this was one of the websites used on prac. Information Communication Technology is incorporated within the student’s daily routine. The student’s daily routine starts with English for 45 minutes, through this lesson the teacher and students use the interactive whiteboard for a warm up lesson. The activity on the whiteboard prepares the students for what they will be doing in English. The next activity is maths and it runs for 45 minutes and followers the same process as English in using the interactive whiteboard as a warm up the lesson.
Wow, what a day, mixed emotions are still running with the unit as I’m not doing very well with the assignments so going into prac I was quite nervous an anxious, after today I am at ease as the children didn’t eat me, guess having most of them the last few years through the day care I worked made it a easier transition. I’m still quite unsettled about passing but I guess time well tell. Bring on day to, I’m ready for bed.
what a strong way to children reality, was very impressed and thought it was great, made me a shiver a little bit though honestly
a good link to show students is the connect.ed site. this module provided a link which I thought would be useful and showing children safety http://www.cybersmart.gov.au/Schools/Teacher%20resources.aspx
Case study complete
- Sam is looking at his favourite football site when a message pops up on his screen telling him that the computer has a virus and he should click the button to remove the virus. Sam tells his mother they have a virus but he does not click the button.
Correct. Sam was being a good cybercitizen. He treated the message cautiously and he consulted with an adult.
- Jasmine borrows her friend’s mobile phone to call her parents as the battery is flat on hers. A text message appears on the phone after Jasmine has made the call. Thinking it might be her parents, Jasmine opens the message to see that her friend has received a hostile text message from an anonymous phone number. Jasmine is shocked at first. Then she deletes the message before her friend sees it.
Correct. Jasmine should have showed positive online behaviours by reporting the text message to a parent or teacher. She was not being a good cybercitizen.
- Kiesha is in year 7. She has a major project due the next day and needed some information about an Australian author. She comes across a fan blog that gives a biography of the author with details that contradict the research that Kiesha has done herself. Even though other information on the blog fills in a few of the ‘blanks’ in the project, she decides not to trust any of the information contained on the site.
Correct. Kiesha showed good media literacy capabilities. She analysed the information, cross-checked it against what she knew and questioned whether the author was accurate or not. Even though some of the other information might have been true, Kiesha was right to be cautious. She was being a good cybercitizen.
- Dillon’s friendship group is organising a LAN gaming party. They talk about it together at school. As the excitement mounts, one of the boys says he’ll post the address of the party on facebook so they’ll all know where to go. Dillon tells him not to do that, as you shouldn’t put addresses online like that. His friends laugh at him, saying facebook is safe and only friends can read the address. Dillon feels uneasy about this and tells his father.
Correct. Dillon was being a good cybercitizen by showing good peer and personal safety capabilities. He stopped his friend from publishing personal information which could have been used by antisocial or hostile internet users. Some facebook privacy settings would allow friends of friends to see the address. This could number in the hundreds.
- What is a cookie in internet terms?
That’s correct. Computer cookies are small files placed on your computer when you visit a website. The website saves a complementary file with a matching identification (ID) tag so it can recognise you by matching the cookie with the website’s copy.
- What is cyberbullying?
Cyberbullying involves the use of information and communication technologies, such as email, mobile phone and pager text messages, instant messaging (IM) and defamatory personal websites, to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others
- What is a firewall?
Firewalls are computer systems that can limit and stop access to computers by unauthorised people or systems. A personal firewall can be installed to protect a computer from intruders on the internet. Firewalls may also help to stop the spread of viruses and spam and can be a valuable tool in protecting children online.
- What is a micro-blog?
That’s correct. Micro-blogging sites are social networking websites that people can sign up for, and send out regular updates about, their daily activities. One of the most popular micro-blogging sites is Twitter. People who use micro-blogging sites can both share their updates and follow others’.
- What is phishing?
That’s correct. Phishing is when emails are sent from falsified email addresses. Many phishing emails often claim to be from a bank, online retailer or credit card company. These emails direct recipients to a website that looks like the real website of a retailer or financial institution, which is designed to encourage the visitor to reveal financial details such as credit card numbers, account names and passwords, or other personal information.