Skip to main content

Home/ Classroom 2.0/ Group items tagged online games

Rss Feed Group items tagged

1More

Top Secret - 0 views

  •  
    An e-safety site following the online activities of five cartoon characters as they surf the web in a not so careful manner. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
1More

Photograph Puzzle Maker - 0 views

  •  
    Make a simple online puzzle with an uploaded image. Play or embed on your site or blog. http://ictmagic.wikispaces.com/ICT+&+Web+Tools+-+Miscellaneous

dgfdgfdgf - 0 views

started by shahbazahmeed on 12 May 21 no follow-up yet

ghfhgfhgfhg - 0 views

started by shahbazahmeed on 12 May 21 no follow-up yet

jhgjhgjhgh - 0 views

started by shahbazahmeed on 12 May 21 no follow-up yet

fhgfhgfh - 0 views

started by shahbazahmeed on 12 May 21 no follow-up yet

fdgfdgfdgg - 0 views

started by shahbazahmeed on 13 May 21 no follow-up yet

rytrytrytryt - 0 views

started by shahbazahmeed on 13 May 21 no follow-up yet

rytrytrytrt - 0 views

started by shahbazahmeed on 13 May 21 no follow-up yet

yuitrdysetydrufghuji - 0 views

started by shahbazahmeed on 13 May 21 no follow-up yet

dsfhjgklljlkjhgfdsghj - 0 views

started by shahbazahmeed on 13 May 21 no follow-up yet
1More

Summer Program - 0 views

  •  
    VocabularySpellingCity has a new summer word study program that allows children to sharpen academic skills as they play. These simple assignments are a daily workout for the brain, building literacy skills such as vocabulary, spelling, and writing.
2More

Performous - Announcements - 21 views

  •  
    Learn to sing!
  •  
    Learn to sing online.
3More

Why should we check the accuracy of information on a web page? - 2 views

shared by Dennis OConnor on 01 Apr 09 - Cached
  • Try this interactive micromodule companion for a hands on experience in determining the accuracy of web-based information. Test your skills at: finding embedded evidence checking evidence for accuracy triangulation of data
  • The accuracy of factual information can help you judge the credibility of the author. Accuracy of information can also provide clues to possible bias in the resource under investigation.
  •  
    A one page overview of how to check the accuracy of information. Includes a link to an online learning game to help learn essential concepts.
6More

Vast Spy System Loots Computers in 103 Countries - NYTimes.com - 0 views

  • The malware is remarkable both for its sweep — in computer jargon, it has not been merely “phishing” for random consumers’ information, but “whaling” for particular important targets — and for its Big Brother-style capacities. It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed.
  • The electronic spy game has had at least some real-world impact, they said. For example, they said, after an e-mail invitation was sent by the Dalai Lama’s office to a foreign diplomat, the Chinese government made a call to the diplomat discouraging a visit. And a woman working for a group making Internet contacts between Tibetan exiles and Chinese citizens was stopped by Chinese intelligence officers on her way back to Tibet, shown transcripts of her online conversations and warned to stop her political activities.
  • “This could well be the C.I.A. or the Russians. It’s a murky realm that we’re lifting the lid on.”
  • ...2 more annotations...
  • “The Chinese government is opposed to and strictly forbids any cybercrime.”
  • two computer researchers at Cambridge University in Britain who worked on the part of the investigation related to the Tibetans, are releasing an independent report. They do fault China, and they warned that other hackers could adopt the tactics used in the malware operation.
  •  
    The malware is remarkable both for its sweep - in computer jargon, it has not been merely "phishing" for random consumers' information, but "whaling" for particular important targets - and for its Big Brother-style capacities. It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed.
« First ‹ Previous 141 - 160 of 169 Next ›
Showing 20 items per page