Thursday, December 4, 2014

19. Thursday group project

(Danielle Laws 1-3)
1.
Facebook, Twitter, and Instagram.

2.
The kind of anonymity that is available on the Internet has made many students forget that they need to filter any information that they post. In fact, many colleges as well as potential employers tend to investigate the social networking profiles of an applicant before they grant any acceptance or an interview. And there are many students who are not constantly evaluating the content which they are publishing online. All this can lead to negative consequences even later on in their life.(http://www.business2community.com)

3.
Sexting- This is a form of communication by sending text messages or emails of nude pictures sometimes involving sexual conduct. In most cases the sender of the picture is the nude person in it.
Cramming-This is a method of tricking a computer into running a java code.(Margaret Rouse, 2014, Cache cramming,TechTarget)
Cookie- This is information that a Web site will put on your computer to remember you for later uses.(Margaret Rouse, 2014, cookie,TechTarget)
Trojan Horse-This is a program where a harmful code is inside what seems to be a harmless program or data and can do a form of damage to a computer.(Margaret Rouse, 2014, trojan horse,TechTarget)
Phishing- This is an email fraud method in which the hacker sends out an email that loos real but its only to gather personal and financial information from the victims.(Margaret Rouse, 2014, Phishing ,TechTarget)
Spyware- This is a technology that helps in gathering information about people without them knowing.(Margaret Rouse, 2014,Spyware ,TechTarget)
Rootkit-This is a collection of tools and allows only the administrator-level access to a computer.(Margaret Rouse, 2014, rootkit ,TechTarget)
Zombie- This is a computer that a hacker has accessed and set up to forward viruses to other computers.(Margaret Rouse, 2014, zombie,TechTarget)

(Kelsey Messemore 4-6)
4.
Actual student screen name- too much information revealed
Trashmouth- it portrays the image of someone who uses inappropriate language
IHaveOnePairPants- you only have one pair of pants? that means you wear them every day-there's no way you wash them every single day
BoogerDude- it portrays the image of a male that has boogers in his nose- not ok.
Pig- it portrays the image of a person who likes to eat a lot, or it portrays the image that you are a nasty animal who always makes messes

5.
InYoFace- what is in your face? and why is it there?
Badboy2u- people may try to test how "bad" of a boy you are by picking on you
Lookin4Luv- if you're "lookin 4 luv" and it's so important that you put it as your screen name it makes you look desperate
IMAHottie- ok first, please humble yourself. second, even if you are confident that you're a "hottie" please don't brag about it. Let others tell you that you're a "hottie"
FatMama- do I even have to explain?
suPaFlirt- NOBODY LIKES A "supa flirt"

6.
Tom_Evans34- full name and age maybe
Missy-13- name and age maybe
AndyKarateKid- name and hobby
ViolinGurl- hobby
restlinmatch- hobby

(Chere’ Diket 7, 8, and 10)
7. Good and bad choices for screen names.
                -i8sushi2-good
                -soccerstar-good
                -puppergirl1234-good
                -KeKe1995-bad
                -Bookworm-good
                -2BorNot2b-good
                -Choco-holic-bad
                -capitlOfens-bad
                -AmrcanIdol2-good
                -BellaIsabella-bad
                -DarkAngel666-bad
                -Karla-Love-1996-bad
                -SimpyMe-good
                -gUn4hiRe-good
                -babyfaceLA-bad
                -Watup?-good

8. Create three different screen names that you think will meet all of the following guidelines: unlikely to attract negative attention, free of bad language, don’t reveal too much personal information, don’t reveal a name, age, or gender.
                -basketballfan3265
                -teacherspet23
                -iloveschool436

(everyone)
9.How likely is it that a password can be cracked? A poor score is a warning to create a new password immediately. Score: 4
a) Does your password include the name of a family member or pet? (-3)
b) Does your password include the birth date of a family member? (-3)
c) Does your password contain one or more words that could be found in a dictionary (including French, Spanish, Italian, German)? (-3)
d) Does your password contain a random set of numbers? (+2)
e) Does your password have 8+ characters? (+2)
f) Does your password contain both letters and numbers? (+2)
g) Does your password have less than six characters? (-1)
h) Does your password contain one or more non-number, non-letter characters, such as ! or = ? (+3)
i) Does your password contain the date of a well-known event, such as the date a particular baseball team won the pennant? (-1)
j) Does your password contain at least three numbers in numerical  sequence, such as "123"? (-2)
k) Does your password contain any word spelled backward? (-1)
l) Is your password written on a piece of paper within 15 feet of your computer? (-2)
m) Does your password contain a word repeated more than once? (-1)
n) Does your password contain your telephone number, zip code, area code, or a portion thereof? (-2)
o) Does your password include a mixture of uppercase and lowercase letters? (+2)
p) Have you ever shared your current password with a friend? (-3)

10. From the list below select the most-common reason and least-common reason that students’ online accounts are broken into each year:
-a password-cracking program is used to crack their password
-others who know personal things about the student guess their password MOST-COMMON
-students write their password down where others are able to see it
-students give their password to their friends, who then decide to use it or give it to others who use it
-other students see the password as the student enters it on a keyboard LEAST-COMMON

(Anna Carmichael 11-13)
11. I never knew the amount of damage that malware could do, to be honest I never really knew what malware was, but now I feel like I have a better understanding. Drive by downloads are programs that automatically install on to your computer without your knowledge or consent. This causes problems with malware, which is a software that is intended to damage or disable a computer. Some of the effects of drive by downloads and malware are programs showing up that you didn't download or unusual files. The attacker can send your computer to unhealthy sites that install more malware, and they can send spam to and from your email to unauthorized recipients.

To me that sounds like a whole lot of damage happening to you and your computer without your knowledge. I know there are some softwares out there that can help protect from things like drive by downloads and malware but I need to stay more up to date on them. I have not personally dealt with all that comes along with a drive by download but I do know someone who has. I feel like there should be a little more being done about this issue since you can never be one hundred percent sure that everything you do on your computer is safe, but being more mindful is a good first step.


 12.
 a) Authentic or Counterfit?
               -medium low risk
 b)  Are You an Unwitting Accomplice in Crime?
              -low risk
 c)  Is Your Computer Protected?
             -medium risk

13.  Arrest Made in Internet Gift Card Scheme

              This article talks about a website called Otartel.com. This website was run, with help from co-conspirators, by a man named Oleksandr Verovkin. Between May and December of 2007 Verovkin stole over 155,000 dollars from unsuspecting users. Otartel.com was set up as an online seller of retail gift cards, including places like Best Buy and Barnes and Noble. Hundreds of customers complained that there cards were never delivered although they were paid for. Some received their cards the first time but never got another. Oleksandr was arrested in the JFK Airport by the United States Postal Inspection service; for this scheme Verovkin was charged with conspiracy to commit mail and wire fraud. He will spend up to thirty years in jail or could be fined up to a million dollars for his crime.

18. It 365 Tuesday Worksheet

1. From Safe Practices for Life Online: A Guide for Middle and High School (2008) - D. Foderman and M. Monroeb. Define:    
       -Pop-ups and Banner Ads- appearing suddenly and temporarily in a new window within or on top of an open window. (dictionary.com)    
       -Spyware- software that is installed surreptitiously and gathers information about an internet user's browsing habits, intercepts the user's personal date, etc., transmitting this information to a third party. (dictionary.com)    
       -Zombies and Botnets- (roBOT NETwork) Also called a "zombiearmy", a botnet is a large number of compromised computers that are used to generate spam, relay viruses or flood a network or Web server with excessive requests to cause it to fail. (google)    
       -Cookies- a message, or segment of data, containing information about a user, sent by a web server to a browser and sent back to the server each time the browser requests a web page. (dictionary.com)    
       -Drive-by-Downloads- means two things, each concerning the unintended download of computer software from the internet: Downloads which a person authorized but without understanding the consequences. (google)     
       -Cramming-  Cache cramming is a method of tricking a computer into running Java code it would not ordinarily run. (searchsecurity.techtarget.com)     
       -Trojan Horse- One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. A bug inserted into a program or system designed to be activated after a certain period of time or a certain number of operations.  (dictionary.com and google)
2. From Transforming Learning with New Technologies (2011)- R. Malloy, R.E. Verock-O'Loughlin, S. A. Edwards, and B.P. Woolfa. Take Pew Internet and American Life Project "What Kind of Tech User are You?" quiz     
       -Results-  You scored better than 81.8% of the public, below 9.9% and the same as 8.3%.
b. Uniform Resource Locator (URL) aka web address- what is the purpose of the following URL designations?     
        -.com- use for companies or businesses (commercial use)     
        -.org- used for non profit organizations like pbs
  .     -.gov- used for government official websites
        -.net- new URL that simply stands for network can be non profit or profit could be any site. (usg.edu)
        -.edu-used for education websites like school districts or colleges.
        -.mil- used for the military (various branches of the US Armed Forces) (usg.edu)
e. Questions
     -What is the meaning of information literacy for teachers and students?
             - the meaning of information literacy means the basic communication competencies of accessing, analyzing, evaluating and communicating information. Both students and teachers do these steps for information literacy: Planning research or posing a question, organizing a way to search for the answer, finding resources, evaluating the resources and thinking critically about them, expressing the information learned in meaningful ways. As students, this is a process that takes time and they will need to learn however for a teacher this is a process that is generally already ingrained in our heads and therefore our job is just to teach these steps for our students so they can be successful. (ldonline.org)

     -What are search engines and how do they work?

             -a computer program that searches documents, especially on the WorldWide Web, for a specified word or words and provides a list of documents in which they are found (dictionary.com)

     -What pieces of information do students need to know about Internet searching?

              -the correct steps for information literacy.
              -to know the differences in .com, .edu, .net, and so on.
              -refer to many sites and not just one for a correct answer.
              -know the difference between opinion and fact.
              -don't provide personal information on unknown websites.

     -How can teachers and students thoughtfully evaluate online information resources, including the online encyclopedia Wikipedia?

              -by asking these questions: who made the message and why? what is left out of the message? How might others view the message differently? (ldonline.org) Teachers and Students can also check other sources about the same information and see if the information lines up with one another. Another great thing is to simply check in a book like a textbook or an informational book.

     -How can teachers respond to problems of plagiarism when students use online resources?

              -clearly address what plagiarism is to the students and what can happen if they do plagiarize.
              -explain that in order to get credit for their work, they need to rely on their own ability and not the ability of someone else
              -explain that the teacher will know when they plagiarize.
              -explain that sources can be used and how to properly use quotation marks and citations so that their work is not plagiarized.
              -if plagiarism becomes a problem with a student, get the principle and parents involved to explain to the student what the issue is with plagiarizing.

Tuesday, December 2, 2014

16. Quiz

Continents and Oceans

Continents and Oceans

Answer each of the questions to the best of your ability.

  1. What is an Ocean made of?
 
  2. What is a Continent made of?
 
  3. What is land?
 
  4. Continents and Oceans make up the what?
 
  5. The Oceans cover ___ of the world.
 
  6. How many Continents are there?
 
  7. How many Oceans are there?
 
  8. Fish live in or on the what?
 
  9. Animals live in or on the what?
 
10. Continents are made of several different ___.
 
When you are done with your quiz, turn over your paper and sit quietly.

Created using Testmaker fromThe Big Bus - www.thebigbus.com

Thursday, November 13, 2014

14. article reflection

"Guide to Creating Tech-Friendly Classroom Management Strategies"
This article describes different strategies that a teacher can use to be successful in integrating technology into the classroom. The first step is to get the student interested in technology which in this day and era is very easy to do, but as a teacher, it is your job to make sure that technology isn't just for games but can be used for learning. The first strategy given is for the teacher to do their homework. Make sure you do your research and are well prepared for the class lesson you are about to teach. The next strategy is to make sure the students know what they are learning and identify with them what they are suppose to get out of the project. This gives them a focus for the project and helps them learn. The third strategy is to make sure that you take breaks away from the computer. Most students, after some time, will start to get fidgety from staring at the screen for so long. Make sure you allow them time to get away from the computer and do other activities. The last strategy is make sure you let your students explore. When using technology it cannot be as structured as a traditional classroom but, students need to be allowed to explore and figure things out on their own.

These are strategies that I will most definitely use in my future classroom. It gives us a great outline for how we should incorporate technology in a fun learning environment instead of just doing random projects or power points. It shows a really good way of how to use the information and how to make sure the students really learn the lesson and how to use the technology that is so important in this day and age. Future students will need to have computer skills to be successful and this gives very helpful tools to make sure they can be successful.

Tuesday, November 11, 2014

13. article review

"Why so many kids can't sit still in school"
This article describes how more and more children are being diagnosed with ADHD and can not stop moving in their desks at school. Some teachers even say that there are at least eight students in their classes that fidget and 'act up' during their class but, Angela Hanscom, a pediatric occupational therapist, believed that the issue is much simpler than ADHD. The cause of more and more students fidgeting and needing to move around is because their bodies don't move around enough. Recess has been drastically reduced and play time outside has become almost non existent because of fear. The result is that only one out of twelve students had normal strength and balance. In order for children's brains to function, they need to move around to keep it active, and they need to stay active if they want to build up strength and balance. Children need to move and play for hours at a time. Fidgeting in a real problem in today's classroom not because they are a distraction, but because it means that those students aren't getting the movement they need to stay active and build up their strength.

Reflection: How I plan on dealing with this issue.
The problem at hand is exactly how Angela Hanscom put it, students are just not moving enough. This also isn't something that happened overnight. When I was in second grade not only did we have recess but we had PE too everyday and it wasn't a controlled environment but a chance for us just to move around and play. However, once I got into middle school and high school it was extremely difficult for me to sit and pay attention because we did nothing all day. Sure we learned but it almost seemed pointless. The issue has just gotten worse as the years have progressed. Now second graders barely have time for moving around and by the time they get home it's like waiting for a bomb to go off they are so fidgety and them we expect them to do homework? How I plan to address this is to make sure my students move throughout the day. I will do this with games and activities that enforce the lesson I am teaching. Doing hands on activities and games will keep their mind active, their bodies strong, and will generally make those students enjoy school because they won't need to sit down the whole time. Another thing I would like to do is during the last five minutes of class time, I would allow my students to get up and move. Some days we might do general exercises where other days we might have a dance party for five minutes. As long as they are moving, then the classroom will be a happier and healthier place of learning.

Thursday, November 6, 2014

12. Six videos on 21st education

Video 1- Class of Tomorrow

  • The issue with this video is it really isn't all that plausible. If you look at classrooms today and how students use their technology, yes computers and phones are sometimes used for notes and for homework assignments however, at the same time there is other websites like facebook or twitter open, and the phones are constantly being checked for texts or other information. I do believe that the creator of this video is correct about technology is going to become more and more integrated into the classroom but the fact that everyone is staying on task? Highly unlikely. I think what will probably happen is the teacher will use technology more and more as a teaching tool but I doubt the students will be able to use technology that freely because they will not stay on task if they do.

Video 2- The Voice of the Active Learner

  • This video is extremely accurate. Students now a days are constantly hooked to their technology and most of the information that they learn can be found at their fingertips. When you look at the world and the road it is going down, the creator of this video is right and most of the classrooms will probably transfer to online studies. The issue with this though is that even though technology is great, it can't replace a classroom. If a student has a hard time comprehending a problem or a concept, they can google it all they like but probably will never truly find the answer they need. Students also need both peer interaction and teacher interaction so they can learn social skills and many other skills that they will need to take into the work force. Technology SHOULD be integrated into the classroom because of how students are learning today, but it can not replace the necessary interactions a student needs. I have been the student doing just online schoolwork and it took me a while to catch up to everyone else. 

Video 3- The Future Starts Now

  • This video is highly plausible. As mentioned before in the other two paragraphs, students today are hooked on their technology. This can be a good or bad thing. If teachers really started to prepare lessons with technology incorporated in them and use those tools to interest the active technology learners, then students will really start to enjoy it more. Just like the creator, I agree with everything she has said. It's more of a combination then strictly doing one or the other and this is the way I believe the future is heading. Technology is necessary, but it's up to teachers to show students how learning can be fun through it. 

Video 4- Designing Schools for 21st Century Learning

  • I have mixed feelings about this video. I think it's a wonderful idea to have a school open like he did and to really sit down and let the students be hands on and just the environment is so much easier to be relaxed in. If all schools could be like this that would be great. Open up those windows, let those students feel like they aren't in prison, however, his reasoning behind this construction is because of the school experience he had. Schools today (or at least not the school I graduated from) were like that. They never just stood their and lectured. They gave us visuals and some gave us hands on experience. I think him judging schools across the board because of his bad experience almost makes his argument invalid. I do however, love his idea and some of those ideas we could really bring into the normal classroom to really enrich those students as well. 

Video 5- Tools and Resources for the 21st Century Education

  • This video is just a resource video for teachers. It provide several helpful learning tools to be used in your classroom and also tools that can help a teacher grow professionally. The only way I could really give a review on this is if I go and look up every site that was on the video which I will probably do at some point in time however the ones I did recognize I know for a fact they are good resources for teachers to use in the classroom and outside of the classroom. Based on that, I believe the creator of the video can be credited with giving good resources for teachers and his resources are valid. 

Video 6- A Vision of 21st Century Teaching

  • It was really great to read how actual 21st Century Teachers are teaching in their classrooms and the impact they are having on their students lives. I think we can say this is plausible considering these are actual teachers telling their experiences. One thing I noticed in the video, opposed to the first video, is that when they use their phones for things its a very strait forward thing and the students don't have time to roam with them but also gives them the opportunity to take it out and use it. The teachers in the video really showed how they are integrating technology in their classrooms and is a great was to really look at it because I will be a teacher in that setting in the future.