My presentation from the ACEC Conference in Adelaide on October 1 2014. The Australian Computers in Education Council ... a great venue for me to showcase my use of social media in class. Not teaching with social media is like NOT teaching Maths.
Presentation made by IASA Associate Director Dr. Richard Voltz for teachers. The purpose of this presentation is to motivate teachers to engage students more in their own learning and to inform teachers of the various technology tools that are available to them to use in the classroom.
A presentation designed for Year 8 and 9 students. Updated with two additional slides for parents. Feel free to download and adapt this presentation for your own purposes.
My presentation from the ACEC Conference in Adelaide on October 1 2014. The Australian Computers in Education Council ... a great venue for me to showcase my use of social media in class. Not teaching with social media is like NOT teaching Maths.
Presentation made by IASA Associate Director Dr. Richard Voltz for teachers. The purpose of this presentation is to motivate teachers to engage students more in their own learning and to inform teachers of the various technology tools that are available to them to use in the classroom.
A presentation designed for Year 8 and 9 students. Updated with two additional slides for parents. Feel free to download and adapt this presentation for your own purposes.
Incorporating student technologies into the curriculum in order to expand the classroom beyond the school. Thanks to Liz Kolb for the bulk of the material.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
8. For the first time since 2003, when asked to
identify the major obstacle to prevent use
of technology in school, students in
grades 6–12 said “I cannot use my own
cell phone, smart phone or Mp3 player in
school.”
10. 76% of secondary students have their own cell phones
▪ 30% have Smartphone's
▪ 54% of 8 year olds will have their own cell phone (end
of 2010)!
1 in 3 teens sends more than 100 text messages a day
85% of secondary students have MP3 players
84% of children between the ages of 8 to 10 have a video
game player in their household
93% of teenagers use the Internet
▪ 70% have their own laptop or netbook
55% of 12-17 year olds have a profile on Facebook or
Myspace
11. Digital Age Learner
Collaboratively
Anytime, anyplace, anywhere, any pace
Structured activities
Relevancy with real world
*They want to do this with the TECHNOLOGY
of their generation
Millennials Rising (Neil Howe and William Strauss)
13. Technological changes are displacing low-skilled workers
and making room for more high-skilled creative and
innovative workers.
Employers are calling for schools to integrate new skills
into education
14.
15.
16.
17. 74% of all 18-24 year olds were
politically active on the Internet
during the 2008 campaign
During the 2008 campaign, 49%
of younger voters (18-24) shared
information via text message
about the campaigns.
http://www.visiblevote.us
18. Parent’s cell phones loaded with literacy
software
▪ Parents living at or below poverty line
Findings:
▪ Participants found the intervention to be a positive
experience, especially for their children.
▪ They reacted enthusiastically to receiving early
literacy content via cell phone.
▪ Most importantly, participants reported that their
children enjoyed and benefited from the program.
▪ Child participants, for the most part, were eager
and excited to view the letter video clips.
▪ They frequently requested to view the videos.
▪ Some parents reported that each time the phone
rang, their children came running, hoping the call
was from Elmo.
19. Civilization IV & Democracy
More civic gaming experience=more civic
engagement
20.
21. “Last year the school ran out
of calculators needed for a
math exam, So I let a student
use the calculator function on
his cell phone. The student
was excited
to use a phone instead of a
calculator. I found 19 of my
22 students had phones.”
-Kipp Rogers, Principal at
Passages Middle School in
Virginia
22. Mary Passage Middle School Cell Phone Policy
1. Students will talk on their cell phone only to complete assignments that are related to the
instructional lesson.
2. Students will keep cell phones turned off or left in lockers when they are not being used for
instructional purposes in class.
3. Students will only send text- messages, pictures or video- messages to others outside of the
classroom with permission and directions from the teacher.
4. Students will not record still or moving images or voices of students or the teacher without
permission from the teacher.
5. Students will not post recordings of still or moving images or voice recordings of students or
the teacher to online websites without their permission.
6. Students will practice internet safety with online resources.
7. Students will post only appropriate text, audio and visual media to on-line websites.
I _____________________ understand that violation of our class acceptable cell phone use policy
may result in my not being able to participate in additional class activities that involve using the cell
phone. I also understand that I may receive disciplinary consequences for violating school board
policies regarding cyber-bullying.
I _______________________ have gone over the Cell Phones in Class Acceptable Use Policy with my
child and agree to allow my child to participate.
27. Norwich Free Academy (Connecticut)
Text of the week!
Monday is vocabulary day
Tuesday is science facts
Wednesday is mathematics
Thursday is history
Friday covers a variety of topics including general
knowledge and cultural literacy
Each day is a theme
Parents and Students Opt in
28. Mobile Novel Project: Cell
Phone Bestseller
Popular in Asia to Read
Novels Via Cell.
http://www.nytimes.com/2008/01/20/world/asia/20japan.html?_r=2&pag
ewanted=1&th&emc=th&oref=slogin
29. Use a cell phone to write a private or collaborative novel, poem, chapter
review, or short story to “publish” on a cell phone.
http://textnovel.com
30. 3rd-6th graders use
Google Voice to
call in oral
language
assignments
http://elementarysp
anish.wikispaces.c
om/Google+Voice
40. Virtual Battle of the Bands
Collaboration Project
http://olliebray.typepad.c
om/olliebraycom/2008/0
6/mgs-guitar-hero.html
41. 3 classes spent 15 minutes a day using two
games, Math Training and Brain Training.
In 6th grade, relative to their peers, the
Nintendo group scored substantially better.
Gains were “obvious and significant”.
In 5th grade, the average gain in the
experimental group was 6 percentile points
higher than in the control group.
In 4th grade, almost every pupil in the Nintendo
group improved their score in comparison with
last year – the average increase was more than
10 percentile points.
The children who made the greatest gains
were those who had been using the game both
in school and at home.
42. "Project Surf.”
Use: Wii Homerun Derby (from Wii Sports)
First, a video clip from "Science of Summer" is
shown in which we discuss the force of a pitch as
it hits the catcher's glove.
The Wii is used to have students try to hit pitches
(using homerun derby game)
The purpose is to show just how fast pitches
come in and how a batter's timing needs to be
perfect.
Students take data in the excel-to-go program
on our palm pilots. Students record the time of
each pitch and then deduce how to find the
velocity, acceleration, force, momentum, and
work of the pitch.
The unit culminates in May when they attend an
Atlantic City Surf game.
Students time pitches and enter data in the palm
pilots for a pitch-by-pitch analysis of a few
innings of the game.
50. “Student’s today can’t prepare
bark to calculate their
problems. They depend on
their slates, which are more
expensive. What will they
do when the slate is dropped
and it breaks? They will not
be able to write.”
-Teachers Conference, 1703
51. “Students today depend
upon paper too much.
They don’t know how to
write on slate without
getting chalk dust all
over themselves. They
can’t clean a slate
properly. What will they
do when they run out of
paper?”
-Principal’s
Association, 1815
52. “The Internet is not a great tool for
teaching. ..People think that
children can think of any topic
and pull up a wealth of
information on it, but that is not
the case.
The information in the library is
what people seem to expect, but
nobody has the time to
transcribe entire libraries onto
computers. There is nothing on
the Internet that is incredibly
beneficial to education.”
-The Monterey County Herald, 1999
53. “We are not going to allow
iPods and BlackBerrys and
cell phones and things that
are disruptive in the
classroom. Classrooms are
for learning. Teachers
cannot be expected to look
under every kid’s desk at
what they’re doing.”
-Mayor Michael
Bloomberg, 2007
54. How do we engage the
anywhere, anytime, anyplace, any pace
student?
How do we prepare 21st Century students for
the 21st Century job force?
How do we prepare 21st Century students to
be citizens in the global community?
71. Don’t assume anything you send or post is
going to remain private.
There is no changing your mind in
cyberspace—anything you send or post will
never truly go away.
Don’t give in to the pressure to do something
that makes you uncomfortable, even in
cyberspace.
Consider the recipient’s reaction.
Nothing is truly anonymous.
72. Cambridge researchers posted pictures to sixteen
websites, noting the direct URL to the image, and then
deleted the original. They reopened the URLs over a period of
30 days to see whether the pictures were accessible and
found that images were still visible on five sites at the end of
that month. This is possible because the files remain in photo
server caches of the underlying content delivery network
(CDN) after they have been cleared from indices that provide
data for dynamic pages (such as profiles) and search results.
The terms of service for these sites indicate that deletion may
not be immediate, with Facebook likening the process to
putting a file in the Recycle Bin.
http://emergingtechnologies.becta.org.uk/index.php?section=e
tn&rid=14632
73. Social networks have been used to post
content to embarrass or intimidate
students, so it is important for learners to
understand that the consequences of such
actions may last even longer than they
expected. Not only may content remain in
caches and backups, but it can be copied to
third party sites or be captured in archives
without your knowledge or permission, such
as the Wayback Machine.
74.
75.
76.
77.
78. "I know for a fact that when a superintendent in
Missouri was interviewing potential teachers
last year, he would ask, 'Do you have a
Facebook or MySpace page?' " said Todd
Fuller, a spokesman for the Missouri State
Teachers Association, which is warning
members to clean up their pages. "If the
candidate said yes, then the superintendent
would say, 'I've got my computer up right
now. Let's take a look.' "
79. 53% of employers hiring search
social networking sites as part
of the interview process
80. Of those hiring managers who have screened
job candidates via social networking
profiles, one-third (34 percent) reported they
found content that caused them to dismiss
the candidate from consideration.
81. 40% - candidate posted provocative or
inappropriate photographs or information
29% - candidate had poor communication
skills
28% - candidate bad-mouthed their previous
company or fellow employee
22% - candidate’s screen name was
unprofessional
82. On the other hand, social networking profiles
gave some job seekers an edge over the
competition.
24% of hiring managers who researched job
candidates via social networking sites said
they found content that helped to solidify
their decision to hire the candidate.
83. 50% Profile provided a good feel for the candidate’s
personality and fit
39% Profile supported candidate’s professional
qualifications
38% Candidate was creative
35% Candidate showed solid communication skills
33% Candidate was well-rounded
19% Other people posted good references about
the candidate
15% Candidate received awards and accolades
84. “"Teaching in DCPS -- Lesson #1: Don't smoke
crack while pregnant."
"you're a retard, but i love you.”
"I only have two feelings: hunger and lust. Also, I
slept with a hooker. Be jealous. I like to go onto
Jdate and get straight guys to agree to sleep
with me."
"rocking out with some deaf kids. it. is.
AWESOME."
85. "teaching chitlins in the ghetto of Charlotte”
"I am teaching in the most ghetto school in
Charlotte”
TO VOTE:
RED X for NO
GREEN CHECK for YES
86. Prosecutors use Facebook, MySpace photos
Students who made light of drinking received jail sentences for DUI
Defense attorneys also use social networking sites to dig up dirt on
witnesses
PROVIDENCE, Rhode Island (AP) -- Two weeks after Joshua Lipton was
charged in a drunken driving crash that seriously injured a
woman, the 20-year-old college junior attended a Halloween party dressed
as a prisoner. Pictures from the party showed him in a
black-and-white striped shirt and an orange jumpsuit labeled "Jail Bird.”
http://74.125.93.132/search?q=cache:SgDbAA0gzEoJ:freedom-
school.com/reading-room/unrepentant-on-facebook-expect-jail-
time.pdf+Unrepentent+on+Facebook&cd=1&hl=en&ct=clnk&gl=us&clie
nt=firefox-a
87.
88. “When you access Facebook from a
computer, mobile phone, or other device, we
may collect information from that device
about your browser type, location, and IP
address, as well as the pages you visit.”
89. Certain categories of information such as
your name, profile photo, list of friends and
pages you are a fan of, gender, geographic
region, and networks you belong to are
considered publicly available, and therefore
do not have privacy settings.
You can limit the ability of others to find this
information on third party search engines
through your search privacy settings.
90. We may institute programs with advertising partners and other
websites in which they share information with us:
- We may ask advertisers to tell us how our users responded to
the ads we showed them. This data sharing, commonly known as
“conversion tracking,” helps us measure our advertising
effectiveness and improve the quality of the advertisements you
see.
- We may receive information about whether or not you’ve seen or
interacted with certain ads on other sites in order to measure the
effectiveness of those ads.
91. “We may collect information about you from
other Facebook users, such as when a friend
tags you in a photo or video, provides friend
details, or indicates a relationship with you.
You can limit who can see that you have been
tagged in a photo or video – which we refer to
as photos or videos “of me” – in your privacy
settings.”
92. When you make a payment.
When you invite a friend to join
When you choose to share your
information with marketers.
To help your friends find you.
To give search engines access to publicly
available information.
To help improve or promote our service.
To provide you with services.
To advertise our services.
To respond to legal requests and prevent
harm.
To offer joint services.
93. We cannot control the actions of other users with
whom you share your information.
We cannot guarantee that only authorized persons
will view your information.
We cannot ensure that information you share on
Facebook will not become publicly available.
We are not responsible for third party circumvention
of any privacy settings or security measures on
Facebook.
You can reduce these risks by using common sense
security practices such as choosing a strong
password, using different passwords for different
services, and using up to date antivirus software.
98. Weak Passwords
Get rid of your year on your birth date (in
profile)
No children’s names (no tags, nothing)
Do not mention your future plans (esp. away
form home)
Remove yourself from public search
99. 1. Take control of your photos. Your personal and professional life are becoming one, largely
due to Facebook. Go through what you have on your social network & untag yourself in
photos that an employer might find inappropriate.
2. Set privacy settings. You have less reason to worry if employers can’t access your digital life.
3. Post photos that promote you as a professional. If you have photos from
volunteering, studying abroad, working a job, giving a presentation, or any other semi-
professional event, post them. They go a long way to help counteract other photos that
might negatively impact your image.
4. Put up a clean profile photo of yourself. Even if you got a lot of compliments on your
stripper Halloween costume, a profile picture that isn’t associated raucous college partying
means a lot to people in hiring positions.
5) Stay active online. By commenting on blogs and forums, updating your profiles, and even
creating your own site you can become much more visible and credible online. This gives
the people who search you a much more comprehensive picture of who you are and allows
you to highlight the good and bury the bad
6. Be mindful of who you accept as a “Friend.” Poor choices could reflect badly on you as a
professional. Make sure to monitor their comments on your sites as well.
102. Six teens face child porn (13 to 15) charges after
being caught "sexting" each other. Criminal
Charge!
IN PA, 3 girls (12, 12, 16) charged with child
pornography for sexing. Picture of them in bras.
15% of teenagers have risqué photos of
themselves or their friends on their cell phones.
1 in 5 sext recipients report that they have
passed the images along to someone else
http://www.cnn.com/video/#/video/bestoftv/2009/01/15/pn.sexting.teens.cnn
103. "If you take a picture, you can be accused of producing
child pornography; if you send it to somebody, you can
be accused of distributing child pornography; and if you
keep a picture, you can be accused of possessing child
pornography. Anywhere along this chain of transmission
of the images, you can be charged as a registered sex
offender."
-Parry Aftab, an Internet privacy and security lawyer.
104. 33% of students in grades 6-12 have been
bullied via social networking sites
105. 750,000 kids between the ages of 8 and 12 have
set up a profile on the big social-networking
sites
http://www.theglobeandmail.com/news/technology/article709704.ece
106. Research shows that issues of privacy and safety are
not at the forefront of younger users' minds.
41% of children aged 8 to 17 who had a visible profile
had them set so they were open and accessible to
anyone. (Office of Communications in GB)
Younger adults and children are much more likely to
share sensitive information
After weeks of butting heads with his
coaches, Taylor, 17, logged on to Facebook from home
Jan. 3. He typed his frustrations for the online world to
see: "I'ma kill em all. I'ma bust this (expletive) up from the
inside like nobody's ever done before.”
(USA Today, Jan 2010)
Taylor's profile was public, so there were no restrictions on
who could view it.
107. Taylor’s family argued that students and
parents aren't properly educated or warned
that what they write online can have
consequences in the classroom.
108. 78% report they frequently see other players
being kind or helpful to those who are
gaming
63% report seeing or hearing “people being
mean or overly aggressive while playing”
49% report seeing or hearing “people being
hateful, racist, or sexist” while playing
109. How can you help keep your student’s
safe and create positive footprints?
110.
111. Survey Students
For K-4, use younger social networking sites
Club Penguin
KidBlog (we will use)
Edmodo
Woogie World
Make up names
No identifying information
Select most private settings
No posting pictures of themselves (use Avatars
instead such as http://voki.com )
112. Go over cybersafety at home
Computers NOT in bedroom
Set up accounts with children
Watch kids online to see where they go
Never talk to strangers online
No unmonitored chatrooms
No sharing ANY personal information online
▪ Phone, address, location, vacations, full names, school, or names of
organizations
Talk with kids often about what they are doing online
Post rules next to computer
Suggest resources such as
http://www.netsmartz.org/index.aspx