By the end of this unit teachers should be able to: Technological …
By the end of this unit teachers should be able to:
Technological literacy 5- (a) Integrating the activity of using computer labs in teaching activities on a continuous basis.
Technology Literacy 5- (b) Work to manage the process of using complementary information and communication technology resources with individuals and small groups of students in the regular classroom so that other educational activities in the classroom are not disrupted.
Deepening knowledge 5- (a) Placing and organizing computers and other digital resources in the classroom so that learning activities and social interactions are supported and enhanced among the classroom students.
بحلول نهاية هذه الوحدة ، يجب أن يكون المعلمون قادرين على:
محو الأمية التكنولوجية 5- (أ) تكامل نشاط استخدام معامل الكمبيوتر في الأنشطة التعليمية بشكل مستمر.
محو الأمية التكنولوجية 5- (ب) العمل على إدارة عملية استخدام موارد تكنولوجيا المعلومات والاتصالات التكميلية مع الأفراد والمجموعات الصغيرة من الطلاب في الفصول الدراسية العادية حتى لا تتعطل الأنشطة التعليمية الأخرى في الفصل.
تعميق المعرفة 5- (أ) وضع وتنظيم أجهزة الكمبيوتر والموارد الرقمية الأخرى في الفصل الدراسي بحيث يتم دعم وتعزيز الأنشطة التعليمية والتفاعلات الاجتماعية بين طلاب الفصل.
Students develop their understanding of the effects of invisible air pollutants with …
Students develop their understanding of the effects of invisible air pollutants with a rubber band air test, a bean plant experiment and by exploring engineering roles related to air pollution. In an associated literacy activity, students develop visual literacy and write photograph captions. They learn how images are manipulated for a powerful effect and how a photograph can make the invisible (such as pollutants) visible. Note: You may want to set up the activities for Air Pollution unit, Lessons 2 and 3, simultaneously as they require extended data collection time and can share collection sites.
An activity sheet with bibliographic information, an annotation, and ideas for extending …
An activity sheet with bibliographic information, an annotation, and ideas for extending the book with children. 2016 CLEL Bell Award Book for the early literacy practice, TALK.
This is an 8 week experience for the college student that begins …
This is an 8 week experience for the college student that begins by setting a learning context through using library resources, especially online databases, for locating images and art that reflect a chosen research topic and creating a mural that demonstrates the students’ comprehension of the chosen topic. The experience includes conducting research on 3 significant events or people in women’s US history. The written research will be accompanied by images or art that the student has chosen (described) as reflective of, or related to the researched event or person. In order to determine the students’ level of information literacy, the research will include a detailed description of how the students located the images. The students will also draw or describe a personalized sketch of one of the researched events or people. The culmination of the research is the design and painting of a collaborative mural depicting the students' research topics.
This Reusable Learning Object (RLO) was created out of the desire to infuse university courses with information literacy or research activities. A traditional research project on significant events or people in history is enhanced with the discovery and analyzing of art and images within the context of history. Analysis not only includes written text but the painting of a mural. The RLO is structured in a way that allows for easy replication and alteration to a variety of subjects and learning levels.
This module includes 10 topics related to finding, evaluating, and presenting scientific …
This module includes 10 topics related to finding, evaluating, and presenting scientific information related to climate change or other interdisciplinary topics.
The ultimate goal is for students to prepare a paper and present it to their colleagues as though they were giving it at typical professional meeting such as American Geophysical Union, Geological Society of America, or American Quaternary Association. However, the technical level of the talk should be at a level that the class will understand and enjoy.
The topic should demonstrate scientific method rather than being merely descriptive or primarily applied science/technology. Students should use current literature. The presentation will be more interesting if the subject is somewhat controversial. The final product should demonstrate that the student understands and has gained the skills presented in all 10 topics.
(Note: this resource was added to OER Commons as part of a batch upload of over 2,200 records. If you notice an issue with the quality of the metadata, please let us know by using the 'report' button and we will flag it for consideration.)
To be information literate, a person must be able to recognize when …
To be information literate, a person must be able to recognize when information is needed and have the ability to locate, evaluate, and use effectively the needed information. By the end of this unit you will be able to Define Information Literacy, Define the four domains that fall under Metaliterate Learners, Identify a lack of knowledge in a subject area, Identify a search topic/question and define it using simple terminology, Articulate current knowledge on a topic, Recognize a need for information and data to achieve a specific end and define limits to the information need, and Manage time effectively to complete a search.
The intent of this OER is twofold: to offer a free or …
The intent of this OER is twofold: to offer a free or low cost quality text to our students in a one-unit information literacy course and to offer a starting place to anyone who wishes to develop their own class or OER. It is intentional that this text is not San Diego City College specific because the skills we teach in our LIBS 101, and are reflected in this OER, are transferable skills. This allows students to take what they learn here and apply it to any information need in any environment: academia, careers, life-long learning, bar bets, or what have you. It is not an attempt to be a comprehensive book on information literacy, but rather a brief overview in support of this one-unit class.
Simply put, this is one of my most favorite topics when it …
Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the order of this lesson, as well as give basic definitions of: •Machine-Level Security •Network Security •Internet Security •Social Engineering
The act of physically protecting the computers. The first rule of any …
The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.
Our third video in our Information Security series (part of the Introduction …
Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are
There are three forms of authentication •Something you know •Something you have •Something about you
This video focuses on date protection. We look at how to migrate …
This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.
Data is always priceless
Three topics: -Data migration -Data backup -Data disposal
Steps taken to protect computer networks. We cover permissions, user policies (especially …
Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.
Links from Video: -The System Administrator Song http://youtu.be/OpGN3oT1thA
Our 6 video in the Information Security series (part of Introduction to …
Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.
Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.
Video 7 of our information security series (part of Introduction to Computers) …
Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.
Links from Video: -AVG by Grisoft: http://free.avg.com/us-en/homepage -AVAST: http://www.avast.com -ClamWin: http://www.clamwin.com/ -Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download
Our last video in the Information Security lesson covers my favorite topic, …
Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.
I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.
Information visualization is concerned with the visual and interactive representation of abstract …
Information visualization is concerned with the visual and interactive representation of abstract and possibly complex datasets. As we encounter growing datasets in various sectors there is an increasing need to develop effective methods for making sense of data. Information visualization relies on computational means and our perceptual system to help reveal otherwise invisible patterns and gain new insights. Across various fields, there is great hope in the power of visualization to turn complex data into informative, engaging, and maybe even attractive forms. However, it typically takes several steps of data preparation and processing before a given dataset can be meaningfully visualized. While visualizations can indeed provide novel and useful perspectives on data, they can also obscure or misrepresent certain aspects of a phenomenon. Thus it is essential to develop a critical literacy towards the rhetoric of information visualization. One of the best ways to develop this literacy is to learn how to create visualizations! The tutorials offer a practical approach to working with data and to create interactive visualizations.
The tutorials require basic familiarity with statistics and programming. They come as Jupyter notebooks containing both human-readable explanations as well as computable code. The code blocks in the tutorials are written in Python, which you should either have already some experience with or a keen curiosity for. The tutorials make frequent use of the data analysis library Pandas, the visualization library Altair, and a range of other packages. You can view the tutorials as webpages, open and run them on Google Colab, or download the Jupyter notebook files to edit and run them locally.
An activity sheet with bibliographic information, an annotation, and ideas for extending …
An activity sheet with bibliographic information, an annotation, and ideas for extending the book with children. 2016 CLEL Bell Award Book for the early literacy practice, WRITE.
Water covers 71% of the earth's surface-does it get the instructional time …
Water covers 71% of the earth's surface-does it get the instructional time it deserves in your busy curriculum? Students wade right in to the study of bodies of water as they read and discuss science trade books and work together to develop Readers Theater scripts based on selected titles.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.