Monday, September 30, 2013

Do Not Track Me Plus, 12

After installing Do Not Track Me Plus, I realized just how scary the internet is if you do not use it properly or do not have the proper protection downloaded.  I visited Facebook and it blocked one company from tracking me.  I also went to blogger.com and it blocked three companies.  Another website I use quite frequently is Pinterest, and that was also tracking me with 3 companies and social networks.  Overall, I have a total of 18 blocked companies or social networks within just a few minutes of downloading this program.  I can only imagine the total number I will have in one day.

Thursday, September 26, 2013

Inspiration Comments, 11

Jacequeline: I liked how Jacequline's concept map was full of pictures and images. She was very comfortable in front of the class.  She incorporated several activities, and depending on the students in her classroom she may need to adjust the amount of activties and games she incorprates.

Mary Catherine: Her concept map was very simple, but effective.  She used two colors and had one image.  Her games and activities seemed to be very relative to her story. I liked how she provided an extra game for students who may finish activities quicker than others.

Jennifer: Her map was very creative and organized.  She used a few worksheets, and maybe could have incorporated more activities on the computer.  However, all her assignments and activities were engaging and exciting for the students.  I like how she used group work.

Amanda:  I like how Amanda integrated acting and drama into her lesson plan, as well as several other activities.  Almost every point on her concept map had pictures; maybe a few less images would make it appear even more organized.

Jordan: I really liked how she had someone come into the class and speak about their first hand experience in a hurricane.  I also, liked how she incorporated books, magazines, and a lot of other resources other than just the internet. She also used a hands-on experiment that I thought the students would enjoy and learn best from.

Johnathon: His concept map was very patriotic and went well with the subject area he was going to teach. I liked how Johnathon used groups to get students engaged and involved. He did use a lot of discussion and videos; he maybe could incorporate some first hand witnesses or more personal examples.



Tuesday, September 24, 2013

Concept Map- "Where the Wild Things Are," 10







R.L.2.7 Use information gained from illustrations and words in a print or digital text to demonstrate understanding of its characteristics, setting, or plot.

I.       I.  Read Along

Have students sit in the reading circle and listen carefully as we read the story, "Where the Wild things Are."  Begin by introducing the title and author and have them make predictions of what might happen.

A.             A. Introduce the author and title; ask students what they might think the story is about.

B.              B. Ask or suggest if is a good story

II.       II. Discuss Elements of a good story

Introduce to the students the key components of a good story. (Plot, Characters, Conflict, Theme, Setting)  Show the video that puts the parts of a story in a song. Explain that a setting of a story is where the story takes place.  Have the students give examples from the story. List and describe the main characters in the story. Discuss the problems and solutions from the story, and address the major theme.

A.           A. Explain what the settings, characters, events, problems, and solutions of a good story are.

B.            B. Give an examples of the setting and main characters in a story.

III.    III.  Create Diagram

Have students use this online graphic organizer to map out the elements of a good story.  Each element should branch off and refer back to the story, "Where the Wild Things Are." Encourage students to be creative and use color and pictures when creating the diagram.

A.           A. Create a bubble for every element we discussed.

B.           B. For each response report back to the question: "How does it tell us that?"

IV.  Illustrate Character
Encourage students to be creative and create their own wild thing by using this online tool.  Students will also come up with a name/ title for their wild thing, which will later be placed on a bulletin board.

A.             A. Use your imagination to create your own wild thing.

B.             B. Prepare & Print your photo and come up with title for your wild thing.

V.  Bulletin Board 

Students will write a sentence that expresses an emotion they often feel and how they respond to that emotion.  They will write the sentence on their printed out wild thing.

A.          A. Recall Max was feeling wild and that it caused problems.

1.              1. Ask: What are other ways you can feel?

B.          B. Have Students fill out: "When I feel (emotion), I (action) and then (this happens.)"

1.               1. Have students write sentence on their printed wild thing.

Monday, September 23, 2013

The Padagogy Wheel, 8

The Padagogy wheel consists of apps and activities that can be used for instruction in the classroom.  It gives examples of ways technology can be incorporated in the classroom.  This wheel can be easily incorporated into several lessons.  One example could be using animation creation after reading a story about animals and their habitat.  Another idea is to use creative book builder to recreate a story that was just read in class.  You could encourage creativity in the classroom, as well as, recognize whether the students comprehended the book that was read to them.  There are countless numbers of ways you can incorporate technology in the classroom, and this wheel narrows down some ways for you.  I find that this wheel will be very useful when coming up lesson plans in the future.

Safe Practices for Life Online, 9

1.  Facebook, Twitter, and Skype are three social networks that are used to form connections and relationships online.

2. There are several different consequences students are facing because of what they are posting on Facebook or any social network.  Consequences of death, expulsion, suspension, and arrest have been present.  There is controversy over where to draw the line between freedom of speech and also what the school's role should be.

3. Sexting is sending or receiving images, messages, or videos that portray sexual content or desires. (Teach Thought Staff, (2013). The Definition of Sexting)
Cramming is studying a massive amount of information in a short period of time. (Note, Kent, (2009). Cramming and Test Performance: An Investigation into the Efficacy of a Common College Practice. The University of Minnesota Undergraduate Journal of Psychology.)
Cookies are pieces of information that are sent to your computer from websites that allows them to obtain certain information from the user. (2013. Cookies Policy. Institutional Investor Journals.)
Trojan Horse is a malicious program that causes the most serious threat to security on your computer.  It is usually disguised, yet it can and will erase your memory on the computer, send out your passwords, or credit card numbers. (Lo, Joseph. (2012). Trojan Horse Attacks, Internet Relay Chat.)
Phishing is an online theft that includes the stealing of passwords credit card information. (Kirda, Engin. (2005). Protecting Users Against Phishing Attacks, Oxford University Press)
Spyware is a monitoring program that records the usage of the computer. (Stafford, Thomas (2004). Spyware: the Ghost in the Machine, Communications of the Association for Information Systems.)
Rootkit is a type of software that is used to retrieve information and gain control over the computer. (Vlad, Marius. (2011). Rootkits and Malicious Code Injections. Journal of Mobile, Embedded and Distributed Systems.)
Zombie is a computer network that is being hacked, and most owners do not know. (Smith, Josh. (2013). New Partnership Aims to Combat Zombie Computer Networks, National Journal.)

4. The screen names: Trashmouth, iHaveOnePairPants, BoogerDude, and Pig all portray a negative message.  They are all very unprofessional and are asking for negative attention.

5.  Certain screen names can encourage others to treat students badly.  The screen names here can also come across as someone seeking attention or a relationship.  These screen names can lead to students getting taken advantage of.

6.  The screen name Tom_Evans34 reveals his first and last name, as well as the individual's age.  Missy-13 also gives too much information, such as her first name and maybe her age.  AndyKarateKid reveals his first name and also his love for karate. ViolinGurl tells others that she loves to play the violin.  Restlinmatch reveals his love for wrestling.

7. Majority of the screen name choices given are bad choices because they give out too much information.  Alot of them give either a name, birth year, or are likely to attract negative users.  Some decent choices may be Soccerstar, Puppygirl1234, or SimplyMe because they do not give away too much information, and they simply reveal the interests of the individual.

8. squid3, EducationTTT, ecal6

9. Passwords can be easily cracked, if they are not unique.  It is important when creating a password to add numbers, symbols, and capitalization to keep a password original. I scored a 6 after answering the questions about how secure my password is.

10. The most common reason students' online accounts are broken to each year is most likely because they give their password out to friends, who then decide to use it or give it to others.  The least likely reason is because other students see the password as the student enters it on a keyboard.

11. After watching the video, I came to realize the importance of anti-virus software.  It is very easy for a computer to be infected, even if viewing a familiar website. Websites can commonly send dangerous infections to your computer without the user even knowing.  This is why it is important to keep up with anti-virus software and updates.
 To lessen the chances of your computer getting infected you can and should follows a few key steps.   Keep up with patches, harden your web browser, block dangerous file types at your firebox,  and use anti-virus and anti-spyware software are things that can be done in defense for virus or malicious codes.  The video showed me just how easy it is to get infected websites.  I find that keeping up with anti-virus software is the easiest way to protect your computer from any viruses or infections.  Also from the video they showed some signs that may mean your computer is infected.  First, if your computer as any unusual apps or icons on the main screen.  Secondly, if the background of computer has changed on its own; or a different web homepage.  By staying informed and keeping up with your computers software updates you can help  prevent infection and malicious codes.

12. The first quiz I took was called, "Are you protecting your identity?"  The results of this quiz showed I was about average as far as protecting my identity.  I was a medium risk level.  The second quiz I took was called,"Is your computer protected?" After this one, I found that I was more at risk than average.  The third and last quiz I took was called, "Are you safe from financial fraud?"  This quiz showed that I was at a low risk.

13.  I chose to read and summarize the article SPAM: DELIVERING MALWARE AND ADVERTISING DANGEROUS COUNTERFEIT GOODS. The article addressed the issues with spam and how you could best deal with spam email.  The first thing to do is to report the email, and make sure to never respond to emails that ask for personal information.  Secondly, never purchase products from spam emails. Lastly, do not click on any of the provided links given in a spam email.  These links can contain malware and will take control of your computer.
Cyber criminals have used spam emails as a means to make money and infect computers for a long time.  Now, spam emails are being sent that look or appear trusted, but in actuality they are not.  Mobile phones and devices are also commonly being used to send text messages or harvest information from the contact list. Emails such as these, aim to retrieve personal or financial information that can interact badly with your computer system.

The article addressed the new coming problems with spam.  

Tuesday, September 17, 2013

Common Core State Standards for ELA and Literacy, 6

What is the purpose of the college and career readiness?
College and career readiness is suppose to prepare students for future education.  Students will need to learn to do independent research and writing and to be social adapt in conversation.

What are the benefits and challenges of the shift reading and writing nonfiction texts?
Reading literature and informational text are the two categories that are implemented help students read more complex text.  The standards call for reading to be taught over all subjects, where students read more informational and complex text. 

What are the benefits and challenges of having standards for Science, Social Studies, and technical subjects?
The standards for Science, Social Studies, and technical studies are rigorous, more performance based, require you to apply knowledge, and embed assessments over instruction.  The standards will help students to learn to think on their own. However, the standards may place too much restriction and control on content and how the teacher chooses to teach lessons.  Also, the assessments are too difficult for children, that it discourages them.

Tuesday, September 10, 2013

Use Arts Integration to Enhance Common Core, 7


In November of last year, an article was written that addressed ways in which arts could be integrated to enhance Common Core.  Integration itself requires extensive research and collaboration from the teachers.  As far as for the students, it also demands creativity and collaboration.  This approach to teaching has been overlooked many times, yet it draws many parallels to the Common Core that could be incorporated in the classroom to make this implementation more beneficial.  The Arts Integration approach engages students and provides relevance to students learning.  It also opens the opportunity for students to connect their world to the classroom, making it more enjoyable.  Arts Integration could be a building block for teachers who are struggling to implement Common Core in the classroom.  The article stresses that strategies for Arts Integration can be implemented quite quickly in the classroom.  Collaboration between arts and classroom teachers, using an arts area in which the teacher is comfortable, creating a lesson that teaches to both standards, and assessing both areas equitably are some strategies this article suggests for implementing Arts Integration in the classroom.

After reading this article, I found that implementing Arts Integration in the classroom could be very beneficial.  An Arts Integration allows students not only to be creative, but also learn how to think on their own and make their own connections.  As stated in the article, “Arts Integration allows us to build chefs who make choices—not cooks who merely follow the recipe.”  I found this quotation very applicable to the Common Core’s goal of teaching students to think critically rather than spit back information.  It is essential for students to learn how to think.  Teaching students how to memorize information does not teach them anything.  It is vital to engage the student’s curiosity and encourage creativity in the classroom.  By implementing an Arts Integration, students can learn in ways that meet not only their intellectual needs, but also their cultural, social, and emotional needs.

Thursday, September 5, 2013

John Hunter and the World Peace Game, 5

John Hunter talks on the TED show and expresses his inspiration as a public school teacher.  He was hired as a gifted teacher, where he was given no standards or guidelines of teaching.  Upon getting hired, he asked the super attendant, "What do i do?" and her response was, "What do you want to do?" With this response he used his imagination and creativity to teach his children.  He came up with the World Peace Game.  This game was four dimensional and included outer space.  The purpose of this game was to let students see if they could solve the problems of Africa.  He used this game as a means of engaging the students and getting them involved in hands- on learning.  In the game students learn to think in long term consequential way.  He lets the students run the game; he is only the facilitator.  He claims, "The students collective wisdom is greater than mine." Every game takes it own path; some are focused more on welfare, some are more about social skills.  Each game teaches something different.

It was inspiring and motivational to see the way John Hunter approaches education in his classroom.  His method of teaching children was totally different than anything I have ever seen or heard of before.  However, I find this World Peace Game that he incorporates in the classroom very effective for his fourth grade gifted students.  They not only learn about the world and the problems of the world, but also they understand the importance of working together and solving issues as a whole.  Everything they learn can be related to real life.  These fourth graders are learning about the world and outside sources that most students are not exposed to.  They are self motivated and actually want to learn. John Hunter is teaching children how to think, and to think deeper.  I think that John Hunter's method of teaching was inspirational, and I find that incorporating creativity in the classroom is essential for students learning.