Edit Delete - Last Modified By: MAN at 17/01/2016 1:41:00 PM
Types of Social Media Tools and Issues with their use
This Bite Goes into listing the different types of Social Media tools / Applications and poses you questions as to contexts of their usage and issues with their use. Answer all Questions and follow instructions within the attachment.
Edit Delete - Last Modified By: man at 11/04/2017 1:14:30 PM
Social Media's Contribution to a Smarter Human Race
Please watch this video to accompany the bite Social Media Tools and Issues with use.
Edit Delete - Last Modified By: man at 11/04/2017 1:32:46 PM
How Social Networks make us Smarter
Please watch this video to accompany the bite Social Media Tools and Issues with use.
Edit Delete - Last Modified By: man at 20/11/2016 11:31:22 AM
(Assessment Activity) Establishing a Social Media Presence
Goes into depth with 3 Assessment Activities. Each Activity will be Assessed according to each dot point stated in the below activity, some aspects will be assessed throughout the course of the year.
You will need to create the below:
- Individual Google Blog on a topic of your own interest
- Individual Google Drive Site Directory (Where you save your submitted work and Collaborate)
- LinkedIn Social Network Presence and Review
Edit Delete - Last Modified By: MAN at 17/01/2016 1:57:09 PM
Social Network Profile Setup and Media Type Review
Goes into depth within How to create a LinkedIn Social Networking Presence, and what to do with your profile. You then need to make a review PowerPoint Presentation on your LinkedIn Profile (Explained Within)
Edit Delete - Last Modified By: man at 18/11/2016 10:15:06 AM
Social Media Task - Google Blog Review
Within the below bite, you will review your Google Blog on a topic of your own choice. You have worked on this throughout the course of the year, so it should be very simple to do.
Edit Delete - Last Modified By: man at 9/07/2016 8:14:43 PM
Cyber Security using Social Media tools
Please explore this activity for three scenarios, all relating to cyber security.