Skip to main content

Home/ Literacy with ICT/ Group items tagged protect

Rss Feed Group items tagged

John Evans

Online Safety 3.0: Empowering and Protecting Youth | ConnectSafelyConnectSafely - 2 views

  •  
    "Both the Internet and the way young people use technology are constantly changing, but Internet safety messages change very slowly if at all. A few years ago, some of us in the Net safety community started talking about how to adjust our messaging for the much more interactive "Web 2.0." And we did so, based on the latest research as it emerged. But even those messages are starting to get a bit stale…. Now it's time for Online Safety 3.0."
John Evans

NetSafe - Learn | Guide | Protect - 5 views

  •  
    LGP stands for Learn: Guide: Protect: It is a frame-work that supports schools in creating a culture of responsible, safe use of digital technologies. LGP promotes a student-centered approach to teaching and learning about cybersafety and digital citizenship across the curriculum.
John Evans

Online bullying: Teachers to get cyber safety training program - 4 views

  •  
    "Program to protect against cyberbullying "
tech vedic

Phone-scams-and-computer-repair-know-your-facts-to-protect-your-computer - 0 views

  •  
    In case, you are getting a phone call regarding your PC infection then no need to respond. This is not a help from technical vendor but a scam.
tech vedic

How to know that my computer is virus or malware infected? - 0 views

  •  
    Advantages: Keeps system running smooth Protection against Internet frauds
John Evans

Free Technology for Teachers: Protect Student Privacy by Using Skitch - 2 views

  •  
    "In yesterday's post about creating digital records of physical items I mentioned using Skitch to take pictures and annotate them. One of the things about Skitch that I failed to mention in that post is that along with drawing and typing on a picture you can crop and blur items in a picture."
John Evans

Copyright Decision Tool - CMEC - 6 views

  •  
    "The Copyright Decision Tool helps teachers decide whether they can use print materials, artistic works or audiovisual materials without getting copyright permission. Teachers! Thinking of using a copyright-protected work? Find out if you have permission."
John Evans

How to Integrate Growth Mindset Messages Into Every Part of Math Class | MindShift | KQ... - 1 views

  •  
    "Catherine Good has experienced stereotype threat herself, although she didn't know it at the time. She started her academic career in pure math, expecting to get a Ph.D. But somewhere along the way she started to feel like it just wasn't for her, even though she was doing well in all her classes. Thinking that she'd just chosen the wrong application for her love of math, Good switched to math education, where she first encountered the idea of stereotype threat from a guest psychology speaker. "As he talked about students feeling that they don't really belong, I had an epiphany," Good said. She realized the discomfort she'd felt studying mathematics had nothing to do with her ability or qualifications and everything to do with a vague sense that she didn't belong in a field dominated by men. Stereotype threat is a term coined by psychologists Joshua Aronson and Claude Steele. They found that pervasive cultural stereotypes that marginalize groups, like "girls aren't good at math," create a threatening environment and affects academic achievement. Good was so fascinated by how powerful psychological forces can be on learning, including her own, that she switched fields again to study social psychology, and she ended up working closely with Carol Dweck for several years when Dweck's growth mindset work was in its early stages and not yet well-known among educators. Good now works at a psychology professor at Baruch College. Originally, Dweck and Good hypothesized that believing intelligence is flexible - what we now call a growth mindset - could protect students from stereotype threat, an inherently fixed idea."
John Evans

What a School District Designed for Computational Thinking Looks Like | MindShift | KQE... - 0 views

  •  
    "Computational thinking is intimately related to computer coding, which every kid in South Fayette starts learning in first grade. But they are not one and the same. At its core, computational thinking means breaking complex challenges into smaller questions that can be solved with a computer's number crunching, data compiling and sorting capabilities. Proponents say it's a problem-solving approach that works in any field, noting that computer modeling, big data and simulations are used in everything from textual analysis to medical research and environmental protection."
John Evans

What to do if asked to hand over your phone, computer at the US border - Business Insider - 4 views

  •  
    "When you're entering the United States, whether at an airport or a border crossing, federal agents have broad authority to search citizens and visitors alike. And that can include flipping through your phone, computer, and any other electronic devices you have with you. As US Customs and Border Protection outlines in a tearsheet it provides to people at the border, federal agents can seize and search your phone, and even make a copy of it to have forensic experts analyze its contents off-site."
John Evans

How to Set up iPad Restrictions | htacademy - 0 views

  •  
    "Does your child have an iOS device (iPad, iPhone, or iPod Touch) or access to your personal device? iOS devices have many security features that parents don't know about. You can use these features to help protect your child from accessing inappropriate content; guard your personal data on a shared device; and safeguard you from unexpected credit card bills due to unapproved app and itunes purchases. The following video explains how!"
‹ Previous 21 - 40 of 144 Next › Last »
Showing 20 items per page