A "meme" is a virally-transmitted cultural symbol or social idea. A meme behaves like a flu or a cold virus, traveling from person to person quickly, but transmitting an idea.
Historically, a meme is a discrete "package of culture" that would travel via word of mouth, usually as a fascinating story, a fable/parable, a joke, or an expression of speech. Today, memes travel much faster than simple speech. As internet email forwards, instant messages, and web page links, memes now travel instantly via the Internet.
We are going to transform PROVERBS or a SAYINGS into Digital ones.
"No por mucho madrugar, amanece más temprano"
MAKE MEMES WITH ADAPTED SAYINGS
The process could be as follows:
Choose saying.
Adapt it to a safety on the Internet piece of advice.
You can protect your digital identity on the Internet by being alert to scams, employing strong passwords, installing anti-virus and anti-spyware software and keeping it up-to-date and checking your settings in your social networks accounts and your operating system. But, there are still more things you can do.
Think twice!
Hold on a minute. Before you post that image, blog or tweet, consider the content. If it breaks even one of these rules, think really hard about putting it out there! DO NOT... Send a picture to someone via email/snapchat/instagram that you wouldn’t want your teacher, boss, principal, or grandma to see!
Sure you are sending them to your good friend or significant other. But what happens when that person is no longer your best friend? Or maybe their phone gets nabbed by someone with less morals.
Post personal information that is not readily available
Think about the last time you had to recover a password online. Was the question: Pet’s name, childhood street, kid’s birthday or mother’s maiden name? Make sure that kind of information stays private and don’t use it for the actual passwords.
Announce when you are going away
Yes, your friends are excited that you only have 3 more days until you leave for Hawaii! But so is the guy that has been staking out your house.
Underestimate what your device or computer already knows about you
All online content is tagged with metadata which contains anything from the timestamp it was created to the location. You cannot see the metadata when you post but simple free software can pull it for someone else. Be wary of geotagging on mobile devices, which marks where you took the photo.
Forget to set your privacy settings
Not only should you check your settings at the outset but you should recheck them frequently. Facebook, for example, uses an ‘opt out’ policy which means that by default you are sharing more information until you go in and update those settings. Follow us on Twitter or Facebook or join our mailing list to get those updates sent to you.
Post negative comments about your highschool/workplace or classmates/teachers/coworkers
Even if your teacher, boss, classmate or coworkers are not able to see your comment, a future employer could see that comment and reconsider hiring you later. Even with privacy settings set, you are at the mercy of our online friends not to share.
Post photos of your friends that break the first rule
It is a great photo of you. So what if your friend is doing something in the background that would tarnish their reputation? If you tag them, your friend can remove the tag, but unless the photo violates terms and conditions (allowing a site to pull it down) only you control the permissions on that photo. Put yourself in their shoes (and hope they would do the same). This goes double for pictures of underage kids. If the child is under 18, you technically need the parents permission to post it.
Use the same password for every account
I know it is a pain to remember different passwords for all of your sites but it is an even bigger pain if someone hacks in to one of your accounts. Are you using the same password for your social networks, banking, or online shopping? If a hacker finds just one instance of your password then they will now have access to everything.
Our digital identity, or tattoo, is the permanent collection of data about us that is available online. Each time we post a picture, a blog, a status or a tweet, we are adding to that digital identity.
As more online applications become part of our daily lives, our digital identities become increasingly more detailed. There are over a billion pieces of content added to Facebook every day!
But it is not only what you do but what others do!
Sharing every detail of your lives online is a great potential risk.
What does our digital identity say about us? Who is reading this information?Who is storing this information? What are they doing with it?What impact will it have on our future?What does it say to future employers? The Dean of Admissions? Our descendants? Your insurance company? To know more:
To be sure that you are viewing your public profile, log out of your social networks before (Facebook, for example), or go to a new browser, and you will see exactly the same as a stranger will in them.
What does Google know about me?
Now, logged in your Google account, write "¿Qué sabe Google sobre mí?
Go to the link highlighted and check the results from the 6 links you are provided. Surprised?
Let's control what Google shows about us
Go to https://aboutme.google.com/. Check and edit. Protect your personal information!
What can I find about my classmates? What can I find about me?
We are going to investigate about your classmates.
Use:
Google Search. Write exactly a full name. Use the quotes. I mean, write into the Google search box "Federico Garcia Lorca" and "García Lorca, Federico". You will see how you find results about your classmates, or at least, about people with the same name.
Add a comment on this post (remember as "Name S" and share what you have found about your or about your classmates (please do not mention your classmates names).
In computing, an avatar is the graphical representation of the user or the user's alter ego or character. It may take either a three-dimensional form, as in games or virtual worlds, or a two-dimensional form as an icon in Internet forums and other online communities.
Your avatar is the small picture that appears along with your user-name when you participate in activity on the site. The avatar is also seen above your user-name on your profile page. Many people use a flattering picture of themselves as their avatar, but you can use any picture you want as long as it isn’t offensive. An avatar gives other users a “face” to go with your user-name. They will recognize your avatar when you participate in activity on the site like commenting on articles, posting in the forum, and making new friends.
Recortes. If you have no option to download your avar, take a screenshot. "Recortes" es a tool you will find only in Windows. Choose a rectagular shape, select your avatar and save it.
My Pictr: This is not to create and avatar, but it could be very useful if you want to chage the size of your avatar.
These are some GENERAL HEALTH AND SAFETY RULES:
(Specific ones will be provided before using each tool and machine).
BEHAVIOUR
NO "horseplay" or "fooling around" is permitted. Do not run in the workshop, you could ‘bump’ into another pupil and cause an
accident.
Bags should not be brought into the workshop are as people can trip over them so, leave them in the table area.
Avoid Distractions. Distractions are a part of everyday life. When you are distracted while in the middle of performing an action with a power tool, remember to always finish the cut or the solder to a safe conclusion before dealing with the distraction. Taking your attention away from the working tool is a recipe for disaster.
Too much noise makes people irritable and aggressive and interrupts concentration. Try to work quietly.
YOURSELF PROTECTION
Always wear safety equipment and wear appropiate clothing. Safety goggles, gloves etc., should be worn due to hazards that may be encountered while using tools.
Long hair must be tied back when working in the workshop.
Don't wear necklaces, rings or loose-fitting clothes - they may get caught in the machines.
Keep your hands clean and dry.
TOOLS
Tools can be dangerous. Never play with them. The greatest hazards posed by hand tools result from misuse and improper maintenance.
Find out how to use each type of tool, equipment and machine correctly before you start. Don't work with tools, equipment or materials you don't know how to use.
Use the right tools for the right task.
Make sure tools are in perfect condition before you use them (check they aren't broken, the handles are secure and that safety elements are in place).
Keep hands away from moving/rotating machinery.
Use hand tools carefully, keeping both hands behind the cutting edge.
Put your tools away while you are not using them.
Clean all equipment and return it to the storage area before leaving the workshop area.
SIGNS
Obey signs. There are four types of signs:
Mandatory
Danger (hazard)
First aid and emergency
Prohibition
VERY IMPORTANT:
Always listen carefully to the teachers (Rosa and Kostyn) and follow instructions. When learning how to use a machine, listen very carefully to all the
instructions given by the teachers. Ask questions, especially if you do not fully
understand.
While working, ask the teacher again if you have any doubts.
Always be patient, never rush in the workshop.
Report any accident or injury to the teacher immediately (cuts, dust in your eyes, burns...).
The different
activities carried out since one problem arises until we are able to solve it. This method of work consists of the following steps:
NEED Define the problem: the situation that need to be
solved is clearly defined.
IDEA Look for solutions: searching for information,
analyzing similar objects, raising different solutions and choosing the most
appropriate one.
DEVELOP THE IDEA Design the object: in this step the idea is set and
it is described in written and graphic form.
PLAN THE CONSTRUCTION Planning: it has to do with anticipating the jobs
that are going to be carried out, handing out the job, obtaining the materials
and preparing the tools.
CONSTRUCTION Construction: it is necessary to manufacture the
different parts separately and later put them together.
CHECK Evaluation: one tests how the object works and
corrects the design if necessary.
TECHNICAL REPORT Communication of results: it is necessary to present
a technical report in which one describes the whole process.
What is Technology? Where is Technology? Can we live without it?
Do you want the answer? Easy.
CHALLENGE
Turn off the electricity and water supply, disconnect the telephone and throw away your mobile phone!!. Wait just for 15 minutes.
How do you feel?
Answer this question in a comment in this article. Don't forget your course and name and the inicial of your surname.
This challenge should be done on Monday October 3rd. If you have problems with your computer or the Internet, do it in your notebook.
Homer Simpson doing the challenge... after 2 minutes