Monday, September 30, 2013

Don't Track Me review (Blog #12)

When I first tried to download Don't track me to my computer, I used firefox and it wouldn't work. I then tried to use it on google chrome and it worked. Once I downloaded it, I went straight to Facebook because that was what I was most curious about. I was thinking since Facebook is such a popular site and so much information is included on it, that trackers would be everywhere. To my surprise, I didn't have many people tracking me. Only three at most. I then tried Google thinking that people would want to know what I search for. Surprisingly I only had two trackers. I'm not sure if I did this right or not since I only had a few trackers follow me but it is nice to know that there is a program out there that lets me know that there are people that follow every step I take on the internet.

Thursday, September 26, 2013

Inspiration comments (Blog #11)

Erika -I like how she started with reviewing the important concepts of the book and the bulletin board idea. She just needed to be a little more confident.

Jackie - Very confident in her concept map. Not much negative.

Mary Katherine - I loved the activities she had planned for her kids.

Jennifer - I like how she uses videos from the library. I like the short story activity and how they get to dress up. This would be a lesson for 4th and 5th graders.

Amanda - I thought the millionaire game was a very smart idea and activity to use. It seems kind of confusing the way the activities are planned. It seems like there's not a good flow.

Jonathan - Like the Pearl Harbor video. I like the statistics he used for the atomic bomb exercise.

Tuesday, September 24, 2013

Concept Map - Hurricane Force (Blog #10)



Activites with the book Hurricane Force by Joseph Treaster
CCSS.ELA-Literacy.SL.5.1a Come to discussions prepared, having read or studied required material; explicitly draw on that preparation and other information known about the topic to explore ideas under discussion.

I.  Have students read important parts of the book.

We will not be able to read the whole book, so I will give them certain pages to read in class that talk about important events that happened. This saves us time and also lets me give them the knowledge that they need to know. Doing this will also help with class discussions.
A.     small group discussion 
                        -Important fact
                        -What they would have done
         -How can they help after a hurricane hits

B.    Class discussion on what small groups talked about

II. Multimedia presentations

The purpose of this activity will be giving kids a clear view of what a hurricane is like and what they can do. Showing video presentations will give them a look at what a hurricane can do. If I am teaching up north, this will definitely help since not many hurricanes hit there.

A.    Youtube presentation on Hurricane Katrina

B.    Youtube presentation on Hurricane Sandy

III. Personal stories from hurricane survivors
http://www.pbs.org/newshour/extra/features/july-dec05/survivors_9-12.html

The purpose of this activity is for students to hear one on one experiences from deadly hurricanes.
Have kid’s pre write questions they want answered by presenter.

A.      Have students write out questions they want to ask the presenter before he or she comes so
that he or she has an idea on what to speak about.

B.      Ask any left out questions after presentation   


IV. Have Kids research a hurricane assigned to them.
http://www.wunderground.com/hurricane/usdeadly.asp

The purpose of this activity is for the students to explore different types of hurricanes and find one that interests them and research more in depth about it. The students will be able to find out about why the hurricanes were so deadly.  This will also open their eyes to what to do when a hurricane approaches.

A.    Teach a lesson on how to research using the library and online resources

B.    Have the groups present their information.
1.    Presentation of facts.
a.    Posterboard
b.    Computer presentation
2.    Act out a story.


V. Do experiment on hurricanes and how wind speed affects wave height.
http://www.discoveryeducation.com/teachers/free-lesson-plans/hurricane.cfm

This activity will be able to give the kids a chance to learn how hurricane winds affect the amount of wave pressure. It will help the students have hands on experience about hurricanes.

A.      Have students bring in the necessary materials.
-          9" 13" baking dish
-          Flexible straw
-          Duct tape
-          Water
-          Ruler
B.       Have students work in small groups.
-Having the students work in small groups will give them the opportunity to enteract with one another and solve problems together.

The Padagogy Wheel V2.0 (Blog #9)

The Padagogy Wheel at first was very confusing to me. After looking at it though I had an idea of how I would use it in my class. For example, if I ever want my kids to Evaluate something, they will go to the evaluate section of the wheel and use the action words that are given to describe what they are evaluating. Then it gives me a list of activities to do to help them evaluate. The wheel is very useful because it gives teachers an organized tool to use in their classrooms so that kids can create, understand, apply, analyze, and evaluate.

Blooms Digital Taxonomy is also a useful tool because it gives key terms that make sense to the teacher but then it gives sections of other words that are good to use for the children. Some students will not be able to know what analyzing means. So then you can use this tool to use other words that will help.

Safe Practices for Life Online (Blog #8)



1.      What are three online social networking sites that are used to form connections and develop relationships online?
-          Facebook
-          Twitter
-          Myspace
2.      Consider the consequences.
-          There are several good and bad consequences for using social networking sites. One good consequence is that you are able to keep up with old friends, new friends, family members, etc. You are able to keep up with their lives, stay informed with what’s going on, and immediately comment on posts if needed. Another good consequence is that social networking sites are now used to post job opportunities since so many people use it. There are also several bad consequences though. One of those is that students starting out on social networking sites are sometimes unsure of what to post. Some students post too much information about themselves which then makes them an easy target for predators. For college students, another big consequence is that of what they post if they’ll find a job or not. If a college student posts too many drunken photos, or has very inappropriate things on their social networking sites, many employers will not hire them. People can also be arrested for what they put on social networking sites. WRAL news report from North Carolina wrote a post on a student who contacted a young lady and threatened to knock out his ex girlfriend’s boyfriend on Facebook. He was then arrested for the post.

3.      Define:
-          Sexting: Using technology to send and receive sexual messages including words and pictures.

-          Cramming:

-          Cookies: A cookie for a computer remembers information for you and saves it in your browser

-          Trojan horse: Programs on your computer that can destroy it. They come in forms of games, disc utilities, and antivirus software.

-          Phishing: These are people that try to steal personal information through online sources. They pretend to be a company and scam you.

-          Spyware: Program that can tract a users personal information including credit card information, passwords, usernames, etc.

-          Rootkit: This is a program that allows regular people to sign on to any computer as the administrator to the computer.

-          Zombie: This is when a computer is hooked up to an internet source that has already been hacked and is then infected with the viruses.

-          Source used for these definitions was http://www.techterms.com/

4.      Why are these screen names poor choices?

-          All of those screen names give a very immature and disgusting connotation about them. If a teacher, employer, or even friend saw things such as Pig and BoogerDude, they would automatically judge negatively about the person.

5.      Why might someone harass those with these screen names?

-          When we go out in public, we judge people on the way they look. When I see a girl that wears clothing that’s very provocative or a male that dresses with guns and marjana leaves on his shirt, you can’t help but judge them negatively. This is the same for screen names such as IMAHottie and suPaFlirt. They give a very naïve, immature, and easy view about the person using the screen name. That is why harassment could happen because of how easy a person makes themselves look.

6.      What info is being revealed through the following screen names?

-          Tom_Evans34 is too much info because it says the name of the person which is too much info to give out. Missy-13 is still bad because even though it doesn’t give her last name, it still gives a name to go off of and the 13 can either be how old she is or that she graduated in 2013 and is about 18 years old. AndyKarateKid is telling a hacker that this persons name is Andy and he does karate. So if the hacker is local, he could stalk any karate center and find Andy. ViolinGurl seems to be okay but not the best because they know she is a girl and likes the violin. She also spelled girl wrong which can give the hacker the impression that she’s dumb or ghetto. Restlinmatch to me seems okay because I’m not able to get any information that’s personal out of it.

7.      Write whether you think these are good or poor choices of user names and why.

-          i8sushi2: bad because it gives me an immature judgement on the person which hackers might also think and use against them
-          soccerstar: good because there is not enough personal information to go off of and stalk
-          puppygirl1234: good because there is not enough personal information to go off of and stalk
-          KeKe1995: bad because it gives the name and possibly year of birth of the girl
-          Bookworm: good because there is not enough personal information to go off of and stalk
-          2BorNot2b: bad because it gives me an immature judgement on the person which hackers might also think and use against them
-          Choco-holoic: bad because it gives me an immature judgement on the person which hackers might also think and use against them.
-          CapitlOfens: bad because it’s pretty much saying this person is a capital offender
-          AmrcanIdol2: good because there is not enough personal information to go off of and stalk
-          BellaIsabella: bad because it gives the name of the person
-          DarkAngel666: bad because this gives a future employer a very negative connotation about the user
-          Karla-Love-1996: bad because we know it gives her first name Karla, but her last name could also possibly be love and then 1996 gives us a possible birth year
-          SimplyMe: good because there is not enough personal information to go off of and stalk
-          gUn4hiRe: bad because I personally would not want to “hiRe” a person with this screen name
-          babyfaceLA: bad because we now know where babyface lives
-          Watup?: bad because personally I think this is a very immature screen name because it gives people a invitation to talk to them. Any stalker could use this against them

8.      Three Different screen names:

-          Ndoarj777
-          Jtayyy_4592
-          Rolyat_572

9.      How likely is it that a password can be cracked?

-          A password can be easily cracked if someone doesn’t follow the guidelines that were given to our class in the packet. But if someone followed the guidelines, it would be unlikely that someone could crack it. My score was 11 which I thought was pretty decent.

10.  Most common reason: Students write their password down where others are able to see it. This is because I know on my computer, I have my passwords written down on the desktop where others can see it and sometimes I even write them on sticky notes and leave them somewhere. I feel like a lot of students do this.

Least common reason: Other students see the password as the student enters it on a keyboard. This is because passwords come up as *** when put in so it would be hard for a student to see what they put. And if they’re sitting that close, it would be easy for the student to look next to them and catch them in the act.