DF Unit 3 Notes
DF Unit 3 Notes
DIGITAL FLUENCY
Module 3 : Digital Fluency (NEP) Modified Syllabus As Per Notification
Dated: 29/12/2021 Prescribed by;
BCU Digital Fluency Module / Unit 3 2
What is Database
The database is a collection of inter-related data which is used to retrieve, insert and
delete the data efficiently. It is also used to organize the data in the form of a table,
schema, views, and reports, etc.
For example: The college Database organizes the data about the admin, staff, students
and faculty etc.
Using the database, you can easily retrieve, insert, and delete the information.
o DBMS provides an interface to perform various operations like database creation, storing
data in it, updating data, creating a table in the database and a lot more.
o It provides protection and security to the database. In the case of multiple users, it also
maintains data consistency.
o Data Definition: It is used for creation, modification, and removal of definition that defines
the organization of data in the database.
o Data Updation: It is used for the insertion, modification, and deletion of the actual data in
the database.
o Data Retrieval: It is used to retrieve the data from the database which can be used by
applications for various purposes.
o User Administration: It is used for registering and monitoring users, maintain data
integrity, enforcing data security, dealing with concurrency control, monitoring performance
and recovering information corrupted by unexpected failure.
Characteristics of DBMS
o It uses a digital repository established on a server to store and manage the information.
o It can provide a clear and logical view of the process that manipulates data.
BCU Digital Fluency Module / Unit 3 3
o DBMS contains automatic backup and recovery procedures.
o It contains ACID properties which maintain data in a healthy state in case of failure.
o It can view the database from different viewpoints according to the requirements of the
user.
Functions of DBMS
Advantages of DBMS
o Controls database redundancy: It can control data redundancy because it stores all the
data in one single database file and that recorded data is placed in the database.
o Data sharing: In DBMS, the authorized users of an organization can share the data among
multiple users.
o Easily Maintenance: It can be easily maintainable due to the centralized nature of the
database system.
o Backup: It provides backup and recovery subsystems which create automatic backup of
data from hardware and software failures and restores the data if required.
o multiple user interface: It provides different types of user interfaces like graphical user
interfaces, application program interfaces
Disadvantages of DBMS
o Cost of Hardware and Software: It requires a high speed of data processor and large
memory size to run DBMS software.
BCU Digital Fluency Module / Unit 3 4
o Size: It occupies a large space of disks and large memory to run them efficiently.
o Higher impact of failure: Failure is highly impacted the database because in most of the
organization, all the data stored in a single database and if the database is damaged due to
electric failure or database corruption then the data may be lost forever.
Examples of DBMS
There is a wide range of database software solutions, including both enterprise and open
source solutions, available for database management.
Here are some of the most popular database management systems:
Oracle
Oracle Database is a commercial relational database management system. It utilizes
enterprise-scale database technology with a robust set of features right out of the box.
It can be stored in the cloud or on-premises.
MySQL
MySQL is a relational database management system that is commonly used with open-
source content management systems and large platforms like Facebook, Twitter, and
Youtube.
SQL Server
Developed by Microsoft, SQL Server is a relational database management system built
on top of structured query language (SQL), a standardized programming language that
allows database administrators to manage databases and query data.
Types of Databases
There are various types of databases used for storing different varieties of data:
BCU Digital Fluency Module / Unit 3 6
1) Centralized Database
It is the type of database that stores data at a centralized database system. It comforts
the users to access the stored data from different locations through several applications.
These applications contain the authentication process to let users access data securely.
An example of a Centralized database can be Central Library that carries a central
database of each library in a college/university.
o It provides better data quality, which enables organizations to establish data standards.
BCU Digital Fluency Module / Unit 3 7
o It is less costly because fewer vendors are required to handle the data sets.
o If any server failure occurs, entire data will be lost, which could be a huge loss.
2) Distributed Database
Unlike a centralized database system, in distributed systems, data is distributed among
different database systems of an organization. These database systems are connected via
communication links. Such links help the end-users to access the data
easily. Examples of the Distributed database are Apache Cassandra, HBase, Ignite, etc.
o Homogeneous DDB: Those database systems which execute on the same operating
system and use the same application process and carry the same hardware devices.
o One server failure will not affect the entire data set.
3) Relational Database
This database is based on the relational data model, which stores data in the form of
rows(tuple) and columns(attributes), and together forms a table(relation). A relational
database uses SQL for storing, manipulating, as well as maintaining the data. E.F. Codd
invented the database in 1970. Each table in the database carries a key that makes the
data unique from others. Examples of Relational databases are MySQL, Microsoft SQL
Server, Oracle, etc.
This is one of the most popular data models which is used in industries. It is based on
SQL.
BCU Digital Fluency Module / Unit 3 10
Every table in a database has a key field which uniquely identifies each record.
This type of system is the most widely used DBMS.
Relational database management system software is available for personal computers,
workstation and large mainframe systems.
For example − Oracle Database, MySQL, Microsoft SQL Server etc.
In the above student table Std ID, Name and city are called as attributes and their values.
Std ID is a primary key attribute.
A means Atomicity: This ensures the data operation will complete either with success or
with failure. It follows the 'all or nothing' strategy. For example, a transaction will either
be committed or will abort.
C means Consistency: If we perform any operation over the data, its value before and
after the operation should be preserved. For example, the account balance before and
after the transaction should be correct, i.e., it should remain conserved.
I means Isolation: There can be concurrent users for accessing data at the same time
from the database. Thus, isolation between the data should remain isolated. For example,
when multiple transactions occur at the same time, one transaction effects should not be
visible to the other transactions in the database.
D means Durability: It ensures that once it completes the operation and commits the
data, data changes should remain permanent.
BCU Digital Fluency Module / Unit 3 11
Object Oriented Database
It is a system where information or data is represented in the form of objects which is
used in object-oriented programming.
It is a combination of relational database concepts and object-oriented principles.
Relational database concepts are concurrency control, transactions, etc.
OOPs principles are data encapsulation, inheritance, and polymorphism.
It requires less code and is easy to maintain.
For example − Object DB software.
The object oriented database is represented in diagram format below −
Hierarchical Database
It is a system where the data elements have a one to many relationship (1: N). Here data
is organized like a tree which is similar to a folder structure in your computer system.
The hierarchy starts from the root node, connecting all the child nodes to the parent
node.
It is used in industry on mainframe platforms.
For example− IMS(IBM), Windows registry (Microsoft).
An example of a hierarchical database is given below −
BCU Digital Fluency Module / Unit 3 12
It is used for storing, organizing, managing and easy retrieving a large number of data
in electronic storage discs.
It is the software that takes care of efficiently creating, reading, updating and deleting a
large set of data in electronic data storage devices.
BCU Digital Fluency Module / Unit 3 13
What is database management software best for?
Database management software is best for storing and managing a huge number of
related information.
Individuals just get knowledge on a theoretical basis and when they are about to
put to use whatever they have learned; it may be a little different thing.
Face-to-face learning is completely missing in online learning that really matters to
some of the people.
The extent of security is also one of the main problems in E-learning programs.
Most of the online assessments are also limited to questions that are only objective
in nature.
Furthermore, the online assessments which are computer marked normally have a
tendency of being knowledge-based only and these are not essentially practicality-
based.
The authenticity of the work of any online course student is also a problem as online
anyone can do any project rather than the real student itself.
4. e-PG Pathshala: It is an initiative taken by the MHRD under its National Mission
on Education through ICT, which is being executed by the UGC. The platform,
epgp.inflibnet.ac.in provides interactive e-content in 70 subjects across all
disciplines of social sciences, arts, fine arts and humanities, natural &
mathematical sciences.
E-learning is the recent and effective way if you have a desire to grow as a professional.
The motive to upskill yourself is not restricted to a fixed structure. Here are the advantages
of e-learning that you can enjoy during COVID-19 and in the future as well:
Be flexible with your learning approach! Now you can learn even from the remote
area where web access is easily available.
Schedule your learning accordingly where you can also manage your work and your
learning side by side.
Keep your safety as your priority. There is no need to step out to learn something
new. Make sure you have your digital resources by your side.
E-learning has given rise to the “microlearning” concept where you can clear your
basics, even the tiniest details of the course.
Make learning fun by just having a mobile or tablet by your side that can do training
work for you.
Increased participation and retention of materials is one of the major advantages of
e-learning as it deepens the impact of learned content on you.
Don’t stop yourself from leveraging the correct opportunities by learning new skills.
Keep yourself updated with the fresh content which is available on the online
learning platforms.
BCU Digital Fluency Module / Unit 3 16
It opens the doors of promotion if you are already working. Just make sure you are
learning the exact skills that a particular job position demands.
It opens the doors of promotion if you are already working. Just make sure you are
learning the exact skills that a particular job position demands.
Every aspect has two sides. If e-learning has established its presence successfully, there
are still some issues that are there. Here are some of the disadvantages of e-learning
during COVID-19 which may apply in the future as well:
Technical glitch is one of the major disadvantages of e-learning as it doesn’t let any
option left for the user to learn effectively.
Health issues may occur due to increased screen time
Inability to focus on what the instructor is teaching may hamper the learning of the
individual.
E-learning often leads to isolation as the interaction is kept with the teacher only
and not with other students.
Lack of focus in some individuals becomes a hurdle in learning new skills.
E-learning advantages and disadvantages completely depend upon the individual, not on
the method of training. You just need to learn how to use online training for your benefit.
SWAYAM
According to https://swayam.gov.in/
This is done through a platform that facilitates hosting of all the courses, taught in
classrooms from Class 9 till post-graduation to be accessed by anyone, anywhere at any
time. All the courses are interactive, prepared by the best teachers in the country and are
available, free of cost to any learner. More than 1,000 specially chosen faculty and teachers
from across the country have participated in preparing these courses.
The courses hosted on SWAYAM are in 4 quadrants – (1) video lecture, (2) specially
prepared reading material that can be downloaded/printed (3) self-assessment tests
through tests and quizzes and (4) an online discussion forum for clearing the doubts. Steps
have been taken to enrich the learning experience by using audio-video and multi-media
and state of the art pedagogy / technology.
In order to ensure that best quality content is produced and delivered, nine National
Coordinators have been appointed. They are:
1. AICTE (All India Council for Technical Education) for self-paced and international
courses
2. NPTEL (National Programme on Technology Enhanced Learning) for Engineering
3. UGC (University Grants Commission) for non technical post-graduation education
4. CEC (Consortium for Educational Communication) for under-graduate education
5. NCERT (National Council of Educational Research and Training) for school education
6. NIOS (National Institute of Open Schooling) for school education
7. IGNOU (Indira Gandhi National Open University) for out-of-school students
8. IIMB (Indian Institute of Management, Bangalore) for management studies
9. NITTTR (National Institute of Technical Teachers Training and Research) for Teacher
Training programme
Courses delivered through SWAYAM are available free of cost to the learners, however
learners wanting a SWAYAM certificate should register for the final proctored exams that
come at a fee and attend in-person at designated centres on specified dates. Eligibility for
the certificate will be announced on the course page and learners will get certificates only if
this criteria is matched. Universities/colleges approving credit transfer for these courses can
use the marks/certificate obtained in these courses for the same.
Briefs
A massive open online course (MOOC) is a free web-based distance learning program that is
designed for large numbers of geographically dispersed students.
MOOCs are online courses that a student accesses through the internet. Typically, these
courses consist of traditional class materials made accessible online, which may include the
following:
Typically, each MOOC will include a course provider and a course platform. A course provider
is often a university, which supplies the course materials and instructors. The platform --
such as EdX, Canvas, Coursera or Udacity -- provides the technological infrastructure for
course modules, user access and other learning resources.
BCU Digital Fluency Module / Unit 3 21
Finding MOOCs
Providers of MOOCs are mostly universities but may also be corporate entities. Top
educational institutions and universities, such as Harvard, the Massachusetts Institute of
Technology (MIT) and Stanford, are leading providers of online courses. Corporations such
as Microsoft and Accenture also provide publicly available online courses. When searching
for a MOOC to take, it is important to make sure that the course aligns with the student's
education and career goals.
Credentials and MOOC-based degrees
MOOCs can also be used for continuing education certifications and degree programs. MOOC
certification levels typically fall into the following six general categories:
Free. These courses are completely free, but usually only to audit. However,
students still have the option to pay for an official certificate of completion at the
end of the course.
Certificates. Certificates for completing individual courses range from about $20
at the lower end, to around $300, with the average being between $50 to $100.
Micro credential. Micro credential programs typically consist of three to six
courses. According to EdX, a popular platform for MOOCs, the median price for
micro credential programs is $946. Typically, they are narrow in focus and provide
a specific skill or competency.
University credit. Courses in this tier are university accredited and comparable to
online courses at institutions that provide degrees. Individual courses at this level
can range from a few hundred dollars to a few thousand dollars.
Online degree. Online degree programs are equivalent to master's or continuing
education degree programs at universities and offer comparable volume and depth
of coursework. Online degree programs generally follow a traditional application
and admissions process and range from a few thousand dollars to tens of
thousands of dollars.
Corporate training. Corporate training MOOCs are deployed on an enterprise
level. This pricing option is typically structured as a per-user cost for access.
Benefits of MOOCs
The widespread adoption and use of online courses provides the following benefits:
No physical location dependence. This can improve collaboration efforts and
save time by eliminating a student's daily commute. Online education also enables
social distancing.
Improved access to higher education. Not only is this a function of
convenience, but access to high-quality education in developing countries can
ultimately increase quality of life and contribute to sustainable development efforts
by providing a high-quality, accessible learning infrastructure.
Affordability of higher education. Scalability makes these types of courses
more cost-effective than in-person courses of comparable scope.
BCU Digital Fluency Module / Unit 3 22
Flexible learning schedule. Many courses are self-paced, which can
accommodate student work schedules. Even if course completion is not self-paced,
as with online degree programs, prerecorded lectures can offer more flexibility on a
daily and weekly basis.
Drawbacks of MOOCs
Though MOOCs have numerous benefits, there are the following associated drawbacks:
Flexibility can make the course more difficult to manage, as some students require
the structure of in-person learning.
A University of Texas study of online course completion rates found that MOOC
completion rates are just 6.8%, significantly lower than in-person courses.
Students may not feel as committed to attend a free online course as they would
an in-person course that requires tuition.
Instructors are less accessible.
Digital literacy is required for effective use.
Students are less likely to form relationships with instructors and other students.
Students with visual or auditory disabilities may not be accommodated.
Courses require strong internet connections, which can be an issue in developing
countries and underprivileged communities.
When searching for the right course, large amounts of similar courses for saturated
areas, such as computer science, may lead to a paradox of choice.
Virtual Meet
Virtual meeting platforms are video applications and software that bring people together
over the internet. Usually, this software includes a form of video conferencing, as well as
tools like chat, reactions and screen sharing. Examples of this software include Zoom,
Webex, Google Meet, Lifesize and Jami. These apps are also called “online meeting
platforms.”
BCU Digital Fluency Module / Unit 3 23
List of virtual meeting platforms
Video conferencing capabilities bring virtual teams together in real time. From the
ubiquitous Zoom to less-known Jitsi Meet, these virtual meeting apps are ready for you
and your remote team to try.
1. Zoom
Zoom is a popular video conferencing platform that is infamous for being easy to use.
You can invite anyone to a Zoom meeting with a URL, even if your attendees do not
have a Zoom account. Once team members click on the URL, they will instantly join a
virtual room with the rest of the team. Registered users can host meetings with up to
100 people using the free version of Zoom’s software. Coupled with fun features like
breakout rooms, Zoom is ideal for hosting meetings, games and activities with virtual
teams.
2. Google Meet
Google originally developed Google Meet as a virtual meeting platform for the company’s
enterprise customers. However, with Zoom’s surge in popularity, Google decided to offer
Meet as a secure alternative. Meet can host gatherings of up to 250 participants, and
also offers nifty additions like live captions and anti-abuse features. If data security is a
priority for your business, then Meet is right for you, as long as everyone has a Google
Account.
BCU Digital Fluency Module / Unit 3 24
3. Skype
Acquired by Microsoft in 2011, Skype was the original household name for video calls.
However, due to consumer complaints and the emergence of Zoom as noted on ZDNet,
Skype is no longer the only or primary option for meetings. Skype is mounting a
comeback with video conferencing, making it the perfect time to revisit the familiar
software with a cute ringtone. The app now offers meetings for up to 50 participants
accessible by a generated link. No registration or download required.
4. Cisco Webex
Cisco Webex is online meeting software originally intended for businesses. With its
intuitive controls and tight security, Webex has long helped businesses stay connected.
By signing up for Webex’s free plan, you can host virtual meetings or games with up to
100 people for any duration. This feature contrasts with Zoom, which limits your
meeting time to 40 minutes if three or more people are in your meeting. Therefore, by
choosing Webex, you won’t have to worry about time limits for your next online
meeting.
5. Jitsi Meet
For an open source platform option you can customize, consider Jitsi Meet for your next
virtual meeting. Secured by strong encryption, this virtual conference software does not
cost anything, require you to register, or limit the number of people you can invite to
meetings. With such flexibility, Jitsi Meet offers endless possibilities for you and your
team to hold virtual meetings, online conferences and more.
BCU Digital Fluency Module / Unit 3 25
Technical Requirements for Virtual Meet
What do I need in order to participate in virtual meetings?
For best virtual meeting experience, you will need access to the following:
Online Forms.
An online form, also known as a web form, E- Form or an HTML form, is an interactive
web page that allows for user input. The data received through the form is then
BCU Digital Fluency Module / Unit 3 26
automatically sent to a server for processing. In collecting data and obtaining the
contact information of users, online forms help capture leads.
There are many types of online forms, ranging from contact forms to the RSVP section
of an event website, to forms that manage online orders and payments on an online
store, educational research forms and much more.
Online forms, much like their paper counterparts, are usually composed of a question or
a series of questions. These are paired with fields in which users can either type in their
answer, or select the most appropriate response out of several available ones.
Online forms can be composed of just one or several types of fields, mixed and
matched. The main types of fields in online forms are:
Text boxes: Also known as input fields, text boxes are blank fields meant for text
to be typed freely into them. For example, typing in a password during login.
Best for: Open-ended questions or questions with an infinite amount of possible
answers (such as a name or password).
Drop-down lists: Drop-down lists are fields that once clicked, open up into a list.
The list includes several items from which a single item can then be chosen.
Best for: Picking one option out of a list.
BCU Digital Fluency Module / Unit 3 27
Check boxes: Small square boxes that are ticked or unticked when clicked. Most
forms allow users to pick more than one option per check box field (also known as
multi selection). An example of a check box is the box you tick to approve the
terms and conditions of a web service.
Best for: Picking one or more options out of a list.
Radio buttons: Small circular buttons. Radio buttons usually come in a list of two
or more optional answers, out of which the user can select the single most
appropriate answer by clicking it. Once selected, radio buttons show an added dot
in their center.
Best for: Picking one option out of several options.
options.
BCU Digital Fluency Module / Unit 3 28
Submit button: The last button at the bottom of an online form is usually
reserved for submitting the answers upon completion. The button microcopy can
vary from “Send” to “Get in Touch” or “Request a Price Quote,” but the intention
stays the same throughout - the provided information will now be sent over to the
website owner.
Acting as the call to action of the form, the submit button will usually stand out in
its design from the rest of the page, in order to draw attention.
Publishing Questionnaire.
Publish by Email
Single-Use Link:
o Link can be used only once
o You can Pre-populate, track participation, send reminders and prevent
ballot box stuffing
Multi-Use Link:
o Forward to others to extend your participation network, set restrictions
for responses as needed
o You can Pre-populate, track participation and also send Reminders
Automated Distribution:
o Automate invitation delivery based on the rules and conditions of your
choice.
o Use SoGoSurvey’s SFTP (Secure File Transfer Protocol) server to deposit
contact information
Publish On Website
Link/QR code: Add a multi-use link on your website or blog
Embed: Integrate your survey fully by making it part of your website
Embed Pop-up: Add a survey invitation pop-up directly on your website
Publish Offline/Mobile
Survey Passwords: Create single- or multi-use passwords to invite
participants offline
SMS Invitations: Send single-use participation links to mobile numbers in the
US, UK, Canada, and Australia.
Offline Mode: Collect responses without internet connectivity
BCU Digital Fluency Module / Unit 3 31
Conducting online responses. Analysing the responses and copying
graphics into power Point and Excel.
If you are looking at the summary view of the results for some Form data you have
collected, you can copy a chart or diagram that you want to use elsewhere very easily
and quickly.
Simply hover over the chart or diagram, and a copy icon will appear in the upper right
corner of it. Click on that -
You will get a message that it has been copied to to the clipboard in the lower left corner
-
BCU Digital Fluency Module / Unit 3 32
You can then paste it into the location you want to use it. Here's an example in a G Doc,
Spreadsheets and Power Points.
I also pasted it into: Slides, an email, a Sites webpage, in my Blogger. A nice feature
addition that saves time from taking screenshots!
Examples of Interpretation Based on Spreadsheet and Power Points.
BCU Digital Fluency Module / Unit 3 33
Introduction to Societal Impact
Societal impact assessment (SIA) refers to a set of guidelines and principles to identify
the societal effects of new technologies, programs, and projects. Starting in the domain
of environmental issues, SIA has expanded into other areas where new technologies
start to shape the everyday life of citizens. With a strong focus on participatory and
anticipatory strategies, SIA attempts to establish a broader understanding of technology
taking into account the perspective of different.
What is social impact?
Social impact is the positive change your organization creates to address a pressing
social issue. This can be a local or global effort to tackle things like climate change,
racial inequity, hunger, poverty, homelessness, or any other problem your community is
facing.
Social impact can be about helping those in need, providing resources and advocacy, or
it can be about lessening the negative effects of doing business. Luckily, when it comes
to the world of social impact, the possibilities for how you can be a good steward in your
Wipro is India’s leading information technology consulting services company that has
set up a foundation that takes care of its CSR needs. Wipro Cares is a non-profit trust
that channelizes its efforts in community service, education and societal development.
They believe no social program can run without strong ethical principles, proper
management and good governance. It was initiated in 2002. It focuses on
developmental issues of the underprivileged society.
BCU Digital Fluency Module / Unit 3 35
Digital Footprints
Digital footprint (DF) is the electronic trail we knowingly or unknowingly leave behind
each time we access the internet or other electronic devices. It is created when we
access services, post, or make comments on the internet.
Digital footprints are categorized into an active digital footprint and a passive digital
footprint . Active digital footprints are those details we knowingly leave behind online,
and which we still make use of everyday, while passive digital footprints are those which
are left behind unintentionally through our use of online services or whose services we
no longer access. The use of a digital footprint has both positive and negative
consequences.
Henry was sixteen years old when social networking media became the mainstay of
our daily life. During this period, he had access to the likes of MySpace, Hi5, Facebook,
and Orkut, all of which he used to maintain contact with family and friends.
Ten years later, at twenty-six years old, and out of college, he could hardly remember
the login details of his profiles on these platforms he had used ten years earlier except
maybe for LinkedIn, which he currently uses to track job opportunities.
BCU Digital Fluency Module / Unit 3 36
Two weeks ago, he surprisingly got an invitation to attend a job interview for a
professional position in a blue chip company on Wall Street.
He was hit with disappointment when he was told he could not get the job due to some
disturbing posts he had on one of his social media profiles ten years earlier.
Not all digital footprints, however, are as a result of social network media as some
reports have shown.
You may be wondering what makes up our digital footprints? Well, wonder no more.
Below are some of the components of our digital footprints:
Personal information
o Name
o Date of birth
o Address
o Phone number
o Photographs
Own actions
o Emails sent
o Upload of documents, photographs,
o Text messages
o Websites visited
o Comments and posts on websites and online forums
Service provider related
o Data collected during sign up for services online
o Telephone and internet service providers
o Other tools we use online everyday which requests some form of our data
Digital footprints are the records and traces individuals activities as they use
the Internet. Digital footprints are permanent stored. Your interactions on
social media, your friend circle on social media sites, sited you visit, online
purchases, locations visited through Facebook check-ins etc. all make up your
digital footprints.
To manage your digital footprint, you can follow the guidelines given below :
Look at all the social networking sited and forums that you belong to,
and search your name to know what information about you is available.
2. E-behave responsibly :
You should be smart and sensible enough to know which sites you are
visiting, which emails you are sending, or what links you open. Also,
make sure to never share your location when online.
Digital cookies are the oldest method websites use to learn about their visitors.
BCU Digital Fluency Module / Unit 3 38
They are small files browsers store on your computer after your first visit to a website,
to track your activity on that site. Cookies can store user preferences and settings to let
the website customize itself to provide an optimal experience, tailored specially for each
user or set of users.
They can also store credentials to make it easy for you to log in to a previously visited
site.
One type, called session cookies, only live while you stay within a website. Once you
leave that website, the cookie automatically disappears. Other cookies are
called persistent cookies. These cookies remain for a while in your hard disk (or
whatever storage device you use) and are used for authentication –keeping track of
logged-in users and remembering the password, so the user doesn’t have to– or for
tracking user activity.
DIGITAL FOOTPRINT
Be Careful About Be Smart About
What you share online Sites you visit
Where you share Emails you open
With whom you share Links you clicks
BCU Digital Fluency Module / Unit 3 39
Digital Society and Netizen
These days, most of the tasks we do are done using digital technologies. We chat online,
shop online, learn online, and so much more. As a result, we have quite the online
presence. Therefore, in order to maintain a certain code of conduct as one would do so
in regular life, there are certain net etiquettes or netiquettes that have been created to
ensure that everyone is a responsible digital citizen (netizen).
Copyright Violation: Do not use copyrighted information without proper license i.e.
permission of the creator/owner. Creators such as Q-Programming have put a lot of
effort into sharing their content and hence one should respect these efforts and not use
materials without proper authorization.
Sharing Information: With access to unlimited online resources, we should share useful
information with others. However, make sure the information you share is accurate and
from a reputable source. A lot of fake information is spread nowadays which can lead to
consequences.
Respect:
Privacy: Respect the privacy of your fellow netizens. Good digital citizens understand
that everyone has the same rights and freedoms. If someone shares private information
with you DO NOT send it to anyone else without the sender's consent.
Diversity: Public forums and chat sites have great diversity in contributing members.
Make sure you respect other people's cultures and beliefs and expect that they do the
same for you.
BCU Digital Fluency Module / Unit 3 40
Responsibility:
Cyber Bullying: Remember that anything you say online to someone has the same effect
as if you say it to their face. Many people say offensive and hurtful things online thinking
that they can't be held accountable. However, remember that everything you say is part
of your digital footprint and can be easily traced back to you. Therefore, be careful what
you say on public forums as you can get in trouble, but also, most importantly, you can
cause harm to others.
Trolling: Internet trolls are people who intentionally disrupt harmony on online
platforms. They thrive on attention and hence you should not fuel them by supporting
them or rebutting. Trolls can be like online bullies they have fun when they make
someone react to their comments. The best thing you can do is ignore them.
Time: Everyone is busy and therefore we should not waste our valuable time on unnecessary
emails and comments. Similarly, do not expect others to respond to you instantly as they are
also preoccupied.
Data Limits: Avoid sending large files over the internet as they use a lot of data and bandwidth,
which come with their respective costs. You should make it a habit to send compressed files or
links, using various free services.
Credibility: As discussed in a previous point, make sure whatever you write on the internet is
accurate and fact-checked. Spreading false information leads to unnecessary confusion.
Passwords: Choose strong passwords to safeguard against data leaks or hackers. Use a
combination of numbers, alphabets, allowed symbols and cases to create a password which is
tough to crack. Also, avoid sharing your account information with others.
Friends: Social networking sites allow us to talk to anyone else on the platform. Be wary,
however, as not everyone is friendly. Some people may even have malicious intentions. Be
careful of who you interact with online and only converse with those who you have met in real
life
Fake Information: There is a lot of fake information on the internet. This information is easily
spread via social networking sites. Therefore, when you see something, make sure it is accurate.
Experienced users are able to distinguish fake news from real news. Those who don't can verify
BCU Digital Fluency Module / Unit 3 41
information from reputed sources. Although platforms have algorithms to fact check, report any
misleading information to avoid further spread.
Reliability:
When you are about to upload something to the internet, pause for a moment and think of
the consequences your actions could have in the future. Once you are sure what you are posting
is acceptable, do so. Remember, as discussed earlier, that even if you delete an upload, it will
still be stored on the service's servers.
Data Protection
Data protection is the process of safeguarding important information from corruption,
compromise or loss.
The importance of data protection increases as the amount of data created and stored
continues to grow at unprecedented rates. There is also little tolerance for downtime that
can make it impossible to access important information.
India has recently banned 118 additional Chinese apps. As per reports, this ban comes
under Section 69A of the Information Technology Act and is due to the illegal data
collection practices followed by these apps. These apps were found to be collecting
extensive information about their users without taking explicit permission. Collected
information included but not limited to – data from users’ clipboard, their GPS locations,
and vital network related information such as IP, local IP, MAC addresses, WIFI access
point names, etc. Some of the apps were even found setting up local proxy servers on
users’ devices to transcode media without permission.
Around the world, major corporations are being fined millions of dollars due to non-
compliance with regional data protection laws. So far Europe’s GDPR has been
considered one of the most stringent ones, and now India’s PDPB is set to take the
benchmark to another level and make it one of the world’s most extensive data
protection policies.
BCU Digital Fluency Module / Unit 3 42
What is data protection, and why is it important?
With the increase in user-generated data and the exponential industrial value of data,
it’s becoming vital that the government bodies take necessary steps to protect the data
rights of their citizens. Data protection regulations ensure the security of individuals’
personal data and regulate the collection, usage, transfer, and disclosure of the said
data. They also provide access to data of the individuals and places accountability
measures for organizations processing personal data and supplements it by providing
remedies for unauthorised and harmful processing.
What is GDPR?
The General Data Protection Regulation (GDPR) came into effect in May 2018 and has
been an essential step in strengthening citizens’ fundamental rights in the current Digital
Revolution, and monitoring businesses, and preventing these companies from misusing
data for their capital gains which puts the user at risk.
GDPR has been highly active and has imposed fines in millions of euros on companies
like Facebook and Google.
India’s Personal Data Protection Bill (PDPB), which is currently under the draft, is said to
be one of the most comprehensive data protection laws, and in some ways stricter than
European Union’s GDPR. Let us understand a few terms
Personal Data: This is information that relates to an individual, and can be used to
identify them, and includes data such as – Name, contact details – Email ID, Phone
number, Fingerprint, web history, cookie data, etc
Sensitive Personal Data: The following personal data is considered ‘sensitive’ and is
subject to specific processing conditions: passwords, financial data, data revealing racial
or ethnic origin, political opinions, religious or philosophical beliefs, caste/ tribe/
community identifiers, health-related data, data concerning a person’s sexual
orientation, biometric and genetic data
BCU Digital Fluency Module / Unit 3 43
Electronic waste, also known as e-waste, is any electronic product, or product containing
electronic components, that has reached the end of its usable life cycle. Unbeknownst to
many consumers, electronics actually contain toxic substances - therefore they must be
handled with care when no longer wanted or needed. If a product is outdated,
consumers can donate it to someone who might still find it valuable. Many retailers also
offer trade-in programs or incentives for people looking to upgrade electronics that
BCU Digital Fluency Module / Unit 3 44
require the surrender of an older model; the retailers are able to reuse or repurpose the
older models. However, if a product is totally unusable or broken, instead of just being
thrown in the garbage, it must be thrown away by a certified e-waste hauler or recycler,
or taken to a designated drop-off at a government building, school or organization as e-
waste can potentially cause harm to humans, animals and the global environment if
disposed of improperly.
The consequences of improper e-waste disposal in landfills or other non-dumping sites
pose serious threats to current public health and can pollute ecosystems for generations
to come. When electronics are improperly disposed and end up in landfills, toxic
chemicals are released, impacting the earth’s air, soil, water and ultimately, human
health.
The Negative Effects on Air
After soil contamination, heavy metals from e-waste, such as mercury, lithium, lead and
barium, then leak through the earth even further to reach groundwater. When these
heavy metals reach groundwater, they eventually make their way into ponds, streams,
rivers and lakes. Through these pathways, acidification and toxification are created in
the water, which is unsafe for animals, plants and communities even if they are miles
away from a recycling site. Clean drinking water becomes problematic to find.
BCU Digital Fluency Module / Unit 3 46
Acidification can kill marine and freshwater organisms, disturb biodiversity and harm
ecosystems. If acidification is present in water supplies, it can damage ecosystems to
the point where recovery is questionable, if not impossible.
The Negative Effects on Humans
As mentioned, electronic waste contains toxic components that are dangerous to human
health, such as mercury, lead, cadmium, polybrominated flame retardants, barium and
lithium. The negative health effects of these toxins on humans include brain, heart, liver,
kidney and skeletal system damage. It can also considerably affect the nervous and
reproductive systems of the human body, leading to disease and birth defects. Improper
disposal of e-waste is unbelievably dangerous to the global environment, which is why it
is so important to spread awareness on this growing problem and the threatening
aftermath. To avoid these toxic effects of e-waste, it is crucial to properly e-cycle, so
that items can be recycled, refurbished, resold, or reused. The growing stream of e-
waste will only worsen if not educated on the correct measures of disposal.