1 - INTRODUCTION

advertisement
1 - INTRODUCTION
(1) Focus of your portfolio: The goal of SED 514 is to equip teachers with technical and
pedagogical skills to enhance teaching and learning. You will prepare a 514-portfolio
(electronic or paper) of your work, illustrating how computer technologies can be used to
improve the teaching and learning of a particular unit within your discipline. By the time
you are done with this class, you will have collected and developed resources that will
benefit you and your students. Please note that many of the activities in this portfolio may
be also used as artifacts for your professional teaching portfolio (PDP) .


Complete the title page of the portfolio that includes you’re a photograph of you,
your name, school, subject taught, and topic for portfolio.
Identify the subject and topic for which your 514-portfolio will be developed.
Briefly describe the significance of this topic with respect to your curriculum.
Name
Rachel Cimino- Luther Burbank Middle School
Student Teacher- July 5, 2005 – August 26, 2005
Subject taught
Social Science
/ History
topic for portfolio
History Resources
and the InternetResearching
historical content
and current events
on the Internet can
be challenging.
There is a wealth
of available
information.
However, not all
websites are
created equal.
Which web sites
are reliable sources
of objective
information for
history/social
science students?
(2) Documenting your work with screen capture: Screen capture programs allow the user
to take pictures of anything on their screen and save them as graphics files. Download a
screen capture program for your home computer and use it to take pictures of items
required in this portfolio.

Demonstrate competency with a screen-capture utility by inserting a .jpg file of
keyboard shortcuts, contextual help menu, of the operating system you are using.
Note that virtually all programs and operating systems have help menus and
keyboard shorcuts. Consult these electronic help menus when you need to know
how to perform a particular operation.
(3) Backing-up and transporting your files: Always backup your files!!! You can: (a) save
them on USB drive or portable hard drive, (b) upload (ftp) them to your CSUN account
(uDrive), (c) move them to an Internet hard drive, or (d) send them as attached files
accompanying email messages. Do one of the following:

Save your work to your uDrive. The uDrive is an extra storage area that provides
additional disk space for campus users who wish to store their desktop files and
folders on a remote server. Include a screen capture.

Develop an Internet hard drive using the Yahoo briefcase or similar resource. You
can send your files to your Internet hard drive and then retrieve them at home or
school. Include a screen capture.
(4) Learning about your students. Most secondary school teachers must learn the names
of 150-200 students at the beginning of each academic year. This formidable task is made
much easier using a photographic seating chart. *TPE-tip Teachers may use photographic
seating charts, combined with student information surveys to learn about their students
early in the semester (TPE 8). Make certain to check with your school regarding policies
for photographing students.

Use a digital camera to make a seating chart for one of the classes you teach or for
this class at CSUN.
Seating Chart SED 514
Printer
Printer
Printer
(5) Searching / Identifying Plagiarism. The ease of information access can accelerate the
learning process, but it can also be counter-productive by facilitating plagiarism. Discuss
the importance of intellectual honesty with your students and illustrate how you can
easily identify work plaigiarized from sites on the Internet.

Using an advanced search engine with Boolean search features (such as
Altavista), find text from one of your students or from a website related to your
field that appears to be plagiarized. Copy and paste the text and the URLs of both
pieces in question. Alternatively, you may wish to use an online plagiarism
detection service such as tunitin.com
Here are some useful websites for researching plagiarism in the Social Sciences.
http://www.english.vt.edu/~IDLE/plagiarism/plagiarism3.html
http://www.plagiarized.com/
http://www.aresearchguide.com/6plagiar.html
Examples from template in assignment:
“The explosion in the use of computers began with 'Third Generation' computers. These
relied Jack St. Claire Kilby's invention - the integrated circuit or microchip; the first
integrated circuit was produced in September 1958 but computers using them didn't begin
to appear until 1963. While large 'mainframes' such as the I.B.M. 360 increased…”
FOUND AT:
http://www.eden.rutgers.edu/~jencita/
“On November 15th, 1971, Intel released the world's first commercial microprocessor,
the 4004. Fourth generation computers developed, using a microprocessor to locate much
of the computer's processing abilities on a single (small) chip…”
FOUND AT:
http://www.isystechonline.com/Harhis.htm
(6) History of computers / graphic search engines. Answer the following questions using
information from technology education websites or other online resources. Make certain
that all information is in your own words. No credit can be given for information that is
identical to that of another student or a web page.

Contributors to the development of the computer: Select five individuals who
have made significant contributions to the development of the computer. List the
contribution(s) of each individual and briefly describe its importance. See
technology education websites. Use a graphic search engine to find pictures of
each.

Computer Generations: Computer historians have classified computers into
"generations" in an effort to identify the major technological advances upon
which the computers are built. Briefly identify the major features of each of the
first five generations of computers. See technology education websites. Use a
graphic search engine to find pictures of each.
Photo
Contributions to the development of computer

Atanasoff, John V.; (1903-1995) Designed and
constructed the first electronic computer. It
was called the ABC (the Atanasoff-Berry
Computer). John Atanasoff was a mathematical
wizard. He has come to be known as the father
of the electronic/ digital age. His invention
served as the first model of computer
technology, which revolutionized the field, and
impacted the way we live today.

Burroughs, William Seward; (1855-1898) Initially a
bank clerk in upstate New York, William
Seward Burroughs created and patented a
printing adding machine in 1888. The
Burroughs Adding Machine was a great asset to
American Business, and therefore, contributed
to the development of computer technology.
More interestingly, William Seward Burroughs
was the grandfather of author William S.
Burroughs. William S. Burroughs is most
famous for his novels Naked Lunch and Junky.
The author was able to devote himself full-time
to his writing and drug addiction because of
the inheritance he received from his family.

da Vinci, Leonardo; inventor, polymath.
Polymath= “Know it All.” The ultimate
Renaissance man, Leonardo da Vinci
exemplifies the Humanist Ideal of the vastly
multi-talented inventor. In addition to painting
and sculpture, he was also a brilliant
mathematician, scientist, naturalist, engineer,
and architect. His contribution to technology is
evidenced by the vast array of drawings and
‘potential” inventions he envisioned far before
technological capacity.

Descartes, Rene; philosopher. “I think, therefore I
am.” (Cogito Ergo Sum) Most celebrated for his
philosophical writing Discourse on Methods.
Descartes was also the father of analytic
geometry. His contributions to the field of
mathematics make him an important
contributor to the digital age.

Einstein, Albert Physicist / Scientist. Einstein’s
Theory of Relativity (E=mc2) changed how
people thought about space and time. Although
his theories were used to develop nuclear
energy (and thus the Atomic Bomb), Einstein
himself was anti-war. His research about mass,
energy, light, and reactors gave rise to
exponential advances in technology.
generation
First19371953
Second
19541962
Third
19631972
Photo of key
component
Features
Machine made of electronic switches and vacuum tubes.
Speed of electronic operations was limited, as was the
capacity to “store” information. ABC computer (pictured
here) also known as the Atanasoff-Berry Computer. The
first computer was intended to perform mathematical
equations. It was, however, not programmable. The speed at
which certain functions were performed was slow. It’s basic
function was to store and process numerical data. By the
mid 1940’s, the U.S. government was using the machine to
help break German codes during WWII.
Advances made in the introduction of programming
languages and the scientific applications of tasks. Transistor
technology allowed for a faster ‘switching time’, and soon
the ‘Supercomputer’ was introduced. The ‘supercomputer’
allowed for multiple tasks to operate at the same time.
Programming languages, such as COBOL, were invented.
The third generation of computers was marked by the
invention of integrated circuits, expansion of memory and
operating systems. The ability to compute was enhanced
exponentially. Memory became larger and faster.
Fourth
19721984
Microcomputers and workstations become the norm. A vast
amount of information was now able to be stored on a small
computer “chip”. The C programming language and the
UNIX operating system were invented, allowing users to
use the same system for a variety of computers.
Fifth
19841990
Integration of parts and computer networks. Parallel
processors allowed for multi-tasking between different
programs. The memory of computer chips expanded.
Introduction of WAN and LAN allows for each worker to
have their own computer workstation hooked up to a
mainframe computer. Visual capacity increases.
(7) Making computers accessible to students: Given the importance of computers in
business and society, it is important that we provide students who have special needs
access via specialized software and hardware. Describe three data input or output devices,
or three OS or software options that may be used to make computers more accessible to
students with specific physical handicaps. *TPE-tip If you have students with special
needs in your class, you may wish to develop lesson plans illustrating how you have
made your curriculum accessible to them using adaptive hardware and/or software.
(TPE4)

Experiment with the universal access features associated with your computer's
operating system and research third-party hardware and software solutions for
those with special needs. Describe three hardware or software solutions and
explain how they may help students with specific special needs.
Special Needs Hardware & Software by MACINTOSH:
VISION = “ZOOM”: Magnifies the screen making language and graphics easier to see.
HEARING = “QUICK TIME”: Allows user to create and display a text track. Text track
can be used for “closed captioning” for the hearing impaired.
PHYSICAL / MOTOR = “SLOW KEYS”: For those with impaired physical or motor
skills, SLOW KEYS helps prevent multiple strokes on the keyboard and allows for time
to navigate.
Special Needs Hardware & Software by ABLEDATA:
ACCUVOTE-TS: Voice output voting machine for the visually impaired. System offers
eight different languages. Has interactive touch-screen system for visibility and
headphones for voice output.
(8) Computer knowledge. Teachers should be conversant with computer terminology and
concepts that pertain to the use of technology in their classrooms.

Review the list of computer terms and concepts for educators and then take this
online quiz. Retake the quiz until you understand the terms and concepts and
score 90% or better. Include a screen shot of your first and final test results.
*TPE-tip If you have access to an online test-generation system such as WebCT,
Blackboard, or Quizmaker, you may wish to develop online self-quizes for your
students. (TPE2, TPE3)
Answers: SED 514 Computer
Terminology and Concepts for
Teachers
1 Which of the following is a true statement regarding operating
systems?
Your answer: Without an operating system, no programs can run
CORRECT!
2 Which of the following is/are tasks of the operating system?
Your answer: all of the above
CORRECT!
3 Which of the following requires the greatest bandwidth?
Your answer: streaming high definition video
CORRECT!
4 Which of the following best describes a blog?
Your answer: A web log on which students can share their
journals
CORRECT!
5 Beta software …
Your answer: all of the above
CORRECT!
6 Which of the following represents the largest amount of data?
Your answer: terabyte
CORRECT!
7 Which of the following graphics files would NOT appear
pixilated (show blocky pixels) if enlarged?
Your answer: tiff
Wrong.
8 When information is uploaded it…
Your answer: Received from a host computer
Wrong.
9 If the performance (speed) of your computer has dropped and
you hear a lot of sputtering noises from your computer, it is
likely that you need to:
Your answer: Defragment your hard drive so files are no-longer
broken in many pieces, but stored efficiently so they can be read
more quickly
CORRECT!
10 When purchasing software for your school, you should
invest in cross-platform software if:
Your answer: Your student laboratory has Macs and PCs
CORRECT!
11 A school acceptable use policy (AUP) should include
Your answer: all of the above
CORRECT!
12 Which of the following has the greatest need for encryption
Your answer: Passwords for students to access their grades online
CORRECT!
13 Wired and wireless communication have revolutionized
research capabilities for teachers and students. Which of the
following communication term pairs are not paired correctly?
Your answer: Bluetooth - PDA and cell phone syncing
Wrong.
14 There is a lot of erroneous information on the Internet, and
this can cause tremendous confusion, particularly as students
perform research for reports. However, students should always
be able to trust data from the following domain:
Your answer: .gov
Wrong.
15 Which one of the following is incorrectly matched?
Your answer: GUI - English class Shakespeare project
CORRECT!
16 If students complain that your laboratory computers are too
slow to operate software for your class, you might request that
school technicians
Your answer: add a 56 baud modem
Wrong.
17 Which of the following would be classified as edutainment?
Your answer: AlgeBlaster, Oregon Trail, Discovery Channel
CORRECT!
18 Many application programs (word processors, spreadsheets,
databases) store data as text files. These ASCII (text) files are
given the .txt extension. Why would a teacher be interested in
saving files in this format?
Your answer: 1 & 2
CORRECT!
19 Most school and district networks have firewalls. Which of
the following is NOTMany schools encourage their students to
save files on compact flash or secure digital cards (also known
as CF cards, USB drives, jump drives, thumb drives, multimedia cards). Which of the following is NOT a reason f
Your answer: A firewall may prevent teacher access to common
sites such as Yahoo.
Wrong.
20 Many schools encourage their students to save files on
compact flash or secure digital cards (also known as CF cards,
USB drives, jump drives, thumb drives, multi-media cards).
Which of the following is NOT a reason for advising students to
purchase such devices.
Your answer: Problems with firewall interference with such
devices are minimal or non-existent compared to problems
associated with sending and receiving email attachments
Wrong.
21 Extensions help users and software identify file types
delivered via the Internet. Which of the following sets of
extension is most commonly used in education.
Your answer: .jpg .mp4 .pdf .doc .xls .ppt .gif .txt
CORRECT!
22
Students should be taught good netiquette, particularly when
accessing
Your answer: Email, newsgroups, web logs and chats
CORRECT!
23 Students should always be encouraged to save their work on
two forms of secondary memory storage such as
Your answer: Hard drive, optical disc
CORRECT!
24 Which of the following is an example of analog, rather than
digital data?
Your answer: A Monet painting
CORRECT!
25 When ordering software for your school, it is important to
check “system requirements”. Which one of the system
requirements is mismatched?
Your answer: Graphics card / Power PC G5, 2.0 GHz or better
CORRECT!
26 Campus networks are particularly prone to “infection” from
malicious code and unwanted files that may decrease
performance, fill hard drives, or corrupt files. All of the
following fall into this category except:
Your answer: System files, startup files
CORRECT!
27 Data/video projectors can be used to display graphics and
text related to your curriculum. Which of the following data
projctors would give the sharpest and brightest image, and
therefore be the easiest for students to see?
Your answer: LCD / 1300 lumens / 1024 x 768 pixels
Wrong.
28
Which of the following would allow students who were
unable to attend school (e.g. for medical or distance reasons) to
participate in real-time classroom discussions.
Your answer: 2-way synchronous video chat
Wrong.
29 Which of the following should schools have to prevent
damage to their computers or restore systems that have crashed?
Your answer: surge protector / spike protector / virus scan
software / boot CD / password protected access /firewall
CORRECT!
30 Which of the following provides teachers may cause greatest
frustration to a teacher who is trying to post his or her grades to
the secure school website?
Your answer: 56K dial-up
CORRECT!
Total score: 21/30 (70.00%).
514 website
Download