What is Digital Literacy?
The ability to use digital technology, communication tools, or networks to locate, evaluate, and create information. It also refers to the ability to understand and use data in multiple formats from various sources when presented via computers or to a person’s ability to perform tasks effectively in a digital environment.
UNESCO (2013)
What is Digital Literate?
A digitally literate person is someone who:
  • possesses the variety of skills – technical and cognitive – required to find, understand, evaluate, create, and communicate digital information in a wide variety of formats
  • can use diverse technologies appropriately and effectively to retrieve information, interpret results, and judge the quality of that information
  • understands the relationship between technology, lifelong learning, personal privacy, and stewardship of information.
American Libraries Association’s Digital Literacy Task Force (2011)
What is an Operating System?
An operating system is the most critical software that runs on a computer. It manages the computer's memory, processes, software, and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language. With an operating system, a computer is functional.
What is an Application?
An app is a type of software that allows you to perform specific tasks. Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps.

A. Desktop applications
There are countless desktop applications, and they fall into several categories. Some are more full featured (like Microsoft Word), while others may only do one or two things (like a clock or calendar app).

Below are just a few types of applications you might use.
  • Word processors: A word processor allows you to write a letter, design a flyer, and create many other types of documents. The most well-known word processor is Microsoft Word.
  • Web browsers: A web browser is the tool you use to access the Internet. Most computers come with a web browser pre-installed, but you can also download a different one if you prefer. Examples of browsers include Internet Explorer, Mozilla Firefox, Google Chrome, and Safari.
  • Media players: If you want to listen to MP3s or watch movies you've downloaded, you'll need to use a media player. Windows Media Player and iTunes are popular media players.
  • Games: There are many types of games you can play on your computer. They range from card games like Solitaire to action games like Halo. Many action games require a lot of computing power, so they may not work unless you have a newer computer.
B. Mobile apps
Desktop and laptop computers aren't the only devices that can run applications. You can also download apps for mobile devices like smartphones and tablets. Here are a few examples of mobile apps:
  • Gmail: You can use the Gmail app to easily view and send emails from your mobile device. It's available for Android and iOS devices.
  • Instagram: You can use Instagram to quickly share photos with your friends and family. It's available for Android and iOS.
  • Duolingo: With a combination of quizzes, games, and other activities, this app can help you learn new languages. It's available for Android and iOS.
What is Netiquette?
  • Etiquette refers to one's ability to follow social conventions of politeness and professionalism.
  • Netiquette refers to one's ability to do the same in the digital environment.
  • Netiquette is a set of unofficial rules for good behavior and politeness followed by users of online and digital technologies such as the Internet, email, and chatrooms. Netiquette is derived from the word "etiquette," which refers to the general rules or conventions of correct and polite behaviour in social settings and situations. It is thus the practice of exercising polite and considerate behaviour in online contexts, such as Internet discussion boards and personal email.
Mistakes in Netiquette
DON'T make these mistakes:
  • Writing in capital letters that MAKE IT SEEM LIKE YOU ARE SHOUTING
  • Opening emails or attachments from unknown or suspicious senders
  • Overusing the priority, high importance or receipt settings
  • Sending or forwarding personal or private information without the original sender's consent
  • Including unnecessary information or diverging from the purpose of the email
  • Using emoticons or abbreviations i.e. :) or "lol" unless writing informally to friends or family
  • Subscribing to unknown distribution lists
Netiquette for email
Email is an important form of communication form in multiple contexts, from professional to personal. DO follow these rules and guidelines for proper email netiquette.

Netiquette for Social Media
Nothing is private on the Internet and many sites have the ability to archive or store your information. Your "digital footprint" is the data that you leave behind after interacting in online environments such as social media websites or discussion boards. Be cautious of personal material and information that is posted online by yourself or others. This is important as employers are increasingly using social media to evaluate and find potential employees.
When using social media websites, you should:
  • Check the privacy settings on websites such as Facebook
  • Confirm that your profile information is accessible only to the extent you choose
  • Do not accept people you do not know as "friends" on social media websites
  • Be careful when interacting or sharing information with other Internet users
What is Internet Safety?
Internet safety refers to personal, corporate and national security in online environments, which can be compromised by negative interactions (such as exploitation and cyberbullying) that occur in settings like social networking websites, discussion boards and chatrooms. On the corporate and national levels, internet safety may be compromised by cyberattacks in the form of hacking in order to obtain information or steal monetary funds.
Online Privacy
New technologies, such as mobile communication and the Internet, allow you to access information, shop, bank, watch films, and communicate from almost anywhere in the world. There are, however, downsides to information and communication technologies (ICTs). Perhaps the most dangerous implication is loss of privacy. Almost every time you use the Internet there is a digital mark left behind that can be tracked through both legal and illegal means. This is often referred to as your digital footprint. 
Tips for Online Privacy Protection
A. Username & Passwords
  • Do not share your username or password. Try to memorize both your username and password rather than write it down in a place it could possibly be found.
  • Create a username and password that would be difficult for a third party to guess or understand.
  • Remember to log out of all websites, internet browsers and applications, especially when you are using a computer or cell phone in a public place such as the library or an Internet cafe.
B. Profile Settings
  • Social networking websites such as Facebook and LinkedIn allow you to customize and change the settings that determine how the information you enter and upload is displayed, used and retrieved online.
  • Go to the user guide or help section of these websites to understand the settings and adjust them accordingly.
  • To ensure the settings work properly, try searching your name using a standard search engine such as Google or Bing.
C. Personal Information
  • Do not give out details such as your name, age, birthday, address or phone number to individual Internet users in settings like chat rooms or on social networking sites such as Twitter and Facebook.
  • When filling out online forms -- such as surveys, email listservs, or payment details for shopping sites -- make sure that the website is reputable, legal, and secure.