Copyright: The legal protection provided to authors of "original works of authorship". (See Above Document) Fair Use Guidelines: Allow people other than the author/copyright owner to copy all of a document or certain parts of the copyrighted document without the permission of the copyright owner. Copyrighted materials should be used in the classroom because it allows students to understand human, cultural, and societal issues related to technology, and thus allow/promote them to practice legal and safe behavior when using technology. (See Above Document)
Website Evaluation
It is important to evaluate websites before using them in a classroom for several reasons. A website that has not undergone evaluation by a teacher may have unnoticed content in it that may be inappropriate for students to be reading or seeing. The website may contain information that is not credible or accurate, and may cause students to become easily biased, swayed, or confused due to their impressionability. The website may be very difficult for students to navigate on their own, thus causing them further confusion. Finally, the website may prove to be distracting to students due to its large amounts of advertisements or pop-up windows that appear when students try to access information.
What is bullying and why is it such an important issue for teachers?
Explain cyberbullying and why it is different from bullying.
List at least 5 things you can do to create a safe environment in which bullying is unacceptable.
Describe three age-appropriate activities you can do to make students aware of and prevent and deal with bullying in your future classroom
1. Bullying is intentionally negative and aggressive behavior that exists over a period of time with an imbalance of power. It can exist in a variety of forms, such as physical bullying, emotional bullying, mental bullying, or cyber bullying. Bullying is an important topic of interest for teachers because it often takes place in the classroom setting. 2. Cyberbullying is a form of bullying that takes place online through things such as email and social media. It is different from regular bullying because if often does not take place in a face-to-face interaction, where people can see it happening or are made aware of it. 3. Five Things I Can Do to Create a Safe Environment For My Students: -Develop rules that specifically state a no-tolerance policy for impolite behavior -Take immediate action when bullying behavior is observed -Refer bullies and their victims to a school counselor or contact the student's parents -Hold class meetings in which students can openly discuss their bullying experiences and be made aware of the effects of bullying -Contact police in the event of cyberbullying
What are the 9 rules of the road for kids to use the Internet safely?
What are 5 ways that you can make yourself more private on the Internet?
What are 4 pros and 4 cons of using location services?
What are at least 4 dangers of using social networking sites?
What kind of rules should teachers have for themselves when social networking sites like Facebook or Twitter?
1. -Guard your privacy. -Protect your own reputation -Don't hide behind a screen name -Realize that nothing you post is totally private -Assume everyone is watching you and has access to the things you post. -Apply the 'Golden Rule': treat others as you would want to be treated -Watch the clock, maintain a life outside of social media -Choose your words wisely -Think before you act
2. -Don't share your birthday, age, phone number, or birthplace, as it can be copied and shared with others -Use a strong password that is not easily able to be copied -Never provide a work-associated email as a contact -Make your privacy question something that not many people know about you. -Don't publicize your vacation plans or where your home is located. 3. .Pros: -Allow for some independence and free movement -It is a lifesaver when you are lost. -It can be enjoyable sharing where you are at, and seeing where your friends are at or where they have been -It is a fun activity and allows for learning navigation skills
Cons: -It can be costly to use constantly -People can know where you actually are or where you have actually been. -An app gets your basic information whenever you use this service. -This service only works if your phone is on. So if it dies, you are out of luck.
4. -Posts are often easily accessed by the public -People are susceptible to stumbling across "raunchy" material -Data does not disappear simply because you cannot see it anymore -Posts can often be copied and shared by random people, and then sent to random people.
5. -Be cautious of what you post, you are a role model for your students. -Check your privacy settings to protect your personal life from curious eyes. -Know what is/isn't allowed or tolerated by your school's computer or internet policies. -Be upfront with others about the content you want to be shared with or about you. -Know your rights when it comes to online free speech and privacy rights.
Equitable Access
1. Equitable access is an important topic for teachers to understand because they need to be aware that not all students have access to high-speed internet, or even a computer, at their own home. Many students have to go elsewhere to use a computer or the internet, and not having access to high-speed internet is causing these students to "fall behind" because non high-speed internet only allows access to certain websites, and the students may not need these.
2. Three things I can do to help provide equitable access to all students are: -use technology that is already available, so that the less fortunate students don't necessarily have to go elsewhere to find technology -schedule computer use for personal classroom computers, so that the less fortunate students can have guaranteed access to them -schedule time for school computer use as well, not just personal, in-class use
Assistive Technologies
1. It is important for me to understand assistive technologies for the following reasons: -My major is Special Education, so, naturally, many of my students will need to have access to these technologies and I will need to be familiar with them as well as the disabilities of each particular student. -Different assistive technologies operate specifically for certain programs on computers (apple, windows, mac, PC, etc.) so it is important to know when to use each type of program for the type of computer. -Different assistive technologies operate specifically for students with certain disabilities (visual impairments, physical impairments, etc.) so it is important to know my students' disabilities so I can pair them with a program that will work well for them.
2. Three benefits of using mobile technologies for mobility-impaired students are: 1. The programs are equipped with easy-to-use controls. 2. There is an on-screen keyboard, which allows students to have a better reach at what is directly in front of them. 3. The program is equipped with a zoom feature that allows students to see objects clearer without exerting a lot of movement on their own part.
3. Summarizing Assistive Technologies
For students with Dyslexia, Low vision, or Vision Impairments, there are features that allow them to see things appear larger or bolder on the screen in front of them, such as the zoom feature. Also, there is a feature that allows the students to hear what is appearing in front of them, instead of only being allowed to see it. Both of these features allow for reading and learning independence. For students that are mobility-impaired, there are several features that can assist them as well, such as a scrolling bar icon that allows for small movements within a constricted area, and an on-screen keyboard, also allowing for small movements within a smaller area. These features definitely benefit these students by allowing them access to features that do not require them to exert a lot of physical movement, thus allowing for more independence.