Presentation is loading. Please wait.

Presentation is loading. Please wait.

What is Broadband? ”Data transmission technology that provides two-way data transmission to and from the Internet with advertised speeds of at least 768.

Similar presentations


Presentation on theme: "What is Broadband? ”Data transmission technology that provides two-way data transmission to and from the Internet with advertised speeds of at least 768."— Presentation transcript:

1

2 What is Broadband? ”Data transmission technology that provides two-way data transmission to and from the Internet with advertised speeds of at least 768 kilobits per second (kbps) downstream and at least 200 kbps upstream to end users.” Source: Connect Michigan Website http://connectmi.org/mapping/Frequently_Asked_Questions.phphttp://connectmi.org/mapping/Frequently_Asked_Questions.php So basically it’s high speed internet.

3 Agenda Survey BTOP Staff & Grant Information Objectives & Possibilities 21 st Century Skills Expectations Internet Safety & Cyberbullying Lighthouse Questions?

4 BTOP Welcome and Introduction Barb Light EUPISD BTOP Project Director Suzy Belonga Instructional Technologist Suzy Belonga Instructional Technologist Elementary Education and English, 2001 Masters in Educational Technology, 2010 Michigan State University Western Michigan University Masters in Biology Northern Michigan University Education Specialist Brimley Area Schools Science and Technology Middle School Teacher LaSalle High School Northern Michigan University Northern Arizona University Twin Peaks Elementary Second and Fourth grade teacher

5 Two more new positions at the ISD: Computer techs Kathy Fountain, Mike Rivenburgh Technicians will be available to assist with broadband connections in home.

6 http://tinyurl.com/EUPBTOP (also tinyurl.com/eupbtop) Broadband Technology Opportunities Program (BTOP)

7 A Federal Grant Program Our category is sustainable broadband adoption: Anywhere, anytime computing. American Recovery and Reinvestment Act funds ($10 billion) National Telecommunications and Information Administration ($4.8 billion of the $10 billion)

8 EUPISD’s Grant Money $3.165 million federal cash award $1.275 million match $ 760,000 cash District match of $50.00/student/year (includes device, tech support, software, community awareness) $ 515,000 in-kind (district tech personnel time and use of school facilities, for example)

9 Why Us? We are an underserved area for broadband. Previous educational technology initiatives in this region – WE ARE READY!!! Visionary thinking at the EUPISD. “…young people thrive in a world of ever-changing images, constant updates, and immediate access to whatever information they may want.” (Tony Wagner, The Global Achievement Gap, 2008, p. 177)

10 What are the objectives? Increase broadband adoption throughout Chippewa, Mackinac, and Luce counties Community awareness Economic development Medical resources Educational opportunities School to home education possibilities

11 Engagement is the key! One-to-one computing is a great engager because it is in the hands of the student actively learning with technology. 10 “The use of the Internet and other digital technology has transformed both what young people learn today and how they learn.” (Wagner, 2008, p.178)

12 Economic Possibilities advance small businesses online bill paying/banking compare companies/prices secure shopping store coupons/ads

13 Medical Possibilities Medical research: know symptoms, medicine side effects, solutions, etc. Online programs and information offered by health insurances. Search for the correct provider/specialist. Online pharmacies: order and mail to you!

14 Educational Possibilities Raise expectations Online class experience Individualize Remediation and enrichment activities, personalized projects, educational games, etc. Improve communication Monitoring grades 21 st century ready “So, are today’s students – and tomorrow’s workers – less motivated or just motivated in ways that may be unique to their generation?” (Wagner, 2008, p.38)

15 Looking to the Future: To the CLOUD! Access to tech tools and files from ANY internet connected device. The EUPISD cloud will be for all students K–12 and staff. Different for different groups of students.

16 2006 Workforce Readiness Report Center for Public Education “The 21 st Century Education” Skills for the 21 st C entury Tony Wagner’s Survival Skills for 21 st Century Workers www.wordle.net

17 Fully charge and fully discharge your battery to increase battery life. Wrapping cords too tight can break wires. Treat the equipment, others, and yourself with respect. Be gentle! Placing things on top of the netbooks can cause damage. Expectations

18 Expectations Use ethically. Ex. Copyright, bullying, appropriate posts, etc. Anticipate traffic tripping on cords. Have separate area for food and liquids.

19 Expectations Use the netbook educationally in and out of school. Allow others in your home to use the netbook. Bring it to school every day with a fully charged battery.

20 Expectations Report any problems to district tech staff immediately. 3 year warranty includes accidental breakage. Return it to school or ISD personnel prior to graduation or leaving the district. Failure to do so may result in the anti-theft software being engaged and a report to the police.

21 Expectations Computrace LoJack for Laptops Built in from the beginning. District only reports missing. LoJack locates, works with law enforcement in tracking it. Webcams are not remotely turned on by the district.

22 Safeguarding Students

23 Students’ online behavior 61% of 13 to 17 yr. olds have a personal profile on a social networking page. 71% report getting a message from somebody they don’t know. 40% said they usually reply. 18% said they would talk to an adult. 30% have considered meeting someone that they’ve only talked to online. 37% said they were not concerned about their private information being used online in ways they don’t want. Teen Internet Safety Study by Cox Communications and NCMEC2, found at NetSmartz.org “More teens who’ve talked to parents or guardians also ignore messages from unfamiliar people, refuse to reply or chat, block unknown senders, and report these occurrences to trusted adults.” Netsmartz.org

24 Safety Tips for Students Protect yourself online! Think about what you are posting. Nothing is completely private when you write it online. Colleges/universities and employers are looking. Respect others online: keep it appropriate. Delete unknown e-mails with attachments. Phone numbers, addresses, videos, travel plans, real names, etc. should be kept private. When is it okay to post a picture of others online? a.) any time you want b.) after you show it to your parents. c.) once you have the permission of everybody in it.

25 More Safety Tips for Students Keep account IDs and passwords safe. Be creative with screen names. MHALLIFWWAS11@something.com RARVAB6@nothing.com Unsure? Log off and talk to a trusted adult!

26 Safety Tips for Parents Keep the computer in a central location. Set time limits. Time to play and a time to work. Time to get up and move! Your expectations Be the student. Have your student teach you what a blog, tweet, post, etc. is. Video networking. Visit the sites: only self-policing. Set expectations for uploading, viewing, etc.

27 More Safety Tips for Parents Google your child’s name. What comes up? Images? Understand and try their online games Visit Netlingo.com and learn the acronyms: CD9 or 9, F2F, LMIRL, TAW, or TMA Respecting copyrights Netiquette Be aware of cyber bullying

28 Where are kids bullied? What percentage of teens discuss Internet safety with parents? 36% 33% of 13 to 17 yr. olds and 48% of 16-17 yr. olds said parents do not know what they do online. SOURCE: U.S. Department of Justice, Bureau of Justice Statistics, School Crime Supplement (SCS) to the National Crime Victimization Survey, 2007.

29 Cyberbullying A great source of information: http://www.stopcyberbullying.org One student using ANY technology to say rude, mean, nasty and otherwise inappropriate things about another student. According to the National Crime Prevention Council, which method to stop cyber bullying did most teens use? a.Report the cyber bully to an adult. b.Refuse to pass on the cyber bullying message. c.Tell the cyber bully to stop. 64% 44%

30 True or False? Cyberbullying StatementTrue or False See The Washington Post’s “5 Myths about bullying” for more information. True. Bullies are often the target of another bully. Also, if a target answers taunts in a rude, harmful way, they become the bully. A bully can be a target and a target can become a bully. You will never get bullied when you grow up. False. Unfortunately, bullying can happen at any age, but you can learn appropriate techniques to prevent or stop it. Bullying only happens online now. False. Unfortunately, bullying can happen anywhere.

31 What do you do about cyber bullying? 1.Prevent it. Do NOT post in anger or frustration. It is not entertainment. Report it to your trusted adult. Think about what you are posting. It’s not private once it is sent. 2.Action not audience.  Ignore or block it. Don’t respond.  Report bullying behavior to the school, police, ISP, cell phone service, or host site (MySpace, YouTube, etc.).  Don’t be a willing bystander or help spread it to others.

32 Vouchers

33 Website: http://tinyurl.com/EUPBTOPhttp://tinyurl.com/EUPBTOP Email: sbelonga@eup.k12.mi.ussbelonga@eup.k12.mi.us Questions?


Download ppt "What is Broadband? ”Data transmission technology that provides two-way data transmission to and from the Internet with advertised speeds of at least 768."

Similar presentations


Ads by Google