposter may be pretending it is you, and in this way spam your email list, or worse, steal your identity.
  6. Discuss 2 key differences between social networking and professional networking.  Professional networking connects people based on their shared professions, industries, contacts, and goals. Social networking is casual, connects you with all kinds of people.
  7. Name 3 services that an online professional organization can provide. Training and development, networking, job postings.
  8. What is the difference between a blog and a micro blog?. The difference is that a micro blog only allows a limited number of characters.
  9. Why might a reader object to seeing ads on your blog? Besides of annoyance, because maybe the purpose of the site itself does not agree with advertising.
  10. What is the purpose of an e-portfolio? You can gather your important online information in one place. It is your personal home page.

WEB 2.0: Making the Web Work for You (Hosie-Bounar/Waxer)-Part 1 | School Project/Assignment

Web 2.0








Unit A: Research 2.0

  1. What are the new key features of Web 2.0 technologies, and how they differ from Web 1.0?  In the past, users could only use the Web to get information. With Web 2.0, the user now has the ability to collaborate with others, interact in virtual or online communities, and generate Web content.
  2. Discuss some things you should consider before sharing information on the Web.  Have to keep in mind that whatever you post on the Web is out there for the world to see unless you set some restrictions.  You should also keep in mind that if you browse the Web or open email without having a firewall and virus protection installed on your computer, you are exposing all of the information on your computer to possible attacks, and yourself to possible identity theft.
  3. Give 3 examples of research tools. As an example of research tools on the Web we can name: Search engines, such as Google, Research Databases, such as school’s or public library’s, and Online Catalogs, such as WorldCat.
  4. What is the difference between a search engine and a meta-search engine? A search engine is a website that finds documents or media related to search terms or keywords that user provides. A meta-search engine is a category of a search engine, which uses multiple search engines in a single search, and therefore returns more results.
  5. What are the benefits of a Subject Guide? For more in depth research a user will have better success using a specialized search engine called a Subject Guide. The advantage is that the information it contains is already categorized for the user.
  6. Discuss the difference between a primary source, a secondary source, and a tertiary source, and give examples of each.  A primary source is directly related to the event or historical figure, such as an interview, sound recording, or photograph. A secondary source interprets or reports on the data or information using primary sources, for example, an article written about the Great Depression. A tertiary source is at least two steps removed from the primary source. Might be an encyclopedia or other large reference network.
  7. Name three things you should consider when you try to determine whether or not a source is valid. Should consider if the reference is a primary, secondary, or tertiary source, if the website for the source is reputable, if other sources confirm the information.
  8. What is the difference between a personal bookmark and a social bookmark? Social bookmarks are bookmarks that you share with friends, classmates, or with the entire web community. A personal bookmark is stored locally on your computer .
  9. What is a mind map and what are its benefits? A mind-mapping tool helps you record information in a format that works for you, revise the information to put it into your own words, and reorganize it in a linear or graphical way, depending on your learning style. Example: mindmeister.com.
  10. Give 3 examples of information that requires you to cite a source.  Quotation or interpretation of data, using direct quotes or data from any primary, secondary, and tertiary source, or if you paraphrase an idea presented in a source.


Unit B: Finding Media for Projects

  1. Copyright Law is a category of what broad area of law? Civil Law.
  2. Name 3 types of work protected by copyright. Photographs, videos, and music.
  3. At what point is a work protected by copyright? As soon as it is created.
  4. Explain what Creative Commons licenses allow. Creative Commons licensing offers a way to assign copyright to your work. CC licenses let creators decide which rights they want to retain while allowing others to use the work under certain conditions that the owner selects. Creator can require simple attribution for his work, restrict its commercia use, or not allow derivative use.
  5. Give an example of when a work enters public domain. In the US, nearly every work created prior to 1923 is in the public domain. Copyright lasts the life of the author plus 70 years. For example, the book “The Phantom of Opera”, by Gaston Leroux, is of public domain, as it was published before 1923.
  6. Discuss the difference between crediting authors for their work and getting permission to use a work.  Giving credit to the copyright holder indicates that you are not trying to claim the work as your own, but it doesn’t mean you are using the work properly, with permission. To get permission, a request should be sent to the author with this minimum information on the request letter: your full name, with complete contact information; a specific description of your intended use; a signature line for the copyright holder; a target date when you would like the copyright holder to respond.
  7. Name 3 rights copyright holders have to their work. Right to reproduce the work, prepare Derivative Works of it, distribute copies of it,  perform it publicly and display it publicly.
  8. Name 3 things you should include in a permissions letter. Full name,  a specific description of your intended use, a target date when you would like the copyright holder to respond.
  9. What do you call the rules users post describing how their work can be used? Terms of Use.
  10. Why shouldn’t you assign a Creative Commons license to scanned photographs you found in a box in the attic? Because the photographs are not your original work; they are someone else’s.