1) Occupation 1a) Academic level If student 2) Institution and department.

Slides:



Advertisements
Similar presentations
IT Services and Facilities Nigel Buckle User Support Manager.
Advertisements

Lea Leininger, Health Sciences Librarian Beth Filar-Williams, Distance Education Librarian University Libraries, UNC Greensboro October 12, 2011 E-BOOK.
What is Personal Publishing? If you’ve ever written a blog entry, posted a comment or reply on a website, uploaded a video to YouTube, posted a picture.
What you don’t know CAN hurt you!
Who Wants To Be A Safe Communicator? What does the ‘e’ stand for when it is in front of words? For example: , e-safety etc…
WHAT CONSUMERS ARE DOING, AND WHAT THEY THINK OF LOCATION SERVICES ON MOBILE Alex Kozloff, Mobile Manager, IAB.
OneDrive for Business Introduction First Time Use First Time Use Access from Computer Access from Computer Access from Internet Access from Internet Access.
1 University of York Department of Health Sciences Computer Skills Review By Ian Cole Lecturer in C&IT.
Bush Library Proposal By Yvana. Introduction The museum will assume that people have their own wireless devices such as iPods, cell phones, and MP3 players.
1 University of York Department of Health Sciences Academic Word Processing By Ian Cole Lecturer in C&IT.
1 Before we start……. Do not logon to the computer. Turn off your mobile phone.
Internet Collaboration Tools: VoIP Spencer S. Eccles Health Sciences Library University of Utah Health Sciences Center.
1 Digital Nature, Digital Nurture Libraries, learning and the digital native Michael Robinson Institute Librarian The Hong Kong Institute of Education.
The Age Of The Smarter Phone Use More and more peoples are starting to get information, news, organize online. That includes union members. More peoples.
Cyber Bullying BEAT BULLYING.
Electrical Engineering. Study electricity and electromagnetism for use in electronic devices. Subtopics include power, electronics, control systems, and.
Internet Safety Keeping Kids and Teens Safe
HARMONIZATION OF STUDENTS’ SKILLS AND REQUIREMENTS NEEDED FOR COMPUTER SCIENCE IN ACADEMIC AREA – RESULTS OF A SURVEY Gyöngyi Bujdosó, PhD University of.
By the end of the lesson you will: 1.Be able to identify different types of computers 2.Be able to explain the advantages and disadvantages of different.
 QUESTIONNAIRE.  The QUESTIONNAIRE has been conducted to evalute how people over the age of 50 use technology.
Cell Phone Usage by Generations By Kiley Feely. My Hypothesis  The older a person is the less likely they are to use a cell phone for other uses such.
Information Use on Mobile Devices in Medicine Preliminary Survey Results Presenters: Jill Boruff (McGill), Dale Storie (Alberta) Lee-Anne Ufholz (Ottawa),
Author: Marybeth Moretti
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Blogging Suitable for: Advanced.
By: Star Duncan & Hannah Cole Computer Apps 4 th Period.
KS2 E-Safety assembly How to be smart and keep safe online.
Internet Safety Helpful Tips to Stay Safe. I bet you didn’t know… 18% of 8- to 10-year-olds spend time on some kind of social networking site daily Kids'
highschools/index.html Using.
Internet Safety 101.  Potential Dangers  Social Networks  Online Gaming  Sexting  Pornography  Texting & Driving.
Annual survey of CARNet member institutions Barbara Kolarek.
G063 - Standards & Protocols. Learning Objectives: By the end of this topic you will be able to: explain the importance of standards for communicating.
‘Digital Sharing’. The Upload and Download Why? Children are already social networking Life and business depends on social networking We are expected.
UNIT 12 The Internet By Nahed AlSalah 1 Computer Terminologieg unit12 Nahed AlSalah.
Virginia Tech University Libraries Discovery Teams Spring 2012 Team Members Rebecca Miller Bruce Obenhaus Jeremiah Puryear Jennifer Sparrow Team Theme/Topic.
TECHNOLOGY TERMS BY:SHAQUILLA WATSON&SIMONE TAYLOR.
DoIT 2010 Student Survey Highlights for ITC Brian Rust April 16, 2010.
7 th Grade Research Source Requirements. What is a source? Sources are pieces of evidence that will support your research. First hand research is research.
What is Data Communication? Data communication is the process of collecting and distributing data(text, voice, graphics, video, etc) electrically from.
1) Occupation 1a) Academic level If student 2) Institution and department.
Communications and Collaboration. Exploring communication methods People with whom you are corresponding and the topic of the correspondence determine.
Welcome to Language Arts Mrs. Hardy. GRADES 1) How can you find out what your student’s current grade is? A) Jenkins Website B) Parent Connect C) Weekly.
ADVANCED/COMMUNITY/5.2 Do you think Sam Smith is great or that Ed Sheeran is better? Who is best?  Sam Smith  Ed Sheeran  Tom Jones  will.i.am 
Chuter Ede BY Jordan,Luke R and Billy.
By Toby Reed.
The graph shows how questions that I have asked the people around me. Every one that I asked has a cell phone and they text a lot. Most of them text a.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
When you open Access you can open or import an existing.csv file. Check that it recognises that the fields are separated by commas.
ICT as a scaffolding for the study of Literature S.NACKEERAN SCHOOL OF LANGUAGE AND LINGUISTIC STUDIES FACULTY OF SOCIAL SCIENCES AND HUMANITIES NATIONAL.
KS2 E-Safety assembly How to be smart and keep safe online.
SDSM IN MOBILE CLOUD COMPUTING By- ID NO-1069 K.C. SHARMILAADEVI Sethu Institute Of Tech IV year-ECE Department CEC Batch: AUG 2012.
Thing to do to keep safe on the web. Internet safety Never ever meet up with someone you don't no other wise they will find you and
C ELL P HONES IN E DUCATION
Importance of Wireless Processes of Wireless Internet Known now as WiFi Very similar to how radio and television signals work Information gets coded.
Who Wants To Be A Safe Communicator?
How to stay safe using the internet & App’s
Internet Safety Guidelines October 3, 2016
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
Do students learn autonomously? Do students learn through videos?
Mykolas Romeris University Library
Issues In media studies: Cyberbullying
Introduction to Computer Architecture
Communications and Collaboration
Your children ~ their technology experiences?
إدارة وتنمية مصادر المعلومات
Communications and Collaboration
Introduction to Computer Architecture
Academic Affairs Update Monday, November 20, 2017
CYBER BULLYING BY RODRICK HILTZ 2014.
Introduction to Computer Architecture
Communications and Collaboration
Presentation transcript:

1) Occupation 1a) Academic level If student 2) Institution and department

3a) Which device? 3) Electronic equipment End survey If no mobile phone owned or used frequently (with or without internet) If mobile device w/ internet 4) Plan include internet 4a) Why not? If no 5) How much time? 6) Internet from mobile when computer available 7) Type of network 8) Plan include texting? If nothing is filled in in 4a, sometimes it ends survey (shouldn’t do this)

9) Which devices? 9a) How often? If any responses “mobile device w/internet or mobile w/o internet” (except n/a) 9b) How do you normally read on device? If anything in “academic content” row except “never” 9c) Where do you find content? 9d) How much time? 10) How do you like to receive info? Sometimes if nothing is checked in reading academic content, 9a skips to end (shouldn’t do that) Sometimes 9d skips to end instead of to 10

11) How often send text messages/ s to self? 12) How do you find new tools? 13) How often use library services? 14) How often use mobile library? 15) Barriers to use 16) Survey on mobile 17) comments End survey