Monday, December 8, 2014

Web Tools Assignment

Rubric: 

    Independent Reading - Elementary : Responding to \"Harry the Dirty Dog\" by Gene Zion


    Teacher Name: Ms. Herring


    Student Name:     ________________________________________

CATEGORY
4
3
2
1
Stays on task
Student reads for the entire reading time. This may be independent reading or done with adult or peer assistance, as assigned.
Student reads almost all (80% or more) of the allotted reading time.
Student reads some (50% or more) of the time.
Student wastes a lot of reading time.
Tries to understand
Stops reading when it doesn\'t make sense and reads parts again. Looks up words s/he doesn\'t know.
Stops reading when it doesn\'t make sense and tries to use strategies to get through the tricky spots or to figure out new words.
Stops reading when it doesn\'t makes sense and asks for assistance.
Gives up entirely OR plows on without trying to understand the story.
Understands story elements
Student knows the title of the story as well as the names and descriptions of the important characters. Can tell approximately when and where the story happened.
Student knows the names and descriptions of the important characters and where the story takes place.
Student knows the names OR descriptions of the important characters in the story.
Student has trouble naming and describing the characters in the story.
Able to make predictions
Student is able to correctly answer all of the previously constructed prediction questions throughout the reading of the book.
Student is able to answer 3 of the four prediction questions while reading the text.
Student is able to answer 2 of the prediction questions while reading the text.
Student is able to answer 1 of the prediction questions while reading the text.
States problems and solutions
Student can correctly state both problems illustrated in the book and the appropriate solutions.
Student can correctly state both problems, but can only match one solution with the problems.
Student can correctly identify one or both problems, but not the solutions.
Student cannot correctly name the problems or solutions in the story.


Track:

Track #456916: Cells, Cells, Cells
Annotated by: Olivia Herring
1.Cell Structures - Quizzes, diagrams, videos, and activities 
http://www.neok12.com/Cell-Structures.htm
This website is wonderful because it provides students with practice quizzes which can be taken in preparation for their test. There are many videos that students can watch that do a great job of explaining cell structure and function. This is beneficial for students who may be more visual learners, because it provides more interesting detail and graphics than the teacher can a lesson. There are also practice labeling sheets which will be extremely beneficial for students preparing for tests in which they have to label cell parts, and games to make learning fun.
2.Mitosis Basketball Review Game 
http://sciencereviewgames.com/srg/games/hs.php?id=127
This website is a great study tool because it provides a fun and engaging way for students to study. It takes the information that teachers would normally print out in a study guide and turns it into an interactive game. This website is important because it shows students that learning can be fun, and it actually uses relevant facts/questions.
3.The Mitosis Rap 
https://www.youtube.com/watch?v=pOsAbTi9tHw
This hyperlink will direct students to an education YouTube video about cell mitosis. Mitosis is always discussed in conjunction with the cells, and it can be very complicated to understand. Putting this information into a song can help students memorize and recall the information more easily.
4.Virtual Cell Tour 
http://vcell.ndsu.nodak.edu/animations/flythrough/closer.htm
This website provides a virtual tour of the cell and its organelles. It allows students to actually see things that would not be possible to see in a regular classroom setting. It also provides more advanced information and concepts that will allow students who are progressing more quickly in the lesson to find more information and continue their learning. It also gives a link to the app version for on-the-go information.
5.Cell Parts and Function Quizlet 
http://quizlet.com/7781906/cell-parts-and-functions-test-flash-cards/
This link directs students to a previously made Quizlet (a set of online note cards). This website is wonderful because students can use the "note cards" that are already available or choose to make their own. It provides a great study tool that can be saved and shared between students in the classroom so that everyone has the same information. It also provides a feature to turn the terms a student needs to learn into a game called "Space Race".


Test:

Batty for Bats - Test 1
Please read the questions VERY carefully and choose the correct answer.
  1. Do bats sleep during the day or during the night? 
 
  2. What do bats like to eat? 
 
  3. How do bats like to sleep? 
 
  4. What color are bats? 
 
  5. Where do bats live? 
 
  6. Bats have small, furry faces, big ears, and long toes. 
 
  7. How do bats move around? 
 
  8. What is it called a sound hits something and bounces back so it can be heard again? 
 
  9. Bats use echolocation to find their food. 
 
10. What are animals called that sleep during the day and play at night? 
 

 
    
Created using Testmaker fromThe Big Bus - www.thebigbus.com

Track

Wednesday, December 3, 2014

Safe Practices for Life Online -- Hannah, Olivia, and Hillary

Hannah LittleJohn
Olivia Herring
Hillary Woodall

‘Safe Practices for Life Online’

  1. What are three online social networking sites that are used to form connections and develop relationships online? Facebook, Twitter, and Instagram.  -- Hannah

  1. Consider the consequences. Conduct research into the consequences faced by students because of what they posted on their social network accounts.
Students can face serious consequences because of what they post on social media, especially when it relates to school. The school board can take action if students post information that directly regards the school, students, faculty, etc, and many students have been suspended from schools or expelled because of their less than stellar social media behavior. There can also be harsher punishments that can involve jail time and other serious consequences that can tarnish a student’s record forever. Threats made on social media can result in students being charged with harassment, simple assault, and terroristic threats. This can result in jail time, fines, and psychiatric evaluations/interventions.   -- Olivia

  1. Define in your own words:
  • sexting - sending inappropriate, sexual information over mobile phones (Gordon-Messer, Deborah; 2012; Sexting Among Young Adults; Journal of Adolescent Health)
  • cramming -  adding charges to a victim’s bill without them knowing (McGregor, Michael; April 2004; Communication Technology at the Federal Communications Commission: E-government in the Public’s Interest; Government Information Quarterly)
  • cookies -  a message from a server that is stored online and given back to the server each time the server page is visited (Sit, Emil; September 2000; Web Cookies: Not Just a Privacy Risk; Communications of the ACM)
  • trojan horse - a virus/program that is disguised as a non-threatening application/webpage (Ghosoon, M. W.; 2011; A Comparison of Trojan Virus Behavior in Linux and Windows Operating Systems; World of Computer Science and Information Technology Journal)
  • phishing - falsely claiming to be a legitimate company, and sending emails to victims in an attempt to get their private information (Love, Steve; 2013; Beware of Phishing Schemes (Online); Computers in Human Behavior)
  • spyware - software that tracks a computer user’s browsing habits, unknown to them. (Shuckla,Sudhindra; August 2005; Web-browsing and Spyware Intrusion; Communications of the ACM)
  • rootkit - attacks that hide an attacker’s presence on a computer (Riley, Ryan; April 2013; A Framework for Prototyping and Testing Data-Only Rootkit Attacks; Computers and Security)
  • zombie - a computer that has been attacked by a virus (Gozzi Jr. Raymond; Fall 2000; Zombie Computers; ETC.: A Review of General Semantics) -- Olivia

  1. Why are these screen names poor choices?
  • Trashmouth
  • IHaveOnePairPants
  • BoogerDude
  • Pig

These screen names are poor choices because they are a poor reflection of yourself and allows for cyber bullies to attack and harass you based on the screen name you have chosen.
Though it may be for entertainment or a nickname that was used when you were younger, it has given a unknown person a way into your personal life. -- Hillary

  1. Why might someone harass those with these screen names?
  • InYoFace
  • Badboy2U
  • Lookin4Luv
  • IMAHottie
  • FatMama
  • suPaFlirt

A person with these screen names might get harassed because it gives of the wrong perception such as “Fat Mama” may be harassed using jokes surrounding the word “fat” or using it itself. “suPaFlirt” is very negative as if the person is very easy or “out there”. A person with the negative mindset would be very explicit or sexual with that specific person b/c of the screen name. -- Hillary

  1. Too much info can be given through screen names. What info is being revealed through the following screen names?
  • Tom_Evans34
  • Missy-13
  • AndyKarateKid
  • ViolinGurl
  • restlinmatch

In the following screen names, it gives out their personal information such as first and last name and their select hobbies and/or interests.

  1. Good and bad choices for screen names. Write whether you think these are good choices or poor choices and why.
  • i8sushi2
  • Soccerstar
  • Puppygirl1234
  • KeKe1995
  • Bookworm
  • 2BorNot2b
  • Choco-holic
  • CapitlOfens
  • AmrcanIdol2
  • BellaIsabella
  • DarkAngel666
  • Karla-Love-1996
  • SimpyMe
  • gUn4hiRe
  • babyfaceLA
  • Watup?

I think these are some poor choices of screen names because it gives hint to a person’s actual age, gender and/or name. It also gives information about a person’s hobbies or likes which is very easy for a hacker or predator to strike conversation in order to lure in a person. -- Hillary

  1. Create three different screen names that you think will meet all of the following guidelines:
  • Unlikely to attract negative attention
  • Free of bad language
  • Don’t reveal too much personal information
  • Don’t reveal a real name, age, or gender
Three screen names are D02Bulls, Lakers700, and L01Fan -- Hillary

  1. How likely is it that a password can be cracked?
  • Does your password include the name of a family member or pet? (-3)
  •             “”                    include the birth date of a family member? (-3)
  •             “”                    contain one or more words that could be found in a dictionary? (-3)
  •             “”                    contain a random set of numbers? (+2)
  •             “”                    have eight or more characters? (+2)
  •             “”                    contain both letters and numbers? (+2)
  •             “”                    have less than 6 characters? (-1)
  •             “”                    contain one or more non-number, non-letter character? (+3)
  •             “”                    contain the date of a well-known even? (-1)
  •             “”                    contain at least 3 numbers in numerical sequence? (-2)
  •             “”                    contain any word spelled backward? (-1)
  •             “”                    contain a word repeated more than once? (-1)
  •             “”                    contain your telephone number, zip code, or area code? (-2)
  •             “”                    include a mixture of uppercase and lowercase letters? (+2)
  • Is your password written on a piece of paper that’s within 15 feet of your computer? (-2)
  • Have you ever shared your current password with a friend? (-3)

Scores:

Hannah - 8
Olivia - 9
Hillary - 8

  1. From the list below select the most-common reason and the least-common reason that students’ online accounts are broken into each year.
  • A password-cracking program is used to crack their password. (LEAST - COMMON)
  • Others who know personal things about the student guess their password.
  • Students write their password down where others are able to see it.
  • Students give their password to their friends, who then decide to use it or give it to others who use it. (MOST - COMMON)
  • Other students see the password as the student enters it on a keyboard.
-- Olivia Herring

  1. Look up on Google - ‘malware analysis: drive-by download’. Watch the video and create a new post with your thoughts and feelings about the subject. (2 paragraphs)

I was very shocked by the information presented in this video. I knew that there were threats on the internet, and that we have to be very wary of what we do online and how we protect our personal information. However, I had no idea that it was so easy for hackers to access your computer. This information is terrifying, because one wrong click can cause your computer to accept a drive-by download which can send your computer to tons of malicious websites.
This video has shown me the importance of security software on my computer. I will no longer let my coverage lapse because I see the dangers that viruses can pose on my computer. I was amazed at how quickly a computer could be attacked, but also discouraged. I am very glad that we have software that can protect us against threats, but I do not feel comfortable with the way the internet has become, and how hackers can compromise my security against my will. -- Olivia

  1. Go to www.lookstoogoodtobetrue.com/tests.aspx and choose three of the eight tests to go through. Write your results.
Are you the lucky winner in a sweepstakes or lottery?- Low Risk
Are you safe from financial fraud?- Low Risk
Are you an unwitting accomplice in crime?- Low Risk --Hannah

  1. Choose an article to summarize from www.lookstoogoodtobetrue.com/alert.aspx. --
CYBER-RELATED SCAMS TARGETING UNIVERSITIES, EMPLOYEES, AND STUDENTS
Ranging from internet fraud to intrusions, internet crime is targeting universities, their employees, and their students. There are five different categories to put these crimes into. The first is called spear phishing emails. The perpetrator sends an email with a link to the university employees. Once the employee has clicked on the link, they are redirected to a page that tells them there is a problem with the system and they must provide their login information. Once this information is received, the perpetrator is able to funnel paychecks into a separate account. The second one, scammers provide advertisements for college students looking for administrative positions. They claim to be able to pay them through an email or direct deposit, if they are able to print the check and mail it to the scammer. In the third scam, individuals compromise the accounts of students and have their refund checks administered to an account that is not the student’s account. Universities have also reported crimes such as individuals obtaining information from professors to file fraudulent income tax returns, and universities being victims of intrusions. -- Hannah

Tuesday, December 2, 2014

Online Practices


1.     From Safe Practices for Life Online:  A Guide for Middle and High School (2008) - D. Fodeman & M. Monroe
          a. Lookstoogoodtobetrue.com risk tests
          b. Chapter 2 Protecting Your Privacy Online
i. Pop-ups and Banner Ads – An online advertisement that is displayed in a new browser (dictionary.com); Long, rectangular image, containing text, images, or animations that can be placed anywhere on a webpage to advertise (dictionary.com)
ii. Spyware – Software that is installed surreptitiously and gathers information about an Internet user’s browsing habits (dictionary.com)
iii. Zombies and Botnets – A computer connected to the Internet that has been compromised by a hacker (Wikipedia); a large number of compromised computers that are used to generate span, relay viruses or flood a network or Web server with excessive requests to cause it to fail (pcmag.com)
iv. Cookies – A message given to a Web browser by a Web server which is stored in a text file and sent back to a server each time the browser requests the server page (webopedia.com)
v. Drive-by-Downloads – A program that is automatically downloaded onto your computer without your consent or knowledge (by accessing a website or opening a html. email) and can contain spyware
vi. Cramming – Any fraudulent charges made to the telephone account of the victim (dictionary.com)
vii. Trojan Horse – A destructive program that masquerades as a benign application
2.     From Transforming Learning with New Technologies (2011) – R. Malloy, R.E. Verock-O’Loughlin, S.A. Edwards, & B.P. Woolf
a.      Take Pew Internet & American Life Project “What Kind of Tech User Are You?” quiz – I scored better than 90.2% of the public (9 out of 12 questions correct)
b.     Uniform Resource Locator (URL) aka Web Address – What is the purpose of the following URL designations?
i.                   .com – Is used to identify a company or commercial site
ii.                 .org – Is used to identify a non-profit organization site
iii.              .gov – Is used to identify government sites
iv.               .net – Is used to identify Internet service providers or other types of networks
v.                 .edu – Is used to identify educational sites, specifically four-year universities
(http://www.smccd.edu/accounts/csmlibrary/tutorials/url.html)
vi.               .mil – Is used for military  sites only

Questions: