0% found this document useful (0 votes)
131 views

DF Unit 3 Notes

The document discusses databases and database management systems. It defines a database as a collection of interrelated data that can be efficiently retrieved, inserted, and deleted. A database management system (DBMS) is software that allows users to create, update, and administer a database. It provides features like data definition, retrieval, updating, security, and user administration. Popular DBMS examples include Oracle, MySQL, and SQL Server. The document also covers different types of databases like centralized and distributed databases.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views

DF Unit 3 Notes

The document discusses databases and database management systems. It defines a database as a collection of interrelated data that can be efficiently retrieved, inserted, and deleted. A database management system (DBMS) is software that allows users to create, update, and administer a database. It provides features like data definition, retrieval, updating, security, and user administration. Popular DBMS examples include Oracle, MySQL, and SQL Server. The document also covers different types of databases like centralized and distributed databases.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

BCU Digital Fluency Module / Unit 3 1

DIGITAL FLUENCY
Module 3 : Digital Fluency (NEP) Modified Syllabus As Per Notification
Dated: 29/12/2021 Prescribed by;
BCU Digital Fluency Module / Unit 3 2
What is Database

The database is a collection of inter-related data which is used to retrieve, insert and
delete the data efficiently. It is also used to organize the data in the form of a table,
schema, views, and reports, etc.

For example: The college Database organizes the data about the admin, staff, students
and faculty etc.

Using the database, you can easily retrieve, insert, and delete the information.

Database Management System


o Database management system is a software which is used to manage the database. For
example: MySQL, Oracle, etc are a very popular commercial database which is used in
different applications.

o DBMS provides an interface to perform various operations like database creation, storing
data in it, updating data, creating a table in the database and a lot more.

o It provides protection and security to the database. In the case of multiple users, it also
maintains data consistency.

DBMS allows users the following tasks:

o Data Definition: It is used for creation, modification, and removal of definition that defines
the organization of data in the database.

o Data Updation: It is used for the insertion, modification, and deletion of the actual data in
the database.

o Data Retrieval: It is used to retrieve the data from the database which can be used by
applications for various purposes.

o User Administration: It is used for registering and monitoring users, maintain data
integrity, enforcing data security, dealing with concurrency control, monitoring performance
and recovering information corrupted by unexpected failure.

Characteristics of DBMS
o It uses a digital repository established on a server to store and manage the information.

o It can provide a clear and logical view of the process that manipulates data.
BCU Digital Fluency Module / Unit 3 3
o DBMS contains automatic backup and recovery procedures.

o It contains ACID properties which maintain data in a healthy state in case of failure.

o It can reduce the complex relationship between data.

o It is used to support manipulation and processing of data.

o It is used to provide security of data.

o It can view the database from different viewpoints according to the requirements of the
user.

Functions of DBMS

 Create structured databases and supporting platforms for enhanced


performance.
 Appropriate backup and data recovery operations to be set.
 Adequate security and anti-virus measures.
 Read and modify existing data if required.

Advantages of DBMS
o Controls database redundancy: It can control data redundancy because it stores all the
data in one single database file and that recorded data is placed in the database.

o Data sharing: In DBMS, the authorized users of an organization can share the data among
multiple users.

o Easily Maintenance: It can be easily maintainable due to the centralized nature of the
database system.

o Reduce time: It reduces development time and maintenance need.

o Backup: It provides backup and recovery subsystems which create automatic backup of
data from hardware and software failures and restores the data if required.

o multiple user interface: It provides different types of user interfaces like graphical user
interfaces, application program interfaces

Disadvantages of DBMS
o Cost of Hardware and Software: It requires a high speed of data processor and large
memory size to run DBMS software.
BCU Digital Fluency Module / Unit 3 4
o Size: It occupies a large space of disks and large memory to run them efficiently.

o Complexity: Database system creates additional complexity and requirements.

o Higher impact of failure: Failure is highly impacted the database because in most of the
organization, all the data stored in a single database and if the database is damaged due to
electric failure or database corruption then the data may be lost forever.

Applications of Database management system in different sectors

 Manufacturing: Product-based industries manufacture different types of products


and deliver them daily, weekly, or monthly basis. In this sector, DBMS is used to
store information about products like the quantity of the products, product bills,
supply chain management.
 Banking & Finance: In banking, DBMS is used to store the customer transaction
details, and in the finance sector, it is used to hold the data about sales, stocks,
and bonds.
 Education sector: DBMS is very useful for this sector. Information about the
students, their attendance, courses, fees, results are stored in the database. Apart
from this, DBMS is used to store the staff data also. In addition, many colleges and
universities use DMMS for conducting online examinations.
 Credit card transaction: While purchasing a credit card and creating a monthly
statement, DBMS is used.
 Social media sites: Nowadays, social media are the popular platforms to share
our thoughts and views with the world and with our friends. Social media also allow
us to connect with our friends. Millions of sign-ins and sign-ups happen daily for
BCU Digital Fluency Module / Unit 3 5
social media like Facebook, Twitter, Linkedin, and so on. All these things happen
with the help of DBMS that allows us to connect with others.
 Telecommunication: All telecommunication companies use DBMS. The database
management system is crucial for this sector to store monthly postpaid bills and
customer call details in the database.
 Railways & airlines reservation system: DBMS is necessary to store the data of
ticket booking and keep the information of train/ airplane arrivals, departure, and
delay status.
 Human resource management: Big industries have more employees. DBMS is
required to store employees’ information like their permanent address, salary, tax
and other details.
 Online shopping: To save time, online shopping is helpful. Present days online
shopping created a trend. People love to do online shopping through websites like
Amazon, Flipkart. All the transactions such as products added, the products sold,
generation of invoice bills, payments happen with the help of DBMS

Examples of DBMS

There is a wide range of database software solutions, including both enterprise and open
source solutions, available for database management.
Here are some of the most popular database management systems:

Oracle
Oracle Database is a commercial relational database management system. It utilizes
enterprise-scale database technology with a robust set of features right out of the box.
It can be stored in the cloud or on-premises.

MySQL
MySQL is a relational database management system that is commonly used with open-
source content management systems and large platforms like Facebook, Twitter, and
Youtube.

SQL Server
Developed by Microsoft, SQL Server is a relational database management system built
on top of structured query language (SQL), a standardized programming language that
allows database administrators to manage databases and query data.

Types of Databases

There are various types of databases used for storing different varieties of data:
BCU Digital Fluency Module / Unit 3 6

1) Centralized Database

It is the type of database that stores data at a centralized database system. It comforts
the users to access the stored data from different locations through several applications.
These applications contain the authentication process to let users access data securely.
An example of a Centralized database can be Central Library that carries a central
database of each library in a college/university.

Advantages of Centralized Database


o It has decreased the risk of data management, i.e., manipulation of data will not affect the
core data.

o Data consistency is maintained as it manages data in a central repository.

o It provides better data quality, which enables organizations to establish data standards.
BCU Digital Fluency Module / Unit 3 7
o It is less costly because fewer vendors are required to handle the data sets.

Disadvantages of Centralized Database


o The size of the centralized database is large, which increases the response time for fetching
the data.

o It is not easy to update such an extensive database system.

o If any server failure occurs, entire data will be lost, which could be a huge loss.

2) Distributed Database
Unlike a centralized database system, in distributed systems, data is distributed among
different database systems of an organization. These database systems are connected via
communication links. Such links help the end-users to access the data
easily. Examples of the Distributed database are Apache Cassandra, HBase, Ignite, etc.

We can further divide a distributed database system into:


BCU Digital Fluency Module / Unit 3 8

o Homogeneous DDB: Those database systems which execute on the same operating
system and use the same application process and carry the same hardware devices.

o Heterogeneous DDB: Those database systems which execute on different operating


systems under different application procedures, and carries different hardware devices.
BCU Digital Fluency Module / Unit 3 9

Advantages of Distributed Database


o Modular development is possible in a distributed database, i.e., the system can be expanded
by including new computers and connecting them to the distributed system.

o One server failure will not affect the entire data set.

3) Relational Database
This database is based on the relational data model, which stores data in the form of
rows(tuple) and columns(attributes), and together forms a table(relation). A relational
database uses SQL for storing, manipulating, as well as maintaining the data. E.F. Codd
invented the database in 1970. Each table in the database carries a key that makes the
data unique from others. Examples of Relational databases are MySQL, Microsoft SQL
Server, Oracle, etc.

A relational database management system (RDBMS) is a system where data is organized


in two-dimensional tables using rows and columns.

This is one of the most popular data models which is used in industries. It is based on
SQL.
BCU Digital Fluency Module / Unit 3 10
Every table in a database has a key field which uniquely identifies each record.
This type of system is the most widely used DBMS.
Relational database management system software is available for personal computers,
workstation and large mainframe systems.
For example − Oracle Database, MySQL, Microsoft SQL Server etc.

Std ID Name City

201 Bob Hyderabad

204 Lucky Chennai

205 Pinky Bangalore

In the above student table Std ID, Name and city are called as attributes and their values.
Std ID is a primary key attribute.

Properties of Relational Database


There are following four commonly known properties of a relational model known as ACID
properties, where:

A means Atomicity: This ensures the data operation will complete either with success or
with failure. It follows the 'all or nothing' strategy. For example, a transaction will either
be committed or will abort.

C means Consistency: If we perform any operation over the data, its value before and
after the operation should be preserved. For example, the account balance before and
after the transaction should be correct, i.e., it should remain conserved.

I means Isolation: There can be concurrent users for accessing data at the same time
from the database. Thus, isolation between the data should remain isolated. For example,
when multiple transactions occur at the same time, one transaction effects should not be
visible to the other transactions in the database.

D means Durability: It ensures that once it completes the operation and commits the
data, data changes should remain permanent.
BCU Digital Fluency Module / Unit 3 11
Object Oriented Database
It is a system where information or data is represented in the form of objects which is
used in object-oriented programming.
 It is a combination of relational database concepts and object-oriented principles.
 Relational database concepts are concurrency control, transactions, etc.
 OOPs principles are data encapsulation, inheritance, and polymorphism.
 It requires less code and is easy to maintain.
For example − Object DB software.
The object oriented database is represented in diagram format below −

Hierarchical Database
It is a system where the data elements have a one to many relationship (1: N). Here data
is organized like a tree which is similar to a folder structure in your computer system.
 The hierarchy starts from the root node, connecting all the child nodes to the parent
node.
 It is used in industry on mainframe platforms.
For example− IMS(IBM), Windows registry (Microsoft).
An example of a hierarchical database is given below −
BCU Digital Fluency Module / Unit 3 12

Short Glance About DBMS;

What is a database management system used for?

It is used for storing, organizing, managing and easy retrieving a large number of data
in electronic storage discs.

What does a database management system include?

DBMS includes programs and applications to manage a large number of data in


electronic storage systems.

What is database management software?

It is the software that takes care of efficiently creating, reading, updating and deleting a
large set of data in electronic data storage devices.
BCU Digital Fluency Module / Unit 3 13
What is database management software best for?

Database management software is best for storing and managing a huge number of
related information.

Introduction to E-learning Platforms

E-learning is a structured course or learning experience delivered electronically; it can


also include performance support content. There are also many different elements that
can make up an e-learning program, such as live or pre-recorded lecture content, video,
quizzes, simulations, games, activities, and other interactive elements.
In Simple terms A learning system based on formalised teaching but with the
help of electronic resources is known as E-learning. While teaching can be based in
or out of the classrooms, the use of computers and the Internet forms the major
component of E-learning.

benefits associated with E-Learning

 Online learning promotes active independent learning.


 It is really a very convenient option for learning for people who are working full time
or part-time students.
 The ultimate convenience and flexibility of e-learning enable people to get the
resources available from anywhere and at any point in time.
 People can train themselves anytime and from anywhere also due to easy
accessibility of the net 24x7.
 Individuals can also train themselves on a day to day basis or on weekends or
whenever they are having free time to do so.
 One can also interact with everyone online and clear his or her doubts if there is any
through discussion boards and chats.
BCU Digital Fluency Module / Unit 3 14
Disadvantages of online learning
Besides all the advantages, there are some disadvantages of e-learning mentioned below.

 Individuals just get knowledge on a theoretical basis and when they are about to
put to use whatever they have learned; it may be a little different thing.
 Face-to-face learning is completely missing in online learning that really matters to
some of the people.
 The extent of security is also one of the main problems in E-learning programs.
 Most of the online assessments are also limited to questions that are only objective
in nature.
 Furthermore, the online assessments which are computer marked normally have a
tendency of being knowledge-based only and these are not essentially practicality-
based.
 The authenticity of the work of any online course student is also a problem as online
anyone can do any project rather than the real student itself.

E-learning Platforms in India


The Government of India has developed several free e-Learning platforms for the
learners across various branches. The aim of free e-Learning platforms is to keep the
learning and the teaching system uninterrupted and ongoing. To overcome the
prevailing COVID 19 crisis, the Government of India has taken several initiatives through
the Ministry of Education and UGC. Not one but many free e-Learning platforms have
been developed and launched by the Government of India in due course.

Free e-Learning platforms developed by the Government of India contain various


courses that can be accessed by the students, teachers, professionals and learners. The
contents are available in the form of audio, video, presentation, PDFs, tests etc. A
complete list of free e-Learning platforms developed by the Government of India is
shared below.

List of free e-Learning platforms developed by the Government of


India:
1. Swayam: The objective of SWAYAM is to provide a learning platform to all,
including the most disadvantaged. It hosts almost all the courses taught in
classrooms from Class 9 till post-graduation. More information on SWAYAM can be
obtained on the official website, swayam.gov.in.

2. Diksha: This is an initiative of the National Council of Educational Research and


Training, Ministry of Education, Government of India. DIKSHA can be accessed at
diksha.gov.in by the learners and teachers across the country. It currently
supports various courses of NCERT, CBSE and SCERTs across India.
BCU Digital Fluency Module / Unit 3 15
3. e-ShodhSindhu: It will continue to provide current as well as archival access to
more than 10,000 peer-reviewed journals and a number of bibliographic, citation
and factual databases to its member institutions. e-ShodhSindhu can be accessed
at ess.inflibnet.ac.in.

4. e-PG Pathshala: It is an initiative taken by the MHRD under its National Mission
on Education through ICT, which is being executed by the UGC. The platform,
epgp.inflibnet.ac.in provides interactive e-content in 70 subjects across all
disciplines of social sciences, arts, fine arts and humanities, natural &
mathematical sciences.

5. Swayam Prabha: It consists of 34 DTH channels, which is devoted to telecasting


high-quality educational programmes 24X7. The course contents are provided by
NPTEL, IITs, UGC, CEC, IGNOU, NCERT and NIOS. The website is
swayamprabha.gov.in.

6. NPTEL: The National Programme on Technology Enhanced Learning was initiated


by IIT Bombay, IIT Delhi, IIT Kanpur, IIT Kharagpur, IIT Madras, IIT Guwahati,
IIT Roorkee along with Indian Institute of Science, Bangalore in 2003. NPTEL
platform, nptel.ac.in provides open online courses around engineering and core
science subjects.

Advantages of E-learning During Covid-19 Pandemic

E-learning is the recent and effective way if you have a desire to grow as a professional.
The motive to upskill yourself is not restricted to a fixed structure. Here are the advantages
of e-learning that you can enjoy during COVID-19 and in the future as well:

 Be flexible with your learning approach! Now you can learn even from the remote
area where web access is easily available.
 Schedule your learning accordingly where you can also manage your work and your
learning side by side.
 Keep your safety as your priority. There is no need to step out to learn something
new. Make sure you have your digital resources by your side.
 E-learning has given rise to the “microlearning” concept where you can clear your
basics, even the tiniest details of the course.
 Make learning fun by just having a mobile or tablet by your side that can do training
work for you.
 Increased participation and retention of materials is one of the major advantages of
e-learning as it deepens the impact of learned content on you.
 Don’t stop yourself from leveraging the correct opportunities by learning new skills.
 Keep yourself updated with the fresh content which is available on the online
learning platforms.
BCU Digital Fluency Module / Unit 3 16
 It opens the doors of promotion if you are already working. Just make sure you are
learning the exact skills that a particular job position demands.
It opens the doors of promotion if you are already working. Just make sure you are
learning the exact skills that a particular job position demands.

Disadvantages of e-learning during COVID-19

Every aspect has two sides. If e-learning has established its presence successfully, there
are still some issues that are there. Here are some of the disadvantages of e-learning
during COVID-19 which may apply in the future as well:

 Technical glitch is one of the major disadvantages of e-learning as it doesn’t let any
option left for the user to learn effectively.
 Health issues may occur due to increased screen time
 Inability to focus on what the instructor is teaching may hamper the learning of the
individual.
 E-learning often leads to isolation as the interaction is kept with the teacher only
and not with other students.
 Lack of focus in some individuals becomes a hurdle in learning new skills.
E-learning advantages and disadvantages completely depend upon the individual, not on
the method of training. You just need to learn how to use online training for your benefit.

SWAYAM

According to https://swayam.gov.in/

Home > About Swayam


BCU Digital Fluency Module / Unit 3 17
About SWAYAM
SWAYAM is a programme initiated by Government of India and designed to achieve the
three cardinal principles of Education Policy viz., access, equity and quality. The
objective of this effort is to take the best teaching learning resources to all, including the
most disadvantaged. SWAYAM seeks to bridge the digital divide for students who have
hitherto remained untouched by the digital revolution and have not been able to join the
mainstream of the knowledge economy.

This is done through a platform that facilitates hosting of all the courses, taught in
classrooms from Class 9 till post-graduation to be accessed by anyone, anywhere at any
time. All the courses are interactive, prepared by the best teachers in the country and are
available, free of cost to any learner. More than 1,000 specially chosen faculty and teachers
from across the country have participated in preparing these courses.
The courses hosted on SWAYAM are in 4 quadrants – (1) video lecture, (2) specially
prepared reading material that can be downloaded/printed (3) self-assessment tests
through tests and quizzes and (4) an online discussion forum for clearing the doubts. Steps
have been taken to enrich the learning experience by using audio-video and multi-media
and state of the art pedagogy / technology.
In order to ensure that best quality content is produced and delivered, nine National
Coordinators have been appointed. They are:

1. AICTE (All India Council for Technical Education) for self-paced and international
courses
2. NPTEL (National Programme on Technology Enhanced Learning) for Engineering
3. UGC (University Grants Commission) for non technical post-graduation education
4. CEC (Consortium for Educational Communication) for under-graduate education
5. NCERT (National Council of Educational Research and Training) for school education
6. NIOS (National Institute of Open Schooling) for school education
7. IGNOU (Indira Gandhi National Open University) for out-of-school students
8. IIMB (Indian Institute of Management, Bangalore) for management studies
9. NITTTR (National Institute of Technical Teachers Training and Research) for Teacher
Training programme

Courses delivered through SWAYAM are available free of cost to the learners, however
learners wanting a SWAYAM certificate should register for the final proctored exams that
come at a fee and attend in-person at designated centres on specified dates. Eligibility for
the certificate will be announced on the course page and learners will get certificates only if
this criteria is matched. Universities/colleges approving credit transfer for these courses can
use the marks/certificate obtained in these courses for the same.

Briefs

Here is everything you need to know about the initiative:


BCU Digital Fluency Module / Unit 3 18
 Swayam uses indigenously developed IT platform, facilitating hosting of all
courses, taught in classrooms from Class 9 till post-graduation to be accessed by
anyone, anywhere at any time.
 Swayam aims to provide interactive courses, prepared by best teachers in the
country and are available free of cost to the residents in India. Over 1,000
specially chosen teachers from across the country have participated in preparing
Swayam courses.
 Course format: Swayam courses are available on swayam.gov.in website in four
quadrants: video lecture, specially-prepared reading material that can be
downloaded/printed, self-assessment tests through tests and quizzes and an
online discussion forum for clearing the doubts.
 National coordinators: To ensure best quality content, seven national
coordinators have been appointed. They are NPTEL for engineering, UGC for post-
graduation education, CEC for under-graduate education, NCERT & NIOS for
school education, IGNOU for out of the school students and IIMB for management
studies.
 Cost: Swayam courses are available free of cost to the learners.
 Certification: Students wanting Swayam certifications need to register. They
would be offered a certificate on successful completion of the course and charged
a little fee.
 Transferable marks/grades: At the end of each course, students would also be
assessed through proctored examination and the marks/grades secured in this
exam could be transferred to the academic record of the students. For this, the
UGC has issued UGC (Credit Framework for online learning courses through
Swayam) Regulation 2016, advising the universities to identify courses where
credits can be transferred on to the academic record of the students for courses
done on Swayam.
 Indigenous Swayam platform: It has been indigenously developed by Ministry
of Human Resource Development (MHRD) and All India Council for Technical
Education (AICTE) with the help of Microsoft.
 Total courses: Swayam platform is capable of hosting 2000 courses and 80000
hours of learning, covering school, under-graduate, post-graduate, engineering,
law and other professional courses.
BCU Digital Fluency Module / Unit 3 19
MOOC
BCU Digital Fluency Module / Unit 3 20
What is a MOOC?

A massive open online course (MOOC) is a free web-based distance learning program that is
designed for large numbers of geographically dispersed students.

A MOOC may be patterned on a college or university course or be less structured. Although


they do not always offer academic credits, these courses may offer a certification, enhance
employment opportunities or further studies. Typically, MOOCs are used for higher
education and career advancement. But due to the coronavirus pandemic, many public
school districts and undergraduate degree programs have implemented MOOCs as the new
standard.

How do MOOCs work?

MOOCs are online courses that a student accesses through the internet. Typically, these
courses consist of traditional class materials made accessible online, which may include the
following:

 filmed or recorded video lectures;


 readings;
 problem sets;
 online quizzes and examinations;
 interactive learning modules; and
 interaction with other students via forums.

Typically, each MOOC will include a course provider and a course platform. A course provider
is often a university, which supplies the course materials and instructors. The platform --
such as EdX, Canvas, Coursera or Udacity -- provides the technological infrastructure for
course modules, user access and other learning resources.
BCU Digital Fluency Module / Unit 3 21
Finding MOOCs
Providers of MOOCs are mostly universities but may also be corporate entities. Top
educational institutions and universities, such as Harvard, the Massachusetts Institute of
Technology (MIT) and Stanford, are leading providers of online courses. Corporations such
as Microsoft and Accenture also provide publicly available online courses. When searching
for a MOOC to take, it is important to make sure that the course aligns with the student's
education and career goals.
Credentials and MOOC-based degrees
MOOCs can also be used for continuing education certifications and degree programs. MOOC
certification levels typically fall into the following six general categories:
 Free. These courses are completely free, but usually only to audit. However,
students still have the option to pay for an official certificate of completion at the
end of the course.
 Certificates. Certificates for completing individual courses range from about $20
at the lower end, to around $300, with the average being between $50 to $100.
 Micro credential. Micro credential programs typically consist of three to six
courses. According to EdX, a popular platform for MOOCs, the median price for
micro credential programs is $946. Typically, they are narrow in focus and provide
a specific skill or competency.
 University credit. Courses in this tier are university accredited and comparable to
online courses at institutions that provide degrees. Individual courses at this level
can range from a few hundred dollars to a few thousand dollars.
 Online degree. Online degree programs are equivalent to master's or continuing
education degree programs at universities and offer comparable volume and depth
of coursework. Online degree programs generally follow a traditional application
and admissions process and range from a few thousand dollars to tens of
thousands of dollars.
 Corporate training. Corporate training MOOCs are deployed on an enterprise
level. This pricing option is typically structured as a per-user cost for access.

Benefits of MOOCs
The widespread adoption and use of online courses provides the following benefits:
 No physical location dependence. This can improve collaboration efforts and
save time by eliminating a student's daily commute. Online education also enables
social distancing.
 Improved access to higher education. Not only is this a function of
convenience, but access to high-quality education in developing countries can
ultimately increase quality of life and contribute to sustainable development efforts
by providing a high-quality, accessible learning infrastructure.
 Affordability of higher education. Scalability makes these types of courses
more cost-effective than in-person courses of comparable scope.
BCU Digital Fluency Module / Unit 3 22
 Flexible learning schedule. Many courses are self-paced, which can
accommodate student work schedules. Even if course completion is not self-paced,
as with online degree programs, prerecorded lectures can offer more flexibility on a
daily and weekly basis.

Drawbacks of MOOCs
Though MOOCs have numerous benefits, there are the following associated drawbacks:
 Flexibility can make the course more difficult to manage, as some students require
the structure of in-person learning.
 A University of Texas study of online course completion rates found that MOOC
completion rates are just 6.8%, significantly lower than in-person courses.
Students may not feel as committed to attend a free online course as they would
an in-person course that requires tuition.
 Instructors are less accessible.
 Digital literacy is required for effective use.
 Students are less likely to form relationships with instructors and other students.
 Students with visual or auditory disabilities may not be accommodated.
 Courses require strong internet connections, which can be an issue in developing
countries and underprivileged communities.
 When searching for the right course, large amounts of similar courses for saturated
areas, such as computer science, may lead to a paradox of choice.

Virtual Meet

Virtual meeting platforms are video applications and software that bring people together
over the internet. Usually, this software includes a form of video conferencing, as well as
tools like chat, reactions and screen sharing. Examples of this software include Zoom,
Webex, Google Meet, Lifesize and Jami. These apps are also called “online meeting
platforms.”
BCU Digital Fluency Module / Unit 3 23
List of virtual meeting platforms

Video conferencing capabilities bring virtual teams together in real time. From the
ubiquitous Zoom to less-known Jitsi Meet, these virtual meeting apps are ready for you
and your remote team to try.

1. Zoom

Zoom is a popular video conferencing platform that is infamous for being easy to use.
You can invite anyone to a Zoom meeting with a URL, even if your attendees do not
have a Zoom account. Once team members click on the URL, they will instantly join a
virtual room with the rest of the team. Registered users can host meetings with up to
100 people using the free version of Zoom’s software. Coupled with fun features like
breakout rooms, Zoom is ideal for hosting meetings, games and activities with virtual
teams.

2. Google Meet

Google originally developed Google Meet as a virtual meeting platform for the company’s
enterprise customers. However, with Zoom’s surge in popularity, Google decided to offer
Meet as a secure alternative. Meet can host gatherings of up to 250 participants, and
also offers nifty additions like live captions and anti-abuse features. If data security is a
priority for your business, then Meet is right for you, as long as everyone has a Google
Account.
BCU Digital Fluency Module / Unit 3 24
3. Skype

Acquired by Microsoft in 2011, Skype was the original household name for video calls.
However, due to consumer complaints and the emergence of Zoom as noted on ZDNet,
Skype is no longer the only or primary option for meetings. Skype is mounting a
comeback with video conferencing, making it the perfect time to revisit the familiar
software with a cute ringtone. The app now offers meetings for up to 50 participants
accessible by a generated link. No registration or download required.

4. Cisco Webex

Cisco Webex is online meeting software originally intended for businesses. With its
intuitive controls and tight security, Webex has long helped businesses stay connected.
By signing up for Webex’s free plan, you can host virtual meetings or games with up to
100 people for any duration. This feature contrasts with Zoom, which limits your
meeting time to 40 minutes if three or more people are in your meeting. Therefore, by
choosing Webex, you won’t have to worry about time limits for your next online
meeting.

5. Jitsi Meet

For an open source platform option you can customize, consider Jitsi Meet for your next
virtual meeting. Secured by strong encryption, this virtual conference software does not
cost anything, require you to register, or limit the number of people you can invite to
meetings. With such flexibility, Jitsi Meet offers endless possibilities for you and your
team to hold virtual meetings, online conferences and more.
BCU Digital Fluency Module / Unit 3 25
Technical Requirements for Virtual Meet
What do I need in order to participate in virtual meetings?

For best virtual meeting experience, you will need access to the following:

 Laptop, desktop or even a smartphone


 Application of Software (App) if required
 High speed Internet .
 USB headset with microphone
 Webcam (if required for your class)
 A quiet location where you will have privacy

Scheduling, Joining and Recording

(Learn Practically With the help of Co-ordinator and submit learning


report in minimum of 4 pages)

Online Forms.

An online form, also known as a web form, E- Form or an HTML form, is an interactive
web page that allows for user input. The data received through the form is then
BCU Digital Fluency Module / Unit 3 26
automatically sent to a server for processing. In collecting data and obtaining the
contact information of users, online forms help capture leads.

There are many types of online forms, ranging from contact forms to the RSVP section
of an event website, to forms that manage online orders and payments on an online
store, educational research forms and much more.

The main elements of online forms:

Online forms, much like their paper counterparts, are usually composed of a question or
a series of questions. These are paired with fields in which users can either type in their
answer, or select the most appropriate response out of several available ones.
Online forms can be composed of just one or several types of fields, mixed and
matched. The main types of fields in online forms are:
 Text boxes: Also known as input fields, text boxes are blank fields meant for text
to be typed freely into them. For example, typing in a password during login.
Best for: Open-ended questions or questions with an infinite amount of possible
answers (such as a name or password).

 Drop-down lists: Drop-down lists are fields that once clicked, open up into a list.
The list includes several items from which a single item can then be chosen.
Best for: Picking one option out of a list.
BCU Digital Fluency Module / Unit 3 27

 Check boxes: Small square boxes that are ticked or unticked when clicked. Most
forms allow users to pick more than one option per check box field (also known as
multi selection). An example of a check box is the box you tick to approve the
terms and conditions of a web service.
Best for: Picking one or more options out of a list.

 Radio buttons: Small circular buttons. Radio buttons usually come in a list of two
or more optional answers, out of which the user can select the single most
appropriate answer by clicking it. Once selected, radio buttons show an added dot
in their center.
Best for: Picking one option out of several options.
 options.
BCU Digital Fluency Module / Unit 3 28

 Submit button: The last button at the bottom of an online form is usually
reserved for submitting the answers upon completion. The button microcopy can
vary from “Send” to “Get in Touch” or “Request a Price Quote,” but the intention
stays the same throughout - the provided information will now be sent over to the
website owner.
Acting as the call to action of the form, the submit button will usually stand out in
its design from the rest of the page, in order to draw attention.

Best for: The very end of an online form.


 Feedback message: An automated feedback message that shows up once the
submit button is clicked, signaling that the form went through successfully, or
alternatively notifying of a problem in its completion. It usually appears on the
same page as the form itself, but can also open in a separate pop-up window.
Best for: Once the form has been submitted.

Creating Questionnaire. (Reference Google Forms)


BCU Digital Fluency Module / Unit 3 29

Preliminary decisions in questionnaire design

There are nine steps involved in the development of a questionnaire:

1. Decide the information required.


2. Define the target respondents.
3. Choose the method(s) of reaching your target
respondents.
4. Decide on question content.
5. Develop the question wording.
6. Put questions into a meaningful order and format.
7. Check the length of the questionnaire.
8. Pre-test the questionnaire.
9. Develop the final survey form.

6 Steps For Conducting An Online Survey

1. Decide on your research goals. ...


2. Create a list of questions. ...
3. Invite the participants. ...
4. Gather your responses. ...
BCU Digital Fluency Module / Unit 3 30
5. Analyse the results. ...
6. Write a report.

Publishing Questionnaire.

Publish by Email
 Single-Use Link:
o Link can be used only once
o You can Pre-populate, track participation, send reminders and prevent
ballot box stuffing
 Multi-Use Link:
o Forward to others to extend your participation network, set restrictions
for responses as needed
o You can Pre-populate, track participation and also send Reminders
 Automated Distribution:
o Automate invitation delivery based on the rules and conditions of your
choice.
o Use SoGoSurvey’s SFTP (Secure File Transfer Protocol) server to deposit
contact information

Publish On Social Media


 Facebook: Direct publication to Facebook from your SoGoSurvey account
 Twitter: Invite participation on Twitter
 LinkedIn: Reach audiences on LinkedIn and LinkedIn groups

Publish On Website
 Link/QR code: Add a multi-use link on your website or blog
 Embed: Integrate your survey fully by making it part of your website
 Embed Pop-up: Add a survey invitation pop-up directly on your website

Publish Offline/Mobile
 Survey Passwords: Create single- or multi-use passwords to invite
participants offline
 SMS Invitations: Send single-use participation links to mobile numbers in the
US, UK, Canada, and Australia.
 Offline Mode: Collect responses without internet connectivity
BCU Digital Fluency Module / Unit 3 31
Conducting online responses. Analysing the responses and copying
graphics into power Point and Excel.

If you are looking at the summary view of the results for some Form data you have
collected, you can copy a chart or diagram that you want to use elsewhere very easily
and quickly.

Simply hover over the chart or diagram, and a copy icon will appear in the upper right
corner of it. Click on that -

You will get a message that it has been copied to to the clipboard in the lower left corner
-
BCU Digital Fluency Module / Unit 3 32
You can then paste it into the location you want to use it. Here's an example in a G Doc,
Spreadsheets and Power Points.

I also pasted it into: Slides, an email, a Sites webpage, in my Blogger. A nice feature
addition that saves time from taking screenshots!
Examples of Interpretation Based on Spreadsheet and Power Points.
BCU Digital Fluency Module / Unit 3 33
Introduction to Societal Impact
Societal impact assessment (SIA) refers to a set of guidelines and principles to identify
the societal effects of new technologies, programs, and projects. Starting in the domain
of environmental issues, SIA has expanded into other areas where new technologies
start to shape the everyday life of citizens. With a strong focus on participatory and
anticipatory strategies, SIA attempts to establish a broader understanding of technology
taking into account the perspective of different.
What is social impact?

Social impact is the positive change your organization creates to address a pressing
social issue. This can be a local or global effort to tackle things like climate change,
racial inequity, hunger, poverty, homelessness, or any other problem your community is
facing.

Social impact can be about helping those in need, providing resources and advocacy, or
it can be about lessening the negative effects of doing business. Luckily, when it comes
to the world of social impact, the possibilities for how you can be a good steward in your

community are endless.

Corporate Social Responsibility

 Corporate social responsibility is a business model in which companies make a


concerted effort to operate in ways that enhance rather than degrade society and
the environment.
 CSR helps both society and the brand image of companies.
 Corporate responsibility programs are a great way to raise morale in the
workplace.
BCU Digital Fluency Module / Unit 3 34

Wipro established Wipro Cares in 2002 to take care of Corporate Social


Responsibility. The umbrella of Wipro Cares CSR activities includes projects like
education for underprivileged children and children with disabilities, healthcare facilities
for disadvantaged communities, environmental conservation projects and a lot more.
Apart from its CSR projects, Wipro explains that their first and foremost responsibility is
to run its all business functions in compliance with the law and ethics. They make sure
that they stand firm on their ground at all times.

CSR by Wipro Cares

Wipro is India’s leading information technology consulting services company that has
set up a foundation that takes care of its CSR needs. Wipro Cares is a non-profit trust
that channelizes its efforts in community service, education and societal development.
They believe no social program can run without strong ethical principles, proper
management and good governance. It was initiated in 2002. It focuses on
developmental issues of the underprivileged society.
BCU Digital Fluency Module / Unit 3 35

Digital Footprints

Digital footprint (DF) is the electronic trail we knowingly or unknowingly leave behind
each time we access the internet or other electronic devices. It is created when we
access services, post, or make comments on the internet.

Digital footprints are categorized into an active digital footprint and a passive digital
footprint . Active digital footprints are those details we knowingly leave behind online,
and which we still make use of everyday, while passive digital footprints are those which
are left behind unintentionally through our use of online services or whose services we
no longer access. The use of a digital footprint has both positive and negative
consequences.

How Our Digital Footprints Evolved (Basic Case Study)

Henry was sixteen years old when social networking media became the mainstay of
our daily life. During this period, he had access to the likes of MySpace, Hi5, Facebook,
and Orkut, all of which he used to maintain contact with family and friends.

Ten years later, at twenty-six years old, and out of college, he could hardly remember
the login details of his profiles on these platforms he had used ten years earlier except
maybe for LinkedIn, which he currently uses to track job opportunities.
BCU Digital Fluency Module / Unit 3 36
Two weeks ago, he surprisingly got an invitation to attend a job interview for a
professional position in a blue chip company on Wall Street.

He was hit with disappointment when he was told he could not get the job due to some
disturbing posts he had on one of his social media profiles ten years earlier.

Unfortunately, today, this is a common occurrence worldwide. With the advent of


the internet and lack of a well-defined internet use etiquette, just like Henry, many
people whose digital footprints have grown in large proportion are now at risk of not
only damaging their reputation, but also at risk of identity theft .

Not all digital footprints, however, are as a result of social network media as some
reports have shown.

You may be wondering what makes up our digital footprints? Well, wonder no more.
Below are some of the components of our digital footprints:

 Personal information
o Name
o Date of birth
o Address
o Phone number
o Photographs
 Own actions
o Emails sent
o Upload of documents, photographs,
o Text messages
o Websites visited
o Comments and posts on websites and online forums
 Service provider related
o Data collected during sign up for services online
o Telephone and internet service providers
o Other tools we use online everyday which requests some form of our data

Digital footprints are the records and traces individuals activities as they use
the Internet. Digital footprints are permanent stored. Your interactions on
social media, your friend circle on social media sites, sited you visit, online
purchases, locations visited through Facebook check-ins etc. all make up your
digital footprints.

In this era, your digital reputation is equally important, which is controlled by


your digital footprint.
BCU Digital Fluency Module / Unit 3 37

To manage your digital footprint, you can follow the guidelines given below :

1. Know what your digital footprint is :

Look at all the social networking sited and forums that you belong to,
and search your name to know what information about you is available.

2. E-behave responsibly :
You should be smart and sensible enough to know which sites you are
visiting, which emails you are sending, or what links you open. Also,
make sure to never share your location when online.

3. Keep your digital footprint clean :


Carefully go through your social media handles, past browsing history
on YouTube and other public sites and do the following :
o Remove any photos, content, and links that may be
inappropriate.
o Remove any details about you that reveal too much information
like your phone number, school, college name, address etc.
4. Control the visibility of your information :
Every web browser, social networking site offers options in their
settings to control the visibility and access of your information. Rather
than making every browsing activity and post of your public, your
should be selective about who you authorize to access your
information. It should be limited only your known circles or the people
you can trust upon (private), e.g., Friends, or Friends of Friends, or
your contacts etc.
5. Allow Comments Moderation :
As you know many comments on public websites are publicly seen,
monitor and moderate comments associated with you to maintain a
positive digital footprint, and a positive digital footprint is very
important thing.
6. Think before you post :
All the above mentioned steps are to control what has been done
earlier. But if you are cautious and think before you post anything
online, your digital footprint will be clean.

Digital cookies are the oldest method websites use to learn about their visitors.
BCU Digital Fluency Module / Unit 3 38
They are small files browsers store on your computer after your first visit to a website,
to track your activity on that site. Cookies can store user preferences and settings to let
the website customize itself to provide an optimal experience, tailored specially for each
user or set of users.

They can also store credentials to make it easy for you to log in to a previously visited
site.

There are different types of cookies.

One type, called session cookies, only live while you stay within a website. Once you
leave that website, the cookie automatically disappears. Other cookies are
called persistent cookies. These cookies remain for a while in your hard disk (or
whatever storage device you use) and are used for authentication –keeping track of
logged-in users and remembering the password, so the user doesn’t have to– or for
tracking user activity.

DIGITAL FOOTPRINT
Be Careful About Be Smart About
 What you share online  Sites you visit
 Where you share  Emails you open
 With whom you share  Links you clicks
BCU Digital Fluency Module / Unit 3 39
Digital Society and Netizen

These days, most of the tasks we do are done using digital technologies. We chat online,
shop online, learn online, and so much more. As a result, we have quite the online
presence. Therefore, in order to maintain a certain code of conduct as one would do so
in regular life, there are certain net etiquettes or netiquettes that have been created to
ensure that everyone is a responsible digital citizen (netizen).

1. Net Etiquettes (Set of Rules and Behaviouí)


Ethics:

Copyright Violation: Do not use copyrighted information without proper license i.e.
permission of the creator/owner. Creators such as Q-Programming have put a lot of
effort into sharing their content and hence one should respect these efforts and not use
materials without proper authorization.
Sharing Information: With access to unlimited online resources, we should share useful
information with others. However, make sure the information you share is accurate and
from a reputable source. A lot of fake information is spread nowadays which can lead to
consequences.

Respect:

Privacy: Respect the privacy of your fellow netizens. Good digital citizens understand
that everyone has the same rights and freedoms. If someone shares private information
with you DO NOT send it to anyone else without the sender's consent.
Diversity: Public forums and chat sites have great diversity in contributing members.
Make sure you respect other people's cultures and beliefs and expect that they do the
same for you.
BCU Digital Fluency Module / Unit 3 40
Responsibility:

Cyber Bullying: Remember that anything you say online to someone has the same effect
as if you say it to their face. Many people say offensive and hurtful things online thinking
that they can't be held accountable. However, remember that everything you say is part
of your digital footprint and can be easily traced back to you. Therefore, be careful what
you say on public forums as you can get in trouble, but also, most importantly, you can
cause harm to others.
Trolling: Internet trolls are people who intentionally disrupt harmony on online
platforms. They thrive on attention and hence you should not fuel them by supporting
them or rebutting. Trolls can be like online bullies they have fun when they make
someone react to their comments. The best thing you can do is ignore them.

2. Communication Etiquettes (Set of Rules and Behaviouí)


Precision:

Time: Everyone is busy and therefore we should not waste our valuable time on unnecessary
emails and comments. Similarly, do not expect others to respond to you instantly as they are
also preoccupied.

Data Limits: Avoid sending large files over the internet as they use a lot of data and bandwidth,
which come with their respective costs. You should make it a habit to send compressed files or
links, using various free services.

Politeness: While talking to someone online in a synchronous/real-


time or asynchronous format, be polite and non-aggressive. Do not use slurs or abuses even if
you get worked up.

Credibility: As discussed in a previous point, make sure whatever you write on the internet is
accurate and fact-checked. Spreading false information leads to unnecessary confusion.

3. Social Media Etiquettes (Set of Rules and Behaviouí)


Security:

Passwords: Choose strong passwords to safeguard against data leaks or hackers. Use a
combination of numbers, alphabets, allowed symbols and cases to create a password which is
tough to crack. Also, avoid sharing your account information with others.

Friends: Social networking sites allow us to talk to anyone else on the platform. Be wary,
however, as not everyone is friendly. Some people may even have malicious intentions. Be
careful of who you interact with online and only converse with those who you have met in real
life

Fake Information: There is a lot of fake information on the internet. This information is easily
spread via social networking sites. Therefore, when you see something, make sure it is accurate.
Experienced users are able to distinguish fake news from real news. Those who don't can verify
BCU Digital Fluency Module / Unit 3 41
information from reputed sources. Although platforms have algorithms to fact check, report any
misleading information to avoid further spread.

Reliability:
When you are about to upload something to the internet, pause for a moment and think of
the consequences your actions could have in the future. Once you are sure what you are posting
is acceptable, do so. Remember, as discussed earlier, that even if you delete an upload, it will
still be stored on the service's servers.

Data Protection
Data protection is the process of safeguarding important information from corruption,
compromise or loss.
The importance of data protection increases as the amount of data created and stored
continues to grow at unprecedented rates. There is also little tolerance for downtime that
can make it impossible to access important information.

India has recently banned 118 additional Chinese apps. As per reports, this ban comes
under Section 69A of the Information Technology Act and is due to the illegal data
collection practices followed by these apps. These apps were found to be collecting
extensive information about their users without taking explicit permission. Collected
information included but not limited to – data from users’ clipboard, their GPS locations,
and vital network related information such as IP, local IP, MAC addresses, WIFI access
point names, etc. Some of the apps were even found setting up local proxy servers on
users’ devices to transcode media without permission.

Around the world, major corporations are being fined millions of dollars due to non-
compliance with regional data protection laws. So far Europe’s GDPR has been
considered one of the most stringent ones, and now India’s PDPB is set to take the
benchmark to another level and make it one of the world’s most extensive data
protection policies.
BCU Digital Fluency Module / Unit 3 42
What is data protection, and why is it important?

With the increase in user-generated data and the exponential industrial value of data,
it’s becoming vital that the government bodies take necessary steps to protect the data
rights of their citizens. Data protection regulations ensure the security of individuals’
personal data and regulate the collection, usage, transfer, and disclosure of the said
data. They also provide access to data of the individuals and places accountability
measures for organizations processing personal data and supplements it by providing
remedies for unauthorised and harmful processing.

What is GDPR?

The General Data Protection Regulation (GDPR) came into effect in May 2018 and has
been an essential step in strengthening citizens’ fundamental rights in the current Digital
Revolution, and monitoring businesses, and preventing these companies from misusing
data for their capital gains which puts the user at risk.
GDPR has been highly active and has imposed fines in millions of euros on companies
like Facebook and Google.

What is India’s PDPB?

India’s Personal Data Protection Bill (PDPB), which is currently under the draft, is said to
be one of the most comprehensive data protection laws, and in some ways stricter than
European Union’s GDPR. Let us understand a few terms

Personal Data: This is information that relates to an individual, and can be used to
identify them, and includes data such as – Name, contact details – Email ID, Phone
number, Fingerprint, web history, cookie data, etc

Sensitive Personal Data: The following personal data is considered ‘sensitive’ and is
subject to specific processing conditions: passwords, financial data, data revealing racial
or ethnic origin, political opinions, religious or philosophical beliefs, caste/ tribe/
community identifiers, health-related data, data concerning a person’s sexual
orientation, biometric and genetic data
BCU Digital Fluency Module / Unit 3 43

E-waste and it’s impact on Health.

Electronic waste, also known as e-waste, is any electronic product, or product containing
electronic components, that has reached the end of its usable life cycle. Unbeknownst to
many consumers, electronics actually contain toxic substances - therefore they must be
handled with care when no longer wanted or needed. If a product is outdated,
consumers can donate it to someone who might still find it valuable. Many retailers also
offer trade-in programs or incentives for people looking to upgrade electronics that
BCU Digital Fluency Module / Unit 3 44
require the surrender of an older model; the retailers are able to reuse or repurpose the
older models. However, if a product is totally unusable or broken, instead of just being
thrown in the garbage, it must be thrown away by a certified e-waste hauler or recycler,
or taken to a designated drop-off at a government building, school or organization as e-
waste can potentially cause harm to humans, animals and the global environment if
disposed of improperly.
The consequences of improper e-waste disposal in landfills or other non-dumping sites
pose serious threats to current public health and can pollute ecosystems for generations
to come. When electronics are improperly disposed and end up in landfills, toxic
chemicals are released, impacting the earth’s air, soil, water and ultimately, human
health.
The Negative Effects on Air

Contamination in the air occurs when e-waste is informally disposed by dismantling,


shredding or melting the materials, releasing dust particles or toxins, such as dioxins,
into the environment that cause air pollution and damage respiratory health. E-waste of
little value is often burned, but burning also serves a way to get valuable metal from
electronics, like copper. Chronic diseases and cancers are at a higher risk to occur when
burning e-waste because it also releases fine particles, which can travel thousands of
miles, creating numerous negative health risks to humans and animals. Higher value
materials, such as gold and silver, are often removed from highly
integrated electronics by using acids, desoldering, and other chemicals, which also
release fumes in areas where recycling is not regulated properly. The negative effects on
air from informal e-waste recycling are most dangerous for those who handle this waste,
but the pollution can extend thousands of miles away from recycling sites
The air pollution caused by e-waste impacts some animal species more than others,
which may be endangering these species and the biodiversity of certain regions that are
chronically polluted. Over time, air pollution can hurt water quality, soil and plant
species, creating irreversible damage in ecosystems. For instance, an informal recycling
hub in Guiyu, China that was formed by parties interesting in extracting valuable metals
from e-waste, and subsequently has caused the region to have extremely high lead
levels in the air, which are inhaled and then ingested when returned to water and soil.
This can cause disproportionate neurological damage to larger animals, wildlife and
humans in the area.
BCU Digital Fluency Module / Unit 3 45
The Negative Effects on Soil

When improper disposal of e-waste in regular landfills or in places where it is dumped


illegally, both heavy metals and flame retardants can seep directly from the e-waste into
the soil, causing contamination of underlying groundwater or contamination of crops that
may be planted near by or in the area in the future. When the soil is contaminated by
heavy metals, the crops become vulnerable to absorbing these toxins, which can cause
many illnesses and doesn’t allow the farmland to be as productive as possible.
When large particles are released from burning, shredding or dismantling e-waste, they
quickly re-deposit to the ground and contaminate the soil as well, due to their size and
weight. The amount of soil contaminated depends on a range of factors including
temperature, soil type, pH levels and soil composition. These pollutants can remain in
the soil for a long period of time and can be harmful to microorganisms in the soil and
plants. Ultimately, animals and wildlife relying on nature for survival will end up
consuming affected plants, causing internal health problems.
The Negative Effects on Water

After soil contamination, heavy metals from e-waste, such as mercury, lithium, lead and
barium, then leak through the earth even further to reach groundwater. When these
heavy metals reach groundwater, they eventually make their way into ponds, streams,
rivers and lakes. Through these pathways, acidification and toxification are created in
the water, which is unsafe for animals, plants and communities even if they are miles
away from a recycling site. Clean drinking water becomes problematic to find.
BCU Digital Fluency Module / Unit 3 46
Acidification can kill marine and freshwater organisms, disturb biodiversity and harm
ecosystems. If acidification is present in water supplies, it can damage ecosystems to
the point where recovery is questionable, if not impossible.
The Negative Effects on Humans

As mentioned, electronic waste contains toxic components that are dangerous to human
health, such as mercury, lead, cadmium, polybrominated flame retardants, barium and
lithium. The negative health effects of these toxins on humans include brain, heart, liver,
kidney and skeletal system damage. It can also considerably affect the nervous and
reproductive systems of the human body, leading to disease and birth defects. Improper
disposal of e-waste is unbelievably dangerous to the global environment, which is why it
is so important to spread awareness on this growing problem and the threatening
aftermath. To avoid these toxic effects of e-waste, it is crucial to properly e-cycle, so
that items can be recycled, refurbished, resold, or reused. The growing stream of e-
waste will only worsen if not educated on the correct measures of disposal.

You might also like