# Reading Responses Set #1
Name: Yanjun You
Course: CDA – Communication and the Digital Age
Instructor: Prof. Joseph Reagle
Set #: 1 (Weeks 1–5)
## 1. *Kate Moran (2016), Millennials as Digital Natives: Myths and Realities*
[https://www.nngroup.com/articles/millennials-digital-natives/](https://www.nngroup.com/articles/millennials-digital-natives/)
*Chris Evans & Wenqian Robertson (2020), The Four Phases of the Digital Natives Debate*
[https://onlinelibrary.wiley.com/doi/epdf/10.1002/hbe2.196](https://onlinelibrary.wiley.com/doi/epdf/10.1002/hbe2.196)
Both Moran and Evans & Robertson discuss the idea of “digital natives,” but from different perspectives. Moran argues that being born with technology doesn’t mean knowing how to use it wisely. Many millennials can click fast but still struggle with judging online information and protecting privacy. The label “digital native” suggests natural skill, while digital literacy requires deeper understanding and critical thinking.
Evans and Robertson show how society’s view of digital natives has evolved through four phases—from early celebration to critical reflection. They emphasize that digital ability depends more on access and training than on age. I agree, because some older teachers are better at digital safety than young users. Together, both readings remind me that experience, education, and awareness matter more than birth year in shaping real digital competence.
## 2. *MDN Web Docs (2023), How the Web Works*
[MDN: How the Web Works](https://developer.mozilla.org/en-US/docs/Learn/Getting_started_with_the_web/How_the_Web_works)
*Hartley Brody (2013), How HTTPS Secures Connections: What Every Web Dev Should Know*
[Brody: HTTPS certificates](https://blog.hartleybrody.com/https-certificates/)
Both MDN and Brody explain how the internet works behind the scenes and how trust is built online. MDN describes the basic communication between clients and servers—how browsers send requests and receive HTML, CSS, and JavaScript files. This makes me more mindful when using technology, because every click travels through many systems.
Brody focuses on HTTPS and how SSL/TLS encryption protects users’ data. He shows how certificates confirm who we are really talking to, preventing attacks and creating trust. Understanding this process makes the small padlock icon feel meaningful—it represents careful design and human responsibility.
Together, these two readings show that the web’s safety is not automatic. It depends on awareness, transparency, and ethical design. Learning how the web and HTTPS function helps me see that digital literacy is not only about using tools but also about understanding the systems and people that make the internet trustworthy.
## 3. *Joyce Valenza (2016), Truth, Truthiness, Triangulation: A News Literacy Toolkit for a ‘Post-Truth’ World*
[http://blogs.slj.com/neverendingsearch/2016/11/26/truth-truthiness-triangulation-and-the-librarian-way-a-news-literacy-toolkit-for-a-post-truth-world/](http://blogs.slj.com/neverendingsearch/2016/11/26/truth-truthiness-triangulation-and-the-librarian-way-a-news-literacy-toolkit-for-a-post-truth-world/)
*UC Berkeley Library (2022), Evaluating Internet Sources*
[https://guides.lib.berkeley.edu/evaluating-resources](https://guides.lib.berkeley.edu/evaluating-resources)
Both Valenza and the Berkeley Library guide teach how to check information carefully in a “post-truth” world. Valenza introduces ideas like *truth*, *truthiness*, and *triangulation*—the need to verify facts from multiple sources. She reminds readers that emotion and repetition can make lies feel true.
The Berkeley Library explains the CRAAP test, which checks Currency, Relevance, Authority, Accuracy, and Purpose. This method helps me look deeper than surface design and question who created the content and why.
Together, these readings show that responsible digital citizens don’t just believe what looks real—they test it. I learned that real digital literacy means asking questions, cross-checking evidence, and slowing down before sharing.
## 4. Exam Review
### Questions
#### Multiple Choice
**1.** Which statement about HTTP is TRUE?
A. HTTP makes websites secure by encrypting all data.
B. HTTP uses public-key cryptography to hide passwords.
C. HTTP transfers data between a browser and a web server, but is not secure by itself.
D. HTTP stands for Hyper Text Transfer Process.
**2.** Which of the following best describes the *Tragedy of the Commons*?
A. When a public good benefits everyone equally.
B. When individuals overuse shared resources for personal gain, harming the group.
C. When people cooperate to save natural resources.
D. When private companies pay for public parks.
---
#### Short / Essay Questions
**3.** Explain the difference between *HTTP* and *HTTPS*, and why HTTPS is important for web security.
**4.** Compare *public goods* and *common resources.* Give one example of each and explain how cooperation or rules can prevent overuse.
---
### ### Answers and Explanations
**1.** C
HTTP (HyperText Transfer Protocol) is how your browser requests and receives web pages. It does not encrypt data. That’s why HTTPS (the secure version) is used for protection.
**2.** B
The “Tragedy of the Commons” happens when common goods are overused because each person acts in self-interest. Without rules or cooperation, the common resource gets destroyed.
**3.**
HTTP sends data in plain text. Anyone could read it. HTTPS adds encryption using SSL/TLS certificates and public-key cryptography. This keeps passwords, messages, and credit card info safe and verifies that the website is real.
**4.**
Public goods (such as street lights) are non-excludable and non-rival, meaning everyone can use them without reducing others’ use.
Common resources (like fish in the ocean or public Wi-Fi) are non-excludable but rivalrous, meaning overuse by one person reduces what’s left for others.
Rules, cooperation, or government regulation can help prevent the tragedy.
---
## 5. *Joseph Reagle (2015), “Shaped: Aw shit, I have to update my Twitter,” Reading the Comments, Chapter 6*
[https://play.google.com/books/reader?id=SICyCAAAQBAJ&pg=GBS.PA30.w.1.1.116_56&hl=en](https://play.google.com/books/reader?id=SICyCAAAQBAJ&pg=GBS.PA30.w.1.1.116_56&hl=en)
Reagle explores how digital communication shapes our behavior, attention, and sense of self. He shows that online life often pulls us to perform and update constantly, as if our identity depends on how others react. This constant connection can reduce mindfulness—we become busy maintaining our image instead of reflecting quietly.
He also discusses how social media can both raise and lower self-esteem. Getting likes and comments can feel rewarding, but it can also make people anxious and compare themselves to others. Reagle suggests that this culture of self-presentation may increase narcissism, because people start valuing how they appear more than who they are.
I learned that being mindful online means pausing before reacting, and remembering that self-worth should not depend on attention or approval. Digital tools are useful, but we must use them with awareness and balance.