# Reading Responses (Set 1) ## Reading Responses 5 out of 5 ## September 20th - How the Web Works When looking at the web through the use of analogies, the complex concept of websites and online protection are simplified. Using the illustrative example of walking to the shop comprehensively describes the relationship between clients and servers, and how information travels through DNS, HTTP, and TCP. Hartley Brody deepens the readers’ understanding of the behind the scene action by explaining the concept of cryptography and how our information is secured either through Public Key Encryption or Symmetric Key Encryption. Quite importantly, certificates allow our information to remain private by requiring a verification system and signatures. This, therefore allows for our information to remain as secure as possible when traveling through networks. While going through the readings, I found myself interested in learning more about data packets and how information is split into small chunks to avoid corruption. Is there a certain sequence to how packets are sent out? Do the packers get smaller and smaller depending on if developers are expecting more people to land on their website? The answer to these questions is important to know for website creators to make sure their content is accessible to as many people as possible. One concept that I struggled a bit to understand, however, was about the different Key Encryptions. While I understand the importance of the public and private key, as well as how it works together for better online protection, I still can’t fully visualize and comprehend the full process in my mind. I hope to learn more about this topic to further my understanding in cryptography. ## September 27 - Learning Students of all ages have heard their educators tell them to “reread your notes and highlight the textbook” right before an important exam. In “Make it Stick: The Science of Successful Learning” the authors explain how these strategies are ineffective, and how to replace them to positively impact your learning. One major concept that stood out was about deepening your learning and how when it's harder, it’s much stronger. This all can be done through strategies such creating mental models, thinking about information in a larger context, and practicing elaboration (6). Brown, Roediger, and McDaniel, continue to explain how the issue stems from the idea that memorizing through re-reading is what will lead to strong learning. This, however, can be refuted through research that has been done throughout the years that present no strong memory building due to mass practice (13). The takeaway sections then proceed to reiterate the importance of retrieval practice for strong learning. To strengthen learning, one can’t simply just reread or cram. Putting effort, writing textbook information in your own words, and applying concepts to your own life, are much better study strategies that will overall lead to stronger learning in the long run. My favorite part of this reading was being called out about how I study. Many of the positive learning strategies mentioned in the text I’ve tried yet stopped since that I believed they were “too-time consuming.” However, this reading has made me realize that what I mainly do when studying (re-reading, cramming, and highlighting) is ten times more consuming than if I were to implement more effiecient techniques. A concept that resonated the most with me was when the authors mentioned how learning was more meaningful when it is effortful. This made me think about all the classes that I loved, where I often put more time and effort, and therefore my learning was much stronger. I now ask myself how can I implement more quizzing, spacing and retrieval practice to allow for better learning? One thing that’s for sure is I’ll be coming back to this reading to keep learning more about effective learning strategies. ## October 7 - Social Networks Who knew that human social networks could be related to carbon atoms? In Rheingold’s “Social has a Shape,” readers learn that just like carbon atoms, our networks have unique elements that ultimately shape their identities. To begin, our networks are becoming a lot less group-centered and more network-centered due to social media. While many people believe that the Internet has made users more separated than ever, research has discovered the opposite (209). Now more than ever are networks connecting on the web and people are re-connecting, highly increasing social capital and trust. In addition, concepts such as Sarnoff, Metcalfe, and Reed’s Law all describe the new reach nodes in a network can attain, influencing the nature of our networks (198). In many ways, the web has allowed our networks to expand and reshape our connections. When engaging with the readings, one aspect I found myself very interested in was in Milgram’s path length experiment. With the rise of social media, I am curious to know if there is any new research about the path length number increasing from six. For example, on my social media pages there are many people that I follow, yet I have never interacted with. My network looks quite large, but like the shift of group-centered to network-centered life is described, there are only so many of the people I follow that I would actually call my close friends. As Watts and Strogatz stated that networks that are highly compacted don’t have average path lengths (Rheingold, 193), what can be said about the path length of college students who often have dense networks? Finding out this information could shed light on how online social media platforms continue to affect us and our network. ## October 11 - Haters While singers like Taylor Swift tell us “haters gonna hate” and to shake it off, it’s unfortunately not that easy. With the rise of digital communication, toxic behaviors have severely increased, mainly due to the anonymity social media brings. When people decide to comment on a celebrity's post or on an influencer’s Youtube video, they believe they are protected behind the screen. The person has no physical context with the influencer, decreasing the face-face communication interactions (Reagle, 2019). In fact, it can be inferred that the person writing the hate comment would never say it to the influencer in-person. Many people separate away from their own identity when online, which most likely is the reason for the large amount of bullying on platforms like Facebook and Instagram (Bond, 2021). The issue that will continue to arise will be how to control the bullying on social media, even when it can be hidden so well in posts. While reading the texts, one example that came to mind about haters had to do with Goodreads. Over the summer, I was a big fan of reading and found myself on “BookTok,” which is essentially the side of TikTok where everyone shares their favorite books. Author, Alex Aster was featuring excerpts of her new book “Lightark” that ended up going viral. While this was a good way for her to gain promotion on her new book, fans began to notice that the book on GoodReads already had a “one-star rating” when it hadn’t even been fully released yet. People were spreading hate in the review section, while some others were simply putting the one-star rating without any reasoning. The author had to speak up about the hate it was receiving, and many people defended her, explaining how it wasn’t fair to attack a book when it hadn’t been released as it could severely affect its success. Like mentioned in the chapter 5 reading, GoodReads is meant to be a positive community for readers to come together. However, I have seen many examples of authors being brought down on the platform simply just for the “fun” of it. It’s important that people do not take advantage of being behind a screen and think about how their messages can hurt other people. ## October 13 - Exam Review ### Multiple Choice Questions: 1. According to Claire Wardle, disinformation can be described as: A. Content that intentionally false and meant to cause harm B. Content shared by a person who is not informed it’s false C. Content that is genuine but has been reframed in dangerous ways D. Content that is genuine and shared with the goal to cause harm 2. According to the text “Make it Stick: The Science of Successful Learning,” which are some of the best techniques to improve studying and long-term learning? A. Implementing studying that focuses on rereading texts and quick memorization B. Implementing studying that focuses on retrieval practice and massed practice C. Implementing studying that focuses on massed practice and rereading texts D. Implementing studying that focuses on varied and retrieval practice ### Short Answers: 1. Molly has been assigned a research paper and needs to find sources online. She found multiple sources, however, she is unsure how credible they are. Using what we learned in class and Berkeley Library’s evaluation of sources, how would you recommend Molly to analyze the sources? (mention 2-3 ways minimum) 2. With the growth of social media, algorithms are stronger than ever. The person sitting right next to you may be getting different advertisements and news sources. Describe how filter bubbles can have negative consequences on society as a whole and some ways to avoid them. ## Answers 1. The correct answer is A. A. B is the definition for misinformation B. C is the definition for false context C. D is the definition for malinformation 2. The correct answer is D Massed practice is not an effective way to study for long-term learning. This includes rereading texts and quick memorization (cramming) 3. According to Berkeley Library’s evaluation of sources, users should analyze these aspects of sources to make sure they are credible: A. Authority B. Purpose C. Publication & format D. Relevance E. Date of Publication D. Documentation 4. Filter bubbles can have a negative impact on users and our society as they separate us severely. Our biases can increase and debates can instantly become aggressive. In addition, Filter bubbles can create the dangerous concept of groupthink, disabling members from thinking in rational ways when making decisions. There are many ways to avoid filter bubbles. One way can be to make sure that a user is reading as much news from all different types of sources. This allows listening on all aspects and makes the user more of a critical thinker. Another way is to be smart on the web by deleting our cookies and history. This disables websites from being able to track your interests and only showing you what you enjoy. These simple tricks are some ways to not fall into the trap of filter bubbles.