1. From Safe
Practices for Life Online: A Guide for Middle adn High School (2008) -D.
Fodeman & M.Monroe
a.
Lookstoogoodtobetrue.com risk tests
b.
Chapter 2 Protecting Your Privacy Online
i.
Pop-ups and Banner Ads- Pop up ads are advertisements
that show up in a new browser window. Pop-up
ads are just one form of internet advertising used by advertisers to get web
users' attention. A web banner or banner
ad is a form of advertising on the World Wide Web delivered by an ad server.
This form of online advertising entails embedding an advertisement into a web
page. It is intended to attract traffic to a website by linking to the website
of the advertiser. https://www.google.com/search?q=what+are+pop+ups+ads&oq=what+are+pop+ups+ads&aqs=chrome..69i57.4147j0j9&sourceid=chrome&es_sm=122&ie=UTF-8
https://www.google.com/search?q=what+are+pop+ups+ads&oq=what+are+pop+ups+ads&aqs=chrome..69i57.4147j0j9&sourceid=chrome&es_sm=122&ie=UTF-8#q=what+are+banner+ads
ii.
Spyware- software that enables a user
to obtain covert information about another's computer activities by
transmitting data covertly from their hard drive. https://www.google.com/search?q=what+are+pop+ups+ads&oq=what+are+pop+ups+ads&aqs=chrome..69i57.4147j0j9&sourceid=chrome&es_sm=122&ie=UTF-8#q=what+is+spyware
iii.
Zombies and Botnets- A ’bot’, short for robot, is a
type of software application or script that performs tasks on command like
indexing a search engine, and they are really good at performing repetitive
tasks. Once these machines are infected
they are called “zombies.” Once a
combined amount of these are infected, they are called a botnet. http://www.webroot.com/us/en/home/resources/tips/pc-security/security-what-are-bots-botnets-and-zombies
iv.
Cookies- A cookie is a mechanism that
allows the server to store its own information about a user on the user's own
computer. https://www.google.com/search?q=what+is+a+cookie&oq=what+is+a+cookie&aqs=chrome..69i57j0l5.5144j0j4&sourceid=chrome&es_sm=122&ie=UTF-8#q=what+is+a+cookie+in+technology
v.
Drive-by-downloads- A drive-by download refers to
the unintentional download of a virus or malicious software (malware) onto your
computer or mobile device. https://www.google.com/search?q=what+is+a+cookie&oq=what+is+a+cookie&aqs=chrome..69i57j0l5.5144j0j4&sourceid=chrome&es_sm=122&ie=UTF-8#q=what%20are%20drive%20by%20downloads
vi.
Cramming- Companies that engage in
"cramming" bill you for services that were never ordered, authorized,
received and/or used. People are getting
charged for internet-related services on their phone bills or credit-card
statements. http://www.atg.wa.gov/InternetSafety/InternetCramming.aspx#.VH-H2THF9u4
vii.
Trojan horse- non-self-replicating type of
malware program containing malicious code that, when executed, carries out
actions determined by the nature of the Trojan, typically causing loss or theft
of data, and possible system harm. http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29
2. From Transforming Learning
with New Technologies (2011) – R. Malloy, R.E. Verock-O’Loughlin, S.A. Edwards,
& B.P. Woolf
a.
Take Pew
Internet & American Life Project “What Kind of Tech User are You?” quiz. You scored better than 81.8% of the public,
below 9.9% and the same as 8.3%.
b.
Uniform Resource Locator (URL) aka Web Address –
What is the purpose of the following URL designations?
i.
.com- derived from the word commercial, indicating
its original intended purpose for domains registered by commercial
organizations.
ii.
.org- truncated from organization. The domain
extension was originally created for non-profits, but this designation no
longer exists and today it is commonly used by schools, open-source projects,
and communities as well as by for-profit entities.
iii.
.gov- derived from government, indicating its
restricted use by government entities in the United States.
iv.
.net- derived from network, indicating it was
originally intended for organizations involved in networking technologies, such
as Internet service providers and other infrastructure companies. However,
restrictions were never enforced and the domain is now a general purpose name
space. It is still popular with network operators, and is often treated as an
alternative to com.
v.
.edu- United States-affiliated institutions of
higher education
vi.
.mil- the Domain Name System of the Internet for
the United States Department of Defense and its subsidiary or affiliated
organizations. The name is derived from military
1.
http://en.wikipedia.org/wiki/Domain_name
c.
Specialized Search Resources for Teachers
1.
Criteria for Evaluating Web Resources
a.
Accuracy – reliability of the information on the
site by providing a description of who authored the site and for what purposes
b.
Authority – credentials of the authors or author
as well as the nature of the site itself – commercial or not for profit
c.
Objectivity – tests whether the information on
the site is fair and non-biased, and free of advertising
d.
Currency – up-to-date with recent information
and updates that are clearly indicated
e.
Coverage – information on the site that can be
viewed easily without difficulties or commercial messages
ii.
Internet Public Library
iii.
Voice of the Shuttle
iv.
Technorati
v.
Webopedia
vi.
Artcyclopedia
vii.
Encyclopedia of Educational Technology
viii.
California Learning Resource Network
ix.
Library of Congress American Memory
x.
University of Texas at Austin Perry-Castaneda
Library Map Collection
xi.
Newslink
xii.
Good Search
xiii.
Score (Schools of California Online Resources
for Educators)
xiv.
Search Engines 2
xv.
Wayback Machine
xvi.
Open Library
xvii.
Viewzi.com
xviii.
VueToo.com
xix.
LibriVox
d.
Internet Search Tools for Students
i.
KidsClick!
ii.
Ask for Kids
iii.
Search 22
iv.
Clusty
v.
Yahoo!Kids
vi.
QUintura
vii.
FirstGov for Kids
viii.
NASA Kids Club
ix.
The Why Files: The Science behind the News
x.
U.S. Oatent and Trademark Office Kids’ Pages
xi.
Time for Kids
xii.
Smithsonian Education
e.
Questions
i.
What is the meaning of information literacy for
teachers and students? Teachers and
students should be able to locate, evaluate, use and share information. They should be able to navigate information
resources, improve their quality of education, learn additional tools to
reinforce course content, and enhance lifelong learning. http://www.csulb.edu/~lfarmer/infolitwebstyle.htm
ii.
What are search engines and how do they work? a program that searches for and identifies
items in a database that correspond to keywords or characters specified by the
user, used especially for finding particular sites on the World Wide Web. Through links, search engines’ automated
robots, called “crawlers,” or “spiders” can reach the many billions of
interconnected documents. Once the
engines find these pages, they next decipher the code from them and store
selected pieces in massive hard drives, to be recalled later when needed for a
search query. To accomplish the monumental task of holding billions of pages
that can be accessed in a fraction of a second, the search engines have
constructed datacenters all over the world.https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=what+are+search+engines+
http://moz.com/beginners-guide-to-seo/how-search-engines-operate
iii.
What pieces of information do students need to
know about Internet searching? Students
should not believe everything they read on the internet; not every webpage is
reliable, Information found on the
internet can be second hand information so not all viewpoints are accurate.
iv.
How can teachers and students thoughtfully
evaluate online information resources, including the online encyclopedia
Wikipedia? If students and teachers find
information though online resources, such as Wikipedia, it is a good idea to
check those web pages’ sources. They can
lead you straight to the page where the information came from. It might also be a good idea to look up the
information found in a textbook or online database to check its’ accuracy.
v.
How can teachers respond to problems of plagiarism
when students use online sources?
Teachers can talk to their students about plagiarism and why it is wrong
before any assignment to ensure that they avoid it. They should also teach students to in some way
cite their information so they are giving credit to the original source. Another way to avoid plagiarism altogether is
to use Turnitin.com, which detects plagiarism in schoolwork.
No comments:
Post a Comment