SlideShare a Scribd company logo
1 of 22
GLOBAL TECHNOLOGY SKILLS FOR THE
21ST CENTURY TEACHER
TO BE AN EFFECTIVE
21ST CENTURY
TEACHER , A
TEACHER MUST
POSSESS THE VERY
FIRST 21ST CENTURY
SKILLS THAT THEIR
STUDENTS ARE
EXPECTED TO HAVE.
AND IN ADDITION TO
THOSE SKILLS, THEY
MUST BE ABLE TO
HELP ALL OF
THEIR STUDENTS
OBTAIN AND
DEVELOP 21ST
CENTURY SKILLS.
COMPUTER
SECURITY
SKILL
BASIC
COMPUTER
LITERACY
SKILL
SOCIAL
NETWORKING
SKILL
NURTURING
CREATIVITY
SKILL
ONLINE
PROJECT
WORK SKILL
THE ABILITY
TO BACK UP
SKILL
GLOBAL
TECHNOLOGY
SKILLS
z
WHAT IS COMPUTER LITERACY ?
Computer literacy is the ability to use computers
and related technology efficiently, with a range of
skills covering levels from elementary use to
programming and advanced problem solving. By
another measure computer literacy
requires computer programming and how
computers work.
z
BASIC COMPUTER LITERACY SKILL
HOW TO USE POWERPOINT.
HOW TO USE MS WORD.
HOW TO USE EXCEL.
HOW TO USE EMAIL.
z
WHAT IS SOCIAL
NETWORKING ?
Social
Networking is to
make
yourself known
within social
media platforms
as well as offline.
Ways to be a creative teacher
ONLINE PROJECT WORK SKILL VIA GOOGLE
CLASSROOM
Computers are the filing cabinets of
the 21st century, and most lesson
plans, resources and reports are
now created, shared and saved on
computers. If a teacher does not
want to lose your work, a teacher
should need to know how to back-
up his/her files.
There are several ways to back up your PC.
1.Select the Start button, then select Control Panel > System
and Maintenance > Backup and Restore.
2.Do one of the following:
•If you've never used Windows Backup before, or recently
upgraded your version of Windows, select Set up backup, and
then follow the steps in the wizard.
•If you've created a backup before, you can wait for your
regularly scheduled backup to occur, or you can manually
create a new backup by selecting Back up now.
•If you’ve created a backup before, but want to make a new,
full backup rather than updating the old one, select Create
new, full backup, and then follow the steps in the wizard.
Apps for backing up the file
Why is computer security important?
Computer security is the process of preventing and detecting unauthorized
use of your computer. Prevention measures help you stop unauthorized users
(hackers) from accessing any part of your computer system. Detection helps
you to determine whether or not someone attempted to break into your
system, if they were successful, and what they may have done.
Hackers do not care about your identity. Often they want to gain control of
your computer so they can use it to launch attacks on other computer
systems.
Having control of your computer gives the hackers the ability to hide their
actual location as they launch attacks, often against high-profile computer
systems such as government or financial systems.
Hackers have the ability to watch all your actions on the computer, or cause
damage to your computer by reformatting your hard drive or changing your
data.
Unfortunately, hackers are always discovering new vulnerabilities to exploit in
computer software. The complexity of software makes it increasingly difficult
to thoroughly test the security of computer systems.
Internet Security is the most important aspect that everyone using the internet
should understand.
Ways to secure your
device
PRESENTED BY –
VENESSA ROBERT OSTA
B.ED 1ST YEAR 2018-2020

More Related Content

Similar to Global technology skills for 21st century teacher

computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Best ethical hacking course online
Best ethical hacking course onlineBest ethical hacking course online
Best ethical hacking course onlineDucat
 
Digital Technology Culture - Anti-Dote Series
Digital Technology Culture - Anti-Dote SeriesDigital Technology Culture - Anti-Dote Series
Digital Technology Culture - Anti-Dote SeriesEnimil Kweku Boateng
 
CSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptxCSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptxYouTube299255
 
Unlocking-the-Power-of-Computer-Applications-A-Beginners-Guide.pptx
Unlocking-the-Power-of-Computer-Applications-A-Beginners-Guide.pptxUnlocking-the-Power-of-Computer-Applications-A-Beginners-Guide.pptx
Unlocking-the-Power-of-Computer-Applications-A-Beginners-Guide.pptxAttitude Tally Academy
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)ChristopherAntonius
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...goldeneducation28
 
COMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and YouCOMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and YouJeremy Flores
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it applicationKumar
 

Similar to Global technology skills for 21st century teacher (17)

computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Best ethical hacking course online
Best ethical hacking course onlineBest ethical hacking course online
Best ethical hacking course online
 
Digital Technology Culture - Anti-Dote Series
Digital Technology Culture - Anti-Dote SeriesDigital Technology Culture - Anti-Dote Series
Digital Technology Culture - Anti-Dote Series
 
CSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptxCSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptx
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Email hacker
Email hackerEmail hacker
Email hacker
 
Computer literacy
Computer literacyComputer literacy
Computer literacy
 
Phone hack
Phone hackPhone hack
Phone hack
 
Hacker
HackerHacker
Hacker
 
Unlocking-the-Power-of-Computer-Applications-A-Beginners-Guide.pptx
Unlocking-the-Power-of-Computer-Applications-A-Beginners-Guide.pptxUnlocking-the-Power-of-Computer-Applications-A-Beginners-Guide.pptx
Unlocking-the-Power-of-Computer-Applications-A-Beginners-Guide.pptx
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 
Technology offering
Technology offeringTechnology offering
Technology offering
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
goldeninstituterup-blogspot-com-2024-01-diploma-in-computer-application-html ...
 
Cyber Security Companies
Cyber Security CompaniesCyber Security Companies
Cyber Security Companies
 
COMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and YouCOMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and You
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it application
 

Recently uploaded

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 

Global technology skills for 21st century teacher

  • 1. GLOBAL TECHNOLOGY SKILLS FOR THE 21ST CENTURY TEACHER
  • 2. TO BE AN EFFECTIVE 21ST CENTURY TEACHER , A TEACHER MUST POSSESS THE VERY FIRST 21ST CENTURY SKILLS THAT THEIR STUDENTS ARE EXPECTED TO HAVE. AND IN ADDITION TO THOSE SKILLS, THEY MUST BE ABLE TO HELP ALL OF THEIR STUDENTS OBTAIN AND DEVELOP 21ST CENTURY SKILLS.
  • 4. z WHAT IS COMPUTER LITERACY ? Computer literacy is the ability to use computers and related technology efficiently, with a range of skills covering levels from elementary use to programming and advanced problem solving. By another measure computer literacy requires computer programming and how computers work.
  • 5. z BASIC COMPUTER LITERACY SKILL HOW TO USE POWERPOINT. HOW TO USE MS WORD. HOW TO USE EXCEL. HOW TO USE EMAIL.
  • 6. z WHAT IS SOCIAL NETWORKING ? Social Networking is to make yourself known within social media platforms as well as offline.
  • 7.
  • 8.
  • 9.
  • 10. Ways to be a creative teacher
  • 11.
  • 12.
  • 13. ONLINE PROJECT WORK SKILL VIA GOOGLE CLASSROOM
  • 14.
  • 15. Computers are the filing cabinets of the 21st century, and most lesson plans, resources and reports are now created, shared and saved on computers. If a teacher does not want to lose your work, a teacher should need to know how to back- up his/her files.
  • 16. There are several ways to back up your PC. 1.Select the Start button, then select Control Panel > System and Maintenance > Backup and Restore. 2.Do one of the following: •If you've never used Windows Backup before, or recently upgraded your version of Windows, select Set up backup, and then follow the steps in the wizard. •If you've created a backup before, you can wait for your regularly scheduled backup to occur, or you can manually create a new backup by selecting Back up now. •If you’ve created a backup before, but want to make a new, full backup rather than updating the old one, select Create new, full backup, and then follow the steps in the wizard.
  • 17. Apps for backing up the file
  • 18.
  • 19. Why is computer security important? Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you stop unauthorized users (hackers) from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. Hackers do not care about your identity. Often they want to gain control of your computer so they can use it to launch attacks on other computer systems. Having control of your computer gives the hackers the ability to hide their actual location as they launch attacks, often against high-profile computer systems such as government or financial systems. Hackers have the ability to watch all your actions on the computer, or cause damage to your computer by reformatting your hard drive or changing your data. Unfortunately, hackers are always discovering new vulnerabilities to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of computer systems. Internet Security is the most important aspect that everyone using the internet should understand.
  • 20. Ways to secure your device
  • 21.
  • 22. PRESENTED BY – VENESSA ROBERT OSTA B.ED 1ST YEAR 2018-2020