Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged excel

Rss Feed Group items tagged

solospiders

Solar Moon Garden Light - 0 views

  •  
    This solar like garden stack is really nice. Very sturdy. All the pieces went together easily. I've had this for over a month now, and it does exactly as expected. Really adds a nice accent night glow to the garden, very whimsical, hypnotic and serene with a excellent contrived appeal. I plan on buying a few more. Just be cautious when unpacking and follow the directions to the letter. It is a very fragile metal design.
solospiders

Bridal Wedding Prom Finger Gloves - 0 views

  •  
    Bridal Wedding Prom Finger Gloves Available in Many Colors. These women's gloves are one size fits all due to the stretch quality. Glossy silk gloves add polish to your conventional night outfits and dresses. The ideal completing touch to any night look. Simple to wear and agreeable. They go flawlessly with your dress, tasteful, make you stick out and look astounding, they are an exquisite completion to an excellent outfit, they can be worn extended for a more drawn outlook or crinkled down for a shorter look, an unquestionable requirement have closet adornment!
Megan Black

Plagiarism - 11 views

  •  
    Excellent Plagiarism site with links to other resources, and audio on each page to read aloud the text.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Course: CyberSafety for Middle School - 1 views

  •  
    Lewsisville Independent School District [Flower Mound, TX] has created this excellent Cybersafety Course for Middle School Students, using moodle. It includes a week-long curriculum with videos, web sites to explore, discussion questions and quizzes.
Vicki Davis

Susan Silverman's Lucky Ladybugs project going on for elementary - 0 views

  • A Collaborative Internet Project for K-5 Students
  • Essential Question: Why are ladybugs considered to be good luck?
  • This project will demonstrate lesson plans designed following principles of Universal Design for Learning (UDL) and examples of student work resulting from the lessons.  As teachers we should ask ourselves if there are any barriers to our students’ learning.  We should look for ways to present information and assess learning in non-text-based formats. 
  • ...5 more annotations...
  • Based on brain research and new media, the UDL framework proposes that educators design lessons with three basic kinds of flexibility: 1. Multiple formats and media are used to present information.
  • Examples: Illustrations, pictures, diagrams, video or audio clips, and descriptions 2.   Teachers use multiple strategies to engage and motivate students. 3.   Students demonstrate learning through multiple performance and product formats.
  • UDL calls for three goals to consider in designing lessons: 1.  Recognition goals: these focus on specific content that ask a student to identify who, what, where, and when. 2.  Strategic goals: these focus on a specific process or medium that asks a student to learn how to do something using problem solving and critical think skills. 3. Affective goals: these focus on a particular value or emotional outcome. Do students enjoy, and appreciate learning about the topic? Does it connect to prior knowledge and experience? Are students allowed to select and discover new knowledge?
  • Resources you might want to use: Scholastic Keys, Kid Pix, Inspiration and Kidspiration, digital camera (still and video), recording narration/music, United Streaming.  Let your imagination go!
  • This project begins on March 15, 2007.  Materials need to be e-mailed by May 31, 2008.
  •  
    An excellent project for elementary students to connect with other classes.
  •  
    A great way to get started with technology is to join in an exciting project. this project by Susan Silverman was designed using the principles of Universal Design for Learning. I've heard her present and she is a pro. (Along with my friend Jennifer Wagner.)
Vicki Davis

Web Etiquette and Safety Lesson Plan [Assessment Piece] - 0 views

  • A person is on the other end of all web communication. The web connects people in a community where everyone becomes each other's neighbor. It is just as important to observe safety on the Internet as it is to follow traffic signs. The Think.com community is a place where the teacher sees everything. Everyone is responsible for his/her own actions while in Think.com. Passwords are to be kept secret.
    • Vicki Davis
       
      Excellent concluding concepts for an introductory course for young students. How many don't understand this!
  •  
    Appropriate web etiquette (netiquette) and web safety are vital for building a strong web community. This is a lesson plan that teachers can use to introduce key concepts to their students as they introduce them to the Think.com community. Use this model lesson as designed, change it to fit your needs, or create your own.
Vicki Davis

Michel Foucault, Privacy, and Doubts about Web 2.0 - 0 views

  •  
    Excellent post about how many are relinquishing their privacy. Very insightful post.
  •  
    Fascinating ponderings by Mike Curtain about how many of us are relinquishing our own privacy. This is a very thought provoking post and yet another one I wouldn't have read, had he not linked to my blog post yesterday asking for bloggers to share their links. This is a very powerful blog post. Wow! I personally think there is a balance here, but also agree than many are not considering the privacy they are relinquishing when they post things that don't belong out there for everyone to see. Internet privacy is an illusion, it really is.
Vicki Davis

Reflection - Horizon Project 2008 - 0 views

  •  
    This 10th grade student has written an exceptional post-project reflection. I hope you'll take time to read it. Here is an excerpt:\n\n"There is no doubt that this technology is dangerous. It is apparent that few people, not adults, not teenagers, truly understand how collaboration, conduct, and manners affect the internet. This project has to teach others that as well. It is necessary to know how to handle yourself on the internet. That's why Horizon Project is so important. We have to educate tomorrow's leaders how to use new technology without abusing it. The highlight of this project is the education we are giving every single person who has been a part of the Horizon Project."
  •  
    An excellent post about how doing global collaborative projects can educate students on the safety they need. This is from a 10th grader.
Vicki Davis

Comment Challenge - 0 views

  •  
    Excellent example of a program to promote meaningful and effective comments and communications.
  •  
    The 31 day comment challenge is a program to promote effective, meaningful comments run by several amazing edubloggers -- this is an example of something that those interested in facilitating effective communications should discuss and participate in.
Anne Bubnic

Cyberbullying: Threat or Teachable Moment? - 1 views

  •  
    Students have always gossiped and complained about their teachers. But in cyberspace such behaviour can take on a life of its own. Cases of cyberbullying are opportunities to teach about responsibilities, consequences and healthy relationships. Employers are starting to check prospective employees' online habits: your resumé is one thing, but what kind of person are you online? We all leave digital footprints.
Vicki Davis

educational-origami » home - 0 views

  •  
    Phenomenal page about integrating ICT into the classroom witha wide variety of rubrics based upon Bloom's taxonomy. You'll see blog journaling, wiki editing, threaded discussion, bookmarking rubrics, search rubrics, podcasting rubrics, audio conferencing, data analysis, and collaborative rubrics. I haven't been through all of these but would love it if we could go through them and work on them. They are in PDF format, but it would be great to share and edit them collaboratively. Very nice website.
  •  
    Important example of how leading edge schools assess podcasting, searching, digital publishing, collaboration, threaded discussions, blog, wikis, and more. Excellent resource for parents or teachers to take to school administrators to advocate for these sorts of programs in their school. I highly recommend this site.
Jocelyn Chappell

Department for Children, Schools and Families : Byron Review - 0 views

  •  
    Published 27th March 2008. On 6th September 2007, the Prime Minister asked Dr. Tanya Byron to conduct an independent review looking at the risks to children from exposure to potentially harmful or inappropriate material on the internet and in video games."
  •  
    You can catch the excellent analysis of Dr. Tanya Byron's work at Anne Collier's web site [NetFamilyNews]. See: http://www.netfamilynews.org/
Anne Bubnic

K12HSN EdZone - Protected Environment for Use of Web 2.0 Tools - 0 views

  •  
    The California K-12 High Speed Network (K12HSN) is offering a comprehensive set of tools to support teaching and learning in California classrooms. This free suite of tools, known as edZone, was developed by the California Dept of Education and currently includes blogging, videoconference scheduling and a file sharing system where educators can upload videos, podcasts, images and documents. EdZone is an excellent tool to share lesson ideas, upload student learning objects, disseminate best practices, and more! EdZone will soon be expanded to include Instant Messaging, Moodle, Wikis, Social Networking, Moodle-an online course management system and other Web 2.0 tools to enhance today's classroom environment. Watch for these new tools in Summer 2008!
Vicki Davis

ThinkQuest - 0 views

  •  
    Excellent organization and competition that is managed very well.
  •  
    This fascinating project needs judges (oh and horizon still does too!) -- hat tip to David Warlick for this link.\n\nThe student web site entries are due in tomorrow (April 2) for the 2008 competition, and ThinkQuest needs people to judge these entries. To be a judge, you must be employed as a teacher or have a minimum of five years experience in the field of education; be proficient in the English language; and be able to, and have the time to evaluate and score websites based on the provided criteria.
Diane Woodard

Copyright Confusion - 7 views

  •  
    Wow, great resource for teaching copyright/fair-use in the classroom. Excellent videos!
Anne Bubnic

The New Writing Pedagogy - 1 views

  •  
    Because Cory was in a class that used social networking tools for writing-specifically Elgg, an open source media platform-other students, teachers, family members and even the general public were able to comment on his story. For example, an "army colonel," who did not give a name, said about chapter 1, "Your words have painted a very vivid picture. You did an excellent job of illustrating the terror of war. Keep up the good work."
Anne Bubnic

What is Privacy/Personal Information? [Video for 8-10 year olds] - 2 views

  •  
    Excellent 8-minute video from the UK's Thinkuknow education program that helps children to understand what constitutes personal information. The assembly enables children to understand that they need to be just as protective of their personal information online, as they are in the real world. It also directs where to go and what to do if children are worried about any of the issues covered.
Anne Bubnic

NetSafe Cybercitizenship Pathway - 0 views

  •  
    THE GRID from NetSafe.org [New Zealand] an excellent scaffolded cybersafety plan and provides a progression of cybercitizenship attributes, appropriate learning objectives, suggested activities and recommended resources from K-12.
JOSEPH SAVIRIMUTHU

Software That Monitors Children's Virtual Playgrounds - 0 views

  • NetModerator, a software tool built by Crisp Thinking, a private company based in Leeds, England, can monitor online chat “for intent as well as content,” says Andrew Lintell, the company’s chief executive. To build the tool, he says, Crisp Thinking analyzed roughly 700 million lines of chat traffic, some from conversations between children and some, like conversations between children and sexual predators, provided by law enforcement groups.
  • Sexual predators are always a concern, she says, though she described the likelihood of a child being targeted by an adult with malicious intent as “statistically low.”
  • “Imagine a thousand children, 95 percent of whom have excellent typing skills, all typing at the same time,” she says. “Now try to monitor those conversations as they scroll past you on a screen.”
  •  
    Software That Guards Virtual Playgrounds
  •  
    The last "highlight" is particularly telling.
« First ‹ Previous 41 - 60 of 72 Next ›
Showing 20 items per page