Saturday, May 22, 2021

Day 5 Digital Literacy Learning.

Presentation  on Social Media using Power Point


What Is Social Media?

Definition and Examples of Social Media

Using social media in business
The Balance / 

Social media refers to websites and applications that are designed to allow people to share content quickly, efficiently, and in real-time. While many people access social media through smartphone apps, this communication tool started with computers, and social media can refer to any internet communication tool that allows users to broadly share content and engage with the public.

The ability to share photos, opinions, and events in real-time has transformed the way we live and the way we do business. Here are the basics of understanding social media and how it can be used to help promote your business.

What Is Social Media?

Social media is any digital tool that allows users to quickly create and share content with the public. Social media encompasses a wide range of websites and apps. Some, like Twitter, specialize in sharing links and short written messages. Others, like Instagram and TikTok, are built to optimize the sharing of photos and videos.

What makes social media unique is that it is both broad and relatively uncensored. While many social media companies impose some limitations—such as taking down images that display violence or nudity—there are much fewer limitations on what someone can share than there with other means of mass communication like newspapers, radio stations, and television channels.

Anyone with internet access can sign up for a social media account. They can use that account to share whatever content they choose to, and the content they share reaches anyone who visits their page or profile.

Advantages of social media
-Information and updates
-Connectivity
-Education
-Awareness
-you reach larger audience
-evaluate Performances ........etc..

Disadvantages of social media

-Lacks emotional connection
-Cheating and relationship issues
-Facilitates laziness
-Reduces family closeness
-Decreases face to face communication
- Addiction and so on...
Impact of Social Media in Bhutan

Over the years, with the rapid growth and usage of social media in Bhutan, its interactive features and no holds barred nature has ensured that social media is now fast becoming a very popular source of news and views.

 Impact of Social Media in Bhutan. (Source: http://enodoglobal.com)

 

By SanjoJendayi | The Bhutanese

Before social media or the media ever reached Bhutan, the country had a rich oral culture of not only passing down traditional stories, religious tales and local folklore but it was also an unofficial means of transmitting news and views.

The media came to Bhutan along with modernisation and soon professional journalists and verified news became the main source of news in Bhutan.

Social media overtook oral tradition in Bhutan

Over the years, with the rapid growth and usage of social media in Bhutan, its interactive features and no holds barred nature has ensured that social media is now fast becoming a very popular source of news and views.

However, just like the rest of the world and with two major elections looming this year, Bhutan is grappling with the challenge of handling fake news on social media as well as highly divisive rhetoric circulating online.

Bhutan’s oral culture suffered from occasional exaggerations or even rumours in response to certain popular fears and situations. The mass media occasionally makes factual errors and is also accused at times of not getting all the sides of a story.

The perils of fake news

However, social media is turning out to be an entirely different and much more dangerous ‘animal’. It is not only being used to deliberately create and spread fake news but it has fertile ground to grow in a country where the political culture is becoming increasingly partisan, extreme, intolerant and violent.

Death threats, threats of physical violence, sexual violence and maligning of each other due to mere political differences is becoming the norm in our social media.

Influence of fake news on Bhutanese youth

A large number of Bhutanese, including the more gullible young, now take their news and views from Facebook pages that are an open sewer of propaganda, fake news, lies and hate. What makes it worse is that an increasing number of youth have been influenced by such news and even participated in it.

The tragedy here is that political forces that were actually unleased in the form of politicians and parties to give shape to and strengthen Bhutanese democracy are the worst offenders encouraging such behaviour, both overtly and covertly.



 What is BTCRIT?

We are a club at RIT focused decentralized systems and their use cases.

  • Cryptocurrencies (like Bitcoin)
  • Blockchain
  • Torrents, IRC, and other things

In our weekly meetings, we talk about how these things work and what you can do with them (including trading!)

Bhutan Computer Incident Response Team (BtCIRT) is a part of Department of Information Technology and Telecom, Ministry of Information and Communication. The BtCIRT is mandated to enhance cyber security in Bhutan by facilitating collaboration and information exchange among stakeholders, rendering assistance in capacity building and through sustained advocacy in computer security. For detailed mandate and roles of the team, click here.

Friday, May 21, 2021

Day 4 Digital Litercy Learning

1. What is Antivirus? 

Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer. Once installed, most antivirus software runs automatically in the background to provide real-time protection against virus attacks.

2.Types of Antiviruses
  • AVG Antivirus. You must have heard about it before as it is one of the most popular and widely used antivirus software. ...
  • McAfee Antivirus. This differs from AVG Antivirus as you can set a timer for scanning files in McAfee Antivirus. ...
  • Norton Antivirus. ...
  • Ad-Aware.

3.How Does Antivirus Work? 

How Does Antivirus Work

An antivirus software works by scanning incoming files or code that's being passed through your network traffic. Companies who build this software compile an extensive database of already known viruses and malware and teach the software how to detect, flag, and remove them.

When files, programs, and applications are flowing in and out of your computer, the antivirus compares them to its database to find matches. Matches that are similar or identical to the database are isolated, scanned, and removed

While you can adjust settings so that your antivirus runs automatic scans of your computer for malicious files, you can also opt-in to manual scans, which let you sit and see in real-time which malicious files were found and neutralized. 

Some antivirus software will ask for your permission before "cleaning" a file to remove malicious code. If you prefer a hands-off approach, you can adjust the settings so the software automatically removes malicious files.

Most antivirus software performs the same functions, so choosing between one brand and another shouldn't be that complex of a decision.

4.Are Antivirus and Anti-Malware the Same?

The short answer is both yes and no.

Before we get into their similarities and differences, let's first define what malware exactly is. 

5.What is Malware?

Malware is any type of software written with malicious intent, which can range from data theft, computer damage, or general privacy invasion.

Malware tends to be spread when a suspicious link or download is opened by a victim. Ranging anywhere from viruses to ransomware, malware is an umbrella term that encompasses many types.

For a more in-depth look at the different types of malware and some tips on how to prevent malware attacks, keep reading.

6.How are They Similar and Different?

Antivirus software and anti-malware are both similar in that they're designed to protect your computer from malicious software.

However, antivirus is a slightly more generic and catch-all software than anti-malware. Most of us know that when we get a new computer, one of the first software we should install is a good antivirus software.

However, not as many people think to install an anti-malware software. While antivirus software offers general-purpose protection against a wide array of pre-known viruses, anti-malware is more specialized in that it is built to fight off ransomware and Trojans.

Antivirus tends to focus on prevention by stopping malicious files from being downloaded or wreaking havoc on your computer. Anti-malware is more so reactive in that it seeks out and neutralizes malicious files that have already been downloaded and have started causing issues. 

Other Ways to Protect Your Network

Are Antivirus and Antimalware the Same

7.Install a Firewall  

Firewalls keep would-be intruders where they should be – outside your network. By putting up a virtual “wall” against inbound and outbound traffic, firewalls choose whether to allow or block certain traffic through.

Firewalls and anti-virus software serve as a good basis for building your network security.

While installing a firewall is a great method for securing your network, they can quickly become outdated and less protective over time.

Cyber threats evolve so often that cyber security software creators must create and release updates to keep your network one step ahead of hackers.

While the process of updating your firewall can be a nuisance, every day that you wait to update your cyber security infrastructure after new versions emerge leaves you more vulnerable to ransomware attacks.

If you are able to, enable auto-updates on your firewall and other security software and schedule any updates for late at night when you're not using your computer. 

Avoid Suspicious Links and Websites

The temptation to visit websites that might contain suspicious links, such as ones that offer free movie and music downloads, can be hard to resist. However, knowing some basic rules about what to stay away from can prevent you from accidentally downloading malware or ransomware.

To start, if a website sounds too good to be true, then you probably shouldn't trust it. For instance, websites offering free tools or software that are usually expensive are likely to contain malware links.

Another way that hackers easily spread malware attacks is through a term called phishing. In a phishing attack, a hacker will email a victim a malware-infected link. These phishing emails will look and feel genuine, tricking many into clicking on the link. 

For instance, a hacker trying to access a company's HR portal might email them posing as Microsoft, telling them to click the link to verify their credentials.

If you're wary about trusting a link that seems to be from a company that you have an account with, such as Microsoft, try accessing the web page described in the email by going to the actual website itself without clicking the link. 

Cyber attacks can cause network downtime, which costs your company money every minute. They can also cause a host of other problems, ranging from the risk of data breach lawsuits to loss of company reputation if sensitive information is publishe  If you're new to Calendar, you can find your Google Calendar by:

Google Calander

  1. Clicking on your account name in the right-hand corner. ...
  2. In “Settings,” you should see “Connected Calendars” — it's in-between “Notifications” and Billing.”
  3. Tap on “Calendar” and a list of the calendars that have been connected with Calendar will appear.

Thursday, May 20, 2021

Day 3 Digital Literacy Learning..20/05/2021

 Wednesday,may.19/05/2021

1*Google

-Google Docs

-Google Excel

-Google Drive(

2*Digital forms(Creating forms)

-Fill up

-share/Response 

-submit

3.Data type

-Radio Button

Dropdown list

*Digital Payment

Wednesday, May 19, 2021

History of Internet in Bhutan

 History of Internet in Bhutan.

 

On June 2nd 1999,internet and Television services were launched as part of Silver Jubilee Celebration of reign of His Majesty,King JIgme Singye Wangchuck,the Forth Druk Gyalpo.In 2003,Bhutan Telecome launched the first mobile communication services in the country.

·       Telecommunications services started in the country in 1963 as part of the implementation of country first five year plan.

·       The first step by step exchange was inaugurated  on 1st  May 1965 at Phuntsholing

·       3 separate networks were built and were not interconnected.

§  Western Bhutan linked the capital Thimphu to Phuntsholing,

§  Central Bhutan connected Trongsa to Gelephu.

§  Eastern net-work connected Tashigang to SamdrupJongkha.

-The tele-communication exchanges were of electro-mechanical type known as Strowger system,using the long distance trunk physical lines,which were of the Open Wire Carrier System

Day 2 Digital Literacy learning Notes.19-05-2021

Computer Parts List (PC Components)

  • Case.
  • Motherboard.
  • CPU [Processor]
  • GPU [Graphics Card] (if no integrated GPU)
  • RAM [Memory]
  • Storage Device (SSD, NVME SSD, HDD)
  • Cooling (CPU, Chassis)
  • PSU [Power Supply Unit]

Key note of today's learning

--Google DOCS

-Installation of Dzongkha Unicot 

-e-services

-Citizen services

-MS Excel

-Spread sheet

-Printer and preferences sharing and setting

Short Cut keys

-My computer =windowkey+E

-Close active window=alt+F4

-Change window=alt+Tab

-Minimize all=Window+M or D

-Copy=Ctrl+C

-Past=Ctrl+V

-Cut=Ctrl+X

-Undo=Ctrl+Z

-Redo=Ctrl+Y

-Run=Window+R

Window+R        Word-windword

                           Excel-excel

                           Powerpoint-Powerpnt

Note pad-notpad

Control panel-control

-Frezer panes

-wrap Tex

-Condational formating

-Filter/sort

-Data validation

-Charts/Graphs

Shortcut KeysDescription
Alt+FFile menu options in current program.
Alt+EOpen Edit options in current program.
Alt+TabSwitch between open programs.
F1View help information (F1 is used by almost every Windows program to display help).
F2Rename a selected file.
F5Refresh the current program window.
Ctrl+DBookmarks the current page in most Internet browsers.
Ctrl+NCreate a new or blank document in some software, or open a new tab in most Internet browsers.
Ctrl+OOpen a file in the current software.
Ctrl+ASelect all text.
Ctrl+BChange selected text to be bold.
Ctrl+IChange selected text to be in italics.
Ctrl+UChange selected text to be underlined.
Ctrl+FOpen find window for current document or window.
Ctrl+SSave current document file.
Ctrl+XCut selected item.
Shift+DelCut selected item.
Ctrl+CCopy selected item.
Ctrl+InsCopy selected item
Ctrl+VPaste
Shift+InsPaste
Ctrl+YRedo last action.
Ctrl+ZUndo last action.
Ctrl+KInsert hyperlink for selected text.
Ctrl+PPrint the current page or document.
HomeGoes to beginning of current line.
Ctrl+HomeGoes to beginning of document.
EndGoes to end of current line.
Ctrl+EndGoes to end of document.
Shift+HomeHighlights from current position to beginning of line.
Shift+EndHighlights from current position to end of line.
Ctrl+Left arrowMoves one word to the left at a time.
Ctrl+Right arrowMoves one word to the right at a time.
Ctrl+EscOpen the Start menu.
Ctrl+Shift+EscOpen Windows Task Manager.
Alt+F4Close the currently active program.
Alt+EnterOpen the properties for the selected item (file, folder, shortcut, etc.)

Day 5 Digital Literacy Learning.

Presentation  on Social Media using Power Point What Is Social Media? Definition and Examples of Social Media Table of Contents What Is Soci...