Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged character

Rss Feed Group items tagged

Anne Bubnic

Disney Copyright Law [Video] - 0 views

  •  
    Educational video which teaches fair use and copyright laws using Disney Characters.
Go Jobio

Behind-The-Scenes of the GoJobio Launch Video - 0 views

  •  
    Here's a behind-the-scenes look at the GoJobio launch video! GoJobio is re-inventing how you hire, recruit or find your next job. JOBSEEKERS: Take control! Stop feeling like your resume is getting lost in the shuffle. Use our video pitch technology to show your true character and creativity. EMPLOYERS: Get to know who you hire! Along with resumes, watch 60-second video pitches directed to your specific job opening to learn more about your candidates personality and skills. For More information, visit http://www.GoJobio.com/
solospiders

Delta Children Chair Desk - 0 views

  •  
    Delta Children Chair Desk a multipurpose seating choice for your little one to sit, and get all of his work done. Designed with all your child beloved Mickey Mouse characters and a new exciting Mickey Mouse design this chair desk is great for coloring playing and reading. The seat also opens as a storage space for your little one's toys books and art supplies. If are you searching the best Delta Children Chair Desk than you come in the right place here all information given below in your children's demand.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

How can cyberbullies be stopped? - 0 views

  • Studies show cyberbullying affects millions of adolescents and young adults. The Centers for Disease Control and Prevention last year labeled "electronic aggression" -- its term for cyberbullying -- an emerging public-health problem.
  • "It's not really the schoolyard thug character" in some cases, said Nancy Willard, executive director of the Center for Safe and Responsible Internet Use, a research and professional development organization in Eugene, Ore. "It's the in-crowd kids bullying those who don't rank high enough."What fuels cyberbullying is "status in schools -- popularity, hierarchies, who's cool, who's not," said Danah Boyd, a fellow at the Berkman Center for Internet and Society at Harvard Law School who studies teens' behavior on MySpace, Facebook and other social-networking sites.
  • Cyberbullying has impelled lawmakers, especially at the state level, to either pass anti-bullying laws that encompass cyberbullying or add cyberbullying to existing statutes. Some laws are propelled by a mix of concern about electronic bullying and online sexual predators.
  •  
    Social networking Web sites and other technologies enable schoolyard bullies to pack a bigger punch. Advice and concerns from Nancy Willard and other experts in the field.
Anne Bubnic

Dizzywood Virtual World Enhances Technology Program for Kids - 0 views

  • “Dizzywood’s unique virtual environment offers our kids a wonderful environment in which they can learn important lessons through activities that require thoughtful decision-making. We hope the success of this program offers a model for other youth programs to follow.”  The partnership reinforces the findings of two recent studies of elementary school students conducted by UC Davis. The studies observed that children find ways to transform their experiences with technology into fun, highly organized group activities and that technology-based activities can be explicitly designed to foster social reflection and advanced planning among young children. 
  •  
    Dizzywood, a virtual world and online game for children ages 8-12, today announced that it has been selected by the YMCA of San Francisco to enhance the youth program's technology curriculum. The YMCA is using Dizzywood's virtual environment to reinforce its program emphasis on activities that promote values such as caring, honesty, respect and responsibility. Children also learn about important issues relating to virtual worlds, such as digital citizenship and online safety, as well as complete storytelling and team-building exercises that emphasize creativity, writing and reading skills, and working together to achieve goals. The YMCA program is similar to the elementary school program that Dizzywood recently completed with the Reed Union School District (Marin County, CA). The highly interactive workshop, which ran from April through June, used virtual activities to reinforce the school's character pillars, which include caring, citizenship, fairness, respect, responsibility and trustworthiness, among other core values.
Anne Bubnic

The Case of the Plagiarized Paper [Video Caper] - 1 views

  •  
    Suggested classroom use (4th-10th grade): writing, literature, history, technology/computer teachers, character education, leadership classes. Additional use: school-wide assemblies, school broadcasts, district streaming, counselor sessions, "back to school" programs on cheating/plagiarism, college prep, in preperation for assigning a major writing assignment,
Anne Bubnic

Don't be illTwitterate or aTextual - 0 views

  • 1) At Marta Valle High School they held an innovation fair celebrating the successes of the innovative work teachers are doing with their students. Some students were selected as fair reporters. These students interviewed attendees with the question, "Please tell me in 140 characters or less what has impressed you most about what you've seen at our innovation fair."
  • 2) Text to capture reflections during field trips. If you're in a school where cells are banned, you may be able to have students bring them on field trips. If that is not allowed, the chaperon's devices can be used. Rather than have students walk around taking notes. Have them Tweet their reflections.
  • Have students do a daily or weekly tweet about something that day. In his post “What Did You Create Today?” (http://weblogg-ed.com 08/22/09), Will Richardson shares some great possibilities that could be used in a daily tweet: What did you teach others? What unanswered questions are you struggling with? How did you change the world in some small (or big) way? What’s something your teachers learned today? What did you share with the world?
  • ...1 more annotation...
  • Use Twitter as a tool to capture student voice by having them respond to class lectures using Twitter.
  •  
    Four ideas for using Twitter with Students.
Anne Bubnic

NS Teens - Profile Penalty [Video] - 4 views

  •  
    NS Teens video - uses Comic Characters to get across a message about cleaning up your social networking profile.
Anne Bubnic

Twittering Dante : New Models for Student Writing in the Digital Age - 0 views

  •  
    Cracking Dante's Inferno is a tough row to hoe for any high school student-but what if the reading assignment was conducted via Twitter? The exercise "Twitter in Hell" was handed to some lucky seniors at University Laboratory High School at the University of Illinois, Urbana-Champaign, after reading the classic tome. Their mission? To write 140-character tweets describing each level in hell as if they were Dante writing to his beloved Beatrice.
Anne Bubnic

Should Info on Facebook Be Grounds for School Suspension? - 0 views

  • School districts across the country have begun to punish students for the material that they publish online. Schools are correct for punishing students for online activities like character defamation of teachers and posting pictures of themselves engaging in illegal activities. Schools must teach students the hard way that wrong actions should be punished no matter where they occur.
  •  
    Question posed in a high school newsletter: If a school comes across online material that depicts a star athlete or school government officer engaging in an illegal activity, should they merely ignore it? Surely, one's moral compass would dictate otherwise. Students must be disciplined for their actions in both the real and virtual worlds.
Anne Bubnic

Footprints in the Digital Age - 0 views

  • In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
  • As the geeky father of a 9-year-old son and an 11-year-old daughter, one of my worst fears as they grow older is that they won't be Googled well. Not that they won't be able to use Google well, mind you, but that when a certain someone (read: admissions officer, employer, potential mate) enters "Tess Richardson" into the search line of the browser, what comes up will be less than impressive. That a quick surf through the top five hits will fail to astound with examples of her creativity, collaborative skills, and change-the-world work. Or, even worse, that no links about her will come up at all. I mean, what might "Your search did not match any documents" imply?
  • digital footprints—the online portfolios of who we are, what we do, and by association, what we know—are becoming increasingly woven into the fabric of almost every aspect of our lives.
  • ...6 more annotations...
  • So what literacies must we educators master before we can help students make the most of these powerful potentials? It starts, as author Clay Shirky (2008) suggests, with an understanding of how transparency fosters connections and with a willingness to share our work and, to some extent, our personal lives
  • Publishing content online not only begins the process of becoming "Googleable," it also makes us findable by others who share our passions or interests.
  • Although many students are used to sharing content online, they need to learn how to share within the context of network building. They need to know that publishing has a nobler goal than just readership—and that's engagement.
  • As Stanford researcher Danah Boyd (2007) points out, we are discovering the potentials and pitfalls of this new public space. What we say today in our blogs and videos will persist long into the future and not simply end up in the paper recycling bin when we clean out our desks at the end of the year.
  • Although Laura is able to connect, does she understand, as researcher Stephen Downes (2005) suggests, that her network must be diverse, that she must actively seek dissenting voices who might push her thinking in ways that the "echo chamber" of kindred thinkers might not? Is she doing the work of finding new voices to include in the conversation?
  • Here are five ideas that will help you begin building your own personal learning network. Read blogs related to your passion. Search out topics of interest at http://blogsearch.google.com and see who shares those interests. Participate. If you find bloggers out there who are writing interesting and relevant posts, share your reflections and experiences by commenting on their posts. Use your real name. It's a requisite step to be Googled well. Be prudent, of course, about divulging any personal information that puts you at risk, and guide students in how they can do the same. Start a Facebook page. Educators need to understand the potential of social networking for themselves. Explore Twitter (http://twitter.com), a free social networking and micro-blogging service that enables users to exchange short updates of 140 characters or fewer. It may not look like much at first glance, but with Twitter, the network can be at your fingertips.
  •  
    Giving Students Ownership of Learning: Footprints in the Digital Age. In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
Anne Bubnic

Online Safety with Tim and Moby - 0 views

  •  
    Promethean offers a free flipchart viewer and flipchart on Online Safety with Brainpop characters, Tim & Moby. (Registration is required). You've got mail! Surfing the Web can be fun and informative, but it can be dangerous, too. Let Tim and Moby help you sort out the good from the bad as you learn some rules to keep you safe in this BrainPOP movie on online safety. Figure out how to keep your identity a secret, how to identify people who might not be as nice as they seem, and who can help you stay safe online. You'll also discover some rules that are good to follow both online and in life and what can happen if you break the World Wide Web code of conduct.
‹ Previous 21 - 34 of 34
Showing 20 items per page