There are two basic kinds of presentations you might do in your professional life: a formal presentation, and a poster presentation. Poster presentations are different from formal presentations in several key ways:
How safe is your information online? Do you use a “password manager” app? How much information about your life is online right now? Could people use your information to hurt you? Could an ex-lover make a “revenge porn” of you and post it online? (Hint: the answer is “Yes”)
Having your “peers” read your paper and give you feedback can be very valuable to improving your writing. The problem is that nobody wants to comment on a classmate’s paper. What do you say? How can you give useful feedback. Here’s a method that may help: PQP. Praise. Question. Polish.
Information technology is truly amazing: our phones and computers are such a part of our lives that it’s hard to imagine life without them. (Have you ever panicked when you forgot your phone at home?) They are so convenient and powerful, but they also have a dark side: they open us up to control, manipulation and having our most private and important information stolen. This next section of the class will look several different issues related to information technology, privacy and security.
We have looked at gender, what it means, how it is a social construction, and some of the challenges associated with traditional gender roles. But what is clear is that traditional ideas about gender have been being “deconstructed” for some time.