This class helped me identify my strengths and weaknesses within the realm of educational technology. First of all, I learned that fearlessness is both a strength and a weakness. On one hand, I am not afraid to “jump into” a new software or activity. I learn how things work by messing around with them instead of waiting for someone else to teach me. On the other hand, it is not good for me to be so willing to “jump in” without looking at possible risks. As a teacher, I need to be sure of the safety and security of a website or application before allowing it into my classroom. Another strength I have is a good set of leadership skills. I am more than willing to take charge and organize group endeavors. One of my weaknesses is inexperience with troubleshooting. If I experience a technical difficulty, I am nearly always dependent on someone else to solve it. If I am teaching in a classroom, I will not often have time to call for help when I cannot get things to work as I please. Hopefully as I spend more time working with education related technology, I will figure out how to fix problems on my own.
IT 365 H002 Fall 2014 Camille Godwin
Thursday, December 4, 2014
Course Reflection
IT 365 has been one of my most useful classes this semester. I really think that in my career as a teacher I will make use of the skills that I learned in this class. I learned how to collaborate efficiently with others using Google Groups, how to maintain a website and a blog, and how to create concept maps, movies, and online quizzes. Most importantly, I learned not to be afraid of incorporating technology into my classroom. In the future, I will definitely create and maintain a website for my students and their parents to keep up with. I will also probably create online quizzes for my students and allow them to play computer games that are related to the learning material. In addition, I will find age appropriate educational videos that help students connect lessons to real life.
One of the main things we did this semester was keep a blog portfolio of all our assignments and reflections. Looking back at it is a good reminder of all the things I learned from this class. It is my hope that when I start teaching, it will remind me of useful or convenient websites, apps, and software that I got experience with this year. In the same way, I can look at other teacher’s blogs for even more ideas and reviews of other, new lesson ideas. Blogs are truly a fantastic way to network and share information among teachers. I look forward to keeping one, as well as “following” my friends and colleagues when we start actually teaching.
Assignment Reflections
Intro Video
Making an introduction video was intimidating to say the least. I felt extremely unprepared and inexperienced with video. I learned that while it is fast and easy to shoot and post a video, it should take quite a bit of preparation to do it right. I learned that you should probably write down what you plan to say and practice it a few times. You should try filming from different angles in order to look your best. My partner and I tried from several different places because either the light was wrong or the angle gave me a double chin. It also sounds funny because I did not have enough words prepared to fill the time limit. My video would not post correctly and ended up sideways on my website. I do not know how to fix that, so it remains sideways. Even though my video turned out terribly, I think it was very good practice. Most schools today require teachers to have a website on which they post assignments and other important class information. These websites nearly always need an introduction to the teacher, and I think a video is a wonderful way to accomplish that. That being said, thanks to this assignment I will be able to create an impressive and professional introduction video when the time comes for me to have my own students. This assignment aligns with NETS 3 and 5 which are, “Model digital age work and learning” and “Engage in professional growth and leadership.” These goals were fulfilled because making a video with partners and displaying it on the blog constitutes modeling digital age work and introducing myself on film developed my skills as a professional.
Concept Map
I really enjoyed doing the concept map assignment. The software was fun to work with, and this assignment gave me a chance to prepare part of a lesson I could actually use in teaching. I made a concept map about different types of transportation. I designed this lesson for a kindergarten class and filled it with pictures and bright colors. I even color coded the sections so that it would be very easy to understand. Since kindergartners do not read well, each item had a picture of the vehicle as well as the word. Even if I do not end up using this particular lesson, I at least have more experience creating lessons. I had trouble making my links look like fun and relevant pictures on the concept map, but I solved it by placing the pictures on the map and then adding the links onto the pictures. I then deleted the original, boring links. This assignment aligns with NETS 1, 2, and 3 which are “Facilitate and inspire student learning and creativity,” “Design and develop digital age learning experiences and assessments,” and “Model digital age work and learning.” They align with these standards because colorful concept maps with lots of pictures can easily help students visualize information and learn in a creative way. This was also a good example of designing and modeling a digital learning experience.
Website
The website assignment was much more difficult than I expected it to be. I made my website as if I was a second grade teacher getting to know my students at the beginning of the year. I had trouble at the beginning trying to figure out the formatting tools of the website maker. Finally I learned that I could insert a horizontal line under the columns so that I could put more information underneath them. I never figured out how to insert a link to my email on the website, so I just put my email address on the bottom of each page. This was a very important assignment for me since I will likely be required to maintain a website for my class when I become a teacher. I will need to be able to produce a website that keeps students and their parents up to date with all assignments and news from my classroom. I feel that now I am able to do that well. It was very helpful to learn how to insert a Google calendar into a website. This assignment aligns with NETS 2, 4, and 5 which are “Design and develop digital age learning experiences and assessments,” “Promote and model digital citizenship and responsibility,” and “Engage in professional growth and leadership.” These goals are accomplished by this assignment because the website is a digital age learning experience, an example of digital citizenship, and a reflection on my professional growth.
Movie
The movie was probably my favorite assignment of the whole semester. The software was easy to work with, and making a movie was really fun. This assignment allowed for more creativity than most of the other assignments since the movie topic did not have to relate directly to teaching. I had never made a movie before, so this was a new experience for me. I learned how to operate the software and share the video on the internet. One problem I encountered was that my pictures took much more time than my music clip. I corrected this by taking out four pictures and making all the other slides much faster. I also removed any fancy transitions that took longer than I wanted. Finally, my credits rolled just as the song ended. It was perfect. This was a great skill for me to learn. I can make interesting videos for my class in the future. For example, after we go on a field trip, I can create a video that will remind them what happened so that they will not forget what they learned. This assignment aligned with NETS 2 and 3 which are “Design and develop digital age learning experiences and assessments” and “Model digital age work and learning.” This assignment fulfilled these standards because making a movie is a prime example of designing a digital age learning experience and modeling digital age work.
Turn It In
The Turn It In Assignment was an unusual experience for me. Even though I knew the purpose of the assignment was to see for myself how Turn It In catches plagiarism, I felt guilty copying and pasting from websites to create a report. I have always been told specifically not to do that, and now it was a requirement! To top it all off, I was not even good at plagiarizing! I had to resubmit my copied report because it did not fulfill the requirement for percent plagiarized. I solved the problem by removing my entire works cited page from the report. I did not have any problems with the original report. My report turned out to be 0% plagiarized. I was very proud of that. Now I know what Turn It In counts as plagiarism and what it does not count. Apparently my copied and pasted report was only about 85% plagiarized because I included the web sites from which the words were stolen. That surprised me. As a teacher, I will have to carefully review each paper’s report that tells which lines were taken from which websites. This assignment aligns with NETS 3 and 4 which are “Model digital age work and learning” and “Promote and model digital citizenship and responsibility.” This assignment fulfills these standards because writing both plagiarized and original reports on a topic is a good way to model digital age work and learning, and learning more about plagiarism and how to catch it taught me more about digital age citizenship and responsibility.
Web Tools
The web tools assignment was frustrating for me. Trackstar is a good site for teachers to use in their classrooms to allow students to use the internet in a productive and controlled manner. I created a track that students could use if they finished their classwork early. It included educational games from a wide range of subjects and ability levels. I had a little trouble figuring out how to operate the Trackstar website, but I got accustomed to it as I worked more with it. The Rubistar rubric maker is a very helpful tool for teachers. Many times in elementary schools, projects and assignments are graded by rubric. It would be very helpful to be able to create them so easily and quickly online. I am glad that I learned how to do that. The Big Bus Testmaker was not quite such a pleasant experience for me. I created my quiz without a problem, but then I could not figure out how to save it. I had to create it again later and copy and paste it into my blog in order to see if it would work. I may not end up using that particular site in my teaching, but if I decide to, I will know how it works. This assignment aligns with NETS 2 and 3 which are “Design and develop digital age learning experiences and assessments” and “Model digital age work and learning.” It accomplishes these goals because creating a track of websites is designing, developing, and modeling a digital age learning experience, and making a quiz and a rubric is designing and developing digital age assessments.
Google Group
I was already familiar with Google apps before this assignment, so it was not very difficult. The only problem was that I added someone’s wrong email address to the group, but then I went back and added the correct one. As the group leader, I started the group email, the document, and the presentation. Then we discussed who would do each part, and we completed our tasks together. My group worked well together; there were no slackers among us, which was refreshing. We created a creative and comical story about a man who daydreams about superheroes and villains. We made a presentation about the five senses; it was fun to collaborate about design for that part. I feel like I learned a little more about the Google apps and how to collaborate with people on multiple projects simultaneously. I think these skills will be useful for collaborating with other teachers on lesson plans. Alternatively, I could have students work together on a presentation and save time in class by allowing them to do so at the same time by using the Google Slides. This assignment aligns with NETS 3 and 5 which are “ Model digital age work and learning” and “Engage in professional growth and leadership.” It fulfills these requirements because we utilized the Google technology to make our story and presentation, and we worked together as a team very professionally. 17 - Group Project - Safe Practices for Life Online
This was a group project. My group members were Brittney, Alex, and Ray. Brittney did questions 3, 4, 5, and 6. Alex did questions 7, 8, and 10. I did questions 1, 2, 9, 11, 12, and 13.
#1 Social Networking Sites
Facebook
Twitter
Tumblr#2 Consequences of Social Media Misuse
Recently, here at USM, a student posted a threat to other students on a social app called Yik Yak. Yik Yak is supposedly a feed where people can post anonymously to the people in the close vicinity. This student was located by campus police with help from the staff of Yik Yak. He was arrested and charged with a felony offense. This is just one example of possible consequences of posting on social media.
#3 Definitions
sexting - sending (someone) sexually explicit photographs or messages via cell phone.
cramming - the fraudulent practice of adding unauthorized charges to a customer's phone bill.
cookies - a message given to a Web browser by a Web server.
trojan horse - a program designed to breach the security of a computer system while ostensibly performing some innocuous function.
phishing - the activity of defrauding an online account holder of financial information by posing as a legitimate company.
zombie - a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet.
rookit - a set of tools that allow an unauthorised person to take over the use of a computer.
spyware - a program that is downloaded to a person's computer without their consent that retrieves information about that person or their computer use.
#4 Screennames
“Trashmouth,” “IHaveOnePairPants,” “BoogerDude,” and “Pig” are not appropriate screen name choices in general. They are especially not appropriate if you want to be taken seriously in the future as a professional. Your screen name needs to represent you, especially in a professional and tasteful manner. These screen names are inappropriate, unprofessional, and just plain unnecessary.
“Trashmouth,” “IHaveOnePairPants,” “BoogerDude,” and “Pig” are not appropriate screen name choices in general. They are especially not appropriate if you want to be taken seriously in the future as a professional. Your screen name needs to represent you, especially in a professional and tasteful manner. These screen names are inappropriate, unprofessional, and just plain unnecessary.
#5 Screennames
The screen name “InYoFace” might give someone the impression that you think you’re all that and that you feel you are superior to other people, which may make them want to harass you and knock you down a level. The screen name “Badboy2U” might give someone the impression that you think you are untouchable and have the right to act however you want, which may make them want to put you in your place. The screen name “Lookin4Luv” may give people the impression that you’re willing to do anything for love, and they may try to take advantage of you. The screen name “IMAHottie” gives off the vibe that you think you are the hottest thing since sliced bread, and that would make anyone want to knock you down two sizes just to show you that you aren’t as great as you seem to think you are. The screen name “FatMama” may make people think you have children, you’re inappropriate, or all of the above. This doesn’t give off a good impression to anyone, which may lead to harassment. The screen name “suPaFlirt” puts off the vibe that you are willing to flirt with anyone without any standards, which can easily lead to sexual harassment.
The screen name “InYoFace” might give someone the impression that you think you’re all that and that you feel you are superior to other people, which may make them want to harass you and knock you down a level. The screen name “Badboy2U” might give someone the impression that you think you are untouchable and have the right to act however you want, which may make them want to put you in your place. The screen name “Lookin4Luv” may give people the impression that you’re willing to do anything for love, and they may try to take advantage of you. The screen name “IMAHottie” gives off the vibe that you think you are the hottest thing since sliced bread, and that would make anyone want to knock you down two sizes just to show you that you aren’t as great as you seem to think you are. The screen name “FatMama” may make people think you have children, you’re inappropriate, or all of the above. This doesn’t give off a good impression to anyone, which may lead to harassment. The screen name “suPaFlirt” puts off the vibe that you are willing to flirt with anyone without any standards, which can easily lead to sexual harassment.
#6 Screennames
#7 Screennames
Are these appropriate?
i8sushi2 - yes
Soccerstar - yes
Puppygirl1234 - no
KeKe1995 - no
Bookworm - yes
2BorNot2b - yes
Choco-holic - no
CapitlOfens - no
AmrcanIdol2 - yes
BellaIsabella - yes
DarkAngel666 - no
Karla-Love-1996 - no
SimpyMe - yes
gUn4hiRe - no
babyfaceLA - no
Watup? - no
Tom_Evans34 gives away the man’s first and last name, and possibly his age.
Missy-13 gives away the fact that this is a 13 year old girl.
AndyKarateKid gives away the child’s first name and a hobby of his. Anyone, if they know the location of this child, could find out where he does karate at.
ViolinGurl gives away that this girl plays the violin and potentially plays in the band. This can make her easily accessible to predators.
restlinmatch gives away that this boy is into wrestling and probably plays for his school.#7 Screennames
Are these appropriate?
i8sushi2 - yes
Soccerstar - yes
Puppygirl1234 - no
KeKe1995 - no
Bookworm - yes
2BorNot2b - yes
Choco-holic - no
CapitlOfens - no
AmrcanIdol2 - yes
BellaIsabella - yes
DarkAngel666 - no
Karla-Love-1996 - no
SimpyMe - yes
gUn4hiRe - no
babyfaceLA - no
Watup? - no
Although many of these screen names are not professional, they are still appropriate. It would depend on the situation and the person who is using this screen name. The screen names that I said “yes” to being appropriate to were unlikely to attract negative attention, were free of bad language, don’t reveal too personal of information, and don’t reveal a name, age, location, or gender.
#8 Appropriate Screennames
# 9 Password score#8 Appropriate Screennames
schoolteacher101
ilovemydog576
deltaairlines01+2 (a fairly good password, but not great)
#10 Common and Uncommon Reasons Students have their Accounts Broken Into
Most Common - Students give their password to their friends, who then decide to use it or give it to other who use it.
Least Common - A password cracking software is used to crack their password.
Most Common - Students give their password to their friends, who then decide to use it or give it to other who use it.
Least Common - A password cracking software is used to crack their password.
#11 Drive by Downloads
Drive by download is a funny name for a serious problem. People can insert coding into seemingly innocent web pages that download malware to your computer without you even noticing. A lot of times, it shows up later claiming to be security software that needs you to pay a subscription fee in order to fix your problem. Even if you pay for the fake security, it does not fix your computer, so you still have the malware problems.
This is one reason that you should always keep your security software up to date. Most modern security software can keep drive by downloads from happening to your computer. It is also important to know what kind of software is on your computer so that you notice when something unfamiliar pops up. I think it is especially important to keep your computer safe in today’s world of technology driven society. In today’s world, if your computer is jeopardized, you have a serious problem. You may not be able to work or socialize properly until the problem is fixed.
The article at http://www.ic3.gov/media/2014/141114.aspx describes how recently criminals have been fraudulently “selling” large items such as boats and automobiles over the internet. They post an ad with a picture and a contact number. Then someone sees it and calls. The scammer asks for their email address and tells them why they need to sell their item so quickly (divorce settlement, moving across the country, etc). After they negotiate a price, the scammer sends the customer an email that appears to be from a safe site like ebay, but is really a fake. The customer pays for their nonexistent boat, and then the scammer sends them another “ebay” email with a payment confirmation and anticipated shipping date. The scammer gets the money, but the customer never gets a boat.
#12 Internet Safety Tests
Are You Protecting Your Identity? – mid-level risk
Are You Safe From Financial Fraud Opportunities – low risk
Are You the Lucky Winner of a Sweepstakes or Lottery? – low risk
#13 Article summary
Tuesday, December 2, 2014
16 - Outline of Internet Information
1. From Safe
Practices for Life Online: A Guide for Middle and High School (2008) - D.
Fodeman & M. Monroe
a.
Lookstoogoodtobetrue.com
risk tests
b.
Chapter
2 Protecting Your Privacy Online
i.
Pop
ups and Banner Ads - an ad that displays in a new browser window
(MarketingTerms.org)
ii.
Spyware
- any technology, such as tracking software, that aids in gathering information
about a person or organization without their knowledge (TechTarget.com)
iii.
Zombies
and Botnets - a number of internet computers that, although their owners are
unaware of it, have been set up to forward spam to other computers.
(TechTarget.com)
iv.
Cookies
- information stored on a user's computer by a Web site so preferences are
remembered on future requests (MarketingTerms.org)
v.
Drive-by-Downloads
- programs that are automatically downloaded to your computer without your
consent or knowledge (TechTarget.com)
vi.
Cramming
- the addition of unauthorized or unexpected charges to a bill for landline or
mobile telephone services (TechTarget.com)
vii.
Trojan
Horse- a program in which malicious or harmful code is contained within
seemingly harmless data or programming in such a way that it can get control
and do damage. (TechTarget.com)
2. From Transforming
Learning with New Technologies (2011)- R. Malloy, R. E. Verock-O'Loughlin, S.
A. Edwards, &B. P. Woolf
a.
Take Pew Internet & American Life
Project “What Kind of Tech
User Are You?” quiz. - I scored better than 95.3% of the public, below 1.3%,
and the same as 3.4%.
b.
Uniform
Resource Locator (URL) aka Web Address – What is the purpose of the following
URL designations? Answers from DomainRegister.com
i.
.com
– commercial business
ii.
.org
– nonprofit groups
iii.
.gov
– federal, state, and local government agencies within the US
iv.
.net
– network related organizations
v.
.edu
– regionally accredited, degree giving institutions of higher learning
vi.
.mil
– US military
c.
Specialized
Search Resources for Teachers
·
Criteria
for Evaluating Web Resources
a. Accuracy – reliability of the information
on the site by providing a description of who authored the site and for what
purposes
b. Authority – credentials of the author or
authors as well as the nature of the site itself – commercial or not for profit
c. Objectivity – tests whether the
information on the site is fair and non-biased, and free of advertising
d. Currency – up to date with recent
information and updates that are clearly indicated
e. Coverage – information on the site can be
viewed easily without difficulties or commercial messages
i.
Internet
Public Library
ii.
Voice
of the Shuttle
iii.
Technorati
iv.
Webopedia
v.
Artcyclopedia
vi.
Encyclopedia
of Educational Technology
vii.
California
Learning Resource Network
viii.
Library
of Congress American Memory
ix.
University
of Texas at Austin Perry – Castaneda Library Map Collection
x.
Newslink
xi.
Good
Search
xii.
Score
(Schools of California Online Resources for Educators)
xiii.
Search
Engines 2
xiv.
Wayback
Machine
xv.
Open
Library
xvi.
Viewzi.com
xvii.
VueToo.com
xviii.
LibriVox
d.
Internet
Search Tools for Students
i.
KidsClick!
ii.
Ask
for Kids
iii.
Search
22
iv.
Clusty
v.
Yahoo!Kids
vi.
QUintura
vii.
FirstGov
for Kids
viii.
NASA
Kids Club
ix.
The
Why Files: The Science behind the News
x.
U.S.
Patent and Trademark Office Kids’ Pages
xi.
Time
for Kids
xii.
Smithsonian
Education
e.
Questions
i.
What
is the meaning of information literacy for teachers and students? Information
literacy is a crucial
skill in the pursuit of knowledge. It involves recognizing when information is needed and being
able to efficiently locate, accurately evaluate, effectively use, and clearly
communicate information in
various formats. (Wesleyan.edu)
ii.
What
are search engines and how do they work? Internet search
engines are special sites on the Web that are designed to help people find
information stored on other sites. To find information on the hundreds
of millions of Web pages that exist, a search engine employs special software
robots, called spiders, to
build lists of the words found on Web sites. When a spider is building its
lists, the process is called Web crawling. Meta tags allow
the owner of a page to specify key words and concepts under which the page will
be indexed. The engine might assign a weight to
each entry, with increasing values assigned to words as they appear near the
top of the document, in sub-headings, in links, in the meta tags or in the
title of the page. Regardless
of the precise combination of additional pieces of information stored by a
search engine, the data will be encoded to save storage space.
(HowStuffWorks.com)
iii.
What
pieces of information do students need to know about Internet searching? The Boolean operators are:
AND - All the terms joined by "AND" must appear in
the pages or documents. Some search engines substitute the operator
"+" for the word AND.
OR - At least one of the terms joined by "OR" must
appear in the pages or documents.
NOT - The term or terms following "NOT" must not
appear in the pages or documents. Some search engines substitute the operator
"-" for the word NOT.
FOLLOWED BY - One of the terms must be directly followed by the other.
NEAR - One of the terms must be within a specified number of
words of the other.
Quotation Marks - The words between the quotation marks
are treated as a phrase, and that phrase must be found within the document or
file. (HowStuffWorks.com)
iv.
How
can teachers and students thoughtfully evaluate online information resources,
including the online encyclopedia Wikipedia? Never use Web sites where an author cannot be determined,
unless the site is associated with a reputable institution such as a respected
university, a credible media outlet, government program or department, or
well-known non-governmental organizations. Beware of using sites like Wikipedia, which are collaboratively developed by users.
Because anyone can add or change content, the validity of information on such
sites may not meet the standards for academic research.
(Owl.English.Purdue.edu)
v.
How
can teachers respond to problems of plagiarism when students use online
sources?
·
Give students a clear and explicit definition of plagiarism
at the beginning of the semester, preferably on the syllabus.
·
Make a clear distinction between acceptable collaboration and
plagiarism, preferably on the syllabus. Because this distinction can vary from
discipline to discipline or from department to department, students can become
confused unless the distinction is spelled out explicitly for each class.
·
Create assignments that encourage originality and discourage
plagiarism.
·
Create assignments that are unusual or that take a different
slant on the material, thus eliminating "canned papers" that can be
easily purchased or even found for free on the Web.
·
Create writing assignments that have several parts (e.g., a
proposal, an annotated bibliography, a first draft, a second draft).
·
Request photocopies of all sources used in a paper.
·
Have students email you a copy of their essays as well as
hand in a hard copy. The email version will be easier to submit to a plagiarism
search engine, and the very fact that you make this request might be enough to
deter some students from plagiarizing. (CMSW.MIT.edu)
Subscribe to:
Posts (Atom)