Skip to main content

Home/ educators/ Group items matching "requirements" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
John Evans

THe Digital Natives Debate: A Critical View of the Evidence - Draft - 0 views

  •  
    The paper presents and questions the main claims made about digital natives and analyses the nature of the debate itself. We argue that rather than being empirically and theoretically informed, the debate can be likened to an academic form of a 'moral panic'. We propose that a more measured and disinterested approach is now required to investigate 'digital natives' and their implications for education.
Anne Bubnic

New U.S. Research Center to Study Education Technology - 0 views

  •  
    Congress has authorized a new federal research center that will be charged with helping to develop innovative ways to use digital technology at schools and in universities. The National Center for Research in Advanced Information and Digital Technologies was included as part of the latest reauthorization Requires Adobe Acrobat Reader of the Higher Education Act, approved last month. President Bush signed the law on Aug. 14. The center will be charged with supporting research and development of new education technologies, including internet-based technologies. It will also help adapt techniques already widely used in other sectors, such as advertising and the military, to classroom instruction.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Jeff Johnson

Washington State: More Algebra a Must - 0 views

  •  
    The state Board of Education voted Thursday to require all high-school students to pass algebra II to graduate, and it agreed to work toward raising other graduation requirements as well. Board members have been discussing, for example, whether to increase the number of classes students would have to complete to earn their diplomas, essentially making the list equal to what they''d need to apply to public, four-year colleges in Washington. That would mean additional classes in English, science, foreign language and more.
Jeff Johnson

Differentiated Instruction (CAST) - 0 views

  •  
    Not all students are alike. Based on this knowledge, differentiated instruction applies an approach to teaching and learning so that students have multiple options for taking in information and making sense of ideas. The model of differentiated instruction requires teachers to be flexible in their approach to teaching and adjusting the curriculum and presentation of information to learners rather than expecting students to modify themselves for the curriculum. Classroom teaching is a blend of whole-class, group and individual instruction. Differentiated Instruction is a teaching theory based on the premise that instructional approaches should vary and be adapted in relation to individual and diverse students in classrooms.
Ben W

MapFling™ - 0 views

shared by Ben W on 24 Jun 08 - Cached
  •  
    create a new map, mark it and share it. No log in required
  •  
    An easily editable map service utilizing Google Maps. Allows you to create custom markers and labels for a map and share it with a short URL.
Emily Vickery

Bloom's Taxonomy Blooms Digitally | 21st Century Connections - 0 views

  • Bloom's Taxonomy Blooms Digitally The skills required for the digital age give new relevance to the list of skills that we learned back in the old days.
Brian C. Smith

Technology Literacy - 0 views

  • workplace
    • Brian C. Smith
       
      Will all students work in a "global workplace"?
  • NY State Basic Education Data System (BEDS) requires information on computer literacy for federal reporting.
Brian C. Smith

Technology Literacy - 0 views

    • Brian C. Smith
       
      What is is "technology related foundation"?
  • At the high school level, there are a variety of technology application courses and some career and technology applications courses that can fulfill the requirement for one credit in technology applications required for graduation.
    • Brian C. Smith
       
      Who wrote this?
  • reveled
    • Brian C. Smith
       
      revealed?
Vicki Davis

CSTA National Secondary School Comparison of 2007 and 2005 Results - 0 views

  •  
    Current comparisons of computer science and introductory computer science courses from the Computer Science teachers Association. I find it interesting that only 33% of schools require such a course and that the #2 choice for professional development for Computer Science teachers is now online networking.
  •  
    Interesting results comparing the last two years of computer science teachers association surveys.
Vicki Davis

Samsung's Hope for Education - Win $200,000 for technology - 0 views

  • Each year, Samsung's Hope for Education holds a contest where students from schools nationwide can write a 100-word essay about how technology benefits and helps education. In 2008, the top winner receives a grand prize of over $200,000 worth of Samsung technology, Microsoft software and cash grants from DIRECTV, as well as the SCHOOL CHOICE® educational television programming package. Entries are open now. Contest will run until August 31, 2008.
  •  
    This is a cool grant requiring a 100 word essay about how technology benefits and helps education and is one I'll be doing in the fall -- it is only open to schools in the US but it is public and private -- check the website for rules and good luck. Info from their site: "Each year, Samsung's Hope for Education holds a contest where students from schools nationwide can write a 100-word essay about how technology benefits and helps education. In 2008, the top winner receives a grand prize of over $200,000 worth of Samsung technology, Microsoft software and cash grants from DIRECTV, as well as the SCHOOL CHOICE® educational television programming package. Entries are open now. Contest will run until August 31, 2008."
  •  
    win a $200,000 grant by having your students write essays. This is exciting.
Vicki Davis

Tales of an Inner-City Teacher: Crunch Time.... - 0 views

  •  
    Exciting description of a wonderful individual research project at the elementary level with limited resources and a very hard working teacher.
  •  
    I love the pictures on this blog showing the students using the computer, on the floor... everywhere, working on individual research projects. (Got to this blog to see the final products.) At first I said, "display boards?" but then I realized the amount of computer work required to create these display boards and I saw the age of the students and the number of computers in this classroom. This is a tremendous amount of work. Applause here from me to Kristi, another teacher blogger who I "met" from yesterday's post (hey go back to yesterdays and leave yours!)
Vicki Davis

K12 Online Conference 2008 | K12Online08 Call for Proposals: Amplifying Possibilities - 0 views

  •  
    Time for K12 online conference proposals: "We are pleased to announce the call for proposals for the third annual "K12 Online Conference" for educators around the world interested in the use of web 2.0 tools in classrooms and professional practice. This year's conference is scheduled for October 20-24 and October 27-31 of 2008, and will include a pre-conference keynote during the week of October 13. The conference theme for 2008 is "Amplifying Possibilities." Participation in the conference (as in the past) is entirely free. Conference materials are published in English and available for worldwide distribution and use under a Creative Commons license. Some changes in the requirements for presentations are being made this year and are detailed below. The deadline for proposal submission is June 23, 2008. Selected presentations will be announced at NECC 2008 in San Antonio, Texas, USA on July 2.
  •  
    K12 online 2008 call for proposals.
Dean Loberg

Education Week's Digital Directions: Building Gaming Into Science Education - 0 views

  • "I've had teachers tell me,” says Eklund, “that after they introduced the game to their students, the classroom went completely silent because all of the kids were just reading." "You just don't get that kind of engagement and involvement with the story" with a textbook, he says.
    • Brian C. Smith
       
      Is this because of the visual appeal or the storyline? I can see this happening, but does silence mean high levels of engagement?
    • Dean Loberg
       
      Assuming that they are not sleeping I think it does mean engagement, but engagement does not equal education. It depends on the content as well.
  • A report written by researchers about The River City Project for a 2006 conference concluded "that students learned biology content, that students and teachers were highly engaged, that student attendance improved, that disruptive behavior dropped, that students were building 21st-century skills in virtual communication and expression, and importantly, that using this type of technology in the classroom can facilitate good inquiry learning."
    • Brian C. Smith
       
      Is this limited to only the River City Project alone though? How does it promote more inquiry, problem and project-based learning in other content?
  • ...4 more annotations...
  • "I'm in a unique situation where there's a computer at every lab table," he says, pointing out that many teachers do not have that ratio of students to computers.
  • when the games don't work properly, but most teachers don’t have that level of technical skill, she points out.
  • "There are little things you need to know," she says, to keep the games running smoothly. "[Otherwise], it's not going to work in the classroom, and teachers aren't going to use it."
  • "If [the game] doesn't have a focus or clear reason for what they're doing, it really doesn't work," says Pokrzywinski. Adapting games to the curriculum is possible, she says, but it takes time—something many teachers don't have.
  •  
    Science and gaming
  •  
    Science and gaming
Jerry Swiatek

Zoho Challenge - Online test tool - 0 views

  •  
    It's smarter. It's online. Discover a smart way to conduct online tests and saving time and effort. Welcome to Zoho Challenge, an online testing tool that smoothly tackles your test requirements with smart, friendly interfaces.
Vicki Davis

Think.com - Safety & Netiquette Lesson - 1 views

  • Identify and provide examples of proper and improper netiquette; Generate a list of preferred web behaviors for their class; Understand and use a few Think.com content creation tools; Define "safety" and describe/draw an environment that values safety; Develop a greater sense of personal responsibility and web community; and Define the following words: accountable, community, enforcement, environment, etiquette, inappropriate, law, netiquette, private, responsible, rule, safety.
  •  
    Think.com's safety lesson with nets standards. Think.com is excellent to use with younger students and is very walled and has an excellent profanity filter. I highly recommend it and have personally used it for a summer blogging project. Excellent site. It also requires an extensive verification process by the participating schools.
  •  
    Excellent digital citizenship lesson from Think.com and oracle.
John Maklary

MailCatch.com: Free, Temporary, Anonymous and Environment Friendly Mails - 0 views

  •  
    This is a great site for temporary email addresses for students -- perfect for signing your students up with a web 2.0 service that requires an email address.
Anna Adam

Education Week: Smart Thinking About Educational Technology - 0 views

shared by Anna Adam on 08 Apr 08 - Cached
  • Too many advocates rely on weak arguments, such as “students are digital natives, so we should use more technology,” as if schools should have used radio and TV more often when earlier generations grew up with those media.
    • Anna Adam
       
      I have a problem with the analogy that schools in the past should have used more radio and TV comparing to now with technology. That's apples and oranges. Or at least tangarines and oranges. The majority of jobs today require the use of technology. Even cashiers at Walmart! Not so for radios and TV in the past. We're not using technology because our kids are growing up with that media. We're using technology because our kids are growing up REQUIRING that media.
Vicki Davis

Setting up your PLN - Horizon Project 2008 - 0 views

  •  
    Today on horizon, my students set up their PLN (personal learning network) in their RSS reader -- we use Netvibes although some switched to Google reader. Here is how I will assess this: I am assessing the students on this by having them print the page out and turn it in -- I'm also checking over their shoulders in lieu of printing -- but I may not get to everyone. -- In this blog post, I've REQUIRED 6 things on the page -- each is worth 10 points -- with 2 of those points being for a properly edited title in Netvibes (so that they may see what is what!) -- and then I have them find at least four additional sources of information for another 10 points each. Knowing how to set up a PLN for a topic of study is a VITAL skill for the 21st century researcher. I like Netvibes because it is very simple -- one page interface.
  •  
    Best practice on setting up a PLN as done for the horizon project 2008.
« First ‹ Previous 221 - 240 of 240
Showing 20 items per page