Lessons Lesson 1.1: Learning the Keys to Success Lesson 1.2: Reviewing the Computer System and File Management Lesson 1.3: Maintaining Digital Safety Lesson 1.4: Practicing Workplace Safety 2
Learning Outcomes 1.1: List the characteristics needed to become a skilled digital master 1.2: Identify how to name and save a file 1.3: Explain how to ensure digital security 1.4: Practice the techniques for good keyboarding 3
Commitment Learning new software and computer skills requires the following commitments Be flexible Keep an open mind Use initiative Listen and read attentively Seek and acquire new knowledge and skills 4
Certifications Digital media certifications generally fall into three categories: Web Print Video Adobe certifications are available online ACA (Adobe Certified Associate ) ACE (Adobe Certified Expert ) 5
Work Skills for Multimedia Careers Behaviors that contribute to your ability to acquire a job and grow in the field of your choice: Good attendance Promptness Proper attire Clean and safe work environment Appropriate voice Pride 6
Managing Files Digital media projects may include image, text, audio, and video files Naming files A naming convention is a set of rules used in the naming of files and folders Choose a name that clearly identifies the contents of the file For shared files, use initials or a numbering method to clarify versions 7
Managing Files (cont.) Saving f iles Designate a place to save project files Network locations or shared Internet locations allow everyone access Choosing storage Internal or external hard drives A server is a computer designed to store files from multiple computers Writeable CD or DVD Flash drives (also called thumb or USB drives) 8
Making Backups Back up work to prevent losing files through a hardware failure or virus attack Back up to hardware (flash drive or another hard drive) Back up over a network to another computer Create an online backup Some organizations automatically back up files at a set interval Make sure you have a backup/recovery plan 9
Personal Security A cyber predator is a person who uses the Internet to make contact with others in order to harm them Stealing someone’s information to use for illegal purposes is identity theft Social engineering scams trick users into providing information in the belief that a request is legitimate A keylogger is software that tracks keyboard use and transmits it to be used for illegal purposes 10
Computer Security Malware , or malicious software, is designed to damage a computer or steal information To keep computer secure, install virus and malware protection software and keep it updated Malware includes: Virus Worm Spyware Trojan horse Adware Rootkit 11
Computer Security (cont.) No virus protection is foolproof Encryption converts text into an unreadable series of numbers and letters to protect information Digital encryption uses software that can scramble and unscramble the data A hacker is a person who finds an electronic means of gaining unauthorized access to a computer 12
Password Security Wise use of passwords protects your computer and information Strong passwords make it difficult for others to figure out Have a minimum of eight characters Use both upper- and lowercase letters Use at least one number Use at least one special character such as ! @ $ % ^ & * ( ) - _ = + [ ] ; : ‘ “ , < . > / ? 13
Password Security (cont.) Phishing is a social engineering activity where the perpetrator uses fake websites or emails to trick a user into providing personal information or passwords 14
Hardware Security Maintain the physical security of a computer Laptops, smart phones , and other devices are No longer secured by the locked windows and doors of an office Stored in cars Taken on public transportation Used in restaurants, hotels , and public places Maintaining the security of your equipment is your responsibility 15
Acceptable Use Policy (AUP) AUPs are written agreements that all system users must agree to AUPs may include the following: Password selection requirements Software usage restrictions Netiquette rules Limits on the use of systems or items that overtax the network 16
Avoiding Repetitive Stress Injury Ergonomics studies the best way to design a workplace for maximum safety and productivity Muscle or joint injury resulting from repeating actions is repetitive stress injury Carpal tunnel syndrome can require surgery or a brace to protect the injured hand 17 Margrit Hirsch/Shutterstock.com
Creating Effective Workstations Ergonomics teaches proper workstation arrangement: Keyboard should be at elbow height and even with the front edge of desk Monitor should be positioned to avoid glare and be at least an arm’s length away Chair should have a good backrest Back should be touching the backrest at all times Feet should be flat on the floor (or use a footrest ) Sit up straight, keeping head and neck as straight as possible 18
Creating Effective Workstations (cont.) Correct keyboarding t echnique Keep fingers curved and upright over the home row keys Keep wrists low, but not touching the keyboard Lightly tap each key with the tip of finger , snapping the fingertip toward the palm of hand Mouse techniques Hold mouse gently; keep arms, hands, fingers relaxed Keep wrist straight and use elbow as the pivot Do NOT use a wrist rest 19
Who Is Responsible? Who is responsible for ensuring your safety? Is it the employer who should provide ergonomic chairs and keyboards? Is it a personal responsibility that requires you to pay attention to how you are using your hands? What happens if you identify a problem, and your employer does not allow you to make changes to improve the situation? 20
Taking a Break Develop a plan to make sure you take breaks Get up from your workstation at least once an hour Rest your eyes occasionally by focusing on an object at least 20 feet away Stretch your muscles to relax and strengthen them 21 killerb10/iStockphoto.com
Key Concepts Five commitments to learning: Be flexible Keep an open mind Use initiative Listen and read attentively Seek to acquire new knowledge and skills Six behaviors that contribute to acquiring a job and growing in the field of your choice: Good attendance Promptness Proper attire Clean and safe work environment Appropriate voice Pride 22
Key Concepts (cont.) Demonstrate digital media skills by seeking certification Managing digital files is an essential part of creating a good work environment Strong passwords meet a set of rules designed to make it difficult for others to figure out the word Repetitive stress injury (RSI) (including carpal tunnel syndrome) results from repeated movement of a particular part of the body 23