Skip to main content

Home/ educators/ Group items tagged manuals

Rss Feed Group items tagged

carlos villalobos

QCad User Reference Manual - 1 views

  •  
    QCad User Reference Manual
Vicki Davis

Wissahickon School District: WHS Graduation Project - 5 views

  •  
    I'll be spending time to AJ Juliani, Steve Mogg and Rosie Esposito from Wissahikon school district. Here's a copy of their Graduation project required to graduate from their school. I think all schools should have graduation projects. There is information and manuals if you want to look into this for yourself. I saw this in Evansvlle High school as well. This can be part of your genius work. "As part of graduation from Wissahickon High School, every senior is required to complete a graduation project.  The projects include research, writing and an oral presentation to assure that students are able to apply, analyze, synthesize and evaluation information and communicate significant knowledge and understanding.  This is culminating project in one or more areas of concentrated study under the guidance and direction of the high school faculty. "
Vicki Davis

Download your free 12 Games of Christmas Teaching Pack - TES Topics - 0 views

  •  
    Here's the content of the 12 games of Christmas teaching pack. NOTE: IF you download, you will probably have to manually enter your school's information, especially if you are from outside the UK as many of us are just coming into the TES platform now.
Vicki Davis

Microsoft's photo and movie making apps revealed ahead of Windows 8.1 release | The Verge - 7 views

  •  
    Here comes Windows 8 with a lot of new settings. These are talking about the Windows phone updates but other updates are on the way. "While Windows 8.1 adds a lot of features and improvements across the OS, the built-in apps include some of the biggest changes. Microsoft is detailing a few of the more creative ones ahead of the Windows 8.1 release tomorrow. The photos app in Windows 8 included Facebook and Flickr integration, but the Windows 8.1 version drops that in lieu of some improvements to editing. You can now select auto fix for a selection of different corrections, and there's also manual cropping, red-eye removal, retouch, and other basic contrast and brightness settings. One of the more interesting features is color enhance that lets you pick an area of a photo to brighten up or darken areas of photos."
carlos villalobos

EduwearKit_manual_oct_2010_de.pdf - Google Docs - 2 views

  •  
    Manual de programación en bloque de Arduino
yc c

GeoNames - 9 views

  •  
    The GeoNames geographical database is available for download free of charge under a creative commons attribution license. It contains over eight million geographical names and consists of 7 million unique features whereof 2.6 million populated places and 2.8 million alternate names. All features are categorized into one out of nine feature classes and further subcategorized into one out of 645 feature codes. (more statistics ...). The data is accessible free of charge through a number of webservices and a daily database export. GeoNames is already serving up to over 11 million web service requests per day.GeoNames is integrating geographical data such as names of places in various languages, elevation, population and others from various sources. All lat/long coordinates are in WGS84 (World Geodetic System 1984). Users may manually edit, correct and add new names using a user friendly wiki interface.
Nik Peachey

Why ebooks should be cheaper and how to get my book for free - 2 views

  •  
    In an effort to counteract this I would like to make my ebook Digital Video - A manual for language teachers freely available to anyone without the means to pay for it who is willing to help me with a little research project.
  •  
    I added a link in the language section of my Free HS Textbooks collections. Suggestions welcome. http://www.textbooksfree.org/Free%20HS%20Textbooks.htm
Kelly Faulkner

The First Unofficial Guide to Dropbox [Save PDF or Read Online] - 25 views

  •  
    a guide to using the free online storage at dropbox.com.  if you don't have an account yet, here is an invite:  http://www.dropbox.com/referrals/NTE3MDMxNTE5?src=7 you can increase the basic storage by inviting other users. i have all my school files stored there, including all video! it's a great service :O)
  •  
    This is useful... Thanks for sharing!
Nelly Cardinale

Linux End User Training Material - Presentation Slides - UNDP-APDIP International Open ... - 0 views

  •  
    Free Power Point Slide shows with instruction on using any version of LInux, created under a Creative Commons License. You can open them with POwerPoint or impress in Open Office.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
anonymous

Bloom's Taxonomy of Learning Domains - 3 views

  •  
    There is more than one type of learning. A committee of colleges, led by Benjamin Bloom, identified three domains of educational activities: - Cognitive: mental skills (Knowledge) - Affective: growth in feelings or emotional areas (Attitude) - Psychomotor: manual or physical skills (Skills)
David Warlick

Reggio Emilia approach - Wikipedia, the free encyclopedia - 4 views

  • Children must have some control over the direction of their learning; Children must be able to learn through experiences of touching, moving, listening, seeing, and hearing; Children have a relationship with other children and with material items in the world that children must be allowed to explore and Children must have endless ways and opportunities to express themselves.
    • David Warlick
       
      This is all very familiar yet rarely expressed so succinctly.
  • In the Reggio approach, the teacher is considered a co-learner and collaborator with the child and not just an instructor.
  • Teacher autonomy is evident in the absence of teacher manuals, curriculum guides, or achievement tests
  • ...7 more annotations...
  • integration of each classroom with the rest of the school, and the school with the surrounding community
  • children can best create meaning and make sense of their world through environments which support "complex, varied, sustained, and changing relationships between people, the world of experience, ideas and the many ways of expressing ideas."
  • In each classroom there are studio spaces in the form of a large, centrally located atelier and a smaller mini-atelier, and clearly designated spaces for large- and small-group activities.
    • David Warlick
       
      A workshop or studio especially for an artist, designer or fashion house.
  • Reggio teachers place a high value on their ability to improvise and respond to children's predisposition to enjoy the unexpected.
  • Regardless of their origins, successful projects are those that generate a sufficient amount of interest and uncertainty to provoke children's creative thinking and problem-solving and are open to different avenues of exploration
  • teachers in Reggio Emilia assert the importance of being confused as a contributor to learning; thus a major teaching strategy is purposely to allow mistakes to happen, or to begin a project with no clear sense of where it might end.
  •  
    The Reggio Emilia Approach is an educational philosophy focused on preschool and primary education. It was started by Loris Malaguzzi and the parents of the villages around Reggio Emilia in Italy after World War II. The destruction from the war, parents believed, necessitated a new, quick approach to teaching their children. They felt that it is in the early years of development that children are forming who they are as an individual. This led to creation of a program based on the principles of respect, responsibility, and community through exploration and discovery in a supportive and enriching environment based on the interests of the children through a self-guided curriculum.
Ruth Howard

Inanimate Alice - iStori.es - 0 views

  • iStori.es is a supremely easy-to-use story-telling device that requires no manual.
  • Cut, blend, fade in, push. These cinematic features and many more are available on iStori.es.
  • Inanimate Alice is told in episodes, each one a complete story. However, we are excited by the possibilities for participation created by our tool, iStori.es. Alice can't wait to see how you and your students mash-up and create your own stories! Join our growing community; selected stories created with our tool will be showcased on 'What's your story?'.
  • ...1 more annotation...
  • The best stories that you share with us will be uploaded to our showcase for everyone to enjoy.
  •  
    I've only just discovered Inanimate Alice-here's the software. Incredibly vibrant resource and links to Inanimate Alice.Gob dropping!
Maggie Verster

Technology Tools to Get Teachers Started - 0 views

  •  
    Where do you start learning how to integrate technology into your classroom as well as how to use it for your ongoing professional development? And how do you stay current with the almost daily changes in the technology landscape? This page give a good overview of how to get teachers going.
Martin Burrett

If Technology Fails, Use Basic Math Skills - Count Manually!! by @johnkaiser13 - 0 views

  •  
    "Technology has inevitably been inserted to nearly all aspects of our lives today. First and foremost, the use of computerised cash registers have been around for a few decades now. Trying to remember cash registers which operated without a digital display might be nearly impossible. The generation which might be able to do so has been replaced with a new generation who depend on technology to a large degree. The dependence on new technology is starting to 'show signs' of the effect of converting from our analogue counterparts. Below is an example that I recently experienced the effect of technology in a transaction at a doughnut shop."
1 - 20 of 20
Showing 20 items per page