Confirmed users
891
edits
No edit summary |
|||
Line 13: | Line 13: | ||
=== Web Mechanics === | === Web Mechanics === | ||
''Understanding the | ''Understanding the web ecosystem and Internet stack'' | ||
* Using and understanding the differences between URLs, IP addresses and search terms | * Using and understanding the differences between URLs, IP addresses and search terms | ||
* | * Identifying where data is in the network of devices that makes up the Internet | ||
* | * Exporting, moving, and backing up data from web services | ||
* Explaining the role algorithms play in creating and managing content on the web | |||
* Creating or modifying an algorithm to serve content from around the web | |||
=== Search === | === Search === | ||
''Locating information, people and resources via the | ''Locating information, people and resources via the web'' | ||
* Using keywords | * Developing questions to aid a search | ||
* Using and revising keywords to make web searches more efficient | |||
* Evaluating search results to determine if the information is relevant | |||
* Finding real-time or time-sensitive information using a range of search techniques | * Finding real-time or time-sensitive information using a range of search techniques | ||
* | * Discovering information and resources by asking people within social networks | ||
=== Credibility === | === Credibility === | ||
''Critically evaluating information found on the | ''Critically evaluating information found on the web'' | ||
* Making judgments based on technical and design characteristics | * Comparing and contrasting information from a number of sources | ||
* | * Making judgments based on technical and design characteristics | ||
* | * Discriminating between ‘original’ and derivative web content | ||
* | * Identifying and investigating the author or publisher of web resources | ||
* Evaluating how purpose and perspectives shape web resources | |||
=== Security === | === Security === | ||
''Keeping systems, identities, and content safe'' | ''Keeping systems, identities, and content safe'' | ||
* | * Recommending how to avoid online scams and 'phishing’ | ||
* Managing and maintaining account security | |||
* Encrypting data and communications using software and add-ons | * Encrypting data and communications using software and add-ons | ||
* Changing the default behavior of websites, add-ons and extensions to make | * Changing the default behavior of websites, add-ons and extensions to make web browsing more secure |