Skip to main content

Home/ Classroom 2.0/ Group items matching "protection" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Martin Burrett

QRJumps - 0 views

shared by Martin Burrett on 05 Jun 12 - Cached
  •  
    A clever QR code generator that lets you change the link behind the code, add expiry dates and password protect links. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
fabrizio bartoli

Features - Gobby - 0 views

  •  
    "Features Realtime Collaboration through encrypted channels (version 0.4.0 and up) Provides local group undo (version 0.4.90 and up) Shows cursors and selections of remote users (version 0.4.94 and up) Each user has its own changeable colour to be identified by others IRC-like chat for communicating with your partners while coding Syntax highlighting for most programming languages Session password protection Multiple documents in one session Drag'n'drop of documents into Gobby Document synchronisation on request Zeroconf support Unicode support Cross-platform: runs on Microsoft Windows, Linux, Mac OS X"
Peter Horsfield

Richard Zimmerman - Extraordinary People Changing the Game - 0 views

  •  
    Meet the extraordinary philanthropist and animal activist who is most famous for being the founder of Orangutan Outreach, one of the largest animal conservation organizations in the world today,Richard Zimmerman. Aiming to not just protect and save the orangutans from extinction but also to get more people involved through the internet and other forms of media. "People have a strong voice via social media". To read more about Richard Zimmerman visit www.thextraordinary.org
Peter Horsfield

David Bellamy - Extraordinary People Changing the Game - 0 views

  •  
    Meet the extraordinary world-renowned author, environmental campaigner, botanist and former broadcaster who is most famous for his numerous television shows in BBC in the seventies and eighties, as well as his activism against the theory of global warming, David Bellamy. Throughout his career, he has been significant in promoting environmental care and protection. "When I see that the truth is being covered up I have to voice my ­opinions". To read more about David Bellamy visit www.thextraordinary.org
shoaibhashmi

Hotspot Shield Elite Crack 2015 with Keygen Full Download - 0 views

  •  
    Hotspot Shield Elite Crack 2015 is world widely used by users to protect their network from different malicious attacks, it has many working abilities that
shoaibhashmi

Trend Micro Antivirus+Security 2015 Crack Serial Full Download - 0 views

  •  
    Trend Micro Antivirus+Security 2015 Crack allows you pure protection against malicious attacks that destroy your computer performance. Trend Micro is one of
Dorothy Hastings

Eye Injuries: Tips to Protect Your Child from Them - 0 views

  •  
    It's important to take proper care of your child eye vision. Read this blog to know some important eye injuries prevention tips.
Dwayne Abrahams

Easy Duplicate File Finder | File Management Download | PCWorld - 17 views

  •  
    "Use your PC long enough, and it will get littered with duplicate files of all kinds. Graphics files, .doc files, media files, .dll files, you'll be amazed at how many duplicates you have. They clog up your hard disk, take away precious hard disk space, and make it hard to find the files you want. This simple freebie will find duplicate files, then let you delete the ones you don't want. Point it at your hard disk or selected folders, and it goes to work, finding duplicates. It then gives you a full report, and lets you clean them en masse, or just selected ones. There's some nice intelligence built in as well. It tells you how much disk space duplicate files take up, for example, and lets you protect system files so that you don't accidentally delete any important files your PC needs in order to run properly. "
Jim Farmer

How to Get a Classroom of Kids Blogging in Under 5 Minutes! - 47 views

  •  
    designed by teachers for teachers. They have made the process of creating and monitoring a class blog safe and efficient. Sign-ups are fast and simple, making it easy to co-ordinate a whole class of new students. At the same time, the blog's privacy and security is protected by default. This makes life incredibly easy for the teacher, allowing you to get straight in to the fun bit of blogging!
anonymous

Bill Kerr: cotton wool culture - 0 views

  •  
    Society is too protective of children. Bill writes on the cotton wool culture.
Sheryl A. McCoy

n2teaching: Lives of Teachers: Public or Private? - 0 views

  •  
    a multi-dimensional concern for teachers and the communities where they teach and live;D
  •  
    Because the internet is interactive, it seems that no problem can be solved in a 20th century manner. As we learn more about how to protect ourselves from identity theft, we need to teach our communities. All teachers, young and old, deserve enough respect to be allowed to defend their honor and not be condemned without due process.
Jeff Johnson

PBwiki (Free wiki | Business - Education - Personal) - 0 views

  •  
    PBwiki lets you quickly set up your own free, hosted, password-protected wiki to edit and share information. It's as easy as a peanut butter sandwich.
Tom Daccord

Woophy - About - 1 views

  •  
    Woophy stands for WOrld Of PHotographY, a website founded by a Dutch collective of photo aficionados and internet designers who believe navigation on internet can be more visual, logical and associative. The goal of Woophy's founders is to create an accessible, visual, current, democratic and collective work of art comprised of a database picturing our remarkable world. With the help of (amateur) photographers across the world we strive to ultimately cover every inch of our world map with images that represent the world's beauty and peculiarity from all different cultural perspectives. Users upload their photos into a free personal account protected by a password, or download pictures for personal use. User email addresses and passwords are not shared with any third parties whatsoever.
Steve Ransom

Digital Literacy | Common Sense Media - 0 views

  •  
    June 2009 Report by CommonSenseMedia "Digital Literacy and Citizenship in the 21st Century: Educating, Empowering, and Protecting America's Kids," proposes eight key initiatives to develop a national digital literacy program and integrate it into our educational curriculum. This white paper is meant to be a "living document" and will be updated on a regular basis.
bethany rebecca

What is boot disk , and how to create it - 0 views

  •  
    A boot disk will allow you to boot from the deskette in place of your hard disk. This deiskette can be used to fix problems that may come during the lifetime of your computer. After creating the boot dsekette write protect the diskette so that viruses would not be able to infect your computer
bethany rebecca

What is boot disk , and how to create it - 0 views

  •  
    A boot disk will allow you to boot from the deskette in place of your hard disk. This deiskette can be used to fix problems that may come during the lifetime of your computer. After creating the boot dsekette write protect the diskette so that viruses would not be able to infect your computer create a boot disk create boot disk creating boot disk how to create boot disk make boot disk win xp boot disk windows xp boot disk xp boot disk
Judy Robison

Estuaries.Gov - Inspiring People to Practice and Promote Coastal and Estuarine Stewardship - 0 views

  •  
    advance estuarine and coastal literacy. Explore these living classrooms and laboratories - our estuaries -, discover their importance and beauty, and learn what you can do to protect them
Judy Robison

Identity Theft Resource Center | A Nonprofit Organization - 12 views

  •  
    "Identity theft can affect everyone, including teenagers. It is important for you to know what information is needed to steal your identity and the best ways of protecting your information. Your information, in the wrong hands, can 'jack your life!' Identity theft is when someone uses your information for their gain. Thieves can use information about you, such as your social security number, to open up fraudulent credit cards, get student loans, and even get out of traffic tickets. Because of this, it is important to be knowledgeable when giving out any personal information about yourself, including people you trust. This information includes your social security number, driver's license number, state ID number, any banking information or your student ID number. This type of information should only be given out when it is absolutely necessary. In Teen Space you will find suggestions and information on the topic of Identity Theft. As well, we have lesson plans, games, and a video on identity theft.…"
Paul Beaufait

An Intellectual Property Primer for Online Instructors - 50 views

  •  
    Main sections include: Copyright and Fair Use, The TEACH Act, Academic Traditions in Intellectual Property, Protecting your Intellectual Property, Using Other People's Property, and a Conclusion (sidebar)
« First ‹ Previous 41 - 60 of 165 Next › Last »
Showing 20 items per page