Updating search results...

Search Resources

129 Results

View
Selected filters:
  • digital-literacy
Examining the Effects of Social Technology Through Analysis of Fiction and Non-Fiction Writing
Read the Fine Print
Educational Use
Rating
0.0 stars

Some of your students seem to have superglued their hands to their cell phones; for others, it is their eyes that have been permanently affixed. Why do so many students find their personal technology more appealing than the real humans on around them . . . and what might be the long-term consequences of this? These are the questions this unit will address – first, through the rhetorical analysis of various articles on the effects of cell phones and social media, and then, through a careful study of dystopian fiction. Ultimately, students will draw their own conclusions and share their learning through letters to middle school students and a creative writing piece that suggests what will happen next.

A few of your students may whine about the work you are giving them. They may rage, rage against the dying of the light emanating from their cell phones. They may claim that teachers and parents just don’t understand. But ultimately they will be better educated, more prescient, less addicted, more creative, and of better use to their communities. I think it is worth the fight.

Subject:
English Language Arts
Material Type:
Lesson Plan
Unit of Study
Provider:
Yale-New Haven Teachers Institute
Provider Set:
2019 Curriculum Units Volume I
Date Added:
08/01/2019
Formatting an Existing MS Word Document
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson concentrates on how to format an existing Microsoft Word document.
The focus is on meeting the Northstar Digital Literacy skills standards for the formatting of a document (font, font size, line spacing, creating lists, review).
The functions required in Microsoft Word are covered and additional functions, such as Save As, Save can also be shown.

Subject:
Arts and Humanities
Career and Technical Education
Education
Material Type:
Activity/Lab
Lesson Plan
Date Added:
05/16/2018
Geospatial Thinking and the Digital Revolution
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this exercise students watch a video and then participate in a think-pair-share activity. The activity is designed to stimulate reflection and discussion on the nature of geospatial data. The activity emphasizes the ways in which the digital revolution has transformed the way we think and gather information about spatially located features, and how we navigate to those features.

Subject:
Applied Science
Computer Science
Information Science
Mathematics
Measurement and Data
Material Type:
Activity/Lab
Homework/Assignment
Provider:
Science Education Resource Center (SERC) at Carleton College
Provider Set:
Teach the Earth
Author:
Katherine Milla
Date Added:
01/20/2023
Health promotion and fake health science on social media
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this session you will be introduced to the methods and dynamics of relevance for health promotion on social media with specific focus on the role and impact of fake health science . The exercise is based on a simulation game where students will join an already established secret Facebook group.

Subject:
Applied Science
Business and Communication
Communication
Education
Health, Medicine and Nursing
Higher Education
Information Science
Material Type:
Lecture
Lesson
Date Added:
05/13/2019
How Online Communication Affects Privacy and Security
Read the Fine Print
Educational Use
Rating
0.0 stars

In this lesson, students will examine their digital footprints, discuss the positives and negatives of having a footprint, and determine how they can most safely manage their footprints.

Subject:
Applied Science
Computer Science
English Language Arts
Mathematics
Material Type:
Lesson
Provider:
Southern Poverty Law Center
Provider Set:
Learning for Justice
Date Added:
10/03/2017
Information Literacy in the Wild
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

In this text, you will see information literacy examined from the perspective of students in the School of Education and the School of Information at the University of Michigan. The diversity of these perspectives contribute to new understandings and realizations as their divergent backgrounds, experiences, aspirations, and influences, both in libraries and 'in the wild', are examined in common. Their findings lend a fresh perspective to the existing body of literature on information literacy.

Subject:
Education
Material Type:
Reading
Teaching/Learning Strategy
Provider:
University of Michigan
Author:
Individual Authors
Date Added:
12/19/2011
Information Security (06:01): Introduction
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the order of this lesson, as well as give basic definitions of:
•Machine-Level Security
•Network Security
•Internet Security
•Social Engineering

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:02): Physical Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:03): Authentication
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are

There are three forms of authentication
•Something you know
•Something you have
•Something about you

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:04): Protecting Your Data
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.

Data is always priceless

Three topics:
-Data migration
-Data backup
-Data disposal

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Date Added:
09/26/2014
Information Security (06:05): Network Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.

Links from Video:
-The System Administrator Song http://youtu.be/OpGN3oT1thA

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:06): Internet Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.

Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:07): Malware
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.

Links from Video:
-AVG by Grisoft: http://free.avg.com/us-en/homepage
-AVAST: http://www.avast.com
-ClamWin: http://www.clamwin.com/
-Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:08): Social Engineering
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.

I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.

Links from Video:
•Internet Storm Center: https://isc.sans.edu/
•SNORT: https://www.snort.org/
•Security Now: http://twit.tv/sn
•Internet Crime Complaint Center: http://www.ic3.gov/default.aspx
•Hak5: http://hak5.org/
•Facecrooks (facebook.com/Facecrooks)

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
The Internet (04:01): Networks 101
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The first video in the Internet series of videos supporting the Introduction to Computers and BCIS series.

In this video we talk about what is a computer network and how that relates to the Internet. We also talk about some of the basic types of network hardware we need to make a network as well as the difference between a LAN and WAN.

If you have no background in networking this is the video to start with before you go any further into the Internet series.

Subject:
Applied Science
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/25/2014
The Internet (04:02): Internet Basics
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

We love our definitions and in this video we define what the Internet is. We take a quick look at how the Internet got its start. Finally we look at how to get on the Internet, how to pick the right ISP and check to see how fast you are surfing.

Links from video:
http://www.speedtest.net/
http://speedtest.comcast.net/

Subject:
Applied Science
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/25/2014