Monday, September 30, 2013
Don't Track Me review (Blog #12)
When I first tried to download Don't track me to my computer, I used firefox and it wouldn't work. I then tried to use it on google chrome and it worked. Once I downloaded it, I went straight to Facebook because that was what I was most curious about. I was thinking since Facebook is such a popular site and so much information is included on it, that trackers would be everywhere. To my surprise, I didn't have many people tracking me. Only three at most. I then tried Google thinking that people would want to know what I search for. Surprisingly I only had two trackers. I'm not sure if I did this right or not since I only had a few trackers follow me but it is nice to know that there is a program out there that lets me know that there are people that follow every step I take on the internet.
Thursday, September 26, 2013
Inspiration comments (Blog #11)
Erika -I like how she started with reviewing the important concepts of the book and the bulletin board idea. She just needed to be a little more confident.
Jackie - Very confident in her concept map. Not much negative.
Mary Katherine - I loved the activities she had planned for her kids.
Jennifer - I like how she uses videos from the library. I like the short story activity and how they get to dress up. This would be a lesson for 4th and 5th graders.
Amanda - I thought the millionaire game was a very smart idea and activity to use. It seems kind of confusing the way the activities are planned. It seems like there's not a good flow.
Jonathan - Like the Pearl Harbor video. I like the statistics he used for the atomic bomb exercise.
Jackie - Very confident in her concept map. Not much negative.
Mary Katherine - I loved the activities she had planned for her kids.
Jennifer - I like how she uses videos from the library. I like the short story activity and how they get to dress up. This would be a lesson for 4th and 5th graders.
Amanda - I thought the millionaire game was a very smart idea and activity to use. It seems kind of confusing the way the activities are planned. It seems like there's not a good flow.
Jonathan - Like the Pearl Harbor video. I like the statistics he used for the atomic bomb exercise.
Tuesday, September 24, 2013
Concept Map - Hurricane Force (Blog #10)
Activites with the book Hurricane Force by Joseph Treaster
CCSS.ELA-Literacy.SL.5.1a Come to discussions prepared,
having read or studied required material; explicitly draw on that preparation
and other information known about the topic to explore ideas under discussion.
I. Have students read important parts of the book.
We will not be able to read the whole book, so I will give
them certain pages to read in class that talk about important events that
happened. This saves us time and also lets me give them the knowledge that they
need to know. Doing this will also help with class discussions.
A. small group discussion
-Important fact
-What they would have done
-How
can they help after a hurricane hits
B. Class discussion on what small groups
talked about
II. Multimedia presentations
The purpose of this activity will be giving kids a clear view of what a
hurricane is like and what they can do. Showing video presentations will give
them a look at what a hurricane can do. If I am teaching up north, this will
definitely help since not many hurricanes hit there.
A. Youtube
presentation on Hurricane Katrina
B. Youtube
presentation on Hurricane Sandy
III. Personal stories from hurricane survivors
http://www.pbs.org/newshour/extra/features/july-dec05/survivors_9-12.html
The purpose of this activity is for students to hear one on one
experiences from deadly hurricanes.
Have kid’s pre write questions they want answered by presenter.
A.
Have students write out questions they want to
ask the presenter before he or she comes so
that he or she has an idea on what to speak about.
B.
Ask any left out questions after
presentation
IV. Have
Kids research a hurricane assigned to them.
http://www.wunderground.com/hurricane/usdeadly.asp
The purpose of this activity is for the students to explore different
types of hurricanes and find one that interests them and research more in depth
about it. The students will be able to find out about why the hurricanes were
so deadly. This will also open their
eyes to what to do when a hurricane approaches.
A. Teach a
lesson on how to research using the library and online resources
B. Have the
groups present their information.
1. Presentation of facts.
a. Posterboard
b. Computer presentation
2. Act out a story.
V. Do
experiment on hurricanes and how wind speed affects wave height.
http://www.discoveryeducation.com/teachers/free-lesson-plans/hurricane.cfm
This activity will be able to give the kids a chance to learn how
hurricane winds affect the amount of wave pressure. It will help the students
have hands on experience about hurricanes.
A.
Have students bring in the necessary materials.
-
9" 13" baking dish
-
Flexible straw
-
Duct tape
-
Water
-
Ruler
B.
Have students work in small groups.
-Having the students work in small groups will give them the opportunity
to enteract with one another and solve problems together.
The Padagogy Wheel V2.0 (Blog #9)
The Padagogy Wheel at first was very confusing to me. After looking at it though I had an idea of how I would use it in my class. For example, if I ever want my kids to Evaluate something, they will go to the evaluate section of the wheel and use the action words that are given to describe what they are evaluating. Then it gives me a list of activities to do to help them evaluate. The wheel is very useful because it gives teachers an organized tool to use in their classrooms so that kids can create, understand, apply, analyze, and evaluate.
Blooms Digital Taxonomy is also a useful tool because it gives key terms that make sense to the teacher but then it gives sections of other words that are good to use for the children. Some students will not be able to know what analyzing means. So then you can use this tool to use other words that will help.
Blooms Digital Taxonomy is also a useful tool because it gives key terms that make sense to the teacher but then it gives sections of other words that are good to use for the children. Some students will not be able to know what analyzing means. So then you can use this tool to use other words that will help.
Safe Practices for Life Online (Blog #8)
1. What
are three online social networking sites that are used to form connections and
develop relationships online?
-
Facebook
-
Twitter
-
Myspace
2. Consider
the consequences.
-
There
are several good and bad consequences for using social networking sites. One
good consequence is that you are able to keep up with old friends, new friends,
family members, etc. You are able to keep up with their lives, stay informed
with what’s going on, and immediately comment on posts if needed. Another good
consequence is that social networking sites are now used to post job
opportunities since so many people use it. There are also several bad
consequences though. One of those is that students starting out on social
networking sites are sometimes unsure of what to post. Some students post too
much information about themselves which then makes them an easy target for
predators. For college students, another big consequence is that of what they
post if they’ll find a job or not. If a college student posts too many drunken
photos, or has very inappropriate things on their social networking sites, many
employers will not hire them. People can also be arrested for what they put on
social networking sites. WRAL news report from North Carolina wrote a post on a
student who contacted a young lady and threatened to knock out his ex
girlfriend’s boyfriend on Facebook. He was then arrested for the post.
3. Define:
-
Sexting:
Using technology to send and receive sexual messages including words and
pictures.
-
Cramming:
-
Cookies:
A cookie for a computer remembers information for you and saves it in your
browser
-
Trojan
horse: Programs on your computer that can destroy it. They come in forms of
games, disc utilities, and antivirus software.
-
Phishing:
These are people that try to steal personal information through online sources. They pretend to be a company and scam you.
-
Spyware:
Program that can tract a users personal information including credit card
information, passwords, usernames, etc.
-
Rootkit:
This is a program that allows regular people to sign on to any computer as the
administrator to the computer.
-
Zombie:
This is when a computer is hooked up to an internet source that has already
been hacked and is then infected with the viruses.
4.
Why
are these screen names poor choices?
-
All
of those screen names give a very immature and disgusting connotation about
them. If a teacher, employer, or even friend saw things such as Pig and
BoogerDude, they would automatically judge negatively about the person.
5.
Why
might someone harass those with these screen names?
-
When
we go out in public, we judge people on the way they look. When I see a girl
that wears clothing that’s very provocative or a male that dresses with guns
and marjana leaves on his shirt, you can’t help but judge them negatively. This
is the same for screen names such as IMAHottie and suPaFlirt. They give a very
naïve, immature, and easy view about the person using the screen name. That is
why harassment could happen because of how easy a person makes themselves look.
6.
What
info is being revealed through the following screen names?
-
Tom_Evans34
is too much info because it says the name of the person which is too much info
to give out. Missy-13 is still bad because even though it doesn’t give her last
name, it still gives a name to go off of and the 13 can either be how old she
is or that she graduated in 2013 and is about 18 years old. AndyKarateKid is
telling a hacker that this persons name is Andy and he does karate. So if the
hacker is local, he could stalk any karate center and find Andy. ViolinGurl
seems to be okay but not the best because they know she is a girl and likes the
violin. She also spelled girl wrong which can give the hacker the impression
that she’s dumb or ghetto. Restlinmatch to me seems okay because I’m not able
to get any information that’s personal out of it.
7.
Write
whether you think these are good or poor choices of user names and why.
-
i8sushi2:
bad because it gives me an immature judgement on the person which hackers might
also think and use against them
-
soccerstar:
good because there is not enough personal information to go off of and stalk
-
puppygirl1234:
good because there is not enough personal information to go off of and stalk
-
KeKe1995:
bad because it gives the name and possibly year of birth of the girl
-
Bookworm:
good because there is not enough personal information to go off of and stalk
-
2BorNot2b:
bad because it gives me an immature judgement on the person which hackers might
also think and use against them
-
Choco-holoic:
bad because it gives me an immature judgement on the person which hackers might
also think and use against them.
-
CapitlOfens:
bad because it’s pretty much saying this person is a capital offender
-
AmrcanIdol2:
good because there is not enough personal information to go off of and stalk
-
BellaIsabella:
bad because it gives the name of the person
-
DarkAngel666:
bad because this gives a future employer a very negative connotation about the
user
-
Karla-Love-1996:
bad because we know it gives her first name Karla, but her last name could also
possibly be love and then 1996 gives us a possible birth year
-
SimplyMe:
good because there is not enough personal information to go off of and stalk
-
gUn4hiRe:
bad because I personally would not want to “hiRe” a person with this screen
name
-
babyfaceLA:
bad because we now know where babyface lives
-
Watup?:
bad because personally I think this is a very immature screen name because it
gives people a invitation to talk to them. Any stalker could use this against
them
8.
Three
Different screen names:
-
Ndoarj777
-
Jtayyy_4592
-
Rolyat_572
9.
How
likely is it that a password can be cracked?
-
A
password can be easily cracked if someone doesn’t follow the guidelines that
were given to our class in the packet. But if someone followed the guidelines,
it would be unlikely that someone could crack it. My score was 11 which I thought was pretty decent.
10.
Most
common reason: Students write their password down where others are able to see
it. This is because I know on my computer, I have my passwords written down on
the desktop where others can see it and sometimes I even write them on sticky
notes and leave them somewhere. I feel like a lot of students do this.
Least common reason: Other students see
the password as the student enters it on a keyboard. This is because passwords
come up as *** when put in so it would be hard for a student to see what they
put. And if they’re sitting that close, it would be easy for the student to
look next to them and catch them in the act.
Subscribe to:
Posts (Atom)