Upload
brad-keeling
View
551
Download
2
Tags:
Embed Size (px)
Citation preview
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
and
Being Online
Workshop
2015
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Photo credits: top Stanley Kubrick circa1940
Staying Connected
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Photo credits: top Stanley Kubrick circa1940 bottom Nancy Slome 1to1interactive blog
In about half a century…
plus ça change plus c'est la même chose
Staying ConnectedWhat’s changed?
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
In about a quarter a century…
Staying ConnectedWhat’s changed?
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
And in less than a decade…
Staying ConnectedWhat’s changed?
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
This workshop’s purpose is to assist older
adults demystify a digital online world
The following slides are not meant to be a
definitive set of answers to all possible
questions but triggers and reminders
Staying ConnectedBeing online
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Our grandchildren have never known a
world without mobile phones, text
messaging and the internet
We used to gather in community halls
and engage in conversations over the
back fence
What do social clubs have in common
with things like Facebook?
Staying Connectedwith each other
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• What do you want or need to know
• Be engaged
• Stay in touch
– Text the grandchildren
– Share photos
– Use the internet
– Apps
• Choose your platform
• Make it meaningful – to you
• Understand your options
• Perceptions
– Usefulness
– Ease of use
– Trust
Staying Connectedwith each other and the world
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Get the Silver Surfers on Facebook • Experts say using social media can help prevent
decline in older adult’s health
• Older people should use Facebook and other social media websites to prevent their health declining
• People aged 65-95 took part in the study by the University of Exeter
• The group felt more confident and sociable after using the internet
• Using Skype and email to contact relatives were among their favourite usages
• Experts said the results could help stunt loneliness – Pensioners who spend time online do not feel as lonely as
others their age, which could stunt deterioration of physical and mental health, according to the research.
http://www.dailymail.co.uk/news/article-2873604/Older-people-use-Facebook-social-media-prevent-decline-health-study-finds.html#ixzz3SKzq2tRV
Staying ConnectedAvoiding social isolation
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Are you connected using a mobile device?– I bet it doesn’t look like these
– It’s probably a bit more like these
Staying ConnectedUsing mobiles and other wireless devices
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
A few tips when using phones and tablets1. Turn off Bluetooth unless you need it
2. Disable automatic updates when on WiFi
3. Clear your phone or tablet of any texts from your bank
4. Never disclose financial information via text or email
5. Don’t save PINs, logins or passwords on your device
6. Use different PINs or passwords for unlocking your device
7. Avoid public Wi-Fi for online banking or shopping
8. Contact your bank if you lose your smart phone or tablet if
you receive bank updates via SMS message
9. Keep your software and apps up to date
10. When disposing of devices give them to a technology
recycling service like Mobile Muster for safe, secure and
proper breaking down and recycling of the components
http://www.netsafe.org.nz/how-to-keep-your-mobile-devices-safe-and-secure/
Staying ConnectedUsing mobiles and other wireless devices
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Writing and sending a text message is basically
the same on all mobiles but the functionality will
vary from phone to phone
– From the phone’s menu select ‘messaging’ (the menu
item name may vary phone to phone)
– Select ‘new message’ or ‘compose’ or similar
– Enter the recipient’s phone number or select it from your
‘contacts’ or ‘address book’
– Type in the message
– Press ‘send’
• One text message or SMS is 160 characters
– If you type more than 160 characters it may send as one
message but it will be charged as two
• When replying to text messages, the procedure
may vary phone by phone. However, with the
original text message open …– Click on ‘options’
– Click on reply
– Type in your answer/message
– Press send
Staying ConnectedText messaging
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Google Hangouts are
video calls or IM chat
and it’s very simple to
use. You just need
Gmail or Google+
Viber uses your phone
number and the phone
numbers of your
contacts in your phone
You create a Skype
addresses which finds
you just like your phone
number does
Use the Skype chat
window for IM chat
(Instant Messages )
Or use Viber or Kik for
IM on mobile. It looks
and works like text
messaging but its free
Staying ConnectedVideo calling and Instant Messaging
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Skype1. Skype addresses find you just like a phone number
2. Use the Skype chat window for IM, Instant Messages
3. Parts of Skype profiles are seen by everyone on Skype.
4. Do not put details in your profile you don’t want public
5. You don’t have to fill in your profile if you do not want to
6. You can change your profile at any time
7. To update your settings on a PC open Skype click Tools
> Options > Privacy. On Mac it's > Preferences > Privacy
Viber1. If you use Viber for IM on mobile. It looks and works like
text messaging and uses your phone number and the
phone numbers of your contacts in your phone
2. In Settings you adjust privacy, accessing contacts etc
Google Hangouts1. Google Hangouts are video calls or IM chat and it’s very
simple to use. You just need Gmail or Google+
Staying ConnectedVideo calling and Instant Messaging
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Connect a wireless router to your internet at
home to create your own ‘private’ WiFi
network
Consider using your own portable WiFiYou can take it anywhere (including overseas)
It will work anywhere there is a mobile network
You can connect multiple devices to it
It is just as secure as your private WiFi
All network providers have them available
Staying ConnectedWiFi: Private, Portable and Public
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Too many plans to choose from so…
– Keep the decision making simple
– Just ask for something basic
– A data plans vary in their price per Mb
– Consider pre-paid
Data plans and WiFi– If you want to use your phone for email or internet you
need a data plan and / or use WiFi at home or while out
– Make sure you have data and MMS set up if you want to send and receive pictures by message
– Ask how to switch data on and off when using the carrier network
– When travelling overseas make sure you have the right data plan
What to look for in a Service Provider / Carrier– There is nothing tricky to look out for keep it simple
– Ask about coverage and check with friends in your area.
– You need to double check the coverage and the plan if you travel a lot around Australia or overseas
Staying ConnectedWiFi: Private, Portable and Public
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Using public wireless networks1. Libraries, fast-food outlets, airports etc have safe WiFi
2. Avoid using WiFi run by people you don't know or trust
3. Always connect as 'public' when using public WiFi
4. Turn off sharing
5. Be aware of your surroundings
6. Be careful about what you do online
7. Avoid banking, shopping or using important passwords
8. If possible use secure URLs https:// instead of http://
9. Always log out and close your browser when finished
10. Disable wireless networking when you are not using it
Staying ConnectedWiFi: Private, Portable and Public
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected‘The Cloud’
The Cloud is the use of remote servers
networked together to allow data storage
and online access to resources and
services. Things like:
– Google Drive, One Drive, iCloud, DropBox, etc
– Accounting like Xero and MYOB etc
– Photos stored for sharing - Flickr, Picasa etc
– Music - Spotify, Pandora, iTunes, Beats etc
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected‘The Cloud’
I have stored this set of slides
in the cloud
– It is in Dropbox so I can access
it while mobile if I want to
– And it can be downloaded from
Dropbox if I invite people to
share that particular Dropbox
folder
– It can also be downloaded from
the cloud by anyone who has
the link to it in SlideShare• http://www.slideshare.net/bradatslice/st
aying-connected-tech-workshop-2015
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
The Cloud1. Backing up, storing and/or sharing via the cloud is
reasonably safe for files you don’t want to lose if your PC
is lost or destroyed
2. Do not back up sensitive information to the cloud
Sharing1. Never open an attachment from a source you don't know
2. Peer-to-peer (P2P) file sharing carries risks including
potential breaches of copyright
Storing1. Never insert a used removable storage device unless
you a) know where it came from and b) have up to date
ant-virus software installed
2. Backup your important personal and critical files (and
those photos you cherish) onto an external hard drive
Staying Connected‘The Cloud’
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
We’ve been writing on ‘walls’ for centuries
These are from Pompeii 79AD
Staying ConnectedSocial Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Sometimes called
Social Networking – in
fact that’s what you do
on Social Media
• People connect in
different ways on
different sites
• Some sites are
designed for special
purposes - like
sharing video or
pictures or just things
you like
Staying ConnectedSocial Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Which of these do you use?
OR you would like to use?
OR you would like to know more about?
Setting up accounts is very similar for any
online social platform all you need is an
email address
AND/OR Once you have Twitter or
Facebook you can usually use either to set
up and login to other platforms
Staying ConnectedSocial Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Facebook is about staying in touch with
people you know and for catching up with
friends you used to know
• Twitter is for following people you don’t
know, would like to know, or should know
• LinkedIn is a combination of both but
used for business and recruitment
• Instagram is primarily for sharing day-to-
day images and short videos
• Tumblr is a blogging platform that allows
you to do all of the above
• Pinterest is all about sharing things you
like on a virtual pin board . It’s a bit like
scrap-booking
Staying ConnectedSocial Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
SnapchatWith this app you can take
photos, record videos, add
text, or draw things, then
send them to a controlled
list of friends. And the post
only stays up for a few
seconds
KikKik Messenger is an instant
messaging app for most
mobile devices which
allows you to avoid the text
messaging system
And there are apps for fans of all sorts of things from
Celebrities to Music and Video
Staying ConnectedSocial Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
The things you write and upload to the
internet, especially on social media
platforms, may not always be secure• It’s important to understand how to use the privacy
features these social media sites have to offer
• Remember, each platform has its own settings, and some
are more complicated than others.
Let’s start with Facebook
Staying ConnectedSocial Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Facebook is probably the platform used by
most which requires a good initial privacy
set-up then an occasional check-up
Facebook Privacy Tab1. Click the lock icon
2. Go to Privacy Settings and Tools
3. Check “Who can see my stuff?”
4. Adjust things like who can send friend requests, who can
tag you and how people can find you
5. Little known: you can limit the audience for old posts
Facebook Profile Settings1. Next, update your privacy settings on your profile
2. Click About on your profile to view basic information
3. Click the icon left of ‘Edit’ You can set privacy for each
Facebook Photo Settings1. You can go back to check settings by album or image
2. For albums: click audience indicator on the bottom right
3. For images uploaded individually click each image and
enter the privacy setting
Staying ConnectedSocial Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Instagram1. Open your Instagram mobile app tap the user icon
2. Tap Edit Your Profile and scroll down
3. Toggle private profiles on and off
4. Private means only accepted followers see your photos
Twitter1. Open the Settings menu. Click Security and Privacy
2. Select Protect my Tweets if you want to approve each
follower instead of allowing anyone to read your tweets
Pinterest1. Click on your name, Select Account Settings
2. Change the Search Privacy to “yes” if you don’t want
your pins to show up in search engines
3. You can also create secret boards The option is at the
bottom of your board screen
LinkedIn1. Go to Settings in the top right corner (your profile
picture) and select Review next to Privacy & Settings
Google+1. The Settings menu is found on the left side of the screen
Staying ConnectedSocial Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Think of Twitter as being a bit like talk-
back radio… on steroids!
ABC Radio uses Twitter extensively now.
Take sport for example. ABC Grandstand
is on both Twitter and Facebook
Commercial TV News Variety and
Current Affairs programmes use them too
Staying ConnectedSocial Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• You can use Twitter on the Web or Mobile
• Or use a downloadable application which operates like
a dashboard making it easier filter topics
• You can also look at Twitter accounts without having an
account yourself
• Or you can set up at Twitter.com
– Use your own name or a nick name Upload a photo
and a bio
• Follow people
– Celebrities, politicians, anyone of personal interest
• Follow topics or events often grouped together by using
what is known as a hash tag
• Filter your timeline by creating lists of groups of people
you follow or topics you are interested in
• Your timeline is what you see when you log on
– It’s the tweets being posted by the people you
follow going up in real time
• Notifications, Mentions and Replies are public
engagements with others
• Direct Messages ‘DM’s are private
• Have your say: Write your first Tweet
Staying ConnectedSocial Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
The Trading Post is only online now and
others too like Gumtree and Craig’s List
Staying ConnectedBanking Shopping and Apps
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
There are apps for almost anything…– Your doctor or healthcare professional will
soon offer you Telehealth options using video
calling and a smart phone app
– You can make Medicare claims via your smart
phone or tablet (you’ll need a My.Gov login
but once done it’s pretty easy)
– You can do all your banking online and on
mobile with apps
– eBay and PayPal both have apps
Staying ConnectedBanking Shopping and Apps
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Using Internet banking1. It is safest to type the bank’s URL into the browser
2. It’s best to memorise your password
3. Banks using non-keystroke passcodes are safest
especially in public places or on shared PCs
4. Always log out when you are finished
Shopping1. Use common sense. Trust your instincts
2. Know who you are dealing with
3. Know what you are buying
4. Know what currency you are using
5. On auction websites always deal within the site
6. Avoid private contact with sellers - scammers will often
use this ploy to 'offer a better deal'
7. Only pay on a secure web page https:// not http://
8. Avoid money transfers and direct debit
9. Use secure payment methods like PayPal or credit card
10. Consider ‘MasterCard SecureCode’ or ‘Verified by Visa’
Staying ConnectedBanking Shopping and Apps
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Downloading apps…1. Each device operating system (OS) has a way to
download apps – Google Play (Android) and iTunes
(Apple iOS) Windows Store (Windows 8) for example
2. This is not the app’s source The source is the developer
3. Check the app’s source, its ratings and reviews
4. You can download apps when you are online or mobile
5. For each ‘store’ you will need a login ID
6. Once you have selected an app you can download it
directly to your mobile device or to your PC/Mac and
then transfer it to your mobile device with a ‘sync’ - by
synchronising the device with your PC/Mac
Staying ConnectedBanking Shopping and Apps
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
How many passwords do you have?• How do you remember them?
• Make them easy to remember but not simple
• Never store them online
Is your screen locked?• Should it be locked?
• If you often leave your device unattended and ‘on’ lock it
Staying ConnectedPasswords
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying ConnectedIdentity theft. Myths and Mysteries
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
A few simple myths1. Cybersecurity is unlike any challenge we have faced
Not so Imagine how it felt in the Victorian era with the
introduction of the motor vehicle and the telegraph
2. Every Day We Face “Millions of Cyber Attacks”
Maybe so. However, counting individual attacks is like
counting bacteria but all we really care about is the impact
and the source
3. This Is a Technology Problem
So, so. Technology, yes however all too often, the problem
exists between the chair and the keyboard
“Having a sense of history can guide our
responses to the novelties of our own era”http://www.wired.com/2014/07/debunking-5-major-cyber-security-myths/
Staying ConnectedIdentity theft. Myths and Mysteries
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Install and activate anti-virus, anti-spyware
software and install or activate a firewall
Adware and Spyware1. These are information gathering software typically used
for advertisers but they gather information secretly
2. Adware is the software used to assist advertisers place
relevant ads onto the pages you visit
3. These may not be as bad as they sound. They may be
annoying but they are rarely malicious viruses
4. Most top brand anti-virus software will prevent your PC
from being attacked by these
5. Never click on those pop-up ads that say things like your
computer may be at risk or run a scan now etc
Staying ConnectedOnline Safety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Spam clogs up your email inbox and can
include scams and phishing expeditions but
there’s little you can do other than be alert
and use common sense
Scams1. If it sounds too good to be true…
Phishing1. These are emails purporting to come from a valid source
like your bank or Australia Post
2. Do not open them.
3. Never click on links or provide information
Staying ConnectedOnline Safety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Online dating is just dating. However it is
important to treat it the same way you
treated meeting people in any social
environment1. Keep your personal information private
2. Only meet offline when you are ready and not before
3. Do not get financially involved online
Staying ConnectedDating
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
As it sounds, they are photos of yourself
usually taken by yourself…
…or with others hence ‘selfie’
https://www.facebook.com/ellentv/photos/a.182755292239.124686.26012002239/10152299789332240/?type=1&theater
Staying ConnectedSelfies
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Account harvestingThe illegal practice of collecting email accounts from information in the
public domain
AdwareSoftware that is covertly installed on your computer and designed to
deliver advertisements or other content which encourages you to
purchase goods or services.
AntivirusSoftware that is designed to prevent infection from computer viruses.
BotA single compromised computer (a robot computer), sometimes called
a zombie.
BrowserA software application that enables the retrieval and presentation of
websites and other internet resources.
Browser hijackingA symptom of a malware infection in which your browser persistently
redirects to fraudulent web sites, usually in an attempt to extort money
CookieA string of text stored by your web browser enabling a website to
remember you and your personal settings.
Staying ConnectedSafety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Digital certificateA way for browsers to verify the identity and authenticity of a website. A
digital certificate is issued to a website by a trusted third party
certificate authority.
Domain Name System (DNS)A hierarchical naming system for resources connected to the internet.
The DNS translates domain names to numerical identifiers (IP
addresses) which are readable to networking equipment, allowing the
routing of data from one point on the internet to another.
EncryptionThe process of transforming documents and files for safe transmission
over a public network. The information is then converted or deciphered
back into its original format.
FirewallHardware or software which monitors information going in and out of
your computer or network.
FreewareCopyrighted computer software which is made available for use free of
charge, for an unlimited time.
HackerSomeone who attempts to gain unauthorized access to a computer
system, often for fraudulent purposes.
HotspotAn area in which Wi-Fi is available to the general public as a wireless
local area network, as in a coffee shop.
Staying ConnectedSafety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Identity theftUse of personal details by someone else to deceive, to support some
type of crime, or even just to play a joke. Identity theft is a form of
identity crime (where somebody uses a false identity to commit a
crime).
Internet Service Provider (ISP)A company that provides access to the internet.
Keystroke loggerA malware program hidden on a computer that records and 'logs' each
key the you press. It is used to record your personal data, e.g.
usernames, passwords, credit card and bank account numbers which
is then sent to the malware operator without your knowledge.
Malicious software (malware)A catch-all term used to describe software designed to be installed into
a computer system for the purpose of causing harm to the you or
others. This would include viruses, spyware, trojans, worms, etc.
NFCNear Field Communications – the technology used for PayPass
PadlockA padlock display in a browser is intended to indicate a secure
connection or website, although it may not always be a reliable
indicator. Users should look instead for 'HTTPS'.
Peer-to-peer file sharing network (P2P)A decentralized file sharing system. Files are stored on and served by
the personal computers of the users.
Staying ConnectedSafety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
PharmingA way of harvesting personal information, where a hacker puts a
malicious code on your computer that redirects you to a fake site.
Phishing (email/website)Phishing refers to fraudulent email messages or web sites used to gain
access to personal information for illegal purposes such as transferring
funds or purchasing goods over the internet.
Pop-upA pop-up is a small window, which suddenly appears (pops-up) in the
foreground of the normal screen.
Privacy settingsSettings which control how a user's data is shared with other people or
systems. Privacy settings apply to web browsers and social networking
services.
RansomwareMalware which handicaps computer functionality, e.g. through browser
hijacking or encrypting personal data, and offers to restore the
functionality for a fee.
Remote accessCommunication with a computer or network from a remote location
through a link such as the internet or mobile phone.
ScamA commonly used term to describe a confidence trick, relying on email
or a website to deliver the trick to unsuspecting users.
Staying ConnectedSafety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
ScarewareMalware that causes frightening messages to appear, e.g. that your
computer is infected with malware or that you are guilty of a crime, and
attempts to extort money from you to resolve the alleged issue. Similar
to ransomware.
Secure Socket Layer (SSL)The most widely used security protocol on the internet, used for online
banking and shopping sites. Website digital certificates are commonly
implemented through SSL. The presence of 'https' in the
browseraddress bar demonstrates that the connection between the
your computer and the website is encrypted. However, 'https' can still
be present when connecting to a website with an invalid digital
certificate.
SpamUnsolicited email. Most email spam is commercial advertising, often for
dubious products, get-rich-quick schemes, or illegal services. Users
are advised that if an offer in an email appears too good to be true then
it probably is and should not be actioned in any way.
SpywareSoftware that is covertly installed on a computing device and takes
information from it without your the consent or knowledge of the user.
Trojan horseMalicious code which is hidden in a computer program or file that may
appear to be useful, interesting, or at the very least harmless to you
when using your computer. When this computer program or file is run,
the malicious code is also triggered, resulting in the set up or
installation of malware.
Staying ConnectedSafety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
URLUniversal Resource Locator is the technical term for the address
(location) of an internet resource on the internet such as a website or
image within a website.
USB stickUniversal Serial Bus. A small piece of hardware which stores data,
sometimes called a jump drive, thumb drive or flash drive.
VirusMalware designed to infect and corrupt a computer and to copy itself.
Viruses can disrupt programs installed on a computer.
VoIPThe routing of real time voice conversations (telephone calls) over the
internet rather than over an analog or circuit switched network.
Wi-FiA set of wireless communication protocols that can transmit traffic to
Wi-Fi-enabled devices within a local area. A Wi-Fi-enabled device such
as a laptop or mobile device can connect to the internet when within
range of a wireless network connected to the internet. An area covered
by one or more Wi-Fi access points is commonly called a hotspot.
WormA self-replicating virus that does not alter files but resides in active
memory and duplicates itself.
ZombieA compromised computer
Staying ConnectedSafety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• 3G and 4G– Generic term for most modern high speed mobile
networks• # or “hash” key
– You are often asked to press the hash key after entering numbers into automated systems
• Android– A new phone & operating system from Google which
competes with iPhone • Blackberry
– A type of mobile phone that is designed primarily for sending and receiving email as its main feature
• Bluetooth– Personal or close range radio frequency (RF) network
• Broadband
– High speed internet
• Cellular
– Generically it’s the current type of mobile phone network
• Cell-phone
– Just another term for a mobile phone
• Desk Top
– The main or home screen of your PC or phone
• GSM
– Generic term for mobile network (originally Groupe
Speciale Mobile then Global System for Mobile)
Staying ConnectedTerminology
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• ICE
– In Case of Emergency
• iPad – also known as a tablet
– Apple Corporation’s touch-screen mobile computing
device with internet access
• Java
– A type of software often used in phones
• Multi-media
– Generic term for pictures and video as opposed to simple
text
• MMS
– A message with a picture in it sent from phone to phone
(Multi-Media Service)
•PDA
– Generic term for a phone with its main feature being a
diary/calendar, notes, and detailed contact list (Personal
Digital Assistant)
• Predictive Text & Auto-Correct
– A feature in most mobiles that predicts the word you are
typing in as you type
• Premium Text Message
– A normal text message that’s charged at a higher rate –
for example voting on TV shows usually costs 55c
• QWERTY
– Typewriter style key pad layout
Staying ConnectedTerminology
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• RF
– Radio frequency
• SMS often called a Text
– A short message typed into a phone and sent to another phone (Short Message Service)
• Smart Phone
– Generic term for a phone with advanced PDA and internet services installed
• Texting
– Same as SMS (SMS-ing)
• URL
– The “www” address you type into an internet browser to go to a web site (Uniform Resource Locator)
• Voicemail
– A message left on an automatic answering machine usually built into the mobile network
• Wallpaper
– The background image on the ‘desk-top’ or screen of your phone or PC
• WAP
– An old generic term for mobile internet – a WAP site is a mobile internet site
Staying ConnectedTerminology
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Avatar
– Usually the image you put up of yourself in your social
media site’s profile
• Blog (or web log)
– A blog is a frequently updated website consisting of dated
entries arranged in reverse chronological order - most
recent post first.
• Chat & Chat rooms
– Web-based text conversation - not always but often in
real time (often called IM & vice versa)
– Dedicated chat sites about a specific subject
• IM (Instant Message)
– A real-time personal message sent between two or more
users typically fast moving
– IM is possible withGmail, MSN, Skype, Viber and on many
sites like Facebook (called chat)
• Mashup
– Website or application that uses content from more than
one source to create a completely new service or
presentation of the content
• MSN Messenger
– An Instant Message service or application
Staying ConnectedTerminology
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Podcast
– An audio blog or recording of (say) a radio programme.
You don't have to have an Apple, iPod to listen to a
podcast; you can also listen to podcasts on a PC, or many
mp3 players.
• Post or Posting
– A message added to an online discussion, or an update to
your social media site status, commenting on a blog,
writing on a Facebook ‘Wall’.
• Skype
– The worlds largest Voice over IP application which can be
used for instant messaging and file transfers between
users
• Status update
– A message you write about yourself on your own social
media site – like Facebook
• Tag or Tagging
– Tags are the keywords people add to articles or photos in
a blog or to web pages to assist in search and
identification (Photos can be tagged in Facebook to help
identifying people)
• Thread
– A series of posts on a single topic
Staying ConnectedTerminology
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Tweet
– A posting to Twitter – must be 140 characters or less
• Upload
– Copying a file from a hard drive to a website or application
thus making the file available to other members of the
same site or application.
• VoIP - Voice over IP (Internet Protocol)
– Enabling people to use the internet as the transmission
medium for telephone calls
– One advantage of VoIP is that calls over the Internet do
not incur a surcharge beyond what the user is paying for
Internet access.
• Widget
– A little “Window Gadget” downloadable to your PC
allowing access to another programme or application
• Wiki
– A Wiki is a website that allows users to freely create and
edit the website content themselves.
• Wikipedia
– A website information service like an encyclopaedia
entirely created by users
Staying ConnectedTerminology