Translate

Wednesday, December 10, 2014

Final Post- Blogfolio: Assignment and Course Reflections


Introduction Video
This assignment required being paired with another student in class. We were told to go outdoors and record a thirty second presentational video of one another through a cellphone. After recording, come indoors and upload the video onto our blog site. I was very nervous about doing this assignment. Mainly, because I’m not sure how to describe myself and secondly because I am camera shy. I will integrate this assignment into my future teaching for the reasons I was first intimidated about this assignment. I believe if students begin early in life describing their strengths then it will come natural introducing themselves. I feel this assignment met the NETS-T standard 1 because the standard clearly says facilitate and inspire students learning and creativity in face-to-face and virtual environments. This assignment clearly challenge my thoughts and thinking process. I had to determine how to extend my speech so it met the required time limit and get over my fear of public speaking. But I did not have to do this alone, I had a partner who helped with the brainstorming of ideas. In my opinion, using digital tools to present is much better than standing in front of a crowd. It eases the tension of nervousness and provide a lot of room for do over. This was my first time uploading a video from a cellphone onto a desktop. It was challenging in the beginning but as I stated earlier I was paired with another student from class. Where I fell short, she surely picked up the slack. I feel learning from one another is motivational and will create long-lasting results.

Concept Mapping
This was a very interesting assignment. Before beginning this assignment, I have never heard of concept maps. So when the instructor introduce the assignment, I felt lost. We used the Inspiration 8 software to create the concept map. Thank goodness this software provided tutorials and templates for referencing. The assignment entail thinking of a subject I can teach upon graduation. I chose sign language, only because I figured no one else will and because I’m a little familiar with the subject. I had to create a visual map of the subject by providing topics and subtopics, graphics, and hyperlinks. The formatting was the same as in MS Word but I encountered a problem changing the hyperlink color from the default color. I also ran into a problem locating my concept map after closing the program, I did not pay attention to where I saved the file. After completion of the map, I had to make a presentation incorporating the concept map created with the Inspiration software. This assignment was engaging and fun and it equipped me with another presentational tool I can use to engage the class I plan to teach. I feel this assignment meets the NETS-T standards 1, 2, and 3. Mainly because, it inspire students learning and creativity, incorporate digital tools to maximize content learning, and used as a collaboration tool for students and peers to facilitate learning.

Creating a Teacher’s Web Page
I have had previous experiences creating web pages in other IT classes. So this was a very relaxed and pleasurable project. In all of the IT classes, the Web site project came from a different source. So I am fully equipped with an abundance of experience in a number of Web-authoring programs. This assignment involved creating a Web page for a future classroom using Google Site Creator. The only difference in this project versus the others is that I had to include a calendar from the Google calendar app and include a YouTube video. I do not recall any weaknesses preparing and completing this project. The Web site included four Web pages at the least, a home page, course information page, personal page, and Web resource page. This project required me to do a lot of brainstorming, researching, and being creative. My topic for this project was Computer Discovery. I had to think of a unique way to create a website for students about the course, NETS –T standard 1. I was able to research the required course materials and class rules on the Internet. And as for my personal page, it was set up in a resume format, very creatively. I do believe I will use this resource in my future teaching career, as a way for students and parents to keep track of what is going on in class. Also, as a way students and parents to receive additional help on a particular topic, NETS-T standard 3. I feel this assignment met the NETS-T standards 1, 2, 3, 4, and 5. NETS-T standard 2 states incorporate digital tool and resources to promote students learning and develop technology-enriched learning environments that enable all students to pursue their individual curiosities and become active participants in setting their own educational goals. As a result, this will inspire professional growth, a NETS-T 5 standard. The Computer Discovery resource page should satisfy NETS-T 4 standards.

My Movie Story
This is another assignment I have had previous experience with. In this class, we had to use Windows Movie Maker to create a movie using no less than ten personal images. From the beginning I was distraught about what my movie was going to be about. I have a lot of family pictures and I did not want to make a movie of my life. So I looked over my photos and decided to make a movie of my Bahamas trip. I did encounter a problem when attempting to upload this project on my blog. The problem was simple but it took a day to figure out. I saved the project with the wrong settings so when I attempted to upload, I kept getting a message saying the file was too large. To fix this problem, I deleted a few pictures and shorten the length of each slide numerous of times until I ended with a movie that did not fully tell a story. The next day when I came back to the project, I realized that my saving settings were wrong. So I added all the slides back to my movie to successfully tell my story. Since I am majoring in technology education, I feel I will come across this program in my future lesson plan as a teacher. If not, this will be a great resource to utilize for Black History month. I feel this assignment met the NETS-T standard 2a because this digital tool promote student learning and creativity.

Turnitin (Social, Ethical, Legal, and Human Issues)
This was a two part assignment, where I had to upload a copied and revised version to Turnitin.com. I was first told to copy text from articles about a particular subject and paste onto my document. Once the document is complete, submit it to Turnitin.com and view the results. My score on the copied version was ninety two percent plagiarism. After receiving my score, I was told to revise the document in my own words and resubmit to Turnitin for an originality score. This time my report reported zero percent plagiarism. Turnitin is a digital application for evaluating student work and providing feedback. It is a good tool to teach students about copying and pasting. This application show the student the results of copying information directly from other open sources and pasting directly into your document. I am sure I will share this experience with my future class so they will know the results of copying and pasting. I feel this assignment met the NETS-T standard three and four. Mainly, because teachers transfer the knowledge of plagiarism in a digital society by using digital tools and resources. In addition, Turnitin combined with teaching instructions will reinforce a student’s respect for copyright, intellectual property, and the appropriate documentation of sources

WebTools
I believe this was my favorite assignment of all because I feel I learned so much. This assignment was entertaining, educational, and enlightening. This assignment required me to create an online rubric, quiz, and bookmarks. To create the online rubric, we visited RubiStar. RubiStar is a tool to help the teacher create rubrics from existing rubrics in a short amount of time. This will be a great asset for me as a future educator because of the ease and freedom to customize an existing rubric very quickly. I also will like to allow the students in class to participate in making a rubric as a class assignment to evaluate their own work. The BigBus Testmaker is a great educational tool used to reinforce the knowledge learned in class. This part of the assignment required me to create a ten question online quiz for future students. TrackStar.com required a little more of my time because of the researching process. First, the TrackStar tool is new to me, so I had to read a tutorial to find out how to use this site. Next, I had to research the resources I was going to place in the Track. I found five fun educational related sites, provided annotations and hyperlinks, so as to connect my students to additional online help. I do feel as a future educator I will integrate this tool in the studying environment. I feel the WebTools assignment meet both the NETS-T standards two and three. Mainly, because we designed and developed digital-age learning experiences and assessments and modeled digital-age work and learning.  

Google Groups
This assignment was a nice one. It forced me to become aware of and get familiar with most of the features in my Google account. This assignment required me to use the group functions in Google to stimulate dialog between members of the group. My group consisted of three other students from class. We had to create documents, share ideas, and post and answer each other questions. I enjoyed participating in this assignment and I was unaware of this particular feature in Google which allows one to collaborate and edit another’s work from anywhere. I am pretty sure this is a valuable tool to integrate into classroom projects. This assignment united students to come together to construct ideas. I feel this assignment met the NETS-T standard 1a because we were able to promote, support, and model creative and innovative thinking and inventiveness. I also feel this assignment met the 2b standard as well because we developed a technology-enriched learning environment in Google that enabled all members to pursue their individual curiosities and become active participants in setting their own educational goals, managing their own learning, and assessing their own progress. In addition, this assignment met the 3b standard because we collaborated with one another using digital tools and resources.

Course Reflection
Overall I have learned that technology is a valuable tool to stimulate learning. I was exposed to and used a lot of digital tools and resources in this class. We listen to a number of educational speakers via YouTube and read numerous educational articles relating to technology. In these speeches and readings, I learned that students have different learning abilities and respond better to encouragement rather than criticism. I learned a lot of digital acronyms with “BYOD,” bring your own device sticking with me the most. This class has had a huge impact on my education and how I interact with technology. I respond more positive to digital tools because of this class and now I feel empowered. I feel confident about going into a technology classroom to educate today’s learners because I am equipped with an array of digital knowledge and can operate a lot of devices. I am now aware of all the free educational tools available to teachers, parents, and students. I can say that I can and will create a classroom website and if possible Skype with other classes or educators to promote student learning. My area of strength will be all the technology knowledge I have gained in class. I know how to create and manage a blog and a website. I used Google Drive for file sharing, cloud storage, and collaborative editing. Dropbox was another cloud storage device I used and feel comfortable with. My area of weakness in my opinion will be public speaking and communication skills. I felt like I stumbled with my words when speaking in front of class. I plan on reading a lot of books and watching more public speaking videos for the do’s and don’ts of public speaking over summer break. On the other hand, I will more than likely be teaching a technology class since I am majoring in technology education. I do feel as if I can incorporate cellphones in the lesson plan somewhere since children carry them all the time. One thing the cellphone will be useful for is to connect to the classroom website or blog that I plan on creating. I feel blogs in education is beneficial to both the student and teacher based on convenience and accessibility. They can be viewed and worked on from anywhere with an Internet-enabled device. Blogs are easy to use and motivational. It is an excellent opportunity for students to show off their work and writings.

Monday, December 8, 2014

#17 Group Project


1. Facebook, Twitter, and Instagram are three online social networking sites used to form connecting.

2. An article from Panama City’s News Herald addressed a student who was arrested for posting that he was going to bring a gun and shoot down his school. Immediately he was reported and police searched his house for weapons, but he claimed he never intended to follow through with it, rather he was just mad.  http://www.newsherald.com/news/crime-public-safety/student-arrested-for-threatening-facebook-post-1.395496
The website, Today Money published an article about a student who tweeted that he was going to place a bomb in a locker at school. Even though he claimed it was a joke, he was arrested and charged with a felony. http://www.today.com/money/students-arrested-expelled-making-violent-twitter-threats-790755

WSVN 
News shared an article about a few students throughout the Fort Lauderdale area making threat on social networking. Specifically, it mentions a 15 year posting a threat on Instagram. The police department stated that they were not taking these threats lightly, and will result in deep consequences. http://www.wsvn.com/story/26880037/broward-teen-arrested-after-making-bomb-threats

3. Define in your own words:
·         Sexting: when someone sends a sexual picture or message. http://familyinternet.about.com/od/computingsafetyprivacy/a/sexting_what.htm
·         Cramming: When phone charges are added to your phone bill. http://www.fcc.gov/guides/cramming-unauthorized-misleading-or-deceptive-charges-placed-your-telephone-bill
·         Cookies: Small text files that are located in browser directories. http://www.allaboutcookies.org
·         Trojan Horse: A program that is designed to break into a computer system. http://usa.kaspersky.com/internet-security-center/threats/trojans
·         Phishing: Defrauding an online account holder through financial information by posing as a legitimate company. http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx
·         Spyware: Software that allows you to get information transmitted from another computer. http://www.microsoft.com/security/pc-security/spyware-whatis.aspx
·         Rootkit: A set of software tools that allow an unauthorized user to get into a computer. http://searchmidmarketsecurity.techtarget.com/definition/rootkit
·         Zombie: A computer that has been hacked. http://computer.howstuffworks.com/zombie-computer.htm
4. Trashmouth, Ihaveonepairpants, boogerdude, and pig are not good screen name choices because they show that you are slob and do not like to take care of yourself. I do not know why having an actual student screen name would be a bad choice for a screen name.

 5. It is important to be cautious on what screen name one chooses. I have listed reasons as to why the following screen names might be made fun of. 

InYoFace- This screen name insinuates that this person is obnoxious and/or loud.
Badboy2U- This screen name is an open door for jokes. It might come across as overly-confident but is probably just a front or cover up for insecurities.
Lookin4Luv- This person might get made fun of for being desperate.
IMAHottie- This person might think that they are attractive, but others might be quick to say otherwise. A bully would try to tear down their confidence.
FatMama- This person could be made fun of for being overweight.
suPaFlirt- This person would probably get called derogatory names for being too flirty.


6. It is important to not give out personal information in screen names. I have listed reasons as to why the following screen names are too revealing.

Tom_Evans34- This screen name gives a first and last name, as well as a possible sports number. It would be easy to identify who this user is.
Missy-13- This screen name gives what might be a first name and age. This is still too much information given. The wrong person could identify you with this little bit of information.
AndyKarateKid- This name tells us that this is someone named Andy who does Karate. This is still too much exposed information.
ViolinGurl- This name suggests that this is a girl that plays the violin.
restlinmatch- This name insinuates that the user is a wrestler.

7. I will discuss the safety of each screen name listed below.


i8sushi2- I think that this name is a little strange. I guess this would be a safe screen name.
Soccerstar- I think that this name would be safe to have.
Puppygirl1234- Again, this is a weird name, but I think it is safe since it does not give out any information.
KeKe1995- This is not a safe name because it gives a first name and birth year.
Bookworm- This is a safe screen name.
2BorNot2b- I honestly don't know what this says, so I guess it is safe.
Choco-holic- This screen name might get made fun of for admitting to liking chocolate but I think it is safe because it does not give out personal information.
CapitalOfens- Is this a criminal's screen name? This one might not be safe.
AmericanIdol2- I think this one is safe and would be free of bullying.
BellaIsabella- Not safe. This is someone's name.
DarkAngel666- Not safe. Plus this screen name weirds me out.
Karla-Love-1996- Not safe. This has someones name and birth year. Too much information.
SimpyMe- Safe. But this might be bullied since there is a typo. Maybe its supposed to be SimplyMe?
gUn4hiRe- NOT SAFE. This sounds like a hit man's screen name.
babyfaceLA- Is this the R&B singer's screen name?
Watup?- Safe name but it's lame. This gives no personal information.
8.
Emc2
Ollie112
Ecal2233
 
9. Lisa
It is highly likely that a password can be cracked.
Poor passwords are the first to be cracked by hackers. A password should not include the name of a family member, pet, date of birth or a random word that can be found in the dictionary because hackers will use this information first when trying to hack your password. Passwords should be strong and at least eight characters long. A strong password is a password that contain both numbers and letters, non-number, non-letter characters, such as “!”, a mixture of upper and lowercase letters, or a random set of numbers. A date of a well-known event such as 9-11 is a weak password and easy to guess. 123 or your name spelled backwards is easy to figure out. Do not hide passwords near your computer, it can be easily found and used by an unwanted guest. Hackers will try your telephone number, zip code, or area code when trying to get into your account. And never ever share your password with a friend.   




As for me, my password is at least eight characters long, contain upper and lower case letters, numbers, punctuation marks and does not repeat. My password is not and have never been information about me, my family members or the family pet. I am not worried about dictionary attacks. I never shared a password with a family member or friend and I do not have my password posted anywhere near the computer I use.
Lauren
Passwords can be cracked easily if they are not well thought through. 
I thought that my password would be safe, since it is completely random (so I thought) but according to question #9, it does not appear to be as safe as I thought. I received a score of 1. I have shared it with a friend, but it is not written down anywhere near my computer. I do think that I would lose major points (probably be in the negative) if it deducted points for using the same password for multiple sites. 
Taylor
no
     no

     yes  -3

    yes +3
     yes +2
   yes +2
   no
     yes +3
   no 
   yes -2
     no

   no
.    no

     no

   yes +2

      yes -3

TTOTAL: 5
I believe that is very likely a password can be cracked. Taking the correct security measures is very important to keep a password safe. After taking this survey, I feel like I might need to modify my password to make it stronger. 
 
Elizabeth
a- no
b- no
c- no
d- +2
e- +2
f- +2
g- no
h- +3
i-no
j- -2
k- no
l- no
m-no
n- no
o-+2
p- -3  
10. The most and least common reason that students’ online accounts are broken into each year are listed below:
The most-common reason that students’ online accounts are broken into each year is that students give their password to their friends, who then decide to use it or give it to others who use it.
The least common reason that students’ online accounts are broken into each year is a password-cracking program.
11. My thoughts and feelings about the subject and video, “malware analysis: drive-by download." I had an “OMG” moment watching this video. I am so excited that I came across such an enlightening message. This video informs the public of websites that secretly install malicious computer software onto your computer once you open their page. That’s right, it download viruses on your computer without your permission or without you even seeing it or knowing, all while visiting the page. This malicious program also uses your computer to send malware to other computers.

I am so outraged that attackers are deliberately installing viruses onto other’s technological devices. I feel it is evil, deceptive, and unethical to infect and kill someone’s device. Also, it’s alarming to know that you no longer have to click to accept a download or install a software update in order to become infected. Furthermore, it’s a disgrace you cannot trust all websites or certain ads that is displayed on legitimate sites. Therefore, I highly advise everyone who use technology to watch and support this video.
12. I visited www.lookstoogoodtobetrue.com/tests.aspx and took three of the eight tests to find out if I am a potential victim of fraud. The results are listed below:
Are You Protecting your Identity? I scored in the low to medium level so I know I need to make some improvement in protecting my identity to lower the score but I am doing okay at the moment according to the test.
Authentic or Counterfeit? My risk level on this test was below low to none. I guess it’s because I have a problem with trust. My motto is trust no one and look out for thine self when it comes to money.
Are You an Unwitting Accomplice in Crime? My risk level was low on this test. Again in life, I use caution and I’m leery about money in general when I think it involves a crimeAlso, I don’t visit chat rooms or chat online. What moved me into the low level is that I answered yes to looking for a work at home job.

  13.  Could not get to the website, I will look at it in class tomorrow.
 Elizabeth Calamari- #1,2,8
Taylor Nace- #3,4,13
Lisa Marshall- #10,11,12
Lauren Byrd- #5,6,7
 

Tuesday, December 2, 2014

#16 Internet Information

1. From Safe Practices for Life Online: A Guide for Middle and High School (2008)- D. Fodeman & M. Monroe
a. Lookstoogoodtobetrue.com risk tests
b. Chapter 2 Protecting Your Privacy Online  
     i. Pop-ups and Banner Ads- forms of online advertising
     ii. Spyware- is software that displays advertisements, tracks your personal or sensitive information, and make changes to your computer, generally without your consent.
     iii. Zombies and Botnets- is a number of Internet computers that, although their owners are unaware of it, have been set up to forward spam or viruses to other computers on the Internet.
     iv. Cookies-  is information that a Web site puts on your hard disk so that it can remember something about you at a later time
     v. Drive-by Downloads-  is a program that is automatically downloaded to your computer, often without your consent or even your knowledge.
     vi. Cramming- is the addition of unexpected or unauthorized charges to a bill for landline or mobile telephone service.
     vii. Trojan Horse-  is a piece of software that looks like it is doing what the user thought, but in reality it is malware designed to infect the user's PC.

2. From Transforming Learning with New Technologies (2011)-R. Malloy, R. E. Verock-O'Loughlin, S. A. Edwards, & B. P. Woolf
a. Take Pew Internet & American Life Project "What Kind of Tech User Are You?" quiz
My results after taking the test: You scored better than 81.8% of the public, below 9.9% and the same as 8.3%.
b. Uniform Resource Locator (URL) aka Web Address - What is the purpose of the following URL designations?
     i. .com- Part of the Internet address of many companies and organizations. It indicates that the site             is commercial
     ii. .org- Part of the Internet address of many organizations usually charitable organizations
     iii. .gov- Part of the Internet address of many government agencies
     iv. .net- Indicates this is a technology site
     v. .edu- Part of the Internet address of many academics. Indicate this site is educational
     vi. .mil- Part of the Internet address of many military organizations

e. Questions
     i. What is the meaning of information literacy for teachers and students?  It is the set of skills needed to find, retrieve, analyze, and use information.
     ii. What are search engines and how do they work? A method used for searching for information. It  searches documents, especially on the World Wide Web, for a specified word or words and provides a list of documents in which they are found.
     iii. What pieces of information do students need to know about Internet searching? That everything on the internet is not accurate, valid, and useful.
     iv. How can teachers and students thoughtfully evaluate online information resources, including the online encyclopedia Wikipedia? Question everything you read by comparing and contrasting with other work and information for accuracy and validity. Also you can look at the address and check the domain used.
     v. How can teachers respond to problems of plagiarism when students use online sources? Telling the students to put the information in their own words and cite where the bit of information comes from.

Sources:
dictionary.com
microsoft.com
searchsecurity.techtarget.com