University Module Report: Digital Skills and Professional Development

Verified

Added on  2022/12/23

|12
|4008
|81
Report
AI Summary
This report delves into the critical aspects of integrated professional skills in the digital age. It begins by defining key terms related to internet usage, including browsers, web pages, URLs, and various protocols, along with discussing safe data storage, specifically cloud computing. The report then addresses personal security and privacy concerns, emphasizing the importance of cybersecurity measures and data management. Furthermore, it highlights the development of online research skills, focusing on source evaluation and effective search strategies. Finally, the report explores digital communication skills, covering email etiquette, social media usage, and collaborative tools, all essential for navigating the modern professional landscape. The report provides insights into the importance of digital literacy and its role in fostering effective communication, secure data handling, and efficient research practices within a professional context.
Document Page
Integrated Professional
skills in Digital Age
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY...................................................................................................................................3
TASK 1 Understand the key terms and considerations associated with using the Internet along
with describing about the safe storage location. .............................................................................3
The terms which are used while assessing Internet can be seen as: ...........................................3
The Storage Source which is used to safe guard the data can be seen as: .................................5
TASK 2 Take responsibility for personal security and privacy when using the Internet................6
Personal and Private Online Security..........................................................................................6
The measures for protection of information can be seen as: ......................................................7
TASK 3 Develop online research skills...........................................................................................7
Some of the skills for online research can be seen as: ...............................................................7
TASK 4 Develop digital communication skills...............................................................................8
The skills for enhancing digital communication can be seen as: ...............................................9
CONCLUSION..............................................................................................................................10
REFERNCES:................................................................................................................................11
Books and Journals:..................................................................................................................11
Document Page
INTRODUCTION
The modernisation and globalisation of of market economy has led to improving the
existing situation of market and make the whole world a global village. In view of this it is
required to manage operations and develop skills and competencies which can work for reducing
the defects. When defects are not reduced it will result in making the organisation involve in
facing crimes and frauds. The report is based on studying the terms that are used at time of
working with Internet and also focusing managing the social security of users. The report is
carried on the social media platform Zoom which is a video calling app that makes users connect
virtually with their known users (Berry and Fagerjord 2017). The information and
communication technology (ICT) gives a lot of facilities to individuals which they can access
and can ease out their process. The Zoom is a virtual application which allows users to video call
and connect to other users. This serves a lot of purpose like attending calls, taking lectures,
attending meetings and others. Using the application requires a lot of understanding and for that
it is required to develop online research skills and digital communication skills so that the
application can be used in a proper manner by both users and developers.
MAIN BODY
TASK 1 Understand the key terms and considerations associated with using
the Internet along with describing about the safe storage location.
The internet is considered as a vital part of human existence as today's modern era is
totally connected to Internet for their every functions. The Internet provides a feasible method to
perform activities. To understand Internet and use it more appropriately, there are various terms
which help in gaining a better insight of the functions performed.
The terms which are used while assessing Internet can be seen as:
ï‚· Browser: To perform any activity, the internet users need a valid and authentic browser
through which they can view images, graphics or any relevant content which they wish
to. They are also called (Blake 2016) as the Web Browsers and major ones can be seen
as Google Chrome, Mozilla Firefox, Internet Explorer, Microsoft Edge, Safari and other
numerous. They are designed in a manner that they can convert HTML and XML codes
Document Page
into human readable data (Bradshaw 2017). To make it more easy to use, each web page
which is surfed on the web browsers have their unique address which is refereed as URL.
ï‚· Web Page: The part of web browser which depicts data and information which users
need on the internet is termed as web browser. This can be explained in simpler terms by
relating with the page in a book. Web pages show advertisement, texts, photos, graphics,
images, links and much more. The web pages are designed in a manner that user can go
on and on further by following the easy instructions mentioned on the same with the help
of links or arrows as given. Same way to come back these arrows and links can again be
used.
ï‚· URL: URL or also called Uniform Resource Locators are refereed to as the addresses of
the pages or web browsers on internet which are assessed by the users. With the help of
URL it becomes easy to locate a page rather than finding it with the content name. This is
a reason that in order to make the web page known and famous, URL are mentioned as
the bottom of the page or business cards, advertisements on TV, newspapers and others.
The URL can be seen as http.//www.tearyeyeswebsite.com/mypage. This can be used by
the users to assess the page and gain information about the particular organisation or
institution. The URL consists of three parts which can be named as protocol, host,
filename.
ï‚· HTTP and HTTPS: This is an acronym of Hyper Text Transfer Protocol, it can be
refereed to as the source which can be used to communicate relevant data to the potential
users. Using HTTP makes it easy for the users to visit accurate page and view the correct
images, links, texts in a web browser which ever is used.
ï‚· IP Address: The online devices which are having an internet access uses Internet
Protocol which acts as an address for identification (Goldie 2016). In almost cases, IP
addresses are assigned automatically at time of initiation only.
ï‚· Email: This is also called as an Electronic Mail which cats as a medium to send and
receive messages from one user to that of another,. The Email carries data, links, images
and other useful contents. This is easily handled by Google mail, Yahoo mail or through
a separate software packages as designed separately like Microsoft Outlook or Apple
Mail for specific purposes in a respective organisation.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ï‚· Social Media: This is a vast term which makes users to interact with any and every one,
irrespective of the geographical boundaries. The social media applications can be mainly
seen as Facebook, Instagram, Snapchat, YouTube, Tumblr, Whatsapp and many more
which has a wide reach in consumer market and users are highly attracted towards them.
ï‚· Downloading: It is a broad term which acts in transferring data or images from the
internet to personal system in order to access (Gretter and Yadav 2016) it after wards as
and when required. The users can either download music, images, songs, videos, files and
others. The time taken to download depends upon the size of file.
ï‚· E Commerce: Email or commonly Electronic Mail is a method that facilitates buying
and selling options via internet. With modernisation in the process there is an immediate
hike in shopping dome by users which has increased use of internet widely and also the
sales and revenue generation of respective digitally working organisations.
The Storage Source which is used to safe guard the data can be seen as:
Cloud Computing
Cloud Computing is regarded as significant storage location where data is stored on the basis of
its date, when it was stored. This connects with the user interface which will result in connecting
with the required tasks. The process of storage is easy and includes several steps. Firstly the user
has to store data by moving into cloud storage which is then transferred and used in cloud
computing. With the help of cloud computing the access is also is also passed to other users who
whom the main user wants to (Kahne, Hodgin and Eidman-Aadahl 2016). In large organisations
which are working digitally are required to store lots and lots of data which is required to be
maintained and stored for future purposes. The large and short data are stored which can be in
times of future needs can be generated back.
Features of Cloud Computing can be seen as:
ï‚· This facilitates retrieving of data as and when required by the users.
ï‚· This gives access to the users to use the storage and every where with a proper IP
address.
ï‚· It is a whole new technological advancement which facilitates organisation in receiving
more growth due (Ignatow and Robinson 2017)to its technological advancements.
ï‚· The feature which will help several users at a time to access the information serves as a
great benefit.
Document Page
TASK 2 Take responsibility for personal security and privacy when using the
Internet.
With benefits come several disadvantages even, which are a cause that hampers the
operational procedure of an organisation. The online working organisations are bound to work
for the safety and security of data of the users. The data stored with the applications like Zoom,
Facebook, Twitter and others holds a lot of personal and private which when used by other
people can hamper the personality and individuality of the being. It becomes significant for the
developers to protect the interest of consumers who are using the application. This will work in
building a good consumers base and developing enlightened competitive rivalry. To protect the
data Zoom (Jackson and Wilton 2016) has started functioning with Cloud Storage where it stores
the data of its users which can only be accessed by the user himself. This will secure the online
security and raise confidence of consumers.
Personal and Private Online Security
Irrespective of the laws, regulations and securities which are implemented for securing
data, there occurs cases which will make all the efforts in vain. So it is required to regulate the
functions and secure operations so that less failures are occurred. Internet is used by individuals
for a number of operations like gathering information, delivering information, communicating,
commercial purposes and much more (Lecheler and Kruikemeier 2016). Thus looking to this it
becomes essential to secure data with critical passwords which is hard for others to restore.
When it is not done, there are chances which can lead to major issues. As known earlier, internet
can spread any information very widely which will reach each and every corner quickly.
These days there are several cyber security cases which are caused by the criminals or
hackers. This way the hackers steal important information which they will sell and can be
misused. When the private and personal information is leaked it will cause misconduct and may
harm the individuality of an individual or that of the organisation. In large organisations where
data of many users are stored, there are chances of big frauds where the hackers can steal data
and use for their own purposes which will affect income of organisation or the digital platform.
This makes it very important to secure the data by putting restricted control over the foreign user
interface. The steps which can be (Jackson 2016) used by the organisations who are required to
protect themselves in terms of securing privacy and maintaining security becomes very critical.
Document Page
The measures for protection of information can be seen as:
Cybersecurity: The cybersecurity of an organisation is required to be very efficient so that it
becomes hard for the hackers to access it. For this there is heavy investment required in initial
stage which helps in after processes.
Eliminating Irrelevant Data: The companies are required to scrutinise their data and
information which stored, thus eliminating the irrelevant one (Mihalcea 2017). This updates the
system which will be barrier to hackers in restoring information.
Better IT technicians: There is an emergent need of hiring the talented IT technicians who have
a great knowledge of IT industry and can easily work in reducing the hacking measures. When
talented workforce is recruited there will be cases that security and privacy of organisation is
maintained.
TASK 3 Develop online research skills.
In order to use internet in a manner that it gives huge advantage, it is highly required by
the individuals to develop their research skills. When research skills are developed it will help in
gaining enhanced data which will create (Kirschner and Bruyckere 2017)a better understanding.
In order to develop research skills the users are required to perform undermentioned activities.
Some of the skills for online research can be seen as:
ï‚· Checking the sources: First of all the appropriate resources are required to be evaluated
so that the data which is calculated is accurate and reliable. There are many challenges
which are faced by the users at the time and to reduce the same, pre hand catering of
resources will make the process easy. When sources are checked and same are used it
will make user more efficient in performing online research.
ï‚· Taking Notes: The major method through which research skills in online manner can be
developed will be by collecting notes of the data which is required to be collected
(Powell and Henry 2017). This will help in recording all the important information thus
reducing the chances of missing small details. This will also make information collected
reliable and complete.
ï‚· Time Management: The online researchers are required to manage their time while they
perform online research as there are many distractions which can be caused while surfing
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
the internet like social media platforms. When time is managed, online research will be
easy process to complete.
ï‚· Making Queries: On any research it is required to make queries and ask questions about
the issues and data which is unable for the research worker top understand. When
questions are asked and queries are made, it will make the online research and data
collected from the same to be informative and complete.
ï‚· Remaining Patient: There are times when the server is slow and web pages are loading
which will delay the work (Smith 2018). In order to reduce this research worker is
required to work with patience and wait until the server works again. There are times
when data is not easily available which also caters towards waste in time and research
worker being impatient. To reduce this and develop patience skills it is required by
research worker to evaluate resources and then start the work from.
ï‚· Respecting Ownership: The online research is a tool which is performed by several
users from their intellect and is then available to other users, in order to improve their
understanding. The users who are accessing the pre hand information are required to be
authentic and should not use their data and findings under their own name. This causes
misconduct which is required by online researcher to ignore.
ï‚· Using diversified Networks: In order to cater appropriate and complete information, it is
required by the users to go beyond their search criteria and diversify their sources by
performing an in (Shao and Purpur 2016) depth study which will help in bringing more
and more reliable as well as complete information.
TASK 4 Develop digital communication skills.
In the era of modernisation, it is highly required by the users to develop their digital
communication skills so that the operations related to internet surfing is properly performed.
Digital Communication can be refereed as making communication to different users through
mode of communication like social media applications and websites. The digital communication
skills can be seen as hard skills and soft skills ( Stephen and Edwards 2017). Hard skills refers to
knowledge of handling software like Facebook, twitter and soft skills refers to developing inner
competencies like patience, knowledge, values and others. The communication can be personal
or formal. By communicating through social media users can share their thoughts, deliver
informations and messages, business organisations can advertisement and other organisations
Document Page
can pas on the relevant information. This has eased the process and to master in the process there
is an urgent need to develop skills which are associated with them.
The skills for enhancing digital communication can be seen as:
ï‚· Search Engine Optimisation: The digital content creators of Zoom should be well
versed with the engine where search is required to be performed. As creators are required
to access wide information about market which (Siemens 2017) will help them in
meeting the needs of market and earning high revenues. For this they are required to
make themselves develop understanding of the search engines so that they can use it for
communicating with the users.
ï‚· Writing an attractive Content: The users are required to practice writing a content
which is attractive so that more and more users are attracted towards the content. The
content which is required to be posted on digital media is required to be very
knowledgeable so that the respective subject matter is displayed on top and more and
more users view this. When this is developed digital skills will also develop.
ï‚· Design creative images: Along with the content, the images and graphics are also
required to be creative which will make content interesting and attractive. The graphical
knowledge is required by the users which will make their work interesting and more
demanding.
ï‚· Maintaining CRM: The digital skills of a business firm also involves maintaining good
consumer relations with the consumers. This will make it possible for organisations in
building a good consumer base which will make loyal consumers (Suler 2016). When
consumers demands are met and they are interacted personally, there will be good
relations among both the parties. Maintaining Consumer Relationship Management is an
essential part to carry digital communication in an effective manner.
ï‚· Managing Social Media: The users are required to be well known with the social media
tactics in a manner that they can attract more and more consumers towards their products
or services. When digital content creators are able to attract more and more consumers by
managing their day to day activities, they will easily develop a good knowledge which
will develop digital communication.
ï‚· Improved Technological Knowledge: The digital communication will be proved
effective when there is improvement in technical procedure of an organisation. The users
Document Page
are required to be (Zhang and Zhu 2016) techno friendly in order to develop their digital
communication as internet uses technology. Day to day there are new advancements
which generates an urgent need of improving technological knowledge.
CONCLUSION
From the above report on the information and technology services and skills of Zoom
acts as a giving a detailed idea on the Internet and its services. It has been observed that working
on digital platforms is a result which makes organisation works in an efficient manner. The
technology of Zoom as discussed in the report has proven very advantageous for working out the
business operations. There is high technological advancements which results in catering high
markets by digitally communicating with consumers in order to develop a better insight in their
minds. Internet is used for various purposes and works in fulfilling a number of merits. Along
with merits comes several disadvantages even which hampers the working progress. It can also
be seen that to protect personal and private data of the users, companies are using Cloud Storage
as a secured form of storing data. This is versed with many required features which ensures
cybersecurity to the users of Internet.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
REFERNCES:
Books and Journals:
Berry, D.M. and Fagerjord, A., 2017. Digital humanities: Knowledge and critique in a digital
age. John Wiley & Sons.
Bradshaw, P., 2017. The online journalism handbook: Skills to survive and thrive in the digital
age. Routledge.
Goldie, J.G.S., 2016. Connectivism: A knowledge learning theory for the digital age?. Medical
teacher, 38(10), pp.1064-1069.
Gretter, S. and Yadav, A., 2016. Computational thinking and media & information literacy: An
integrated approach to teaching twenty-first century skills. TechTrends, 60(5), pp.510-
516.
Kahne, J., Hodgin, E. and Eidman-Aadahl, E., 2016. Redesigning civic education for the digital
age: Participatory politics and the pursuit of democratic engagement. Theory & Research
in Social Education, 44(1), pp.1-35.
Lecheler, S. and Kruikemeier, S., 2016. Re-evaluating journalistic routines in a digital age: A
review of research on the use of online sources. New media & society, 18(1), pp.156-
171.
Mihalcea, A., 2017. Employer branding and talent management in the digital age. Management
Dynamics in the Knowledge Economy, 5(2), pp.289-306.
Powell, A. and Henry, N., 2017. Sexual violence in a digital age. Springer.
Rogers, D.L., 2016. The digital transformation playbook: Rethink your business for the digital
age. Columbia University Press.
Smith, R., 2018. Crime in the digital age: Controlling telecommunications and cyberspace
illegalities.
Stephen, C. and Edwards, S., 2017. Young children playing and learning in a digital age: A
cultural and critical perspective. Routledge.
Suler, J.R., 2016. Psychology of the digital age: Humans become electric. Cambridge University
Press.
Blake, R., 2016. Technology and the four skills. Language Learning & Technology, 20(2),
pp.129-142.
Ignatow, G. and Robinson, L., 2017. Pierre Bourdieu: theorizing the digital. Information,
Communication & Society, 20(7), pp.950-966.
Jackson, D. and Wilton, N., 2016. Developing career management competencies among
undergraduates and the role of work-integrated learning. Teaching in Higher
Education, 21(3), pp.266-286.
Jackson, D., 2016. Re-conceptualising graduate employability: The importance of pre-
professional identity. Higher Education Research & Development, 35(5), pp.925-939.
Kirschner, P.A. and De Bruyckere, P., 2017. The myths of the digital native and the
multitasker. Teaching and Teacher Education, 67, pp.135-142.
Shao, X. and Purpur, G., 2016. Effects of information literacy skills on student writing and
course performance. The Journal of Academic Librarianship, 42(6), pp.670-678.
Siemens, G., 2017. Connectivism. Foundations of Learning and Instructional Design
Technology.
Document Page
Zhang, H. and Zhu, C., 2016. A study of digital media literacy of the 5th and 6th grade primary
students in Beijing. The Asia-Pacific Education Researcher, 25(4), pp.579-592.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]