Want to create interactive content? It’s easy in Genially!

Get started free

Quiz Héroes Cósmicos

Yariana Morfin Hernández

Created on October 21, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Christmas Spirit Test

Corporate Icebreaker

Retro Bits Quiz

Bomb Quiz

Witchcraft Quiz

Halloween Quiz

Day of the Dead Quiz

Transcript

manual of survivance TO THE DIGITAL WORLD

Yariana Morfin Hernández a01739299Sasha Parés García A01739154 Oscar matías buen abad barrera A01739800 November 11th., 2024 team 10

Empezar

Our superheroes

Spider-web

Crypto

Wixel

Next

Intellectual property

Intellectual property or IP refers to inventions of every type, the IP is protected by the law, some examples of this are patents, coopyright and trademarks this allow people to get recognition or financial benefit from their creations, this creates an environment in which the creativity can flourish (WIPO, n.d.).

Copyright

Copyright is the ownership of an author about their song, painting, name,etc.Technically, copyrights is to copy something with the authorization of the actual author. If you are going to use something with an author, you need to ask them first or they'll ask you for a price, then you have to pay to use it. Normally it helps to protect an artwork from other people that want to steal it. (Weston. W, n.d).

Copyright

Next

Digital security

Digital security are the protections and practices we use to secure our devices, personal information, there are many tools for protect you such as antivirus software, VPNs or firewalls, all this measures will mantain your information safe from hackers, malwares, virus, etc. (Sternx, 2024).

Strong passwords

Strong password are very important to protect your sensitive data from hackers. A strong password is a very complex mix of characters, usually combines upper case letters, numbers and special characters mostly 12 characters long and should not have personal information (Shaul, 2007).

Strong passwords

Next

Ethics in the use of information

Ethics in using information means making sure technology and the internet are used in the right and responsible way. This includes things like making sure everyone can access technology, protecting people from online dangers, and keeping the internet safe. It's about using information to help people, not harm them (Information Ethics, 2023).

Identity theft

Identity theft happens when someone uses your personal info, like your Social Security number or passwords, without your permission. They might pretend to be you, take out loans, buy things online, or get into your bank and medical records. You might not notice right away, but some signs include random bills or debt collectors calling about accounts you didn’t open (Eset.com, 2016).

Identity theft

Next

Digital world

Digital world refers to the ability and use of tools to interact with the internet, some examples are: digital devices, smart devices and other technologies. Digital is changing the way we live, the way we speak, live, deal with problems and even how with interact with other persons, thats why we can find techology in every part of our lives (Lakshmipathi, 2023).

Digital fingerprint

When we are talking about digital fingerprint were talking about a huge amount of information and movements that you have done in your device, even if you think some things haven't been recorded on the device, they are there. The digital fingerprint has the capacity of store. A lot of data is collected, often more than you'd expect. Websites can track not only your browser and operating system but also your extensions, apps, system language, and even the fonts on your device (Crider, M, 2023).

Digital fingerprint

Next

Collaborative tools

Collaborative tools are online apps that help groups work better together by making communication easier, keeping the things organized, and helping people get things done. They let teams collaborate even if they're not in the same place. These tools include things like document sharing, real time editing, project management, and chat or video calls. Some examples are Google Workspace, Microsoft Teams, Zoom, and Trello (Kirvan & Brush, 2023).

Learning Managment Systems

A Learning Management System (LMS) is a software used to create, manage, and deliver learning programs. It helps teachers provide lessons and track student progress. LMS platforms let teachers make interactive courses with videos and quizzes. Most of these programs are online, but many also offer offline access so students can download lessons to their phones and keep learning without internet (TalentLMS, n.d.).

Learning Management Systems

Next

References

Britannica. (2017). Pentagon Papers. History, Significance, & Role of Daniel Ellsberg. En Encyclopædia Britannica. Copyright. Definition & Meaning. (n.d.). Britannica. Crider, M. (2023). Digital fingerprinting: The secret, insidious way you’re tracked online. PCworld. Dadoo, V. (2022). How a Peruvian political scandal became the viral global hit 'Mi Bebito Fiu Fiu. GPB News. Digital security. (2024). Sternx. Evolmind. (n.d.). Landing LATAM LMS. Evolmind. Retrieved October 18, 2024. Famous Identity Theft Cases That Rocked The Nation. (2021, June 2). SECURITY HERO. Froehlich, A., & Brush, K. (2023). team collaboration tools. Unified Communications. History of Distance Education. (2020). University of London. https://www.london.ac.uk/centre-online-distance-education/about/history-distance-education Identity Theft. (2023, December 6). USAGov. Information Ethics. (2023). Unesco.org. Kirvan, P., & Brush, K. (2023). learning management system (LMS). CIO. Lakshmipathi, A. (2023). Digital World. LinkedIn. Shaul, J., & Ingram, A. (2007). Strong Password. Science Direct. TalentLMS. (n.d.). What is an LMS? TalentLMS. Retrieved October 18, 2024 The 2012 Linkedin Breach had 117 Million Emails and Passwords Stolen, Not 6.5M. (2016). Trend Micro. What is Intellectual Property? (n.d.) WIPO. What is Online Identity Theft? (2016). Eset.com. Wheelhouse. (n.d.). What is the most commonly used LMS? Retrieved October 18, 2024. Wenton, W. (n.d.). Copyright. Britannica.

References

Britannica. (2017). Pentagon Papers. History, Significance, & Role of Daniel Ellsberg. En Encyclopædia Britannica. Copyright. Definition & Meaning. (n.d.). Britannica. Crider, M. (2023). Digital fingerprinting: The secret, insidious way you’re tracked online. PCworld. Dadoo, V. (2022). How a Peruvian political scandal became the viral global hit 'Mi Bebito Fiu Fiu. GPB News. Digital security. (2024). Sternx. Evolmind. (n.d.). Landing LATAM LMS. Evolmind. Retrieved October 18, 2024. Famous Identity Theft Cases That Rocked The Nation. (2021, June 2). SECURITY HERO. Froehlich, A., & Brush, K. (2023). team collaboration tools. Unified Communications. History of Distance Education. (2020). University of London. https://www.london.ac.uk/centre-online-distance-education/about/history-distance-education Identity Theft. (2023, December 6). USAGov. Information Ethics. (2023). Unesco.org. Kirvan, P., & Brush, K. (2023). learning management system (LMS). CIO. Lakshmipathi, A. (2023). Digital World. LinkedIn. Shaul, J., & Ingram, A. (2007). Strong Password. Science Direct. TalentLMS. (n.d.). What is an LMS? TalentLMS. Retrieved October 18, 2024 The 2012 Linkedin Breach had 117 Million Emails and Passwords Stolen, Not 6.5M. (2016). Trend Micro. What is Intellectual Property? (n.d.) WIPO. What is Online Identity Theft? (2016). Eset.com. Wheelhouse. (n.d.). What is the most commonly used LMS? Retrieved October 18, 2024. Wenton, W. (n.d.). Copyright. Britannica.

References

Britannica. (2017). Pentagon Papers. History, Significance, & Role of Daniel Ellsberg. En Encyclopædia Britannica. Copyright. Definition & Meaning. (n.d.). Britannica. Crider, M. (2023). Digital fingerprinting: The secret, insidious way you’re tracked online. PCworld. Dadoo, V. (2022). How a Peruvian political scandal became the viral global hit 'Mi Bebito Fiu Fiu. GPB News. Digital security. (2024). Sternx. Evolmind. (n.d.). Landing LATAM LMS. Evolmind. Retrieved October 18, 2024. Famous Identity Theft Cases That Rocked The Nation. (2021, June 2). SECURITY HERO. Froehlich, A., & Brush, K. (2023). team collaboration tools. Unified Communications. Identity Theft. (2023, December 6). USAGov. Information Ethics. (2023). Unesco.org. Kirvan, P., & Brush, K. (2023). learning management system (LMS). CIO. Lakshmipathi, A. (2023). Digital World. LinkedIn. Shaul, J., & Ingram, A. (2007). Strong Password. Science Direct. TalentLMS. (n.d.). What is an LMS? TalentLMS. Retrieved October 18, 2024 The 2012 Linkedin Breach had 117 Million Emails and Passwords Stolen, Not 6.5M. (2016). Trend Micro. What is Intellectual Property? (n.d.) WIPO. What is Online Identity Theft? (2016). Eset.com. Wheelhouse. (n.d.). What is the most commonly used LMS? Retrieved October 18, 2024. Wenton, W. (n.d.). Copyright. Britannica.

Identity theft

Historical case For example, Jonathan Gibson, who worked in IT, stole a lot of money by creating fake credit accounts in other people's names. He got caught when he made a mistake and asked for a check (15 Famous Identity Theft Cases That Rocked the Nation, 2021). Suggestions To protect yourself, don’t share personal info with unknown calls, texts, or emails. Always check your bank and credit card statements for anything strange, and keep important things like your Social Security card safe (USA Gov, 2023).

Wixel can help by detecting the stolen accounts, eliminating them and giving them to their original author

Digital Fingerprint

Historical Case Gary McKinnon was a scottish hacker that hacked a lot of information from NASA, the Army, the Navy, the Department of Defense and the US Air Force, managing to completely enter the Pentagon's computer network. He was discovered because his digital fingerprint had been tracked when a course moved alone. When he had to explain why he did it he said it was because he was investigating about the aliens and he said he discovered a lot of images about it. (Pacheco, M. J, 2021) Suggestions I suggest that be careful with the websites that you could ever get into, because your movements will problably be registered and you can´t do anything to change it.

Wixel can help to check your information by your digital fingerprint and check anyone has seen your information.

Copyright

Historical case "Mi bebito Fiu Fiu" was a song made by the Peruvian author Tito Silva Music, a parody of the song "Thank you" by Dido, later popularized by Eminem with the song "Stan" (Dadoo, 2022). Suggestions I suggest that if you are going to use the song of another author you must ask permission and if the song has the tax for it, then pay it.

The authors didn´t like this so they called Crypto to solve this problems and what she did was to call this guy and together they eliminate the song and then nobodys rights were taken.

LMS

Blackboard is very a popular and useful LMS, it is mostly used in higher education but also in other industries. LMSs also let teachers check how students are doing in their activities and see how well the lessons are working(Wheelhouse, 2024). Historical case In the late 1800s, before the internet, The University of London started doing a thing called correspondence courses, which consisted in letting students study from home, by sending them letters with their lessons, and them sending back their assignments. Altough this isnt really LMS, is like an early version of it, students could learn and get feedback, kind of like we use the online platforms today (History of Distance Education, 2020). Suggestions Some other LMS examples are Moodle, Canvas, Google Classroom and Schoology. Make sure the LMS you are using are easy to use and navigate through, have interactive tools, are secure and are affordable.

If none of the existing LMS are to your liking, Crypto can create one that suits your needs, you just tell her what are the things you are looking for, and she creates the software.

Spider-web

Ariana was a software engineer working at Google, she was developing a super software to protect your personal data, from hackers. One day some hackers, hacked her best frend bank account. So she decided to protect every single person form hackers. After she developed a highly advanced security software, she became, spider-web.

  • Spider-web has power that when she touches any device she eliminate any malware or virus, also restores all the affected systems
  • She can create a firewall shield, to protect any electronic device from anyone
  • She can create a super strong password to protect your information form hackers

Crypto

Catherine is a 19 year old girl who was struck by lightning that fell on an electrical tower the night her father, a recognized engineer, got kidnapped by a famous hackers organization. She started to look for him and founded him inside a computer full of viruses and won the battle against them. Since that moment, Crypto has taken care of all kinds of virtual problems.

  • Crypto has the power of having lightnings in her hands that make her enter to the computers and fight with the viruses.
  • Her lightnings also reduce the power of different computational pests.
  • Can create softwares in a second

Strong password

Historical case Linkedln had a data breach, this caused that that 117 million user emails and passwords were hacked. The breach occured due to poor security measures such as the SHA-1 hasing passwords, which were very easy to decode (Trend micro, 2016). Suggestions In order to make an strong password you need to combine uppercase letters, lowercase letters, numbers and special characters, also do not share your password with everyone (Shaul, 2007).

Whenever you need to create a strong password, you just call Spider-web, she can create a super strong password for you, protecting your sensitive information from hackers.

Wixel

Alexa was a 17 year old girl who discovered that had powers through a strange friend request. When she clicked on the profile, she suddenly knew the persons real identity, but it didn´t match at all. After discovering this ability, she realized she could detect fake accounts online. Now, she has the name of Wixel and the mission to protect others from the dangers of the internet, using her power to find the truth behind every profile.

  • Wixel has the power of knowing all the real information of a profile online.
  • She can delete any fake profile she wants just by saying the name of the profile