Tuesday, December 2, 2014

December 2nd In Class assignment

  1. From Safe Practices for Life Online: A Guide for Middle and High School (2008) - D. Fodeman & M. Monroe
b. Chapter 2 Protecting Your Privacy Online
i. Pop-ups and Banner Ads-A type of window that appears on top of (over) the browser window of a Web site that a user has visited. In contrast to a pop-under ad, which appears behind (in back of) the browser window, a pop-up is more obtrusive as it covers other windows, particularly the window that the user is trying to read. Pop-ups ads are used extensively in advertising on the Web, though advertising is not the only application for pop-up windows. (Webopedia)
ii. Spyware-software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. (TechTarget)
iii. Zombie and Botnets- A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. (TechTarget)
iv. Cookies- A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server. (Webopedia)
v. Drive-by-Downloads- A drive-by download refers to any download to a computer or device that occurs without the owner’s consent. A drive-by download may occur simply from visiting a website or opening an email. Drive-by downloads can be spyware, adware, malware or even a legitimate program that the user simply doesn't want. (Techopedia)
vi. Cramming- Any kind of fraudulent charges made to the telephone account of the victim, typically a small business or non-profit group, e.g. while claiming to provide web design or hosting for little or no charge. (dictionary.com)
vii. Trojan Horse- A term coined by MIT -hacker-turned-NSA-spook Dan Edwards for a malicious, security-breaking program that is disguised as something benign, such as a directory lister, archiver, game or (in one notorious 1990 case on the Mac) a program to find and destroy viruses! A Trojan horse is similar to a back door. (dictionary.com)

2. From Transforming Learning with New Technologies (2011) - R. Malloy, R.E. Verock-O’Loughlin, S. A. Edwards, & B. P. Woolf
a. Take Pew Internet & American Life Project “What Kind of Tech User Are You?” quiz. 
6/12 - You scored better than 48.8% of the public, below 32.6% and the same as 18.7%.
b. Uniform Resources Locator (URL) aka Web Address- What is the purpose of the following URL designations?
i. .com - Originally created to represent the “commercial” intent of a website, .com has since been at the epicenter of the digital revolution that has reshaped the way people work, live, play and connect with family and friends. (Verisign)
ii. .org - organization 
iii. ,gov - government 
iv. .net - network 
v. .edu - education
vi. .mil - military
c. Specialized Search Resources for Teachers 
1. Criteria for Evaluating Web Resources
a. Accuracy - reliability of the information on the site by providing a description of who authored the site and for what purposes
b. Authority - credentials of the author or the authors as well as the nature of the site itself- commercial or not for profit
c. Objectivity- tests whether the information on the site if fair and non-biased, and free of advertising
d. Currency - up-to-date with recent information and updates that are clearly indicated. 
e. Coverage- information on the site can be viewed easily without difficulties or commercial messages. 
ii.Internet Public Library 
iii. Voice of the Shuttle 
iv. Technorati 
v. Webopedia 
vi. Artcuclopedia 
vii. Encyclopedia of Educational Technology 
viii. California Learning Resources Network
ix. Library of Congress American Memory
x. University of Texas at Austin Perry-Castaneda Library Map Collection
xi. Newslink
xii. Good Search
xiii. Score (Schools of California Online Resource for Educators)
xiv. Search Engines 2
xv. Wayback Machine
xvi. Open Library 
xvii. viewzi.com
xviii. VueToo.com
d. Internet Search Tools for Students 
i. KidsClick!
ii. Ask for Kids
iii. Search 22
iv. Clusty
v. Yahoo!Kids
vi. QUintura
vii. FirstGov for Kids 
viii. NASA Kids Club
ix. The Why Files: The Science behind the News
x. U.S. Patent and Trademark Office Kids’ Pages
xi. Time for Kids
xii. Smithsonian Education

e. Questions 
i. What is the meaning of information literacy for teachers and students?
Teachers and Stundets need to be able to locate, evaluate, use and share information. (www.cslub.edu)

ii. What are search engines and how do they work? 
Search engines are the key to finding specific information on the vast expanse of the World Wide Web. Without sophisticated search engines, it would be virtually impossible to locate anything on the Web without knowing a specific URL. When people use the term search engine in relation to the Web, they are usually referring to the actual search forms that searches through databases of HTML documents, initially gathered by a robot.(Webopedia)
iii. What pieces of information do students need to know about Internet searching?
The Internet is an especially valuable research tool when you are looking for information that is current and updated often. You can find current data, as well as news on current events, on the Web. Many news web sites are updated many times each day. Most major newspapers, for example, have web sites that are updated throughout the day. The Internet is not the best place to find established viewpoints in their original form since it is often the case that information is changed from its original source. Information on the Internet is often second, third, even fourth hand. Published books remain the safest place to get established fact and opinion, especially if you are looking for traditional, mainstay ideas. (Centage)
iv. How can teachers and students thoughtfully evaluate online information resources, including the online encyclopedia Wikipedia?
You might be able to find current quotations from prominent public figures on the Internet, but if you are working in an area in which there are certain key thinkers, writers, theorists, and practitioners who have published fundamental work, it is best to go directly to those sources rather than relying on what is often second-hand reporting (or worse) on the Internet. (Centage)
v. How can teacher respond to problems of plagiarism when students use online sources? 

Plagiarism matters to educators because acts of plagiarism can undermine the student learning outcomes that they have for their courses. Approaching plagiarism as an opportunity for teaching and learning, rather than exclusively focusing on detection and punishment, has significant benefits for both students and educators. Discussions about plagiarism allow students and instructors to focus on understanding intellectual property, evaluating sources, engaging deeply with others’ ideas, and employing conventions for authorial attribution. (DePaul)

No comments:

Post a Comment