SlideShare a Scribd company logo
1 of 18
TECHNOLOGY IN THE
CLASSROOM
PRESENTER
DATE

“This presentation contains copyrighted material under the
educational fair use exemption to the U.S. copyright law."

EDNA LAMARCA
NOVEMBER 11, 2013
THE CORE PRINCIPLES
Computer
Safety

That Students Must Know
Citation

Social
Networking

Plagiarism

Ethics

Copyright
Guidelines
TECHNOLOGY HARDWARE:
•

–
–
–
–

Technology
Hardware

Passwords

Acceptable
Use Policy

Be careful with devices

•

Place securely on tables
Handle carefully
Watch for cords and cables
Keep devices clean

Respect software and programs
– Never open attachments you are not
expecting
– Never download programs, apps, etc.
– Keep an updated virus protection plan
– Back up your files regularly
PASSWORDS:
•
•
•
•
•
•

Your responsibility
Unique
Changed on a regular basis
Composed of both letters and numbers
Never be given to anyone else
Not be taped under the computer or in
another easily accessible place
ACCEPTABLE USE POLICY:
•
•
•

•

Your responsibility to know the rules
Parental Permission Form
Everything may be searched by school
authorities/law enforcement officials
Never:
–
–
–
–

Access pornographic, obscene material
Vandalize property of another person
Pirate software
Violate any local, state, or federal statue
WHEN WE ENTER THE INTERNET WE BECOME CONNECTED
WITH THE WORLD
We must be professional and
responsible with every word
•
•
•

Never give out personal
information
Secure sites “https” but not
“http”
Organizations want to market
to you
A STRANGER IS A STRANGER
Protect yourself
from predators
Protect yourself from
Cyberbullying

Protect yourself from giving out too much
information
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons.
ETHICS
•

Is the branch of philosophy that deals with moral
judgments, issues of right and wrong, and
determining what behaviors are humane or
inhumane.

“Ethical Action” is an action that does not have a
damaging impact
on oneself, other individuals, or society.
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons.
JOHNSON’S THREE RULES OF TECHNOLOGY ETHICS
1. Privacy – I will protect my privacy and respect the privacy of
others.
2. Property – I will protect my property and respect the
property of others.
3. Appropriate use – I will use technology in constructive ways
and in ways that do not break the rules of my family, faith,
school, or government.

Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons
Do Not:
 Steal or Destroy
 Exaggerate or embellish
 Look at or create tasteless, offensive or lacking in educational value material

Do:
 Treat intellectual property the same way you would treat physical property
 Question material - Hate groups, Political extremists
DOES MY USE OF THE TECHNOLOGY VIOLATE THE PRIVACY OF
OTHERS, OR AM I GIVING INFORMATION TO OTHERS THAT I
SHOULD NOT?

Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons.
Johnson, G. (2012). Copyright and Fair Use - General Guidelines Statement and Disclosure
Books/Magazines – Up to 1000 words but not more than 10%
Poems – Up to 250 words or if less the entire poem
Photographs/Drawings – Up to 5 graphics from the same person
Video – Up to 3 minutes but not more than 10% of entire video
Music – Up to 30 seconds but not more than 10%
And cannot be changed in any way
 “Fair use” statement at beginning of presentations
 Bibliography






NC Wise Owl. (2009). Copyright Guidelines. Retrieved from http://www.ncwiseowl.org/zones/copyright/Student_Guidelines.html
PLAGIARISM
 Accidental or Intentional Plagiarism:











Copying a quotation without quotation marks
Not writing the citation showing where the information comes from
Writing material very close to the original
Paraphrasing - writing another’s ideas in your own words – rearranging
words
Copying and pasting without using citations or quotation marks
Purchasing work (such as essays) from the Internet and claiming them as
your own
Using another student’s work as your own
Using images, charts, or graphics without a citation
Giving information that is not accurate

mizikar, A. (). Battling Plagiarism in the Internet age. Retrieved from http://www6.wittenberg.edu/lib/help/plagiarism/
METHODS OF CHECKING FOR PLAGIARISM
Changes in Writing Style
Changes in Font
Not the Right Topic
Check Citations
Dated References

Unusual Word Choices
Above/Below Class Level
Samples of In-class Writing
Students Write Summaries
Boolean Searches

Microsoft

mizikar, A. (). Battling Plagiarism in the Internet age. Retrieved from http://www6.wittenberg.edu/lib/help/plagiarism
Easy Bib
• http://content.easybib.com/citation-guides/apaformat

Study Mode
• http://www.studymode.com/citation-generator/
APA Format Citation Generator

• http://apareferencing.ukessays.com/
THE CORE PRINCIPLES






Follow the Rules
Ask
Report
Learn

Computer
Safety

Citation
Microsoft

Social
Networking

Ethics

Plagiarism

Copyright
Bibliography
Chaudhary, N. (). Free Images of Technology. Retrieved from http://www.google.com/search?q=free+images+of+technology&nord
=1&rlz=1C2GGGE_enUS510US543&tbm=isch&tbo=u&source=univ&sa=X&ei=wrd2UouDCOSOyAHqhIGQDg&ved=0CFwQsAQ&biw
=1292&bih=683#facrc=_&imgdii=_&imgrc=Y1axob-gHnJyJM%3A%3BmewJg4JEtZemvM%3Bhttp%2
Free Images of Technology. Retrieved from http://office.microsoft.com
Free Images of Technology. Retrieved from http://www.google.com/search?q=free+images+of+technology&nord=1&rlz=1C2GGGE_en

US510US543&tbm=isch&tbo=u&source=univ&sa=X&ei=wrd2UouDCOSOyAHqhIGQDg&ved=0CFwQsAQ&biw=1292bih=683
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons
https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?assetMetaId=d9ec986b-3a6b-48fd-85ec-

278389888511&assetDataId=22d60f48-4737-40d0-93c6-ba6b18108fdf&sectionId=ch07lev1sec1&assetpdfdataid=dd438dd1-2462-4fe09eeb-a422cffd9dff
Johnson, G. (2012). Copyright and Fair Use - General Guidelines Statement and Disclosure. Retrieved from
http://www.resourcesforlife.com/docs/item6247
Mizikar, A. (). Battling Plagiarism in the Internet age. Retrieved from http://www6.wittenberg.edu/lib/help/plagiarism/

More Related Content

What's hot

Chapter 8- 9 update 5
Chapter 8- 9 update 5Chapter 8- 9 update 5
Chapter 8- 9 update 5edniuchis
 
Copyright and fair use in a digital age
Copyright and fair use in a digital ageCopyright and fair use in a digital age
Copyright and fair use in a digital agecathanne1024
 
Copyright & Fair Use
Copyright & Fair UseCopyright & Fair Use
Copyright & Fair UseAnn Kardos
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentationmhporter1
 
Chapter 5 -7 update 4
Chapter 5 -7 update 4Chapter 5 -7 update 4
Chapter 5 -7 update 4edniuchis
 
Chapter 5 -7 update 4
Chapter 5 -7 update 4Chapter 5 -7 update 4
Chapter 5 -7 update 4edniuchis
 
Edtc6340 jessica burnias_copyright1
Edtc6340 jessica burnias_copyright1Edtc6340 jessica burnias_copyright1
Edtc6340 jessica burnias_copyright1jessburnias
 
Academic dishonesty 2011
Academic dishonesty 2011Academic dishonesty 2011
Academic dishonesty 2011dcaryll
 
S alvarado revision wk 7 copyright crash course
S alvarado revision wk 7 copyright crash courseS alvarado revision wk 7 copyright crash course
S alvarado revision wk 7 copyright crash coursesalvara85
 
Plagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesPlagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesTurnitin User Experience Team
 
Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2jpc6760
 
Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3jpc6760
 
Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3jpc6760
 
Chapter 3 &4 update 3
Chapter 3 &4 update 3Chapter 3 &4 update 3
Chapter 3 &4 update 3edniuchis
 
Copyright edtc6340.66 april_canales_final
Copyright edtc6340.66 april_canales_finalCopyright edtc6340.66 april_canales_final
Copyright edtc6340.66 april_canales_finalacanales04
 

What's hot (19)

Chapter 8- 9 update 5
Chapter 8- 9 update 5Chapter 8- 9 update 5
Chapter 8- 9 update 5
 
Copyright and fair use in a digital age
Copyright and fair use in a digital ageCopyright and fair use in a digital age
Copyright and fair use in a digital age
 
Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
 
Copyright & Fair Use
Copyright & Fair UseCopyright & Fair Use
Copyright & Fair Use
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Chapter 5 -7 update 4
Chapter 5 -7 update 4Chapter 5 -7 update 4
Chapter 5 -7 update 4
 
Chapter 5 -7 update 4
Chapter 5 -7 update 4Chapter 5 -7 update 4
Chapter 5 -7 update 4
 
Edtc6340 jessica burnias_copyright1
Edtc6340 jessica burnias_copyright1Edtc6340 jessica burnias_copyright1
Edtc6340 jessica burnias_copyright1
 
Academic dishonesty 2011
Academic dishonesty 2011Academic dishonesty 2011
Academic dishonesty 2011
 
S alvarado revision wk 7 copyright crash course
S alvarado revision wk 7 copyright crash courseS alvarado revision wk 7 copyright crash course
S alvarado revision wk 7 copyright crash course
 
Webinar2
Webinar2Webinar2
Webinar2
 
Avoiding Plagiarism
Avoiding PlagiarismAvoiding Plagiarism
Avoiding Plagiarism
 
Plagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesPlagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front Lines
 
DLfDL final webinar
DLfDL final webinarDLfDL final webinar
DLfDL final webinar
 
Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2
 
Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3
 
Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3
 
Chapter 3 &4 update 3
Chapter 3 &4 update 3Chapter 3 &4 update 3
Chapter 3 &4 update 3
 
Copyright edtc6340.66 april_canales_final
Copyright edtc6340.66 april_canales_finalCopyright edtc6340.66 april_canales_final
Copyright edtc6340.66 april_canales_final
 

Viewers also liked

The Human Touch in the Age of Technology
The Human Touch in the Age of TechnologyThe Human Touch in the Age of Technology
The Human Touch in the Age of TechnologyJordan Lloyd Bookey
 
De kenniscrash
De kenniscrash De kenniscrash
De kenniscrash Joop Vorst
 
Models of folk costumes
Models of folk costumesModels of folk costumes
Models of folk costumesYuliya Troyan
 
Options Strategies
Options StrategiesOptions Strategies
Options Strategiesnoyeshaj
 
Universum
UniversumUniversum
UniversumTjompe
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroomejl2
 

Viewers also liked (7)

The Human Touch in the Age of Technology
The Human Touch in the Age of TechnologyThe Human Touch in the Age of Technology
The Human Touch in the Age of Technology
 
De kenniscrash
De kenniscrash De kenniscrash
De kenniscrash
 
Models of folk costumes
Models of folk costumesModels of folk costumes
Models of folk costumes
 
Metatrader 5
Metatrader 5Metatrader 5
Metatrader 5
 
Options Strategies
Options StrategiesOptions Strategies
Options Strategies
 
Universum
UniversumUniversum
Universum
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroom
 

Similar to Technology in the classroom

Citation 101: Teaching Students to Avoid Plagiarism
Citation 101: Teaching Students to Avoid PlagiarismCitation 101: Teaching Students to Avoid Plagiarism
Citation 101: Teaching Students to Avoid Plagiarismemdowney
 
A & S Plagiarism Presentation
A & S Plagiarism PresentationA & S Plagiarism Presentation
A & S Plagiarism PresentationDonnaGunter
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesMs. D
 
Plagiarism Ppt Teachers
Plagiarism Ppt TeachersPlagiarism Ppt Teachers
Plagiarism Ppt TeachersTedine Soule
 
Assignment learning and cognition
Assignment learning and cognitionAssignment learning and cognition
Assignment learning and cognitionAssignment Help
 
Plagiarism in the classroom pp presentation
Plagiarism in the classroom pp presentationPlagiarism in the classroom pp presentation
Plagiarism in the classroom pp presentationshellyddunsford
 
Techno-Cheating: What's a Librarian to Do?
Techno-Cheating: What's a Librarian to Do?Techno-Cheating: What's a Librarian to Do?
Techno-Cheating: What's a Librarian to Do?Brian Gray
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
How to Prevent Cheating in an Online Course
How to Prevent Cheating in an Online CourseHow to Prevent Cheating in an Online Course
How to Prevent Cheating in an Online CourseEvan Silberman
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ssLenva Shearing
 
Plagiarism tutorial
Plagiarism tutorialPlagiarism tutorial
Plagiarism tutorialcarol90403
 
Plagiarism tutorial
Plagiarism tutorialPlagiarism tutorial
Plagiarism tutorialcarol90403
 
IIM Secondary Overview
IIM Secondary OverviewIIM Secondary Overview
IIM Secondary Overviewiimresearch
 
LIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docx
LIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docxLIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docx
LIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docxsmile790243
 
STCC Library Information Literacy Assignment Tips 2017
STCC Library Information Literacy Assignment Tips 2017STCC Library Information Literacy Assignment Tips 2017
STCC Library Information Literacy Assignment Tips 2017STCC Library
 

Similar to Technology in the classroom (20)

Citation 101: Teaching Students to Avoid Plagiarism
Citation 101: Teaching Students to Avoid PlagiarismCitation 101: Teaching Students to Avoid Plagiarism
Citation 101: Teaching Students to Avoid Plagiarism
 
Plagiarism2
Plagiarism2Plagiarism2
Plagiarism2
 
A & S Plagiarism Presentation
A & S Plagiarism PresentationA & S Plagiarism Presentation
A & S Plagiarism Presentation
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database Resources
 
Plagiarism Ppt Teachers
Plagiarism Ppt TeachersPlagiarism Ppt Teachers
Plagiarism Ppt Teachers
 
Quoting
QuotingQuoting
Quoting
 
Assignment learning and cognition
Assignment learning and cognitionAssignment learning and cognition
Assignment learning and cognition
 
Plagiarism in the classroom pp presentation
Plagiarism in the classroom pp presentationPlagiarism in the classroom pp presentation
Plagiarism in the classroom pp presentation
 
Techno-Cheating: What's a Librarian to Do?
Techno-Cheating: What's a Librarian to Do?Techno-Cheating: What's a Librarian to Do?
Techno-Cheating: What's a Librarian to Do?
 
Social media policy
Social media policySocial media policy
Social media policy
 
How to Prevent Cheating in an Online Course
How to Prevent Cheating in an Online CourseHow to Prevent Cheating in an Online Course
How to Prevent Cheating in an Online Course
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Ethics
EthicsEthics
Ethics
 
Plagiarism tutorial
Plagiarism tutorialPlagiarism tutorial
Plagiarism tutorial
 
Plagiarism tutorial
Plagiarism tutorialPlagiarism tutorial
Plagiarism tutorial
 
IIM Secondary Overview
IIM Secondary OverviewIIM Secondary Overview
IIM Secondary Overview
 
LIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docx
LIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docxLIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docx
LIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docx
 
STCC Library Information Literacy Assignment Tips 2017
STCC Library Information Literacy Assignment Tips 2017STCC Library Information Literacy Assignment Tips 2017
STCC Library Information Literacy Assignment Tips 2017
 
Computer Rules
Computer RulesComputer Rules
Computer Rules
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Technology in the classroom

  • 1. TECHNOLOGY IN THE CLASSROOM PRESENTER DATE “This presentation contains copyrighted material under the educational fair use exemption to the U.S. copyright law." EDNA LAMARCA NOVEMBER 11, 2013
  • 2. THE CORE PRINCIPLES Computer Safety That Students Must Know Citation Social Networking Plagiarism Ethics Copyright Guidelines
  • 3. TECHNOLOGY HARDWARE: • – – – – Technology Hardware Passwords Acceptable Use Policy Be careful with devices • Place securely on tables Handle carefully Watch for cords and cables Keep devices clean Respect software and programs – Never open attachments you are not expecting – Never download programs, apps, etc. – Keep an updated virus protection plan – Back up your files regularly
  • 4. PASSWORDS: • • • • • • Your responsibility Unique Changed on a regular basis Composed of both letters and numbers Never be given to anyone else Not be taped under the computer or in another easily accessible place
  • 5. ACCEPTABLE USE POLICY: • • • • Your responsibility to know the rules Parental Permission Form Everything may be searched by school authorities/law enforcement officials Never: – – – – Access pornographic, obscene material Vandalize property of another person Pirate software Violate any local, state, or federal statue
  • 6. WHEN WE ENTER THE INTERNET WE BECOME CONNECTED WITH THE WORLD We must be professional and responsible with every word • • • Never give out personal information Secure sites “https” but not “http” Organizations want to market to you
  • 7. A STRANGER IS A STRANGER Protect yourself from predators Protect yourself from Cyberbullying Protect yourself from giving out too much information Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons.
  • 8. ETHICS • Is the branch of philosophy that deals with moral judgments, issues of right and wrong, and determining what behaviors are humane or inhumane. “Ethical Action” is an action that does not have a damaging impact on oneself, other individuals, or society. Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons.
  • 9. JOHNSON’S THREE RULES OF TECHNOLOGY ETHICS 1. Privacy – I will protect my privacy and respect the privacy of others. 2. Property – I will protect my property and respect the property of others. 3. Appropriate use – I will use technology in constructive ways and in ways that do not break the rules of my family, faith, school, or government. Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons
  • 10. Do Not:  Steal or Destroy  Exaggerate or embellish  Look at or create tasteless, offensive or lacking in educational value material Do:  Treat intellectual property the same way you would treat physical property  Question material - Hate groups, Political extremists
  • 11. DOES MY USE OF THE TECHNOLOGY VIOLATE THE PRIVACY OF OTHERS, OR AM I GIVING INFORMATION TO OTHERS THAT I SHOULD NOT? Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons.
  • 12. Johnson, G. (2012). Copyright and Fair Use - General Guidelines Statement and Disclosure
  • 13. Books/Magazines – Up to 1000 words but not more than 10% Poems – Up to 250 words or if less the entire poem Photographs/Drawings – Up to 5 graphics from the same person Video – Up to 3 minutes but not more than 10% of entire video Music – Up to 30 seconds but not more than 10% And cannot be changed in any way  “Fair use” statement at beginning of presentations  Bibliography      NC Wise Owl. (2009). Copyright Guidelines. Retrieved from http://www.ncwiseowl.org/zones/copyright/Student_Guidelines.html
  • 14. PLAGIARISM  Accidental or Intentional Plagiarism:          Copying a quotation without quotation marks Not writing the citation showing where the information comes from Writing material very close to the original Paraphrasing - writing another’s ideas in your own words – rearranging words Copying and pasting without using citations or quotation marks Purchasing work (such as essays) from the Internet and claiming them as your own Using another student’s work as your own Using images, charts, or graphics without a citation Giving information that is not accurate mizikar, A. (). Battling Plagiarism in the Internet age. Retrieved from http://www6.wittenberg.edu/lib/help/plagiarism/
  • 15. METHODS OF CHECKING FOR PLAGIARISM Changes in Writing Style Changes in Font Not the Right Topic Check Citations Dated References Unusual Word Choices Above/Below Class Level Samples of In-class Writing Students Write Summaries Boolean Searches Microsoft mizikar, A. (). Battling Plagiarism in the Internet age. Retrieved from http://www6.wittenberg.edu/lib/help/plagiarism
  • 16. Easy Bib • http://content.easybib.com/citation-guides/apaformat Study Mode • http://www.studymode.com/citation-generator/ APA Format Citation Generator • http://apareferencing.ukessays.com/
  • 17. THE CORE PRINCIPLES     Follow the Rules Ask Report Learn Computer Safety Citation Microsoft Social Networking Ethics Plagiarism Copyright
  • 18. Bibliography Chaudhary, N. (). Free Images of Technology. Retrieved from http://www.google.com/search?q=free+images+of+technology&nord =1&rlz=1C2GGGE_enUS510US543&tbm=isch&tbo=u&source=univ&sa=X&ei=wrd2UouDCOSOyAHqhIGQDg&ved=0CFwQsAQ&biw =1292&bih=683#facrc=_&imgdii=_&imgrc=Y1axob-gHnJyJM%3A%3BmewJg4JEtZemvM%3Bhttp%2 Free Images of Technology. Retrieved from http://office.microsoft.com Free Images of Technology. Retrieved from http://www.google.com/search?q=free+images+of+technology&nord=1&rlz=1C2GGGE_en US510US543&tbm=isch&tbo=u&source=univ&sa=X&ei=wrd2UouDCOSOyAHqhIGQDg&ved=0CFwQsAQ&biw=1292bih=683 Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?assetMetaId=d9ec986b-3a6b-48fd-85ec- 278389888511&assetDataId=22d60f48-4737-40d0-93c6-ba6b18108fdf&sectionId=ch07lev1sec1&assetpdfdataid=dd438dd1-2462-4fe09eeb-a422cffd9dff Johnson, G. (2012). Copyright and Fair Use - General Guidelines Statement and Disclosure. Retrieved from http://www.resourcesforlife.com/docs/item6247 Mizikar, A. (). Battling Plagiarism in the Internet age. Retrieved from http://www6.wittenberg.edu/lib/help/plagiarism/

Editor's Notes

  1. This presentation is to help teachers in teaching students how to appropriately and responsibly use technological devices. BECAUSE OF THE ANIMATIONS SOME SCREENS WILL REQUIRE THAT YOU CLICK A SECOND TIME. If the slide does not change just click again.Thank you.
  2. The use of technology in our schools today have many advantages and there is much that you, the students, must be taught in order for you to use new technology correctly and to keep yourself safe. Today we are going to discuss six areas that as teachers it is our responsibility to teach and enforce in our classroom so that you will be good technology citizens.
  3. First and foremost you need to know some basic computer safety guidelines.
  4. You are responsible for the care and condition of devices. Place devices carefully and securely on surfaces. Handle them carefully. Do not be “playing around”, “tossing” or in other ways endangering the devices. Be aware of cords and cables. They can be stepped on, tripped on and cause devices or students to be damaged. Keep devices clean. Be careful with food and especially drink around them. Wipe them and remove dirt and smudges regularly.Respect software and programs. Never open attachments you are not expecting. This is one of the ways that viruses and worms attach your devices. Never download programs, apps or other software without the permission of your instructor. Keep an updated virus protection plan on your computers and run scans regularly. If you are surfing the internet a lot then run your security scans daily.
  5. Passwords are your security that other people will not alter or delete your files. It is your responsibility to maintain a strong password, change it regularly and not share it with other students. You all know what happens when you tell your best friend your locker combination. Soon everyone in your group knows your combination and finally someone outside your group finds out and things begin to disappear from your locker. This same scenario happens when you share your password. Your teacher will need your password and your parents but no one else is to have your password.
  6. Your school has an “Acceptable Use Policy”. This is your manual of guidelines of what is acceptable and unacceptable while using your technological devices. Your are responsible to know what is in the policy and to follow the rules. If you do not follow the rules one of the consequences is that you will not be allowed to use technology and will have to do your assignments with an encyclopedia and paper and pencil. Think about that. Will it be worth it to have this opportunity to work on your assignments with computers, tablets, cell phones, video cameras, etc. taken from you because you do not follow the rules? You are being given the chance to show us that you are responsible enough to have these devices in your hands at school to be used for education. Your parents must sign a Parental Permission Form before you are allowed to use any device. This form will be kept and if there is a violation it will be referred to when consequences are assigned. All school files, e-mail accounts, log-ins, and any other technological areas may be viewed by school authorities and law enforcement officials. They are all school property and thus open to school inspection at any time.Now only a few reminders of main points in the Acceptable Use Policy. Never access pornographic, obscene or explicit material. Do not vandalize property of another person. This includes going in and deleting or altering their files. Never download or exchange pirated software. “Pirated” means software that has been copied illegally, usually because someone did not pay for it. Do not accept a copy of a great game or other material that you know should be paid for. Do not violate the law on the internet. It has the same serious consequences as when you do them off the internet. Threats, lies, exaggerations, distasteful jokes, slander are unacceptable and will incur consequences.
  7. Social networking refers to your online activities and more specifically communications with other people. Some of these include e-mails, Facebook, Twitter, texts, cell phone conversations, websites, and communications with other internet sites.
  8. When a student is communicating with other people through technological devices they are expected to show maturity and keep their communications, language and words professional at all times. Never give out your social security number, telephone number, e-mail address, mailing address or other personal information. Know what a secure site is. If the address begins with “https” it is usually secure. Watch for a “http” for that is not secure. Students need to understand that business and organizations want your information in order to market products to you. They are not trying to be your friend. They are trying to sell you something or get you to do something. That is not why we are using these devices in the classroom and you need to learn how to communicate appropriately with them so that when you are not at school you can still handle these situations.
  9. On the internet you are swimming with everyone. There are good fish and bad fish. You must protect yourself from people who are trying to harm you by getting your information or using inappropriate language or illegal materials. (CLICK) There are sites that will use colorful language or racial slurs or offensive pictures. You must report any site that makes you feel uncomfortable or any text or conversation that is not what your were expecting. The internet is your responsibility but your teachers are here to help and guide. Report anything strange. Your teacher will check it out. The internet is your world of information and entertainment. Make it safe for yourself and others. Swim safely in the world of the Internet.
  10. Ethics is often misunderstood and requires a person to develop their own sense of honor. Are you a person of honesty and integrity? Are you a person others can trust? Do you do you say what you will do and do what you say? Who are you? Who you are is defined in your actions and make up your character. When we talk about ethical use of Internet material we are talking about how you use videos, music and printed material.
  11. Let’s define “ethics”. Ethics is the branch of philosophy that deals with moral judgments, issues of right and wrong, and determining what behaviors are humane or inhumane. “Ethical Action” is an action that does not have a damaging impact on oneself, other individuals, or society. Let’s stop for a minute. What words up here would you like to talk about or have a better definition? (At this time have a discussion with students clearing up any misconceptions and clarifying what is meant by ethics before going to the next slide.)
  12. D. Johnson in his book,The classroom teacher’s technology survival guide, outlines “Three Rules of Technology Ethics”. These three rules cover First privacy: I will protect my privacy and respect the privacy of others. Second, Property: I will protect my property and respect the property of others.Third: Appropriate use – I will use technology in constructive ways and in ways that do not break the rules of my family, faith, school, or government.The important words here are “protect”, “respect” and “not break the rules”.
  13. Students need to use the same rules in cyberspace that you use in the real world. Do not steal or destroy materials or information. Do not change pictures in order to make fun of someone or spread gossip or lies. These kinds of activities will harm your reputation and your creditability. Do not look at or create materials that are offensive, pornographic or lacking in educational value. You are using technology to learn and do your assignments. You are not using it to entertain or make fun of people or look at inappropriate material.You may also be exposed to literature written by groups that are racist, hateful or extremists. You need to report these propaganda materials to your teacher and they may become an opportunity for your class to discuss this type of material.
  14. All this talk of ethics, right and wrong, respect and protect can be narrowed to one simple question. Ask yourself this each time you use technology: Does my use of technology violate the privacy of others, or am I giving information that I should not?
  15. Copyright laws and guidelines are written to protect computer software. People who spend the time creating something have copyrighted their materials and a person cannot use their creations without paying for them or receiving permission to use them. When you pay for software, such as programs or games, you are only paying to use the software – Not to change it or copy it for someone else. We talked about pirating earlier. Pirating is copying material that is copyrighted without the owner’s permission and selling it or giving it to another person. It is stealing. It is illegal. If has the same punishments under the law as if you had broken into someone house and stole some money. How much is your good name worth? $20, $50 or $100. I hope it is worth thousands of dollars. Once you cheat and lose your good name it does not matter is you get caught or not. It matters that you sold your good name for a few dollars. It is not worth breaking the law for the savings of some money instead of legally paying for it.
  16. There are copyright guidelines for including work that was prepared or created by other people. This guidelines are written to ensure that only a small portion of original material is used and that the commercial value of what you are using is not diminished. (Teachers may want to stop at this point and discuss how using the whole song or copying it for a friend would “diminish the commercial value”). The guidelines help you, the student, to create a work that is mostly yours and not just a collection of copied material. Also, your new work is for your benefit and it is not for commercial gain. If you plan on using what you have created to make money then you must get written permission in order to use the material you are copying. Also, your new work must be a critique, a satire or for educational purposes.
  17. You can use up to 1000 words of books and magazines but not more than 10%, poems up to 250 words or if the poem is less than that then you may use the complete poem. You may use up to 5 pictures or drawing from the same person. A video can only be a total of 3 minutes and not more than 10% of the video. Music is the same. Only 30 seconds and you cannot change the music in any way. Also, you should have a “Fair use” statement at the beginning of presentation and always, always, always you need a bibliography correctly citing all of your sources.
  18. Copyright laws and guidelines are written to protect computer software. People who spend the time creating something have copyrighted their materials and a person cannot use their creations without paying for them or receiving permission to use them. When you pay for software, such as programs or games, you are only paying to use the software – Not to change it or copy it for someone else. We talked about pirating earlier. Pirating is copying material that is copyrighted without the owner’s permission and selling it or giving it to another person. It is stealing. It is illegal. If has the same punishments under the law as if you had broken into someone house and stole some money. How much is your good name worth? $20, $50 or $100. I hope it is worth thousands of dollars. Once you cheat and lose your good name it does not matter is you get caught or not. It matters that you sold your good name for a few dollars. It is not worth breaking the law for the savings of some money instead of legally paying for it.
  19. Plagiarism is another form of stealing. Plagiarism is when people use an author’s language, thoughts, ideas, or expressions and claims it as their own work. It can be accidental or intentional. There are several ways that you can commit plagiarism. It can be accidental because you are not careful with your work or it can be intentional, which means you do it on purpose. When you copy someone else’s work and claim it as your own you have stolen their work. When you take someone else’s idea and do not give a citation telling where you found the material about the idea then you have stolen their idea. When you write something that is almost the same as what is written somewhere or copy and past and do not give a citation then you have committed plagiarism. If you purchase an essay or other material off the Internet or use another student’s work and claim it as your own you have broken the law. Think about it. Suppose you came up with a really great recipe or a way to make a gocart go faster. You probably did a some research, baked or built a lot, tried different ideas, eliminated things that did not work, tried other things and finally found the right combination. Then you put it on the internet so that you could either sell it or just share it with others. Then someone comes along and takes your idea and puts it in a cookbook or engineering magazine and becomes famous for the idea and makes a lot of money. Do you see how that person has stolen from you? Plagiarism counts for even the smallest ideas. When people come up with books and thoughts and different ways to look at things that is their idea and when you use it in your work you must write a citation and give them credit for what they have done.
  20. With better technology enforcement of the rules is also becoming easier. Teachers and associates have learned how to check for plagiarism. By showing you a few of the ways they become aware the plagiarism might be happening you will know if you are crossing the line into deception. Some of the clues include changes in writing style, unusual word choice, changes in the font, and the writing is above or below what is the level of the class or the paper does not really address the topic. Teachers also keep samples of in-class writing to compare. Teachers will check the list of works cited to see if they are real, they may ask for students to turn in copies of the works they have cited, they may ask students to write summaries in class about their papers. Teachers may notice that the references have old dates cluing that the paper was not written recently. There are also internet resources called Boolean searches that will search papers for the teachers and report back after checking on all the cites and other clues that show a paper is not the student’s own composition. So, be careful. If you are in doubt as to how to use information, check with your teacher. Ask questions and learn the proper way to cite.
  21. Citations are very important. Often people leave them out because it seems hard to write them correctly. You need to learn how and when to use citations. There are many Internet sites that will tell you how to write a citation and some will even do it for you when you put in the information. There is no reason not to be able to cite what you find on the Internet correctly. You will learn to use the APA form with the aide of your teacher. It is one of the most common forms and it is easy to find sites to help you on the Internet. The citation is a little different for each type of resource such as websites, articles, movies, videos, TV/radio broadcasts, pictures, clipart, sound clips, etc. You need to know how you should cite in text and on your reference or bibliography page at the end of your paper.
  22. The use of technology in our schools has had a lot of controversy as to whether we should allow students to use them in the classroom. In order to keep these resources available for you to use it will require that you learn and practice the proper and legal use of the Internet and other devices. As you begin to learn and work in the classroom the responsible thing to do is ask you teacher whenever you are not sure and report anything that does not look appropriate. With your help we will be able to keep the technology we have and add more in the future to make your learning more fun and exciting.