Translate

Wednesday, December 10, 2014

Final Post- Blogfolio: Assignment and Course Reflections


Introduction Video
This assignment required being paired with another student in class. We were told to go outdoors and record a thirty second presentational video of one another through a cellphone. After recording, come indoors and upload the video onto our blog site. I was very nervous about doing this assignment. Mainly, because I’m not sure how to describe myself and secondly because I am camera shy. I will integrate this assignment into my future teaching for the reasons I was first intimidated about this assignment. I believe if students begin early in life describing their strengths then it will come natural introducing themselves. I feel this assignment met the NETS-T standard 1 because the standard clearly says facilitate and inspire students learning and creativity in face-to-face and virtual environments. This assignment clearly challenge my thoughts and thinking process. I had to determine how to extend my speech so it met the required time limit and get over my fear of public speaking. But I did not have to do this alone, I had a partner who helped with the brainstorming of ideas. In my opinion, using digital tools to present is much better than standing in front of a crowd. It eases the tension of nervousness and provide a lot of room for do over. This was my first time uploading a video from a cellphone onto a desktop. It was challenging in the beginning but as I stated earlier I was paired with another student from class. Where I fell short, she surely picked up the slack. I feel learning from one another is motivational and will create long-lasting results.

Concept Mapping
This was a very interesting assignment. Before beginning this assignment, I have never heard of concept maps. So when the instructor introduce the assignment, I felt lost. We used the Inspiration 8 software to create the concept map. Thank goodness this software provided tutorials and templates for referencing. The assignment entail thinking of a subject I can teach upon graduation. I chose sign language, only because I figured no one else will and because I’m a little familiar with the subject. I had to create a visual map of the subject by providing topics and subtopics, graphics, and hyperlinks. The formatting was the same as in MS Word but I encountered a problem changing the hyperlink color from the default color. I also ran into a problem locating my concept map after closing the program, I did not pay attention to where I saved the file. After completion of the map, I had to make a presentation incorporating the concept map created with the Inspiration software. This assignment was engaging and fun and it equipped me with another presentational tool I can use to engage the class I plan to teach. I feel this assignment meets the NETS-T standards 1, 2, and 3. Mainly because, it inspire students learning and creativity, incorporate digital tools to maximize content learning, and used as a collaboration tool for students and peers to facilitate learning.

Creating a Teacher’s Web Page
I have had previous experiences creating web pages in other IT classes. So this was a very relaxed and pleasurable project. In all of the IT classes, the Web site project came from a different source. So I am fully equipped with an abundance of experience in a number of Web-authoring programs. This assignment involved creating a Web page for a future classroom using Google Site Creator. The only difference in this project versus the others is that I had to include a calendar from the Google calendar app and include a YouTube video. I do not recall any weaknesses preparing and completing this project. The Web site included four Web pages at the least, a home page, course information page, personal page, and Web resource page. This project required me to do a lot of brainstorming, researching, and being creative. My topic for this project was Computer Discovery. I had to think of a unique way to create a website for students about the course, NETS –T standard 1. I was able to research the required course materials and class rules on the Internet. And as for my personal page, it was set up in a resume format, very creatively. I do believe I will use this resource in my future teaching career, as a way for students and parents to keep track of what is going on in class. Also, as a way students and parents to receive additional help on a particular topic, NETS-T standard 3. I feel this assignment met the NETS-T standards 1, 2, 3, 4, and 5. NETS-T standard 2 states incorporate digital tool and resources to promote students learning and develop technology-enriched learning environments that enable all students to pursue their individual curiosities and become active participants in setting their own educational goals. As a result, this will inspire professional growth, a NETS-T 5 standard. The Computer Discovery resource page should satisfy NETS-T 4 standards.

My Movie Story
This is another assignment I have had previous experience with. In this class, we had to use Windows Movie Maker to create a movie using no less than ten personal images. From the beginning I was distraught about what my movie was going to be about. I have a lot of family pictures and I did not want to make a movie of my life. So I looked over my photos and decided to make a movie of my Bahamas trip. I did encounter a problem when attempting to upload this project on my blog. The problem was simple but it took a day to figure out. I saved the project with the wrong settings so when I attempted to upload, I kept getting a message saying the file was too large. To fix this problem, I deleted a few pictures and shorten the length of each slide numerous of times until I ended with a movie that did not fully tell a story. The next day when I came back to the project, I realized that my saving settings were wrong. So I added all the slides back to my movie to successfully tell my story. Since I am majoring in technology education, I feel I will come across this program in my future lesson plan as a teacher. If not, this will be a great resource to utilize for Black History month. I feel this assignment met the NETS-T standard 2a because this digital tool promote student learning and creativity.

Turnitin (Social, Ethical, Legal, and Human Issues)
This was a two part assignment, where I had to upload a copied and revised version to Turnitin.com. I was first told to copy text from articles about a particular subject and paste onto my document. Once the document is complete, submit it to Turnitin.com and view the results. My score on the copied version was ninety two percent plagiarism. After receiving my score, I was told to revise the document in my own words and resubmit to Turnitin for an originality score. This time my report reported zero percent plagiarism. Turnitin is a digital application for evaluating student work and providing feedback. It is a good tool to teach students about copying and pasting. This application show the student the results of copying information directly from other open sources and pasting directly into your document. I am sure I will share this experience with my future class so they will know the results of copying and pasting. I feel this assignment met the NETS-T standard three and four. Mainly, because teachers transfer the knowledge of plagiarism in a digital society by using digital tools and resources. In addition, Turnitin combined with teaching instructions will reinforce a student’s respect for copyright, intellectual property, and the appropriate documentation of sources

WebTools
I believe this was my favorite assignment of all because I feel I learned so much. This assignment was entertaining, educational, and enlightening. This assignment required me to create an online rubric, quiz, and bookmarks. To create the online rubric, we visited RubiStar. RubiStar is a tool to help the teacher create rubrics from existing rubrics in a short amount of time. This will be a great asset for me as a future educator because of the ease and freedom to customize an existing rubric very quickly. I also will like to allow the students in class to participate in making a rubric as a class assignment to evaluate their own work. The BigBus Testmaker is a great educational tool used to reinforce the knowledge learned in class. This part of the assignment required me to create a ten question online quiz for future students. TrackStar.com required a little more of my time because of the researching process. First, the TrackStar tool is new to me, so I had to read a tutorial to find out how to use this site. Next, I had to research the resources I was going to place in the Track. I found five fun educational related sites, provided annotations and hyperlinks, so as to connect my students to additional online help. I do feel as a future educator I will integrate this tool in the studying environment. I feel the WebTools assignment meet both the NETS-T standards two and three. Mainly, because we designed and developed digital-age learning experiences and assessments and modeled digital-age work and learning.  

Google Groups
This assignment was a nice one. It forced me to become aware of and get familiar with most of the features in my Google account. This assignment required me to use the group functions in Google to stimulate dialog between members of the group. My group consisted of three other students from class. We had to create documents, share ideas, and post and answer each other questions. I enjoyed participating in this assignment and I was unaware of this particular feature in Google which allows one to collaborate and edit another’s work from anywhere. I am pretty sure this is a valuable tool to integrate into classroom projects. This assignment united students to come together to construct ideas. I feel this assignment met the NETS-T standard 1a because we were able to promote, support, and model creative and innovative thinking and inventiveness. I also feel this assignment met the 2b standard as well because we developed a technology-enriched learning environment in Google that enabled all members to pursue their individual curiosities and become active participants in setting their own educational goals, managing their own learning, and assessing their own progress. In addition, this assignment met the 3b standard because we collaborated with one another using digital tools and resources.

Course Reflection
Overall I have learned that technology is a valuable tool to stimulate learning. I was exposed to and used a lot of digital tools and resources in this class. We listen to a number of educational speakers via YouTube and read numerous educational articles relating to technology. In these speeches and readings, I learned that students have different learning abilities and respond better to encouragement rather than criticism. I learned a lot of digital acronyms with “BYOD,” bring your own device sticking with me the most. This class has had a huge impact on my education and how I interact with technology. I respond more positive to digital tools because of this class and now I feel empowered. I feel confident about going into a technology classroom to educate today’s learners because I am equipped with an array of digital knowledge and can operate a lot of devices. I am now aware of all the free educational tools available to teachers, parents, and students. I can say that I can and will create a classroom website and if possible Skype with other classes or educators to promote student learning. My area of strength will be all the technology knowledge I have gained in class. I know how to create and manage a blog and a website. I used Google Drive for file sharing, cloud storage, and collaborative editing. Dropbox was another cloud storage device I used and feel comfortable with. My area of weakness in my opinion will be public speaking and communication skills. I felt like I stumbled with my words when speaking in front of class. I plan on reading a lot of books and watching more public speaking videos for the do’s and don’ts of public speaking over summer break. On the other hand, I will more than likely be teaching a technology class since I am majoring in technology education. I do feel as if I can incorporate cellphones in the lesson plan somewhere since children carry them all the time. One thing the cellphone will be useful for is to connect to the classroom website or blog that I plan on creating. I feel blogs in education is beneficial to both the student and teacher based on convenience and accessibility. They can be viewed and worked on from anywhere with an Internet-enabled device. Blogs are easy to use and motivational. It is an excellent opportunity for students to show off their work and writings.

Monday, December 8, 2014

#17 Group Project


1. Facebook, Twitter, and Instagram are three online social networking sites used to form connecting.

2. An article from Panama City’s News Herald addressed a student who was arrested for posting that he was going to bring a gun and shoot down his school. Immediately he was reported and police searched his house for weapons, but he claimed he never intended to follow through with it, rather he was just mad.  http://www.newsherald.com/news/crime-public-safety/student-arrested-for-threatening-facebook-post-1.395496
The website, Today Money published an article about a student who tweeted that he was going to place a bomb in a locker at school. Even though he claimed it was a joke, he was arrested and charged with a felony. http://www.today.com/money/students-arrested-expelled-making-violent-twitter-threats-790755

WSVN 
News shared an article about a few students throughout the Fort Lauderdale area making threat on social networking. Specifically, it mentions a 15 year posting a threat on Instagram. The police department stated that they were not taking these threats lightly, and will result in deep consequences. http://www.wsvn.com/story/26880037/broward-teen-arrested-after-making-bomb-threats

3. Define in your own words:
·         Sexting: when someone sends a sexual picture or message. http://familyinternet.about.com/od/computingsafetyprivacy/a/sexting_what.htm
·         Cramming: When phone charges are added to your phone bill. http://www.fcc.gov/guides/cramming-unauthorized-misleading-or-deceptive-charges-placed-your-telephone-bill
·         Cookies: Small text files that are located in browser directories. http://www.allaboutcookies.org
·         Trojan Horse: A program that is designed to break into a computer system. http://usa.kaspersky.com/internet-security-center/threats/trojans
·         Phishing: Defrauding an online account holder through financial information by posing as a legitimate company. http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx
·         Spyware: Software that allows you to get information transmitted from another computer. http://www.microsoft.com/security/pc-security/spyware-whatis.aspx
·         Rootkit: A set of software tools that allow an unauthorized user to get into a computer. http://searchmidmarketsecurity.techtarget.com/definition/rootkit
·         Zombie: A computer that has been hacked. http://computer.howstuffworks.com/zombie-computer.htm
4. Trashmouth, Ihaveonepairpants, boogerdude, and pig are not good screen name choices because they show that you are slob and do not like to take care of yourself. I do not know why having an actual student screen name would be a bad choice for a screen name.

 5. It is important to be cautious on what screen name one chooses. I have listed reasons as to why the following screen names might be made fun of. 

InYoFace- This screen name insinuates that this person is obnoxious and/or loud.
Badboy2U- This screen name is an open door for jokes. It might come across as overly-confident but is probably just a front or cover up for insecurities.
Lookin4Luv- This person might get made fun of for being desperate.
IMAHottie- This person might think that they are attractive, but others might be quick to say otherwise. A bully would try to tear down their confidence.
FatMama- This person could be made fun of for being overweight.
suPaFlirt- This person would probably get called derogatory names for being too flirty.


6. It is important to not give out personal information in screen names. I have listed reasons as to why the following screen names are too revealing.

Tom_Evans34- This screen name gives a first and last name, as well as a possible sports number. It would be easy to identify who this user is.
Missy-13- This screen name gives what might be a first name and age. This is still too much information given. The wrong person could identify you with this little bit of information.
AndyKarateKid- This name tells us that this is someone named Andy who does Karate. This is still too much exposed information.
ViolinGurl- This name suggests that this is a girl that plays the violin.
restlinmatch- This name insinuates that the user is a wrestler.

7. I will discuss the safety of each screen name listed below.


i8sushi2- I think that this name is a little strange. I guess this would be a safe screen name.
Soccerstar- I think that this name would be safe to have.
Puppygirl1234- Again, this is a weird name, but I think it is safe since it does not give out any information.
KeKe1995- This is not a safe name because it gives a first name and birth year.
Bookworm- This is a safe screen name.
2BorNot2b- I honestly don't know what this says, so I guess it is safe.
Choco-holic- This screen name might get made fun of for admitting to liking chocolate but I think it is safe because it does not give out personal information.
CapitalOfens- Is this a criminal's screen name? This one might not be safe.
AmericanIdol2- I think this one is safe and would be free of bullying.
BellaIsabella- Not safe. This is someone's name.
DarkAngel666- Not safe. Plus this screen name weirds me out.
Karla-Love-1996- Not safe. This has someones name and birth year. Too much information.
SimpyMe- Safe. But this might be bullied since there is a typo. Maybe its supposed to be SimplyMe?
gUn4hiRe- NOT SAFE. This sounds like a hit man's screen name.
babyfaceLA- Is this the R&B singer's screen name?
Watup?- Safe name but it's lame. This gives no personal information.
8.
Emc2
Ollie112
Ecal2233
 
9. Lisa
It is highly likely that a password can be cracked.
Poor passwords are the first to be cracked by hackers. A password should not include the name of a family member, pet, date of birth or a random word that can be found in the dictionary because hackers will use this information first when trying to hack your password. Passwords should be strong and at least eight characters long. A strong password is a password that contain both numbers and letters, non-number, non-letter characters, such as “!”, a mixture of upper and lowercase letters, or a random set of numbers. A date of a well-known event such as 9-11 is a weak password and easy to guess. 123 or your name spelled backwards is easy to figure out. Do not hide passwords near your computer, it can be easily found and used by an unwanted guest. Hackers will try your telephone number, zip code, or area code when trying to get into your account. And never ever share your password with a friend.   




As for me, my password is at least eight characters long, contain upper and lower case letters, numbers, punctuation marks and does not repeat. My password is not and have never been information about me, my family members or the family pet. I am not worried about dictionary attacks. I never shared a password with a family member or friend and I do not have my password posted anywhere near the computer I use.
Lauren
Passwords can be cracked easily if they are not well thought through. 
I thought that my password would be safe, since it is completely random (so I thought) but according to question #9, it does not appear to be as safe as I thought. I received a score of 1. I have shared it with a friend, but it is not written down anywhere near my computer. I do think that I would lose major points (probably be in the negative) if it deducted points for using the same password for multiple sites. 
Taylor
no
     no

     yes  -3

    yes +3
     yes +2
   yes +2
   no
     yes +3
   no 
   yes -2
     no

   no
.    no

     no

   yes +2

      yes -3

TTOTAL: 5
I believe that is very likely a password can be cracked. Taking the correct security measures is very important to keep a password safe. After taking this survey, I feel like I might need to modify my password to make it stronger. 
 
Elizabeth
a- no
b- no
c- no
d- +2
e- +2
f- +2
g- no
h- +3
i-no
j- -2
k- no
l- no
m-no
n- no
o-+2
p- -3  
10. The most and least common reason that students’ online accounts are broken into each year are listed below:
The most-common reason that students’ online accounts are broken into each year is that students give their password to their friends, who then decide to use it or give it to others who use it.
The least common reason that students’ online accounts are broken into each year is a password-cracking program.
11. My thoughts and feelings about the subject and video, “malware analysis: drive-by download." I had an “OMG” moment watching this video. I am so excited that I came across such an enlightening message. This video informs the public of websites that secretly install malicious computer software onto your computer once you open their page. That’s right, it download viruses on your computer without your permission or without you even seeing it or knowing, all while visiting the page. This malicious program also uses your computer to send malware to other computers.

I am so outraged that attackers are deliberately installing viruses onto other’s technological devices. I feel it is evil, deceptive, and unethical to infect and kill someone’s device. Also, it’s alarming to know that you no longer have to click to accept a download or install a software update in order to become infected. Furthermore, it’s a disgrace you cannot trust all websites or certain ads that is displayed on legitimate sites. Therefore, I highly advise everyone who use technology to watch and support this video.
12. I visited www.lookstoogoodtobetrue.com/tests.aspx and took three of the eight tests to find out if I am a potential victim of fraud. The results are listed below:
Are You Protecting your Identity? I scored in the low to medium level so I know I need to make some improvement in protecting my identity to lower the score but I am doing okay at the moment according to the test.
Authentic or Counterfeit? My risk level on this test was below low to none. I guess it’s because I have a problem with trust. My motto is trust no one and look out for thine self when it comes to money.
Are You an Unwitting Accomplice in Crime? My risk level was low on this test. Again in life, I use caution and I’m leery about money in general when I think it involves a crimeAlso, I don’t visit chat rooms or chat online. What moved me into the low level is that I answered yes to looking for a work at home job.

  13.  Could not get to the website, I will look at it in class tomorrow.
 Elizabeth Calamari- #1,2,8
Taylor Nace- #3,4,13
Lisa Marshall- #10,11,12
Lauren Byrd- #5,6,7
 

Tuesday, December 2, 2014

#16 Internet Information

1. From Safe Practices for Life Online: A Guide for Middle and High School (2008)- D. Fodeman & M. Monroe
a. Lookstoogoodtobetrue.com risk tests
b. Chapter 2 Protecting Your Privacy Online  
     i. Pop-ups and Banner Ads- forms of online advertising
     ii. Spyware- is software that displays advertisements, tracks your personal or sensitive information, and make changes to your computer, generally without your consent.
     iii. Zombies and Botnets- is a number of Internet computers that, although their owners are unaware of it, have been set up to forward spam or viruses to other computers on the Internet.
     iv. Cookies-  is information that a Web site puts on your hard disk so that it can remember something about you at a later time
     v. Drive-by Downloads-  is a program that is automatically downloaded to your computer, often without your consent or even your knowledge.
     vi. Cramming- is the addition of unexpected or unauthorized charges to a bill for landline or mobile telephone service.
     vii. Trojan Horse-  is a piece of software that looks like it is doing what the user thought, but in reality it is malware designed to infect the user's PC.

2. From Transforming Learning with New Technologies (2011)-R. Malloy, R. E. Verock-O'Loughlin, S. A. Edwards, & B. P. Woolf
a. Take Pew Internet & American Life Project "What Kind of Tech User Are You?" quiz
My results after taking the test: You scored better than 81.8% of the public, below 9.9% and the same as 8.3%.
b. Uniform Resource Locator (URL) aka Web Address - What is the purpose of the following URL designations?
     i. .com- Part of the Internet address of many companies and organizations. It indicates that the site             is commercial
     ii. .org- Part of the Internet address of many organizations usually charitable organizations
     iii. .gov- Part of the Internet address of many government agencies
     iv. .net- Indicates this is a technology site
     v. .edu- Part of the Internet address of many academics. Indicate this site is educational
     vi. .mil- Part of the Internet address of many military organizations

e. Questions
     i. What is the meaning of information literacy for teachers and students?  It is the set of skills needed to find, retrieve, analyze, and use information.
     ii. What are search engines and how do they work? A method used for searching for information. It  searches documents, especially on the World Wide Web, for a specified word or words and provides a list of documents in which they are found.
     iii. What pieces of information do students need to know about Internet searching? That everything on the internet is not accurate, valid, and useful.
     iv. How can teachers and students thoughtfully evaluate online information resources, including the online encyclopedia Wikipedia? Question everything you read by comparing and contrasting with other work and information for accuracy and validity. Also you can look at the address and check the domain used.
     v. How can teachers respond to problems of plagiarism when students use online sources? Telling the students to put the information in their own words and cite where the bit of information comes from.

Sources:
dictionary.com
microsoft.com
searchsecurity.techtarget.com


Tuesday, November 25, 2014

#15 Webtools

Vocabulary Test
Vocabulary Test
  1. What is the part of the computer that you type information?
 
  2. A network that covers a large area
 
  3. Another name for information
 
  4. What are the homerow keys?
 
  5. A screen used to view typed information on a computer?
 
  6. The computers in lab are an example of
 
  7. All the following are ouput devices except
 
  8. What is the name of the smallest unit of information a computer can understand?
 
  9. All the following are input devices except
 
10. A handheld device that lets you point to and select items on the monitor screen
 


Created using Testmaker fromThe Big Bus - www.thebigbus.com

The link to the online rubric I created in RubiStar:

Below is the link to my interactive, online lesson referred to as a Track. The Track includes activities from five educational-related sites.

Wednesday, November 12, 2014

#14 Guide to Creating Tech-Friendly Classroom Management Strategies Summary and Opinion


This article is about showing pre-internet era teachers and post- internet era teachers how to effectively integrate technology in the classroom. This article noted that today’s kids are using technological devices everyday mostly for fun. And will like to show kids as well as educators that these technological devices can also be used for learning purposes. The author of this article list a number of strategies educators can take to implement these technological devices as learning tools in and outside the classroom. Strategy number one is planning, you just can’t put a student in front of a computer and say go. You must know the technological device and constraints yourself as an educator. Moreover, make sure the student has everything needed to complete an online assignment, also give the student an objective or goal prior to the start of each lesson. This article also suggest there should be a balance between “tech time” and other modes of learning. Do not be guilty of computer overload because at this level it will distract from the learning process. The author feels learning is more effective when it is hands on and teachers should provide a time for unstructured computer exploration.

My plan as a future educator is to teach a computer-based class. I feel I will have students from one to one and a half hours at a time each day. At this present moment I am learning about all the technological tools and gadgets that can be implemented into the classroom. Because of the class I will be teaching I feel I will have the time to implement the above suggestions.

Monday, November 10, 2014

#13 Summary and Opinion of "Why so many kids can’t sit still in school today"


This article gives a logical explanation as to why kids can’t sit still in school today as compared to yesterday. Today, many kids during home hours are indoors sitting more than they are outdoors playing. And schools have shortened the length of time of recess due to increasing educational demands. The author of the article explains, kids are not burning off enough energy in order to sit still in class for the length of time schools are demanding. Kids are fidgeting during class lectures because their body needs to move more. Because of the fidgeting or disruptions in class more schools want to test and diagnosed kids with Attention Deficit and Hyperactivity Disorder (ADHD). The real issue at hand is that some children are being falsely diagnosed. This article feels to alleviate this problem children should be encouraged to play outdoors and schools should extend recess time.

I agree with the author of this article that this could be a reason as to why kids are fidgeting or disruptive in class. I am aware that yesterday technology was not as popular as it is today. But since the increase in technology so many children are indoors. Yesterday, more kids were outdoors playing after school hours and from sun up to sun down in the summer. Dealing with this issue is what frightens me as a future educator. So I have decided to provide positive reinforcement and redirection. Explain to the student that this behavior bothers other students and if the student needs a movement break he or she can have it. This will be where students can stand up or walk around a minute. Also I will incorporate some physical activity like handing out papers.

#12 6 most watched videos on 21st education


Classrooms Of Tomorrow
So many students have their own personal cellular phones and so many bring them to school. This video is showing how educators are incorporating students’ cellular phones as well as other technological devices such as IPads in the classroom to improve the learning process. This video proves technology is more visually appealing, engaging and interactive than textbooks. It also shows that technology eliminates the need for textbooks.

The Voice of The Active Learner
This video discusses the upcoming changes in education as related to technology. It explains how children are growing up and using technology today. The internet for instance, is an information center with tons of information. The video states with technology you will become a lifelong learner. I do agree it is more interesting learning about new information through technology but one will have to decipher between what is fact and fiction. This video assumes that with technology one learns right away and all the time. And because of this the traditional brick and mortar buildings of schools will become obsolete by the year 2019. I am not so sure about the school buildings but evidence clearly shows how technology has eliminated the need for libraries.

The Future Starts Now
This video discusses education and technology in Norway. It provides a solution to retention of students in education. ICT which stands for Information and communication technology is the key according to this article. It states that today’s students are growing up with gadgets such as IPads, laptops, and smart mobile phones. So why not incorporate these gadgets in education. This video states ICT in education improve learning and motivate students. For example, a math class which uses computers to visualize and simulate formulas to students will make advance math concepts easier to understand. I as a student totally agree with incorporating ICT in education. I also feel the use of technology in education will make the lessons more enjoyable, grasp a student’s interest, and retain a student’s attention. I for one feel as if I learn better and hold information longer if I interact with it and see it visually.

Designing Schools for 21st Century Learning
This video is narrated by an architect with the option of redesigning the traditional school building. He states the characteristics of learning is security and a stimulus rich environment. His design is an open floor plan with wall to wall windows. In my opinion, the more windows available will create a distraction in class. I feel students will pay more attention to what is going on outdoors. Also, with an open floor plan and numerous windows throughout, I feel will make the school somewhat of a safety hazard.

Tools and Resources for The 21st Century Education
This video portrays the available educational tools and resources needed for 21st century educators and learners. Video resources such as YouTube and Ted Talk can enhance a student’s learning ability. Presentation tools such as Prezi and SlideShare is beneficial to both student and educator today. I must attest that interactive resources such as Poll Everywhere is a great tool to incorporate in class just to see where everyone stands on an issue and what makes this tool so wonderful is your statements are anonymous. This video was very colorful and is my favorite thus far and I feel the author of this video was very accurate.

A Vision of 21st Century Teaching
From the beginning I disliked this video because the narrator was so hard to understand and the video was too busy. But when the characters in the video started using cue cards to deliver the message I got a better understanding of what was going on. We live in a world of technology and it is an amazing tool to incorporate in class to increase learning. Personally, technology can be motivating, engaging, interest driven, and informative and this is why some educators such as the ones in the video incorporate it into their lesson plan.