Download presentation
Presentation is loading. Please wait.
Published bySusan Bennett Modified over 8 years ago
1
BEST SECONDARY WEBSITES January 2009
2
Expectations C – can you talk? Yes! This will be essential to building the best collection of Elementary Websites! Cells/text….put them on “stun” & take calls outside Quietly enough so that only the person next to you can hear H - How to get help? Questions are GOOD! Feel free to ask a neighbor quietly A – What about Activities? Discussions and activities are the “heart” of having a great experience. You will get out of them what you put in! M – can you Move? Quietly – yes! P – How will I know you are Participating? Bring the focus back to the front after discussions. Returning promptly from breaks and utilizing your discussion time!
3
Workshop Objectives Review structure of 21 st Century Learning Review Netiquette to lay the foundation of responsible internet users Familiarize ourselves with NETS and SD Technology standards Explore internet resources Review and collaborate on what we find via a wiki space and social bookmark site.
4
Themes Global AwarenessFinancial, Economic, Business and Entrepreneurial Literacy Civic LiteracyHealth Literacy Skills Problem Solving CollaborationAnalytical thinking CommunicationFinding and Evaluating Information Creating and Innovating Tools Newspapers, books, spreadsheets, graphing calculators, computers, internet resources, websites, databases, digital libraries, television, observational and measurement tools, videos, DVD’s, CD’s, telecommunication, word processing, presentation tools, smart boards, GPS, probes, manipulatives, geometry tools, digital cameras, laptops, multimedia, scanners, video equipment, digital recorders,mp3 technology, cell phones……
5
Let’s get started… Check your knowledge of Net etiquette…. http://www.albion.com/netiquette/netiquiz.html Core rules to Net etiquette- http://www.albion.com/netiquette/corerules.html This is applicable to teaching your students, too.
6
Instructional Purpose Why are you choosing to send students to a website? Efficiency Enriching Extending
7
² Matrix of the Four Planning Questions, the Nine Categories of Instructional Strategies, and the Seven Categories of Technology Planning Questions Instructional Strategies Word Processi ng Applicati ons Sprea dshee t Softw are Organizing and Brainstorm ing Data Collec tion Tools Multime dia Web Resou rces Com muni catio n Softw are What will students learn?Setting Objectives ●●●●● Which strategies will provide evidence of student learning? Providing Feedback ●●●● Providing Recognition ●●●● Which strategies will help students acquire and integrate learning? Cues, questions, and advance organizers ●●●● Nonlinguistic Representation ●●●●●● Summarizing and note taking ●●●●● Reinforcing effort ●● Which strategies will help students practice, review, and apply learning? Identifying Similarities and Differences ●●●● Homework and Practice ●●●●● Generating and testing hypotheses ●●●
8
Some Great Websites… Teachers Maybe thinkfinity or google or arlys peterson’s lesson plans Students Elem/MS/HS Elem/MS/HS www.ePals.com www.ePals.com http://www.starfall.com http://www.starfall.com
9
How sites were chosen? Ease of access Ease of navigation Valuable and relevant content Credible and reliable content Free availability
10
Tips to finding a missing site… Check very carefully that you have entered the site’s address accurately. Wait a few moments and try the site again. Use a search engine and enter the name of the site (not the URL) Trim the URL by eliminating elements of the address starting at the right. Use the “Wayback Machine” at www.webdev.archive.org it can retrieve archived websites with about a 75% success rate. www.webdev.archive.org
11
General Information Plug-ins- free software programs that enable users to play audio or video and display PDF files. Online Bookmark Service- store you favorite bookmarks online rather than on your computer. Practice Safe Surfing
12
Threats that need consideration: Malware- malicious software designed to damage computer files or disrupt system and network operations. (ie virus, worm, trojan horse, backdoor, keylogger) Spyware- software that gathers data about you and the way you use your computer, usually for commercial purposes. Spoofing- a technique used by hackers to gain unauthorized access to a computer or network share. (ie) asking for a password, download a patch, give credit card info)
13
Best protection… Install all critical security updates for your operating system and software. Firewalls prevent unauthorized access to your system by filtering every packet of information coming in from or going out to the internet, then blocking traffic that doesn’t meet its security criteria.
14
NETs and SD Technology Standard
15
Social Bookmarking
16
Bookmarking Tonight’s class will explore/introduce: Delicious – social bookmarking service Portaportal – utility based bookmarking (server- based)
17
Folksonomy What is it? How do you use it?
18
My Portaportal Navigate to www.my.portaportal.comwww.my.portaportal.com Guest Name: http As a guest you may view but not add or edit links
19
Delicious And what’s delicious?
20
Your project… Work together to find: Three websites you think are worth sharing Two websites that you really like One website you’ll use on Tuesday
21
Remember… Information literacy: Is the information from a credible source? Is the information current? Media literacy: What is the source? What is the bias? How is this material meant to influence you?
22
Group Share Share the websites you found, please include rationalization Where does this fit in 21 st Century learning? What is your instructional purpose for the website? How will you assess it?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.