57
Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Staying Connected and Being Online Workshop 2015

Staying connected tech workshop 2015

Embed Size (px)

Citation preview

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Staying Connected

and

Being Online

Workshop

2015

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Photo credits: top Stanley Kubrick circa1940

Staying Connected

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Photo credits: top Stanley Kubrick circa1940 bottom Nancy Slome 1to1interactive blog

In about half a century…

plus ça change plus c'est la même chose

Staying ConnectedWhat’s changed?

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

In about a quarter a century…

Staying ConnectedWhat’s changed?

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

And in less than a decade…

Staying ConnectedWhat’s changed?

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

This workshop’s purpose is to assist older

adults demystify a digital online world

The following slides are not meant to be a

definitive set of answers to all possible

questions but triggers and reminders

Staying ConnectedBeing online

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Our grandchildren have never known a

world without mobile phones, text

messaging and the internet

We used to gather in community halls

and engage in conversations over the

back fence

What do social clubs have in common

with things like Facebook?

Staying Connectedwith each other

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

• What do you want or need to know

• Be engaged

• Stay in touch

– Text the grandchildren

– Share photos

– Use the internet

– Email

– Apps

• Choose your platform

• Make it meaningful – to you

• Understand your options

• Perceptions

– Usefulness

– Ease of use

– Trust

Staying Connectedwith each other and the world

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Get the Silver Surfers on Facebook • Experts say using social media can help prevent

decline in older adult’s health

• Older people should use Facebook and other social media websites to prevent their health declining

• People aged 65-95 took part in the study by the University of Exeter

• The group felt more confident and sociable after using the internet

• Using Skype and email to contact relatives were among their favourite usages

• Experts said the results could help stunt loneliness – Pensioners who spend time online do not feel as lonely as

others their age, which could stunt deterioration of physical and mental health, according to the research.

http://www.dailymail.co.uk/news/article-2873604/Older-people-use-Facebook-social-media-prevent-decline-health-study-finds.html#ixzz3SKzq2tRV

Staying ConnectedAvoiding social isolation

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Staying ConnectedBeing online

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Are you connected using a mobile device?– I bet it doesn’t look like these

– It’s probably a bit more like these

Staying ConnectedUsing mobiles and other wireless devices

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

A few tips when using phones and tablets1. Turn off Bluetooth unless you need it

2. Disable automatic updates when on WiFi

3. Clear your phone or tablet of any texts from your bank

4. Never disclose financial information via text or email

5. Don’t save PINs, logins or passwords on your device

6. Use different PINs or passwords for unlocking your device

7. Avoid public Wi-Fi for online banking or shopping

8. Contact your bank if you lose your smart phone or tablet if

you receive bank updates via SMS message

9. Keep your software and apps up to date

10. When disposing of devices give them to a technology

recycling service like Mobile Muster for safe, secure and

proper breaking down and recycling of the components

http://www.netsafe.org.nz/how-to-keep-your-mobile-devices-safe-and-secure/

Staying ConnectedUsing mobiles and other wireless devices

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

• Writing and sending a text message is basically

the same on all mobiles but the functionality will

vary from phone to phone

– From the phone’s menu select ‘messaging’ (the menu

item name may vary phone to phone)

– Select ‘new message’ or ‘compose’ or similar

– Enter the recipient’s phone number or select it from your

‘contacts’ or ‘address book’

– Type in the message

– Press ‘send’

• One text message or SMS is 160 characters

– If you type more than 160 characters it may send as one

message but it will be charged as two

• When replying to text messages, the procedure

may vary phone by phone. However, with the

original text message open …– Click on ‘options’

– Click on reply

– Type in your answer/message

– Press send

Staying ConnectedText messaging

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Google Hangouts are

video calls or IM chat

and it’s very simple to

use. You just need

Gmail or Google+

Viber uses your phone

number and the phone

numbers of your

contacts in your phone

You create a Skype

addresses which finds

you just like your phone

number does

Use the Skype chat

window for IM chat

(Instant Messages )

Or use Viber or Kik for

IM on mobile. It looks

and works like text

messaging but its free

Staying ConnectedVideo calling and Instant Messaging

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Skype1. Skype addresses find you just like a phone number

2. Use the Skype chat window for IM, Instant Messages

3. Parts of Skype profiles are seen by everyone on Skype.

4. Do not put details in your profile you don’t want public

5. You don’t have to fill in your profile if you do not want to

6. You can change your profile at any time

7. To update your settings on a PC open Skype click Tools

> Options > Privacy. On Mac it's > Preferences > Privacy

Viber1. If you use Viber for IM on mobile. It looks and works like

text messaging and uses your phone number and the

phone numbers of your contacts in your phone

2. In Settings you adjust privacy, accessing contacts etc

Google Hangouts1. Google Hangouts are video calls or IM chat and it’s very

simple to use. You just need Gmail or Google+

Staying ConnectedVideo calling and Instant Messaging

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Connect a wireless router to your internet at

home to create your own ‘private’ WiFi

network

Consider using your own portable WiFiYou can take it anywhere (including overseas)

It will work anywhere there is a mobile network

You can connect multiple devices to it

It is just as secure as your private WiFi

All network providers have them available

Staying ConnectedWiFi: Private, Portable and Public

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Too many plans to choose from so…

– Keep the decision making simple

– Just ask for something basic

– A data plans vary in their price per Mb

– Consider pre-paid

Data plans and WiFi– If you want to use your phone for email or internet you

need a data plan and / or use WiFi at home or while out

– Make sure you have data and MMS set up if you want to send and receive pictures by message

– Ask how to switch data on and off when using the carrier network

– When travelling overseas make sure you have the right data plan

What to look for in a Service Provider / Carrier– There is nothing tricky to look out for keep it simple

– Ask about coverage and check with friends in your area.

– You need to double check the coverage and the plan if you travel a lot around Australia or overseas

Staying ConnectedWiFi: Private, Portable and Public

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Using public wireless networks1. Libraries, fast-food outlets, airports etc have safe WiFi

2. Avoid using WiFi run by people you don't know or trust

3. Always connect as 'public' when using public WiFi

4. Turn off sharing

5. Be aware of your surroundings

6. Be careful about what you do online

7. Avoid banking, shopping or using important passwords

8. If possible use secure URLs https:// instead of http://

9. Always log out and close your browser when finished

10. Disable wireless networking when you are not using it

Staying ConnectedWiFi: Private, Portable and Public

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Staying Connected‘The Cloud’

The Cloud is the use of remote servers

networked together to allow data storage

and online access to resources and

services. Things like:

– Google Drive, One Drive, iCloud, DropBox, etc

– Accounting like Xero and MYOB etc

– Photos stored for sharing - Flickr, Picasa etc

– Music - Spotify, Pandora, iTunes, Beats etc

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Staying Connected‘The Cloud’

I have stored this set of slides

in the cloud

– It is in Dropbox so I can access

it while mobile if I want to

– And it can be downloaded from

Dropbox if I invite people to

share that particular Dropbox

folder

– It can also be downloaded from

the cloud by anyone who has

the link to it in SlideShare• http://www.slideshare.net/bradatslice/st

aying-connected-tech-workshop-2015

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

The Cloud1. Backing up, storing and/or sharing via the cloud is

reasonably safe for files you don’t want to lose if your PC

is lost or destroyed

2. Do not back up sensitive information to the cloud

Sharing1. Never open an attachment from a source you don't know

2. Peer-to-peer (P2P) file sharing carries risks including

potential breaches of copyright

Storing1. Never insert a used removable storage device unless

you a) know where it came from and b) have up to date

ant-virus software installed

2. Backup your important personal and critical files (and

those photos you cherish) onto an external hard drive

Staying Connected‘The Cloud’

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Staying ConnectedSocial Media

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

We’ve been writing on ‘walls’ for centuries

These are from Pompeii 79AD

Staying ConnectedSocial Media

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

• Sometimes called

Social Networking – in

fact that’s what you do

on Social Media

• People connect in

different ways on

different sites

• Some sites are

designed for special

purposes - like

sharing video or

pictures or just things

you like

Staying ConnectedSocial Media

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Which of these do you use?

OR you would like to use?

OR you would like to know more about?

Setting up accounts is very similar for any

online social platform all you need is an

email address

AND/OR Once you have Twitter or

Facebook you can usually use either to set

up and login to other platforms

Staying ConnectedSocial Media

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

• Facebook is about staying in touch with

people you know and for catching up with

friends you used to know

• Twitter is for following people you don’t

know, would like to know, or should know

• LinkedIn is a combination of both but

used for business and recruitment

• Instagram is primarily for sharing day-to-

day images and short videos

• Tumblr is a blogging platform that allows

you to do all of the above

• Pinterest is all about sharing things you

like on a virtual pin board . It’s a bit like

scrap-booking

Staying ConnectedSocial Media

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

SnapchatWith this app you can take

photos, record videos, add

text, or draw things, then

send them to a controlled

list of friends. And the post

only stays up for a few

seconds

KikKik Messenger is an instant

messaging app for most

mobile devices which

allows you to avoid the text

messaging system

And there are apps for fans of all sorts of things from

Celebrities to Music and Video

Staying ConnectedSocial Media

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

The things you write and upload to the

internet, especially on social media

platforms, may not always be secure• It’s important to understand how to use the privacy

features these social media sites have to offer

• Remember, each platform has its own settings, and some

are more complicated than others.

Let’s start with Facebook

Staying ConnectedSocial Media

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Facebook is probably the platform used by

most which requires a good initial privacy

set-up then an occasional check-up

Facebook Privacy Tab1. Click the lock icon

2. Go to Privacy Settings and Tools

3. Check “Who can see my stuff?”

4. Adjust things like who can send friend requests, who can

tag you and how people can find you

5. Little known: you can limit the audience for old posts

Facebook Profile Settings1. Next, update your privacy settings on your profile

2. Click About on your profile to view basic information

3. Click the icon left of ‘Edit’ You can set privacy for each

Facebook Photo Settings1. You can go back to check settings by album or image

2. For albums: click audience indicator on the bottom right

3. For images uploaded individually click each image and

enter the privacy setting

Staying ConnectedSocial Media

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Instagram1. Open your Instagram mobile app tap the user icon

2. Tap Edit Your Profile and scroll down

3. Toggle private profiles on and off

4. Private means only accepted followers see your photos

Twitter1. Open the Settings menu. Click Security and Privacy

2. Select Protect my Tweets if you want to approve each

follower instead of allowing anyone to read your tweets

Pinterest1. Click on your name, Select Account Settings

2. Change the Search Privacy to “yes” if you don’t want

your pins to show up in search engines

3. You can also create secret boards The option is at the

bottom of your board screen

LinkedIn1. Go to Settings in the top right corner (your profile

picture) and select Review next to Privacy & Settings

Google+1. The Settings menu is found on the left side of the screen

Staying ConnectedSocial Media

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Think of Twitter as being a bit like talk-

back radio… on steroids!

ABC Radio uses Twitter extensively now.

Take sport for example. ABC Grandstand

is on both Twitter and Facebook

Commercial TV News Variety and

Current Affairs programmes use them too

Staying ConnectedSocial Media

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

• You can use Twitter on the Web or Mobile

• Or use a downloadable application which operates like

a dashboard making it easier filter topics

• You can also look at Twitter accounts without having an

account yourself

• Or you can set up at Twitter.com

– Use your own name or a nick name Upload a photo

and a bio

• Follow people

– Celebrities, politicians, anyone of personal interest

• Follow topics or events often grouped together by using

what is known as a hash tag

• Filter your timeline by creating lists of groups of people

you follow or topics you are interested in

• Your timeline is what you see when you log on

– It’s the tweets being posted by the people you

follow going up in real time

• Notifications, Mentions and Replies are public

engagements with others

• Direct Messages ‘DM’s are private

• Have your say: Write your first Tweet

Staying ConnectedSocial Media

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

The Trading Post is only online now and

others too like Gumtree and Craig’s List

Staying ConnectedBanking Shopping and Apps

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

There are apps for almost anything…– Your doctor or healthcare professional will

soon offer you Telehealth options using video

calling and a smart phone app

– You can make Medicare claims via your smart

phone or tablet (you’ll need a My.Gov login

but once done it’s pretty easy)

– You can do all your banking online and on

mobile with apps

– eBay and PayPal both have apps

Staying ConnectedBanking Shopping and Apps

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Using Internet banking1. It is safest to type the bank’s URL into the browser

2. It’s best to memorise your password

3. Banks using non-keystroke passcodes are safest

especially in public places or on shared PCs

4. Always log out when you are finished

Shopping1. Use common sense. Trust your instincts

2. Know who you are dealing with

3. Know what you are buying

4. Know what currency you are using

5. On auction websites always deal within the site

6. Avoid private contact with sellers - scammers will often

use this ploy to 'offer a better deal'

7. Only pay on a secure web page https:// not http://

8. Avoid money transfers and direct debit

9. Use secure payment methods like PayPal or credit card

10. Consider ‘MasterCard SecureCode’ or ‘Verified by Visa’

Staying ConnectedBanking Shopping and Apps

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Downloading apps…1. Each device operating system (OS) has a way to

download apps – Google Play (Android) and iTunes

(Apple iOS) Windows Store (Windows 8) for example

2. This is not the app’s source The source is the developer

3. Check the app’s source, its ratings and reviews

4. You can download apps when you are online or mobile

5. For each ‘store’ you will need a login ID

6. Once you have selected an app you can download it

directly to your mobile device or to your PC/Mac and

then transfer it to your mobile device with a ‘sync’ - by

synchronising the device with your PC/Mac

Staying ConnectedBanking Shopping and Apps

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

How many passwords do you have?• How do you remember them?

• Make them easy to remember but not simple

• Never store them online

Is your screen locked?• Should it be locked?

• If you often leave your device unattended and ‘on’ lock it

Staying ConnectedPasswords

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Staying ConnectedIdentity theft. Myths and Mysteries

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

A few simple myths1. Cybersecurity is unlike any challenge we have faced

Not so Imagine how it felt in the Victorian era with the

introduction of the motor vehicle and the telegraph

2. Every Day We Face “Millions of Cyber Attacks”

Maybe so. However, counting individual attacks is like

counting bacteria but all we really care about is the impact

and the source

3. This Is a Technology Problem

So, so. Technology, yes however all too often, the problem

exists between the chair and the keyboard

“Having a sense of history can guide our

responses to the novelties of our own era”http://www.wired.com/2014/07/debunking-5-major-cyber-security-myths/

Staying ConnectedIdentity theft. Myths and Mysteries

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Install and activate anti-virus, anti-spyware

software and install or activate a firewall

Adware and Spyware1. These are information gathering software typically used

for advertisers but they gather information secretly

2. Adware is the software used to assist advertisers place

relevant ads onto the pages you visit

3. These may not be as bad as they sound. They may be

annoying but they are rarely malicious viruses

4. Most top brand anti-virus software will prevent your PC

from being attacked by these

5. Never click on those pop-up ads that say things like your

computer may be at risk or run a scan now etc

Staying ConnectedOnline Safety and Security

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Spam clogs up your email inbox and can

include scams and phishing expeditions but

there’s little you can do other than be alert

and use common sense

Scams1. If it sounds too good to be true…

Phishing1. These are emails purporting to come from a valid source

like your bank or Australia Post

2. Do not open them.

3. Never click on links or provide information

Staying ConnectedOnline Safety and Security

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Online dating is just dating. However it is

important to treat it the same way you

treated meeting people in any social

environment1. Keep your personal information private

2. Only meet offline when you are ready and not before

3. Do not get financially involved online

Staying ConnectedDating

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

As it sounds, they are photos of yourself

usually taken by yourself…

…or with others hence ‘selfie’

https://www.facebook.com/ellentv/photos/a.182755292239.124686.26012002239/10152299789332240/?type=1&theater

Staying ConnectedSelfies

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Staying ConnectedTerminology

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Account harvestingThe illegal practice of collecting email accounts from information in the

public domain

AdwareSoftware that is covertly installed on your computer and designed to

deliver advertisements or other content which encourages you to

purchase goods or services.

AntivirusSoftware that is designed to prevent infection from computer viruses.

BotA single compromised computer (a robot computer), sometimes called

a zombie.

BrowserA software application that enables the retrieval and presentation of

websites and other internet resources.

Browser hijackingA symptom of a malware infection in which your browser persistently

redirects to fraudulent web sites, usually in an attempt to extort money

CookieA string of text stored by your web browser enabling a website to

remember you and your personal settings.

Staying ConnectedSafety and Security

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Digital certificateA way for browsers to verify the identity and authenticity of a website. A

digital certificate is issued to a website by a trusted third party

certificate authority.

Domain Name System (DNS)A hierarchical naming system for resources connected to the internet.

The DNS translates domain names to numerical identifiers (IP

addresses) which are readable to networking equipment, allowing the

routing of data from one point on the internet to another.

EncryptionThe process of transforming documents and files for safe transmission

over a public network. The information is then converted or deciphered

back into its original format.

FirewallHardware or software which monitors information going in and out of

your computer or network.

FreewareCopyrighted computer software which is made available for use free of

charge, for an unlimited time.

HackerSomeone who attempts to gain unauthorized access to a computer

system, often for fraudulent purposes.

HotspotAn area in which Wi-Fi is available to the general public as a wireless

local area network, as in a coffee shop.

Staying ConnectedSafety and Security

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Identity theftUse of personal details by someone else to deceive, to support some

type of crime, or even just to play a joke. Identity theft is a form of

identity crime (where somebody uses a false identity to commit a

crime).

Internet Service Provider (ISP)A company that provides access to the internet.

Keystroke loggerA malware program hidden on a computer that records and 'logs' each

key the you press. It is used to record your personal data, e.g.

usernames, passwords, credit card and bank account numbers which

is then sent to the malware operator without your knowledge.

Malicious software (malware)A catch-all term used to describe software designed to be installed into

a computer system for the purpose of causing harm to the you or

others. This would include viruses, spyware, trojans, worms, etc.

NFCNear Field Communications – the technology used for PayPass

PadlockA padlock display in a browser is intended to indicate a secure

connection or website, although it may not always be a reliable

indicator. Users should look instead for 'HTTPS'.

Peer-to-peer file sharing network (P2P)A decentralized file sharing system. Files are stored on and served by

the personal computers of the users.

Staying ConnectedSafety and Security

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

PharmingA way of harvesting personal information, where a hacker puts a

malicious code on your computer that redirects you to a fake site.

Phishing (email/website)Phishing refers to fraudulent email messages or web sites used to gain

access to personal information for illegal purposes such as transferring

funds or purchasing goods over the internet.

Pop-upA pop-up is a small window, which suddenly appears (pops-up) in the

foreground of the normal screen.

Privacy settingsSettings which control how a user's data is shared with other people or

systems. Privacy settings apply to web browsers and social networking

services.

RansomwareMalware which handicaps computer functionality, e.g. through browser

hijacking or encrypting personal data, and offers to restore the

functionality for a fee.

Remote accessCommunication with a computer or network from a remote location

through a link such as the internet or mobile phone.

ScamA commonly used term to describe a confidence trick, relying on email

or a website to deliver the trick to unsuspecting users.

Staying ConnectedSafety and Security

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

ScarewareMalware that causes frightening messages to appear, e.g. that your

computer is infected with malware or that you are guilty of a crime, and

attempts to extort money from you to resolve the alleged issue. Similar

to ransomware.

Secure Socket Layer (SSL)The most widely used security protocol on the internet, used for online

banking and shopping sites. Website digital certificates are commonly

implemented through SSL. The presence of 'https' in the

browseraddress bar demonstrates that the connection between the

your computer and the website is encrypted. However, 'https' can still

be present when connecting to a website with an invalid digital

certificate.

SpamUnsolicited email. Most email spam is commercial advertising, often for

dubious products, get-rich-quick schemes, or illegal services. Users

are advised that if an offer in an email appears too good to be true then

it probably is and should not be actioned in any way.

SpywareSoftware that is covertly installed on a computing device and takes

information from it without your the consent or knowledge of the user.

Trojan horseMalicious code which is hidden in a computer program or file that may

appear to be useful, interesting, or at the very least harmless to you

when using your computer. When this computer program or file is run,

the malicious code is also triggered, resulting in the set up or

installation of malware.

Staying ConnectedSafety and Security

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

URLUniversal Resource Locator is the technical term for the address

(location) of an internet resource on the internet such as a website or

image within a website.

USB stickUniversal Serial Bus. A small piece of hardware which stores data,

sometimes called a jump drive, thumb drive or flash drive.

VirusMalware designed to infect and corrupt a computer and to copy itself.

Viruses can disrupt programs installed on a computer.

VoIPThe routing of real time voice conversations (telephone calls) over the

internet rather than over an analog or circuit switched network.

Wi-FiA set of wireless communication protocols that can transmit traffic to

Wi-Fi-enabled devices within a local area. A Wi-Fi-enabled device such

as a laptop or mobile device can connect to the internet when within

range of a wireless network connected to the internet. An area covered

by one or more Wi-Fi access points is commonly called a hotspot.

WormA self-replicating virus that does not alter files but resides in active

memory and duplicates itself.

ZombieA compromised computer

Staying ConnectedSafety and Security

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

• 3G and 4G– Generic term for most modern high speed mobile

networks• # or “hash” key

– You are often asked to press the hash key after entering numbers into automated systems

• Android– A new phone & operating system from Google which

competes with iPhone • Blackberry

– A type of mobile phone that is designed primarily for sending and receiving email as its main feature

• Bluetooth– Personal or close range radio frequency (RF) network

• Broadband

– High speed internet

• Cellular

– Generically it’s the current type of mobile phone network

• Cell-phone

– Just another term for a mobile phone

• Desk Top

– The main or home screen of your PC or phone

• GSM

– Generic term for mobile network (originally Groupe

Speciale Mobile then Global System for Mobile)

Staying ConnectedTerminology

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

• ICE

– In Case of Emergency

• iPad – also known as a tablet

– Apple Corporation’s touch-screen mobile computing

device with internet access

• Java

– A type of software often used in phones

• Multi-media

– Generic term for pictures and video as opposed to simple

text

• MMS

– A message with a picture in it sent from phone to phone

(Multi-Media Service)

•PDA

– Generic term for a phone with its main feature being a

diary/calendar, notes, and detailed contact list (Personal

Digital Assistant)

• Predictive Text & Auto-Correct

– A feature in most mobiles that predicts the word you are

typing in as you type

• Premium Text Message

– A normal text message that’s charged at a higher rate –

for example voting on TV shows usually costs 55c

• QWERTY

– Typewriter style key pad layout

Staying ConnectedTerminology

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

• RF

– Radio frequency

• SMS often called a Text

– A short message typed into a phone and sent to another phone (Short Message Service)

• Smart Phone

– Generic term for a phone with advanced PDA and internet services installed

• Texting

– Same as SMS (SMS-ing)

• URL

– The “www” address you type into an internet browser to go to a web site (Uniform Resource Locator)

• Voicemail

– A message left on an automatic answering machine usually built into the mobile network

• Wallpaper

– The background image on the ‘desk-top’ or screen of your phone or PC

• WAP

– An old generic term for mobile internet – a WAP site is a mobile internet site

Staying ConnectedTerminology

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

• Avatar

– Usually the image you put up of yourself in your social

media site’s profile

• Blog (or web log)

– A blog is a frequently updated website consisting of dated

entries arranged in reverse chronological order - most

recent post first.

• Chat & Chat rooms

– Web-based text conversation - not always but often in

real time (often called IM & vice versa)

– Dedicated chat sites about a specific subject

• IM (Instant Message)

– A real-time personal message sent between two or more

users typically fast moving

– IM is possible withGmail, MSN, Skype, Viber and on many

sites like Facebook (called chat)

• Mashup

– Website or application that uses content from more than

one source to create a completely new service or

presentation of the content

• MSN Messenger

– An Instant Message service or application

Staying ConnectedTerminology

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

• Podcast

– An audio blog or recording of (say) a radio programme.

You don't have to have an Apple, iPod to listen to a

podcast; you can also listen to podcasts on a PC, or many

mp3 players.

• Post or Posting

– A message added to an online discussion, or an update to

your social media site status, commenting on a blog,

writing on a Facebook ‘Wall’.

• Skype

– The worlds largest Voice over IP application which can be

used for instant messaging and file transfers between

users

• Status update

– A message you write about yourself on your own social

media site – like Facebook

• Tag or Tagging

– Tags are the keywords people add to articles or photos in

a blog or to web pages to assist in search and

identification (Photos can be tagged in Facebook to help

identifying people)

• Thread

– A series of posts on a single topic

Staying ConnectedTerminology

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

• Tweet

– A posting to Twitter – must be 140 characters or less

• Upload

– Copying a file from a hard drive to a website or application

thus making the file available to other members of the

same site or application.

• VoIP - Voice over IP (Internet Protocol)

– Enabling people to use the internet as the transmission

medium for telephone calls

– One advantage of VoIP is that calls over the Internet do

not incur a surcharge beyond what the user is paying for

Internet access.

• Widget

– A little “Window Gadget” downloadable to your PC

allowing access to another programme or application

• Wiki

– A Wiki is a website that allows users to freely create and

edit the website content themselves.

• Wikipedia

– A website information service like an encyclopaedia

entirely created by users

Staying ConnectedTerminology

Copyright Brad Keeling and Slice Wireless Pty Limited 2015

Workshop

Good Luck