Skip to main content

Home/ educators/ Group items tagged keyboard

Rss Feed Group items tagged

Mary Quinn

Pen Mightier Than Keyboard for Making Imprint on Brain - 9 views

  •  
    Interesting article with interesting implications for today's youth. Study finds that handwriting is more effective than keyboarding in recall tests.
Claude Almansi

College-Made Device Helps Visually Impaired Students See and Take Notes - Wired Campus ... - 0 views

  •  
    "August 1, 2011, 5:51 pm By Rachel Wiseman College students with very poor vision have had to struggle to see a blackboard and take notes-basic tasks that can hold some back. Now a team of four students from Arizona State University has designed a system, called Note-Taker, that couples a tablet PC and a video camera, and could be a major advance over the small eyeglass-mounted telescopes that many students have had to rely on. It recently won second place in Microsoft's Imagine Cup technology competition. (...) The result was Note-Taker, which connects a tablet PC (a laptop with a screen you can write on) to a high-resolution video camera. Screen commands get the camera to pan and zoom. The video footage, along with audio, can be played in real time on the tablet and are also saved for later reference. Alongside the video is a space for typed or handwritten notes, which students can jot down using a stylus. That should be helpful in math and science courses, says Mr. Hayden, where students need to copy down graphs, charts, and symbols not readily available on a keyboard. (...) But no tool can replace institutional support, says Chris S. Danielsen, director of public relations for the [NFB]. "The university is always going to have to make sure that whatever technology it uses is accessible to blind and low-vision students," he says. (Arizona State U. has gotten in hot water in the past in just this area.) (...) This entry was posted in Gadgets."
Nelly Cardinale

VersionTracker - 0 views

  •  
    Instructions for resetting the PMU NOt PRAM in Powerbooks when Apple Firmware update goes wrong: Zapping the PRAM will not bring back your Bluetooth. You have to reset the PMU.(Power Management Unit) Mac OS X PowerBook G4 (12-inch), PowerBook G4 (12-inch DVI), PowerBook G4 (15-inch FW 800), PowerBook G4 (17-inch) and PowerBook G4 (17-inch 1.33GHz) 1. If the computer is on, turn it off. 2. Reset the power manager by simultaneously pressing and then releasing Shift-Control-Option-power on the keyboard. Do not press the fn (Function) key while using this combination of keystrokes. 3. Wait 5 seconds. 4. Press the power button to restart the computer.
Martin Burrett

Scribble Audio - 1 views

  •  
    An online music maker. Choose the note on the keyboard and then draw the melody on the screen.
Martin Burrett

Nitro Type | Competitive Typing Game - 9 views

  •  
    This is a fast, action packed typing game where you can race your car against other typists in real time online. Use your WPM to increase your MPH! Earn cash to buy upgrades. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Nelly Cardinale

Type Spanish accents online - 1 views

  •  
    Online page to help create spanish accents with the need for keyboard shortcuts
tmbellah

TypingClub - 13 views

  •  
    Beta version of simple, easy typing courses for students. Can be managed by instructors and organized by classes. I like it so far!
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Kathy Benson

Tar Heel Reader - 0 views

  •  
    free, easy to read, voice to text, books for special needs readers up to teenagers
  •  
    a collection of free, easy-to-read, and accessible books on a wide range of topics. Each book can be speech enabled and accessed using multiple interfaces (i.e. switches, alternative keyboards, touch screens, and dedicated AAC devices). The books may be downloaded as slide shows in PowerPoint, Impress, or Flash format.
  •  
    Free online books for beginning readers of all ages. Some content more appropriate for teenagers. Use the favorites feature to pick books appropriate for you students.
Vicki Davis

List of keyboard shortcuts for Word 2002, Word 2003, and Word 2007 - 0 views

  • Apply List Bullet CTRL+SHIFT+L
  • Bold CTRL+B or CTRL+SHIFT+B
  • Create Auto Text ALT+F3
  • ...7 more annotations...
  • Delete Back Word CTRL+BACKSPACE
  • Delete Word CTRL+DELETE
  • Hyperlink CTRL+K
  • Grow Font CTRL+SHIFT+. Grow Font One Point CTRL+]
  • Italic CTRL+I or CTRL+SHIFT+I
  • Paste CTRL+V or SHIFT+INSERT
  • Paste Format CTRL+SHIFT+V
  •  
    Cool page with a lot of neat hotlinks in Microsoft Word. I've highlighted some that I really like.
  •  
    Cool website with hotlinks -- great for teachers of Microsoft Word.
Georgina Pazzi

Creative Commons Search - 1 views

    • Ted Sakshaug
       
      Need to click a tab to see results.
    • Micah Sittig
       
      Thank you!
    • Georgina Pazzi
       
      Fabulous search engine for educators & students.
  • by Creative Commons
  •  
    A creative commons search engine.
  •  
    cc search for student projects
Adrienne Michetti

OLPC Human Interface Guidelines/Design Fundamentals/Key Design Principles - OLPC - 0 views

  • n which provides a low floor to the inexperienced, but doesn't impose a ceiling upon those who are.
  • tailored to the needs of children in the context of their learning
  • n activity ring that contains icons representing each instance of an open activity
  • ...15 more annotations...
  • limitations
  • mphasis on discoverability and usability
  • the actual behavior of the activities, the layout of the buttons and tools, and the feedback that the interface provides to the children when they interact with it
  • there is no substitute for user testing
  • imple doesn't necessarily mean limited
  • simple—even minimal—controls can have great expressive power.
  • a "fail-soft" approach to their designs
  • five categories of "bad things" software can do: damaging the laptop; compromising privacy; damaging the children's data; doing bad things to other people; and impersonating the child.
  • without the use of menus, pop-up boxes, passwords, etc., as these approaches are meaningless to most people.
  • no noticeable side-effects
  • When children know they have a fallback plan—a way back to the current state of things—they will much more frequently go beyond their comfortable boundaries and experiment with new tools and new creative means of expression
  • the ability to undo one's actions.
  • Interoperability
  • Towards this end, a view source key has been added to the laptop keyboards, providing them with instant access to the code that enables the activities that they use from day to day. This key will allow those interested to peel away layers of abstraction, digging deeper into the codebase as they learn.
  • (without a mouse or trackpad)
David Wetzel

Tips and Tricks for Podcasting - Part 3 - 14 views

  •  
    This is third and final installment on "Tips and Tricks for Podcasting" and focuses on GarageBand.
Megan Black

Best of free typing games - Typing games : improve typing skills - 27 views

  •  
    An awful lot of ads at the top of these; some of them encouraging them to download stuff. Think I'll pass on this one.
  •  
    I have the Adblock app from Firefox on all my student computers so they did not show up. This helps with a lot of free educational sites. You might want to give it s try. It installs quickly.
Vicki Davis

64 Things Every Geek Should Know - LaptopLogic.com - 1 views

  • Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing.
    • Vicki Davis
       
      Often the keylogger is a program on the computer, so don't think just looking for the hardware will find it!
  • Tor is an onion-routing system which makes it 'impossible' for someone to find out who you actually are.
  • See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux.
    • Vicki Davis
       
      FYI - as a person who has had to do this on a Windows computer - this often doesn't work!
  • ...3 more annotations...
  • Every geek should know how to recover the master book record.
    • Vicki Davis
       
      I did this last week! It saved me a TON of time!
  • There are computer service centers that would be happy to extract the data for a (hefty) fee; a true geek would be the one working at center, not taking his or her drive there.
    • Vicki Davis
       
      There are inexpensive programs that you can use to do this - it helped us with a personnel matter quite a few years back - I think every IT person should have such a program and every teacher should understand that it is possible for such a program to be used. I teach my students that everything ever saved on a hard drive can be retrieved - be careful.
  • Person to Person data sharing
    • Vicki Davis
       
      Uhm - that is peer to peer!
  •  
    Great article with many things people should know.
  •  
    Cool article that covers a lot of things that people should know - whether you mind being called a geek or not. Very interesting reading.
‹ Previous 21 - 40 of 42 Next ›
Showing 20 items per page