Sunday, September 29, 2013

11. Do Not Track Me Plus

Wow, is the only word that comes to mind. I did not realize how much I was being tracked through out my daily searches within the Internet. I usually like to keep up to date on world news involving our country and military. With this said, just from one search to CNN news website I had 15 trackers. As I continued my search I became more aware of how the number of trackers was rising. I am really grateful to my instructor for introducing me to this site to make me more aware of what goes on through daily uses of the Internet.

Tuesday, September 24, 2013

10. Concept Map- Understanding Place Value





Understanding Place Value

Numbers and Operations in Base Ten. (Understanding Place Value.) 1. NBT 2a-3


I.       USE OF BASE TEN BLOCKS


The use of base ten blocks will provide the students with rough material to better understand the meaning of place value. The blocks also allow students to visual each place value individually. In the game it easily provides the students with capability of identifying the ones and tens value.


A.    Understanding two number digits


B.    Number digits represent amounts of tens and ones. children will count the blocks then choose the correct response.  


II.     ODD OR EVEN


The odd or even activity helps children learn to place numbers in order. for example, wether the number one should be placed before or after the number two. In this activity the game of shooting the fruit consist of identifying if its odd or even. Another good way to show the activity is that you could display on your board/smart board "nn nn n" and have the students identify wether the pattern is odd or even. In this case the pattern would be odd. 


A.    Identify a pattern of numbers in the game.


B.    Comparing tens and ones digits.


III.    PLACEMENT


With the placement activity, it allows students understand the placement of ones and tens. The activity will consist of drawing a placemat (In Paint Program) with two different columns labeling them ones and tens. Give the students a number 23. The students will then draw the amount of sticks needed for each placement.


A.    Understand placement of tens and ones.


B.    Use of paint to draw placemat. The students will then place correct numbers under the column.


IV.    GREATER THAN OR LESS THAN


The greater than or less then activity also provides the student with sense of acknowledging place value. When using this the students or able to understand the pattern the numbers describe. This activity consist of passing out 2 cards to each student, then have the children label wether the cards are less than (<), greater than (>), or equal (=).


A.    Understanding where numbers are placed in value.


B.    Compare tens and ones digits using symbols <, >, =.


1.    Students will have two cards each.


2.    Then the students will begin labeling the relevance of the cards,  wether it is <, >, or =.


V.     NUMBER LINE


The number line activity allows the students to count aloud seeing the placement of each number 1,2,3. In this activity simple draw a number line have missing variables for the students to fill in. This can be done on the Paint program on the computer.


A.    Counting aloud, along with voice recorded video.


B.    See placement of numbers by using paint able to draw out the number line.


 

 

Sunday, September 22, 2013

9. Safe Practices for Life Online


1.Three social networking sites that are used to form xonnections online and develop relations online are Facebook, instagram, and twitter.

2.       Considering the consequences:  At my local high school these group of girls was bulling one girl with harsh comments towards her on Facebook. They had to pay consequences by attending detention.

3.       In my own words I would define the following words as:

a.       Sexting- is to send sexual messages or pictures via text messages

b.      Cramming-used as a verb is to completely fill, or used as a noun as to add fraudulent charges to one’s phone bill.

c.       Cookies- web: a message given to a web browser by a web server. Baking: a flat sweet pastry.

                                                            i.      Source: webopedia.com, 2013

d.      Trajan horse- computer hacking program

                                                             i.      Source: Wikipedia.com, September  2013

e.      Phishing- to defraud an online account holder of financial information

                                                         i.      Source: searchsecurity.techtarget.com,  2013

f.        Spyware: enables a user to obtain information of another computer’s activities.

                                                           i.      Wikipedia.com, 2013

g.       Rootkit: set of software tools that enables a computer to enter another computer’s software without being detected

                                                           i.      Source: Wikipedia, 2013

h.   Zombie: a living dead person, or a tall mixed drink

                                                           i.      Source: Wikipedia.com, 2013

4. ihaveonepairpants, boogerdude, or pig” portrays a sense of immaturity.  These names give off a sense of carelessness.

5.        People might have the tendency to harass those who have screen names such as “inyoface,badyboy2, or imahottie.” The reason I feel this may be true is because of the attitude is presents to others.

6.       Too much information given through the following screen names consist of:

a.       Tom_evans34- full name and age

b.      Missy-13- name and age

c.       AndyKarateKid- name along with interest

d.      ViolinGirl- interest

e.      Restlinmantch- interest

7.       Good or poor choices for screen names:

a.       I8sushi2- good doesn’t reveal a name

b.      Soccerstar- good doesn’t give name or age

c.     Puppygirl1234- poor has a sense of young girl

d.      Keke1995- poor gives a year of birth

e.     Bookworm- good doesn’t reveal a name and age

f.        2bornot2b- poor portrays a sense of wildness

g.      Choco-holic- good because it doesn’t reveal personal information

h.   Capitlofens- good because it confidential

i.          Amrcanidol2- good because doesn’t portray personal information

j.        Bellaisbella- poor gives a name

k.       Darkangel666- poor gives off attitude

l.         Karla-love-1996- poor gives name, age, and shows openness

m.    Simpyme- good no name

n.      Gun4hire- poor reveals negative attention

o.      Babyfacela- poor reveals a location

p.      Whatup?- poor shows the person is open to conversation

8.       2ighieb3, ghieuuh, 7yhei8baud9

9.       My score was 0.

10.   The most common reason students’ online accounts are broke into each year: students write their passwords where they can be seen

a.       Least common reason: others guess things about that student

11.   Drive-by download video:

          The video is very informational on how drive by downloads can easily hack into your computer. They are assessed through clicking on the popup sites. The malware damage can be very harmful to your computer. It is very important to keep up to date with your security.

       The video also displays how an infected computer works. It can easily load when you start up your computer. Popups are the most basic and common ways these can invade your computer. It is best to ignore these sites by closing them immediately.

12.   Test results:

a.       Are you protecting your identity? Risk was low

b.      Is your computer protected? Risk was in the low to medium range

c.       Are you at risk to be scammed through an internet auction? Risk was low

13.   Malware installed on travelers’ laptops through software updates on hotel internet connections:

Recent analysis from the FBI have found that malicious actors are targeting travelers through pop-up windows within internet connections in their hotel rooms. Recently, there has been travelers’ laptops being infected with malicious software while using hotel internet connections. The traveler was attempting to setup the hotel room internet connection and was presented with a pop-up window notifying the user to update a widely-used software product. Which was their big mistake! In my opinion pop-ups are never a good thing. When I come in contact with one I immediately close them.  So in this case if the user clicked the update, malicious software was installed on the laptop. The FBI recommends that all government, private industry, and academic personnel who travel abroad take extra caution before updating software products on their hotel internet connections. This comes as a big shock to me. My family and I never thought about these situations. However, we do know not to click pop-ups.

Thursday, September 19, 2013

8. The Padagogy Wheel

The padagogy wheel is a very useful tool used to help speed your work processes as well as your work in the classroom. A cool way I thought of how the padagogy wheel could help me was with the process of teaching the first step to creating an essay to students. With this said I began in the center reading the passages then worked my way outward. I began by choosing the “Remembering and Understand” category. My thought process I kept in mind, was how could I make this lecture memorable to my students. Then the wheel guided me fast from there where it then led me to choosing the action verbs: “identify, retrieve, and explain”. These words all are interacting with creating a thinking web for designing essay thoughts. Then I moved to the activities where mine obviously stood out “MIndmappimg”. Then the wheel gave examples of apps that could be useful in the classroom, and I chose “iThoughts”. This was a ver effective and fast way to create a lesson plan activity.

Wednesday, September 11, 2013

7. Use Arts Integration to Enhance Common Core


The article “Use Arts Integration to Enhance Common Core,” states that in today’s world integration seems to be the “buzzword” to curriculum designers everywhere. The article stresses how integration is a rare yet seemingly “magical” approach that has the capacity to turn learning into meaningful practice. Integration requires collaboration, research, intentional alignment and practical application on behalf of the teachers who take on this challenge. From the students, integration demands creativity, problem-solving, perseverance, collaboration and the ability to work through the rigorous demands of multiple ideas and concepts woven together to create a final product. The article portrays that integration combines two or more contents together to approach the aligned standards, and these components will be able to facilitate the Common Core State Standards.  The article also provides information how along with Common Core, that often integration approach is presented through STEM.  Arts integration is just as effective yet many time overlooked.  The arts have some unique parallels to the Common Core Standards. Theses parallels attest to the rigors of the arts and the need for their processes in today’s global workforce and unforeseen future.  The article provides some shared features: 1. Process produces product, 2. Access points, 3. True equity, and 4. Analytic practice.  Strategies for implementation include: 1. Mirroring, 2. Stepping into the painting, and 3. Call and response.  The article closes with a suggestion, “are we building cooks or chefs?” arts integration allows us to build chefs who make choices, not cooks who merely follow the recipe.

I whole-heartedly agree with the article that integration seems to be “buzzword” for any curriculum. The curriculum of any choice needs art integration for any subject matter to better enhance the lesson intended. Art allows students to participate, see, and grasp the objective better. I also love how the article provides many examples of how to implement art. My chosen favorite was the mirroring strategy.  It simply demonstrates how it provides students with a way to share understanding using movement, concentration, and problem-solving skills. It involves partnering students and having them mirror each other’s actions. I believe this allows students to be able to take criticism from peers and learn from it.

Thursday, September 5, 2013

6. John Hunter and the World Peace Game

What he implemented in his classroom?
John Hunter had this superintendent that was a very modern, technology savoy person who had this older table. The table belonged to the superintendent's grandfather. She recalled the table as the wisdom table, because as growing up the superintendent remembered many wisdom discussed over that table. John took this into play as an educator and linked it to empty space. How do we fill the empty space? He wanted the students to create a meaning out of their own understanding. His mother was a teacher and his inspiration, as he also taught his daughter. With this said, many people interact and convey among others. So he came up with this game that started out as a piece of plywood that evolved into a much larger 4D display. The display included countries, ground, underground sea level, atmosphere, etc. John wanted the children to solve problems he included under the categories in social, economically, etc. It to let the children learn with their bodies and by their own experiences to interact with others to create their own solutions. His idea was to let the children use their mind and creativity. I really enjoyed his preference of teaching that lets the students interact with their peers, and how they can make up their own minds.