Monday, December 8, 2014

Web Tools Assignment

Rubric: 

    Independent Reading - Elementary : Responding to \"Harry the Dirty Dog\" by Gene Zion


    Teacher Name: Ms. Herring


    Student Name:     ________________________________________

CATEGORY
4
3
2
1
Stays on task
Student reads for the entire reading time. This may be independent reading or done with adult or peer assistance, as assigned.
Student reads almost all (80% or more) of the allotted reading time.
Student reads some (50% or more) of the time.
Student wastes a lot of reading time.
Tries to understand
Stops reading when it doesn\'t make sense and reads parts again. Looks up words s/he doesn\'t know.
Stops reading when it doesn\'t make sense and tries to use strategies to get through the tricky spots or to figure out new words.
Stops reading when it doesn\'t makes sense and asks for assistance.
Gives up entirely OR plows on without trying to understand the story.
Understands story elements
Student knows the title of the story as well as the names and descriptions of the important characters. Can tell approximately when and where the story happened.
Student knows the names and descriptions of the important characters and where the story takes place.
Student knows the names OR descriptions of the important characters in the story.
Student has trouble naming and describing the characters in the story.
Able to make predictions
Student is able to correctly answer all of the previously constructed prediction questions throughout the reading of the book.
Student is able to answer 3 of the four prediction questions while reading the text.
Student is able to answer 2 of the prediction questions while reading the text.
Student is able to answer 1 of the prediction questions while reading the text.
States problems and solutions
Student can correctly state both problems illustrated in the book and the appropriate solutions.
Student can correctly state both problems, but can only match one solution with the problems.
Student can correctly identify one or both problems, but not the solutions.
Student cannot correctly name the problems or solutions in the story.


Track:

Track #456916: Cells, Cells, Cells
Annotated by: Olivia Herring
1.Cell Structures - Quizzes, diagrams, videos, and activities 
http://www.neok12.com/Cell-Structures.htm
This website is wonderful because it provides students with practice quizzes which can be taken in preparation for their test. There are many videos that students can watch that do a great job of explaining cell structure and function. This is beneficial for students who may be more visual learners, because it provides more interesting detail and graphics than the teacher can a lesson. There are also practice labeling sheets which will be extremely beneficial for students preparing for tests in which they have to label cell parts, and games to make learning fun.
2.Mitosis Basketball Review Game 
http://sciencereviewgames.com/srg/games/hs.php?id=127
This website is a great study tool because it provides a fun and engaging way for students to study. It takes the information that teachers would normally print out in a study guide and turns it into an interactive game. This website is important because it shows students that learning can be fun, and it actually uses relevant facts/questions.
3.The Mitosis Rap 
https://www.youtube.com/watch?v=pOsAbTi9tHw
This hyperlink will direct students to an education YouTube video about cell mitosis. Mitosis is always discussed in conjunction with the cells, and it can be very complicated to understand. Putting this information into a song can help students memorize and recall the information more easily.
4.Virtual Cell Tour 
http://vcell.ndsu.nodak.edu/animations/flythrough/closer.htm
This website provides a virtual tour of the cell and its organelles. It allows students to actually see things that would not be possible to see in a regular classroom setting. It also provides more advanced information and concepts that will allow students who are progressing more quickly in the lesson to find more information and continue their learning. It also gives a link to the app version for on-the-go information.
5.Cell Parts and Function Quizlet 
http://quizlet.com/7781906/cell-parts-and-functions-test-flash-cards/
This link directs students to a previously made Quizlet (a set of online note cards). This website is wonderful because students can use the "note cards" that are already available or choose to make their own. It provides a great study tool that can be saved and shared between students in the classroom so that everyone has the same information. It also provides a feature to turn the terms a student needs to learn into a game called "Space Race".


Test:

Batty for Bats - Test 1
Please read the questions VERY carefully and choose the correct answer.
  1. Do bats sleep during the day or during the night? 
 
  2. What do bats like to eat? 
 
  3. How do bats like to sleep? 
 
  4. What color are bats? 
 
  5. Where do bats live? 
 
  6. Bats have small, furry faces, big ears, and long toes. 
 
  7. How do bats move around? 
 
  8. What is it called a sound hits something and bounces back so it can be heard again? 
 
  9. Bats use echolocation to find their food. 
 
10. What are animals called that sleep during the day and play at night? 
 

 
    
Created using Testmaker fromThe Big Bus - www.thebigbus.com

Track

Wednesday, December 3, 2014

Safe Practices for Life Online -- Hannah, Olivia, and Hillary

Hannah LittleJohn
Olivia Herring
Hillary Woodall

‘Safe Practices for Life Online’

  1. What are three online social networking sites that are used to form connections and develop relationships online? Facebook, Twitter, and Instagram.  -- Hannah

  1. Consider the consequences. Conduct research into the consequences faced by students because of what they posted on their social network accounts.
Students can face serious consequences because of what they post on social media, especially when it relates to school. The school board can take action if students post information that directly regards the school, students, faculty, etc, and many students have been suspended from schools or expelled because of their less than stellar social media behavior. There can also be harsher punishments that can involve jail time and other serious consequences that can tarnish a student’s record forever. Threats made on social media can result in students being charged with harassment, simple assault, and terroristic threats. This can result in jail time, fines, and psychiatric evaluations/interventions.   -- Olivia

  1. Define in your own words:
  • sexting - sending inappropriate, sexual information over mobile phones (Gordon-Messer, Deborah; 2012; Sexting Among Young Adults; Journal of Adolescent Health)
  • cramming -  adding charges to a victim’s bill without them knowing (McGregor, Michael; April 2004; Communication Technology at the Federal Communications Commission: E-government in the Public’s Interest; Government Information Quarterly)
  • cookies -  a message from a server that is stored online and given back to the server each time the server page is visited (Sit, Emil; September 2000; Web Cookies: Not Just a Privacy Risk; Communications of the ACM)
  • trojan horse - a virus/program that is disguised as a non-threatening application/webpage (Ghosoon, M. W.; 2011; A Comparison of Trojan Virus Behavior in Linux and Windows Operating Systems; World of Computer Science and Information Technology Journal)
  • phishing - falsely claiming to be a legitimate company, and sending emails to victims in an attempt to get their private information (Love, Steve; 2013; Beware of Phishing Schemes (Online); Computers in Human Behavior)
  • spyware - software that tracks a computer user’s browsing habits, unknown to them. (Shuckla,Sudhindra; August 2005; Web-browsing and Spyware Intrusion; Communications of the ACM)
  • rootkit - attacks that hide an attacker’s presence on a computer (Riley, Ryan; April 2013; A Framework for Prototyping and Testing Data-Only Rootkit Attacks; Computers and Security)
  • zombie - a computer that has been attacked by a virus (Gozzi Jr. Raymond; Fall 2000; Zombie Computers; ETC.: A Review of General Semantics) -- Olivia

  1. Why are these screen names poor choices?
  • Trashmouth
  • IHaveOnePairPants
  • BoogerDude
  • Pig

These screen names are poor choices because they are a poor reflection of yourself and allows for cyber bullies to attack and harass you based on the screen name you have chosen.
Though it may be for entertainment or a nickname that was used when you were younger, it has given a unknown person a way into your personal life. -- Hillary

  1. Why might someone harass those with these screen names?
  • InYoFace
  • Badboy2U
  • Lookin4Luv
  • IMAHottie
  • FatMama
  • suPaFlirt

A person with these screen names might get harassed because it gives of the wrong perception such as “Fat Mama” may be harassed using jokes surrounding the word “fat” or using it itself. “suPaFlirt” is very negative as if the person is very easy or “out there”. A person with the negative mindset would be very explicit or sexual with that specific person b/c of the screen name. -- Hillary

  1. Too much info can be given through screen names. What info is being revealed through the following screen names?
  • Tom_Evans34
  • Missy-13
  • AndyKarateKid
  • ViolinGurl
  • restlinmatch

In the following screen names, it gives out their personal information such as first and last name and their select hobbies and/or interests.

  1. Good and bad choices for screen names. Write whether you think these are good choices or poor choices and why.
  • i8sushi2
  • Soccerstar
  • Puppygirl1234
  • KeKe1995
  • Bookworm
  • 2BorNot2b
  • Choco-holic
  • CapitlOfens
  • AmrcanIdol2
  • BellaIsabella
  • DarkAngel666
  • Karla-Love-1996
  • SimpyMe
  • gUn4hiRe
  • babyfaceLA
  • Watup?

I think these are some poor choices of screen names because it gives hint to a person’s actual age, gender and/or name. It also gives information about a person’s hobbies or likes which is very easy for a hacker or predator to strike conversation in order to lure in a person. -- Hillary

  1. Create three different screen names that you think will meet all of the following guidelines:
  • Unlikely to attract negative attention
  • Free of bad language
  • Don’t reveal too much personal information
  • Don’t reveal a real name, age, or gender
Three screen names are D02Bulls, Lakers700, and L01Fan -- Hillary

  1. How likely is it that a password can be cracked?
  • Does your password include the name of a family member or pet? (-3)
  •             “”                    include the birth date of a family member? (-3)
  •             “”                    contain one or more words that could be found in a dictionary? (-3)
  •             “”                    contain a random set of numbers? (+2)
  •             “”                    have eight or more characters? (+2)
  •             “”                    contain both letters and numbers? (+2)
  •             “”                    have less than 6 characters? (-1)
  •             “”                    contain one or more non-number, non-letter character? (+3)
  •             “”                    contain the date of a well-known even? (-1)
  •             “”                    contain at least 3 numbers in numerical sequence? (-2)
  •             “”                    contain any word spelled backward? (-1)
  •             “”                    contain a word repeated more than once? (-1)
  •             “”                    contain your telephone number, zip code, or area code? (-2)
  •             “”                    include a mixture of uppercase and lowercase letters? (+2)
  • Is your password written on a piece of paper that’s within 15 feet of your computer? (-2)
  • Have you ever shared your current password with a friend? (-3)

Scores:

Hannah - 8
Olivia - 9
Hillary - 8

  1. From the list below select the most-common reason and the least-common reason that students’ online accounts are broken into each year.
  • A password-cracking program is used to crack their password. (LEAST - COMMON)
  • Others who know personal things about the student guess their password.
  • Students write their password down where others are able to see it.
  • Students give their password to their friends, who then decide to use it or give it to others who use it. (MOST - COMMON)
  • Other students see the password as the student enters it on a keyboard.
-- Olivia Herring

  1. Look up on Google - ‘malware analysis: drive-by download’. Watch the video and create a new post with your thoughts and feelings about the subject. (2 paragraphs)

I was very shocked by the information presented in this video. I knew that there were threats on the internet, and that we have to be very wary of what we do online and how we protect our personal information. However, I had no idea that it was so easy for hackers to access your computer. This information is terrifying, because one wrong click can cause your computer to accept a drive-by download which can send your computer to tons of malicious websites.
This video has shown me the importance of security software on my computer. I will no longer let my coverage lapse because I see the dangers that viruses can pose on my computer. I was amazed at how quickly a computer could be attacked, but also discouraged. I am very glad that we have software that can protect us against threats, but I do not feel comfortable with the way the internet has become, and how hackers can compromise my security against my will. -- Olivia

  1. Go to www.lookstoogoodtobetrue.com/tests.aspx and choose three of the eight tests to go through. Write your results.
Are you the lucky winner in a sweepstakes or lottery?- Low Risk
Are you safe from financial fraud?- Low Risk
Are you an unwitting accomplice in crime?- Low Risk --Hannah

  1. Choose an article to summarize from www.lookstoogoodtobetrue.com/alert.aspx. --
CYBER-RELATED SCAMS TARGETING UNIVERSITIES, EMPLOYEES, AND STUDENTS
Ranging from internet fraud to intrusions, internet crime is targeting universities, their employees, and their students. There are five different categories to put these crimes into. The first is called spear phishing emails. The perpetrator sends an email with a link to the university employees. Once the employee has clicked on the link, they are redirected to a page that tells them there is a problem with the system and they must provide their login information. Once this information is received, the perpetrator is able to funnel paychecks into a separate account. The second one, scammers provide advertisements for college students looking for administrative positions. They claim to be able to pay them through an email or direct deposit, if they are able to print the check and mail it to the scammer. In the third scam, individuals compromise the accounts of students and have their refund checks administered to an account that is not the student’s account. Universities have also reported crimes such as individuals obtaining information from professors to file fraudulent income tax returns, and universities being victims of intrusions. -- Hannah

Tuesday, December 2, 2014

Online Practices


1.     From Safe Practices for Life Online:  A Guide for Middle and High School (2008) - D. Fodeman & M. Monroe
          a. Lookstoogoodtobetrue.com risk tests
          b. Chapter 2 Protecting Your Privacy Online
i. Pop-ups and Banner Ads – An online advertisement that is displayed in a new browser (dictionary.com); Long, rectangular image, containing text, images, or animations that can be placed anywhere on a webpage to advertise (dictionary.com)
ii. Spyware – Software that is installed surreptitiously and gathers information about an Internet user’s browsing habits (dictionary.com)
iii. Zombies and Botnets – A computer connected to the Internet that has been compromised by a hacker (Wikipedia); a large number of compromised computers that are used to generate span, relay viruses or flood a network or Web server with excessive requests to cause it to fail (pcmag.com)
iv. Cookies – A message given to a Web browser by a Web server which is stored in a text file and sent back to a server each time the browser requests the server page (webopedia.com)
v. Drive-by-Downloads – A program that is automatically downloaded onto your computer without your consent or knowledge (by accessing a website or opening a html. email) and can contain spyware
vi. Cramming – Any fraudulent charges made to the telephone account of the victim (dictionary.com)
vii. Trojan Horse – A destructive program that masquerades as a benign application
2.     From Transforming Learning with New Technologies (2011) – R. Malloy, R.E. Verock-O’Loughlin, S.A. Edwards, & B.P. Woolf
a.      Take Pew Internet & American Life Project “What Kind of Tech User Are You?” quiz – I scored better than 90.2% of the public (9 out of 12 questions correct)
b.     Uniform Resource Locator (URL) aka Web Address – What is the purpose of the following URL designations?
i.                   .com – Is used to identify a company or commercial site
ii.                 .org – Is used to identify a non-profit organization site
iii.              .gov – Is used to identify government sites
iv.               .net – Is used to identify Internet service providers or other types of networks
v.                 .edu – Is used to identify educational sites, specifically four-year universities
(http://www.smccd.edu/accounts/csmlibrary/tutorials/url.html)
vi.               .mil – Is used for military  sites only

Questions: 

Thursday, November 20, 2014

Blogfolio

Final Project - Blogfolio

Introduction Video
            This introduction video assignment was very helpful and informative because it was my first instruction on how to make a blog. I learned how to set up a blog and create entries, as well as upload videos to accompany my blog posts. I really had no problems creating the blog or uploading the video. I watched one of my classmates who had previously uploaded a video to her blog, and followed her steps with no trouble.
            I really think that blogging is a valuable skill, and I know that I will use it in my future classroom. I think that blogging is a great way for teachers to share their ideas and discover new tactics for teaching their class. When teachers share their daily lessons on their blog they can share what worked and what didn't work, which can help teachers searching for new ideas sort through the good and bad. I plan to keep a blog of my adventures as a teacher, for myself, other teachers, and maybe the guardians of my students. It would be good to be able to look back on the year, and give the caregivers of my students an insight into our classroom.
            This introduction video meets the first NETS-T standard, which is to “facilitate and inspire student learning and creativity.”  In order to meet this standard, the teacher must “facilitate experiences that advance student learning, creativity, and innovation in both face-to-face and virtual environments.” This was done by first allowing the students to create a blog where they would share their own thoughts and projects, and secondly by having the students create the videos with partners. This gave them face-to-face interactions with other students, and allowed them to try out and share ideas to make their video their own.

Concept Map
            I learned a lot from the concept map assignment, but most specifically how to use Inspiration. This assignment came at the perfect time, because we had just learned how to make a proper concept map in one of our other classes. However, the only method they showed us was using a poster board. This lesson gave me an opportunity to practice my skills in making concept maps, but it also showed me a different and more effective way to use concept maps. Using hyperlinks, I learned how to make my lesson more interactive and integrate technology in my classroom.
            The only real trouble I had with this assignment was figuring out some of the editing strategies, such as changing the shape and configuration. After asking my classmate for assistance, however, I was able to figure out the program rather easily.
            I definitely plan to use this concept map method in my future classroom to present my students with organized facts about my lesson. I think that it will help them sort through facts and develop a clearer understanding of the material. Using the concept map will also help me to stay on track when teaching my lesson, and give me a place to store all supplementary videos, pictures, and other web materials that I will need as I teach.
            This concept map activity met the NETS-T standard of “designing and developing digital age learning experiences and assessments. In order to meet this standard, teachers must “design, develop, and evaluate authentic learning experiences…incorporating contemporary tools and resources.” Having us create our own concept map from scratch really showed us how to design and develop a classroom lesson that uses modern technology.

Social, Ethical, Legal and Human Issues – Turnitin.com
            This assignment showed me that as educators and future educators we need to be doing more in our classrooms to encourage all students to succeed in using technology. I had no idea that there was still such a gender gap in regards to technology in our country. I learned that as a teacher I need to stimulate female students’ interest in technology by using it to teach all subjects, not just math and science, as females general succeed more in other subjects. I can also teach students about famous females in the technology field and invite female guest speakers into the classroom to show my female students that they have the same opportunities as males, and that they can do anything they want to.
            I also learned a lot about plagiarism. As I wrote the second draft of my essay, it took a lot of concentration to make sure that I didn't plagiarize anything. Surprisingly I was able to do this with little to no trouble as Turnitin.com revealed that I had 0% plagiarism, but it took a lot of effort to achieve this score. This assignment made me realize how easy it is to plagiarize and how often I probably plagiarize without even knowing or thinking about it. As a teacher I could use an assignment like this to teach students about plagiarism and explain the dangers of it. It will also be helpful for me to remember this assignment to prevent plagiarism in my own work.
            This assignment met the 4th NETS-T standard: “promote and model digital citizenship and responsibility” by showing us how to follow plagiarism laws and learn to write an ethically sound paper. This standard involves modeling and teaching “legal and ethical use of digital information and technology, including respect for copyright,” and we learned how to do this in our assignment by turning a paper into Turnitin.com so that we could see what qualifies as plagiarism, so that we can teach our students and remind ourselves of how to submit original work that gives proper credit where it is due.

Website
            I think this assignment was one of the most helpful of all of our classroom assignments because we learned how to actually create a classroom website. In this day and age, a classroom website seems like one of the most practical ways to keep parents and students informed about what is going on the classroom. Through this assignment I learned how to create a Google calendar to help students keep up with homework, and was able to import pictures to make my website more appealing. I learned the important things to include in a classroom website, such as announcements, homework, supply lists, and contact information. The one thing that I had the most trouble with on the assignment was creating an email link on webpage. To remedy this problem, I used Google to search for the correct way to create an email link and was able to find instructions and fix my problem.
            This lesson will play a role in my future classroom because I fully intend to establish a classroom website when I begin teaching. I plan to use the Google websites because they are free and professional, and now I understand how to navigate the site. I think the best things I learned to include on my classroom website were the supplementary educational videos, websites, and games. In my classroom I will have students performing on all different levels, and trying to incorporate everyone into the lesson will be difficult. However, these links will provide students and their guardians with a way to practice and learn at home to even the playing field.
            Having us create our own classroom website meets NETS-T standard 3: “model digital age, work, and learning.” To do this, teachers must “demonstrate fluency in technological systems and collaborate….using digital tools.” This website meets all of these qualifications because in order to create a website, the teacher must be well-versed in the technology. This website also provides an outlet for communication between the guardians, students, and teacher.

Movie
            The movie assignment was one of my favorites. I have had experience with Movie Maker, so I did not really have any problems with the assignment, except for completing it within the allotted time. I did not really learn any new skills during this project except for how to upload photos to Dropbox and retrieve them. However, I had to follow the directions very carefully and remember how to use the program, and in doing so I was able to think about and learn ways to effectively explain to students how to make their own movie.
            I don’t know if I would actually use this method for teaching in my classroom, but I think it would be a great way for students to do projects. We recently learned about a strategy for teaching reading comprehension, where students create a “movie trailer” to advertise one of their classroom books. I think making a movie using this program would be a wonderful and simplistic way to do this. Students could also use this for other projects in the classroom, such as oral reports, and of course we could make an end of the year class video.
            This video did a wonderful job of meeting NETS-T standard one, which is: “facilitate and inspire student learning and creativity.” We learned how to use new technology to create a video, but were allowed a lot of leeway when it came to the design of our video. This project let us express our creativity through our designs, pictures, and music.

Google Assignment
            The Google Groups assignment was probably the most helpful, because I have had no experience using Google Groups. I learned a lot, including: how to set up a Google Group as an administrator and add people to that group, how to share and write Google Docs, and how to share and create a Google Slide Show.
            Once I figured out how to work Google Docs and the Google Slides I had no trouble because it is very similar to Microsoft Word and PowerPoint, which I have had a lot of experience with. I did have difficulty navigating from the Google Group homepage to the docs and slides, but I asked a classmate for assistance and they were able to help me. It was also a little difficult to complete assignments with others in my group because we weren't physically working together and had to rely on email communication to ensure that we all completed the assignment. It was slightly problematic when group members were late turning their work in because it affected the entire group, but, at the same time it was nice to have everyone’s work in one place for everyone to edit.
            I think using Google Docs and Slides would be great to use as a teacher both in my classroom and for collaboration with other teachers. I can share lesson plans and other documents, as well as slide shows with classroom information/lessons with the other teachers in my grade. Students could also use it to complete group projects, similarly to what we did in this class.
            The Google assignment me the NETS-T standard of: “engaging in professional growth and leadership.” In order to meet this standard, teachers must “collaborate with parents, peers, and students using digital tools.” This Google assignment was the perfect match for this standard because we had to learn how to collaborate with one another and complete assignments together without the benefit of face-to-face contact.

Web Tools
            I learned so much from this assignment. I never knew which sites teachers go to create tests or rubrics, or how easy it could be. I learned how to create these tests and rubrics, and learned about the many different forms of rubrics that teachers can use depending on their subject area and lesson. The most interesting part however, was the track program. Similar to how we included supplementary websites on our classroom websites, this track program keeps all educational websites in one place for students and educators. I learned how to organize these websites by type and how to share my track with others using each track’s specific number.
            The only problems I encountered with this assignment were in regards to posting it on the blog and deciding which websites to include. The instructions weren’t very detailed, and I found myself questioning if what I included in my assignment was what my professor wanted. To remedy this problem, I again collaborated with other students in the class to develop a game plan and come to a common conclusion about how to go about this assignment.
            As I teacher I know that I will use the information and skills from this assignment on at least a weekly basis. I have learned how important it is to use a detailed rubric for each of my lessons to ensure that students are meeting the standards and learning the information they need to. This program will help me create rubrics quickly and give me ideas when I am having difficulty. I will also use the test creator, though probably not as often as the others because I may not be in a situation in which students can take computerized tests on a regular basis. I would use the track program to create a place for supplementary websites, and maybe even collaborate with my students’ computer teacher to allow them to go to these websites when they have free time in computer class.
            This assignment meets the 2nd NETS-T standard: “design and develop digital age learning experiences and assessments” because it incorporates current digital technology, and teaches us ways to incorporate it into our students’ learning through things like computerized tests and educational games videos.

Class Reflection
            This class has taught me many valuable things about incorporating technology into my classroom, using technology effectively in the work place, and using technology to help students learn and express their creativity. Before this class, I was very skeptical about using technology as a major medium of learning in an elementary school classroom, but now I can see how it can be beneficial. I have learned that elementary students are able to grasp onto ideas regarding technology relatively quickly and that as teachers we need to provide them with the opportunity to do this in the classroom to help them keep up with the ever technologically advancing world they live in. I have learned how to operate many new computer programs that I have continued to use even outside of class, such as Dropbox and Google docs. I have also learned how to operate
            One of my weaknesses would be the speed at which I can figure out and use new-to-me technology. I found myself falling behind in the classroom many times because I could not keep up with the instructor’s directions. I also have a great weakness when it comes to understanding the technical side of technology. With a little practice I can usually figure out how to make a concept map or movie, but I am lacking in understanding when it comes to computer vocabulary and internet security. I think this lack of understanding can be attributed to the fact that I have not had a computer education course that addresses computer safety or what goes on behind the scenes to make computer programs work; we only learn how to operate the program. For this reason, I feel that one of my strengths is picking up new skills quickly and navigating my way around a computer program until I figure it out. I have simply had a lot of practice with this aspect of technology and it comes more naturally to me.  I also have not had a lot of experience planning lessons that incorporate technology, nor do I have an extensive knowledge of the applications and programs available to teach students through technology. This class has given me some ideas, and I plan to continue exploring educational software until I find programs that work in my classroom. I can do this through something as simple as a Google search or by perusing apps like Kids Media. I definitely plan to investigate more about Internet security because this class has really brought to life how easily my computer can be hacked without the proper protection. I will look into what information is appropriate to give online, as well as different anti-virus software to ensure that I am protected.
            I plan to integrate technology into my classroom in many different ways. I can begin the process by simply allowing the students to spend time on the computer. Giving online tests, requiring internet research for assignments, and creating projects with Movie Maker will give students much needed practice in operating computers. If my school has the budget for it, I would love to use iPads in my classroom. In this day and age there are great opportunities for students to learn from apps and advanced software such as Google Earth. As the teacher, I have to make sure that I am setting a good example, and this can be done by using my Smart Board to its full capabilities, using supplementary videos in my lessons, and even using technology like Skype to go on virtual field trips and talk to people around the world.
            Another way to integrate technology into my classroom is through blogs. I think blogs are excellent tools for both the classroom teacher and students. I like the practicality of making blogs and the fact that they can be shared between teachers to share information and ideas to enhance students’ learning. Blogs can also be used in the classroom for subjects like English or reading, where students need to write responses to books or papers, but they can also be used in History when teachers have students keep a blog under the name of a historical figure. Blogs are also a great way for students to critique other students’ work. The comment section allows students to make suggested changes to students’ papers that are submitted via blog.
Resources:
NETS-T Standards
<http://www.iste.org/docs/pdfs/20-14_ISTE_Standards-T_PDF.pdf>